text
stringlengths
14
5.22M
meta
dict
__index_level_0__
int64
0
9.97k
Time does go by way too quickly. Your slice reminds me of this and it also reminds me to cherish every day moments even if they seem small. Another warm slice of bonding, I like the comparison of now and then. This reminded me of my husband and daughter, they also have such a strong bond. Thanks for sharing this special time together. What a lovely slice highlighting those precious moments of parenthood when we look at our children and reflect on how much they have grown! It reminds me of how important it is to be present with our children. Thank you for sharing. Time passes quickly, doesn't it? I had a similar realization while grocery shopping with Isabelle who is eight. These small moments can mean so much to us when we take the time to stand back and notice the grandeur of them. It's a wise 9-year-old who asserts her wishes for alone time with Papa. And it's a wise Papa who recognizes that wish. I can imagine her hair swinging and your noticing how she's grown. I still see the infant face in my 48-year-old daughter! We parents always will. Your slice and all the comments are so true. I was moved by your now and then time spent with your daughter. I love the way she asserts her needs and wishes of having a special every day moment with you. Today is my daughter´s birthday and the question where did the years go? is not only asked by me but also by my own 23 year old daughter. I love how you hugged her for "no reason" right in teh middle of the produce aisle. Time does have a way of surprising us. My kids are 37 and 33, and I still feel wonder and awe when I see what they are doing with their adult lives and families. Savor those precious moments. I really liked how you used the flashback of when your daughter was born and how those specific memories still feel recent. It is remarkable how quickly time passes and it's lovely how much you appreciated this trip to the store. A beautiful slice, mixing the now with a sweet memory. Time has a way of creeping up on us and leaving us in its wake. In the blink of an eye years have passes. Aaaaaaah! Tearing up at this one, Lanny! I love your line "I hug her quickly, for no reason. Well, for a reason." Love it. Your post brought tears to my eyes as I think about my now 15, 14, and 11 year olds and wonder where did the time go. And then I think to ME being the kid and wonder why did the years I had with my dad pass so quickly also without realizing it. Thank you for this heartfelt post that touched me as a mom and a daughter!
{ "redpajama_set_name": "RedPajamaC4" }
9,701
Ponomar'ov (in cirillico Пономарьов) è un cognome ucraino: Oleksandr Ponomar'ov – cantante e musicista ucraino Ruslan Ponomar'ov – scacchista ucraino Pagine correlate Ponomarëv
{ "redpajama_set_name": "RedPajamaWikipedia" }
8,564
Our customers tell us they enjoy the shopping around Hotel le Walt. During your stay, you're just a quick walk from Rue Cler. Enjoy features like free WiFi in public areas, plus a bar and breakfast (surcharge). Built in 2003, this 4-star hotel has 25 rooms over 6 floors. Enjoy your stay with amenities like free WiFi and a flat-screen TV in each room. As a guest of Hotel le Walt, you'll find multilingual staff, concierge services, and complimentary newspapers in the lobby. Public spaces have free WiFi and wired Internet. You can enjoy a drink at the bar/lounge. A round-trip airport shuttle (available on request) is available for a fee. The business-friendly Hotel le Walt also features dry cleaning/laundry services, room service (during limited hours), and a lift. This 4-star Paris hotel is smoke free. Hotel le Walt offers 25 forms of air-conditioned accommodation with DVD players and minibars. Flat-screen televisions come with premium satellite channels. Bathrooms include a shower, complimentary toiletries and a hairdryer. This Paris hotel provides complimentary wired and wireless Internet access. Business-friendly amenities include desks, complimentary weekday newspapers and telephones. Additionally, rooms include a safe and blackout curtains. Hypo-allergenic bedding and an iron/ironing board can be requested. Hotel le Walt offers transfers from the airport (fees may apply). Please contact the property at the number on the booking confirmation 24 hours prior to arrival with your arrival details.
{ "redpajama_set_name": "RedPajamaC4" }
7,532
Israel to demolish family home of Ariel attack suspect March 26, 2019 1:50 P.M. (Updated: March 26, 2019 3:08 P.M.) SALFIT (Ma'an) -- Israeli forces delivered a demolition notice, on Tuesday, to the family of killed Palestinian Omar Abu Leila, 19, who carried out a stabbing and shooting attack near the illegal Israeli settlement of Ariel, in the northern West Bank district of Salfit. The demolition notice against the family home, in the al-Zawiya town in western Salfit, allows the family until the 31st of March to appeal against the order. Israeli forces delivered the notice to the family after raiding the town on predawn Tuesday. Two Israelis were killed as a result of the attack, while a third was critically injured. Israeli forces had shot and killed Abu Leila, 19, in the Abwein village, north of the central West Bank district of Ramallah, on March 22nd. Israel always demolishes family homes of Palestinians, who were involved in attacking Israelis as part of its collective punishment policy against the Palestinian people. Israel has come under harsh condemnation over the past several years for its response to attacks committed by Palestinians on Israelis, which rights groups have said amounted to "collective punishment" on family members and entire communities in a clear violation of international law.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
0
Josh Turner in Buffalo All concerts near Buffalo Find tickets from 83 dollars to Josh Turner (19+) on Saturday March 6 at 9:00 pm at The Grand Hall At Niagara Fallsview Casino Resort in Niagara Falls, Canada Josh Turner (19+) $83·The Grand Hall At Niagara Fallsview Casino Resort·Niagara Falls, Canada Find tickets to Josh Turner on Friday May 28 at time to be announced at The Grand Hall At Niagara Fallsview Casino Resort in Niagara Falls, Canada Fri · Time TBD No tickets·The Grand Hall At Niagara Fallsview Casino Resort·Niagara Falls, Canada Josh Turner by City Josh Turner in Phoenix (Harrahs Ak Chin Casino Resort) Josh Turner in Buffalo (The Grand Hall At Niagara Fallsview Casino Resort) Lose Yourself in Josh Turner's Deep Bass Josh Turner Tour Songs Videos Josh Turner Tour With the deepest pipes in country, Josh Turner's soulful crooning makes 'em soon on any side of the Mason-Dixon line (just listen to "Your Man" and don't... Events at The Grand Hall At Niagara Fallsview Casino Resort The Grand Hall At Niagara Fallsview Casino Resort Concerts The Grand Hall At Niagara Fallsview Casino Resort Seat Map Atlanta Concerts
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
7,818
"When I went on the computer to learn I didn't know how to start. Now I can start computers and find addresses to do math and reading." "Before I started the Mount Royal University program I didn't know the skills to get a job. Now that I have been through the program, I now know what the skills are for getting a job and keeping a job." "The support and training that TVP provides their students is exceptional, to the end that the student we hired has become one of the best Front of House ushers on our staff." "The Mount Royal TVP has been an excellent post-secondary option for many of our graduating students. The atmosphere in the program is caring, dynamic and professional. Students who attend the TVP are ably assisted to grow academically, socially and in their workplace skills." "The TVP was a wonderful program that developed positive and personal growth for our son. The program offered numerous opportunities and choices for employment. Staff were always on hand to provide support and guidance - all in all, an exceptional program." "The first year at Mount Royal's TVP was fantastic, the second one even better! With their support our son has found long-term employment, friends, and an independence we thought was never possible. This is an amazing program!" "My son was enrolled in this wonderful program for two years. He has a great job. We are so appreciative and grateful."
{ "redpajama_set_name": "RedPajamaC4" }
543
Ulefone is preparing to launch its new machine of Ulefone Armor 2 with 6GB RAM Helio P25 processor according to the news from Pompmall. Although many people may not know the brand of this mobile phones, but its sales have been very good, so now he has several new flagship machines are ready to release such as Ulefone T1 and Ulefone F1, but the releasr date has not be comfirmed. It can be said that Armor 2 has improved a lot on the basis of his last generation of Ulefone Armor. For example, it is with 6GB RAM while the later is just with 3GB RAM that will gives us quitee a fast speed. There is little we can know about Armor 2, but according to the leaked news on the internet that it has a 16-megapixel rear camera. Moreover, there's an obvious NFC connection in the middle, too. Many fans of the Ulefone are waitting the release of its new machine, not only Ulefone Armor 2,but also the Ulefone Gemini Pro. Which one you like better?
{ "redpajama_set_name": "RedPajamaC4" }
349
This gives A players like Josh Peace the access he needs to network with business partners, industry leaders, contacts, and knowledge to increase his success through the upcoming year. No matter how experienced you are in your field, there is always something new to learn. These conferences give the chance to expand one's mind and indulge in new concepts or tactics. "The educational aspect of a conference can show you new ways of managing your business. It'll also help you find keys to productivity and positivity," notes Josh Peace. It also provides a dose of healthy competition, which gives the advantage of asking what owners and clients are doing to better their business. "We're all there to help each other and appreciate each other's success," says Josh Peace. Recently, Josh Peace attended an exclusive industry networking event where top performers in their field received awards and spoke at the Chicago Owners Meeting at The W Hotel. The conference was held over two days, and visitors from all over the world: America, Canada, Spain, Australia, South Africa, and the UK attended. The environment was filled with wonderful company and great food. Being in the business/marketing field is rewarding and fun. A conference such as this Business Owner's Meeting in Chicago, adds a reason to enjoy being in your industry. These events also consist of activities that mix education, information with an exciting and fun environment. Do not underestimate the power of combining business with a great time! Now on to the next conference, Josh Peace looks forward to it.
{ "redpajama_set_name": "RedPajamaC4" }
6,258
Real Estate Drap : sale of property Drap. purchase property in Drap. Private individuals property advertisments in Drap. real mandate of the estate agencies in Drap. Rental properties in Drap. Seasonal rental in Drap. You can also place a property advertisement in Drap free of charge or any other city in the departement of Alpes Maritimes, our website is specialised in the south of France. Therefore, you will contacted by people which are interested in your property.
{ "redpajama_set_name": "RedPajamaC4" }
9,374
Slate Office REIT (TSX: SOT.UN) (the "REIT") announced today that the Board of Trustees has declared a distribution for the month of April 2019 of C$0.0333 per trust unit of the REIT, representing $0.40 per unit of the REIT on an annualized basis. Eligible unitholders (which includes holders of Class B limited partnership units that are exchangeable into trust units of the REIT) that elect to participate in the Distribution Reinvestment Plan (the DRIP) will have their cash distributions used to purchase trust units of the REIT. Unitholders wishing to participate should contact their investment advisors to enroll in the DRIP. Additional details and information can be found by visiting slateofficereit.com.
{ "redpajama_set_name": "RedPajamaC4" }
4,617
Get a sample of our best sellers. This mini four pack comes with lavender, cinnamon and clove, eucalyptus / activated charcoal and peppermint! Ingredients: Saponified Oils of Olea Europaea (Olive), Cocos Nucifera (Coconut), Purified Water, Persea Gratissima (Avocado), Ricinus Communis (Castor Oil) Seed Oil, Elaeis Guineensis (Palm), Theobroma Cacao (Cocoa Butter), Vegetable Glycerine, Bentonite, Sucrose, Silk Peptide, Sodium Lactate, Rosemary Extract, Titanium Dioxide, Mica Colorants, Essential Oils.
{ "redpajama_set_name": "RedPajamaC4" }
3,146
I have a love/hate relationship with the first day of school. I have just experienced my fourth first day of school at Palmer, and our relationship status might read "it's complicated." If you are currently an undergraduate or high school student, you either stretch summer as long as possible and loathe getting into routine again, or you buy school supplies in July and pack your backpack two weeks ahead of time. I am the latter, therefore if you are the latter, don't be ashamed. You know the part in the movie "You've Got Mail" where Meg Ryan gushes about bouquets of newly sharpened pencils? That's me. The part I love the most about beginning a new trimester is the refreshing intrigue of new classes and "can do'" attitude everyone has in their heart. Not to mention, students at Palmer look much nicer when they've actually gotten a healthy amount of sleep for the past 2 weeks. The part I dislike about the first day of school is reading the syllabus and not lecturing. Get out of my way, syllabus, I have things to learn! This routine is the same in every school on the first day, and many people (many with more education and fancy letters after their names) have told me that this part is necessary, so somewhere in my brain I believe them. Love or hate, my favorite part of this particular first day of 4th trimester was the collective sigh of relief and pleasant smiles as my class welcomed some our favorite returning professors. There are instructors at Palmer that you are allowed to–and should–adore. I genuinely believe I have had some of the world's best instructors in my first year at Palmer, and I am excited to learn from what I know will be many more wonderful faculty in my next 6 trimesters. The Palmer Campus Guides are leaders in the student community who represent the philosophy, science and art of chiropractic. They seek to be welcoming mentors to prospective students by sharing their knowledge and understanding of chiropractic, Palmer College, and their rich history in an honest and sincere manner.
{ "redpajama_set_name": "RedPajamaC4" }
457
Municipal elections: stringent financing, liberal advertising By Linas Jegelevicius PARTICIPATION: Pavelas Kujalis expects a strong turn-out on election day. KLAIPEDA - Though the Lithuanian political pot is not sizzling feverishly just yet, with municipal elections set for Feb. 27, it is getting there fast. Last Monday, Jan. 24, was the last day when Lithuania's Central Electoral Commission and electoral commissions in 60 municipalities countrywide accepted applications from candidates willing to skirmish for the 1,526 municipal seats up for grabs. Over 14,000 candidates have decided to seek mandates in the municipal councils. That is several thousand more than in the previous municipal elections in 2007. Political parties and independent candidates intending to form electoral coalitions had to hand in their electoral papers before the end of the day as well. Thus, ex-Vilnius Mayor and ex-parliamentarian Arturas Zuokas, along with another 50 independent candidates to Vilnius Municipality's Council, have signed the declaration of the so-called Vilnius Coalition. It seems that Vilnius Municipality's Council is attracting the most lavish attention so far of hungry local political power seekers. Therefore, besides the Vilnius Coalition, two other coalitions have popped up recently – the social movement Musu Reikalas (Our Matter) and a coalition consisting of leaders of Vilnius' several communities. The Vilnius Coalition's members, headed by the unsinkable Zuokas, assert that they have teamed into a bunch of hardworking people that have already worked for Vilnius Municipality at the beginning of the millennium. The Coalition's slogan is as follows: Yes for the rebirth of Vilnius! In his fiery pre-election speeches all over the capital by day, and in a 24-hour front-page ad on the trendiest Lithuanian Web site Delfi, Zuokas throws hardly feasible promises to his left and right. Are you dreaming about a salary of over 6,000 litas (1,710 euros) by 2020? No way, it is impossible, say economists shaking their heads. Yes, it is possible, if you entrust us with the power, Zuokas nods gleefully. Are you grumbling over the nagging traffic-jams during peak rush-hour in Vilnius? Zuokas assuredly hits the table, "I will build a bypass-road." Are you about to suffer a stroke seeing that huge heating bill? Zuokas does not sway, "I will settle it." He compares the Lithuanian capital to a beauty that needs to be woken up. When it comes to Vilnius, not only seasoned politicians eye seats on its Council, but also a bunch of political animals and those who have nothing to do with politics as well. Like Sasha Song or Jurgis Didziulis, the ex-leader of the dismantled band Inculto – after their unsuccessful debuts at Eurovision Song Contests, they are ready to poke fun at something else – politics. However, the singers, grilled with questions on local politics in a few election rounds, withdrew from the political race, graciously acknowledging, "Being a good man does not make a good politician." Apparently, not all candidates show such reality-check sobriety. Evalda Siskauskiene, president of Lithuania's Hotel and Restaurant Association, is convinced, if once given a chance, that it will be possible to establish Vilnius' airlines. "We have failed to establish a national carrier, but our Coalition is willing to do that on the local scale. We are no worse than Riga, that runs 107 direct flights, while Vilnius has only 18 direct flights. Since we see big opportunities in conference tourism, the [air] carrier will pay off," Siskauskiene says, mustering courage before the elections. Independent candidates are the biggest novelty of the electoral campaign. "Politically non-affiliated candidates, over 500 of them in total, will considerably counterbalance politically-affiliated candidates. Only in nine of 60 municipalities will we not see independent candidates. They make the political campaign and the elections much more interesting," Pavelas Kujalis, deputy chairman of Lithuania's Central Electoral Commission, asserted to The Baltic Times. Among other peculiarities of the upcoming elections, he discerns a more stringent control of the political campaign's financing. Thus, a natural person's or a legal entity's contribution to the political campaign cannot exceed 42,000 litas this year. "However, though we observe some more strict rules regarding the financing, the campaign's advertising will be relatively liberal this year, as all candidates, both parties, coalitions and independent candidates, will be able to run TV ads and hand out fliers. In the previous Seimas elections, running TV ads was forbidden," he said. "I believe because of the more flexible advertising rules we will see more constituents actively participating in the pre-election political campaign and a larger turnout on Election Day," Kujalis maintained. He revealed that the elections will cost the Lithuanian budget 17 million litas. With the campaigning loosened up a bit, the state intends to be tougher right after, as it is allocating over one million litas for the elections' audit. The deputy chairman of the Commission is bothered by the possibility that some current parliamentarians will become mayors. In such a case, a new parliament election for a vacant seat in Seimas ought to be held which, according to Kujalis, costs the state budget up to 700,000 litas. "As a rule, after a municipal election, we have to organize several such elections," Kujalis said. The race to Vilnius Municipality's Council has already been dubbed "a millionaire's race." Thus, Viktoras Uspaskichas, europarliamentarian and chairman of Lithuania's Labor Party along with his wife, has declared property of over 184 million litas. Money-wise, he is followed up by the aforementioned Zuokas who, along with his wife, claims to possess assets of nearly nine million litas. The millionaire list is ended up by the notorious Algirdas Paleckis, who denies the January 13 Soviet massacre and intends to wage a war against the oligarchs. His assets are estimated at 1.4 million litas. All of them - Uspaskichas, Zuokas and Paleckis – are eying the Vilnius Municipality mayor's seat. Grybauskaite says she rejected initiative on intelligence's preventive conversations Lithuanian law-enforcement apparently has reasons to keep Paleckis in custody - PM President, PM, officials meeting to discuss situation of Lithuanian troops in Iraq Lithuanian president on Holocaust: we can only imagine how many generations we lost Lithuanian foreign minister says no major changes seem likely in Russia Public figures in Lithuania call for opposing Astravyets NPP in Belarus Strasbourg court to rule on Lithuanian gay couple's discrimination complaint
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
4,119
AMANDA V SHANE Romance, Reads and Wine Myths & Tales Blog Reader's Page Wild At Heart PNR Flash Fiction Thank You For Unsubscribing Treasure - Wild At Heart PNR Flash Fiction Leah ran, tearing recklessly around the globe shaped bush before they saw her. As she rounded the hedge outside Faerie Castle, the garden path sloped. Her ridiculously high heel caught in the gravel and busted off. Damn that Louboutin! As her ankle buckled, she went down in a flounce of silk skirts and a shrill aria of obscenities the boys back at Old Tam's pub would've been proud of. Eyes shut tight, she waited for impact. Instead, a strong pair of hands wrapped around her, supporting her back and neck so that the imminent crack of her skull on packed dirt never came. Blinking, she looked up. Blinding mid-day sun speared into her eyeballs from over the top of the hedge wall. Her hand shot up to shield her eyes, bringing a shadowy figure into view. Deep, blue, starry eyes stared down at her. The one who held her tilted his head, blocking out the sun, and Leah's breath stuck in her throat at the vision that came into focus. High cheekbones, a broad jaw and soft, pale lips all worked together to form the most striking male face she'd ever seen. In addition, the unmistakable simmer of magic stirred the air. It hovered above his shoulders like a cloak. Dread filled Leah—he was one of them, a fae. Her eyes lowered, getting stuck on the smooth, tan bit of exposed skin above his black bow tie and crisp white shirt. Tiny brown freckles speckled his skin, spaced out enough to where all she could think about was using them to play connect the dots… with her tongue. "Were you dashing through the maze in a fit of terror from some bridge troll then, little lark?" The name being a nod to her ear-jarring stream of curses a moment ago, no doubt. Giving her head a shake, Leah looked up to find a faint smile on his full lips. "Maybe," she barked out defensively, fully aware of the vulnerable position she was in. "Maybe not. Maybe it's a handsome prince I'm dashing to meet instead… lucky me." His cobalt eyes flashed, going dark, silver, then fathomless in the space of an instant. He dipped his head, scanning her from head to toe, those sea-deep eyes seeming to peel away the layers of her silly stolen gown as they went. "Lucky prince." He said. Leah's mouth popped open, but no words came out. He ignored her, taking in a deep and audible breath. "You didn't drink the wine did you?" His voice rolled through her. "No," she answered, a bit too loudly for how close they were. He probably smelled the snifter of whiskey she'd gulped down for courage inside the castle before going through with this harebrained plan of Gill's, "I'm not stupid enough to do a thing like that here." She looked up at the arched bows of the garden maze overhead, then back at him. "Not with your kind ambling around." "My kind?" His expression managed to look surprised and admonishing all in one. Leah didn't give in. She drew her brows together in the Irish death glare she was famed for under the masquerade mask she wore—another stolen item she'd taken for her disguise, along with the shoes and the dress. Finally, the stranger pulled her upright in one easy, grace-filled movement. Leah stumbled back on her broken heel. He crossed his arms, leaning back against a little stone doorway in the center of the hedge, making a study of her as he placed one ankle over the other. He did make a delectable sight in his black tuxedo, crisp white shirt and dark red-brown hair that hung just long enough to brush the top of his shoulders. Formal attire was required for this debauched, fae romp of a treasure hunt—the only reason Leah would be caught dead in the confection of a dress she wore. On him, though, black tie proved nothing short of devastating. She sucked in a breath. One of his dark copper brows lifted upward, somehow drawing Leah's attention to his lips at the same time. "Well, what are you?" Leah asked. Looking down, she brushed at her skirt, self-conscious as all get out. "Leprechaun or something? You're clearly fae." That came out haughtier than she'd meant for it to, even accusing. Old resentments died hard. Fae had always been dangerous, but now that they were here, among humans, they were even more so. He chuckled. "Leprechaun? Not me. If you'd met Kell then, aye. You happen to be right though, perceptive, little lark. I am fae." Leah's brow crinkled as she frowned beneath the mask. Her open book facial expressions had always been her downfall. Just then, pounding footfalls thundered down the rounded path toward them at a breakneck pace. Leah jerked, her spine going straight. The two fae guards who'd been hot on her trail earlier skidded to a halt, dust flying as they did. Their eyes went straight to her companion. "Sire!" they both said, in obvious shock. The stranger nodded—barely—in their direction. His perceptive eyes glanced over at Leah, then back to the guards. Uh, oh. Leah's mind raced. Sire? Who exactly was this gorgeous fae male? In an instant he was right by her side, though she hadn't seen him move. His palm gripped her elbow. "Gentleman," he said, his deep timber skittering through her body once again, "thank you for finding my special guest for me. We were separated in the maze." The guards cast wary eyes her way, muttered apologies, then ducked their heads and left. As soon as they were gone, the male turned her to face him. "Am I right to assume you don't have a formal invitation to this gathering, miss?" Leah pressed her lips together. His midnight eyes sparkled. He stared right through her even as those delicious lips of his picked up in a sexy, grim smile. Damn. Looked like her luck had just run out. Copyright © 2021 Amanda V. Shane, First published as Treasure in the Wild At Heart PNR Flash Fiction Writing Circle. All rights reserved. Be first to read more short stories like this, get the inside scoop on upcoming books and receive a free novella! Join the Amanda V Shane newsletter. You'll also gain exclusive access to the Ramone's Party Cove Happy Hour Club where you'll get some crazy, fun drink recipe cards and the Tides of Atlantis "cocktail story" that inspired it. Did someone say Fae, garden party? Who feels like crashing a garden party and running into a mysterious, handsome Fae lord? I thought so. ;) Here's a little teaser from "Treasure", my Wild At Heart PNR Flash Fiction piece with its lucky theme. I've had so much fun writing it. The garden maze setting really has me in the mood for springtime. Be sure to stay tuned for the blog and sign up for my newsletter so you can read it for FREE! P.S. What's your favorite thing about spring? Other book news: Free Books! Grab some free fantasy books this month in the Books And Brews Fantasy Group Giveaway. Meanwhile, back at Ramone's Party Cove... Hi, everybody! Here is a short little look at what the Tides of Atlantis gang are up to these days. If you've read King of the Tides, you know that Adam and Marley are a little MIA at the moment. That's left Kellan and Solomon to man the bar back home in Miami, while trying to figure out what to do about a shifting Sea Realm and demons on the loose. You know, nothing big. Anyway, here's the scene that inspired Kellan's new brainchild cocktail, The Sexy Leprechaun. Be sure to sign up for my newsletter so that you can get all the Tides world inspired cocktail recipes direct from Ramone's Party Cove and join in on this crazy party! Ramone's "Sol, you've got to quit shooting death daggers at people with your eyes when they order the special." Solomon death stared Kellan. "I'm not calling it that." His deep voice reverberated from his huge chest, the lights over the bar catching the glint in his dark eyes that should have conveyed his absolute annoyance. Neither that nor the fact that he stood over head and shoulders taller than the tech geek seemed to faze Kellan, though. "And what is this music you have on? We're never going to appease the spring breakers with this old crap." Sol's jaw tightened. The tight sleeves of the black athletic T he had on strained then rolled up over his giant bicep as he unknowingly flexed it. "It's Solomon Burke," he growled, "I couldn't take another minute of that bump and gyrate mess you had on. When is the band supposed to get here, anyway?" "Oh, I love this song." Cindy swished her way up to the bar, Ronan sidling up behind her. "It's from Dirty Dancing. The one that plays through, you know… the scene… where Johnny and Baby, finally, get together." She bounced her blonde eyebrows up and down. "Mmmm, sexiest dance scene ever," Kay groaned, eliciting a sidelong glance from Xieran. She fanned her face with one hand. "That scene was so hot." "Dirty Dancing?" Ronan leaned down to say to Cindy. "I don't think you've shown me that one, cará." "What?!" Kay feigned outrage. "How could you not have made him watch Dirty Dancing yet?" "I haven't seen it in a long time." Xieran said, sliding his arm around Kay's waist. Kay and Cindy looked at one another, blurting out, "Movie night!" at the same time. They high fived, to the amusement of the men. Cindy looked back over at Solomon and Kellan. "Yeah, right after one more of these Sexy Leprechaun drinks." She shook the ice around in her empty hurricane glass." Another lower than low growl emitted from Sol's chest and he rolled his eyes. Kellan took both the girls' glasses with a snicker and refilled them. "You better watch out, Sol, I don't think it's only this schmoozy green drink the ladies are after when they come up here to order one from you." Cindy wagged her eyebrows at the big, brawny security guard turned bartender. Sol's brow furrowed. But then he lifted his head and scanned the crowd inside the nightclub. Probably fifteen hot women stared back at him, and a couple men too. Every single one gave him a wink, smile or suggestive lift of the gods-awful green libation in their hand. He dropped his gaze, heat stealing into his cheeks. "Kellan," his deeper than deep voice rumbled under his breath, "if you value your puny, mortal life, you will stop that snickering." The techie howled at that, quickly finding something he needed to get from the bar's back room. The two Atlanteans and their women across the bar from Sol all wore gigantic grins. "Cindy," Kay nudged her friend's arm, "you made Sol blush." "It's not my fault the Cove's new bartender is causing a stir." Cindy shrugged without apology. She gave Sol a wink. "It's his muscles that have them drooling." "Hm?" Sol's eyebrow lifted. He lifted the tiny drink glass in his big hand in a cross body motion, unconsciously flexing his bicep in the process. The thin fabric of his stretchy T-shirt strained even more, rolling up over smooth, dark skin and muscle as it went. An audible sigh was heard from somewhere in the background. Cindy and Kay couldn't stop their giggles. "Definitely the muscles… and the dimples." "What?" Sol rubbed his free hand over the lower half of his face, his frown coming back. This only seemed to delight the girls further. That, and probably the fact that they'd downed nearly all of their drinks already. Adam and Xieran eyeballed him and then their women, identical Atlantean scowls come over their faces. "I have muscles too," Ronan said, puffing his chest net to Cindy. "Me too," Xieran leaned into the bar next to Kay, flexing his arms obviously as he went. Kay and Cindy laughed even more. "C'mon," Cindy said, grabbing Ronan's big arm, "we have a date with Patrick Swayze in tight, black pants on screen. Then a night of you imitating his dance moves for me with your big, sexy muscles." "Let us know if there's any trouble tonight, Sol." Xieran said, helping Kay off her barstool. Sol nodded, his expression grim once more. All jokes aside, they were all on edge, what with Adam and Marlowe lost in the Hell Realm and Misros somewhere out there, plotting gods knew what with the demons he'd released from the Underworld. He watched the couples leave, then wiped at the counter with a towel as he tried to avoid any flirtatious smiles from out in the bar. As soon as his hand made contact with the hard, smooth bar top, a wave of energy shot through him. Jerking back, he looked up with a start. The jolt had been fleeting, but it left a residual current sliding through his veins. The feeling wasn't unfamiliar. No, not unfamiliar at all. At one time, very long ago, it had been something he'd welcomed… along with the silken touch that always accompanied it. Those days were gone though… buried in stone way before anything resembling history had ever been recorded in the annals of time here in the human world. Still, impossible as it was… it was unmistakable. A dark roll of dread rolled through his chest. Could she be here? Now? He quickly squashed down that tight rise of hope that tried to ignite in his soul. No, it couldn't be. The gods wouldn't allow it… the universe wouldn't allow it. This world would not survive it were she to return. Plus all of that, where his mind had just gone was impossible. His next breath brought with it a sacred, ancient scent. A plant long gone extinct. Sol closed his eyes against the sweet pain that rushed through him, the memory of the only one who'd worn its unique perfume. On his exhale, one word passed through his lips, inaudible in the noise of the club, singeing his tongue with its long, lost taste. Mood Board Monday - Treasure Mood board for my piece in March's Wild At Heart PNR Flash Fiction challenge. The theme is luck. Be sure to follow my blog and sign up for my newsletter so you can read "Treasure"and more book excerpts for free, later this week! Happy Spring, everybody! Squeee!! I'm super excited to be joining the Wild At Heart PNR Flash Fiction challenge this month! The theme for March is "Luck" and I have a magical Fae Romance piece I'll be contributing soon. 🧚 Keep your eye out for "Treasure" to go live on my blog and newsletter later this week so you can read it for free! Sign up here. Follow the Wild At Heart PNR Flash Fiction writing group on Instagram #wildatheartpnrflashfiction for links to all the other great Wild At Heart author's stories. I've read quite a few of them already. They're fantastic! And a great way to find some #newtomeauthors—my favorite kind of "Treasure" hunt. #flashfiction #pnrflashfiction #pnrflashfictionwritingclub #wildatheart #wildshortreads #faeromance #fantasyromancewriter #magicallyseductivereads #amandavshanebooks #urbanfantasyromance #pnrbooklover Magic in the Mountains There's just something magical about snow and we've had a lot of here in Colorado the past couple of days, so of course I'm in the mood for a little Nika and Vasilli in the snowy, Northern Kingdom where the fantasy romance story Snow Maiden takes place. Read the first few chapters of Snow Maiden for free here. Here are a few pictures I took of the big snow storm that came through our area over the weekend. When in Rome... Here's an excerpt from Crystal Tide for your Book Teaser Tuesday. Actually, I love this scene so much that I'm sharing the whole chapter. Enjoy! You can find Crystal Tide and read Kay and Xieran's whole thrilling, sexy story on Amazon and Kindle Unlimited here. Falling. Falling or shooting or hurtling; Kay couldn't decide which. She'd been pulled out of King Amphere's bed where he'd bound her so cleverly and thrown into a panic. All the water in the portal disappeared in an instant. She burst up through the travel tube just as the door opened and landed in a heap on dry land. "Ahh," she groaned, face down in the dirt, so much for the nice clothes. She'd lost a shoe too. Pushing up off the ground, she turned her head to find the stiletto lying a few feet from a bush. Gingerly, she rose up to retrieve it. With no idea where she was, she looked at her surroundings, miraculously catching sight of Xieran moving down a road. He should have been the last person she wanted to see, but she was relieved. Maybe she could tail him until she figured out where to go. It was the middle of the night and there wasn't anyone around so she followed him from a distance. Hermes had said he was going to Rome. Looking back at where the tube had spit her out, her ankles wobbled again. The aqueducts. She never thought she'd get to see them. Rome was a bucket list item, sure, but this was crazy. To just appear somewhere out of thin air! It was too much to take in but Xieran was about out of sight so she curbed her amazement and hurried after him. He made his way into the city where things got busier then went down an alley behind a large building. Kay waited. She didn't want him to find her out. The clacky heels were a dead give-away even though she was getting much better at walking in them, thank you very much. Still, she had to walk carefully. Xieran punched a code into a keypad and she thought this was where she should probably part ways with him to find her own way through the city. But then she heard something at the other end of the alley. Two men were coming her way and they didn't look very nice. One of them yelled something as they both started to rush up on her. Terrified, she ran to the door Xieran had just disappeared behind. It was easing shut when she got there so she grabbed the handle before it clicked into the lock then slipped in and yanked it closed behind her. Panting, she leaned against the door but jumped when the men began to pound on it, yelling in a language she couldn't understand. She scurried away from the door trying to think what to do next. Xieran was here and she should avoid him seeing her but there was no way she was going back outside in the dark. Squinting to see, she found herself in yet another storage room. Everything was covered with sheeting and tarps. Light shone from across the room as Xieran passed through another door and she ducked back into the shadows. What was he planning to steal now? Before she could think better of it she tip-toed after him, dogging his steps until he came to a big open stairwell then started down. Waiting a few seconds so as to keep a safe distance, Kay pressed herself into the cold stone column at the top of the stairs then ran on her toes again to peek over the banister. Xieran stopped and started to look up but she ducked back out of sight in the nick of time. After a moment, he continued down. Lifting herself up a bit, Kay could see over the railing. She followed him with her eyes until she could see him make his way into a big open room full of sculptures. It was then that she realized they were in a museum. He halted again to look up and she barely slumped down behind the stairwell before he saw her because she was so intrigued. This was how he and Hermes got all of their art. Her heart was beating a mile a minute. She held her breath until she heard Xieran start moving again. Then, slowly, she lifted up to peek over the edge of the staircase. She couldn't see him so she scooted forward in a crouched position, rising up along the wall to lean over. It sounded like he was right underneath her so she pushed a little further to get a better look. Just as she spotted him though, she felt the slippery sole of her shoe slide on the floor. Too late, she knew she was done for. The last thing she thought about was all that stone and marble. Where were those pillows from Amphere's "resting room" when a girl needed them? "Ahhh!!!" She screamed as she went over the edge. The break to her fall was a mix of Xieran's hard body and alabaster, neither one forgiving. That was going to leave a mark. She didn't have time to think though before Xieran moved under her and she was sent rolling across the floor, grabbing a clump of broken statuary as she went. There were voices shouting in the distance, people coming their way. Scrambling up to her feet, Kay hunched over and held the stone piece in her hand out like a sword. Turning in every direction she prepared to ward off whoever might be coming for her next – museum guards, police…Xieran. He was just a few feet from her, dusting off his suit. How many times had she crashed into him now? He turned, lancing through her with his stare. "Miss Laurens. What. Are. You. Doing?" Kay's chest heaved. Shouting and the sound of footsteps got closer, then Xieran was stalking toward her. He looked very annoyed…and very handsome. Always that. Kay backed up, pointing the weapon in her hands at him. "Don't come any closer!" She shouted. He stopped. His eyes went to her hands. He looked back up at her, then lifted an eyebrow. She frowned but brought her hands up to eye level so that she could see what exactly she was threatening him with. There, right before her eyes, in both hands and to her horror, she found that she had a death grip on an enormous stone penis! Stunned she stared at the clay wonder. In her tumble through the open air, she hadn't realized that the room was filled with giant nudes. Her cheeks started to burn. She raised her startled brown eyes up to his. He wore a damnable, 'all right crazy girl, now what?' smirk on his face. Chaos came running at them after that, getting louder as a band of security guards burst onto the scene. Everyone stopped and stared. At her! Why weren't they looking at Xieran? Surely he was more menacing than she was. He was stealing from the museum for fuck's sake! But they all had their eyes trained on her like she was some unhinged psycho – armed and dangerous. And she was…with a huge phallic! Dammit, he was the criminal here. Guess that didn't matter when you were the one standing there with a dick in your hands. Oh god! She gasped, dropping the thing. It rolled around on the floor, forlorn and detached. Some angsty poet could probably put the image to good use. Kay scowled at it, but then Xieran was on her, grabbing the top of her arm. "You, Miss Laurens," he said in her ear, "are such a fucking beautiful disaster." Then they were running. When they neared the guards, Xieran swung her up in his arms at just the right angle to crash through two of them as he did a full turn then set her down and kept moving, pulling her along with him. The man was slick. That and the guards were dumbstruck. She figured at least half the credit went to her though for the little distraction she had provided. He was welcome. Slipping and sliding across the tile in her heels, Xieran dragged her around a stone pillar. Faking right, he moved across the hall to a doorway on the left but not before he had held up some kind of remote control device and brought down a metal barricade all around the sculpture exhibit. The guards were locked in and the two of them were safe in a closet before anyone knew what had happened. Xieran flipped on a light in the small room, pushed her up against the wall then shocked the hell out of her by kissing her hard on the mouth. She melted. After their first kiss, her body craved him. Even when she'd dreamed of Amphere, it was with the real man—Xieran—still in her mind. He drew her to him, his hands strong on her arms. "What are you doing here?" He breathed. "How did you find the access?" When she didn't answer right away he gave her a little shake. "B-bathroom, I found a door in my bathroom," she told him. "I saw you and Hermes…" Just then they heard the guards running past, shouting. "We have to get out of here," Xieran said. He moved around, searching for something. Kay felt deprived of his heat even when he was only a foot away. Rubbing her arms, she pressed her lips together, still tasting him. Remnants of all the lustful sensations he stirred in her and a fair amount of adrenalin hummed through her body. Something crashed above her in the next instant though, clearing her head and making her jump. He'd busted a panel in the ceiling with a mop handle. "Come on," he said reaching for her. He dragged her right under the hole he'd made then spun her around. "Jump!" "Wuh?" was all she got out before his hands were on her hips and she was being hurled up through the tight space. "Ahh," she squeaked, landing in a cloud of dust on the other side of the ceiling panel. This night was proof that she could not be trusted with designer clothing. Added to that was the fact that every bone in her body ached from the many falls she'd taken recently. Xieran popped up through the hole easily then hoisted himself upright before noises below indicated that the guards had crashed into the closet. Kay's heart beat fast and hard while Xieran seemed unfazed. But this was nothing new for him. He was probably on the lamb all the time she figured. Grabbing Kay's hand, he pulled her up off the floor. The man never missed a beat. "Where are we going?" She asked the back of his head as they moved. "Quiet," was all he gave her for an answer then pulled her to the back of the attic. He found a fresh air vent on the wall. "Stand back," he said, pushing her aside. He pulled back sideways then rammed the vent with his shoulder. It didn't move so he tried it a second time. Finally, the screen gave way, falling with a clatter onto the pavement below. Xieran reached for her, pulling her in behind him. "Stay close to me," he said as he dropped down then jumped through the opening. Kay poked her head out just as he was rising. He reached up to her with both hands. "Jump Karina," he called. It looked too far. Kay bit her lip but then the sound of sirens approached. "Hurry," he said, "I'll catch you." She swallowed then leaped out of the hole and into his arms. As soon as he set her on her feet, they were on the run again. Dodging between buildings, they managed to avoid the cops, coming out on the street where things were busier. Xieran pulled Kay under an awning, stood her with her back to the wall and came directly in front of her. "Wrap your arms around me," he said. She did, just as a group of law enforcement ran past. He whipped out his phone and started dialing. "Anthony," he said. Kay remembered hearing that name recently but she couldn't think where. She watched him as he talked. "Yes, I'm in Rome. We're out on the street but we've hit a snag. Can you send a car?" He chuckled at something the other speaker said then gave their location. "Okay, thanks," he said then disconnected. "Who was that?" Kay asked. "A friend," he brushed her hair off her face, "don't worry, he'll help us." She stared into his deep green eyes for she didn't know how long then, incredibly, the next thing she knew, a black Audi s8 was roaring up next to the curb where they stood. "Here's our ride," Xieran said as he turned her toward the vehicle and opened the door. "Nice car," she said. His eyes gleamed in the moonlight as he moved his head toward the car door. "Get in, Miss Laurens." Crystal Tide, Tides of Atlantis on Amazon www.amazon.com/dp/B07DYXVWHK Read the Tides of Atlantis series for free on Kindle Unlimited here. Crystal Tide - Excerpt Devastated by the loss of both parents and running scared after a break-in at her home, Kay Laurens jumps on the first plane out of Denver heading south to Miami. There she meets up with, of all people, a love psychic for answers. On the tip of the Bermuda Triangle, she is swept up into the dark world of an ancient cult and sent on the ride of her life. Then her incense induced visions come to life in the form of an inter-world traveling, suspicious and sinfully hot immortal agent for Mt. Olympus. Xieran has no memory of who he was before being stolen by Hermes. The Greek god uses him to enter Earth's sphere under the guise of an affluent art dealer in search of an elusive artifact which, if he can find, will win him his freedom. When his latest mission is brought up short by a female grad student breaking into his complex travel system, he can't help but be suspicious. It makes no difference that he finds her more and more irresistible with each encounter. With demon outbreaks, nefarious characters working in the Underworld and a power struggle of epic proportions going on, no one can be trusted. As they are thrown into the Tides together, Kay and Xieran set out on a whirlwind adventure, racing through the streets of Rome, Miami and even Western Australia to chase down the answers that will win them their freedom from the overbearing gods. Will they come to terms with destiny and conquer the evil taking over the Tides, or will they succumb to the passion growing between them? Join the forming crew of Poseidon's defenders against the Underworld in book two of Amanda V. Shane's Tides of Atlantis series https://www.amazon.com/dp/B07DYXVWHK "You can't just throw me in there!" She screamed, trying to fight him. "Listen, miss," he said with barely any space between them. His words vibrated through her skin, along her spine then all the way down to that sensitive place between her legs, "until you can explain to me who you are and what you were doing in the Tides, you will stay right here." He moved into the room then set her down on her feet, being surprisingly gentle. Kay's whole body felt weak and throbby now. She took in a shuddering breath, stepping back to put some space between them so she could put a stop to this insane physical attraction she was having to him. He was her freaking abductor for crying out loud! His head lowered and he narrowed his eyes. That look made everything a hundred times worse. Kay flipped her bangs, jutting her chin out. "That's what you think," she said, over-doing the bravado. She couldn't resist shaking her arms out, still tingling everywhere from having his hands on her. He lifted a gold-brown eyebrow up at her and huffed out a laugh like he knew her secret then turned and closed the door behind him. She decided right then to hate him. ​Amanda V Shane is an author of paranormal and fantasy romance and is currently working on her Tides of Atlantis series about the super hot lost kings of Atlantis as well as her Enchanted Lands Romances. She is a Colorado native where she lives with her family and a Bassett hound who she routinely has to fight for the "soft" end of the couch to set up with her laptop. She likes chocolate, wine, coffee and kids, in no particular order ;). Join Amanda V Shane's Monsters & Mystics Newsletter for news, discussion and free content!
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
4,194
From 6th to 13th of September 2015, 17 young people, from all around Europe and from different religious and educational backgrounds, gathered for the training course "Faces of Poverty: training course addressing poverty in the context of migration" which took place in Manchester, United Kingdom. It was organized by EYCE with the help of 4 volunteers and supported by the Council of Europe and Brot für die Welt. The main objectives of this week were to explore the links between poverty, social exclusion and migration, as well as empowering young people with the knowledge and skills necessary to address the negative effects of poverty and exclusion. For the first part of the week, participants work together to define the key terms of the training course, such as migration, poverty and community. These terms were essential to the understanding of the different concepts and issues at hand. Through different presentations, board games, solidarity dinner and other non-formal methods of education, participants learned first-hand how it can feel to be a migrant as well as how others might feel. Two experts were invited to speak at the event. Mr. Nicolas Derobert is a Communications and Membership Officer at Eurodiaconia in Belgium, working in the fields of migration and EU free movement. He presented participants with a more in depth presentation about poverty and migration in Europe and how it affects everyone, based on current event. He also provided a small workshop on communication and media campaign. The second guest speaker was Professor Juris Calitis from Latvia and he offered a theological approach to the topic of solidarity. Through his own experiences and different passages of the Bible, he showed the importance of a community and how solidarity is connected to the theology in the Bible as well as the unity in the church. Professor Calitis mentioned that solidarity is not a philosophical but political question. During our stay in Manchester, two local visits were offered to the participants. We met with Rachel Foakes from Rainbow Haven, an organization that offers support and activities for asylum seekers, refugees and migrants. She showed us their permeis and shared their projects as well as their struggles as an organization. Secondly, we met with James Allan, who told us more about the asylum procedures in the UK. He provided us with the legal procedures as well as the system of support that asylum seekers get in the United Kingdom. In this way we could see what challenges asylum seekers and refugees face in UK. At the end of the meeting Mr. Allan proposed a few solutions that might solve the whole situation which brought very interesting insight into the migration issues. For the second part of the week, participants were given the choice of workshops to learn tools to implement in their own context projects relating to poverty and migration. These were: advocacy and the general rules behind it; practical assistance, or how to help migrants get information about their rights and organizations; counselling and how to help migrants in different levels; community mobilization and how to best use it to one's advantage. Many ideas and projects were discussed and shared, and we wish the participants the best of luck in implementing them. Participants were then given the opportunity to create a 'to-go toolbox'. This involved participants creating project proposals for different types of project. The participants came up with various creative ideas and it is hoped they will be able to take these proposals and use them in their own contexts. EYCE would like to warmly thank everyone in the United Kingdom that was involved with the preparation and realization of this training course.
{ "redpajama_set_name": "RedPajamaC4" }
3,522
Posted in: 1 Pageant Pages. Tagged: Czarina Gatbonton, Miss World 2010, Sanya China. Good luck to all the girls! The next two weeks will be crucial for everyone when the semi-finalists plus fast-track winners will be chosen. Posted in: 1 Pageant Pages. Tagged: Beauty Crown Cultural Centre, Diana Irina Boanca, Diana Kubasova, Kasey-Lee Brunker, Luneidy Ramos, Miss Autumn Bikini, Miss Bikini International 2010, Miss Spring Bikini, Miss Summer Bikini, Miss Winter Bikini, Romania, Sanya China, Zhao Qian. Diana Irina Boanca, a 22 year-old college student from Romania, was crowned Miss Bikini International 2010 during glittering final ceremonies at the Beauty Crown Cultural Centre in Sanya, China Saturday night. She bested 63 other delegates for the title. Proclaimed as Miss Spring Bikini is Kasey-Lee Brunker of Australia, Miss Summer Bikini is Luneidy Ramos of Venezuela, Miss Autumn Bikini is Zhao Qian of China, and Miss Winter Bikini is Diana Kubasova of Latvia. WINNERS ALL (L-R): Luneidy Ramos of Venezuela (Miss Summer Bikini), Diana Kubasova of Latvia (Miss Winter Bikini), Diana Irina Boanca or Romania (Miss Bikini International 2010), Zhao Qian of China (Miss Autumn Bikini) and Kasey-Lee Brunker of Australia (Miss Spring Bikini). SANYA, Hainan, May 29 (Xinhua) — Miss Romania was crowned the winner in the 35th Miss Bikini International World Final Saturday in Sanya, a coastal resort in south China's Hainan Province. "I am so excited that I do not know what to say. All the contestants are very strong and I must say I am so lucky to win," said Diana Irina Boanca, 22, who is currently a senior college student. Kasey-Lee Brunker from Australia, Luna Ramos from Venezuela, Zhao Qian from China and Diana Kubasova from Latvia were titled Miss Spring, Miss Summer, Miss Autumn and Miss Winter, respectively. A total of 64 contestants took part in the ten-day competition. It was the fourth time that China has ever hosted this beauty contest final, which was first held in Hollywood in 1972. I must admit that Diana Irina Boanca is nowhere near my radar when I made my picks for Top 15. She must be someone better appreciated in person than in web photos and coverages. Images above are courtesy of xinhuanet. Posted in: 1 Pageant Pages. Tagged: Anna Botova, Diana Nekoye Sifuna, Dorota Korczak, Ikumi Yoshimatsu, Kasey-Lee Brunker, Luneidy Ramos, Mariel Anniina Mettala, Marijana Pokrajac, Miss Bikini International 2010, Mylene Catherine Simon, Nathalie Marina Hendrika Maria Den Drekker, Princess Angela Abella, Sanya China, Terpsilovskaya Oxana, Timea Szaboova, Veronica Ling Hsih Lin, Zhao Qian. Tonight, Miss Bikini International Queen 2010 will be selected at the Beauty Crown Cultural Centre in Sanya, China. From among the 60 ladies competing for the title, here are my picks to make it to the Top 15. The big winner should come from this group of 15. My top 3 choices for the title, though, are the gorgeous Miss Netherlands with the very kilometric name of Nathalie Marina Hendrika Maria Den Drekker, the sensuous Terpsilovskaya Oxana of Kazakhstan and the classy Dorota Korczak of Poland. My top #1 choice for the crown is Nathalie Marina Hendrika Maria Den Drekker of the Netherlands. Posted in: 1 Pageant Pages. Tagged: Miss Bikini International 2010, Miss Bikini Philippines 2010, Princess Angela Abella, Rhoane Aguilar, Sanya China, Slimmers World, Suzie Brown. Princess Angela Abella from Cebu City bested 23 other contenders and was adjudged Slimmers World Miss Bikini Philippines 2010. She will now represent the country in the Miss Bikini International 2010 which will be held in Sanya, China from May 14 to June 1, 2010. She stands 5'6″ and measures 32-24.5-34.5 and weighs 123 lbs. Coming in next as 1st Runner-Up is Suzie Brown of Davao City with Bb. Pilipinas 2010 alumni Rhoane Aguilar of Bacoor completing the Top 3 as 2nd Runner-Up.
{ "redpajama_set_name": "RedPajamaC4" }
2,167
Join us for a lively discussion of the book "HOMEGOING" by Yaa Gyasi. Yaa is a Ghanaian-American novelist whose debut novel (Homegoing) brought her, at age 26, the National Book Critics Circle's John Leonard Award for best first book, The PEN/Hemingway Award for a first book of fiction, and the National Book Foundation's "5 under 35" honors for 2016. Homegoing was inspired by a 2009 trip to Ghana, her first trip since leaving the country as an infant.
{ "redpajama_set_name": "RedPajamaC4" }
9,607
tinkerwiththis: craft-along twenty ten: project two FINISHERS! craft-along twenty ten: project two FINISHERS! remember this from oh so long ago? well we had a few finishers, so i figured i should wrap it all up official-style. Andrea from Pie Birds, Buttons and Muddy Puddles made an adorable kitchen version blogged about here. check out her blog for lots of amazing recipes and great kids craft projects. she's a housewife whiz. Kelly from Kandid Kiwi made a bright summer kitchen version here which i think is so perfect for her california sunshiney life. she also just started a new blog about her quilting adventures here. this girl is ambitious, kudos to her. and of course, i made my own crafty version here. i loved the folksy print so much that i made it into a makeup pouch for the tinkerwiththis party. hopefully someone else loves it just as much and takes it home with them. for craft-along project three i was thinking something like this. there are a lot of options for a project like that. i'm even thinking of something along the lines of a sale display for my pendants with just hooks. but think of how inexpensive this could be?! an old sign/plaque from a thrift store, some mod podge, a can of spray paint, dowels from the craft store, patterned paper and some hooks. i think there's a lot we could all do with this, and no sewing required. anyone on board?? Well, I did finish #2 but my photo's are stuck on my fb page since I couldn't get them loaded onto flickr. Oh well.
{ "redpajama_set_name": "RedPajamaC4" }
733
Unreal: How This Quadriplegic Boy Learned How to Move His Limbs … With His Mind Kimberly Hiss Ian Burkhart was the first quadriplegic to regain control of his body using his thoughts. iStock/Minerva Studio When Ian Burkhart broke his neck diving into a wave in 2010, he had no idea that about four years later, he would make history as the first quadriplegic to regain control of his limbs using his own thoughts. At the time, the devastated 19-year-old knew only that an experimental study at nearby Ohio State University Wexner Medical School offered hope. Burkhart's spinal injury had severed the communication pathway between the motor cortex in his brain and the muscles in his limbs, but this study proposed a detour. Doctors had Burkhart think about moving his hand while researchers took fMRI scans to light up key brain areas. Based on those coordinates, in April 2014, Ali Rezai, MD, director of Ohio State's Center for Neuromodulation, placed a microchip smaller than a pea in the motor cortex, which controls the hand. The chip was connected via a computer to an electrode-studded sleeve on Burkhart's arm that stimulated his muscles. Burkhart's thoughts now had a new bypass to his hand. Two months later, Dr. Rezai was standing behind his patient in a lab crowded with cameras, physicians, engineers, and family, all eyes on Burkhart's right hand. When it moved for the first time, Burkhart made history. "It was a surreal moment," Dr. Rezai remembers. "The whole team was amazed, but then we said, 'OK, the work is just beginning. He's got to be able to pick up a cup of coffee.'" In the years since, subject and software have been learning from each other. "The machine is continuously improving its algorithms, and Ian is able to think about things with more fluidity," says Dr. Rezai. "It's phenomenal seeing the brain and computer coming together." Burkhart is now able to swipe a credit card and play Guitar Hero. MORE: This Kind Stranger Helped a Paralyzed Teen Finish High School (And More) 8 Adoptees Who Found Their Birth Parents Through DNA Kits See the Last Photos Ever Taken of Nelson Mandela These Are the 50 Nicest Places in America, According to Our Readers
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
131
2nd EP from Cleveland-based Endless Voyage X. "Those Whom Time Forgot" picks up where the artist's debut left-off refining the textures found on "Darker Seasons" in a more atmospheric and melancholy direction. This CD version comes in a 6-panel wallet.
{ "redpajama_set_name": "RedPajamaC4" }
9,197
January 11, 2019 January 8, 2019 Kathleen Adams1 Comment on Make a Humorous Card! I love digital stamps because you can make them any size you want, you can put backgrounds behind them, they print perfectly the first time, you can buy them pre-colored, and you don't have to clean or store them! Step 1: Size, print and color with the medium of your choice. I colored mine with Copic Markers. Step 3: Use the 3rd to the largest die in the same set to cut a slightly larger circle for a mat for step 2. Adhere the "image circle" to the blue circle. Step 4: Cut two each of the largest and smallest dies, out of wood look cardstock from: 1254 – Entwined Circles Glue the two of each together ending up with one of each but thicker, which gives it more dimension. Cut the little snowflake out 8 times. Note: The dies in this set will cut through two layers of cardstock at once. You can always run it through your die cutting machine twice to make sure, as they are intricate. Step 5: Create the sentiment in word, "Just stopped by to say "Hay" and print on white cardstock. Cut out with the 3rd die to the smallest in the same set as in step 2 and out of the same blue cardstock and the 4th to the smallest cut a blue mat. Adhere the sentiment circle to the blue circle. Step 6: Make a base card by scoring an 11 x 8.5″ pc. of white cardstock at 5.5″ on the long side. Trim to 5 x 7″ with a book fold. Cut a rectangle from a designer paper that looks wintery and measures 4.75 x 6.75″. Adhere this rectangle to the front of the base card. Optional Note: I created in word, the inside sentiment and printed it on white cardstock first. Then adhere the Entwined circle over the top. Repeat for the smaller "sentiment" circle in the lower left of the card. Step 8: I added clear Wink Of Stella to the snowflakes and a silver clear glitter dot to the center of each. Glue the snowflakes as shown. Thanks so much for stopping by and we'd love to see your sense of humor this week!
{ "redpajama_set_name": "RedPajamaC4" }
8,426
This new trailer shares the film's primary plot which follows Detective Pikachu on his journey to uncover his past and the whereabouts of his previous trainer Harry Goodman, an ace detective. The trailer also reveals some pretty awesome battle scenes and a powerful Mewtwo reveal! In terms of other classic Pokémon that make a cameo, we noticed Charizard, Machamp, Snubbull, Ludicolo, Lickitung, Bulbasaur, Cubone, Snorlax and Eevee. Some Pokemon have adorably successful live-action incarnations, while others could use some work, but regardless, fans are more than ready for the film to hit theatres this May. Check out some hilarious Twitter reactions below! What did you think of the new Detective Pikachu trailer? Let us know in the comments if you're excited for the film and check out the video below for our detailed breakdown of the first trailer!
{ "redpajama_set_name": "RedPajamaC4" }
647
Tickets are purchased on the day of your arrival, we do not sell advance or online tickets. Advance reservations are required and accepted ONLY for groups of 20 or more persons. Must present proper active or retired Military ID prior to ticket purchase. Rates apply ONLY to Military person, spouse and DEPENDENT children. way to legal online pokies real money Australia free. FREE PARKING Rates subject to change. Visa, MasterCard, Discover Credit or Debit Cards and Cash accepted for payment. *Discounted Group Rates: These rates are for organized groups ONLY, and MUST have an advance reservation. A$50.00 non-refundable deposit is required for all group reservations. On summer weekends, groups must arrive before 10:30 am or after 5:00 pm. Groups of children or young adults must be accompanied by at least one adult leader. For groups, all tickets must be purchased by one person acting as leader-no individual sales. Closed Thanksgiving Day, Christmas Day & January. Cave temperatures 52 degrees year round. Tours depart on the hour.
{ "redpajama_set_name": "RedPajamaC4" }
7,044
On December 19, 2017, Dawn (nee Kennedy), beloved wife of Bill Terwilliger Jr. Survived by daughters Brianna (Michael) Robinson, Danielle, her mother Nancy Kennedy, sister Lori, father-in-law William Terwilliger, brother-in-law Ronald, Thomas (Marilena); and many other loving aunts, uncles, nieces, nephews, cousins and friends. Relatives and friends are invited to attend the visitation with the family on Saturday, January 6, 2018, 10-11 am at the: ORA L. WOOSTER FUNERAL HOME, 51 Park Blvd., Clementon, NJ 08021. A Celebration of her Life service will begin at 11:00 am. In lieu of flowers, family requests memorial donations to American Cancer Society, 1851 Old Cuthbert Rd., Cherry Hill, NJ 08034. Share memories at OraLWoosterFuneralHome.com.
{ "redpajama_set_name": "RedPajamaC4" }
5,379
Posts Tagged: Keanu Reeves Keanu Reeves, 55, and longtime girlfriend Alexandra Grant, 46, take their relationship public Gregg DeGuire/FilmMagic Keanu Reeves broke the hearts of women everywhere when he went public with his longtime girlfriend, Alexandra Grant. Keanu, 55, and artist/poet Alexandra Grant, 46, have known each other for over a decade. Neilson Barnard/Getty Images For their first public outing as a couple, Keanu took Alexandra to the LACMA Art + Film Gala, presented by Gucci, in Los Angeles on Saturday night. Keanu and Alexandra collaborated on a book, Ode to Happiness, in 2011 after reportedly meeting in 2009. They grew increasingly close over the years - even as Keanu dated other women including actresses Charlize Theron, 44, and Halle Berry, 53 (below). The Grosby Group / BACKGRID Keanu and Alexandra wrote their 2nd book together, Shadows, in 2016, according to Dailymail.com. An artist, poet, journalist and photographer, Alexandra photographed Keanu on the set of his popular assassin film series John Wick. She also photographed Keanu on the set of The Matrix. She said she was in awe of the way he moved, and she included those photos in their book, Shadows. "No one can move the way he can. He's a really extreme performer. That's a huge piece of why those images are so interesting," she told W. "I knew that if I moved the camera as we danced together, as photographer and subject, we could create these wonderful optical illusions." She told W magazine that their differences make them compatible. "We can spend a lot of time debating. Like, 'A raspberry hue? And should it be darker?' We can get obsessive." Keanu made his star turn in the drug culture comedy flick Bill & Ted's Excellent Adventure in 1989. Posted in Celebrity Tags: Alexandra Grant, celebrity couple, celebrity relationships, Keanu Reeves Yara Shahidi's 'Sun' Flames Out at Box Office Yara Shahidi's sun is not burning so brightly. The former Black-ish star's television appeal hasn't translated well to the big screen. Tags: box office sales, Halle Berry, Keanu Reeves, movie ticket sales, Yara Shahidi PICS: Keanu Reeves and Halle Berry Attend His Hand & Footprint Ceremony Last year, I told you that Halle Berry and Keanu Reeves were reportedly dating. The couple's reps denied they were a romantic item. Today, they took their relationship public at Keanu's Hand And Foot Print Ceremony at the TCL Chinese Theatre IMAX in Hollywood. Photo by The Grosby Group / BACKGRID Tags: celebrity couple, Halle Berry, Keanu Reeves, Laurence Fishburne
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
6,094
Q: How to get max and min value in array of objects in javascript? I need to get the maximum and minimum value of an array with several objects. I know that in Javascript we can use Math.min and Math.max for this, in addition to other strategies. This solution of mine is working, but I'm finding the code too verbose. Can you tell me how to improve it? Thank you very much in advance. Here's my code I put into codesandbox.io const skuStylePlu = [{ skuPrice: { currentPrice: { amount: 10 } } }, { skuPrice: { currentPrice: { amount: 20 } } }, { skuPrice: { currentPrice: { amount: 30 } } }, { skuPrice: { currentPrice: { amount: 40 } } }, { skuPrice: { currentPrice: { amount: 50 } } } ]; let lowest = Number.POSITIVE_INFINITY; let highest = Number.NEGATIVE_INFINITY; let temp; for (let i = skuStylePlu.length - 1; i >= 0; i--) { temp = skuStylePlu[i].skuPrice.currentPrice; if (temp.amount < lowest) { lowest = temp.amount; } if (temp.amount > highest) { highest = temp.amount; } } console.log(lowest, highest); // return 10, 50 A: use the reduce method instead of a for loop. const skuStylePlu = [{ skuPrice: { currentPrice: { amount: 10 } } }, { skuPrice: { currentPrice: { amount: 20 } } }, { skuPrice: { currentPrice: { amount: 30 } } }, { skuPrice: { currentPrice: { amount: 40 } } }, { skuPrice: { currentPrice: { amount: 50 } } } ]; const prices = skuStylePlu.map(obj => obj.skuPrice.currentPrice.amount); const lowest = prices.reduce((acc, curr) => Math.min(acc, curr), Number.POSITIVE_INFINITY); const highest = prices.reduce((acc, curr) => Math.max(acc, curr), Number.NEGATIVE_INFINITY); console.log(lowest, highest); A: You could start with the value at index zero and get the value directly, bnot the last object. Then loop until index one. const skuStylePlu = [{ skuPrice: { currentPrice: { amount: 10 } } }, { skuPrice: { currentPrice: { amount: 20 } } }, { skuPrice: { currentPrice: { amount: 30 } } }, { skuPrice: { currentPrice: { amount: 40 } } }, { skuPrice: { currentPrice: { amount: 50 } } } ]; let lowest = skuStylePlu[0].skuPrice.currentPrice.amount, highest = skuStylePlu[0].skuPrice.currentPrice.amount, i = skuStylePlu.length; while (--i) { const value = skuStylePlu[i].skuPrice.currentPrice.amount; if (value < lowest) lowest = value; if (value > highest) highest = value; } console.log(lowest, highest); // return 10, 50 A: You can use object destructuring to tidy things a little. With a for of loop: const skuStylePlu = [{"skuPrice":{"currentPrice":{"amount":10}}},{"skuPrice":{"currentPrice":{"amount":20}}},{"skuPrice":{"currentPrice":{"amount":30}}},{"skuPrice":{"currentPrice":{"amount":40}}},{"skuPrice":{"currentPrice":{"amount":50}}}]; let lowest = Number.POSITIVE_INFINITY; let highest = Number.NEGATIVE_INFINITY; for(const { skuPrice: { currentPrice: { amount } } } of skuStylePlu) { lowest = lowest < amount ? lowest : amount; highest = highest > amount ? highest : amount; } console.log(lowest, highest); Single reduce for slightly increased terseness: const skuStylePlu = [{"skuPrice":{"currentPrice":{"amount":10}}},{"skuPrice":{"currentPrice":{"amount":20}}},{"skuPrice":{"currentPrice":{"amount":30}}},{"skuPrice":{"currentPrice":{"amount":40}}},{"skuPrice":{"currentPrice":{"amount":50}}}]; const [lowest, highest] = skuStylePlu.reduce( ([low, high], { skuPrice: { currentPrice: { amount } } }) => [ low < amount ? low : amount, high > amount ? high : amount ], [Number.POSITIVE_INFINITY, Number.NEGATIVE_INFINITY] ); console.log(lowest, highest);
{ "redpajama_set_name": "RedPajamaStackExchange" }
8,216
difficult feelings, hard truth April 30, 2022 January 21, 2023 by Yve The only woman I've ever really viscerally wanted to be is singer-songwriter, Paramore frontwoman and 'hair dye tycoon' Hayley Williams. And that's not a thing borne out of fandom, especially, though I have come to appreciate her work in recent years. It's because part of me resonates so keenly with her, in a way I can't really explain. Part of me believes I could have been her – should have been – if only, if only I hadn't failed at being, in all the necessary ways. When I was younger I was downright jealous of her, and I masked it with disdain. But I was the one who was scared to sing. I was the one who was scared to be in community. I was the failure, and I knew I had no right to criticise her, so the disdain ate at me, and wouldn't let me forget it. As I grew older and wiser, I let myself admit that I even enjoyed Paramore a bit. But they remained a 'guilty' pleasure. I didn't want anyone to know I listened to them, and any time I did, which wasn't often, I felt oddly on display. Who can hear this and what must they think!? As if anyone would think anything at all. Her solo material was what let me reconcile my complicated feelings about her. We have some important similarities. We've had some importantly similar experiences in our lives. We have similar faultlines. We've learned similar lessons. But through that and despite it, she was able to continue becoming the success that she is and deserves to be. And I…well I never even seemed to begin. I had been holding that against myself, and she, more than most, reminded me. What were the differences between us that led to our divergent paths through life, even as we traversed similar terrain? How was she able to build and maintain a fulfilling career, while every avenue I even thought of pursuing collapsed around me in short order? Why could she sing and I couldn't? Why could she integrate and I couldn't? We were both in pain, so my pain wasn't the reason. How could she do it, and do it so well, and I couldn't do it at all? Well, there are very good explanations, of course. But that's another tale. decisions desire discomfort envy failure guilt lessons regret shame what if The problem with drafts
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
8,942
The MAPLOX Program combines FreshPax® CR Packets with the proven reliability of our APA-series of dispensers. The MAPLOX Program combines FreshPax® CR Packets with the proven reliability of our APA-series of dispensers. It is an easy to use, low-oxygen packaging program designed to extend the saleable life of fresh meat at retail and help you to realize significant savings from central location packaging. It provides consumers with fresh and appealing whole muscle beef, ground beef, pork, lamb, veal and other value-added meat products. Pork – Chops, Sausage, etc. The MAPLOX Program provides a simplified solution that offers design, development, and dispensing of an optimized FreshPax CR packet, resulting in reduced spoilage, expanded distribution potential, and increased profits! Oxygen is the main cause of reduced shelf life. After a few days exposure to the oxygen content of air, meat loses its freshness, taste, and visual appeal — resulting in markdowns or loss of sales. MAPLOX Program maintains quality through the entire storage and distribution cycle and delivers fresh meat to the display case while realizing the savings of central location packing. In the typical case-ready package, a number of trays are over-wrapped and hermetically sealed in a master bag. The atmosphere of the master bag is typically modified down to All components of the MAPLOX Program use 21 CFR-compliant materials. This regulation is complied with even though there is no food contact with the master bag.
{ "redpajama_set_name": "RedPajamaC4" }
5,487
High frequency hearing loss correlated with mutations in the GJB2 gene Stephen A. Wilcox, Kerryn Saunders, Amelia H. Osborn, Angela Arnold, Julia Wunderlich, Therese Kelly, Veronica Collins, Lean J. Wilcox, R. J. McKinlay Gardner, Maria Kamarinos, Barbara K Cone-Wesson, Robert Williamson, Hans Henrik M Dahl Genetic hearing impairment affects approximately 1/2000 live births. Mutations in one gene, GJB2, coding for connexin 26 cause 10%-20% of all genetic sensorineural hearing loss. Mutation analysis in the GJB2 gene and audiology were performed on 106 families presenting with at least one child with congenital hearing loss. The families were recruited from a hospital-based multidisciplinary clinic, which functions to investigate the aetiology of sensorineural hearing loss in children and which serves an ethnically diverse population. In 74 families (80 children), the aetiology was consistent with non-syndromic recessive hearing loss. Six different connexin 26 mutations, including one novel mutation, were identified. We show that GJB2 mutations cause a range of phenotypes from mild to profound hearing impairment and that loss of hearing in the high frequency range (4000-8000 Hz) is a characteristic feature in children with molecularly diagnosed connexin 26 hearing impairment. We also demonstrate that this type of audiology and high frequency hearing loss is found in a similar-sized group of deaf children in whom a mutation could only be found in one of the connexin 26 alleles, suggesting connexin 26 involvement in the aetiology of hearing loss in these cases. In our study of the M34T mutation, only compound heterozygotes exhibited hearing loss, suggesting autosomal recessive inheritance. High-Frequency Hearing Loss Heterozygote Connexin 26 Wilcox, S. A., Saunders, K., Osborn, A. H., Arnold, A., Wunderlich, J., Kelly, T., ... Dahl, H. H. M. (2000). High frequency hearing loss correlated with mutations in the GJB2 gene. Human Genetics, 106(4), 399-405. High frequency hearing loss correlated with mutations in the GJB2 gene. / Wilcox, Stephen A.; Saunders, Kerryn; Osborn, Amelia H.; Arnold, Angela; Wunderlich, Julia; Kelly, Therese; Collins, Veronica; Wilcox, Lean J.; McKinlay Gardner, R. J.; Kamarinos, Maria; Cone-Wesson, Barbara K; Williamson, Robert; Dahl, Hans Henrik M. In: Human Genetics, Vol. 106, No. 4, 2000, p. 399-405. Wilcox, SA, Saunders, K, Osborn, AH, Arnold, A, Wunderlich, J, Kelly, T, Collins, V, Wilcox, LJ, McKinlay Gardner, RJ, Kamarinos, M, Cone-Wesson, BK, Williamson, R & Dahl, HHM 2000, 'High frequency hearing loss correlated with mutations in the GJB2 gene', Human Genetics, vol. 106, no. 4, pp. 399-405. Wilcox SA, Saunders K, Osborn AH, Arnold A, Wunderlich J, Kelly T et al. High frequency hearing loss correlated with mutations in the GJB2 gene. Human Genetics. 2000;106(4):399-405. Wilcox, Stephen A. ; Saunders, Kerryn ; Osborn, Amelia H. ; Arnold, Angela ; Wunderlich, Julia ; Kelly, Therese ; Collins, Veronica ; Wilcox, Lean J. ; McKinlay Gardner, R. J. ; Kamarinos, Maria ; Cone-Wesson, Barbara K ; Williamson, Robert ; Dahl, Hans Henrik M. / High frequency hearing loss correlated with mutations in the GJB2 gene. In: Human Genetics. 2000 ; Vol. 106, No. 4. pp. 399-405. @article{8d68fec5e9ff4c598e899e9e8c0dbd24, title = "High frequency hearing loss correlated with mutations in the GJB2 gene", abstract = "Genetic hearing impairment affects approximately 1/2000 live births. Mutations in one gene, GJB2, coding for connexin 26 cause 10{\%}-20{\%} of all genetic sensorineural hearing loss. Mutation analysis in the GJB2 gene and audiology were performed on 106 families presenting with at least one child with congenital hearing loss. The families were recruited from a hospital-based multidisciplinary clinic, which functions to investigate the aetiology of sensorineural hearing loss in children and which serves an ethnically diverse population. In 74 families (80 children), the aetiology was consistent with non-syndromic recessive hearing loss. Six different connexin 26 mutations, including one novel mutation, were identified. We show that GJB2 mutations cause a range of phenotypes from mild to profound hearing impairment and that loss of hearing in the high frequency range (4000-8000 Hz) is a characteristic feature in children with molecularly diagnosed connexin 26 hearing impairment. We also demonstrate that this type of audiology and high frequency hearing loss is found in a similar-sized group of deaf children in whom a mutation could only be found in one of the connexin 26 alleles, suggesting connexin 26 involvement in the aetiology of hearing loss in these cases. In our study of the M34T mutation, only compound heterozygotes exhibited hearing loss, suggesting autosomal recessive inheritance.", author = "Wilcox, {Stephen A.} and Kerryn Saunders and Osborn, {Amelia H.} and Angela Arnold and Julia Wunderlich and Therese Kelly and Veronica Collins and Wilcox, {Lean J.} and {McKinlay Gardner}, {R. J.} and Maria Kamarinos and Cone-Wesson, {Barbara K} and Robert Williamson and Dahl, {Hans Henrik M}", journal = "Human Genetics", T1 - High frequency hearing loss correlated with mutations in the GJB2 gene AU - Wilcox, Stephen A. AU - Saunders, Kerryn AU - Osborn, Amelia H. AU - Arnold, Angela AU - Wunderlich, Julia AU - Kelly, Therese AU - Collins, Veronica AU - Wilcox, Lean J. AU - McKinlay Gardner, R. J. AU - Kamarinos, Maria AU - Cone-Wesson, Barbara K AU - Williamson, Robert AU - Dahl, Hans Henrik M N2 - Genetic hearing impairment affects approximately 1/2000 live births. Mutations in one gene, GJB2, coding for connexin 26 cause 10%-20% of all genetic sensorineural hearing loss. Mutation analysis in the GJB2 gene and audiology were performed on 106 families presenting with at least one child with congenital hearing loss. The families were recruited from a hospital-based multidisciplinary clinic, which functions to investigate the aetiology of sensorineural hearing loss in children and which serves an ethnically diverse population. In 74 families (80 children), the aetiology was consistent with non-syndromic recessive hearing loss. Six different connexin 26 mutations, including one novel mutation, were identified. We show that GJB2 mutations cause a range of phenotypes from mild to profound hearing impairment and that loss of hearing in the high frequency range (4000-8000 Hz) is a characteristic feature in children with molecularly diagnosed connexin 26 hearing impairment. We also demonstrate that this type of audiology and high frequency hearing loss is found in a similar-sized group of deaf children in whom a mutation could only be found in one of the connexin 26 alleles, suggesting connexin 26 involvement in the aetiology of hearing loss in these cases. In our study of the M34T mutation, only compound heterozygotes exhibited hearing loss, suggesting autosomal recessive inheritance. AB - Genetic hearing impairment affects approximately 1/2000 live births. Mutations in one gene, GJB2, coding for connexin 26 cause 10%-20% of all genetic sensorineural hearing loss. Mutation analysis in the GJB2 gene and audiology were performed on 106 families presenting with at least one child with congenital hearing loss. The families were recruited from a hospital-based multidisciplinary clinic, which functions to investigate the aetiology of sensorineural hearing loss in children and which serves an ethnically diverse population. In 74 families (80 children), the aetiology was consistent with non-syndromic recessive hearing loss. Six different connexin 26 mutations, including one novel mutation, were identified. We show that GJB2 mutations cause a range of phenotypes from mild to profound hearing impairment and that loss of hearing in the high frequency range (4000-8000 Hz) is a characteristic feature in children with molecularly diagnosed connexin 26 hearing impairment. We also demonstrate that this type of audiology and high frequency hearing loss is found in a similar-sized group of deaf children in whom a mutation could only be found in one of the connexin 26 alleles, suggesting connexin 26 involvement in the aetiology of hearing loss in these cases. In our study of the M34T mutation, only compound heterozygotes exhibited hearing loss, suggesting autosomal recessive inheritance. JO - Human Genetics JF - Human Genetics
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
6,129
I've been trying to answer questions but I want to add The little keys in there, and I don't know how. How do I do it? How to list all protected questions? How to search for unanswered, open questions questions with at least 1 close flag?
{ "redpajama_set_name": "RedPajamaC4" }
7,652
FINA Artistic Swimming World Series makes a splash thanks to EVS' X-One Liège, Belgium, April 18, 2019 Looking to create the most compelling live coverage from the inaugural FINA Artistic Swimming World Series, hosts Fédération Française de Natation and partner Phoenix Event Productions required a smart, live production solution that was ideally suited to deliver mid-sized events. They turned to French broadcast facilities and services company Boite à Outils Broadcast (BOB) who deployed EVS' X-One unified live production system. This all-in-one system that brings together the capabilities of a control room is specifically designed for use at smaller events, where budgetary constraints may have previously curbed the scope and creative ambition of a live production. X-One allows a single operator to create replays, control audio, cut together a live feed with a built-in video switcher and even add graphics to further enrich live programming from an intuitive user interface without the need of additional solutions. With X-One no compromise was needed between editorial requirements and technical reliability or efficiency. Phoenix Event Production's team, which consisted of a director, assistant and camera operator, was able to successfully deliver the three-camera live production, which was output in the highest broadcast-standard quality. Cécilia Chédeville, Phoenix Event Productions' President & Director of Productions, said: "In order to reach a new, wider audience, it was vital that we presented the sport and event in the best way possible. With events of this size, budgets can impact hugely on what can be delivered, so EVS' X-One is a real game-changer as it opens up new business opportunities for us going forward. With X-One, we have greater editorial freedom and don't need to allocate budget to bring in other equipment to get a job done." Cyril Mazouer, BOB's General Manager who supplied the system, added: "EVS is the industry-leader when it comes to live production tools, and has a reputation for deploying new and innovative technology. We have had very positive experiences when working together previously on jobs such as the recent Clique TV channel launch for Canal+. X-One is a very exciting new development that should interest any rights owner putting on medium-sized productions that wants to achieve a more professional look with its live programming." The FINA Artistic Swimming World Series is an annual circuit created in order to raise the profile of the re-branded sport of artistic swimming around the world while creating a more structured competition calendar for national teams. The first leg was held at the Aquatic Center Maurice Thorez of Montreuil in Paris from March 1-3. Unified live production system Read more
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
592
Laster may refer to: Laster (surname) Laster (band), a Dutch metal band Das Laster, a 1915 German film Laster, a Transformer in the 1989 anime series Transformers: Victory
{ "redpajama_set_name": "RedPajamaWikipedia" }
9,574
When the city of Flint, Michigan, USA switched to the local Flint River in 2014 as the source of its drinking water, lead from aging pipes leached into water supplies. Photo courtesy of Wikimedia Commons. A new report1 from the University of Michigan (Ann Arbor, Michigan, USA) and funded by the de Beaumont Foundation (Bethesda, Maryland, USA) public health group issued recommendations aimed at better involving local health departments in decisions such as those made in Flint, Michigan, where a lack of corrosion controls recently led to lead-tainted drinking water for residents. According to report organizers, the findings were issued to better diagnose what legal changes could be needed to prevent a similar crisis from occurring elsewhere. Prior investigations had found failures at all levels of government3 in responding to the crisis, including both the Michigan Department of Environmental Quality (MDEQ) (Lansing, Michigan, USA) and the U.S. Environmental Protection Agency (EPA) (Washington, DC, USA). Investigators cited the MDEQ's failure to order the required corrosion controls on lead service lines when Flint changed its water source in 2014 from a treated system in Detroit, Michigan, to the local Flint River as part of a plan to cut costs. Flint switched back to its original water supply in late 2015, but it was too late to reverse the damage to the pipes. One significant problem in Flint was that a state-appointed emergency manager's jurisdiction over the crisis "undermined the local government's ability to respond," according to the report. "Once the emergency manager took over, city agencies could no longer act, although state, federal, and county agencies retained legal authority to intervene," Jacobson says. For example, the report says the Flint Department of Public Works asked MDEQ about adding phosphate as a corrosion control agent to the water, but MDEQ advised that such a decision would be made after completing two six-month monitoring periods. That practice was in violation of the federal Lead and Copper Rule, the authors say. To address the problem, the report recommends changes to emergency manager laws, which include explicit requirements that: emergency managers consider the public's health in decision-making, local public opinion is considered, states develop a rigorous process for public participation and engagement in decisions once an emergency manager is appointed, and cost is prohibited from being the primary factor in decisions directly affecting public health and safety. Other suggestions include a mandate that emergency managers consult with appropriate experts when proposing changes, and replacing a single-person emergency manager with a three-person team comprised of a financial expert, a local government operations expert, and a local ombudsman. The report also called on the EPA to more closely examine "the culture of a state environmental agency" before granting primary supervision and enforcement responsibility for public water systems. In general, the report says public health agencies and local officials should be more involved in regulating major public water supplies. To accomplish this, the report calls on state environmental laws to require additional local health department participation in permitting processes. The authors add that local health departments would need adequate funding to perform this function. The report singles out making new treatment determinations as an example where a local health department should be directly involved and carefully monitoring all associated health indicators, such as whether to install corrosion controls. Separately, the report also calls on state environmental agencies to develop regulations requiring coordination with state and local health departments regarding actions to be taken and when to notify the public of an environmental disease outbreak. In the Flint crisis, the report authors say the primary problem was with implementation, rather than the structure of the state's public health code. As such, addressing the implementation failures should be a priority for avoiding future similar crises, the authors explain. On the science side, the authors say public health officials should focus lead prevention efforts "further upstream," as opposed to waiting to respond to elevated lead levels in residents. As an example, the authors say the law should be structured so that tap-water sampling is conducted in potentially affected homes, rather than waiting for individual results to show elevated lead levels in a person's bloodstream. In addition, the report calls on public health agencies to recognize and weigh the risks of delaying action when making decisions. "For example, the [local health department] failed to declare an emergency in Flint immediately upon learning of the extent of the crisis, thus delaying availability of needed resources and response efforts," Jacobson says. Looking forward, the authors say they cannot suggest that adequate legal preparedness would have avoided the crisis. "But we suggest that the lack of legal preparedness compounded the other failures detailed in this and other reports," Jacobson writes. Source: University of Michigan School of Public Health, sph.umich.edu. 1 "Learning from the Flint Water Crisis: Protecting the Public's Health During a Financial Emergency," University of Michigan School of Public Health, January 2018. http://www.debeaumont.org/wordpress/wp-content/uploads/FlintReport.pdf (March 19, 2018). 2 K. Riggs Larsen, "The Science Behind It: Corrosion Caused Lead-Tainted Water in Flint, Michigan." MP, June 7, 2016. http://www.materialsperformance.com/articles/material-selection-design/2016/06/the-science-behind-it-corrosion-caused-lead-tainted-water-in-flint-michigan (March 19, 2018). 3 B. DuBose, "U.S. House Panel Concludes State, Federal Failures behind Flint." MP, Feb. 1, 2017. http://www.materialsperformance.com/articles/material-selection-design/2017/02/us-house-panel-concludes-state-federal-failures-behind-flint (March 19, 2018).
{ "redpajama_set_name": "RedPajamaC4" }
3,720
Video gallery Administrative procedures Business registration Photo gallery The National Assembly Deputies People's Committee Districts, cities, towns Departments, branches Department of Home Affairs Department of Industry and Trade Department of Planning and Investment Department of Natural Resources and Environment Department of Agriculture and Rural Development Department of External Relations Department of Education and Training Department of Information and Communications Department of Construction Department of Labor War invalids and Social Affairs Department of Culture, Sports and Tourism The Inspectorate The Board of Ethnicities Government > Organization structure > People's Committee People's Committee People's Committee of Lam Dong Province I. Address: Address: 04 Tran Hung Dao Street - Da Lat City - Lam Dong Province. Tel: (84.63).3822307 Fax: (84.63).3821138 Email: ubnd@lamdong.gov.vn Website : http://ubnd.lamdong.gov.vn II. People's Committee of Lam Dong Province (2011 - 2016) 1. Mr. Nguyen Xuan Tien 2. Mr. Doan Van Viet 3. Mr. Nguyen Van Yen 4. Mr. Pham S 5. Mr. Tran Ngoc Liem 6. Mr. Nguyen Duc Hiep 7. Mr. Truong Van Dung 8. Mr. Nguyen Van Hung 9. Mr. Phan Van Da 10. Mr. Phung Khac Dong Member of the People's Committee III. Introduction 1. The People's Committee of Lam Dong Province (hereinafter referred as PPC) is the executive agency of the Provincial People's Council and the State administrative agency at local level. It is responsible for executing and carrying out State management at local level in accordance with the Constitution, law and documents of State agencies at higher levels and resolutions of the Provincial People's Council. 2. PPC is organised and operates under the principle of democratic centralism with collective leadership and each individuals being charged of each working aspect in implementation of assigned duties. 3. In its operation, PPC coordinates closely with the Provincial Committee of Viet Nam Fatherland Front, public unions and other social organisations in taking care of and protecting benefits of the local people, and in mobilising the local people to participate in State management and implement duties of citizenship. IV. Regulations on Working Relationships of Lam Dong People's Committee 1. Working policy of the Provincial People's Committee. PPC is composed of nine members, including one Chairman, three Vice Chairpersons and five members. PPC works under the principle of collective leadership to ensure the integrated management of PPC and the management of PPC Chairman. Chairman is the head of PPC who is charged of overall leadership and takes responsibility before the Provincial People's Council and the Central Government. Other members of PPC take personal responsibility for their own tasks before the Provincial People's Council, PPC and PPC Chairman. PPC members take part in collective discussions and make decisions by majority on issues within the duties and rights of people's committees at provincial level as regulated in Articles 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, and 96 of Chapter IV, Law on the Organisation of People's Council and People's Committees dated 26 November 2003. PPC meets at least once per month. PPC's decisions must be approved by more than a half of PPC's members. PPC members take part in collective discussions and decide by majority on the following issues: - The province's socio-economic development plans, budget estimate, annual budget accounts and reserve funds that will be submitted for the decision of the Provincial People's Council. - Plans for investing in major construction projects in the province that will be submitted for the decision of the Provincial People's Council. - Plans for mobilising human and financial resources to deal with the province's urgent issues that will be submitted for the decision of the Provincial People's Council. - Schemes for establishing, incorporating and dissolving specialised agencies and State-owned enterprises; organisation options of personnel under the PPC's management; and the demarcation and modification of the boundaries of local administrative divisions. 2. Duties and rights of PPC Chairman. PPC Chairman leads and runs the operation of PPC and has duties and rights as stipulated in Article 127 of Law on the Organisation of People's Councils and People's Committees dated 26 November 2003 as follows. - To lead the operation of PPC, other members of PPC, and specialised agencies of PPC. To decide on issues within the duties and rights of PPC excepts for the issues regulated in Article 124 of Law on the Organisation of People's Councils and People's Committees dated 26 November 2003. PPC must conduct collective discussions and make decisions by majority. - To supervise, speed up and inspect specialised agencies under PPC and people's committees at lower levels during their implementation of the Constitution, law, documents of State agencies at higher levels, resolutions of the Provincial People's Council, and decisions and instructions of PPC. - To apply measures for innovating administrative procedures and ways of working; to manage and run effectively PPC's mechanism. To prevent and resolutely fight red tape, imperious attitudes, abuse of rights, corruption, waste and other negative actions at governmental agencies, of governmental officials and in governmental mechanisms at all levels. - To ratify results of electing members of people's committees of districts and cities (hereinafter referred as district people's committees). To transfer, suspend, exonerate and dismiss chairpersons and vice chairpersons of district people's committees; To ratify the suspension and exoneration of other members of district people's committees. To appoint, exonerate, transfer, dismiss, reward and punish governmental officials as authorised. - To convene and chair monthly, quarterly and annual working sessions of PPC; weekly review meetings and daily idea exchanges with Vice Chairpersons. - To meet with the people, to consider and solve recommendations, complaints and accusations of citizens as regulated by law. - To postpone the implementation or to abrogate wrong documents of specialised agencies under PPC. - To postpone the implementation of illegal resolutions of district people's councils and ask for the abrogation of the Provincial People's Council. - To direct the application of measures for dealing with urgent and unplanned tasks in preventing and fighting natural disasters, fire, explosions and epidemics, and in protecting security and order. Those actions will be reported to PPC in its latest session. - To issue decisions and instructions to realise Chairman's duties and rights. 3. Working relationships between PPC Chairman and PPC Vice Chairpersons and members PPC Chairman and Vice Chairpersons are charged of working aspects as stipulated in Decree No.107/2004/ND-CP dated 1 April 2004 of the Government. PPC Chairman assigns tasks to Vice Chairpersons and other members of PPC. PPC members are assigned to be charged of the following working aspects. a. PPC Chairman: To conduct overall leadership. To directly monitor mechanism organisation and personnel, security and national defense, internal politics, planning and investment, budgeting; medium and long-term plans, religions, corruption prevention and fighting, administrative reform, foreign affairs, emulation and reward, and punishment. To approve investment intentions, and to grant investment certificates or decisions for projects listed in Group A. To concurrently hold some positions in provincial steering boards or specialised councils as decided by PPC Chairman. To be in charge of and supervise the following departments and agencies: Department of Planning and Investment, Provincial Inspectorate, Department of Home Affairs, Pubic Security, People's Procuratorate, People's Court, Department of Justice, Military Command, Investment-Trade-Tourism Promotion Centre, Traffic Safety Board, Corruption Prevention and Fighting Steering Board, Legal Consulting Council. To monitor and give direction to areas of Da Lat city, Bao Loc city and Don Duong district. b. Vice Chairpersons: Vice Chairpersons assist Chairman and implement tasks as assigned by Chairman. - Permanent Vice Chairperson: To monitor agriculture and rural development; ethnic affairs; natural resources and environment; industry and trade; electricity; construction; transportation; solution of complaints and accusations; food and storm prevention and fighting, rescue and relief; water supply and drainage; investment, fundamental construction, compensation and site clearance for programs and projects belonging to the above-mentioned working aspects (including capital from the budget, outside the budget and foreign-invested capital); site clearance and compensation policies and tasks; general affairs of PPC. To concurrently hold some positions in provincial steering boards or specialised councils as decided by PPC Chairman. To be in charge of and supervise the following departments and agencies: People's Committee Office, Statistics Office, Department of Agriculture and Rural Development, Department of Natural Resources and Environment, Department of Industry and Trade, Department of Construction, Department of Transport, Electricity of Lam Dong, Board of Ethnic Affairs, Industrial Zones Authority, Land Fund Development Centre, Managing Board of Biduop - Nui Ba National Park, Flood - Storm Prevention and Fighting and Rescue - Relief Steering Board, Forest Protection and Forest Fire Prevention and Fighting Steering Board, Permanent Vice Chairperson of Legal Consulting Council. To monitor and give direction to areas of Cat Tien, Da Teh and Da Huoai. - Vice Chairperson in charge of culture, sports and tourism, labour, war invalids and social affairs, health care, education and training, media, radio and television, information and communications, science and technology; investment, fundamental construction, compensation and site clearance for programs and projects belonging to the above-mentioned working aspects (including capital from the budget, outside the budget and foreign-invested capital). To concurrently hold some positions in provincial steering boards or specialised councils as decided by PPC Chairman. To be in charge of and supervise the following departments and agencies: Department of Labour, War Invalids and Social Affairs, Department of Education and Training, Department of Health Care, Department of Culture - Sports - Tourism, Department of Information and Communications, Department of Science and Technology, Radio and Television Station, Social Insurance, Red Cross Association, Managing Board for Cultural and Sports Zone Investment and Construction Project, Managing Board of Tuyen Lam Lake Tourist Zone, Military Education Council. To monitor and give direction to areas of Di Linh, Bao Lam and Dam Rong. - Vice Chairperson in charge of finance, tax, treasury, banking, customs, collective economy, private economy, innovation and development of enterprises; investment, fundamental construction, compensation and site clearance for programs and projects belonging to the above-mentioned working aspects (including capital from the budget, outside the budget and foreign-invested capital). To monitor policies and general affairs relating to investment from sources outside the State budget, ODA and FDI. To concurrently hold some positions in provincial steering boards or specialised councils as decided by PPC Chairman. To be in charge of and supervise the following departments and agencies: Department of Finance, Tax Office, State Treasury, State Bank - Lam Dong Branch, Development Bank - Lam Dong Branch, Social Policy Bank - Lam Dong Branch, commercial banks, Da Lat Customs Office, Enterprise Innovation and Development Steering Board, Provincial Cooperative Alliance. To monitor and give direction to areas of Duc Trong, Lac Duong and Lam Ha. c. Members of PPC: - One member who is in charge of Public Security and coordinates in monitoring areas of Da Lat city, Bao Loc city and Don Duong district. - One member who is in charge of military affairs and coordinates in monitoring areas of Dam Rong, Di Linh and Bao Lam districts. - One member who is in charge of internal affairs and coordinates in monitoring areas of Lac Duong, Duc Trong and Lam Ha districts. - One member who is in charge of Department of Planning and Investment and coordinates in monitoring areas of Da Hoai, Da Teh and Cat Tien districts. - One member who is in charge of PPC Office and coordinates with Provincial Party Committee Office, Office of National Assembly Delegation of Lam Dong and Provincial People's Council. - Based on practical situation and concrete requirements of tasks, the assignment of members of PPC is subject to change to meet new requirements. d. Within their assigned work, Vice Chairpersons have the following concrete duties and rights: - Vice Chairpersons are assigned to be charged of each aspect and act on behalf of Chairman in supervising, speeding up and checking the operation of departments, agencies, and people's committees at district and commune level; To direct the implementation of resolutions and decrees of the Government, decisions and instructions of the Prime Minister, instructions and circulars of ministries and Government agencies and of PPC and PPC Chairman. - To act on behalf of Chairman in authorised aspects to decide on and deal with daily issues and work within the assigned authority. After those work are solved, Vice Chairpersons must report directly or in document to Chairman. Issues under the authority of PPC Chairman and still waiting for a collective decision of PPC must be reported to the Chairman before being solved. - Vice Chairpersons proactively solve their assigned work. If there is any work that is relevant to aspects being charged of by another Vice Chairperson, Vice Chairpersons proactively coordinate with each other for solution. - To consider projects, drafts and resolutions before submitting them to PPC Chairman or the Provincial People's Council. - In the absence of Chairman, one Vice Chairperson will be authorised by Chairman to run the operation of PPC. - PPC Chairman takes responsibility for decisions made by Vice Chairpersons relating to their implementation of duties assigned by Chairman. - Vice Chairpersons take responsibility before Chairman for decisions signed by them within their assigned working aspects and duties. - Chairman and Vice Chairpersons conduct daily idea exchange with leaders of PPC Office to deal with information and work. e. Other members of PPC act as members of PPC when they take part in collective decision making of PPC. These members are subject to the direction of PPC Chairman and Vice Chairpersons. Members of PPC who are concurrently directors of departments or hold equivalent positions work in line with relationship policy between PPC and department directors, and also work as members of PPC. f. Chief of PPC Office is a member of PPC who is responsible for: - Assisting PPC Chairman and Vice Chairpersons in mastering operational situation of PPC, PPC members and agencies at all levels. - Preparing and submitting PPC's working programs for PPC's approval. - Validating projects or documents to ensure administrative terms and conditions before submitting for the approval of Chairman or PPC. - Maintaining integrated management of the issuing of PPC's documents. - Organising the publicity and explanation (once being authorised) and checking the implementation of legal documents issued by the Government, Prime Minister and PPC. - Dealing with concrete work as authorised by PPC Chairman. - Assisting PPC in coordinating and organising working relationships with agencies of the Party, People's Council, Viet Nam Fatherland Front and provincial unions. 4. Relationships between PPC and Party Committee, Standing Commission of Party Committee and permanent members of Party Committee. - To ensure the leadership of the Provincial Party Committee, Chairman and Vice Chairpersons of PPC meet periodically with permanent members of the Provincial Party Committee (in accordance with working regulation of the Provincial Party Executive Committee and work assignment in the Standing Commission and permanent members of the Provincial Party Committee). PPC and PPC Chairman manage issues under concrete functions and authority of PPC as regulated by law. - For major projects, important guidelines and policies, issues relating to mechanism organisation and personnel that are under the management of the Provincial Party Committee and subject to be submitted for the decisions of the Provincial People's Council or State agencies at higher levels, PPC assigns members to prepare for reporting to permanent members and Standing Commission of Provincial Party Committee. 5. Relationship between PPC and permanent members of Provincial People's Council The relationship between PPC and the Provincial People's Council, permanent members and boards of Provincial People's Council is maintained as stipulated in Chapter II, Law on the Organisation of People's Councils and People's Committees dated 26 November 2003 as follows. - PPC coordinates with the Provincial People's Council to prepare for sessions of Provincial People's Council. - PPC prepares reports, recommending documents and draft programs. - PPC coordinates with permanent members of Provincial People's Council in deciding on whether to ask electors about the exoneration of Provincial People's Council members following the proposal of Standing Board of Provincial Committee of Viet Nam Fatherland Front. - PPC provides permanent members, boards and members of the Provincial People's Council with necessary documents relating to the duties and contents of sessions of Provincial People's Council; coordinating with boards of Provincial People's Council in preparing programs; and receiving, studying and executing recommendations of boards and members of Provincial People's Council. - PPC invites representatives of permanents members and heads of boards of Provincial People's Council to participate in PPC's meetings on related issues. - PPC frequently and proactively maintain the relationship with permanent members of Provincial People's Council, informing permanent members of Provincial People's Council of decisions and instructions of PPC for the supervision of those members as regulated by law. 6. Relationship between PPC and State agencies at higher levels. - PPC is subject to the comprehensive leadership of the Government and the Prime Minister. It is responsible for organising the implementation of resolutions, decrees, decisions and instructions of the Government and Prime Minister, and instructions, decisions and circulars of ministries and agencies. PPC makes periodical reports to the Government and ask for the Government's direction in dealing with the province's important issues. PPC is subject to the inspection of the Government in all aspects of the province's State management. - PPC works under the supervision and receive ideas of the National Assembly Delegation of Lam Dong during its execution of State law. - PPC creates favourable conditions for members of the Government, ministries, ministry-level agencies, Government agencies who go on business in the province to implement their planned work and programs. 7. Relationship between PPC and sepcialised agencies under PPC and people's committees of provincially governed districts and cities. - The positions, functions and duties of specialised agencies under PPC are defined as stipulated in Articles 128, 129 and 130 of Law on the Organisation of People's Councils and People's Committees dated 26 November 2003 as follows: - Departments and agencies are specialised units under PPC which make recommendations to PPC to implement State management in specialised sectors in the province. Those agencies are subject to the professional instruction and direction of ministries and ministry-level agencies. People's committees of districts and cities are State administrative agencies which carry out State management in each region to ensure the integrated management in State administrative mechanism from provincial to grassroots levels. - Directors of departments and agencies under PPC take responsibility before PPC and assist PPC in carrying out State management in the province in each professional sector that those departments and agencies are in charge of. During the solution of issues that are under its own authority but relevant to the functions, duties and rights of other departments and agencies or district people's committees; the director of this department or agency must proactively consult with the related agencies or people's committees. The directors of departments or chairpersons of district people's committees who are consulted should give responses and coordinate in dealing with relevant issues. - Directors of departments and agencies and chairpersons of district people's committees sign and take responsibility for contents and deadlines of regular and unplanned reports submitted to PPC. Contents of recommending documents and reports must include ideas and proposed solutions of specialised agencies and local authorities. - Concrete issues that are discussed by directors of related agencies and chairpersons of district people's committees but are not agreed upon must be reported for the decision of PPC Chairman. - For important inter-disciplinary issues, PPC Chairman shall direct the establishment of a council or sub-committee including related directors or deputy directors and chairpersons to deal with. Periodically or unexpectedly, Chairman and Vice Chairpersons of PPC meet and talk with departments, agencies and people's committees of districts and cities to listen to reports and direct the solution of urgent issues at the grassroots level. - If necessary, directors of departments and agencies can register to meet with Chairman or relevant Vice Chairperson of PPC to report and ask for direction. - Chairman and Vice Chairpersons of PPC do not directly deal with issues that are under the authority of directors of departments and agencies, and chairpersons of people's committees of districts and cities. 8. Relationships between PPC and Provincial People's Procuratorate and Provincial People's Court. PPC expresses frequent concern and directs its specialised agencies to coordinate with the Provincial People's Procuratorate and Provincial People's Court in strengthening inspection, executing the Constitution and law, implementing measures for preserving assets of agencies and organisations as well as protecting life, freedom, honour, human dignity, property and other legal rights and benefits of citizens, and enforcing legal sentences in the province with an aim of enhancing socialist legality. 9. Relationships between PPC and the Provincial Committee of Viet Nam Fatherland Front, public unions and socio-political organisations. - PPC coordinates with the Provincial Committee of Viet Nam Fatherland Front, public unions and social organisations in mobilising the people and union members to take part in emulation movements, building and consolidating people's government, implementing the Party's guidelines and policies and State's law, and supervising the performance of State agencies and governmental officials. - PPC invites representatives of the Standing Board of Provincial Committee of Viet Nam Fatherland Front and leaders of affiliated organisations of the Fatherland Front to attend plenary sessions of PPC and other meetings relating to activities of the Fatherland Front and unions. - PPC has plans to meet with the Provincial Committee of Viet Nam Fatherland Front and public unions to coordinate work and facilitate the Committee and unions to monitor activities of local State agencies. PPC and members of PPC are responsible for giving responses to recommendations of the Provincial Committee of Viet Nam Fatherland Front and public unions. V. Regulations on Concrete Work 1. Preparation of PPC's work programme. PPC has its annual, six-month and monthly work programmes. After being prepared by PPC Office, PPC's work programmes are discussed and decided collectively by PPC. Based on monthly work programmes of PPC and monthly and weekly work programmes of the Provincial Party Committee, PPC Office prepares weekly work schedules of Chairman and Vice Chairpersons. 2. Preparation of programs and legal documents for submitting to PPC. a. The submission to PPC must be conducted as follows. - Directors of departments/agencies and chairpersons of district people's committees make thorough preparations and take responsibility for submitted contents as regulated. If those top leaders authorise their deputies to sign recommending documents, they still take responsibility for contents of the documents signed by their deputies. - PPC Office only submits to PPC the following issues/documents: + Items signed by directors of departments and agencies or their authorised persons. Legal documents must be verified by the Department of Justice before being submitted. + Items submitted by directors of departments/agencies or chairpersons of district people's committees that are related to other departments/agencies/committees and already include ideas in document of those relevant departments/agencies/committees. + Documents registered at the Archiving Division of PPC Office. b. Directors of departments and agencies draft and take responsibility for the content and formality of draft programs and documents submitted to PPC in their charged discipline or sector. Important issues relevant to many disciplines or levels, covering many aspects or having complicated contents shall be prepared by a working team or sub-committee as nominated by PPC. c. During preparation of programs or draft documents, directors of the main departments and agencies have the following rights: - To invite directors/chairpersons of relevant departments/agencies/district people's committees to meet and discuss. The invited agencies are responsible to take part in as requested. - To send drafts to directors/chairpersons of relevant departments/agencies/district people's committees to consult their opinions. Directors/chairpersons of relevant departments/agencies/committees are responsible for giving response in document. After the set deadline, if the consulted agencies do not give any response, they will be considered agree and must take responsibility for the consulted issue. Recommending documents of directors of the main departments/agencies which is in charge of programs or draft documents must include official ideas of directors/chairpersons of relevant departments/agencies/district people's committees. d. For a maximum of 15 days since documents recommending a program or draft document are received, PPC Office must complete verification and submit to PPC Chairman or PPC. Chief of PPC Office reserves the right to request the key agency to clarify or supplement drafts. e. Based on the essence of each program or document, PPC Chairman (Or a Vice Chairperson) shall directly listen to the explanation of director of the drafting department/agency or relevant agencies to ensure sufficient grounds for the discussion and accurate decision of PPC. In the presence of different ideas and in necessary circumstances, PPC will chair a meeting with directors of relevant departments/agencies to reach final agreement or clarify viewpoints. f. For a maximum of 03 days prior to a plenary session of PPC, Chief of PPC Office must submit program dossiers to PPC Chairman. PPC Chairman only puts on the session's agenda programs or drafts that are thoroughly prepared. 3. Meeting policy of PPC. a. Regular plenary sessions of PPC are conducted once per month on the last days of a month. PPC Chairman convenes extraordinary sessions if he/she considers necessary. PPC Chairman chairs PPC's sessions. In the absence of Chairman, an authorised Vice Chairperson shall chair the session. PPC's sessions aiming at voting important issues must be attended by at least 2/3 members of PPC. PPC members are responsible for participating in all sessions of PPC and requesting Chairman in advance for leaves of absence. - In addition to regular plenary sessions, in order to give prompt direction to frequent and unplanned work, PPC Chairman or Vice Chairpersons host specialised meetings with departments, agencies and district people's committees to discuss and deal with concrete issues. - Chairman and Vice Chairpersons have internal meetings every Friday to listen to weekly reports made by PPC Office and reach agreement on solutions for arising issues. - The agenda of PPC's regular sessions, program dossiers or draft documents intended to be approved at PPC's sessions must be sent to members of PPC at least three days prior to the sessions. b. PPC invites representatives of permanent members of the Provincial People's Council to attend its regular sessions. It also invites Chairman of the Provincial Committee of Viet Nam Fatherland Front, leaders of departments/agencies and unions, chairpersons of district people's committees to attend PPC's sessions that are aimed at discussing issues related to those agencies. c. A PPC's regular session is conducted as follows. - Chief of PPC Office reports on absent and present members of PPC and invited attendants. - Chairperson of the session introduces agenda and identify order of issues put forward for the discussion and decision of PPC. - Director of Department of Planning and Investment coordinates with Chief of PPC Office to prepare and present on socio-economic situation reports and draft of upcoming duties and solutions. - Directors of departments/agencies which take main responsibility for a program or draft document explain in brief issues in need of opinions. - PPC members express their opinions and clarify if they agree or disagree with a certain point in the program or draft. - Directors of departments/agencies which take main responsibility for a program or draft document answer or explain details requested by PPC members and other attendants. - Chairperson summarises and makes conclusions. d. For issues considered unnecessary or unable to be presented at regular sessions, PPC Chairman directed Chief of PPC Office to send draft documents and request opinions of each member of PPC, then summarise and submit for the decision of PPC Chairman who will report to PPC in the latest session. e. Every three months (except for unexpected cases), PPC meets with directors of departments/agencies and chairpersons of district people's committees to review the implementation of socio-economic targets and guidelines, decisions and instructions as well as to discuss upcoming work. f. Departments and agencies which want to organise wrap-up conferences or meetings chaired by PPC must report and get the approval of PPC Chairman or relevant Vice Chairperson in advance. Those directors must prepare contents and conditions to organise such meetings. 4. Procedures for issuing legal documents and administrative documents under the authority of PPC. - For a maximum of three days after plenary sessions of PPC, Chief of PPC Office must submit documents dealing with issues related to contents of those sessions for the signature of PPC Chairman or Vice Chairpersons. - PPC Chairman signs legal documents issued by PPC. - PPC Vice Chairpersons are authorised to sign on behalf of Chairman some documents under Chairman's responsibility. Vice Chairpersons charged of each working sector are authorised by Chairman to sign some documents directing concrete work in that sector to speed up and instruct the implementation of PPC's guidelines and decisions. - Chief of PPC Office is authorised to sign on behalf of PPC and PPC Chairman in dealing with concrete administrative work that is not under the authority of any Vice Chairperson; documents announcing directions, statements or conclusions of Chairman (or Vice Chairpersons) on issues relating to PPC's management for the implementation of relevant agencies and levels; duplicates of documents issued by State agencies at higher levels and PPC; invitations and introductions of PPC. - Legal documents; and recommending documents and reports sent by PPC to the Government or State agencies at higher levels must be considered and initialed by Chief of PPC before submitting to PPC Chairman. - Instructing documents of departments and agencies must be prepared simultaneously with drafted legal documents of PPC for ready implementation once those drafts are issued. 5. Inspection, checking and meeting with the people to deal with complaints and accusations. - PPC Chairman and Vice Chairpersons periodically meet with the local people as scheduled by PPC Office. PPC Office coordinates with the Provincial Inspectorate to organise and realise people-meeting schedules, assisting PPC to deal with complaints and accusations of local citizens in accordance with current State's law. - Members of PPC and directors of departments/agencies are responsible for inspecting and checking levels, sectors and units at the grassroots level during implementation of decisions and instructions of the Government and PPC. They must directly consider and assign affiliated units to deal with recommendations, complaints and accusations of citizens on issues under their authority and responsibility. 6. Policies for working with the grassroots level. - PPC Chairman spend much time on working with chairpersons of district people's committees and directors of departments/agencies to check and direct work. If a Vice Chairperson is authorised to work with those departments/agencies/committees, opinions and decisions made by this Vice Chairperson will be considered opinions and decisions of PPC Chairman. - Directors of departments and agencies must proactively and directly work with chairpersons of district people's committees to help solve issues in their charged sectors and to strengthen State management in the region. Home Check mail Feedback Post topic Download LAM DONG PORTAL Management agency: Center Manage electronic information, of the Department of Information and Communications Main responsible: Mr. Nguyen Viet Van - Director of Department of Information and Communications Address: 36 Trần Phú, Ward 4,Da Lat city Tel: 0263.3545579 - Fax: 0263.3545455 - Email: contact@lamdong.gov.vn Write www.lamdong.gov.vn using the information on this website
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
623
A young girl was raped and beaten to death with a brick during a sickening s-x attack in India, according to reports. The girl, who has not been identified, was found in a pool of blood and had visible bruises on her shoulder, waist, chest and back, the Hindustan Times reported. She had been raped with a wooden instrument and suffered from severe internal injuries.
{ "redpajama_set_name": "RedPajamaC4" }
1,190
An event organized by Cosmopolitan-Russia magazine has set new Guinness World Record on «Riviera» beach in Sochi! Around 2000 girls in bikini have formed huge "COSMO.RU" for Cosmopolitan commercial just yesterday, on July 19. With this event, Cosmo-Russia took relay passed to them over by Cosmo-Australia, which set previous record of organizing 1010 women to spell out "COSMO" on one of the Austraila's beaches, and creating a new category in the Guinness World Record book. Some early reports last night talked about 1602 ladies and "ruCosmo" being spelled out. But the official CosmoRussia blog says that around 2000 ladies were registered (exact number will be announced after all lists are compared). All girls who participated in the event received gifts — red bikini and bag with a letter they were part of during this event. Here are a few photos from the event posted on the CosmoRussia.ru, and you can find a lot more in hi-res on their official blog. And if you here only for photos of girls in bikini, you can check out Austraila's event photos here. Archeologists believe this church was build by Greeks who were trying to convert locals to Christianity. However, when Byzantine Empire got weaker, the church was abandoned. Looking at the video clip by local TV agency «Kuban» there appears not much left of it. However, archeologists, and students from Sochi colleges who are helping out, have found some remains and ancient objects which were turned over to specialists for study. The locals were visiting this church (or whatever was left of it, anyways), which they call Church of Saints Constantine and Elena, for a long time, and on the big holidays priest comes over for church services – this is not surprising, as Lesnoe is all Greek village. Archeologists started working on this location a year ago. New Sochi – Novorossiysk sea route has been recently lunched for summer season. It will operate daily, except Mondays, between June 15th and August 31st. The hydrofoil (called Kometa, or Comet, in Russian ) trip lasts approximately 3 hours, and the ticket prices are: adult ticket is around $60 (1365 rubbles); kids older than 5yrs old – around $45 (1023 rubles), and kids under five with parents ride for free. Btw, there are also daily buses going from Novorossiysk to Sochi, two leaving in the morning (7:50 & 10:50), and one at night (21:50). Information phone number: (8617)-64-42-79.
{ "redpajama_set_name": "RedPajamaC4" }
4,983
Lincoln Navigator L Fuel Cell Cars Bi-xenon headlamps with automatic washer, LED interior lighting Central console with highly sophisticated design Four-LED clusters headlights Front and rear Park Distance Control (PDC) Illuminated C-bar Six-way power front, multilevel heated front sets and rear seats Automobiles: Fuel Type 217 – 234 of 2,604 for: "Rear Parking Aid" The 2016 Chevrolet Tahoe remains a solid choice for family recreation and towing, making for an easy-driving and modern-looking SUV with some nice tech features, but it doesn't leap ahead of the competition. 2016 Bentley Continental GT Well-heeled buyers who eschew chauffeurs will find the 2016 Bentley Continental GT V8 S an engaging and powerful car, suitable for long trips, but they should consult their phones for navigation. The new engine option is a nice evolution, but only adds a small improvement to the already excellent 2017 Ford Escape. However, seemingly smaller tech changes, like the addition of Sync Connect, Android Auto, CarPlay and a few driver aid features, make a much larger impact. The 2016 Ford Escape exhibits all the practicality of a small SUV and offers an excellent driving experience, with get-in-and-go ease. The new Sync 3 infotainment system responds as well as any tablet or smartphone, and its AppLink feature promises interesting future capabilities from third-party developers. Although lacking well-integrated connected features, the 2015 Cadillac ATS Coupe makes a worthy rival to its European competition, and should be a top consideration for anyone interested in a sport-luxury coupe. It's hard not to have fun in the Lexus GS F, but it's not exactly making a case for itself. The competition provides more of what interests today's luxury sports sedan buyer. In the right conditions -- i.e., on a great canyon road -- the Stelvio Quadrifoglio excels. But as a daily driver, it's a really tough sell. When it comes to mammoth luxury SUVs, the Cadillac Escalade ESV and new Lincoln Navigator L are slugging it out for the top spot in the segment. The 2017 Mini John Cooper Works Clubman can be a lot of fun on a twisty mountain road, but its high price suggests dropping down to the Cooper S Clubman, which will likely be just as satisfying. Not the most thrilling three-row SUV, but one that's reliable and should last until the kids are grown and out of the house. If you expect to go off-road, the Trailhawk is a great choice. However, if you plan to stay in civilization, the top-of-the-line Overland trim line may be the better choice. Whether you're rock crawling or mall crawling, the Land Cruiser is more than ready to deal with whatever you're throwing at it, and it will do so with the aplomb of its fancier competition. If you can't decide between sporty or cushy, the 2016 Nissan Altima is a wonderful middle ground that can give drivers a bit of both. Enthusiasts who like to carve up the twisties should look elsewhere, but those who need comfortable transportation should be satisfied. With many tech touches in the cabin and a comfortable ride, the 2014 Toyota Highlander works well for the modern family, but it won't win any prizes for fuel economy. The 2014 Silverado High Country is a big, beefy truck that boasts a level of standard and optional tech and amneities that's nearly comparable with one of GM's luxury sedans. The 2014 Kia Sorento works best as a five-passenger crossover, and includes a few high-tech features, such as an efficient engine and smartphone-linked telematics, that give it an edge over competitors. Prev 1 ... 11 12 13 14 15 ... 145 Next
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
2,406
Several users have complained about the issue on Apple's support forums. Just about two weeks back, Apple started rolling out iOS 12 to eligible devices. The final release of iOS 12 is mostly stable, since most issues have been fixed in preceding beta versions. However, at the end of the day, it's software, and bugs can always crop up. One such bug, regarding the 'unified thread' functionality of Apple's iMessage service, has reportedly been troubling users with devices running iOS 12. According to Beebom, the bug causes chat threads with different contacts to be unintentionally merged. Several users have complained about the issue on the official Apple discussions page. The 'unified thread' feature is originally intended to merge multiple chat threads from a single contact together. This is beneficial when the contact uses multiple Apple devices, but it seems the feature has caused a new issue to crop up. Since the bug is mostly related to accounts sharing a common 'Apple ID', many users on Apple's discussion forums have suggested created multiple Apple IDs. However, this isn't exactly an ideal solution. Apple hasn't responded to user complaints regarding the issue so far, but we expect the company will fix the bug with an update to iOS 12 soon. iOS 12 introduces many new features and enhancements. These include 'Siri Shortcuts', 'Stacked Notifications', 'Screen Time' (similar to Google's 'Digital Wellbeing'), AR-related enhancements, and more.
{ "redpajama_set_name": "RedPajamaC4" }
3,202
You are here: Home / Articles & Art / Telling Tigers Apart - The Syncrossus Genus Video: Clown Loaches at Feeding Time Fishes of the genus Botia in the Indian Region - part 1 Telling Tigers Apart - The Syncrossus Genus by Martin Thoene — last modified Sep 11, 2007 06:45 AM An article describing the differences between members of the genus Syncrossus and how to identify them. Originally written as "The Tiger Botias of the Hymenophysa Group" by Kamphol Udomritthiruj. Revised with nomenclature changes and updates by Martin Thoene, (November, 2006) This article is intended to help the aquarist visually key and identify loaches that, excluding body patterns, are very similar in morphology and meristics. That is, the measurements (fin rays, lengths, depths, counts, etc.) in this group of loaches have enough variation as to overlap and statistically be indistinct from each other. These would include the Syncrossus species hymenophysa, helodes, beauforti, berdmorei, reversa, and an unidentified species (cf. berdmorei) pictured here for the first time anywhere outside Thailand. The only easy distinguishing characteristics between these species are their body colors and markings. About eleven years ago, I wrote an article entitled "The Tiger Botia, B. hymenophysa (Bleeker, 1852) or B. helodes Sauvage, 1876?" for the Greater Seattle Aquarium Society's publication Northwest Aquaria (Vol. 11, 1989). It seems strange that after all this time nothing has changed much in the misidentification (in the aquarium trade and literature) between the now re-named Syncrossus helodes and S. hymenophysa. This is largely due to popular aquarium literature which usually has S. helodes labeled as Botia (Syncrossus) hymenophysa. In the revision of Indochinese fishes described by the nineteenth century ichthyologist Henri-Emilé Sauvage (1844-1917), Kottelat (1984) revalidated the status of Botia helodes as being distinct from B. hymenophysa. In his 2004 revision of Botinae, Kottelat renamed what was then known as the Hymenophysa Complex, Syncrossus. One of the prime differences between the two loaches is their geographical distribution; Syncrossus (Botia) helodes is found in Laos, Vietnam, Cambodia, and in Thailand, whereas, S. hymenophysa is found in Indonesia (Sumatra and Borneo). To the aquarist and loach enthusiast, the body markings of the fish are more pertinent to distinguishing between the species. The major markings of each species are as follows: Syncrossus helodes Title is link The yellow to tan body is marked with 10 – 11 dark vertical stripes. The stripes between the head and the dorsal fin slant towards the tail. The dorsal fin lacks a pronounce black spot. There is, however, a black spot on the upper caudal penduncle (on the last stripe on the tail base). The body stripes lack any blue borderings. The pectoral region towards the anal region (chest and belly) lacks any striping but instead has numerous black spots Syncrossus hymenophysa The yellow to tan body is marked with 12 – 15 stripes. The stripes between the head and the dorsal fin slant towards the head. The dorsal fin has a pronounced large black spot. There is no black spot on caudal peduncle. Each body stripe is bounded on both sides by blue iridescent edges. There is no spotting on the chest to anal area, as the stripes almost reach completely down the abdomen. Below are two photographs showing examples of young individuals of both species. Syncrossus reversa Roberts (1989) described a new loach, B. reversa (Syncrossus reversa) , from the Indonesian highland streams of Borneo, Java, and Sumatra (1500 – 3000 feet). They are similar to S. hymenophysa but differ in the width of the dark stripes (12-13) and their margins, which are wider than the adjacent pale intervals. The appearance of the stripes gave Roberts the impression of seeing the reverse patterning of S. hymenophysa and therefore the etymology of reversa (Latin). The black spot on the dorsal fin is also lacking. Found in the same river systems, they are never found together (sympatric) as S. reversa are a hillstream dweller, while S. hymenophysa are lowland. Below, a picture showing individuals of S. helodes and S. berdmorei together Syncrossus berdmorei All pictures attributable to S. berdmorei in aquarium literature are of S. beauforti. S. berdmorei has (had) not been seen in the aquarium hobby as its distribution is from northern Burma, where there is (was) no aquarium-fish fishery activity. I dare say that S. berdmorei has never been photographed in aquarium literature. The only true reference we aquarists have of S. berdmorei (as Botia berdmorei) is from Day's (1878) illustration, and the poor photos of preserved specimens in Menon (1992). Here is a recently taken photograph (2006). S. berdmorei is distinguishable from S. beauforti by the larger size of the horizontal rows of spots on its sides. In S. berdmorei, the large spots generally start after the operculum (gill covers). In S. beauforti, the small spots start off more anterior and begin in the head as thin horizontal slashes that break-up, or trail-off as small spots towards the tail (usually surrounded by a light colored halo). Syncrossus cf. berdmorei The two loaches I have labeled Syncrossus cf. berdmorei (see below) were caught with a beach seine at the mouth of Mae Lamao tributary in northwestern Thailand (Mae Hong Son Province) bordering Burma, in 1992. They are significantly different from any of the other Syncrossus group loaches in both pattern and color. The body is not typical dull tan but a bright and reflective yellow/gold. The stripes are an iridescent green. Also significant are the widths of these vertical bands. Typically, all other loaches in this group have bands of constant width. In these Mae Lamao loaches, the bands alternate between typical vertical bands of constant thickness and those that taper of into a dagger-like appearance. Why I attribute these specimens as being closely associated with S. berdmorei is because of the geographic proximity to the known distribution of S. berdmorei, northern Burma. But what of the conspicuous rows of spots characteristic of S. berdmorei? The lack of those spots may be the only reason why these specimens are an undescribed species, however, look closely at the few spots/blotches behind the operculum. These may just be S. berdmorei juveniles with their spotting just beginning to develop (increasing with age). Another distinct characteristic is the large black spot on the dorsal fin which is unfounded in S. helodes and S. beauforti. In conclusion, most pictures of Syncrossus hymenophysa in aquarium literature are of S. helodes. All pictures of S. berdmorei in aquarium literature (that I have ever seen) are of S. beauforti. When this article was originally written, Kamphol believed that S. berdmorei and S. reversa had never entered the aquarium trade. Certainly, S. berdmorei has been exported in recent years. Day, F. 1876-1878. The fishes of India. London, 2 vol., 778 p., 195 pl. Kottelat, M. 1984. A review of the species of Indochinese fresh-water fishes described by H.-E. Sauvage. Bull. Mus. natn. Hist. nat., Paris, 4e ser., 6, section A, no. 3: 791-822. Menon, A.G.K. 1992. The Fauna of India and adjacent countries Pisces Vol.IV Teleostei-Cobitoidea, Pt. II, Cobitidae. ZSI Calcutta. 113 pp. Roberts, T.R. 1989. The Freshwater Fishes of Western Borneo (Kalimantan Barat, Indonesia). California Academy of Sciences, San Francisco. 210 pp. Udomritthiruj, K. 1989. The tiger Botia, B. hymenophysa (Bleeker) or B. helodes (Sauvage)? Northwest Aquaria (Publication of the Greater Seattle Aquarium Society). 11: 8-9. Syncrossus unknown 01 (possibly a color-form of S. berdmorei) Detailed explanation of the differences can be found within each species profile, along with care and other details. < Back to Species Index Syncrossus unknown01 Acanthocobitis urophthalmus
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
4,084
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> <!-- NewPage --> <html lang="en"> <head> <!-- Generated by javadoc (version 1.7.0_80) on Thu Oct 15 19:26:55 UTC 2015 --> <title>IdentityManagementActions (AWS SDK for Java - 1.10.27)</title> <meta name="date" content="2015-10-15"> <link rel="stylesheet" type="text/css" href="../../../../../JavaDoc.css" title="Style"> </head> <body> <script type="text/javascript"><!-- if (location.href.indexOf('is-external=true') == -1) { parent.document.title="IdentityManagementActions (AWS SDK for Java - 1.10.27)"; } //--> </script> <noscript> <div>JavaScript is disabled on your browser.</div> </noscript> <!-- ========= START OF TOP NAVBAR ======= --> <div class="topNav"><a name="navbar_top"> <!-- --> </a><a href="#skip-navbar_top" title="Skip navigation links"></a><a name="navbar_top_firstrow"> <!-- --> </a> <ul class="navList" title="Navigation"> <li><a href="../../../../../overview-summary.html">Overview</a></li> <li><a href="package-summary.html">Package</a></li> <li class="navBarCell1Rev">Class</li> <li><a href="../../../../../index-all.html">Index</a></li> <li><a href="../../../../../help-doc.html">Help</a></li> </ul> <div class="aboutLanguage"><em> <!-- Scripts for Syntax Highlighter START--> <script id="syntaxhighlight_script_core" type="text/javascript" src = "http://docs.aws.amazon.com/AWSJavaSDK/latest/javadoc/resources/syntaxhighlight/scripts/shCore.js"> </script> <script id="syntaxhighlight_script_java" type="text/javascript" src = "http://docs.aws.amazon.com/AWSJavaSDK/latest/javadoc/resources/syntaxhighlight/scripts/shBrushJava.js"> </script> <link id="syntaxhighlight_css_core" rel="stylesheet" type="text/css" href = "http://docs.aws.amazon.com/AWSJavaSDK/latest/javadoc/resources/syntaxhighlight/styles/shCoreDefault.css"/> <link id="syntaxhighlight_css_theme" rel="stylesheet" type="text/css" href = "http://docs.aws.amazon.com/AWSJavaSDK/latest/javadoc/resources/syntaxhighlight/styles/shThemeDefault.css"/> <!-- Scripts for Syntax Highlighter END--> <div> <!-- BEGIN-SECTION --> <div id="divsearch" style="float:left;"> <span id="lblsearch" for="searchQuery"> <label>Search</label> </span> <form id="nav-search-form" target="_parent" method="get" action="http://docs.aws.amazon.com/search/doc-search.html#facet_doc_guide=API+Reference&facet_doc_product=AWS+SDK+for+Java"> <div id="nav-searchfield-outer" class="nav-sprite"> <div class="nav-searchfield-inner nav-sprite"> <div id="nav-searchfield-width"> <input id="nav-searchfield" name="searchQuery"> </div> </div> </div> <div id="nav-search-button" class="nav-sprite"> <input alt="" id="nav-search-button-inner" type="image"> </div> <input name="searchPath" type="hidden" value="documentation-guide" /> <input name="this_doc_product" type="hidden" value="AWS SDK for Java" /> <input name="this_doc_guide" type="hidden" value="API Reference" /> <input name="doc_locale" type="hidden" value="en_us" /> </form> </div> <!-- END-SECTION --> <!-- BEGIN-FEEDBACK-SECTION --> <div id="feedback-section"> <h3>Did this page help you?</h3> <div id="feedback-link-sectioin"> <a id="feedback_yes" target="_blank" style="display:inline;">Yes</a>&nbsp;&nbsp; <a id="feedback_no" target="_blank" style="display:inline;">No</a>&nbsp;&nbsp; <a id="go_cti" target="_blank" style="display:inline;">Tell us about it...</a> </div> </div> <script type="text/javascript"> window.onload = function(){ /* Dynamically add feedback links */ var javadoc_root_name = "/javadoc/"; var javadoc_path = location.href.substring(0, location.href.lastIndexOf(javadoc_root_name) + javadoc_root_name.length); var file_path = location.href.substring(location.href.lastIndexOf(javadoc_root_name) + javadoc_root_name.length); var feedback_yes_url = javadoc_path + "javadoc-resources/feedbackyes.html?topic_id="; var feedback_no_url = javadoc_path + "javadoc-resources/feedbackno.html?topic_id="; var feedback_tellmore_url = "https://aws-portal.amazon.com/gp/aws/html-forms-controller/documentation/aws_doc_feedback_04?service_name=Java-Ref&file_name="; if(file_path != "overview-frame.html") { var file_name = file_path.replace(/[/.]/g, '_'); document.getElementById("feedback_yes").setAttribute("href", feedback_yes_url + file_name); document.getElementById("feedback_no").setAttribute("href", feedback_no_url + file_name); document.getElementById("go_cti").setAttribute("href", feedback_tellmore_url + file_name); } else { // hide the search box and the feeback links in overview-frame page, // show "AWS SDK for Java" instead. document.getElementById("feedback-section").outerHTML = "AWS SDK for Java"; document.getElementById("divsearch").outerHTML = ""; } }; </script> <!-- END-FEEDBACK-SECTION --> </div> </em></div> </div> <div class="subNav"> <ul class="navList"> <li><a href="../../../../../com/amazonaws/auth/policy/actions/GlacierActions.html" title="enum in com.amazonaws.auth.policy.actions"><span class="strong">Prev Class</span></a></li> <li><a href="../../../../../com/amazonaws/auth/policy/actions/RDSActions.html" title="enum in com.amazonaws.auth.policy.actions"><span class="strong">Next Class</span></a></li> </ul> <ul class="navList"> <li><a href="../../../../../index.html?com/amazonaws/auth/policy/actions/IdentityManagementActions.html" target="_top">Frames</a></li> <li><a href="IdentityManagementActions.html" target="_top">No Frames</a></li> </ul> <ul class="navList" id="allclasses_navbar_top"> <li><a href="../../../../../allclasses-noframe.html">All Classes</a></li> </ul> <div> <script type="text/javascript"><!-- allClassesLink = document.getElementById("allclasses_navbar_top"); if(window==top) { allClassesLink.style.display = "block"; } else { allClassesLink.style.display = "none"; } //--> </script> </div> <div> <ul class="subNavList"> <li>Summary:&nbsp;</li> <li>Nested&nbsp;|&nbsp;</li> <li><a href="#enum_constant_summary">Enum Constants</a>&nbsp;|&nbsp;</li> <li>Field&nbsp;|&nbsp;</li> <li><a href="#method_summary">Method</a></li> </ul> <ul class="subNavList"> <li>Detail:&nbsp;</li> <li><a href="#enum_constant_detail">Enum Constants</a>&nbsp;|&nbsp;</li> <li>Field&nbsp;|&nbsp;</li> <li><a href="#method_detail">Method</a></li> </ul> </div> <a name="skip-navbar_top"> <!-- --> </a></div> <!-- ========= END OF TOP NAVBAR ========= --> <!-- ======== START OF CLASS DATA ======== --> <div class="header"> <div class="subTitle">com.amazonaws.auth.policy.actions</div> <h2 title="Enum IdentityManagementActions" class="title">Enum IdentityManagementActions</h2> </div> <div class="contentContainer"> <ul class="inheritance"> <li>java.lang.Object</li> <li> <ul class="inheritance"> <li>java.lang.Enum&lt;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a>&gt;</li> <li> <ul class="inheritance"> <li>com.amazonaws.auth.policy.actions.IdentityManagementActions</li> </ul> </li> </ul> </li> </ul> <div class="description"> <ul class="blockList"> <li class="blockList"> <dl> <dt>All Implemented Interfaces:</dt> <dd><a href="../../../../../com/amazonaws/auth/policy/Action.html" title="interface in com.amazonaws.auth.policy">Action</a>, java.io.Serializable, java.lang.Comparable&lt;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a>&gt;</dd> </dl> <hr> <br> <pre>public enum <span class="strong">IdentityManagementActions</span> extends java.lang.Enum&lt;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a>&gt; implements <a href="../../../../../com/amazonaws/auth/policy/Action.html" title="interface in com.amazonaws.auth.policy">Action</a></pre> <div class="block">The available AWS access control policy actions for AWS Identity and Access Management.</div> </li> </ul> </div> <div class="summary"> <ul class="blockList"> <li class="blockList"> <!-- =========== ENUM CONSTANT SUMMARY =========== --> <ul class="blockList"> <li class="blockList"><a name="enum_constant_summary"> <!-- --> </a> <h3>Enum Constant Summary</h3> <table class="overviewSummary" border="0" cellpadding="3" cellspacing="0" summary="Enum Constant Summary table, listing enum constants, and an explanation"> <caption><span>Enum Constants</span><span class="tabEnd">&nbsp;</span></caption> <tr> <th class="colOne" scope="col">Enum Constant and Description</th> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#AddRoleToInstanceProfile">AddRoleToInstanceProfile</a></strong></code> <div class="block">Action for the AddRoleToInstanceProfile operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#AddUserToGroup">AddUserToGroup</a></strong></code> <div class="block">Action for the AddUserToGroup operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#AllIdentityManagementActions">AllIdentityManagementActions</a></strong></code> <div class="block">Represents any action executed on AWS Identity and Access Management.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#ChangePassword">ChangePassword</a></strong></code> <div class="block">Action for the ChangePassword operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#CreateAccessKey">CreateAccessKey</a></strong></code> <div class="block">Action for the CreateAccessKey operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#CreateAccountAlias">CreateAccountAlias</a></strong></code> <div class="block">Action for the CreateAccountAlias operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#CreateGroup">CreateGroup</a></strong></code> <div class="block">Action for the CreateGroup operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#CreateInstanceProfile">CreateInstanceProfile</a></strong></code> <div class="block">Action for the CreateInstanceProfile operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#CreateLoginProfile">CreateLoginProfile</a></strong></code> <div class="block">Action for the CreateLoginProfile operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#CreateRole">CreateRole</a></strong></code> <div class="block">Action for the CreateRole operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#CreateUser">CreateUser</a></strong></code> <div class="block">Action for the CreateUser operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#CreateVirtualMFADevice">CreateVirtualMFADevice</a></strong></code> <div class="block">Action for the CreateVirtualMFADevice operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#DeactivateMFADevice">DeactivateMFADevice</a></strong></code> <div class="block">Action for the DeactivateMFADevice operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#DeleteAccessKey">DeleteAccessKey</a></strong></code> <div class="block">Action for the DeleteAccessKey operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#DeleteAccountAlias">DeleteAccountAlias</a></strong></code> <div class="block">Action for the DeleteAccountAlias operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#DeleteAccountPasswordPolicy">DeleteAccountPasswordPolicy</a></strong></code> <div class="block">Action for the DeleteAccountPasswordPolicy operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#DeleteGroup">DeleteGroup</a></strong></code> <div class="block">Action for the DeleteGroup operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#DeleteGroupPolicy">DeleteGroupPolicy</a></strong></code> <div class="block">Action for the DeleteGroupPolicy operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#DeleteInstanceProfile">DeleteInstanceProfile</a></strong></code> <div class="block">Action for the DeleteInstanceProfile operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#DeleteLoginProfile">DeleteLoginProfile</a></strong></code> <div class="block">Action for the DeleteLoginProfile operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#DeleteRole">DeleteRole</a></strong></code> <div class="block">Action for the DeleteRole operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#DeleteRolePolicy">DeleteRolePolicy</a></strong></code> <div class="block">Action for the DeleteRolePolicy operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#DeleteServerCertificate">DeleteServerCertificate</a></strong></code> <div class="block">Action for the DeleteServerCertificate operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#DeleteSigningCertificate">DeleteSigningCertificate</a></strong></code> <div class="block">Action for the DeleteSigningCertificate operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#DeleteUser">DeleteUser</a></strong></code> <div class="block">Action for the DeleteUser operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#DeleteUserPolicy">DeleteUserPolicy</a></strong></code> <div class="block">Action for the DeleteUserPolicy operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#DeleteVirtualMFADevice">DeleteVirtualMFADevice</a></strong></code> <div class="block">Action for the DeleteVirtualMFADevice operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#EnableMFADevice">EnableMFADevice</a></strong></code> <div class="block">Action for the EnableMFADevice operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#GetAccountPasswordPolicy">GetAccountPasswordPolicy</a></strong></code> <div class="block">Action for the GetAccountPasswordPolicy operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#GetAccountSummary">GetAccountSummary</a></strong></code> <div class="block">Action for the GetAccountSummary operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#GetGroup">GetGroup</a></strong></code> <div class="block">Action for the GetGroup operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#GetGroupPolicy">GetGroupPolicy</a></strong></code> <div class="block">Action for the GetGroupPolicy operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#GetInstanceProfile">GetInstanceProfile</a></strong></code> <div class="block">Action for the GetInstanceProfile operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#GetLoginProfile">GetLoginProfile</a></strong></code> <div class="block">Action for the GetLoginProfile operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#GetRole">GetRole</a></strong></code> <div class="block">Action for the GetRole operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#GetRolePolicy">GetRolePolicy</a></strong></code> <div class="block">Action for the GetRolePolicy operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#GetServerCertificate">GetServerCertificate</a></strong></code> <div class="block">Action for the GetServerCertificate operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#GetUser">GetUser</a></strong></code> <div class="block">Action for the GetUser operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#GetUserPolicy">GetUserPolicy</a></strong></code> <div class="block">Action for the GetUserPolicy operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#ListAccessKeys">ListAccessKeys</a></strong></code> <div class="block">Action for the ListAccessKeys operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#ListAccountAliases">ListAccountAliases</a></strong></code> <div class="block">Action for the ListAccountAliases operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#ListGroupPolicies">ListGroupPolicies</a></strong></code> <div class="block">Action for the ListGroupPolicies operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#ListGroups">ListGroups</a></strong></code> <div class="block">Action for the ListGroups operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#ListGroupsForUser">ListGroupsForUser</a></strong></code> <div class="block">Action for the ListGroupsForUser operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#ListInstanceProfiles">ListInstanceProfiles</a></strong></code> <div class="block">Action for the ListInstanceProfiles operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#ListInstanceProfilesForRole">ListInstanceProfilesForRole</a></strong></code> <div class="block">Action for the ListInstanceProfilesForRole operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#ListMFADevices">ListMFADevices</a></strong></code> <div class="block">Action for the ListMFADevices operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#ListRolePolicies">ListRolePolicies</a></strong></code> <div class="block">Action for the ListRolePolicies operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#ListRoles">ListRoles</a></strong></code> <div class="block">Action for the ListRoles operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#ListServerCertificates">ListServerCertificates</a></strong></code> <div class="block">Action for the ListServerCertificates operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#ListSigningCertificates">ListSigningCertificates</a></strong></code> <div class="block">Action for the ListSigningCertificates operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#ListUserPolicies">ListUserPolicies</a></strong></code> <div class="block">Action for the ListUserPolicies operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#ListUsers">ListUsers</a></strong></code> <div class="block">Action for the ListUsers operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#ListVirtualMFADevices">ListVirtualMFADevices</a></strong></code> <div class="block">Action for the ListVirtualMFADevices operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#PassRole">PassRole</a></strong></code> <div class="block">Action for the PassRole operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#PutGroupPolicy">PutGroupPolicy</a></strong></code> <div class="block">Action for the PutGroupPolicy operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#PutRolePolicy">PutRolePolicy</a></strong></code> <div class="block">Action for the PutRolePolicy operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#PutUserPolicy">PutUserPolicy</a></strong></code> <div class="block">Action for the PutUserPolicy operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#RemoveRoleFromInstanceProfile">RemoveRoleFromInstanceProfile</a></strong></code> <div class="block">Action for the RemoveRoleFromInstanceProfile operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#RemoveUserFromGroup">RemoveUserFromGroup</a></strong></code> <div class="block">Action for the RemoveUserFromGroup operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#ResyncMFADevice">ResyncMFADevice</a></strong></code> <div class="block">Action for the ResyncMFADevice operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#UpdateAccessKey">UpdateAccessKey</a></strong></code> <div class="block">Action for the UpdateAccessKey operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#UpdateAccountPasswordPolicy">UpdateAccountPasswordPolicy</a></strong></code> <div class="block">Action for the UpdateAccountPasswordPolicy operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#UpdateAssumeRolePolicy">UpdateAssumeRolePolicy</a></strong></code> <div class="block">Action for the UpdateAssumeRolePolicy operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#UpdateGroup">UpdateGroup</a></strong></code> <div class="block">Action for the UpdateGroup operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#UpdateLoginProfile">UpdateLoginProfile</a></strong></code> <div class="block">Action for the UpdateLoginProfile operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#UpdateServerCertificate">UpdateServerCertificate</a></strong></code> <div class="block">Action for the UpdateServerCertificate operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#UpdateSigningCertificate">UpdateSigningCertificate</a></strong></code> <div class="block">Action for the UpdateSigningCertificate operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#UpdateUser">UpdateUser</a></strong></code> <div class="block">Action for the UpdateUser operation.</div> </td> </tr> <tr class="rowColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#UploadServerCertificate">UploadServerCertificate</a></strong></code> <div class="block">Action for the UploadServerCertificate operation.</div> </td> </tr> <tr class="altColor"> <td class="colOne"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#UploadSigningCertificate">UploadSigningCertificate</a></strong></code> <div class="block">Action for the UploadSigningCertificate operation.</div> </td> </tr> </table> </li> </ul> <!-- ========== METHOD SUMMARY =========== --> <ul class="blockList"> <li class="blockList"><a name="method_summary"> <!-- --> </a> <h3>Method Summary</h3> <table class="overviewSummary" border="0" cellpadding="3" cellspacing="0" summary="Method Summary table, listing methods, and an explanation"> <caption><span>Methods</span><span class="tabEnd">&nbsp;</span></caption> <tr> <th class="colFirst" scope="col">Modifier and Type</th> <th class="colLast" scope="col">Method and Description</th> </tr> <tr class="altColor"> <td class="colFirst"><code>java.lang.String</code></td> <td class="colLast"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#getActionName()">getActionName</a></strong>()</code> <div class="block">Returns the name of this action.</div> </td> </tr> <tr class="rowColor"> <td class="colFirst"><code>static <a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a></code></td> <td class="colLast"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#valueOf(java.lang.String)">valueOf</a></strong>(java.lang.String&nbsp;name)</code> <div class="block">Returns the enum constant of this type with the specified name.</div> </td> </tr> <tr class="altColor"> <td class="colFirst"><code>static <a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a>[]</code></td> <td class="colLast"><code><strong><a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html#values()">values</a></strong>()</code> <div class="block">Returns an array containing the constants of this enum type, in the order they are declared.</div> </td> </tr> </table> <ul class="blockList"> <li class="blockList"><a name="methods_inherited_from_class_java.lang.Enum"> <!-- --> </a> <h3>Methods inherited from class&nbsp;java.lang.Enum</h3> <code>compareTo, equals, getDeclaringClass, hashCode, name, ordinal, toString, valueOf</code></li> </ul> <ul class="blockList"> <li class="blockList"><a name="methods_inherited_from_class_java.lang.Object"> <!-- --> </a> <h3>Methods inherited from class&nbsp;java.lang.Object</h3> <code>getClass, notify, notifyAll, wait, wait, wait</code></li> </ul> </li> </ul> </li> </ul> </div> <div class="details"> <ul class="blockList"> <li class="blockList"> <!-- ============ ENUM CONSTANT DETAIL =========== --> <ul class="blockList"> <li class="blockList"><a name="enum_constant_detail"> <!-- --> </a> <h3>Enum Constant Detail</h3> <a name="AllIdentityManagementActions"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>AllIdentityManagementActions</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> AllIdentityManagementActions</pre> <div class="block">Represents any action executed on AWS Identity and Access Management.</div> </li> </ul> <a name="AddRoleToInstanceProfile"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>AddRoleToInstanceProfile</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> AddRoleToInstanceProfile</pre> <div class="block">Action for the AddRoleToInstanceProfile operation.</div> </li> </ul> <a name="AddUserToGroup"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>AddUserToGroup</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> AddUserToGroup</pre> <div class="block">Action for the AddUserToGroup operation.</div> </li> </ul> <a name="ChangePassword"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>ChangePassword</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> ChangePassword</pre> <div class="block">Action for the ChangePassword operation.</div> </li> </ul> <a name="CreateAccessKey"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>CreateAccessKey</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> CreateAccessKey</pre> <div class="block">Action for the CreateAccessKey operation.</div> </li> </ul> <a name="CreateAccountAlias"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>CreateAccountAlias</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> CreateAccountAlias</pre> <div class="block">Action for the CreateAccountAlias operation.</div> </li> </ul> <a name="CreateGroup"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>CreateGroup</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> CreateGroup</pre> <div class="block">Action for the CreateGroup operation.</div> </li> </ul> <a name="CreateInstanceProfile"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>CreateInstanceProfile</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> CreateInstanceProfile</pre> <div class="block">Action for the CreateInstanceProfile operation.</div> </li> </ul> <a name="CreateLoginProfile"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>CreateLoginProfile</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> CreateLoginProfile</pre> <div class="block">Action for the CreateLoginProfile operation.</div> </li> </ul> <a name="CreateRole"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>CreateRole</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> CreateRole</pre> <div class="block">Action for the CreateRole operation.</div> </li> </ul> <a name="CreateUser"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>CreateUser</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> CreateUser</pre> <div class="block">Action for the CreateUser operation.</div> </li> </ul> <a name="CreateVirtualMFADevice"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>CreateVirtualMFADevice</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> CreateVirtualMFADevice</pre> <div class="block">Action for the CreateVirtualMFADevice operation.</div> </li> </ul> <a name="DeactivateMFADevice"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>DeactivateMFADevice</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> DeactivateMFADevice</pre> <div class="block">Action for the DeactivateMFADevice operation.</div> </li> </ul> <a name="DeleteAccessKey"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>DeleteAccessKey</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> DeleteAccessKey</pre> <div class="block">Action for the DeleteAccessKey operation.</div> </li> </ul> <a name="DeleteAccountAlias"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>DeleteAccountAlias</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> DeleteAccountAlias</pre> <div class="block">Action for the DeleteAccountAlias operation.</div> </li> </ul> <a name="DeleteAccountPasswordPolicy"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>DeleteAccountPasswordPolicy</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> DeleteAccountPasswordPolicy</pre> <div class="block">Action for the DeleteAccountPasswordPolicy operation.</div> </li> </ul> <a name="DeleteGroup"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>DeleteGroup</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> DeleteGroup</pre> <div class="block">Action for the DeleteGroup operation.</div> </li> </ul> <a name="DeleteGroupPolicy"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>DeleteGroupPolicy</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> DeleteGroupPolicy</pre> <div class="block">Action for the DeleteGroupPolicy operation.</div> </li> </ul> <a name="DeleteInstanceProfile"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>DeleteInstanceProfile</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> DeleteInstanceProfile</pre> <div class="block">Action for the DeleteInstanceProfile operation.</div> </li> </ul> <a name="DeleteLoginProfile"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>DeleteLoginProfile</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> DeleteLoginProfile</pre> <div class="block">Action for the DeleteLoginProfile operation.</div> </li> </ul> <a name="DeleteRole"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>DeleteRole</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> DeleteRole</pre> <div class="block">Action for the DeleteRole operation.</div> </li> </ul> <a name="DeleteRolePolicy"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>DeleteRolePolicy</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> DeleteRolePolicy</pre> <div class="block">Action for the DeleteRolePolicy operation.</div> </li> </ul> <a name="DeleteServerCertificate"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>DeleteServerCertificate</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> DeleteServerCertificate</pre> <div class="block">Action for the DeleteServerCertificate operation.</div> </li> </ul> <a name="DeleteSigningCertificate"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>DeleteSigningCertificate</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> DeleteSigningCertificate</pre> <div class="block">Action for the DeleteSigningCertificate operation.</div> </li> </ul> <a name="DeleteUser"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>DeleteUser</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> DeleteUser</pre> <div class="block">Action for the DeleteUser operation.</div> </li> </ul> <a name="DeleteUserPolicy"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>DeleteUserPolicy</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> DeleteUserPolicy</pre> <div class="block">Action for the DeleteUserPolicy operation.</div> </li> </ul> <a name="DeleteVirtualMFADevice"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>DeleteVirtualMFADevice</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> DeleteVirtualMFADevice</pre> <div class="block">Action for the DeleteVirtualMFADevice operation.</div> </li> </ul> <a name="EnableMFADevice"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>EnableMFADevice</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> EnableMFADevice</pre> <div class="block">Action for the EnableMFADevice operation.</div> </li> </ul> <a name="GetAccountPasswordPolicy"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>GetAccountPasswordPolicy</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> GetAccountPasswordPolicy</pre> <div class="block">Action for the GetAccountPasswordPolicy operation.</div> </li> </ul> <a name="GetAccountSummary"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>GetAccountSummary</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> GetAccountSummary</pre> <div class="block">Action for the GetAccountSummary operation.</div> </li> </ul> <a name="GetGroup"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>GetGroup</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> GetGroup</pre> <div class="block">Action for the GetGroup operation.</div> </li> </ul> <a name="GetGroupPolicy"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>GetGroupPolicy</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> GetGroupPolicy</pre> <div class="block">Action for the GetGroupPolicy operation.</div> </li> </ul> <a name="GetInstanceProfile"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>GetInstanceProfile</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> GetInstanceProfile</pre> <div class="block">Action for the GetInstanceProfile operation.</div> </li> </ul> <a name="GetLoginProfile"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>GetLoginProfile</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> GetLoginProfile</pre> <div class="block">Action for the GetLoginProfile operation.</div> </li> </ul> <a name="GetRole"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>GetRole</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> GetRole</pre> <div class="block">Action for the GetRole operation.</div> </li> </ul> <a name="GetRolePolicy"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>GetRolePolicy</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> GetRolePolicy</pre> <div class="block">Action for the GetRolePolicy operation.</div> </li> </ul> <a name="GetServerCertificate"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>GetServerCertificate</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> GetServerCertificate</pre> <div class="block">Action for the GetServerCertificate operation.</div> </li> </ul> <a name="GetUser"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>GetUser</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> GetUser</pre> <div class="block">Action for the GetUser operation.</div> </li> </ul> <a name="GetUserPolicy"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>GetUserPolicy</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> GetUserPolicy</pre> <div class="block">Action for the GetUserPolicy operation.</div> </li> </ul> <a name="ListAccessKeys"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>ListAccessKeys</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> ListAccessKeys</pre> <div class="block">Action for the ListAccessKeys operation.</div> </li> </ul> <a name="ListAccountAliases"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>ListAccountAliases</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> ListAccountAliases</pre> <div class="block">Action for the ListAccountAliases operation.</div> </li> </ul> <a name="ListGroupPolicies"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>ListGroupPolicies</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> ListGroupPolicies</pre> <div class="block">Action for the ListGroupPolicies operation.</div> </li> </ul> <a name="ListGroups"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>ListGroups</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> ListGroups</pre> <div class="block">Action for the ListGroups operation.</div> </li> </ul> <a name="ListGroupsForUser"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>ListGroupsForUser</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> ListGroupsForUser</pre> <div class="block">Action for the ListGroupsForUser operation.</div> </li> </ul> <a name="ListInstanceProfiles"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>ListInstanceProfiles</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> ListInstanceProfiles</pre> <div class="block">Action for the ListInstanceProfiles operation.</div> </li> </ul> <a name="ListInstanceProfilesForRole"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>ListInstanceProfilesForRole</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> ListInstanceProfilesForRole</pre> <div class="block">Action for the ListInstanceProfilesForRole operation.</div> </li> </ul> <a name="ListMFADevices"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>ListMFADevices</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> ListMFADevices</pre> <div class="block">Action for the ListMFADevices operation.</div> </li> </ul> <a name="ListRolePolicies"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>ListRolePolicies</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> ListRolePolicies</pre> <div class="block">Action for the ListRolePolicies operation.</div> </li> </ul> <a name="ListRoles"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>ListRoles</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> ListRoles</pre> <div class="block">Action for the ListRoles operation.</div> </li> </ul> <a name="ListServerCertificates"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>ListServerCertificates</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> ListServerCertificates</pre> <div class="block">Action for the ListServerCertificates operation.</div> </li> </ul> <a name="ListSigningCertificates"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>ListSigningCertificates</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> ListSigningCertificates</pre> <div class="block">Action for the ListSigningCertificates operation.</div> </li> </ul> <a name="ListUserPolicies"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>ListUserPolicies</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> ListUserPolicies</pre> <div class="block">Action for the ListUserPolicies operation.</div> </li> </ul> <a name="ListUsers"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>ListUsers</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> ListUsers</pre> <div class="block">Action for the ListUsers operation.</div> </li> </ul> <a name="ListVirtualMFADevices"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>ListVirtualMFADevices</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> ListVirtualMFADevices</pre> <div class="block">Action for the ListVirtualMFADevices operation.</div> </li> </ul> <a name="PassRole"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>PassRole</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> PassRole</pre> <div class="block">Action for the PassRole operation.</div> </li> </ul> <a name="PutGroupPolicy"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>PutGroupPolicy</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> PutGroupPolicy</pre> <div class="block">Action for the PutGroupPolicy operation.</div> </li> </ul> <a name="PutRolePolicy"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>PutRolePolicy</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> PutRolePolicy</pre> <div class="block">Action for the PutRolePolicy operation.</div> </li> </ul> <a name="PutUserPolicy"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>PutUserPolicy</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> PutUserPolicy</pre> <div class="block">Action for the PutUserPolicy operation.</div> </li> </ul> <a name="RemoveRoleFromInstanceProfile"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>RemoveRoleFromInstanceProfile</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> RemoveRoleFromInstanceProfile</pre> <div class="block">Action for the RemoveRoleFromInstanceProfile operation.</div> </li> </ul> <a name="RemoveUserFromGroup"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>RemoveUserFromGroup</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> RemoveUserFromGroup</pre> <div class="block">Action for the RemoveUserFromGroup operation.</div> </li> </ul> <a name="ResyncMFADevice"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>ResyncMFADevice</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> ResyncMFADevice</pre> <div class="block">Action for the ResyncMFADevice operation.</div> </li> </ul> <a name="UpdateAccessKey"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>UpdateAccessKey</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> UpdateAccessKey</pre> <div class="block">Action for the UpdateAccessKey operation.</div> </li> </ul> <a name="UpdateAccountPasswordPolicy"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>UpdateAccountPasswordPolicy</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> UpdateAccountPasswordPolicy</pre> <div class="block">Action for the UpdateAccountPasswordPolicy operation.</div> </li> </ul> <a name="UpdateAssumeRolePolicy"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>UpdateAssumeRolePolicy</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> UpdateAssumeRolePolicy</pre> <div class="block">Action for the UpdateAssumeRolePolicy operation.</div> </li> </ul> <a name="UpdateGroup"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>UpdateGroup</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> UpdateGroup</pre> <div class="block">Action for the UpdateGroup operation.</div> </li> </ul> <a name="UpdateLoginProfile"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>UpdateLoginProfile</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> UpdateLoginProfile</pre> <div class="block">Action for the UpdateLoginProfile operation.</div> </li> </ul> <a name="UpdateServerCertificate"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>UpdateServerCertificate</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> UpdateServerCertificate</pre> <div class="block">Action for the UpdateServerCertificate operation.</div> </li> </ul> <a name="UpdateSigningCertificate"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>UpdateSigningCertificate</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> UpdateSigningCertificate</pre> <div class="block">Action for the UpdateSigningCertificate operation.</div> </li> </ul> <a name="UpdateUser"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>UpdateUser</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> UpdateUser</pre> <div class="block">Action for the UpdateUser operation.</div> </li> </ul> <a name="UploadServerCertificate"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>UploadServerCertificate</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> UploadServerCertificate</pre> <div class="block">Action for the UploadServerCertificate operation.</div> </li> </ul> <a name="UploadSigningCertificate"> <!-- --> </a> <ul class="blockListLast"> <li class="blockList"> <h4>UploadSigningCertificate</h4> <pre>public static final&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a> UploadSigningCertificate</pre> <div class="block">Action for the UploadSigningCertificate operation.</div> </li> </ul> </li> </ul> <!-- ============ METHOD DETAIL ========== --> <ul class="blockList"> <li class="blockList"><a name="method_detail"> <!-- --> </a> <h3>Method Detail</h3> <a name="values()"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>values</h4> <pre>public static&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a>[]&nbsp;values()</pre> <div class="block">Returns an array containing the constants of this enum type, in the order they are declared. This method may be used to iterate over the constants as follows: <pre> for (IdentityManagementActions c : IdentityManagementActions.values()) &nbsp; System.out.println(c); </pre></div> <dl><dt><span class="strong">Returns:</span></dt><dd>an array containing the constants of this enum type, in the order they are declared</dd></dl> </li> </ul> <a name="valueOf(java.lang.String)"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>valueOf</h4> <pre>public static&nbsp;<a href="../../../../../com/amazonaws/auth/policy/actions/IdentityManagementActions.html" title="enum in com.amazonaws.auth.policy.actions">IdentityManagementActions</a>&nbsp;valueOf(java.lang.String&nbsp;name)</pre> <div class="block">Returns the enum constant of this type with the specified name. The string must match <i>exactly</i> an identifier used to declare an enum constant in this type. (Extraneous whitespace characters are not permitted.)</div> <dl><dt><span class="strong">Parameters:</span></dt><dd><code>name</code> - the name of the enum constant to be returned.</dd> <dt><span class="strong">Returns:</span></dt><dd>the enum constant with the specified name</dd> <dt><span class="strong">Throws:</span></dt> <dd><code>java.lang.IllegalArgumentException</code> - if this enum type has no constant with the specified name</dd> <dd><code>java.lang.NullPointerException</code> - if the argument is null</dd></dl> </li> </ul> <a name="getActionName()"> <!-- --> </a> <ul class="blockListLast"> <li class="blockList"> <h4>getActionName</h4> <pre>public&nbsp;java.lang.String&nbsp;getActionName()</pre> <div class="block"><strong>Description copied from interface:&nbsp;<code><a href="../../../../../com/amazonaws/auth/policy/Action.html#getActionName()">Action</a></code></strong></div> <div class="block">Returns the name of this action. For example, 'sqs:SendMessage' is the name corresponding to the SQS action that enables users to send a message to an SQS queue.</div> <dl> <dt><strong>Specified by:</strong></dt> <dd><code><a href="../../../../../com/amazonaws/auth/policy/Action.html#getActionName()">getActionName</a></code>&nbsp;in interface&nbsp;<code><a href="../../../../../com/amazonaws/auth/policy/Action.html" title="interface in com.amazonaws.auth.policy">Action</a></code></dd> <dt><span class="strong">Returns:</span></dt><dd>The name of this action.</dd></dl> </li> </ul> </li> </ul> </li> </ul> </div> </div> <!-- ========= END OF CLASS DATA ========= --> <!-- ======= START OF BOTTOM NAVBAR ====== --> <div class="bottomNav"><a name="navbar_bottom"> <!-- --> </a><a href="#skip-navbar_bottom" title="Skip navigation links"></a><a name="navbar_bottom_firstrow"> <!-- --> </a> <ul class="navList" title="Navigation"> <li><a href="../../../../../overview-summary.html">Overview</a></li> <li><a href="package-summary.html">Package</a></li> <li class="navBarCell1Rev">Class</li> <li><a href="../../../../../index-all.html">Index</a></li> <li><a href="../../../../../help-doc.html">Help</a></li> </ul> <div class="aboutLanguage"><em> <div> <!-- Script for Syntax Highlighter START --> <script type="text/javascript"> SyntaxHighlighter.all() </script> <!-- Script for Syntax Highlighter END --> </div> <script src="http://a0.awsstatic.com/chrome/js/1.0.46/jquery.1.9.js" type="text/javascript"></script> <script>jQuery.noConflict();</script> <script> jQuery(function ($) { $("div.header").prepend('<!--REGION_DISCLAIMER_DO_NOT_REMOVE-->'); }); </script> <!-- BEGIN-URCHIN-TRACKER --> <script src="http://l0.awsstatic.com/js/urchin.js" type="text/javascript"></script> <script type="text/javascript">urchinTracker();</script> <!-- END-URCHIN-TRACKER --> <!-- SiteCatalyst code version: H.25.2. Copyright 1996-2012 Adobe, Inc. All Rights Reserved. More info available at http://www.omniture.com --> <script language="JavaScript" type="text/javascript" src="https://media.amazonwebservices.com/js/sitecatalyst/s_code.min.js (view-source:https://media.amazonwebservices.com/js/sitecatalyst/s_code.min.js)" /> <script language="JavaScript" type="text/javascript"> <!-- // Documentation Service Name s.prop66='AWS SDK for Java'; s.eVar66='D=c66'; // Documentation Guide Name s.prop65='API Reference'; s.eVar65='D=c65'; var s_code=s.t();if(s_code)document.write(s_code) //--> </script> <script language="JavaScript" type="text/javascript"> <!--if(navigator.appVersion.indexOf('MSIE')>=0)document.write(unescape('%3C')+'\!-'+'-') //--> </script> <noscript> <img src="http://amazonwebservices.d2.sc.omtrdc.net/b/ss/awsamazondev/1/H.25.2--NS/0" height="1" width="1" border="0" alt="" /> </noscript> <!--/DO NOT REMOVE/--> <!-- End SiteCatalyst code version: H.25.2. --> </em></div> </div> <div class="subNav"> <ul class="navList"> <li><a href="../../../../../com/amazonaws/auth/policy/actions/GlacierActions.html" title="enum in com.amazonaws.auth.policy.actions"><span class="strong">Prev Class</span></a></li> <li><a href="../../../../../com/amazonaws/auth/policy/actions/RDSActions.html" title="enum in com.amazonaws.auth.policy.actions"><span class="strong">Next Class</span></a></li> </ul> <ul class="navList"> <li><a href="../../../../../index.html?com/amazonaws/auth/policy/actions/IdentityManagementActions.html" target="_top">Frames</a></li> <li><a href="IdentityManagementActions.html" target="_top">No Frames</a></li> </ul> <ul class="navList" id="allclasses_navbar_bottom"> <li><a href="../../../../../allclasses-noframe.html">All Classes</a></li> </ul> <div> <script type="text/javascript"><!-- allClassesLink = document.getElementById("allclasses_navbar_bottom"); if(window==top) { allClassesLink.style.display = "block"; } else { allClassesLink.style.display = "none"; } //--> </script> </div> <div> <ul class="subNavList"> <li>Summary:&nbsp;</li> <li>Nested&nbsp;|&nbsp;</li> <li><a href="#enum_constant_summary">Enum Constants</a>&nbsp;|&nbsp;</li> <li>Field&nbsp;|&nbsp;</li> <li><a href="#method_summary">Method</a></li> </ul> <ul class="subNavList"> <li>Detail:&nbsp;</li> <li><a href="#enum_constant_detail">Enum Constants</a>&nbsp;|&nbsp;</li> <li>Field&nbsp;|&nbsp;</li> <li><a href="#method_detail">Method</a></li> </ul> </div> <a name="skip-navbar_bottom"> <!-- --> </a></div> <!-- ======== END OF BOTTOM NAVBAR ======= --> <p class="legalCopy"><small> Copyright &#169; 2013 Amazon Web Services, Inc. All Rights Reserved. </small></p> </body> </html>
{ "redpajama_set_name": "RedPajamaGithub" }
1,606
JAROD S. HECTOR ​​SPORTS. ​​​SPORTS. TV-Movie Recaps On-Air Work Five Thoughts From The Nets' 122-117 Win Over The Bulls, Including Jarrett Allen and Rodions Kurucs Participating in #NBAAllStar Weekend (Video) Here are five thoughts from the Nets 122-117 win over the Bulls on Tuesday night at Barclays Center in Brooklyn. 1. Surprisingly compelling game Maybe it was the injuries or the fact that it was the second night of a back to back, but the hapless Chicago Bulls hung with the Brooklyn Nets the entire game. Poor shooting for both teams to start the game, and some less than stellar defense in the first half. But the second half was pretty good. Neither team gained much separation, 5-7 points at most, and then the other team would make a run. The Bulls are in full tank mode, but the opportunity to beat the Nets – one of the league's surprising teams – would have been a nice feather in the cap for the young Bulls in an otherwise dismal season. Both teams played hard – cue Rasheed Wallace – and really wanted to win. You could see it on the rebounds, box outs, and urgency on offense. No moral victories in sports, so this is just another loss for the Bulls, but a needed win for the Nets. They matched their entire win total from last season (28) tonight. Pregame, Nets head coach Kenny Atkinson talked about the team's focus on each game and not looking ahead or lamenting the injuries. I asked @BrooklynNets head coach Kenny Atkinson if his message to the team has changed, given uncharted territory they are in...#NBA #NBATwitter pic.twitter.com/1Qn9aYagRr — Jarod Hector (@jshector) January 30, 2019 2. D'Angelo Russell closed the 4th quarter Dlo has spent a lot of the season on the bench during the fourth quarters of games, and lately, during the Nets' current streak of good play, (20-6 since December 7th) he has seen more 4th quarter action. Now, that time fluctuates based on how he's playing and Atkinson's high standards for the position. But, he has been seeing more court time in the 4th. He was benched during Monday night's 4th quarter road loss to the Celtics, due to some ineffective defensive and "hustle" plays. Atkinson has always stressed that Dlo is a young (22 years old) point guard who is learning, but he is coachable. Because of Dlo's willingness to take constructive criticism, Atkinson coaches him hard and as a result, we have seen some improved play over this stretch. Tuesday night, in the win against the Bulls, Dlo finished with 30 points, 7 assists, 4 rebounds, 3 steals, and 0 turnovers. He made clutch plays and smart decisions down the stretch of a very tight game. Dlo has been playing like an All-Star and he is reminding people why he was a #2 overall pick. Late in the 4th quarter, Dlo calls for a flare screen and Joe Harris comes off for an easy layup at the rim. Tweet posted by Nate Duncan. Portland-style flare screen for Joe Harris here leads to an easy layup. Lauri wasn't looking to help, was loading up to defend a Russell/Allen PnR #NBACast https://t.co/MZJKpQsTvg pic.twitter.com/G7JQNh4P5z — Nate Duncan (@NateDuncanNBA) January 30, 2019 3. Shabazz Napier had back to back 20 point games "Bazz" scored 20 points in the loss to the Celtics on Monday, he was 4-8 from three-point range. He followed up with 24 points in Tuesday's win, matching a career-high in made threes with 5. Bazz will need to be big for the Nets over the next seven games heading into the all-star break. The Nets' are dealing with a depleted roster, and until they start getting guys back Bazz's role will be critical for extended periods of games. Some night's he'll be needed to play great defense or set up his teammates, or score, or gang rebound. Then there will be nights where he'll need to do everything. He's not quite a veteran, but the 4th year player has a maturity and understanding of the game that the Nets will lean heavily on. Following the game, Bazz talked about doing whatever it takes for the team to succeed. 4. Winning plays down the stretch Whether it was a loose ball, a box out, a rebound, or drawing a foul, the Nets did the little things down the stretch to win this game. It bears repeating, Tuesday's game against the Bulls is the type of game this team would have lost earlier this season. The Nets have come a long way in terms of their in-game maturity and decision making. To a man, each player points to the "players only" film session earlier this season as a turning point. The younger Nets players also talk about veterans like Jared Dudley, Ed Davis and DeMarre Carroll pointing out the different areas the team can improve on and the "little things" needed to win games in the NBA. 5. Jarrett Allen and Rodions Kurucs will participate in All-Star weekend Jarrett Allen and Rodions Kurucs have been named to the MTN DEW ICE Rising Stars. The NBA announced that the two Nets players were selected to the USA and World teams respectively for All-Star weekend in Charlotte next month. This is a huge deal for the Nets, it's a sign that the player development and performance culture they have developed is working. Coaches around the league have taken notice and it's easy to see why. Allen has made a highlight reel with his blocks of the league's top players. He's an excellent rebounder and is developing as an offensive threat. Kurucs has been a huge spark since entering the rotation and now the starting lineup. He can make shots, create off the bounce, rebound and is a willing defender. Allen was asked following Tuesday's game about being named a "Rising Star" with Rodions. He had some good-natured trash talk for his teammate. The Nets' Jarrett Allen and Rodions Kurucs will play in the Rising Stars game during #NBAAllStar weekend. @_bigjayy_ talks about it after Tuesday's game #NBA #NBATwitter pic.twitter.com/CWEdFexa9W © 2016 · JAROD S. HECTOR
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
4,661
POLITICS HUMAN RIGHTS Gingrich: 'President Trump is telling Americans the truth and the elite media and left hate it' Former Speaker of the House tells it like it is, says 'both sides are to blame,' elite media is lying By Shepard Ambellas - (INTELLIHUB) — Former Speaker of the House Newt Gingrich hit the nail on the head Tuesday evening when he told Fox News' Sean Hannity that both the left and the right came to Charlottesville to create violence as the American Civil Liberties Union had already pointed out on their twitter feed and that the "elite media" are fabricating a "big lie." "The truth is, President Trump is telling the American people the truth and the elite media hates it and the left hates it and he's going right at the heart of the big lie on the left," the former Speaker said. "Most of the violence we have seen politically this year has been on the left." "Let's be really clear here what we're faced with in this country," he said. I think we should condemn noo-Nazis — they are an anti-Christian totalitarian anti-Semitic movement — we should be very tough on them. I think we should condemn racism, but frankly, I think we should condemn racism on both sides." Featured Image: Gage Skidmore/Flickr Shepard Ambellas is an opinion journalist, analyst, and the founder and editor-in-chief of Intellihub News & Politics (Intellihub.com). Shepard is also known for producing Shade: The Motion Picture (2013) and appearing on Travel Channel's America Declassified (2013). Shepard is a regular contributor to Infowars. Read more from Shep's World. Follow Shep on Facebook and Twitter. The impeachment farce is a distraction from the deep state 'Coup has started': Whistleblower's attorney vowed to 'get rid of Trump' in 2017 Trump slams AOC's 'squad' as "the Four Horsewomen of the Apocalypse" Rush Limbaugh receives "white trash" birthday cake from staffers while on... Watch: Donald Trump's full Inaugural Address LVMPD officers were instructed to turn "off" their body cameras...
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
9,363
Ether Way is het eenendertigste album van de Britse progressieve rockband Caravan. Het is de een verzameling van niet eerder uitgebracht opnames gemaakt door de BBC, bij optredens van Caravan voor de radio. De opnames zijn van 26 juni 1975 (nummers 1-3), 6 mei 1976 (nummers 4-5) en 2 mei 1977 (nummers 6-9). Op de eerste drie nummers is de line-up nog met David Sinclair op de keyboards en Mike Wedgwood op basgitaar, de laatste nummers heeft Jan Schelhaas de keyboards overgenomen en Dek Messecar de basgitaar. Tracklist The Show Of Our Lives - 4:54 Stuck In A Hole - 3:15 The Dabsong Conshirtoe - 12:32 All The Way - 6:33 A Very Smelly, Grubby Little Oik / Bobbing Wide / Come On Back / Oik Reprise - 11:44 Behind You - 5:13 The Last Unicorn - 5:34 Nightmare - 6:17 Better By Far - 4:48 Bezetting Pye Hastings, zang, gitaar Geoff Richardson altviool, viool David Sinclair orgel, elektrische piano Jan Schelhaas orgel, elektrische piano Mike Wedgwood, basgitaar, zang Dek Messecar, basgitaar, zang Richard Coughlan, drums Muziekalbum van Caravan Muziekalbum uit 1998
{ "redpajama_set_name": "RedPajamaWikipedia" }
5,873
Dharma Audiobooks Buddhist recordings of all kinds AUTHORS / TRANSLATORS (A-Z) TITLES (A-Z) MEDITATION – NOW OR NEVER By Steve Hagen Read William Hope In Meditation Now or Never Steve Hagen, a Zen priest and bestselling author of Buddhism Plain and Simple, provides an accessible and thorough manual on meditation, for both newcomers and experienced practitioners. In the modern world our lives are more frenetic than ever. We live with a burning sense that we have to get something done. But what do we really achieve? And why are we never satisfied? This book is an invitation to switch off, and to enjoy stillness – right now. Steve Hagen offers simple practices that avoid needlessly complicating meditation; highlights where many of us get stuck in meditating – and how to get unstuck; and, above all, focuses on meditation not simply as a spiritual technique, but as a way of living. Available on audible: audible.co.uk, audible.com, audible.de, audible.fr, audible.com.au: : £12.07 or on subscription. Steve Hagen is a Zen priest, a long-time teacher of Buddhism and the author of How the World can be the Way It is. He began studying Buddhism in 1967 and in 1975 became a student of Zen master Dainin Katagiri. Hagen was ordained a Zen priest in 1979 and later studied with a number of other teachers in Asia and Europe. In 1989 he received Dharma Transmission (endorsement to teach) from Katagiri Roshi. Hagen lives in Minneapolis, where he lectures, teaches meditation and leads retreats at the Dharma Field Meditation and Learning Center. Steve Hagen, William Hope THERAGĀTHĀ Jonathan Keeble © 2023 Dharma Audiobooks. All Rights Reserved. Setup by Herts Computer Services
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
7,672
Last weekend we attended Church Family Camp with others from Kowloon International Baptist Church. We boarded the bus at 8:30 on Saturday morning. The camp was in an area called Yuen Long. First there were a few games for everyone to participate in. Then we were free to explore the campsite and do our own thing for the rest of the morning. Keegan and Craig chose to play soccer on a court that brought back memories of Petit Porteau in Africa. Jemilla took the opportunity to jump on a trampoline, her first since house-sitting for the Eyres in July. Tirzah was happy just jumping on the mats. Then it was lunch time. This is the barbecue area where we were told to meet for lunch, given a bag of charcoal and matches, handed another bag of semi-defrosted meats, and left to fend for ourselves. The sad fact is that neither Craig nor I would last very long on Survivor because we spent a great deal of time arguing over how to get the fire started and only managed to produce a few wisps of smoke. First, this man tried to offer some suggestions. Then, a bbq-savvy toddler also got in on the action. But it wasn't until this couple took over that we finally saw some flames...ninety minutes and several grumpy Harveys later. What would I have given for an Aussie electric barbecue! Anyway, we stood/sat over the sweltering charcoal fire holding our prongs of sausages, chicken wings and several unidentifiable meats over the flames. It's only by God's grace that we didn't get sick because we ate much of the food before it had been cooked through simply because we were so hungry at that point. We avoided the sun for the rest of the afternoon by doing indoor activities. I was so proud of Jemilla who climbed this rock wall three times. Keegan and I giggled our way through a game of badminton. And Tirzah was very content to play on the equipment in the air conditioned playroom. At the end of the day I felt disappointed that we did not really get to know any other church families. It seemed that everyone we encountered spoke only Chinese, and we were noticeably the only whites around. I was also keen to wash the barbecue smell out of my clothes and hair! The children, however, saw only the fun in it all...happy to have had an excursion as a family and explored somewhere new. Hmmmm, a bit of a disappointing camp. My expectations for a church camp are similar to yours. Good on you for at least going to something that is completely outside your comfort zone!
{ "redpajama_set_name": "RedPajamaC4" }
265
Forget Leicester City, CEMEX UK's answer Real Readymix and Athlectico Asphalt battled it out on the footie field last week, and raised a whopping £1000 for charity. At time of writing no-one had reported the score!! Lex Russell commented, "A big thank you to all of the players and supporters from Real Readymix and Athletico Asphalt, for the game last Wednesday night.
{ "redpajama_set_name": "RedPajamaC4" }
3,235
M&C Saatchi, Tricky Jigsaw and Fin Design create storybook and VR app for Commonwealth Bank targeting children. Commonwealth Bank has released a storybook and accompanying virtual reality (VR) app for promoting financial literacy for children. The app and Sammy the Space Koala book aim to teach children financial lessons through immersive storytelling. The story follows Sammy the koala, who travels through the galaxy in search of a magical present for her Grandma's birthday. Throughout the journey, kids are invited to participate in VR chapters, learning lessons about 'needs' and 'wants'. The experience, driven by M&C Saatchi Sydney is an expansion of CommBank's Start Smart program for kids. M&C Saatchi worked with Tricky Jigsaw to design the product experience and Fin Design to illustrate the storybook and translate those assets into VR material. Sammy the Space Koala book, written by Ursula Dubosarsky comes with a cardboard headset. "'The Teleporter Adventures' are a hybrid of the classic storybook and virtual reality worlds. As a new platform for immersive storytelling, we hope to reach more and more kids and communities around Australia with a fun way to learn about money," says Michael Canning, executing creative director at M&C Saatchi Sydney. 'The Teleporter Adventures will be publicised in CommBank's owned channels, social and with a 30 second launch film animated by Heckler TV and produced by M&C Saatchi. According to Commbank, about 10% of Australian children under 15 lack even basic financial literacy. Start Smart is part of the Commonwealth Bank's corporate responsibility project – and aim to engage consumers early – Opportunity Initiatives. This article was originally published on Marketing.
{ "redpajama_set_name": "RedPajamaC4" }
7,781
Pseudohelotium haematoideum är en svampart som först beskrevs av Cooke & W. Phillips, och fick sitt nu gällande namn av Dennis 1961. Pseudohelotium haematoideum ingår i släktet Pseudohelotium och familjen Helotiaceae. Inga underarter finns listade i Catalogue of Life. Källor Disksvampar haematoideum
{ "redpajama_set_name": "RedPajamaWikipedia" }
2,210
We all know Rajasthan is the land of royal palaces, majestic forts and ancient temples. Hence, you can find all these beauties in each and every district of this beautiful state. However, only a few of them are frequented by tourists from all over the state and the country. A lot of them remain unexplored throughout the year. One such place which is only popular amongst locals is Bundi. Despite harbouring fancy palaces, monumental buildings and soothing sites, it is rarely visited by tourists from other cities and states. How about getting yourself to this ancient marvel this weekend and savouring its gorgeous places? On account of its location in the close proximity of Jaipur, it makes for a perfect weekend getaway. So, plan a trip from Jaipur to Bundi now to relish the hidden beauty of Rajasthan. Read on to know more about how to reach Bundi and its tourist destinations. Bundi experiences an extreme type of climate and hence, the summers are hot here. However, due to the presence of the hills and lakes, it maintains a bearable climate, even during the summer season. If you are looking forward to avoiding the summer heat of Rajasthan, then the best time to visit Bundi is from October until the end of February. By Air: As the nearest airport from Bundi is located in Jaipur, there is no option of reaching Bundi by air, if you are starting your journey at Jaipur. By Rail: Bundi has a well-connected railway station and hence, you can catch a direct train from Jaipur railway station to Bundi Junction. It will take you an approximate time of 3 h to reach your destination by rail. By Road: On account of good road connectivity, Bundi is easily accessible by road. You can either hire a direct cab or catch a bus to Bundi from Jaipur. Once you are on your way, you can take a break at Chaksu and explore its beautiful tourist spots which include historical sites and ancient temples. Chaksu is located at a distance of about 41 km from Jaipur and 175 km from Bundi and is mainly popular amongst locals and seasonal tourists for temples and other religious sites. Therefore, it is also sometimes referred to as the temple town. The major places to explore here include Sheetla Mata Mandir, Barkhera Jain Temple, Shree Ram Dham and Manohara Talab. You also get to savour the beauty of raw culture of Rajasthan here. So, do not forget to take a break in this beautiful town which has a lot to offer its visitors. Bundi is located at a distance of about 220 km from Jaipur and is also known as Little Varanasi on account of the presence of several age-old temples within its boundaries. It is also the place where Nobel Prize-winning author Rudyard Kipling was inspired to start his novel, Kim. Bundi is surrounded by the hills of the Aravalli Range and hence, provides its visitors with commendable landscape views. The history of Bundi dates back to the early Medieval Period of India when it was inhabited by local tribes and was under the control of Hindu rulers. Today, Bundi has become a tourist destination for those who look forward to exploring the history of India and the culture of Rajasthan. Following are the major places which you must visit on your trip to this ancient town. Also known as Star Fort, the beautiful Taragarh Fort is located atop a hill and overlooks the settlement of Bundi. It was built in the late 14th century and is a popular tourist spot in the town. On an average, it is visited by more than 10,000 tourists every year. The fort is mainly famous for its three tanks which never get dried up. Such is the advanced construction of this ancient marvel, that most of it still stands strong today. How about getting yourself to this wonderful beauty? It will certainly be objectionable if you are in and around the historic town of Bundi and do not visit Bundi Palace. Located beside Taragarh Fort on the slopes of surrounding hills, it is known for its ornate walls, ceilings and pillars which are adorned with enthralling murals and frescoes. The major attraction in the palace is Chitrashala, which is a picture gallery showcasing mesmerising paintings and frames. Therefore, it attracts history lovers as well as painters. If you are done with exploring the historical beauty of Bundi and are looking for a place where you can just sit down and relax, then it is certainly Naval Sagar Lake, an artificial lake built in the shape of a square. You can also capture the beauty of a small temple in the middle of the lake which is dedicated to Lord Varuna, the god of water. So, what do you think about lazing by this soothing spot and getting lost in its pristine and charming atmosphere? Yes, Sukh Mahal is the place where the famous author Rudyard Kipling got inspired to pen down the critically acclaimed novel, Kim. It is a beautiful palace on the bank of Naval Sagar Lake and is a perfect spot to just chill and relax. If you are not satisfied with the above-given sites and are looking for more to satisfy your wanderlust, then you can also visit Chaurasi Khambon Ki Chhatri, Raniji Ki Baori, Sagar Bazar, Chogan Pol and Bardha Dam.
{ "redpajama_set_name": "RedPajamaC4" }
3,508
We are happy to customize any menu. All pricing is based on 50 or more guests in attendance. Please call to request pricing for groups of less than 50 guests. A 20% administrative fee, service staff, and sales tax are additional. Gourmet Express Catering reserves the right to adjust pricing if needed based on individual party parameters including but not limited to distance, length of service, or extended setup. Please contact us to request pricing for Appetizer and Main Course Appetizer Menus. We are happy to customize any menu. All pricing is based on 50 or more guests in attendance. Please call to request pricing for groups of less than 50 guests. A 20% administrative fee, service staff, and sales tax are additional. Gourmet Express Catering reserves the right to adjust pricing if needed based on individual party parameters including but not limited to distance, length of service, or extended setup. We are happy to help build any custom menu. All pricing is based on 50 or more guests in attendance. Please add $4.00 per person for groups of 25-50 guests. A 20% administrative fee, service staff, and sales tax are additional. Gourmet Express Catering reserves the right to adjust pricing if needed based on individual party parameters including but not limited to distance, length of service, or extended setup. Please contact us to request pricing for our Grilled Menus. We are happy to customize any menu. All pricing is based on 50 or more guests in attendance. Please call to request pricing for groups of less than 50 guests. A 20% administrative fee, service staff, and sales tax are additional. Gourmet Express Catering reserves the right to adjust pricing if needed based on individual party parameters including but not limited to distance, length of service, or extended setup. Please contact us to request pricing for our Dessert Menus. We are happy to customize any menu. All pricing is based on 50 or more guests in attendance. Please call to request pricing for groups of less than 50 guests. A 20% administrative fee, service staff, and sales tax are additional. Gourmet Express Catering reserves the right to adjust pricing if needed based on individual party parameters including but not limited to distance, length of service, or extended setup.
{ "redpajama_set_name": "RedPajamaC4" }
2,510
Gaza: A humanitarian implosion by TRNN December 30, 2008 September 23, 2020 A report from eight UK human rights organizations says situation in Gaza worst since 1967 VOICE OF CARLO BASILONE: A coalition of eight UK-based human rights organizations released a scathing report on conditions in the Gaza Strip on Thursday. (CLIPS BEGIN) DAVID MEPHAN, POLICY DIRECTOR, SAVE THE CHILDREN: The judgment of the various humanitarian, human rights, and development organizations like Save the Children that have been involved in putting this report together is that the humanitarian situation on the ground in Gaza today is the worst that it's been for forty years. Gaza City, Gaza Strip JOHN JING, HEAD OF UN RELIEF AND WORKS AGENCY: Eighty percent of the people here are depending on handouts of food from the United Nations. They've no other way to survive unless they get these handouts of food, because the economy has completely collapsed. And they've been stripped of their dignity, so they're left in a most miserable and desperate situation. And this report gives clear evidence of just how bad the situation is. (CLIPS END) VOICE OF MICHAEL BAILEY, ADVOCACY AND MEDIA MANAGER, OXFAM: The primary public health concerns are that if you have any disease that can't be treated in Gaza, you're unlikely to be able to go out of Gaza to get your life-saving treatment. They have to fight to get a permit from the Israeli authorities. And we know that in the last three months of last year, 20 of them lost that fight and died, simply because they couldn't get out of Gaza. If you require x-raying, if you require CT scanning, if you require other complex imaging, it's unlikely that you will be able to get that in Gaza because it's very difficult to maintain old equipment when spare parts aren't let in, technicians aren't allowed in, and the service has generally fallen apart. BASILONE: The report, sponsored by Amnesty International, OXFAM, CARE International UK, Save the Children UK, and four others adds that it considers Israel's blockade of Gaza unacceptable and illegal, and uses the term "collective punishment" to describe the situation. BAILEY: It's a strong term for a serious crime against humanity when 1.5 million people are being punished for something over which they have no control. It's the correct term to use when collectively people are being punished for something they haven't done, and which in fact they have very little influence over. I think it's very difficult for the general public in Jerusalem or elsewhere in Israel to be entirely clear about what's happening in Gaza. The news that's available to them tends to concentrate on the deplorable rockets that are fired from militants in Gaza into Israel. They tend to hear about the Israeli military incursions into Gaza. They hear very little about the daily life of people in Gaza. And indeed many people in Israel know nothing about the daily life of people in the West Bank, or even in East Jerusalem, which is the Arab part of Jerusalem, because, for most people, they don't travel out of Israel into the Arab areas. Please note that TRNN transcripts are typed from a recording of the program; The Real News Network cannot guarantee their complete accuracy. VOICE OF CARLO BASILONE: A coalition of eight UK-based human rights organizations released a scathing report on conditions in the Gaza Strip on Thursday. (CLIPS BEGIN) London, UK March 6, 2008 DAVID MEPHAN, POLICY DIRECTOR, SAVE THE CHILDREN: The judgment of the various humanitarian, human rights, and development organizations like Save the Children that have been involved in putting this report together is that the humanitarian situation on the ground in Gaza today is the worst that it's been for forty years. Gaza City, Gaza Strip March 6, 2008 JOHN JING, HEAD OF UN RELIEF AND WORKS AGENCY: Eighty percent of the people here are depending on handouts of food from the United Nations. They've no other way to survive unless they get these handouts of food, because the economy has completely collapsed. And they've been stripped of their dignity, so they're left in a most miserable and desperate situation. And this report gives clear evidence of just how bad the situation is. (CLIPS END) VOICE OF MICHAEL BAILEY, ADVOCACY AND MEDIA MANAGER, OXFAM: The primary public health concerns are that if you have any disease that can't be treated in Gaza, you're unlikely to be able to go out of Gaza to get your life-saving treatment. They have to fight to get a permit from the Israeli authorities. And we know that in the last three months of last year, 20 of them lost that fight and died, simply because they couldn't get out of Gaza. If you require x-raying, if you require CT scanning, if you require other complex imaging, it's unlikely that you will be able to get that in Gaza because it's very difficult to maintain old equipment when spare parts aren't let in, technicians aren't allowed in, and the service has generally fallen apart. BASILONE: The report, sponsored by Amnesty International, OXFAM, CARE International UK, Save the Children UK, and four others adds that it considers Israel's blockade of Gaza unacceptable and illegal, and uses the term "collective punishment" to describe the situation. BAILEY: It's a strong term for a serious crime against humanity when 1.5 million people are being punished for something over which they have no control. It's the correct term to use when collectively people are being punished for something they haven't done, and which in fact they have very little influence over. I think it's very difficult for the general public in Jerusalem or elsewhere in Israel to be entirely clear about what's happening in Gaza. The news that's available to them tends to concentrate on the deplorable rockets that are fired from militants in Gaza into Israel. They tend to hear about the Israeli military incursions into Gaza. They hear very little about the daily life of people in Gaza. And indeed many people in Israel know nothing about the daily life of people in the West Bank, or even in East Jerusalem, which is the Arab part of Jerusalem, because, for most people, they don't travel out of Israel into the Arab areas. DISCLAIMER: Please note that TRNN transcripts are typed from a recording of the program; The Real News Network cannot guarantee their complete accuracy.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
7,447
In the Season 1 finale, Michele dives in deep into two things you need to create any change that moves you to your next level of success. They are elements you probably haven't considered and may be actually holding you back from more if you don't know how to use them in your favour. Tune in as all the lesson of the season collide to help you see why your purpose, image, identity, mindset and actions need to collide in the right way to fill your life with success and joy as you define it.
{ "redpajama_set_name": "RedPajamaC4" }
8,732
1. You should use a process called "backward induction" when selecting your hunting rifle. First of all, what you need to do is to look at the end goal in mind and then pick you rifle and cartridge accordingly. In this case it is all about what type of game you want to hunt. After that you want to pick the right ammunition and cartridge for the type of game you are hunting. You want to pick a type of rifle and cartridge that will provide a clean kill that will leave a lot of meat on the animal. You do not want the animal to die too quickly and not leave any meat, yet at the same time you do not want the animal to have a prolonged death where they suffer for a long time. After you figure out what you are hunting, then you can go on to personal preference. 2. The rifle should feel right and should shoot right for you to hunt with it. Generally there are two types of rifles that you could consider for your hunting outing. There are single shot rifles and there are repeating rifles. A single shot rifle is pretty self-explanatory. It simply means that it will only take a single shot at a time. Many hunters prefer a single shot rifle because they have an easier time controlling for how many cartridges are fired at the game. Many think that this allows for a more humane kill. One downside is that you have to be a very skilled hunter in order to use this rifle. Repeating rifle fire more than one bullet at a time and can allow for a kill more easier. However, there may not be too much meat left after firing more than one cartridge at the game. 3. The type of rifle you use depends on your location. If you are shooting at game from a close up location you probably should go with a short and fast handling rifle. If you are shooting at game from a longer range you should probably go with a high-velocity rifle with a scope. If you're a beginner I recommend first choosing the cartridge that he wants to use as many of them aren't available in all rifles. Then, choose based on barrel length, finish, where you want to use it but most importantly avoid investing too much in your first rifle. You will upgrade for sure and there's really no pint in this.
{ "redpajama_set_name": "RedPajamaC4" }
9,489
What's the difference between PHP 4, PHP 5 and PHP 7? How come it's better to have them all at hand? How do you switch between them? PHP is one of the most widely used open-source scripting languages. It is extremely popular since it's free software, which you can use to build responsive websites like community portals, e-shops or online teaching sites instead of static HTML-based sites. A PHP module must be installed on the web server where a PHP-driven website is hosted so that its code can be 'decrypted'. As there are no license taxes for this sort of module and the language itself provides limitless possibilities for the apps that you develop, there're 100s of millions of PHP-powered sites. In addition, there're a lot of PHP scripts, which you can use for your sites without the need to have any programming capabilities. Given the fact that there are different PHP versions, you must verify if the same exact version that you used while setting up your website is present on the web server too. In case you buy a website hosting package from our company, you won't ever need to speculate about whether your websites are compatible with the hosting platform, since several PHP versions are activated on our servers for your convenience's sake. The Hepsia Control Panel will allow you to select PHP 4, PHP 5 and PHP 7 with only one single mouse click and in case you need to change the current version, the new settings will be applied straight away. Thus, years of work on websites created with an older version of PHP won't go down the tube. Our web hosting platform will even permit you to use a different version of PHP for each domain hosted in your account, which implies that you can run newer and older scripts simultaneously. Most web hosting providers on the market offer support for one, sometimes for two versions of PHP. Unlike them, we believe that you should be the one to choose the version that your very own sites will use. Even if your sites were built with an older version of PHP, you will be able to host them in a semi-dedicated server account from us, as we support different versions running at the same time on our servers and each of them can be enabled for your account with just one click of the mouse through our custom-created Hepsia hosting Control Panel. Aside from the newest PHP 7, we also offer 5.2, 5.3 and the older PHP 4. The latter has already been dropped by the majority of web hosting suppliers, but we are convinced that you shouldn't be forced to modify a website that took several years to develop, since older scripting language syntax does not necessarily equal safety weaknesses. Just the opposite, a well-maintained website using PHP 4 can be more secure than a non-maintained one using PHP 5. For the sake of your convenience, we'll also offer you the possibility to select a different version for each site within your account.
{ "redpajama_set_name": "RedPajamaC4" }
5,623
Q: how to programmatically run the before_destroy and other Active record hooks in rails I wan to override the destroy and the destroy_all, and the delete and the delete_all methods in rails to accomplish soft deletion (set active bit to false), without using any plugin for that. I want to run the before_destroy filter in these actions where appropriate. So how can i run the before_destroy hook, and other such hooks, programmatically from rails code? As a side question, what other detail should i be aware of when trying to monkeypatch an activerecord method like destroy, destroy_all etc? A: I think you want to follow the hard way :) Maybe a gem like https://github.com/JackDanger/permanent_records could help you to solve your problem. A: There is a similar SO question, whose answer might be of help: My custom destroy method does not trigger the default before and after destroy callbacks self.class.before_destroy_callback_chain and the self.class.after_destroy_callback_chain can give the list of methods to call. but dont know if this is the complete answer or not.
{ "redpajama_set_name": "RedPajamaStackExchange" }
316
Home Sweet Murder (ID True Crime #2) (Hardcover) Not On Our Shelves—Ships in 1-5 Days This is book number 2 in the ID True Crime series. #1: Murder, Interrupted (ID True Crime #1) (Hardcover): $28.00 #3: Murder Beyond the Grave (ID True Crime #3) (Paperback): $15.99 #4: Murder Thy Neighbor (ID True Crime #4) (Hardcover): $29.00 #5: Murder of Innocence (ID True Crime #5) (Hardcover): $29.00 #6: Till Murder Do Us Part (ID True Crime #6) (Hardcover): $29.00 As seen on the Discovery ID TV series Murder is Forever, these two true-crime thrillers follow a lawyer struggling to stop a killer and a detective angling to solve a double homicide. Home Sweet Murder (with Andrew Bourelle): Lawyer Leo Fisher and his wife Sue are a sixty-one-year-old couple enjoying a quiet Sunday dinner at home. Until a man in a suit rings their front door claiming to be an SEC agent. By the end of the evening, two people will be shot, stabbed, and tortured. And two others will fare worse . . . Murder on the Run (with Scott Slaven): The middle-aged housekeeper found dead with a knife in her throat was bad. But the little boy was worse. After a bloody double homicide that puts Omaha, Nebraska, on the map, Detective Derek Mois promises the boy's parents he will catch the killer, no matter how long or far he runs . . . James Patterson received the Literarian Award for Outstanding Service to the American Literary Community at the 2015 National Book Awards. Patterson holds the Guinness World Record for the most #1 New York Times bestsellers. His books have sold more than 355 million copies worldwide. He has donated more than one million books to students and soldiers and has over four hundred Teacher Education Scholarships at twenty-four colleges and universities. He has also donated millions to independent bookstores and school libraries. True Crime / Murder / Serial Killers Biography & Autobiography / Criminals & Outlaws Biography & Autobiography / Law Enforcement Publisher: Grand Central Publishing Series: ID True Crime "Every once in a while a writer comes along and fundamentally changes the way people read. He or she is so bright, innovative, so industrious that what they envision and create becomes the measure by which all others are judged. In 1993 one such writer - James Patterson - began to do just that. Now...with his mission still unfolding, James Patterson is the gold standard by which all others are judged." —Steve Berry, New York Times bestselling author of the Cotton Malone series "Behind all the noise and numbers, we shouldn't forget that no one gets this big without amazing natural storytelling talent - which is what James Patterson has, in spades." —Lee Child, #1 New York Times bestselling author of the Jack Reacher series
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
4,326
What are the closest stations to Hoàng Diệu? Chùa Anh Linh is 46 meters away, 1 min walk. Đoàn Văn Bơ is 162 meters away, 3 min walk. Trường Vân Đồn is 169 meters away, 3 min walk. Which Bus lines stop near Hoàng Diệu? These Bus lines stop near Hoàng Diệu: 31, 38, 72. Traveling to Hoàng Diệu in Quận 4 has never been so easy. Use Moovit to get detailed step by step directions as you travel from your current location or from a top attraction or any major public transit station. View detailed routes on a map, see bus and train schedules, arrival times, and service alerts so you know exactly how to get to Hoàng Diệu. When traveling to Hoàng Diệu use Moovit's Live Directions with Get Off Notifications to know exactly where and how far to walk, how long to wait for your line , and how many stops are left. Moovit will alert you when it's time to get off — no need to constantly re-check whether yours is the next stop.
{ "redpajama_set_name": "RedPajamaC4" }
9,700
Pete created caricatures of the twelve Magic 828 Radio presenters as a commission. Two of them – David Guselli and Nicola Duddy – then interviewed him live on the Magic Drive show to find out more about how he does it, and his other projects. Pete admitted he was nervous as we arrived at the appointed time at Magic 828 Radio's studio in Cape Town. It was not the first time he had been on the radio, and he knew he had only a short time to tell the listeners about his caricaturing as well as his monkey illustration project. The first thing we saw after being met at the reception, was the row of caricatures that had been printed on canvas and displayed on the walls and pillars of the main office area. Directly outside the studio is a large canvas of all the caricatures together. This is a fantastic and friendly way for the station to welcome its on-air guests as they can 'meet' the presenters via their caricatures right there in the waiting area before they go inside. In the studio, Pete met presenters David Guselli and Nicola Duddy who were to interview him on Dave's late afternoon drive show. They were wonderfully funny and warm and soon put Pete at ease. While a few tracks played, and then a few ads, they chatted about Pete's work and finally switched over to 'live on the air'. The interview was in two parts, focusing on Pete's caricature work at weddings, parties and by commission (such as those he had done for the radio station), and then on his long-term project in which he is illustrating monkey characters for a book entitled 'Monkeys In Your Face'. David Guselli praised Pete for the wonderful caricatures in the Magic 828 offices and thanked him for "making me look 28 years old!" He encouraged listeners to get in touch with Pete for workplace and event caricatures. While on the air, a message came in by email from an old school mate of Pete's whom he had caricatured recently. As they chatted live with Pete the presenters were exploring the monkey art in our online shop and Pete's Instagram account and they agreed it is 'very cool art; not what you'd expect'. After the interview, it was all smiles and hugs. Station CEO Tony Sanderson came out to meet us, and once again congratulated Pete on how he had made him look '10 years younger'! Visit Magic 828 AM's website: magic828.co.za and tune in every weekday from 3-7pm to hear Dave Guselli on the Magic Drive. If you'd like to commission a caricature, visit our online shop, or if you'd like to request a quote for getting the whole office done, get in touch with us.
{ "redpajama_set_name": "RedPajamaC4" }
4,619
Home » Topics » Rheumatoid Arthritis Publish Date September 9, 2016 VIDEO: Discussing the Use of Biosimilars for Rheumatic Disease Follow @https://twitter.com/RheumAdvisor Allan Gibofsky, MD, attending rheumatologist and Co-director of the Clinic for Inflammatory Arthritis at Hospital for Special Surgery, in New York City, met with Rheumatology Advisor to discuss the recent introduction of biosimilar agents into the treatment armamentarium for rheumatic disease. This is part 1 of a 3 part video series on this topic. Please scroll down to view the text transcript beneath the video. Transcript of Video Hello, I'm Allan Gibofsky, attending rheumatologist at the Hospital for Special Surgery and Co-director of the Clinic for Inflammatory Arthritis here at Special Surgery. We are going to be discussing the very important and topical issue of biosimilars in autoimmune and rheumatic diseases. I'd like to begin with a brief introduction to our topic of biosimilars. A biosimilar is a biologic molecule that, as its name implies, is similar – but not identical – to the molecular after which it was made, which is called the bio-originator. We are now seeing a number of molecules in the United States and elsewhere in the world that are biosimilars. They are purported to have the same efficacy and safety as the bio-originator molecule, notwithstanding minor differences in their chemical composition. Biosimilars in the United States were developed in response to a provision of President Barack Obama's health care reform legislation in order to provide an avenue for less-expensive biologic medications for patients who need them. In other words, the promise of biosimilars is going to be reduction in cost and increase in access. As to whether those promises are actually met remains to be seen, because we have yet to have a biologic biosimilar for any of the autoimmune diseases here in the United States market. Indeed, though biosimilars have been available in Europe and other parts of the world for several years, one cannot completely learn from their experiences because their payment and reimbursement systems are quite different. Yes, of course, you will see reductions in cost when there is only one person buying all of the drug in a country – namely the government – but in a country like ours, where there are multiple payors and multiple points of competition among drugs, it is unclear whether the introduction of biosimilars will reduce costs and improve access for our patients, or will solely reduce costs for the payors for the drugs – namely, the insurance companies. It is a point that remains to be determined. We have experience with one biosimilar in the United States market: a biosimilar to an oncology product, filgrastim. There we have seen some inroads into the costs in terms of an increased market share of the biosimilar. But as to whether we have seen increased access in the numbers of patients who need that drug remains to be determined, as well. TNFi Biosimilars: Review of Interchangeability, Bioequivalence Clinical Implications of the Recommended Approval of 2 Biosimilars: Interview With Allan Gibofsky MD follow @RheumAdvisor Biosimilars House Videos Rheumatoid Arthritis Spondyloarthritis Next post in Rheumatoid Arthritis Evidence-Based Routine MTX Reduction in RA Pts Initiating ADA Close more info about VIDEO: Discussing the Use of Biosimilars for Rheumatic Disease
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
3,338
A college diploma will require at the very least two years for completion, while a career study course can be completed in a matter of few months. powerful vision statement is an essential part of your business. Last night she was rummaging through bottles of pills and tablets when I asked her what she was trying to find she casually said she's ran out of amlodipine. Is there anything you would change about your undergraduate experience. Get certified with the Pharmacy Technician Certification Board. This is very profitable in case you have a continued require for the purchase of a package of ninety days, will save a considerable amount of money when ordering online. Hence, they are constantly seeking solutions to control extra weight from birth control pills purchased in any discount pharmacy or Canadian pharmacy. As a pharmacy technician you'll be able to expect to do routine tasks to aid prepare medication for patients. They are managing the resources efficiently in the organizations like hospital or clinics also evaluate medicines and ensure that these are safe to use. In order to be entitled to federal loans a Free Application for Federal Student Aid (FAFSA) have to be completed and aid is granted based on student need, tuition rates at the college, as well as other factors. Fear not, after a while you will know just how to handle different types of problems that may come about. They are also responsible for inspecting the operational treating dispensary and manufacturing units and providing a platform to enhance the pharmacists' role to prescribe medicine independently. As time passes, pharmacists continue to be given increasingly more responsibilities within the healthcare system. I feel this aspect is among the most toughest part with the residency curriculum. Think of computer as getting a slice of pizza in New York City - Buy in Manhattan and yes it's $2.
{ "redpajama_set_name": "RedPajamaC4" }
4,428
Jan 12, 2018 You are eligible under JAE 2018 if you are one of the following: Note: Applicants under the JAE must not have been enrolled at any of the local polytechnics before. Appeal period details will be confirmed at a later date. Apr 9, 2018 Brown kept his dating life low-key, however, until January 2017, when Brown and Jae were engaged on Easter 2017, in a rather unique way: consejos antes de divorcio Why are we not dating jae Youngjae (영재) is a South Korean singer and composer under JYP Entertainment. Take our "Which Got7 Member Are You" quiz to find out which member you For Jaebum, I think he's not really the type to date a noona so as ONLY GOT7 Sep 1, 2018 It is no secret that women around the world find country singer Kane She's from Philadelphia, and we've been dating almost… it's going to be As of 2015, Hoody is signed with AOMG, a record label headed by Jay Park . dating ban kpop Progesterone does not dress in fairbanks, like to you are not a lot Jealous Jae-chan is my favorite kind of Jae-chan, followed closely by Vain Why Do People Get Jealous? you were the one that got hurt, and you don't want to . new life you never had while you were dating him While You Were Sleeping primera cita consejos para mujeres solteras Why are we not dating jae "Be glad that Judas Two has demanded that you not be raped!" Ralph says. "Otherwise Rudolph replies, as he throws the head off ofTea Jae's lap and yanks her to her feet. "I want the beautiful girl I "Because we used to date!"The fairly JAE Centre @ NYP opening hours will be released nearer the date. We would like to invite you, your parents and friends to the JAE Centre @ NYP where to JCs/MI) may not apply for an institution in the same category through the JAE. brDima Apr am Congragulations Unnie I shipped you and Ahn Jae Hyun in ths a piece of advice please learn to be tactful not only to KHS but also to others About Jae. No matter where you are in the home buying process, I can help. From the first conversation for the pre-approval to the closing date, Jae always act chico busca chico toledo zaragoza Why are we not dating jae Jul 1, 2017 The Journal of Architectural Education (JAE) has been the primary venue for If you have questions about the format of a submission or you wish Likewise, the reviewers' identities will not be revealed to the author. . Remember that the JAE will need to keep the pictures until after the date of publication. 2018 related to Dates for 04th FAE/JAE Exam for the Banglore & Hyderabad S. No. Topic. Date. Time and Duration. Links. 1. Theory Overview & Method in August 1992 and the inertial reference system at a date still to be determined. The U.S. government is attempting to facilitate access to Japan's non-derived Agency stated that it would not in principle award new contracts to JAE. como ligar a una mujer por mensajes de texto Why are we not dating jae Aug 28, 2018 South Korean President Moon Jae-in has declined to attend the North and South have agreed to meet in September in Pyongyang, but the date of the no changes to summit plans have been made since U.S. President Read Zero Dating - Jae X Male! Reader (Day6) from "You haven't come to visit Jae in a really long time. We're not going to be seeing each other anymore. Explore Jay Leno's Big Dog Garage, one of the best car collections in the country. If You Liked Jay Leno's Garage. New Amsterdam. Manifest. America's Got -sinnett-‎ dating 50 plus singles cruises deals Why are we not dating jae Lady Jae Save up to 50% on save the date cards at Shutterfly. Share the news of Ours were not, but the background picture is faded out a bit as a background. Here too the j.E. 1757 estate map is an invaluable source of information. for many the j.E. l 75 7 map. the Randle Holrne sketch of mid-seventeenth-century date (British Library Harleian MS 2073 f. we'd it" will: .ierwtri . '0' .714 not. 17.
{ "redpajama_set_name": "RedPajamaC4" }
6,857
I've been able to create data CDs under Linux for a while, and recently learnt how to make audio cds. But there were still some tasks that I didn't know how to do, but were sure could be done. So I did some research. I started with the Sept/Oct 2000 issue of the now-defunct Maximum Linux magazine. I had used this issue ages ago to learn how to setup the cd burner and make data cds. It had a lot of extra information that was now relevant. Then I looked at the CD-Writing-HOWTO that gets installed in /usr/doc/Linux-HOWTOs under Slackware, and is probably somewhere similar for other distributions. And finally, I read the man pages for cdrecord, readcd, cdrdao and cdda2wav. I find man pages easier to read and understand when I have a bit of a background of the topic. So now that I know, the trick is not to forget. And that means I have to write a web page so that I can refer back to it. The essence of doing this is to set your system up for a SCSI cd burner. If you actually have a SCSI cd burner, then your system should work as is. If you have an ATAPI cd burner like most of us, then you have to build a special kernel and fake the SCSI. If you don't know how to build a kernel, it's time to learn. I'll give rough instructions here, but you should investigate further and learn what to do. See your distribution manual, or read the O'Reilly book by Matt Welch Running Linux or use any of the thousands of tutorials that can be found on the Web by doing a Google search. configure the kernel. There are three ways to do this. It's your choice. "make config" for the painful command line method. Avoid this. "make menuconfig" for the curses based configuration program. I use this. It's fast and convenient. "make xconfig" for X based configuration program. This is very similar to the curses version, but prettier. put the new kernel into place with "cp /usr/src/linux/arch/boot/i386/bzImage /boot" This shows I have two SCSI buses. The first one I know is a real SCSI card in my machine, the one that is attached to my Hewlett Packard photo scanner. The second one is the emulation SCSI device. It has two devices on it and that pretty clearly shows me that my Yamaha CD burner, model CRW8824E, is device 1,1,0. So for all examples below, when I want to burn, I use dev=1,1,0. And if I want to read CDs in the DVD drive, I would use device dev=1,0,0. The first step will create a large file containing the files and directory structure that you want on the cdrom. The program to use is mkisofs - MaKe ISO File Structure. If you look at the man page for mkisofs, you'll see that it takes a lot of options. I use a very limited set of the options. Here's the commonest form of what I use. I specify -r to set up the file permissions in the simplest and most useful way on the cdrom. -o is the name of the file that gets created. And at the end I list a directory that contains the file structure I want put on cdrom. When this finishes, I check the ISO image to see that it contains what I expected, by mounting it. This is a feature that I appreciate very much. and then I can rummage around inside the ISO image and make sure it's all set up correctly before I burn it. The second step is to burn the ISO image to a blank cdrom. Set the speed to what your burner will take. I usually use 8 because my burner is rated at that. And set the dev= to the correct values for your burner. "cdrecord -scanbus" is your friend. See how to determine your device. The first step is what takes me a lot of time. If I am collecting songs from a cd so I can build a compilation cd, then it's no big deal. I use cdparanoia to rip the cds from the original cds. However, I spend a lot of time digitising audio tapes and vinyl. What you ultimately want is raw PCM data. This data is usually wrapped inside a very primitive structure, and the result has a WAV extension and is called a wav file. cdparanoia will create the PCM data and wrap it automatically in the WAV structure. Most recording programs will do the same thing. cdparanoia has many more options. Read the man page for how to name the tracks as you go. -r sets the sampling rate (44100), -b sets the sample size in bits (16), and -c sets the number of channels (2 for stereo). If you use other recording programs, you can set the same parameters. I have dabbled with sox and snd and both these do a nice job. I have also fiddled with the Gnome and KDE utilities and again, these do a nice job. But I keep coming back to yarec because I can write scripts around for when I am digitising an entire LP or tape and I want to insert the track breaks. Before you can use yarec, you need to set the input channels and the sound levels. I use aumix for this. There are plenty of other programs, but I like aumix. I used the Linux Journal Press book The Book of Linux Music and Sound by Dave Phillips, to help me get through the learning process of building your own audio files. I strongly recommend this book. I use -pad because most of the tracks that I create myself from non-cd sources do not have an integral number of blocks (man cdrecord to understand that), -pad will clean that up for me and pad the data. All files specified after -audio are assumed to be audio files. What sort is determined by the extension. I use WAV files, so that works out fine. Copying a cd, data or audio, requires two passes. I reckon that even the slick Windows programs require two passes. You have to fill in the numbers for dev=x,x,x, so see above for how to determine the numbers. Set the speed to whatever you normally set it at. /dev/player is the player device. Change that to fit your circumstances. I have used this, but not successfully. I don't think my DVD player is fast enough to keep the data coming in to the burner. Reading from a hard disk is a lot faster than reading from a cdrom. I prefer to do all this stuff in two passes anyway. I tried a number of different methods of getting the data to hard disk. I used dd, but wasn't happy with the results. Then I tried readcd, a utility that comes with cdrecord. The first method I tried of getting the data from the cdplayer was with dd. I did this and got an error at the very end. However when I mounted the image I had created, it looked fine. "mount -o loop -t iso9660 cdimage /mnt/test". It looked okay, but I didn't trust it, so I don't use this method any more. There is a utility that comes with cdrecord called readcd. This is nice. It gives a nice count of the reading, doesn't give any errors and is my preferred way of sucking a cd to hard disk. You have to setup the dev=x,x,x yourself, using "cdrecord -scanbus" to determine what SCSI devices you have. See above. and that works very nicely. If you want to check your work before you attempt a burn, mount the ISO image with "mount -o loop -t iso9660 cdimage /mnt/test". Then cd to /mnt/test and check that it's all there. If you're happy with the arrangement, umount the image, then burn. Again, a two pass method is required. Obviously, the new audio cd will not be an exact bit for bit copy of the original. But it will be close enough. There are a number of ways of doing this. cdparanoia will do it. cdda2wav (comes with cdrecord) will also do it. I started with cdda2wav. This produces a lot of screen information and seems slow but does a nice job. It will produce audio.inf and cddb files, but I turn these off with -H. This will produce a bunch of tracks in the format audio_nn.wav. There are lots of options with this program. One of them is to echo to the soundcard. You can play while you rip. I haven't tried this. Too junky for me. This pair of programs, cdda2wav and cdrecord, work well together. But I'm used to cdparanoia for my ripping, so I thought I would try it too. which starts at track 1 and goes to the end. I found that this occasionally shows bad data in the very first read of the cd, but Ctrl-C and restart clears that up. cdparanoia will produce WAV files with a filename format of tracknn.cdda.wav. Again, they are in the right order, ready to be burnt to an audio cd with cdrecord. Interestingly, cdparanoia produces exactly the same size files as cdda2wav does, so either that reflects the common origin, or the PCM data is the same regardless of what extracts it. You have to pad the files (-pad) so the WAV files are in the right size for the cd burning. The tracks on the audio cd will be in the normal ls order of the tracks you specify, so name them so they will ls in the correct order and you'll be fine. The output of cdda2wav is already in the right order. If you're making a mix and match type of cd, like a greatest hits, then you rename them to be in the order you want. I can now duplicate data and audio cds under Linux. I am unsure if this works with bootable cdroms. This is something I will test later. I am much happier now that I know this. I can write my little scripts and automate a lot of this. There are front ends that do all that for you and I plan on investigating them. However, front ends hide information and I don't like that. If I wanted a GUI front end to hide tricky details, I would be using Windows. Little scripts are much handier.
{ "redpajama_set_name": "RedPajamaC4" }
1,864
"President Obama leaves office on Jan. 20 after eight years. We invite you to reflect on his successes and failures, and how you will remember him. We will see if the Times actually publishes any submissions outlining some of Obama's many failures.
{ "redpajama_set_name": "RedPajamaC4" }
5,137
Xinxiang Gaofu Machinery Co., , Experts in Manufacturing and Exporting Vibrating Screen Equipment (Rotary Vibrating Sieve, Linear Vibrating Screen and 2232 more Products. A Verified CN Gold Supplier on Alibaba. rotary drum trommel screen vibrating screen for mining offers 2385 concrete vibrating screen products. Guangzhou HwaBao Mining Equipment Large output rotary trommel drum screen. popular yk series vibration screen in south africasilica sand YK series vibrating screen separator machine. YK industrial vibrating screen/wet sieve screen/sand sieves shaker for mining processing. YK Type Vibrating Screen Gold Coal Vibrating Screen Machine. Ball Mill, Rotary Kiln, Jaw Crusher manufacturer / supplier in China, offering China Factory Coal/Lime Rotary Dryer Machine/Drying, Diameter 11m Large Cast Gear with Heat Treatment for Large Mining Machine, Mqs Series Low Cost Grid Type Ball Mill for Granite Grinding and so on. Rotary Vibrating Screen, Vibrating Screen, Screening Machine manufacturer / supplier in China, offering Rotary Vibrating Screen for Screening Powdered Sugar, Round Ultrasonic Rotary Screener for Separating Fertilizer Powder, Cassava Powder Sieving Machine Ultrasonic Vibrotary Screen and so on. Used Vibrating Screen. mining used silica sand vibration screen machine for sale. US $700 6000 / . new type hot vibrating screen factory cornstarch powder ultrasonic rotary screen. Our main products include 7 series of round, tumbler screen, intermediate frequency screen, linear vibrating screen, mining screen, conveyers, air jet sieve etc. The rotary screen is a mining machinery, also called roller screen, which is widely used in dry powdered or granular material screening in industries such as metallurgy, building materials, grain, chemical and fertilizer etc. This product can also be used for the wet granular material screening. Introduction Rotary vibrating screen is designed as a high precision screening machinery, it is composed of a upper cover, a screen box, a base and a vertical motor with eccentric weight installed at two ends. rotary vibrating screen manufacturer/supplier, China rotary vibrating screen manufacturer factory list, find qualified Chinese rotary vibrating screen manufacturers, suppliers, factories, exporters wholesalers quickly on Made in China. Efficient Rotary Vibrating Screen,Fruit Juice Rotary Vibro Sieve,Vibro Sifter . Food Processing, Chemical industry, food industry, metal, metallurgical mining. . Small size, light weight, saving space. .. zs vibro sifter rotary sifter zyd vibro sifter. ore rotary screen Nagaland Page. coal Vibrating screen is a kind of sieving equipment of international advanced China iron Liner Vibrating Screen machine gold ore sand ore trommel screen SINOLINKING Gold Mining Ore Trommel Sand Trommel Screen Machine . sand washing rotary sieve machine copper ore, gold ore, .
{ "redpajama_set_name": "RedPajamaC4" }
103
The wily octopus: King of flexibility by Diana Kenney, Marine Biological Laboratory An octopus (O. bimaculoides) extends an arm to explore its environment. Credit: Michael LaBarbera Octopuses have the most flexible appendages known in nature, according to a new study in Scientific Reports. In addition to being soft and strong, each of the animal's eight arms can bend, twist, elongate and shorten in many combinations to produce diverse movements. But to what extent can they do so, and is each arm equally capable? Researchers at the Marine Biological Laboratory (MBL) filmed 10 octopuses over many months while presenting them with a variety of challenges, and recorded 16,563 examples of these arm movements. Amazingly, all eight arms could perform all four types of deformation (bend, twist, elongate, shorten) throughout their length. Moreover, each type of movement could be deployed in multiple orientations (e.g. left, right, up, down, 360º, etc.). Especially noteworthy was the clockwise and counterclockwise twisting that could occur throughout each arm during bending, shortening or elongating. This twisty strong arm is exceptionally flexible by any standard. "Even our research team, which is very familiar with octopuses, was surprised by the extreme versatility of each of the eight arms as we analyzed the videos frame-by-frame," said co-author and MBL Senior Scientist Roger Hanlon. "These detailed analyses can help guide the next step of determining neural control and coordination of octopus arms, and may uncover design principles that can inspire the creation of next-generation soft robots." Examples of arm deformation types in an octopus (O. bimaculoides). From: E.B. Lane Kennedy, Kendra C. Buresch, Preethi Boinapally, and Roger T. Hanlon (2020) Octopus Arms Exhibit Exceptional Flexibility. Scientific Reports, DOI: 10.1038/s41598-020-77873-7 Credit: Roger Hanlon Lab/Marine Biological Laboratory Engineers have long wished to design "soft robotic arms" with greater agility, strength and sensing capability. Currently, most robotic arms require hard materials and joints of many configurations, all of which have limitations. The octopus presents a novel model for future robotic designs. Octopus arms are similar in function to the human tongue and the elephant trunk; they are muscular hydrostats that use incompressible muscle in different arrangements to produce movement. The current study provides a basis for investigating motor control of the entire octopus arm. Soft, ultra-flexible robotic arms could enable many new applications, e.g., inspecting unstructured and cluttered environments such as collapsed buildings, or gentler medical inspection of alimentary or respiratory pathways. Do octopuses' arms have a mind of their own? More information: E. B. Lane Kennedy et al, Octopus arms exhibit exceptional flexibility, Scientific Reports (2020). DOI: 10.1038/s41598-020-77873-7 Journal information: Scientific Reports Provided by Marine Biological Laboratory Citation: The wily octopus: King of flexibility (2020, November 30) retrieved 18 January 2021 from https://phys.org/news/2020-11-wily-octopus-king-flexibility.html Octopus-inspired robot can grip, move, and manipulate a wide range of objects How octopuses don't tie themselves in knots Octopus arm inspires future surgical tool Video: Octopuses have unique way to control their 'odd' forms Robotic swimmer with supple silicone web mimics octopus
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
9,259
Contact says smelter closure is 'disappointing' Contact Energy ("Contact") CEO Mike Fuge said Rio Tinto's intention to effectively close New Zealand's Aluminium Smelter ("NZAS") by giving 14 months' notice on their electricity contract with Meridian Energy was "very disappointing". He said all commercial parties involved in dealing with NZAS, including Contact, had collectively delivered significant cost reductions for electricity. "We've all had a strong desire to help secure the financial sustainability of the unique low-carbon smelter at Tiwai, and retain the 1,000 high-paying jobs in Southland, plus the 1,600 contractor and supplier roles. "We're very disappointed to have played our part in delivering these savings for one of the greenest smelters in the world and to have such limited engagement from Rio Tinto. We urge Rio Tinto to seriously consider the offer for improved electricity supply and encourage them to consider what is right for Southland, for New Zealand and for their own global environmental commitments." Mr Fuge said that with the disorderly exit of 13 per cent of national electricity demand looming, Contact would now accelerate mitigation options including the consideration of closure of the Taranaki Combined Cycle thermal power station at Stratford. Contact also expects Transpower to expedite the build-out of the transmission grid and in this regard welcomes the commitment to the lower South Island transmission upgrade. He said that the smelter's departure will have a significant impact on the Southland economy. "In addition, the decision will also result in an avoidable and significant increase in global emissions as production shifts away from NZAS to aluminium smelters powered by electricity generated solely from fossil fuels." Mr Fuge said customers should expect to see an increase in transmission costs as the proportion of transmission costs currently paid by NZAS will be spread across all customers. "The reality is that NZAS has subsidised transmission costs to consumers for years. Not only will those costs now fall to other customers, there will also be additional costs for the significant transmission investment from Transpower now needed to shift surplus energy from the lower South Island north to where it is needed. In the meantime, the surplus water currently being used to generate renewable energy in Southland will in large part end up flowing down the Clutha River." Contact's 'shovel-ready' Tauhara geothermal power station remained New Zealand's cheapest and most attractive option for new, renewable, baseload electricity generation, but Mr Fuge said the sensible option was to defer this investment. "Tauhara remains a fantastic project, however it is prudent to press pause for now. We need to factor in the impact of COVID-19 and the potential exit of NZAS and get a clearer picture of demand," he said. Opportunities to decarbonise transport and accelerate the electrification of South Island industry away from a reliance on coal remained in focus. "One silver lining is that we expect today's news to be a catalyst for users to accelerate their shift toward low-carbon electricity – however this transformation would be a slow burn and take much longer than 12 months." Mr Fuge said Contact would update the market on any implications of the NZAS exit on the company's expected earnings and dividend. "We're accelerating our mitigation plans to minimise the financial impact. Our portfolio of long-life renewable generation assets, flexible thermal assets and fuel contracts, and strong balance sheet provide confidence we are well-placed even in a lower demand environment." Source: Contact Energy Source: Contact Energy
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
2,213
Paliperidone injection is used to treat the symptoms of psychotic (mental) disorders, including schizophrenia. Invega Trinza® is used if patients have been treated with Invega Sustenna® for at least 4 months. Invega Sustenna® may also be used alone or in combination with other medicines to treat schizoaffective disorder. This medicine should not be used to treat behavioral problems in older adults who have dementia.
{ "redpajama_set_name": "RedPajamaC4" }
1,631
I know we have talked about statement accessories before. I personally love statement necklaces. Since acquiring my first beautiful statement necklace at Christmas from Tracy, I have purchased several others. We have also posted about statement earrings before too. While I find these beautiful, they just are not for me. With the arrival of March, Spring has unofficially begun. Here we have started off with snow and freezing weather, but the weather is looking a lot nicer this upcoming week. Spring and Summer always make me think of sunglasses. During the sunny days of Spring and Summer they are a must have accessory for me. If I am not wearing them when I leave the house, they are in bag so that I can pull them out when needed. Lately I have seen a lot of websites with very embellished sunglasses- statement sunglasses. I love these cases for sunglasses, they are so cute. I have put together a few of my favorite pairs and you can see two pairs that I would absolutely love to have here and here. Are you into statement sunglasses? While some of them would just be too much for me, I do love the moon and stars pair above. They are so beautiful. Do you like the embellished sunglasses or do you prefer the simple frames? Are sunglasses a must have accessory for you like they are for me in the Spring and Summer? Wow..these eyeglasses surely pack the style punch! Thanks for sharing! Hope you are having a wonderful day! So I'm still on the fence on how I feel about this trend. They're definitely all super cute, I'm just not sure if the added decor will look nice on my face! Loving the first photo you posted - the flowers on the edges are so cute. I was never into sunglasses before, but I totally dig these floral ornamented, cat eye glasses. Where can I find cheap ones? Also, thanks for stopping by my blog. Would you like to follow each other? I like the idea of statement sunglasses! Love the neon ones with the roses! I love this trend – at first I wasn't that into it, but now I can't get enough. I like the first pair, it's so colorful and fun! wow - these are so fun! i would love some sunglasses covered in sparkles. the floral ones here are great too. Nice blog , lovely nd beautyfull looks, do you want to follow each other, if yes let me know, greetings from Moscow! Keep in touch! I'm not actually much for statement sunglasses, but I definitely love that moon and star pair too. Not sure I'd wear them...but I might just hang them somewhere to have something fun to look at! How cool are these sunglasses, love the drama about them, they are so unique and seem really fun to wear! Love the colourful one and the pretty pair with the white flowers. These are all so adorable. :) I mainly use few basic models, but these could really spice up outfits! Great choices. I just have one pair of House of Harlow sunglasses but I love them so very much! I love these glittery sunnies! The sunnies on the first picture are a masterpiece, I love them ! You picked some great sunnies! You're def making me want to bust out my collection again...maybe this summer I'll get over my phobia of breaking or losing them (which has happened countless times) because whats the use if they never see the sun!? i´m an addict to fabulous shades and you picked some really amazing pairs here i want them all, but especially those with the tropical fruits on the very first pic and well also those moon shades i need them! Thank you for your lovely comments. They really make our day. Blog Design by Delightful Designs. Powered by Blogger.
{ "redpajama_set_name": "RedPajamaC4" }
4,771
Two men indicted for acid attack of Nazareth teen Relatives of girl who was seriously wounded, blinded in one eye, will face charges of sexual abuse, aggravated assault. Nazereth 521 (photo credit: Makbula Nassar ) Less than a month after a Nazareth teen was attacked with acid in her home, the district attorney for the northern region indicted two male relatives of the girl. The attack left the victim seriously wounded and blind in one eye, with doctors battling to save her vision in the other. The defendants, both of whom live next door to the girl, will face charges of sexual assault for abuses police say they carried out against the victim over a period of time before the assault. The older suspect, aged 51, was also charged with aggravated assault for throwing the acid in the girl's face. Police and the prosecutor's office charge that the girl was attacked after the 51- year-old man found out that she was getting engaged to another man, which he feared "would cause her to become distant from him and he would be unable to have his way with her anymore," according to the indictment. The document states that on February 18 at 11:30 p.m., the man knocked on the girl's window and when she opened it, he threw hydrochloric acid in her face and fled the scene. According to the indictment, the man's crimes "show great cruelty, to the extent to where he would stop at nothing in order to have his way with her, and show that he has no respect for human life." Attorney Said Hadad told The Jerusalem Post on Sunday that his client, the 51- year-old man, has denied all the charges against him and was not at all connected to the incident. Hadad added that his client was at home at the time of the attack and that there are witnesses who have attested to this fact. When asked why police singled him out, he said his client had told him that he had been set up. At Rambam Hospital last month, the victim's mother said that her daughter had been harassed by the man for a long time, and that in recent months the harassment had gotten worse, and included threats to harm her physically. She also said that her daughter had become engaged to a student living in Jordan shortly before the attack. A gag order remains on the case banning publication of the names of the defendants or the victim and her family.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
7,375
7 Days Cultural Tour Trip Length : 06 Nights, 07 Days Travel Back In Time Dambulla, Polonnaruwa, Kandy and Sigiriya all fall within the cultural triangle of Sri Lanka; the seat of ancient civilisation dating way back to 4 BC. A narrative speaks from a bygone era, as you take in the colourful murals which cover over 2000 square metres, in the Dambulla Cave Temple. The Temple is also famous for the 150 Buddha statues housed in the five caves. The irrigation systems, sculpture and stone workmanship, as seen in the Gal Vihara and its granite statues, are wondrous to behold in Polonnaruwa, a city which flourished under King Parakrama Bahu in the 12th century. You will only be further amazed at the sight of the 5th Century Rock Fortress in Sigiriya. Known as the Lion Rock, the site showcases a planned garden city, water systems and the beautiful frescoes – in the once impenetrable kingdom of King Kasyapa. Travelling to Central Sri Lanka, Kandy is a bustling city with mountain ranges protecting what was once the last kingdom to resist foreign forces in the 19th century. As you drive into Kandy city, the Kandy Lake ushers you to the sight of the Dalada Maligawa. The Temple of the Tooth which was built initially in the 16th century, is where the tooth relic of Lord Buddha is enshrined. Truly a hotpot of culture and faiths, you can easily walk through the streets of Kandy and see Buddhist and Hindu temples, mosques and churches – dating back in time. Day 1 – Arrival in Negombo Day 2 – Negombo Fish Market/ Dambulla Cave Temple Day 3 – Sigiriya Rock Fortress/ Polonnaruwa Historical Site Day 4 – Aluvihara Temple / Temple of the Sacred Tooth Relic in Kandy Day 5 – Three Temples in Kandy Day 6 – City Tour in Colombo Day 7 – Departure from Colombo Day 1 - Arrival - Negombo On arrival at the Bandaranaike International Airport, meet and greet & transfer to Negombo Check in to the hotel (check in time after 12. 30 p.m) Evening - enjoy a short visit to the neighbouring communities with your guide (Depending on your arrival time) Dinner and overnight stay at your hotel in Negombo Less than 5 kilometres from the airport is the fishing coastal city of NEGOMBO. Captured by colonisers starting in the 17th century, it's priceless cinnamon trees was a gold mine for the likes of the Dutch, Portuguese and the British. Today, regal churches and colonial styled buildings reflect a bygone era, amidst the hustle and bustle of a vibrant fishing city, blessed by a beautiful lagoon and canals to explore the place and of course the beach - warmly embraced by the Indian Ocean. Day 2 - Negombo – Dambulla – Sigiriya Early morning visit to an authentic fish market in Negombo and interaction with a vibrant and busy fishing community Leave for Sigiriya via Dambulla after breakfast Visit Dambulla Cave Temple Check in for an overnight stay at the hotel in Sigiriya Dambulla Rock Cave Temple, known as the "Golden Temple" consists of 5 caves, containing countless images of Buddha and goes back to 1st century BC when King Valagambahu took refuge here. The most elaborate and most spectacular of the five, is the second cave – which at 170 feet in length 75 feet in width and 21 feet high, is the largest of all. There is a large reclining Buddha statue and statues of two kings namely, Valagambahu who took first took refuge there and did most of the constructions and Nissankamalla who later improved on the cave. In the centre of this cave, is a large container to collect the water that drips from the rock ceiling even during the dry season. This place is worth visiting not only for the cave temple, but also for the beautiful view over the countryside one gets from near the caves situated at around 150m above the road. Day 3 - Sigiriya – Polonnaruwa – Sigiriya Breakfast at the hotel Climb Sigiriya Rock Fortress after breakfast Upon finishing the visit at Sigiriya proceed to Polonnaruwa Visit Polonnaruwa Historical Site Back to the hotel in Sigiriya for overnight stay The ancient city of SIGIRIYA is a signature historical destination in Sri Lanka. A World Heritage Site since 1982, it shares the stage with the monumental wonders of the Pyramids and the Grand Canyon, and is even considered as the Eighth Wonder of the World. The Rock gets its name from the words 'sinha' (lion in Sinhala) and 'giriya' (throat), hence the word: Sigiriya. The iconic paintings of the 'Cloud Maidens' have been paid tribute to by poets over the ages. The frescoes exude a beauty and artistry only comparable to the Ajanta frescoes of India. The final and almost precarious ascent to the top of the Rock, is through – what remains of a majestic lion sculpture: the gigantic paws, sculpted into the side of the rock. And on reaching the summit one stands tall, 600 feet from the ground, with a breathtaking panoramic 360 degrees view with gusts of wind which can catch you unawares. POLONNARUWA has historically been a favoured capital city in ancient Lanka. King Vijaya Bahu was the first to make the city his capital but it is during King Parakrama Bahu's rule, that the city experienced a renaissance. The planned development of the city saw intense activity in irrigation systems, strengthening of trade and special emphasis on sculpture, art and architecture. The 2500 hectare tank called 'Parakrama Samudra' (Sea of Parakrama) is a scenic reservoir draped with greenery and brushed with sweeping, cool winds. Walk around the historic sites and be a guest at the ruins of the Audience Hall and 'Nissanka Malla', the Royal Palace, all impressive structures, reflecting the grandeur of that civilisation. Interestingly, one will see the emergence of South Indian architecture along with Dravidian and Hindu artistry – a facet never seen before this era. The Shiva temple, made entirely out of stone, captures Chola temple architecture taking its place prominently - along with other forms of art and sculpture - in Polonnaruwa. Day 4 - Sigiriya – Kandy Leave for Kandy after breakfast Visit Aluvihare Temple in Matale Check in at the hotel in Kandy City tour in Kandy in the evening, including a visit to Temple of Sacred Tooth Relic & a Cultural Show Overnight stay at the hotel in Kandy The Aluvihare Temple was built by King Devanampiyatissa around the 3rd century BC. Situated in Matale, about 30 kilometres from Kandy, it is enclosed by hills and rocks. It is widely accepted that this temple has a historical importance in the reservation of Buddhism in Sri Lanka as it is here that the writing of the Tripitaka (Buddhist scriptures) in Pali happened after the passing away of Lord Buddha. The preservation of his teachings was passed on verbally. Sri Dalada Maligawa, the Temple of the Tooth, dates back to the 16th century, with many extensions and changes occurring until the 19th century. It is home to the Sacred Relic of the Tooth of Buddha – the most venerated object in the Buddhist world. Walking into the shrine will take one through numerous buildings, corridors and chambers that are highly decorated with colourful and ornate carvings. Various services are held daily for the worshippers. The distinct sounds of traditional drums skillfully handled by costumed artistes, accentuate the spiritual ambience. The drums also signal the ceremonial opening of the Inner Chamber's window for the public viewing of the casket with the Relic - brought from India 2500 years ago. The tour does end prior to the commencement of the drumming. Day 5 - Kandy After a laidback breakfast, a visit to Gadaladeniya & Lankathilaka, in the suburbs of Kandy A luncheon with a French turned Sri Lankan historian to discuss Sri Lankan history, culture and art Return to the hotel In the evening you will be met by our special invitee, to attend a brief Buddhist ritual. This will be followed by a 45 minute discussion about Buddhism & meditation Gadaladeniya Rajamaha Viharaya is an ancient monastery located on a hilltop in Diggala. An inscription there proclaims that it was built by King Buwanekabahu IV in the year 1344. The main shrine houses a seated Buddha surrounded by four standing Buddha statues. While the frescoes and interior sculptures found here depict Jataka stories of Lord Buddha. A distinct feature of the shrine is the Makara Thorana (Dragon Arch) which is embellished with images of gods like Brahma, Sathusta, Suyama and Natha. Noteworthy is the strong influence of South Indian architecture alongside Kandyan artistry. Overlooking the Hantane mountain range, the Lankathilaka Viharaya was constructed entirely on rock and using granite for its main building. Beautiful murals and decorative paintings, especially of two lions, adorn the monastery. Professor Jacques Soulie Professor Jacques Soulie, the Director of the Alliance Francaise (French Cultural Centre) Kandy, has made this city his home. He has mastered speaking the Sinhala language and has become pivotal in strengthening Franco-Sri Lankan relations. In addition, he is a visiting lecturer at the Peradeniya University and contributes to literary events. Vipula Wanigasekera A Senior lecturer at the National School of Business Management and a Marketing Professional, Wanigasekera, has many years of experience in meditation. His collective experiences motivated him to write the book 'Pointers to Enlightenment' paving the way for Wanigasekera to conduct meditation sessions. Day 6 - Kandy – Colombo Following breakfast, depart for Colombo Check in at the hotel Evening City tour in Colombo in the evening Overnight stay at the hotel in Colombo COLOMBO is Sri Lanka's stand out city and hub for anything new. Amidst the impressive hotels and high rise buildings, the past peeps through, if one takes a closer look. Arab traders docked at this strategic city to trade in spices and gems. The Portuguese, Dutch and the British all used Colombo as a central command location. Street names such as Bloemendhal Road, De Kretzer Road and Gregory's Road are all reminiscent of a bygone time. Many colonial buildings can be also seen around the city. Independence Square with its landscaped gardens is a monumental salute to Sri Lanka's Independence; an emblematic structure of grand Sri Lankan architecture; an inheritance of centuries' worth. Day 7- Colombo – Departure After breakfast depart for the Airport (check out time from the hotel is before noon) [Please check-in at least 60 minutes before the scheduled time of departure] 14 Days Cultural Tour
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
1,512
Posted inChild Welfare, Civil Liberties, Legal / Civil Courts Bill to Set Age Limitation on Marriage In Connecticut Clears First Hurdle by Jack Kramer March 30, 2017, 10:30 am January 21, 2021, 6:58 pm HARTFORD, CT — Legislation that would prohibit the issuance of a marriage license to anyone under the age of 18 cleared its first hurdle Wednesday. The legislation was approved on a 32-7 vote of the Judiciary Committee. All seven members voting against the proposal were Republicans. Marrying that young "can be detrimental to a child's well-being," Rep. Michelle Cook, D-Torrington, said during a public hearing held on the proposed legislation. Cook was one of the co-sponsor of the legislation. The bill has some exceptions, including a teen who is pregnant or if the intended spouse is a member of the Armed Forces and has the written consent of a parent and a probate judge. "Statistics show that when married young, children tend not to finish high school or pursue college," Cook said. She added that when teens marry young "they are more susceptible to pregnancy and sexually transmitted diseases that can compromise their health." Cook added that the bill "also protects children from being led into human trafficking and forced marriages." Laws in 27 states, including Connecticut, do not have a minimum age below which a child cannot marry. Connecticut, New York, Massachusetts, and New Jersey are all considering bills this year that would limit child marriage. Currently, Connecticut's legal age to marry is 18 but the law allows for exceptions: 16- and 17-year-olds can marry as long as they obtain parental consent. And children 16 and younger can marry if they obtain approval from a probate judge. The bill was brought to the attention of Cook by a Litchfield couple who learned about Connecticut's law while doing research for mater degrees in public health. During the public hearing on the proposed legislation, advocates for children urged the Judiciary Committee to back the proposal. Janet Walsh, acting director of Women's Rights for Human Rights Watch, a New York-based organization, testified that she was shocked Connecticut had no age limitations on marriage. "Such a law is out of step with the rest of the world," she said. "Even in countries with high rates of child marriage, there is usually recognition that marriage before the age of 18 is harmful, and [there is] an effort to prevent these marriages, beginning with reforming the law." She said that of the countries in which Human Rights Watch has worked to end child marriage, only Iran, Saudi Arabia, and Yemen — like Connecticut — have set no minimum age below which marriage isn't permitted. Judiciary Committee members were moved during the public hearing by the testimony of Nalia Amin, who told them she grew up in New York, was engaged to be married at age 8, and married at 15. "Even though I was still living in New York, I was taken back to Pakistan and forced to marry a first cousin who was 13 years older than me," Nalia told the committee. "I was rescued by the State Department and child protective services in March of 2015. "I lost my youth and my mental health is just not the same. The happy-go-lucky girl is gone. I can go months now without laughing. He robbed me of my childhood. My body and soul were taken from me by force," Nalia said. The Judiciary Committee gave broad support to the bill, but didn't pass it unanimously. Among those voting against it was Rep. Rob Sampson, R-Wolcott. Sampson said his main objection was that the legislature had several bills in front of it this year concerning regulating young people, naming tobacco use and parental consent for abortion as two examples. "I have some concerns about whether or not the state of Connecticut should be involved in the institution of marriage at all," Sampson said.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
9,381
How Security Films Can Maintain Your Safety and Privacy at Home / Home Improvement / By dvdm Window films can provide homeowners with a wide range of advantages, including protection from the sun's harmful radiation, reducing glare, and maintaining a cool temperature. Aside from these, window tinting Reading can also help ensure privacy and safety at home. You can consider applying security window tint films on your glass windows to deter possible intruders. Security window tinting Portsmouth typically has features that help improve privacy inside your residence. Aside from keeping your home private against the prying eyes of your neighbours, it can also enhance and improve the security of your house from burglars. Aside from this, window tint films also make it difficult to break the glass window. The adhesive used in applying the tint film makes your windows resistant to impact and more challenging to break. Additionally, it can also help keep the shattered glass pieces in place. Window tint films can also have shatterproof features that help keep glass shards together and reduce possible injuries. Besides the safety, security, and privacy advantages that it can provide to homeowners, security window films also help households increase their energy efficiency and reduce the negative impact of glare. Additionally, window tint films can also protect their furniture from fading or causing damage due to solar heat ultraviolet rays from the sun. For more information about how security films can maintain your privacy and safety at home, here is an infographic from Global Tint.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
5,688
China's second biggest OTA Qunar has said that it is "closing the gap" with market leader Ctrip and that leisure travel in China is "immune" to the recent slowdown in the country's growth. The OTA's Q2s came in ahead of expectations, with bosses highlighting some operational successes alongside a financial performance which means Qunar is now the fourth largest e-commerce business in China after Alibaba, JD.com and Ctrip. One highlight of the quarter was the success of an offline marketing campaign. CEO Chenchao Zhuang said the campaign helped Qunar to attract more new users in the first six months of this year than it did during the whole of 2014. CFO Yilu Zhao added that, in the past three months, 13 million people used Qunar for the first time. Mobile revenues for the quarter were RMB600.1 million (US$96.8 million). This is more than 300% higher than the same period last year, with mobile accounting for 68% of total revenues, compared with 36% before. Mobile accounted for more than half of its flight revenues and 85% of hotels. Zhao told analysts on the earnings call that the new users who came to Qunar via its offline campaign were higher-spending and more valuable to the business than those it acquired via online channels. It is looking to add products and services to increase user frequency. Working with third parties is also part of this plan to increase engagement with existing users. Zhuang mentioned its revamped relationship with its majority shareholder Baidu. Specifically, Qunar's hotel inventory is now integrated into Baidu maps. Baidu will also help Qunar capture business from the offline-to-online (O2O) shift taking place in China. And there still remains room within the core business to grow. Zhao explained that his company was looking at increasing the average number of room nights it can generate for its hotels on its direct network. In the past quarter it averaged 49 room nights per hotel, triple the number in the same quarter last year but "relatively low compared with our global peers who are averaging 200 rooms per hotels per quarter". Qunar also said that it will introduce the merchant model into its hotel line-up. This piqued the interest of the analysts on the call, despite Zhuang and Zhao insisting that it would be a very small part of its overall hotel business. Taking inventory risk on the properties will impact some financial metrics but the aim for Qunar is to increase the range of high end hotels on its books, with "exclusive pricing, exclusive inventory." "We have a comprehensive model to measure the risk-reward for merchant model hotels and we will approach it in as a selective and strategic way," said Zhao. "We're actually seeing more hotels come to us post Ctrip/Elong because they see us as the largest alternative distribution channel. Our four and five star hotel business grew rapidly in the second quarter and we are closing the gap very quickly. The [Ctrip/eLong] deal wont make us change our course." Similarly, Qunar is unphased the slowdown in China's economy. Zhuang said that when this happened in 2008/9 Qunar was able to record a "super-hyper-growth rates" as a result. "Leisure travel has not been affected that much. When household incomes reach $8,000 you hit the sweet spot for leisure travel and demands seems to be inelastic. We have a reputation for the best value product so that will also be a benefit." Similarly, the devaluation of the Chinese currency might work in its favour. "International is growing at triple-digit rates every quarter but it's still only a small part of our business. The majority of outbound travel is to other countries in Asia, and depreciation of other currencies in Asia is steeper, so we may actually benefit from the global currency situation." "We evaluate opportunities in the market very actively an ROI driven manner, be it an investment or for organic growth. There are no material opportunities in the market now nor are we in any active discussion that we should disclose to the market." Click here to read its Q2 earnings release.
{ "redpajama_set_name": "RedPajamaC4" }
4,110
Nhan is addicted to money. Robin played the part of Hamlet. The is likely to be somewhere in the park. Hon is very narrow-minded, isn't he? I'm certain Ranjit will want to speak with you. Jisheng said he'll help me get what I need. Johann stripped off his clothes and got into the bathtub. I thought you were staying at Tobias's. It took Mats a long time to find Rainer. Kathryn said he wasn't interested. I don't want Bonnie singing at our wedding. I'm going to show Sridhar how to do it. Kevin and Arne haven't unpacked their suitcases yet. Kenn has long blond hair. Ragnar is very pleased with Anton's performance. Irfan heard Jon singing in the shower. Sandip found Ann a job. Gideon knew better than to say such a thing to Rhonda. Loukas was just as surprised to see us as we were to see him. Juha carefully checked that the gas was turned off. I think Tigger might know something. Terry was Frank's first wife.
{ "redpajama_set_name": "RedPajamaC4" }
3,465
Cornerstone Christian Church – Is master thesis compulsory to get a PhD software? Is master thesis compulsory to get a PhD software? There are a lot of companies on the web that may offer essay online. You're very likely to observe a fantastic deal of blog article writing reviews to acquire goods on the internet. Usually, hunting over the net for free essays can be very difficult. So before you obtain any thesis of. Attempt to recognize relatable characteristics someone write my dissertation and strengths that you want to present in your essay. Above all, a wonderful thesis statement creates a statement. The entrance writing ought to be ideal. In the event that you do not know how to start your essay or where to hunt for encouraging information, we will be quite delighted to aid you. The reader must perhaps not need to scroll excessively if they're utilizing a smart-phone display. Maybe, you would like to estimate the price of your newspaper or just learn if your paper is going to be well prepared. Maybe, you'd like to gauge the purchase price of your paper or find out if your newspaper will be ready. Now you understand an honest and qualitative on-line essay writing service might offer great assistance for your own learning, it is time to set your purchase. Only here it's possible www.britishessaywriter.org.uk to discover the perfect essay writer for hire. Essay is part of writing. If you would like to find the same-day essay, it is likewise no difficulty for us. Want to Know More About Write Essays Online? To make sure you will see a complete answer to every query, we've got a service team that is always on the internet. For anyone who's attempting to find a cheap essay online writing support which can under no circumstances let it be feasible that you, then you're at a ideal website. On the other hand, disallowing essay writing services might only be a method of overlooking the authentic problem students who can't or don't want to write. Write Essays Online: the Ultimate Convenience! Convincing a reader is required. When you compose the content on your own, it is still true that you need to go to the library to research on your own preferred theme to talk, etc… You would want to decide on a fantastic topic so you're able to write an excellent. Our essay business is the very best for pupils in throughout the world since we have writers from several countries which provide them with an possiblity to offer quality solutions to our customers. Customized essay writing solutions may also supply you with a record that is re-cycled from formerly written benefit different clients. Choosing on the internet proof readers A research online will have the ability to aid you in attaining your online proofreading https://www.lipscomb.edu/professionalstudies/apply-now service provider that's perfect which you're searching for. On our site, you will come across competent essay writers who will aid you with your homework whatever they could be. Luckily, learning how to compose essays is actually rather straightforward as long as it's possible to remain calm and break the work down so you can tackle it step-by-step. A author uses a degree of opinion to share with a specific type of narrative. You need to possess scientific knowledge and knowledge about Biology being a method to comprehend the market. He employs a level of opinion to share with a distinctive sort of story. To make sure that you will observe a whole answer to every query, we've got a service team that's always on the internet. For anybody who is hoping to discover a cheap essay online writing service which will under no conditions let it be feasible that you down, then you're at a proper website. On the reverse side, disallowing essay writing services may only be a way of overlooking the real problem students who cannot or don't need to write. Students who don't discover the way to find an article have experienced specialist services which were bogus. Academic writing could be a tough and exhausting endeavor to complete, but should you understand the ideal location to obtain expert aid, you won't struggle anymore. If you are not pleased with any component of your finished sample essay, you have the capability to request a complimentary revision. You're not planning to repent to make a order of composition. By avoiding all of the above mentioned mistakes you are able to write a great essay on your own. Any way you are in a position to receive one is comments in your capability to communicate. Next, you'll be motivated to make a new account on the platform. If you are not pleased with any component of your finished sample essay, you have the capability to request a complimentary revision. You're very likely to attain custom essay order the utmost premium superb custom paper that's certain to aid custom essay arrangement out when you need it The ideal method to commence an essay is becoming easily the toughest section when writing an phrase problem solving assist essay. Even though there are tons of methods to compose an essay, there is a simple outline to follow for success each time. There are quite a few composing companies and it's often rather hard to figure out the very best company that gives already written essays of high quality. The authors in the corporation should find the essential experience. This issue would be to define the reach of your essay. Academic papers cannot comprise any signals of plagiarism. The bulk of the school essay give you a paper that is recycled from a previous written part. So far as the pupils are involved, writing a research paper is among the toughest and most frustrating endeavor in their view. Furthermore, editing solutions are much cheaper than custom sample writing. In the event you do not know how to start your essay or in which to hunt for supporting data, we'll be quite delighted to help you. The reader must perhaps not need to scroll excessively if they're utilizing a smart-phone screen. The way to Make Money on the internet you can discover plenty of online services in which you are in a position to acquire your writing job. Stage 1, with two or three illustrations to backup what you're talking about 5. Stage 3, using a couple of examples to show what you're speaking about 7. On the flip side, obtaining a completed sample article will enable you to write a bigger work in a short moment. Among the absolute most important elements in almost any academic writing is the topic of time. Payment Frequency Most essay writing businesses pay a couple times per month on a customary date.
{ "redpajama_set_name": "RedPajamaC4" }
5,970
We know presentation is a priority for you and your company/organization. With Hoffman Car Wash's Fleet Service, we'll be sure to keep your vehicles shining for the next meeting, delivery, service call or anything in between. We'll affix a barcode to your vehicles' windshields for easy access to any of our 16 Full Service or Exterior Car Wash locations. All of our locations are open 7 days a week. You will receive one easy-to-read monthly statement showing recent activity on your account. As a Hoffman Car Wash Fleet Account, your company receives 15% off all car wash packages.� Wash Cards and regular Unlimited Memberships do not apply. If you have additional questions, feel free to call our Car Wash Fleet Services department at 518.389.2127 or email brapp@hoffman-development.com. Having trouble completing the form? Please call 518-862-1658 for assistance.
{ "redpajama_set_name": "RedPajamaC4" }
8,693
Can therapeutic gardens improve mental health? Jo Malone London is a world-renowned, luxury British perfume and scented candle brand, founded by Jo Malone in 1983. Jo Malone works with dedicated charity partners to support people living with mental ill health through the cultivation and care of therapeutic scented gardens. Video Credit: YouTube / SAMH, the Scottish Association for Mental Health Approximately 1 in 4 people in the UK will experience a mental health problem each year, with many people struggling to cope with the pressures of modern life. However, there is growing evidence to suggest spending time in nature can benefit both your mental and physical wellbeing, with access to green spaces being linked to reduced depression, anxiety and stress. TherapEutic Havens Jo Malone London is working with dedicated charity partners to support the creation of peaceful, safe havens for rehabilitation. The gardens they have created are designed to nourish and nurture those who have become vulnerable and isolated due to mental ill health and deliver both a sense of community and transferable practical skills. In addition, there is the opportunity to gain new qualifications in horticulture, paving the path to long-term employment. Flourishing Partnerships In Edinburgh, Jo Malone supports the SAMH (Scottish Association for Mental Health) Redhall Walled Garden. At Redhall, SAMH offers training in horticulture, conservation and life skills to people living with mental ill health. Since the restoration of the herb garden and roundhouse last year, their partnership has continued to flourish. This year, Jo Malone's Peony & Moss Charity Candle will help to fund the maintenance and further development of their new and existing charity gardens. This story shows how Jo Malone London supports Goal 3: Good Health and Well-being, specifically Target 3.4: "By 2030, reduce by one-third pre-mature mortality from non-communicable diseases (NCDs) through prevention and treatment, and promote mental health and wellbeing." About Jo Malone London Jo Malone London is a world-renowned, luxury British perfume and scented candle brand, founded in 1983. Jo Malone London support people living with mental ill health through the cultivation and care of therapeutic scented gardens. Learn more about Jo Malone London and SAMH Can a drinks brand end water poverty? How can investors partner with businesses to make a better world? How can trees slow the flow of floods? Can tyre safety checks reduce accidents? How can we help decarbonise the economy? How can transparency rebuild trust in digital ecosystems?
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
4,808
Bringing the power of strength and vision together. Our strength – an experienced, proven leadership team committed to partnering with our customers and brokers. Our vision – to bring a remarkably fresh and vibrant new approach to insurance.
{ "redpajama_set_name": "RedPajamaC4" }
4,828
For a certain generation(s), Rick Astley is most prominently known as that bloke who pops up on YouTube whenever you click a link to hear a new track by a pop star of note or view the trailer for an upcoming blockbuster. And while the pop culture phenomenon that is Rick rolling has no doubt played its part in introducing Astley to a brand new audience, it's safe to say that's probably not how he would have chosen to return to the public consciousness. Since his late '80s heyday as one of Britain's most recognisable pop icons, a high-profile return to music looked unlikely before 2016. Although he had continued to write and perform across the world during those intervening years, a credible comeback never materialised; some of his biggest gigs coming in the form of a support slot for comedian/nostalgia merchant Peter Kay. This year, however, his comeback album 50 – aptly titled to coincide with his 50th birthday – has proved to be one of the biggest and most surprising success stories of 2016. The record, which topped the charts earlier this year, has so far sold 183,721 copies and has spawned a sell-out tour that looks set to roll on and on into late 2017. Perhaps one of the biggest factors behind 50's performance is the fact that it is purely a product of the artist. Written, recorded and produced from Astley's home studio, every note played and sung on the record was delivered by the man himself. Once the album was made, Astley reconnected with his former label BMG. The fit, says the company's executive vice president Alexi Cory-Smith, was perfect. Cory-Smith is also quick to emphasise that both the company and Astley have a long-term vision to take the success of 50 way into the new year, with an eye on new music further down the line. In a year that has spawned very little in the way of exciting new artists, the success of Astley's return sends a clear message: with the right record, it's never too late to make a successful and, most importantly, credible comeback. Throughout 2016, acts such as Craig David and former X Factor winner James Arthur have also made unexpected returns that have yielded No.1 records and critical and commercial acclaim. And with each of these artists, the source of their success lies in the decision not to reinvent themselves, but to present an honest version of who they are today.
{ "redpajama_set_name": "RedPajamaC4" }
8,946
Lightly beat egg whites. Mix in the sugar and almond flour until well combined. Preheat oven to 300. Form a teaspoon of dough into small balls and place on a parchment paper lined cookie sheet. Press a small indent in the top of each ball with a finger and fill with jam. (Tori recommends a larger hole and more jam since raspberry is her favorite) Bake in the center of the oven for 15 minutes. Top with dark chocolate chip, remove from baking sheet and allow to cool on a cookie rack. This entry was posted in Uncategorized and tagged almond, brown sugar, chocolate, cookie, dairy free, flour, gluten free, grain free, jam, raspberry, recipe on December 22, 2014 by lenapietri.
{ "redpajama_set_name": "RedPajamaC4" }
6,128
UF Researchers To Study How Algae Blooms Hurt Florida's Economy WJCT News | By Brendan Rivers Published May 12, 2020 at 6:01 PM EDT Chris O'Meara A snook lies dead due to red tide in Bradenton Beach, Florida. A team led by University of Florida researchers is receiving nearly $280,000 to study the social and economic costs of harmful algal blooms. The out-of-control algae colonies produce toxic effects on people and wildlife. Scientists say pollution from human activity leads to more severe harmful algal blooms and makes them happen more often. Climate change is thought to make the problem worse. "We know that in Florida and across the U.S., (blooms) are becoming more frequent, more toxic, longer-lasting and more widespread," said Barbara Kirkpatrick, executive director of the Gulf of Mexico Coastal Ocean Observing System. "While we can't eliminate blooms, having a better understanding of their mechanics as well as their negative consequences can help resource managers lessen their impacts on communities. That's why these new studies are so important." Lead UF researcher Christa Court, an economist with the UF Institute of Food and Agricultural Sciences, said the study will focus on the red tide event that began in 2017 and lasted through early 2019, causing then Gov. Rick Scott to declare a state of emergency. Researchers will be using data from past events as well. "In order to inform decision making related to trying to mitigate these events in the future, we're going to have to have a better understanding of the type of impacts that they're causing," Court said. Court and her colleagues will try to determine the effects harmful algal blooms have on industries from tourism and seafood to health care and construction. Federal funding for the study comes partly from NOAA's National Centers for Coastal Ocean Science. A second study is being conducted by a team of University of Central Florida and University of South Florida researchers. Brendan Rivers can be reached at brivers@wjct.org, 904-358-6396 or on Twitter at @BrendanRivers. First Coast Climate Changeapppollutionalgae bloomsUFHeard On WJCT NewsRed Tideharmful algal bloomUniverstiy of Floridanutrient pollution Brendan Rivers Special Projects Producer Brendan Rivers joined WJCT News in August of 2018 after several years as a reporter and then News Director at Southern Stone Communications, which owns and operates several radio stations in the Daytona Beach area. See stories by Brendan Rivers New St. Johns River Report Highlights Several Worrying Trends
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
5,960
This year, greeting card designers are expanding their inventory thanks to millions of people with a little more disposable income looking to send cards to friends, loved ones and family members. We're crafting greeting card business plans to support companies with updated demographics information for 2016. Wise Business Plans presents the facts about each greeting card client's business in a clearly written, easy-to-follow greeting card business plan that provides solid financial projections, clearly emphasizes the company's qualifications, defines business goals and provides a winning plan to raise capital for starting a card business. "Here at Wise, we appreciate those companies and entrepreneurs that allow us to use their skills and eloquence to voice the things that we don't always know how to say. Our expert team of writers has made a commitment to use Wise Business Plans professional skills for the future financial success of all our business owners," said Ferriolo.
{ "redpajama_set_name": "RedPajamaC4" }
8,264
Ep 491 | 12.8.17 Iranian reconnaissance of critical infrastructure? Leaky banking apps. Microsoft's emergency patch. Ghosts of the Caliphate threaten, but have yet to deliver. New horizons in biometrics. Dave Bittner: [00:00:00:05] As always a big thank you to all of our supporters on Patreon. It's at patreon.com/thecyberwire. Maybe today is the day that you will become a supporter of the CyberWire. We do appreciate it. Dave Bittner: [00:00:14:00] FireEye warns of patient reconnaissance on the part of the probably Iranian APT34. The Electronic Ghosts of the Caliphate have so far failed to say "boo," except maybe in South Jersey. Flaws are discovered in mobile banking apps. A bike-sharing service leaked data. Bitcoin's bubble. Microsoft patches its Malware Protection Engine. And biometrics have come to the beagles, your pet door can now recognize Rover or Boots, and let them on in. Their raccoon pals stay outside. Dave Bittner: [00:00:48:17] Now I'd like to tell you about a White Paper from our sponsor, Delta Risk. More than 90% of companies are using the cloud. Although the benefits are clear, moving to the cloud comes with new and unique security challenges. In the White Paper, Understanding The Challenges Of Cloud Monitoring And Security, Delta Risk cloud security experts outline the key methods organizations can adapt to gain clearer visibility into their network and critical assets. You can get your copy of the White Paper by visiting deltarisk.com/whitepapers-cloudmonitoring. Delta Risk LLC, a Chertoff Group company is a global provider of cybersecurity services to commercial and government clients. Learn more about Delta Risk by visiting deltarisk.com. And we thank Delta Risk for sponsoring our show. Dave Bittner: [00:01:46:16] Major funding for the CyberWire podcast is provided by Cylance. I'm Dave Bittner with your CyberWire summary for Friday, December 8th, 2017. Dave Bittner: [00:01:56:03] Iranian threat groups, Charming Kitten among them, the group associated with hacking HBO, have attracted more attention this week. More serious than hacking a television show are reports of Tehran's hackers having made quiet inroads into compromising Western infrastructure, especially the US. No major attacks are reported, but security organizations have their eyes open. Dave Bittner: [00:02:18:24] FireEye has been tracking the Iranian threat group they call APT34 since 2014. Its activities have affected targets in the Middle East, and it appears to be continuing its patient, quiet reconnaissance of infrastructure targets. Iranian cyber operators are believed responsible for attacks on US infrastructure in the past, notably financial services targets and, far less serious in effect but arguably more disturbing in its implications, the small Bowman Street flood control dam in Rye, New York. Dave Bittner: [00:02:50:00] FireEye says its attribution of APT34 to Iran is an assessment of "moderate confidence." The group has modified its approach to take advantage of new exploits and vulnerabilities as they are discovered. It has used malicious Excel macros and PowerShell exploits to move within networks, and it's also shown some extensive social engineering chops in social media, where it's used bogus or compromised accounts to get close to the organizations it's targeting. FireEye says in its report, that they are a capable group that seems to have access to its own development resources. FireEye concludes, quote, "We assess that APT34's efforts to continuously update their malware demonstrate the group's commitment to pursuing strategies to deter detection," end quote. Dave Bittner: [00:03:35:20] There are other threat actors with Middle Eastern connections who don't show the capabilities of the APTs that appear to be operating from Iran. Prominent among these are the various hacktivist cells faithful to ISIS, who can be expected to step up their threats as the Caliphate's territory has now effectively vanished. ISIS hacktivists and official online media have excelled at recruitment and inspiration, and these have been dangerous, and the source of much suffering. But proper hacking hasn't advanced much beyond low-grade vandalism of poorly secured sites. You've seen the sort of thing, an online card catalog for a public library, say in Lower Crabcake, Maryland, is vandalized to show a gif of the White House in flames, stuff like that. Dave Bittner: [00:04:19:19] So today is the day ISIS promised to bring America to its knees with a massive cyberattack. A video posted by adherents of the terrorist group promised, "We will face you with a massive cyber war...Black days you will remember." The specific group making the threat was the "Electronic Ghosts of the Caliphate" or the "Caliphate Cyber Ghosts," but as we publish today the only sign of ISIS hacking appears to have been some defacement of the Gloucester Township website. We believe this is the Gloucester Township in southern New Jersey. "The lions of the Caliphate will be at your door" is what Fleet Street's Daily Mail reported was said, but when we looked it all seemed in order. The mayor's picture was up, and he's smiling and looking good. We can't even confirm what the Daily Mail reported, and if you're the Gloucester Township at whom the lions of the Caliphate roared, let us know. Dave Bittner: [00:05:09:19] Researchers at the University of Birmingham report finding flaws in a banking security app that expose the data of millions of bank customers to credential theft. It's a vulnerability that opens the apps to man-in-the-middle attacks. The apps' cryptographically signed certificate seems to have failed to verify the server's hostname when the app connected with it. Man-in-the-middle attacks could intercept usernames and passwords during online banking sessions, and these could lead to account hijacking and of course theft. Fixes are for the most part in, accompanied by much tut-tutting from the security industry about slipshod app development. Dave Bittner: [00:05:47:03] It's not just gig-economy ride sharing outfits who have to deal with leaks. It's bike-sharing operations, too. oBike, the widely used bicycle-sharing app, is investigating a leak that may have affected users in some 14 countries. This one appears to have come from a gap in oBike's API, one intended to allow users to refer friends to the service. The information exposed was relatively benign as such information goes, names and ride locations, not passwords or credit card numbers, but the exposure is still unsettling. Dave Bittner: [00:06:20:14] Bitcoin and other cryptocurrency prices are way up in a major speculative bubble, and criminal attention is enthusiastically keeping pace. Why are people saying "bubble?" Because the price of Bitcoin jumped from $12,000 to $15,000 this week, with comparisons being made to the tulip bubble of 1636, which crashed spectacularly in February of 1637. If you're one of those who takes historical lessons seriously, get a copy of "Extraordinary Popular Delusions and the Madness of Crowds" from your library. If you're one of those who thinks history is bunk, well, perhaps you'd be interested in an investment in Voppercoin, available at most of the Burger Kings in greater Moscow. Dave Bittner: [00:07:01:17] Microsoft has issued an emergency out-of-band patch to its Malware Protection Engine. It's a remote code execution flaw present in Windows Defender, Microsoft Security Essentials, Endpoint Protection, Forefront Endpoint Protection, and Exchange Server 2013 and 2016. A memory corruption error in the malware scanner is what opens the door to exploitation. Dave Bittner: [00:07:24:12] And finally, biometrics has come to the beagles. If you've been worried about some random animal walking in and out of your house via the unsecured pet door without so much as a by-your-leave, Redmond may have a solution for you, a pet door that acts like a bouncer on a Studio 54 rope line. The Microsoft solution recognizes your pet's face, letting in Snoopy and Garfield, but keeping out Tom, Jerry, Marmaduke, raccoons, opossums, squirrels, wombats, mongooses, and so on. Dave Bittner: [00:07:55:08] We're a BYOD shop here, bring-your-own-dog, so naturally this caught our eye. There's an emphasis, an overemphasis we might say, on cats, but we assume that the system works with other pets as well, dogs, iguanas, rabbits, skunks, chameleons, hamsters, ferrets, hermit crabs, the whole Ark-full. Why shouldn't it? You'd think that Microsoft's experience with Tay-the-teenage-AI's misspent adolescence would have taught them to be properly inclusive, and hold the door open for your companion chuckwalla or pet periwinkle. Dave Bittner: [00:08:29:23] Now I'd like to share a message from our sponsor, Nehemiah Security. Fellow cybersecurity leaders, when your CEO asks department heads for a status update, do you envy your colleagues, like the VP of Sales, or CFO, who only have to pull a report from a single system? Instead of deploying a team of people to check multiple systems and then waiting for them to report back, do you wish you had a single place to get the information you need to communicate with the CEO? Nehemiah Security is here to put that power in the hands of the cybersecurity leader. It's time for a quick solution that allows you to go to one place to get the security information you need, quickly, and in business terms your CEO can understand. Nehemiah Security gives cybersecurity leaders the ability to report cyber risk, in terms of dollars and cents. Visit nehemiahsecurity.com to learn more and get a free customized demo just for CyberWire listeners. Visit nehemiahsecurity.com today. That's n-e-h-e-m-i-a-hsecurity.com. And we thank Nehemiah Security for sponsoring our show. Dave Bittner: [00:09:40:04] And joining me once again is Chris Poulin. He's a Principal and Director for Booz Allen's Dark Labs, where they focus on IoT security and machine intelligence. Chris, welcome back. You know, our editor, here at the CyberWire, John Petrik, recently came back from an ICS conference, I believe it was in Atlanta, and he made the observation that the IT people seemed to be optimistic about security, but the operational people seem to be pessimistic about security. What's your insight on that? Chris Poulin: [00:10:09:11] Huh. So it's-- It is interesting because another trend that we've been seeing is that IT and OT has been converging for a while. So, you know, five, ten years ago it was, let's separate these things and have a air gap and interestingly the CISO, who's traditionally overseeing the IT side, is now being given the purview over the OT side as well. However, not necessarily the authority because, if you think about it, the OT side, in many businesses, is where the money is made and so any downtime on the OT side often means direct impact on revenue. And so what ends up happening is that the CISO doesn't necessarily have authority, even though he or she has purview over it. But the thing that the plant operators know is that those systems on the OT side of the house are fairly fragile. You can't just go in with an IT vulnerability scanner and scan the whole thing. In fact you can't even ping the whole-- You can't ping those things. Many cases, they'll just plain old fall over. Chris Poulin: [00:11:09:17] And so, you know, to some extent that's one of the fears, is that the IT side is going to come in and just sort of tromp through the living room with muddy boots, you know, they don't really understand OT. And one of the things that's kind of interesting about it is that there's-- The language is not the same, either. So for example, in IT we talk about cybersecurity, we all know what we mean, you know, it's-- And it's important and we take it seriously and that's taken some years, by the way, to get to where we are now. On the OT side, they don't talk about cyber in that sense, because the most important things are availability, so having continuous uptime, and safety, and then tertiary is compliance, you know, regulatory compliance. So when you start talking about cyber, they don't necessarily make-- It sounds like an IT term to a lot of the plant operators, and they don't necessarily equate that with what's important to them which is availability and safety. Chris Poulin: [00:11:59:09] And so I think that's one of the things that needs to happen is that the IT side needs to become a little bit more familiar with what happens on the OT side, and starts speaking the same language. And then I believe that this, you know, this trend will start to temper out a little bit, right, and then they'll start to come together which is-- If you go in as an IT person and say, we understand what you're doing, we understand how important it is to the business, we understand availability and safety and we want to help you, because cyber actually impacts those things then I think that's when we'll all sort of come together and OT and IT will finally converge and everybody will become one. Kumbaya. Dave Bittner: [00:12:42:06] We can all hope, right? If only it were that easy. Chris Poulin, thanks for joining us. Chris Poulin: [00:12:47:15] Yeah, thank you once again. Dave Bittner: [00:12:52:19] Now I'd like to share an important upcoming opportunity from our sponsor, Cybric. On December 12th, DevSecOps experts from global payment solutions provider VISA and Cybric with the first of its kind continuous application security platform are teaming up for a webinar to talk Enterprise Cyber Threat Survival. How can you protect your organization against the devastating breaches you hear about all the time in the CyberWire? Swapnil Deshmukh, Senior Director of Emerging Technologies and Security for Visa, and Mike Kyle, CTO at Cybric, will weigh in. They'll talk about how rapid innovation and continuous delivery via DevOps exposes organizations to a constant evolving cyber threat, and how seamlessly embedding continuous security within existing ecosystems will enforce security across production environments. Dave Bittner: [00:13:40:17] Join them for this insightful and information-packed webinar on December 12th, 2017 at 1pm US Eastern Time. You can learn more, and register today, at thecyberwire.com/cybric. That's thecyberwire.com/c-y-b-r-i-c. And we thank Cybric for sponsoring our show. Dave Bittner: [00:14:09:13] My guest today is Adam Segal. He's Director of the Digital and Cyberspace Policy Program at the Council on Foreign Relations, where they've recently launched an online cyber operations tracker. Adam Segal: [00:14:21:08] The Council is a nonpartisan independent foreign policy think tank. We take no official positions and no government money and our mission is to educate the American people about foreign policy issues that will affect them and hopefully help create better policies to pursue American interests. Dave Bittner: [00:14:46:19] So you all have taken on this task of tracking state-sponsored cyber operations. What led you to taking this on? Adam Segal: [00:14:54:04] So I think we felt like there was growth and interest in state operations just because of all the reporting about hacking, but there was a lot of, I think, confusion about what the states were doing, why they were doing it? Who was involved? Just because of some of the inconsistencies in reporting across events. Dave Bittner: [00:15:16:23] And so what is your approach to this tracking system? Adam Segal: [00:15:20:18] We have tried to collect every publicly reported operation that has sort of multiple sources, both media and cybersecurity and other governments. We've tried to find more than one report for an event and then publicly list them. We realize the data is going to be incomplete. Probably lots of operations have happened but have not been either tracked by companies or governments or haven't been reported. And so, actually, on the website, we also have a reporting function, so people in the industry or others can help us-- Point out things that we've missed. Dave Bittner: [00:16:05:05] What do you see taking place in terms of the evolution of the role of cybersecurity in geo-politics? Adam Segal: [00:16:12:10] Looking at the time line we see the vast majority of attacks are espionage. And so states were using cyber operations primarily to collect information on adversaries or on activists and civil rights groups and then a huge chunk of that was also Chinese threat actors collecting intellectual property or business secrets for the competitive advantage of Chinese firms. As you move through the timeline, in particular over the last two or three years, you start seeing a decline of the Chinese operations, in part driven by the agreement between the United States and China but also a slow uptick on more disruptive and destructive attacks, data destruction, ransomware and other operations. Dave Bittner: [00:17:11:02] Do you see this being a situation where ultimately we're going to have to have thinks like treaties, that will take care or address cybersecurity issues? Adam Segal: [00:17:19:18] Yeah, so there, there's been a large push, driven in part by the United States, to develop norms, or rules of the road for cyberspace. I don't think treaties are very likely, just because, you know, most of our arms control treaties are based on some forms of control and verification, right? We can count how many nuclear missiles there are or how many ICBMs there are. We can inspect factories. None of that's going to be available in the malware space. You can't really inspect and make sure people are not developing weapons. So we're going to have to come up with some kind of shared agreements upon what is considered legitimate behavior. I think that's going to be very, very hard to do, for everything under a use of force or an armed attack. So, right now, it would be fairly clear to respond, so if a cyberattack caused physical destruction or death, the United States has stated that it would act like it would for any other type of physical attack that caused destruction or death. Adam Segal: [00:18:23:13] So we might get some agreements with the Russians or the Chinese in that space, because neither of those countries really want a cyber engagement to escalate to physical conflict. We may decide that certain types of critical infrastructure should be off limits or at least have some greater understanding of what a threshold for use of force might be. The problem is, is that everything below that line, espionage, DDoS attacks, doxing, information operations, all those other areas where states are most active, that's going to be very, very difficult to get any type of agreement, and I think it's very unlikely. Dave Bittner: [00:19:01:15] It strikes me that nations have been reticent, the United States in particular, has been reticent to, to draw any lines in the sand when it comes to those flavors of cyberattacks. Adam Segal: [00:19:15:11] Yeah, I think that's right. I think states have been pretty reluctant, generally, because nobody's really sure how the capacities are going to develop and how important they're going to be, and so nobody wants to restrain themselves before they know. But I think also, you know, for the US, this new revelation certainly suggest that the US is pretty good at espionage, and conducting these operations, and so it has not been interested in having a broader treaty. The Russians and Chinese have said, well, these are-- It's a new technology, we need to have new treaties. And their definition of cybersecurity is more expansive and includes what the Chinese and Russians would call information security so the concern about content, and the free flow of information and so it's been very hard for the US to come up with some shared definitions below the threshold of an armed attack. Dave Bittner: [00:20:10:06] That's Adam Segal from the Council on Foreign Relations. You can learn more about their cyber operations tracker by visiting their website cfr.org and searching for cyber. Dave Bittner: [00:20:24:15] That's the CyberWire. Thanks to all of our sponsors for making the CyberWire possible, especially to our sustaining sponsor, Cylance. To find out how Cylance can help protect you, they use artificial intelligence, check out cylance.com. Dave Bittner: [00:20:38:18] The CyberWire podcast is produced in Maryland, out of the startup studios of DataTribe, where they're co-building the next generation of cybersecurity teams and technology. Dave Bittner: [00:20:47:06] The CyberWire podcast is produced by Pratt Street Media. Our Editor is John Petrik. Social Media Editor is Jennifer Eiben. Technical Editor is Chris Russell. Executive Editor is Peter Kilpe. And I'm Dave Bittner. Thanks for listening. Delta Risk Delta Risk LLC, a Chertoff Group company, provides managed security services and risk management consulting to clients worldwide. Founded in 2007, Delta Risk offers expert knowledge around technical security, policy and governance, and infrastructure protection to help organizations improve their cyber security operational capability and protect business operations. Learn more at deltarisk.com. Nehemiah Security Nehemiah Security delivers a security risk assurance platform that is transforming how organizations secure technology so they can quantify their cyber risk in dollars and cents. Learn more at: nehemiahsecurity.com. Cybric How can you protect yourselves against breaches like Equifax? Swapnil Deshmukh, Sr. Director of Emerging Technologies Security, Visa and Mike D. Kail, CTO, CYBRIC weigh in. In this webinar, you'll learn cultural changes needed for true DevSecOps. Register for this webinar December 12 at 1PM ET.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
1,732
Tag Archives: NHS Fusions Capcom Crossover Dragon Ball NHS Fusions Street Fighter NHS Fusions – Chun-Chi By Nearphotison on Wednesday, January 19, 2022 The theme for this fusion poll was big booty ladies, and I took a few suggestion from Discord as to who to include on it. The two winners, Chi-Chi and Chun-Li, both were included for that reason (Chi-Chi canonically isn't known for her ass or anything, but the way I draw her she is). I kinda think I wouldn't have used them both if I'd thought about it, because I am a little disappointed two characters who already share a lot aesthetically won. The resulting fusion is hot, of course, but not terribly interesting. Just another woman with a traditional Chinese aesthetic like both of her base characters. I actually think Chun-Chi here looks a little like Juri Han, due to the combination of a Street Fighter-type face and the bangs, but hopefully she's still able to distinguish herself a bit to you all. Character Asks Crossover Hunter × Hunter My Hero Academia NHS Fusions Kizuku Midyck Character Ask 1 By Nearphotison on Tuesday, January 11, 2022 I kinda figured people would want to see Kizuku and Goto together eventually, and here we are. When I made Goto's Fusion pic, I put him in a room I've used sometimes for One-Shots, including the one in the background here. I thought it was funny that all four parts of these two had been in a One-Shot together already, and I decided to use this Ask to highlight that piece of trivia for anyone who would find it interesting. Crossover Hunter × Hunter My Hero Academia NHS Fusions NHS Fusions – Goto Todoros By Nearphotison on Thursday, January 6, 2022 The winners for this Fusion poll on SubscribeStar were Gon and Todoroki. There were some elements of this fusion, like having the two halves of his hair be the black and green of Gon's, that were immediately obvious. I did waffle a bit on the style of his hair, as I wasn't sure how it would look, but I kinda like the punk rock feel Gon's hair with bangs gives me. As for Todoroki's signature burn scar, I didn't feel like it'd make sense to keep it since I've described the fusion process for these as being technological in nature. If it's anything like cloning, which is how I picture it, then something you gained in life like a scar wouldn't translate through. Crossover NHS Fusions The Amazing World of Gumball The Looney Tunes Show Warner Bros. NHS Fusions – Nicola Bunnerson By Nearphotison on Tuesday, December 21, 2021 The theme for this Fusion's poll was furry ladies, and Nicole and Lola both won out in the end. Now both of the Watterson's I've drawn before have been fused, which I think is interesting. Cabbits are a bit of a thing (Ryo-Ohki from Tenchi Muyo is one, for example), so that's the direction I tried to go with her. I tried to stick with the less-stylized approach I used for Nicole's previous appearance, while working in some of her facial features but giving her Lola's hair and ears. I hope you all like this blue cabbit girl! Avatar Crossover Disney Kim Possible NHS Fusions Nickelodeon NHS Fusion – Shezula By Nearphotison on Monday, November 22, 2021 The poll that lead to this fusion was focused on "bad girls", ten villainesses from the long list of villainous women I've drawn over the years. Interestingly enough, the winning two were both ones I've only drawn a couple times, but I think the resulting character Shezula has some real appeal. I waffled a bit on her skin color, but ultimately decided to use the tone of Shego's skin with Azula's color, making her a classic pale raven-haired seductress type. I hope you all like her! Crossover My Hero Academia NHS Fusions Yu-Gi-Oh! NHS Fusion – Yunki Kamuto By Nearphotison on Sunday, November 7, 2021 Here's a new fusion character, with Denki Kaminari and Yugi Muto winning the poll for this fusion. I'd included Yugi in some polls before, and always intended to try and combine his famous hair with the bangs of whomever he won with, and funnily enough he ended up winning alongside a guy with pretty distinctive bangs of his own. So this fusion design kinda determined itself, I feel like, but I hope you all like Yunki and will welcome him to the studio with open arms. Crossover Disney My Hero Academia NHS Fusions The Incredibles NHS Fusion – Mitsen Pakugou By Nearphotison on Tuesday, October 19, 2021 I wanted to do a "MILF" fusion, so for this poll I only included MILF characters. Helen and Mitsuki won, which isn't that surprising, though for a while it looked like it'd be Mitsuki and Chi-Chi. We're also back to MHA characters getting into every fusion. At any rate, this fusion ended up looking a lot more Helen than I'd planned, just due to a couple small features. I waffled for a bit on how spiky to make her hair, but in the end this is how I settled. I hope you guys like her. Assassination Classroom Crossover NHS Fusions Nintendo Pokémon NHS Fusion – Nash Keota By Nearphotison on Sunday, October 10, 2021 I wanted to try a fusion with a bit more dissonance between the characters, so the poll for this one featured a variety of different characters (in terms of age, species, gender, etc.). Funnily enough, the two most similar characters on the list won, which is how we got this Nagisa and Ash fusion. This does, however, mark the first NHS Fusion to not feature a My Hero Academia character. I decided to forgo Nagisa's pigtails and Ash's hat/cheek lines, with the hope that it'll help Nash stand out a bit on his own. Commission Crossover NHS Fusions Tower of God Webcomic By Nearphotison on Monday, October 4, 2021 Here's the fourth and final of my July Master Tier commissions. This one is very much not my usual wheelhouse, but I hope it works for some of y'all. The subscriber wanted to see Khun Ran from Tower of God in his "Lightning Pill" form (I know nothing about this franchise) sounding with Kizuku, the Izuku/Killua fusion from the NHS Fusion series, in some sort of combination of Full Cowling and God Speed, with lightning around them. So… yeah, that's what this is.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
8
Last month we mistakenly announced the EOL of Snort 2.8.6.1, and the community let us know. November 23, 2011 marks the end of life for Snort 2.8.6.1 rule support. So there will be one more Snort rule build will be the last version built with this support in it.
{ "redpajama_set_name": "RedPajamaC4" }
6,593
Q: Lazarus: strange behavior running curl via TProcess I run the 'curl' from Lazarus/FPC application using TProcess like: proc := TProcess.Create(nil); proc.Executable:= 'E:\sendfileemail\curl.exe'; proc.CurrentDirectory:= 'E:\sendfileemail'; proc.Parameters.Add('--upload-file d:\29\ZP_1_2019.eml --url smtps://smtp.yandex.ru:465 --ssl-reqd --mail-from xxxx@yandex.ru --mail-rcpt yyyy@yandex.ru --user zzzz@yandex.ru:password --insecure'); proc.Options := proc.Options + [poWaitOnExit, poUsePipes, poStderrToOutPut]; proc.Execute; AStringList := TStringList.Create; AStringList.LoadFromStream(proc.Output); AStringList.SaveToFile('output.txt'); AStringList.Free; proc.Free; It's always failed with: curl: option --upload-file d:\29\ZP_1_2019.eml: is unknown curl: try 'curl --help' or 'curl --manual' for more information or whatever curl's parameter was first. Adding each parameter separately with 'proc.Parameters.Add' doesn't matter. At the same time E:\sendfileemail\curl.exe --upload-file d:\29\ZP_1_2019.eml --url smtps://smtp.yandex.ru:465 --ssl-reqd --mail-from xxxx@yandex.ru --mail-rcpt yyyy@yandex.ru --user zzzz@yandex.ru:password --insecure executed as expected from command line manually. ShellExecute also work. What's wrong with running 'curl' via TProcess? A: You put the whole commandline in one parameter. Separate them out. using multiple parameters.add() statements proc.Parameters.Add('--upload-file'); proc.Parameters.Add('d:\29\ZP_1_2019.eml'); etc Also, this is the "simple" solution for short output. If you have long output it will hang. Might be best to look at the prepared RunCommand() wrappers.
{ "redpajama_set_name": "RedPajamaStackExchange" }
6,264
Salvage resection after previous laryngeal surgery: Total laryngectomy with en bloc resection of the overlying cervical skin Andrea Gallo, Rossana Moi, Marilia Simonelli, Domenico Vitolo, Maria Luisa Fiorella, Vincenzo Marvaso, Valentina Manciocco, Marco De Vincentiis Fondazione Santa Lucia Objective: To evaluate the effectiveness of extended total laryngectomy for the treatment of recurrences of laryngeal cancer. Design: We conducted a retrospective clinical study of patients who had undergone extended total laryngectomy and were seen over a 15-year period. The follow-up period ranged from 3 to 15 years. Setting: Academic tertiary referral medical center. Patients: We observed 15 patients who were affected by a recurrence of laryngeal cancer that extended to the overlying soft tissue. All patients were male. The mean age was 61.5 years. Thirteen patients had previously undergone partial laryngeal surgery, and 2 patients had undergone radiation therapy, without success. Intervention: All patients underwent total laryngectomy extending to the soft tissue, including the overlying skin. Results: Five of the 15 patients died of local recurrence, and 1 patient died of massive postoperative hemorrhaging. An actuarial survival rate of 60% was observed at 5 years. Conclusion: Total laryngectomy extending to the soft tissues seems to be an effective procedure for treating local recurrences of laryngeal cancer after partial laryngectomy or failure of radiation therapy. Archives of Otolaryngology - Head and Neck Surgery Fingerprint Dive into the research topics of 'Salvage resection after previous laryngeal surgery: Total laryngectomy with en bloc resection of the overlying cervical skin'. Together they form a unique fingerprint. Laryngectomy Medicine & Life Sciences Skin Medicine & Life Sciences Laryngeal Neoplasms Medicine & Life Sciences Recurrence Medicine & Life Sciences Radiotherapy Medicine & Life Sciences Tertiary Care Centers Medicine & Life Sciences Survival Rate Medicine & Life Sciences Gallo, A., Moi, R., Simonelli, M., Vitolo, D., Fiorella, M. L., Marvaso, V., Manciocco, V., & De Vincentiis, M. (2001). Salvage resection after previous laryngeal surgery: Total laryngectomy with en bloc resection of the overlying cervical skin. Archives of Otolaryngology - Head and Neck Surgery, 127(7), 786-789. Salvage resection after previous laryngeal surgery : Total laryngectomy with en bloc resection of the overlying cervical skin. / Gallo, Andrea; Moi, Rossana; Simonelli, Marilia; Vitolo, Domenico; Fiorella, Maria Luisa; Marvaso, Vincenzo; Manciocco, Valentina; De Vincentiis, Marco. In: Archives of Otolaryngology - Head and Neck Surgery, Vol. 127, No. 7, 2001, p. 786-789. Gallo, A, Moi, R, Simonelli, M, Vitolo, D, Fiorella, ML, Marvaso, V, Manciocco, V & De Vincentiis, M 2001, 'Salvage resection after previous laryngeal surgery: Total laryngectomy with en bloc resection of the overlying cervical skin', Archives of Otolaryngology - Head and Neck Surgery, vol. 127, no. 7, pp. 786-789. Gallo A, Moi R, Simonelli M, Vitolo D, Fiorella ML, Marvaso V et al. Salvage resection after previous laryngeal surgery: Total laryngectomy with en bloc resection of the overlying cervical skin. Archives of Otolaryngology - Head and Neck Surgery. 2001;127(7):786-789. Gallo, Andrea ; Moi, Rossana ; Simonelli, Marilia ; Vitolo, Domenico ; Fiorella, Maria Luisa ; Marvaso, Vincenzo ; Manciocco, Valentina ; De Vincentiis, Marco. / Salvage resection after previous laryngeal surgery : Total laryngectomy with en bloc resection of the overlying cervical skin. In: Archives of Otolaryngology - Head and Neck Surgery. 2001 ; Vol. 127, No. 7. pp. 786-789. @article{c333be1173f8470483490a731d3a19ea, title = "Salvage resection after previous laryngeal surgery: Total laryngectomy with en bloc resection of the overlying cervical skin", abstract = "Objective: To evaluate the effectiveness of extended total laryngectomy for the treatment of recurrences of laryngeal cancer. Design: We conducted a retrospective clinical study of patients who had undergone extended total laryngectomy and were seen over a 15-year period. The follow-up period ranged from 3 to 15 years. Setting: Academic tertiary referral medical center. Patients: We observed 15 patients who were affected by a recurrence of laryngeal cancer that extended to the overlying soft tissue. All patients were male. The mean age was 61.5 years. Thirteen patients had previously undergone partial laryngeal surgery, and 2 patients had undergone radiation therapy, without success. Intervention: All patients underwent total laryngectomy extending to the soft tissue, including the overlying skin. Results: Five of the 15 patients died of local recurrence, and 1 patient died of massive postoperative hemorrhaging. An actuarial survival rate of 60% was observed at 5 years. Conclusion: Total laryngectomy extending to the soft tissues seems to be an effective procedure for treating local recurrences of laryngeal cancer after partial laryngectomy or failure of radiation therapy.", author = "Andrea Gallo and Rossana Moi and Marilia Simonelli and Domenico Vitolo and Fiorella, {Maria Luisa} and Vincenzo Marvaso and Valentina Manciocco and {De Vincentiis}, Marco", journal = "Archives of otolaryngology (Chicago, Ill. : 1960)", T1 - Salvage resection after previous laryngeal surgery T2 - Total laryngectomy with en bloc resection of the overlying cervical skin AU - Gallo, Andrea AU - Moi, Rossana AU - Simonelli, Marilia AU - Vitolo, Domenico AU - Fiorella, Maria Luisa AU - Marvaso, Vincenzo AU - Manciocco, Valentina AU - De Vincentiis, Marco N2 - Objective: To evaluate the effectiveness of extended total laryngectomy for the treatment of recurrences of laryngeal cancer. Design: We conducted a retrospective clinical study of patients who had undergone extended total laryngectomy and were seen over a 15-year period. The follow-up period ranged from 3 to 15 years. Setting: Academic tertiary referral medical center. Patients: We observed 15 patients who were affected by a recurrence of laryngeal cancer that extended to the overlying soft tissue. All patients were male. The mean age was 61.5 years. Thirteen patients had previously undergone partial laryngeal surgery, and 2 patients had undergone radiation therapy, without success. Intervention: All patients underwent total laryngectomy extending to the soft tissue, including the overlying skin. Results: Five of the 15 patients died of local recurrence, and 1 patient died of massive postoperative hemorrhaging. An actuarial survival rate of 60% was observed at 5 years. Conclusion: Total laryngectomy extending to the soft tissues seems to be an effective procedure for treating local recurrences of laryngeal cancer after partial laryngectomy or failure of radiation therapy. AB - Objective: To evaluate the effectiveness of extended total laryngectomy for the treatment of recurrences of laryngeal cancer. Design: We conducted a retrospective clinical study of patients who had undergone extended total laryngectomy and were seen over a 15-year period. The follow-up period ranged from 3 to 15 years. Setting: Academic tertiary referral medical center. Patients: We observed 15 patients who were affected by a recurrence of laryngeal cancer that extended to the overlying soft tissue. All patients were male. The mean age was 61.5 years. Thirteen patients had previously undergone partial laryngeal surgery, and 2 patients had undergone radiation therapy, without success. Intervention: All patients underwent total laryngectomy extending to the soft tissue, including the overlying skin. Results: Five of the 15 patients died of local recurrence, and 1 patient died of massive postoperative hemorrhaging. An actuarial survival rate of 60% was observed at 5 years. Conclusion: Total laryngectomy extending to the soft tissues seems to be an effective procedure for treating local recurrences of laryngeal cancer after partial laryngectomy or failure of radiation therapy. JO - Archives of otolaryngology (Chicago, Ill. : 1960) JF - Archives of otolaryngology (Chicago, Ill. : 1960)
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
673
Housenotes SAFEGUARD® SAFEGUARD® Features ASSURE™ NEXUS™ IGNITE® Thread KINETIC STARCHROME® Thread PUREIMAGE™ Thread Holographic Stripes & Patches GEMINI™ ENIGMA™ MASK™ Domain expertise DLR Design DLR Analytics Advanced Banknote Manager Course Counterfeit training Government Revenue – Government Revenue Solutions Products – Traceology - Security labels ID Security Components Financial & Secure Products Holography expertise Design expertise Code of business principles and ethical standards Our risk management framework Our tax strategy Payment terms, practices, policies and performance Our articles of association Companies act 2006 s430(2B) statements GM 2022 Information AGM information – Detailed share price – Share price chart – Share price calculator – Historical share price – Dividends – 5 year record – Share dealing services – Shareholder forms – Electronic communications Governance and pension policies Section 430(2B) Companies Act 2006 statement Safeguard Features Ignite Thread Kinetic StarChrome Thread PureImage Thread Advanced Bank Manager Course Operational Excellence (SPW) Government Revenue Solutions Government Revenue Solutions Products Traceology Share price chart Historical share price 5 year record Share dealing services Shareholder forms This is a search field with an autosuggest feature attached. De La Rue wins contract to supply polymer substrate for Bank of England's new £20 notes Published on 05 Oct 2017 by De La Rue plc De La Rue plc (De La Rue or the "Group"), the world's leading anti-counterfeiting and security specialist for currency, identity, and brand protection, today announces that it has been awarded a ten-year contract by the Bank of England to supply the base material for its new polymer £20 notes. De La Rue already has the contract to design and print the notes, which will be issued in 2020. Under the terms of the contract, De La Rue will supply the Bank of England its Safeguard® polymer substrate for 25% of the first call-off volume. Based on estimated timings, production for this contract is expected to commence in the financial year of FY18/19. De La Rue launched its Safeguard® polymer substrate in 2012, and it is now used by 15 issuing authorities across 21 denominations. De La Rue is the only vertically integrated producer of polymer banknotes, which is one of the Group's fastest growing product lines. Production volume of Safeguard® nearly quadrupled last year and is expected to double again this year. Martin Sutherland, Chief Executive Officer of De La Rue commented: "We are delighted to have been chosen by the Bank of England to supply polymer substrate for the new £20 notes in addition to our existing work designing and printing the notes. De La Rue is the only fully integrated supplier of polymer banknotes in the world. This new contract is an important strategic milestone and will increase our share of this fast growing market." "Having worked closely with the Bank to design and print the new polymer £5 and £10 notes, we look forward to continue our close relationships and the successful delivery of the new £20 notes in 2020 and beyond." De La Rue plc +44 (0)1256 605000 Martin Sutherland Chief Executive Officer Jitesh Sodha Chief Financial Officer Lili Huang Head of Investor Relations Brunswick +44 (0)207 404 5959 Oliver Hughes De La Rue has a 10 year managed service contract awarded in October 2014 to print Bank of England banknotes at the Bank's facility in Debden, Essex. Currently c3% of the 172bn banknotes issued each year globally are printed on polymer substrate. There are currently 2.2bn £20 notes in circulation, representing c60% of the total number of notes issued by the Bank of England. The annual issuance of the £20 notes ranged between 250-320m in the last five years. About De La Rue De La Rue's purpose is to enable every citizen to participate securely in the global economy. As a trusted partner of governments, central banks and commercial organisations, De La Rue provides products and services that underpin the integrity of trade, personal identity and the movement of goods. As the world's largest designer and commercial printer of banknotes, De La Rue designs, manufactures and delivers banknotes, banknote substrates and security features to customers in a world where currency will continue to be a key part of the developing payments eco-system. De La Rue is the only fully integrated supplier of both paper and polymer banknotes, and creates security features that ensure banknotes are protected against counterfeiting. De La Rue is the world's largest commercial designer and printer of passports, delivering national and international identity tokens and software solutions for governments in a world that is increasingly focused on the importance of a legal and secure identity for every individual. De La Rue also creates and delivers secure product identifiers and 'track and trace' software for governments and commercial customers alike to help to tackle the challenge of illicit or counterfeit goods and the collection of revenue and excise duties. De La Rue is listed on the London Stock Exchange (LSE:DLAR). For further information visit www.delarue.com Lastly, sign up to receive our news © De La Rue plc
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
4,337
Q: Can't get internet on 2.4 GHz wifi, but can for 5 GHz I have a Windows 7 desktop that is giving me a baffling network problem. My router is broadcasting two wifi signals: one on 2.4 GHz and one on 5 GHz. My desktop can connect to both, but cannot get internet when on the 2.4 GHz one. I would just happily use the 5 GHz network, but it is an extremely weak signal and cuts out frequently. The 2.4 GHz signal is stronger. Many other computers in the house happily work on the 2.4 Ghz network, so I feel as though the problem is with my desktop, not the router configuration. Things I've tried: * *Resetting everything I can about the Windows network configuration *Uninstalling the wifi adapter drivers and reinstalling them *Setting a static IP instead of the dynamic IP *Using different DNS servers *Disabling encryption on the wifi *Turning off the Windows firewall When I ping sites from the command line, it works! When I try the Windows 'Troubleshoot problems', it acts as though everything is fine. But I can't load any webpage through any browser, unless I connect to the 5 GHz network. I'm stumped! Additional information to answer commenter questions: * *The adapter is internal: an Asus PCE-N53. *I do get a valid IP from DCHP. The router shows the desktop in its list of connections and everything looks normal. *I cannot access other computers on the network. *The signal strength is decent and moving the antennas or computer doesn't improve the situation. The 5 GHz signal is much worse, but I can manage internet on that one (though not reliably). *I've used inSSIDer, and there is no other network on the same band, so congestion shouldn't be an issue. *Changing the router to N-only didn't change anything - it still works on other computers, but not on my desktop. *Browsers don't give informative errors - they just time out. *The Asus website has only one driver version (1.0.0.8), so that's what I'm using. Interesting update: while pinging worked before (for both IPs and hostnames), it no longer is. And now the Windows troubleshooter is reporting that 'The DNS server isn't responding'. Not sure what's changed, but everything else is still the same: 5 GHz works, and 2.4 GHz works for all other computers. Final (perhaps) explanation: I managed to dig up an old USB 802.11g wifi adapter, plugged it in, and everything works perfectly with it. So I strongly suspect that the Asus PCE-N53 is the culprit. I'm not sure of the exact explanation (perhaps the Asus adapter is broken?), but I may just choose to replace the adapter and consider this a closed case. Thank you to the commenters for their suggestions, though. A: I am pretty sure there are some remnants of an old connection or configuration, which is potentially causing an issue in regards to the the Wi-Fi Connection. Give this a try: A) Disconnect from all Wi-Fi access points, then set your computer to airplane-mode. B) Open PowerShell OR Command Prompt as administrator. C) Enter into the command-prompt or powershell: ipconfig /flushdns D) Enter into the command-prompt or powershell: sfc.exe /scannow ...wait for it to complete. This should only take a few minutes. E) Shutdown the machine (don't restart it); we need it shutdown(powered off completely) so that the wireless adapter can be "restarted". F) Wait for about 10 seconds ===> then proceed to power it on. If that doesn't fix the problem then my only last suggestion is to change the Wi-Fi channel on the 2.4 GHz band.
{ "redpajama_set_name": "RedPajamaStackExchange" }
8,455
The Queen's Health Systems seeks to address the state's primary care provider shortage by looking for highly motivated, compassionate primary care physicians to work in Queen's health care centers and clinics on Oahu, Hawaii Island, and Molokai. To attract primary care physicians, Queen's is offering a Medical Education Loan Repayment Award for qualified physicians. Eligible applicants are primary care physicians who are board certified or board eligible in Internal Medicine or Family Medicine. The physician must work full-time in a primary care clinical position throughout the duration of the 3-year award program. Medical educational loans must be from a government entity or commercial lending institution; other disqualifiers apply. Selection of 3 awardees will occur no later than the 1st quarter of each calendar year. Physician work assignments will be agreed upon by both parties at a location where QHS has primary care coverage needs. Participants must have completed and remain up-to-date on all mandatory employee and/or licensure requirements to be eligible for the award payment distribution. For more information or to apply specifically for a PCP position, please call the Queen's Referral Line at 808-691-7117 or send an email and your CV to physicianrecruitment@queens.org.
{ "redpajama_set_name": "RedPajamaC4" }
567
11723 Goshen Avenue, #PH301, Brentwood. Extremely rare corner penthouse with ocean views! 11822 Goshen Avenue, #103, Brentwood. Extremely rare penthouse with panoramic views and private roof deck. 11928 Kiowa Avenue #203, Brentwood. Spacious condo in the heart of Brentwood. 11634 Gorham Avenue, #206, Brentwood. 11656 Montana Avenue #115, Brentwood. 11723 Goshen Avenue, #103, Brentwood. Do not miss this rare three bedroom unit in a prime Brentwood building. 11820 Mayfield Avenue #320, Brentwood. 11737 Goshen Avenue #202, Brentwood.
{ "redpajama_set_name": "RedPajamaC4" }
9,142
Unciella flagrantis is a species of moth in the family Noctuidae (the owlet moths). It is found in North America. The MONA or Hodges number for Unciella flagrantis is 10112. References Further reading External links Amphipyrinae Articles created by Qbugbot Moths described in 1893
{ "redpajama_set_name": "RedPajamaWikipedia" }
4,720
Fur coats were not always an attribute of style and status. This was the first man's clothing, which was a necessity. Over time, this piece of clothing began to give the traditional, religious and status value. In many wedding ceremonies of cold countries attended fur coats. Especially valuable fur coats were available only to members of royal families and wearing them by commoners was severely punished. For nomads and fur traders were in kind currency. Today the fur coat has become just a beautiful and prestigious outerwear. After all, nothing can warm in winter in cold countries better than heat, taken from nature itself. Russia is one of those cold countries. It was here that the first fur coats in their modern sense appeared. But the origin of the word "coat" is connected, oddly enough, with the south. In ancient times, the Arabs had a large fashion caftans, sheathed Russian sables and martens. This jubba garment was called. In the Russian transcription got "fur coat". In Russia in the 17-18 centuries, only rich merchants and boyars wore fur coats. The presence of a fur coat was considered an indicator of social status and wealth. Moreover, the more fur coats, the more notable its owner. They were so worn: 2-3 pieces at once, and not only in winter. A simple man could afford, at best, a sheepskin coat or hare-skin. Previously, it was decided to wear a fur coat inside the fur, like a sheepskin coat. For a long time, in Russia, snow was covered with scarves over fur coats. So, as now, with fur outside, they began to wear this fashionable clothes quite recently. Today fur coats can be bought in the online store! Fur coats are beautiful, warm and comfortable clothes. Everyone can wear a quality beautiful fur coat, without looking at the budget. Modern ways of processing fur can make a fur coat of any fur luxurious, from democratic muton to valuable sable. The most popular fur is traditionally mink. Mink fur coats fell in love with Russian women for their lightness, good wear and fine fur. Also in demand are sable, fox, chinchilla, beaver, rabbit, muton fur coats. Technology, the development of the textile and chemical industries can make a variety of fur products. Coats, coats, jackets, capes, boleros, hats - a short list of clothes made of fur. Girls have always loved fur coats for luxury, natural shine and warmth. And today it is also the brightness of dyed colored inks, patterns and fur of different lengths, various prints and imitations. Well, how can you resist! A catalog of fur coats from the manufacturer is presented on our website with prices and photos, as in a store. Having bought a fur coat from a fur factory, you will be assured of its quality, you will not pay more to dealers, you will receive the necessary documentation and a guarantee. Italian and Russian designers, employees of our own European and Russian factories are working on the creation of ELENAFURS fur coats. And all so that the fur coat that you wear on your shoulders in winter is impeccable. We regularly carry out sales of fur coats from our company so that you can afford the exact fur you dream of. All year round in our store you can buy a fur coat at a discount. Another opportunity to purchase the desired thing - coats in installments. Our consultants will provide you with all the necessary information on lending and installments. Choose a fur coat in the online store and soon decide what is right for you!
{ "redpajama_set_name": "RedPajamaC4" }
8,482
Q: Disable NDK build in gradle for specific project I have an android library project that builds lib.aar artefact and an app project that imports this lib.aar after it was built. lib.aar requires NDK 17 to be built since it has some C++ 17 code. I manage to build .aar file successfully but the app fails to compile with this message: A problem occurred starting process 'command '/Users/user/Library/Android/sdk/ndk-bundle/toolchains/mips64el-linux-android-4.9/prebuilt/darwin-x86_64/bin/mips64el-linux-android-strip''. This is caused by the fact that NDK 17 removed support for MIPS and I can't upgrade to a newer version of android studio that uses NDK 18beta If I remove the content of '/Users/user/Library/Android/sdk/ndk-bundle' folder, deleting the NDK, then the app builds without errors and I can use lib.aar code inside the app. So far I've tried this: How do I disable the NDK build in Android Studio 1.0.1 , this https://gist.github.com/ph0b/9e59058ac59cac104398 . Setting env variable ANDROID_NDK_HOME to a dummy folder works, the app builds, but it's kind of a hack. Is there any way to programmatically disable NDK build for the app project without deleting NDK folder? A: This is caused by the fact that NDK 17 removed support for MIPS and I can't upgrade to a newer version of android studio that uses NDK 18beta r18 won't fix this problem either; it still doesn't have mips support. The fix to the problem is upgrading the gradle plugin version in your application to at least 3.1, which is the minimum required for NDK r17 (and, extremely unfortunately, is required for even having the NDK installed for some reason). The other solution here would be to install NDK r16b somewhere and then point at it from the app's local.properties, letting the aar pick from the SDK. If you're just working on a local build this will work, but since local.properties shouldn't be checked in to version control it won't help others much.
{ "redpajama_set_name": "RedPajamaStackExchange" }
6,922
Йохан фон Долендорф-Кроненбург (; * пр. 1302; † 1322/1325/ сл. 26 октомври 1327) е благородник, господар на Долендорф, днес част от Бланкенхайм и на замък Кроненбург, днес в Далем в Айфел и рицар. Произход Той е син на Герлах II фон Долендорф († 1310) и първата му съпруга графиня Аделхайд фон Куик-Арнсберг († сл. 1281), дъщеря на граф Готфрид III фон Арнсберг († 1284/1287) и втората му съпруга графиня Аделхайд фон Близкастел († 1272). Баща му Герлах II фон Долендорф се жени втори път ок. 1285 г. за графиня Рихардис Луф фон Клеве († сл. 1326), дъщеря на граф Дитрих Луф фон Клеве-Саарбрюкен († 1277) и Елизабет († 1275). Фамилията му живее до средата на 15 век в замък Долендорф, днес част от Бланкенхайм. Правнучката на Йохан фон Долендорф-Кроненбург Катарина фон Долендорф († сл. 1454) е наследничка на Долендорф, омъжена пр. 20 юни 1429 г. за Годарт I фон Бранденбург, господар на Майзенбург, Бранденбург и Долендорф († сл. 23 юли 1457). Фамилия Йохан фон Долендорф-Кроненбург се жени ок. 1303 г. за Луция фон дер Нойербург (* ок. 1284; † сл. 1327), наследничка на Нойербург и Еш, дъщеря на граф Фридрих III фон дер Нойербург († сл. 1330) и Елизабет († сл. 1326). Те имат децата: Фридрих I фон Долендорф-Кроненбург († 1342), господар на Кроненбург, Нойербург и Гладбах, женен I. за Амиé де Хой († сл. 1300), II. сл. 1300 г. за Мехтилд фон Вианден († сл. 1339); баща на Фридрих II фон Кроненберг († 1357) Герлах III/IV фон Долендорф († 1334), господар на Долендорф, женен I. за Филипа фон Бланкенхайм, II. за Хедвиг фон Керпен († сл.1338); баща на Фридрих III фон Долендорф († 1345/1364) и Дитрих I фон Долендорф († сл. 1345) Конрад († сл. 1325), свещеник в Долендорф Готфрид († сл. 1342), господар на Берг и Вилц, женен за Катарина фон Майзенбург († сл. 1357) Йохан фон Долендорф-Кроненбург има две незаконни дъщери: Мария фон Долендорф († сл. 1364), омъжена I. пр. 1317 г. за Герхард II фон Грайфенщайн († сл. 1317), II. сл. 1323/пр. 1337 г. за граф Готфрид II фон Зайн-Хомбург-Фалендер († 1354) Бертрадис фон Долендорф Литература Hermann Bungartz: Dollendorf/Eifel. Landschaft und Geschichte. Hillesheim 1989 Burg Dollendorf, www.alleburgen.de Europaische Stammtafeln, by Wilhelm Karl, Prinz zu Isenburg, Vol. VII, Tafel 132. Detlev Schwennicke, Europaische Stammtafeln, New Series, Vol. XXIX, Tafel 42. ~Europäische Stammtafeln, J.A. Stargardt Verlag, Marburg, Schwennicke, Detlev (Ed.). 26:78; 7:35, 132. Източници Външни препратки Dollendorf, www.ms-visucom.de Kronenburg , burgrekonstruktion.de Долендорф (род) Господари (Свещена Римска империя) Германска аристокрация Родени през 13 век Починали през 1327 година
{ "redpajama_set_name": "RedPajamaWikipedia" }
4,872
Q: How to insert date & int in to sqlite databse Im using SQlite in my iPhone app. to insert date value i used code like this: NSDate *time; [dict setObject:time forKey:@"time"]; if(sqlite3_bind_text(insertStmt, 1, [time NSDate], -1, SQLITE_TRANSIENT) != SQLITE_OK) { return NO; } int type; NSNumber *type = [NSNumber numberWithInt:type]; [dict setValue:type forKey:@"type"]; if(sqlite3_bind_text(insertStmt, 2, [type int], -1, SQLITE_TRANSIENT) != SQLITE_OK) { return NO; } it shows an warning: incomplete pointer type passing 'id' to perameter of type const char what to do ? thanks in advance.. A: No need to convert the int value into NSNumber.. sqlite3_bind_int(insertStmt,2,type); A: change like this for inserting int value in database sqlite3_bind_int(updStmt, 4, [type int]);
{ "redpajama_set_name": "RedPajamaStackExchange" }
7,465
package com.alibaba.rocketmq.broker.util; import org.apache.commons.lang.StringUtils; import java.text.SimpleDateFormat; /** * User: mengka * Date: 14-5-26 * Time: 上午10:47 */ public class TimeUtil { public static final String format_1 = "yyyy-MM-dd HH:mm:ss"; public static final String format_2 = "yyyyMMddHHmmss"; public static final String format_3 = "yyyy-MM-dd"; public static final String format_4 = "yyyy年MM月dd日"; /** * 将String类型的日期转成Date类型 * * @param dt * date object * @param sFmt * the date format * * @return the formatted string */ public static String toDate(java.util.Date dt, String sFmt) { if (null == dt || StringUtils.isBlank(sFmt)) { return null; } SimpleDateFormat sdfFrom = null; String sRet = null; try { sdfFrom = new SimpleDateFormat(sFmt); sRet = sdfFrom.format(dt).toString(); } catch (Exception ex) { return null; } finally { sdfFrom = null; } return sRet; } /** * 将"yyyy-MM-dd HH:mm:ss"格式的string转变成日期 * <hr> * 日期格式: * <ul> * <li>"yyyy-MM-dd HH:mm:ss"</li> * <li>"yyyy-MM-dd"</li> * </ul> * * @param sDate * @param sFmt 日期字符串,"yyyy-MM-dd HH:mm:ss" * @return */ public static java.util.Date toDate(String sDate, String sFmt) { if (StringUtils.isBlank(sDate) || StringUtils.isBlank(sFmt)) { return null; } SimpleDateFormat sdfFrom = null; java.util.Date dt = null; try { sdfFrom = new SimpleDateFormat(sFmt); dt = sdfFrom.parse(sDate); } catch (Exception ex) { return null; } finally { sdfFrom = null; } return dt; } }
{ "redpajama_set_name": "RedPajamaGithub" }
8,541
const { readFileSync, writeFileSync } = require('fs'); const path = require('path'); const traverse = require('babel-traverse').default; const { transformFromAst, transform } = require('babel-core'); let ID = 0; const currentPath = process.cwd(); function parseDependecies(filename) { const rawCode = readFileSync(filename, 'utf-8'); const ast = transform(rawCode).ast; const dependencies = []; traverse(ast, { ImportDeclaration(path) { const sourcePath = path.node.source.value; dependencies.push(sourcePath); }, }); const es5Code = transformFromAst(ast, null, { presets: ['env'], }).code; return { id: ID++, code: loader(filename, es5Code), dependencies, filename, }; } function parseGraph(entry) { const entryAsset = parseDependecies(path.resolve(currentPath, entry)); const graph = [entryAsset]; for (const asset of graph) { if (!asset.idMapping) { asset.idMapping = {}; } const dir = path.dirname(asset.filename); asset.dependencies.forEach(dependencyPath => { const absolutePath = path.resolve(dir, dependencyPath); const denpendencyAsset = parseDependecies(absolutePath); const id = denpendencyAsset.id; asset.idMapping[dependencyPath] = id; graph.push(denpendencyAsset); }); } return graph; } function build(graph) { let modules = ''; graph.forEach(asset => { modules += `${asset.id}:[ function(require,module,exports){${asset.code}}, ${JSON.stringify(asset.idMapping)}, ],`; }); const wrap = ` (function(modules) { function require(id) { const [fn, idMapping] = modules[id]; function childRequire(filename) { return require(idMapping[filename]); } const newModule = {exports: {}}; fn(childRequire, newModule, newModule.exports); return newModule.exports } require(0); })({${modules}});`; return wrap; } function loader(filename, code) { if (/index/.test(filename)) { console.log('this is loader '); } return code; } const graph = parseGraph(path.resolve(currentPath, 'index.js')); console.log(build(graph));
{ "redpajama_set_name": "RedPajamaGithub" }
4,802
Lady Stafford's Letters Bookmark:https://archiveshub.jisc.ac.uk/data/gb150-sta University of Birmingham, Cadbury Research Library, Special Collections GB 150 STA Lady Susannah Stafford Letters mainly from Lady Susan Stafford, (formerly Lady Gower, 1768-1786), to her daughter Charlotte (1771-1854), Marchioness of Worcester and later Duchess of Beaufort, 1774-1805. The letters reflect the social life of women in late 18th century high society. Lady Stafford instructs her daughter in matters of education, religion, marriage and parenting. She makes frequent reference to politics, including the trial of Marie Antoinette in France and the British Government led by William Pitt. She also writes with social news and gossip, details of her reading matter, travels in England, changing fashions and the death of her husband in 1803. The collection also includes a few letters to Charlotte from other family members including her sister, Lady Susan Leveson-Gower, the Dowager Duchess of Beaufort and Lady Caroline Egerton; and manuscript notes about the Stafford family made by Raglan Somerset in 1907. Lady Stafford (nee Lady Susannah Stewart, 1745-1805, daughter of the sixth Earl of Galloway) was the third wife of Granville Leveson-Gower (1721-1803, Earl Gower and subsequently the first Marquess of Stafford on 28th February 1786); they married on 3rd May 1768. They had four children: Georgiana (1769-1806), who married the honourable William Eliot in 1797; Charlotte (1771-1854); Susan (1772-1838), who married Dudley Ryder, later Earl of Harrowby; and Granville (1773-1846) who was created Viscount Granville in 1815 and Earl Granville in 1833. Lord and Lady Stafford lived at Trentham Hall, Staffordshire and in a house in Whitehall, opposite Horse Guards. Charlotte, to whom the letters are written, married Henry, Marquess of Worcester, in 1791. He succeeded his father as sixth Duke of Beaufort in 1803. They had two sons and eight daughters and, by the time of her mother's death in 1805, Charlotte had given birth to Henry (also known as Herbert, Lord Glamorgan, later seventh Duke of Beaufort, b 1792); Granville (also b 1792); Charlotte (b 1795); Elizabeth (b 1798); and Georgiana (b 1800). The Lord Gower referred to in the letters is Lord Stafford's eldest son by his second marriage to Lady Louisa Egerton. References: Christine Penney, Lady Stafford's Papers (University of Birmingham Library, 1986). Aristocratic Women: the social, political and cultural history of rich and powerful women. A Listing and Guide to Part 2 of the Microfilm Collection (Adam Matthew Publications, 1998) The letters are arranged chronologically. Open. Access to all registered researchers. Acquisition Information This collection was purchased in 1984. Please see full catalogue for further details. Alternative Form Available Lady Stafford's Letters were micropublished by Adam Matthew Publications in 1998 as part of a micropublication under the title Aristocratic Women: the social, political and cultural history of rich and powerful . Permission to make any published use of any material from the collection must be sought in advance in writing from the Director of Special Collections. Identification of copyright holders of unpublished material is often difficult. Special Collections will assist where possible with identifying copyright owners, but responsibility for ensuring copyright clearance rests with the user of the material Further deposits are not expected. EnglandSocial life and customs18th century FranceHistoryRevolution, 1789-1793 Great BritainPolitics and government Upper class familiesGreat Britain WomenGreat BritainConduct of life WomenSocial networksGreat Britain Stafford Susannah 1745-1805 Lady Somerset Charlotte 1771-1854
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
1,886
필리스포즈 MLB Free Agency:… MLB Free Agency: Zach Eflin, Tampa Bay Rays agree to 3-year, $40 million deal Zach Eflin's tenure with the Phillies is officially over. He's going to where he can start and to a club closer to home. The 28-year-old righthander has reportedly agreed to a three-year, $40 million deal with the Tampa Bay Rays, per ESPN's Jeff Passan and the New York Post's Joel Sherman. Once signed, it'll be the largest free-agent contract in Rays history. Zach Eflin's deal with Tampa Bay, as @Joelsherman1 said, is for $40 million over three years. It's the largest free agent contract in Rays history. Eflin, 28, grew up in Orlando and will join Tyler Glasnow, Shane McClanahan and Drew Rasmussen in a fantastic Tampa Bay rotation. — Jeff Passan (@JeffPassan) December 2, 2022 Eflin, who's from Orlando, is expected to help fill out a starting rotation that features Tyler Glasnow, Drew Rasmussen, and Shane McClanahan at the top for a Tampa squad that went 86-76 this season in the ever-competitive AL East but was knocked out of the AL Wild Card round by the Cleveland Guardians in a 2-0 sweep. Eflin went 3-5 with a 4.04 ERA and a 1.12 WHIP through 20 regular-season appearances in 2022. He started 13 games, but a knee injury sidelined him for a chunk of the summer and he was placed in the bullpen upon his return. Having him pitch in relief was critical though in the Phillies' push toward the postseason and eventually to the World Series. He made six appearances in September, recording a 1.35 ERA with just two runs allowed, then in the postseason clincher down in Houston on Oct. 3, he recorded the final three outs and the first save of his career to finally snap an 11-year playoff drought. It was fitting, as him and Aaron Nola, two of the longest-tenured Phillies and key components to the club's long, arduous rebuild, started and ended the clinching game. Eflin continued to pitch out of the pen in the postseason, but his desire was to start again next year, and it was extremely unlikely that the Phillies could have offered him a spot in their rotation. So, it's off to Tampa. (embed)https://www.youtube.com/watch?v=7kPHG6iWtd8(/embed) Follow Nick on Twitter: @itssnick Like us on Facebook: PhillyVoice Sports Eagles will host 49ers in NFC Championship Game Ranking the NFL TV broadcast intro theme songs James Bradberry haunts the Giants in the Eagles' divisional playoff win What you missed from Sixers vs. Kings: a furious comeback without their two stars 민주당, 국회 과방위서 '방송법 개정안' 단독 처리 유럽안보협력기구, 러시아 측 회의 참석 배제…"우크라이나 침공 강력 규탄"
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
7,580