task
stringlengths
12
101
input
stringlengths
0
13.4k
output
stringlengths
1
3.92k
options
sequence
pageTitle
stringlengths
0
254
outputColName
stringlengths
1
492
url
stringlengths
21
194
wdcFile
stringlengths
69
75
b053d7aa_OIT_Services__Description
[Service] Hobsons [User Group] Staff [Description]
This application enables CGU to manage the entire student lifecycle, including recruitment, enrollment, and retention.
[]
OIT Services
Description
http://jodi.james@cgu.edu/pages/9244.asp
43/1438042989042.37_20150728002309-00300-ip-10-236-191-2_124703343_2.json
b053d7aa_OIT_Services__Description
[Service] Millennium [User Group] Staff [Description]
Millennium is CGU's fundraising software.
[]
OIT Services
Description
http://jodi.james@cgu.edu/pages/9244.asp
43/1438042989042.37_20150728002309-00300-ip-10-236-191-2_124703343_2.json
b053d7aa_OIT_Services__Description
[Service] Telephone Services [User Group] Faculty, Staff [Description]
For issues related to your office telephone, please contact the Claremont University Consortium Telephone Office.
[]
OIT Services
Description
http://jodi.james@cgu.edu/pages/9244.asp
43/1438042989042.37_20150728002309-00300-ip-10-236-191-2_124703343_2.json
6669fd4d_A___Environmental_Defense_Fund__ARPA_E_MONITOR_Program
[0] Industry applicability Focused on emissions from well pads and associated equipment, and compressors [ARPA-E MONITOR Program]
Focused on oil and gas systems from the wellhead to the end-user
[]
Methane Detectors Challenge Q&A | Environmental Defense Fund
ARPA-E MONITOR Program
https://www.edf.org/energy/natural-gas-policy/methane-detectors-challenge/q-and-a
18/1438042989142.82_20150728002309-00034-ip-10-236-191-2_896963408_0.json
6669fd4d_A___Environmental_Defense_Fund__ARPA_E_MONITOR_Program
[0] Technology stage Relatively mature technologies ready for testing in a controlled environment, and able to be deployed in industrial settings in the short run [ARPA-E MONITOR Program]
Early stage technologies requiring substantial time and resources for development to ensure reliable detection for transformational improvements
[]
Methane Detectors Challenge Q&A | Environmental Defense Fund
ARPA-E MONITOR Program
https://www.edf.org/energy/natural-gas-policy/methane-detectors-challenge/q-and-a
18/1438042989142.82_20150728002309-00034-ip-10-236-191-2_896963408_0.json
6669fd4d_A___Environmental_Defense_Fund__ARPA_E_MONITOR_Program
[0] Scope of detection Limited to continuous detection technologies, that provide a 24/7 approach to detecting leaks [ARPA-E MONITOR Program]
Open to continuous or periodic/mobile approaches to detecting emissions
[]
Methane Detectors Challenge Q&A | Environmental Defense Fund
ARPA-E MONITOR Program
https://www.edf.org/energy/natural-gas-policy/methane-detectors-challenge/q-and-a
18/1438042989142.82_20150728002309-00034-ip-10-236-191-2_896963408_0.json
6669fd4d_A___Environmental_Defense_Fund__ARPA_E_MONITOR_Program
[0] Leak size Focused on large leaks; initial basic requirements of 5 and 2.5 scfm for detection, with preference for adaptive technologies and potential to detect somewhat smaller leaks [ARPA-E MONITOR Program]
Focused on a wide range of emissions including small leaks; threshold of 0.1 scfm
[]
Methane Detectors Challenge Q&A | Environmental Defense Fund
ARPA-E MONITOR Program
https://www.edf.org/energy/natural-gas-policy/methane-detectors-challenge/q-and-a
18/1438042989142.82_20150728002309-00034-ip-10-236-191-2_896963408_0.json
6669fd4d_A___Environmental_Defense_Fund__ARPA_E_MONITOR_Program
[0] Information provided Notification of methane emissions, including rough indication of leak size; leak location not required [ARPA-E MONITOR Program]
Reasonably accurate quantification of methane emissions, in addition to leak location down to 1m precision
[]
Methane Detectors Challenge Q&A | Environmental Defense Fund
ARPA-E MONITOR Program
https://www.edf.org/energy/natural-gas-policy/methane-detectors-challenge/q-and-a
18/1438042989142.82_20150728002309-00034-ip-10-236-191-2_896963408_0.json
6669fd4d_A___Environmental_Defense_Fund__ARPA_E_MONITOR_Program
[0] Timeline Full proposals due June 17,2014; testing begins summer 2014; industry pilots expected in 2015 [ARPA-E MONITOR Program]
Concept papers due June 13, 2014, Full application deadline TBD
[]
Methane Detectors Challenge Q&A | Environmental Defense Fund
ARPA-E MONITOR Program
https://www.edf.org/energy/natural-gas-policy/methane-detectors-challenge/q-and-a
18/1438042989142.82_20150728002309-00034-ip-10-236-191-2_896963408_0.json
6669fd4d_A___Environmental_Defense_Fund__ARPA_E_MONITOR_Program
[0] Funding type Independent testing paid for by EDF; industry pilot purchases expected; no development awards anticipated [ARPA-E MONITOR Program]
Up to $30M provided for development of the technology, in increments between $250,000 and $10M per awardee
[]
Methane Detectors Challenge Q&A | Environmental Defense Fund
ARPA-E MONITOR Program
https://www.edf.org/energy/natural-gas-policy/methane-detectors-challenge/q-and-a
18/1438042989142.82_20150728002309-00034-ip-10-236-191-2_896963408_0.json
6669fd4d_A___Environmental_Defense_Fund__ARPA_E_MONITOR_Program
[0] Market access Many of the participating companies intend to make pilot purchases and trial deployments of instruments that meet the specifications [ARPA-E MONITOR Program]
Not applicable
[]
Methane Detectors Challenge Q&A | Environmental Defense Fund
ARPA-E MONITOR Program
https://www.edf.org/energy/natural-gas-policy/methane-detectors-challenge/q-and-a
18/1438042989142.82_20150728002309-00034-ip-10-236-191-2_896963408_0.json
6669fd4d_A___Environmental_Defense_Fund__ARPA_E_MONITOR_Program
[0] Partnership EDF partnering with five leading oil and gas producers [ARPA-E MONITOR Program]
ARPA-E partnering directly with innovators to help them develop their technologies; no industry partnership planned at this time
[]
Methane Detectors Challenge Q&A | Environmental Defense Fund
ARPA-E MONITOR Program
https://www.edf.org/energy/natural-gas-policy/methane-detectors-challenge/q-and-a
18/1438042989142.82_20150728002309-00034-ip-10-236-191-2_896963408_0.json
eb4e061e_n_Center___Feelings_Vocabulary__2
[0] abandoned [1] distrusted [3] diminished [2]
put down
[ [ "p", "u", "t", " ", "d", "o", "w", "n" ], [ "r", "e", "j", "e", "c", "t", "e", "d" ], [ "t", "a", "k", "e", "n", " ", "f", "o", "r", " ", "g", "r", "a", "n", "t", "e", "d" ], [ "t", "h", "r", "e", "a", "t", "e", "n", "e", "d" ], [ "u", "n", "a", "p", "p", "r", "e", "c", "i", "a", "t", "e", "d" ], [ "u", "n", "h", "e", "a", "r", "d" ], [ "u", "n", "s", "e", "e", "n" ], [ "u", "n", "s", "u", "p", "p", "o", "r", "t", "e", "d" ] ]
Sweetwater Zen Center - Feelings Vocabulary
2
http://www.swzc.org/pages/feelings.html
37/1438042982013.25_20150728002302-00011-ip-10-236-191-2_742846452_21.json
eb4e061e_n_Center___Feelings_Vocabulary__2
[0] abused [1] interrupted [3] provoked [2]
rejected
[ [ "p", "u", "t", " ", "d", "o", "w", "n" ], [ "r", "e", "j", "e", "c", "t", "e", "d" ], [ "t", "a", "k", "e", "n", " ", "f", "o", "r", " ", "g", "r", "a", "n", "t", "e", "d" ], [ "t", "h", "r", "e", "a", "t", "e", "n", "e", "d" ], [ "u", "n", "a", "p", "p", "r", "e", "c", "i", "a", "t", "e", "d" ], [ "u", "n", "h", "e", "a", "r", "d" ], [ "u", "n", "s", "e", "e", "n" ], [ "u", "n", "s", "u", "p", "p", "o", "r", "t", "e", "d" ] ]
Sweetwater Zen Center - Feelings Vocabulary
2
http://www.swzc.org/pages/feelings.html
37/1438042982013.25_20150728002302-00011-ip-10-236-191-2_742846452_21.json
eb4e061e_n_Center___Feelings_Vocabulary__2
[0] attacked [1] intimidated [3] used [2]
taken for granted
[ [ "p", "u", "t", " ", "d", "o", "w", "n" ], [ "r", "e", "j", "e", "c", "t", "e", "d" ], [ "t", "a", "k", "e", "n", " ", "f", "o", "r", " ", "g", "r", "a", "n", "t", "e", "d" ], [ "t", "h", "r", "e", "a", "t", "e", "n", "e", "d" ], [ "u", "n", "a", "p", "p", "r", "e", "c", "i", "a", "t", "e", "d" ], [ "u", "n", "h", "e", "a", "r", "d" ], [ "u", "n", "s", "e", "e", "n" ], [ "u", "n", "s", "u", "p", "p", "o", "r", "t", "e", "d" ] ]
Sweetwater Zen Center - Feelings Vocabulary
2
http://www.swzc.org/pages/feelings.html
37/1438042982013.25_20150728002302-00011-ip-10-236-191-2_742846452_21.json
eb4e061e_n_Center___Feelings_Vocabulary__2
[0] betrayed [1] let down [3] pressured [2]
threatened
[ [ "p", "u", "t", " ", "d", "o", "w", "n" ], [ "r", "e", "j", "e", "c", "t", "e", "d" ], [ "t", "a", "k", "e", "n", " ", "f", "o", "r", " ", "g", "r", "a", "n", "t", "e", "d" ], [ "t", "h", "r", "e", "a", "t", "e", "n", "e", "d" ], [ "u", "n", "a", "p", "p", "r", "e", "c", "i", "a", "t", "e", "d" ], [ "u", "n", "h", "e", "a", "r", "d" ], [ "u", "n", "s", "e", "e", "n" ], [ "u", "n", "s", "u", "p", "p", "o", "r", "t", "e", "d" ] ]
Sweetwater Zen Center - Feelings Vocabulary
2
http://www.swzc.org/pages/feelings.html
37/1438042982013.25_20150728002302-00011-ip-10-236-191-2_742846452_21.json
eb4e061e_n_Center___Feelings_Vocabulary__2
[0] boxed in [1] manipulated [3] cornered [2]
unappreciated
[ [ "p", "u", "t", " ", "d", "o", "w", "n" ], [ "r", "e", "j", "e", "c", "t", "e", "d" ], [ "t", "a", "k", "e", "n", " ", "f", "o", "r", " ", "g", "r", "a", "n", "t", "e", "d" ], [ "t", "h", "r", "e", "a", "t", "e", "n", "e", "d" ], [ "u", "n", "a", "p", "p", "r", "e", "c", "i", "a", "t", "e", "d" ], [ "u", "n", "h", "e", "a", "r", "d" ], [ "u", "n", "s", "e", "e", "n" ], [ "u", "n", "s", "u", "p", "p", "o", "r", "t", "e", "d" ] ]
Sweetwater Zen Center - Feelings Vocabulary
2
http://www.swzc.org/pages/feelings.html
37/1438042982013.25_20150728002302-00011-ip-10-236-191-2_742846452_21.json
eb4e061e_n_Center___Feelings_Vocabulary__2
[0] bullied [1] misunderstood [3] unwanted [2]
unheard
[ [ "p", "u", "t", " ", "d", "o", "w", "n" ], [ "r", "e", "j", "e", "c", "t", "e", "d" ], [ "t", "a", "k", "e", "n", " ", "f", "o", "r", " ", "g", "r", "a", "n", "t", "e", "d" ], [ "t", "h", "r", "e", "a", "t", "e", "n", "e", "d" ], [ "u", "n", "a", "p", "p", "r", "e", "c", "i", "a", "t", "e", "d" ], [ "u", "n", "h", "e", "a", "r", "d" ], [ "u", "n", "s", "e", "e", "n" ], [ "u", "n", "s", "u", "p", "p", "o", "r", "t", "e", "d" ] ]
Sweetwater Zen Center - Feelings Vocabulary
2
http://www.swzc.org/pages/feelings.html
37/1438042982013.25_20150728002302-00011-ip-10-236-191-2_742846452_21.json
eb4e061e_n_Center___Feelings_Vocabulary__2
[0] cheated [1] neglected [3] patronized [2]
unseen
[ [ "p", "u", "t", " ", "d", "o", "w", "n" ], [ "r", "e", "j", "e", "c", "t", "e", "d" ], [ "t", "a", "k", "e", "n", " ", "f", "o", "r", " ", "g", "r", "a", "n", "t", "e", "d" ], [ "t", "h", "r", "e", "a", "t", "e", "n", "e", "d" ], [ "u", "n", "a", "p", "p", "r", "e", "c", "i", "a", "t", "e", "d" ], [ "u", "n", "h", "e", "a", "r", "d" ], [ "u", "n", "s", "e", "e", "n" ], [ "u", "n", "s", "u", "p", "p", "o", "r", "t", "e", "d" ] ]
Sweetwater Zen Center - Feelings Vocabulary
2
http://www.swzc.org/pages/feelings.html
37/1438042982013.25_20150728002302-00011-ip-10-236-191-2_742846452_21.json
eb4e061e_n_Center___Feelings_Vocabulary__2
[0] coerced [1] overworked [3] co-opted [2]
unsupported
[ [ "p", "u", "t", " ", "d", "o", "w", "n" ], [ "r", "e", "j", "e", "c", "t", "e", "d" ], [ "t", "a", "k", "e", "n", " ", "f", "o", "r", " ", "g", "r", "a", "n", "t", "e", "d" ], [ "t", "h", "r", "e", "a", "t", "e", "n", "e", "d" ], [ "u", "n", "a", "p", "p", "r", "e", "c", "i", "a", "t", "e", "d" ], [ "u", "n", "h", "e", "a", "r", "d" ], [ "u", "n", "s", "e", "e", "n" ], [ "u", "n", "s", "u", "p", "p", "o", "r", "t", "e", "d" ] ]
Sweetwater Zen Center - Feelings Vocabulary
2
http://www.swzc.org/pages/feelings.html
37/1438042982013.25_20150728002302-00011-ip-10-236-191-2_742846452_21.json
d8362d8e_g_JD_Students___Georgetown_Law__3
[Step] 1 Free Application for Federal Student Aid (FAFSA) Free Application for Federal Student Aid (FAFSA) [3]
Required for all federal aid applicants Use school code G21075 Parent information is not required
[]
Incoming and Transferring JD Students — Georgetown Law
3
http://www.law.georgetown.edu/admissions-financial-aid/office-of-financial-aid/apply/New-JD.cfm
50/1438042991951.97_20150728002311-00231-ip-10-236-191-2_552660300_0.json
d8362d8e_g_JD_Students___Georgetown_Law__3
[Step] 2 Need Access Application [3]
Required for grant applicants only Must include parents' information *
[]
Incoming and Transferring JD Students — Georgetown Law
3
http://www.law.georgetown.edu/admissions-financial-aid/office-of-financial-aid/apply/New-JD.cfm
50/1438042991951.97_20150728002311-00231-ip-10-236-191-2_552660300_0.json
d8362d8e_g_JD_Students___Georgetown_Law__3
[Step] 3 Obtain GU Net ID credentials and establish new password Obtain GU Net ID credentials and establish new password [3]
Admission is required before completion of this step Click on "Your Credentials" link in right column of Admitted Student Website Must set security questions and new password at NetID Password Management System
[]
Incoming and Transferring JD Students — Georgetown Law
3
http://www.law.georgetown.edu/admissions-financial-aid/office-of-financial-aid/apply/New-JD.cfm
50/1438042991951.97_20150728002311-00231-ip-10-236-191-2_552660300_0.json
d8362d8e_g_JD_Students___Georgetown_Law__3
[Step] 4 Georgetown Law Yellow Application Georgetown Law Express Yellow Application [3]
Log-in with official GU NetID -- NOT your Admitted Student Website username and password See instructions in step 3 above Must set security questions and new password at NetID Password Management System BEFORE attempting to log-in to Yellow Application
[]
Incoming and Transferring JD Students — Georgetown Law
3
http://www.law.georgetown.edu/admissions-financial-aid/office-of-financial-aid/apply/New-JD.cfm
50/1438042991951.97_20150728002311-00231-ip-10-236-191-2_552660300_0.json
d8362d8e_g_JD_Students___Georgetown_Law__3
[Step] 5 Review Award Notice Review Award Notice [3]
Tentative award notice will be e-mailed approx. 3 weeks after application is completed
[]
Incoming and Transferring JD Students — Georgetown Law
3
http://www.law.georgetown.edu/admissions-financial-aid/office-of-financial-aid/apply/New-JD.cfm
50/1438042991951.97_20150728002311-00231-ip-10-236-191-2_552660300_0.json
d8362d8e_g_JD_Students___Georgetown_Law__3
[Step] 6 Submit Tax Documents [3]
44 Copies of student's, spouse's and parents' 2014 federal tax return and W-2s required if award includes Dean's Tuition Grant assistance You may e-mail, fax or mail
[]
Incoming and Transferring JD Students — Georgetown Law
3
http://www.law.georgetown.edu/admissions-financial-aid/office-of-financial-aid/apply/New-JD.cfm
50/1438042991951.97_20150728002311-00231-ip-10-236-191-2_552660300_0.json
cbae062d_n_Day_s_Automotive_Electronics__2
[0] Valve [1] Pressure [2]
Switch
[]
How signal chains and PLCs impact our lives - John Day's Automotive Electronics
2
http://johndayautomotivelectronics.com/how-signal-chains-and-plcs-impact-our-lives/
47/1438042986806.32_20150728002306-00014-ip-10-236-191-2_138117865_9.json
cbae062d_n_Day_s_Automotive_Electronics__2
[0] Motor [1] Humidity [2]
Solenoid
[]
How signal chains and PLCs impact our lives - John Day's Automotive Electronics
2
http://johndayautomotivelectronics.com/how-signal-chains-and-plcs-impact-our-lives/
47/1438042986806.32_20150728002306-00014-ip-10-236-191-2_138117865_9.json
cbae062d_n_Day_s_Automotive_Electronics__2
[0] Pressure [1] Force feedback [2]
Lights
[]
How signal chains and PLCs impact our lives - John Day's Automotive Electronics
2
http://johndayautomotivelectronics.com/how-signal-chains-and-plcs-impact-our-lives/
47/1438042986806.32_20150728002306-00014-ip-10-236-191-2_138117865_9.json
cbae062d_n_Day_s_Automotive_Electronics__2
[0] Velocity [1] Room entry [2]
Weight
[]
How signal chains and PLCs impact our lives - John Day's Automotive Electronics
2
http://johndayautomotivelectronics.com/how-signal-chains-and-plcs-impact-our-lives/
47/1438042986806.32_20150728002306-00014-ip-10-236-191-2_138117865_9.json
cbae062d_n_Day_s_Automotive_Electronics__2
[0] Flow [1] Sequence [2]
Speed
[]
How signal chains and PLCs impact our lives - John Day's Automotive Electronics
2
http://johndayautomotivelectronics.com/how-signal-chains-and-plcs-impact-our-lives/
47/1438042986806.32_20150728002306-00014-ip-10-236-191-2_138117865_9.json
cbae062d_n_Day_s_Automotive_Electronics__2
[0] Volume [1] Authorization [2]
Meters
[]
How signal chains and PLCs impact our lives - John Day's Automotive Electronics
2
http://johndayautomotivelectronics.com/how-signal-chains-and-plcs-impact-our-lives/
47/1438042986806.32_20150728002306-00014-ip-10-236-191-2_138117865_9.json
cbae062d_n_Day_s_Automotive_Electronics__2
[0] Torque [1] Attenuation [2]
Display
[]
How signal chains and PLCs impact our lives - John Day's Automotive Electronics
2
http://johndayautomotivelectronics.com/how-signal-chains-and-plcs-impact-our-lives/
47/1438042986806.32_20150728002306-00014-ip-10-236-191-2_138117865_9.json
cbae062d_n_Day_s_Automotive_Electronics__2
[0] Frequency [1] Equalization [2]
Calibration
[]
How signal chains and PLCs impact our lives - John Day's Automotive Electronics
2
http://johndayautomotivelectronics.com/how-signal-chains-and-plcs-impact-our-lives/
47/1438042986806.32_20150728002306-00014-ip-10-236-191-2_138117865_9.json
cbae062d_n_Day_s_Automotive_Electronics__2
[0] Voltage [1] Communication [2]
Time
[]
How signal chains and PLCs impact our lives - John Day's Automotive Electronics
2
http://johndayautomotivelectronics.com/how-signal-chains-and-plcs-impact-our-lives/
47/1438042986806.32_20150728002306-00014-ip-10-236-191-2_138117865_9.json
cbae062d_n_Day_s_Automotive_Electronics__2
[0] Current [1] Gain offset [2]
Tool
[]
How signal chains and PLCs impact our lives - John Day's Automotive Electronics
2
http://johndayautomotivelectronics.com/how-signal-chains-and-plcs-impact-our-lives/
47/1438042986806.32_20150728002306-00014-ip-10-236-191-2_138117865_9.json
cbae062d_n_Day_s_Automotive_Electronics__2
[0] xx [1] Flux density [2]
Pitch
[]
How signal chains and PLCs impact our lives - John Day's Automotive Electronics
2
http://johndayautomotivelectronics.com/how-signal-chains-and-plcs-impact-our-lives/
47/1438042986806.32_20150728002306-00014-ip-10-236-191-2_138117865_9.json
cbae062d_n_Day_s_Automotive_Electronics__2
[0] Position [1] Temperature [2]
Filter
[]
How signal chains and PLCs impact our lives - John Day's Automotive Electronics
2
http://johndayautomotivelectronics.com/how-signal-chains-and-plcs-impact-our-lives/
47/1438042986806.32_20150728002306-00014-ip-10-236-191-2_138117865_9.json
cbae062d_n_Day_s_Automotive_Electronics__2
[0] Power [1] Galvanometers [2]
Acceleration
[]
How signal chains and PLCs impact our lives - John Day's Automotive Electronics
2
http://johndayautomotivelectronics.com/how-signal-chains-and-plcs-impact-our-lives/
47/1438042986806.32_20150728002306-00014-ip-10-236-191-2_138117865_9.json
cbae062d_n_Day_s_Automotive_Electronics__2
[0] Brightness [1] Air-fuel ration [2]
Contrast
[]
How signal chains and PLCs impact our lives - John Day's Automotive Electronics
2
http://johndayautomotivelectronics.com/how-signal-chains-and-plcs-impact-our-lives/
47/1438042986806.32_20150728002306-00014-ip-10-236-191-2_138117865_9.json
84b4470e_Insurance_Corporation_of_India__4
[0] Fund Type [1] Bond Fund [2] Secured Fund [3] Balanced Fund [4]
Growth Fund
[]
Life Insurance Corporation of India
4
http://www.licindia.in/endowment%20plus_features.htm
40/1438042981921.1_20150728002301-00237-ip-10-236-191-2_548794705_11.json
84b4470e_Insurance_Corporation_of_India__4
[0] Investment in Government / Government Guaranteed Securities / Corporate Debt [1] Not less than 60% [2] Not less than 45% [3] Not less than 30% [4]
Not less than 20%
[]
Life Insurance Corporation of India
4
http://www.licindia.in/endowment%20plus_features.htm
40/1438042981921.1_20150728002301-00237-ip-10-236-191-2_548794705_11.json
84b4470e_Insurance_Corporation_of_India__4
[0] Short-term investments such as money market instruments [1] Not more than 40% [2] Not more than 40% [3] Not more than 40% [4]
Not more than 40%
[]
Life Insurance Corporation of India
4
http://www.licindia.in/endowment%20plus_features.htm
40/1438042981921.1_20150728002301-00237-ip-10-236-191-2_548794705_11.json
84b4470e_Insurance_Corporation_of_India__4
[0] Investment in Listed Equity Shares [1] Nil [2] Not less than 15% & Not more than 55% [3] Not less than 30% & Not more than 70% [4]
Not less than 40% & Not more than 80%
[]
Life Insurance Corporation of India
4
http://www.licindia.in/endowment%20plus_features.htm
40/1438042981921.1_20150728002301-00237-ip-10-236-191-2_548794705_11.json
84b4470e_Insurance_Corporation_of_India__4
[0] Details and objective of the fund for risk /return [1] Low risk [2] Steady Income Lower to Medium risk [3] Balanced Income and growth Medium risk [4]
Long term Capital growth High risk
[]
Life Insurance Corporation of India
4
http://www.licindia.in/endowment%20plus_features.htm
40/1438042981921.1_20150728002301-00237-ip-10-236-191-2_548794705_11.json
84b4470e_Insurance_Corporation_of_India__4
[0] Details and objective of the fund for risk /return [1] ULIF001200910LICEND+BND512 [2] ULIF002200910LICEND+SEC512 [3] ULIF003200910LICEND+BAL512 [4]
ULIF004200910LICEND+GRW512
[]
Life Insurance Corporation of India
4
http://www.licindia.in/endowment%20plus_features.htm
40/1438042981921.1_20150728002301-00237-ip-10-236-191-2_548794705_11.json
c671d8f6_e_a_Hospital_Admission_Closely__Hospital_Status
[Situation] You visit the emergency room, and then the doctor writes an order to admit you to the hospital. [Part A Pays] Your hospital stay usually including emergency department charges and all medications. You will pay your required co-payment [Part B Pays] 80% of Doctor services after your annual deductible has been satisfied [Hospital Status]
Inpatient
[ [ "I", "n", "p", "a", "t", "i", "e", "n", "t" ], [ "O", "u", "t", "p", "a", "t", "i", "e", "n", "t" ] ]
Admitted to the Hospital? Are You Sure? Scrutinize a Hospital Admission Closely
Hospital Status
http://www.eldercareteam.com/public/733.cfm?sd=54
20/1438044160065.87_20150728004240-00035-ip-10-236-191-2_434965630_18.json
c671d8f6_e_a_Hospital_Admission_Closely__Hospital_Status
[Situation] You visit the emergency room for a broken bone. You receive x-rays, have the bone set, and go home with a prescription for pain. [Part A Pays] Nothing [Part B Pays] 80% of Doctor and outpatient services (x-rays, cast) after your annual deductible has been satisfied [Hospital Status]
Outpatient
[ [ "I", "n", "p", "a", "t", "i", "e", "n", "t" ], [ "O", "u", "t", "p", "a", "t", "i", "e", "n", "t" ] ]
Admitted to the Hospital? Are You Sure? Scrutinize a Hospital Admission Closely
Hospital Status
http://www.eldercareteam.com/public/733.cfm?sd=54
20/1438044160065.87_20150728004240-00035-ip-10-236-191-2_434965630_18.json
c671d8f6_e_a_Hospital_Admission_Closely__Hospital_Status
[Situation] You visit the emergency room because of chest pain. You stay in the hospital for two nights for observation. [Part A Pays] Nothing [Part B Pays] 80% of Doctor services and hospital outpatient services (emergency dept. visit, observation, lab tests, EKGs, etc.) after your annual deductible has been satisfied You are responsible to pay for medications received while under observation. [Hospital Status]
Outpatient
[ [ "I", "n", "p", "a", "t", "i", "e", "n", "t" ], [ "O", "u", "t", "p", "a", "t", "i", "e", "n", "t" ] ]
Admitted to the Hospital? Are You Sure? Scrutinize a Hospital Admission Closely
Hospital Status
http://www.eldercareteam.com/public/733.cfm?sd=54
20/1438044160065.87_20150728004240-00035-ip-10-236-191-2_434965630_18.json
c671d8f6_e_a_Hospital_Admission_Closely__Hospital_Status
[Situation] You have outpatient surgery, but the doctor keeps you overnight because you have a reaction that is of concern. You are not admitted as an inpatient, and you go home the following day. [Part A Pays] Nothing [Part B Pays] 80% of Doctor services and hospital outpatient services (observation, lab tests, etc.) after your annual deductible has been satisfied You are responsible to pay for medications received while under observation. [Hospital Status]
Outpatient
[ [ "I", "n", "p", "a", "t", "i", "e", "n", "t" ], [ "O", "u", "t", "p", "a", "t", "i", "e", "n", "t" ] ]
Admitted to the Hospital? Are You Sure? Scrutinize a Hospital Admission Closely
Hospital Status
http://www.eldercareteam.com/public/733.cfm?sd=54
20/1438044160065.87_20150728004240-00035-ip-10-236-191-2_434965630_18.json
c671d8f6_e_a_Hospital_Admission_Closely__Hospital_Status
[Situation] You are kept in the hospital 24 hours for observation. You are then admitted for continuing care. [Part A Pays] Your hospital stay usually including emergency department charges and all medications. You will pay your required co-payment. [Part B Pays] 80% of Doctor services after your annual deductible has been satisfied [Hospital Status]
Inpatient
[ [ "I", "n", "p", "a", "t", "i", "e", "n", "t" ], [ "O", "u", "t", "p", "a", "t", "i", "e", "n", "t" ] ]
Admitted to the Hospital? Are You Sure? Scrutinize a Hospital Admission Closely
Hospital Status
http://www.eldercareteam.com/public/733.cfm?sd=54
20/1438044160065.87_20150728004240-00035-ip-10-236-191-2_434965630_18.json
c671d8f6_e_a_Hospital_Admission_Closely__Hospital_Status
[Situation] You are admitted to the hospital as an inpatient. However, the hospital informs you later that your status has been changed to "under observation." [Part A Pays] Nothing [Part B Pays] 80% of Doctor services and hospital outpatient services (observation, lab tests, etc.) after your annual deductible has been satisfied You are responsible to pay for medications received while in the hospital [Hospital Status]
Outpatient
[ [ "I", "n", "p", "a", "t", "i", "e", "n", "t" ], [ "O", "u", "t", "p", "a", "t", "i", "e", "n", "t" ] ]
Admitted to the Hospital? Are You Sure? Scrutinize a Hospital Admission Closely
Hospital Status
http://www.eldercareteam.com/public/733.cfm?sd=54
20/1438044160065.87_20150728004240-00035-ip-10-236-191-2_434965630_18.json
e1b590ee__tomato_pests_and_control_them__Symptom
[Pest] tomato cutworm (early in the season) [Symptom]
chewed stem
[]
How to identify tomato pests and control them
Symptom
http://www.tomatodirt.com/tomato-pests.html
12/1438042990114.79_20150728002310-00312-ip-10-236-191-2_770301655_2.json
e1b590ee__tomato_pests_and_control_them__Symptom
[Pest] tomato hornworm, tobacco hornworm [Symptom]
defoliation
[]
How to identify tomato pests and control them
Symptom
http://www.tomatodirt.com/tomato-pests.html
12/1438042990114.79_20150728002310-00312-ip-10-236-191-2_770301655_2.json
e1b590ee__tomato_pests_and_control_them__Symptom
[Pest] flea beetles [Symptom]
holes in leaves
[]
How to identify tomato pests and control them
Symptom
http://www.tomatodirt.com/tomato-pests.html
12/1438042990114.79_20150728002310-00312-ip-10-236-191-2_770301655_2.json
e1b590ee__tomato_pests_and_control_them__Symptom
[Pest] aphids [Symptom]
yellowing, curled leaves
[]
How to identify tomato pests and control them
Symptom
http://www.tomatodirt.com/tomato-pests.html
12/1438042990114.79_20150728002310-00312-ip-10-236-191-2_770301655_2.json
e1b590ee__tomato_pests_and_control_them__Symptom
[Pest] psyllids [Symptom]
purpling veins in leaves
[]
How to identify tomato pests and control them
Symptom
http://www.tomatodirt.com/tomato-pests.html
12/1438042990114.79_20150728002310-00312-ip-10-236-191-2_770301655_2.json
e1b590ee__tomato_pests_and_control_them__Symptom
[Pest] leaf miners [Symptom]
tunnels or zigzag patterns in leaves
[]
How to identify tomato pests and control them
Symptom
http://www.tomatodirt.com/tomato-pests.html
12/1438042990114.79_20150728002310-00312-ip-10-236-191-2_770301655_2.json
e1b590ee__tomato_pests_and_control_them__Symptom
[Pest] stalk borer [Symptom]
hole in stem
[]
How to identify tomato pests and control them
Symptom
http://www.tomatodirt.com/tomato-pests.html
12/1438042990114.79_20150728002310-00312-ip-10-236-191-2_770301655_2.json
e1b590ee__tomato_pests_and_control_them__Symptom
[Pest] aphids, whiteflies [Symptom]
honeydew (white, sticky residue)
[]
How to identify tomato pests and control them
Symptom
http://www.tomatodirt.com/tomato-pests.html
12/1438042990114.79_20150728002310-00312-ip-10-236-191-2_770301655_2.json
e1b590ee__tomato_pests_and_control_them__Symptom
[Pest] spider mites [Symptom]
webbing on leaf undersides
[]
How to identify tomato pests and control them
Symptom
http://www.tomatodirt.com/tomato-pests.html
12/1438042990114.79_20150728002310-00312-ip-10-236-191-2_770301655_2.json
29dec61d_s___Provo_City_School_District__Summary
[Section] Board of Education: 1000 Series [Summary]
This series contains statements of the Board’s purpose and provisions for matters such as induction of Board members, inservice development of Board members, code of ethics for the Board as a group and individually, and the Board’s attitude toward policy development. The Board’s intent makes a great deal of difference in what it ultimately does and how it does it
[]
Policies Procedures & Forms | Provo City School District
Summary
http://provo.edu/policies/
26/1438042990900.28_20150728002310-00088-ip-10-236-191-2_193808436_0.json
29dec61d_s___Provo_City_School_District__Summary
[Section] Administration and District Planning: 2000 Series [Summary]
This series focuses on the administrative machinery at the executive level. Here is recorded the Board’s action in activating all administrative and supervisory jobs to the extent that the Board has that function under the law. In addition, you will find the organizational chart.
[]
Policies Procedures & Forms | Provo City School District
Summary
http://provo.edu/policies/
26/1438042990900.28_20150728002310-00088-ip-10-236-191-2_193808436_0.json
29dec61d_s___Provo_City_School_District__Summary
[Section] Students: 3000 Series [Summary]
This series focuses upon the Student, not the educational process. He/she must be admitted, data about him/her, his/her parents, and his/her place of residence recorded; a place in a school assigned, and so on. These are the challenges of student personnel administration.
[]
Policies Procedures & Forms | Provo City School District
Summary
http://provo.edu/policies/
26/1438042990900.28_20150728002310-00088-ip-10-236-191-2_193808436_0.json
29dec61d_s___Provo_City_School_District__Summary
[Section] Curriculum, Instruction, Assessment: 4000 Series [Summary]
This series contains policies related to all aspects of Curriculum, Instruction, and Assessment. Included are the goals of the schools, curricular matters, instructional arrangements to assist teachers in teaching and students with learning, as well as provisions for individual differences and exceptional children.
[]
Policies Procedures & Forms | Provo City School District
Summary
http://provo.edu/policies/
26/1438042990900.28_20150728002310-00088-ip-10-236-191-2_193808436_0.json
29dec61d_s___Provo_City_School_District__Summary
[Section] Personnel: 5000 Series [Summary]
This series contains all the familiar topics of personnel, administration, recruitment and selection, contracts, tenure, assignment and transfer until the time of separation from the school system through retirement, resignation, promotion, death or other causes, except as otherwise covered through collective bargaining agreements.
[]
Policies Procedures & Forms | Provo City School District
Summary
http://provo.edu/policies/
26/1438042990900.28_20150728002310-00088-ip-10-236-191-2_193808436_0.json
29dec61d_s___Provo_City_School_District__Summary
[Section] Finances and Operations: 6000 Series [Summary]
This series contains policies and regulations for the management of money: revenues, expenditures, budget development, purchasing, record-keeping, etc. This series also addresses the non-instructional services necessary for maintenance and operation of the District, such as transportation and food services, and with certain fixed expenses. School facilities management and construction are also found in this series.
[]
Policies Procedures & Forms | Provo City School District
Summary
http://provo.edu/policies/
26/1438042990900.28_20150728002310-00088-ip-10-236-191-2_193808436_0.json
29dec61d_s___Provo_City_School_District__Summary
[Section] Community: 7000 Series [Summary]
This series addresses the school system’s external relations with mass media communication, Parent-Teacher organizations, citizen’s committees, complaints concerning school personnel, community use of school buildings, other governmental and private groups concerned with education, and the like.
[]
Policies Procedures & Forms | Provo City School District
Summary
http://provo.edu/policies/
26/1438042990900.28_20150728002310-00088-ip-10-236-191-2_193808436_0.json
2cac8686_plication_Security_and_Privacy__Derived_Security_Controls
Failure to keep software security up to date [Derived Security Controls]
Create and maintain a policy for software patching Maintain a list of all software, including components (e.g. third-party libraries, frameworks), their versions, source and method of monitoring for security patches and other updates Define who is responsible for the patching of each software component Create, use and maintain a procedure for assessing security patches and other software updates, that includes a risk assessment Apply software security patches in a timely manner Do not use software that is no longer supported by the supplier/vendor/development company; or limit its use and undertake a risk assessment and apply additional controls Create, maintain and operate a process for checking that security patches have been applied to all software components, or those that have not been applied have adequately justified, documented and applied mitigating controls
[]
Privacy : Application Security and Privacy
Derived Security Controls
https://www.clerkendweller.uk/privacy?startRow=11
44/1438042981525.10_20150728002301-00256-ip-10-236-191-2_898324119_0.json
2cac8686_plication_Security_and_Privacy__Derived_Security_Controls
Lack of protection from SQL injection [Derived Security Controls]
Create and maintain a process for other people and organisations to report security issues about your applications Create and maintain a procedure for assessing and fixing security flaws in custom application code, and include these issues in the software patching documentation (see above), and if SQL injection is found in one place, examine similar code elsewhere Identify who is responsible for preventing SQL injection in each custom coded application (e.g. software such as websites developed by/for the organisation) Require the default to be to use the safest server-side method for database queries supported by the API or framework Ensure the prevention, detection and remediation of SQL injection vulnerabilities are included at multiple stages of the software development lifecycle (e.g. coding standards, peer/independent code review with audit trail, automated code review, automated vulnerability assessment, penetration testing before going live) Use the software patching policy and processes (see above) for software components used by the custom applications Include a requirement in contracts with third party development to build security into their development practices and inform you when they become aware critical vulnerabilities like SQL injection, and then provide patches Use automated application vulnerability assessments (scanning) to help identify SQL injection, but ensure these cover all the application (e.g. for authenticated customers and administrators too) Undertaking penetration testing in the production/live environment of custom-built applications (external and internal-facing) that interact with databases and other data stores, and repeat periodically
[]
Privacy : Application Security and Privacy
Derived Security Controls
https://www.clerkendweller.uk/privacy?startRow=11
44/1438042981525.10_20150728002301-00256-ip-10-236-191-2_898324119_0.json
2cac8686_plication_Security_and_Privacy__Derived_Security_Controls
Exposure of unnecessary protocols & services [Derived Security Controls]
Do not use insecure protocols such as Telnet and plain FTP Implement access control for all protocols (e.g for secure FTP disallowing anonymous access, preventing SMTP being used as an open relay) Use firewalls to prevent external access to internal services Remove, disable or block un-necessary services (see also decommissioning below) Limit remote access to trusted IP addresses and enforce access using an encrypted method Segment services so that a compromise of one does not lead to wider system compromise Consider using a Virtual private Network (VPN) using strong credentials (such as two-factor authentication) for all remote access Scan ports of all system components periodically to verify that only the intended services are available externally, internally, and from particular other locations Document and periodically review all the services allowed
[]
Privacy : Application Security and Privacy
Derived Security Controls
https://www.clerkendweller.uk/privacy?startRow=11
44/1438042981525.10_20150728002301-00256-ip-10-236-191-2_898324119_0.json
2cac8686_plication_Security_and_Privacy__Derived_Security_Controls
Exposure of decommissioned software/services [Derived Security Controls]
Maintain a schedule of all software/services in use Ensure all system components (hardware, software, configuration files, databases, files, services, ports, DNS records, etc) are decommissioned when no longer needed, and maintain a record of how this was undertaken Test/audit that decommissioned components no longer exist and cannot be accessed For hardware disposal, ensure data is securely removed
[]
Privacy : Application Security and Privacy
Derived Security Controls
https://www.clerkendweller.uk/privacy?startRow=11
44/1438042981525.10_20150728002301-00256-ip-10-236-191-2_898324119_0.json
2cac8686_plication_Security_and_Privacy__Derived_Security_Controls
Insecure storage of passwords [Derived Security Controls]
Create and maintain a password policy for all types of system users Encourage, and allow, users to choose stronger passwords Discourage users from having the same password on multiple systems Discourage or prevent commonly used passwords Never store or send passwords in plain text Never encrypt passwords unless there are extremely robust key protection and key management processes in place Use one-way hashing of passwords with a long salt value, unique for each user Use a hashing method that is slow (e.g. PBKDF2, bcrypt or scrypt) Do not use weak hashing methods such as MD5 or SHA-1 Review hashing best practice periodically, and build in considerations to allow future changes to the hashing method Ensure password breaches are included in incident report planning
[]
Privacy : Application Security and Privacy
Derived Security Controls
https://www.clerkendweller.uk/privacy?startRow=11
44/1438042981525.10_20150728002301-00256-ip-10-236-191-2_898324119_0.json
2cac8686_plication_Security_and_Privacy__Derived_Security_Controls
Failure to encrypt online communications [Derived Security Controls]
Identify and record all information that should be encrypted in transit Ensure the encryption method (e.g. SSL/TLS) is configured correctly and that certificate are valid Maintain a list of all certificates and ensure they are renewed before expiry Consider using Extended Validation (EV) digital certificates to provide a higher level of identity assurance to users Do not use SSL v2, and preferably enable TLS 1.2), disable weak ciphers (i.e.enable ciphers with 128 bi strength or greater) and avoid weak ciphers (e.g. RC4) or those that provide no encryption or no authentication i.e. null ciphers) Ensure the information cannot be accessed without encryption When web pages are sent over SSL/TLS, ensure every single component in the page (e.g. images, style sheets, scripts and third-party hosted content) is also sent over SSL/TLS Never send session identifiers (e.g. cookies identifying an authenticated user) over unencrypted connections Ensure SSL/TLS websites are only accessible by hostnames included in the certificate, and not by IP address) Consider making websites completely "SSL/TLS only Review transport encryption best practice periodically and update configurations as required
[]
Privacy : Application Security and Privacy
Derived Security Controls
https://www.clerkendweller.uk/privacy?startRow=11
44/1438042981525.10_20150728002301-00256-ip-10-236-191-2_898324119_0.json
2cac8686_plication_Security_and_Privacy__Derived_Security_Controls
Processing data in inappropriate locations [Derived Security Controls]
Identify and maintain an inventory of all locations where personal data is stored, processed and transmitted Do not allow unauthorised access (e.g. public access) to personal data Do not use production data in development and test systems Incorporate personal data access into systems design processes Use network segmentation to assist with limiting access to personal data (e.g. segregate non production systems, segregate teams or departments with access to sensitive personal data) Use redundancy/diversity to protect against accidental loss or destruction of, or damage to, personal data Create and maintain policies for the storage, processing and transmission of personal data Create, maintain and use procedures for transfers of personal data Do not place copies of personal data in unprotected locations Enforce appropriate access control in custom applications (e.g. websites) Provide training about the access, use and transfers of personal data Monitor transfers of personal data
[]
Privacy : Application Security and Privacy
Derived Security Controls
https://www.clerkendweller.uk/privacy?startRow=11
44/1438042981525.10_20150728002301-00256-ip-10-236-191-2_898324119_0.json
2cac8686_plication_Security_and_Privacy__Derived_Security_Controls
Use of default credentials including passwords [Derived Security Controls]
Change all default passwords across all system components Disable or remove guest and demonstration accounts Use strong passwords to replace default ones (see above) Avoid hard coding of access credentials (and never in software code), but use encryption if possible if necessary to store elsewhere (e.g. configuration files)
[]
Privacy : Application Security and Privacy
Derived Security Controls
https://www.clerkendweller.uk/privacy?startRow=11
44/1438042981525.10_20150728002301-00256-ip-10-236-191-2_898324119_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] TransNet Today: Keeping faith with the voters while achieving the region’s transportation goals [Year Published] 2015 [Short Description]
As SANDAG makes its plans to invest in the future of San Diego’s transportation system, it must redefine its vision for San Diego’s transportation system to align with California’s increasingly ambitious GHG reduction goals, and set regional goals for improving health, equity, and the economy.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Why Creating and Preserving Affordable Homes Near Transit is a Highly Effective Climate Protection Strategy [Year Published] 2014 [Short Description]
California is currently debating how to invest greenhouse gas (GHG) cap-and-trade auction proceeds so that they result in real, quantifiable and verifiable greenhouse gas reductions.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Innovation Required: Moving More People with Less Traffic [Year Published] 2013 [Short Description]
This report proposes that San Mateo County study Optimized HOT lanes as a strategy on Highway 101 that will make the best use of highway lanes, reduce traffic, and fund an expansion of public transit, vanpools, and other transit alternatives that are affordable and accessible to all. With state approval, an Optimized HOT lane network would not only address San Mateo County’s traffic problem, but also set an important model for the entire Bay Area to follow.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Moving People, Not Just Cars [Year Published] 2013 [Short Description]
Moving People, Not Just Cars is a detailed analysis of MTC’s propsed Express Lane Network and how it compares to practices in regions around the country, and shows how MTC can prioritize choice, equity, and innovation to move more people for less money, make connections sooner, and invest in public transit and other long-term solutions.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Moving Ahead with High Speed Rail [Year Published] 2012 [Short Description]
California has an opportunity to revolutionize its transportation system through high speed rail, but planning has been fraught with problems. TransForm's report analyzes the April 2012 Revised Business Plan for high speed rail, urges California to move ahead with the first construction segment and provides key recommendations to make sure we do it right. The consequences of not building high speed rail are real: Californians may ultimately spend significantly more money than high speed rail will cost in order to widen highways and expand airports – with negative environmental and health impacts.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Creating Healthy Regional Transportation Plans [Year Published] 2012 [Short Description]
Regional Transportation Plans are an incredible opportunity to shape transportation and the built environment. How can we make sure the billions of dollars of transportation funding in these plans create positive health outcomes? This guide is intended for public health professionals as well as local government officials, transportation planners and others who want to engage in developing plans that promote better health and increasing access to opportunities for disadvantaged communities.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] San Diego and SB 375: Lessons from California's first Sustainable Communities Strategy [Year Published] 2011 [Short Description]
A comprehensive look at California's first Sustainable Communities Strategy (SCS), approved by the San Diego Association of Governments (SANDAG).
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Transportation Planning: An Overview for Public Health Advocates [Year Published] 2011 [Short Description]
This fact sheet discusses the important link between transportation planning and health, describes the key players and processes of local and regional transportation planning, and suggests steps you can take to advocate effectively for healthier transportation policies.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Merchant Perspectives on Bus Rapid Transit [Year Published] 2010 [Short Description]
In the spring of 2010, TransForm surveyed 217 merchants along the Alum Rock corridor about the proposed BRT service. This report summarizes our findings.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Oakland Airport Connector Options Analysis [Year Published] 2010 [Short Description]
This report provides an updated and expanded analysis of options for the Oakland Airport Connector. The intent of this report is to inform current discussions on the Oakland Airport Connector through a valid comparison of the four key modal options.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Windfall for All [Year Published] 2009 [Short Description]
How Connected, Convenient Neighborhoods Can Protect Our Climate and Safeguard California's Economy
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Bringing Safe Routes to Scale [Year Published] 2008 [Short Description]
This report estimates that investing in Safe Routes to Schools infrastructure, education, and encouragement projects region-wide would result in up to 110 million fewer miles traveled every year by Bay Area vehicles.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Great Communities Toolkit [Year Published] 2008 [Short Description]
This frequently-updated toolkit helps you to take on a step-by-step process for understanding development near transit and engaging the community. Includes great sample fact sheets, how to run a campaign, and more.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Priorities for Access to Health [Year Published] 2006 [Short Description]
Results of TransForm's pilot project in the Monument Corridor (Contra Costa County). It chronicles some remarkable successes and some areas where new funding sources are still needed.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Safe Routes for the Mayfair Community [Year Published] 2005 [Short Description]
This report lays out in great detail the specific projects that will increase bicycle and pedestrian safety in the Downtown/East Valley (DTEV) corridor, which runs along Alum Rock Avenue and Santa Clara Street between East and Downtown San Jose corridor, and the amenities and services that community members want at and near the stations.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Access Now! [Year Published] 2004 [Short Description]
Inadequate transportation is a major barrier to accessing jobs, education, child care, and health care. This comprehensive guide can help communities throughout the Bay Area to win safer streets and better transit.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] ¡Acceso Ahora! [Year Published] 2004 [Short Description]
Spanish version of Access Now! guide.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] It Takes a Transit Village [Year Published] 2004 [Short Description]
How better regional planning, and designing new development to truly support transit can save the Bay Area billions of dollars and ease the housing shortage.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Cutting Transit, Terminating the Economy [Year Published] 2004 [Short Description]
This report quantified the economic and social impacts of Governor Schwarzenegger's proposed 2004 transit cuts. Contains a useful methodology for future funding battles.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Cleaning the Air, Growing Smarter [Year Published] 2003 [Short Description]
Contra Costa County residents are being exposed to a dangerous - and growing - air pollution threat: particulate matter. This report describes how the only way to reduce reentrained road dust is to reduce driving.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Can't Get There From Here [Year Published] 2003 [Short Description]
Report about how California's transportation system is failing children and youth, and what we can do about it.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Best and Worst Developments of the Bay Area [Year Published] 2003 [Short Description]
Nine counties and eighteen projects help demonstrate what makes smart growth smart.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Revolutionizing Bay Area Transit...on a Budget [Year Published] 2002 [Short Description]
Outlines a Bus Rapid Transit network that will provide the fastest, lowest-cost way to dramatically improve the speed and quality of public transit in the Bay Area.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json
05178a33__TransForm_Reports___TransForm__Short_Description
[Title] Housing Shortage/Parking Surplus [Year Published] 2002 [Short Description]
Lays out Silicon Valley's opportunity to address housing needs and transportation problems with innovative parking policies.
[]
All TransForm Reports | TransForm
Short Description
http://www.transformca.org/resources/reports
8/1438042988511.77_20150728002308-00090-ip-10-236-191-2_762597814_0.json