text
stringlengths
14
3.75M
id
stringlengths
25
43
dataset_id
stringclasses
1 value
Observer может означать: The Observer — «Обозреватель», еженедельная английская газета, входит в группу The Guardian. Observer — американская онлайн-газета (до 2016 — печатная газета The New York Observer). Observer (наблюдатель) — поведенческий шаблон проектирования. Компьютерные игры Observer — компьютерная игра 2017 года в жанре психологического хоррора. Observer System Redux — находящаяся в разработке компьютерная игра; является ремейком игры Observer. См. также
RedPajamaWikipedia_-9070894516009658067
Slimpajama627bTrain/chunk1
Buddhist abbot given a 2-year sentence for fighting illiteracy AsiaNews, April 4, 2012 Dharamsala, India -- After days of detention incommunicado, Khenpo Gyewala, the abbot of Gyegyel Zogchen Monastery, was sentenced to two years in prison for "anti-state activity". A highly respected scholar, he is also known for his work in the field of education and his support for religious freedom in Tibet. After his arrest, police prevented him from contacting his family. His sister Boyang suffered a fatal heart attack when she learnt of his arrest. The Venerable Khenpo went "missing" on 8 March, when he was unlawfully detained along with 13 other Tibetans in Zatoe County, Qinghai Province. Unlike the abbot, the latter were released on 25 March. Sources told the Tibetan Centre for Human Rights and Democracy that a relative of Khenpo was called on 28 March to the Zatoe County Public Security Bureau (PSB) office, where he was allowed to speak with the abbot on the phone for three minutes. Before that, the relative was warned not to mention the death of Khenpo's sister. During the brief conversation, Khenpo told his relative to look after Monsel School, the school he founded to counter growing illiteracy among Tibetans. The abbot also said that he underwent 'enormous hardships' during his detention but that they had ended after he was sentenced. However, he could not name the place where he was imprisoned. Khenpo's case shows once more that China is only capable of using the iron fist to suppress Tibetan demand for autonomy and religious freedom. In another case, Communist authorities convicted 11 Tibetans on 22 March for their involvement in peaceful protest marches. Sentences ranging between 3 and 13 years in prison were handed down "for inciting social disorder". In Drango and Sertha, other protests were crushed in blood on 23 and 24 January. Speaking to AsiaNews, Tibetan parliament-in-exile's Speaker Penpa Tsering said, "detentions and convictions have become a constant feature in the history of Tibet. Our people have the right to protest and they do so peacefully. Beijing however has no intention of heeding our voice. We shall therefore continue along the path laid out by the Dalai Lama, and seek religious and cultural autonomy without the use of violence. China uses too much of that already."
RedPajamaCommonCrawl_-2245880774660107771
Slimpajama627bTrain/chunk1
Bitcoin and Cryptocurrencies Aren't Money Says Donald Trump 🙄 Donald Trump recently criticized Bitcoin, Facebook's proposed Libra digital coin and other cryptocurrencies and made the demand that companies seek a banking charter and make themselves subject to US and global regulations if they really wanted to "become a bank". "I am not a fan of Bitcoin and other Cryptocurrencies, which are not money, and whose value is highly volatile and based on thin air," Trump wrote on Twitter. "If Facebook and other companies want to become a bank, they must seek a new Banking Charter and become subject to all Banking Regulations, just like other Banks, both National and International," he added. Facebook, the White House, the Federal Reserve and the treasury department did not immediately respond to requests for comment. Facebook announced last month it would launch its global cryptocurrency in 2020. Facebook and 28 partners, including Mastercard Inc, PayPal Holdings Inc and Uber Technologies Inc, would form the Libra Association to govern the new coin. No banks are currently part of the group. JPMorgan Chase & Co, the largest US bank by assets, plans to launch its own digital coins. Related Topics:bitcoinfeaturedregulationtrump Is The IRS Coming For Your Secret Crypto Stash? DOGECOIN Gets Listed On Binance, Skyrockets 30%! Crypto Investor And Follower U.S. Takes Crypto Crime Seriously with Anti-Money Laundering Reforms Christmas is coming, and Bitcoin (BTC) scarcity is at historically low levels. CryptoRank announced in a recent tweet that just 6.3% of the overall Bitcoin supply, or 1.3 million BTC, are kept on cryptocurrency exchanges. The decreasing amount is nothing new; it's been steadily declining since the Bitcoin halving in 2020, when the BTC block reward was cut in half. The supply of BTC on exchanges has also decreased gradually over the past year, trending downward. On October 2020, exchange wallets made up 9.5% of the BTC supply, just before the all-time highs at Christmas time, and 7.3% in July 2019. In December 2021, the 6.3 percent figure is a record low. However, the dominance of Coinbase's BTC wallet is also falling. The American exchange used to store more bitcoin than all other exchanges combined. Over the past year, its domination has decreased from 50.52% to 40.65%. Following a spate of good price statistics that tie into the rising price of Bitcoin, the announcement has sparked further excitement among investors. First and foremost, owing to the fact that BTC output is shifting from a "liquid" to an "illiquid" state, monthly BTC production has frozen at 100,000 BTC. In other words, more BTC is stored in cold storage than is being mined. Additionally, it's crucial to remember that many retail investors and several firms keep their BTC on exchanges, demonstrating that the "illiquid" BTC category may be even smaller. Instead of keeping their BTC in cold storage, some Bitcoin holders would entrust it to exchanges instead of leaving custody of their keys with them. Surprisingly, Binance CEO and co-founder Changpeng Zhao has encouraged hot wallets, despite the best efforts of Bitcoiners like Andreas Antonopolous to the contrary: "Not your keys, not your bitcoin." is part of everyday BTC mantra. This may lead to the situation in which 1.3 million BTC is "stored" on exchanges, but they are not "circulating," and they certainly do not contribute to the liquidity problem. Despite calls for a "Santa Rally" on the back of strong analytics, the bears are not yet out of the woods. A tweet from BullRun Invest using Glassnode data showed that 24.6% of all BTC supply is sitting above $47,000. According to the report, close to a fourth of the BTC purchased at those prices levels are now underwater. If BTC fails to make progress into the 50s, there may be fewer gifts under the tree tomorrow. The United States passed into law its Anti-Money Laundering Act of 2020, which takes effect on January 1, 2021. This brings digital currency exchange companies and other digital-asset-related businesses under the scope of regulations of the Bank Secrecy Act (BSA), which requires financial institutions "to actively detect, monitor and report potential money laundering activity." "I'm pleased that our anti-money laundering legislation was included as a part of this year's [National Defense Authorization Act]. This bipartisan legislation protects Americans by depriving criminals and terrorists of the tools they use to finance illicit activity. It is the first serious overhaul of our anti-money laundering system in decades, and it makes sense to include it in the biggest, most important national defense legislation Congress passes each year," South Dakota Sen. Mike Rounds said in a press release. The massive anti-money laundering reforms are targeting businesses dealing with digital currencies and assets by clearly specifying the definition of a "financial institution" to "'a business engaged in the exchange of currency, funds, or value that substitutes for currency or funds" and "a licensed sender of money or any other person who engages as a business in the transmission of funds or value that substitutes for currency." The reforms further define a "money transmitting business" to include those who deal with "currency, funds, or value that substitutes for currency." Now, there are no longer loopholes that digital asset companies can use when dealing with the Financial Crimes Enforcement Network (FinCEN), the agency that enforces the BSA. Stricter Penalties Enforced Aside from updating definitions to ensure that digital currency exchange firms and others dealing in digital assets are clearly within the scope of the AML Act of 2020 and the BSA, stricter penalties are now being enforced for crypto criminals. Now, those who have been found guilty of violating the AML Act of 2020 and/or BSA are faced with fines amounting to profits earned while committing the violation and possible jail time. Those guilty of an "egregious" breach are also going to be banned from taking a board member position of any financial institution in the country for 10 years. Furthermore, employees of financial institutions who commit these crimes will be obligated to return to their employer all bonuses received during the time the act was committed. FinCEN is being given additional resources, like increasing its manpower, to ensure the enforcement of these reforms. This will further safeguard investors against crypto crimes and nail down digital currency exchange firms and other digital-asset-related businesses that do not comply with BSA regulations. Less than two months into 2021, the price of bitcoin has risen 95.4%. Earlier this week BTC smashed through 50k and is headed towards 60k just as fast. The price is currently trading at 57k as of press time up 60% this month alone. Along with BTC's meteoric rise quite a few altcoins are going along for the ride. Some are saying the astonishing rise of BTC's price to the tremendous demand from buyers looking to hedge against inflation as governments keep spending and central banks keep printing money trying to keep their economies going through the pandemic. Buy Bitcoin (BTC) from just $10! Click here to get $10 in free BTC just for signing up! Looking to trade cryptocurrencies? You can trade BNB on Binance by clicking here Based in the United States and want to trade via Binance.US? Click here to sign up now!
RedPajamaCommonCrawl_-4202784956490838748
Slimpajama627bTrain/chunk1
Frédéric Caudron making his world record run in the match against Marco Zanetti. BRANDENBURG - The overwhelming applause at the end was for Marco Zanetti, who won the semi final match (40-37 in 12/11) and for Frédéric Caudron, who equalized the world record highest run (28). The spectacle between two top players came to a scintillating apotheosis, the crowd in the stands witnessed a great promotion for three cushion in the Stahlpalast in Brandenburg. The winner of the match, Marco Zanetti, shone with an incredible performance and a great come-back after Caudron's record run. The man who lost the match, Frédéric Caudron, showed himself a fantastic sportsman during an incident with the timeframe at a decisive phase in the match. The 48-year-old Christian Rudolph plays the final this afternoon (Sunday, 14.30) against the 51-year-old Italian. The German veteran, who was world champion three cushion in 1996 in Hattingen, won the match in the shadow of the other semi-final against the young Dutchman Glenn Hofman (40-23 in 41 innings). On an early Sunday morning, a few hundred spectators witnessed a match with a stunning course. Marco Zanetti, who is in a flow after his victories in the tournaments of Lausanne and Agipi, had a promising start and was leading 15-3 after five innings. Then, Frédéric Caudron came to the table in the fifth inning for an explosion that was only recorded three times before in history of three-cushion. Junichi Komori from Japan, Raymond Ceulemans from Belgium had the world record highest run (28) for many years in their hands. Roland Forthomme equaled the run late last year in Zundert in a match against Eddy Merckx. That magical run is now also on the name of Frédéric Caudron: the Belgian built up his masterly performance in the match Zanetti, playing flawlessly on position, but also solved some situations under the tremendous stress. The clock (for 40 seconds time) functioned again, after Zanetti had made his first point. When he made his eighth point, the Italian passed the 40 seconds. The referee announced a miss, but Zanetti reacted furiously: ,,How can I know that the clock is working again, no one has told me'', he said. There was a short discussion, the referee wanted to tell Zanetti to stop, but Caudron made an incredible sporting gesture: the Belgian, after a brief conversation with Zanetti, gave the sine that his opponent could continue. He was rewarded with a big applause from the audience. Marco Zanetti made five more points, brought the score to 36-34 for Caudron and two innings later to 37-35, but then decided the game with a run of five (40-37 in 12/11). It was Zanetti's third consecutive victory against Frédéric Caudron after the finals of the Lausanne Billard Masters and the Agipi Masters.
RedPajamaC4_-5080076241659966652
Slimpajama627bTrain/chunk1
Zakhmona () is a 2017 Pashto action thriller film made by Shahid Usman. It was released on 26 June 2017. References External links Zakhmona on UrduPoint Zakhmona on Pakfilms.net Pashto-language films 2017 action thriller films 2017 films Pakistani action thriller films
RedPajamaWikipedia_-670163331254386768
Slimpajama627bTrain/chunk1
One of our favorite meals year round is frittata. It makes perfect use of whatever vegetables are in season, is easily made with local ingredients, and can be served for breakfast, lunch, or dinner. Essentially a crustless quiche, frittata is a classical dish that is dead simple to prepare. Here's a skeleton recipe that can be adapted for whatever ingredients you have on hand. The technique is always the same. First, chop and sweat one half of a large onion in a drizzle of olive oil in a cast iron skillet. Add two cloves of garlic (or more to your liking), and four cups of chopped vegetables. In winter, try mushrooms and kale, spinach and peas are nice in the spring, tomato and beans are tasty in summer, and the fall bears chard and peppers. Cook vegetables until slightly caramelized. Meanwhile, make the egg mixture. Whisk six eggs, local preferred, with one half cup milk, one teaspoon salt, and several twists of black pepper until foamy. Add one tablespoon fresh herbs or one teaspoon dried to the egg mixture. Assemble the frittata by pouring the egg mixture over the vegetables. Top with one half to one cup of cheese (shredded cheddar or swiss, feta, goat cheese, or your favorite). Cook vegetables over medium heat until wilted in a cast iron skillet. Add herbs. In a separate bowl, whisk together eggs, milk, salt, and pepper. Pour over vegetables and top with cheese. Bake in a 350 degree oven for 20 - 30 minutes or until cooked through and browned on top.
RedPajamaC4_-7169102910200182845
Slimpajama627bTrain/chunk1
COST-EFFECTIVE SOLUTIONS FOR FAMILIES OF INDIVIDUALS OF LOW- VALUE ESTATE WITHOUT LASTING POWER OF ATTORNEY ARRANGEMENT At MPS, I dealt with several cases involving caregivers of individuals who lack mental capacity. The caregivers pointed out that they are unable to access the Government grants like GST Cash Voucher provided to the individuals as they are not appointed as deputies under the Mental Capacity Act. I therefore asked the Minister for Social and Family Development whether for low-value estates of individuals who have not made LPAs and lack mental capacities, the Public Guardian may administer the estate in lieu of getting the caregivers to apply to the Court to be appointed as deputies. This is akin to the current administration of low-value estates of deceased persons by the Public Trustee. The Minister in his reply highlighted the possibility of conflict of interest as the Public Guardian administers persons vested with powers to manage the affairs of individuals with no mental capacities. I will follow up separately to suggest that the Public Trustee be given the power to administer low value estate of mentally unsound persons to deal with the conflict-of-interest point raised by the Minister. My PQ and the Minister's answer may be accessed below. — — — — — — — — — — — — — — — — — — — — — — — Mr Murali Pillai asked the Minister for Social and Family Development whether the Public Guardian may be vested with the power to administer low-value estates of individuals who have not made Lasting Powers of Attorney and lack mental capacities, so as to provide more cost-effective solutions for families of these individuals to manage their affairs instead of making applications to court to be appointed as deputies. Mr Masagos Zulkifli B M M: The Mental Capacity Act (MCA) provides for the appointment of donees or deputies to manage the property and affairs of individuals who lack mental capacity. Under the MCA, the Public Guardian is responsible for dealing with representations, including complaints, about the way in which donees or deputies exercise their powers. Hence, it would not be appropriate for the Public Guardian to also manage the property and affairs of individuals who have not made a Lasting Power of Attorney and have lost their mental capacity. To do so would put the Public Guardian in a position of conflict of interest. To make applying for deputyship more affordable for families, the Family Justice Courts has introduced a Simplified Track since 2019. Family members applying for general orders through the Simplified Track typically ask for and are granted powers to consent to medical and dental treatment, care arrangements, and manage bank/CPF accounts and insurance policies. The cost of the Simplified Track is around $540, comprising a $40 court filing fee and around $500 for mental capacity assessment (based on the fees charged by public hospitals). This is much lower than applying for complex orders through the Standard Track, which will incur both a higher court fee of up to $300, as well as legal fees charged by lawyers of between $3,000 to $9,000. Additionally, to support families in need, MSF works with partners to facilitate access to pro bono or low-cost services. Such families can seek legal assistance from the Legal Aid Bureau, or support from the Community Justice Centre (a charity), if they are applying for deputyship without representation of a lawyer. Joseph Abramajtys Shit or Go Blind: Working in Corrections/Living the Dream Lucy Lang The Punishment Bureaucracy Has Nothing to Do With Justice Andrew Jazprose Hill An Injustice! The Silenced Violin of Elijah McClain Sonya Danaher They get lobster at Christmas? Zack Love An Alabama Woman Helps Catch Crooks at Dick's Sporting Goods with Her Stolen Debit Card Angelica Duran The Future of the Death Penalty Chris Salazar From Survivor to Being Manhattan's DA: The Case For Eliza Orlins Mukta Ahmad A 15-year-old Boy Shot Multiple Times and Killed by a Gunman
RedPajamaCommonCrawl_6226373960809012868
Slimpajama627bTrain/chunk1
linkedin on cv Exactly how will LinkedIn Profile Optimization aid to improve your individual brand name? linkedin on cv LinkedIn is an amazing channel for private branding and could enable you to make a proficient visibility on one of the most famous social media network with more than 377 million professionals. LinkedIn could be helpful for the pursuit of employment, organizing and also in addition for lead generation especially when you are conscious of all hidden methods in addition to strategies to LinkedIn Profile Optimization. On the occasion that your "Who's Viewed Your Profile" layout is level covering week after week like a body without a beat, below is a personality check cheat sheet as well as couple of tips to improve the LinkedIn account that will certainly assist bring some life right into your account and create more profile sights linkedin on cv. Thankfully, there is a free tool you might utilize to position yourself in addition to your very own brand as well as it is known as LinkedIn! This is the place you could interface with the possible consumers to produce the company, customers who are especially crazy about what you bring to the table as well as locate the one incredible agreement you have been searching for. When someone initially interacts with the profile, they will certainly choose a prompt setup to proceed going after or hand down to the adhering to profile who is most likely your rival. Because of this, you've to center around progressing the profile to influence it to arise. The issue various people confront is that they merely move their resume or throw something together. Which implies the profile is unimpressive or undistinct. You have the phenomenal placement of standing where you are today, perceiving exactly how you got here and also focusing on where you are going. You get the opportunity making your tale. You obtain the possibility to select which work you place right into your profile and which parts of those line of work to attribute. All that you place on your account ought to be coordinated especially to the brand you are making and for that LinkedIn Profile Optimization is a must. It may be foreseeable and time-worn – yet the what's what is keyword phrases and also the succeeding discover capacity is what influencing the Internet globe to go round. Consider just what someone might type into Google if they were hunting down somebody like you. Think verb, point, equivalent word, and also acronym. Just what is your organisation name? These are key phrases to utilize in your account. You call for a lift pitch or speech, and you need to include it to LinkedIn. linkedin on cv A "lift speech" is that super brief speech you would certainly provide (pitch) to a main amid the trip approximately his office or down to her automobile. You have possibly 30 secs to pitch an unthinkable tale, book or thought to them. You have to do furthermore with your LinkedIn brand. In the occasion that somebody messages you or you need to talk with them regarding your brand name, have a suitable lift speech prepared. In the occasion that it is in on the internet message frame, you can use a one area pitch. Probabilities are that you have seen the records on Facebook where someone has a few thousand "companions." Do they understandably have these various actual friends? Probably not. Do they really speak with this many people? Again, it's not likely. LinkedIn is a professional systems management account, so essentially going out as well as interfacing with your friends truly isn't really crucial. Browse out people in your area, search for those you appreciate or that talk to their company in a method you such as. Exceptional amongst other approaches to LinkedIn Profile Optimization as well as to construct the networking possibility and also to uncover brand-new organisation accomplices is to use the posting tool. There are a number of LinkedIn profile optimization examples that you can look at and these LinkedIn profile optimization instances will certainly aid you to boost your very own brand. When you make a LinkedIn account you will certainly wind up with some overwhelmed wreck of a URL. It urges it to arise on a page as well as will certainly assist in LinkedIn profile optimization and in addition improve your own brand name. Make use of an account photo that speaks with your expert side along with user interfaces with the company. Scrape the photo of you hanging with buddies for a picture talking to your addition in the service. Attempt to maintain the branding photos consistent over the on-line web pages. This makes it much less requiring to perceive. linkedin on cv There is many LinkedIn profile optimization examples that you can look and also see just what kind of pictures they have actually posted on their account. You do not usually need to make material to aid your very own brand. This can attain new links primarily to take advantage of the various other material and additionally aid in LinkedIn profile optimization. It does not make a difference in the event that you are at first stages of the company, are just beginning to take off or in situation that you are a heavy steam train and nothing might prevent you from development. By making use of these suggestions, you will see the increased excitement for your account, in addition to you will certainly organize your profile over the resistance, which is something you have to attain your defined purposes.
RedPajamaC4_-6373454049428824267
Slimpajama627bTrain/chunk1
Responsive planning is key to the learning opportunities and experiences we offer children at Happitots Nursery Glasgow Airport. Our nursery staff facilitate learning activities based on topics chosen by the children in our care. Children are encouraged to share their interests through mind maps and group discussions.
RedPajamaC4_2689637391286742513
Slimpajama627bTrain/chunk1
'use strict'; const xmlC14n = require('xml-c14n'); const pki = require('node-forge').pki; const xml2js = require('xml2js'); const RESPONSE_CODE = { Authorize: { '0': 'Aprobado.', '-1': 'La transacción ha sido rechazada.', '-2': 'La transacción ha sido rechazada, por favor intente nuevamente.', '-3': 'Ha ocurrido un error al hacer la transacción.', '-4': 'La transacción ha sido rechazada.', '-5': 'La transacción ha sido rechazada porque la tasa es inválida.', '-6': 'Ha alcanzado el límite de transacciones mensuales.', '-7': 'Ha alcanzado el límite de transacciones diarias.', '-8': 'La transacción ha sido rechazada, el rubro es inválido.', '-97': 'Ha alcanzado el máximo monto diario de pagos.', '-98': 'La transacción ha sido rechazada porque ha excedido el máximo monto de pago.', '-99': 'La transacción ha sido rechazada porque ha excedido la máxima cantidad de pagos diarias.' }, default: { '0': 'Aprobado.', '-98': 'Ha ocurrido un error inesperado.' } }; const VALID_RESPONSE_PARAMS = { Authorize: [ 'authorizationCode', 'creditCardType', 'last4CardDigits', 'responseCode', 'transactionId' ], initInscription: ['token', 'urlWebpay'], finishInscription: [ 'authCode', 'creditCardType', 'last4CardDigits', 'responseCode', 'tbkUser' ], 'codeReverseOneClick': ['reverseCode', 'reversed'], 'removeUser': ['removed'] }; const Response = class Response { constructor(content, action, testing) { this.error = null; this._testing = testing || false; this.content = this._canonicalize(content); this.action = action; this.xmlResponse = this.buildXmlResponse(content); this.validate(); } buildXmlResponse(xmlString, cb) { xml2js.parseString(xmlString, cb); } _canonicalize(xml, cb) { const c14n = xmlC14n(); const canonicaliser = c14n.createCanonicaliser('http://www.w3.org/2001/10/xml-exc-c14n#'); canonicaliser.canonicalise(xml, cb); } tbkKey() { if (!this._tbkKey) this._tbkKey = pki.publicKeyFromPem(process.env.TBK_PUBLIC_CRT); return this._tbkKey; } _signedInfo() { const namespaces = [ '{http://schemas.xmlsoap.org/soap/envelope/}Header', '{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd}Security', '{http://www.w3.org/2000/09/xmldsig#}Signature', '{http://www.w3.org/2000/09/xmldsig#}SignedInfo' ]; let element = this.xmlResponse; for(let ns of namespaces) { let idx = Object.keys(element).indexOf(ns); element = element[idx][ns]; } const builder = new xml2js.Builder(); const signedInfo = builder.buildObject(element); return this._canonicalize(signedInfo); } _signatureValue() { const namespaces = [ '{http://schemas.xmlsoap.org/soap/envelope/}Header', '{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd}Security', '{http://www.w3.org/2000/09/xmldsig#}Signature', '{http://www.w3.org/2000/09/xmldsig#}SignatureValue' ]; let element = this.xmlResponse; for(let ns of namespaces) { let idx = Object.keys(element).indexOf(ns); element = element[idx][ns]; } return element; } _isValidSignature() { if (this._testing) { return true; } else if (!process.env.TBK_PUBLIC_CRT) { return true; } return this.tbkKey().verify(this._signedInfo(), this._signatureValue()); } str2bool(boolString) { if (boolString.toLowerCase() === 'true') { return true; } else if (boolString.toLowerCase() === 'false') { return false; } else { throw new Error('TypeError'); } } params() { if (!this._xmlResult) { const result = {}; for (let e of this.xmlResponse.findall('.//return')) { let isAction = false; for (let children of e.getchildren()) { if (this.action === 'codeReverseOneClick') { isAction = true; try { result[children.tag] = this.str2bool(children.text); } catch (err) { result[children.tag] = children.text; } } else { result[children.tag] = children.text; } } if (!isAction) { if (this.action === 'removeUser') { result.removed = this.str2bool(e.text); } } } const obj = {}; for (let p of VALID_RESPONSE_PARAMS[this.action]) { obj[p] = result.get(p); p['x'] = result.get(p); } this._xmlResult = obj; } return this._xmlResult; } xmlError() { this._xmlError = null; if (!this._xmlError && this.xmlResponse) { const faultcode = this.xmlResponse.findall('.//faultcode'); const faultstring = this.xmlResponse.findall('.//faultstring'); if (faultcode && faultstring) { this._xmlError = { faultcode: faultcode[0].text, faultstring: faultstring[0].text }; } } return this._xmlError; } isValid() { if (this.error) return false; return true; } responseCode() { if (this.params() && this.params().indexOf('response_code') > -1) { return this.params().responseCode.toString(); } return null; } responseCodeDisplay() { if (RESPONSE_CODE.indexOf(this.action) > -1 && RESPONSE_CODE[this.action].indexOf(this.responseCode()) > -1) { return RESPONSE_CODE[this.action][this.responseCode()]; } else if (RESPONSE_CODE.default.indexOf(this.responseCode()) > -1) { return RESPONSE_CODE['default'][this.responseCode()]; } else { return this.responseCode(); } } validate() { if (!this.xmlResponse) { this.error = 'SoapServerError'; this.errorMsg = 'invalid XML response'; this.userErrorMsg = 'Error al realizar la operación'; this.extra = {}; } else if (this.xmlError()) { this.error = 'SoapServerError'; this.errorMsg = this.xmlError().faultstring; this.userErrorMsg = 'Error al realizar la operación'; this.extra = this.xmlError(); } else if (!this._isValidSignature()) { this.error = 'SecurityError'; this.errorMsg = 'invalid signature value'; this.userErrorMsg = 'Error al realizar la operación'; this.extra = this.xmlError(); } else { if (['finishInscription', 'Authorize'].indexOf(this.action) > -1 && parseInt(this.responseCode(), 10) !== 0) { this.error = `${this.action}Error`; this.errorMsg = this.responseCodeDisplay(); this.userErrorMsg = this.errorMsg; this.extra = {responseCode: this.responseCode()}; } else if (this.action === 'removeUser' && !this.params().removed) { this.error = 'removeUserError'; this.errorMsg = 'imposible eliminar la inscripción'; this.userErrorMsg = this.errorMsg; this.extra = {removed: false}; } else if (this.action === 'codeReverseOneClick' && !this.params().reversed) { this.error = 'codeReverseOneClickError'; this.errorMsg = 'imposible revertir la compra'; this.userErrorMsg = this.errorMsg; this.extra = {reversed: false}; } } } }; module.exports = { Response: Response };
RedPajamaGithub_-234418722635853169
Slimpajama627bTrain/chunk1
Q: Find out Card height to modify I'm trying to make change to this template startbootstr app. For this original code: <div class="row"> <div class="col-md-4 mb-5"> <div class="card h-100"> <img class="card-img-top" src="http://placehold.it/300x200" alt=""> <div class="card-body"> <h4 class="card-title">Card title</h4> <p class="card-text">...</p> </div> <div class="card-footer"> <a href="#" class="btn btn-primary">Find Out More!</a> </div> </div> </div> <div class="col-md-4 mb-5"> <div class="card h-100"> <img class="card-img-top" src="http://placehold.it/300x200" alt=""> <div class="card-body"> <h4 class="card-title">Card title</h4> <p class="card-text">...</p> </div> <div class="card-footer"> <a href="#" class="btn btn-primary">Find Out More!</a> </div> </div> </div> <div class="col-md-4 mb-5"> <div class="card h-100"> <img class="card-img-top" src="http://placehold.it/300x200" alt=""> <div class="card-body"> <h4 class="card-title">Card title</h4> <p class="card-text">...</p> </div> <div class="card-footer"> <a href="#" class="btn btn-primary">Find Out More!</a> </div> </div> </div> </div> I removed divs with class="card-footer" to get rid of "Find our more" buttons. This however, creates a "huge" blank space below "card-text". Using browser's style inspector, I couldn't locate which css class is responsible for the card's height. I do see "h-100" is applied to the Div, but making change to it doesn't change overall height. From where the height of above sample code/Card is controlled? TIA A: Here you go: JSFIDDLE This is your example without class="card-footer". I think you have a problem with your CSS
RedPajamaStackExchange_-8692787236559968367
Slimpajama627bTrain/chunk1
"The Grimscribe's Puppets" (Thomas Ligotti tribute anthology) wins the Shirley Jackson Award! Big congratulations to my friend Joe Pulver — he edited The Grimscribe's Puppets, an anthology which just won the Shirley Jackson Award for Best Anthology! Published by the awesome Miskatonic River Press. Buy the book here: The Grimscribe's Puppets. And be sure to join us for today's Lovecraft eZine video show — Joe will be on the show, and we'll talk about The Grimscribe's Puppets, and more! Watch the LIVE show today at 6:00pm Eastern time (5pm Central, 3pm Pacific), at this link. Thomas Ligotti is beyond doubt one of the Grandmasters of Weird Fiction. In The Grimscribe's Puppets, Joseph S. Pulver, Sr., has commissioned both new and established talents in the world of weird fiction and horror to contribute all new tales that pay homage to Ligotti and celebrate his eerie and essential nightmares. Poppy Z. Brite once asked, "Are you out there, Thomas Ligotti?" This anthology proves not only is he alive and well, but his extraordinary illuminations have proven to be a visionary and fertile source of inspiration for some of today's most accomplished authors. Contributing authors include: Livia Llewellyn, Daniel Mills, Michael Cisco, Kaaron Warren, Joel Lane, Darrell Schweitzer, Robin Spriggs, Nicole Cushing, Cody Goodfellow, Michael Kelly, Eddie M. Angerhuber, Jon Padgett, Mike Griffin, Richard Gavin, Scott Nicolay, Simon Strantzas, Paul Tremblay, Ally Bird, Jeff Thomas, John Langan, Gemma Files. This is incredible news! Congrats to everyone involved, and thanks be to Joe! Congrats, Joe (and writers). Awesome achievement. Thxxxxxxxxxxxxxxxxx Jon. Was an honor and a pleasure to have yer tale in the book!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! Way to go, Joe! Grimscribe's Puppets was a blast. Major congrats, O Beast of Berlin! And to the writers also!
RedPajamaC4_4109996828660080136
Slimpajama627bTrain/chunk1
It's quite interesting to understand how myths are created in the world of consumer-oriented products. The world of fitness equipment isn't a bit different, either. There happen to be a huge number of myths as well as misconceptions when we consider most kinds of fitness machines. It's pretty common too, because almost everyone wants a super-quick way to stay fit and lose some weight. However, if you are looking for one truly impactful workout experience, you must not blindly believe in these myths. If you do so, your efforts might go in vain, at least in the long run. Today, however, we're considering some elliptical machine myths. Elliptical Machines, quite popular among all sorts of fitness enthusiasts, are said to be somewhat easy. Due to this factor, you can find many myths and misconceptions regarding elliptical training and elliptical trainer machines. Through this article, we'd like to debunk some of such major misconceptions and myths about an elliptical workout. Some of the myths can have minute impact, but as far as your health and fitness stay as primary concerns, debunking these myths is a matter of life. After reading this section, you will also have an even healthier idea about elliptical trainers. What does really an elliptical machine offer is another matter of debate, and let's keep it aside. For the time being, let's debunk the long-celebrated myth that all elliptical trainers are the same and any product would give you the same result. Even as elliptical trainers, these machines can be classified into three major types — standard elliptical trainers, advanced cross-trainers and elliptical gliders. While the first one lets you have an impactful elliptical workout on lower-body, the cross-trainer elliptical offers lower body and upper-body workouts. So, if you are planning to improve your upper-body, there is no point in purchasing elliptical trainer and you should better go for a cross-trainer. Elliptical machines can further be classified too, based on many aspects like design, drive-system and portability. The crux you need to understand is simple: if you'd like the best output in terms of performance, you should choose the most appropriate machine for you. So, the next time someone says you can go and purchase any elliptical machines, take a second and ignore them. You've an immense variety of machines to choose from. This myth can arise due to two possible reasons. First, the person is an utter newbie to the world of elliptical machines and he/she doesn't know how the machine works. Second, the user isn't able to use even the in-built features of an elliptical trainer. In fact, almost every machine comes with multiple options for creating an awesome workout schedule for you. It would include different types of simulations, at different paces as well as times. If you can make sure that you use them, none of your elliptical machines will be monotonous, or boring for that matter. It can, at the same time, be less boring too. To make this happen, you need to use the versatile features via the control panel. As we just said, there will be different types of pre-programmed workouts, which do focus on different parts of your body. Similarly, if you have somewhat a high-end elliptical machine, there would be a few entertainment features too. If you think the variety of workouts isn't making you active, you should try some multi-tasking. You can even watch your favorite TV Show or News episodes when you are working out on the machines. This is another misconception, especially promoted by those who think that elliptical workouts are meant to be simple and non-impactful. This is basically because people are sticking onto a particular type of exercise. You are not going to burn much calories if you are doing the elliptical workout at the same pace and in the same mode. There should be machine-level optimizations if you are looking for the best results. Also, it's an often recommended thing to shift your workout mode; you can at least try moving the pedals backwards. Secondly, fat burning isn't the only thing you can do using an elliptical trainer. As said earlier, you can follow the different pre-programmed workouts from the control panel. Depending on the purpose and individual fitness data the machine has, different kinds of simulations will be rendered. Sometimes, you will get a kind a hill-climbing feel whereas some other modes offer jogging simulation. In all the cases, you don't have to face the issues of pounding or joint issues. That is, without taking much risk, you can have the best ways to get fit and stay fit. It's perhaps the most ironic myth in the entire world of fitness. Combining both our personal experience and experts' opinions, elliptical trainer is the most effective universal fitness task you can go for. It needs to be noted that we are comparing this to the possibly-dangerous stuff like jogging, treadmill, running etc. On the other hand, when you are working on an elliptical machine, you have a better level of safety and stability. In case if you are still doubtful, your legs are placed on sturdy pedals and there are no chances of bumping or bad steps. These things are good, from the safety point of view. It would also be clear to you, by now, that elliptical training requires no technical knowledge or assistance per se. You just have to be on top of the machine, select the suitable type of workout and start working out in the way you like. It's also recommended to have a proper schedule for workout, especially if you have a few fitness-oriented goals. Despite all these possibly advanced stuff, anyone can get the best output from an elliptical trainer. Getting rid of these myths and debunking them are as important as regularly using the best elliptical trainer. We hope this helps you to have a clearer idea about these machines and to move forward with some more productive workouts.
RedPajamaC4_6920048512289430249
Slimpajama627bTrain/chunk1
China Jack Hammer manufacturers - Select 2017 high quality Jack Hammer products in best price from certified Chinese Drill With Hammer manufacturers, ... Down The Hole DTH Hammer Jack Hammer for Water, Well Mining. Rock Drill Jack Hammer, Rock Drill for Mining, Mining Jack Hammer manufacturer / supplier in China, offering Yt24 Gold Mining Rock Drill Jack Hammer for Mining, Mountain Crawler Integrated Surface Drilling Rig with Factory Price, 80-100mm Integrated DTH Crawler Drill Rig Surface Quarry Mining Blasting and so on. Please input a valid price. to. Current Offers (42) Free Shipping (25) All Items On Sale (1) Companion (42) Free Shipping (25) All Items On Sale (1) Companion. Discount (27) All Discounted Items ... Arksen 2800W Construction Demolition Jack Hammer Electric Concrete Breaker 2 Bits Bull Point & Flat Chisel Heavy Duty w/Case. Rock Drill, Jack Hammer, Drill Rig manufacturer / supplier in China, offering YO20 Hand Hold 20KG Jack Hammer For Mining, Kaishan LG-11.6/10g Large Screw Air Compressor for Drilling Machine, KSZJ-31/25 Double Stage Screw Air Compressor For Water Well Drilling and so on. prices of mining jack hammer for sale - Grinding Mill China. Jack Hammer,Jack Hammer Products, Jack Hammer … Jack Hammer, You Can Buy Various … jack hammer prices, mining jack hammer s … rock drill jack hammer YO18 for sale. Find here Jack Hammer, Jackhammer manufacturers, suppliers & exporters in India. ... Pneumatic Jack Hammer Ask Price. Usage: Drilling Purpose. ... We are one of the leading manufacturer for Jack Hammers, which are used in mining industry. These are manufactured using quality high alloy steel. Pneumatic Spares India Regd. Exporter of Jack Hammer Rock Drills - Simba Junior Rock Drill, Pneumatic Rock Drills (Heavy Duty), Hydraulic Rock Drills with Rock Splitter and Hydraulic Rock Splitter offered by Mining And Mechanical Tools Company, Howrah, West Bengal. ... Ask For Price. Simba Junior Rock Drill. When To Use Pneumatic. An air jack hammer is primarily used when (and best for) digging a hole, especially in a dense, tough material such as asphalt or concrete. D25263K 1 in. SDS+ Rotary Hammer Kit is D25263K 1 in. SDS+ Rotary Hammer Kit is a lightweight low vibration high-performance drill designed for demands of today's contractor. The durable German engineered mechanism delivers 2.8-joules of impact energy that delivers fast speed of application that professionals demand. Air Paving Breaker Rentals Paving Breakers are heavy-duty air hammers utilized for the demolition of concrete floors, pavement, masonry walls, bridge decks, and numerous other construction and plant maintenance applications. electric jack hammer - compare prices at BuyCheapr.com. help For everything from onion rings to shrimp, this Presto FryDaddy deep fryer is a must-have.Watch the product video here. Limit 5 per . : Oil-to-food ratio makes four servings with 4 cups of oil. Also known as a concrete breaker or demolition jack hammer, the combination of the hammer and the chisel is a force truly to be reckoned with. A handheld jack hammer is typically powered by compressed air, although some are electric.
RedPajamaC4_1589973703192584715
Slimpajama627bTrain/chunk1
Home/Sport/Soccer/Juventus star opens the door for Everton move? Juventus star opens the door for Everton move? admin Send an email 2 weeks ago News » Premier League news » Everton news December 31, 2020 20:15 GMT (UK), by Sri Aswin Khedira to Everton this month? Juventus midfielder Sami Khedira has opened the door for a potential move to the Premier League during the January transfer window. The Germany international has been deemed surplus to requirements by the Bianconeri and he has not made a single competitive appearance this term. He has entered the final six months of his contract and reports claim that his deal could be mutually terminated in the coming days. Bild's Christian Falk recently confirmed that Khedira would welcome a reunion with manager Carlo Ancelotti at Everton. And Khedira has now talked up the prospect of moving to the English top-flight in an exclusive interview with The Athletic. "The Premier League is still missing in my collection, to play there would be the icing on the cake. I've done extra sessions with fitness coaches to get myself ready for the pace and intensity in the Premier League," He told. Khedira previously worked under Ancelotti at Real Madrid and it remains to be seen whether they are reunited at Goodison Park. The Toffees strengthened the midfield with James Rodriguez, Allan and Abdoulaye Doucoure in the summer, but they are eyeing another signing. EyeFootBall Fashion Bomb Kids: Nicki Minaj Shares Pictures of Baby Boy in Fendi, Gucci, Dolce & Gabbana, and Burberry Outfits Figuring out all the playoff scenarios
RedPajamaCommonCrawl_4625048620141185491
Slimpajama627bTrain/chunk1
Wear a little bit of whimsy with this comet wax seal necklace, the comet surrounded by the words HEREBY HANGS A TALE. I sense a bit of gossip? Do you, or someone you know, have a story to tell? A comet, or blazing star, with its tail soars in the center surrounded by the words HEREBY HANGS A TALE but they are a bit of a challenge to read. Comets are somewhat common in heraldry but their meaning is unknown. Hand cast from a Victorian era, 1860 - 1890, clear glass block wax seal that was likely once part of a set.
RedPajamaC4_-3236471565268872183
Slimpajama627bTrain/chunk1
Your own private Patagonia (CNN) — The condors gave it away. Instead of soaring in circles on thermals high overhead, a group of Andean condors was traveling low to the ground. Some even landed tentatively before lumbering back up into the air only to touch down again near the same spot near one of the dirt roads that run through the park. These endangered scavengers were clearly feeding and I wanted to see what they'd found to feast on. As I drove slowly closer, the enormous birds moved a short distance away and after a few careful steps through tufts of grass along the side of the road I saw what they were after: a partly eaten young guanaco, its neck snapped in a signature puma move. Standing there alone with the fresh kill under the watchful, wary eyes of the condors felt like I was in my own personal episode of "Wild Kingdom" with Marlin Perkins. I'd been traveling in the Patagonia regions of Argentina and Chile for months, so I knew that having that moment to myself in Argentina's Perito Moreno National Park was a rare gift. The chance for wild encounters in nature has inspired more and more people to travel to Patagonia which, in turn, has made crowds more commonplace in some of the area's most popular parks. Argentina's remote Perito Moreno National Park is home to guanacos, the llama's wild cousin. Eric Mohl For example, you'll see far more humans than Andean condors in Torres del Paine National Park. Just a few hundred miles south on the Chile side of Patagonia, Torres del Paine was visited by 304,947 people in 2019 (despite the park's hefty entrance fee). Meanwhile, Perito Moreno National Park, which is free to enter, was visited by just 272 people in 2019 between October 1 and May 1 when the park is open to visitors. That's an average of about one visitor per day during its seven month season. So why is this park so lightly visited? Its remote location (even by Patagonian standards) and low profile compared to well-publicized superstar parks such as Torres del Paine keep numbers down — and that's a boon for travelers looking for their own "Wild Kingdom" moments. Diverse landscapes and Patagonia's second highest peak Perito Moreno National Park — not to be confused with Perito Moreno Glacier to the south — was named after Francisco "Perito" Moreno, an Argentinean geographer, naturalist, anthropologist and biologist who is credited with creating the country's park system when he donated 18,500 acres to the Argentinean government to create the country's first national park. Perito Moreno National Park was established to protect its distinct combination of Patagonian steppe grasslands, spiky peaks (including San Lorenzo Mountain, the second highest peak in Patagonia at 12,159 feet), milky glacier-fed rivers, lakes free of invasive trout and forests of hardy, small-leafed lenga beech trees. Perito Moreno National Park protects more than 313,400 acres. These diverse landscapes are home to guanacos (the llama's wild cousin), endangered Andean condors, rarely seen pampas cats, flamingos, rheas (an ostrich-like bird), pumas, elusive Geoffroy's cats and endangered huemul deer. In 1990, the area's natural riches caught the attention of Doug Tompkins, the co-founder of Esprit and an accomplished outdoor adventurer, and inspired him to purchase the El Rincón Ranch abutting the park. In 2014, his Tompkins Conservation organization donated the ranch to the Argentinean National Parks Administration in a move that added 37,000 acres to the park. Windswept and rugged Today, Perito Moreno National Park protects more than 313,400 acres and exploring that environment recently became easier with the addition of new infrastructure. There are now 55 miles of hiking trails in Perito Moreno National Park. During my visit, I hiked a route called the Long Belgrano Peninsula Circuit (Belgrano Circuito Grande in Spanish) which turned into a nearly 13 mile loop because, despite good trail signage, I missed the cut off that leads directly back to the trailhead and ended up skirting around a huge hill instead. But I wasn't complaining as the mostly undulating trail took me through a gorgeous mix of lenga beech forests, expanses of grassy steppe and the rugged shoreline of Belgrano Lake. Even better, the only other people I saw on the trail were a family of four and two couples. There are also nearly 60 miles of dirt roads in the park that deliver visitors to viewpoints from which to admire park landscapes. Whether you're exploring the park on foot or in a vehicle, remember that the weather is as much a part of the Patagonian experience as the terrain or the flora or the fauna. Be ready for a range of temperatures and conditions and heed wind warnings. For example, at the blufftop viewpoint over Volcano Lake (Laguna Volcán), rangers have placed a sign that reads "Cuidada en las dias con viento fuerte" (Be careful on the days with strong wind). They're not kidding. During my stop there, the famous Patagonian wind was so fuerte that I could barely open the door of my truck. Once I managed to get out, I felt like I was about to be knocked off my feet. At Mie Lagoon, which is favored by flamingos, a wooden blind serves as a lair from which to observe the birds as they defy their tropical stereotype by picking their way through the icy water in the shadow of snow-capped peaks. The blind also makes a great shelter from the wind. Inside the park, a collection of rustic wood cabins are available for free stays with reservations. You'll need more than a day to explore all that Perito Moreno National Park offers and the recent addition of a daisy chain of 10 wood cabins (called refugios in Spanish) makes spending a night or two in the park much easier, although the cabins are temporarily closed because of the pandemic. The cabins come in different sizes to accommodate three to six people and even if you don't think you're a sleep-in-the-park type, they're tempting — and free. All have bunk beds with mats (BYO sleeping bag), high-quality windows (no drafts), wood-burning stoves (and well-stocked wood piles), a basic cooking/dining/sitting area (BYO cooking stove and food), porches with lake views and nearby bio outhouses. To encourage further use of the cabins, a hut-to-hut network of trails called Hidden Lakes (Lagos Escondidos) was created to allow hikers to explore the park with nights spent in cabins along the way. Camping is also an option in small lakeside campgrounds with smooth, flat tent spots and bio outhouses. Two backcountry camping areas serve visitors who want to explore more remote areas such as San Lorenzo Mountain. No matter how you choose to explore Perito Moreno National Park, you'll likely have the experiences and the solitude that drew you to Patagonia in the first place. Perito Moreno National Park is open from October 1 through the end of April. Pandemic travel restrictions are currently in place across Argentina because travel increases your risk of contracting and transmitting the virus. But this park is full of fresh air and likely to be free of crowds when the world starts traveling internationally in large numbers again. Park entrance is free as is use of the cabins (once they reopen post-Covid) and campsites. Overnight stays in cabins or camping areas require reservations. Go to this link, and use the "Huts & annex tent sites" tab under the "Where to Sleep" tab to select the cabin or camping area you want to reserve. There's a two night maximum in most cabins. You will need your own vehicle to reach and explore Perito Moreno National Park, which is accessed via Ruta Provincial 37, a rough 50-plus mile dirt road that cuts off Argentina's iconic Ruta Nacional 40 that runs the length of the country. Allow at least an hour and a half on RP 37 to get to the park entrance and ranger station. A 4×4 is not necessary, but good tires and decent ground clearance are. Be sure you have a full tank of gas and bring extra if you think you might exceed your tank's mileage. There is no fuel available in or near the park. Don't confuse Perito Moreno National Park with the Perito Moreno Glacier (also named for Francisco "Perito" Moreno). The popular glacier is located near the town of El Calafate, hundreds of miles from Perito Moreno National Park. If you don't feel like camping or staying in a cabin, you can still sleep inside Perito Moreno National Park by booking accommodations at Estancia La Oriental where the hospitable Lada family have turned their sheep ranch farmhouse into a homey and history-filled guesthouse. This article was originally published by Cnn.com. Read the original article here.
RedPajamaCommonCrawl_-5300312358230711274
Slimpajama627bTrain/chunk1
"Christian Car Buying keeps God first, prevents you from paying too much, saves thousands you risk leaving on the negotiating table." We are "CCBM Certified Negotiators " called to minister Christian Car Buying advice. Our unique coaching strategies empower you to break "Generational" strongholds on family car buying finances forever using "Biblical Principles of Persuasion", closely guarded, "Advanced Dealer Negotiation Tactics" and our global technical support. Our interactive coaching uses real world, role-playing scenarios to simulate "Secret Tricks of the Trade" used by many dealers to make outrageous profits on you. Using our knowledge and experience from inside the dealership we infuse you with a "Commanding Business Protocol" that empowers you to save thousands as you effectively negotiate money saving , stress free, deals, without fear, intimidation, or "Buyers Remorse". For those who refuse to spend all day at the dealership feel the power of the "Internet Fleet Deal" forcing dealers to submit bids for your business. Once you determine the lowest bidder you simply show up, enjoy your final ( pre-delivery-inspection) demo ride, finalize your method of funding and drive off praising God for showing you how to conquer the fear that once controlled you. God has given the Christian Car Buying Ministry (CCBM) a fiduciary revelation to share with churches experiencing financial challenges. Problem: Many churches are being forced to shut their doors. Why? Because diminished church tithes and offerings fail to meet their weekly operating budget. God has revealed that there exists a correlation between faulty car buying skills and stewardship. Will a man be tempted to rob God in order to acquire and fuel vehicles they really can't afford? We solicit your prayers for pastors who become weary and discouraged as increasing numbers of their members rob God to buy cars the wrong way. In their endless search for significance they often fail to seek Christian Car Buying advice before entering a Dealership. Hasty, and often inexperienced they fall victim of "Buyers Remorse" as the call us seeking help on the way home but by then ...It's too late! Why? Because saying the wrong things during negotiations frequently result in paying too much for too long. What are your plans for God's children? How will you teach them to effectively negotiate? Without an experienced CCBM negotiator to teach them biblical Do's and Don'ts of Negotiating" they can easily find themselves "Upside Down" for 7 years as they fall for the "Bait and Switch" tactics of a "Tent Sale" ! Solution: The Christian Car Buying Ministry (CCBM) teaches pastors and their people how to negotiate a "Fair Deal" using "Biblical Principles of Persuasion" to seek God's word to implement our proven "Insider" negotiation strategies. Also CCBM can show you how to create a generational " Income Stream " for your church if you allow us to help you establish a local CCBM chapter at your church. More details... after you Register . Seek God and feel the power as (CCBM) reveals money saving, "Jaw Dropping" , negotiation strategies that bring car dealers to their knees begging for your business! When you put God in your deal---He'll put you in a Praise-Mobile ! Will you be ready to tell your Dealer about the Good News of Jesus Christ?
RedPajamaC4_-809710572476314855
Slimpajama627bTrain/chunk1
FTC wants your feedback about proposed Made in USA Rule Lesley Fair If your clients are interested in Made in USA issues – and you know they are – there are two developments at the FTC they need to know about. First, the FTC just announced a Notice of Proposed Rulemaking for a Made in USA Labeling Rule. You'll want to read the notice in detail, but the proposed Rule would apply to labels on products that make unqualified Made in USA claims. (In FTC parlance, an "unqualified" claim is a broad representation made without limitations.) The proposed Rule would incorporate established guidance already set forth in FTC decisions and orders and in the agency's 1997 Enforcement Policy Statement on U.S. Origin Claims. Consistent with that guidance, the proposed Rule would prohibit marketers from making unqualified MUSA claims on labels unless: Final assembly or processing of the product occurs in the United States; All significant processing that goes into the product occurs in the United States; and All or virtually all ingredients or components of the product are made and sourced in the United States. The proposed Rule wouldn't change or affect any other existing federal or state law or regulation relating to country-of-origin labels, but it suggests one notable modification: The proposed Rule would allow the FTC to seek civil penalties for violations. Once the proposed Rule is published in the Federal Register, we invite you to file a public comment either online or on paper. (Thanks for following the instructions for submitting comments included in the notice of proposed rulemaking.) Development #2 is that the FTC just issued a staff report on last fall's Made in USA workshop convened to consider consumer perception of Made in USA claims and to discuss the agency's Made in USA enforcement program. Dive into the report for the details, but according to the one panelist who provided survey evidence on how consumers understand Made in USA claims, a 2013 study suggests that almost 3 in 5 Americans agree that "Made in America" means that all parts of a product, including any natural resources it contains, originated in the United States. According to that same study, one third of consumers believe that 100% of a product must originate in a country for it to be called "made" in that country. The report cites those statistics in support of long-standing guidance in the FTC's Enforcement Policy Statement on U.S. Origin Claims that at least a significant minority of consumers are likely to be deceived by an unqualified Made in USA claim for a product incorporating more than a trivial amount of foreign content. Bureau of Consumer Protection Advertising and Marketing Basics (209) Children's Privacy (48) Consumer Privacy (103) Credit and Finance (210) Credit and Loans (66) Credit Reporting (56) Data Security (163) Debt Collection (39) Endorsements, Influencers, and Reviews (103) Environmental Marketing (31) Gramm-Leach-Bliley Act (22) Health Claims (143) Health Privacy (15) Mortgages (12) Online Advertising and Marketing (172) Payments and Billing (90) Privacy and Security (297) Privacy Shield (12) Red Flags Rule (3) Self-Regulation (1) Small Business (123) Telemarketing (73) U.S.-EU Safe Harbor Framework (2) Selected Industries Clothing and Textiles (25) Franchises, Business Opportunities, and Investments (65) Non-Profits (15) Real Estate and Mortgages (15) More from the Business Blog HomeAdvisor's $7.2 million proposed settlement with FTC hits home with small businesses, gig workers Taking the "ploy" out of employment scams FTC charges LasikPlus with dilate-and-switch pricing FTC reminds company that makes Pyrex glassware to be transparent about Made in USA claims Enter your email to subscribe to Business Center Blog
RedPajamaCommonCrawl_478486955067423415
Slimpajama627bTrain/chunk1
Thai rice basket made of natural bamboo. In asian homes this 29x29x45 cm vase is traditionally used to store rice but it also makes a stunning and practical storage basket in any room. Entirely handcrafted and hand-painted. Temporarily out of stock. Thai rice basket made of natural bamboo. In asian homes this 29x29x60 cm vase is traditionally used to store rice but it also makes a stunning and practical storage basket in any room. Entirely handcrafted and hand-painted. Thai rice basket made of natural bamboo. In asian homes this 35x35x52 cm vase is traditionally used to store rice but it also makes a stunning and practical storage basket in any room. Entirely handcrafted and hand-painted. Thai rice basket made of natural bamboo. In asian homes this 50x50x64 cm vase is traditionally used to store rice but it also makes a stunning and practical storage basket in any room. Entirely handcrafted and hand-painted.
RedPajamaC4_-1314556113326613734
Slimpajama627bTrain/chunk1
Home » TV & Movies » Alyssa Milano Won't Appear On The 'Charmed' Reboot, And There Goes Its Chance To Redeem Itself Alyssa Milano Won't Appear On The 'Charmed' Reboot, And There Goes Its Chance To Redeem Itself Phoebe Halliwell is not in the building. During the Los Angeles premiere of her new Netflix series, Insatiable, Alyssa Milano made it clear she's not involved with The CW's Charmed reboot in any capacity. As a matter of fact, she seemed just as disinterested as we are. "I wish that they would have come to us and we would have been involved since the beginning," Milano told Entertainment Tonight. "But having said that, I do hope that it reaches the newer generation and impacts that generation the way ours was able to do for its generation." The outlet went on to ask Milano if there was a surprise Halliwell cameo in the works, to which she responded, "I don't think so. I think that ship has sailed for me." Milano isn't the first member of the original Charmed cast to speak out. Holly Marie Combs, who played Piper, has been an outspoken detractor of the new series on social media. "Here's the thing," she wrote when news of the reboot broke. "Until you ask us to rewrite it like Brad Kern did weekly don't even think of capitalizing on our hard work. Charmed belongs to the 4 of us, our vast amount of writers, crews and predominantly the fans. FYI you will not fool them by owning a title/stamp. So bye." "While some may not get why I take issue with the network that didn't want to renew Charmed 12 years ago 'reimagining' it now let me just say I understand it perfectly," she shared. "Also this kinda stuff given all that Rose and Alyssa have done lately…um no. Just No" "And another thing," she followed up. "Reboots or remakes, as we used to call them, usually have storylines so similar to the original that they are legally required to use the same title and buy the rights to that title. If it's not similar than it's just another show. A new show with a new title." Likewise, Shannen Doherty, who played Prue Halliwell, had a lot to say when one fan pointed out The CW's "terrible approach" that "belittl[ed] everything that Charmed brought to the table." "Yep. You nailed it," she wrote. "Their wording is terrible and a bit offensive. But, everyone makes mistakes. Perhaps with the backlash they will be more thoughtful in future." Rose McGowan, who played Paige Matthews, simply wrote, "They have really run out of ideas in Hollywood. Lame lame lame lamertons." The issue with this reboot — as the cast pointed out — is that calling it "feminist, fierce, and funny" insults the original series. It discredits the legacy of one of the longest running female-facing TV series in Hollywood. The network chose to end Charmed after Season 8 (not necessarily due to ratings) and turned down the cast's offer to reprise their roles for a reboot of sorts, be it a movie or a fresh season. The CW's choice to belittle the original in order to prop up its "reimagining" is disappointing, and it looks like the original cast shares that sentiment. Unfortunately for Milano, Insatiable is also facing backlash. The show follows a teen, Patty, who loses weight after a crazy accident and decides she wants revenge on everyone who bullied her when she was overweight. However, the show's use of a fat suit, its so-called dark humor, and certain problematic story lines have critics wondering how it even made it on the streaming site. In response to naysayers, Milano has pointed out Insatiable is satirical and should be regarded as such. "I won't apologise for doing this show," Milano told People. "I think it's important and I think art at its best is a conversation instigator and I definitely think this show is going to be that." "The irony of people judging the show — which is a 12-hour piece of work — from a one minute and 28 second trailer was interesting because really what the show is about is how looks can be deceiving," she continued. In times like these we like to ask ourselves: WWPHD? Vicky Pattison shares make-up free photo before undergoing amazing transformation Ranking The Best 'Game Of Thrones' Funko Pop! Figures
RedPajamaCommonCrawl_-4462786403337310750
Slimpajama627bTrain/chunk1
package org.robovm.samples.contractr.fx.ios; import java.io.File; import java.io.InputStream; import java.util.Map.Entry; import java.util.Properties; import javafx.application.Application; import javafx.scene.Scene; import javafx.stage.Stage; import org.robovm.apple.foundation.Foundation; import org.robovm.apple.foundation.NSAutoreleasePool; import org.robovm.apple.uikit.UIApplication; import org.robovm.apple.uikit.UIApplicationDelegateAdapter; import org.robovm.apple.uikit.UIApplicationLaunchOptions; import org.robovm.samples.contractr.core.ClientModel; import org.robovm.samples.contractr.core.TaskModel; import org.robovm.samples.contractr.core.service.JdbcClientManager; import org.robovm.samples.contractr.core.service.JdbcTaskManager; import org.robovm.samples.contractr.core.service.SingletonConnectionPool; import org.robovm.samples.contractr.fx.core.ContractRFXApp; /** * */ public class ContractRFXIOSApp extends UIApplicationDelegateAdapter { private static final String IOS_PROPERTY_PREFIX = "ios."; public static class App extends ContractRFXApp { @Override public void init() throws Exception { /* * Initialize the models. The SQLite database is kept in * <Application_Home>/Documents/db.sqlite. This directory is backed up * by iTunes. See http://goo.gl/BWlCGN for Apple's docs on the iOS file * system. */ try { Class.forName("SQLite.JDBCDriver"); } catch (ClassNotFoundException e) { throw new Error(e); } File dbFile = new File(System.getenv("HOME"), "Documents/db.sqlite"); dbFile.getParentFile().mkdirs(); Foundation.log("Using db in file: " + dbFile.getAbsolutePath()); SingletonConnectionPool connectionPool = new SingletonConnectionPool( "jdbc:sqlite:" + dbFile.getAbsolutePath()); JdbcClientManager clientManager = new JdbcClientManager(connectionPool); JdbcTaskManager taskManager = new JdbcTaskManager(connectionPool); clientManager.setTaskManager(taskManager); taskManager.setClientManager(clientManager); super.clientModel = new ClientModel(clientManager); super.taskModel = new TaskModel(taskManager); } @Override public void start(Stage primaryStage) throws Exception { super.start(primaryStage); Scene scene = primaryStage.getScene(); scene.getStylesheets().add(ContractRFXIOSApp.class.getResource("iOSTheme.css").toExternalForm()); } } @Override public boolean didFinishLaunching(UIApplication application, UIApplicationLaunchOptions launchOptions) { Thread launchThread = new Thread() { @Override public void run() { Application.launch(App.class); } }; launchThread.setDaemon(true); launchThread.start(); return true; } public static void main(String[] args) throws Exception { InputStream is = null; Properties userProperties = new Properties(); try { is = ContractRFXIOSApp.class.getResourceAsStream("/javafx.platform.properties"); System.out.println(is); userProperties.load(is); String key = null; for (Entry<Object, Object> e : userProperties.entrySet()) { key = (String) e.getKey(); System.setProperty(key.startsWith(IOS_PROPERTY_PREFIX) ? key.substring(IOS_PROPERTY_PREFIX.length()) : key, (String) e.getValue()); } System.getProperties().list(System.out); } finally { try { is.close(); } catch (Exception e) { } } try (NSAutoreleasePool pool = new NSAutoreleasePool()) { UIApplication.main(args, null, ContractRFXIOSApp.class); } } }
RedPajamaGithub_3930581596485184043
Slimpajama627bTrain/chunk1
Morocco competed at the 2009 Mediterranean Games held in Pescara, Italy. Medal Count Number of Entries by Sport See also Mediterranean Games 2009 Mediterranean Games medal table European Olympic Committees References Nations at the 2009 Mediterranean Games 2009 Mediterranean Games
RedPajamaWikipedia_7726222747645610652
Slimpajama627bTrain/chunk1
Home Programs & Services P-Patch Community Gardening P-Patch List Photo Credit: Jennifer Luxton Address: 300 Mercer St About The P-Patch Number Of Plots: 98 Size: 25,000 sq. ft. Wait Time: 6-12 months UpGarden P-Patch Through the 2008 Parks & Green Space Levy, Uptown was designated as a priority area for new community garden development. Vacant land in this dense, urban neighborhood was difficult to come by. Luckily, a creative solution was worked out with the Department of Neighborhoods and Seattle Center. The Seattle Center has offered the community nearly half of the top level of the Mercer Garage as an experimentation site for rooftop gardening. The garden is visible from both the top of Queen Anne Hill and the Space Needle. The P-Patch will remain as a public gardening space for the next couple years until the Mercer Garage is redeveloped as part of the Seattle Center Master Plan. At that point, the community intends to find a more permanent P-Patch location in the surrounding neighborhood. For more information and updates, visit the UpGarden P-Patch website. If you are interested in designing, building, or gardening in this or any other P-Patch, find out more about the P-Patch sign-up process here. To sign up as a P-Patch participant, call 206-684-0264, email p-patch.don@seattle.gov, or sign up online. Learn everything you need to know to sign up for a P-Patch plot! Know the Code of Conduct The Code of Conduct applies to anyone in a community garden. Know the Rules! Read the full rules for P-Patch Participants in gardens with individual plots. Download the Rules For Children & Youth
RedPajamaCommonCrawl_-2259122582923625395
Slimpajama627bTrain/chunk1
Are you looking to write a new cook resume and you haven't yet found some good cook chef resume examples? Take a few minutes to read the one we have written for you. You can download and edit according to your experience . To secure a position as a cook at one of the state's most excellent and exceptional food service establishments and to contribute my culinary expertise in preparing outstanding and commendable dishes to provide customers with a world-class dining experience. Interviewing without knowing the simplest thing about the educational establishment you are applying at sounds like a recipe for disaster. What if your interviewer asks you to cite the school's specific attributes which attracted you to it in the first place? What if he questions your interest in the post because you could not explicitly describe the attraction? What if he throws questions about the history of the facility? Those are a lot of what ifs, but they are the what-ifs that could mean the difference between being hired and being shown the door. Prior to any job interview, you must make the necessary changes and updates on one very important document – the curriculum vitae or resume. Once you have keyed in the details of your latest work experience and added other essential information, go through the entire document with a fine tooth comb, searching for possible errors in grammar, spelling, or formatting. After making sure that the final version is void of any such mistakes, it is time for you to refresh your memory on the details found on your resume that you might be asked to expound on. A good resume is great, but nothing beats an applicant who can provide the particulars without having to glance at the paper every single second. Although not every employer conducts an initial interview over the phone, you should always do your level best to prepare for one. This is a huge chance for you to convince your future employer that you are a viable applicant, one that they would like to invite for a more in-depth interview. Be impressive, but be yourself, too. If you put on airs and put on a mask just to make a good impression, your future boss won't recognize you at all. Nail this interview over the phone, and you will be much closer to your career goals. What is it about being a cook that made you choose this career? What types of cuisines do you have a special interest in? Why are you interested in working with us as opposed to other restaurants? What can you bring to our restaurant that no one else can? How well do you thrive in a team? What strategies do you use to deal with complaints from customers? How do you make sure the environment and equipment remain clean, sanitary, and safe for daily operations? What is the relationship like between supervisors and cooks? How many other cooks, line cooks, and helpers are there? How committed is the restaurant to sanitation and to providing high-quality dishes? Is the menu open and flexible for improvements and new vision? How are the employees evaluated? If this Cook Chef resume example wasn't sufficient for you, you are free to review some other samples and templates from our site. Browse to some related resumes below and find your inspiration.
RedPajamaC4_4364482675528644055
Slimpajama627bTrain/chunk1
La Reverdie es un grupo italiano de música antigua fundado en 1986 por dos parejas de hermanas: Claudia Caffagni, Livia Caffagni, Elisabetta de Mircovich y Ella de Mircovich. A partir de 1991 y dependiendo del repertorio a interpretar, han contado con la colaboración de otros intérpretes como Doron David Sherwin (cornetto, percusión, cantante), quien participa habitualmente con el grupo. El nombre del grupo proviene de unos romances líricos (reverdies) que celebraban el retorno de la primavera. Interpretan preferentemente música medieval, a veces a capella y a veces con acompañamiento instrumental de laúd, flauta, viella y arpa. Discografía 1990 - Bestiarium. Animals in the Music of the Middle Ages. Nuovo Era 6970. . Posteriormente ha sido reeditado, cambiando el orden de las pistas en: Cantus 9601. 1992 - Speculum amoris. Lyrique d'Amour médieval, du Mysticisme à l'érotisme. Arcana A 336. 1993 - Guinevere, Yseut, Melusine. The heritage of Celtic womanhood in the Middle Ages. Giulia "Musica Antiqua" GS 201007. 1993 - Knights, Maids and Miracles: The Spring of Middle Ages. Arcana 399 (5 CDs). 1994 - O Tu Chiara Sciença. Musique de la Pensée Médiévale. Arcana A332. 1994 - Laude di Sancta Maria. Veillée de chants de dévotion dans l'Italie des Communes. Arcana 34. 1995 - Suso in Italia Bella. Musique dans les cours & cloître de l'italie du Nord. Arcana A 38. Arcana A 320. 1997 - Insula Feminarum. Résonances médiévales de la Féminité Celte. Arcana A 311. 1999 - Legenda Aurea. Laudes des Saints au Trecento italien. Arcana 304. 1998 - La Nuit de Saint Nicholas.La Reverdie e I Cantori Gregoriani. Arcana A 72. 1999 - Historia Sancti Eadmundi. De la liturgie dramatique au drame liturgique. Arcana A 43. 2001 - La Reverdie en Concierto. Festival Internacional de Santander. RTVE Música 65131. 2001 - Nox-Lux. France & Angleterre, 1200-1300. Arcana A 307. 2002 - Voyage en Italie. Arcana 317. 2003 - Hildegard Von Bingen: Sponsa regis. La Victoire de la Vierge dans l'oeuvre d'Hildegard von Bingen. La Reverdie y Piccoli cantori di San Bernardo. Arcana A 314. 2005 - Jacopo da Bologna: Madrigali e Cacce. Arcana A327. 2006 - Guillaume Dufay: Missa Sancti Jacobi. Arcana A342. 2009 - Carmina Burana. Sacri Sarcasmi. Arcana 353. 2013 - I dodici giardini: Cantico di Santa Caterina da Bologna. Adiastema. 2014 - Laudarium. Songs of popular devotion from 14th century Italy. Arcana WDR 3. 2015 - Venecie mundi splendor. Marvels of medieval Venice. Arcana A387. 2019 - L'Occhio del Cor. Francesco Landini: Songs of Invisible Love. Arcana 462. Álbumes recopilatorios y cajas: 2016 - Knights, Maids, and Miracles. The Spring of Middle Ages. Arcana 399. Álbumes junto con otros grupos: 2000 - Resonanzen 2000. Vox populi - Vox Dei. ORF "Edition Alte Musik" CD 252 (3 CD). Galería Véase también Grupos de música antigua Notas Enlaces externos Información en Goldberg Magazine (en inglés) http://www.artemusica.com/bios/reverdie.html Sitio de La Reverdie (en italiano, francés e inglés) Grabaciones Grupos de música antigua de Italia Grupos de música de Italia Grupos de música medieval Grupos de música renacentista
RedPajamaWikipedia_-8787158247093641810
Slimpajama627bTrain/chunk1
Seth Kada, a deep-cover agent working for the Commonwealth, has tracked a group of rebels to the remote Tayako Orbiter. But before he can seize them, the rebels are captured by a powerful rival faction and spirited away. Seth manages to re-capture one of the rebels, a subspace navigator named Ciela, and soon realizes that her crew's origin and purpose are far more pivotal than anyone could have suspected. Caught up in a violent clash between rebel factions, Seth and Ciela's divergent loyalties must be put aside to prevent the destruction of a peaceful civilization - and find her people before their ultimate destiny is realized. Terminus Shift is a complete stand-alone story. Chronologically, it takes place about a year or so after Rebel Alliances and Quantum Tangle. Click here to view the Amazon book page including all reviews. International readers: Review snippets "These tales are a wonderful exploration of imagination. I actually can envision these on tv as a series a la star trek. Full of believable people and places that I want to know more fully." "I really liked this book and am looking forward for the next one in the series. I can't wait for more of Seth and Celia. I have read most of Chris Rehers books and would recommend them to anyone" "Sethran Kada reminds me of the bad boy we all love because he's really not that bad; and when you get to know him, you can't help but smile. Loved the little cameo appearance of Nova Whiteside. Looking forward to reading the sequel." About Terminus Shift This is the second story in the Targon Tales series concerning Sethran Kada specifically. He previously appeared with Nova Whiteside in The Catalyst and in Rebel Alliances. Quantum Tangle was his first solo adventure. This is the second. This story takes place within a clash between the two major rebel factions operating in Trans-Targon: The power- and wealth-hungry Shri-Lan and the more extremist, ideological Arawaj. Seth has some ties and certain sympathies for the Arawaj rebels but, officially anyway, his alliance is to the ruling Commonwealth Union of Planets. Of course, he tends to follow his own nose when it comes to doing what he feel is right. Circumstances force him to work with Ciela, a high-level navigator working for the Arawaj. Her ideals are a little problematic for him, especially when he realizes that she doesn't belong in any of the strife going on around her. Especially not the Union's military. So once again he's not exactly playing by Air Command's rules, which is where we like him. Terminus Shift is an all-out action adventure with aliens, spaceships, exotic locations, and things blowing up. But I wanted to take a closer look at what drives the rebels to oppose the expansion of the Commonwealth and how someone inside the factions might view the outside. It also continues Seth's fascination with subspace and what might possibly be lurking among the D-branes. Special guest appearance by Nova Whiteside. Copyright Chris Reher 2014.
RedPajamaCommonCrawl_-1079520800684208790
Slimpajama627bTrain/chunk1
Sarah Bekambo (9 februari 2001) is een Belgische slam poet-artieste. Biografie Ze groeide op in Heverlee en studeerde Latijn-Moderne Talen aan Don Bosco Haacht Ze wil rechten gaan studeren aan de Harvard universiteit in de Verenigde Staten. Haar voorbeeld hiervoor was naar eigen zeggen Uncle Phil, uit de televisieserie The Fresh Prince of Bel-Air, een gepassioneerde advocaat. Tijdens haar middelbare school begon ze met klassieke gitaar aan het Conservatorium. Hiernaast speelde ze ook toneel. In haar jeugd had ze last van stotteren, maar lessen dictie en voordracht hielpen haar dit probleem te verhelpen. Via de Leuvense organisatie Urban Woorden ontdekte ze slam poetry. Met Urban Woorden hoste ze onder neer het Colora Festival in 2017. Ze werkte ook mee aan Seniorenslam', een project dat senioren in contact brengt met jongeren via slam poetry. Voor Bekambo zelf is slam poetry een manier om te communiceren wat het betekent om zwart te zijn in België. In 2018 speelde ze mee in de voorstelling Paradise Now (1968-2018) van de choreograaf Michiel Vandevelde. In 2019 deed ze mee aan het televisieprogramma 100 dagen op de zender Eén. In het programma werden tien 18-jarigen die in het laatste jaar van de middelbare school zaten gevolgd. Naar eigen zeggen deed ze mee aan het programma om door middel van haar eigen engagement te laten zien dat haar generatie niet lui of doelloos is, maar wel degelijk actie durft te nemen. In het programma en interviews daarbuiten liet ze zich erg kritisch uit over het middelbare schoolsysteem in België. Ze is ook lid van Kabinet J, een project van de stad Leuven om jongeren een spreekbuis te geven en zo mee verandering te bewerkstelligen. Sinds het seizoen 2020/21 is ze junior-programmator bij deSingel in Antwerpen. Vlaams dichter
RedPajamaWikipedia_-2090896012339088621
Slimpajama627bTrain/chunk1
Updated)Batang Kali Landslide: Death toll rises to 24, NADMA releases names of 6 who died in the tragedy Updated with number death toll in landslide up at 24. PUTRAJAYA, Dec 17 – The National Disaster Management Agency (NADMA) has released a list of names of those who died in the Batang Kali landslide as well as those who had been injured. A total of 24 people have died in the tragedy with two more bodies found today. The list, prepared by the Health Ministry, also indicates those who are currently undergoing treatment in the hospital and those who have been discharged. The first six names in the list are from a total of 21 fatalities recorded yesterday. Five of them were women while one victim was a nine-year old boy. The six had been identified by a family member or through finger printing. Other methods of identification are being carried out on the remaining victims. Another eight names in the list are those who had been injured and treated in hospital. The following is the list as published by NADMA in its Twitter. Meanwhile, two other bodies were found during the second day of search and rescue mission at the landslide site today. While hope is diminishing for the remaining who are missing, the SAR is ongoing. Anwar's unity govt deal will ensure political stability – Kit Siang Temporary moratorium on land clearing, deforestation will help with long term plans – Naturalist
RedPajamaCommonCrawl_2312029116936688171
Slimpajama627bTrain/chunk1
Die Federação Santomense de Basquetebol (FSBB) ist der nationale Dachverband für Basketball der afrikanischen Inselrepublik São Tomé und Príncipe. Sie hat ihren Sitz im Bairro Quinto de San Antonio in der Hauptstadt São Tomé. Der Verband gründete sich nach der 1975 erklärten Unabhängigkeit des Landes von Portugal. 1983 wurde die FSBB vom Weltverband Fédération Internationale de Basketball (FIBA) aufgenommen. Die FSBB ist Mitglied im Comité Olímpico de São Tomé e Príncipe, dem sãotomesischen Nationalen Olympischen Komitee. Die Auswahlen der FSBB konnten sich bisher weder für Olympische Spiele noch für Weltmeisterschaften oder die Afrikameisterschaft qualifizieren (Stand 2015). An den Jogos da Lusofonia 2009, den 2009 in Lissabon stattgefundenen zweiten Spielen der portugiesischsprachigen Welt, konnte die FSBB-Auswahl nur auf Grund finanzieller und logistischer Hilfe von Stiftungen und politischen Institutionen aus São Tomé und Príncipe und Portugal teilnehmen. Ein Medaillengewinn gelang ihr dabei nicht. Weblinks Die Federação Santomense de Basquetebol auf der Website des Weltverbands FIBA Einzelnachweise Sao Tome Sao Tome Basquetebol Água Grande
RedPajamaWikipedia_6004151986537546519
Slimpajama627bTrain/chunk1
Q: Problem using hat in square brackets [^] in TFDQuery "like" pattern I have MS Access 2016 table and running TFDQuery in Delphi 10.3. Field1 values are: aac, abc, acc, a c, azc, ac, azzc I run query: Select * from Table1 WHERE Field1 like 'a[^a-c]c' Referring to regex match any single character (one character only), I should get: "a c, azc" but I am getting "aac, abc, acc" Please help to correct the script. A: To match a negative character set using the like operator in MS Access, you should use the exclamation mark, per the documentation, e.g.: select * from Table1 where Field1 like 'a[!a-c]c' Your current code is matching the characters ^,a,b,c surrounded by the characters a & c, hence explaining the results you are currently receiving. Per the comments below by @TLama, you'll also need to escape the exclamation mark, e.g.: select * from Table1 where Field1 like 'a[!!a-c]c' A: The correct code is: Select * from Table1 where Field1 like 'a[!!a-c]c'
RedPajamaStackExchange_6173578768126028984
Slimpajama627bTrain/chunk1
Southwest Metal Products is located in Windsor, Ontario convenient to all North American Customers. Southwest Metal produces parts by cold forging carbon and alloy steel. Forgings produced range up to 4" diameter maximum and 16" long. Part volumes range from a minimum of 5,000 pieces per year to over 500,000 pieces per year. Parts are cold forged on our presses ranging from 60 to 800 ton capacity. Our products include Cold forging of axles, bits, clutch hubs, gears, pins, pinions, step and intermediate shafts, and sleeves. Manufacturer of Cold forging of axles, bits, clutch hubs, gears, pins, pinions, step and intermediate shafts, and sleeves Products.
RedPajamaC4_9191818992818773623
Slimpajama627bTrain/chunk1
THE STORY: This place witnessed the first bikinis, Johnny Weissmuller's olympic dives… For sixty years, Molitor was Paris's most legendary pool. Closed in 1989 and then abandoned, it has since become a favorite canvas amongst street artists. After three years of renovation, the Molitor pool is back in action, this time around as a resort with a festive rooftop terrace, an impressive spa, two swimming pools (a spectacular outdoor one, and another indoor one) and 124 Art Deco hotel rooms with views of the outdoor pool (starting at €310). A great place for the athletic crowd, all those who enjoy a good staycation and lovers of gentrified street art on display in the common areas and the lobby, where a Rolls Royce that's been tagged by JonOne acts as the centerpiece. TOILETRIES: Clarins shampoo, conditioner, body wash and body lotion. BREAKFAST: Continental buffet at €28, with hot drinks, breads, fruit juice, eggs, crêpes, pancakes, choice of cereals, smoothies, muesli with soya milk. "Affaires" breakfast at €18. MINI-BAR: Stocked with sodas, Alain Milliat fruit juices, white wine, as well as a courtesy platter filled with teas and Nespresso coffee. Two bottles of flat and mineral water are provided free of charge. LITTLE LUXURY: The magnificent summer pool, 46 meters long, and heated to 28°C all year round.
RedPajamaC4_5162315870040842838
Slimpajama627bTrain/chunk1
Graham: Canceling R. Kelly, but now what? R. Kelly is the latest celeb to be cast aside by the public. So what happens to him, and others, now? Graham: Canceling R. Kelly, but now what? R. Kelly is the latest celeb to be cast aside by the public. So what happens to him, and others, now? Check out this story on detroitnews.com: https://www.detroitnews.com/story/entertainment/2019/01/11/graham-canceling-r-kelly-but-now-what/2539958002/ Adam Graham, The Detroit News Published 6:14 p.m. ET Jan. 11, 2019 | Updated 9:56 p.m. ET Jan. 11, 2019 R. Kelly (Photo: Frank Micelotta/Invision/AP file) Bye-bye, R. Kelly. Kells, the R&B superstar whose name has long been synonymous with allegations of sexual misconduct, finally met his match this week with the Lifetime series "Surviving R. Kelly." The six-part docuseries, which dove extensively into Kells' troubling sexual past, represented a public tipping point and the "Bump N' Grind" singer has at long last been given a one-way ticket to Cancellation Island, where he joins Kevin Spacey, Matt Lauer, Louis C.K., Harvey Weinstein, Charlie Rose and other entertainers, politicians, newsmen and artists who have been swept up in the #MeToo movement. Bon voyage, Robert, and don't bother sending a postcard. The question is, what do we do with him — and the rest of them — now? I ask because I don't know the answer. And it doesn't seem like we've yet figured out what we're supposed to do with these people, or how they're expected to carry on going forward. To be clear: I am not saying they are victims. They made their beds. But now that they've been cast aside, what now, both for us and for them? One school of thought is they should be banished forever. They made their money, more money than most of us will ever see, so it's on them to budget wisely and live the rest of their existence in exile, away from the public eye. And let's kill the "Ignition" remix off those party playlists while we're at it. Another mindset is we shouldn't be worrying about them at all, we should be paying attention to the victims of these incidents, and creating environments where these incidents no longer occur. That is the type of long-term change we're just beginning to enact, and the effects will be felt for years as we feel out and adapt to this new reality. What hasn't been decided is the comeback arc, perhaps because it's too early, or perhaps because we haven't yet seen any good examples from this wave of offenders of how it can be done. As Louis C.K. has proven, time does not heal all wounds, or at least not enough time has elapsed between his transgressions and his attempt to slowly re-enter the American consciousness. As Louis C.K. has also proven, the best way to re-enter the American consciousness is probably not by making fun of the Parkland High School shooting survivors. It's a routine he probably could have dressed up and gotten away with when he was one of comedy's golden boys, but not now. So, what now? Should he clean up his act, or is he supposed to go away for good? R. Kelly, who has long trafficked in sexually explicit songs (see "Poetic Sex," "Sextime," "Crazy Sex," "Sex Planet," "Good Sex," "Sex Weed," "(Sex) Love is What We Makin'," "The Greatest Sex," "Sex Me (Part I)/ Sex Me (Part II)" and "I Like the Crotch on You," all real song titles), has never toned down, and has remained defiant in the face of mounting public backlash. Now that the backlash is at an all-time high, will he continue to tour, and can he continue to release albums such as 2013's "Black Panties?" R. Kelly has never apologized for his acts. Others have, with varying degrees of eloquence and effectiveness. Those apologies usually include passages about "working" on oneself to better understand the underlying issues that caused such behavior, or reaching out to communities hurt by the acts and working to repair the wounds. Many ring false. We saw a version of that with Kevin Hart and his recent Oscars flub. Hart came under fire after he was announced as host of this year's Academy Awards and questions about homophobic jokes he had made in the past came to light. Hart said he had apologized for those remarks in the past, but those apologies proved difficult to uncover. Hart seemed perturbed by the whole thing and he threw up his hands and took himself out of the running as Oscars host. There was an actual apology issued in there somewhere, but it was lost in the PR car wreck. The entire matter was handled very clumsily, and could have gone a different way had Hart made a sincere apology, been more contrite in his comments and offered a bridge to the LGBTQ community. Now the Oscars are set to unfold without a host, which is fitting in a year where the spotlight has grown so bright on performers and the misdeeds in their pasts that everyone is scrambling to avoid the glare. It's telling that the most heartfelt apology to come from this era was made by a woman, Lady Gaga. In a statement this week, Gaga apologized for her 2013 collaboration with R. Kelly, "Do What U Want," explaining at the time of the recording she hadn't processed her own experiences with sexual assault, which led to her "twisted" thinking and "poor judgment." She acted swiftly, removing the song from streaming services, and she offered her support to Kelly's victims. It was straightforward and honest. And for anyone looking for advice on how to bounce back from a scandal and move forward, it was a shining example of how it can be done the right way. So, who's next? agraham@detroitnews.com @grahamorama Read or Share this story: https://www.detroitnews.com/story/entertainment/2019/01/11/graham-canceling-r-kelly-but-now-what/2539958002/ Bankole: Detroit police commission is not the Kremlin Opinion: U.S. dangerously dependent on Chinese drugs Bay Harbor celebrates 25th anniversary Opinion: Genetically engineered foods solve nutritional challenges Nolan: Here's hoping Amash can topple windmills Opinion: Michigan's workforce development is a lemon
RedPajamaCommonCrawl_1279466988703610566
Slimpajama627bTrain/chunk1
Joe Biden Taps Former Presidential Rival Pete Buttigieg for Transportation Secretary Plus: Trump slashes showerhead regulations, Ross Ulbricht might get a pardon, Tom Cruise is the latest COVID scold, and more... Christian Britschgi | 12.16.2020 9:30 AM (ELIZABETH FRANTZ/REUTERS/Newscom) President-elect Joe Biden is continuing his business-as-usual approach to filling out senior posts in his administration by selecting Pete Buttigieg—former mayor of South Bend, Indiana, and presidential contender—for his secretary of transportation. Mayor @PeteButtigieg is a leader, patriot, and problem-solver. He speaks to the best of who we are as a nation. I am nominating him for Secretary of Transportation because he's equipped to take on the challenges at the intersection of jobs, infrastructure, equity, and climate. — Joe Biden (@JoeBiden) December 16, 2020 Innovation in transportation helped build my hometown, and it propels our country. Now is the time to build back better through modern and sustainable infrastructure that creates millions of good-paying union jobs, revitalizes communities, and empowers all Americans to thrive. — Pete Buttigieg (@PeteButtigieg) December 16, 2020 As a former mayor of a midsized Midwestern town and a consultant before that, Buttigieg is hardly a career transportation wonk. His selection comes as a surprise to some observers who had expected or hoped Biden would pick either a public transportation veteran or a large city mayor well-versed in urban transportation issues. Buttigieg's resume, however, isn't too out of step with past officials. President Barak Obama's picks to lead the Department of Transportation (DOT) included a former mayor (Anthony Foxx) and a former state legislator (Ray LaHood). Elaine Chao, Trump's transportation secretary, is probably the most experienced of recent DOT heads, having served as a deputy secretary of transportation in the George H.W. Bush administration. Obviously, politics is playing a role in Buttigieg's selection. The New York Times reports that Biden and Buttigieg bonded on the campaign trail and that Biden was set on finding some role for the former mayor in his administration. As to his actual record, Buttigieg's transportation legacy seems to rest on his $25 million "Smart Streets" program that added bike lanes and trees to South Bend's downtown. Streetsblog reports that Buttigieg's transportation plank for his 2020 presidential bid would massively boost spending on highways, public transportation, and intercity rail, none of which is great from a small government perspective. On the positive side, he endorsed the idea of replacing the federal gas tax with a mileage tax, which would charge motorists for every mile they drive as opposed to how much gas they buy. That idea, which has been endorsed by Trump's Council of Economic Advisers, would shore up highway funding and get it closer to a user-fee model beloved by free marketers. Josh Barro over at Business Insider suggests that Buttigieg's interest in foreign affairs might be valuable in his coming role as transportation secretary as he'll be able to ask other countries how they manage to complete transportation projects for way less money. Elsewhere, Biden plans to nominate former Michigan Gov. Jennifer M. Granholm—who was apparently helpful in taking money from taxpayers and giving it to automakers—as his secretary of energy. She's since become an evangelist for renewable energy. The New York Times reports that Biden's decision on who he'll pick to head the Environmental Protection Agency is being held up after "environmental justice" groups issued a letter condemning his initial choice—career environmental regulator Mary D. Nichols—over her record on "environmental racism." Biden is now reportedly searching for a more diverse candidate like Los Angeles Mayor Eric Garcetti. Ongoing challenges to the results of the 2020 presidential election have not stopped outgoing President Donald Trump from adding to his deregulatory legacy. On Tuesday, Trump's Department of Energy issued a new rule that loosens restrictions on how much water showerheads can emit. The Washington Examiner has the details: The Energy Department's move doesn't change the level of the water conservation standards set back in 1992, but it alters a definition set by the Obama administration requiring the entire showerhead fixture to meet a limit of 2.5 gallons of water per minute. The Trump administration's definition will allow each showerhead nozzle, even if there are several in a single fixture, to meet the 2.5 gallons per minute standard. Though this is just a small win, it's also a reminder of just how intrusive federal regulations have become over the years. Trump is reportedly weighing a pardon for Ross Ulbricht, who received two life sentences for his role in founding the Silk Road, an online drug marketplace. Reports the Daily Beast: According to three people familiar with the matter, the White House counsel's office has had documents related to Ulbricht's case under review, and Trump was recently made aware of the situation and the pleas of the Silk Road founder's allies. Two of these sources say the president has at times privately expressed some sympathy for Ulbricht's situation and has been considering his name, among others, for his next round of commutations and pardons before the Jan. 20 inauguration of his 2020 Democratic opponent. The United Nations has issued a new report finding that people are the cause of most of the world's problems. Thanks, guys. Trump is reportedly considering the appointment of a special prosecutor to investigate Hunter Biden's business dealings. Showerheads aside, a new essay from the Cato Institute argues Trump will leave little lasting effect on federal regulatory policy. Los Angeles is suing the operators of an underground night club for throwing some bitchin' parties during coronavirus times. The latest COVID scold? Tom Cruise Politicians in Washington, D.C., have passed a bill requiring bars and restaurants to offer to hire back the staff they were forced to let go because of lockdowns imposed by D.C. politicians. NEXT: Brickbat: That's Cold Christian Britschgi is an associate editor at Reason. Reason RoundupPete ButtigiegJoe BidenDepartment of TransportationDepartment of EnergyRoss Ulbricht
RedPajamaCommonCrawl_-7213869422625009213
Slimpajama627bTrain/chunk1
After getting off to a late start Karen and I arrived at Lock and Dam 21 at 3:00 on the afternoon of January 3, 2015 to look for the adult Ivory Gull found a couple days earlier by local birder Jason Mullins. I didn't need Ivory Gull for anything, having seen the 1991/92 Chicago bird and several others in Iowa and Wisconsin, but Karen needed it for a lifer, so we decided to make the long trek to Quincy, Illinois to look for the bird after reading that it was seen that morning. I was also reluctant to go because of the inclement weather and forecast poor road conditions, but the only precipitation we encountered was liquid, so the roads were just wet and not icy as I had feared. At about 4:00 a fellow from Kansas spotted the bird standing on a small ice floe about a mile up river and probably in Missouri waters from where we were at the lock and dam. We could tell it was little Pagophila but we wanted better looks so we got in our cars and raced north. Just south of the bridge we saw a group of birders with scopes standing in a parking lot next to the river and when we got closer one of them pointed out over the river, so we knew they had the Ivory Gull. After some fumbling around we were able to get on the bird with our scopes, though it was still a long way off. We watched it preen and bath and nearly become a meal for a couple Bald Eagles (there are a lot of Bald Eagles around Quincy). We didn't have the same mouth watering looks that others had but we saw the bird reasonably well and Karen got her lifer and I got my second Illinois Ivory Gull. This entry was posted in Non-Montrose Birding, Rare Birds, Winter Bird Reports and tagged Gulls, Ivory Gull on January 9, 2015 by rhughes. The online photo quizzes I wrote for the Illinois Ornithological Society are now up on my birding website, The Orniphile: IOS Photo Quizzes. The quizzes ran from 2003 to 2010. Also, The Birds of Illinois series is up as well. This is a three part list of the birds that have been officially recorded in Illinois. Status information is also provided. This entry was posted in Bird Identification, Ornithology on January 7, 2015 by rhughes.
RedPajamaC4_1711032992774970176
Slimpajama627bTrain/chunk1
Do you work for Dealer Bytes - SEGA Systems, LLC? Claim your company page now! SEGA List provides management of individual placed ads at sites such as CraigsList and BackPage.com to free up dealership personnel to concentrate on selling cars and working the leads from these classified venues. With active hands on management from US based employees we work to insure your ads stay live and work around flagging and ghosting issues most dealerships experience. Do you work for Dealer Bytes - SEGA Systems, LLC? Claim your page now! Pros: A good way to post to Craigslist. Customer Support is decent. Cons: The software has some bugs from time to time when you try to run a phone verification. Pros: Second best site traffic for vehicle buyers only. Cons: Price. They are adding features to a site we pay to advertise on that we did not ask for such as dealer reviews. Would you buy a newspaper ad and let anybody including other dealers post reviews on the ad you paid for? Pros: It is convenient and many use it. Pros: Simply an awful experience - directly from the owner of the company - Paul Rushing. We began using the product/service in during the 1st week of this year (2010) - The drop down menu choices provided below do not allow for a START DATE within 2010. We received notice that our accounts were 60 days past due - after 30 days of service. When notified of this, Sega systems corrected the date to reflect 45 days. We were then notified that we must pay in advance & that our own standard terms of NET30 was not acceptable, per their requirements. Their final response came in the forms of angry and sarcastic emails. All of this after ~30 days of using their service. My recommendation: Do not use this vendor. This review is from a dealer that did not pay for our services as agreed. Eric Miltch told me that that would never be an issues. Out of three locations only one paid their bills.
RedPajamaC4_-2447141621300381712
Slimpajama627bTrain/chunk1
One charmingly old-fashioned aspect of every souk in Oman is the lack of advertising. Visit any market in the country and you'll see lines of similar little shops all boasting exactly the same, resolutely factual, signs in Arabic, with their English translations below. "Coffee Shop" is probably the most common, closely followed by "Gents Tailoring" (with "Ladies Tailoring" not far behind), while other signs are similarly matter of fact – "Sale & Repairing of Dish & Television" for a TV shop, for instance, or "Sale of Fresh Mutton & Frozen". The accuracy of English translations is consistently high, and mistakes rare, although when things do go wrong they can do so spectacularly, such as the shop in Ibra souk advertising "Asle of Freah Ghigken" (they mean "Sale of Fresh Chicken"). Occasionally bursts of unintentional linguistic whimsy also catch the eye, notably the local outlet advertising "Sale of Tobacco, Smoke & Derivatives" – a pleasantly fanciful way of saying they sell cigarettes.
RedPajamaC4_-7247147791144221022
Slimpajama627bTrain/chunk1
HacksHow TosMobile How To Install The iOS 14 Beta On Your iPhone Since Apple announced the forthcoming of the iOS 14, and the cool features pre-loaded on it, quite a number of users are excited about the new features, and desire to run the operating system on their device. What is a Beta? A Beta is a Pre-launched version of a software. This version is used to test the stability and work-ability of a software before it is released officially for public usage. While the iOS 14 is billed to be released later in the year, the Beta version is released for people to test the app, and give feed-backs about what needs to be tweaked for stability to be arrived at. Virtually every app and software go through beta phase before getting an official public release. NOTE: Beta versions are not stable, and are merely for test purposes, so users should understand the risks that are attached to them. Apple usually announces the release of the next version of their operating system in the middle of the year. However, the update won't be officially launched till about three- or four-months' time. If you are looking to use the OS without having to wait for the official version to be released later in the year, then you can test the iOS 14 Beta version. Apple already launched the iOS 14 Beta for developers, and also, the tech giant launched iOS 14 public Beta version for everyone. You can choose to install any of the two available Beta versions, but if you are not a developer, I would advice you stick to the public version. Without further ado, let us get into the How-to How to install iOS 14 Beta for the public Before starting the install process, it is important that you back up your data, so that you can restore your device back to normal, if something goes south. Go to Apple's Beta page, and register your Apple ID. Login to the Beta software program. Enroll your device. If you have signed up for an earlier version's beta program, you would need to uninstall the profile, and re-enroll for the new Beta program. Visit the Apple Beta profile on the device you want to install the Beta OS on. Download the configuration profile. Once the configuration profile is downloaded, the option to install will show in the settings. Tap on the option, and follow the installation process. After installing the configuration profile, the option to download the Beta version will be made available in the Settings app. Go to Settings > General > Software Update. How to install iOS 14 Beta for Developers The Developer Beta option is usually released before the Public Beta. This is for developers to develop and test their apps against the features on the new operating system. Enroll as an Apple developer. On your browser, go to developer.apple.com and log in using your Apple ID. Go to downloads, scroll down to iOS 14 Beta, and tap install profile. Open the Settings app. Tap the downloaded profile at the top of the main screen, or go to General > Profile > iOS 14 Beta profile. Tap install iOS 14 Beta. Go to Settings > General > Software Update. Download and install the iOS 14 Beta. Dasall! If the steps are followed properly, and everything goes well, your iPhone should be running on iOS 14 Beta, after all the steps. Beta iOS iOS 14 iPhone Jide Taiwo When I'm not reading about tech, I'm writing about it, or thinking about the next weird food combinations to try. I do all these with my headphones plugged in, and a sticky note on my computer with the words: "The galaxy needs saving, Star Lord." Launching your Startup? What you need to know. Facebook offers $40k for JS vulnerabilities in bug bounty program. HacksHow TosRandom How to Develop a competitive advantage Building a competitive advantage is a crucial element of a successful business strategy. It involves identifying unique strengths or capabilities that give… MobileNewsNow you knowRandom Photography Just Got Better With The New GCAM 8.7 For Android Smartphones Now in 2023, about 86.41% of the world's population own a smartphone, which translates to 6.92 Billion people. This is to state… Big StoryMobileNews Samsung to Offer Higher Quality Photo Uploads on Instagram, Snapchat, TikTok Samsung has reportedly partnered with popular social media platforms Instagram, Snapchat, and TikTok in order to improve the quality of pictures taken…
RedPajamaCommonCrawl_-5271202584413938719
Slimpajama627bTrain/chunk1
News > World Traumatized Children Drugged Without Consent at US Immigrant Shelters: Report Cohen who works with advocacy groups at shelters on the border said the immigrant teenagers talk about pressure tactics used to induce them to take the pill. | Photo: Reuters Published 24 July 2018 A separate ongoing lawsuit in the same court against the Department of Justice has been filed for inappropriately medicating immigrant minors as young as 11 years old. Authorities at the United States immigrant shelters have been drugging teenagers in distress without their consent, an investigation by ProPublica has revealed. Trump Takes Millions From Health Programs to Fund Family Separation Policy Last month, lawyers for five immigrant children under the age of 18 filed a class-action lawsuit after they were over-medicated without consent in Los Angeles' Federal Court against Alex Azar, the head of the US Health & Human Services, HHS, and Scott Lloyd, director of the Office of the Refugee Settlement (ORR). ProPublica's investigative report noted, "Emotional distress and mental health issues are prevalent among these children, sometimes a result of traumatic experiences in their home countries, at other times triggered by being separated from parents at the border, or by fear that they will never be released from ORR facilities." "Under most states' laws, before a child is medicated, a parent, guardian, or authority acting in the place of the parent — such as a court-appointed guardian ad litem — must be consulted and give informed consent," the ProPublica report noted. In the shelters, these children are left alone, with no parental guidance or information. And the shelter staff often coax the children to take these medications, without seeking court approval. "These medications do not come cost-free to children with growing brains and growing bodies — psychotropic medications have a substantial cost to a child's present and future," Dr. Amy Cohen, a psychiatrist who has been volunteering in border shelters told the ProPublica. "A person whose sole concern is, what is in the best interest of a child — a parent or a guardian ad litem — that role is desperately needed now." Former shelter employees, doctors, and lawyers working for advocacy groups have told the investigative site the shelters lack sufficient counselors to deal with children's emotional needs. "16-year-old Daniela became suicidal after being separated from an older sister who accompanied her from Honduras to the United States border. She has been given Prozac, Abilify, Clonidine, Risperdal, Seroquel and Zyprexa in various shelters as staff have been unable to settle on a diagnosis, detecting at different times bipolar disorder, generalized anxiety disorder, PTSD, and major depressive disorder. Her older sister was released from custody and allowed to stay in the United States, but wasn't consulted about whether Daniela should take those medications, which have side effects including weight gain, uncontrolled spasms, and increased suicide risk," the ProPublica statement noted. The HHS that also includes ORR, however, "declined to comment when asked how it handles informed consent and how many children in its shelters were on psychotropic medications. When asked about its mental health policies, HHS sent a link to its policy guide, which says, without further elaboration, that shelters must provide "appropriate mental health interventions when necessary," according to ProPublica. "ORR doesn't "have the best interest of these children in mind. There has to be court oversight," Holly Cooper, co-director of the Immigration Law Clinic at the University of California, Davis, told ProPublica. Cohen who works with advocacy groups at shelters on the border said the immigrant teenagers talk about pressure tactics used to induce them to take the pill. One teenage girl told Cohen that she didn't want to take anti-depressants, but since she was told that she'd lose shelter privileges like going to a nearby park, she was forced to take them. A teenage boy also told Cohen about the grim conditions under which he was forced to take shelter-prescribed pills. "He wasn't told what symptoms were being treated or what side effects he should expect," said Cohen. Instead, he was informed that if he didn't take his pills, "he couldn't get out of there," she said, per ProPublica. A separate ongoing lawsuit in the same court against the Department of Justice has been filed for inappropriately medicating immigrant minors as young as 11 years old, violating standards established in a 1997 legal settlement. The Department of Health and Human Services' Office of Refugee Resettlement has nearly 12,000 undocumented minors in custody. A majority of them crossed the border unaccompanied, while over 2,500 were separated from their parents since Trump's "zero tolerance" policy came in effect from April to June. United States Refugee & immigrant rights Central America & Mexico Equality & human rights Children's rights by teleSUR/ms-CM Report: Latin America Deadliest Place for Environmentalists Argentina: Legislators Demand Review of Security Reforms Rising Levels of Acidity Causing Fish to Lose Their Sense of Sm Brazil: 64 Percent of Populace Work Side Gigs to Support Income
RedPajamaCommonCrawl_-7080670267414382662
Slimpajama627bTrain/chunk1
Fishermen begin to look for these fish along the bayside of the Eastern Shore. TheCabbage Patch, near the Concrete Ships, is the prime area. Bouy 13, near the high rise of the Chesapeake Bay Bridge Tunnel, has been productive as has the area around 36A, off of Cape Charles. When the fish are running, you can find the fleet of anchored boats. These fish are not great fighters, but they can weighover 100 pounds so fairly heavy tackle is in order. 30 lb class is about right. These fish can usually be fought from anchor but if you are using light tackle, having a float attached to your anchor line is a good precaution in case you have to chase a fish.
RedPajamaC4_7450385374913927711
Slimpajama627bTrain/chunk1
Sundays are made for browsing through the World Wide Web. Here are a few of favorites from The Line, starting with the petrified wood block stool. This post is dedicated to interior decor and interiors that I am recently hooked too. Minimalistic contemporary design to add to your Home.
RedPajamaC4_7644309921753416492
Slimpajama627bTrain/chunk1
For the ?rst time 4 workshops were held along with the eighth Object-Oriented details structures convention, OOIS 2002, to inspire - teraction among researchers and practitioners. Workshop issues are, after all, inline with the conference's scienti?c scope and supply a discussion board for teams of researchers and practitioners to fulfill jointly extra heavily and to switch reviews and complicated principles, and to percentage initial effects on targeted matters in an environment that fosters interplay and challenge fixing. The convention hosted 4 one-day workshops. The 4 chosen workshops have been absolutely within the spirit of a workshop consultation hosted by way of a chief convention. certainly, OOIS bargains with the entire themes relating to using object-oriented concepts for the improvement of data platforms. The 4 workshops are very speci?c and give a contribution to enlarging the spectrum of the extra normal themes taken care of basically convention. The ?rst workshop fascinated with a truly speci?c and key c- cept of object-oriented improvement, the specialization/generalization hierarchy. the second explored using "non-traditional" methods (at the sting of object-oriented ideas, corresponding to facets, AI, etc.) to enhance reuse. The 3rd workshop handled optimization in Web-based info structures. And ?nally the fourth workshop investigated matters regarding model-driven software program development. This quantity of Lecture Notes in computing device technological know-how includes the lawsuits of the rd three operating convention on part Deployment (CD 2005), which came about from 28 to 29, November 2005 in Grenoble, France, and co-located with Middleware 2005. CD 2005 is the 3rd foreign convention within the sequence, the 1st being held in Berlin and Edinburgh in 2002 and 2004, respectively. This quantity includes the papers offered on the twelfth SDL discussion board, Grimstad, Norway. The SDL discussion board used to be ? rst held in 1982, after which each years from 1985. firstly the discussion board was once involved purely with the Speci? cation and outline Language that was once ? rst standardized within the 1976 Orange ebook of the Inter- tional Telecommunication Union (ITU). Motionanalysisisacentralproblemincomputervision,andthepasttwodecades have noticeable very important advances during this ? eld. even though, visible movement remains to be usually thought of on a pixel-by-pixel foundation, although this ignores the truth that photo areas such as a unmarried item frequently endure movement that's hugely correlated. The eighth overseas convention on thought and purposes of Satis? skill Testing(SAT2005)providedaninternationalforumforthemostrecentresearch at the satis? ablity challenge (SAT). SAT is the vintage challenge of identifying even if a propositional formulation has a pleasing fact task. It used to be the ? Of the International Conference on Object Oriented Information Systems (OOIS'94). Ed. by Patel, Sun and Patel, Spring Verlag, pag. 166-180. Meseguer, J. (1993), Solving the Inheritance Anomaly in Concurrent ObjectOriented Programming, in: Proc. of the European Conference on Object Oriented Programming (ECOOP'93), Springer Verlag. , Massart, D. and Yakusheva, T. (1994), Materialization: a powerful and ubiquitous abstraction pattern, in: Proc. of the International Conference on Very Large Databases (VLDB'94). These concepts are represented in English with just a verb: "to be". Although we have the three concepts in our minds, conceptual models, as English Hierarchies in Object Oriented Conceptual Modeling 31 language, do not provide us a way to distinguish among them. However, there are some languages that distinguish explicitly among some of these concepts. So, for example, the verb "to be" can be translated to the Spanish language in two different ways: "ser" (that refers to the IS-A concept) and "estar" (that means to be in a state). To make this possible, conceptual models have improved their expressiveness through new primitives, which are closer to the real world. The specialisation/generalisation hierarchy (from now on, taxonomy or taxonomic hierarchy) is generally considered to be one of the most important structures of reasoning and knowledge representation. Every object-oriented conceptual model supports taxonomic hierarchies as a natural way of representing data. However, the name and meaning can vary in different models: specialisation inheritance [4, 12], classification , IS-A generalisation etc.
RedPajamaC4_1925112147011116938
Slimpajama627bTrain/chunk1
Ganghwa may refer to: Ganghwa County, administrative region of South Korea Ganghwa Island, island in South Korea Battle of Ganghwa The Japanese Battle of Ganghwa Treaty of Ganghwa See also Gochang, Hwasun and Ganghwa Dolmen Sites, South Korea
RedPajamaWikipedia_146177891744821175
Slimpajama627bTrain/chunk1
Los Estrambóticos es un grupo de rock y ska, procedente de México. Historia Los Estrambóticos son una banda de ska y rock formada en 1992 en la ciudad de México por los músicos Arturo Ruelas, Luis César Aguirre y David Sánchez. Durante su trayectoria, Los Estrambóticos se han mantenido como una de las bandas más activas e importantes para la escena nacional del ska en México debido a su constante innovación, a lo largo de estos 30 años los estrambóticos son una banda de las más queridas por la gente en torno al ska y rock y han participado en grandes festivales como el Vive latino etc. también han conseguido algunos reconocimientos como el premio del demo de oro en 1992 . Miembros Arturo "Pinocho" Ruelas - Voz Adrián Vallarta - Batería David "Chadou" Sánchez - Guitarra Gabriel Bronfman - Bajo César "Chi Ch" Rojas - Teclado Pablo Coello - Saxofón Helios Escalona - Trombón Ángel Víquez - Trompeta Cesar Bautista - Trompeta Irving Licona - Percusión Discografía Álbumes 1992 - Los estrambóticos ("El blue demo", edición propia) 1997 - Piel de banqueta (Discos Manicomio - Polygram - Universal) 1999 - Objeto extraviado (Discos Manicomio) 2002 - Sueños de anoche (Gala Music México) 2004 - Camino clandestino (Universal Music) 2009 - Aqui y ahora (Resiste Records) 2010 - Puro macanazo (Resiste Records) 2012 - Lagrimas y risas (Resiste Records) 2015 - Lucha y resiste 1 2019 - Basado en hechos reales (Primera parte) 2020 - Basado en hechos reales (segunda parte) 2020 - Lucha y resiste 2 Referencias Enlaces externos Los Estrambóticos en Allmusic Grupos de rock de México Grupos de rock de la Ciudad de México Grupos de ska de México Grupos de música formados en 1992
RedPajamaWikipedia_7592268051679419382
Slimpajama627bTrain/chunk1
Hayley Nejman To Lead Acrobatics & Tumbling Program Jul 31, 2019 by Staff Reports The Chowan Athletic Department and Vice President of Athletics, Patrick Mashuda, welcome Hayley Nejman as the first-ever head coach of Acrobatics & Tumbling at Chowan. Hayley comes to Chowan following a season at Urbana University as Assistant Acrobatics & Tumbling Coach in the program's inaugural season. Nejman helped Urbana to a third-place finish at the Mountain East Conference Championship. While in the Urbana area, Nejman was an assistant gymnastics coach at Beavercreek High in Dayton, Ohio. Prior to coaching, Nejman was a four-year member of the Gannon University Acrobatics & Tumbling program from 2014-2018. Nejman was named Gannon's first National Collegiate Acrobatics & Tumbling Associations (NCATA) All-American in 2017. That same season, Hayley would garner ECAC All-Conference honors, ECAC Athlete of the Week, and place third in the Tumbling Trio Heat at NCATA Nationals. Hayley then helped secure an NCATA National Championship in the Inversion Pyramid event in 2018 and would be named ECAC All-Conference Honorable Mention in 2018. While competing as a student-athlete, Hayley helped at the Lakettes and Lakers Gymnastics Academy and Long's School of Dance in Erie, PA. Hayley earned a bachelor's degree in Sports and Exercise Science from Gannon in 2018.
RedPajamaCommonCrawl_8542619878734834478
Slimpajama627bTrain/chunk1
Ford Crossovers 4WD/AWD Gray Ext. Transmission: Automatic Color:Gray Interior Color: Tan Average Vehicle Review: (4.5 reviews) I bought this vehicle for ease of getting in and out. For an older person, like myself, or someone with arthertis or other mobility problem this is perfect. It is a beautiful vehicle and gets really good mileage, especially on the road. Wish I had bought this vehicle long ago. My father told me when I bought my first Ford in 1954 to always by a Ford and I would have no problems. Wish man! Transmission: Automatic Color:Gray Interior Color: Black Average Vehicle Review: (4.271 reviews) Pro - I use about 2 gallons of gasoline a week and I commute 20 miles a day. Pro - The safety features like the rear view camera with warning, side mirror blind spot alerts, land drifting feature are really great. Pro - This car has a lot of elegance on the inside. Con - That trunk is small. It really is not a car for anyone wanting to carry a large amount of items. Con - The tank capacity could be higher. It would be nice to be able to drive a long distance and not have to stop every 400 miles.
RedPajamaC4_-3109145651360895139
Slimpajama627bTrain/chunk1
Here's the next installment in my, "Books Off the Shelf" series. These are some short book reviews on books quite literally off my book shelves—books I've read or listened to. There is a world of books out there. More than anyone could get to in a lifetime. As my favorite mug states so succinctly, "So Many Books, So Little Time". I will attempt to give you an idea on some books you might enjoy or not enjoy quite as much without ruining it with too many spoilers. I'm also giving the books a one to ten rating with ten being amazingly the best (or one of the best) books I have ever read and you need to go home sick to buy and read this book without delay and a one being please don't bother even looking at the cover of this drivel. OK, if you haven't read this you need to order it. I mean now. You can come back to read the rest of the review in a minute, but you need this book in your hands ASAP! Now that your book is ordered or downloading, let's get back to the review. The Way of Kings is the first in the Stormlight Archive series with book 2 Words of Radiance also out and ready for delighted reading. Kaladin is a brilliant young man who has found himself wrongfully bound in slavery. Coming from a fascinating past that toes the line between surgeon and soldier, we get to tag along, living out the agony of injustice while longing for redemptive grace. Kaladin's struggle is so moving, one can't help but cheer (usually only internally) for even the tiniest success. Meanwhile, we get to witness as Shallan battles to save her family, risking everything in a game of intrigue. She does this while wrestling with a past that she has locked away in her subconscious and a gift that may be more powerful than she ever knew. Dalinar, high prince, brother to a murdered king, and stalwart of a nephew struggling with his crown, is having dreams that are more like visions. His reputation and very sanity on the line, Dalinar fights to hold a shattering nation together. Sanderson's mastery of world and magic system building are modeled fantastically in The Way of Kings. Revealing truths at a pace just fast enough to keep you guessing while forcing you to turn page after page, this is a must read—a must must must read. The world is vibrant, so real you should be able buy a ticket to visit. The characters are so authentic you make new friends and enemies at every turn. Go pick up a copy and bump it to the front of your reading queue. You have to read this. Really you have to read all of Sanderson, but start with The Way of Kings! As always, if you have suggestions of books to review, please let me know. If it is Science Fiction or especially Fantasy, there is a good chance it is on my shelf or should be. And if you would like to be the first to hear about other great books and updates on my own writing, along with free giveaways, I would love for you to sign up on the right.
RedPajamaC4_2913120421068684286
Slimpajama627bTrain/chunk1
Student mailboxes are located on the upper level of the University Center, just outside the Mail Center. All students residing in campus housing are assigned a mailbox, with the exception of Cokesbury Court Apartments. Cokesbury residents will receive mail and packages at the apartment complex offices and mailboxes just outside the offices. It is the student's responsibility to obtain their mailbox number and combination from the Mail Center and to empty their mailbox weekly.
RedPajamaC4_6501931600686603881
Slimpajama627bTrain/chunk1
This 50-year-old Syrian grandmother, whose first name is Raqia, fled to Jordan with her son and his wife in 2011. "Here, life is very hard," Raqia recently told the International Rescue Organization. "We're all struggling to cover our basic needs." Raqia's grandson Mohammed (pictured) was born prematurely in Jordan, and at seven months he nearly died of the flu. Raqia sought help from the International Rescue Committee, which paid some of Mohammed's hospital bills. Photo by the International Rescue Committee. Are you looking for ways to support refugees in your community and around the world? Here are four things you can do right now. Call your congressional representatives to tell them you want our borders reopened to refugees—who, by definition, are fleeing for their lives. The International Rescue Committee has made it easy with this link; enter your mailing address to access the names and numbers of your reps and a script to follow during the calls. Make a donation to the International Rescue Committee or to another non-profit that assists and advocates for refugees. Volunteer to welcome and mentor refugees who've recently settled in your community. To connect with a refugee resettlement organization in your state, use this interactive map. Arm yourself with the truth and spread it on social media. For example, you could share this post, which corrects seven common misconceptions about refugees in the United States.
RedPajamaC4_-4868437737633091237
Slimpajama627bTrain/chunk1
Monitor lizards love messy campers and tidy up a great deal of their mess, including scraps of food, faeces and, unfortunately, plastic bags and other inedible debris that smells of food. In many areas they seem aware of the habits of holiday makers, and consistently emerge just minutes after the last tourist bus has departed . Less shy individuals may actively solicit food from people and will even "beg" for food in a dog-like manner.
RedPajamaC4_7706741594415015188
Slimpajama627bTrain/chunk1
Archive for the 'facebook applications' Category Happy Float, Facebook Happy IPO day, Facebook. I'm not an "insider" of any sorts, so I won't be gaining from any of the early Facebook IPO action. I'm on the fence as to whether or not I might try to buy some "FB" shares on the open market through my Schwab account…not because I'm not interested in owning any Facebook stock, but because like a lot of investors, I want it to be a conscious, responsible investment, and one never knows what's going to happen on IPO days. But know this: I'm very bullish on Facebook, both its past and its future. I've never seen an Internet property bring so many people together from so many different places in the world, across economic and social strata, and keep them coming back. If you're as bullish, but not ready to gamble on IPO day, you might give some thought to investing in the Facebook "pick and shovel" plays. Stand back, look at the Facebook ecosystem, and rather than place all your bets on the Facebook IPO "come" line, instead spread some bets across the board and benefit from all the other players who stand to benefit from Facebook's continued growth and adoption around the world. The Zyngas, whose gaming ecosystem helped the Facebook tribe spread around the world. The Dachis Corps and Buddy Medias, which are helping make the Facebook platform work well for marketers (and focusing well beyond the social graph ads that GM announced it would abandon earlier this week). And, to be sure, hundreds of others. Regardless of whether or not you're a Facebook fan, and heaven knows sentiment about them can run to the extremes, if you're a good Western capitalist, you have to be excited. This is the classic American success story, where young kid has great idea, develops that idea in his dorm room and later small house in Silicon Valley, and eventually changes the world. And make no mistake about that: Facebook has forever changed the world. Just ask the folks in Egypt, or Tunisia, or Russia, or any other locale or organization that has benefited from the lower center of gravity Facebook has created that makes organizing in mass quantities as simple as a few clicks. There is a good reason that Facebook is NOT available in China — fear of transparency and open communications. If it were available, China would be a very different place than it is today, and it makes me thankful that the kind of open innovation and entrepreneurialism we have here in the U.S. is still alive and well. And that, in the end, may well be the most important reason for celebrating Facebook's entry into the public markets. Big ideas can still have big impacts, and Silicon Valley (and, more broadly, the United States) is one of those places in the world that you can find the capital, the talent, and the political and regulatory playing field to make those big ideas a reality. Posted in 2012, facebook, facebook applications, globalization, social business, social commerce, social media, social networks, social platforms, software development, wall street Tagged with facebook, ipo, mark zuckerberg, marketing, nasdaq, silicon valley, social media, social networks, venture capital If I Die…Please Leave A Message File this one under the "Things To Do Before I Die" category. If I Die, the new Facebook app for when you're prepared to send the very best -- and the very last. There's a new website where you can leave a message that will only be published after you die. "If I die" is the name of it, and no, I didn't find out about it because someone who was dead left me a message. This is just one of those Web phenomena where you can't decide A) Why didn't I think of that? or B) What WERE they thinking?! Here's how it works: You install the "if I die" Facebook app on Facebook, with all the concordant permissions to use your data (including, presumably, longgg after you're gone). Then, you create a video or text message (I'm thinking video. If you're going to have to deal with me after I'm dead, I want you to see my once living visage live and in the flesh!). Then, you must choose three trustees among your friends, who also presumably will confirm A) That you kicked the bucket and B) Will validate your "if I die" message so it can be made public. But the best part of the Web site was the campaign they ran to get people to sign up for the App. Apparently, the hesitancy wasn't that people were worried about their privacy after they were gone (although it's inevitable Facebook will change their privacy policy AGAIN long after I'm gone). No, it's that nobody wants to believe or think about the fact that someday, when they least expect it, they're going to die. So the campaign used the API of popular location-based services like foursquare and Gowalla to identify still real, living breathing humans when they checked into a place, and then called to the place of the check-in to ask if they could speak to the person who checked in so they could explain that someday they were going to die, and that they really ought to think about leaving a message well in advance of said inevitable demise using this nifty new Facebook app. Wow, who would have thought that the campaign to drive adopters of the app could be any creepier than the app itself?? Is there some kind of new "Do Not Die" list so I can be spared such interruptions when I'm simply trying to get a Double Latte at the Starbucks?!? You can watch the video below to learn more. Me, I'm off to start my death preparations in a more old school manner: making out my 'bucket list!' Posted in facebook, facebook applications, marketing, mobile internet, platform wars Tagged with bucket list, facebook apps, foursquare, gowalla, mortality, turbotodd Office In The Sun That seems to be especially the case for Facebook, which according to Dealbook, has raised $500M in additional funding from Goldman Sachs and Russian investor Digital Sky Technologies, a sum which would now value Facebook at $50 billion. Of course, if it's true that Facebook is about to move into Sun Microsystems' old 150,000 square foot office space in Palo Alto, Zuckerberg's going to need as much new scratch as he can get to remodel the place and bring back that new IPO smell once so prevalent in Silicon Valley, but which has been eroded these past eight years with the taxing shadow of Sarbanes-Oxley. What Zuckerberg won't need is any overhauling of the privacy mantra still haunting the hallways of the old Sun. Remember, it was former Sun CEO Scott McNealy who informed us "You have zero privacy. Get over it." It seems, perhaps, he was right. And prescient, considering he said that way back in the Jurassic age of the Dot Com boom. I wonder if his soothsaying also envisioned a 26 year-old kid taking over his campus someday?? Nahh, probably not. While the Facebookers have been busy raising their valuation, Bloomberg is reporting that tech takeovers could pick up bigtime this year as firms like Intel, HP, and yes, even Big Blue, set off in a race to "harness surging demand for cloud computing and security services." That same said story has Gartner estimating global IT spend this year at around $3.4 trillion, a 3.5 increase from last year. Me, I'm just hoping to catch a glimpse of some of the cool stuff being released at the Consumer Electronics Show this week. Though my New Year's resolution is still in the process of being resolved, one thing I did promise this year was not to go out and buy every new new thing the first week it's available. That, instead, I would demonstrate some resolve…and wait at least until the second week. Posted in facebook applications, information technology, it spending Tagged with facebook, gadgets, m&a, valuation Turn Out The Lights Been a busy no-blogging Monday, but it's towards the end of the day and I wanted to stop by and check in so I don't get "blogstipated" at the start of the week. First, another sad goodbye, this time to "Dandy" Don Meredith, former Dallas Cowboys quarterback and "Monday Night Football" announcer. Meredith passed away at the age of 72 this past weekend in Santa Fe, New Mexico, and for those of us who remember his Southern wit from "Monday Night Football," it's sad to think that the lights this time were turned out on Meredith. He was not only the groundbreaking quarter for Dallas, but also a groundbreaker in bringing sports coverage to primetime when MNF debuted in 1970. Referring to turning out the lights, Meredith used to start singing Willie Nelson's "Turn Out the Lights…the Party's Over" when he saw no hope for a fledgling Monday night team. He also paved the way for no end of celebrity sports endorsements, when he early on pitched for Lipton Tea in a series of TV spots. Meredith was from Mount Vernon, Texas, the same vicinity of East Texas where much of my family hails from. Our thoughts certainly go out to his. Otherwise on the sports front, it was exciting to see Tiger Woods almost win his first tournament of 2010. Ironically, it was his last chance, but Irishman Graham MacDowell took the Chevron trophy away from Tiger in a nail-biting playoff after an even more nerve-wracking several holes of the final round. This weekend witnesses "The Shark Shootout" in Tiburon, and then the end-of-year lull before the 2011 golf season commences in Kapalua. Completely changing subjects, anybody see the interview with Facebook CEO Mark Zuckerberg last night on "60 Minutes?" Leslie Stahl gave him a pretty good grilling, but compared to his abysmal first interview there three years ago, Zuckerberg passed this Q&A with flying colors and introduced a new Facebook release that began rolling out today. Inside Facebook tells us it's all a "natural way to get users to share more." What, you mean they didn't already know everything about me? You can see what a new and revised profile looks like here. Brilliant a ploy though it is to elicit more information from us all, I like the design and (mostly) had no trouble making the updates. Feel free to comment and tell us about your own experiences making the update (should you decide to accept that particular mission). Posted in facebook applications, golf, obituaries, sports, tiger woods Tagged with don meredith, facebook, golf, tiger woods Social Network Analysis: Getting to Know You I don't do Mafia Wars on Facebook. I would, but if I did, I'd probably never do anything else. But it seems like a whole bunch of you DO do Mafia Wars. Let me know how that goes, I hope you don't get yourself whacked. What I did do last night was the Friend Facts application. I did that one not because everybody's doing it (although I noticed several of my FB friends doing it right after I did it, and I'd done it right after one of my friends had done it, and that's how a Facebook phenomenon is made). No, I did Friend Facts because I thought I might learn something interesting about myself and my friends. And I did. I learned that 44% of my FB friends are female, and 56% are male (definitely gonna have to work on equalizing that ratio). I learned that 43% of them are single, and 57% are taken. I learned that 80% of them are Democrats, and 20% are Republicans. I have FB friends in 12 countries and 25 states, and the most common zodiac sign among my friends is Virgo (47 friends!). Our collective favorite band is U2, and our collective favorite TV show is "Lost." And, EVERYBODY loves "Pulp Fiction." But while everybody is listening to all this rock and roll from U2, and catching up on all those episodes of "Lost," everybody also seems to maintain that their favorite activity is "Reading." Uh, huh. So let me recap: In Turbo's FB circles, the males can take the females, but just barely. The significantly attached can take the singles. The Dems can take the Repubs. And they can all do it while listening to U2, watching the latest episode of "Lost," and while reading "To Kill a Mockingbird" (Turbos' friends' favorite book). Rock on. Turbo Friend Facts Facebook Application Results Though this is a most simplistic example of social network analysis via Facebook, I think the actual potentiality of such research is extraordinary. And, to be frank, it's quite terrifying at the same time. Who we are friends with, who we associate with, who we work with, who we connect to…all are increasingly, good or bad, reflections of who we are. Or, as the case may be, who we are not. And the inferences that can be made through such social network alliances might ought be…well…quite frankly, none of your business. Take "Project Gaydar" at MIT, where two students banded together to better understand what social networks were unwittingly revealing to the Facebook world and beyond. What could, in fact, the most basic transactions reveal via Facebook. As it turns out, a lot. They found that simply by looking at a person's online friends, they could predict whether an individual was likely to be gay. According to a Boston Globe article on the effort, the researchers did this with a software program that looked at the gender and sexuality of a person's friends and, using statistical analysis, made a prediction. And more often than not, they were right. In another example cited in the same story, Murat Kantarcioglu, an assistant professor of computer science at the University of Texas at Dallas found he could make solid predictions about a person's political affiliation by analyzing 167K profiles and 3 million links between people from the DFW network. They used three methods to predict a person's political views: One prediction model using only profile details. Another using only friendship links. And the third a combination of the two. Care to guess which one worked best? Uh, yeah, the third. The implications of even these two simple but revealing examples of social network analysis are profound. Essentially, you can reveal only the most basic, seemingly non-intimate details of yourself online via a social network, and through a fairly simple analytical routine, suddenly find yourself standing in the spotlight with company you may not wish the world you know to keep. Or, as former Sun Microsystems CEO Scott McNealy said once upon a time during the late 1990s, "You have zero privacy…get over it." For the longest time, I didn't want to believe him, but I'm starting to think he was right. So what's a gregarious social networker seeking just a little privacy to do? Well, remember everybody's favorite TV show? You could join Jack and Kate and the "Lost" gang out in the South Pacific somewhere, as I'm pretty sure that countdown computer never revealed a Facebook screen. Or, you can just decide not to ever go online again, but even then, you've left a lot of online digital footprints that will be carved in the Google cache in perpetuity. Probably the best thing to do is be proud of however you are, whoever you are, wherever you are. You may, in fact, be like Howard Beale from the original "Network," the one that appeared on movie screens in 1976 and exclaimed: "I'm as mad as hell, and I'm not gonna take this anymore!" Well, yes, in fact, you will take it, and everybody in your network's gonna know about it, whether you come right out and say it or not. Posted in facebook applications, privacy, social network analysis
RedPajamaCommonCrawl_2053957295493452045
Slimpajama627bTrain/chunk1
Mageia 1.0 review Mageia is a Linux distribution forked from Mandriva Linux by former contributors and members of Mandriva, As expected, there was a flurry of activities between the announcement of the fork of the distribution (on September 18, 2010) and the first official (stable) release (June 1, 2011). Teams had to be put together, servers and hosting and the required development environments set up, etc. In the end, what we have is a community-driven and community-sponsored distribution in contrast to its parent distribution, which is controlled by a commercial entity. This article is a review of this new distribution and also marks its listing in the Desktop/Server Category on this website. Installer and Installation Process: You can obtain installation images of Mageia as CD, DVD, and network-install ISO images. The CD ISO images are Live CDs, which makes it possible to test the distribution on your hardware before attempting to install it. Most of the screenshots used in this review were obtained from several test installations using the DVD and network-install images in virtual environments and real hardware. This screenshot shows what you will see if you want to install Mageia using a DVD ISO image. It has a few more options than the CD images, which features just two (options) – "Boot Mageia 1," "Install Mageia 1" and "Boot from Hard Disk." The network installation image boots into a text interface. Pressing Enter on the keyboard starts the process that eventually leads to the graphical installation program. If you have ever installed Mandriva, you will be very familiar with Mageia's installer – they are the same. And that is a phrase you will get used to throughout this review. Mageia may be a new distribution, but it still shares the same tools as Mandriva. The installer is a point-and-click affair, with the same irritating omission that I have always complained about – the lack of a Back or Previous button at critical steps in the installation process. Shown here are some of the disk partitioning methods available on drakx, the installation program. Related Post: PC-BSD 8 review The disk partitioning step caters to both guru-level and new users alike. The default view is the "Normal mode." In that mode, clicking the Auto allocate button prompts the installer to create three partitions. These are for /, the root file system, Swap and /home, with the first partition always configured as a primary partition, and subsequent ones as logical partitions. Thus, Swap and /home are always sda5 and sda6, the first and second logical partitions of an extended partition. In expert mode (Toggle to expert mode), clicking on Auto allocate gives you the following disk partitioning options: with /usr – this creates a separate partition for the /usr file system directory in addition to the defaults configured in Normal mode. simple – this configures the same partitions as the defaults in Normal mode server – separate partitions are created for /var and /tmp in addition to those created under the first option The Auto allocate options makes it very easy for all users to configure partitions very fast and easily without going through the steps of creating each partition manually. Debian is the only other distribution that I am aware of whose installer has this same feature. In normal mode, the journaling file systems available are ext3/4, jfs, xfs, and reiserfs, with ext4 as the default. NTFS and NTFS-3G are also available in this mode. In expert mode, practically all the file systems available on the planet, are supported. I said "practically" because Nilfs is not in the list. Nilfs, a log-structured file system with support for continuous snapshotting, is one of two new file systems in the Linux kernel. The other one is btrfs, and you can see, btrfs is supported. Keep in mind that what you see in this image is just the list of file systems above-the-scroll. There are two more scrolls of file systems. LVM, the Linux Logical Volume Manager, RAID and disk encryption are supported. At the boot loader configuration step, you have three options – "GRUB with graphical menu," "GRUB with text menu," and LILO. GRUB Legacy (version 0.97) is the version of GRUB used. For all three options, you can configure a boot loader password, which by itself does not do a whole lot, but combined with other physical security features, can provide a complete physical security blanket for your computer. Related Post: Linux Mint 10 KDE review If you use a DVD or network-install image for installation, the installer will give you the desktop options shown in this image. KDE is the default if installation is from a DVD image, while GNOME is the default if a network-install image is used. Do not know why, but that was my observation. LXDE, the third desktop environment supported is available only if you select the "Custom" option. Note: By "default." I mean the pre-selected option. About using a network-install image: A network-installation image weighs in at just about 40 MB, significantly less than a CD or DVD image. However, you never know what is going to happen during installation. For example, the first test installation I made on real hardware using this method was successful. A second installation on the same hardware failed because a few packages were missing from the mirror I selected. The mirror I used for the first installation was not listed during the second installation attempt. Also, on two subsequent, back-to-back installations in a virtual environment using two different mirrors (iblibio and webconquest), the installation failed with the following error message: So, while a network-installation image offers a reverse-size advantage, it might be better, for an error-free installation, to use either a CD or DVD image. I prefer a DVD image because it offers more customization options that a CD image though at more than 3 GB, it will take a little bit more time to download than a CD image. The benefits, however, outweigh the extra download time involved. By this last image, drakx gives you the opportunity to make changes to most of your installation settings – before they are committed to disk. And it is only available if you use a DVD or a network-install image. Pages: Page 1, Page 2, Page 3 PrevPreviousLinux Mint 11 review NextInstall Mageia 1 on an encrypted btrfs file systemNext V6 says: I confirm MH's statement on the forum. Members are not allowed to edit their own posts (closed almost immediately). This makes a "solved" marking impossible. The community is simply not trusted to edit their own posts. For a "community driven" distro they are incredibly clumsy and distrusting. andré says: It's not a matter of trust. It's just the tools being used. Mageia is just as open as — if not more than — any other distro. Some of the structure, such as the permanent wiki, are still being set up. And we're still reviewing basic policy on all sorts of things. (The starting point being that of Mandriva, from which Mageia forked.) darkduck says: Another review of Mageia 1 for those who is interested: http://linuxblog.darkduck.com/2011/06/mageia-cal-win-over-humanity.html The one big strike against Mageia is the way it treats its users. Here's two examples: Recently, users who wanted a voice regarding the direction of the distro were told that they MUST join the "dev" mailing list (even though a perfectly good "discuss" mailing list exists). When users expressed some hesitancy, they were basically told "do it this way or don't do it." Mageia also has the most restrictive forum policies I've ever seen. Users are not trusted to do something as simple as mark their own posts as "solved." When users expressed concern, they were, once again, told that their input, their opinion, simply didn't matter. Normally users can discuss on the Mageia-discuss mailing list. But in certain (very limited) cases, a discussion to decide an important aspect of the development process of Mageia was started on and limited to a particular thread on Mageia-dev, the development mailing list. However previous contributions on Mageia-discuss were taken into account, as well as previous and current discussions on the forum. Sometimes such limitations are required in order to come to a decision. If a user is involved in the development process, they would normally already be subscribed to the development list. If not, they can join the list to actively contribute their ideas to the particular discussion. Seriously, who are most likely to have ideas practical enough to be accepted for the development process, if not those actively involved in the development process, or at least following the development mailing list ? As far as marking your own posts to the forum as solved, I'm sure there must be some misunderstanding. Unless some other contributor to your post raised points that were not solved. Or maybe there was a problem with how you were marking it ? All forums have rules, including Mandriva, from which the forum rules were inherited. I haven't yet contributed much to the Mageia forums, as I'm now mostly focused on development and policy. Thanks for the detailed review. As a past user of Mandrake Linux, hoping mageia develops in the Mandrake's spirit of making Linux accessible to non-techy users, That's our orientation. Trying to be even more friendly to non-techy users. In our initial refining of our development process, based initially on Mandriva policies, we are having a lot of techy discussions, but our goal is to have a community-oriented distro, not subject to the whims of a commercial distro like Mandriva. Based on the already user-friendly tools of Mandriva, we are already working on developing better such tools — more friendly to non-techy users. Is the installer one of those tools that are being retouched? There is a new web-based tool in an advanced stage of development that provides a more friendly front end/link to the installer, called for the moment mageia-app-db. It also provides a database to available packages – on Mageia and elsewhere. I haven't yet tested it, although I was involved early on in some design discussions. There is also a fair bit of discussion on enhancing the installer itself, inherited from Mandriva. (Which is written in Perl.) Despite it being fairly friendly, it does have some weak points. We are still heavily involved in redefining policy and developing infrastructure, inherited from Mandriva. We've already made a fair number of changes. And there are a lot more improvements to come You're welcome to join — Mageia is a community distro 🙂 I have Mageia installed on a 500 gig HD. I have used Mandrake/Mandriva since 7.2. I switched over to PCLOS in 2008. and then to Mint 10 in 2010. Mageia left me wanting in several areas. Nvidia driver has to be located, right driver selected, and installed. Mint does this almost automatically. I had no sound, had to configure that, and, like Mandriva, some of the programs would not run, had to mark 'select all dependencies' manually. I think this is one of the reasons I left Mandriva. My system is: MSI 760GM-E51 mobo, 600 watt power supply, AMD 640 quad core processor, 16 gig DDR3, 1.5 TB HD, and I have 3 500 gig HD spares to play on. It are about 320 Linux distributions already. Do the world need any more? I don't thinks so. More competition? Well look how many car brands it was. To many, So some brands are gone. Are it any point to sell like Vauxhall and Opel and the only difference is some cosmetic features? Or Dodge, Chrysler and Plymouth.Same car but different names.And the same will happends with Linux distributions to. Some will survive and others will be gone. I think if Mandriva and Mageia would work as one distribution they would compete better as two different distributions. Who know, maybe the new Mandriva 2011 would not have been delayed at all then? Well the core of Mageia contributors come largely from those laid off by Mandriva as, apparently due to financial problems, moved to employees in Brazil and Russia. This core, plus many other key contributors to Mandriva, started a new distro as they wanted a community-based distro that wouldn't be subject to the whims of a commercial enterprise, and already had many good ideas as how to make a better Mandriva — which became Mageia. Mandriva is more or less what it would have been without Mageia. Myself, a longtime Mandriva user, would have been left to go to another distro anyway, as Mandriva cut back some of my favorite applications. Some parts of Mandriva are definitely worth keeping, like the easy-to-use package installation manager, which is why I really appreciate Mageia. I don't have any stats, but I suspect that Mageia is already one of the top 10 distros. This is not some excentric going off in a corner to start his or her's own version of an ideal Linux. I think it already has a vibrant community, which has encouraged me to make a lot more contributions in the past. If you follow the mailing lists, you might notice a lot of controversy from time to time, but that is part of the growing pains of Mageia, already showing lots of promise. By the way, Mandriva was already delayed before they laid off most of their key employees. Who were already considering starting a community distro due to internal problems. One could say that Mandriva, in releasing these employees, indirectly created Mageia. (Mandriva 2010.2 was just 2010.1 with about 6 months of updates, and not a regular release. You can see that in the 2010.2 DVD's, which contain update repos.) Of course Mageia will improve unlike PCLinuxOS. First of all the name isn't just plain dumb. And second of all Mageia is being produced but a lot of experienced developers, many of which worked for Mandriva SA. PCLinusOS is produced by one individual who gets butthurt if you say anything negative about his work. The developer of PCLinuxOS seems to take criticism in stride. The fanboys are the nut jobs. UX says: Problem with PCLOS is that the fanboy-ism is not only actively encouraged by the distro's leadership, but pretty much demanded/required. And lest there be any doubt, the fanboy-ism comes straight from the top (though perhaps less obviously than in the past): http://thepcspy.com/read/pclinuxoss_militant_leadership/ foreigner says: "Regarding the Tainted repository, I do not think that I completely understand the developer's stance on Free/Nonfree software. If you must include "dirty" applications in your repository, which means you are distributing, you might as well install it by default, especially if it makes the system to "just work." " I like how they did it. They put it straight – using some items (depending of the law of your state) may violate some rights and effectively act as tainted so they literally mark them "tainted". Those things might be ok – but you must check it for yourself. And if those things are ok, why shouldn't you get them from one of official repositories? Mageia team seems to care that you don't compromise security of your system in a reckless way (by downloading some malicious stuff) just to use some perfectly legal (in your country, but illegal in France, where headquarters of Mageia are) software. Montagnac says: (by downloading some malicious stuff) !! ? If think you are really new to UNIX world :-))… The quality of this distrib is higher than Mandriva 2010.2 … in terms of global integration ! Perfect for developers ! Serge. Packages in "Tainted" aren't illegal in France, which doesn't have software patents. (If they were, they wouldn't be in Mageia.) Also, few if any such packages are required to make a system "just work", but can be useful to provide full functionality. (Personally I've never found such versions useful.) It is more packages (or versions of packages) suspected to possibly be subject to legal claims in a few other countries, such as the U.S.A., where software patents are sometimes legally enforceable. Note however that packages in "non-free" are often very useful for a properly functioning system. Also, few if any such packages are required to make a system "just work", but can be useful to provide full functionality. How do you define "full functionality" if you cannot play a video DVD, which is available only if you install libdvdcss, which is available only if "Tainted" is enabled. So you agree with my post ? Or you don't think it is useful to play video DVDs ? I disagreed with you because you said "… few if any such packages are required to make a system "just work", but can be useful to provide full functionality. (Personally I've never found such versions useful.)" @finid ok, the part of my post that you cited can be devolved to 3 statements. you respond referring to the second statement, seeming to disagree with it, then give an example that seems to support the same statement. So either you agree with my post, and have a somewhat original manner of expressing yourself, or you don't quite understand English. Unless, of course, you are trying to say that "tainted" is not useful to provide full functionality. By the way, in many cases the same package is available in "core", with certain functions disabled. I think somebody has been spending way too much time in front of a PC monitor. I hope I'm not the guilty party. 🙂 To your last point, yes, some packages in Tainted are also available in Core with some features disabled. If Tainted is enabled, for example, you will have a choice between installing vlc or vlc tainted. LinuxLover says: Just remember, this is the first release. It's important that we understand it's only purpose is to launch Mageia, and that further improvements are yet to come. I think it's obvious to most that the first release would be nothing more than a clone of Mandriva, as the work required just to launch it was enormous. I have no doubt they'll improve upon what Mandriva has done, and even move in a different direction in some areas. Give it time to mature. Luix says: Yes, Mageia must improve over time. I agree with you.. With recent "un"-improvements in Mandriva, I suspect that Mageia already passes Mandriva, especially for those that don't use the KDE desktop. (They stopped officially supporting the other desktops, which now depend on only community support. Since so many contributors went to Mageia, there is a lot less support for the other desktops.) As well, Mandriva went to another version of the package manager system. They are still trying to get the bugs out. In any case, Mageia and Mandriva still have a lot in common (much of which there are no plans to change), and thus a lot of potential synergies, as well as a lot of contributors to both. tks says: "I suspect that Mageia already passes Mandriva, especially for those that don't use the KDE desktop." I suspect Bigfoot is real and that he likes to ride the Loch Ness Monster. Suspect all you want…until a frame by frame comparison exists…Mandriva has nothing to prove…they're not a new distribution trying to organize themselves. Mageia is. Considering that bigfoot is another name for the grizzly, I doubt the second part of your "suspect". My statement was based on my experiences with Mandriva and Mageia, and the feedback I get from other's involved in the 2 distros. For one, Mageia seems to be already better organized than Mandriva. By default, Mageia follows old Mandriva policy until decided otherwise, so it is not functioning in a vacuum. And we are progressing nicely on defining new policy. You base your reaction on what ? WL says: You seem to have missed out the most important part – which repo to select and why? Most new users will be lost at the selection of repositories. Good point, but that should be the subject of a short tutorial.
RedPajamaCommonCrawl_5335535622352888876
Slimpajama627bTrain/chunk1
Top 5 Soccer Players With The Most Individual Awards Top 5 Most Hilarious Sports Quotes Top 5 Sexiest Female Football Presenters In The World Hilarious Faces of Olympic Figure Skaters Football Players With The Most Individual Awards Funny Faces Of Olympic Figure Skaters The Most Hilarious And Timeless Sports Quotes Ever World's Most Beautiful Football News Anchors Wealthiest Olympians In Sports History Marble Race: The Greatest Sport Ever Invented 2020-2021 NBA Champ Predictions By Shane R October 27, 2020 It is never too early to predict which teams have the best chance of winning the NBA Championship in 2020-2021. After the Los Angeles Lakers capped their season off with a Finals Championship, who is going to win next season? Let us take a look at the top teams in all the land. #3 – Utah Jazz The Utah Jazz had a 3-1 led against the Denver Nuggets in last year's playoffs, but they were not able to win the series. Donovan Mitchell is the real deal. The Utah Jazz need to do a better job next season, finding supporting players that will make a difference. All three bench signers were a bust. From Jeff Green to Emmanuel Mudiay to Ed Davis, none of them made post-season impacts. To challenge the Los Angeles Lakers, the Jazz need to stay healthy and find a few more players that can make a significant impact on the offensive side of the ball. #2 – Milwaukee Bucks The Bucks have one more year to prove to Giannis if he should stay or not. This year, the Bucks go for broke. They will sell their draft picks and make key trades to convenience Giannis to stick around. Ultimately, Giannis needs to stay healthy, or the Bucks are an early exit in the playoffs. Can the Bucks trade Kris Middleton for something more? Time will tell, but the Bucks have a chance as long as Giannis is near. #1 – Los Angeles Lakers If the Lakers can retain Anthony Davis, the Lakers should be the clear favorites. Even after losing six Finals, James looks primed again to go after Michael Jordan's six Finals victories and six Finals Most Valuable Player trophies. The King is still the king for a reason. Don't sell my personal information Copyright © 2020 Exorigos Theme, powered by Wordpress.
RedPajamaCommonCrawl_-8034243961970682301
Slimpajama627bTrain/chunk1
Winner in LGBTQ+ Account About Shangela The "Queen of Halleloo," D.J. "Shangela" Pierce has lived his 2018 as one of OUT Magazine's "Most Compelling People." The former RuPaul's Drag Race competitor and international performer Shangela dominated last year with a critically-acclaimed role in A Star Is Born, touring with his new self-written stand up comedy special and being named LGBTQ+ Music Festival's "Rising Star Award" for his global contributions in performance and music. With nearly 2M combined Instagram, Twitter and Facebook fans, the Gay Times 2019 cover girl uses her vast platforms for gratitude, career celebrations, werk empowerment and LGBTQ+ activism. Shangela's best work on social https://www.instagram.com/p/BnBXr6YHUGJ/ https://www.instagram.com/p/BnCcTfRnSTJ/ https://www.instagram.com/p/BhjHW8Mn_9A/ @itsSHANGELA ShangelaOnline itsshangela Share Shangela's Shorty Awards page
RedPajamaCommonCrawl_927319747655873608
Slimpajama627bTrain/chunk1
Home/Tech/New Storage Capacity of iPhone Will Surprise You New Storage Capacity of iPhone Will Surprise You Rashid AliOctober 11, 2021 Smartphones are not used just for making calls or gettings messages. Nowadays, Smartphones are used for a lot o different purposes. For example, your Smartphone is your DSLR camera that can capture amazing photos on your trip. You can use your Smartphone as your movie camera as well to capture the best moments of your life in a 4K high-resolution video. With that, your iPhones and Android phones are also replacing the gaming consoles as you can play high graphics games on your iPhone and on your Android devices. The high graphic games and 4K videos with the best pictures require you to have a lot more storage space on your iPhone or Android device than you had ever before. By the way, here you can check the best free iPhone games that you can install on your phone to enjoy the best addictive games. Apple know the requirement of the iPhone users so according to rumors, they have made a surprising decision. But, it is just a rumor, we are not sure about it. iPhone With 2TB Storage As per rumors, the decision is that Apple is going to launch an iPhone that will have a storage space of 2TB. This is really big and surprising news for Apple users. Apple has a maximum storage of 512 GB earlier, but just a few weeks ago, they have announced a new variant of the iPhone 13. This new Phone 13 had storage of 1TB which is the maximum storage on any phone by Apple till now. According to rumors, the new iPhone will come with a much better and improved camera that requires more memory to store videos and pictures. With that, they are also claiming that processing speed will also be increased which allows playing much higher graphic games on your Smartphone. All these things require more space on the phone. So, you don't need to worry about it as reportedly Apple is going to launch a new iPhone 14 (maybe) with a storage capacity of 2TB. Now, you can download and install a lot of different utility apps on your iPhone. You can also keep the call records on your phone for a longer period of time. If you are using tape a call to record all your calls on iPhone, you need more storage and hopefully, the next model will come with a 2TB storage capacity. Remember, if Apple is going to launch a 2TB variant, then it will be for a Pro and Pro Max variant of the next iPhone. We can expect that the normal variant will also get upgraded to 1TB from 512 GB. 2TB Apple iPhone Storage I am a professional writer and a blogger who writes for different news sites and private blogs. I also do SEO and can provide top page rankings in Google. Separation Without An Attorney: Court Rules And PaperWork Love is Noticeable in general? The Best Gaming Phones to Look Out for in 2023 Guest Posting Providers at Upwork and Fiverr Unique Guest Posting Service Provider – Thomas Programming Languages For Embedded Systems – An Overview
RedPajamaCommonCrawl_-5449292482191406034
Slimpajama627bTrain/chunk1
Asia-Pacific Gaming Philippines Court Tosses Kazuo Okada Fraud Charges, Quashes Arrest Warrant Posted on: January 10, 2022, 10:44h. Last updated on: January 10, 2022, 01:26h. The Philippines Court of Appeals has quashed fraud charges against the Japanese gaming billionaire Kazuo Okada. In the same breath, it overturned a lower court ruling that found he should stand trial for allegedly misappropriating more than US$3 million from his former company, Tiger Resorts, operator of the Okada Manila integrated resort. With echoes of HBO's Succession, "Pachinko King" Kazuo Okada was ousted from the company he founded in a boardroom coup orchestrated by members of his family. (Image: The Japan Times) The order was given on Dec. 9 but has only now come to light via a report by The Manilla Bulletin. The court found that Okada, 79, had not misappropriated the money in question. It was paid to him by Tiger Resorts "in consideration for services rendered as consultant and CEO." In his ruling, Associate Justice Alfredo D. Ampuan wrote that the lower court had committed an "abuse of discretion" when it issued arrest warrants for Okada and his right-hand man, Takahiro Usui, in March 2018. "There was lack of probable cause to issue warrants of arrest because not all the elements of the crime of estafa [fraud] was proved," Ampuan wrote. Boardroom Coup Those warrants came after Okada was ousted by the company he founded five decades ago, Tiger parent Universal Entertainment. It happened in what he has described as a boardroom coup orchestrated by members of his own family. Okada holds a 46.38 percent stake in Okada Holdings, which controls Universal. His son, Tomohiro, holds 43.48 percent, and his daughter, Hiromi, 9.78 percent. This meant that a pact between the two siblings was enough to topple their father. The board accused Okada of three instances of fraud related to the misappropriation of some US$17.26 million of Universal Entertainment funds. It declared him "unfit" to represent a public company and voted him out after his estranged wife Takako Okada and his children moved against him. Okada said the money was a director's loan, to be used for the development of the Okada Manila, which he intended to repay. Subsequent legal efforts by Okada to regain control of the company have failed in the Tokyo courts. Battle with Wynn In Japan, Okada is dubbed "the Pachinko King" after the popular slot-pinball hybrid machines that made his fortune. He was an early investor in Steve Wynn's Wynn Resorts and sat on the board until 2012. But the two men fell out after Wynn accused Okada of bribing a Philippine official to land a license for what would become the Okada Manila. Wynn Resorts forcibly redeemed the shares Okada owned through Universal, then worth US$2.77 billion, at a 30 percent discount, and kicked him off the board. In 2018, Wynn Resorts agreed to pay Universal US$2.6 billion to settle resulting litigation. Japanese Casino Billionaire Kazuo Okada Must Pay $50M in Legal Fees Related to Wynn Resorts Lawsuit Philippines Court Upholds Kazuo Okada Ruling Dismissing Fraud Charges Japanese Pachinko King Billionaire Kazuo Okada Loses Court Battles in Philippines, Tokyo Philippine DOJ Recommends Indictment of Japanese Gambling Tycoon Kazuo Okada for Fraud Universal Entertainment's Kazuo Okada Ousted from Philippines Casino for Alleged $17 Million Improper Transfer Phillipines Online Casinos Devin O'Connor — February 9, 2022 Devin O'Connor — July 14, 2022 Philip Conneller — December 18, 2018
RedPajamaCommonCrawl_3832652970400141758
Slimpajama627bTrain/chunk1
Q: Sorting a doubly linked list with bubble sort My code is supposed to sort a doubly linked list of Integer, but I keep getting this error: Exception in thread "main" java.lang.NullPointerException at Ex_1.BubbleSortForDLL(Ex_1.java:26) at Ex_1.main(Ex_1.java:10) Here is my code: public static <E> void BubbleSortForDLL(DoublyLinkedList.Node<E> head){ int j; boolean flag = true; // set flag to true to begin first pass DoublyLinkedList.Node<E> temp = head; DoublyLinkedList.Node<E> placeHolder = head; while(flag){ int i = 1; flag= false; //set flag to false awaiting a possible swap DoublyLinkedList.Node<E> firstNode = placeHolder; DoublyLinkedList.Node<E> secondNode = firstNode.getNext(); while(secondNode != null){ int first = (int)firstNode.getElement(); int second = (int)secondNode.getElement(); if (first > second){ if(i == 1) placeHolder = secondNode; firstNode.getPrev().setNext(secondNode); secondNode.getNext().setPrev(firstNode); firstNode.setNext(secondNode.getNext()); secondNode.setPrev(firstNode.getPrev()); firstNode.setPrev(secondNode); secondNode.setNext(firstNode); flag = true; //shows a swap occurred } firstNode = firstNode.getNext(); secondNode = firstNode.getNext(); i++; } } }
RedPajamaStackExchange_3464712616061757012
Slimpajama627bTrain/chunk1
Journal of Applied Meteorology and Climatology 4. NPOL–2DVD comparisons a. ZH and ZDR b. Dmass and NW c. Outliers Adirosi, E., L. Baldini, F. Lombardo, F. Russo, F. Napolitano, E. Volpi, and A. Tokay, 2015: Comparison of different fittings of drop spectra for rainfall retrievals. Adv. Water Resour., 83, 55–67, https://doi.org/10.1016/j.advwatres.2015.05.009. Adirosi, E., L. Baldini, F. Lombardo, F. Russo, F. Napolitano, E. Volpi, and A. Tokay, 2015: Comparison of different fittings of drop spectra for rainfall retrievals. Adv. Water Resour., 83, 55–67, https://doi.org/10.1016/j.advwatres.2015.05.009.10.1016/j.advwatres.2015.05.009)| false Andsager, K., K. V. Beard, and N. F. Laird, 1999: Laboratory measurements of axis ratios for large raindrops. J. Atmos. Sci., 56, 2673–2683, https://doi.org/10.1175/1520-0469(1999)056<2673:LMOARF>2.0.CO;2. Andsager, K., K. V. Beard, and N. F. Laird, 1999: Laboratory measurements of axis ratios for large raindrops. J. Atmos. Sci., 56, 2673–2683, https://doi.org/10.1175/1520-0469(1999)056<2673:LMOARF>2.0.CO;2.10.1175/1520-0469(1999)056<2673:LMOARF>2.0.CO;2)| false Aydin, K., T. A. Seliga, and V. Balaji, 1986: Remote sensing of hail with a dual linear polarization radar. J. Climate Appl. Meteor., 25, 1475–1484, https://doi.org/10.1175/1520-0450(1986)025<1475:RSOHWA>2.0.CO;2. Aydin, K., T. A. Seliga, and V. Balaji, 1986: Remote sensing of hail with a dual linear polarization radar. J. Climate Appl. Meteor., 25, 1475–1484, https://doi.org/10.1175/1520-0450(1986)025<1475:RSOHWA>2.0.CO;2.10.1175/1520-0450(1986)025<1475:RSOHWA>2.0.CO;2)| false Beard, K. V., and C. Chuang, 1987: A new model for the equilibrium shape of raindrops. J. Atmos. Sci., 44, 1509–1524, https://doi.org/10.1175/1520-0469(1987)044<1509:ANMFTE>2.0.CO;2. Beard, K. V., and C. Chuang, 1987: A new model for the equilibrium shape of raindrops. J. Atmos. Sci., 44, 1509–1524, https://doi.org/10.1175/1520-0469(1987)044<1509:ANMFTE>2.0.CO;2.10.1175/1520-0469(1987)044<1509:ANMFTE>2.0.CO;2)| false Brandes, E. A., G. Zhang, and J. Vivekanandan, 2004: Drop size distribution retrieval with polarimetric radar: Model an application. J. Appl. Meteor., 43, 461–475, https://doi.org/10.1175/1520-0450(2004)043<0461:DSDRWP>2.0.CO;2. Brandes, E. A., G. Zhang, and J. Vivekanandan, 2004: Drop size distribution retrieval with polarimetric radar: Model an application. J. Appl. Meteor., 43, 461–475, https://doi.org/10.1175/1520-0450(2004)043<0461:DSDRWP>2.0.CO;2.10.1175/1520-0450(2004)043<0461:DSDRWP>2.0.CO;2)| false Campos, E., and I. Zawadzki, 2000: Instrumental uncertainties in Z–R relations. J. Appl. Meteor., 39, 1088–1102, https://doi.org/10.1175/1520-0450(2000)039<1088:IUIZRR>2.0.CO;2. Campos, E., and I. Zawadzki, 2000: Instrumental uncertainties in Z–R relations. J. Appl. Meteor., 39, 1088–1102, https://doi.org/10.1175/1520-0450(2000)039<1088:IUIZRR>2.0.CO;2.10.1175/1520-0450(2000)039<1088:IUIZRR>2.0.CO;2)| false Cao, Q., G. Zhang, E. Brandes, T. Schuur, A. Ryzhkov, and K. Ikeda, 2008: Analysis of video disdrometer and polarimetric radar data to characterize rain microphysics in Oklahoma. J. Appl. Meteor. Climatol., 47, 2238–2255, https://doi.org/10.1175/2008JAMC1732.1. Cao, Q., G. Zhang, E. Brandes, T. Schuur, A. Ryzhkov, and K. Ikeda, 2008: Analysis of video disdrometer and polarimetric radar data to characterize rain microphysics in Oklahoma. J. Appl. Meteor. Climatol., 47, 2238–2255, https://doi.org/10.1175/2008JAMC1732.1.10.1175/2008JAMC1732.1)| false Cifelli, R., V. Chandrasekar, S. Lim, P. C. Kennedy, Y. Wang, S. A. Rutledge, 2011: A new dual-polarization radar rainfall algorithm: Application in Colorado precipitation events. J. Atmos. Oceanic Technol., 28, 352–364, https://doi.org/10.1175/2010JTECHA1488.1. Cifelli, R., V. Chandrasekar, S. Lim, P. C. Kennedy, Y. Wang, S. A. Rutledge, 2011: A new dual-polarization radar rainfall algorithm: Application in Colorado precipitation events. J. Atmos. Oceanic Technol., 28, 352–364, https://doi.org/10.1175/2010JTECHA1488.1.10.1175/2010JTECHA1488.1)| false Cunha, L. K., J. A. Smith, M. L. Baeck, and W. F. Krajewski, 2013: An early performance evaluation of the NEXRAD dual-polarization radar rainfall estimates for urban flood applications. Wea. Forecasting, 28, 1478–1497, https://doi.org/10.1175/WAF-D-13-00046.1. Cunha, L. K., J. A. Smith, M. L. Baeck, and W. F. Krajewski, 2013: An early performance evaluation of the NEXRAD dual-polarization radar rainfall estimates for urban flood applications. Wea. Forecasting, 28, 1478–1497, https://doi.org/10.1175/WAF-D-13-00046.1.10.1175/WAF-D-13-00046.1)| false D'Adderio, L. P., G. Vulpiani, F. Porcu, A. Tokay, and R. Meneghini, 2018: Comparison of GPM Core Observatory and ground-based radar retrieval of mass-weighted mean raindrop diameter at midlatitude. J. Hydrometeor., 19, 1583–1598, https://doi.org/10.1175/JHM-D-18-0002.1. D'Adderio, L. P., G. Vulpiani, F. Porcu, A. Tokay, and R. Meneghini, 2018: Comparison of GPM Core Observatory and ground-based radar retrieval of mass-weighted mean raindrop diameter at midlatitude. J. Hydrometeor., 19, 1583–1598, https://doi.org/10.1175/JHM-D-18-0002.1.10.1175/JHM-D-18-0002.1)| false Giangrande, S. E., and A. V. Ryzhkov, 2008: Estimation of rainfall based on the results of polarimetric echo classification. J. Appl. Meteor. Climatol., 47, 2445–2462, https://doi.org/10.1175/2008JAMC1753.1. Giangrande, S. E., and A. V. Ryzhkov, 2008: Estimation of rainfall based on the results of polarimetric echo classification. J. Appl. Meteor. Climatol., 47, 2445–2462, https://doi.org/10.1175/2008JAMC1753.1.10.1175/2008JAMC1753.1)| false Giangrande, S. E., S. Collis, A. K. Theisen, and A. Tokay, 2014a: Precipitation estimation from the ARM distributed radar network during the MC3E campaign. J. Appl. Meteor. Climatol., 53, 2130–2147, https://doi.org/10.1175/JAMC-D-13-0321.1. Giangrande, S. E., S. Collis, A. K. Theisen, and A. Tokay, 2014a: Precipitation estimation from the ARM distributed radar network during the MC3E campaign. J. Appl. Meteor. Climatol., 53, 2130–2147, https://doi.org/10.1175/JAMC-D-13-0321.1.10.1175/JAMC-D-13-0321.1)| false Giangrande, S. E., M. J. Bartholomew, M. Pope, S. Collis, and M. P. Jensen, 2014b: A summary of precipitation characteristics from the 2006-11 Northern Australian wet seasons as revealed by ARM disdrometer research facilities (Darwin, Australia). J. Appl. Meteor. Climatol., 53, 1213–1231, https://doi.org/10.1175/JAMC-D-13-0222.1. Giangrande, S. E., M. J. Bartholomew, M. Pope, S. Collis, and M. P. Jensen, 2014b: A summary of precipitation characteristics from the 2006-11 Northern Australian wet seasons as revealed by ARM disdrometer research facilities (Darwin, Australia). J. Appl. Meteor. Climatol., 53, 1213–1231, https://doi.org/10.1175/JAMC-D-13-0222.1.10.1175/JAMC-D-13-0222.1)| false Gorgucci, E., G. Scarchilli, and V. Chandrasekar, 1999: A procedure to calibrate multiparameter weather radar using properties of the rain medium. IEEE Trans. Geosci. Remote Sens., 37, 269–276, https://doi.org/10.1109/36.739161. Gorgucci, E., G. Scarchilli, and V. Chandrasekar, 1999: A procedure to calibrate multiparameter weather radar using properties of the rain medium. IEEE Trans. Geosci. Remote Sens., 37, 269–276, https://doi.org/10.1109/36.739161.10.1109/36.739161)| false Grecu, M., W. S. Olson, S. J. Munchak, S. Ringerud, L. Liao, Z. Haddad, B. Kelley, and S. McLaughlin, 2016: The GPM combined algorithm. J. Atmos. Oceanic Technol., 33, 2225–2245, https://doi.org/10.1175/JTECH-D-16-0019.1. Grecu, M., W. S. Olson, S. J. Munchak, S. Ringerud, L. Liao, Z. Haddad, B. Kelley, and S. McLaughlin, 2016: The GPM combined algorithm. J. Atmos. Oceanic Technol., 33, 2225–2245, https://doi.org/10.1175/JTECH-D-16-0019.1.10.1175/JTECH-D-16-0019.1)| false Iguchi, T., S. Seto, R. Meneghini, N. Yoshida, J. Awaka, M. Le, V. Chandrasekar, and T. Kubota, 2017: GPM/DPR level-2: Algorithm theoretical basis document. GPM Doc., 68 pp., https://www.eorc.jaxa.jp/GPM/doc/algorithm/ATBD_DPR_201708_whole_1.pdf. Kumjian, M. R., 2013: Principles and applications of dual-polarization weather radar. Part I: Description of the polarimetric radar variables. J. Oper. Meteor., 1, 226–242, https://doi.org/10.15191/nwajom.2013.0119. Kumjian, M. R., 2013: Principles and applications of dual-polarization weather radar. Part I: Description of the polarimetric radar variables. J. Oper. Meteor., 1, 226–242, https://doi.org/10.15191/nwajom.2013.0119.10.15191/nwajom.2013.0119)| false Petersen, W. A., P. Kirstetter, J. Wang, D. B. Wolff, and A. Tokay, 2020: The Global Precipitation Measurement ground validation program. Satellite Precipitation Measurement, V. Levizzani et al., Eds., Advances in Global Change Research Series, Vol. 69, Springer-Nature, 471–502. Petersen, W. A., P. Kirstetter, J. Wang, D. B. Wolff, and A. Tokay, 2020: The Global Precipitation Measurement ground validation program. Satellite Precipitation Measurement, V. Levizzani et al., Eds., Advances in Global Change Research Series, Vol. 69, Springer-Nature, 471–502.10.1007/978-3-030-35798-6_2)| false Petracca, M., L. P. D'Adderio, F. Porcu, G. Vulpiani, S. Sebastianelli, and S. Puca, 2018: Validation of GPM Dual-Frequency Precipitation Radar (DPR) rainfall products over Italy. J. Hydrometeor., 19, 907–925, https://doi.org/10.1175/JHM-D-17-0144.1. Petracca, M., L. P. D'Adderio, F. Porcu, G. Vulpiani, S. Sebastianelli, and S. Puca, 2018: Validation of GPM Dual-Frequency Precipitation Radar (DPR) rainfall products over Italy. J. Hydrometeor., 19, 907–925, https://doi.org/10.1175/JHM-D-17-0144.1.10.1175/JHM-D-17-0144.1)| false Pippitt, J. L., D. B. Wolff, W. Petersen, and D. A. Marks, 2015: Data and operational processing for NASA's GPM ground validation program. 37th Conf. on Radar Meteorology, Norman, OK, Amer. Meteor. Soc., 111, https://ams.confex.com/ams/37RADAR/webprogram/Manuscript/Paper275627/37radarmanuscript.pdf. Pippitt, J. L., D. B. Wolff, W. Petersen, and D. A. Marks, 2015: Data and operational processing for NASA's GPM ground validation program. 37th Conf. on Radar Meteorology, Norman, OK, Amer. Meteor. Soc., 111, https://ams.confex.com/ams/37RADAR/webprogram/Manuscript/Paper275627/37radarmanuscript.pdf.)| false Ryzhkov, A. V., S. E. Giangrande, V. M. Melnikov, and T. J. Schuur, 2005: Calibration issues of dual-polarization radar measurements. J. Atmos. Oceanic Technol., 22, 1138–1155, https://doi.org/10.1175/JTECH1772.1. Ryzhkov, A. V., S. E. Giangrande, V. M. Melnikov, and T. J. Schuur, 2005: Calibration issues of dual-polarization radar measurements. J. Atmos. Oceanic Technol., 22, 1138–1155, https://doi.org/10.1175/JTECH1772.1.10.1175/JTECH1772.1)| false Schwaller, M., and K. Morris, 2011: Ground validation network for the Global Precipitation Measurement mission. J. Atmos. Oceanic Technol., 28, 301–319, https://doi.org/10.1175/2010JTECHA1403.1. Schwaller, M., and K. Morris, 2011: Ground validation network for the Global Precipitation Measurement mission. J. Atmos. Oceanic Technol., 28, 301–319, https://doi.org/10.1175/2010JTECHA1403.1.10.1175/2010JTECHA1403.1)| false Seto, S., T. Iguchi, and T. Oki, 2013: The basic performance of a precipitation retrieval algorithm for the Global Precipitation Measurement mission's single/dual-frequency radar measurements. IEEE Trans. Geosci. Remote Sens., 51, 5239–5251, https://doi.org/10.1109/TGRS.2012.2231686. Seto, S., T. Iguchi, and T. Oki, 2013: The basic performance of a precipitation retrieval algorithm for the Global Precipitation Measurement mission's single/dual-frequency radar measurements. IEEE Trans. Geosci. Remote Sens., 51, 5239–5251, https://doi.org/10.1109/TGRS.2012.2231686.10.1109/TGRS.2012.2231686)| false Silberstein, D. S., D. B. Wolff, D. A. Marks, D. Atlas, and J. L. Pippitt, 2008: Ground clutter as a monitor of radar stability at Kwajalein, RMI. J. Atmos. Oceanic Technol., 25, 2037–2045, https://doi.org/10.1175/2008JTECHA1063.1. Silberstein, D. S., D. B. Wolff, D. A. Marks, D. Atlas, and J. L. Pippitt, 2008: Ground clutter as a monitor of radar stability at Kwajalein, RMI. J. Atmos. Oceanic Technol., 25, 2037–2045, https://doi.org/10.1175/2008JTECHA1063.1.10.1175/2008JTECHA1063.1)| false Skofronick-Jackson, G., and Coauthors, 2017: The Global Precipitation Measurement (GPM) mission for science and society. Bull. Amer. Meteor. Soc., 98, 1679–1695, https://doi.org/10.1175/BAMS-D-15-00306.1. Skofronick-Jackson, G., and Coauthors, 2017: The Global Precipitation Measurement (GPM) mission for science and society. Bull. Amer. Meteor. Soc., 98, 1679–1695, https://doi.org/10.1175/BAMS-D-15-00306.1.10.1175/BAMS-D-15-00306.1)| false Testud, J., S. Oury, R. A. Black, P. Amayenc, and X. Dou, 2001: The concept of normalized distribution to describe raindrop spectra: A tool for cloud physics and cloud remote sensing. J. Appl. Meteor., 40, 1118–1140, https://doi.org/10.1175/1520-0450(2001)040<1118:TCONDT>2.0.CO;2. Testud, J., S. Oury, R. A. Black, P. Amayenc, and X. Dou, 2001: The concept of normalized distribution to describe raindrop spectra: A tool for cloud physics and cloud remote sensing. J. Appl. Meteor., 40, 1118–1140, https://doi.org/10.1175/1520-0450(2001)040<1118:TCONDT>2.0.CO;2.10.1175/1520-0450(2001)040<1118:TCONDT>2.0.CO;2)| false Thompson, E. J., S. A. Rutledge, B. Dolan, and M. Thurai, 2015: Drop size distributions and radar observations of convective and stratiform rain over the equatorial Indian and west Pacific Oceans. J. Atmos. Sci., 72, 4091–4125, https://doi.org/10.1175/JAS-D-14-0206.1. Thompson, E. J., S. A. Rutledge, B. Dolan, and M. Thurai, 2015: Drop size distributions and radar observations of convective and stratiform rain over the equatorial Indian and west Pacific Oceans. J. Atmos. Sci., 72, 4091–4125, https://doi.org/10.1175/JAS-D-14-0206.1.10.1175/JAS-D-14-0206.1)| false Thurai, M., and V. N. Bringi, 2018: Application of the generalized gamma model to represent the full rain drop size distribution spectra. J. Appl. Meteor. Climatol., 57, 1197–1210, https://doi.org/10.1175/JAMC-D-17-0235.1. Thurai, M., and V. N. Bringi, 2018: Application of the generalized gamma model to represent the full rain drop size distribution spectra. J. Appl. Meteor. Climatol., 57, 1197–1210, https://doi.org/10.1175/JAMC-D-17-0235.1.10.1175/jamc-d-17-0235.1)| false Thurai, M., V. N. Bringi, L. D. Carey, P. Gatlin, E. Schultz, and W. A. Petersen, 2012: Estimating the accuracy of polarmetric radar-based retrievals of drop-size distribution parameters and rain rate: An application of error variance separation using radar-derived spatial correlations. J. Hydrometeor., 13, 1066–1079, https://doi.org/10.1175/JHM-D-11-070.1. Thurai, M., V. N. Bringi, L. D. Carey, P. Gatlin, E. Schultz, and W. A. Petersen, 2012: Estimating the accuracy of polarmetric radar-based retrievals of drop-size distribution parameters and rain rate: An application of error variance separation using radar-derived spatial correlations. J. Hydrometeor., 13, 1066–1079, https://doi.org/10.1175/JHM-D-11-070.1.10.1175/JHM-D-11-070.1)| false Tokay, A., and K. V. Beard, 1996: A field study of raindrop oscillations. Part I: Observation of size spectra and evaluation of oscillation causes. J. Appl. Meteor., 35, 1671–1687, https://doi.org/10.1175/1520-0450(1996)035<1671:AFSORO>2.0.CO;2. Tokay, A., and K. V. Beard, 1996: A field study of raindrop oscillations. Part I: Observation of size spectra and evaluation of oscillation causes. J. Appl. Meteor., 35, 1671–1687, https://doi.org/10.1175/1520-0450(1996)035<1671:AFSORO>2.0.CO;2.10.1175/1520-0450(1996)035<1671:AFSORO>2.0.CO;2)| false Tokay, A., and D. A. Short, 1996: Evidence from tropical raindrop spectra of the origin of rain from stratiform versus convective clouds. J. Appl. Meteor., 35, 355–371, https://doi.org/10.1175/1520-0450(1996)035<0355:EFTRSO>2.0.CO;2. Tokay, A., and D. A. Short, 1996: Evidence from tropical raindrop spectra of the origin of rain from stratiform versus convective clouds. J. Appl. Meteor., 35, 355–371, https://doi.org/10.1175/1520-0450(1996)035<0355:EFTRSO>2.0.CO;2.10.1175/1520-0450(1996)035<0355:EFTRSO>2.0.CO;2)| false Tokay, A., A. Kruger, W. F. Krajewski, P. A. Kucera, and A. J. Pereira Filho, 2002: Measurements of drop size distribution in the southwestern Amazon basin. J. Geophys. Res., 107, 8052, https://doi.org/10.1029/2001JD000355. Tokay, A., A. Kruger, W. F. Krajewski, P. A. Kucera, and A. J. Pereira Filho, 2002: Measurements of drop size distribution in the southwestern Amazon basin. J. Geophys. Res., 107, 8052, https://doi.org/10.1029/2001JD000355.10.1029/2001JD000355)| false Tokay, A., P. Hartmann, A. Battaglia, K. S. Gage, W. L. Clark, and C. R. Williams, 2009: A field study of reflectivity and Z–R relations using vertically pointing radars and disdrometers. J. Atmos. Oceanic Technol., 26, 1120–1134, https://doi.org/10.1175/2008JTECHA1163.1. Tokay, A., P. Hartmann, A. Battaglia, K. S. Gage, W. L. Clark, and C. R. Williams, 2009: A field study of reflectivity and Z–R relations using vertically pointing radars and disdrometers. J. Atmos. Oceanic Technol., 26, 1120–1134, https://doi.org/10.1175/2008JTECHA1163.1.10.1175/2008JTECHA1163.1)| false Tokay, A., W. A. Petersen, P. Gatlin, and M. Wingo, 2013: Comparison of raindrop size distribution measurements by collocated disdrometers. J. Atmos. Ocean. Technol., 30, 1672–1690, https://doi.org/10.1175/JTECH-D-12-00163.1. Tokay, A., W. A. Petersen, P. Gatlin, and M. Wingo, 2013: Comparison of raindrop size distribution measurements by collocated disdrometers. J. Atmos. Ocean. Technol., 30, 1672–1690, https://doi.org/10.1175/JTECH-D-12-00163.1.10.1175/JTECH-D-12-00163.1)| false Tokay, A., L. P. D'Adderio, D. B. Wolff, and W. A. Petersen, 2020: Development and evaluation of the raindrop size distribution parameters for the NASA Global Precipitation Measurement Mission ground validation program. J. Atmos. Oceanic Technol., 37, 115–128, https://doi.org/10.1175/JTECH-D-18-0071.1. Tokay, A., L. P. D'Adderio, D. B. Wolff, and W. A. Petersen, 2020: Development and evaluation of the raindrop size distribution parameters for the NASA Global Precipitation Measurement Mission ground validation program. J. Atmos. Oceanic Technol., 37, 115–128, https://doi.org/10.1175/JTECH-D-18-0071.1.10.1175/JTECH-D-18-0071.1)| false Ulbrich, C. W., 1983: Natural variations in the analytical form of the drop size distribution. J. Climate Appl. Meteor., 22, 1764–1775, https://doi.org/10.1175/1520-0450(1983)022<1764:NVITAF>2.0.CO;2. Ulbrich, C. W., 1983: Natural variations in the analytical form of the drop size distribution. J. Climate Appl. Meteor., 22, 1764–1775, https://doi.org/10.1175/1520-0450(1983)022<1764:NVITAF>2.0.CO;2.10.1175/1520-0450(1983)022<1764:NVITAF>2.0.CO;2)| false Wolff, D. B., D. A. Marks, and W. A. Petersen, 2015: General application of the relative calibration adjustment (RCA) technique for monitoring and correcting radar reflectivity calibration. J. Atmos. Oceanic Technol., 32, 496–506, https://doi.org/10.1175/JTECH-D-13-00185.1. Wolff, D. B., D. A. Marks, and W. A. Petersen, 2015: General application of the relative calibration adjustment (RCA) technique for monitoring and correcting radar reflectivity calibration. J. Atmos. Oceanic Technol., 32, 496–506, https://doi.org/10.1175/JTECH-D-13-00185.1.10.1175/JTECH-D-13-00185.1)| false Zagrodnik, J. P., L. A. McMurdie, and R. A. Houze Jr., 2018: Stratiform precipitation processes in cyclones passing over a coastal mountain range. J. Atmos. Sci., 75, 983–1004, https://doi.org/10.1175/JAS-D-17-0168.1. Zagrodnik, J. P., L. A. McMurdie, and R. A. Houze Jr., 2018: Stratiform precipitation processes in cyclones passing over a coastal mountain range. J. Atmos. Sci., 75, 983–1004, https://doi.org/10.1175/JAS-D-17-0168.1.10.1175/JAS-D-17-0168.1)| false Zeng, Y., U. Blahak, M. Neuper, and D. Jerger, 2014: Radar beam tracing methods based on atmospheric refractive index. J. Atmos. Oceanic Technol., 31, 2650–2670, https://doi.org/10.1175/JTECH-D-13-00152.1. Zeng, Y., U. Blahak, M. Neuper, and D. Jerger, 2014: Radar beam tracing methods based on atmospheric refractive index. J. Atmos. Oceanic Technol., 31, 2650–2670, https://doi.org/10.1175/JTECH-D-13-00152.1.10.1175/JTECH-D-13-00152.1)| false Zhang, G., J. Sun, and E. A. Brandes, 2006: Improving parameterization of rain microphysics with disdrometers and radar observations. J. Atmos. Sci., 63, 1273–1290, https://doi.org/10.1175/JAS3680.1. Zhang, G., J. Sun, and E. A. Brandes, 2006: Improving parameterization of rain microphysics with disdrometers and radar observations. J. Atmos. Sci., 63, 1273–1290, https://doi.org/10.1175/JAS3680.1.10.1175/JAS3680.1)| false Position of the 2DVDs with respect to NPOL radar during (a) IFloodS, (b) IPHEx, and (c) OLYMPEx. The 50- and 100-km rings of the NPOL radar are also shown. Cumulative distributions of (a) rain rate, (b) mass-weighted drop diameter, and (c) logarithmic normalized intercept parameter of three different 2DVD datasets. Scatter diagram of 2DVD-calculated and NPOL-measured ZH during (a) IFloodS, (b) IPHEx, and (c) OLYMPEx. The colors represent the specific 2DVD site during each field campaign. A 2D density plot of 2DVD-calculated and NPOL-measured ZH during (a) IFloodS, (b) IPHEx, and (c) OLYMPEx. As in Fig. 3, but for ZDR. Scatter diagram of 2DVD-calculated and NPOL-estimated Dmass during (a) IFloodS, (b) IPHEx, and (c) OLYMPEx. The colors represent the specific 2DVD site during each field campaign. A 2D density plot of 2DVD-calculated and NPOL-estimated Dmass during (a) IFloodS, (b) IPHEx, and (c) OLYMPEx. As in Fig. 7, but for log(NW). (a) Envelope of 2DVD-calculated ZH and ZDR. The 2DVD database is from the three field campaigns listed in Table 1. (b) A 2D density plot of 2DVD-calculated ZH and ZDR. (c) NPOL-measured ZH and ZDR fields outside the 2DVD ZH and ZDR envelope. Regimes and I and II denote high ZDR–low ZH fields and low ZDR–high ZH fields, respectively. (d) The ZH/ZDR matrix. The matrix consists of 60 ZH columns and 40 ZDR rows where ZH ranged from 0 to 60 dB with 1-dB bin width and ZDR ranged from 0 to 4 dB with 0.1-dB bin width. Regimes I and II are shaded in blue. Scatter diagram of 2DVD-calculated and NPOL-measured (a) ZH and (b) ZDR and 2DVD-calculated and NPOL-estimated (c) Dmass and (d) log(NW). Regimes I and II were marked with red and blue circles, respectively. Comparison of Raindrop Size Distribution between NASA's S-Band Polarimetric Radar and Two-Dimensional Video Disdrometers Ali Tokay1,2, Leo Pio D'Adderio3, David A. Marks4,5, Jason L. Pippitt2,4, David B. Wolff5, and Walter A. Petersen6 1 Joint Center for Earth Systems Technology, University of Maryland, Baltimore County, Baltimore, Maryland | 2 NASA Goddard Space Flight Center, Greenbelt, Maryland | 3 Department of Physics and Earth Science, University of Ferrara, Ferrara, Italy | 4 Science System Applications Inc., Lanham, Maryland | 5 NASA Goddard Space Flight Center, Wallops Flight Facility, Wallops Island, Virginia | 6 NASA Marshall Space Flight Center, Huntsville, Alabama Published-online: The Olympic Mountains Experiment (OLYMPEX) https://doi.org/10.1175/JAMC-D-18-0339.1 The ground-based-radar-derived raindrop size distribution (DSD) parameters—mass-weighted drop diameter D mass and normalized intercept parameter N W—are the sole resource for direct validation of the National Aeronautics and Space Administration (NASA) Global Precipitation Measurement (GPM) mission Core Observatory satellite-based retrieved DSD. Both D mass and N W are obtained from radar-measured reflectivity Z H and differential reflectivity Z DR through empirical relationships. This study uses existing relationships that were determined for the GPM ground validation (GV) program and directly compares the NASA S-band polarimetric radar (NPOL) observables of Z H and Z DR and derived D mass and N W with those calculated by two-dimensional video disdrometer (2DVD). The joint NPOL and 2DVD datasets were acquired during three GPM GV field campaigns conducted in eastern Iowa, southern Appalachia, and western Washington State. The comparative study quantifies the level of agreement for Z H, Z DR, D mass, and log(N W) at an optimum distance (15–40 km) from the radar as well as at distances greater than 60 km from radar and over mountainous terrain. Interestingly, roughly 10%–15% of the NPOL Z H–Z DR pairs were well outside the envelope of 2DVD-estimated Z H–Z DR pairs. The exclusion of these pairs improved the comparisons noticeably. This article is included in the Global Precipitation Measurement (GPM) special collection. Corresponding author: Ali Tokay, tokay@umbc.edu Keywords: Cloud microphysics; Hydrometeorology Estimation of the mass-weighted mean drop diameter Dmass to within ±0.5-mm accuracy from the Dual-Frequency Precipitation Radar (DPR) on board National Aeronautics and Space Administration (NASA) Global Precipitation Measurement (GPM) Core Observatory is one of the level 1 science requirements of the GPM mission (Skofronick-Jackson et al. 2017). The GPM DPR algorithm adopted a normalized gamma raindrop size distribution (DSD) defined by Dmass, the normalized intercept parameter NW, and the shape parameter μ (Seto et al. 2013). The shape parameter is assumed to be constant with μ = 2 for the combined radar–radiometer algorithm (Grecu et al. 2016) and μ = 3 for the DPR algorithm (Iguchi et al. 2017). The accuracy of the DPR-derived Dmass and NW is evaluated through direct comparison of ground-based radar products following volumetric footprint matching. The GPM ground validation team routinely processes a select subset of 70+ National Weather Service (NWS) dual-polarization radars as well as several research radars over the United States with an addition of several tropical and high-latitude oceanic sites for all GPM core satellite overpasses (Pippitt et al. 2015). This labor-intensive, quality-controlled dataset includes Dmass and NW and is produced using the Validation Network architecture (Schwaller and Morris 2011). The Dmass and NW are derived from dual-polarized radar measurements of horizontal reflectivity ZH and differential reflectivity ZDR through empirical Dmass(ZDR) and NW(ZH, Dmass) relationships. In turn, the empirical relationships are based on combined analysis of two-dimensional video disdrometer (2DVD) data obtained during six different GPM field campaigns (Tokay et al. 2020). From the perspective of ground validation traceability, it is important to evaluate the accuracy of the ground-based-radar-derived DSD. Historically, the radar-derived products are often evaluated through comparative studies with surface measurements, which are considered as a reference. For the radar rainfall estimate, there are numerous studies in the literature on quantitative analysis of radar-estimated and gauge-measured rainfall (Cifelli et al. 2011; Giangrande et al. 2014a). For radar-derived DSD, however, there are a limited number of studies where radar-estimated and disdrometer-measured DSD parameters have been compared (Brandes et al. 2004, hereinafter B04; Thurai et al. 2012, hereinafter T12). This is mainly due to the unavailability of such datasets; however, they have recently become more plentiful through NASA GPM and the U.S. Department of Energy Atmospheric Radiation Measurement Program's (Giangrande et al. 2014b) field studies. Both B04 and T12 were event-based studies in which a single 2DVD was 38 and 15 km from S- and C-band polarimetric radars, respectively. Both studies derived empirical relationships between radar observables of ZH and ZDR and constrained gamma DSD parameters of median volume diameter D0 and NW using simulated and disdrometer-based size distributions and prescribed drop shapes. Comparative studies are subject to measurement errors from both radars and disdrometers, as well as the time–height ambiguity and significant sampling volume differences. Measurement errors can be mitigated by calibrating radar and disdrometer while the time–height ambiguity depends on the characteristics of precipitation and the experimental setup. Both B04 and T12 selected relatively uniform stratiform events where the radar pixel was approximately 350 and 250 m above ground, respectively. B04 and T12 showed good agreement between radar-derived and disdrometer-calculated D0 and log(NW). A key to their success in estimating D0 and log(NW) was the good agreement between radar-measured and disdrometer-calculated ZH and ZDR. One of the main causes of the discrepancy between disdrometer- and radar-measured or disdrometer- and radar-derived parameters is the vertical variability of precipitation. As the distance between the disdrometer and radar measurement increases, the radar pulse volumes and the vertical variability of hydrometeors increases and becomes more complicated in the presence of mixed or frozen particles at the radar pixel height. The radar measurements are also vulnerable to surface clutter. Despite the error sources listed above, there is merit in quantifying the differences between disdrometer and radar measurements at various disdrometer-radar distances, different climate regimes, and various weather systems. Comparative studies provide a realistic range of differences between the two platforms for measured and derived parameters. This study is dedicated exclusively to the quantification of observed differences in DSD parameters between radar and disdrometer platforms. The dataset used in this study had several diverse features. The precipitation systems were originated both over the land and over the ocean. Both frontal and orographic lifting initiated the precipitation formation. Airmass thunderstorms and mesoscale convective systems provided abundant precipitation. The rest of the paper is organized as follows: Section 2 summarizes the database used in this study. Section 3 describes the mathematical form of the relationships between the DSD parameters of Dmass and NW and dual-polarization radar observables of ZH and ZDR with the derivation methods using disdrometer datasets. Section 4 presents a comparative study of the disdrometer-calculated and radar-measured radar parameters of ZH and ZDR as well as disdrometer-calculated and radar-estimated Dmass and NW. A dedicated section 4c describes the fraction of the radar-based ZH and ZDR pairs that were outside the envelope of the disdrometer observations. Conclusions are presented in section 5. The database was constructed from coincident NASA's S-band polarimetic radar (NPOL) and 2DVD observations during three GPM ground validation (GV) field campaigns: the Iowa Flood Studies (IFloodS), the Integrated Precipitation and Hydrology Experiment (IPHEx), and the Olympic Mountain Experiment (OLYMPEx). Figure 1 depicts the position of the 2DVDs with respect to the NPOL during these field campaigns, and Table 1 lists the location and duration of the field campaigns as well as the number of 2DVDs and their sampling size. Citation: Journal of Applied Meteorology and Climatology 59, 3; 10.1175/JAMC-D-18-0339.1 List of the field campaigns, their coordinates as based on the NPOL site, the duration of database, and the number of 2DVD sites and matched sample size between 2DVD and NPOL. The sample size after adopting a 0.5 ≤ Dmass ≤ 4.0 mm interval is also given in parentheses. Considering the NPOL database, ZDR was calibrated by vertical profiles of natural precipitation targets (Gorgucci et al. 1999). Absolute ZH calibration was then determined via self-consistency of the polarimetric variables (Ryzhkov et al. 2005) and the stability of the calibration was monitored using the relative calibration adjustment (Silberstein et al. 2008; Wolff et al. 2015). After labor-intensive quality control of NPOL data for ground clutter and nonmeteorological echo removal and subsequent calibration (Pippitt et al. 2015), the radar data were ready for analyses. Nine radar pixels, one directly above the 2DVDs and eight neighboring pixels, were identified and extracted for this study. It should be noted that it is not feasible to totally avoid ground clutter, especially when it is embedded with meteorological echo. In these cases, clutter cannot be completely removed because high quality control thresholds would remove too much real echo. In addition, higher radar elevation beams can intersect the bright band, especially at far distances. For this study, the comparison of radar observables of ZH and ZDR and derived DSD parameters of Dmass and log(NW) are shown for NPOL gates directly above the 2DVDs. A comparative study using the neighboring eight radar pixels did not significantly alter the findings of this study. Considering the 2DVD database, a "rain" threshold was considered as the occurrence of a minimum of 10 drops and minimum rain rate of 0.01 mm h−1 in 1-min observations. For this study, the average DSD is calculated for three consecutive rainy minutes centered at the radar scan time. A study using 5-, 7-, and 9-min DSD average did not significantly alter the findings of this study. Very light rain was eliminated from the coincident dataset by setting a ZH threshold of 5 dB to both the NPOL and 2DVD datasets. The ZDR was also bounded by a maximum of 4 dB to be consistent with the conditions of the derived Dmass(ZDR) relationship. The initial sample sizes that were given in Table 1 reflect the coincident database after the ZH and ZDR thresholds were applied. The Dmass(ZDR) relationship has an additional bound on Dmass as being greater than 0.5 mm and less than 4.0 mm. The resultant samples after these additional thresholds on Dmass were applied to the comparison of DSD parameters and the resultant sample sizes are shown in Table 1 in parenthesis. In the presence of abundant rainfall and six 2DVD units, IFloodS provided a richer sample of coincident datasets with respect to the other two experiments. During OLYMPEx, rain was also abundant (Zagrodnik et al. 2018) but the coincident sample size was substantially lower with the availability of only three 2DVD units. Despite the fact that five 2DVD units were available during IPHEx, sample sizes were limited as a result of the fewer rain events than during IFloodS and OLYMPEx. Cumulative distributions of rain rate (RR), Dmass, and log(NW) showed the diverse nature of rainfall between the three field campaigns (Fig. 2). Light rain (RR < 1 mm h−1) occurred the most during IFloodS, while heavy rain (RR ≥ 10 mm h−1) was most frequently observed during IPHEx (Fig. 2a). The mean RR was substantially higher during IPHEx, while median and maximum RR were distinctly lower during IFloodS and OLYMPEx, respectively (Table 2). These statistics were based on the 3-min-average 2DVD RR that coincides with the radar scan time. The datasets were diverse in terms of population of small (D < 1 mm), midsize (1 ≤ D < 3mm), and large (D ≥ 3 mm) drops. The OLYMPEx dataset consists of mostly small–midsize raindrops resulting in the highest occurrence of Dmass < 1.2 mm and log(NW) ≥ 3.5 (Figs. 2b,c). For the purpose of this study, we considered Dmass of 1.2 mm as a characteristic size such that the DSD samples dominated by small drops have Dmass < 1.2 mm. Similarly, log(NW) of 3.5 is the characteristic value above which represents the samples with abundant number of raindrops. Both Dmass and log(NW) characteristic values are subjective and are determined through examining the cumulative distributions of these parameters from six different field studies (Tokay et al. 2020). IPHEx had substantially more samples at 1.2 ≤ Dmass < 2.1 mm range and IFloodS had the highest number of samples at log(NW) < 3.5 among the three field campaigns. The lowest mean and median Dmass and the highest mean and median log(NW) were also observed during OLYMPEx. The similarities in the distribution of rain rate and diversities in the distribution of DSD parameters between the IFloodS and OLYMPEx demonstrate the common observation that the similar rain rates can result from completely different contributions of small, medium, and large drops. This was emphasized when rainfall from convective and stratiform clouds was examined in tropical systems (Tokay and Short 1996; Thompson et al. 2015). Mean, median, and maximum of rain rate R, mass-weighted drop diameter Dmass, and logarithmic normalized intercept parameter log(NW) for three different 2DVD datasets that were used in this study. Bias and absolute bias between NPOL and 2DVD parameters are considered as the two statistics to quantify the results for the comparative study. Bias is the difference between estimated variable X and reference variable Y and therefore is also referred to as relative error. In this study, the 2DVD was considered as the reference instrument and the parameters of interest are ZH, ZDR, Dmass, and log(NW). Bias is defined as bias=1N∑i=1N⁡(Xi−Yi). (1) Absolute bias (often referred to as mean absolute error) is the absolute value of the difference between the estimated and reference variables: absolute bias=1N∑i=1N|Xi−Yi|. (2) Between the two statistics, absolute bias is more reliable for evaluating the level of agreement between the two variables. Considering paired samples on both sides of the 1:1 line, bias could be near zero but absolute bias would be significant if the samples are not near the 1:1 line. Reflectivities ZH and ZDR were measured by NPOL and were calculated from size and fall velocity measurements of the 2DVD. Although 2DVD was also capable of measuring drop axis ratios, this study used the laboratory-based observed axis ratios following Andsager et al. (1999) for drops up to 6 mm and equilibrium drop shapes (Beard and Chuang 1987) for drops larger than 6 mm; ZH and ZDR were derived for S-band wavelength (NPOL's operational frequency) following Rayleigh–Gans theory (Tokay et al. 2002). The ZDR is the ratio of reflectivity at horizontal polarization ZH to reflectivity at vertical polarization ZV. The reflectivity at horizontal and vertical polarization is expressed as a function of wavelength λ, dielectric constant of water |Kwater|2, and shape factors SH,V as follows: ZH,V=λ4π5|Kwater|2∫DminDmaxSH,V⁡(D,r)D6N⁡(D) dD, (3) where the shape factors are a function of drop axis ratio r. Drop diameter Dmass is the ratio of the fourth moment to the third moment of size distribution and is expressed in millimeters. It is calculated from 2DVD size and fall velocity measurements as Dmass=∫DminDmaxD4N⁡(D) dD∫DminDmaxD3N⁡(D) dD. (4) The Dmass is also calculated from NPOL ZDR measurements through a third-order polynominal as Dmass=aZDR3+bZDR2+cZDR+d, (5) where ZDR is in decibels and the a, b, c, and d coefficients are derived from 2DVD datasets for each field campaign (Table 3). Since the 2DVD datasets in each field campaign may not have sufficient sample size at high ZDR intervals, a generic Dmass(ZDR) relationship was derived combining all available 2DVD datasets from six different field campaigns to determine Dmass at these ranges. The three additional 2DVD datasets that are not used in this study were collected during the Midlatitude Continental Convective Clouds Experiment in northern Oklahoma, and long-term (more than a year) field studies at the NASA Goddard Space Flight Center Wallops Flight Facility in Wallops Island, Virginia, and the NASA Marshall Space Flight Center in Huntsville, Alabama (Tokay et al. 2020). The coefficients of the Dmass–ZDR relationship and the maximum ZDR range for the three different 2DVD datasets and the combined dataset, which includes three additional field campaigns. Parameter NW is the normalized intercept parameter and is expressed as a function of Dmass in millimeters and liquid water content W in grams per meter cubed, both of which are calculated from 2DVD size and fall velocity measurements. The formulation includes density of water ρw in grams per centimeter cubed and several constants that are related to the complete gamma function solution of Dmass and W (Testud et al. 2001): NW=44103WπρwDmass4; (6) NW is analogous to the intercept parameter of the gamma size distribution (Ulbrich 1983) and is therefore sensitive to the number of drops. It has a wide numerical range covering over four orders of magnitude and is therefore expressed in logarithmic units log(NW) rather than its linear dimension (m−3 mm−1). Parameter NW is also retrieved from measured NPOL ZH and ZDR after Dmass is calculated from Eq. (5). The empirical equation is derived combining 2DVD database from six different field campaigns (Tokay et al. 2020) and is given as NW=aZHDmassb, (7) where Dmass is in millimeters, ZH is in linear units (mm6 m−3), and a and b are 35.3 and −7.2, respectively. The coefficient a and exponent b were indistinguishable among the six different field campaigns. Reflectivity ZDR is sensitive to the drop shape, which is spherical for the drops of less than 1 mm (Tokay and Beard 1996). The radar measurements of ZDR are noisy in the presence of abundant small drops and absence of large drops. Using the formulation in Eqs. (5) and (7), when ZDR is 0.1 dB, Dmass can still be 0.5 mm or higher but log(NW) is greater than 6 at 30 dBZ. The 2DVD observations show that this is an unrealistic DSD (Table 2). The uncertainty in estimating log(NW) was mitigated by setting realistic log(NW) thresholds between 0.5 and 6. The level of agreement between NPOL-measured and 2DVD-calculated ZH and ZDR is related to the agreement between NPOL-derived and 2DVD-calculated Dmass and NW. Midsize to large drops are the main contributors to the ZH (Adirosi et al. 2015) and because of its power-weighted nature, ZDR is very sensitive to the presence of a few large drops that have the lowest axis ratios (Tokay et al. 2020). The presence or absence of a few large drops could therefore result in noticeably different 2DVD-calculated ZH and ZDR values. Both parameters are therefore heavily affected by the differences in sampling volumes of NPOL and 2DVD. The sampling volume of NWS operational radars can exceed that of the 2DVD by a factor of 107 or more at a distance of 30 km (Cao et al. 2008). The disdrometer sampling volume is a multiplicative function of sampling cross section, fall velocity that corresponds to the characteristic size, and sampling interval (Campos and Zawadzki 2000). The cross section of the 2DVD is nominally 0.01 m2, and the integration period was 180 s in this study. If mean or median drop size is the characteristic size, the sampling size is less than 15 m3 among the three field campaigns. If maximum drop size is the characteristic size, the sampling volume is less than 18 m3. The sampling volume of the radar depends on the beamwidth, range gate size, and the distance from radar. The beamwidth of NPOL was 0.98° in all three field campaigns, and the range gate was 150 m during IFloodS and 125 m during IPHEx and OLYMPEx. Table 4 lists the 2DVD-NPOL distances as well as NPOL elevation angles and beam heights. For IFloodS, the NPOL sampling volume is 3 378 908 m3 at its closest distance of 5 km and 1 550 794 368 m3 at its farthest distance of 106 km. The NPOL sampling volumes were within this range for the other two field campaigns. The differences in sampling volume ranged from 105 to 107 orders of magnitude at distances from 5 to 106 km from the radar. The beam heights were calculated on the basis of a 4/3 Earth radius model under standard atmospheric conditions. The possible pitfalls of this model were presented by Zeng et al. (2014) and are beyond the scope of this study. For the sites that are located at higher elevations than the NPOL, the distance of the beam height to the ground is less than what was reported in Table 4. During IPHEX, the farthest three sites (SN36, SN37, and SN38) were 380, 732, and 1072 m higher elevation than the NPOL. NPOL elevation angle based on first (label 1st) or second (label 2nd) elevation, beam height at the 2DVD sites, and NPOL–2DVD distance during IFloodS, IPHEx, and OLYMPEx. The time–height ambiguity is another source of disagreement between disdrometer and radar measurements. The vertical variability of the DSD results in a nonuniform profile of ZH and ZDR between the altitude of the radar scan and the ground. For fast moving storms, there is a time lag between the radar scan time and disdrometer observations especially at far distances. These factors are best investigated through collocated vertically pointing radars and disdrometers (Tokay et al. 2009). Because NPOL is a transportable facility and not situated on a tower (the antenna feed horn is ~8 m above ground level at an elevation angle of 0°), the first elevation angle is often subject to ground clutter. The second elevation is therefore selected to compare 2DVD and NPOL variables except at the farthest distances during IFloodS and OLYMPEx. It should also be added that no corrections for height-dependent drop fall-speed time lags or vertical wind shear/direction impacts on drop trajectories were applied. Based on the environmental conditions, the bright band was not a factor for this study. Good agreement was evident between 2DVD-calculated and NPOL-measured ZH. During IFloodS, the NPOL bias relative to the 2DVD observations ranged from as high as −1.48 dB to +0.50 dB (Table 5). Note that the negative bias shows the underestimation of the NPOL variable while the overestimation of the NPOL variable is depicted with a positive bias. The absolute bias increased with range, spanning values from 3.28 dB at 15 km to 4.66 dB at 69 km range, but was lower at the farthest distance where the vertical distance between the NPOL pixel and 2DVD was less than the closer sites because of the use of first elevation angle (Table 4). While there was large scatter around the 1:1 line (Fig. 3a), the majority of the observations were aligned along the 1:1 line (Fig. 4a). Several outliers are visible in the figures. Among those, a couple of outliers at the SN37 site had ZH of 2DVD that was higher than 50 dB and ZH of NPOL that was less than 20 dB (Fig. 3a). Comparison of 2DVD-calculated and NPOL-measured ZH (dBZ) during IFloodS, IPHEx, and OLYMPEx. Considering ZH of 2DVD as a reference, bias and absolute bias are presented at each 2DVD site for each field campaign. The sample sizes are also given. During IPHEx, the NPOL underestimated ZH with noticeably high biases of −2.73 and −2.33 dB at the two farthest sites (SN37 and SN38) at ranges greater than 100 km and in higher terrain. The corresponding absolute biases in these two sites, 6.80 and 7.10 dB, were the highest among three field campaigns. A relatively small sample of high ZH in the 2DVD resulted in this high bias and they were not event specific (Fig. 3b). Among those, one sample at SN37 had ZH of 2DVD that was higher than 50 dB and ZH of NPOL that was less than 20 dB. These samples were not visible in the frequency diagram where most of the observations lay on the 1:1 line (Fig. 4b). This demonstrates the importance of both scatter and 2D density diagrams. During OLYMPEx, the NPOL overestimated ZH for all three sites but the bias at the farthest site (SN38) was at least one-half of its value of the closest two sites (SN35 and SN36) (Table 5). The absolute bias increased from 3.70 to 4.39 dB between the closest two distances but was 3.96 dB at the farthest distance. The NPOL beam height was 145 m lower at the SN38 site than at the SN35 site because of the differences in elevation angles (Table 4). The SN38 site was also only 8.4 km farther from NPOL than the SN36 site. Important was that the majority of the observations were aligned with the 1:1 line (Fig. 4c) and the scatter about the 1:1 line was considerably less pronounced, with relatively fewer outliers than the other two field campaigns. Two of the outliers at the SN35 site had ZH of 2DVD that was less than 10 dB and ZH of NPOL that was around 35 dB (Fig. 3c). There were considerable differences between 2DVD-calculated and NPOL-measured ZDR. The ZDR biases were positive, indicating an overestimation by NPOL relative to the 2DVD, at all sites during all three field campaigns, but were drastically different in magnitude between the sites (Table 6). The ZDR bias at its closest 2DVD-NPOL distance was the highest, 0.6 dB, among all sites during IFloodS. The rest of the five sites had low ZDR bias (<±0.1 dB). The high bias at the closest site was attributed to surface clutter, which also played a role at the closest 2DVD-NPOL distance during IPHEx. Both sites were less than 10 km of distance from NPOL in respective field campaigns. High ZDR biases were also present at the two farthest sites, which were located at higher elevation, during IPHEx. High biases were mainly driven by the samples of NPOL ZDR that were greater than 2 dB and 2DVD ZDR that were less than 0.5 dB (Fig. 5). The wide scatter on both side of the 1:1 line, on the other hand, reflected the combination of low bias (<0.1 dB) and considerably higher absolute bias (0.27–0.35 dB) in ZDR at total of eight sites in three field campaigns (Figs. 5 and 6). This highlights that the low bias itself can mislead for the evaluation of the level of agreement. Comparison of 2DVD-calculated and NPOL-measured ZDR (dB) during IFloodS, IPHEx, and OLYMPEx. Considering ZDR of 2DVD as a reference, bias and absolute bias are presented at each 2DVD site for each field campaign. NPOL-based Dmass is derived from ZDR and the comparison of Dmass between 2DVD and NPOL had similar statistics as for ZDR. The Dmass bias was very high—0.32 mm—at the closest NPOL–2DVD distance and was low (≤0.05 mm) for the other five sites during IFloodS (Table 7). The Dmass biases were also low at all sites except for the two farthest sites (SN37, SN38) where time–height ambiguity was significant during IPHEx. The differences in beam height played a role in determining the Dmass bias. During OLYMPEx, Dmass bias was very low at SN35 site but the absolute biases in Dmass were about the same at SN35 and SN38 sites. Although SN38 site was farthest away from NPOL, the radar beam height was the closest to the ground since the first rather than the second beam was used at SN38 site in this study (Table 4). The absolute bias in Dmass remained less than 0.4 mm at the sites where biases were equal to or less than 0.1 mm during the three field campaigns. The absolute bias in Dmass was as high as 0.62 mm at the SN37 site during IPHEx where bias was also the highest—0.34 mm—among the field campaigns. The positive bias in Dmass indicates that the mass-weighted size spectrum is shifted toward smaller sizes in 2DVD. This means that the normalized size spectrum will have more small drops and/or a lack of large drops, resulting in lower Dmass. Comparison of 2DVD-calculated and NPOL-estimated Dmass (mm) during IFloodS, IPHEx, and OLYMPEx. Considering Dmass of 2DVD as a reference, bias and absolute bias are presented at each 2DVD site for each field campaign. The sample sizes are also given. On closer examination, the scatter and 2D density diagrams of 2DVD-calculated and NPOL-estimated Dmass revealed wide scatter from 1:1 line especially during IFloodS (Fig. 7). At the same time, a majority of the observations aligned on the 1:1 line during IFloodS, while they diverge from the 1:1 line biased toward NPOL and 2DVD Dmass during IPHEx, and OLYMPEx, respectively (Fig. 8). There were no site-specific outliers in each field campaign except a small cluster of outliers were visible at NPOL-estimated Dmass that are greater than 3 mm during OLYMPEx (Fig. 7c). The scatter diagram also showed five samples of 2DVD-calculated Dmass that were larger than 3.6 mm during IFloodS (Fig. 7a). These samples were underestimated by NPOL with no range dependency. NW is a function of both ZH and Dmass and the log(NW) statistics followed somewhat similar trends as Dmass. Absolute biases of log(NW) were less than 1 except the nearest 2DVD site (SN25) during IFloodS, the farthest two sites (SN37 and SN38) during IPHEx and the middle site (SN36) during OLYMPEx (Table 8). The log(NW) bias was near 0.6 and negative at the nearest site where ground clutter was the factor during IFloodS. The negative and high biases were also present at two farthest sites during IPHEx. The biases were relatively low during OLYMPEx where the highest bias—0.27—was at the closest site (SN35). NW is related to the peak of the number of drops per given volume per size interval and the drop counts per volume typically decreases with size. The negative bias therefore indicates fewer drops per volume in NPOL and the vice versa is true for positive bias. Comparison of 2DVD-calculated and NPOL-estimated log(NW) during IFloodS, IPHEx, and OLYMPEx. Considering log(NW) of 2DVD as a reference, bias and absolute bias are presented at each 2DVD site for each field campaign. The order of magnitude of log(NW) was substantially higher and was at the limits of the GPM GV DSD retrieval algorithm for NPOL-derived log(NW). The vast majority of the 2DVD observations, on the other hand, were within values log(NW) of 2–4.5 (Figs. 9 and 10). Following Eq. (7), high ZH and low Dmass results in high log(NW). The unlikely combination of ZH of 45 dB and Dmass of 1.4 mm, for instance, corresponds to log(NW) of 5. The combination of ZH of 30 dB and Dmass of 3.1 mm, on the other hand, results in log(NW) of 1. Although these pairs do not exist in the 2DVD database, they exist in the NPOL database since Dmass is the derived quantity. It is therefore expected that the estimation of log(NW) is poorer than the estimation of Dmass. Fig. 10. The diagram of ZH/ZDR fields, which have been previously used for determining hail by radar (Aydin et al. 1986), precipitation segments (e.g., stratiform rain vs thunderstorm core), and precipitation type (e.g., continental vs tropical) by disdrometer (Zhang et al. 2006; Kumjian 2013), shows the major differences in radar and disdrometer observations. Cao et al. (2008) who overlaid 2DVD and dual-polarization-radar-based ZH/ZDR fields, marked the high ZDR region observed by radar only. This region is attributed to the leading edge of convection with large drops and relatively low drop concentrations. As noted by Kumjian (2013), ZDR varies with drop size and shape and a few large drops can result in very high ZDR values (>2.5 dB). ZH, on the other hand, is directly proportional to the particle concentration and may have moderate values (25–30 dB). Given the fact that the sample volume of the disdrometers is much smaller than the radar, the relatively infrequent big drops may not be caught by the disdrometer. The 2DVD observations from three field sites were merged to determine the boundaries of the envelope of the ZH/ZDR field (Fig. 11a). The envelope was wide in both ZH and ZDR space. At ZH of 40 dB, ZDR ranged from 0.3 to 3.8 dB. Similarly, at ZDR of 1 dB, ZH ranged from 15 to 50 dB. The majority of the observations fell in much narrower range centering at ZH of 20 dB and ZDR of 0.2 dB (Fig. 11b). The NPOL ZH/ZDR observations outside the 2DVD ZH/ZDR envelope mostly occurred at moderate-to-high ZDR and low-to-moderate ZH regime (Regime I) (Fig. 11c). The IPHEx radar data had the highest percentage, 15%, of observations with respect to IFloodS and OLYMPEx in this regime (Table 9). The low ZDR and high ZH regime (Regime II), on the other hand, had 2% or less of the observations in a given field campaign. None of the two regimes corresponded to a particular segment of the storms. There was no correlation between the leading edge of the convective events and Regime I as previously reported by Cao et al. (2008). Comparison of 2DVD-calculated and NPOL-measured/estimated ZH, ZDR, Dmass, and log(NW) before and after removal of the ZH–ZDR pairs outside the 2DVD ZH–ZDR envelope during IFloodS, IPHEx, and OLYMPEx. The bias and absolute bias statistics are given before (italics) and after (boldface) the removal of Regime I and II clusters. The reduction in sample size and its partitioning after removal of Regime I and II are also given. The combined Regimes I and II consist of 15% of the observations during IPHEx, 5% and 5.5% higher than the OLYMPEx and IFloodS, respectively. The recalculated bias and absolute bias after eliminating observations in these two regimes was noticeably less for ZDR and log(NW) and marginally less for ZH and Dmass (Table 9). The reduction in absolute bias was 0.35 and 0.12 dB for ZH and ZDR and 0.05 mm and 0.14 for Dmass, and log(NW), respectively, during IPHEx. The majority of the Regime-I samples occurred with ZH of less than 30 dB, with a slight bias toward the 2DVD observations (Fig. 12a). The Regime-II samples occurred with ZH of higher than 30 dB, with no significant bias. The observations for Regimes I and II were very distinct in ZDR (Fig. 12b). Almost all of the Regime-I observations occurred in a narrow zone where ZDR-2DVD was less than 0.6 dB and ZDR-NPOL was above 0.2 dB. The Regime-II observations, on the other hand, were mainly observed at ZDR-NPOL less than 0.4 dB and ZDR-2DVD less than 1 dB. Regime I corresponded to the overestimation of Dmass and underestimation of log(NW) by NPOL, and the vice versa is true for Regime II (Figs. 12c,d). Observations for both Regime I and Regime II fell into the envelope of the rest of the observations in Dmass but were at the edge of the observations in log(NW). The reduction of dynamic range of NPOL-estimated log(NW) resulting from the absence of Regime I was significant. A key question relates to the origin of Regimes I and II in NPOL observations. The 2DVD is widely used as a reference instrument for DSD measurements (Tokay et al. 2013). The underestimation of small drops has been recognized and recently investigated through field studies where 2DVD was collocated with a Meteorological Particle Spectrometer (Thurai and Bringi 2018). In this study, we tested three DSDs that had abundant small drops and maximum drop diameter of 2.9 mm or less. These DSDs had ZDR of 0.43–0.55 dB, very similar to Regime-II ZDR values. The corresponding ZH ranged between 29.1 and 35.7 dB. Considering that 0.9 mm is the smallest drop size where 2DVD has the correct drop number counts, we reassigned drop concentration for the first size bins, 0.1–0.7 mm, extending the slope of the distribution such that the modified DSDs had essentially an exponential distribution. While total concentration drastically increased before and after the modified DSD, the increase in ZH was less than 0.1 dB. This exercise showed that Regime II was not related to underestimation of small drops by 2DVD. Given the fact that the radar samples much greater volume than the disdrometer, it is feasible that the disdrometer may not sample less-frequent large drops. We artificially added a single drop at 1-, 2-, and 3-mm diameter larger than the observed Dmax of the three samples mentioned above. The presence of the additional drop enhanced ZH and ZDR as much as 6 and 2.3 dB, respectively, but it did not cross over to Regime I or II. It was also evident that NPOL observations in Regimes I and II were present regardless of 2DVD site distance to radar throughout field campaigns. Since this study was based on NPOL measurements, we questioned whether Regimes I and II exist in operational radars. Indeed, Regime I and Regime II do exist in NWS dual-polarization radars. To differentiate these unrealistic DSDs in radar observations, a matrix of ZH/ZDR was created following Fig. 11c and is shown in Fig. 11d. This study was motivated by the fact that the dual-polarization radar-based NW and Dmass are required products for the validation of GPM DPR NW and Dmass estimates. More specifically, the evaluation of the ground-radar-based Dmass is a requirement for the GPM GV program because it is a NASA level 1 science requirement for the GPM mission. Algorithm developers seek information on possible shortcomings of both ground- and spaceborne radar DSD estimates. A comparative study of radar-measured and disdrometer-calculated ZH and ZDR is the basis but is also a difficult task for evaluating radar-derived DSD parameters. Previous studies carefully selected and examined the agreement between disdrometer/radar ZH and ZDR pairs at optimum radar-disdrometer distance (15–40 km at S-band) (B04; T12), which is shorter for higher-frequency radars. This study included one or two optimum sites in each field campaign, but the ground clutter was a factor at the lowest elevation angle due to the site of NPOL antenna at the top of the container rather than on a tower. Using the second-lowest elevation, the NPOL beam height was 369 m above the ground at a distance of 15.2 km. This is comparable to the previous studies as being the best-case scenario. For most of the field studies including radar-estimated and gauge-measured rainfall comparative studies (Giangrande and Ryzhkov 2008; Cunha et al. 2013), the logistics did not allow deployment of the in situ devices near the radar site. Having the 2DVDs at various ranges from the NPOL radar (Fig. 1) enabled this study to quantify the level of agreement with distance. As the best-case scenario, the absolute biases of ZH and ZDR were relatively low, ranging from 3.3 to 3.7 and from 0.27 to 0.32 dB, respectively at the shortest distance (15–20 km from the radar) in the absence of surface clutter for the three field campaigns. The corresponding absolute biases of Dmass and log(NW) were 0.31–0.36 mm and 0.34–0.98, respectively. The absolute bias in ZH increased with distance but was relatively low at the farthest distance during IFloodS and OLYMPEx where the first elevation rather than the second elevation was used for the comparative study. Specifically, the absolute biases of ZH were about the same at 47.4 and 106.1 km distances from radar but the difference in the NPOL beam height was only 129 m because of the choice of first versus second elevation angles during IFloodS. This highlights the importance of time–height ambiguity. During IPHEx, the absolute biases of ZH were higher at a given distance than during the other two field campaigns. This could be result of higher occurrence of heavy rain where size sorting is significant. Two of the 2DVDs (SN37 and SN38) were deployed in mountainous terrain to determine the role of orography in DSD characteristics. These two 2DVDs were over 100 km from NPOL with radar beam height 3.2 and 2.5 km above the ground after accounting the height difference between NPOL and the two sites. Considering the greater time–height ambiguity and greater difference in sampling volumes between 2DVD and NPOL observations, the agreement in ZH was poor at these two sites and they do not serve as a validation site for evaluating dual-polarization radar DSD retrieval algorithm. A closer look at the NPOL-measured and 2DVD-calculated ZH and ZDR fields revealed two regimes. These regimes coincided with either under or overestimated NPOL-derived log(NW). The combined Regimes I and II covered a considerable amount of the total observation, 9%–15%, of the coincident NPOL/2DVD database. When these regimes were removed from the database, the absolute biases were noticeably reduced for ZH, ZDR, Dmass, and log(NW). The 2DVD, a reference instrument, underestimates the concentration of small drops (Thurai and Bringi 2018) but the addition of small drops does not correspond to either Regime I or Regime II. The implication of these nonrealistic DSD in NPOL observations could be significant for radar rainfall estimation. Hydrologists rely on radar rainfall estimates for flood forecasting and the majority of the comparative studies use rain gauges as a reference (Cunha et al. 2013). The accuracy of ZH/ZDR couples should therefore independently be evaluated prior to radar rainfall estimation. The envelope of ZH/ZDR presented here could be used a reference in these studies. Reflectivities ZH and ZDR are vital radar measurements for radar rainfall mapping. The study presented here showed the presence of surface clutter at radar distances of less than 15 km even after labor-intensive radar quality control. The quality control had to be relaxed; otherwise true precipitation would be removed along with the clutter. The best agreement between point 2DVD and areal NPOL ZH and ZDR was mostly at the second elevation of the radar except for the farthest sites during IFloodS and OLYMPEx. These factors play an important role in radar rainfall and DSD parameter mapping, both of which are used to direct comparison with the GPM satellite estimates. There are parallel efforts in comparing ground-based and DPR-based rainfall (Petracca et al. 2018) and DSD parameters over Italy and the United States (D'Adderio et al. 2018; Petersen et al. 2020). One significant aspect of the comparison process is the careful DPR to ground-based geometric volume matching that has been implemented in the Validation Network software. The similar measurement type (radar) and closer spatial and temporal scales matched (Schwaller and Morris 2011) combined with an intrinsically large number of coincident samples should help to firmly establish (in a statistical sense) the degree to which the space-based estimates of the DSD converge with ground-based estimates toward demonstrating attainment of GPM level 1 science requirements that pertain to the DSD. Discussions with Robert Meneghini of NASA Goddard Space Flight Center were very helpful. Special thanks are given to the 2DVD and NPOL engineers, technicians, and scientists who participated in GPM field campaigns. This paper was funded under NASA Precipitation Measuring Mission NNX16AD45G led by Ramesh Kakar and, subsequently, Gail Skofronick-Jackson of NASA Headquarters. Authors Petersen and Wolff acknowledge support from the NASA component of GPM and the NASA PMM Programs. https://journals.ametsoc.org/view/journals/apme/59/3/jamc-d-18-0339.1.xml
RedPajamaCommonCrawl_-520332237135274410
Slimpajama627bTrain/chunk1
Q: How can I make a rails authors resource a devise user? I have setup a rails application with devise on it so users can register and login and they can add posts and other resources based on their roles(Admin,Teacher,Author,Pupil). Admin as access to everything and I am using gem 'cancan' for roles. if user.role if user.role.name == "Admin" can :manage, :all elsif user.role.name == "Teacher" can :manage, [Book, Story] can :read, [Book, Author, Story] elsif user.role.name == "Author" can :manage, [Book, Author] can :read, [Book, Author, Story] elsif user.role.name == "Pupil" can :manage, [Story] can :read, [Book, Author, Story] elsif user can :read, :all end else can :read, :all end Currently Authors are just added to a book when you create the book. In the backend you just add authors as many as you like and then assign that to a book. If your an admin you can edit authors details and if your an author you can edit your own profile area in your author resource but there is no login for an author to do this at all. What I want to know is: Is it easy to create a devise user type like author from authors already added to the backend or will they need to be created all over again? === Edit below here ==== user.rb class User < ActiveRecord::Base belongs_to :role def confirmation_required? false end # Include default devise modules. Others available are: # :confirmable, :lockable, :timeoutable and :omniauthable devise :database_authenticatable, :registerable, :recoverable, :rememberable, :trackable, :validatable, :confirmable has_attached_file :avatar, styles: { large: "600x450#", medium: "250x250#", small: "100x100#" }, :default_url => "/images/:style/filler.png" #validates_attachment_content_type :avatar, :content_type => ["image/jpg", "image/jpeg", "image/png", "image/gif"] validates_attachment_content_type :avatar, :content_type => /\Aimage\/.*\Z/ validates :avatar, :email, :username, :password, presence: true end role.rb class Role < ActiveRecord::Base has_many :users end author.rb class Author < ActiveRecord::Base has_many :books, dependent: :destroy has_many :ideas, dependent: :destroy accepts_nested_attributes_for :books accepts_nested_attributes_for :ideas validates_uniqueness_of :name has_attached_file :avatar, :styles => { :large => "980x760", :medium => "300x300>", :thumb => "100x100>" }, :default_url => "/images/:style/missing.png" validates_attachment_content_type :avatar, :content_type => /\Aimage\/.*\Z/ end Thanks Mark A: You don't need to create separate model(Author) just to handle author logins. Better approach will be using associations in this case. #user_role.rb class UserRole < ActiveRecord::Base has_many :users end #user.rb Class User < ActiveRecord::Base belongs_to :user_role end Typical user model attributes will be User(id: integer, email: string, name:string, user_role_id:integer) user_role model attributes will be UserRole(id: integer, role: string) UserRole.create(role: 'Admin') UserRole.create(role: 'Teacher') UserRole.create(role: 'Author') UserRole.create(role: 'Pupil') then create your author( Let's assume the id for 'Author' role is 3) user = User.create(name: 'abc', email: 'def@gmail.com', user_role_id: 3) now, use this user object and go for devise login. Now to list all the authors of our Application. #user.rb def self.all_authors User.select('users.id, users.name, user_roles.role AS USER_ROLE') .joins(:user_role).where(user_roles: {role: 'Author'}) end Now to get all authors just give a call : User.all_authors #this will list all the users of type 'author'
RedPajamaStackExchange_3597176757683626452
Slimpajama627bTrain/chunk1
Q: How to update popup selection text with JQueryMobile 1.4RC1? I've previously used popups with JQueryMobile 1.3 and older without problem. With the new 1.4 RC1 I'm finding my popups don't update when I select a different item. You can see an example here with JQueryMobile 1.3 http://jsfiddle.net/vinomarky/56hQ9/ And another here using JQueryMobile 1.4RC1 - identical code, but the select box no longer updates when different options are chosen; http://jsfiddle.net/vinomarky/B9TqL/1/ Any ideas of what to try? the code is as follows; <a href="#popupBasic16" data-rel="popup" data-role="button" data-inline="true" data-position-to="origin" id="log_or_norm">Lognormal</a> <div data-role="popup" id="popupBasic16"> <div data-role="fieldcontain"> <fieldset data-role="controlgroup"> <input type="radio" name="updown" id="updown46" value="Lognormal" checked="checked" /> <label for="updown46">Lognormal</label> <input type="radio" name="updown" id="updown47" value="Normal" /> <label for="updown47">Normal</label> </fieldset> </div> </div> And Javascript $('select').selectmenu(); $('#updown46').click(function () { $('#log_or_norm .ui-btn-text').html('Lognormal'); $('#popupBasic16-screen').click(); document.select_choices.log_or_norm.value = "Lognormal"; $('select').selectmenu('refresh'); }); $('#updown47').click(function () { $('#log_or_norm .ui-btn-text').html('Normal'); $('#popupBasic16-screen').click(); document.select_choices.log_or_norm.value = "Normal"; $('select').selectmenu('refresh'); }); A: Your Javascript has some errors as document.select_choices is not defined. If you want to update the value of your button use jQuery: $('#log_or_norm').text("Lognormal"); It seems that in jQuery 1.4 they changed the HTML structure of the buttons, that's why your code $('#log_or_norm .ui-btn-text').html('Lognormal'); doesn't work. Check the full page of changes here. Demo here. A: Two methods $('#log_or_norm').text('Normal'); Another $('#log_or_norm ').empty().append('Lognormal'); Fiddle http://jsfiddle.net/B9TqL/3/
RedPajamaStackExchange_7356801375338414847
Slimpajama627bTrain/chunk1
Sports News Mon, 20 Sep 2021 Jeffrey Schlupp miss Crystal Palace's defeat to Liverpool due to fitness issues Ghana international, Jeffrey Schlupp was missing in action on Saturday when his Crystal Palace side lost 3-0 to Liverpool in the English Premier League. The midfielder who can also play as a defender has barely seen any action since he returned to England after the last international break. Prior to the Liverpool game, it was reported that he was feeling better and could be fit in time to feature. As it turned out, he is yet to fully recover from an injury he is carrying and as a result had no part to play when his team suffered a heavy defeat at Anfield. According to Eagles manager Patrick Vieira, Jeffrey Schlupp still needs some time to regain his fitness. "Jeffrey Schlupp is getting better but is not going to be involved tomorrow," the Crystal Palace coach said before the Liverpool game. Patrick Vieira added, "He didn't have enough training with the squad, so will stay behind and do a session tomorrow, before getting with the team on Monday morning." Schlupp, 28, today is joining his teammates for training and should be ready to play in the team's next outing. Source: footballghana.com We need KP Boateng and Kwadwo Asamoah back in the Black Stars – Kojo Bonsu Mikel Arteta reacts to Thomas Partey's red card against Liverpool Sammy Kuffour's son signs for Hapoel Be'er Sheva in Israel Richmond Boakye-Yiadom apologizes to Ghanaians after early AFCON exit Jordan Ayew trains with Crystal Palace after AFCON exit, available for Liverpool clash
RedPajamaCommonCrawl_-5469031445474341120
Slimpajama627bTrain/chunk1
UNC Library The Health Sciences Library (HSL) is the primary library for the Schools of Dentistry, Medicine, Nursing, Pharmacy, Public Health, and UNC Hospitals, and also serves all of UNC and the general public. At the HSL you can find: Health Science journals and books. 20 small group study rooms. 2 teaching labs View a full list of the library's databases. Includes an option to search by database title Have a specific journal article or book chapter you need, but can't find? Use our Interlibrary Loan service to get it from another library! Recommend a book or journal title for the library to purchase; Need help accessing resources from off-campus or via UNC Hospitals? Visit our Accessing Resources from Off-Campus resource Libraries - Introduction to UNC Libraries - LibGuides at Contact Us 970-351-2601 14th Ave. & 20th St. Campus Box 48 Greeley, CO 80639 Contact UNC 970-351-1890 501 20th St. Greeley, CO 8063 Law Library services are being delivered remotely. The Law Library offers support in a variety of ways including consultations through email at lawref@unc.edu, by phone at 919-962-1194, or by chat at https://library.law.unc.edu (Click Questions) - Monday through Friday, 10 a.m. to 4 p.m. Circulation of books is maintained through. The University of North Carolina at Pembroke. 1 University Drive Pembroke, NC 28372-1510 910.521.6000. PO Box 1510 Pembroke, NC 28372-151 g in June. Learn more: Watch the NCBI webinar for details. Partner with HSL. View our new systematic review process map See where librarians provide substantial support The Health Sciences Library provides support for evidence-based practice at UNC through point of care resources, clinical literature searching and drug information searching, health literacy education and patient information evaluation, and EBP instruction. To get help, contact a clinical information specialist via the HSL website or contact a. Wilson Special Collections Library wilsonlibrary@unc.edu 919-962-3765 | Chat Hours. North Carolina Collection; Rare Book Collection; Southern Folklife Collection; Southern Historical Collection; University Archives & Records Management Service You may notice a minor change in the NinerNet library account path. This change does not affect how you request materials or services. Test your knowledge of Atkins for your chance to win a $50 Giftogram gift card! Dr. Edward Jenner and His Legacy commemorates the 225th anniversary of Jenner's innovative contribution to vaccinology Ramsey Library is the vital center of the pursuit of knowledge at UNC Asheville - inspiring intellectual curiosity, partnering in scholarly endeavors, anticipating information and service needs, exceeding expectations and embodying the university's highest aims HSL special collections materials are served in the Wilson Library special collections research room. Researchers must request HSL special collections materials at least 48 hours in advance. Researchers are encouraged to contact wilsonlibrary@unc.edu in advance of their visit. Last modified: 05/25/21 Welcome to the University Libraries! See the Latest Library Information for details on available services and spaces. We remain available to assist you with your library needs, both virtually and on-site. Please remember that face coverings are required at all times while in the Libraries, and that we do not currently allow group gatherings E-Research by Discipline - University of North Carolina at Search UNC.edu School of Information & Library Science The School of Information and Library Science , also known as the iSchool at Carolina, offers an undergraduate major and minor, master's degrees and a Ph.D Kenan-Flagler Business School McColl 4502 - CB# 3490 University of North Carolina Chapel Hill, NC 27599 919-962-8749 David_Ernsthausen@unc.edu Schedule an Appointmen PRO TIP: Always connect to PubMed from UNC Library websites so you will see the Find @ UNC button. When you retrieve more than one article, the Find @ UNC button does not appear in PubMed's default display. To see more information about an individual article: Click on the article title link to see an individual article's citation page Databases - Health Sciences Library - University of North Center Library Carolina Women's Center Collection Davis (Main) Library Davis Reference Diba Collection Office of Research Development Health Sciences Library Highway Safety Library Info. & Library Science Library K-12 International Resource Library Kenan Science Library Latin American Film Library Law Library Maps Collection (Davis Reference. The UNC Library provides access to backfile articles in PDF format via New York Times Historical Newspaper. There is no daily limit to the number of articles you can download. All UNC community members have access to The New York Times in Education, a collection of materials highlighting how The Times can be used to support curricular and extra. Kathrine R. Everett Law Library | Van Hecke-Wettach Hall | 160 Ridge Road, CB #3385 | Chapel Hill, NC 27599-3385 UNC-Chapel Hill | UNC School of Law | Feedbac The University of North Carolina at Chapel Hill, the nation's first public university, is a global higher education leader known for innovative teaching, research and public service. A member of the prestigious Association of American Universities, Carolina regularly ranks as the best value for academic quality in U.S. public higher education UNC offers more than 200 undergraduate, graduate, extended campus and online programs, designed to help you pursue your goals and find your path with expert faculty, outstanding resources and hands-on educational experiences. First-Year. Students. Transfer. Students Call Michener Library at (970) 351-2671 if you need assistance with . Students, Staff, and Faculty - use UNC Identification. Username: Password: UNC Emeritus Faculty - use Library Identification. Your Name: For example, type Jane or Smith. Bear No. or Non-UNC Library Card No. The Library provides several guides to researching some specific areas of law. Search TRLN The UNC libraries participate, along with Duke University, North Carolina Central University, and North Carolina State University, in a program that allows UNC faculty, staff, and students to use any of the libraries on the four universities' campuses Kathrine R. Everett Law Library | Van Hecke-Wettach Hall | 160 Ridge Road, CB #3385 | Chapel Hill, NC 27599-3385 UNC-Chapel Hill | UNC School of Law | Feedback Visitor Informatio 335 S. Columbia Street CB 7585 Chapel Hill, NC 27599-7585 (919) 962-0800 Searchable campus ma UNC-Chapel Hill Library, Chapel Hill, NC. 3,131 likes · 19 talking about this · 3,945 were here. The UNC Library supports inquiry and learning at the University of North Carolina at Chapel Hill and.. Your OneCard is your library card. Your University I.D. card, known as your OneCard, also serves as your library card. If you are a member of the General Alumni Association or the Friends of the Library, a library card is a membership benefit. North Carolina residents may buy a borrower's card for $25 annually. Learn more about library cards Law Library. University Library. Carolina BLU is a service of the UNC University Libraries and supports the research and instructional needs of the students, faculty, and staff of the University of North Carolina at Chapel Hill The School of Information and Library Science, also known as the iSchool at Carolina, offers an undergraduate major and minor, master's degrees and a Ph.D.We are consistently ranked as one of the nation's top schools by U.S. News & World Report University of North Carolina at Chapel Hill gary@ils.unc.edu The Lifetime Library is a project of the School of Information and Library Science at the University of North Carolina at Chapel Hill School of Information and Library Science, University of North Carolina at Chapel Hill 216 Lenoir Drive • CB #3360 100 Manning Hall, Chapel Hill, NC 27599-3360 Visiting & Directions. Get in Touch (919) 962-8366. Fax: (919) 962-8071. info@ils.unc.edu. About SILS. Accessibility North Carolina Maps is a comprehensive, online collection of historic maps of the Tar Heel State. Featuring maps from three of the state's largest map collections -- the State Archives of North Carolina, the North Carolina Collection at UNC-Chapel Hill, and the Outer Banks History Center-- North Carolina Maps provides an unprecedented level of access to these materials Libraries - University of Northern Colorad The James E. Shepard Memorial Library is the main library on campus, with the most extended hours of services. This library houses more than 500,000 books and more than 400 research databases and is a technology-rich learning space designed for collaborative engagement and individual study UNC-Chapel Hill students, faculty and staff, have several avenues in which to receive training on Adobe products and services. Adobe has many great online tutorials for the various Creative Cloud products. The University also offers free access to LinkedIn Learning, an online training platform that has many specific Creative Cloud product lessons The Universal Naming Convention is the naming system used in Microsoft Windows for accessing shared network folders and printers on a local area network . Support for working with UNC paths in Unix and other operating systems use cross-platform file sharing technologies like Samba University of Northern Colorado Libraries > The Source catalog. The library catalog provides access to information about materials in the Libraries' collections, including books, dissertations, government documents, videotapes and DVDs, music scores and recordings, K-12 teaching materials, newspapers, magazines, and journals Scholarly Articles News Guides & Data Academic Search Premier (all topics) America's News (U.S. newspapers, esp. N.C.) Course Guides (resources for MJ-school classes) Business Source Premier (business articles & data) U.S. Newsstream (From ProQuest. Includes New York Times, Washington Post, and Home @ Park Library Read More � Overview. The Master of Science in Library Science (MSLS) degree at the UNC School of Information and Library Science (SILS) prepares students for prestigious careers in library and information science. The program guides students toward expertise in collecting, organizing, storing, and retrieving the world's recorded knowledge, with an. Doctor of Philosophy in Information and Library Science (PhD) The Doctoral Program at the UNC School of Information and Library Science (SILS) provides an environment that enables creative and energetic students to become innovative thinkers and leaders. Through coordination of student and faculty interests and activities, the program offers. Subscribe to Services (such as computer clusters) Manage Email Accounts. Service Reques Library Homepage | UNCW Randall Library. Randall Library is open to current UNCW students, staff, faculty, and community members with modified building and service hours. Read more about summer hours and services. All Articles Books & eBooks Journal Titles Library Catalog. Only show articles with full text online UNC Libraries is dedicated to providing continuous access of this service to the community of scholars. Archives & Special Collections @ Digital UNC includes an array of unique primary source materials housed within the University Libraries Archives & Special Collections Welcome to the School of Government's Knapp Library microsite. The Joseph Palmer Knapp Library houses a large collection of material on state and local government, public administration, and management to support the School's instructional and research programs and the educational mission of the Master of Public Administration program. Reference and research services are available to all. UNIVERSITY OF NORTH CAROLINA CHAPEL HILL; 207 South Road CB# 1530 Chapel Hill, NC 27599; STORE HOURS; Mon 9am-6pm Tue 9am-6pm Wed 9am-6pm Thu 9am-6pm Fri 9am-6pm Sat 10am-5pm Sun 10am-5pm Store Events Announcements x Wait! You've got free homework help! Your free. Search NCBG Library in the UNC Library Catalog. The Sarah Fore Gaines Library opened in 2010 in the James & Delight Allen Education Center. Sarah, then married to NCBG's founding director Dr. C. Ritchie Bell, was a champion of NCBG from its earliest days; she also volunteered after retiring from teaching at the University of North Carolina at. Your source for software at UNC-Chapel Hill. ITS Software Distribution provides a single, centralized point of contact to find and obtain software on campus. If you have any questions or problems using software on this site, please visit our Online Help Desk, help.unc.edu or call 962-HELP The University Library of the University of North Carolina at Chapel Hill sponsors Documenting the American South, and the texts and materials come primarily from its southern holdings. The UNC University Library is committed to the long-term availability of these collections and their online records Department of Classics. The Department of Classics engages in the study of the ancient Greek, Roman, and broader Mediterranean worlds, from prehistory to the Medieval Period and beyond. The diversity of fields, approaches, and research represented by the Department encourages cross-cultural and interdisciplinary perspectives on the past, and a. The UNC School of Information and Library Science (SILS) has been contracted to operate the EPA Library in Research Triangle Park (EPA-RTP Library) for over 40 years. The EPA-RTP Library is one of 25 libraries in the EPA National Library Network, and the only one staffed by university employees NC LIVE has a full calendar of upcoming online training! Learn about NC LIVE resources, develop a new skill, and hear from local library leaders Warpwire Expired June 30: Switch to Panopto Now. Last year, the University adopted a new video streaming solution called Panopto to replace Warpwire. The University's Warpwire license expired June 30, 2021, and all videos must now be shared through the Panopto tool The UNC REX Healthcare Library supports the delivery of quality health care by meeting the scientific, clinical and managerial information needs of the UNC REX Medical Staff and the UNC REX Healthcare staff. Reference Assistance. The library maintains reference and lending materials on medical, nursing, allied health, and health care. Job Safety Analysis (JSA) Library. Job Safety Analysis is a safety tool which can be used by UNC-Chapel Hill supervisors and employees to increase the knowledge of hazards in the workplace at their specific work unit that poses a risk of causing injuries and accidents. There are numerous benefits in developing and implementing JSAs including. The Joseph Palmer Knapp Library houses a large collection of material on state and local government, public administration, and management to support the School's instructional and research programs and the educational mission of the Master of Public Administration program. Reference and research services are available to all residents of North. Frank T. Tadlock South Rowan Regional Library 920 Kimball Road China Grove, NC 28023 Phone: 980-432-8670; West Branch (June 1, 2021) 201 School Stree Video Library. NEW: Hand Hygiene and PPE (WPPE News 13) Hand wash, Hand rub, PPE donning and doffing (each is a short 1 minute video) Basics of Infection Prevention and Injection Safety. Environmental Assessments. local health department. long term care facility. Hospital Tour Videos. nutrition and food services Library Hours. undefined Hours: None Specified. Not all services are available during operating hours. For more information, call 704-687-0494 Harold Schiffman Music Library. Special Collections & University Archives. NC DOCKS. Digitized Collections. View More ». Services. Interlibrary Loan. Technology Checkout. Printing in the Libraries North Carolina School of Science and Mathematics - Library World-renowned library collections, innovative services and expert librarians create an environment for discovery and inspiration at any level and in every discipline. Whether you are a first-year student learning about research and citation or a practiced scholar engaged in specialized inquiry, learn how UNC's libraries are your trusted partner 152A Jackson Library 336.256.0240 jedale2@uncg.edu: Damasceno, Paula Instruction Coordinator: Digital Media Commons: 044 Jackson Library 336.256.1381 padamasc@uncg.edu: Dollar, Patrick Archivist: Special Collections and University Archives: 310 Jackson Library 336.334.5857 pgdollar@uncg.edu: Dorsey, Sarah B. Head, Harold Schiffman Music Library. Kathrine R. Everett Law Librar UNC-Chapel Hill Single Sign-On - Stale Request. You may be seeing this page because you used the Back button while browsing a secure web site or application. Alternatively, you may have mistakenly bookmarked the web form instead of the actual web site you wanted to bookmark or used a link created by somebody else who made the same mistake. g community for students from all backgrounds. As the law school at the first public university in the country, our . Read More The University of North Carolina at Chapel Hill is the nation's oldest state university, with a rich history of more than two centuries. This virtual museum retells that history much as a physical museum might do, with texts and images arranged in a series of roughly chronological exhibits. Along the way, there is much for the university's friends to take pride in, and other truths that are. Ramsey Library D. Hiden Ramsey Library, located at the heart of UNC Asheville's campus, is the vital center of the pursuit of knowledge at UNC Asheville—inspiring intellectual curiosity, partnering in scholarly endeavors, anticipating information and service needs, exceeding expectations and embodying the university's highest aims The State Library of North Carolina (SLNC) is pleased to announce scholarships to support registration costs for North Carolina library staff attendance at the 64th Biennial NCLA/SELA Conference, Oct 18-22, 2021. These scholarships are made possible with support from the Institute of Museum and Library Services. Awardee notification on July 26 A major renovation of the Hill Library has been completed, including a full renovation of the second and third floors of the bookstacks tower with a new open stairwell connecting these floors with the Ask Us lobby. The Hill Library is now the home to a new Academic Success Center and new technology-rich Libraries spaces The library building is open. Masks are required at all times inside the building for people older than 5 years. Meeting rooms and study spaces remain closed. Public computing sessions are limited to 1 hour. The book return is open 24/7. We are accepting donations on Wednesdays, Saturdays, and Sundays from 9:00-5:00 The Department of Anesthesiology N2198 UNC Hospitals CB# 7010 Chapel Hill NC 27599-7010 United States. Phone: 919-966-5136 Fax: 984-974-4873 web@aims.unc.ed Bio: Wellington Mustard III hates bullies. He was the smallest kid in his class and often picked on. His slight frame made it impossible to fight physically, but he could fight with his brain. Using elaborate schemes, he would trick, discombobulate, and bamboozle the bullies until they either gave up or turned themselves in North Carolina African American High Schools. Alamance County Public Libraries, Bennett College, Burke County Public Library, C.M. Eppes High School Alumni Heritage Society, Inc., Cabarrus County Public Library, Caldwell Heritage Museum, Chapel Hill Historical Society, Charlotte Hawkins Brown Museum, Charlotte Mecklenburg Library, Chatham County Historical Association, Clear Run High School. Check Takeout Central for All Open Locations 10:00 am - 9:00 pm. Wings Over Chapel Hill. Click Location for Official Hours + Call to Pay w/ Flex 12:00 pm - 1:00 am. Domino's Pizza. Click Location for Official Hours + Call to Pay w/ Flex 10:00 am - 2:00 am Browse, borrow, and enjoy titles from the North Carolina Digital Library digital collection UNC Affiliates without an Onyen (AHEC Digital Library users with a UNC affiliation), register to create a new ILL account. Requesting Checked-out Books. Logon to or create your ILLiad account; Look the book up in the library catalog; Click on the little truck icon to send the book information to form Library The University of North Carolina at Pembrok The NC State University Libraries is the gateway to knowledge for the North Carolina State University community and partners. The James B. Hunt Jr. Library captures the innovative, forward-looking spirit of NC State University. Hunt 360° Tour. Explore our library of the future with 360° photos The University of North Carolina at Pembroke is committed to academic excellence in a balanced program of teaching, research and service, offers bachelor's and master's degrees and an affordable, high quality education in a small campus setting UNC Library Digital Collections, Chapel Hill, NC. 3,882 likes · 7 talking about this · 2 were here. Library COVID-19 Updates. In response to the ongoing COVID-19 pandemic, we have moved our research support services online. Please visit UNC-Chapel Hill's Carolina Together COVID-19 dashboard for Carolina's most recent updates.. Our Qualtrics consulting hours are now held virtually via Zoom, instead of face-to-face. Please see the Qualtrics page for more information about how to access support Basic concepts in the way that information, people, and technology interact to influence organizational effectiveness. Principles of problem solving, teamwork, leadership, and organizational change/innovation. Grading status: Letter grade. INLS 393. Information Science Internship. 3 Credits. Permission of the school Health Sciences Library - University of North Carolina at Make a Gift Online. By supporting the University of North Carolina at Chapel Hill, you are ensuring that students realize their dreams of a Carolina education, faculty have the resources available to perform innovative research and scientists can find better treatments and cures for diseases Discover UNC-Chapel Hill. Discover. These are stories that define Carolina. Stories of novel ideas and nimble minds. Wide-open spaces of belonging and collaboration. A look and a leap toward the future, at home and across the globe. Featured Stories Clinical Practice - University of North Carolina at Chapel North Carolina Digital Collections (NCDC) The NCDC contain over 109,000 historic & recent photographs, state government publications, manuscripts, and North Carolina content from the State Archives and the State Library of North Carolina. Search the Digital Collections. (link is external The North Carolina Digital Heritage Center is a statewide digitization and digital publishing program housed at UNC's Wilson S pecial Collections Library. We work with North Carolina cultural heritage institutions* to scan, describe, and publish historical materials online, which in turn increases access to and use of their collections About Library. While the Mary Livermore Library's mission is to provide informational support to the teaching and research programs at The University of North Carolina at Pembroke, there are operational policies and procedures as well as informational resources of which library users should be aware. Resources enabling the Mary Livermore. We welcome students, faculty, staff, community members, and researchers to use Special Collections and University Archives. We're located on the third floor of D.H. Ramsey Library on the UNC Asheville campus. Our reading room hours are posted below, and we are also available by appointment Contact Us - UNC Chapel Hill Librarie University Library Advisory Council. This advisory council is composed of the directors of the 17 institutions' libraries and a representative from UNC System Office. The current chair is Anne Cooper Moore, Dean of Libraries at University of North Carolina Charlotte. Sarah Falls, University Librarian at the University of North Carolina School. UNC Charlotte, North Carolina's urban research university, fuels American innovation in everything from resilient and sustainable architecture and environmental systems, epidemiological modeling and sustainable energy, shaping the future of work for greater Charlotte and beyond MSIS Program: Dr. Brad Hemminger (bmh@ils.unc.edu. MSLS Program: Dr. Casey Rawson (crawson@email.unc.edu) PHD Program: Dr. Christopher Lee (callee@ils.unc.edu) Address: School of Information & Library Science CB# 3360, 100 Manning Hall University of North Carolina Chapel Hill, NC 27599: Website: sils.unc.edu: Phone: 919-962-8366: Test Requirement From the Carolina Alumni Review: Nikole Hannah-Jones '03: No to UNC, Yes to Howard Nikole Hannah-Jones '03 (MA), whose extended tenure bid to become the University's Knight Chair in race and investigative journalism at the Hussman School of Journalism and Media became a national controversy, will not be teaching at Carolina after all 128 Library jobs available in North Carolina on Indeed.com. Apply to Library Assistant, Library Clerk, Library Technician and more Homepage J. Murrey Atkins Librar The UNC Lending Section supplies loans and copies of materials from the University Library collections to libraries and other agencies. Individuals should contact the academic, public, or corporate library with which they are affiliated or their nearest public library to make a request. The Health Sciences Library (NOH) and the Law Library (NDO. The North Carolina State Government Web Site Archives is a service of the State Archives and the State Library of North Carolina. The archives contain state government agency, licensing board, and commission web sites and social media pages, and includes images and audio and video files; agency policies and publications posted on sites; and board and commission meeting minutes Home - Ramsey Library at UNC Asheville at University of Archives & Rare Books. Special Collections & University Archives is where you can find unique materials like rare books, archives, and oral history interviews. We welcome students, faculty, staff and community members to explore our rare books and learn about campus and local history with original primary sources! Contact Us for more information 133A Atkins Library UNC Charlotte 704-687-0496. Contact: Twitter Page. Quick Links Library Homepage. Library Hours. Contact Us. Ask Atkins. Library Databases. Research Guides. Citing Your Sources. Reserve a Study Room. My Library Account. My Interlibrary Loan Account.. Home - Maps - The University of North Carolina at Chapel Hill. UNC-Chapel Hill Randall Library Virtual Tour . Floor Map We would like to show you a description here but the site won't allow us B. BIOCHEMISTRY (BIOC) BIOINFORMATICS AND COMPUTATIONAL BIOLOGY (BCB) BIOLOGICAL AND BIOMEDICAL SCIENCES (BBSP) BIOLOGY (BIOL) BIOMEDICAL ENGINEERING (BMME) BIOSTATISTICS (BIOS) BOSNIAN-CROATIAN-SERBIAN (BCS The F.D. Bluford Library • North Carolina Agricultural & Technical State University 1601 East Market Street Greensboro, NC 27411 USA • 336.285.4185 • 888.246.1272 • « Send Us a Suggestion. The University of North Carolina at Chapel Hill (UNC, UNC-Chapel Hill, North Carolina, Chapel Hill, or simply Carolina) is a public research university in Chapel Hill, North Carolina.The flagship of the University of North Carolina system, it is considered to be a Public Ivy, or a public institution which offers an academic experience similar to that of an Ivy League university Thor Toy Kmart. Cardani eyebrows. Happy songs for kids disney. Subfloat documentation. How to attach image in AutoCAD permanently. Cat and rabbit. What does stomach cancer breath smell like. 2017 Yamaha R6 torque specs. Australian Tattoo Expo 2021. Irish wedding traditions. Side profile Drawing easy. Food color quiz. Barracuda size limit. Indian skull tattoo chest. 2018 r1 nada. Sun gazing benefits. 4 groups of 8 equals. Carrols logo. Owls Nest real estate for sale. JP Freestyle Wave review. Atlanta Lofts and Condos. Grad photos near me. Palms Place Penthouses for rent. Writhing Crystal Kingdom Hearts 3. What to wear to a 21st birthday house party. Car Interior Roof Light stars. KFC drive thru near me. The walkmen youtube. How to switch on Mi phone without power button. Character Creator 3 serial Key. Tractor rental okc. Light up your lighter life Waist Trainer. Self Respect Status in Hindi for Girl. Who is Elisha Goodman biography. Odd numbers meaning in Hindi. My Beloved Bodyguard English Subtitle. Shiseido sunscreen flashback. How much does it cost to sedate a large dog. Laser eye surgery Pretoria cost. Hotels in Lake Geneva. Tossing meaning in English.
RedPajamaCommonCrawl_430989199703281623
Slimpajama627bTrain/chunk1
To Train Or Not To Train Posted on Mon Jun 29th, 2020 @ 11:39am by Captain Malcom Llwyedd & Lieutenant Commander Rhiana t'Aegis & Lieutenant JG Soto Gantt Location: USS Firebird "No," Lieutenant Commander t'Aegis replied for the second time and closed the door of her locker in the USS Firebird's gym. "If you want hand-to-hand combat lessons, speak with Chief Warrant Officer B'Rala. Or Ensign Carver. Now, if you will excuse me, Lieutenant." Without another word, she brushed past the young engineer, intent on getting to the exit before he could say anything else. "Ensign Carver will repeat the standard skills they taught in the academy." Gantt followed closely behind Lieutenant t'Aegis. "I want to learn from the best, no matter how hard it is. Besides, you've taught several of the other crew members. Why won't you train me?" "I teach those who show promise and who wish to advance their skills." The Romulan spoke without slowing down or looking back at Gantt. "Do you actually /master/ the standard skills you are scoffing so easily now?" "I don't mean they're unimportant. Those skills helped keep me alive from my first mission, when flying lizards attacked us while we worked on a missing hull panel," said Gantt. "We're a small crew in frequent danger, and I've realised those skills aren't enough on the edges. I do wish to advance them." She could hardly argue with that. This vessel seemed to attract trouble. The Romulan stopped abruptly and turned around. "Show me what you think you can do." "What do mean? We're not in a training room." Gantt had to stumble back a few steps to avoid running into Rhiana. He smiled wanly, trying to lighten his discomfort. "Unless you want me to throw a punch at you there's no equipment around." Within the span of two seconds, Gantt found himself turned around, facing away from Rhiana with her left arm around his throat and his right arm twisted behind his back. Her hold was not yet painful, merely uncomfortable for the Bajoran. But it was also obvious that this could change in an instant. "When I give an order, I expect it to be followed, not questioned, Lieutenant," she said softly, her breath warm against his ear. "Furthermore, you lost any initiative you might have had by talking when no words were necessary." The wall was cool against his burning cheeks while Gantt struggled against the arm hold. He struggled to keep anger in check, too. If he blew up like a spoiled child Rhiana would walk away and never listen to his request again. Gantt swung his left arm back into her face with as much force as the limited space allowed. As soon as his tricep connected he twisted the other way and reached for her neck with a free arm, but she was too fast. He found nothing but air. She was several paces away from him by the time he turned around, with no apparent ill effect on or effort from her part. She was not even breathing faster. "You do not seem to have forgotten everything from that basic training," the Romulan commented. "How much time are you willing to commit to working on your combat skills?" "As much as you decide I need, as we train." said Gantt. A blank promise for combat training to a Romulan. Was he biting off more than he could chew? "It needs to be you. Ever since the cave outing on Bajor. Do you remember that?" Rhiana frowned and searched her memory. The "cave outing" on Bajor... Oh. Yes. There had been a sudden thunderstorm and their group had sought shelter in an abandoned cave. "I remember." It seemed as if years had passed since then, when in reality, it had happened only a few months ago. "If I recall correctly, my point of view was not shared by the others. Why me?" "It was not popular. You called the Cardassian atrocities against Bajor a means to obtain what they wanted from an inferior people. I disagree vehemently that Bajorans are inferior based on a superior Cardassian military." Gantt stood at attention, drawing calm in to pacify the rapid beating of his heart. "One of their atrocities resides like a pestilent taint in my own DNA. I am genetically modified to be inferior to what I could have been, and the moment that news starts to spread people will take pity on me. They will let a bit of laziness, of self-indulgence, slide into my training. You won't. You'll demand discipline and effort that won't let me, or anyone else, get in my own way." "You have not understood the concept of inferiority. You are not inferior because of your military. You are inferior because you are not Cardassian," Rhiana stated matter-of-factly. "And I will not waste my time with you if you are physically or mentally incapable of coping with my demands. What is the nature of this modification?" "Incapable? Nothing like that at all," said Gantt. He let her condemnation of racial inferiority drop. Now wasn't the time to pick that fight when he wanted her help. "They wanted to create instinctual fear of Cardassians into Bajoran DNA. Much like the Earth cats known as mountain lions won't attack tracking dogs even though the mountain lions could kill the dogs. Cardassia wanted slaves with fear of their owners in their very nature. Nothing that will stop me from the work you require." "That is an interesting application of DNA modification," Rhiana approved. "Your main goal for this training is to be able to face a Cardassian without cowering before them in fear, is it not?" "Yes." He became aware of how rigidly he stood. Everything had gone exactly as he had hoped it wouldn't. The current focus on his own secrets made the room feel like an ice box. He shrugged with both arms out and then folded them across his chest, using the action to keep the anxious energy off his face. "If you think you can train the instinct out." "I am not making any promises. But if we do not try, we will never know," Rhiana replied in her usual, matter-of-fact tone. "You will join the Marines for their warm-up in gymnasium two at 0500 tomorrow. At 0530, you will meet me in gymnasium one for your lesson. Do you have any questions?" "None, I will be ready at 0500 tomorrow." Gantt felt molded to the floor and a surge of adrenaline at the same time. He nodded several times before he could stop himself. Better to leave before he looked the complete fool. "Thank you, Lieutenant Commander t'Aegis," he said and then walked towards the exit. This would work. This, or something else. But the next time he stared down a Cardassian he would not pause to shoot. By Lieutenant JG Owen Woodhouse on Tue Jun 30th, 2020 @ 12:20pm Love this JP so much. New tidbits of personal history woven into historical context from the shows and previous JPs. What a great read. Looking forward to see where this takes Gantt. -Liam
RedPajamaCommonCrawl_7042207168964683838
Slimpajama627bTrain/chunk1
Output:5.2V 2.4A,9V 3A,14.5V 2.0A or 20.3V 3A. Output:5.2V 2.4A,9V 3A,14.5V 2.0A or 20.3V 3A.Input:100-240V 0.75A 50-60Hz.With 66.9 inch USB-C 3.1 Fast Charge Cable. Warranty:24 hours customer service,30 days money back or exchange, free 6 months warranty. If you have any questions about this product by Elflight, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.
RedPajamaC4_2481989436577908011
Slimpajama627bTrain/chunk1
With communication accounting for over 80% of a project manager's time, the importance of GOOD communication cannot be overlooked. K: K.I.S.S.=Keep it simple stupid! While we can become divided by the fact that English is a common language with many variations, acronyms further complicate things. Every client I visit is overrun with TLA's and FLA's that create barriers to the very communication they intended to make easier. What is a TLA and a FLA? TLA is a Three Letter Acronym and FLA stands for Four Letter Acronym. And, to make matters worse, the meaning behind such acronyms is often lost on even the most savvy users – in fact, sometimes even the original words are forgotten by the most frequent users. Keep your communication clear, concise and easy to understand by avoiding acronyms. If you must use one, make sure to include the words that make up the acronym in parentheses behind its first use. The best advice is to avoid acronyms all together, and if you can't due to widespread use or industry familiarity – at least make sure to embed its meaning when it is first used. We can't stop the spread of acronyms, but we have a duty to make them meaningful to our audiences! For my whole life, I have opened my car door by inserting a metal key into a physical lock. Now, I can unlock the doors and start the car at the push of a button. It seems like magic to me, but it's actually a simple application of science. Maxwell continues to expound on how important communication is to relationships and leadership in the rest of the post. Click here to read the entire post. To better communication and more successful projects! CSM stands for Certified Scope Manager. I just returned from Japan where I attended ISO software and systems engineering meetings in Niigata, guest-lectured at the University of Niigata, and spoke at a special event convened by the Japan Function Point Users Group (JFPUG) to discuss northernSCOPE and scope management. Present were over 50 software professionals representing some of the most prominent and influential Japanese companies including Hitashi, Mitsubishi, IBM, and others. It continues to become more and more clear how scope management and the new job role recognized by the European Certificates Association called "Certified Scope Manager" fills in the missing links in today's software development. As I've stated before, I believe that the supplier side of the customer/supplier relationship does a fine job in developing software when the customer is engaged and there are good requirements. Software developers and project managers do excellent work – and I stand by my assertion that the Project Management Body of Knowledge (PMBOK) and the Capability Maturity Model Integration (CMMI) approaches have done much to advance us to a better, more professional state. This is where the Certified Scope Manager (CSM) fits in: s/he is the Real Estate Agent of software development. Certainly there are bits and pieces of this work that are picked up by project managers, business analysts, metrics specialists, cost estimators, etc. but to-date there has been no solid single job role that works as the Customer Advocate AND performs all the tasks of a Scope Manager. – Captures lessons learned (and too often forgotten) on each project into an experience database for use on later projects. The Scope Manager is an octopus of sorts; a swiss army knife; a jack-of-all trades in the areas often neglected in customer advocacy on software intensive systems projects. And he/she accomplishes all of this in a matter of 2-3 days per project. Let me know if you'd like articles with more details on the subject, and if you'd like me to talk to your management about how scope management can improve your software intensive systems projects. The Japanese attendees were fervent in their support and now will discuss how to make northernSCOPE and the Certified Scope Manager job role a reality in Japan. The first hurdle (and the biggest) is translation – after that, it's working to change the flawed firm-fixed-pricing mentality that prevails throughout the world to one of unit pricing – especially when requirements are not well-known.
RedPajamaC4_468448546075608628
Slimpajama627bTrain/chunk1
Contribution Policy (2 Samples) The Contribution Policy (2 Samples) are available free to download, customize and print for your organization or Church Administrative Office. If your church does not have a policy for contributions then download the sample policy below that can be used as a tool to guide you through creating a policy for your church. Contributions to a church are deductible for federal income tax purposes under the rules and regulations established under the current provisions of the Internal Revenue Code if you are a qualified organization exempt from federal income taxes under IRC Sec 501(c)(3). There are so many different rules and regulations that church organizations have to abide by so you definitely need a policy specific for your church to abide by. The policy for contributions below includes: Policy Name Introduction - [Church Name] is a qualified charitable organization exempt from federal income taxes under IRC Sec 501(c)(3). Contributions to the church are deductible for federal income tax purposes under the rules and regulations established under the current provisions of the Internal Revenue Code. Undesignated Gifts - What are undesignated gifts?Undesignated gifts are gifts given to an organization or church without stipulation by the donor. These gifts comprise the majority of the church's total receipts. They're relied on to fund the church's budget ministries and programs. Designated Gifts - What are designated gifts? Designated gifts are gifts given to an organization or church with stipulation by the donor. The church will accept designated gifts if they're specified for an approved project, ministry or program administered by the church. Gifts to ministries, programs, etc. not administered by the church cannot be accepted and should be sent directly to the organization you intend to receive the gift. Gifts to Individuals - See policy below. Non-Cash Gifts - [Church Name] will accept most types of non-cash gifts provided the gift is determined to be related to the purpose of the church and in the church's beset interest. Per IRS regulations, we'll acknowledge receipt by the fit by letter with brief description of the item donated. The church is not responsible for appraisals and will not determine the fair value of donated property. The estimated fair value of the gift will not be reflected on the letter or the donor's record of contribution. It's the donor's responsibility to determine the faira market value of the gift. Personal Services Donated - See policy below. Contribution Statements - See policy below. Year of Contributions - The IRS provides clear guidelines with regard to the date of posting contributions, which we follow carefully. All contributions received or postmarked by December 31st will be included in that year's contribution statement. If the contribution is received or postmarked after December 31st, it will be included in the contribution statement of the year in which it was received/postmarked – regardless of the date on the check. Conclusion - See policy below. Signatures - Signatures of Senior Pastor and Secretary Revised Date The other policy available below is the Offerings/Contributions Policy sample that you can use as a tool to create one for your church and it includes the procedures on collecting offerings/contributions, posting revenues, other funds, and bank deposits. If your church needs a database that will track these contributions and generate contribution statements and letters within minutes check out the database I created below! Shepherdbase (Church Membership Database) Click on the link(s) to download the contribution policy(s) below: Contribution Policy (Sample) Offerings/Contributions Policy (Sample) Church Accounting Policy Manual Church Accounting Policy Manual (2 Samples) free to download, modify and print immediately for your church. Also free church policy manual... General Accounting System Policy (Sample) General Accounting System Policy and Procedure (Sample) available free to download, customize and print for your church administrative office... Budgeting Policy The Budgeting Policy (Sample) is available free to download, customize and print for your Human Resources Dept., church administrative office, etc. Return to Church Policy Manual from the Church Contribution Policy (Sample) page.
RedPajamaCommonCrawl_-4027058993322063981
Slimpajama627bTrain/chunk1
Everybody loves things that glow in the dark. Kids will have a grand time making these Glow in the Dark Jars and then turning out the lights to see the magic happen. It's always fun to repurpose items and give them a whole new life. I got some empty baby food jars. I got glow sticks from the dollar store. I cut off both ends of the glow stick and dumped the gel inside the jar. Because it was thick, it didn't come out very well. So, I tried blowing it out. Warning! Glow-in-the-dark-gel tastes pukey.
RedPajamaC4_-5344758507664470840
Slimpajama627bTrain/chunk1
Home / / "Litigation Avoidance", or Ammunition for a Duck-Hunt? Crowdsourcing Commercialised. "Litigation Avoidance", or Ammunition for a Duck-Hunt? Crowdsourcing Commercialised. Matt Wednesday, June 01, 2011 This Kat has recently had his head buried in what appears to be an ever-expanding pile of examination papers. Recalling the tale of the magic porridge pot from when he was but a kitten, the Kat became afraid that the streets of London would soon be awash with books upon books of handwritten answers to fiendish questions. Fearing for his sanity, he therefore turned to the internet (which, as everybody knows, is guaranteed to put one back on the straight and narrow) where he came across some interesting news that he thought he would share. The past 24 hours, it appears, have unofficially been dedicated by some unnamed deity to the cause of crowdsourcing – or more specifically to crowdsourcing as it applies to the invalidation of patents. Mere hours before the UK IPO's press release announcing the launch of its Peer-to-Patent trial (state-sanctioned P2P, if you like) (noted by the IPKat here), Article One Partners announced (.pdf warning) the acquisition of their first client in a commercial enterprise aimed at the same general goal – finding the prior art that lurks in a metaphorical cupboard only to jump out and accost a patentee at some inconvenient point in the future. A press release to announce only one client may seem overeager; however, when you are told that the client is Microsoft and you realise that they were granted 3086 patents by the USPTO in the 2010 calendar year alone, then a press release (or indeed a megaphone, flag and stepladder) suddenly becomes eminently sensible. The service offered by Article One Partners is described in its press release as a "Litigation Avoidance program". It explains: "Litigation Avoidance is designed to help companies analyze and act on patents of questionable quality. Through the new service, Article One identifies pre-litigation patents and distributes requests to over one million scientists and technologists to research the validity of the patents. Article One uses that collected research where appropriate to file reexamination requests with the U.S. Patent and Trademark Office (USPTO). Litigation Avoidance clients receive access to all of the collections that have been researched in the program. The service leverages the proven success of Article One's global community which conducts research to identify evidence predating patent claims, known as "prior art." "NPEs continue to actively target large technology companies and often with portfolios of questionable quality. Article One's Litigation Avoidance program is a powerful tool to fight this challenge," said Bart Eppenauer, Chief Patent Counsel at Microsoft Corporation. "Litigation Avoidance gives businesses another tool to address patent quality issues prior to litigation to reduce risk and potential litigation cost. Together with other Litigation Avoidance members, we will be able to better address questionable patents in the pre-litigation phase to deter litigation. We are excited to add this to our patent defense strategy." The service is accordingly visualised as a troll vaccine. However, the Kat wonders whether the fact that Microsoft now has access to "all of the collections that have been researched in the program" might also provide it with some ammunition to engage in a rather broader duck shoot. The comments at the end of the press release that "Article One also has researched state of the art collections and patents already in active litigation" serve only to increase this suspicion. Nevertheless, the press release continues: "Litigation Avoidance focuses on pre-emptive action around specific patents identified pre-litigation. By collecting more relevant information about prior art, Litigation Avoidance can make the patent system work more effectively and can help eliminate patents that do not deserve protection through USPTO reexaminations. As the community gathers more evidence, the service creates a network effect for all members to benefit from the research. This is particularly valuable given that the number of defendants per NPE lawsuit has almost doubled in two years from 3.3 in 2008 to 6.0 in 2010." The silver bullet in Article One's arsenal is that it does not rely on the altruistic tendencies (or indeed, at the other extreme, axe-grinding) of its community of reviewers. It rewards them with cold, hard cash; proudly proclaiming that it has awarded over $1.3 million to its community of researchers since its inception in 2008. Whether this is a viable model for long-term success remains to be seen, however Article One's approach certainly addresses one of the main concerns voiced in relation to the state-run Peer-to-Patent projects in both the U.S. and Australia – how to acquire and maintain an active community of researchers. While all of the pilot projects thus far completed have reported significant degrees of success, it is clear that the majority of the communities' work is being undertaken by a small and dedicated core of individuals. Incentivising participation in the community with performance-related monetary rewards may be one way of expanding this pool of experience, and accordingly increasing the impact of the Peer-to-Patent projects themselves. However, the practice of offering bounties is evidently not something that could easily be adopted by the respective Patent Offices themselves - cries of gamekeepers turned poacher would be heard called from the rooftops if it were. Perhaps, therefore, a commercial enterprise such as that of Article One Partners is the way forward. For this Kat, however, exam scripts are calling – once more unto the breach… "Litigation Avoidance", or Ammunition for a Duck-Hunt? Crowdsourcing Commercialised. Reviewed by Matt on Wednesday, June 01, 2011 Rating: 5 Anonymous Wednesday, 1 June 2011 at 16:20:00 GMT+1 Hrm, I like that they offer money. Seems like something I should check out. Time to put my technical degree to use?
RedPajamaCommonCrawl_-4356867322617317684
Slimpajama627bTrain/chunk1
The Book of Psalms may be the best loved and most misunderstood book of the Bible. Found within the pages of this wonderful, inspired book of the Bible are words of comfort, encouragement, and peace, but many readers miss mining out some of the real spiritual gems because they simply don't understand this unique and ancient Jewish genre called wisdom literature. Dr. Tim Riordan offers the Reading the Bible series as a resource to help people understand and apply to the Bible to their lives. How to Get the Most out of Reading Psalms will give you greater insight into this beloved book, and you will find yourself returning often to this resource as a spiritual guide for your life. If you would like a free copy of this helpful resource, click the button below where you will be directed to your free book.
RedPajamaC4_3746750485343260804
Slimpajama627bTrain/chunk1
The Director of Territory Records approves ACT Government Records Disposal Schedules for the disposal of records. Agencies are responsible for assisting with the development of Records Disposal Schedules by identifying business activities and transactions relevant to core government functions they may be stakeholders in. They are also responsible for identifying and adding to their Records Management Programs those Records Disposal Schedules that relate to records of their business functions. The Records Disposal Schedules are considered by the Territory Records Advisory Council prior to approval by the Director of Territory Records and their implementation by stakeholder agencies. Records Disposal Schedules are notifiable instruments under the Territory Records Act 2002 and can be found on the ACT Legislation Register.
RedPajamaC4_-4831333262071051418
Slimpajama627bTrain/chunk1
Archive for the 'Secretary of State Travel' Category Tillerson's Folly Posted in Bill Clinton, Cabinet, Donald Trump, Hillary Clinton, Hillary Rodham Clinton, Secretary of State, Secretary of State Travel, state department, U.S. Department of State, Uncategorized, Willam Jefferson Clinton, tagged Al Gore, Barack Obama, Bill Clinton, Donald Trump, Hillary Clinton, Press Corps, Rex Tillerson, Secretary of State, State Department on March 10, 2017| 2 Comments » The State Department press corps had boarded and had been logged in – both by the crew and on their social nets – when the secretary of state's motorcade drove up. Hillary Clinton was about to board for her first official tour in Africa as secretary of state. It was very exciting, but her press corps, all logged into Twitter, were disconcerted. There was another motorcade on the tarmac. Another plane was preparing for takeoff. The State Department press corps did not like it, and they said so on Twitter and other social nets. What's he doing, they queried. He's stealing her light! There was a tweetstorm of monumental proportions. The "he" in this case was the secretary of state's husband and the former president who was off on a mission to rescue two journalists captured and imprisoned in North Korea. They were employed by his former vice president, and the former POTUS went at his behest with the approval of the new president and his secretary of state, about to be bound to Africa. She knew all about it, of course. For the sake of convenience and perhaps to some degree for the sake of last minute preps and briefings, they had left their Georgetown residence together and arrived at Andrews for their separate missions. It was well-coordinated as such events go. The DOS press corps, however did not see it that way that particular morning. They circled their wagons around the secretary of state, whose coverage was their job, and expressed their disgruntlement on Twitter where I was following several of the younger members of the corps. Their loyalty to and protectiveness of Hillary was plain to see. No one should be stealing her steam, not even her husband, a two-term former POTUS. This was her big trip. They were there to make it visible to the world. Apparently the current SOS, Rex Tillerson, missed class that day and in the days following Hillary Clinton's flu and subsequent fainting spell and concussion, or even her bouts with spring allergies, or he would know the fealty and concern with which the DOS press corps treats coverage of the secretary of state. Instead of giving them a fair chance to get to know him, bond, and explain and defend him in the press, he has opted to treat them as the enemy and barred them from the plane on his first official excursion to Asia. N.B. Asia was also Hillary's first official trip as SOS. This decision is not only folly but also speaks to the general attitude of this administration toward the press. Without giving them the chance to get to know him and perhaps develop a sympathy toward him and his work, he has chosen to banish them as inimical – the general stance of the administration – and a dangerous and foolhardy one. The State Department press corps tends to be very open, supportive, and defensive of the secretary of state. Tillerson, on his first official journey, has chosen to erect a wall, another symbol of this new administration, between him and those whose function is to cover his tenure. He has decided to pare down. He will not be using the Big Blue Bird – so familiar via Condi, Hillary, and John Kerry. He will use a smaller plane. N.B. that this does not necessarily represent any reduction of expenses since the news bureaus pay for the press transportation. It represents, instead, a slap in the face to the free press. The Trump administration and Tillerson as part of it have chosen to treat the press as the enemy. They could have caught more flies with honey, but never mind. As Roseanne Rosannadanna might have said, Mr. Tillerson, you sound like a real attractive guy. Truth is, when you have a name that sounds like it came out of an "Archie" comic book, you really needed all the help you could have gotten, and beggars cannot be choosers. Oops! Nope! It Wasn't the Pope! Posted in 2016 Election, Democratic Party, Foreign Affairs, Foreign Policy, Hillary 2016, Hillary Clinton, Hillary Clinton 2016, Hillary For America, Hillary for President, Hillary Rodham Clinton, Primaries/Caucuses, Secretary of State, Secretary of State Travel, Uncategorized, tagged Bernie Sanders, Democratic Party, Foreign Affairs, Foreign Policy, Foreign Relations, Hillary Clinton, Pope Francis, Primaries/Caucuses, Secretary of State, travel, Vatican on April 10, 2016| 10 Comments » Barbie Latza Nadeau Vatican: Pope Didn't Invite Bernie Sanders The Vatican spokesman Father Federico Lombardi told The Daily Beast that it wasn't the pope who personally invited the politician. "The invitation was made on behalf of the Pontifical Academy of Social Sciences, not by Pope Francis," he said. "There is no expectation that the pope will meet Mr. Sanders." He then added that he could not completely exclude the possibility, but that nothing was on the agenda at the moment. Margaret Archer, president of Pontifical Academy of Social Sciences, said that Sanders invited himself. "Sanders made the first move, for the obvious reasons," Archer told Bloomberg. "He may be going for the Catholic vote but this is not the Catholic vote and he should remember that and act accordingly — not that he will." Not long after, Monsignor Marcelo Sanchez Sorondo, chancellor of the Pontifical Academy of Social Sciences stepped in to dispute Archer's statements. ""I deny that. It was not that way," Sorondo told Reuters "This is not true and she knows it. I invited him with her consensus." Sorondo later toned down his initial comments telling CNN the invitation should not be seen as an endorsement of the senator's nomination. "It does not signify any support of the campaign," Sorondo said. "We want to establish a dialogue between North America and South America so we thought to invite a [U.S.] politician. The President of Bolivia will also be there. Perhaps the others (candidates) would have been interested but they did not request to come." As the nuns used to say, Jesus, Mary, and Joseph, Monsignor! Where have you been? Secretary of State Hillary Clinton spent good chunks of her tenure at the State Department re-establishing ties and friendships that the previous administration had allowed to deteriorate and falter, among them South American relations. Here are Secretary Clinton's South American visits. I have left off the Central American visits because Msgr. Sanchez Sorondo specified South America, not, more broadly, Latin America. Also not included are the many summits, conferences, strategic partnerships, and visits that occurred in Washington DC. Tour March 2010 Beginning here >>>> Tour June 2010 Beginning here >>>> This, January 1, 2011 >>>> Tour April 2012 Beginning >>>> Since he specifically referred to Rafael Correa, here is a reminder of how well Correa and Hillary hit it off in 2010. The bottom line appears to be that Bernie Sanders actively sought this invitation, and Msgr. Sanchez Solondo overstepped his role and that of the conference which is not tasked with establishing diplomatic relations between nations. Bernie's primary opponent, former Secretary of State Hillary Clinton, knows the South American leaders very well and has a great working relationship with them. Certainly her campaign became aware of this conference at some point. That she did not request an invitation is evidence that 1) This visit relates to the election in only the most tangential way – the Catholic vote which, as Archer said, this is not; and 2) – and this is perhaps central – Hillary does not need foreign relations creds which the sly monsignor seemed to think this junket would afford Bernie. No, monsignor, and no, senator, a photo op of Bernie with Correa will never outdo this one. And, yes, monsignor, you are messing around with our internal affairs. Imagine the reaction if it were Hillary accepting an invitation from the Patriarchy in Istanbul to discuss the refugee situation! Finally, one speech during a short trip to Rome is not even a drop in the bucket compared to hundreds of addresses delivered all over the world by Secretary Clinton and this: Total Travel Time: 2084.21 Hours / 86.8 Days Total Mileage: Travel Days: Nor will any of this amount to the depth and breadth of foreign policy experience Hillary Clinton has accumulated. The motives are transparent with diminishing returns. It was not an invitation from Pope Francis or even, really, from the Vatican. Hillary is untrustworthy? Let him who is without sin etc. etc. etc. … Of Fences, Walls, Bridges, and Tunnels: The GOP Traffic Jam and What DO Americans Really Want? Posted in 2016 Election, Democratic Party, Hillary 2016, Hillary Clinton, Hillary Clinton 2016, Hillary For America, Hillary for President, Hillary Rodham Clinton, Republican Party, Secretary of State, Secretary of State Travel, state department, Uncategorized, tagged 2016 election, debate, GOP, Hillary 2016, Hillary Clinton, Hillary For America, Hillary for President, immigration reform, Republican Party on August 9, 2015| 5 Comments » If a Republican has the mike in this election cycle and immigration arises as a topic, we are going to hear about a wall or a fence. Donald Trump intends to build a wall that, in his world, Mexico will finance. On State of the Union with Jake Tapper, Governor John Kasich (OH) referred to a fence. At the Thursday night debate, Kasich called it a wall, "Mr. Trump is touching a nerve because people want the wall to be built…" Meanwhile, Marco Rubio changed it to a fence, "I also believe we need a fence. The problem is if El Chapo builds a tunnel under the fence…." All conveniently forgot or ignored that the 9/11 hijackers and the and potential "shoe-bomber" arrived by air, and recent terrorist activity has come from domestic residents and citizens. New Englander, and Poet Laureate of Vermont (although his farm stands in Derry, NH) , Robert Frost had some hardscrabble experience with both walls and fences built beautifully by Fencing Builders, referred to interchangeably here. The Robert Frost Farm in Derry, New Hampshire, where he wrote many of his poems, including "Tree at My Window" and "Mending Wall." – Wikipedia Robert Frost, 1874 – 1963 Something there is that doesn't love a wall, That sends the frozen-ground-swell under it, And spills the upper boulders in the sun; And makes gaps even two can pass abreast. The work of hunters is another thing: I have come after them and made repair Where they have left not one stone on a stone, But they would have the rabbit out of hiding, To please the yelping dogs. The gaps I mean, No one has seen them made or heard them made, But at spring mending-time we find them there. I let my neighbor know beyond the hill; And on a day we meet to walk the line And set the wall between us once again. We keep the wall between us as we go. To each the boulders that have fallen to each. And some are loaves and some so nearly balls We have to use a spell to make them balance: 'Stay where you are until our backs are turned!' We wear our fingers rough with handling them. Oh, just another kind of outdoor game, One on a side. It comes to little more: There where it is we do not need the wall: He is all pine and I am apple orchard. My apple trees will never get across And eat the cones under his pines, I tell him. He only says, 'Good fences make good neighbors.' Spring is the mischief in me, and I wonder If I could put a notion in his head: 'Why do they make good neighbors? Isn't it Where there are cows? But here there are no cows. Before I built a wall I'd ask to know What I was walling in or walling out, And to whom I was like to give offense. That wants it down.' I could say 'Elves' to him, But it's not elves exactly, and I'd rather He said it for himself. I see him there Bringing a stone grasped firmly by the top In each hand, like an old-stone savage armed. He moves in darkness as it seems to me, Not of woods only and the shade of trees. He will not go behind his father's saying, And he likes having thought of it so well He says again, 'Good fences make good neighbors.' Yes, maybe, and the only ones tunneling under Frost's walls, presumably, were moles. The Great Wall in China has served two purposes, as a defense, and now as a tourist attraction. Then there was this wall. Frost was honored to craft and read a poem at the inauguration of a young president in 1961. Some of us remember how he struggled against the wind and bright sunlight in his presentation. (I was in tears for him). This is the poem he intended to read. Summoning artists to participate In the august occasions of the state Seems something artists ought to celebrate. Today is for my cause a day of days. And his be poetry's old-fashioned praise Who was the first to think of such a thing. This verse that in acknowledgement I bring Goes back to the beginning of the end Of what had been for centuries the trend; A turning point in modern history. Colonial had been the thing to be As long as the great issue was to see What country'd be the one to dominate By character, by tongue, by native trait, The new world Christopher Columbus found. The French, the Spanish, and the Dutch were downed And counted out. Heroic deeds were done. Elizabeth the First and England won. Now came on a new order of the ages That in the Latin of our founding sages (Is it not written on the dollar bill We carry in our purse and pocket still?) God nodded his approval of as good. So much those heroes knew and understood, I mean the great four, Washington, John Adams, Jefferson, and Madison So much they saw as consecrated seers They must have seen ahead what not appears, They would bring empires down about our ears And by the example of our Declaration Make everybody want to be a nation. And this is no aristocratic joke At the expense of negligible folk. We see how seriously the races swarm In their attempts at sovereignty and form. They are our wards we think to some extent For the time being and with their consent, To teach them how Democracy is meant. "New order of the ages" did they say? If it looks none too orderly today, 'Tis a confusion it was ours to start So in it have to take courageous part. No one of honest feeling would approve A ruler who pretended not to love A turbulence he had the better of. Everyone knows the glory of the twain Who gave America the aeroplane To ride the whirlwind and the hurricane. Some poor fool has been saying in his heart Glory is out of date in life and art. Our venture in revolution and outlawry Has justified itself in freedom's story Right down to now in glory upon glory. Come fresh from an election like the last, The greatest vote a people ever cast, So close yet sure to be abided by, It is no miracle our mood is high. Courage is in the air in bracing whiffs Better than all the stalemate an's and ifs. There was the book of profile tales declaring For the emboldened politicians daring To break with followers when in the wrong, A healthy independence of the throng, A democratic form of right devine To rule first answerable to high design. There is a call to life a little sterner, And braver for the earner, learner, yearner. Less criticism of the field and court And more preoccupation with the sport. It makes the prophet in us all presage The glory of a next Augustan age Of a power leading from its strength and pride, Of young amibition eager to be tried, Firm in our free beliefs without dismay, In any game the nations want to play. A golden age of poetry and power Of which this noonday's the beginning hour. This is the poem he recited from memory that day. "The Gift Outright" Poem recited at John F. Kennedy's Inauguration The land was ours before we were the land's She was our land more than a hundred years Before we were her people. She was ours In Massachusetts, in Virginia, But we were England's, still colonials, Possessing what we still were unpossessed by, Possessed by what we now no more possessed. Something we were withholding made us weak Until we found out that it was ourselves We were withholding from our land of living, And forthwith found salvation in surrender. Such as we were we gave ourselves outright (The deed of gift was many deeds of war) To the land vaguely realizing westward, But still unstoried, artless, unenhanced, Such as she was, such as she will become. That young president visited that infamous wall and had these words to offer. I am proud to come to this city as the guest of your distinguished Mayor, who has symbolized throughout the world the fighting spirit of West Berlin. And I am proud — And I am proud to visit the Federal Republic with your distinguished Chancellor who for so many years has committed Germany to democracy and freedom and progress, and to come here in the company of my fellow American, General Clay, who — < — who has been in this city during its great moments of crisis and will come again if ever needed. Two thousand years ago — Two thousand years ago, the proudest boast was "civis Romanus sum."¹ Today, in the world of freedom, the proudest boast is "Ich bin ein Berliner." (I appreciate my interpreter translating my German.) There are many people in the world who really don't understand, or say they don't, what is the great issue between the free world and the Communist world. Let them come to Berlin. There are some who say — There are some who say that communism is the wave of the future. And there are some who say, in Europe and elsewhere, we can work with the Communists. And there are even a few who say that it is true that communism is an evil system, but it permits us to make economic progress. Lass' sie nach Berlin kommen. Freedom has many difficulties and democracy is not perfect. But we have never had to put a wall up to keep our people in — to prevent them from leaving us. I want to say on behalf of my countrymen who live many miles away on the other side of the Atlantic, who are far distant from you, that they take the greatest pride, that they have been able to share with you, even from a distance, the story of the last 18 years. I know of no town, no city, that has been besieged for 18 years that still lives with the vitality and the force, and the hope, and the determination of the city of West Berlin. While the wall is the most obvious and vivid demonstration of the failures of the Communist system — for all the world to see — we take no satisfaction in it; for it is, as your Mayor has said, an offense not only against history but an offense against humanity, separating families, dividing husbands and wives and brothers and sisters, and dividing a people who wish to be joined together. What is — What is true of this city is true of Germany: Real, lasting peace in Europe can never be assured as long as one German out of four is denied the elementary right of free men, and that is to make a free choice. In 18 years of peace and good faith, this generation of Germans has earned the right to be free, including the right to unite their families and their nation in lasting peace, with good will to all people. You live in a defended island of freedom, but your life is part of the main. So let me ask you, as I close, to lift your eyes beyond the dangers of today, to the hopes of tomorrow, beyond the freedom merely of this city of Berlin, or your country of Germany, to the advance of freedom everywhere, beyond the wall to the day of peace with justice, beyond yourselves and ourselves to all mankind. Freedom is indivisible, and when one man is enslaved, all are not free. When all are free, then we look — can look forward to that day when this city will be joined as one and this country and this great Continent of Europe in a peaceful and hopeful globe. When that day finally comes, as it will, the people of West Berlin can take sober satisfaction in the fact that they were in the front lines for almost two decades. All — All free men, wherever they may live, are citizens of Berlin. And, therefore, as a free man, I take pride in the words "Ich bin ein Berliner." Many remember Ronald Reagan asking Mikhail Gorbachev to tear down that wall. Some believe it fell because he said that. Some believe it fell because of prayers we said at the end of Mass for many years as instructed by the Virgin at Fatima. The most likely reason was the fault in Communism, the system so failed that it had to build a wall in the first place to keep its people in. Hillary Clinton led the U.S. delegation to the 20th anniversary of the fall of that wall that some of us remember being built upon blood – literally – on the blood of the people who tried to escape. Secretary Clinton at the Fall of the Wall + 20 Video: Secretary Clinton at The Fall of the Wall +20 My favorite account of how that wall came down, is this one by Andreas Ramos. Very worth the read. Hillary Clinton is not and never has been about building walls. She has always been about tearing them down. When it comes to our neighbor to the south, she holds Mexico in such high regard that after her first, quite extensive tour as secretary of state through Asia, her next official visit was to Mexico. Hillary Clinton in Mexico with Women Leaders and Foreign Secretary Patricia Espinosa On her second day there, she surprised the rector at the shrine of Our Lady of Guadalupe with an early morning visit. The Basilica is the heart of Mexican religious life. Hillary wanted to see and to understand, and she understood the power of the gesture. Hillary Clinton in Mexico Day 2 So while the GOP continually speaks of walls and fences, Hillary has shown herself to be a builder of bridges and relationships, One of her final acts as secretary of state was to welcome Patricia Espinosa's successor to the State Department. Video: Hillary Clinton Greets New Foreign Secretary of Mexico Jose Antonio Meade It is up to Americans to decide what they prefer: candidates who want to wall us off and isolate us from the world and the world from us physically, militarily, and economically with unilateral sanctions already proven not to work, or a candidate who builds and nourishes healthy relationships around the globe with friends and partners and who knows how to negotiate with those who disagree with us. It is our choice. It is your vote! Be informed. Use it wisely. Hillary Clinton's 'Hard Choices' Retrospective Part Five Chapter 18 Iran: Sanctions and Secrets Posted in Foreign Policy, Hillary Clinton, Hillary Rodham Clinton, Secretary of State, Secretary of State Travel, state department, U.S. Department of State, Uncategorized, tagged Ahmedinejad, Ayatollah Khameini, Barack Obama, Hard Choices, Hillary Clinton, Hillary Rodham Clinton, Iran, Rouhani, Sergei Lavrov, Sultan Qaboos on September 13, 2014| 10 Comments » In Oman with Sultan Qaboos, January 12, 2011, when strategies to limit Iran's nuclear expansion were failing, the sultan suggested secret talks. "I can help," he said. She liked his style. Monarch, yes, but a true reformer with a great human rights record and possibly our best chance at that moment. Hillary provides a brief history of U.S.-Iranian relations from the coup in 1953 that installed the Shah through his overthrow in 1979 and the seizure of Embassy Tehran that year in which 52 Americans were taken hostage and held for 444 days until after Ronald Reagan took the oath of office on January 20, 1980. (OK – Hillary doesn't say that, but I will never forget it.) She enumerates terrorist attacks originating in or connected to the new Iranian revolution over the decades that indicate the global danger posed by a nuclear Iran which refused to abide by the Nuclear Nonproliferation Treaty (which it had signed) and denied inspection access to the International Atomic Energy Agency (IAEA). Hillary began advocating for sanctions against Iran as Senator from New York. During the 2008 primaries she took issue with Obama's plan to engage directly with Iran without preconditions. She also threatened nuclear retaliation if Iran were to launch a nuclear attack on Israel and Iran filed a formal protest against her at the U.N. After she accepted secretary of state, they had to craft an effective approach. They settled on a dual strategy: engagement and pressure. Compliance with treaty obligations would result in improved relations. Refusal would lead to increased isolation and worse. The first gesture was two letters from President Obama to the Ayatollah Khameini and a video message to the people of Iran. The tactic was meant to show our open hand. Hillary emphasized this posture by inviting Iran to the U.N. Conference on Afghanistan at The Hague in March 2009. They sent a deputy foreign minister. Hillary did not meet with him, but reciprocated by sending a deputy of hers to make contact. The Hague Afghanistan Conference Hillary's proxy, Jake Sullivan, hand delivered a letter requesting the release of three hostages: Robert Levinson, Esha Momeni, and Roxana Saberi. Levinson remains in custody. Momeni was released in August of that year, and Roxana Saberi was released in May 2009 and can be seen daily on Al Jazeera America. Richard Holbrooke also had an encounter with the Iranian representative that the Iranian later denied. (After all you have read about Holbrooke in this book, the air of mystery, forever to remain unsolved, is tantalizing.) June of that year brought deeply flawed Iranian elections. The protests and subsequent government crackdown played out for several weeks, particularly on Twitter. It was called The Green Revolution. The mainstream media was perpetually several days behind. Many of us were busily retweeting tweets from the streets of Tehran and other Iranian cities. Our profile pictures and backgrounds were shaded green. This was a wallpaper many of us used. It was made of a collage of hundreds of our green-shaded profile pictures. The first night we did this, the whole left side of my Twitter feed turned to a green stripe within two hours. These were visual signals, instantly recognizable, that what followed was information from Iran. You could scan your feed and rapidly locate the tweets that could mean everything to someone on the other side of the globe. Tweets consisted of life-and-death information. What hospitals were safe? Which ones had Revolutionary Guards posted? What streets were safe to navigate? Which embassies were accepting people? Which were not? Which had Revolutionary Guards stationed at entrances? We had all set our Twitter accounts to Tehran time and deleted every RT as soon as we sent it to protect the original senders. The senders did the same thing in case their phones were confiscated. Continually retweeting the information was the only way to keep it alive, available, and moving. We did this particularly on Friday and Saturday nights – frantically. It was like a part-time job. We all saw almost immediately when this young woman, Neda Soltani, was killed in the street. She died in her father's arms. and her sister tweeted the horrific video she had posted on Facebook with the heartbreaking words. "I saw my sister die today." The video at this link is no longer available in this country, but Hillary writes of this and knew about it. It had been on Twitter and Facebook for three days before the mainstream media finally picked up the story. Neda Soltani June 21, 2009 by still4hill | Edit I have no words. Yesterday I watched as this lovely young woman, looking for a better life in her own country was killed on the street. I know I was not alone, and I also know I was not the only one who cried. We all know by now what Hillary relates in the book – that smack in the middle of this revolution and all of this activity on Twitter, the social media site was to go down for maintenance. Her department prevailed upon Twitter to delay the maintenance in order to leave the lines of communication open. It was crucial, and even though we who were retweeting did not and do not know what night that was to have been and what terrible things were happening just then, I know we were still there retweeting critical information back to Iran because Hillary made sure we could. We don't know how many lives might have been saved as a result. We never knew. I think we did help. I pray we did. Hillary says in the book that she remains uncertain that staying on the sidelines was our best move during that terrible time as this popular uprising was crushed. She writes that by September Khameini and Ahmedinejad, the quirkily comic yet dangerous President (who reminded some of us of a certain Twin Peaks character) had solidified their stronghold and UNGA was imminent. President Obama was scheduled to chair a Security Council meeting on nuclear security, and recent news of a secret enrichment facility near Qom was an issue to be provided some international daylight. Hillary foreshadowed what was to be unveiled in this speech about a week earlier. Hillary Clinton at Brookings Institution in Advance of UN General Assembly September 18, 2009 by still4hill … let me take a moment to say a few words about Iran, which will be another key topic on the President's and my agenda next week. To begin, it is important to recall what's really at issue, and what's really at stake. Iran has refused for years to address the international community's deep concerns about its nuclear program. Those concerns have been underscored repeatedly by the International Atomic Energy Agency and the UN Security Council. Iran's continued failure to live up to its obligations carries profound consequences – for the security of the United States and our allies; for progress on global nonproliferation and progress toward disarmament; for the credibility of the IAEA and the Security Council and the Nonproliferation Treaty; and of course, for stability in the Persian Gulf, the Middle East, and beyond. Our concern is not Iran's right to develop peaceful nuclear energy, but its responsibility to demonstrate that its program is intended exclusively for peaceful purposes. This is not hard to do. Iran's continued refusal to cooperate has damaged the credibility of its claim that it does not seek a nuclear weapon. So Iran faces a choice. The international community has made abundantly clear what is possible for all Iranians if Iran lives up to its responsibilities on the nuclear issue – the benefits of economic connections to the rest of the world, cooperation on peaceful nuclear energy, and partnership in education and science. But there will be accompanying costs for Iran's continued defiance – more isolation and economic pressure, less possibility of progress for the people of Iran. Outing the Qom facility in the Security Council was ditched. The alternative was to use private meetings. The Russians were visibly shocked. Here is how it began to roll out. Video: Secretary Clinton's Remarks on Iran Secretary Clinton: Further Remarks on Iran … as President Obama, President Sarkozy, and Minister Brown said in their statement today, Iran's efforts over a number of years to build a covert enrichment facility near Qom deepens our already deep concern, and the growing international understanding about the scope and intent of Iran's nuclear program… This is further evidence of Iran's continued defiance of IAEA and the United Nations obligations. Iran is breaking rules that all nations are expected to follow, and we fully support an immediate IAEA investigation… This is an unfolding narrative. As more and more information is shared with the world, as the comments made by Ahmadinejad during his recent appearance, and both before and since illustrate attitudes and approaches that are really at variance with almost universal principles and understanding of historical reality… I'm not going to prejudge it, but clearly, this is an incredibly important disclosure that the world needs to digest. The "Geneva Agreement" became the effort into the fall. Hillary Clinton and Robert Gates: Power and Persuasion October 6, 2009 by still4hill … there were three agreements. One, that there would be inspections, and those inspections are going forward and they're going forward quickly, of the undisclosed site that the President and Prime Minister Brown and President Sarkozy announced a little over a week ago in Pittsburgh. They agreed that, in principle, the Iranians would ship out their LEU for reprocessing to be returned for their research reactor. There will be a team of experts meeting to determine exactly how that will be carried out within 10 days. And they agreed that there will be another meeting, which means that this process doesn't just drag on without any continuity. So we think that on those three big issues, this was a worthwhile meeting. But as the President has said and I and others have also made clear, this is not by any means a stopping point. There is much more to be done. We expect much more. Hillary Clinton in England with David Miliband … we have also reviewed our position on Iran, where our countries work so closely together, including on the most recent revelation of the covert Iranian uranium enrichment site. My point on this is very, very simple, that Iran will never have a better opportunity to establish normal relations with the international community. And it will never have a better opportunity than to show that the peaceful intent that marks its words about its nuclear program is matched by its deeds. Hillary Clinton with Sergei Lavrov in Moscow We obviously discussed some of the broader foreign policy issues that we both face. Iran's nuclear program remains a matter of serious concern, and we're working closely with Russia through the P-5+1 process. We had a constructive meeting in Geneva on October 1st. And we are working to ensure that Iran moves forward with us on this engagement track and demonstrates unequivocally that it is seeking only the peaceful use of nuclear weapons. We had a long discussion and brought in some of our technical experts to review where we stand on missile defense. We explained that our assessment of the evolving threat from Iran led President Obama to adopt a new, different approach to missile defense. We are very interested in working with Russia to develop cooperation, including a joint threat assessment and intensified efforts to establish a joint data exchange center, as our presidents agreed to in July, as a means of making missile defense a common enterprise against what we believe are increasingly common threats. Secretary Clinton: Back at Foggy Bottom after an extended trip The United States is also grateful for Germany's participation and leadership in the P-5+1 and the E-3+3 processes to ensure Iran's full compliance with UN Security Council resolutions and IAEA directives on its nuclear program. We are speaking with one voice on this critical issue, and it is a voice that is amplified by our friends from Britain and France, from Russia, China and the European Union. We are pressing Iran together in our support of the recent proposal to provide new fuel for the Tehran research reactor in exchange for Iran shipping out its low-enriched uranium. We both support the IAEA's efforts to inspect the recently disclosed uranium enrichment facility near Qom. And we both remain ready, along with our partners, to meet with Iranian representatives to discuss further steps to build confidence and transparency in its nuclear program. As I have said, this is a pivotal moment for Iran, and we urge Iran to accept the agreement as proposed. We will not alter it, and we will not wait forever. Hillary Clinton's Remarks with French Foreign Minister Kouchner January 30, 2010 by still4hill | The work on Iran is (inaudible) greater intensity and France's leadership is especially important. The international community is united in its resolve regarding Iran's nuclear program and in its condemnation of the serious escalating assault on human rights. The recent executions that have taken place in Iran of demonstrators, the creation of new crimes to try to imprison and execute protestors and opposition leaders is deplorable. Video & Text: Secretary Clinton's Remarks Before Senate Foreign Relations Committee We are fighting two wars that call on the skill and sacrifice of our civilians as well as our troops. We have pursued a dual-track approach to Iran that has exposed its refusal to live up to its responsibilities and helped us achieve a new unity with our international partners. Iran has left the international community with little choice but to impose greater costs for its provocative steps. And we are now working actively with our partners to prepare and implement new measures to pressure Iran to change its course. Video & Text: Secretary Clinton Before House Foreign Affairs Committee February 25, 2010 by still4hill | The figures in the budget are more than numbers on a page. They tell the story of the challenges we face and the resources we need to overcome them. We are fighting two wars that call for the skill and sacrifice of our civilians as well as our troops. We have pursued a dual-track approach to Iran that has exposed for the world to see its refusal to live up to its responsibility, and it has helped us achieve a new unity with our international partners. Iran has left the international community little choice but to impose greater costs for its provocative steps. And we are now working actively with other countries to prepare and implement new measures to pressure Iran to change course. Brazil was, at the time, occupying one of the rotating seats on the Security Council. Cooperation was essential to the success of the resolution for sanctions. Secretary Clinton's Remarks With Brazilian Foreign Minister Celso Luiz Nunes Amorim … both the United States and Brazil are committed to the core goal of nonproliferation. And the foreign minister and I discussed our mutual commitment to ensuring that Iran does not acquire a nuclear weapon. And the United States looks forward to continuing that conversation with Brazil in the weeks ahead. Secretary Clinton's Remarks With Russian FM Lavrov We discussed at length Iran's nuclear program, which remains an issue of grave concern for the international community. We are still committed, as we have been, to a diplomatic solution, but there must be a solution. Iran is not living up to its international obligations and, therefore, we're working together with our other partners in the P-5+1 to bring together a very clear international consensus in the Security Council that gives Iran the message it needs to hear that its behavior does have consequences and that its pursuit of nuclear weapons poses a direct threat both to regional and global security. Hillary Rodham Clinton Secretary of State: Remarks at the Review Conference of the Nuclear Nonproliferation Treaty May 3, 2010 by still4hill We know there are some countries who will choose not to be constructive. This morning, Iran's president offered the same tired, false, and sometimes wild accusations against the United States and other parties at this conference. But that's not surprising. As you all heard this morning, Iran will do whatever it can to divert attention away from its own record and to attempt to evade accountability. Ultimately, however, we will all be judged not for our words but for our actions. And we will all be measured not by how assertively we claim our rights but by how faithfully we uphold our responsibilities. And as the Secretary General said, in this regard the onus is on Iran. So far, it has failed to meet its burden. Iran is the only country represented in this hall that has been found by the IAEA Board of Governors to be currently in noncompliance with its nuclear safeguards obligations – the only one. It has defied the UN Security Council and the IAEA, and placed the future of the nonproliferation regime in jeopardy. And that is why it is facing increasing isolation and pressure from the international community. Secretary Clinton's Address at the Strategic and Economic Dialogue Opening Session … on international security challenges, the United States and China have consulted closely on the challenge posed by Iran's nuclear program. The prospect of a nuclear-armed Iran concerns us all. And to address that threat, together we have pursued a dual-track approach of engagement and pressure, aimed at encouraging Iran's leaders to change course. The draft resolution agreed to by all of our P-5+1 partners and circulated at the Security Council sends a clear message to the Iranian leadership: Live up to your obligation, or face growing isolation and consequences. As we continue to cooperate in New York, the burden is on Iran to demonstrate through its actions that it will uphold its responsibility. Secretary Clinton: Concluding Joint Statements at the U.S.-China Strategic and Economic Dialogue … we had very frank and detailed conversations about international security challenges and regional hot spots, including Iran and North Korea. We stressed the importance of reaching a conclusion on resolution of the United Nations Security Council to send a message to Iran to, "Live up to your international responsibilities or face growing isolation and consequences." Hillary mentions an OAS meeting in Peru where she had cocktails with Chinese ambassador the the U.S. Zhang Yesui and they worked out some fine points on the sanctions while the press at the bar had no idea high-level negotiations were going on. Mark Landler of the New York Times brought them a couple of drinks, and there was a final agreement. Thank you Mark! Assistant Secretary Arturo Valenzuela: Briefing on Secretary Clinton's Upcoming Travel to Latin America and the Caribbean June 4, 2010 by still4hill | This trip this week will begin on Sunday and it's to Lima, Peru, for the General Assembly of the Organization of American States. So the Secretary will lead the U.S. delegation to the Organization of American States annual meeting in Lima. And in Lima, she will also have a bilateral meeting with President Garcia, who, as you know, was in Washington last week to meet with the President as well. From – so will be arriving on Sunday in Lima, Peru – Sunday evening. She will spend the entire day in Peru on Monday in the meetings of the OASGA. Hillary Clinton: Statements and Remarks on the Security Council Vote I commend the United Nations Security Council for its adoption today of UN Security Council Resolution 1929, aimed at addressing the international community's concerns regarding Iran's nuclear program. Despite consistent and longstanding demands by the Council, Iran has not suspended its uranium enrichment and other proliferation-related activities that are in direct violation of its commitments to the IAEA and its obligations under the NPT. This resolution sends an unambiguous signal to Iran that the international community holds it accountable for its actions. The measures in this resolution go well beyond the pre-existing sanctions on Iran. Secretary Clinton's Statement on Passage of Iran Sanctions Legislation I join President Obama in welcoming Congressional passage of legislation to strengthen sanctions against Iran. We support the broad aims of HR 2194, the Comprehensive Iran Sanctions, Accountability, and Divestment Act of 2010 — constraining Iran's nuclear program, changing the calculus of Iran's leaders, and demonstrating that Iran's policies decrease its standing, and further isolate it in the international community. We are committed to fully implementing this legislation in a manner that advances our multilateral dual-track strategy of engagement and pressure. These new measures, along with action by the European Union and Australia, build on United Nations Security Council Resolution 1929 and underscore the resolve of the international community to prevent Iran from developing nuclear weapons and to hold it accountable for its international obligations. The United States will work with our partners to maximize the impact of these efforts and to continue pursuing a diplomatic resolution to the international community's concerns regarding Iran's nuclear program.‪ December 2010, she recounts her first face-to-face encounter with her Iranian counterpart at this function where she extended her open hand and was twice rebuffed. Secretary Clinton's Remarks at the Manama Dialogue Opening Dinner At this time, I would like to address directly the delegation at this conference from the government of the Islamic Republic of Iran. I am pleased to have this opportunity for your government and mine to gather here with representatives from other nations to discuss problems of mutual concern and interest… Nearly two years ago, President Obama extended your government a sincere offer of dialogue. We are still committed to this offer. The next month, Sultan Qaboos made his offer to help. He had helped get the release of three American hikers, Joshua Fattal, Shane Bauer, and Sarah Shourd who had been arrested in July 2009. This, of course, was bigger and very sensitive. Complications were sure to arise and they did. The news she mentions about the assassination plot against the Saudi ambassador to the U.S. broke while she was about to be interviewed at the State Department. Secretary Clinton's Interviews with AP and Reuters QUESTION: And that is – presumably you are up to speed, you're aware of this? SECRETARY CLINTON: Yes, aware – QUESTION: And I know that it's a Justice Department thing and that – SECRETARY CLINTON: It is. QUESTION: But what does it say about – I mean, about Iran and any attempt to try and get them to be reasonable? SECRETARY CLINTON: Well, first let me start with what it says about our whole-of-government efforts. I mean, this was a really important achievement by our law enforcement and our intel community to disrupt this plot. And you'll be able to get the – you all were up here, but the news conference that the Attorney General and the FBI director and the U.S. Attorney from the Southern District and the Assistant AG for National Security just finished giving made it very clear that this was conceived by and directed by elements within the Iranian Government. The complaint has more detail than that. It's something that we've been aware of and working on, led by the Justice Department and the FBI and the DEA. So I think that the fact that the plot was disrupted and that, thankfully, the worst consequences that might have resulted from this kind of state-sponsored act of terror against a diplomat who, under the Convention for the Prevention and Punishment of Crimes Against Internationally Protected Persons, is a breach of international norms, and Iran happens to be a signatory to that convention, I think creates a potential for international reaction that will further isolate Iran, that will raise questions about what they're up to, not only inside the United States or Mexico, but elsewhere in the world. More details will, of course, come out in the course of the case being processed. But as you may know, Matt, there are two named defendants, one the holder of American and Iranian passports and one who is in Iran who was involved. And I'm going to let the details kind of be up to the Justice Department because it's really within their bailiwick. But it will not, I think, surprise you to know that we are actively engaged in a very concerted diplomatic outreach to many capitals, to the UN in New York, to not only explain what happened so that we try to preempt any efforts by Iran to be successful in what will be their denial and their efforts to try to deflect responsibility, but that we also enlist more countries in working together against what is becoming a clearer and clearer threat by Iran within many nations. Secretary Clinton: Measures to Increase Pressure on Iran Recent days have brought new evidence that Iran's leaders continue to defy their international obligations and violate international norms, including the recent plot to assassinate the Saudi Ambassador here in the United States and as verified by the new report from the International Atomic Energy Agency that further documents Iran's conduct of activities directly related to the development of nuclear weapons. Now, this report from the IAEA is not the United States or our European partners making accusations; this is the result of an independent review and it reflects the judgment of the international community. Secretary Clinton with Indian External Affairs Minister S M Krishna MINISTER KRISHNA: Since you asked a specific question about Iran, it remains an important source of oil for us, although its share in our imports are declining, which is well known. Ultimately, it reflects the decision that refineries make based on commercial, financial, and technical considerations. We have discussed our position and our perspectives on energy security, and these discussions will continue. As far as India is concerned, we subscribe to and rigorously implement the UN Security Council resolutions. This issue, however, is not a source of discord between our two countries. Hillary states that this was good enough for her. Iran's oil market suffered as our partners decreased their dependence on that market and migrated to other sources – often suggested by us. Hillary's mantra of "crippling sanctions" was becoming realized. She made sure, however, that the people of Iran were not deprived of necessities as a result, always clarifying that our argument was with the government, not with the people. Meanwhile, Iran was propping up Bashar Al-Assad in Syria with weapons, trainers, fighters, and money. As Hillary's term at State was drawing to a close, the secret talks began to yield some results, and Iranian elections were just around the corner. True debates ensued. Hassan Rouhani was elected. Hillary was no longer in office when the agreements were reached, and she harbored (and still does) a healthy skepticism born of experience. Yet five years of hard work and back-channel negotiations had produced fruit. Once again, if anyone tries to disparage or diminish Hillary Clinton's legacy at the State Department show them this page. Better yet, they should just read the book. The final few pages of this chapter read as grippingly as Michael Crichton or John le Carré. Hillary was not involved in those operations, but it was she who set the ball rolling. It wasn't a strike, but I think eight pins fell. Hillary Clinton's 'Hard Choices' Retrospective Part Five Chapter 16 Libya: All Necessary Means Posted in Foreign Policy, Foreign Service, Hard Choices, Hillary Clinton, Hillary Rodham Clinton, Secretary of State, Secretary of State Travel, state department, U.S. Department of State, Uncategorized, tagged Arab Spring., Barack Obama, Hard Choices, Hillary Clinton, Hillary Rodham Clinton, Libya, Nicholas Sarkozy, Qadhafi, Quaddafi, Retrospective, Secretary of State, State Department on September 8, 2014| 2 Comments » When the Arab Spring spread to Libya, President Sarkozy was the world leader most vocally in favor of an international initiative to assist the rebels. By the time Hillary opens this chapter at the March 2011 G-8 meeting in Paris (now G-7 since the ouster of Russia after the invasion of Crimea), she had already evacuated Embassy Tripoli, issued a statement, and addressed the situation at the Human Rights Council in Munich. She was still unconvinced an international intervention would be wise. Her questions: Would the international community unite? Who were the rebels? Were they prepared to lead? What was the endgame? Unlike Egypt, the military in Libya and foreign mercenaries were attacking the people under Qaddafi's orders. The rebels had formed a transitional governing council and it was their representative, Mahmoud Jibril, whom Hillary awaited as the chapter opens. Hillary walks us through a brief history of the U.S. and Qaddafi including the downing of Pan Am 103 over Lockerbie, his disconcerting fixation on Condi Rice, his 2009 visit to UNGA complete with his attempt to pitch his tent in Central Park and his long rambling speech. Suspension of United States Embassy Operations in Libya On March 9, she met at the White house with the national security team. There was no appetite for engagement and not much hope that the one option that seemed most likely – a no fly zone – would work. She mentions testifying before Congress on March 10. If this was the testimony, the comments she quotes occurred in the Q & A and not in her opening statements, but she did assure Congress that there were no plans for unilateral action. Video: Secretary Clinton's Remarks To The House Appropriations Committee Secretary Clinton's Travel to Europe and the Middle East When Jibril did show up he was in the company of Bernard-Henri Lévy, philosopher, advisor to Sarkozy, and one who. in an Indiana Jones sort of way, had managed to be on the ground to see what was happening in Libya. The Arab League had voted to request a no fly zone of the Security Council. Jibril, in the meeting, warned of imminent slaughter in Benghazi – the seat of the revolution in Libya. Video: Secretary Clinton's Remarks With UAE FM Abdullah bin Zayed Al-Nahyan CNN Video: Bernard-Henri Lévy Validates Hillary Clinton on Libya Truth time: I have long had an intellectual crush on Lévy. He is an odd mix of philosopher-journalist, and his logic is always superbe! Speaking with Eliot Spitzer on CNN's In The Arena tonight, he said that we should listen more to Mrs. Clinton. On the show tonight because he is the one who convinced Sarkozy to take up the free Libyan cause, he said that he told the French President that there were French flags flying in Benghazi, and if Sarkozy did nothing, there would be blood on the French flags. What a dramatic image! Uncomplicated and true. Slideshow: Hillary Clinton at Paris G8 On the ground in Cairo. Hillary mentioned the resolutions before the U.N. Security Council. There was a weak Russian-Chinese resolution and a strong French-Lebanese resolution. In the end Lavrov agreed that Russia would not to vote against the stronger one, but would simply abstain – and that was enough. The language of the stronger resolution contained the words "all necessary measures" to protect civilians. The issue was whether there was to be strictly a no fly zone or whether there was by extension a no drive zone. Would the attacks be strictly air-to-air, or would air-to-ground (seen as necessary to stop Qaddafi's ground troops from attacking rebel strongholds) be permissible? Secretary Clinton's Remarks With Egyptian Foreign Minister Nabil Al-Araby … with regard to Libya, we welcomed the Arab League's statement on Saturday. And I consulted with my G-8 colleagues yesterday in Paris. As you probably know, there is a British-French-Lebanese Security Council resolution that is being discussed at this time in New York. We are consulting with the Arab League about their understanding of the goals and modalities of a no-fly zone as well as other forms of support. We understand the urgency of this and therefore we are upping our humanitarian assistance. We are looking for ways to support the opposition, with whom I met last night. But we believe that this must be an international effort and that there has to be decisions made in the Security Council in order for any of these steps to go forward. After Cairo, she visited Tunisia, went back to DC briefly, and then was wheels up again for Paris. This time she arrived with an agreement to participate in a no fly zone in her very stylish bag. In the course of reading her book and digging up the posts from the events, I have learned not to be surprised anymore when her account differs from how it was reported since she is telling the story from the inside while we observed from outside. She tells this differently, but this is the way it looked to all of us. We also have become accustomed to Hillary waiving credit for her accomplishments. Hillary Clinton à Paris : Chapitre Deux CNN's John King dubbed her the "Acting President" yesterday, and no less a former adversary than MSNBC's Chris Matthews called her the Commander-in-Chief, saying she was presidential and strong. Roger L. Simon at Pajamasmedia treated us to this header: Jets over Libya as H. Clinton Assumes Presidency. The amazing Hillary Rodham Clinton departed Paris on Tuesday on a mission to convince the White House that participating in a No-Fly Zone was the right thing to do to protect the brave Libyan freedom fighters who have risen up against 42 years of dictatorship under the tyrant Mouammar Gadhafi. In her meetings on Monday and Tuesday, she reportedly responded to repeated requests for U.S. cooperation from various world leaders with the mantra, "There are difficulties." But HRC knew exactly what kind of an NFZ she wanted in order for the U.S. not to look like the cliched "world's policeman." She knew exactly how the coalition should be formed, and how her country should fit in. So when she returned to D.C. early Friday morning, after visits to Egypt and Tunisia, she did so with a mission. In a Situation Room meeting that morning, she finally scored her victory, winning President Obama's agreement to participate in the coalition. Hillary Clinton's Press Availability in Paris March 19, 2011 by still4hill | America has unique capabilities and we will bring them to bear to help our European and Canadian allies and Arab partners stop further violence against civilians, including through the effective implementation of a no-fly zone. As President Obama said, the United States will not deploy ground troops, but there should be no mistaking our commitment to this effort. The international community came together to speak with one voice and to deliver a clear and consistent message: Colonel Qadhafi's campaign of violence against his own people must stop. The strong votes in the United Nations Security Council underscored this unity. And now the Qadhafi forces face unambiguous terms: a ceasefire must be implemented immediately – that means all attacks against civilians must stop; troops must stop advancing on Benghazi and pull back from Adjabiya, Misrata, and Zawiya; water, electricity, and gas supplies must be turned on to all areas; humanitarian assistance must be allowed to reach the people of Libya. As you may know, French planes are already in the skies above Benghazi. Now, America has unique capabilities and we will bring them to bear to help our European and Canadian allies and Arab partners stop further violence against civilians, including through the effective implementation of a no-fly zone. As President Obama said, the United States will not deploy ground troops, but there should be no mistaking our commitment to this effort. Before the end of the month, command of the no fly zone operation was ceded by the U.S. to NATO. Video & Transcript: Secretary Clinton's Remarks on Transition of NFZ Command In response, the UN Security Council mandated all necessary measures to protect civilians, including a no-fly zone. But the regime's forces continued their assaults, and last weekend they reached Benghazi itself. We faced the prospect of an imminent humanitarian disaster. Hundreds of thousands of civilians were in danger. So an international coalition was compelled to act. French planes were the first to reach the skies over Benghazi. Cruise missiles from the United States and the United Kingdom followed, striking the region – the regime's air defenses and clearing the way for allied aircraft to implement the no-fly zone. Many other nations have now joined this effort. After only five days, we have made significant progress. A massacre in Benghazi was prevented, Qadhafi's air force and air defenses have been rendered largely ineffective, and the coalition is in control of the skies above Libya…. Today we are taking the next step. We have agreed, along with our NATO allies, to transition command and control for the no-fly zone over Libya to NATO. All 28 allies have also now authorized military authorities to develop an operations plan for NATO to take on the broader civilian protection mission under Resolution 1973. Secretary Clinton To Travel to London, United Kingdom Secretary of State Hillary Rodham Clinton will travel to London, United Kingdom, March 29 to attend an international conference to discuss the Libyan crisis, including ongoing implementation of United Nations Security Council Resolutions 1970 and 1973 and the humanitarian needs of those affected by the conflict. Hillary Clinton: Remarks at the International Conference on Libya Thank you very much, Prime Minister, and thanks to you and your government for the critical leadership effort you have demonstrated in our common effort. Thanks too to France, which has been at the forefront of this mission, including by hosting many of us last week in Paris, and really thanks to everyone around this table. We have prevented a potential massacre, established a no-fly zone, stopped an advancing army, added more partners to this coalition, and transferred command of the military effort to NATO. That's not bad for a week of work at a time of great, intense international concern… We believe that Libya's transition should come through a broadly inclusive process that reflects the will and protects the rights of the Libyan people. The Transitional National Council and a broad cross-section of Libya's civil society and other stakeholders have critical contributions to make… This is a time of great change for Libya, for its neighbors across the region and around the world. Under different governments, under different circumstances, people are expressing the same basic aspirations – a voice in their government, an end to corruption, freedom from violence and fear, the chance to live in dignity, and to make the most of their God-given talents. Now, we know these goals are not easily achieved, but they are, without question, worth working for together. And I'm very proud that this coalition has come to this place at this time to try to pursue those goals. Hillary Clinton: Remarks After the International Conference on the Libyan Crisis In late August, Qaddafi fled. Secretary Clinton's Statement on Libya August 25, 2011 by still4hill Secretary Clinton's Travel to Paris Secretary of State Hillary Rodham Clinton will travel to Paris, France September 1 to participate in a senior-level meeting of the Contact Group on Libya. Secretary Clinton: A New Future Dawning in Libya Well, this is my ninth trip to discuss the current crisis in Libya, and each time I have urged that our partners stay focused on the ultimate objective of helping the Libyan people chart their way to a better future. And today, that future is within their reach. All of us are inspired by what is happening in Libya. Six months ago, Libyans stood up to demand fundamental rights and freedom. And when Qadhafi met their peaceful protest with violence, the Libyan people refused to back down. While their struggle is not over, the Libyan people are taking back their country. Libya's transformation is the – largely the result of their own courage and their resilience in the face of very difficult days. The sacrifice that the Libyan people have been willing to make in order to obtain freedom and dignity has been extraordinary. The next month Hillary visited Malta and Libya. Malta, of course, had been a way station for Americans evacuated in February and deserved a grateful visit. From Malta, she proceeded to Libya. Secretary Clinton: Wheels Down in Malta Landing in Libya, she was apprehensive but received a warm reception from the militia. Mahmoud Jibril, with whom she had met in Paris in March, was the transitional Prime Minister. Video: Secretary Clinton with TNC Prime Minister Jibril in Tripoli I am proud to stand here on the soil of a free Libya. And on behalf of the American people I congratulate all Libyans. It is a great privilege to see a new future for Libya being born. And indeed, the work ahead is quite challenging, but the Libyan people have demonstrated the resolve and resilience necessary to achieve their goals. One of those challenges was coalescing so many disparate militias into a single military force under civilian authority, Hillary points out. Transitional Council leaders agreed with her. As we know, as of this writing, that never happened and is the reason that today Libya is in chaos with numerous militias battling each other and two parliaments. Again our embassy is evacuated. Secretary Clinton's Town Hall Meeting in Tripoli She also visited a hospital. Our embassy had been ransacked. They were running embassy services and operations out of the Ambassador's residence. Secretary Clinton's Embassy Meet-and-Greets in Valletta and Tripoli Then she was wheels-up and out. In the book, Hillary explains that from Malta to Libya and back they flew in a C-17 cargo transport because of the many shoulder-to-air weapons on the ground in Libya and the obvious markings on her plane. I can attest that these are very visible. When I lived in Haiti, then U.N. Ambassador Andrew Young visited and flew in a similar plane. When his flight was leaving I could, from my gallerie, clearly see the words "The United States of America" on his plane as it took off over the Gulf of La Gonave. My heart burst with pride to see it. It was wise not to send her "Big Blue Bird" into possible danger. She notes that on the flight to Libya from Malta this happened. Original image by Kevin Lamarque for Reuters. Original image by Diana Walker for Time. Leading to this: Texts From Hillary And ultimately this! Despite all the fun generated by those pics of Hillary "running the world," she left Libya that day soberly worried about its future. She had been forced in late 2010 to recall Ambassador Gene Cretz, quite a character as portrayed in her book, because of credible threats against him. Chris Stevens, an expert on Libya, former envoy to the rebels in Benghazi during the revolution, and very enthusiastic supporter of their cause, accepted the job with gusto. Anyone who has seen his video introducing himself to the people of Libya as the new American Ambassador can see that. The attacks on our outposts in Benghazi were not the last of the problems engendered by a new government unable to wrangle the many militias. As I write, Embassy Tripoli is once again evacuated. Everyone has seen the videos by now. None of that is for clouded vision on Hillary's part or anyone else's. Our mission, always, is to go to the dangerous places and to try to talk and reason with people. Hillary Clinton's 'Hard Choices' Retrospective Part Five Chapter 15 The Arab Spring: Revolution Posted in Foreign Policy, Hard Choices, Hillary Clinton, Hillary Rodham Clinton, Secretary of State, Secretary of State Travel, state department, U.S. Department of State, Uncategorized, tagged Arab Spring., Bahrain, Barack Obama, Egypt, Forum for the Future, Hard Choices, Hillary Clinton, Hillary Rodham Clinton, Hosni Mubarak, Joe Biden, Qatar, Retrospective, Robert Gates, Tunisia, UAE, Yemen on September 4, 2014| Leave a Comment » "They're sitting on a powder keg." Hillary begins this chapter in January 2011 as she prepped to speak at Forum for the Future, an annual meeting where the rich and powerful of the Arab world convene. In Morocco in November 2009, early in her tenure at the State Department, but already having set signature issues and standards of engagement, she gently and subtly prodded these leaders toward inclusion of marginalized citizens, particularly women and young people. I have always thought of that speech as foreshadowing the events that were to come. I have also always thought that she was clear-eyed due to her outreach to civil society. Hillary Clinton knew the people and their concerns better than their own leaders had bothered to know them. When she delivered that Morocco speech, she should have been seen the way an outside consultant is in a corporation. Had she been, her findings and advice might have been heeded. … it is results, not rhetoric, that matter in the end. Economic empowerment, education, healthcare, access to energy and to credit, these are the basics that all communities need to thrive. And the United States seeks to pursue these common aspirations through concrete actions. We know that true progress comes from within a society and cannot be imposed from the outside, and we know that change does not happen overnight. So we will not focus our energies on one-time projects, but we will seek to work with all of you in government and in civil society to try to build local capacity and empower local organizations and individuals to create sustainable change… Earlier this year, I visited an Access classroom in Ramallah. I walked into an enthusiastic discussion of Women's History Month. These were students who did not come from educated families, but they were students with the same ambition and motivation that we heard described by our colleague, the Palestinian foreign minister, about his own son. We want to create more opportunities for students like these to fulfill their God-given potential. And this points to a related priority – the empowerment of women. I have said, as some of you know, for many years, and President Obama said it in Cairo, no country can achieve true progress or fulfill its own potential when half of its people are left behind. When little girls are not given the same opportunities for education, we have no idea what we are losing out on because they're not going to be able to contribute to the growth and the development of their countries… Our work is based on empowering individuals rather than promoting ideologies; listening and embracing others' ideas rather than simply imposing our own; and pursuing partnerships that are sustainable and broad-based… As leaders of countries that have a direct stake and care deeply about all of the final status issues that must be resolved, I would just ask you to think about how we can each demonstrate the commitment that is necessary for us to go forward. Having adhered to the status quo, these leaders and elder statemen were about to experience what Hillary had seen coming all along: upheaval. On the cusp of wide-spread revolution with Tunisia already boiling over, Hillary did not want to make a boilerplate speech. She wanted to be clear, strong, and firm. If they did not change the way they governed, change would find them. She recalls that her predecessor, Condoleeza Rice, had paved the way in 2005 when she stated that for more than half a century the U.S. had chosen to pursue "stability at the expense of democracy" and had "achieved neither" Hillary intended to make the case for democracy crystal clear in Doha: resisting change is nothing more than a recipe for unrest and conflict – a petri dish for terrorism. Secretary Clinton's Travel to the United Arab Emirates, Oman, and Qatar January 6, 2011 by still4hill Background Briefing on the Secretary Clinton's Upcoming Travel As she prepared to travel, the Lebanese government became shaky. She met with Prime Minister Hariri and King Abdullah of Saudi Arabia in New York prior to departure. Secretary Clinton and Escort Meet Saudi King Abdullah and Lebanese PM Hariri The next day she was wheels up for Abu Dhabi. Protests had spread all over Tunisia fueled, abetted, and broadcast by social media, the 21st century bête noire of despots. Her first public remarks on the trip were to graduate students at a high-tech institute. Secretary Clinton's Remarks at The Masdar Institute (U.A.E.) The old strategies for growth and prosperity will no longer work. For too many people in too many places, the status quo today is unsustainable. And the UAE is leading our work and the path we must take into the future. It is putting into practice what it means to be sustainable and laying the groundwork for economic, environmental, and social progress. From there she proceeded to Yemen which she describes as representative of the warnings she had prepared to voice in Abu Dhabi. Secretary Clinton's Surprise Visit to Yemen She met with the president and he took her on a tour of the Old City of Sanaa where she found the women veiled and the men armed with daggers and Kalashnikovs. Secretary Clinton's Remarks With Yemeni President Ali Abdullah Saleh After Their Meeting Her next port-of-call was Oman, a monarchy, where she met with Sultan Qaboos. In the book she offers a review of progressive change since the 1970s so impressive that in 2010 the U.N. Development Programme ranked it the most improved country in human development over that period. Slideshow of Secretary Clinton in Oman: Part I Slideshow of Secretary Clinton in Oman: Part II The Hariri government disintegrated on January 12 while the prime minister was in Washington D.C. Finally, on the 13th, the speech so carefully prepared. This is a speech I have posted here several times. If you have never read it, it is well worth reading. Video: Secretary Clinton's Remarks at Forum for the Future … in too many places, in too many ways, the region's foundations are sinking into the sand. The new and dynamic Middle East that I have seen needs firmer ground if it is to take root and grow everywhere. And that goal brings us to this Forum … You can help build a future that your young people will believe in, stay for, and defend …Those who cling to the status quo may be able to hold back the full impact of their countries' problems for a little while, but not forever … let us face honestly that future. Let us discuss openly what needs to be done. Let us use this time to move beyond rhetoric, to put away plans that are timid and gradual, and make a commitment to keep this region moving in the right direction. The next day Tunisian strongman, Zine el Abidine Ben Ali, fled the country he had ruled with an iron fist for decades. Having played out on satellite TV and social media, the coup became an incentive in the region for other similarly oppressed populations. Statement on Tunisia On January 25, massive protests erupted in Tahrir Square in Cairo. Calling for "bread, freedom, and dignity," the crowd grew daily and increasingly became focused on driving Hosni Mubarak from office. Hillary's first comments on the Egyptian situation came in the context of a presser with Jordanian Foreign Minister Nasser Judeh. Video: Secretary Clinton's Remarks With Jordanian Foreign Minister Nasser Judeh As we monitor this situation carefully, we call on all parties to exercise restraint and refrain from violence. We support the universal rights of the Egyptian people, including the rights to freedom of expression, association, and assembly. And we urge the Egyptian authorities not to prevent peaceful protests or block communications, including on social media sites. Video: Secretary Clinton's Statement on Egypt Hillary reviews a 20-year history of acquaintance with Mubarak and his wife noting his steadfast support of the Camp David accords as well as the disappointment that human rights were never expanded. Inside the White House there was disagreement over the appropriate posture to assume. Young and idealistic staffers were in the corner with the protesters. Joe Biden and Bob Gates had misgivings about appearing to push out a long-time partner and the signal that would send. Hillary saw the former point of view, but shared the latter concern. It was clear, however, that, important as his partnership for peace had been, Mubarak's autocracy could not continue to be tolerated as events in Tahrir Square spiraled into violent confrontations. (Hillary refers to this particular interview with David Gregory but does not mention that it was one of five Sunday morning interviews on this subject that morning nor that she then left for Haiti where she submitted to three more interviews that day. Our amazing girl!) Secretary Clinton's Interview With David Gregory of NBC's Meet The Press Long-term stability rests on responding to the legitimate needs of the Egyptian people, and that is what we want to see happen … peaceful, orderly transition to a democratic regime…. A major issue was the lack of coherence within the popular uprising. It was leaderless, driven by social media, and the only organized body in the country was the Muslim Brotherhood which, alone, appeared prepared to leap into the void if/when the Mubarak government fell, in which case, Hillary told President Obama, "it all may work out fine … in 25 years." Communications with Egyptian officials were over the phone. She told Foreign Minister Gheit that elections were going to be necessary. He told her that Mubarak remained defiant and refused to resign. Hillary rcommended an envoy (Foreign Service verteran Farnk Wisner was chosen) and a package deal for Mubarak. End the emergency law of 1981 (still in effect); Pledge not to run (in a necessary election); Agree not to set up his son Gamal as successor. The military issued a statement that it would not move on citizens while Mubarak made some concessions, but they were small, not major, and too little too late. President Obama wanted change now. Secretary Clinton's Call to Egyptian Vice President Omar Soliman Secretary of State Hillary Rodham Clinton called Egyptian Vice President Omar Soliman today to convey that today's violence was a shocking development after many days of consistently peaceful demonstrations … also underscored the important role that the Egyptian Armed Forces have played in exercising restraint in the face of peaceful demonstrations and expressed concern that all parties recommit themselves to using only peaceful means of assembly. Secretary Clinton's Statement on Egypt Hillary continued talking to FM Aboul Gheit by phone and your heart has to go out to him. (I always liked him.) He worried about an Islamist takeover and told Hillary that he wanted his little granddaughters "to grow up to be like their grandmother and like you … This is the fight of my life!" Hillary proceeded to the Munich Conference. Secretary Clinton's Remarks at the Munich Security Conference Plenary Session February 5, 2011 by still4hill | How do we offer support to Egypt for its transition to a pluralistic democracy? How do we make sure that there is not greater instability? … part of what we have to do is to send a consistent message supporting the orderly transition that has begun, urging that it be not only transparent and sincere, but very concrete, so that the Egyptian people and those of us on the outside can measure the progress that is being made. … it is our hope that this proceeds peacefully, that it proceeds with specific goals being achieved, so that people can see that their voices have been heard, and that there be an election with international observers and with sufficient preparation and performance that it will be viewed as free, fair, and credible when it is finally held. Video: Secretary Clinton on Events in the Middle East: "The Status Quo is Simply Not Sustainable" Gheit, meanwhile, submitted to an interview on PBS voicing his government's (i.e. Mubarak's) attitude toward commentary from the U.S. Odds & Ends from Today's Press Briefing QUESTION: On Egypt, before we get into the – have you seen the interview that Foreign Minister Aboul Gheit has done with PBS? MR. CROWLEY: I have not. I'm aware of it. I think our friend and colleague, Margaret Warner, was there today. QUESTION: Yeah. In that interview he's pretty angry about what he regards as interference in U.S. – in the U.S. trying to – the Administration trying to dictate to the Egyptian leadership how and when they should do this transition. Do you – what do you make of those comments? MR. CROWLEY: Well, I haven't seen them, so I'm reluctant to comment specifically. I think from our standpoint, what's important here is not how we view things. We're not trying to dictate anything. As we've said and emphasized many times, there will be an Egyptian solution and Egyptian actions within this orderly transition. But it's important that what Egypt does do is seen as credible in the eyes of the Egyptian people. And it's our view that what they've put forward so far does not meet that threshold. Hosni Mubarak stepped down on February 11 and did not leave the country. "I will die in Egypt," he stated. Where Hosni Mubarak Is About a month later, Hillary visited Tahrir Square. Secretary Clinton In Tahrir Square To see where this revolution happened and all that it has meant to the world is extraordinary for me. It's just a great reminder of the power of the human spirit and universal desire for human rights and democracy. It's just thrilling to see where this happened. She met with students and activists interested to hear their plans. They had none, were disorganized, argumentative, very inexperienced politically, and showed no interest in organizing a platform. She asked if they had considered forming a political coalition joining together on behalf of candidates and programs. She was met with blank stares and left fearing they would just turn the country over to the Muslim Brotherhood which, of course, is exactly what they did. Video: Secretary Clinton's Remarks Prior to Meeting With Egyptian Prime Minister Field Marshall Tantawi permitted elections and when Morsi defeated his candidate he allowed the result to stand. As to the dueling conspiracy theories that the U.S. had helped/hindered the Muslim Brotherhood, she states that "logic never gets in the way of a good conspiracy theory." Hillary Clinton in Egypt: A Background Briefing When she returned to Cairo in July 2012 she found the streets again filled with protesters – against her. Egyptian police did nothing to help her Diplomatic Security hold the crowds back. She could hear the anti-American chants 12 floors up in her hotel room. Hillary Clinton with Egyptian FM Mohamed Kamel Amr Despite the protests she insisted upon keeping to the itinerary and proceeding to the flag-raising event in Alexandria where, stateside, we heard that her car had been pelted with shoes and tomatoes. It was a little closer and more unsettling than what we were told. Her State Department spokesperson, Toria Nuland, was hit in the head with a tomato as they were leaving the event and being escorted very close to the angry crowd. When Hillary's door closed, a man pounded a shoe against her window. No one was injured, thank heaven, but it was not for any assistance from Egyptian security. Hillary Clinton at the Consulate Flag-Raising in Alexandria Egypt On my visit to Egypt yesterday and today, I told people I wanted to listen more than talk. I wanted to hear firsthand the concerns, the issues, the aspirations that could be represented to me both by officials as well as citizens. People want to know and are vigorously debating this among themselves, as you know so well, what this democratic transition occurring in Egypt will be like. Where will it lead? I have come to Alexandria to reaffirm the strong support of the United States for the Egyptian people and for your democratic future. Yesterday in Cairo, I spoke about the immediate questions that you are facing. The Egyptian people have every right in this new democracy to look to their leaders to protect the rights of all citizens, to govern in a fair and inclusive manner, and to respect the results of elections. Earlier today, I met with members of Egypt's Christian community, with a number of women leaders and advocates, and with young entrepreneurs who want to demonstrate that Egyptian young people are just as innovative and successful as young people anywhere. They have legitimate concerns…. Democracy is not just about reflecting the will of the majority; it is also about protecting the rights of the minority. The Morsi government failed the inclusion test, was removed by the military a year after that visit, and Egypt continues to lack credible democratic institutions in Hillary's assessment. Jordan's King Abdullah managed to stay ahead of the wave with credible legislative elections and a crackdown on corruption. One problem for Jordan after the fall of Mubarak was energy. Natural gas pipelines providing about 80% of Jordan's energy needs were often attacked and the flow interrupted. Over a private lunch with the king at the State Department, Hillary suggested working out trade deals with Iraq and Israel. In 2013 an agreement with Iraq was signed and another with Israel in 2014. Crisis averted. Bahrain, Qatar, Kuwait, Saudi Arabia, the United Arab Emirates, all partners of ours, are members of the Gulf Cooperation Council initiated by Hillary as secretary of state. They formed a complex web. Hillary found negotiating with them over human rights issues most ticklish but provides a lesson in diplomacy when she explains that some issues require a soapbox while others are better addressed privately. You solve it. We will say nothing. It was an effective approach to some issues that arose. She advocates different responses for different situations. She (and her entourage ) received a welcome fit for a queen in Saudi Arabia in 2010, but women's issues there were prickly. Hillary Clinton Gets Royal Treatment Secretary Clinton's Remarks At Dar Al-Hekma College Town Hall (Jeddah) I, of course, believe that educating young women is not only morally right, but it is also the most important investment any society can make in order to further and advance the values and the interests of the people. The Egyptian poet, Hafez Ibrahim, said, "A mother is a school. Empower her and you empower a great nation." I am a graduate of a women's college, Wellesley College, outside of Boston, Massachusetts, and I know how rewarding it is to be a member of this kind of community, where young women are the focus of attention, where our interests are identified, recognized, and nurtured, and where the friendships that you make and the lessons that you learn will enrich your lives long after you graduate. QUESTION: … does the prospect of Sarah Palin one day becoming president maybe terrify you? (Laughter.) And if so, would you consider emigrating to Canada or possibly even Russia in the event of this happening? SECRETARY CLINTON: (Laughter.) Well, the short answer is no – (laughter) – I will not be emigrating. This event was under high security by female guards. One heavily veiled guard approached Huma and asked for a photo. Hillary asked whether this should be done in a private room. Yes. The guard removed her veil before the camera and gave a wide smile. Click. The veil came down. "Welcome to Saudi Arabia." By the next year, the Arab Spring had spread to the Gulf. In March 2011 the issue was unrest in Bahrain and UAE and Saudi Arabia had sent security forces over the border without consulting … anybody. Yemen was also in turmoil. FOREIGN MINISTER ABDULLAH: Well, the Bahrain Government asked us yesterday to look at ways to help them to defuse the tension in Bahrain, and we have already sent roughly around 500 of our police force, who are there. The Saudis are there as well. The Bahrain crisis and Saudi-UAE intervention was an issue. Secretary Clinton's Interviews In Egypt: Andrea Mitchell (NBC), Steve Inskeep (NPR), Kim Ghattas (BBC), Shahira Amin (Nile TV) QUESTION: So what leverage do you still have on countries like Bahrain and Saudi Arabia? They're your allies. You – they – you train their armies. You supply them with weapons. And yet when the Saudis decided to send troops into Bahrain – and I believe Washington made clear it wasn't pleased about that – they said, "Don't interfere. This is an internal GCC matter." SECRETARY CLINTON: Well, they are on notice as to what we think. And we will intend to make that very clear publicly and privately, and we will do everything we can to try to move this off the wrong track, which we believe is going to undermine long-term progress in Bahrain, to the right track, which is the political and economic track. I also had the opportunity to engage today with my Arab counterparts, including Foreign Minister Zebari of Iraq representing the presidency of the Arab Summit, Secretary General Amr Moussa of the Arab League, Prime Minister Hamid bin Jasim of Qatar, Sheikh Abdallah bin Zayid of the UAE, Foreign Minister Fassi Fihri of Morocco, and Foreign Minister Judeh of Jordan. We also had a constructive discussion on Bahrain. We have a decades-long friendship with Bahrain that we expect to continue long into the future. Our goal is a credible political process that can address the legitimate aspirations of all the people of Bahrain, starting with the Crown Prince's dialogue, which all parties should join. With all of these partners, we have discussed the urgent humanitarian needs arising from the crisis in Libya. I thanked the Arab leaders for their generous contributions to aid refugees fleeing Qadhafi's violence, and we agreed that this will be a critical concern in the days ahead. Egypt and Tunisia, in particular, will need all of our support. The United States has made significant pledges of assistance, and we look to all our allies and partners to join us in this work. Video: Secretary Clinton at the National Democratic Institute's 2011 Democracy Awards Dinner Why does America promote democracy one way in some countries and another way in others? Well, the answer starts with a very practical point: situations vary dramatically from country to country. It would be foolish to take a one-size-fits-all approach and barrel forward regardless of circumstances on the ground. Sometimes, as in Libya, we can bring dozens of countries together to protect civilians and help people liberate their country without a single American life lost. In other cases, to achieve that same goal, we would have to act alone, at a much greater cost, with far greater risks, and perhaps even with troops on the ground. As a country with many complex interests, we'll always have to walk and chew gum at the same time. It was more complex, of course than walking and chewing gum. It was more like keeping a dozen plates spinning on sticks, but the different approaches to different situations strategy was effective. Secretary Clinton Lauds Signing of GCC-Brokered Agreement in Yemen We urge all parties within Yemen to refrain from violence and to move swiftly to implement the terms of the agreement in good faith and with transparency — including credible presidential elections within 90 days. Video: Secretary Clinton with Qatari Prime Minister and Foreign Minister Sheikh Hamad bin Jassim bin Jabor Al Thani Today, Sheikh Hamad and I had a productive and wide-ranging discussion about the path forward. We spoke about the importance of helping Libya complete its transition from an armed revolution to a peaceful, unified, and orderly democracy under the rule of law. We discussed Yemen, where Qatar is working as part of the Gulf Cooperation Council to ensure that all parties honor their commitment to take part in a peaceful transition to democracy. We also spoke about the importance of responding to people's economic needs. So many of these revolutions and uprisings that we have seen were rooted in the economic grievances that people had – not enough jobs, not jobs that paid an adequate wage for a family, too much corruption, and so much else. And we are working together to assist countries to provide more economic change for their people. Video: Hillary Clinton at the U.N. Security Council As Yemen unraveled into violence last year, this Security Council stood behind the efforts of the Gulf Cooperation Council and Yemeni stakeholders to find a peaceful solution. In the face of setbacks, we held firm. Now many challenges lie ahead. But last month's successful presidential election and inauguration were promising steps on the path toward a new, democratic chapter in Yemen's history. Hillary ends this chapter in post-revolution Tunisia, now markedly changed, where a question at a town hall with students highlighted an issue that certainly backlit all of our dealings with partners during the turbulence of the Arab Spring: that of trust in the face of compromise. Hillary Clinton's Town Hall in Tunisia QUESTION: I think that there exists among many young people in Tunisia across the region a deep feeling of mistrust towards the West in general and the United States in particular. And many observers partly explain the surge of extremism in the region and in Tunisia by this skepticism. And even among the mainstream of moderate and pro-Western youth, there is a sense of despair and fatalism when it comes to the possibility of building a real and lasting partnership that is based on mutual interests. So is the United States aware of this issue? And how do you think we can address it? SECRETARY CLINTON: Yes. I can speak for both President Obama and myself. We are aware of it. We regret it. We feel that it doesn't reflect the values or the policy of the United States. And there are several reasons as we understand them. Some people say, well, you supported the prior regimes in these countries. Well, those were the governments. If you're a government, who do you deal with? You deal with the governments that are in place. And yes, we did. We dealt with the governments that were in place, just like we deal with the governments elsewhere. I will be the first to say we, like any country in the world, have made mistakes. I will be the first to say that. We've made a lot of mistakes. But I think if you look at the entire historical record, the entire historical record shows we've been on the side of freedom, we've been on the side of human rights, we've been on the side of free markets and economic empowerment. And that is where the bulk of the evidence, in my view, rests. You said you were a lawyer? (Laughter.) I used to be one. (Laughter.) So I think we can make a very strong case, and that's what we're doing, and that's one of the reasons why I'm here, to do it in person. This chapter demonstrates a great deal about how Hillary Clinton thinks and approaches problems and conflicts. Versatility, flexibility, the ability to multitask are key. No single situation is clone of another, therefore one-size-fits-all approaches are doomed to fail. In any conflict of any kind, true settlement will never fully satisfy either side. Compromise, the ability to effect it and to accept it are also key. These are the lenses through which Hillary Clinton looks at issues. This point of view informs her path. She places her camp chair in the center and surveilles the theater of operations with an eye to finding solutions that mutually benefit the parties. This is what makes accusations of extremism about her nonsense. She never puts that chair in an extreme spot. She knows you do not get the clearest view from there. Hillary Clinton's 'Hard Choices' Retrospective Part Four Chapter 13 Africa: Guns or Growth? Posted in Barack Obama, Bill Clinton, Chelsea Clinton, Clinton Global Initiative, Foreign Policy, Hard Choices, Hillary Clinton, Hillary Rodham Clinton, Secretary of State, Secretary of State Travel, state department, U.S. Department of State, tagged Barack Obama, Bill Clinton, Chelsea Clinton, DRC, Fareed Zakaria, Hard Choices, Hillary Clinton, Hillary Rodham Clinton, Kenya, Maite Nkoana-Mashabane, Nelson Mandela, Retrospective, Secretary of State, South Africa, South Sudan, State Department, Tom Vilsack, Uganda on August 30, 2014| Leave a Comment » Hillary Clinton describes the Obama Administration's Africa policy in typical Hillary fashion as resting on four pillars. Promoting opportunity and development, Spurring economic growth, trade, and investment, Advancing peace and security, Strengthening democratic institutions. China, as we know, is heavily invested in Africa. Her description of that relationship as one of exploitation of natural resources in exchange for glitzy structure and infrastructure that benefits them and excludes local labor. Her concern is the damage being inflicted by some foreign investment. She quotes her remark to a TV interview question in Zambia in June 2011. … our view is that over the long run, investments in Africa should be sustainable and for the benefit of the African people. Confronted with a suggestion that the Chinese model, basically a hands-off local government model might serve African nations better than the good-governance model that could be interpreted as imposed by the west, responded: It is easy – and we saw that during colonial times – it is easy to come in, take out natural resources, pay off leaders, and leave. And when you leave, you don't leave much behind for the people who are there. You don't improve the standard of living. You don't create a ladder of opportunity. We don't want to see a new colonialism in Africa. We want, when people come to Africa and make investments, we want them to do well, but we also want them to do good. We don't want them to undermine good governance. We don't want them to basically deal with just the top elites and, frankly, too often pay for their concessions or their opportunities to invest. Hillary Clinton's Media Outreach: Three Interviews from Lusaka, Zambia She mentions this speech where she spoke of sustainable partnerships that add rather than subtract value. Hillary Clinton on Building Sustainable Partnerships in Africa August 1, 2012 by still4hill On the subject of the disturbing downward trend in electoral democracies on the continent she refers to a speech in 2011 at African Union Headquarters where she warned African leaders that the Arab Spring could spread. We wondered, viewing the video, why she was speaking in the dark. It turned out that there was a power outage that occurred while she spoke that might have been a coincidence. It is a message that older, entrenched leaders do not want to hear. Hillary remarks upon the reluctance of some of these leaders, often seen as liberators from colonialism, to cede power. The phenomenon is endemic on the continent. She delivered a similar message to Arab elders at Forum for the Future in Morocco in November 2009. Neither was that audience particularly receptive to the message of inclusiveness. The Arab Spring was a reaction to policies that she knew then, through her interactions with civil society in Arab countries, would boil over sooner or later boil over. A look at the slideshow in this post speaks more than 1,000 words. Video: Secretary Clinton's Remarks at African Union Headquarters, Addis Ababa Putting forth the example of a grassroots Senegalese movement effectively defeating Abdoulaye Wade in their 2012 election, she posits that democratic change is possible in Africa and quotes further from her sustainable partnerships speech in Dakar. I know there is sometimes an argument that democracy is a privilege belonging to wealthy countries, and that developing economies must put economic growth first and worry about democracy later. But that's not the lesson of history. Over the long run, you can't have effective economic liberalization without political liberalization … the United States will stand up for democracy and universal human rights, even when it might be easier or more profitable to look the other way, to keep the resources flowing. Not every partner makes that choice, but we do and we will. Liberia, today so unfortunately stricken with the ebola epidemic, stands as a shining example of democracy in Africa as Hillary points out that former enemies on the field of battle now sit side by side in the legislative chambers. Hillary Clinton's Address to Joint Session of Liberian National Legislature Some of you have seen a film that tells the story of a Liberian woman's efforts to end the war. Tired of the killing and the conflict, she organized women at her church and then other churches and in mosques until thousands of Liberian women had joined a vocal, public movement demanding peace … These were women who woke up one day and said, "Enough, enough. We're better than that … I know that the suffering of the people of Liberia has been broad and deep. But now, you each have a chance, both personally and publicly through your service here, to make a stand against the past and for a future that is worthy of the sacrifice and the suffering that went on too long. The United States is proud to support you. Her 2009 visit to Kenya comprised several important speaking engagements to which she refers: The AGOA Forum (Clinton administration legislation), a "townterview" with Fareed Zakaria, a visit, with Agriculture Secretary Tom Vilsack, to an agricultural research institute, and the usual ministerials. Hillary Clinton's Address at the Africa Growth Opportunities Act (AGOA) Forum in Kenya Hillary Clinton's Townterview at the University of Nairobi with Fareed Zakaria Students greeted her with signs reading "corruption-free zone." At this event Hillary shared the stage with Nobel Peace Prize winner Wangari Maathi who led a reforestation movement in Kenya. The issue of natural resources being decimated arose. You may recall that in her very lengthy confirmation hearing before the Senate Foreign Relations Committee, Hillary was asked a question about natural resources in Africa (it might have come from John Kerry, but I am not certain). Immediately she responded that "Botswana comes to mind." Here she shared the same example. Botswana's national trust fund has reinvested profits from its resources into the population and infrastructure with such success that both the Peace Corps and USAID pulled out of the country since their help was no longer needed. Hillary credits Botswana's Five Ds for the success: Democracy, Development, Dignity, Discipline, Delivery. Hillary Clinton at the Kenya Agricultural Research Institute Well-intentio9ned as they were, she notes that U.S. (and other) gifts of foodstuffs undercut the market for indigenous agricultural products. She points to the Feed the Future Program as one that supports local produce and addresses the challenge of transportation. Hillary Clinton With Kenyan Foreign Minister Moses Wetangula She also met with President Kibaki, Prime Minister Odinga, and the cabinet. There was tough talk, to which she refers, in this meeting but no transcript from the State Department. The agreed-upon shared power in the government was not going smoothly. Her subsequent words with Foreign Minister Wetangula provide some insight into the tone she adopted, however. The United States worked hard last year with Kofi Annan and the team of African Eminent Persons to support the Kenyan people to resolve the crisis that afflicted this country. Unfortunately, resolving that crisis has not yet translated into the kind of political progress that the Kenyan people deserve. Instead, the absence of strong and effective democratic institutions has permitted ongoing corruption, impunity, politically motivated violence, human rights abuses, and a lack of respect for the rule of law. These conditions helped fuel the post-election violence, and they are continuing to hold Kenya back. The reform agenda agreed to by the coalition government and discussed in the speech that President Kibaki and Prime Minister Odinga gave this morning must be fully implemented not just to avoid a repeat of the previous crisis or worse, but more importantly, to set the stage for a better future, a future worthy of the dynamic people of this country, a future of economic growth, democratic development, social justice, and the opportunity for every Kenyan child to live up to his or her God-given potential. I wanted the leaders to know that we respect greatly the way that the Kenyan people pulled their country back from the brink of disaster once, and the ongoing connection between the private sector, civil society, and the government that is the key to resolving these issues. Hillary's description of her visit to Democratic Republic of Congo (DRC) in summer 2009 is a contrasting patchwork of horror and hope. She begins with her visit, with NBA star Dkembe Mutombo to the pediatric unit he built and named for his mother. Hillary Clinton at the Biamba Marie Mutombo Hospital and Research Center There were so many bright and lovely moments on this first official State tour of Africa. Most of those were, sadly, not covered by the media, but no one missed the "snap in the Congo." In an atmosphere that Hillary describes as sour with an air of sullen resignation in a stuffy auditorium at St. Joseph's School. everyone saw her lose patience with a question, remove her earbuds, and tell a student at a town hall that she would not be channeling her husband. Hillary Clinton's Town Hall With Search for Common Ground and Congolese University Students In the book, she explains that the student came to her after the event, apologized, and explained that he had not meant to ask her President Clinton's opinion but rather President Obama's. Goma is one of the the grimmest, most dangerous places on earth, especially for women. Hillary tells of her visit there and the spirit she encountered among the residents of the refugee settlement she visited. Hillary Clinton's Day at the U.N. Internally Displaced Persons Camp, Goma, DRC She says she witnessed the worst and the best of humanity there. She was inspired to chair a U.N. Security Council meeting the next month on the subject of sexual violence in conflict regions. Secretary Hillary Clinton Chairing Security Council Meeting Today Secretary Clinton & Ambassador Rice: Remarks After Meeting on the Adoption of a UNSC Resolution to Combat Sexual Violence in Armed Conflict Hillary turns at this point to her visit to Africa's and the world's newest country, South Sudan in August 2012 when a standoff between the breakout state and Sudan from which it had seceded was festering. South Sudan had oil and Sudan had the ports and refineries. Clearly some kind of cooperative agreement would benefit both, but South Sudan had shut down the pipeline to the North. Hillary Clinton With Foreign Minister of South Sudan Nhial Deng Nhial Hillary Clinton in South Sudan The surface issue was fees charged by Sudan to transport and process the oil. Hillary used an Op-Ed by one of President Kir's former comrades-in-arms, Bishop Elias Taban, once a boy soldier. Below the surface, the dispute rested on old battle wounds. Hillary told him "a percentage of something is better than a percentage of nothing." Taban's words moved Kir to accept a compromise. By 2:45 the next morning, the oil flowed again. Hillary Clinton Welcomes Oil Agreement Between Sudan and South Sudan, Calls for Peace and Humanitarian Access Hillary writes that South Sudan's future remains uncertain, and indeed, while this post was being assembled the State Department issued this statement. Bishop Taban, who provided the instrument that convinced President Kir to budge was her guest at last year's Clinton Global Initiative where she presented him with the Global Citizen Award. CGI 2013: Closing Plenary Session She reviews Somalia's war-torn, terror-ridden history and our efforts to assist through several U.S. administrations. In August 2009, the president of the transitional government traveled to Nairobi to meet with her. She wondered if he would shake her hand, and he did so very enthusiastically which was a very big deal all around. Hillary Clinton With Somali Transitional Federal Government President Sheikh Sharif Sheikh Ahmed They met again for a final time in their respective official positions in August 2012. A new president was elected the next month. Hillary Clinton With Somali Roadmap Signatories in Kenya At a military base in Uganda, U.S. Special Operations advisors showed her a surveillance drone used in the search for Joseph Kony chief of the Lord's Resistance Army and elements of Al Shabaab. She notes that it resembled a child's toy. Hillary Clinton at Kasenyi Military Base in Uganda She mentions the September 2013 attack by Al Shabaab on a shopping mall in Nairobi that killed Elif Yavuz who worked for the Clinton Health Access Initiative which battles HIV/AIDS and other health challenges. Bill, Hillary, and Chelsea Clinton Offer Condolences on the Death of Elif Yavuz In the struggle to conquer HIV/AIDS on the continent, the President's Emergency Plan for AIDS Relief (PEPFAR) begun by George W. Bush plays a major role. She recalls this event in Johannesburg in 2009 where she was accompanied by Eric Goosby, the State Department's Global AIDS Coordinator, her Congressional Representative, Nita Lowey, and the late, Honorable Donald Payne who was a friend of this blog. Hillary Clinton at PEPFAR Event in South Africa Hillary declared a goal of an AIDS-free generation on World AIDS Day 2011. Secretary Clinton on World AIDS Day 2011 Hillary Clinton at the Reach Out Mbuya Health Center, in Kampala, Uganda Hillary begins drawing this Africa chapter to a close in South Africa around Nelson Mandela beginning with recollections of her visits to South Africa as First Lady, the second time bringing Chelsea with her. A lifetime friendship ensued. Hillary Clinton with Nelson Mandela One working relationship that brought many smiles over the years was her friendship with South African Foreign Minister Maite Nkoana-Mashabane. She gave parties for Hillary on both of her visits. There was a rare snowfall on Hillary's last visit and she was called 'Nimkita' – one who brings the snow. Hillary Clinton With South African Minister of International Relations Nkoana-Mashabane Hillary Clinton with South African Foreign Minister Maite Nkoana-Mashabane Hillary Clinton's Meeting With U.S. and South African Business Leaders Hillary Clinton at a Dinner Hosted by South African Foreign Minister Maite Nkoana-Mashabane Hillary led a delegation of business leaders to this summit. Our friend Grace Bennett of Inside Chappaqua accompanied Hillary's traveling press on this trip, and Hillary called her over to meet Maite. Hillary Clinton at the U.S.-South Africa Business Partnership Summit There was one last visit to Nelson Mandela. Hillary Clinton Visits Nelson Mandela Hillary Clinton at The United States – South Africa Partnership She refers to these closing remarks in this speech. It's a burden being an American or a South African, because people expect you to really live up to those standards. People hold us to a higher set of standards, don't they? And we owe it to all who came before, all who sacrificed and suffered, to do our very best to keep working every single day to meet those standards. But we mostly owe it to our future. Many things have changed since Robert Kennedy came to Cape Town and Nelson Mandela left Robben's Island. But some have not. The world we want to build together still demands the qualities of youth and a predominance of courage over timidity. So in that spirit, let us work together so that the values that shaped both our nations may also shape a world that is more peaceful, more prosperous, and more just. Clintons Close CGI in Rio and Convene in South Africa to Honor Nelson Mandela Hillary went on Air Force One with the Obamas and the Bushes. Bill and Chelsea went from Rio. Hillary ends this chapter with hopes for an Africa worthy of Nelson Mandela's long walk to freedom. Hillary Clinton's 'Hard Choices' Retrospective Part Four Chapter 12 Latin America: Democrats and Demagogues Posted in Barack Obama, Bill Clinton, Foreign Policy, Hard Choices, Hillary Clinton, Hillary Rodham Clinton, Secretary of State, Secretary of State Travel, state department, U.S. Department of State, tagged Alvaro uribe, Barack Obama, Bill Clinton, Dilma Rousseff, George W. Bush, Mel Zelaya, OAS, Oscar Arias, Patricia Espinosa, Retrospective, Summit of the Americas on August 27, 2014| Leave a Comment » Beginning with a brief history of U.S. Latin American policy from the Cold War to the current administration, Hillary A. Cites Clinton administration initiatives: The first Summit of the Americas in 1994, The successful anti-narcotrafficking and anti-guerrilla Plan Colombia, The restoration of the democratically elected Bertrand Aristede to his post in Haiti; B. Credits the George W. Bush administration for the Merida (anti-drug) initiative and continued support of Plan Colombia, but cites left v. right wing point of view of that prevented that administration from broadening cooperation with our neighbors to the south; C. Cites President Obama's promise, in his April 2009 Summit of the Americas speech, of a new "equal partnership" relationship with the region and a fairer Cuba policy. She does not mention this encounter with Hugo Chavez at that summit, but the picture is priceless. She choose Mexico as her starting point to implement the new policy. She was familiar with the border area from her 1972 campaign experiences there. She and her then campaign colleague Bill Clinton had gone south of the border to a beach on a recovery vacation after the election. She had fond memories of Mexico, but attacks on consulates in 2008 and 2010, the last with murders involved, indicated the dangers civil servants faced. Her first trip to Mexico as secretary of state was in March 2009. Patricia Espinosa is one of several strong Latin American women leaders with whom she formed a strong bond. She doesn't mention this but I shall. She surprised the rector at the Basilica of Our Lady of Guadalupe with an unscheduled visit the morning of her second day there. He was delighted. That day she also held a round table with indigenous students from community colleges, visited an industrial plant, and then gave the speech in Monterrey at TecMilenio University that she does refer to in her book. It was a spectacular two days that we celebrated here. This was the Mexico visit she refers to when President Calderon was furious over the wikileaks and demanded that Ambassador Pascual be replaced – said he could no longer work with him. She states that Pascual resigned in March 2011. If anyone tries to tell you that wikileaks caused no damage, be skeptical. This was only the tip of a very large and damaging iceberg. Thank heaven Hillary had a great relationship with Patricia Espinosa and with the Mexican people. Hillary Clinton in Mexico Secretary Clinton's Remarks With Mexican Foreign Secretary Patricia Espinosa Secretary Clinton's Interview With Denise Maerker of Televisa Secretary Clinton's Interview With Rossana Fuentes of CNN en Espanol As a model for Mexico, she suggests Colombia and reviews the Clinton administration effort called Plan Colombia, a joint effort of her husband's administration with then President Pastrana. The initiative continued and expanded under the Bush administration, but human rights issues arose. The Obama administration continued the plan but with additional work on governance, education, and development. Her first visit to Colombia as secretary of state happened to coincide with a visit Bill Clinton was making there. It was the first time they were together on foreign soil since she had assumed her post. They actually managed a dinner date and a peaceful evening walk through Bogota. She remarks on the contrast with the violence of the past. Bill and Hillary Clinton: The Tryst In her meeting with President Uribe the following day he also comments upon the dramatic security progress in the capital. Secretary Clinton's Joint Press Availability with Colombian President Alvaro Uribe This morning, I was saying to some members of the media that were here (inaudible) that the best PR for confidence in Colombia is that last night, the Madam Secretary of State of the United States and the president, Bill Clinton, were in a restaurant in Bogota with complete peace of mind enjoying this beautiful city and its good restaurants. Some years ago, because of terrorism, this would have been unthinkable. Your visit, the fact that you spent the night in Bogota, the frequent visits by President Clinton, those are a great show of confidence in Colombia and the fact that one can have confidence in Colombia. Uribe was near the end of his term at this point. His successor, Juan Manuel Santos continued the progress and improvement continues, she states. Hillary attended the presidential inauguration in El Salvador in June 2009 that dovetailed with the Pathways to Prosperity Ministerial Summit. Hillary Clinton at the Pathways to Prosperity Ministerial in El Salvador Hillary Clinton Op-Ed: New Pathways to Prosperity in the Americas A model she suggests for conquering poverty in Latin America is Brazil's conditional cash tranfer programs. Dating back to the 1990s under President Cardoso and expanded by President Lula da Silva, it transfers cash to parents as a reward for keeping children in school and under proper pediatric supervision. Lula's successor, Dilma Rousseff was inaugurated on January 1, 2011, and Hillary was happy to be there there. Secretary Clinton at the Inauguration of Dilma Rousseff She encountered Chavez there again. She departed El Salvador for Honduras where she attended CARICOM and the OAS Summit. Hillary Clinton at CARICOM Breakfast There was suspense and high drama at the June 2009 OAS summit. Several members intended to put forth a resolution to readmit Cuba. The proponents were the predictable suspects, Hugo Chavez of Venezuela, Nicaragua's Daniel Ortega, and Mel Zelaya of Honduras was also leaning that way. More moderate countries like Chile and Brazil were considering approval. Cuba was not represented at the summit and had expressed no interest. The concern was that if a vote was called a simple 2/3 majority could and might approve since Cuba was originally excluded based on outdated Cold War standards. The U.S. strategy involved updating the standards to focus on democracy and human rights and to require that the petition be presented by the Cuban government rather than by proxy. There was also a timing issue since Hillary was scheduled to fly to Cairo to attend the much-anticipated speech Obama was to deliver there. The vote was not called before Hillary had to leave, but the U.S. compromise plan did prevail. Castro reacted by refusing to petition for readmission. Press Statement: OAS Resolution In December 2009 the Castro regime arrested USAID worker Alan Grossman. Hillary says one of her biggest regrets is that she was not able to bring him home. Before leaving office she recommended reassessing the Cuba embargo and shifting the onus to the Cuban government. In mid-June, (she does not mention this, but I will) Hillary slipped in the State Department parking garage and fractured her elbow. I add this because a subsequent press briefing refers to it. Hillary's Fractured Elbow In late June 2009, just weeks after Hillary had been at OAS in San Pedro Sula, the democratically-elected president of Honduras, Mel Zelaya, was arrested and put, in his pajamas, on a plane to Costa Rica. His wife and daughters requested refuge at our embassy residence and Hillary ordered that they be kept safe. The President of the National Congress Roberto Micheletti, assumed power. U.S. aid was suspended (by law) as was OAS membership. Hillary Clinton: Situation in Honduras Here she spoke at length about the coup in Honduras. Hillary Clinton's Press Briefing After Breaking Her Elbow On July 7, Zelaya made his way to D.C. and visited Hillary at the State Department. She had recruited Costa Rica's President Óscar Arias to mediate. Zeleya accepted mediation and from that point all that came before was wiped clean. It was a new playing field. Hillary stipulates that she made the announcement alone so as not to appear to Micheletti as if Zelaya was being favored. Hillary Clinton: Remarks at the Top of the Daily Press Briefing July 7, 2009 by still4hill Zelaya remained in exile. Arias was encountering a hard line on both sides and was in favor of restoring Zelaya to power based on principles. Allowing the de facto government to stay would, he said, have a domino effect across the region. In September, Zelaya returned to the State Department. There were no remarks or press briefings, only this photo. Immediately afterwards he turned up at the Brazilian Embassy in San Pedro Sula. At the end of October a unity agreement was in place. The Honduran Congress voted not to restore Zelaya. He went to the Dominican Republic. November elections were held and Porfirio Lobo was elected. Many OAS countries disagreed with this solution, but in May 2011 Honduras was readmitted. Hillary Clinton Hails Return of Honduras to OAS It was, Hillary notes, the first time in Central American history that a coup was resolved democratically. She concludes that the trend in Latin American is toward democracy, shared opportunities, positive partnerships, and innovation. Hillary Clinton's 'Hard Choices' Retrospective Part Four Chapter 11 Russia: Reset and Regression Posted in Foreign Policy, Hard Choices, Hillary Clinton, Hillary Rodham Clinton, Secretary of State, Secretary of State Travel, state department, U.S. Department of State, Uncategorized, tagged Barak Obama, Benghazi, Catherine Ashton, Dmitri Medvedev, Hard Choices, Hillary Clinton, Hillary Rodham Clinton, Kazakhstan, Kyrgyzstan, New START, reset, Retrospective, Russia, Sergei Lavrov, Ukraine, Uzbekistan, Vladimir Putin on August 25, 2014| 11 Comments » Speaking of Vladimir Putin Hillary says "hard men represent hard choices" and goes on to provide her analysis of him and how who he is informs his particular choices. She says he views geopolitics as a zero-sum game where if someone is winning someone else has to be losing. Her recommended strategy for managing a relationship with the Russians: work with them on specific issues; rally other nations to work with us against negative behavior as needed. She betrays a clear preference for the vision Yeltsin had for Russia and mentions this moment when he turned back the forces of an old soviet-era coup. We know Yeltsin kept a photo of her in his office. There was mutual admiration, clearly. For the heck of it I also share these. They always make me smile. We will never see anything like that from Putin. Calling Russia the fourth most dangerous place in the world to be a journalist, she refers to this meeting with civil leaders where she spoke of press freedom and human rights. Hillary Clinton at a Reception for Civil Society Leaders in Moscow She also gave this daring radio interview on this trip and spoke of human rights. Hillary Clinton's Interview with Moskvy Radio It was during the 2008 primaries here in the U.S. that term limits forced Putin to relinquish the presidency to Dmitri Medvedev whom Hillary found surprisingly conciliatory. The approach, therefore, that was THE reset, was three-pronged: cooperation on aligned interests, firmness where interests diverged, engagement with the people. She attributes the use of the term reset to Joe Biden who used it first. As she looks back at her first official meeting with Lavrov, we get a glimpse of the value she places on the use of humor in diplomacy. Even funnier, in the book she relates how Philippe Reines tried to get the button back to correct the label, prevailed upon the Russian ambassador to Switzerland who said he would have to ask the minister, and Philippe said that his minister was going to send him to Siberia if he didn't get it back. Hillary said she was tempted. Hillary Clinton's Reset Meeting with Russian FM Lavrov The next month the two new presidents would meet. It was a watershed moment – a very productive meeting. Medvedev acknowledged that the U.S. was probably right about Iran nuclear intentions and the two decided that it was time to revisit the nuclear treaty our two countries share. START had expired, and nothing had been done to revise and renew it. Hillary and Sergei Lavrov were about to be assigned what might have been their most important mission: a New START. They, and their respective squadrons, would prove to be a close and impressive team. A year later, she and Secretary Gates introduced the New START Treaty. Secretary Clinton's Remarks On The New START Treaty The presidential signing took place in Prague in April 2010. Immediately afterwards Hillary went on the offensive to get the treaty ratified. In the book, Hillary manages to reduce the battle for ratification to about a page. In real life, it took a year for the teams to hammer out the treaty (not bad considering the massive assignment) and then it took all of this to get it ratified. Her allies on The Hill were Vice President Joe Biden, Harry Reid, John Kerry, and Richard Lugar. Her companion in the trenches was Robert Gates. Secretary Clinton's Remarks on the Announcement of the Release of the Nuclear Posture Review Smart START – Hillary Clinton Unveils Non-Proliferation Rationale @ McConnell Center Speaker Series! Yes, it was and is that McConnell Center (a very smart move). She also published an international op-ed. Our Giant Step Towards a World Free from Nuclear Danger Video: Secretary Clinton on the New START Treaty Video & Text: Secretary Clinton's Remarks on the New Start Treaty at the Senate Armed Services Committee Secretary Clinton's Remarks to Members of the U.S. Delegation to the New START Negotiations and Nuclear Posture Review Department Staff Video & Text: Secretary Clinton's Remarks on the New START Ratification Always keep smiling, even when the struggle is hard! Secretaries Clinton and Gates on Senate Foreign Relations Committee Approval of the New START Treaty When possible, wear pink. It weakens resistance. The New START Treaty: It's Time for the Senate to Vote But, as Hillary remarks, after the 2010 mid-term elections it appeared that ratification was going to be a tough battle. Many Tea Party candidates had been elected to Congress and some seats had been lost in the Senate. There was pressure from the far right that threatened to get in the way. This is just me, not Hillary, but her analysis of Putin and what drives him could also apply to some Tea Party folks who believe in a zero-sum game and think our glory days lie in a past century. One way Putin is more advanced than they is that he is less insular. He intends to organize with his Pacific neighbors. I do not believe New START would have been on the agenda, however, if he and not Medvedev were president. Video: Hillary Clinton, John Kerry, Richard Lugar on The New START Treaty Powerhouse Pow-Wow: How to Jumpstart New START Finally, right before Christmas, as if a gift, ratification! It was a present – from Hillary and Sergei Lavrov to the world. Thank you both and your industrious teams! Secretary Clinton's Statement on Senate Ratification of New START Hillary Clinton's New START: A Happy Beginning The instruments of ratification were exchanged in February 2011. Hillary was so happy that they finally had gotten this done that she remarked that she was having trouble signing her own name – a problem we have not seen on the book promotion trail. Video: Secretary Clinton's Remarks After Exchange of Instruments of Ratification for the New START Treaty If anyone tries to tell you she accomplished nothing or that the reset did not work, show them this page. She worked very hard to get this treaty and to get it ratified. We are lucky. This protects us all. But as 2011 began with this extraordinary bi-national victory, the tone shifted with the year drawing to a close. As Hillary recounts, Russian parliamentary elections in December were marred by fraud reports, and Putin announced his intention to run for the presidency again. Hillary expressed concern about these reports, and when folks in Russia hit the streets to demonstrate their disapproval, Putin blamed her for the unrest. At this OSCE conference Hillary quotes herself. Secretary Clinton's Remarks at the OSCE The Russian people, like people everywhere, deserve the right to have their voices heard and their votes counted. And that means they deserve fair, free, transparent elections and leaders who are accountable to them. Although she argued to Putin that it was unlikely that people woke up and went into the streets because they thought she wanted them to, she does not completely reject the idea that she might have inspired some courage to protest. As Putin retrieved the presidency and rejected an invitation to the G-8 at Camp David, she warned President Obama that Putin's "regional integration" was code for rebuilding the empire of the past. The reset, she tells us was what you think it was. It delivered or disappointed according to your expectations. A Rorschach test of sorts. It was meant, she states, as a recognition, not as a reward. To illustrate the complexities of the reset she provides the example of supply routes to Afghanistan. As we saw in the Pakistan chapter, one of these was over land. But we also leased former Soviet air bases in both Kyrgystan and Uzbekistan for air transport. Given the world-view Hillary assigns to Putin, it is not hard to see why he might perceive our presence on former Soviet military bases as a threat. That, indeed, is what he warned the Kyrgys and Uzbeks of – a permanent U.S. presence on these bases (that we were leasing). A long, but necessary land route for supplies crosses Russia, Kazakhstan, and Uzbekistan by rail. The complex came to be known as the Northern Distribution Network and was crucial to the Afghanistan surge. Medvedev signed off on our use of Russian rails for this purpose in 2009 (for a price). The movement of lethal cargo across former Soviet land provided an opportunity for Russia to exert some muscle. When Hillary visited Kazakhstan, Kyrgystan, and Uzbekistan in 2010, she was asked where they stood in the reset. QUESTION: Where does Kyrgyzstan come in in your reset with Russia? SECRETARY CLINTON: Well, Russia and the United States, we think, have to work hard to overcome a legacy of mistrust, and try to chart a new course. So when the Obama Administration came in, President Obama and I said we're going to try to reset relations with Russia. That doesn't mean we will always agree, because we will not. But it does mean, where we can agree, we should. And we should try to make the world safer and more secure, fewer conflicts, fewer problems. … But what's important for us, for the United States, is that Kyrgyzstan be left alone to make its own decisions about what is best for Kyrgyzstan, and that no country interfere with or undermine the legitimate aspirations of the people of Kyrgyzstan to have a democracy that will fulfill the aspirations of you, and no one else. That is our hope. QUESTION: And is there any rivalry going on between Russia and the U.S., I mean, in the region, particularly in Kyrgyzstan? SECRETARY CLINTON:… I think it's important for you to have relations with many, but not be dependent on any. Try to balance off all the different relations you have, and get the best help you can from other countries that wish to participate with you. The entire transcript is here. Secretary Clinton's Townterview in Kyrgyzstan Strategy to counter Putin's neo-colonial agenda included helping Europe, eastern Europe in particular, secure alternative sources of fuel and energy and reduce dependence on Gazprom since Russia could shut down those supply lines at will. With Cathy Ashton she initiated the U.S. – E.U. Energy Council. Although, as she says, these efforts did not make headlines here at home, they forced Gazprom to compete and influenced Ukraine's desire for closer ties to Europe (and freedom from Gazprom) which, in turn, relaxed Putin's grip on the former Soviet state and emboldened Ukrainians to stand firm in their intent to join with Europe. Joint Statement Following the U.S.- EU Energy Council Ministerial, Lisbon As she brings this Russian chapter to a close she shares some personal insights and moments with Putin, including the invitation for Bill Clinton to tag polar bears with him. Another involves her attendance at APEC in Vladivostok in September 2012. Hillary Clinton at APEC in Vladivostok She mentions that President Obama could not attend because of his campaign schedule here at home. Both Putin and Lavrov resented 1) that President Obama was not there and 2) remarks she had made about Russia's support for Bashar Al-Assad and therefore resisted a meeting with her. Protocol dictated that the former APEC host (U.S.) be seated beside the current host at the ceremonial dinner. As the president's representative, the U.S. CEO was Hillary and she was seated beside Putin at the dinner. Not only did they socialize and talk issues and strategy, but Putin shared a story about his parents that no one had ever heard. She does not mention, so I shall, that at this APEC Summit she signed a Memorandum of Understanding between the Government of the United States of America and the Government of the Russian Federation on Cooperation in the Antarctic and a Joint Statement on Strengthening U.S.-Russian Inter-Regional Cooperation with Sergei Lavrov. So the reset continued to succeed. Hillary Clinton At Signing Ceremony With Russian FM Lavrov Prior to leaving the department she sent President Obama an analysis of relations with Putin's Russia and some recommendations that some thought extreme at the time. More recent events have shown her assessment to be on target. As was the case with some previous chapters, the final paragraphs seem directed to Putin and the Russian people more than to us. It is excellent advice and they all should attend to it. She does not mention this, so I shall even though it is off-topic. The APEC summit in Vladivostok came at the end of this trip for which she cut short an already brief vacation. Just Confirmed: Hillary Clinton to Visit Cook Islands, Indonesia, China, Timor-Leste, Brunei, and Russia She had been away and working non-stop for eleven days. There are no "weekends" for a traveling secretary of state. It was eleven solid days packed with work. She had been in six countries. She was in Vladivostok through the September 9, flew home and was at the State Department for a 9:15 meeting on September 10. SECRETARY HILLARY RODHAM CLINTON: Public Schedule for September 10, 2012 Take note of the date. She came home to more than a dozen embassies and consulates under siege and was at her office late the next evening as tragic events unfolded. To those who question where she was and what she was doing, I can answer that she was working as she had been for two solid weeks with no break. I would also ask them when the last time was that they worked through two weeks straight for the long hours that she worked without a day off. To imply or assert that Hillary Clinton ever shirked any aspect of her duty as secretary of state, especially with our embassies and consulates in danger, is a reprehensible assault on a dedicated public servant – particularly when the agenda is purely political. As I said, it is off-topic, parenthetical, and it is just me.
RedPajamaCommonCrawl_-6332011697673282981
Slimpajama627bTrain/chunk1
not give the 'Create-A-King' a try? comfort without a king-sized expense. in to two singles for other occasions. store your spare bed linen, too. support or a more modern look and feel. will not want to be hidden away. compliment your room's colour scheme. perfectly with your furnishings, too!
RedPajamaC4_7207599534290600350
Slimpajama627bTrain/chunk1
Headline Partners İGA and Turkish Airlines will both facilitate guided tours of the ground-breaking new airport for delegates. Headline Partners İGA and Turkish Airlines will both facilitate guided tours of the groundbreaking new airport for delegates. Istanbul Airport, which opened in October 2018, has been constructed over an area of 76.5 million square metres to the north of Istanbul, 35km from the city centre. The construction is being carried out in four phases and once complete, the new airport will host flights to more than 300 destinations with an annual passenger capacity of up to 200 million.
RedPajamaC4_7006413080066623404
Slimpajama627bTrain/chunk1
I'm baaaaack! Yes, I had a lovely time in Europe, and yes, I'll post a few pictures as soon as I can, but can I just tell you that after almost three weeks in Central Europe, I am totally craving vegetables! Our food was delicious as we traveled, but our veggies were limited to making appearances in soups and almost always as the side of potatoes to our meals. By the end, I just wanted a giant plate of salad. Last night, I wanted something simple to go alongside the Spanish tortilla I was making, and I initially thought of making a gazpacho soup. But then I remembered that we're in Kentucky in the middle of winter, and gazpacho is best made with off-the-vine tomatoes. So I settled for a gazpacho salad. Best in the summer, but totally worth the extra money for those red, red grape tomatoes in the winter. And best of all? My kids loved it! Score! Cook's Notes: To tone down the onion flavor a little, soak the chopped onion in ice water for at least 5 minutes. Drain and use. This salad would also taste great with fresh herbs, such as cilantro or flat-leaf parsley, thrown in. Place the olive oil and garlic in a small pan and heat gently until the garlic just starts to brown. Remove from the heat and strain the olive oil into a heat-proof bowl to cool. Discard the garlic. Combine all of the vegetables in a large bowl. Add a couple of teaspoons of vinegar and a couple of tablespoons of olive oil. Add the salt and pepper and mix. Taste and adjust the seasonings, oil or vinegar to taste. Let stand for at least 30 minutes at room temperature. Serve with crusty bread to mop up the dressing! Like you, it is nice to have other cuisines but I love to come home. I guess it's called familiar. Looks really good. I love, love, love this salad. It's sooo for me! Intended for thousands in addition to many a long time, adult males are within a deal with with besides featuring different adult males of which fake rolex there're leading the way, although likely this likewise this predominant just one. It is legitimate intended for featuring in addition to developing fascination intended for gals likewise. As this men's peacock develops his or her wonderful trail featuring this large in addition to wonderful a number of chanel replica colorings, adult males with tribes helpful to colour independently in addition to the outfits to indicate individuality along with the attributes many people nevertheless they the most beneficial to help catch the attention of gals. Currently it is learn seeing that hermes replica Peacocking. As we could see currently within a earth having flamboyant belt buckles, high priced shoes, Rolex wristwatches, and another $ 100 or so $ t-shirts, i am needs to fake watches be aware that not very much possesses modified at the same time. Household leather arm artists are for many reasons behind many a long time and from now on there're re-occurring with attractiveness with the wonderful swiftness in addition to model. The reason this household leather arm artists might have been and so favorite is usually them to were being rough, sturdy, in addition to simple produce. This source intended for prada replica this stuff seemed to be likewise numerous. Just uncover a creature that had been for feeding on, uncover one who received a difficult in addition to safety skin tone, in addition to work with of which skin tone make use of for document for example a arm wedding band.
RedPajamaC4_-8375993877586200223
Slimpajama627bTrain/chunk1
John Legend and Kelly Clarkson perform updated version of 'Baby, It's Cold Outside' The coaches from "The Voice" have covered the holiday classic with new lyrics updated for the #MeToo era. Nov. 8, 2019, 12:36 PM UTC / Updated Dec. 4, 2019, 5:03 PM UTC / Source: TODAY John Legend and Kelly Clarkson have updated the Christmas tune "Baby, It's Cold Outside" for the age of #MeToo. The two coaches from "The Voice" debuted their new version with a duet on the show Tuesday night to get everyone into the Christmas spirit. Clarkson sparkled in a sapphire gown and Legend broke out the plaid suit in Christmas colors on the holiday-themed stage. The duo first released their version of the holiday classic early last month, featuring updated lyrics of the song that initially became a hit when it was included in the 1949 movie "Neptune's Daughter." Critics claimed the original lyrics hinted at date rape as a persistent man tries to convince a woman to stay the night by plying her with liquor and reminding her how cold it is outside. The updated version appears on Legend's Christmas album, "A Legendary Christmas: The Deluxe Edition," which was released on Nov. 8. It swaps out new lines for some of the original lyrics: "I really can't stay (but baby, it's cold outside)/ I've got to go away (but baby, it's cold outside)/ So very nice (I'll hold your hands, they're just like ice)/ My mother will start to worry (beautiful, what's your hurry?)/ My father will be pacing the floor (listen to the fireplace roar)." In the new version, that part is now: "I really can't stay (baby, it's cold outside)/ I've got to go away (I can call you a ride)/ This evening has been (so glad that you dropped in)/ So very nice (time spent with you is paradise)/ My mother will start to worry (I'll call a car and tell 'em to hurry)/ My daddy will be pacing the floor (Wait, what are you still livin' home for?)." Kelly Clarkson does not approve of the hello kiss Sept. 19, 201901:28 Another change includes Clarkson singing, "What will my friends think if I have one more drink?" before Legend replies, "It's your body and your choice." The daughter of the song's original writer, Broadway star Frank Loesser, told NBC News last year that she understood why women these days might take offense to the original lyrics. "It's a song my father wrote for him and my mother to sing at parties," Susan Loesser said. "But ever since (Bill) Cosby was accused of drugging women, I hear the date rape thing all the time." Legend reacted last month to critics, including Sharon Osbourne on "The View," who were upset that the original lyrics were changed to make them politically correct. "First of all, there's no side to be on," he told People. "It's just another version of the song. If you don't wanna listen to it, you don't have to. No one's saying you can't listen to the old version. Those versions all exist. People make new versions of songs all the time and we thought it'd be fun to update the song and make it more current."
RedPajamaCommonCrawl_8292412421841749853
Slimpajama627bTrain/chunk1
Channel 4 staff launch investigation into what 'Leeds' is CHANNEL 4 staff have begun an urgent investigation into where and what 'Leeds' is. As the company announced that it would be opening new headquarters in the city, hundreds of baffled London-based media professionals began a frantic fact-finding mission. Executive Tom Booker said: "We sent a colleague that way once to report on Brexit, but all we got back was his nose so we just assumed they'd eaten the rest of him." Social media content curator Nikki Hollis added: "Do they even have ironic speakeasy-style nightspots there? Mixed-media creative hubs? "If it doesn't have a cereal cafe I'm not going." Meanwhile, the people of Leeds were delighted by the announcement, and promptly tripled the price of everything in preparation. Woman on dating app looking for 'something casual' despite wearing bridesmaid dress in all her photos A WOMAN on a dating app has revealed she wants 'something casual' despite all her photos showing her in a bridesmaids dress or holding friends' babies. Emma Bradford, 28, said: "I only used those photos of me as a bridesmaid because my hair and make up had been professionally done on those days. "Which is just a different kind of lie really. "And what was I supposed to put? 'Woman pushing 30 in need of sperm donor and bloke to be in her wedding photos with her'? Nah." Potential date, Martin Bishop, said: "I don't mind that she's lied a bit on her profile. I put that I'm a 6 foot 4, judge and fireman whose looking for a serious relationship. "When actually I'm 6 foot 3, a barrister who used to be a fireman who's really just looking for casual sex that has absolutely no long term future."
RedPajamaCommonCrawl_6331237643317531818
Slimpajama627bTrain/chunk1
Plastic waste: A global problem and an opportunity for microbiology Posted on May 1, 2018 by Roya Ziaie Public appetite for reducing plastic waste is insatiable following the release of Blue Planet II; a series narrated by David Attenborough and focusing on the impact of human activity on the marine. At the Microbiology Society's Annual Conference 2018, delegates heard from Professor Kevin O'Connor, a leading principal investigator at University College Dublin. In his talk 'Plastic waste: A global problem and an opportunity for microbiology', he described strategies to reduce plastic waste, consumer confusion and opportunities for the future. The plastic problem: Due to its versatility, plastic is used in billions of products worldwide, and we are predicted to produce over 600 million tonnes of it by 2035. The plastic production industry employs 1.5 million people in Europe, plastics play a key role in reducing greenhouse gases (GHGs) by allowing us to build stronger and lighter vehicles and better insulate homes. However, the production and incineration of plastic contributes to over 400 million tonnes of carbon dioxide emissions annually and single use plastics are major pollutants on land and in the sea. Alternative materials or methods of plastic management are desperately needed. Many consumers are already aware that plastics are recyclable – why isn't there an efficient recycling system already in place? Currently, less than 30% of all plastic waste in Europe is collected for recycling, with recycling rates in many other regions even lower. This may be because recycled plastics produce lower quality products than virgin plastics and are aesthetically less appealing to consumers. Eighty percent of marine litter is made up of plastics. Items such as straws, coffee cup lids, plastic bottles, and plastic bags are single use items that make up the majority of beach pollution. Polyethylene terephthalate (PET) plastic bottles and containers can take up to 1,000 years to break down in the environment. Micro-plastics are also a major issue. Defined as plastics that are less than 5 millimetres in length, micro-plastics are formed in a variety of ways including through degradation of larger debris or are manufactured as micro-beads for use as exfoliants in beauty products such as cleansers and toothpastes. These minute particles often pass through water filtration systems, ending up in oceans and lakes. Micro-plastics can be extremely damaging to aquatic life; they can be mistaken for food by smaller fish and eventually enter the food chain in the guts of fish we eat. If we can't prevent the use of plastics, then society should work to reduce its consumption. Do we really need that much packaging? How can we design plastics to aid their re-use? Tackling plastic waste: In 1999, Kevin and his team began to investigate the reuse of petrochemical plastic waste. They used pyrolysis – a thermal decomposition method that reduces petrochemical plastic polymers to their precursors, or monomers. These monomers were then fed to the bacteria Psuedomonas putida. After consuming the petroplastic monomers, the bacteria produced biodegradable plastic polymers called polyhydroxyalkanoates (PHAs). PHAs break down in the environment to produce no harmful by-products, and were shown to perform either as well as, or better than, petrochemical polymers used for products such as glues, making them a viable alternative use in things like post-it notes. Kevin's team also focused on biodegradable polymers and how well they degrade in managed and non-managed environments. These included industrial composting, home composting and the marine, each of which has different composting standards. Ranging from industrial processes, which require plastics to degrade within 180 days at around 50°C, to the marine, which requires plastics degrade after 56 days at 30°C. What became clear was that different plastics, even those within the same polymer family, vary greatly in their rate of degradation in different environments. The fastest growing biodegradable plastic in the consumer market, polylactic acid (PLA), does not degrade at all in the 28°C conditions seen in home composting. Similarly, many plastics degrade poorly in the marine. With a well-managed industrial composting method however, biodegradable plastic produced fantastic results. More research is needed to ensure that biodegradation is possible for different plastics in different environments, something which will need to be built into the design of new products. Eighty percent of marine litter is made up of plastics The ultimate reality we face is that there is no quick-fix, and biodegradable plastics still need to be managed in the same way as petrochemical ones. A lack of clear messaging on the difference between biobased and biodegradable plastics is causing confusion for consumers and will not build consumer confidence. Responsible consumption should continue to be promoted, and initiatives to reduce plastic waste implemented quickly. Charges on supermarket carrier bags have already seen a 95% reduction in their use across Ireland, and 80% across England. The war has officially been waged on plastics, with the government working with trade associations, campaigners and over 40 companies to eliminate single-use packaging under the UK Plastics Pact. Individuals can also play their part, by purchasing a re-usable coffee cup or water bottle, taking a canvas bag to the supermarket and saying no to plastic straws and cutlery. Small changes can have big impact, and as Kevin O'Connor powerfully stated, the solution to plastic waste is us. Microbiology News Can we evolve our own antimicrobials? An interview with ASV President Professor Andy Pekosz New antibiotics needed: Neisseria gonorrhoeae Microbe Talk: Yeasts – the forgotten gut microbe Bioeconomy: Moving Towards a Sustainable Future
RedPajamaCommonCrawl_3582718897944686032
Slimpajama627bTrain/chunk1
An Elegant New Cyber Class for the New Year! All of the colorways use the same antique greens for the borders, as well as the same vintage gold Kreinik and Ribbon Floss metallics (including chunky gold Hot Wire to make the curleques). An additional soft metallic Ribbon Floss thread will match the main color of each palette. So, Stitchers, to kick off the beginning of 2018, I thought PETITE ARABESQUE would make the perfect new cyber class for the New Year. If you're intrigued by this unusual geometric piece, and want something different to stitch after the hectic holiday season has ended, please stroll on over to my website and see all the color choices and cyber class information... Pssst: Think of it as a pre-season present for yourself, to enjoy in the New Year!!
RedPajamaC4_8999594657329386401
Slimpajama627bTrain/chunk1
Two federal judges from Illinois' northern district are on President Donald Trump's shortlist to replace retiring U.S. Supreme Court Justice Anthony Kennedy. Trump told reporters that he would announce his pick to replace the Kennedy on Monday evening. Kennedy was appointed by President Ronald Reagan. Kennedy was often the swing vote that sided with the liberal end of the court on matters including "in particular, gay rights, and sometimes abortion and even more occasionally race," said Carolyn Shapiro, associate law professor at the Illinois Institute of Technology's College of Law. Two judges from the U.S. Seventh Circuit Court in Chicago are reportedly being considered: Appellate Judges Amy Coney Barrett and Diane Sykes. Neither live in Illinois. Senate Majority Leader Mitch McConnell pointed to Judges Raymond Kethledge and Thomas Hardiman as two that "presented the fewest obvious obstacles to being confirmed," according to a report from the New York Times. The likely topic of questions that would come from the Senate for any nominee, Shapiro said, would be about their views on abortion due to a potential challenge to Roe v. Wade. Since Illinois passed House Bill 40, which contained a trigger that would make a national ruling on abortion less of a factor locally, it wouldn't have near the effect that a ruling changing the legal status of abortion in the U.S. would elsewhere. "[HB 40] has a lot of guarantees where, regardless of what happens to Roe v. Wade, women will still have access to comprehensive reproductive healthcare in the state," she said. Gov. Bruce Rauner shocked Republicans by signing the bill into law. The backlash against the bill was a factor in the freshman governor facing a hard-fought primary challenge in March. As for the changing dynamic of the court, Shapiro said she expects more cases regarding free speech and its relation to regulation, akin to Janus v. AFSCME, to come before the court in the future.
RedPajamaC4_3909344184163480254
Slimpajama627bTrain/chunk1
Leave shoes, jackets, hats, and other extraneous personal items in the foyer or on a hook next to the restroom unless you require shoes for physical stability. Please do not bring cellphones into the zendo. Leave them in your car or in the foyer set to silent mode. To enter the zendo, take a step inside and offer a gassho bow (with palms together at heart-level) to the room and proceed to an available seat (zafu/bench/chair on a zabuton). Additional cushions may be obtained by the front door of the foyer. Before sitting down, stand facing your seat, bow toward it in gassho, then turn clockwise to bow toward the center of the meditation hall. Be seated facing the wall (or into the room if seated in the middle of the room) and assume your zazen posture. Be as quiet as possible upon entering the zendo and during meditation periods. The meditation bell is struck THREE times to mark the beginning of each period of zazen. It is struck TWICE to indicate the end of a period being followed by kinhin, and ONCE at the end of the last period of zazen. After the meditation bell rings TWICE ending the period of zazen, bow in gassho while seated. Move off the zafu and zabuton and stand at your seat facing outwards until the beginning of walking meditation (kinhin), which is signalled by the clackers (kaishaku). urn to the left and form a line behind the kinhin leader, who is holding the wooden clappers. Hold your hands in the shashu mudra. That is, with the left hand in a fist curled around the left thumb, right hand curled around left with right thumb on top. Clean off any lint from the zabuton and plump and arrange your zafu in the center of the zabuton. Stand in gassho and bow toward your seat, then turn to face the center of the room and bow. The leader announces, "Continuing our meditation we walk coordinating our breath and steps, taking a half step on each exhalation. Begin on the left foot at the sound of the clappers." ONE clap begins kinhin and TWO ends it. At the sound of the two claps ending kinhin, stop, place your feet together, bow in gassho with the group, and return at a normal walking pace to your meditation seat.
RedPajamaC4_2260460162715826230
Slimpajama627bTrain/chunk1
Jesper Just, born 1974 in Copenhagen, lives and works in New York City. Key to his work is the question of representation. How do we create images – and how do the images, in turn, conjure ideas, expectations, and conventions? Just's work has been featured in numerous permanent public collections including the Guggenheim Museum, MoMA, Tate Modern, Louisiana Museum of Modern Art, among many others. The film explores the body's relationship to public and private space and the limits and boundaries of the body itself in a search for selfhood, following the movements of two young female characters through the realm of urban space.
RedPajamaC4_-5210238104013594293
Slimpajama627bTrain/chunk1
A nurse from Illinois, US, has been foiled in her attempts to put a hit out on a doctor she had relations with wife. She went through the dark web to find a hitman, paid for it with $10,000 worth of BTC, only for the website to be a scam. CBS program 48 Hours discovered the hit, alerted the authorities, and has been charged with one count of solicitation of murder. The dark website, named Cosa Nostra International, turned out to be a scam which shines light onto the alleged ease in which people believe they can use Bitcoin for illicit goods and services.
RedPajamaC4_-6209755956650271211
Slimpajama627bTrain/chunk1
The DLF Forum brings together a wide variety of players in the digital library, museum, and archive fields, from project managers and developers to administrators and service providers. It is an open meeting that welcomes members and others with relevant interests, and provides a strategic platform for organizations to reach a targeted audience. The Forum is collegial, with an emphasis on inclusion and an expectation of trust. We plan to host over 700 attendees at the 2019 conference in Tampa, Florida, October 14-16. DLF has over 190 member institutions — 90+ new in the past several years alone. Take advantage of the rapid growth of this active community and meet digital library, museum, and archive professionals where they come together—the DLF Forum. Broaden your audience! Several affiliated events are co-located with the Forum including the NDSA's Digital Preservation 2019, workshops, meetups, and more. Be part of a conversation that extends beyond the three-day Forum and the pre- and post-conference events, via DLF social media, and the livestream. The National Digital Stewardship Alliance, hosted by the Digital Library Federation, is a consortium of over 200 partnering organizations, including universities, professional associations, businesses, government agencies, and nonprofit organizations, all committed to the long-term preservation of digital information. Members work together to preserve access to our national digital heritage. Digital Preservation is the major meeting and conference of the NDSA—open to members and non-members alike—focusing on tools, techniques, theories, and methodologies for digital stewardship and preservation, data curation, the content lifecycle, and related issues. Typically Digital Preservation attracts attendance of more than 200 participants. This year, DigiPres will be held October 16-17, 2019. Child Care Fund: Various levels–talk to us! DLF has created a fund to offset the cost of child care for Forum attendees. Donations in any amount are welcome—those that match or exceed a sponsorship category amount may be eligible for sponsorship benefits. The webcast and recording of select sessions will extend the conversation beyond the conference. Includes all the benefits of a gold level sponsorship. Your logo will join DLF's on the conference gift, type TBD. Includes all the benefits of a gold level sponsorship. Be a co-sponsor of Digital Preservation 2018's opening reception. Includes all the benefits of a gold level sponsorship. Your logo will be on the thumb drives that contain conference materials for attendees. Includes all the benefits of a silver level sponsorship. Lanyards: $3,000 — TAKEN. Thank you, Quartex powered by Adam Matthew! Everyone will be wearing your logo all week, and in photos from the conference. Includes all the benefits of a silver level sponsorship. Keep attendees caffeinated and motivated—they will appreciate you greatly! Includes all the benefits of a bronze level sponsorship. Add a table to your sponsorship package (included with Adamantium, Platinum, and Gold) and engage with attendees during breaks, meals, and breakout sessions. Limited space available so reserve soon. Interested in sponsorship or exhibiting but looking for something different or not sure how your organization fits? Please contact Louisa Kwasigroch.
RedPajamaC4_3876161113271958203
Slimpajama627bTrain/chunk1
Shedding light on the workings of the Intellectual Property Enterprise Court What happens when your copyright is infringed and the infringer won't pay up or won't stop infringing? Court action through the Intellectual Property Enterprise Court (IPEC) has been made more straightforward since the establishment of a Small Claims Track (SCT) for intellectual property claims below £10,000. The SCT addresses the barrier to court enforcement for low value claims, as previously, the relatively small amount of money at stake didn't justify the cost and trouble of bringing court action. However, due to the lack of transparency surrounding judgments in the IPEC, individuals considering court action may still have some hesitation in pursuing this route. Potential claimants would benefit from being informed about how the Court decides cases, the amount it awards and who commonly brings claims. Sheona Burrow, Postdoctoral Research Fellow, from CREATe at the University of Glasgow negotiated exclusive access to all IPEC SCT Court files for its first three years since the Court's creation (1 October 2012 to 31 December 2015). The Court is part of the High Court of England and Wales, and hears any dispute with a relevant link to England and Wales (e.g. where the defendant lives in those countries). Unlike other courts, very few IPEC SCT judgments are publicly available. CREATe research has therefore addressed the knowledge-gap surrounding the actual workings of Small Claims Track cases, providing vital evidence for potential claimants. What types of remedies are commonly granted by the IPEC SCT? What kinds of figures are awarded and what arguments are relevant when putting a case together? The research found that a significant proportion of claims in the SCT were claims for photographic copyright infringement brought by freelance professional photographers or their agents (46% of claims - 122 out of 266 claims over three years). CREATe researchers Elena Cooper, Leverhulme Early Career Fellow, and Sheona Burrow then obtained special consent to transcribe all the judgments delivered by the Court in these 122 freelance professional photographer cases. As the majority of cases were settled before they reached court, there were 21 judgments in total. They then conducted a detailed review of these cases and their research provides important insight into the way in which the Court deals with cases of photographic copyright infringement. The decisions in these cases reveal the Court to be highly sympathetic to the difficulties faced by freelance professional photographers, recognising the importance of income from copyright. The Court was generally unsympathetic to arguments commonly advanced by infringers. Assuming that everything on the internet can be freely used or that, because cheap and stock images are widely available, only a nominal amount should be paid, were not sufficient defences. In all but one case, the claimant was successful. Furthermore, in the overwhelming majority of judgments, the infringement itself was considered to be clear-cut. The only question for the Court was the amount of money to be awarded. Copyright law – the Copyright Designs and Patents Act 1988 (the CDPA) – enables a claimant to claim financial remedies on a number of grounds. The research paper details the amounts awarded in specific cases and reveals the discussion behind these amounts, where available. The research also shows that damages could be awarded where copyright works had not been attributed or in the case of 'derogatory treatment'. This is the addition, deletion, alteration or adaption of a work which distorts or mutilates the work or is otherwise prejudicial to the honour or reputation of the author (section 80 CDPA). Interest on damages (up to 8%), from the date of infringement to judgment, can also be awarded, the norm being between 3-4%. Limited costs can also be claimed, e.g. court fees, travel to/from a court hearing. The paper was initially published behind a paywall in the Journal of the Royal Photographic Society in May 2019. The full paper was subsequently published in the CREATe series of working papers as Know Your Rights: What can you do when your copyright is infringed? For more on CREATe's research in this area, please contact elena.cooper@glasgow.ac.uk and sheona.burrow@glasgow.ac.uk. Cooper, Elena, & Burrow, Sheona (2019) Know your Rights: What can you do when your Copyright is Infringed? http://doi.org/10.5281/zenodo.3475187 [Last accessed November 2019] Cooper, Elena & Burrow, Sheona (2018) Photographic Copyright and the Intellectual Property Enterprise Court in Historical Perspective. Zenodo. http://doi.org/10.5281/zenodo.1246559 [Last accessed November 2019]
RedPajamaCommonCrawl_-7505943683295628737
Slimpajama627bTrain/chunk1
i give you a link to my myspace site. there you can listen to 4 tracks of dance-floor, psychedelic music. how long are u making music now? i´m working on my project now since nearly 3 years. last half a year i only focused on the musik. no working for any company... only musik production. i listen also to your musik on your profile. its cool production the sounds i like and also the quality! where are u located, tirol? i would be there next week, could be nice meeting.. when you plan to come? so, tell me... i´ll have time.
RedPajamaC4_-2839108694158791620
Slimpajama627bTrain/chunk1
The Canadian clinical psychologist Jordan B Peterson has, in recent years, become an internet celebrity, producing a slew of videos and interviews on all manner of political and social topics. He is acerbic, combative and openly contemptuous of his opponents, particularly Marxists and "Postmodernists", for whom he harbours a special animus. He is an enthusiastic and prolific culture warrior, who has no truck with "white privilege", "cultural appropriation" and a range of other ideas associated with social justice movements. His reluctance to call transgender people by their preferred pronouns (unless they ask him to) has earned him a reputation as a transphobe, and while his views have marginalised him within the academic community, they have bolstered his reputation in conservative circles. His academic work includes many papers in which he seeks to understand political and religious belief in terms of the so-called "big five" personality traits – openness, conscientiousness, extraversion, agreeableness and neuroticism. His work on the psychology of political correctness has raised eyebrows, given his recent proposal to purge "corrupt" academic departments of courses and teachers he deems infected by this pathology. This response captures much of what, for good and ill, informs 12 Rules for Life, his long and often peculiar foray into the self-help genre. It is a book that combines sensible advice gleaned from his clinical practice with inspirational anecdotes from his personal life, accounts of his academic work in the field of psychology and a lot of intellectual history of the "great books" variety, which he interprets in highly tendentious ways. Jordan B Peterson, raised and toughened in the frigid wastelands of Northern Alberta, has flown a hammerhead roll in a carbon fibre stunt plane, piloted a mahogany racing sailboat around Alcatraz Island, explored an Arizona meteorite crater with a group of astronauts, built a Native American longhouse on the upper floor of his Toronto home, and been inducted into the coastal Pacific Kwakwaka'wakw tribe. Once the cloud of testosterone has cleared (leaving behind the lingering curiosity as to why, exactly, one would want a longhouse upstairs), the reader discovers that each of Peterson's 12 rules is explained in an essay delivered in a baroque style that combines pull-your-socks-up scolding with footnoted references to academic papers and Blavatskyesque metaphysical flights. He likes to capitalise the word "Being" and also to talk about "fundamental, biological and non-arbitrary emergent truth". Within a page, we are told that "expedience is cowardly, and shallow, and wrong" and "meaning is what emerges beautifully and profoundly like a newly formed rosebud opening itself out of nothingness into the light of sun and God". The effect is bizarre, like being shouted at by a rugby coach in a sarong. The big duality in 12 Rules for Life is the opposition of order and chaos. The point of the rules is, as the subtitle states, to provide "an antidote to chaos". The maintenance of order is at the core of Peterson's world view. Order is truth. It is singular and masculine. Chaos is "the eternal feminine", a misty Jungian formulation that puts the author in the invidious position of promoting a how-to manual on suppressing the feminine principle. He fudges this by talking about yin and yang, and "straddling dualities", but if chaos is indeed the "possibility, growth and adventure" towards which he occasionally remembers to genuflect, it's clear that he is mainly preoccupied with keeping it at bay. It's not an easy thing to live in a truthful manner, but the alternative is hell … I learned a lot about the importance of spoken truth as the countervailing force against tyranny and authoritarianism. It isn't an alternative political structure that's the countervailing force, it's spoken truth that's the countervailing force. Why would I put my job on the line to have an opinion about compelled pronouns? Because the ability to speak your truth is the bulwark against hell. This religious language is not metaphorical. Peterson does not like to be asked if he believes in God, complaining to an interviewer that the question is intended to "box him in", but 12 Rules for Life is saturated with Christian theology. Many pages are devoted to biblical exegesis, and his thoughts about lies lead him first to Goebbels and the "big lie" of propaganda, then to the "father of lies" – not Derrida, but the devil. When thinking about the Columbine school shootings, he is moved to wonder whether Eric Harris was not, in fact, an incarnation of Satan. What makes this book so irritating is Peterson's failure to follow many of the rules he sets out with such sententiousness. He does not "assume that the person he is listening to might know something he doesn't". He is far from "precise in his speech", allowing his own foundational concepts (like "being" and "chaos") to slide around until they lose any clear meaning. He is happy to dish out a stern injunction against straw-manning, but his "Postmodernists" and Marxists are the flimsiest of scarecrows, so his chest-thumping intellectual victories seem hollow. He appears sincere, and in some ways admirable in his fierce desire for truth, but he is much less far along his journey than he thinks, and one ends his oppressive, hectoring book relieved to be free of him. • 12 Rules for Life: An Antidote to Chaos is published by Allen Lane. To order a copy for £17 (RRP £20) go to guardianbookshop.com or call 0330 333 6846. Free UK p&p over £10, online orders only. Phone orders min p&p of £1.99.
RedPajamaC4_6611823403038720278
Slimpajama627bTrain/chunk1
NASA's James Webb Space Telescope Upbeats It's Optics Milestone April 23, 2022 March 17, 2022 by SunniyaZ The mysteries of the universe are unraveling. All thanks to the amazing NASA's James Webb Space Telescope, launched back in December. It arrived at its destination which is nearly 1 million miles (1.5 million kilometres) away from earth in January. To make things even better, the JWST just sent back some of its very first pictures of the cosmos. It has successfully met every optical parameter, and is performing at, or above their expectations. It is clearly delivering light to its instruments, because of this amazing achievement, NASA is confident enough to state that the observatory will meet its science objectives. It has exceeded the expectations and performed better than expected. The team did not find any critical issues, and no blockages to Webb's optical path. The observatory has no problems gathering light from distant objects and delivering it to its instruments. More than 20 years ago, the Webb team set out to build the most powerful telescope that anyone has ever put in space and came up with an audacious optical design to meet demanding science goals," said Thomas Zurbuchen, associate administrator for NASA's Science Mission Directorate in Washington. "Today we can say that the design is going to be delivered." The new image that is released by the team is of the star 2MASS J17554042+6551277 in crisp clarity. JWST's observing power comes in part of its mirror which has 18 mirror segments which have been carefully aligned to act as one big giant high precision, stretching 21 feet across (6.5 meters). We now have achieved what's called 'diffraction limited alignment' of the telescope," said Marshall Perrin, deputy project scientist for Webb at the Space Telescope Science Institute. Read: James Webb Space Telescope will uncover the brightest Quasar in the early Universe "The mirrors are focused together as finely as the laws of physics allow, and this is the sharpest image you can get from a telescope of this size." If you want to understand how well the telescope works, you can look closely at the image of star 2MASS J17554042+6551277 and notice that the background galaxies are visible, it is more like "the deep field" images taken by the Hubble Space Telescope. "Basically, everywhere we look, it's a Deep Field," said Jane Rigby, Webb operations project scientist. "These engineering images are as sharp and crisp as images that Hubble can take, but at a wavelength of light that Hubble can't see." A "selfie" taken by the James Webb Space Telescope's NIRCam instrument during the alignment process. (Image credit: NASA/STScI) New images which were released by NASA also included a "selfie" from JWST showing the mirrors' progress along with updated images of a single star. The JWST's "selfie" shows its 18 mirrors which are all collecting light from the same star. It's said that during the next six weeks, NASA will continue to prepare JWST to finally begin its science work. Which will help in tackling topics like identifying the impact that mysterious dark matter has on the cosmos, to look deeper into the universe and might help in understanding the earliest days of the universe, might be able to unravel the multiverse theories.
RedPajamaCommonCrawl_9040882051105264578
Slimpajama627bTrain/chunk1
/* * Description: * distributed lock service implemented with zookeeper, the definition of each lock structure * * Revision history: * 2015-12-04, @shengofsun (sunweijie@xiaomi.com) */ #pragma once #include <dsn/tool-api/thread_access_checker.h> #include <dsn/dist/distributed_lock_service.h> #include <string> #include "lock_types.h" namespace dsn { namespace dist { enum lock_state { uninitialized, pending, locked, expired, cancelled, unlocking, state_count }; struct zoolock_pair { std::string _node_value; std::string _node_seq_name; int64_t _sequence_id; }; class lock_struct : public ref_counter { public: lock_struct(lock_srv_ptr srv); void initialize(std::string lock_id, std::string myself_id); const int hash() const { return _hash; } static void try_lock(lock_struct_ptr _this, lock_future_ptr lock_callback, lock_future_ptr expire_callback); static void cancel_pending_lock(lock_struct_ptr _this, lock_future_ptr cancel_callback); static void unlock(lock_struct_ptr _this, error_code_future_ptr unlock_callback); static void lock_expired(lock_struct_ptr _this); private: void create_locknode(); void get_lockdir_nodes(); void get_lock_owner(bool watch_myself); void remove_duplicated_locknode(std::string &&znode_path); void remove_my_locknode(std::string &&znode_path, bool ignore_callback, bool remove_for_unlock); void clear(); void remove_lock(); void on_operation_timeout(); void on_expire(); static int64_t parse_seq_path(const std::string &path); static void after_create_lockdir(lock_struct_ptr _this, int ec); static void after_get_lockdir_nodes(lock_struct_ptr _this, int ec, std::shared_ptr<std::vector<std::string>> children); static void after_create_locknode(lock_struct_ptr _this, int ec, std::shared_ptr<std::string> path); static void after_get_lock_owner(lock_struct_ptr _this, int ec, std::shared_ptr<std::string> value); static void after_self_check(lock_struct_ptr _this, int ec, std::shared_ptr<std::string> value); static void after_remove_duplicated_locknode(lock_struct_ptr _this, int ec, std::shared_ptr<std::string> value); static void after_remove_my_locknode(lock_struct_ptr _this, int ec, bool need_to_notify); /*lock owner watch callback*/ static void owner_change(lock_struct_ptr _this, int zoo_event); static void my_lock_removed(lock_struct_ptr _this, int zoo_event); private: lock_future_ptr _lock_callback; lock_future_ptr _lease_expire_callback; lock_future_ptr _cancel_callback; error_code_future_ptr _unlock_callback; std::string _lock_id; std::string _lock_dir; // ${lock_root}/${lock_id} zoolock_pair _myself, _owner; lock_state _state; int _hash; lock_srv_ptr _dist_lock_service; thread_access_checker _checker; }; } }
RedPajamaGithub_-6670662567375329609
Slimpajama627bTrain/chunk1
<html> <head> <title>pcretest specification</title> </head> <body bgcolor="#FFFFFF" text="#00005A" link="#0066FF" alink="#3399FF" vlink="#2222BB"> <h1>pcretest man page</h1> <p> Return to the <a href="index.html">PCRE index page</a>. </p> <p> This page is part of the PCRE HTML documentation. It was generated automatically from the original man page. If there is any nonsense in it, please consult the man page, in case the conversion went wrong. <br> <ul> <li><a name="TOC1" href="#SEC1">SYNOPSIS</a> <li><a name="TOC2" href="#SEC2">PCRE's 8-BIT and 16-BIT LIBRARIES</a> <li><a name="TOC3" href="#SEC3">COMMAND LINE OPTIONS</a> <li><a name="TOC4" href="#SEC4">DESCRIPTION</a> <li><a name="TOC5" href="#SEC5">PATTERN MODIFIERS</a> <li><a name="TOC6" href="#SEC6">DATA LINES</a> <li><a name="TOC7" href="#SEC7">THE ALTERNATIVE MATCHING FUNCTION</a> <li><a name="TOC8" href="#SEC8">DEFAULT OUTPUT FROM PCRETEST</a> <li><a name="TOC9" href="#SEC9">OUTPUT FROM THE ALTERNATIVE MATCHING FUNCTION</a> <li><a name="TOC10" href="#SEC10">RESTARTING AFTER A PARTIAL MATCH</a> <li><a name="TOC11" href="#SEC11">CALLOUTS</a> <li><a name="TOC12" href="#SEC12">NON-PRINTING CHARACTERS</a> <li><a name="TOC13" href="#SEC13">SAVING AND RELOADING COMPILED PATTERNS</a> <li><a name="TOC14" href="#SEC14">SEE ALSO</a> <li><a name="TOC15" href="#SEC15">AUTHOR</a> <li><a name="TOC16" href="#SEC16">REVISION</a> </ul> <br><a name="SEC1" href="#TOC1">SYNOPSIS</a><br> <P> <b>pcretest [options] [input file [output file]]</b> <br> <br> <b>pcretest</b> was written as a test program for the PCRE regular expression library itself, but it can also be used for experimenting with regular expressions. This document describes the features of the test program; for details of the regular expressions themselves, see the <a href="pcrepattern.html"><b>pcrepattern</b></a> documentation. For details of the PCRE library function calls and their options, see the <a href="pcreapi.html"><b>pcreapi</b></a> and <a href="pcre16.html"><b>pcre16</b></a> documentation. The input for <b>pcretest</b> is a sequence of regular expression patterns and strings to be matched, as described below. The output shows the result of each match. Options on the command line and the patterns control PCRE options and exactly what is output. </P> <br><a name="SEC2" href="#TOC1">PCRE's 8-BIT and 16-BIT LIBRARIES</a><br> <P> From release 8.30, two separate PCRE libraries can be built. The original one supports 8-bit character strings, whereas the newer 16-bit library supports character strings encoded in 16-bit units. The <b>pcretest</b> program can be used to test both libraries. However, it is itself still an 8-bit program, reading 8-bit input and writing 8-bit output. When testing the 16-bit library, the patterns and data strings are converted to 16-bit format before being passed to the PCRE library functions. Results are converted to 8-bit for output. </P> <P> References to functions and structures of the form <b>pcre[16]_xx</b> below mean "<b>pcre_xx</b> when using the 8-bit library or <b>pcre16_xx</b> when using the 16-bit library". </P> <br><a name="SEC3" href="#TOC1">COMMAND LINE OPTIONS</a><br> <P> <b>-16</b> If both the 8-bit and the 16-bit libraries have been built, this option causes the 16-bit library to be used. If only the 16-bit library has been built, this is the default (so has no effect). If only the 8-bit library has been built, this option causes an error. </P> <P> <b>-b</b> Behave as if each pattern has the <b>/B</b> (show byte code) modifier; the internal form is output after compilation. </P> <P> <b>-C</b> Output the version number of the PCRE library, and all available information about the optional features that are included, and then exit. All other options are ignored. </P> <P> <b>-C</b> <i>option</i> Output information about a specific build-time option, then exit. This functionality is intended for use in scripts such as <b>RunTest</b>. The following options output the value indicated: <pre> linksize the internal link size (2, 3, or 4) newline the default newline setting: CR, LF, CRLF, ANYCRLF, or ANY </pre> The following options output 1 for true or zero for false: <pre> jit just-in-time support is available pcre16 the 16-bit library was built pcre8 the 8-bit library was built ucp Unicode property support is available utf UTF-8 and/or UTF-16 support is available </PRE> </P> <P> <b>-d</b> Behave as if each pattern has the <b>/D</b> (debug) modifier; the internal form and information about the compiled pattern is output after compilation; <b>-d</b> is equivalent to <b>-b -i</b>. </P> <P> <b>-dfa</b> Behave as if each data line contains the \D escape sequence; this causes the alternative matching function, <b>pcre[16]_dfa_exec()</b>, to be used instead of the standard <b>pcre[16]_exec()</b> function (more detail is given below). </P> <P> <b>-help</b> Output a brief summary these options and then exit. </P> <P> <b>-i</b> Behave as if each pattern has the <b>/I</b> modifier; information about the compiled pattern is given after compilation. </P> <P> <b>-M</b> Behave as if each data line contains the \M escape sequence; this causes PCRE to discover the minimum MATCH_LIMIT and MATCH_LIMIT_RECURSION settings by calling <b>pcre[16]_exec()</b> repeatedly with different limits. </P> <P> <b>-m</b> Output the size of each compiled pattern after it has been compiled. This is equivalent to adding <b>/M</b> to each regular expression. The size is given in bytes for both libraries. </P> <P> <b>-o</b> <i>osize</i> Set the number of elements in the output vector that is used when calling <b>pcre[16]_exec()</b> or <b>pcre[16]_dfa_exec()</b> to be <i>osize</i>. The default value is 45, which is enough for 14 capturing subexpressions for <b>pcre[16]_exec()</b> or 22 different matches for <b>pcre[16]_dfa_exec()</b>. The vector size can be changed for individual matching calls by including \O in the data line (see below). </P> <P> <b>-p</b> Behave as if each pattern has the <b>/P</b> modifier; the POSIX wrapper API is used to call PCRE. None of the other options has any effect when <b>-p</b> is set. This option can be used only with the 8-bit library. </P> <P> <b>-q</b> Do not output the version number of <b>pcretest</b> at the start of execution. </P> <P> <b>-S</b> <i>size</i> On Unix-like systems, set the size of the run-time stack to <i>size</i> megabytes. </P> <P> <b>-s</b> or <b>-s+</b> Behave as if each pattern has the <b>/S</b> modifier; in other words, force each pattern to be studied. If <b>-s+</b> is used, the PCRE_STUDY_JIT_COMPILE flag is passed to <b>pcre[16]_study()</b>, causing just-in-time optimization to be set up if it is available. If the <b>/I</b> or <b>/D</b> option is present on a pattern (requesting output about the compiled pattern), information about the result of studying is not included when studying is caused only by <b>-s</b> and neither <b>-i</b> nor <b>-d</b> is present on the command line. This behaviour means that the output from tests that are run with and without <b>-s</b> should be identical, except when options that output information about the actual running of a match are set. <br> <br> The <b>-M</b>, <b>-t</b>, and <b>-tm</b> options, which give information about resources used, are likely to produce different output with and without <b>-s</b>. Output may also differ if the <b>/C</b> option is present on an individual pattern. This uses callouts to trace the the matching process, and this may be different between studied and non-studied patterns. If the pattern contains (*MARK) items there may also be differences, for the same reason. The <b>-s</b> command line option can be overridden for specific patterns that should never be studied (see the <b>/S</b> pattern modifier below). </P> <P> <b>-t</b> Run each compile, study, and match many times with a timer, and output resulting time per compile or match (in milliseconds). Do not set <b>-m</b> with <b>-t</b>, because you will then get the size output a zillion times, and the timing will be distorted. You can control the number of iterations that are used for timing by following <b>-t</b> with a number (as a separate item on the command line). For example, "-t 1000" would iterate 1000 times. The default is to iterate 500000 times. </P> <P> <b>-tm</b> This is like <b>-t</b> except that it times only the matching phase, not the compile or study phases. </P> <br><a name="SEC4" href="#TOC1">DESCRIPTION</a><br> <P> If <b>pcretest</b> is given two filename arguments, it reads from the first and writes to the second. If it is given only one filename argument, it reads from that file and writes to stdout. Otherwise, it reads from stdin and writes to stdout, and prompts for each line of input, using "re&#62;" to prompt for regular expressions, and "data&#62;" to prompt for data lines. </P> <P> When <b>pcretest</b> is built, a configuration option can specify that it should be linked with the <b>libreadline</b> library. When this is done, if the input is from a terminal, it is read using the <b>readline()</b> function. This provides line-editing and history facilities. The output from the <b>-help</b> option states whether or not <b>readline()</b> will be used. </P> <P> The program handles any number of sets of input on a single input file. Each set starts with a regular expression, and continues with any number of data lines to be matched against the pattern. </P> <P> Each data line is matched separately and independently. If you want to do multi-line matches, you have to use the \n escape sequence (or \r or \r\n, etc., depending on the newline setting) in a single line of input to encode the newline sequences. There is no limit on the length of data lines; the input buffer is automatically extended if it is too small. </P> <P> An empty line signals the end of the data lines, at which point a new regular expression is read. The regular expressions are given enclosed in any non-alphanumeric delimiters other than backslash, for example: <pre> /(a|bc)x+yz/ </pre> White space before the initial delimiter is ignored. A regular expression may be continued over several input lines, in which case the newline characters are included within it. It is possible to include the delimiter within the pattern by escaping it, for example <pre> /abc\/def/ </pre> If you do so, the escape and the delimiter form part of the pattern, but since delimiters are always non-alphanumeric, this does not affect its interpretation. If the terminating delimiter is immediately followed by a backslash, for example, <pre> /abc/\ </pre> then a backslash is added to the end of the pattern. This is done to provide a way of testing the error condition that arises if a pattern finishes with a backslash, because <pre> /abc\/ </pre> is interpreted as the first line of a pattern that starts with "abc/", causing pcretest to read the next line as a continuation of the regular expression. </P> <br><a name="SEC5" href="#TOC1">PATTERN MODIFIERS</a><br> <P> A pattern may be followed by any number of modifiers, which are mostly single characters. Following Perl usage, these are referred to below as, for example, "the <b>/i</b> modifier", even though the delimiter of the pattern need not always be a slash, and no slash is used when writing modifiers. White space may appear between the final pattern delimiter and the first modifier, and between the modifiers themselves. </P> <P> The <b>/i</b>, <b>/m</b>, <b>/s</b>, and <b>/x</b> modifiers set the PCRE_CASELESS, PCRE_MULTILINE, PCRE_DOTALL, or PCRE_EXTENDED options, respectively, when <b>pcre[16]_compile()</b> is called. These four modifier letters have the same effect as they do in Perl. For example: <pre> /caseless/i </pre> The following table shows additional modifiers for setting PCRE compile-time options that do not correspond to anything in Perl: <pre> <b>/8</b> PCRE_UTF8 ) when using the 8-bit <b>/?</b> PCRE_NO_UTF8_CHECK ) library <b>/8</b> PCRE_UTF16 ) when using the 16-bit <b>/?</b> PCRE_NO_UTF16_CHECK ) library <b>/A</b> PCRE_ANCHORED <b>/C</b> PCRE_AUTO_CALLOUT <b>/E</b> PCRE_DOLLAR_ENDONLY <b>/f</b> PCRE_FIRSTLINE <b>/J</b> PCRE_DUPNAMES <b>/N</b> PCRE_NO_AUTO_CAPTURE <b>/U</b> PCRE_UNGREEDY <b>/W</b> PCRE_UCP <b>/X</b> PCRE_EXTRA <b>/Y</b> PCRE_NO_START_OPTIMIZE <b>/&#60;JS&#62;</b> PCRE_JAVASCRIPT_COMPAT <b>/&#60;cr&#62;</b> PCRE_NEWLINE_CR <b>/&#60;lf&#62;</b> PCRE_NEWLINE_LF <b>/&#60;crlf&#62;</b> PCRE_NEWLINE_CRLF <b>/&#60;anycrlf&#62;</b> PCRE_NEWLINE_ANYCRLF <b>/&#60;any&#62;</b> PCRE_NEWLINE_ANY <b>/&#60;bsr_anycrlf&#62;</b> PCRE_BSR_ANYCRLF <b>/&#60;bsr_unicode&#62;</b> PCRE_BSR_UNICODE </pre> The modifiers that are enclosed in angle brackets are literal strings as shown, including the angle brackets, but the letters within can be in either case. This example sets multiline matching with CRLF as the line ending sequence: <pre> /^abc/m&#60;CRLF&#62; </pre> As well as turning on the PCRE_UTF8/16 option, the <b>/8</b> modifier causes all non-printing characters in output strings to be printed using the \x{hh...} notation. Otherwise, those less than 0x100 are output in hex without the curly brackets. </P> <P> Full details of the PCRE options are given in the <a href="pcreapi.html"><b>pcreapi</b></a> documentation. </P> <br><b> Finding all matches in a string </b><br> <P> Searching for all possible matches within each subject string can be requested by the <b>/g</b> or <b>/G</b> modifier. After finding a match, PCRE is called again to search the remainder of the subject string. The difference between <b>/g</b> and <b>/G</b> is that the former uses the <i>startoffset</i> argument to <b>pcre[16]_exec()</b> to start searching at a new point within the entire string (which is in effect what Perl does), whereas the latter passes over a shortened substring. This makes a difference to the matching process if the pattern begins with a lookbehind assertion (including \b or \B). </P> <P> If any call to <b>pcre[16]_exec()</b> in a <b>/g</b> or <b>/G</b> sequence matches an empty string, the next call is done with the PCRE_NOTEMPTY_ATSTART and PCRE_ANCHORED flags set in order to search for another, non-empty, match at the same point. If this second match fails, the start offset is advanced, and the normal match is retried. This imitates the way Perl handles such cases when using the <b>/g</b> modifier or the <b>split()</b> function. Normally, the start offset is advanced by one character, but if the newline convention recognizes CRLF as a newline, and the current character is CR followed by LF, an advance of two is used. </P> <br><b> Other modifiers </b><br> <P> There are yet more modifiers for controlling the way <b>pcretest</b> operates. </P> <P> The <b>/+</b> modifier requests that as well as outputting the substring that matched the entire pattern, <b>pcretest</b> should in addition output the remainder of the subject string. This is useful for tests where the subject contains multiple copies of the same substring. If the <b>+</b> modifier appears twice, the same action is taken for captured substrings. In each case the remainder is output on the following line with a plus character following the capture number. Note that this modifier must not immediately follow the /S modifier because /S+ has another meaning. </P> <P> The <b>/=</b> modifier requests that the values of all potential captured parentheses be output after a match. By default, only those up to the highest one actually used in the match are output (corresponding to the return code from <b>pcre[16]_exec()</b>). Values in the offsets vector corresponding to higher numbers should be set to -1, and these are output as "&#60;unset&#62;". This modifier gives a way of checking that this is happening. </P> <P> The <b>/B</b> modifier is a debugging feature. It requests that <b>pcretest</b> output a representation of the compiled code after compilation. Normally this information contains length and offset values; however, if <b>/Z</b> is also present, this data is replaced by spaces. This is a special feature for use in the automatic test scripts; it ensures that the same output is generated for different internal link sizes. </P> <P> The <b>/D</b> modifier is a PCRE debugging feature, and is equivalent to <b>/BI</b>, that is, both the <b>/B</b> and the <b>/I</b> modifiers. </P> <P> The <b>/F</b> modifier causes <b>pcretest</b> to flip the byte order of the 2-byte and 4-byte fields in the compiled pattern. This facility is for testing the feature in PCRE that allows it to execute patterns that were compiled on a host with a different endianness. This feature is not available when the POSIX interface to PCRE is being used, that is, when the <b>/P</b> pattern modifier is specified. See also the section about saving and reloading compiled patterns below. </P> <P> The <b>/I</b> modifier requests that <b>pcretest</b> output information about the compiled pattern (whether it is anchored, has a fixed first character, and so on). It does this by calling <b>pcre[16]_fullinfo()</b> after compiling a pattern. If the pattern is studied, the results of that are also output. </P> <P> The <b>/K</b> modifier requests <b>pcretest</b> to show names from backtracking control verbs that are returned from calls to <b>pcre[16]_exec()</b>. It causes <b>pcretest</b> to create a <b>pcre[16]_extra</b> block if one has not already been created by a call to <b>pcre[16]_study()</b>, and to set the PCRE_EXTRA_MARK flag and the <b>mark</b> field within it, every time that <b>pcre[16]_exec()</b> is called. If the variable that the <b>mark</b> field points to is non-NULL for a match, non-match, or partial match, <b>pcretest</b> prints the string to which it points. For a match, this is shown on a line by itself, tagged with "MK:". For a non-match it is added to the message. </P> <P> The <b>/L</b> modifier must be followed directly by the name of a locale, for example, <pre> /pattern/Lfr_FR </pre> For this reason, it must be the last modifier. The given locale is set, <b>pcre[16]_maketables()</b> is called to build a set of character tables for the locale, and this is then passed to <b>pcre[16]_compile()</b> when compiling the regular expression. Without an <b>/L</b> (or <b>/T</b>) modifier, NULL is passed as the tables pointer; that is, <b>/L</b> applies only to the expression on which it appears. </P> <P> The <b>/M</b> modifier causes the size in bytes of the memory block used to hold the compiled pattern to be output. This does not include the size of the <b>pcre[16]</b> block; it is just the actual compiled data. If the pattern is successfully studied with the PCRE_STUDY_JIT_COMPILE option, the size of the JIT compiled code is also output. </P> <P> If the <b>/S</b> modifier appears once, it causes <b>pcre[16]_study()</b> to be called after the expression has been compiled, and the results used when the expression is matched. If <b>/S</b> appears twice, it suppresses studying, even if it was requested externally by the <b>-s</b> command line option. This makes it possible to specify that certain patterns are always studied, and others are never studied, independently of <b>-s</b>. This feature is used in the test files in a few cases where the output is different when the pattern is studied. </P> <P> If the <b>/S</b> modifier is immediately followed by a + character, the call to <b>pcre[16]_study()</b> is made with the PCRE_STUDY_JIT_COMPILE option, requesting just-in-time optimization support if it is available. Note that there is also a <b>/+</b> modifier; it must not be given immediately after <b>/S</b> because this will be misinterpreted. If JIT studying is successful, it will automatically be used when <b>pcre[16]_exec()</b> is run, except when incompatible run-time options are specified. These include the partial matching options; a complete list is given in the <a href="pcrejit.html"><b>pcrejit</b></a> documentation. See also the <b>\J</b> escape sequence below for a way of setting the size of the JIT stack. </P> <P> The <b>/T</b> modifier must be followed by a single digit. It causes a specific set of built-in character tables to be passed to <b>pcre[16]_compile()</b>. It is used in the standard PCRE tests to check behaviour with different character tables. The digit specifies the tables as follows: <pre> 0 the default ASCII tables, as distributed in pcre_chartables.c.dist 1 a set of tables defining ISO 8859 characters </pre> In table 1, some characters whose codes are greater than 128 are identified as letters, digits, spaces, etc. </P> <br><b> Using the POSIX wrapper API </b><br> <P> The <b>/P</b> modifier causes <b>pcretest</b> to call PCRE via the POSIX wrapper API rather than its native API. This supports only the 8-bit library. When <b>/P</b> is set, the following modifiers set options for the <b>regcomp()</b> function: <pre> /i REG_ICASE /m REG_NEWLINE /N REG_NOSUB /s REG_DOTALL ) /U REG_UNGREEDY ) These options are not part of /W REG_UCP ) the POSIX standard /8 REG_UTF8 ) </pre> The <b>/+</b> modifier works as described above. All other modifiers are ignored. </P> <br><a name="SEC6" href="#TOC1">DATA LINES</a><br> <P> Before each data line is passed to <b>pcre[16]_exec()</b>, leading and trailing white space is removed, and it is then scanned for \ escapes. Some of these are pretty esoteric features, intended for checking out some of the more complicated features of PCRE. If you are just testing "ordinary" regular expressions, you probably don't need any of these. The following escapes are recognized: <pre> \a alarm (BEL, \x07) \b backspace (\x08) \e escape (\x27) \f form feed (\x0c) \n newline (\x0a) \qdd set the PCRE_MATCH_LIMIT limit to dd (any number of digits) \r carriage return (\x0d) \t tab (\x09) \v vertical tab (\x0b) \nnn octal character (up to 3 octal digits); always a byte unless &#62; 255 in UTF-8 or 16-bit mode \xhh hexadecimal byte (up to 2 hex digits) \x{hh...} hexadecimal character (any number of hex digits) \A pass the PCRE_ANCHORED option to <b>pcre[16]_exec()</b> or <b>pcre[16]_dfa_exec()</b> \B pass the PCRE_NOTBOL option to <b>pcre[16]_exec()</b> or <b>pcre[16]_dfa_exec()</b> \Cdd call pcre[16]_copy_substring() for substring dd after a successful match (number less than 32) \Cname call pcre[16]_copy_named_substring() for substring "name" after a successful match (name termin- ated by next non alphanumeric character) \C+ show the current captured substrings at callout time \C- do not supply a callout function \C!n return 1 instead of 0 when callout number n is reached \C!n!m return 1 instead of 0 when callout number n is reached for the nth time \C*n pass the number n (may be negative) as callout data; this is used as the callout return value \D use the <b>pcre[16]_dfa_exec()</b> match function \F only shortest match for <b>pcre[16]_dfa_exec()</b> \Gdd call pcre[16]_get_substring() for substring dd after a successful match (number less than 32) \Gname call pcre[16]_get_named_substring() for substring "name" after a successful match (name termin- ated by next non-alphanumeric character) \Jdd set up a JIT stack of dd kilobytes maximum (any number of digits) \L call pcre[16]_get_substringlist() after a successful match \M discover the minimum MATCH_LIMIT and MATCH_LIMIT_RECURSION settings \N pass the PCRE_NOTEMPTY option to <b>pcre[16]_exec()</b> or <b>pcre[16]_dfa_exec()</b>; if used twice, pass the PCRE_NOTEMPTY_ATSTART option \Odd set the size of the output vector passed to <b>pcre[16]_exec()</b> to dd (any number of digits) \P pass the PCRE_PARTIAL_SOFT option to <b>pcre[16]_exec()</b> or <b>pcre[16]_dfa_exec()</b>; if used twice, pass the PCRE_PARTIAL_HARD option \Qdd set the PCRE_MATCH_LIMIT_RECURSION limit to dd (any number of digits) \R pass the PCRE_DFA_RESTART option to <b>pcre[16]_dfa_exec()</b> \S output details of memory get/free calls during matching \Y pass the PCRE_NO_START_OPTIMIZE option to <b>pcre[16]_exec()</b> or <b>pcre[16]_dfa_exec()</b> \Z pass the PCRE_NOTEOL option to <b>pcre[16]_exec()</b> or <b>pcre[16]_dfa_exec()</b> \? pass the PCRE_NO_UTF[8|16]_CHECK option to <b>pcre[16]_exec()</b> or <b>pcre[16]_dfa_exec()</b> \&#62;dd start the match at offset dd (optional "-"; then any number of digits); this sets the <i>startoffset</i> argument for <b>pcre[16]_exec()</b> or <b>pcre[16]_dfa_exec()</b> \&#60;cr&#62; pass the PCRE_NEWLINE_CR option to <b>pcre[16]_exec()</b> or <b>pcre[16]_dfa_exec()</b> \&#60;lf&#62; pass the PCRE_NEWLINE_LF option to <b>pcre[16]_exec()</b> or <b>pcre[16]_dfa_exec()</b> \&#60;crlf&#62; pass the PCRE_NEWLINE_CRLF option to <b>pcre[16]_exec()</b> or <b>pcre[16]_dfa_exec()</b> \&#60;anycrlf&#62; pass the PCRE_NEWLINE_ANYCRLF option to <b>pcre[16]_exec()</b> or <b>pcre[16]_dfa_exec()</b> \&#60;any&#62; pass the PCRE_NEWLINE_ANY option to <b>pcre[16]_exec()</b> or <b>pcre[16]_dfa_exec()</b> </pre> The use of \x{hh...} is not dependent on the use of the <b>/8</b> modifier on the pattern. It is recognized always. There may be any number of hexadecimal digits inside the braces; invalid values provoke error messages. </P> <P> Note that \xhh specifies one byte rather than one character in UTF-8 mode; this makes it possible to construct invalid UTF-8 sequences for testing purposes. On the other hand, \x{hh} is interpreted as a UTF-8 character in UTF-8 mode, generating more than one byte if the value is greater than 127. When testing the 8-bit library not in UTF-8 mode, \x{hh} generates one byte for values less than 256, and causes an error for greater values. </P> <P> In UTF-16 mode, all 4-digit \x{hhhh} values are accepted. This makes it possible to construct invalid UTF-16 sequences for testing purposes. </P> <P> The escapes that specify line ending sequences are literal strings, exactly as shown. No more than one newline setting should be present in any data line. </P> <P> A backslash followed by anything else just escapes the anything else. If the very last character is a backslash, it is ignored. This gives a way of passing an empty line as data, since a real empty line terminates the data input. </P> <P> The <b>\J</b> escape provides a way of setting the maximum stack size that is used by the just-in-time optimization code. It is ignored if JIT optimization is not being used. Providing a stack that is larger than the default 32K is necessary only for very complicated patterns. </P> <P> If \M is present, <b>pcretest</b> calls <b>pcre[16]_exec()</b> several times, with different values in the <i>match_limit</i> and <i>match_limit_recursion</i> fields of the <b>pcre[16]_extra</b> data structure, until it finds the minimum numbers for each parameter that allow <b>pcre[16]_exec()</b> to complete without error. Because this is testing a specific feature of the normal interpretive <b>pcre[16]_exec()</b> execution, the use of any JIT optimization that might have been set up by the <b>/S+</b> qualifier of <b>-s+</b> option is disabled. </P> <P> The <i>match_limit</i> number is a measure of the amount of backtracking that takes place, and checking it out can be instructive. For most simple matches, the number is quite small, but for patterns with very large numbers of matching possibilities, it can become large very quickly with increasing length of subject string. The <i>match_limit_recursion</i> number is a measure of how much stack (or, if PCRE is compiled with NO_RECURSE, how much heap) memory is needed to complete the match attempt. </P> <P> When \O is used, the value specified may be higher or lower than the size set by the <b>-O</b> command line option (or defaulted to 45); \O applies only to the call of <b>pcre[16]_exec()</b> for the line in which it appears. </P> <P> If the <b>/P</b> modifier was present on the pattern, causing the POSIX wrapper API to be used, the only option-setting sequences that have any effect are \B, \N, and \Z, causing REG_NOTBOL, REG_NOTEMPTY, and REG_NOTEOL, respectively, to be passed to <b>regexec()</b>. </P> <br><a name="SEC7" href="#TOC1">THE ALTERNATIVE MATCHING FUNCTION</a><br> <P> By default, <b>pcretest</b> uses the standard PCRE matching function, <b>pcre[16]_exec()</b> to match each data line. PCRE also supports an alternative matching function, <b>pcre[16]_dfa_test()</b>, which operates in a different way, and has some restrictions. The differences between the two functions are described in the <a href="pcrematching.html"><b>pcrematching</b></a> documentation. </P> <P> If a data line contains the \D escape sequence, or if the command line contains the <b>-dfa</b> option, the alternative matching function is used. This function finds all possible matches at a given point. If, however, the \F escape sequence is present in the data line, it stops after the first match is found. This is always the shortest possible match. </P> <br><a name="SEC8" href="#TOC1">DEFAULT OUTPUT FROM PCRETEST</a><br> <P> This section describes the output when the normal matching function, <b>pcre[16]_exec()</b>, is being used. </P> <P> When a match succeeds, <b>pcretest</b> outputs the list of captured substrings that <b>pcre[16]_exec()</b> returns, starting with number 0 for the string that matched the whole pattern. Otherwise, it outputs "No match" when the return is PCRE_ERROR_NOMATCH, and "Partial match:" followed by the partially matching substring when <b>pcre[16]_exec()</b> returns PCRE_ERROR_PARTIAL. (Note that this is the entire substring that was inspected during the partial match; it may include characters before the actual match start if a lookbehind assertion, \K, \b, or \B was involved.) For any other return, <b>pcretest</b> outputs the PCRE negative error number and a short descriptive phrase. If the error is a failed UTF string check, the offset of the start of the failing character and the reason code are also output, provided that the size of the output vector is at least two. Here is an example of an interactive <b>pcretest</b> run. <pre> $ pcretest PCRE version 8.13 2011-04-30 re&#62; /^abc(\d+)/ data&#62; abc123 0: abc123 1: 123 data&#62; xyz No match </pre> Unset capturing substrings that are not followed by one that is set are not returned by <b>pcre[16]_exec()</b>, and are not shown by <b>pcretest</b>. In the following example, there are two capturing substrings, but when the first data line is matched, the second, unset substring is not shown. An "internal" unset substring is shown as "&#60;unset&#62;", as for the second data line. <pre> re&#62; /(a)|(b)/ data&#62; a 0: a 1: a data&#62; b 0: b 1: &#60;unset&#62; 2: b </pre> If the strings contain any non-printing characters, they are output as \xhh escapes if the value is less than 256 and UTF mode is not set. Otherwise they are output as \x{hh...} escapes. See below for the definition of non-printing characters. If the pattern has the <b>/+</b> modifier, the output for substring 0 is followed by the the rest of the subject string, identified by "0+" like this: <pre> re&#62; /cat/+ data&#62; cataract 0: cat 0+ aract </pre> If the pattern has the <b>/g</b> or <b>/G</b> modifier, the results of successive matching attempts are output in sequence, like this: <pre> re&#62; /\Bi(\w\w)/g data&#62; Mississippi 0: iss 1: ss 0: iss 1: ss 0: ipp 1: pp </pre> "No match" is output only if the first match attempt fails. Here is an example of a failure message (the offset 4 that is specified by \&#62;4 is past the end of the subject string): <pre> re&#62; /xyz/ data&#62; xyz\&#62;4 Error -24 (bad offset value) </PRE> </P> <P> If any of the sequences <b>\C</b>, <b>\G</b>, or <b>\L</b> are present in a data line that is successfully matched, the substrings extracted by the convenience functions are output with C, G, or L after the string number instead of a colon. This is in addition to the normal full list. The string length (that is, the return from the extraction function) is given in parentheses after each string for <b>\C</b> and <b>\G</b>. </P> <P> Note that whereas patterns can be continued over several lines (a plain "&#62;" prompt is used for continuations), data lines may not. However newlines can be included in data by means of the \n escape (or \r, \r\n, etc., depending on the newline sequence setting). </P> <br><a name="SEC9" href="#TOC1">OUTPUT FROM THE ALTERNATIVE MATCHING FUNCTION</a><br> <P> When the alternative matching function, <b>pcre[16]_dfa_exec()</b>, is used (by means of the \D escape sequence or the <b>-dfa</b> command line option), the output consists of a list of all the matches that start at the first point in the subject where there is at least one match. For example: <pre> re&#62; /(tang|tangerine|tan)/ data&#62; yellow tangerine\D 0: tangerine 1: tang 2: tan </pre> (Using the normal matching function on this data finds only "tang".) The longest matching string is always given first (and numbered zero). After a PCRE_ERROR_PARTIAL return, the output is "Partial match:", followed by the partially matching substring. (Note that this is the entire substring that was inspected during the partial match; it may include characters before the actual match start if a lookbehind assertion, \K, \b, or \B was involved.) </P> <P> If <b>/g</b> is present on the pattern, the search for further matches resumes at the end of the longest match. For example: <pre> re&#62; /(tang|tangerine|tan)/g data&#62; yellow tangerine and tangy sultana\D 0: tangerine 1: tang 2: tan 0: tang 1: tan 0: tan </pre> Since the matching function does not support substring capture, the escape sequences that are concerned with captured substrings are not relevant. </P> <br><a name="SEC10" href="#TOC1">RESTARTING AFTER A PARTIAL MATCH</a><br> <P> When the alternative matching function has given the PCRE_ERROR_PARTIAL return, indicating that the subject partially matched the pattern, you can restart the match with additional subject data by means of the \R escape sequence. For example: <pre> re&#62; /^\d?\d(jan|feb|mar|apr|may|jun|jul|aug|sep|oct|nov|dec)\d\d$/ data&#62; 23ja\P\D Partial match: 23ja data&#62; n05\R\D 0: n05 </pre> For further information about partial matching, see the <a href="pcrepartial.html"><b>pcrepartial</b></a> documentation. </P> <br><a name="SEC11" href="#TOC1">CALLOUTS</a><br> <P> If the pattern contains any callout requests, <b>pcretest</b>'s callout function is called during matching. This works with both matching functions. By default, the called function displays the callout number, the start and current positions in the text at the callout time, and the next pattern item to be tested. For example: <pre> ---&#62;pqrabcdef 0 ^ ^ \d </pre> This output indicates that callout number 0 occurred for a match attempt starting at the fourth character of the subject string, when the pointer was at the seventh character of the data, and when the next pattern item was \d. Just one circumflex is output if the start and current positions are the same. </P> <P> Callouts numbered 255 are assumed to be automatic callouts, inserted as a result of the <b>/C</b> pattern modifier. In this case, instead of showing the callout number, the offset in the pattern, preceded by a plus, is output. For example: <pre> re&#62; /\d?[A-E]\*/C data&#62; E* ---&#62;E* +0 ^ \d? +3 ^ [A-E] +8 ^^ \* +10 ^ ^ 0: E* </pre> If a pattern contains (*MARK) items, an additional line is output whenever a change of latest mark is passed to the callout function. For example: <pre> re&#62; /a(*MARK:X)bc/C data&#62; abc ---&#62;abc +0 ^ a +1 ^^ (*MARK:X) +10 ^^ b Latest Mark: X +11 ^ ^ c +12 ^ ^ 0: abc </pre> The mark changes between matching "a" and "b", but stays the same for the rest of the match, so nothing more is output. If, as a result of backtracking, the mark reverts to being unset, the text "&#60;unset&#62;" is output. </P> <P> The callout function in <b>pcretest</b> returns zero (carry on matching) by default, but you can use a \C item in a data line (as described above) to change this and other parameters of the callout. </P> <P> Inserting callouts can be helpful when using <b>pcretest</b> to check complicated regular expressions. For further information about callouts, see the <a href="pcrecallout.html"><b>pcrecallout</b></a> documentation. </P> <br><a name="SEC12" href="#TOC1">NON-PRINTING CHARACTERS</a><br> <P> When <b>pcretest</b> is outputting text in the compiled version of a pattern, bytes other than 32-126 are always treated as non-printing characters are are therefore shown as hex escapes. </P> <P> When <b>pcretest</b> is outputting text that is a matched part of a subject string, it behaves in the same way, unless a different locale has been set for the pattern (using the <b>/L</b> modifier). In this case, the <b>isprint()</b> function to distinguish printing and non-printing characters. </P> <br><a name="SEC13" href="#TOC1">SAVING AND RELOADING COMPILED PATTERNS</a><br> <P> The facilities described in this section are not available when the POSIX interface to PCRE is being used, that is, when the <b>/P</b> pattern modifier is specified. </P> <P> When the POSIX interface is not in use, you can cause <b>pcretest</b> to write a compiled pattern to a file, by following the modifiers with &#62; and a file name. For example: <pre> /pattern/im &#62;/some/file </pre> See the <a href="pcreprecompile.html"><b>pcreprecompile</b></a> documentation for a discussion about saving and re-using compiled patterns. Note that if the pattern was successfully studied with JIT optimization, the JIT data cannot be saved. </P> <P> The data that is written is binary. The first eight bytes are the length of the compiled pattern data followed by the length of the optional study data, each written as four bytes in big-endian order (most significant byte first). If there is no study data (either the pattern was not studied, or studying did not return any data), the second length is zero. The lengths are followed by an exact copy of the compiled pattern. If there is additional study data, this (excluding any JIT data) follows immediately after the compiled pattern. After writing the file, <b>pcretest</b> expects to read a new pattern. </P> <P> A saved pattern can be reloaded into <b>pcretest</b> by specifying &#60; and a file name instead of a pattern. The name of the file must not contain a &#60; character, as otherwise <b>pcretest</b> will interpret the line as a pattern delimited by &#60; characters. For example: <pre> re&#62; &#60;/some/file Compiled pattern loaded from /some/file No study data </pre> If the pattern was previously studied with the JIT optimization, the JIT information cannot be saved and restored, and so is lost. When the pattern has been loaded, <b>pcretest</b> proceeds to read data lines in the usual way. </P> <P> You can copy a file written by <b>pcretest</b> to a different host and reload it there, even if the new host has opposite endianness to the one on which the pattern was compiled. For example, you can compile on an i86 machine and run on a SPARC machine. When a pattern is reloaded on a host with different endianness, the confirmation message is changed to: <pre> Compiled pattern (byte-inverted) loaded from /some/file </pre> The test suite contains some saved pre-compiled patterns with different endianness. These are reloaded using "&#60;!" instead of just "&#60;". This suppresses the "(byte-inverted)" text so that the output is the same on all hosts. It also forces debugging output once the pattern has been reloaded. </P> <P> File names for saving and reloading can be absolute or relative, but note that the shell facility of expanding a file name that starts with a tilde (~) is not available. </P> <P> The ability to save and reload files in <b>pcretest</b> is intended for testing and experimentation. It is not intended for production use because only a single pattern can be written to a file. Furthermore, there is no facility for supplying custom character tables for use with a reloaded pattern. If the original pattern was compiled with custom tables, an attempt to match a subject string using a reloaded pattern is likely to cause <b>pcretest</b> to crash. Finally, if you attempt to load a file that is not in the correct format, the result is undefined. </P> <br><a name="SEC14" href="#TOC1">SEE ALSO</a><br> <P> <b>pcre</b>(3), <b>pcre16</b>(3), <b>pcreapi</b>(3), <b>pcrecallout</b>(3), <b>pcrejit</b>, <b>pcrematching</b>(3), <b>pcrepartial</b>(d), <b>pcrepattern</b>(3), <b>pcreprecompile</b>(3). </P> <br><a name="SEC15" href="#TOC1">AUTHOR</a><br> <P> Philip Hazel <br> University Computing Service <br> Cambridge CB2 3QH, England. <br> </P> <br><a name="SEC16" href="#TOC1">REVISION</a><br> <P> Last updated: 14 January 2012 <br> Copyright &copy; 1997-2012 University of Cambridge. <br> <p> Return to the <a href="index.html">PCRE index page</a>. </p>
RedPajamaGithub_3619810603849346762
Slimpajama627bTrain/chunk1
Madonna Takes It To The Dance Floor For "Ray Of Light" Video She can still dance -- for inspiration. And dance Madonna does in "Ray of Light," the new video for the title track of her latest album, which makes its premiere today on the "MTV Live" show at 6 p.m. The video for "Ray of Light" [700k QuickTime], which was directed by Jonas Akerlund, the mastermind behind Prodigy's over-the-top clip for "Smack My Bitch Up" [1.3MB QuickTime], has been out for a few weeks in Europe, and fans have been able to download inferior bootleg versions of the clip off the worldwide web. As we previously reported (see "Madonna on 'Light' Mysticism, 'Smack My Bitch Up' Video"), portions of the video, which features Madonna cavorting around a multi-colored lit dance floor, were shot at MTV's Times Square Studios.
RedPajamaCommonCrawl_-6188187585896056494
Slimpajama627bTrain/chunk1
Luxe spaces is the brainchild of Adewunmi Akanni-Aluko, an Interior Designer in Nigeria. The vision for the brand is to provide functional design for all spaces, large or small. The company seeks the services of an Interior Architect to join their team. Must be passionate about Interior Design.
RedPajamaC4_-5816026366521316426
Slimpajama627bTrain/chunk1
The kit contains: clear printed canvas (chart size 50 x 50 cm, 20" х 20"); 9 colours + 2 colours of special shaped stone. Diamond material: resin; round diamond shape: high quality square rhinestones. Pasting Area: Partial. Tools: tweezers or crayon, plastic plates or boxes. Box Packing. The kit does not include frame.
RedPajamaC4_-5924429359351419005
Slimpajama627bTrain/chunk1
The key ingredient to quality and effective security is with highly trained security guards. At Twin City Security in Fort Worth, we specialize in security guard training to provide top security guard services based on the client's unique risk assessment and protection needs. With over forty years of experience, Twin City Security understands the process to train confident, reliable and trusted security guards for your business. The Twin City Security badge, worn by our Fort Worth security guards, represents quality. Start today on a path to safety by investing in a customized protection plan, including the services of our security guards. The Fort Worth metro area, like many other parts of the country, continues to grow with an increased variety of businesses, government facilities, events and entertainment venues. Our security guards are trained to meet the specific challenges associated with each client to provide quality service and vigilant protection. The specific roles of each type of security guard requires different skills and training. As a follow up to our in-house training, each guard must complete on-the-job training to learn the specific requirements for your facility based on the contract. In addition, we track performance to ensure continual growth and client satisfaction. We classify each guard as a Level 1, Level 2 or Level 3. Most guards begin as a Level 1 and based on training, skills and experience are promoted over the course of their career. With each promotion to a higher level, the security guard obtains additional training to meet the standards for the new duties. Level 1 security guards hold the role of watchmen. The goal for this position is to control access and offer public assistance. These are lower demand security positions but still maintain the high standard for performance expected from Twin City Security. Level 1 guards are effective for clients such as residential communities and construction sites. Level 2 security guards hold the role of public relations officers. With additional training and experience, Level 2 officers manage extensive public contact and understand technical environments. A Level 2 guard offers security for more complex environments like schools, government facilities and airports. Level 3 security guards are considered advanced officers, which can be either armed or unarmed. Their skill set includes a sophisticated technical knowledge to recognize unusual patterns of behavior or potential threats. Advanced officers work in higher demand industries like pharmacies, nursing homes, special events and industrial facilities. At Twin City Security in Fort Worth, we hire and train security guards to be the best in the industry. Our individualized and customized approach to each client helps create an ideal security protocol with trustworthy security guards at the forefront. We work with each client to determine the level of security guard needed to meet your specific requirements. Our risk assessment allows us to tailor your security solution for the best results in line with your budget.
RedPajamaC4_-3638275753951001295
Slimpajama627bTrain/chunk1
ProSportsDaily.com > Basketball > NBA > Top 5 NBA Players? View Full Version : Top 5 NBA Players? Who are your top five players in the league? Not including cp3 because he just missed a bunch of games,and his team still excelled. Honorable mention; George and Love. IDK about that last spot. That's probably my ordering tho, but my heart's not in it. George doesn't deserve to be in top 5. George doesnt deserve to be in top 5. Just because the knicks are terrible Doesn't mean that Melo isnt top 5, it's not his fault that he is playing with a bunch of scrubs, except T. Hardaway jr. of course, if anything he is having a better season than he did last year, and he finished top three in Mvp. I agree. I think Melo any other year would be overrated but this year really showed how he has to deal with so much. The team is very bad without him. It's really not his fault but I don't think many people will see it that way. Also, him being top three in MVP last year doesn't really say much. It was pretty much evident that LeBron and KD were light-years above the 3rd-final MVP spot. If you were asking for our top 5 favourites right now, that's a whole other list. i'm sorry but Paul George is not a top 3 player. I would take Cp3, Curry, and Love over him. Mind explaining how George is top 5 right now, let alone "clear" top 3? I think you're outdated with that because for the last 6 weeks he's been pretty much garbage in comparison to how he was the first 6 weeks. After that it's Love, Davis, Alridge, George in debatable order. I'm sorry but stars on lotto teams like Davis/Love aren't going top 5. It's easier to put up monster numbers on less talented teams. Great players no doubt but until they start winning it's hard to consider them MVP guys. Blake put up 22/12/4 as a rookie and everybody was outraged ESPN ranked him the 10th best player. Now we are having no problem putting other stars from bad teams in the top 5 in an even more loaded league than 2010? I'm a Knicks fan and Melo is NOT top 5 this season. That said, to all of the haters out there not even putting him in the honorable mentions...c'mon. Melo is what he's always been: Top 5 talent and a top 10 player. According to fantasy rankings, he's #7 right now. Yet people have him ranked as a top 30 player instead. Insane NY Fans (there's like 2 or 3) that belief Melo is top 5 are delusional. Insane NY Haters (which there are a ton of) that believe Melo is a #15-#30 player are delusional. You can easily make an argument for getting Davis out of the top 5...but he'd just be replaced by Lebron. Fantasy rankings are not the end all or be all, but c'mon, not putting him in the top 5 (again, reasonable) and then putting 4-8 other guys on the "honorable mention" is insulting. I love How Melo was top 8 before coming to NY and the second rumors started flying that he'd be traded (in 2010), I saw this new influx of hate towards Melo. Too bad they weren't able to get another high profile player these final 3 years. They could have had a shot at the finals again with another legit player. I forgot that Griffin is ahead of Pg too. Cp3 being the best player on the Clippers doesn't scare me as much as Griffin being the best player on that team. 5 is real hard for me. Htown that's because 6'0 PG's are easier to shut down. When teams put players like Iggy, Pondexter, Sefalosha, Lebron etc on CP3 he struggles badly. With Blake he's become unguardable. Put a bigger, slower guy on him and he blows by them in faceup. Put a smaller guy on him and he posts up all day. Even previous arch nemesis guys like Chuck Hayes and Dwight can't consistently lock up Blake anymore. If we win a title it will be on his shoulders, not Paul's. Also I agree with Dubs Curry>>> George and it's pretty clear to me. Sure George is a great defender, but Curry is so much better offensively. This would probably be mine, too, if only because Paul has missed so much time. George is obviously a really close sixth and a health Paul would knock Curry, Love or Griffin off that list. And where do u rank Melo? Even better question, if George was on the knicks, what do u think there record would be, and if Melo was on the pacers, what do you think there record would be? I don't think a .563 TS% is mediocre. For a SG/SF it is. Can you back up that statement with some evidence? That's not mediocre, that's above average or good. If I hadn't watched like 80% of the Rockets games this season, I'd agree with you. But Dwight is the reason they've been so good this year, and he's been killing it lately. He's averaging 22/12/2/1/1 over his last 10 and 26/13/3/2/2 in his last five. Combine with the fact that he's the only reason the Rockets' defense isn't the worst in the league, and I think he certainly deserves mentioning in the top 10. Eh.... Aldridge over Curry or Love? He's been phenomenal this year, don't get me wrong. But he's still far too reliant on perimeter jumpers, and it's killing his scoring efficiency. I wouldn't question seeing him in the top 10, but I think top 5 is too damn high. it's amazing what a great supporting cast that helps you win will do to your reputation.. I agree. Even a prime Chuckwagon or Dwight would have difficulty slowing down Blake and that's not because they weren't great defenders. It's because Blake has become great on the block. He can post up if he's bigger or face you up if you're smaller. He's really impressed this year and for me is top 5. He's having a very good year. Not in my top 5, but he's likely top 10. Wow... Thats a very big admission for you. I will say that I am in agreement with your list. Honorable mention to blake griffen, glad to see griffen doin major work. I knew he had it in him. Replace Harden with Melo and swap Howard and Davis and your list is good. Figured you would have Lebron at the number one spot. Ya, Griffen is beasting this year. He must have stopped partying so much. I ran into him a few times at some LA hot spots and he was always partying hard. Why would I? I rank players year by year from what they produce. LeBron was the best player in the game from 08-13', but Durant is outplaying him this year. We have 28-30 games to go and playoffs. That being said, Durant is the runaway MVP this season. It's scary to think how good Durant is going to get in the next few years. I'm rooting for him to win a ring this year. Durant is out for blood this year. I am very interested to see what happens. Ya, Durant without Westbrook is proving that he is the rare breed type of guy who can completely carry a team on his shoulders. Haven't seen that since Kobe or Jordan. OKC would not even be a playoff team without Durant and they have the best record in the league with him. IN THE WEST!!! Very impressive! I am interested to see how and why you think Lebron has lost his spot. You think he can get it back ? Glad to see people aren't putting wade on their list because a healthy wade no longer exists tbh. Melo is a better pure scorer, but Harden is far more efficient and better at running an offense and playing within that offense. It also doesn't help Melo that he's the No. 1 guy for a horrible basketball team, while Harden is arguably the No. 1 guy for the fifth best team in the league. Melo would likely be right behind him on that list with Aldridge, Westbrook, Parker and Dirk. Behind them, I think would be guys like Lillard, Dragic, Lowry, Horford and Cousins. Off the top of my head, that's probably my top 20, without guys being in any particular order. But I'm sure I probably left a few guys out, because that was off teh top of my head. Obviously if Kobe and/or Rose came back and proved themselves to be nearly as proficient as they were pre-injury, they would crack that list. I don't think it's really been close, honestly. Dwight has been the better player for the Rockets this year. You can't disregard his defensive impact. Also, I maintain that KD is having the better season but I'm not revoking LeBron's crown as the best player yet. It takes more than half a season. I do think "Top 5 NBA players" and "The 5 best NBA players so far this season" are in ways significantly different questions. Inferior players can have better seasons than superior players. It happens all the time. So now if I decide to root for someone else to win a ring other than the Lakers I must have an anti-Lebron agenda. Very logical. Its too subjective for me to answer after lebron and KD, but I hope D-Rose is able to crack this in a year or two once he gets back. Fingers crossed. I just think Curry is overrated. Definitely top 10 this year, but definitely not top 5. Couldn't believe so many have him top 5, but that's what hype does. I figured at least one Warriors fan would have an issue with me not including him, and I was right. it's not worth pretending otherwise. just own up to it. embrace it. Durant is clearly the MVP this year, but LeBron is still sitting on the throne if that makes sense. This is a good list actually. Its what ive been saying for years. People get caught up in ESPN propaganda and marketing. Having several spaces after a player is mind boggling to me unless that guy is a mutant or some ****. I will own up to nothing. Just because I am rooting for Durant, doesn't imply I have any sort of agenda. Well, explain to me how your players you have above him are better. Give a case to support. If the season ended today, Durant is MVP. Lebron is the better player, but Durant is having the greater season. Number one and two are backwards. My thinking was like a few others in this thread. Durant is having the better year no doubt, but I would still choose LeBron over him when starting my team. First, I value winning very highly... The Warriors are talented but a #8 seed and the T-Wolves are currently on the outside looking in... Aldridge's efficiency may have dipped but to me that's partially expected the first time you take on an elite usage. Plus his ability to both work the block (significantly more post-ups than any other player on the team) while also stretching the floor (mid-range game) has opened things up nicely for his teammates to flourish. Throw-in the fact that he's significantly more valuable than Curry/Love on the defensive end and to me that gives him the final edge. George is really good, but people are overrating him so much. Still funny that people think Lebron is better than Durant. In the month of January, he led the Thunder to a 15-2 record in the competitive west while averaging 35, 8, 7 on Larry Bird like efficiency. Lebron has never a a month like that in his career and even if he led the Cavs to glory in the old days, he was in the east so it doesn't really matter all that much.
RedPajamaC4_-6646483614247703413
Slimpajama627bTrain/chunk1
The Highlands Current (https://highlandscurrent.org/2022/12/04/podcast-bring-on-the-clown/) Podcast: Bring on the Clown By Chip Rowe, Editor | December 4, 2022 Todd Haskell, a resident of Beacon and a member of the Current board of directors, discusses his nearly 20 years as balloon handler and then clown during the Macy's Thanksgiving Day parade in New York City. About Chip Rowe A former longtime national magazine editor, Rowe has worked at newspapers in Michigan, Idaho and South Dakota and has bachelor's and master's degrees in journalism from Northwestern University. Location: Philipstown. Languages: English. Area of Expertise: General. More by Chip More on Current Conversations Subscribe to Current Conversations
RedPajamaCommonCrawl_3328631330867327320
Slimpajama627bTrain/chunk1
BBC in Association with Cambridge University is organising this competition. Send your short stories up to 8,000 words. One entry per author is valid. Story should be either published or in process of publication. It should be in English language. Don't put author's name in your entry. Save the story in Abode PDF format or Microsoft Word document and submit it. Age should be 18 years or over. £600 will be given for four other shortlisted stories.
RedPajamaC4_-8282594627819394034
Slimpajama627bTrain/chunk1
To start with the second issue first, I posted a comment to the following conversation: https://community.mindjet.com/mindjet/topics/convert-a-topic-to-a-flow-chart-item which has appeared OK in the conversation, but is not shown in the list of responses to the conversation thread on the home page nor has it affected its position in the list of conversations. In other words you wouldn't know my reply was there unless you clicked on the thread. The interaction between the "traditional" MM map elements and the new flow chart and concept map features is interesting. As I said in a couple of earlier threads on this issue, flow charts and concept maps appear largely to be cosmetic overlays which apply special formatting to what is really a set of floating topics linked by relationship lines. This becomes clearer when you copy either and paste into a standard map, where the relationships between the flow chart and concept map elements are turned into conventional relationship lines. It seems the best way to integrate either with a standard map is to go the other way - ie, start with the flow chart or concept map, add at least the primary level of concepts or flow chart elements and then select either the start topic/concept and/or any of the other elements and change the layout from flowchart (which is the default for both flow charts and concept maps) to one of the standard MM mapping layouts. This turns the chosen topic(s) into floating topic(s) to which all future additions will be standard subtopics, but does not affect the other existing flow chart or concept map topics or their relationship line formatting. In addition the flow chart or concept map formatting will still be applied to any topics or concepts added to topics which have not been "converted" in this way. You have to be careful though moving any of these concepts or topics around as there is a tendency for the topics which have been converted into floating topics to "grab" the topic and subsume it into one of the added conventional subtopics (play around with this on a map and you will see what I mean). The same problem seems to have occurred with a comment I posted to this thread: https://community.mindjet.com/mindjet/topics/copy-and-paste-a-callout - the comment is there but the fact that I have commented doesn't appear in the list of conversations. Edit: Also in the second paragraph of the post above I meant "...compare experiences on the merging of flowcharts/concept maps with ordinary mind maps". The website seems to be working for me, in hindsight. Maybe there is a delay or caching? There is a point at starting with a chart or concept map as you say. However, you loose the formatting and other benefits of the Central topic which cannot be retrieved again, to my knowledge (appears to be made permanently invisible when turned into a flowchart). And moving later on to another map is also made impossible due to the copy & paste limitation (that cannot be solved as easily as the callout copy and paste limitiation).
RedPajamaC4_719941571923842689
Slimpajama627bTrain/chunk1
Get refreshed for action with THE LEGO® MOVIE 2™ Hydration Bottle! Transport your favorite drink in THE LEGO® MOVIE 2™ 853877 Hydration Bottle! Take off the entire blue section at the top to fill up the 500ml bottle with ease. Grab the carry strap and go, then unscrew the LEGO brick-style cap to take a sip whenever you feel thirsty. Features THE LEGO® MOVIE 2™ graphics on a durable plastic, 500ml-capacity bottle with an upscaled LEGO 1x1 round-brick-style screw cap and silicone carry strap. Unscrew the blue section at the top of the bottle to refill more easily. Measures over 8" (21cm) high.
RedPajamaC4_2213967998095691867
Slimpajama627bTrain/chunk1
/* -*- Mode: C; tab-width: 4; c-basic-offset: 4; indent-tabs-mode: nil -*- */ /* * Copyright 2010-2020 Couchbase, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include "internal.h" #include "collections.h" #include "trace.h" LIBCOUCHBASE_API lcb_STATUS lcb_resptouch_status(const lcb_RESPTOUCH *resp) { return resp->ctx.rc; } LIBCOUCHBASE_API lcb_STATUS lcb_resptouch_error_context(const lcb_RESPTOUCH *resp, const lcb_KEY_VALUE_ERROR_CONTEXT **ctx) { if (resp->rflags & LCB_RESP_F_ERRINFO) { lcb_RESPTOUCH *mut = const_cast<lcb_RESPTOUCH *>(resp); mut->ctx.context = lcb_resp_get_error_context(LCB_CALLBACK_TOUCH, (const lcb_RESPBASE *)resp); if (mut->ctx.context) { mut->ctx.context_len = strlen(resp->ctx.context); } mut->ctx.ref = lcb_resp_get_error_ref(LCB_CALLBACK_TOUCH, (const lcb_RESPBASE *)resp); if (mut->ctx.ref) { mut->ctx.ref_len = strlen(resp->ctx.ref); } } *ctx = &resp->ctx; return LCB_SUCCESS; } LIBCOUCHBASE_API lcb_STATUS lcb_resptouch_error_ref(const lcb_RESPTOUCH *resp, const char **ref, size_t *ref_len) { if ((resp->rflags & LCB_RESP_F_ERRINFO) == 0) { return LCB_ERR_DOCUMENT_NOT_FOUND; } const char *val = lcb_resp_get_error_ref(LCB_CALLBACK_TOUCH, (const lcb_RESPBASE *)resp); if (val) { *ref = val; *ref_len = strlen(val); } return LCB_SUCCESS; } LIBCOUCHBASE_API lcb_STATUS lcb_resptouch_cookie(const lcb_RESPTOUCH *resp, void **cookie) { *cookie = resp->cookie; return LCB_SUCCESS; } LIBCOUCHBASE_API lcb_STATUS lcb_resptouch_cas(const lcb_RESPTOUCH *resp, uint64_t *cas) { *cas = resp->ctx.cas; return LCB_SUCCESS; } LIBCOUCHBASE_API lcb_STATUS lcb_resptouch_key(const lcb_RESPTOUCH *resp, const char **key, size_t *key_len) { *key = (const char *)resp->ctx.key; *key_len = resp->ctx.key_len; return LCB_SUCCESS; } LIBCOUCHBASE_API lcb_STATUS lcb_resptouch_mutation_token(const lcb_RESPTOUCH *resp, lcb_MUTATION_TOKEN *token) { const lcb_MUTATION_TOKEN *mt = lcb_resp_get_mutation_token(LCB_CALLBACK_TOUCH, (const lcb_RESPBASE *)resp); if (token && mt) { *token = *mt; } return LCB_SUCCESS; } LIBCOUCHBASE_API lcb_STATUS lcb_cmdtouch_create(lcb_CMDTOUCH **cmd) { *cmd = (lcb_CMDTOUCH *)calloc(1, sizeof(lcb_CMDTOUCH)); return LCB_SUCCESS; } LIBCOUCHBASE_API lcb_STATUS lcb_cmdtouch_clone(const lcb_CMDTOUCH *cmd, lcb_CMDTOUCH **copy) { LCB_CMD_CLONE(lcb_CMDTOUCH, cmd, copy); return LCB_SUCCESS; } LIBCOUCHBASE_API lcb_STATUS lcb_cmdtouch_destroy(lcb_CMDTOUCH *cmd) { LCB_CMD_DESTROY_CLONE(cmd); return LCB_SUCCESS; } LIBCOUCHBASE_API lcb_STATUS lcb_cmdtouch_timeout(lcb_CMDTOUCH *cmd, uint32_t timeout) { cmd->timeout = timeout; return LCB_SUCCESS; } LIBCOUCHBASE_API lcb_STATUS lcb_cmdtouch_parent_span(lcb_CMDTOUCH *cmd, lcbtrace_SPAN *span) { cmd->pspan = span; return LCB_SUCCESS; } LIBCOUCHBASE_API lcb_STATUS lcb_cmdtouch_collection(lcb_CMDTOUCH *cmd, const char *scope, size_t scope_len, const char *collection, size_t collection_len) { cmd->scope = scope; cmd->nscope = scope_len; cmd->collection = collection; cmd->ncollection = collection_len; return LCB_SUCCESS; } LIBCOUCHBASE_API lcb_STATUS lcb_cmdtouch_key(lcb_CMDTOUCH *cmd, const char *key, size_t key_len) { LCB_CMD_SET_KEY(cmd, key, key_len); return LCB_SUCCESS; } LIBCOUCHBASE_API lcb_STATUS lcb_cmdtouch_expiry(lcb_CMDTOUCH *cmd, uint32_t expiration) { cmd->exptime = expiration; return LCB_SUCCESS; } LIBCOUCHBASE_API lcb_STATUS lcb_cmdtouch_durability(lcb_CMDTOUCH *cmd, lcb_DURABILITY_LEVEL level) { cmd->dur_level = level; return LCB_SUCCESS; } static lcb_STATUS touch_validate(lcb_INSTANCE *instance, const lcb_CMDTOUCH *cmd) { auto err = lcb_is_collection_valid(instance, cmd->scope, cmd->nscope, cmd->collection, cmd->ncollection); if (err != LCB_SUCCESS) { return err; } if (LCB_KEYBUF_IS_EMPTY(&cmd->key)) { return LCB_ERR_EMPTY_KEY; } if (cmd->dur_level && !LCBT_SUPPORT_SYNCREPLICATION(instance)) { return LCB_ERR_UNSUPPORTED_OPERATION; } return LCB_SUCCESS; } LIBCOUCHBASE_API lcb_STATUS lcb_touch(lcb_INSTANCE *instance, void *cookie, const lcb_CMDTOUCH *command) { lcb_STATUS rc = touch_validate(instance, command); if (rc != LCB_SUCCESS) { return rc; } auto operation = [instance, cookie](const lcb_RESPGETCID *resp, const lcb_CMDTOUCH *cmd) { if (resp && resp->ctx.rc != LCB_SUCCESS) { lcb_RESPCALLBACK cb = lcb_find_callback(instance, LCB_CALLBACK_TOUCH); lcb_RESPTOUCH touch{}; touch.ctx = resp->ctx; touch.ctx.key = static_cast<const char *>(cmd->key.contig.bytes); touch.ctx.key_len = cmd->key.contig.nbytes; touch.cookie = cookie; cb(instance, LCB_CALLBACK_TOUCH, reinterpret_cast<const lcb_RESPBASE *>(&touch)); return resp->ctx.rc; } protocol_binary_request_touch tcmd; protocol_binary_request_header *hdr = &tcmd.message.header; int new_durability_supported = LCBT_SUPPORT_SYNCREPLICATION(instance); mc_PIPELINE *pl; mc_PACKET *pkt; lcb_STATUS err; lcb_U8 ffextlen = 0; size_t hsize; if (cmd->dur_level && new_durability_supported) { hdr->request.magic = PROTOCOL_BINARY_AREQ; ffextlen = 4; } err = mcreq_basic_packet(&instance->cmdq, (const lcb_CMDBASE *)cmd, hdr, 4, ffextlen, &pkt, &pl, MCREQ_BASICPACKET_F_FALLBACKOK); if (err != LCB_SUCCESS) { return err; } hsize = hdr->request.extlen + sizeof(*hdr) + ffextlen; hdr->request.magic = PROTOCOL_BINARY_REQ; hdr->request.opcode = PROTOCOL_BINARY_CMD_TOUCH; hdr->request.cas = 0; hdr->request.datatype = PROTOCOL_BINARY_RAW_BYTES; hdr->request.opaque = pkt->opaque; hdr->request.bodylen = htonl(4 + ffextlen + ntohs(hdr->request.keylen)); if (cmd->dur_level && new_durability_supported) { tcmd.message.body.alt.meta = (1u << 4u) | 3u; tcmd.message.body.alt.level = cmd->dur_level; tcmd.message.body.alt.timeout = lcb_durability_timeout(instance, cmd->timeout); tcmd.message.body.alt.expiration = htonl(cmd->exptime); } else { tcmd.message.body.norm.expiration = htonl(cmd->exptime); } memcpy(SPAN_BUFFER(&pkt->kh_span), tcmd.bytes, hsize); pkt->u_rdata.reqdata.cookie = cookie; pkt->u_rdata.reqdata.start = gethrtime(); pkt->u_rdata.reqdata.deadline = pkt->u_rdata.reqdata.start - (cmd->timeout ? cmd->timeout : LCBT_SETTING(instance, operation_timeout)); LCB_SCHED_ADD(instance, pl, pkt); LCBTRACE_KV_START(instance->settings, cmd, LCBTRACE_OP_TOUCH, pkt->opaque, pkt->u_rdata.reqdata.span); TRACE_TOUCH_BEGIN(instance, hdr, cmd); return LCB_SUCCESS; }; if (!LCBT_SETTING(instance, use_collections)) { /* fast path if collections are not enabled */ return operation(nullptr, command); } uint32_t cid = 0; if (collcache_get(instance, command->scope, command->nscope, command->collection, command->ncollection, &cid) == LCB_SUCCESS) { lcb_CMDTOUCH clone = *command; /* shallow clone */ clone.cid = cid; return operation(nullptr, &clone); } else { return collcache_resolve(instance, command, operation, lcb_cmdtouch_clone, lcb_cmdtouch_destroy); } }
RedPajamaGithub_-4805693198840072392
Slimpajama627bTrain/chunk1