id
stringlengths
50
55
text
stringlengths
54
694k
global_01_local_0_shard_00000017_processed.jsonl/3885
Skip Headers Oracle Data Mining Application Developer's Guide 10g Release 1 (10.1) Part Number B10699-01 Go to Documentation Home Go to Book List Book List Go to Table of Contents Go to Index Go to Master Index Master Index Go to Feedback page Go to previous page Go to next page View PDF Text Mining The PL/SQL interface enables you to perform Text Mining using a simple two-step process: Step 1: Given a Text document table, and an Oracle Text Index built against the documents, extract the text "features" using a simple PL/SQL driver provided with the ODM installation (see Section 5.2, "Summary of ODM PL/SQL Sample Programs"). This driver demonstrates how to store all the text features corresponding to a DocID into a table with nested table columns. Step 2: Provided the table created in Step 1 as input to the CREATE_MODEL or APPLY operation, as appropriate, to be classified using any classification algorithm -- such as SVM, or a clustering algorithm such as k-Means, or a feature extraction algorithm such as NMF. Note that this two-step process is flexible and can handle any general text input; you just have to provide the text features in an input table whose schema corresponds to the one depicted in dm/demo/sample/plsql/textfe.sql. See also Chapter 13, "Text Mining Using ODM," in Oracle Data Mining Concepts.
global_01_local_0_shard_00000017_processed.jsonl/3887
Sun Java System Application Server Enterprise Edition 8.2 Performance Tuning Guide Use getConnection() JMS connections are served from a connection pool. This means that calling getConnection() on a Queue connection factory is fast. Caution – Caution – Previous to version 8.1, it was possible to reuse a connection with a servlet or EJB component. That is, the servlet could call getConnection() in its init() method and then continually call getSession() for each servlet invocation. If you use JMS within a global transaction, that no longer works: applications can only call getSession() once for each connection. After than, the connection must be closed (which doesn’t actually close the connection; it merely returns it to the pool). This is a general feature of portable J2EE 1.4 applications; the Sun Java System Application Server enforces that restriction where previous (J2EE 1.3-based) application servers did not.
global_01_local_0_shard_00000017_processed.jsonl/3888
Common Desktop Environment: Style Guide and Certification Checklist Drag-and-Drop Mechanics There are several areas of the underlying application architecture that are useful to understand when designing drag and drop. In the Common Desktop Environment, there are three types of dragable objects: files, buffers, and text selections. Each application has its own objects that can be dragged and dropped. For example, Calendar uses appointments, Mailer uses mail messages, and File Manager uses folders and files. The folder and file icons in File Manager exist as separate entities in the underlying file system and are, therefore, treated as files when dragged and dropped. However, Calendar appointments and Mailer messages do not exist as separate entities in the file system. When these objects get dragged they are treated as buffers. This difference can lead to some conflicts for the user. The user sees both of these types of objects as the same -- both can appear as icons and both can be manipulated separately from other similar objects. Yet, due to the implementation, the user may see different results from a drag-and-drop operation based on which type of object is being manipulated. Text selections fall into a different category because selecting a piece of text is very different to the user than selecting an icon. The user selects a range of text in a document window; the text does not represent the whole document, it only represents a piece of a document. Rarely does a user see the piece of text as a distinct object and the user does not expect a piece of text to behave like an icon when dropped. For this reason, the drag-and-drop model for text mirrors the cut, copy, and paste operations available from the Edit menu. There are two actions that can take place when an object is dropped: insert or load. The insert action inserts the dropped object into the destination, adding it to the current data in the application or document. The object is inserted when a user schedules an appointment, prints a document, attaches a document, pastes text, or appends a mail message. Such an action is a move or copy operation depending on the destination and the user. The user might decide to copy a piece of selected text, as opposed to moving it. The drag icon should indicate whether the operation is a copy or move. The load action operates the same as if the user had chosen Open from the File menu, selected a file, and clicked the Open button. The dropped object gets loaded into the application. The user can edit it and save changes back to the original file. Load only works with files at this time, not with buffers or text. The user should see the copy drag icon when dragging an object over a drop zone that supports the load action. Load does work with buffers; however, buffers are loaded as read-only. See the section on "Attachment User Model"for more details. Matching Operations
global_01_local_0_shard_00000017_processed.jsonl/3903
Wikipedia has an article on: A flyball governor (mechanical), connected to a linkage to regulate flow. Alternative formsEdit From Middle English govenour, from Old French gouvreneur, from Latin gubernator, from Ancient Greek κυβερνήτης (kybernetes, steersman, pilot, guide), from κυβερνάω (kybernao, to steer, to drive, to guide, to act as a pilot). governor (plural governors) • 1999, Karen O'Connor, The essentials of American government: continuity and change, p 17 Younger voters are more libertarian in political philosophy than older voters and are credited with the success of libertarian governor Jesse Ventura of Minnesota 3. A member of a decision-making for an organization or entity (including some public agencies) similar to or equivalent to a board of directors (used especially for banks); a member of the board of governors. Board of Governors of the Federal Reserve System, (November 6, 2009) 4. (informal) father. • 1869, Louisa May Alcott, An Old-Fashioned Girl: "Say 'father.' We never called him papa; and if one of my brothers had addressed him as 'governor,' as boys do now, I really think he'd have him cut off with a shilling." 5. (informal) Boss, employer. 6. (grammar) A constituent of a phrase that governs another. Derived termsEdit Related termsEdit Last modified on 21 February 2014, at 17:57
global_01_local_0_shard_00000017_processed.jsonl/3905
Alderac Entertainment Group From Wikipedia, the free encyclopedia Jump to: navigation, search Alderac Entertainment Group Type Privately held company Industry Role-playing, Collectible card games Founded 1993 Headquarters Ontario, California, USA Key people John Zinser, Todd Rowland, Mark Wootton Products See article Alderac Entertainment Group, or AEG, is a publisher of role-playing game, board game, and collectible card game products. AEG was formed by Jolly Blackburn[1] in 1993 and is based in the city of Ontario, California. Prior to getting into their current markets, AEG was involved in hobby gaming magazines, with their first product the magazine Shadis (winner of the 1994, 1995, and 1996 Origins Awards for Best Professional Gaming Magazine[2][3][4]). Including the three for Shadis mentioned above, AEG products have garnered eight Origins Awards (see the individual articles noted below for more details). AEG's house system is the 'roll and keep' mechanic, but possibly their greatest contribution to role-playing systems is the concept of 'Action Dice' - these are additional dice awarded to a player for ideas, good role-playing or just amusing the GM; which may be rolled (and thus expended) to improve the player's chance of success when making any die roll. —Megan Robertson[5] In 2009, AEG entered the board games market with 10 new board game releases. Notable successes include Thunderstone and Smash Up. Collectible card games[edit] Board games[edit] Deck-building card games[edit] Role-playing games[edit] • Clan War[13] (Legend of the Five Rings Miniature Combat) 1. ^ Varney, Allen (November 1998). "ProFiles: Jolly Blackburn". Dragon (Renton, Washington: Wizards of the Coast) (#253): 120.  2. ^ "Origins Award Winners (1994)".  3. ^ "Origins Award Winners (1995)".  4. ^ "Origins Award Winners (1996)".  5. ^ "Alderac Entertainment Group (description)". RPG Resource. Archived from the original on 25 October 2007. Retrieved 2007-09-26.  6. ^ "Evil (Review)". RPG Resource. Retrieved 2007-09-26.  7. ^ "Dungeons (Review)". RPG Resource. Retrieved 2007-09-26.  8. ^ "Sundered Faith (Review)". RPG Resource. Retrieved 2007-09-26.  9. ^ Newquist, Ken. "Stargate SG-1 Roleplaying Game (Review)". Archived from the original on 2007-08-27. Retrieved 2007-09-26.  10. ^ Kohler, Alan. "Review of Swashbuckling Adventures". Psion  11. ^ Mix, Brad (2002). "Review of Swashbuckling Adventures". D20 Magazine Rack  12. ^ Bassingthwaite, Don. "The SF Site Featured Review: 7th Sea". Archived from the original on 25 August 2007. Retrieved 2007-09-26.  13. ^ "Listing for Alderac Entertainment Group". The Miniatures Page. Archived from the original on 20 October 2007. Retrieved 2007-09-27.  External links[edit]
global_01_local_0_shard_00000017_processed.jsonl/3907
Interstate 710 From Wikipedia, the free encyclopedia   (Redirected from California State Route 710) Jump to: navigation, search Interstate 710 markerState Route 710 marker Interstate 710 and State Route 710 Long Beach Freeway Route information Defined by S&HC § 622 Maintained by Caltrans Length: 23 mi[citation needed] (37 km) History: 1930s as highway, 1964 as a number (SR 7), 1983-1984 as an interstate (I-710)[1] I-710 from Long Beach to Monterey Park SR 710 (unsigned) from California Boulevard (South Pasadena Gap) to Pasadena Section 1 South end: SR 47 in Long Beach I-405 in Long Beach SR 91 in Long Beach I-105 in Lynwood I-5 in Commerce SR 60 in East Los Angeles I-10 in Monterey Park North end: Valley Boulevard in Alhambra Section 2 South end: California Boulevard in Pasadena North end: SR 134 / I-210 in Pasadena Highway system I-680 I-780 Route 710 (colloquially referred to as "The Seven-Ten"), consisting of State Route 710 (SR 710) and Interstate 710 (I-110), is a state highway in the Los Angeles area of the U.S. state of California, mostly built to interstate standards. Interstate 710 is a north–south auxiliary interstate freeway running for 23 miles (37 km) through Los Angeles County, California. Officially known as the Long Beach Freeway, it runs north from Long Beach to Valley Boulevard, just north of I-10, the San Bernardino freeway, near the boundary between the cities of Alhambra and Los Angeles. South of I-5, Interstate 710 follows the course of the Los Angeles River, rarely wandering more than a few hundred feet from the riverbed. South of SR 1 in Long Beach, SR 710 is officially part of the Seaside Freeway.[2] Also called the Los Angeles River Freeway prior to November 18, 1954,[3] I-710 was planned at its inception to run all the way north to Pasadena, but the construction of the segment from Alhambra to Pasadena through South Pasadena has been delayed for several decades due to community opposition. Prior to 1983, the road was not an Interstate, although it was built to Interstate standards.[citation needed] Until 1964 it was State Route 15, but it was renumbered to State Route 7 in the 1964 renumbering because of the existence of Interstate 15, and to I-710 in 1983. Route description[edit] The southern terminus of the freeway presently signed as Interstate 710 is at Ocean Boulevard in Long Beach. From there, the Long Beach Freeway follows the course of the Los Angeles River to Atlantic Boulevard in the city of Bell. 710 then travels roughly due north, east of downtown Los Angeles, to its current northern terminus at Valley Boulevard (just north of Interstate 10) in Alhambra and the El Sereno neighborhood of Los Angeles. Freeway interchange 710 & 105 in Los Angeles, California. Near its southern terminus, 710 actually separates into three spur freeways. The first spur carries the Long Beach Freeway designation heading toward Downtown Long Beach and becomes Shoreline Drive after the 6th and 9th Street exits, while the Interstate 710 designation continues on N. Harbor Scenic Drive up to an interchange with Ocean Boulevard. The second spur heads down S. Harbor Scenic Drive after the interchange to the eastern piers of the Port of Long Beach and the Queen Mary. The third spur heads west down Ocean Boulevard, which carries the Interstate 710 designation over the Gerald Desmond Bridge onto Terminal Island, where the interstate designation eventually terminates. There is, however, a part of 710 in Pasadena that is constructed to freeway standards, extending from California Boulevard north to the Foothill (I-210)/Ventura (Hwy 134) freeway interchange. But the route designation on this freeway stub is unsigned, and is instead marked if it were merely freeway entrance and exit ramps to and from 210. California 15.svg 1964 – 1985 1930 to 1965[edit] Legislative Route 167 was defined in 1933 to run from San Pedro east to Long Beach and north to Monterey Park.[5] An extension was added in 1947, taking it north to Pasadena.[6] State Route 15 was signed in 1934 along the section of Legislative Route 167 from Pacific Coast Highway (State Route 3, later U.S. Route 101 Alternate, now State Route 1) in Long Beach north to Garvey Avenue (U.S. Route 99, replaced by Interstate 10) in Monterey Park. The original pre-freeway alignment ran along Los Robles Avenue (Pasadena) and Atlantic Boulevard.[1][7] The freeway replacement of SR 15/LR 167 was built from 1953 to 1965.[8] The whole route of LR 167, including the proposed extensions west to San Pedro and north to Pasadena, was renumbered State Route 7 in 1964 after it was decommissioned from portions of the San Diego Freeway (which is now Interstate 405) as part of the state highway renumbering, as the number 15 conflicted with Interstate 15. In 1965 the route was truncated to State Route 1 in Long Beach; the part from SR 1 south and west to State Route 47 was deleted, and the rest from SR 47 west to State Route 11 (now Interstate 110) became part of SR 47. 1965 to present[edit] The Long Beach Freeway was approved as a chargeable interstate in September 1983, so Caltrans changed out the SR 7 signs with Interstate 710 signs in 1984. It was added shortly after the Harbor Freeway went up changing out the SR 11 signs with Interstate 110 in 1981.[9] The short stub in Pasadena was built in 1975, along with the adjacent sections of Interstate 210 and State Route 134.[8] To this day, there are still remaining overhead street signs pointing motorists to State Route 7 in Monterey Park. The existing freeway from SR 1 south to Ocean Boulevard was taken over by the state on August 25, 2000 in a trade with the City of Long Beach for former State Route 103 north of SR 1.[10] In 2013, CalTrans adopted the remainder of the Seaside Freeway from Ocean Boulevard to SR 47 over the Gerald Desmond Bridge as part of Route 710. CalTrans and the Port of Long Beach plan to replace the Gerald Desmond Bridge by 2016.[11] I-710 Corridor Project[edit] The explosive growth of cargo volumes handled at the ports of Los Angeles and Long Beach has added an enormous amount of truck traffic to the Long Beach Freeway, since it is the most direct route between the port complex and the railyards in Vernon and East Los Angeles, as well as the Pomona and San Bernardino freeways that connect Los Angeles to railyards in San Bernardino and Colton. The freeway's pavement has been badly damaged as a result, since it was not designed to carry nearly as large of a load of truck traffic. It has also become a major source of air pollution, emanating from diesel-fueled trucks idling in rush hour traffic congestion and giving cities along its route some of the worst air quality in already smoggy Southern California.[12] In response, an Environmental Impact Statement/Environmental Impact Report is currently being conducted to analyze possible significant improvements to I-710 between the ports of Long Beach and Los Angeles and the Pomona Freeway (SR-60).[13] The South Pasadena Gap[edit] The planned segment from Alhambra to Pasadena through South Pasadena has been subject to legal battles which have stopped construction.[14] Because of these legal disputes, the freeway's northern terminus has been Valley Boulevard since the 1960s. However, a short unsigned freeway does exist in Pasadena, heading south from the interchange of Interstate 210 and State Route 134 to California Boulevard. As a result of the route's incomplete condition, freeway signs are inconsistent in their identification of the northbound Long Beach Freeway's destination, with some indicating Pasadena as a control city and others identifying Valley Boulevard as the freeway's terminus. For example, approaching I-710 from State Route 60 (Pomona Freeway) in East Los Angeles, westbound traffic is given Valley Boulevard as the destination for northbound I-710, while eastbound traffic is given a destination of Pasadena. Signs at the interchange with Interstate 105 show Pasadena as the destination for northbound I-710. Currently, traffic headed for Pasadena on I-710 is redirected to Interstate 10 (San Bernardino Freeway) eastbound by signs at the interchange between the two routes in Monterey Park. These signs identify both Pasadena and San Bernardino as control cities for the eastbound San Bernardino Freeway, although it does not actually pass through Pasadena. Rather, traffic to the city is directed to take State Route 19 (Rosemead Boulevard) northbound from its junction with I-10 (about 6 miles (9.7 km) east of the Long Beach Freeway) to reach Pasadena. Traffic from northbound I-710 is routed onto Fremont Avenue in Alhambra and South Pasadena, and the Pasadena Freeway (State Route 110). The areas around I-710, northeastern Los Angeles and the northwestern San Gabriel Valley are subject to traffic congestion. There are no completed north–south freeways in the twelve-mile area between Interstate 5 (Golden State Freeway) and Interstate 605 (San Gabriel River Freeway). Pro- and anti-710 lobbies have debated whether finishing I-710 would alleviate any of the San Gabriel Valley's traffic congestion, or merely displace it from surface streets to the freeway. Current plans[edit] Caltrans and its local partner, the Los Angeles County Metropolitan Transportation Authority (Metro), are researching the possibility of extending the Long Beach Freeway from Valley Boulevard to Pasadena by building a tunnel under Alhambra, El Sereno, and South Pasadena. The premise is that a tunnel would allow Caltrans to extend the freeway without disturbing the residential neighborhoods on the surface, similar to other tunnels throughout the world.[14] The proposed twin 4.5-mile-long tunnels would be the longest in the United States, but are small compared with others around the world. Between January and May 2009, Caltrans conducted soil samples for the tunneling project in the Pasadena area and is currently in the process of completing a combined environmental impact statement (EIS) and environmental impact report (EIR), in which the tunnel is one option.[15] In August 2012, Metro narrowed down the list of potential alternatives to study in the EIR/EIS process. The alternatives include: (1) a no-build alternative, where no additional infrastructure would be built to address the gap in the freeway plan between Valley Boulevard and I-210; (2) a roadway tunnel without exits to connect the northern terminus of the freeway at Valley Boulevard to Pasadena; (3) a light rail line connecting East L.A. with Pasadena using a route that travels along the I-710 right of way until Valley Boulevard where it would become a subway until connecting with the Metro Gold Line at the Fillmore Metro station in Pasadena; (4) a bus rapid transit line from Montebello to Pasadena; and (5) Transportation System Management/Transportation Demand Management (TSM/TDM).[16][17] Exit list[edit] Except where prefixed with a letter, postmiles were measured on the road as it was in 1964, and do not necessarily reflect current mileage. R reflects a realignment in the route since then.[18] The entire route is in Los Angeles County. Location Postmile Exit[21] Destinations Notes Long Beach   SR 47 south (Vincent Thomas Bridge) – San Pedro Continuation beyond Navy Way   Navy Way At-grade intersection; south end of SR 47 overlap   SR 47 north / SR 103 north / Willow Street – Pier A North end of SR 47 overlap   Pier T Avenue – Piers S T Demolished for bridge construction   Gerald Desmond Bridge over Cerritos Channel 4.96 Port of Long Beach, Piers A-J Northbound exit and southbound entrance 5.46 1A Queen Mary (Harbor Scenic Drive) – Piers F-J Southbound exit and northbound entrance 5.98 1B Pico Avenue – Piers B-E Southbound exit and northbound entrance 6.06 1C Downtown Long Beach, Aquarium (Long Beach Freeway, Shoreline Drive) Southbound left exit and northbound entrance; south end of Interstate 710 designation 6.38 1D Anaheim Street Signed as exit 1 northbound 6.88 2 SR 1 (Pacific Coast Highway) 7.89 3 Willow Street Signed as exits 3A (east) and 3B (west) 9.07 4 Wardlow Road Southbound exit and northbound entrance 9.41 4 I-405 (San Diego Freeway) – San Diego, Santa Monica Former SR 7 10.82 6 Del Amo Boulevard Signed as exits 6A (east) and 6B (west) northbound 12.01 7 Long Beach Boulevard Signed as exits 7A (south) and 7B (north) southbound 12.89 8A Artesia Boulevard Northbound exit and southbound entrance 12.97 8 SR 91 (Artesia Freeway, Gardena Freeway) – Riverside, Redondo Beach Signed as exits 8A (east) and 8B (west) northbound and the opposite southbound Compton 13.95 9 Alondra Boulevard – Compton Signed as exits 9A (east) and 9B (west) southbound Paramount R14.98 10 Rosecrans Avenue Lynwood R15.69 11A I-105 (Century Freeway) – Norwalk, El Segundo Signed as exit 11 northbound   11B Martin Luther King Jr. Boulevard Southbound exit and entrance South Gate 16.99 12 Imperial HighwayLynwood Signed as exits 12A (east) and 12B (west) southbound 18.44 13 Firestone Boulevard Former SR 42 Bell 19.73 15 Florence AvenueBell 21.92 17A Atlantic Boulevard, Bandini Boulevard Signed as exits 17A (north/east) and 17B (south/west) northbound Commerce 22.45 17B Washington BoulevardCommerce Signed as exit 17C northbound 23.28 18A I-5 north (Santa Ana Freeway) – Los Angeles Northbound exit and southbound entrance 23.28 18 I-5 south (Santa Ana Freeway) – Santa Ana Southbound exit and northbound entrance Los Angeles 23.77 19 Whittier Boulevard, Olympic Boulevard Signed as exit 18B northbound; former SR 72 24.47 20A 3rd Street Signed as exit 20B northbound 24.63 20B SR 60 (Pomona Freeway) – Pomona, Los Angeles Signed as exit 20A northbound 24.97 20C Cesar Chavez Avenue Monterey Park 26.38 21 Ramona Boulevard Northbound exit and southbound entrance; former US 99 26.50 22 I-10 (San Bernardino Freeway) – Los Angeles, San Bernardino, Pasadena Signed as exits 22A (west) and 22B (east) southbound Alhambra T27.48 23 Valley Boulevard At-grade intersection Gap in route Pasadena T30.95 Columbia Street At-grade intersection T31.76 California Boulevard At-grade intersection   South end of freeway T32.11 Del Mar Boulevard Southbound exit and northbound entrance T32.45 Colorado BoulevardPasadena Southbound exit and northbound entrance R32.72 SR 134 west (Ventura Freeway) – Ventura Northbound exit and southbound entrance R32.72 I-210 east (Foothill Freeway) – San Bernardino Northbound exit and southbound entrance R32.72 I-210 west (Foothill Freeway) – San Fernando Northbound exit and southbound entrance 1.000 mi = 1.609 km; 1.000 km = 0.621 mi South Harbor Scenic Drive spur (exit 1A)[edit] The entire route is in Long Beach, Los Angeles County. Postmile Destinations Notes   Queen Mary Southbound exit and northbound entrance   Harbor Scenic Drive, Harbor Plaza – Piers H-J Southbound exit and northbound entrance   Harbor Plaza – Port of Long Beach, Piers F-G Southbound exit only   Downtown Long Beach (Queensway Bridge) Northbound exit and entrance   Queensway Drive Northbound exit and entrance   Pico Avenue – Piers F-G No northbound exit   Downtown Long Beach (Ocean Boulevard) Northbound exit only   I-710 north (N. Harbor Scenic Drive) – Pasadena Northbound exit and southbound entrance 1.000 mi = 1.609 km; 1.000 km = 0.621 mi Shoreline Drive spur (exit 1C)[edit] The entire route is in Long Beach, Los Angeles County. Postmile Destinations Notes   Pine Avenue (Shoreline Drive) – Convention Center, Shoreline Village Continuation beyond Queensway Bridge   Queen Mary, Events Park, Cruise Ships (Queensway Bridge) At-grade intersection   Golden Shore, Catalina Landing Southbound exit and entrance   Ocean Boulevard Northbound exit and entrance   Shoreline Drive Northbound U-turn   Pine Avenue, Broadway – Long Beach Civic Center Southbound exit and northbound entrance   6th Street east – Downtown Long Beach Southbound exit and northbound entrance   9th Street, Anaheim Street – Port of Long Beach Northbound exit and southbound entrance   I-710 north (Long Beach Freeway) – Pasadena Northbound exit and southbound entrance 1.000 mi = 1.609 km; 1.000 km = 0.621 mi See also[edit] 1. ^ a b "California Highways: Interstate 710". Retrieved 2013-01-26.  2. ^ California State Legislature (1959). "Relating to the Seaside Freeway". State of California. 1959 House Resolution No. 144, p. 3502. : "That the California Highway Commission is requested to declare the added portion of Route 167 which will connect the Harbor Freeway and the Long Beach Freeway to be a freeway, to be known as the Seaside Freeway..." 3. ^ California Department of Transportation, 2007 Named Freeways, Highways, Structures and Other Appurtenances In California (PDF) 5. ^ "California Highways: Chronology of California Highways 1933-1946". Retrieved 2013-01-26.  6. ^ "California Highways: Chronology of California Highways 1947-1962". Retrieved 2013-01-26.  7. ^ 1942 Gousha Los Angeles map[dead link] 8. ^ a b "January 1, 2006 California Log of Bridges on State Highways". Retrieved 2013-01-26.  9. ^ "California Highways: State Route 7". Retrieved 2013-01-26.  10. ^ Caltrans - District 7: A Closer Look At 2000 Achievements[dead link] (PDF) 11. ^ [1] 12. ^ The Life and Death of Great American Freeways: The 710 Case Study[dead link] by John Dutton 13. ^ "I-710 Corridor Project Overview". Los Angeles County Metropolitan Transportation Authority. Retrieved 2011-07-16.  14. ^ a b "South Pasadena tunnel plan may advance". Los Angeles Times. March 22, 2007. Retrieved 18 Dec 2011.  15. ^ "Metro: SR 710 Conversations Notices and Meeting Materials".  16. ^ "Metro: An Important Announcement Regarding the SR 170 Study".  17. ^ "Maps of the alternative routes for the roadway tunnel, light rail, and bus rapid transit alternatives".  19. ^ California Department of Transportation, Log of Bridges on State Highways, July 2007 20. ^ California Department of Transportation, All Traffic Volumes on CSHS, 2005 and 2006 21. ^ California Department of Transportation, California Numbered Exit Uniform System, I-710 Northbound and I-710 Southbound, accessed February 2008 External links[edit] Route map: Google / Bing
global_01_local_0_shard_00000017_processed.jsonl/3908
Clinton Heylin From Wikipedia, the free encyclopedia Jump to: navigation, search Clinton Heylin (born 8 April 1960 in Manchester) is an English author who has written extensively about popular music and the work of Bob Dylan. Heylin attended Manchester Grammar School. He read History at Bedford College, University of London, followed by getting an M.A. in History at the University of Sussex. Heylin has written extensively on the life and work of Bob Dylan, combining interviews with discographical research. He has published a full-length biography Dylan: Behind the Shades (1991) which was republished in a revised second edition: Bob Dylan: Behind The Shades - Take Two (UK edition, 2000), Bob Dylan: Behind The Shades Revisited (US edition, 2001). Heylin published a detailed analysis of every song by Dylan in two volumes: Revolution In The Air: The Songs of Bob Dylan: Vol. 1: 1957-73 (2009), and Still On The Road: The Songs of Bob Dylan: Vol. 2: 1974-2008 (2010). These books analyse 610 songs written by Dylan, devoting a numbered section to each song. In 2011, to mark Dylan's 70th birthday, Heylin published Behind the Shades: The 20th Anniversary Edition, which contained 60,000 words of new material to cover Dylan's work since 2000. He has also written detailed biographies on Van Morrison and Sandy Denny. Heylin has also published favorably reviewed studies of Orson Welles, Despite The System: Orson Welles versus The Hollywood Studios,[1] and Shakespeare's sonnets, So Long As Men Can Breathe.[2][3] In 2012, Heylin published a book about the theme of mental illness in British rock music in the 1960s and 1970s, All The Madmen. The book featured chapters on the Dialectics of Liberation conference of 1967, Syd Barrett, the Pink Floyd's album Dark Side Of The Moon, David Bowie's theme of schizophrenia in his songs, The Who's Quadrophenia album, and Nick Drake. In 2012, Heylin also published E Street Shuffle: The Glory Days of Bruce Springsteen and the E Street Band, a biography of Bruce Springsteen and an analysis of his achievements in the recording studio.[4] Selected works[edit] 1. ^ Schulberg, Budd (2005-05-01). "The Kane Mutiny". New York Times. Retrieved 2010-03-10.  2. ^ Shaw, Kevin (July 21, 2009). "So Long as Men Can Breathe by Clinton Heylin". Retrieved January 31, 2014.  3. ^ Peters, Susan (2009-06-01). "Literature, So Long as Men Can Breathe". The Library Journal. Retrieved 2010-03-10.  4. ^ Mark, Amanda (January 3, 2013). "E Street Shuffle: The Glory Days of Bruce Springsteen and the E Street Band". New York Journal of Books. Retrieved March 11, 2014.  External Links[edit] Clinton Heylin - official website
global_01_local_0_shard_00000017_processed.jsonl/3909
Evolution (Boyz II Men album) From Wikipedia, the free encyclopedia Jump to: navigation, search Studio album by Boyz II Men Released September 23, 1997 Recorded 1996 - 1997 Genre R&B, pop, soul, hip hop soul Length 61:48 Language English Label Motown Producer Boyz II Men, Babyface, Jimmy Jam and Terry Lewis, Sean "Diddy" Combs, Keith Crouch, Shawn Stockman Boyz II Men chronology The Remix Collection The Ballad Collection Singles from Evolution 1. "4 Seasons of Loneliness" Released: September 9, 1997 2. "A Song for Mama" Released: November 25, 1997 3. "Can't Let Her Go" Released: 1998 4. "Doin' Just Fine" Released: 1998 Alternate Spanish cover Professional ratings Review scores Source Rating Allmusic 3/5 stars[1] Entertainment Weekly C[2] Robert Christgau (choice cut)[3] Rolling Stone 2/5 stars[4] Evolution is the third album by R&B group Boyz II Men, released in September 1997. It is their final album released on Motown Records.[5] A Spanish language version, Evolución, was also issued. On August 20, 1997, Boyz II Men held a press conference to talk about their first album since 1994's II. They were under pressure with their last two albums cumulatively selling almost 30 million copies worldwide. With Evolution, they worked with their regular collaborators, including Jimmy Jam and Terry Lewis and Babyface. They appeared on many talk shows including The Rosie O'Donnell Show, The Oprah Winfrey Show, The Tonight Show with Jay Leno, The Vibe Show, The Keenen Ivory Wayans Show and MTV Live. The album was released on September 23, and that night, Boyz II Men signed copies of the album at the Virgin Megastore in New York City. Evolution debuted at #1 in the Billboard 200 with 215,000 copies sold in its first week of release. The album also debuted at #1 on the R&B Album Charts. However, the album spent only one week at the #1 spot and quickly fell down the charts. Evolution sold two million copies in the United States and over four million copies worldwide, a disappointment compared with the successes of Cooleyhighharmony and II. Evolution was not received well by critics. In October 1998, Boyz II Men went to Japan and Europe to promote the album, and during that year they embarked on the Evolution Tour. The first single released from the album, "4 Seasons of Loneliness", was released in August 1997. The song was Boyz II Men's highest debut on the Billboard Hot 100 Singles. It debuted at #2, behind Mariah Carey's "Honey". The following week, the single went to #1, became their fourth (and fifth overall) and last chart-topper to date. 4 Seasons of Loneliness became Boyz II Men's sixth platinum single. Later that year, the second single, "A Song for Mama", was released, a track which already appeared on the Soul Food soundtrack The single reached #7 on the Billboard Hot 100 and #1 on the R&B Singles Chart, making Boyz II Men the only group in history to have seven platinum singles in the United States. Track listing[edit] English version[edit] 1. "Doin' Just Fine" (Produced by Shawn Stockman) 2. "Never" (Produced by Babyface) 3. "4 Seasons of Loneliness" (Produced by Jimmy Jam & Terry Lewis) 4. "Girl in the Life Magazine" (Produced by Babyface) 5. "A Song for Mama" (Produced by Babyface) 6. "Can You Stand the Rain" (Produced by Boyz II Men) 7. "Can't Let Her Go" (featuring Puff Daddy) (Produced by Sean Combs) 8. "Baby C'mon" (Produced by Keith Crouch) 9. "Come On" (featuring Mase) (Produced by Sean Combs) 10. "All Night Long" (Produced by Keith Crouch) 11. "Human II (Don't Turn Your Back on Me)" (Produced by Jimmy Jam & Terry Lewis) 12. "To the Limit" (featuring Craig Mack) (Produced by Sean Combs) 13. "Dear God" (Produced by Boyz II Men) 14. "Just Hold On" (Japanese Edition) (Produced by Babyface) 15. "I Can Love You" (Japanese Edition) (Produced by Boyz II Men) 16. "Can't Let Her Go" (Original Mix feat. Driver) (French Bonus Track) (Produced by Sean Combs) 17. "Wishes" (Produced by Jimmy Jam & Terry Lewis)[6] Spanish version[edit] 1. "4 Estaciones De Soledad (4 Seasons of Loneliness)" 2. "A Mi Me Va Bien (Doin' Just Fine)" 3. "Te Doy Mi Amor (I Can Love You)" 4. "La Chica De La Revista (Girl in the Life Magazine)" 5. "Una Canción Para Mamá (A Song for Mama)" 6. "Yo Te Voy a Amar (I'll Make Love to You)" 7. "No Dejemos Que Muera el Amor (Water Runs Dry)" 8. "Me Rindo Ante Ti (On Bended Knee)" 9. "Yesterday (Spanish Version)" 10. "Al Final Del Camino (End of the Road)" Chart positions[edit] Chart (1997) Peak Australian ARIA Albums Chart 6 Belgian Wallonia Albums Chart 45 Canadian Albums Chart 2 Dutch Albums Chart 7 European Albums Chart[7] 18 French Albums Chart 7 German Albums Chart 8 Japanese Albums Chart[8] 8 New Zealand RIANZ Albums Chart 6 Swedish Albums Chart 25 Swiss Albums Chart 20 UK Albums Chart 12 U.S. Billboard 200 1 Region Certification Sales/shipments Australia (ARIA)[9] Gold 35,000^ Canada (Music Canada)[10] 2× Platinum 200,000^ Hong Kong (IFPI Hong Kong)[11] Platinum 20,000* Japan (RIAJ)[12] 2× Platinum 400,000^ United Kingdom (BPI)[13] Silver 60,000^ United States (RIAA)[14] 2× Platinum 2,000,000^ *sales figures based on certification alone ^shipments figures based on certification alone xunspecified figures based on certification alone Year Song[15] Hot R&B Singles U.S. Hot 100 1997 "4 Seasons of Loneliness" 2 1 "A Song for Mama" 1 7 See also[edit] 1. ^ http://www.allmusic.com/album/r315633 2. ^ Helligar, Jeremy (1997-09-26). "Evolution Review". Entertainment Weekly. Retrieved 2012-06-30.  3. ^ Christgau, Robert. "CG: Boyz II Men". RobertChristgau.com. Retrieved 2012-06-30.  4. ^ Hardy, Ernest (1997-10-10). "Boyz II Men: Evolution : Music Reviews". Rolling Stone. Archived from the original on 2008-06-18. Retrieved 2012-06-30.  5. ^ "Evolution - Boyz II Men". Motown Records. Retrieved 14 July 2009.  6. ^ "Boyz II Men CD Singles and CDs". Matt's CD Singles. Retrieved 14 July 2009.  7. ^ http://books.google.ca/books?id=0wkEAAAAMBAJ&lr=&rview=1%7Ctitle=Hits of the World - Eurochart|work=Billboard|publisher=Nielsen Business Media, Inc.|date=25 October 1997|accessdate=25 July 2012 8. ^ http://www.oricon.co.jp/prof/artist/154394/ranking/cd_album/ 9. ^ "ARIA Charts – Accreditations – 1997 Albums". Australian Recording Industry Association. Retrieved 25 July 2012.  10. ^ "Canadian album certifications – Boyz II Men – Evolution". Music Canada. Retrieved 25 July 2012.  11. ^ "IFPIHK Gold Disc Award − 1997". IFPI Hong Kong.  12. ^ "Japanese album certifications – Boyz II Men – Evolution" (in Japanese). Recording Industry Association of Japan. Retrieved July 15, 2012.  13. ^ "British album certifications – Boyz II Men – Evolution". British Phonographic Industry. Retrieved 25 July 2012.  Enter Evolution in the field Search. Select Title in the field Search by. Select album in the field By Format. Click Go 14. ^ "American album certifications – Boyz II Men – Evolution". Recording Industry Association of America. Retrieved July 15, 2012.  If necessary, click Advanced, then click Format, then select Album, then click SEARCH 15. ^ "Artist Single Chart History - Boyz II Men". Billboard.com. Retrieved 14 July 2009.  External links[edit] Preceded by Butterfly by Mariah Carey Billboard 200 number-one album October 11–17, 1997 Succeeded by You Light Up My Life: Inspirational Songs by LeAnn Rimes
global_01_local_0_shard_00000017_processed.jsonl/3910
Independence Air From Wikipedia, the free encyclopedia Jump to: navigation, search Independence Air Independence Air logo.svg Founded 1989 (as Atlantic Coast Airlines) Ceased operations January 5, 2006 Operating bases Washington Dulles International Airport Hubs Washington Dulles International Airport Frequent-flyer program iCLUB Fleet size 85 Destinations 37 Company slogan Go your own way Parent company FLYi, Inc. Headquarters Loudoun County, Virginia Key people Kerry Skeen (CEO) Independence Air was a low-cost airline, owned by FLYi, Inc., headquartered in the Loudoun Gateway Corporate Center in Dulles, unincorporated Loudoun County, Virginia, United States (near Washington, D.C.) that operated from 1989 until 2006. Its route network focused on the East Coast of the United States, but it also extended to the West Coast. The route network was based at Washington Dulles International Airport. It ceased all operations at 8:24 p.m. UTC-5 on January 5, 2006. The airline had been in Chapter 11 Bankruptcy since November 7, 2005,[1] and there had been discussion of a last-minute deal that could save the airline, but that did not happen. A regional jet operated by Independence Air, seen through terminal windows Independence Air started life as Atlantic Coast Airlines on December 15, 1989, operating feeder services as United Express for United Airlines and Delta Connection for Delta Air Lines.[2] After United withdrew the contract when the ACA labor and management would not agree to the concessions it requested, Atlantic Coast reinvented itself as low-cost carrier Independence Air.[3] It was announced on November 19, 2003, and operations as Independence Air began on June 16, 2004. At its inception, it was unique among low-cost carriers in that its fleet mainly consisted of 50-seat regional jets, although the airline later introduced larger Airbus A319 equipment. It was based at Washington Dulles International Airport (IAD) and contributed to Dulles's substantial increase in passenger use, bringing one million new customers to the airport in its first three months of operation.[4] The airline was also credited with helping to reduce fares to and from the airport.[3] From the beginning, the airline faced criticism. Some[who?] believed that it expanded too quickly, had a poor fleet mix[5] and did not have the resources to compete with the legacy airlines, who despite their own financial troubles, would match the fares offered by Independence.[3][6] Further, industry experts believed that the reasons behind the airline's failure were not problems with the low-cost strategy, but miscues on the part of airline management.[7] Atlantic Coast's / Independence Air's former partner at Dulles, United Airlines, responded vigorously to Independence Air's emergence as a stand-alone carrier by leveraging Washington area passenger loyalty to the United Mileage Plus frequent flyer program. United offered its Mileage Plus members substantial bonuses, including free trips around the world on United and other Star Alliance carriers; these proved effective in maintaining United's grip on the lucrative business travel market, and Independence Air was unable to respond to United's promotional onslaught. (United's primary offer for free flights based on a sliding scale of flight segments to/from a Washington airport - IAD, DCA, BWI. 24 segments yielded a United coach ticket, 48 segments yielded a Star Alliance round-the-world business class ticket.) Problems, including flights flying far below capacity, were identified in October 2004,[8] less than six months following the airline's launch as the parent company attempted to avoid bankruptcy.[9] Promotional activities[edit] Independence Air employment center in Sterling On May 20, 2004, even prior to its inaugural flight, Independence Air signed a deal[10] with the Washington Redskins to become the official airline sponsor of the team for three years.[11] In the summer of 2005, the airline offered the GLiDE Summer Travel Pass for college students.[12] Upon paying $250, the customer would be able to fly at no cost (after paying taxes & airport fees) from May 1-Aug 31, on Tuesdays, Wednesdays & Saturdays. This move was meant not to bring in revenue, but to try to fill seats that otherwise would have flown empty. This promotional tool was not enough to prevent trouble, due in part to the airline losing almost $150 million in its two years of operation.[6] Independence Air became quickly known for the humorous touches it added to the flying experience, such as replacing the flight attendant safety announcements with prerecorded versions of the warnings by celebrities such as James Carville and Mary Matalin.[13] They also attracted attention from their partnership with the Laugh Factory[14] and the use of former baggage handler Dave George as "the Flyi Guy" — the airline's resident comedian.[15] Independence Air also invested in a fleet of 20 promotional vehicles, dubbed "Jet Trucks". Modified pickup trucks were painted in the airline's livery and featured an aircraft tail attached to the truck's bed. Jet Trucks were featured at all promotional events and activities, where employees would handout information and branded giveaways. Rather than having these vehicles sit in the headquarters office parking lot between events, 10 trucks were allocated for employee use to increase public exposure.[citation needed] Corporate affairs[edit] Independence Air had its headquarters in Loudoun Gateway III in the Loudoun Gateway Corporate Center in Dulles, unincorporated Loudoun County, Virginia.[16][17] The facility is located at the intersection of Virginia Route 28 and Virginia Route 606, 1 mile (1.6 km) north of the Dulles Toll Road and near Washington Dulles International Airport. The three-story, 76,557 square feet (7,112.4 m2) building has an about 25,000 RSF floor plate. The entire Loudoun Gateway Corporate Center has about 38.6 acres (15.6 ha) of space.[17] Grubb & Ellis had originally leased 76,982 square feet (7,151.9 m2) of the building to Atlantic Coast Airlines.[18] Independence Air Airbus A319 in 2005. From the airline's beginning, its fleet mix was cited as one of the causes of its financial troubles.[5] Independence Air's fleet ebbed and flowed in an attempt to stay in business.[19] In February 2005, the airline canceled the lease on more than 20 Bombardier CRJ200 jets and British Aerospace Jetstream 41 turbo-prop planes.[20] After its emergence as an independent brand name, Independence Air became known for offering very low airfares: as little as $29 one-way to Florida from Washington Dulles International Airport.[21] However, the company never overcame a series of financial problems during its transition, and its decline started only six months after its launch. In February 2005, one of its aircraft was repossessed after the company missed a lease payment,[22] after trying and failing to restructure the lease.[9] Later that year, three more aircraft were sold or repossessed and in November 2005, FLYi, Inc., their parent company, declared bankruptcy.[23] The company cited rising costs in the airline industry as the reason its low-cost strategy did not succeed.[6] In the intervening months between FLY I's declaration of bankruptcy and Independence Air's cessation of operations, a number of airlines expressed an interest in acquiring the airline's assets including: Mesa Air Group, United Airlines and Richard Branson.[24] Not finding a suitable buyer in time to keep the planes flying, Independence Air announced on January 2, 2006, that it would cease operations at 7:26 p.m. UTC-5 on January 5, 2006 following a flight from Westchester County Airport in New York.[25] When the airline ceased operations, it employed more than 2,500 staff, [23] many of whom had been with the airline since its inception as Atlantic Coast Airlines.[21] Over its 18 months of operation, Independence carried more than 8 million passengers.[21] On March 10, 2006, Northwest Airlines bought the operating certificate of Independence Air for $2 million to establish a new regional airline. On March 29, 2006, Northwest reported that Independence Air would be renamed Compass Airlines. The first flight route would be a twice daily service between Washington Dulles International Airport and Minneapolis-Saint Paul International Airport beginning in early June 2006.[26] At the time of its shutdown on January 5, 2006, Independence operated 200 daily departures to 37 destinations throughout the United States,[27] up from 78 flights at its launch.[28] 1. ^ "Fact Sheet re 2/98 Cessation of Ops". Office of Aviation Enforcement and Proceedings. 2006-02-21. Retrieved 2008-02-20.  2. ^ Matthew French (2004-11-15). "Despite Industry woes, Independence Air Sees Strong Market in Charleston". Charleston Regional Business Journal. Archived from the original on 2007-11-14. Retrieved 2008-02-20.  3. ^ a b c Joe Sharkey (2006-01-10). "Independence Air Ends: No Bang, Some Whimpers". The New York Times. Retrieved 2008-02-20.  4. ^ Sara Kehaulani (2004-09-30). "Dulles Among Busiest Airports". Washington Post. Retrieved 2008-02-20.  5. ^ a b Keith L. Alexander (2006-01-03). "Despite Persistent Criticism, Airline Chief Stayed His Course". The Washington Post. Retrieved 2008-02-20.  6. ^ a b c "Independence Air is Banktupt". Consumer Affairs. 2005-11-08. Retrieved 2008-02-20.  7. ^ Peter J. Howe (2006-01-03). "Independence Air to Shut Down". The Boston Globe. Retrieved 2008-02-20.  8. ^ "Delta Flight Plan May Include Bankruptcy". 2005-10-25. Retrieved 2008-02-20.  9. ^ a b "Flyi's Share Price Continues to Fall". The Washington Post. 2004-11-11. Retrieved 2008-02-20.  10. ^ Clabaugh, Jeff (2004-05-21). "Independence Air scores Redskins sponsorship".  11. ^ Jeff Clabaugh (2004-05-21). "Independence Air Scores Redskins Sponsorship". Baltimore Business Journal. Retrieved 2008-02-20.  12. ^ Sascha Segan (2005-04-22). "Swap That Hall Pass for an Air Pass & Flit About the US from $249 All Summer". Frommer's. Retrieved 2008-02-20.  13. ^ "RDU Welcomes Independence Air". RDU Update. Raleigh-Durham International Airport. 2004. Retrieved 2008-02-20.  14. ^ Joe Sharkey (2005-08-16). "What Flies Coast to Coast and Isn't Very Funny?". The New York Times. Retrieved 2008-02-20.  15. ^ Jayne Clark (2005-08-18). "I Just Flew in from Cleveland...and, Boy, are My Wings Tired!". USA Today. Retrieved 2008-02-20.  16. ^ "ANNUAL REPORT TO STOCKHOLDERS For the fiscal year ended December 31, 2004." Independence Air. Retrieved on January 31, 2011. "45200 Business Court, Dulles, Virginia (Address of principal executive offices)" 17. ^ a b "Loudoun Gateway III." The Alter Group. Retrieved on January 31, 2011. "Loudoun Gateway III 45200 Business Court Loudoun Gateway Corporate Center Dulles, VA." 18. ^ "FCC delays decision on who can wire buildings." The Washington Times. September 18, 2000. Retrieved on January 31, 2011. "Grubb & Ellis has leased 76982 square feet of office space to Atlantic Coast Airlines Holdings Inc in the Loudoun Gateway III complex in Dulles[...]" 19. ^ "Independence Air Cuts Fleet to Stay Airborne". 2005-02-23. Retrieved 2008-02-20.  20. ^ Jeff Clabaugh (2005-02-22). "Independence Air Pares Fleet". The Business Review (Albany). Retrieved 2008-02-20.  21. ^ a b c Bill Brubaker (2006-01-06). "Foggy Morning, Misty Eyes Usher Out Independence". The Washington Post. Retrieved 2008-02-20.  22. ^ "Repo Man Visits Independence Air". 2005-02-13. Retrieved 2008-02-20.  23. ^ a b "Last Run for Independence Air". 2006-01-05. Retrieved 2008-02-20.  24. ^ Bill Brubaker (2005-12-23). "United Seeks Piece of Independence Air". The Washington Post. Retrieved 2008-02-20.  25. ^ "Final Boarding Call for Independence Air". 2006-01-02. Retrieved 2008-02-20.  26. ^ Jewel Gopwani (2006-03-30). "NWA Plans June Start for Carrier". USA Today. Retrieved 2008-02-20.  27. ^ "Low-fare Airline to Shut Down Thursday". St. Petersburg Times. 2006-01-03. Retrieved 2008-02-20.  28. ^ Bill Brubaker (2004-06-17). "Independence Air is Off the Ground at Last". The Washington Post. Retrieved 2008-02-20.  External links[edit]
global_01_local_0_shard_00000017_processed.jsonl/3911
Jack Wilshere From Wikipedia, the free encyclopedia Jump to: navigation, search Jack Wilshere Jack Wilshere Oct 2010 (cropped).jpg Wilshere playing for Arsenal in 2010 Personal information Full name Jack Andrew Garry Wilshere[1] Date of birth (1992-01-01) 1 January 1992 (age 22) Place of birth Stevenage, England Height 1.72 m (5 ft 7 12 in)[2] Playing position Midfielder Club information Current club Arsenal Number 10 Youth career 2001 Luton Town 2001–2008 Arsenal Senior career* Years Team Apps (Gls) 2008– Arsenal 85 (4) 2010 Bolton Wanderers (loan) 14 (1) National team 2006–2007 England U16 2 (0) 2007–2009 England U17 9 (1) 2009 England U19 1 (0) 2009 England U21 7 (0) 2010– England 15 (0) * Senior club appearances and goals counted for the domestic league only and correct as of 19:18, 6 March 2014 (UTC). † Appearances (Goals). ‡ National team caps and goals correct as of 22:04, 5 March 2014 (UTC) Jack Andrew Garry Wilshere /ˈwɪlʃər/ (born 1 January 1992) is an English footballer who plays for English club Arsenal and the England national team. He plays primarily as a central midfielder. Wilshere came up through Arsenal's youth academy and impressed from an early age. He made his first team debut in 2008, becoming Arsenal's youngest ever league debutant at the age of 16 years, 256 days.[3] Wilshere has earned a number of accolades including the PFA Young Player of the Year award, nomination to the 2010-11 PFA Team of the Year, and Arsenal's Player of the Season award, as voted for by fans for his performances in his first full campaign for Arsenal during the 2010–11 season.[4] Wilshere is an England international, having previously represented his country at under-16, under-17, under-19 and under-21 levels. He made his debut for the senior team against Hungary at the age of 18 years and 222 days, making him the 10th youngest player in England's history.[5] Early life[edit] Wilshere was born in Stevenage, Hertfordshire and currently lives in Hitchin, where he grew up and captained his school team.[6] He captained The Priory School football team to County Cup and District Cup glory from Year 7 through to Year 10, and also added the Under 15s National Cup to his list in Year 8. Club career[edit] Youth and Reserves[edit] Wilshere joined the Arsenal Academy in October 2001 at the age of nine, after a short spell in the Luton Town youth programme.[7][8] He rose through the ranks, and at the age of 15 was named the captain of the under-16s; he also made a few appearances for the Under-18s. In the summer of 2007 Wilshere featured in the Champions Youth Cup and upon his return to England, Arsenal Academy coach Steve Bould gave him a start for the Under-18s first game against the Chelsea Under-18 team.[9] He scored his first goal against Aston Villa Under-18s in a 4–1 win.[10] He then scored a hat-trick against Watford Under-18s, helping his side to an Academy Group A title.[11] He finished his first full season with the Under-18s with 13 goals in 18 appearances, most of which coming at age 15.[12] In February 2008, he made his debut for Arsenal Reserves aged 16 against Reading, and scored Arsenal's only goal of the match, which ended in a draw.[13] He scored a memorable goal against West Ham reserves in March, picking the ball up and curling a shot into the top left corner under the watching eye of Arsène Wenger.[14] He managed to record two goals and two assists in just three appearances for the reserves at the end of the 2007–08 season. He played in the Under-16s victory in the Ferroli Cup, being named as player of the tournament.[15] He played an important role in Arsenal's 2009 FA Youth Cup win, scoring goals in the semi final[16] and producing a man-of-the-match display in the first leg of the final against Liverpool, assisting two goals and scoring himself.[17] Wilshere warming up before a game against West Bromwich Albion 2008–09 season[edit] In July 2008, Wilshere was selected in the first team for the pre-season friendlies. He made his first team debut against Barnet as a half-time substitute for Henri Lansbury, setting up a goal for Jay Simpson.[18] Wilshere scored his first two goals for Arsenal in a 10–2 win against a Burgenland XI, and again two days later in a friendly against Stuttgart. Arsenal manager Arsène Wenger gave Wilshere a place in Arsenal's first team squad for the 2008–09 season,[19] and he was given the number 19 shirt.[20] He made his competitive debut in a Premier League match against Blackburn Rovers at Ewood Park in September 2008, as an 84th-minute substitute for Robin van Persie.[21] At the age of 16 years and 256 days, he was Arsenal's youngest-ever league debutante, a record previously held by Cesc Fàbregas.[22] Ten days later, on 23 September, Wilshere scored his first competitive Arsenal goal in a 6–0 victory against Sheffield United in the Football League Cup.[23] On 25 November 2008, Wilshere came on as a substitute in a UEFA Champions League match against Dynamo Kyiv, becoming the fifth sixteen-year-old to ever play in the Champions League.[24] In January 2009 Wilshere signed his first professional contract,[25] extending it in July the same year.[26] 2009–10 season[edit] In the preparation for the 2009–10 season, Wilshere scored twice and was twice awarded Man of the Match as Arsenal regained the friendly tournament, the Emirates Cup.[27] On 22 September 2009, he started for Arsenal in their 2–0 Football League Cup win over West Bromwich Albion. In the 37th minute of the match, he was involved in a controversial incident with Jerome Thomas as Thomas pushed Wilshere's face and was shown a red card.[28] Loan to Bolton Wanderers[edit] On 29 January 2010, Wilshere joined Premier League side Bolton Wanderers on loan until the end of the 2009–10 season.[29] He made his first league start in the away game at Manchester City on 9 February, and scored his first Bolton goal, his first in the Premier League, on 6 March 2010 in the 2–1 victory at West Ham United.[30] He impressed at Bolton and they tried, unsuccessfully, to sign him on loan for another season.[31] 2010–11 season[edit] Wilshere on the ball for Arsenal in 2010 The 2010–11 football season was a year of breakthrough for Wilshere. On 15 August 2010, he made his first start in the Premier League for Arsenal against Liverpool at Anfield.[32] He followed that up with another start the next weekend against Blackpool contributing with an assist. On 15 September, Wilshere started his first Champions League game of the season providing an assist.[33] Wilshere was named Arsenal's Player of The Month for September 2010.[34] On 16 October, Wilshere received his first straight red card in first-team football in a Premier League match against Birmingham City for a challenge on Nikola Žigić.[35] On 19 October, Wilshere scored his first Champions League goal with a chip over Andriy Pyatov at the Emirates Stadium for Arsenal in a 5–1 thrashing of Shakhtar Donetsk in the group stage.[36] On 1 November, it was announced that Wilshere had signed a new long-term contract.[37] On 27 November, Wilshere scored his first Premier League goal for Arsenal in a 4–2 win at Aston Villa. Wilshere was praised for his highly influential display against Barcelona in Arsenal's 2–1 victory, he completed 93.5% of his passes overall and 91% of his passes in the final third of the pitch.[38][39] Manager Arsène Wenger described his performance as "outstanding".[40] In April 2011, Wilshere won the PFA Young Player of the Year award, and was also named in the PFA Team of the Year for the 2010–11 season, along with Arsenal team-mates Samir Nasri and Bacary Sagna.[41] In his breakthrough season he was also voted Arsenal's Player of the Season, ahead of the likes of Fàbregas, van Persie and Nasri.[42] 2011–12 season[edit] During the summer leading into the 2011–12 season, Wilshere suffered a stress fracture ankle injury during an Emirates Cup pre-season friendly against New York Red Bulls. The injury proved a persistent problem throughout Arsenal's pre-season and on 26 September, Wilshere underwent successful surgery, and was to be ruled out for four to five months. However, on 27 January, he suffered a recurrence of the ankle injury,[43] and in April 2012 he was ruled out for the remainder of the season. The injury meant that he did not participate in a single club match all season as well as the 2012 Olympics and England's UEFA Euro 2012 campaign.[44] 2012–13 season[edit] "It's such an honour for me. Getting the No 10 shirt again at the Club means so much to me as I wore it all through the youth teams at Arsenal. It has a special place for all attacking or creative players. I feel proud to wear it now after some real Club legends have worn it, such as Dennis Bergkamp. Now I am even more excited about returning to action and honouring the shirt."[45] Jack Wilshere After Robin van Persie left Arsenal for Manchester United on 17 August 2012, Wilshere was given the vacant number 10 shirt.[46] After 14 months out from football due to a persistent injury, Wilshere returned to regular first team training with Arsenal on 20 September 2012. On 27 October, he made his first Premier League start since May 2011 in a 1–0 win over Queens Park Rangers, playing 67 minutes before being replaced by Theo Walcott.[47] He started the following league game against Manchester United at Old Trafford, but was sent off in the 69th minute after receiving 2 yellow cards and Arsenal lost the match 2–1.[48] Wilshere played the full 90 minutes in a UEFA Champions League match against Schalke on 6 November which ended in a 2–2 draw.[49] On 21 November, he scored his first goal since returning from injury in a 2–0 win against Montpellier in the UEFA Champions League.[50] On 19 December 2012, it was announced that Wilshere, along with teammates Alex Oxlade-Chamberlain, Kieran Gibbs, Aaron Ramsey and Carl Jenkinson, signed a new long term contract with Arsenal.[51] On 16 January 2013, he scored the only goal in a win against Swansea City in the FA Cup.[52] In April, Wilshere was nominated for the PFA Young Player of the Year award for the season, his second nomination after he won the 2010–11 award.[53] After Wenger chose to rest Wilshere in the March and April period of the season, he featured sporadically in mostly substitute appearances towards the end of the campaign. In the summer of 2013, Wilshere was to have a very minor surgery to prepare him for Arsenal's preseason.[54] 2013–14 season[edit] Wilshere started the season playing on the left wing due to injuries keeping out Arsenal's first-team wingers, Lukas Podolski, Alex Oxlade-Chamberlain and Theo Walcott.[55] He scored his first goal of the season on 6 October in a 1–1 draw away to West Bromwich Albion.[56] He scored his second goal of the season on 19 October in a 4–1 win against Norwich City.[57] On 26 November, he scored his first career brace in a 2–0 win against Olympique de Marseille in the UEFA Champions League, the first being the fastest European goal scored by an English player, timed at 29 seconds.[58] During a match against Manchester City on 14 December, Wilshere gave an abusive hand gesture and was given a two match ban.[59] On 13 January Wilshere played a part in both of Arsenal's goals against Aston Villa (a game which Arsenal won 2-1). Having scored in the 34th minute, Wilshere won the ball back from the kick-off and set up Olivier Giroud who scored Arsenal's second. [60] Wilshere picked up his fourth assist of the season in Arsenal's 2-0 win over Fulham, on 18 January, setting up Santi Cazorla close to the hour mark. [61] On 6 March, Wilshere was ruled out for six weeks after suffering a fractured foot after a tackle by Daniel Agger during England's friendly win against Denmark the previous day.[62][63] International career[edit] Wilshere (top right) making his debut for England against Hungary, 11 August 2010. Since 2006, the England national football team have decided to play Wilshere in an age group above his age. Wilshere was just 14 when he played for the England national under-16 football team at the Victory Shield in 2006. At the age of 15, he began playing for the England national under-17 football team. He was then named in the squad for the 2009 UEFA European Under-17 Football Championship in May, starting the first two games, particularly impressing in the second match against Germany before going off with an injury which kept him out of the final game.[64][65] After the tournament, he was named among the 10 future stars from the tournament.[66] On 11 September 2009, he also came on as substitute for his England U-21 debut against the Netherlands in a 0–0 draw.[67] On 7 August 2010, Wilshere was called up to the England senior squad for the first time for their friendly against Hungary.[68] He made his England debut in the match played on 11 August 2010, coming on as an 83rd minute substitute for Steven Gerrard.[69] This made him the 10th youngest player ever to play for the English national team. On 9 February 2011, Wilshere made his full England debut when he started in a friendly against Denmark. He impressed despite playing in an unfamiliar role just in front of the defence and was praised by manager Fabio Capello.[70] On 25 March 2011, Wilshere made his competitive debut for England in a UEFA Euro 2012 qualifier against Wales at Cardiff's Millennium Stadium.[71] He made one further appearance in the qualifying phase but missed the tournament finals due to injury. On 6 February 2013, Wilshere made his first start for England since 2011 due to injury, and was named man-of-the-match as England beat Brazil 2–1 at Wembley.[72] Wilshere's performance was widely praised by many including manager Roy Hodgson, captain Steven Gerrard, Wayne Rooney and Frank Lampard.[73][74][75][76] Style of play[edit] Wilshere is a player known for his movement, vision, passing and combination play, as well as his leadership on the pitch.[77][78][79] He has been described by Arsène Wenger as having "Spanish technique, but an English heart".[80] Owen Coyle, manager of Bolton during Wilshere's loan spell, praised his ability to "tackle and take a knock", despite his lack of height. However, Arsenal head of youth development Liam Brady noted that Wilshere had problems with his temper early on in his career.[81] "I think Jack Wilshere's got the potential to become one of the best in the world, I don’t want to add any pressure. That’s unfair. But playing against him recently and in training, he’s a one-off. He's a lot better than your normal Premier League midfielder. I have a lot of confidence in him. He's got a bit of everything, he can tackle, get up and down the pitch, create a goal, score a goal, can pass. He can tick almost every box, and he's going to get better and better. He's only 21 and a fantastic talent. We're all delighted he's back and happy to play with him. I hope he brings out the best in all of us. He's a top player and I hope he gives the dressing room a lift. And he'll get better, and better than he is now. Which is a scary thought." Steven Gerrard[82] Wilshere has been used in a number of positions, including as an attacking midfielder, a winger, and most regularly as a deep-lying central midfielder. Wenger has said that Wilshere is "a box-to-box player, more than just a holding midfielder."[83] Wilshere's style of play has frequently been compared to that of Arsenal legend Brady,[84][85] while Brady himself identified Wilshere as the latest in a line of technically gifted English players from Glenn Hoddle to Wayne Rooney.[86] Following his return from injury in the 2012-13 season, Wilshere received praise for his performances and potential from a variety of fellow professionals; Barcelona and Brazil defender Dani Alves referred to Wilshere as 'a great player', and compared his potential to that of Barcelona midfielders Andres Iniesta and Xavi,[87] while Bayern Munich's Bastian Schweinsteiger called him 'one of the best players there are' in his position.[88] Borussia Dortmund's Marco Reus hailed him as "a perfect player".[89] Wilshere has stated his ambition to captain both Arsenal and England,[90] and has been tipped by Wenger for both roles.[91] England manager Roy Hodgson said: "Wilshere has got the personality, the ­character and the quality to accept ­responsibility, to accept the pressure. I foresee a fantastic England career for him. I would agree with Arsène Wenger and say Jack has got the ­qualities [to be England captain], there's no doubt about that."[92] Personal life[edit] Wilshere was arrested in the early hours of the morning on 29 August 2010 in connection with a "fracas".[93] However, it appeared Wilshere played the role of peacemaker and so did not face charges but received a caution.[94] In March 2011, Wilshere received a police warning for spitting on a taxi driver, who happened to be wearing a hat of Arsenal's rivals Tottenham, after the driver refused to drive him home because he was too drunk. [95] On 29 September 2011, Wilshere's girlfriend Lauren Neal gave birth to their son, Archie Jack Wilshere.[96] On 26 September 2013, Neal gave birth to their second child, Delilah Grace Wilshere.[97] Wilshere appeared on the UK and Ireland cover of FIFA 12 alongside Wayne Rooney.[98] In November 2011, Wilshere became an ambassador for St John Ambulance.[99] Career statistics[edit] As of 8 March 2014[100][101] Club Season League FA Cup League Cup Europe Total Apps Goals Apps Goals Apps Goals Apps Goals Apps Goals Arsenal 2008–09 1 0 2 0 3 1 2 0 8 1 2009–10 1 0 1 0 2 0 3 0 7 0 Bolton Wanderers (loan) 2009–10 14 1 0 0 0 0 14 1 Total 14 1 0 0 0 0 14 1 Arsenal 2010–11 35 1 2 0 5 0 7 1 49 2 2011–12 0 0 0 0 0 0 0 0 0 0 2012–13 25 0 4 1 1 0 3 1 33 2 2013–14 23 3 2 0 1 0 7 2 34 5 Total 85 4 11 1 12 1 22 4 130 10 Career total 99 5 10 1 12 1 22 4 144 11 As of 5 March 2014.[102] National team Club Year Apps Goals England Arsenal 2010 1 0 2011 4 0 2012 1 0 2013 8 0 2014 1 0 Total 15 0 1. ^ "Jack Wilshere". England Football Online. Retrieved 4 March 2014.  2. ^ "Player Profile: Jack Wilshere". Premier League. Retrieved 31 January 2012.  3. ^ "Blackburn 0-4 Arsenal". BBC. 13 September 2008. Retrieved 1 June 2013.  4. ^ "Player of the Season - And the winner is...". Arsenal F.C. 27 May 2011. Retrieved 1 June 2013.  5. ^ "Gibbs and Wilshere make senior England debuts". Arsenal F.C. 11 August 2010. Retrieved 11 August 2010.  6. ^ Wyett, Charlie (13 November 2008). "Hero Jack still has time for his pals". The Sun (London). Retrieved 3 August 2009.  7. ^ "Sowing the seeds". The Football League. 26 November 2008.  8. ^ "The next Gazza? Why 16-year-old Jack is the talk of football". The Independent (London). 13 November 2008. Archived from the original on 18 August 2010.  9. ^ "Academy League: Arsenal 3–1 Chelsea". Arsenal F.C. 22 February 2014. Retrieved 5 August 2008.  10. ^ "Academy: Arsenal 4–1 Aston Villa". Arsenal F.C. 3 September 2007. Retrieved 22 February 2014.  11. ^ "Academy: Watford 1–7 Arsenal — Report". Arsenal F.C. 18 September 2007. Retrieved 22 February 2014.  12. ^ "Reserves and Youth Statistics— Report". Arsenal F.C. 1 May 2008. Retrieved 22 February 2014.  13. ^ "Match Report". Arsenal F.C. 21 February 2008. Retrieved 22 February 2014.  14. ^ "Reserves: Arsenal 2–0 West Ham — Report". Arsenal F.C. 21 April 2008. Retrieved 22 February 2014.  15. ^ "Arsenal Under 16’s Beat Juventus To Win Atalanta Cup". Young Guns. 5 May 2008. Retrieved 22 February 2014.  16. ^ "Youth Cup: Arsenal 4–1 Man City — Report | Fixtures & Reports | Fixtures". Arsenal F.C. 22 April 2009. Retrieved 3 August 2009.  17. ^ Lawrence, Amy (23 May 2009). "FA Youth Cup final, first leg: Jack Wilshere orchestrates young Gunners' thrashing of Liverpool". The Guardian (London). Retrieved 3 August 2009.  18. ^ "Match Report". Arsenal F.C. 19 July 2008. Archived from the original on 30 July 2008. Retrieved 5 August 2008.  19. ^ "Wilshere named in Arsenal's first-team squad". Arsenal F.C. 3 August 2008. Retrieved 22 February 2014.  20. ^ "19. Jack Wilshere". Arsenal F.C. Retrieved 1 November 2010.  21. ^ Lyon, Sam (13 September 2008). "Blackburn 0–4 Arsenal". BBC Sport. Retrieved 17 August 2009.  22. ^ Castles, Duncan (14 September 2008). "Walcott sets up another rout". The Guardian (London). Retrieved 14 September 2008.  23. ^ "Arsenal 6–0 Sheffield United Match Report". Arsenal F.C. Retrieved 23 September 2008.  24. ^ "Minute-by-minute". UEFA. Archived from the original on 12 December 2008. Retrieved 12 December 2008.  25. ^ "Arsenal's Wilshere signs pro deal". BBC Sport. 5 January 2009. Retrieved 9 January 2009.  26. ^ "Wilshere extends Arsenal contract". BBC Sport. 2 July 2009. Retrieved 3 August 2009.  27. ^ Hynter, David (6 August 2009). "Jack Wilshere is like a young Wayne Rooney, says Arsène Wenger". Guardian. Retrieved 22 February 2014.  28. ^ "Arsenal star Jack Wilshere in red card storm". Daily Mirror. 22 September 2009. Retrieved 2009-22-23.  29. ^ "Jack Wilshere joins Bolton Wanders on loan". Arsenal F.C. 29 January 2010.  30. ^ Cox, Gerry (7 March 2010). "West Ham United 1 Bolton Wanderers 2: match report". The Daily Telegraph (London). Retrieved 22 February 2014.  31. ^ "Coyle admits Wilshere defeat". Sky Sports. 5 August 2010. Retrieved 1 November 2010.  32. ^ Clarke, Richard (16 August 2010). "Liverpool 1–1 Arsenal". Arsenal F.C. Retrieved 16 August 2010.  33. ^ Wallace, Sam (16 September 2010). "Wilshere comes of age for rampant Arsenal but tougher tasks await". The Independent (London). Retrieved 11 April 2011.  34. ^ "Wilshere – It was a great month for me". Arsenal F.C. 11 October 2010. Retrieved 11 October 2010.  35. ^ Sheringham, Sam (16 October 2010). "Arsenal 2–1 Birmingham". BBC Sport. Retrieved 16 October 2010.  36. ^ Williamson, Laura (21 October 2010). "Arsenal 5 Shakhtar Donetsk 1: Cesc Fabregas's return inspires super display from the Gunners". Daily Mail (London). Retrieved 11 April 2011.  37. ^ "Midfielder Jack Wilshere signs new Arsenal contract". BBC Sport. 1 November 2010.  38. ^ "Jack Wilshere's dazzling display against Barcelona offers Arsenal and England genuine hope for the future". The Telegraph (London). 17 February 2011.  39. ^ Wilson, Steve (17 February 2011). "Jack Wilshere’s radar on par with Barcelona greats". The Telegraph (London).  40. ^ "Jack Wilshere's stunning display". Canadian Press. 17 February 2011. Archived from the original on 20 February 2011.  41. ^ "Gareth Bale & Samir Nasri lead PFA nominations". BBC Sport. 8 April 2011. Retrieved 11 April 2011.  42. ^ "Jack Wilshere player of the season". Arsenal.com. 28 May 2011. Retrieved 11 April 2011.  43. ^ "Wilshere has successful surgery on ankle". Arsenal F.C. 26 September 2011. Retrieved 3 November 2011.  44. ^ "Jack Wilshere ruled out of Euro 2012 by ankle injury". BBC Sport. 16 April 2012.  45. ^ "Wilshere - The No 10 shirt is an honour". Arsenal F.C. 17 August 2012. Retrieved 17 August 2012.  47. ^ http://www.bbc.co.uk/sport/0/football/20014281 48. ^ "Manchester United 2-1 Arsenal" BBC Sport. 3 November 2012. Retrieved 6 November 2012. 49. ^ "Schalke 2-2 Arsenal" BBC Sport. 6 November 2012. Retrieved 20 November 2012. 50. ^ "Arsenal 2-0 Montpellier" BBC Sport. 21 November 2012. Retrieved 21 November 2012. 51. ^ "Five young internationals sign new contracts". Arsenal F.C. Official Website. 19 December 2012. Retrieved 19 December 2012.  52. ^ "Arsenal 1-0 Swansea" BBC Sport. 16 January 2013. Retrieved 16 January 2013. 53. ^ "Carrick, Bale, Suarez, Van Persie, Hazard & Mata on PFA shortlist" BBC Sport. 19 April 2013. Retrieved 19 April 2013. 54. ^ "Wenger moves to alleviate Wilshere fears" ESPN. 19 May 2013. Retrieved 20 May 2013. 55. ^ http://www.arsenal.com/news/news-archive/wenger-wide-role-can-help-wilshere 56. ^ "West Bromwich Albion 1-1 Arsenal" BBC Sport. 6 October 2013. Retrieved 26 November 2013. 57. ^ "Arsenal 4-1 Norwich City" BBC Sport. 19 October 2013. Retrieved 26 November 2013. 58. ^ "Arsenal 2-0 Marseille" BBC Sport. 26 November 2013. Retrieved 26 November 2013. 59. ^ Arsenal's Jack Wilshere to serve two-game ban for gesture 60. ^ http://www.bbc.co.uk/sport/0/football/25617902 61. ^ http://www.bbc.co.uk/sport/0/football/25693407 62. ^ "Jack Wilshere: Arsenal & England midfielder out for six weeks" BBC Sport. 6 March 2014. Retrieved 6 March 2014. 63. ^ "England 1-0 Denmark" BBC Sport. 5 March 2014. Retrieved 6 March 2014. 64. ^ "Pezzaiuli: We could have won by more". UEFA. Retrieved 22 February 2014.  65. ^ "Euro U17 Championships: Germany 4–0 England". Daily Mirror. Retrieved 22 February 2014.  66. ^ "Ten future stars from 2009 finals". UEFA. Retrieved 14 May 2010.  67. ^ "New-look Under-21s draw comfort in Holland". The Football Association. Retrieved 22 February 2014.  68. ^ "Capello calls up Wilshere, Gibbs and Zamora for England". BBC Sport. 7 August 2010. Retrieved 7 August 2010.  69. ^ "Gerrard brace saves England blushes". ESPNsoccernet. 11 August 2010. Retrieved 22 February 2014.  70. ^ "Fabio Capello hails Jack Wilshere after England win over Denmark". Metro. 11 August 2010. Retrieved 9 February 2011.  71. ^ "Wales 0 - 2 England". BBC. 25 March 2011.  72. ^ "England 2-1 Brazil" BBC Sport. 6 February 2013. Retrieved 6 February 2013. 73. ^ "Wilshere evokes memories of Gascoigne for excited England" Reuters. 7 February 2013. Retrieved 7 February 2013. 74. ^ "Jack Wilshere ticks every box for England" ITV. 6 February 2013. Retrieved 7 February 2013. 75. ^ "Wayne Rooney hails Arsenal duo after England win against Brazil GiveMeFootball. 7 February 2013. Retrieved 7 February 2013. 76. ^ "Wilshere will be 'a massive player for England - and in the world' The Telegraph. 7 February 2013. Retrieved 7 February 2013. 77. ^ Emirates experience leaves me jealous, BBC Sport. Retrieved 19 September 2010. 78. ^ Comment: Forget Joe Cole – In Jack Wilshere, Arsenal Have England's Finest Young Talent, Goal.com. Retrieved 22 February 2014. 79. ^ The team showed desire, energy and quality, Arsenal F.C.. Retrieved 19 September 2010. 80. ^ "Jack Wilshere has Spanish talent". 17 February 2011. Retrieved 1 June 2013.  81. ^ Ornstein, David (1 October 2010). "Jack Wilshere ready to shine for Arsenal and England". BBC Sport. Retrieved 18 October 2010.  82. ^ England: Steven Gerrard excited by Jack Wilshere's potential, BBC Sport. Retrieved 6 February 2013. 83. ^ Speck, Ivan (20 October 2010). "Wenger lauds Wilshere maturity". Daily Mail (UK). Retrieved 28 October 2012.  84. ^ "Sunderland manager Martin O'Neill wary of in-form Jack Wilshere". Independent. 8 February 2013. Retrieved 1 June 2013.  85. ^ "Wilshere has great future, says Wenger". The Independent. 25 September 2008. Retrieved 1 June 2013.  86. ^ "Brady: Wilshere up there with Hoddle and Gazza". ESPN. 5 February 2013. Retrieved 1 June 2013.  87. ^ "Dani Alves urges Barcelona to make move for Arsenal's Jack Wilshere". The Telegraph. 18 February 2013. Retrieved 1 June 2013.  88. ^ "Schweinsteiger: Wilshere is so dynamic". Arsenal F.C. 18 February 2013. Retrieved 1 June 2013.  89. ^ "Marco Reus: "We push our boundaries because we believe in Dortmund". The Guardian. 1 April 2013. Retrieved 1 June 2013.  90. ^ "Jack Wilshere wants to captain Arsenal and England". 21 May 2013. Retrieved 1 June 2013.  91. ^ "Wenger: Wilshere can captain both club and country". 25 January 2013. Retrieved 1 June 2013.  92. ^ Jack the lad: Roy Hodgson backs Wilshere to carry England's hopes, Mirror Football. Retrieved 2 February 2013. 93. ^ "Arsenal player Jack Wilshere arrested after 'fracas'". BBC. 29 August 2010. Retrieved 3 November 2011.  94. ^ "Wilshere receives caution". Sky Sports. 19 November 2010. Retrieved 3 November 2011.  95. ^ http://uk.eurosport.yahoo.com/20032011/58/premier-league-wilshere-spat-spurs-fan-cabbie.html 96. ^ Littlejohn, Georgina (30 September 2011). "Proudest day of my life! Arsenal's Jack Wilshere Tweets touching photo with his newborn baby boy hours after the birth". Daily Mail (London).  97. ^ Wilshere, Jack. "Tweet". Twitter. Retrieved 2013-09-27.  98. ^ "FIFA 12 cover revealed with Rooney and Wilshire as stars". T3. 8 September 2011. Retrieved 3 November 2011.  99. ^ "Arsenal star Jack Wilshere becomes St John Ambulance ambassador". The Mirror. 1 November 2011. Retrieved 3 November 2011.  100. ^ "10. Jack Wilshere". Arsenal F.C. Retrieved 3 September 2012.  101. ^ "10. Jack Wilshere". Barclays Premier League. Retrieved 27 May 2012.  102. ^ "Player Info". englandstats.com. Retrieved 5 November 2012.  External links[edit]
global_01_local_0_shard_00000017_processed.jsonl/3912
Jason Wood (comedian) From Wikipedia, the free encyclopedia Jump to: navigation, search Jason Wood Birth name Jason Robert Wood Born (1972-01-21)21 January 1972 Luton, England, UK Died 20 February 2010(2010-02-20) (aged 38) Sundon, Bedfordshire, England, UK Nationality British Years active 2003–2010 Website http://www.jasonwood.info Jason Robert Wood (21 January 1972 – 20 February 2010) was a British comedian. He was a regular performer at the Edinburgh Festival Fringe, he was best known for his comic musical impersonations of performers including Cher and Morrissey. He frequently headlined comedy clubs.[1] Wood was born in Luton, and attended Icknield High School. In 2004, he took part in the first series of Strictly Come Dancing. He and his partner, professional dancer Kylie Jones, were the first to leave the competition.[1] He was a contestant on the second series of The Underdog Show. Wood was gay. His show "My Anus Horribilis," its name a play on Queen Elizabeth's 1992 "Annus Horribilis" Christmas message, was about how "[The Christian right is] pushing the country backwards, and I wanted to point that out. It’s insane when they’re quoting Leviticus to outlaw gay sex, yet most people, who have never read the Bible, won’t know that book also threatens punishment for people who wear shirts of mixed fibre."[2] His Fringe show in 2006 attracted a damning one-star review by The Scotsman newspaper. He referred to this on subsequent posters, quoting, "A star – The Scotsman".[3] Wood lived with his dog Jim in a cottage in Sundon, Bedfordshire, where he died[4] on 20 February 2010 aged 38.[1] Initial reports suggested he died in his sleep.[5] He is survived by his father Brian, mother, and sister Ann.[6] 1. ^ a b c Smith, Alistair (2010-02-22). "Comedian Jason Wood dies aged 38". Retrieved 2010-02-22.  2. ^ "Putting the fun into fundamentalism". Times Online (London). 2006-07-23. Retrieved 2010-02-22.  3. ^ "Jason Wood dies at 38". Chortle. 2010-02-20. Retrieved 2010-02-22.  4. ^ Lives in brief: Jason Wood 5. ^ "Comedian Jason Wood dies aged 38". BBC News. 2010-02-23. Retrieved 2010-02-23.  6. ^ Guardian obituary External links[edit]
global_01_local_0_shard_00000017_processed.jsonl/3913
Land mine From Wikipedia, the free encyclopedia   (Redirected from Landmines) Jump to: navigation, search Examples of anti-personnel mines. Center:Valmara 69 (a bounding mine), right:VS-50 An anti-tank mine - the L9 Bar Mine A land mine is an explosive device, concealed under or on the ground and designed to destroy or disable enemy targets, ranging from soldiers to vehicles and tanks, as they pass over or near the device. Such devices are typically detonated automatically by way of pressure from the target stepping or driving on it, though other detonation mechanisms may be possible.[1] The device may cause damage either by a direct blast or by fragments that are thrown by the blast. The name originates from the ancient practice of military mining, where tunnels were dug under enemy fortifications or troop formations by sappers. These killing tunnels ("mines") were at first collapsed to destroy targets located above, but they were later filled with explosives and detonated in order to cause even greater devastation. The use of land mines is controversial because of their potential as indiscriminate weapons. They can remain dangerous many years after a conflict has ended, harming the economy and civilians of many developing nations. With pressure from a number of campaign groups organised through the International Campaign to Ban Landmines, a global movement to prohibit their use led to the 1997 Convention on the Prohibition of the Use, Stockpiling, Production and Transfer of Anti-Personnel Mines and on their Destruction. Currently, a total of 161 nations are party to the Ottawa treaty. Land mines were designed for two main uses: to create defensive tactical barriers, channeling attacking forces into predetermined fire zones or slowing an invasion force's progress to allow reinforcements to arrive; and to act as passive area-denial weapons (to deny the enemy use of valuable terrain, resources or facilities when active defense of the area is not desirable or possible). Land mines are currently used in large quantities mostly for this first purpose, thus their widespread use in the demilitarized zones (DMZs) of likely flashpoints such as Cyprus, Afghanistan and Korea. However, as of 2013, the only governments that still lay land mines are Myanmar in its internal conflict, and Syria in its civil war.[2] Land mines continue to kill or injure at least 4,300 people every year, even decades after the ends of the conflicts for which they were placed.[3] Premodern development[edit] Some sources report that the 3rd-century Chancellor (China) Zhuge Liang of the Kingdom of Shu in China invented a land mine type device. This claim was made by Jiao Yu in his Huolongjing Quanzhi, his preface written in 1412 AD,[4] and that Zhuge had used not only "fire weapons" but land mines in the Battle of Hulugu Valley against the forces of Sima Yi and his son Sima Zhao of the Wei Kingdom.[5] However, this claim is dubious, considering that gunpowder warfare did not exist in China until the advent of the flamethrower (Pen Huo Qi) in the 10th century, while the land mine was not seen in China until the late 13th century.[6] The modern land mine was developed by Nils Waltersen Aasen.[7] Explosive land mines[edit] East Asia[edit] The Chinese 'self-tripped trespass land mine' from the Huolongjing, compiled by Jiao Yu and Liu Ji in the mid 14th century. Explosive land mines were being used in 1277 AD by the Song Dynasty Chinese against an assault of the Mongols, who were besieging a city in southern China. The invention of this detonated "enormous bomb" was credited to one Lou Qianxia of the 13th century.[8] The famous 14th-century Chinese text of the Huolongjing, which was the first to describe hollow cast iron cannonball shells filled with gunpowder,[9] was also the first to describe the invention of the land mine in greater detail than references found in texts written beforehand.[8] This mid 14th century work compiled during the late Yuan Dynasty and early Ming Dynasty (before 1375, when its co-editor Liu Ji died) stated that mines were made of cast iron and were spherical in shape, filled with either 'magic gunpowder', 'poison gunpowder', or 'blinding and burning gunpowder', any one of these compositions being suitable for use.[10] The wad of the mine was made of hard wood, carrying three different fuses in case of defective connection to the touch hole.[10] In those days, the Chinese relied upon command signals and carefully timed calculation of enemy movements into the minefield, since a long fuse had to be ignited by hand from the ambushers in a somewhat far-off location lying in wait.[11] However, the Huolongjing also describes land mines that were set off by enemy movement, called the 'ground-thunder explosive camp', one of the 'self-trespassing' (zifan) types, as the text says: These mines are mostly installed at frontier gates and passes. Pieces of bamboo are sawn into sections nine feet in length, all septa in the bamboo being removed, save only the last; and it is then bandaged round with fresh cow-hide tape. Boiling oil is next poured into (the tube) and left there for some time before being removed. The fuse starts from the bottom (of the tube), and (black powder) is compressed into it to form an explosive mine. The gunpowder fills up eight-tenths of the tube, while lead or iron pellets take up the rest of the space; then the open end is sealed with wax. A trench five feet in depth is dug (for the mines to be concealed). The fuse is connected to a firing device which ignites them when disturbed.[11] The Huolongjing describes the trigger device used for this as a 'steel wheel', which directed sparks of flame onto the connection of fuses running to the multiple-laid land mines underneath the carefully hidden trap.[12] However, further description of how this flint device operated was not made until a Chinese text of 1606 AD revealed that a weight drive (common in medieval clockworks) had been used to work the 'steel wheel'.[12] The way in which the Chinese land mine trigger worked was a system of two steel wheels rotated by a falling weight, the chord of which was wound around their axle, and when the enemy stepped onto the disguised boards they released the pins that dropped the weights.[13] In terms of global significance, the first wheellock musket in Europe was sketched by Leonardo da Vinci around 1500 AD, although no use of metal flint for gunpowder weapons were known before that point in Europe.[12] Besides the use of steel wheels providing sparks for the fuses, there were other methods used as well, such as the 'underground sky-soaring thunder'.[14] The Ming Dynasty (1368–1644) text of the Wubei Zhi (Treatise on Armament Technology), written by Mao Yuanyi in 1628, outlined the use of land mines that were triggered by the heat of a slow-burning incandescent material in an underground bowl placed directly above the train of fuses leading to the mines buried 3 ft beneath.[15] The booby trap of this mine system had a mound where weapons of halberds, pikes, and lances were dug in, meant to entice the enemy to walk up the small mound and claim their stolen prize of war booty.[14] When the weapons were removed from the mound, this movement disturbed the bowl beneath them where the butt ends of the staffs were, which in turn ignited the fuses.[15] According to the Wubei Huolongjing volume of the 17th century, the formula for this slow-burning incandescent material allowed it to burn continuously for 20 to 30 days without going out.[15] This formula included 1 lb (0.45 kg) of white sandal wood powder, 3 oz (85 g) of iron rust (ferric oxide), 5 oz (140 g) of 'white' charcoal powder (from quicklime), 2 oz (57 g) of willow charcoal powder, 6 oz (170 g) of dried, ground, and powdered red dates, and 3 oz (85 g) of bran.[15] The Chinese also employed the use of the naval mine at sea and on the rivers of China and elsewhere in maritime battles. Europe and the United States[edit] The first land mine in Europe was created by Pedro Navarro (d. 1528), a Spanish soldier, who used it in the settles of the Italian castles, in the beginning of the sixteenth century. At Augsburg in 1573, a German military engineer by the name of Samuel Zimmermann invented an extremely effective mine known as the Fladdermine. It consisted of a fougasse (or later, sometimes a shell fougasse, that is, a fougasse loaded not with stones but with early black powder mortar shells, similar to large black powder hand grenades) activated by a snaphance or flintlock mechanism connected to a tripwire on the surface. Combining the effects of a tripwire activated bounding fragmentation mine with a cluster bomb, it was devastating to massed attackers but required high maintenance due to the susceptibility of black powder to dampness. Consequently it was mainly employed in the defenses of major fortifications, in which role it continued to be used until the 1870s.[16] In Europe in the early eighteenth century, improvised land mines or booby traps were constructed in the form of bombs buried in shallow wells in the earth and covered with scrap metal and/or gravel to serve as shrapnel. Known in French as fougasse, the term is sometimes still used in the present day to describe such devices. This technique was used in several European wars of the eighteenth century, the American Revolution, and the American Civil War. The first modern mechanically fused high explosive anti-personnel land mines were created by Confederate troops of Brigadier General Gabriel J. Rains during the Battle of Yorktown in 1862. As a Captain, Rains had earlier employed explosive booby traps during the Seminole Wars in Florida in 1840.[17] Both mechanically and electrically fused "land torpedoes" were employed, although by the end of the war mechanical fuses had been found to be generally more reliable. Many of these designs were improvised in the field, especially from explosive shells, but by the end of the war nearly 2,000 standard pattern "Rains mines" had been deployed. Improved designs of mines were created in Imperial Germany, circa 1912, and were copied and manufactured by all major participants in the First World War. Both sides employed land mines (defensively) and tunnel mines (offensively).[16] Well before the war was over, the British were manufacturing land mines that contained poison gas instead of explosives. Poison gas mines were manufactured at least until the 1980s in the Soviet Union. The United States was known to have at least experimented with the concept in the 1950s. Nuclear mines have also been developed, both land and naval varieties. An example is the British Blue Peacock project, while another was the U.S. Medium Atomic Demolition Munition. Characteristics and functioning[edit] Mine components A typical land mine includes the following components: • firing mechanism or other device (including anti-handling devices) • detonator or igniter (sets off the booster charge) • booster charge (may be attached to the fuse, or the igniter, or be part of the main charge) • main charge (in a container, usually forms the body of the mine) • casing (contains all of the above parts) Firing mechanisms and initiating actions[edit] A land mine can be triggered by a number of things including pressure, movement, sound, magnetism and vibration. Anti-personnel mines commonly use the pressure of a person's foot as a trigger, but tripwires are also frequently employed. Most modern anti-vehicle mines use a magnetic trigger to enable it to detonate even if the tires or tracks did not touch it. Advanced mines are able to sense the difference between friendly and enemy types of vehicles by way of a built-in signature catalog. This will theoretically enable friendly forces to use the mined area while denying the enemy access. Many mines combine the main trigger with a touch or tilt trigger to prevent enemy engineers from defusing it. Land mine designs tend to use as little metal as possible to make searching with a metal detector more difficult; land mines made mostly of plastic have the added advantage of being very inexpensive. Some types of modern mines are designed to self-destruct, or chemically render themselves inert after a period of weeks or months to reduce the likelihood of civilian casualties at the conflict's end. However, these self-destruct mechanisms are not absolutely reliable, and most land mines laid historically are not equipped in this manner. Anti-handling devices[edit] Anti-handling devices detonate the mine if someone attempts to lift, shift or disarm it. The intention is to hinder deminers by discouraging any attempts to clear minefields. There is a degree of overlap between the function of a boobytrap and an anti-handling device insofar as some mines have optional fuze pockets into which standard pull or pressure-release boobytrap firing devices can be screwed. Alternatively, some mines may mimic a standard design, but actually be specifically intended to kill deminers e.g. the MC-3 and PMN-3 variants of the PMN mine. Anti-handling devices can be found on both anti-personnel mines and anti-tank mines, either as an integral part of their design or as improvised add-ons. For this reason, the standard render safe procedure for mines is often to destroy them on site without attempting to lift them. Anti-tank mines[edit] Section of an anti-tank mine. Note the yellow main charge wrapped around a red booster charge, and the secondary fuze well on the side of the mine designed for an anti-handling device Anti-tank mines were created not long after the invention of the tank in the First World War. At first improvised, purpose-built designs were developed. Set off when a tank passes, they attack the tank at one of its weaker areas — the tracks. They are designed to immobilize or destroy vehicles and their occupants. In U.S. military terminology destroying the vehicles is referred to as a catastrophic kill (k-kill) while only disabling its movement is referred to as a mobility kill (m-kill). Anti-tank mines are typically larger than anti-personnel mines and require more pressure to detonate. The high trigger pressure, normally requiring 100 kilograms (220 lb) prevents them from being set off by infantry or smaller vehicles of lesser importance. More modern anti-tank mines use shaped charges to focus and increase the armor penetration of the explosives. Anti-personnel mines[edit] Anti-personnel mines are designed to kill or injure enemy combatants as opposed to destroying vehicles. They are often designed to injure rather than kill in order to increase the logistical support (evacuation, medical) burden on the opposing force. Some types of anti-personnel mines can also damage the tracks or wheels of armored vehicles. Under the Ottawa Treaty, signatory countries undertake not to manufacture, stockpile or use anti-personnel mines. As of 2009, it has been signed/accessioned by 156 countries. Thirty-eight countries, including the People's Republic of China, Russian Federation and the United States, are not party to the Convention. Argentinian minefield at Port William, Falkland Islands created in 1982; clearance inhibited by boggy terrain In military science, minefields are considered a defensive or harassing weapon, used to slow the enemy down, to help deny certain terrain to the enemy, to focus enemy movement into kill zones, or to reduce morale by randomly attacking material and personnel. In some engagements during World War II, anti-tank mines accounted for half of all vehicles disabled. Since combat engineers with mine-clearing equipment can clear a path through a minefield relatively quickly, mines are usually considered effective only if covered by fire. The extents of minefields are often marked with warning signs and cloth tape, to prevent friendly troops and non-combatants from entering them. Of course, sometimes terrain can be denied using dummy minefields. Most forces carefully record the location and disposition of their own minefields, because warning signs can be destroyed or removed, and minefields should eventually be cleared. Minefields may also have marked or unmarked safe routes to allow friendly movement through them. Placing minefields without marking and recording them for later removal is considered a war crime under Protocol II of the Convention on Certain Conventional Weapons, which is itself an annex to the Geneva Conventions. Artillery and aircraft scatterable mines allow minefields to be placed in front of moving formations of enemy units, including the reinforcement of minefields or other obstacles that have been breached by enemy engineers. They can also be used to cover the retreat of forces disengaging from the enemy, or for interdiction of supporting units to isolate front line units from resupply. In most cases these minefields consist of a combination of anti-tank and anti-personnel mines, with the anti-personnel mines making removal of the anti-tank mines more difficult. Mines of this type used by the United States are[citation needed] designed to self-destruct after a preset period of time, reducing the requirement for mine clearing to only those mines whose self-destruct system did not function. Some designs of these scatterable mines require an electrical charge (capacitor or battery) to detonate. After a certain period of time, either the charge dissipates, leaving them effectively inert or the circuitry is designed such that upon reaching a low level, the device is triggered, thus destroying the mine. Guerrilla warfare[edit] None of the conventional tactics and norms of mine warfare applies when they are employed in a guerrilla role:[citation needed] • The mines are not used in a defensive role (for specific position or area). • Mined areas are not marked. • Mines are usually placed singly and not in groups covering an area. • Mines are often left unattended (not covered by fire). One of the aims of terrorism – and to a certain extent of guerrilla warfare – is to spread fear and panic. This can be achieved by a single mine left on a civilian road to be detonated by a civilian target which is clearly quite different from the normal military application. One example where such tactics were employed is in the various Southern African conflicts during the 1970s and 1980s[citation needed], specifically Angola, Mozambique, Namibia, South Africa and Zimbabwe.[18] Laying mines[edit] Minefield warning on the Golan Heights, still valid more than 40 years after creation of the field by the Syrian army Minefields may be laid by several means. The preferred, but most labour-intensive, way is to have engineers bury the mines, since this will make the mines practically invisible and reduce the number of mines needed to deny the enemy an area. Mines can be laid by specialized mine-laying vehicles. Mine-scattering shells may be fired by artillery from a distance of several tens of kilometers. Mines may be dropped from helicopters or airplanes, or ejected from cluster bombs or cruise missiles. Anti-tank minefields can be scattered with anti-personnel mines to make clearing them manually more time-consuming; and anti-personnel minefields are scattered with anti-tank mines to prevent the use of armored vehicles to clear them quickly. Some anti-tank mine types are also able to be triggered by infantry, giving them a dual purpose even though their main and official intention is to work as anti-tank weapons. Some minefields are specifically booby-trapped to make clearing them more dangerous. Mixed anti-personnel and anti-tank minefields, anti-personnel mines under anti-tank mines, and fuses separated from mines have all been used for this purpose. Often, single mines are backed by a secondary device, designed to kill or maim personnel tasked with clearing the mine. Multiple anti-tank mines have been buried in stacks of two or three with the bottom mine fuzed, in order to multiply the penetrating power. Since the mines are buried, the ground directs the energy of the blast in a single direction — through the bottom of the target vehicle or on the track. Another specific use is to mine an aircraft runway immediately after it has been bombed in order to delay or discourage repair. Some cluster bombs combine these functions. One example is the British JP233 cluster bomb which includes munitions to damage (crater) the runway as well as anti-personnel mines in the same cluster bomb. School posters in Karabakh educating children on mines and UXO British Royal Engineers practice mine clearance Metal detectors were first used for demining, after their invention by the Polish officer Józef Kosacki.[19] His invention, known as the Polish mine detector, was used by the Allies alongside mechanical methods, to clear the German mine fields during the Second Battle of El Alamein when 500 units were shipped to Field Marshal Montgomery's Eighth Army.[20] The Nazis used captured civilians who were chased across minefields to detonate the explosives. According to Laurence Rees, "Curt von Gottberg, the SS-Obergruppenfuhrer who, during 1943, conducted another huge anti-partisan action called Operation Kottbus on the eastern border of Belorussia, reported that 'approximately two to three thousand local people were blown up in the clearing of the minefields'."[21] Whereas the placing and arming of mines is relatively inexpensive and simple, the process of detecting and removing them is typically expensive, slow, and dangerous. This is especially true of irregular warfare where mines were used on an ad hoc basis in unmarked areas. Anti-personnel mines are most difficult to find, due to their small size and the fact that many are made almost entirely of non-metallic materials specifically to escape detection. Manual clearing remains the most effective technique for clearing mine fields, although hybrid techniques involving the use of animals and robots are being developed. Animals are desirable due to their strong sense of smell, which is more than capable of detecting a land mine.[22] Animals like rats and dogs can also differentiate between other metal objects and land mines because they can be trained to detect the explosive agent itself.[23] Other techniques involve the use of geo-location technologies. A joint team of researchers at the University of New South Wales and Ohio State University is working to develop a system based on multi-sensor integration.[24] The laying of land mines has inadvertently led to a positive development in the Falkland Islands. Mine fields laid near the sea during the Falklands War have become favorite places for penguins, which do not weigh enough to detonate the mines. Therefore, they can breed safely, free of human intrusion. These odd sanctuaries have proven so popular and lucrative for ecotourism that efforts exist to prevent removal of the mines.[25] Norwegian NGO Norwegian People's Aid is one organisation involved in the safe removal of land mines.[26] Anti-personnel mine ban[edit] Party states to the Ottawa Treaty (in blue) Countries with high numbers of land mine victims The use of land mines is controversial because they are indiscriminate weapons, harming soldier and civilian alike. They remain dangerous after the conflict in which they were deployed has ended, killing and injuring civilians and rendering land impassable and unusable for decades. To make matters worse, many factions have not kept accurate records (or any at all) of the exact locations of their minefields, making removal efforts painstakingly slow. These facts pose serious difficulties in many developing nations where the presence of mines hampers resettlement, agriculture, and tourism. The International Campaign to Ban Landmines campaigned successfully to prohibit their use, culminating in the 1997 Convention on the Prohibition of the Use, Stockpiling, Production and Transfer of Anti-Personnel Mines and on their Destruction, known informally as the Ottawa Treaty. The Ottawa Treaty (Convention on the Prohibition of the Use, Stockpiling, Production and Transfer of Anti-Personnel Mines and on their Destruction) came into force on March 1, 1999. The treaty was the result of the leadership of the Government of Canada working with the International Campaign to Ban Landmines, launched in 1992. The campaign and its leader, Jody Williams, won the Nobel Peace Prize in 1997 for its efforts. The treaty does not include anti-tank mines, cluster bombs or claymore-type mines operated in command mode and focuses specifically on anti-personnel mines, because these pose the greatest long term (post-conflict) risk to humans and animals since they are typically designed to be triggered by any movement or pressure of only a few kilograms, whereas anti-tank mines require much more weight (or a combination of factors that would exclude humans). Existing stocks must be destroyed within four years of signing the treaty. Signatories of the Ottawa Treaty agree that they will not use, develop, manufacture, stockpile or trade in anti-personnel land mines. There were originally 122 signatories in 1997; currently, it has been signed by 155 countries and ratified by 153. Another 40 have yet to sign on. The United States is not one of the signatories, based on lacking an exception for the DMZ of Korea. There is a clause in the treaty, Article 3, which permits countries to retain land mines for use in training or development of countermeasures. 64 countries have taken this option. As an alternative to an outright ban, 10 countries follow regulations that are contained in a 1996 amendment of Protocol II of the Convention on Conventional Weapons (CCW). The countries are China, Finland, India, Israel, Morocco, Pakistan, South Korea, Sri Lanka, and the United States. The ICBL has identified the following countries as manufacturing land mines as of August 2004. None are signatories of the Ottawa Treaty.[27] Of other states which are thought to have manufactured mines recently: • Egypt has unofficially stated that production ceased in 1988.[39] • South Korea has stated that no mines have been produced since 2000.[40] • An official from China stated in September 2003 that production has ceased there, since they have an ample stockpile.[41] • In March 2004, a Libyan official stated that the country has never produced anti-personnel mines, but is known to have laid land mines in the 1970s and 1980s.[42] More recently, during the civil war in March 2011, Gaddafi's forces have sown mines around rebel-controlled areas.[43] • A United Nations assessment mission to Peru reported that production of land mines in the country ceased in January 1999. Peru was one of the original signatories and the treaty came into force for them in March 1999.[44] • Denmark had officially declared having 6 factories producing land mines in 1995 but production ceased since ratification of the Ottawa treaty.[45] • The United States stopped manufacturing land mines in 1997, but has one of the largest stockpiles.[46] See also[edit] 1. ^ "Land mine". Random House Dictionary (Random House, Inc). 2012.  "Land mine". Collins English Dictionary (HarperCollins). 2009.  2. ^ Landmines in Myanmar: Politically explosive 3. ^ "[1]". Landmine Monitor 2012. Page 1. November 2012. 4. ^ Needham, Volume 5, Part 7, 27. 5. ^ Needham, Volume 5, Part 7, 28. 6. ^ Needham, Volume 5, Part 7, 8, 25. 7. ^ 8. ^ a b Needham, Volume 5, Part 7, 192. 9. ^ Needham, Volume 5, Part 7, 264. 10. ^ a b Needham, Volume 5, Part 7, 192-193. 11. ^ a b Needham, Volume 5, Part 7, 193. 12. ^ a b c Needham, Volume 5, Part 7, 199. 13. ^ Needham, Volume 5, Part 7, 200. 14. ^ a b Needham, Volume 5, Part 7, 204. 15. ^ a b c d Needham, Volume 5, Part 7, 203. 16. ^ a b The Origins of Military Mines, Major William C. Schneck, Engineer Bulletin July 1998 17. ^ Roy, Roger L; Friesen, Shaye K (October 1999). "Historical Uses Of Anti-Personnel Landmines: Impact On Land Force Operations". Department of National Defence (Canada).  18. ^ "Leopard — Land Mine Resisting Vehicle". Retrieved 2008-07-18.  19. ^ Croll, Mike The History of Landmines (1998) by Leo Cooper, Pen & Sword Books Ltd. ISBN 0-85052-628-0 20. ^ Tadeusz Modelski The Polish Contribution to The Ultimate Allied Victory in The Second World War, Worthing, England 1986, Page 221 21. ^ Laurence Rees (1999). War of the century: when Hitler fought Stalin. BBC Books. p.118. ISBN 0-563-38477-8 22. ^ APOPO Landmine Removal Rats 23. ^ Mott, Maryann (February 10, 2004). "Bees, Giant African Rats Used to Sniff Landmines". National Geographic News.  24. ^ Grad, Paul (17 December 2008). "Detecting Land Mines: New Technology". Asian Surveying and Mapping.  25. ^ Milliken, Mary (28-Sep-05). "Penguins Find Peace in Falklands War Minefields". Planet Ark. Reuters.  26. ^ NPA: Completed Projects 27. ^ ICBL landmine report 2004, Findings 28. ^ ICBL landmine report 2004, Burma 29. ^ ICBL landmine report 2004, Cuba 30. ^ ICBL landmine report 2004, India 31. ^ ICBL landmine report 2004, Iran 32. ^ ICBL landmine report 2004, Iraq 33. ^ ICBL landmine report 2004, Nepal 34. ^ ICBL landmine report 2004, North Korea 35. ^ ICBL landmine report 2004, Pakistan 36. ^ ICBL landmine report 2004, Russia 37. ^ ICBL landmine report 2004, Singapore 38. ^ ICBL landmine report 2004, Vietnam 39. ^ ICBL landmine report 2004, Egypt 40. ^ ICBL landmine report 2004, South Korea 41. ^ ICBL landmine report 2004, China 42. ^ ICBL landmine report 2004, Libya 43. ^ Gaddafi forces sow landmines in east Libya, Reuters, March 31, 2011 44. ^ ICBL landmine report 2004, Peru 45. ^ Information om landminer (in Danish)[self-published source?] 46. ^ ICBL landmine report 2004, USA External links[edit]
global_01_local_0_shard_00000017_processed.jsonl/3914
From Wikipedia, the free encyclopedia Jump to: navigation, search Classification and external resources Acute leukemia-ALL.jpg ICD-10 C91-C95 ICD-9 208.9 ICD-O: 9800-9940 DiseasesDB 7431 MedlinePlus 001299 MeSH D007938 Leukemia is a treatable disease. Most treatments involve chemotherapy, medical radiation therapy, hormone treatments, or bone marrow transplant. The rate of cure depends on the type of leukemia as well as the age of the patient. Children are more likely to be permanently cured than adults. Even when a complete cure is unlikely, most people with a chronic leukemia and many people with an acute leukemia can be successfully treated for years. Sometimes, leukemia is the effect of another cancer, known as blastic leukemia, which usually involves the same treatment, although it is usually unsuccessful. Leukemia can affect people at any age. In 2000 approximately 256,000 children and adults around the world had developed some form of leukemia, and 209,000 have died from it.[1] About 90% of all leukemias are diagnosed in adults.[2] The name comes from Ancient Greek λευκός leukos "white", and αἷμα haima "blood"[3] Four major kinds of leukemia Cell type Acute Chronic Lymphocytic leukemia (or "lymphoblastic") Acute lymphoblastic leukemia (ALL) Chronic lymphocytic leukemia (CLL) Myelogenous leukemia (also "myeloid" or "nonlymphocytic") Acute myelogenous leukemia (AML) (or myeloblastic) Chronic myelogenous leukemia (CML) Clinically and pathologically, leukemia is subdivided into a variety of large groups. The first division is between its acute and chronic forms: • Acute leukemia is characterized by a rapid increase in the number of immature blood cells there are. Crowding due to such cells makes the bone marrow unable to produce healthy blood cells. Immediate treatment is required in acute leukemia due to the rapid progression and accumulation of the malignant cells, which then spill over into the bloodstream and spread to other organs of the body. Acute forms of leukemia are the most common forms of leukemia in children. Combining these two classifications provides a total of four main categories. Within each of these four main categories, there are typically several subcategories. Finally, some rarer types are usually considered to be outside of this classification scheme. Signs and symptoms[edit] Common symptoms of chronic or acute leukemia[14] Damage to the bone marrow, by way of displacing the normal bone marrow cells with higher numbers of immature white blood cells, results in a lack of blood platelets, which are important in the blood clotting process. This means people with leukemia may easily become bruised, bleed excessively, or develop pinprick bleeds (petechiae). White blood cells, which are involved in fighting pathogens, may be suppressed or dysfunctional. This could cause the patient's immune system to be unable to fight off a simple infection or to start attacking other body cells. Because leukemia prevents the immune system from working normally, some patients experience frequent infection, ranging from infected tonsils, sores in the mouth, or diarrhea to life-threatening pneumonia or opportunistic infections. Finally, the red blood cell deficiency leads to anemia, which may cause dyspnea and pallor. Some patients experience other symptoms, such as feeling sick, having fevers, chills, night sweats, feeling fatigued and other flu-like symptoms. Some patients experience nausea or a feeling of fullness due to an enlarged liver and spleen; this can result in unintentional weight loss. Blasts affected by the disease may come together and become swollen in the liver or in the lymph nodes causing pain and leading to nausea.[15] If the leukemic cells invade the central nervous system, then neurological symptoms (notably headaches) can occur. Uncommon neurological symptoms like migraines, seizures, or coma can occur as a result of brain stem pressure. All symptoms associated with leukemia can be attributed to other diseases. Consequently, leukemia is always diagnosed through medical tests. There is no single known cause for any of the different types of leukemia. The few known causes, which are not generally factors within the control of the average person, account for relatively few cases.[17] The cause for most cases of leukemia is unknown. The different leukemias likely have different causes. Leukemia, like other cancers, results from mutations in the DNA. Certain mutations can trigger leukemia by activating oncogenes or deactivating tumor suppressor genes, and thereby disrupting the regulation of cell death, differentiation or division. These mutations may occur spontaneously or as a result of exposure to radiation or carcinogenic substances. Among adults, the known causes are natural and artificial ionizing radiation, a few viruses such as human T-lymphotropic virus, and some chemicals, notably benzene and alkylating chemotherapy agents for previous malignancies.[18][19][20] Use of tobacco is associated with a small increase in the risk of developing acute myeloid leukemia in adults.[18] Cohort and case-control studies have linked exposure to some petrochemicals and hair dyes to the development of some forms of leukemia. Diet has very limited or no effect, although eating more vegetables may confer a small protective benefit.[17] Viruses have also been linked to some forms of leukemia. Experiments on mice and other mammals have demonstrated the relevance of retroviruses in leukemia, and human retroviruses have also been identified. The first human retrovirus identified was human T-lymphotropic virus, or HTLV-1, which is known to cause adult T-cell leukemia.[21] Some people have a genetic predisposition towards developing leukemia. This predisposition is demonstrated by family histories and twin studies.[18] The affected people may have a single gene or multiple genes in common. In some cases, families tend to develop the same kinds of leukemia as other members; in other families, affected people may develop different forms of leukemia or related blood cancers.[18] In addition to these genetic issues, people with chromosomal abnormalities or certain other genetic conditions have a greater risk of leukemia.[19] For example, people with Down syndrome have a significantly increased risk of developing forms of acute leukemia (especially acute myeloid leukemia), and Fanconi anemia is a risk factor for developing acute myeloid leukemia.[18] Whether non-ionizing radiation causes leukemia has been studied for several decades. The International Agency for Research on Cancer expert working group undertook a detailed review of all data on static and extremely low frequency electromagnetic energy, which occurs naturally and in association with the generation, transmission, and use of electrical power.[22] They concluded that there is limited evidence that high levels of ELF magnetic (but not electric) fields might cause childhood leukemia. Exposure to significant ELF magnetic fields might result in twofold excess risk for leukemia for children exposed to these high levels of magnetic fields.[22] However, the report also says that methodological weaknesses and biases in these studies have likely caused the risk to be overstated.[22] No evidence for a relationship to leukemia or another form of malignancy in adults has been demonstrated.[22] Since exposure to such levels of ELFs is relatively uncommon, the World Health Organization concludes that ELF exposure, if later proven to be causative, would account for just 100 to 2400 cases worldwide each year, representing 0.2 to 4.9% of the total incidence of childhood leukemia for that year (about 0.03 to 0.9% of all leukemias).[23] A few cases of maternal-fetal transmission (a baby acquires leukemia because its mother had leukemia during the pregnancy) have been reported.[18] According to a study conducted at the Center for Research in Epidemiology and Population Health in France, children born to mothers who use fertility drugs to induce ovulation are more than twice as likely to develop leukemia during their childhoods than other children.[24] Diagnosis is usually based on repeated complete blood counts and a bone marrow examination following observations of the symptoms, however, in rare cases blood tests may not show if a patient has leukemia, usually this is because the leukemia is in the early stages or has entered remission. A lymph node biopsy can be performed as well in order to diagnose certain types of leukemia in certain situations. Following diagnosis, blood chemistry tests can be used to determine the degree of liver and kidney damage or the effects of chemotherapy on the patient. When concerns arise about visible damage due to leukemia, doctors may use an X-ray, MRI, or ultrasound. These can potentially view leukemia's effects on such body parts as bones (X-ray), the brain (MRI), or the kidneys, spleen, and liver (ultrasound). Finally, CT scans are rarely used to check lymph nodes in the chest. Despite the use of these methods to diagnose whether or not a patient has leukemia, many people have not been diagnosed because many of the symptoms are vague, unspecific, and can refer to other diseases. For this reason, the American Cancer Society predicts that at least one-fifth of the people with leukemia have not yet been diagnosed.[16] Mutation in SPRED1 gene has been associated with a predisposition to childhood leukemia.[25] SPRED1 gene mutations can be diagnosed with genetic sequencing. Most forms of leukemia are treated with pharmaceutical medication, typically combined into a multi-drug chemotherapy regimen. Some are also treated with radiation therapy. In some cases, a bone marrow transplant is effective. Acute lymphoblastic[edit] Management of ALL focuses on control of bone marrow and systemic (whole-body) disease. Additionally, treatment must prevent leukemic cells from spreading to other sites, particularly the central nervous system (CNS) e.g. monthly lumbar punctures. In general, ALL treatment is divided into several phases: • Consolidation therapy or intensification therapy to eliminate any remaining leukemia cells. There are many different approaches to consolidation, but it is typically a high-dose, multi-drug treatment that is undertaken for a few months. Patients with low- to average-risk ALL receive therapy with antimetabolite drugs such as methotrexate and 6-mercaptopurine (6-MP). High-risk patients receive higher drug doses of these drugs, plus additional drugs. • CNS prophylaxis (preventive therapy) to stop the cancer from spreading to the brain and nervous system in high-risk patients. Standard prophylaxis may include radiation of the head and/or drugs delivered directly into the spine. • Maintenance treatments with chemotherapeutic drugs to prevent disease recurrence once remission has been achieved. Maintenance therapy usually involves lower drug doses, and may continue for up to three years. • Alternatively, allogeneic bone marrow transplantation may be appropriate for high-risk or relapsed patients.[26] Chronic lymphocytic[edit] Decision to treat[edit] Treatment approach[edit] CLL is probably incurable by present treatments. The primary chemotherapeutic plan is combination chemotherapy with chlorambucil or cyclophosphamide, plus a corticosteroid such as prednisone or prednisolone. The use of a corticosteroid has the additional benefit of suppressing some related autoimmune diseases, such as immunohemolytic anemia or immune-mediated thrombocytopenia. In resistant cases, single-agent treatments with nucleoside drugs such as fludarabine,[28] pentostatin, or cladribine may be successful. Younger patients may consider allogeneic or autologous bone marrow transplantation.[29] Acute myelogenous[edit] Chronic myelogenous[edit] There are many possible treatments for CML, but the standard of care for newly diagnosed patients is imatinib (Gleevec) therapy.[31] Compared to most anti-cancer drugs, it has relatively few side effects and can be taken orally at home. With this drug, more than 90% of patients will be able to keep the disease in check for at least five years,[31] so that CML becomes a chronic, manageable condition. Hairy cell[edit] Decision to treat Typical treatment approach T-cell prolymphocytic[edit] Most patients with T-cell prolymphocytic leukemia, a rare and aggressive leukemia with a median survival of less than one year, require immediate treatment.[34] T-cell prolymphocytic leukemia is difficult to treat, and it does not respond to most available chemotherapeutic drugs.[34] Many different treatments have been attempted, with limited success in certain patients: purine analogues (pentostatin, fludarabine, cladribine), chlorambucil, and various forms of combination chemotherapy (cyclophosphamide, doxorubicin, vincristine, prednisone CHOP, cyclophosphamide, vincristine, prednisone [COP], vincristine, doxorubicin, prednisone, etoposide, cyclophosphamide, bleomycin VAPEC-B). Alemtuzumab (Campath), a monoclonal antibody that attacks white blood cells, has been used in treatment with greater success than previous options.[34] Some patients who successfully respond to treatment also undergo stem cell transplantation to consolidate the response.[34] Juvenile myelomonocytic[edit] Treatment for juvenile myelomonocytic leukemia can include splenectomy, chemotherapy, and bone marrow transplantation.[35] Age-standardized death from leukemia per 100,000 inhabitants in 2004.[36]   no data   less than 1   more than 11 In 2010, globally, approximately 281,500 people died of leukemia.[37] In 2000, approximately 256,000 children and adults around the world developed a form of leukemia, and 209,000 died from it.[1] This represents about 3% of the almost seven million deaths due to cancer that year, and about 0.35% of all deaths from any cause.[1] Of the sixteen separate sites the body compared, leukemia was the 12th most common class of neoplastic disease, and the 11th most common cause of cancer-related death.[1] About 245,000 people in the United States are affected with some form of leukemia, including those that have achieved remission or cure. Approximately 44,270 new cases of leukemia were diagnosed in the year of 2008 in the US.[38] This represents 2.9% of all cancers (excluding simple basal cell and squamous cell skin cancers) in the United States, and 30.4% of all blood cancers.[39] Among children with some form of cancer, about a third have a type of leukemia, most commonly acute lymphoblastic leukemia.[38] A type of leukemia is the second most common form of cancer in infants (under the age of 12 months) and the most common form of cancer in older children.[40] Boys are somewhat more likely to develop leukemia than girls, and white American children are almost twice as likely to develop leukemia than black American children.[40] Only about 3% cancer diagnoses among adults are for leukemias, but because cancer is much more common among adults, more than 90% of all leukemias are diagnosed in adults.[38] Race is a risk factor. Hispanics, especially those under the age of 20, are at the highest risk for leukemia, while whites, Native Americans, Asians, and Alaska Natives are at higher risk than blacks.[41] Sex is also a risk factor. More men than women are diagnosed with leukemia and die from the disease. Around 30 percent more men than women have leukemia.[42] Rudolf Virchow Leukemia was first observed by pathologist Rudolf Virchow in 1845. Observing an abnormally large number of white blood cells in a blood sample from a patient, Virchow called the condition Leukämie in German, which he formed from the two Greek words leukos (λευκός), meaning "white", and aima (αίμα), meaning "blood". Around ten years after Virchow's findings, pathologist Franz Ernst Christian Neumann found that one deceased leukemia patient's bone marrow was colored "dirty green-yellow" as opposed to the normal red. This finding allowed Neumann to conclude that a bone marrow problem was responsible for the abnormal blood of leukemia patients. By 1900 leukemia was viewed as a family of diseases as opposed to a single disease. By 1947 Boston pathologist Sidney Farber believed from past experiments that aminopterin, a folic acid mimic, could potentially cure leukemia in children. The majority of the children with ALL who were tested showed signs of improvement in their bone marrow, but none of them were actually cured. This, however, led to further experiments. In 1962, researchers Emil J. Freireich Jr. and Emil Frei III used combination chemotherapy to attempt to cure leukemia. The tests were successful with some patients surviving long after the tests.[43] Society and culture[edit] Leukemias are often romanticized in 20th century fiction. It is portrayed as a joy-ending, clean disease whose fair, innocent and gentle victims die young or at the wrong time. As such, it is the cultural successor to tuberculosis, which held this cultural position until tuberculosis was discovered to be an infectious disease.[44] The 1970 romance novel Love Story is an example of this romanticization of leukemia. Research directions[edit] Significant research into the causes, prevalence, diagnosis, treatment, and prognosis of leukemia is being performed. Hundreds of clinical trials are being planned or conducted at any given time.[45] Studies may focus on effective means of treatment, better ways of treating the disease, improving the quality of life for patients, or appropriate care in remission or after cures. In general, there are two types of leukemia research: clinical or translational research and basic research. Clinical/translational research focuses on studying the disease in a defined and generally immediately patient-applicable way, such as testing a new drug in patients. By contrast, basic science research studies the disease process at a distance, such as seeing whether a suspected carcinogen can cause leukemic changes in isolated cells in the laboratory or how the DNA changes inside leukemia cells as the disease progresses. The results from basic research studies are generally less immediately useful to patients with the disease.[46] Treatment through gene therapy is currently being pursued. One such approach turns T cells into cancer-targeting attackers. As of August 2011, a year after treatment, two of the three patients are cancer-free.[47][48] In addition to this identifying stem cells that cause different types of leukaemia is being researched.[49] Leukemia is rarely associated with pregnancy, affecting only about 1 in 10,000 pregnant women.[50] How it is handled depends primarily on the type of leukemia. Nearly all leukemias appearing in pregnant women are acute leukemias.[51] Acute leukemias normally require prompt, aggressive treatment, despite significant risks of pregnancy loss and birth defects, especially if chemotherapy is given during the developmentally sensitive first trimester.[50] Chronic myelogenous leukemia can be treated with relative safety at any time during pregnancy with Interferon-alpha hormones.[50] Treatment for chronic lymphocytic leukemias, which are rare in pregnant women, can often be postponed until after the end of the pregnancy.[50][51] See also[edit] 1. ^ a b c d Mathers, Colin D, Cynthia Boschi-Pinto, Alan D Lopez and Christopher JL Murray (2001). "Cancer incidence, mortality and survival by site for 14 regions of the world". Global Programme on Evidence for Health Policy Discussion Paper No. 13 (World Health Organization).  2. ^ "SEER Stat Fact Sheets: Leukemia". National Cancer Institute. 2011. "Approximately 10.8% were diagnosed under age 20"  3. ^ "Leukemia". Mosby’s Medical, Nursing &Allied Health Dictionary (Fourth ed.). Mosby-YearBook. 1994. p. 903.  5. ^ Finding Cancer Statistics » Cancer Stat Fact Sheets »Chronic Lymphocytic Leukemia National Cancer Institute. 6. ^ Colvin G. A., Elfenbein G. J. (2003). "The latest treatment advances for acute myelogenous leukemia". Medicine and Health, Rhode Island 86 (8): 243–6. PMID 14582219.  7. ^ Novartis 8. ^ Patients with Chronic Myelogenous Leukemia Continue to Do Well on Imatinib at 5-Year Follow-Up Medscape Medical News 2006. 9. ^ Updated Results of Tyrosine Kinase Inhibitors in CML ASCO 2006 Conference Summaries. 10. ^ Else, M., Ruchlemer, R., Osuji, N. (2005). "Long remissions in hairy cell leukemia with purine analogs: a report of 219 patients with a median follow-up of 12.5 years". Cancer 104 (11): 2442–8. doi:10.1002/cncr.21447. PMID 16245328.  11. ^ Matutes, Estella. (1998) "T-cell prolymphocytic leukemia, a rare variant of mature post-thymic T-cell leukemias, has distinct clinical and laboratory characteristics and a poor prognosis." Cancer Control Journal Volume 5 Number 1. 12. ^ Valbuena JR, Herling M, Admirand JH, Padula A, Jones D, Medeiros LJ (March 2005). "T-cell prolymphocytic leukemia involving extramedullary sites". American Journal of Clinical Pathology 123 (3): 456–64. doi:10.1309/93P4-2RNG-5XBG-3KBE. PMID 15716243.  13. ^ Elaine Sarkin Jaffe, Nancy Lee Harris, World Health Organization, International Agency for Research on Cancer, Harald Stein, J. W. Vardiman (2001). Pathology and genetics of tumours of haematopoietic and lymphoid tissues. World Health Organization Classification of Tumors 3. Lyon: IARC Press. ISBN 92-832-2411-6.  14. ^ Reference list is found at image description page in Wikimedia Commons 15. ^ "Leukemia". Columbia Electronic Encyclopedia, 6th Edition. Retrieved 4 November 2011.  16. ^ a b American Cancer Society (2010). "How is Leukemia Diagnosed?". Detailed Guide: Leukemia – Adult Chronic. American Cancer Society. Retrieved 4 May 2010. [dead link] 17. ^ a b Ross JA, Kasum CM, Davies SM, Jacobs DR, Folsom AR, Potter JD (August 2002). "Diet and risk of leukemia in the Iowa Women's Health Study". Cancer Epidemiol. Biomarkers Prev. 11 (8): 777–81. PMID 12163333.  18. ^ a b c d e f Wiernik, Peter H. (2001). Adult leukemias. New York: B. C. Decker. pp. 3–15. ISBN 1-55009-111-5.  19. ^ a b Robinette, Martin S.; Cotter, Susan; Van de Water (2001). Quick Look Series in Veterinary Medicine: Hematology. Teton NewMedia. p. 105. ISBN 1-893441-36-9.  20. ^ Stass, Sanford A.; Schumacher, Harold R.; Rock, William R. (2000). Handbook of hematologic pathology. New York, N.Y: Marcel Dekker. pp. 193–194. ISBN 0-8247-0170-4.  21. ^ Leonard, Barry (1998). Leukemia: A Research Report. DIANE Publishing. p. 7. ISBN 0-7881-7189-5.  22. ^ a b c d Non-Ionizing Radiation, Part 1: Static and Extremely Low-Frequency (ELF) Electric and Magnetic Fields (IARC Monographs on the Evaluation of the Carcinogenic Risks). Geneva: World Health Organisation. 2002. pp. 332–333, 338. ISBN 92-832-1280-0.  23. ^ "WHO | Electromagnetic fields and public health". Retrieved 2009-02-18.  24. ^ Rudant, Jérémie; Alicia Amigou, Laurent Orsi, Thomas Althaus, Guy Leverger, André Baruchel, Yves Bertrand, Brigitte Nelken, Geneviève Plat, Gérard Michel, Nicolas Sirvent, Pascal Chastagner, Stéphane Ducassou, Xavier Rialland, Denis Hémon, Jacqueline Clavel (2012). "Fertility treatments, congenital malformations, fetal loss, and childhood acute leukemia: The ESCALE study (SFCE)". Pediatric Blood & Cancer 60 (2): 301–8. doi:10.1002/pbc.24192. ISSN 1545-5009. PMID 22610722. Lay summary.  25. ^ Pasmant E, Ballerini P, Lapillonne H et al. SPRED1 disorder and predisposition to leukemia in children. Blood 2009; 114:1131. 26. ^ Hoffbrand AV, Moss PAH, and Pettit JE, "Essential Haematology", Blackwell, 5th ed., 2006. 27. ^ National Cancer Institute. "Chronic Lymphocytic Leukemia (PDQ) Treatment: Stage Information". Retrieved 2007-09-04.  28. ^ Eichhorst BF, Busch R, Hopfinger G, Pasold R, Hensel M, Steinbrecher C, Siehl S, Jäger U, Bergmann M, Stilgenbauer S, Schweighofer C, Wendtner CM, Döhner H, Brittinger G, Emmerich B, Hallek M, German CLL Study Group. (2006). "Fludarabine plus cyclophosphamide versus fludarabine alone in first-line therapy of younger patients with chronic lymphocytic leukemia". Blood 107 (3): 885–91. doi:10.1182/blood-2005-06-2395. PMID 16219797.  29. ^ Gribben JG (January 2008). "Stem cell transplantation in chronic lymphocytic leukemia". Biol. Blood Marrow Transplant. 15 (1 Suppl): 53–8. doi:10.1016/j.bbmt.2008.10.022. PMC 2668540. PMID 19147079.  30. ^ American Cancer Society (22 March 2012). "Typical treatment of acute myeloid leukemia (except promyelocytic M3)". Detailed Guide: Leukemia – Acute Myeloid (AML). American Cancer Society. Retrieved 31 Oct 2012.  31. ^ a b c Fausel C (October 2007). "Targeted chronic myeloid leukemia therapy: seeking a cure". J Manag Care Pharm 13 (8 Suppl A): 8–12. PMID 17970609.  32. ^ "Cladribine in a weekly versus daily schedule for untreated active hairy cell leukemia: final report from the Polish Adult Leukemia Group (PALG) of a prospective, randomized, multicenter trial – Robak et al. 109 (9): 3672 – Blood". Retrieved 2007-09-10.  33. ^ "Filgrastim for Cladribine-Induced Neutropenic Fever in Patients With Hairy Cell Leukemia – Saven et al. 93 (8): 2471 – Blood". Retrieved 2007-09-10.  34. ^ a b c d Dearden CE, Matutes E, Cazin B (September 2001). "High remission rate in T-cell prolymphocytic leukemia with CAMPATH-1H". Blood 98 (6): 1721–6. doi:10.1182/blood.V98.6.1721. PMID 11535503.  35. ^ "JMMLfoundation.org". JMMLfoundation.org. Retrieved 2010-08-29. [dead link] 36. ^ "WHO Disease and injury country estimates". World Health Organization. 2009. Retrieved 2009-11-11.  38. ^ a b c "Leukemia Facts & Statistics." The Leukemia & Lymphoma Society. Retrieved 2009-07-02. 39. ^ Horner MJ, Ries LAG, Krapcho M, Neyman N, et al. (eds). "SEER Cancer Statistics Review, 1975–2006". Surveillance Epidemiology and End Results (SEER). Bethesda, MD: National Cancer Institute. Retrieved 2009-11-03. "Table 1.4: Age-Adjusted SEER Incidence and U.S. Death Rates and 5-Year Relative Survival Rates By Primary Cancer Site, Sex and Time Period"  40. ^ a b James G. Gurney, Malcolm A. Smith, Julie A. Ross (1999) Cancer Incidence and Survival among Children and Adolescents, United States SEER program 1975–1995, chapter on Leukemia Cancer Statistics Branch, National Cancer Institute, available online from the SEER web site 41. ^ Childhood Blood Cancers | The Leukemia & Lymphoma Society 42. ^ Facts 2012 from The Leukemia & Lymphoma Society 43. ^ Patlak, Margie. "Targeting Leukemia: From Bench to Bedside". Breakthroughs in Bioscience. The Federation of American Societies for Experimental Biology. Retrieved 20 May 2010.  44. ^ Sontag, Susan (1978). Illness as Metaphor. New York: Farrar, Straus and Giroux. p. 18. ISBN 0-374-17443-1.  45. ^ Search of: leukemia – List Results – ClinicalTrials.gov 47. ^ Jaslow, Ryan. "New Leukemia Therapy Destroys Cancer by Turning Blood Cells into "Assassins"". CBSnews.com HealthPop section. Retrieved 11 August 2011.  48. ^ Coghlan, Andy (26 March 2013)Gene therapy cures leukaemia in eight days The New Scientist, Retrieved 15 April 2013 49. ^ "How we're beating leukaemia". Retrieved 24 September 2013.  50. ^ a b c d Shapira T, Pereg D, Lishner M (September 2008). "How I treat acute and chronic leukemia in pregnancy". Blood Rev. 22 (5): 247–59. doi:10.1016/j.blre.2008.03.006. PMID 18472198.  51. ^ a b Koren G, Lishner M (2010). "Pregnancy and commonly used drugs in hematology practice". Hematology Am Soc Hematol Educ Program 2010: 160–5. doi:10.1182/asheducation-2010.1.160. PMID 21239787.  External links[edit]
global_01_local_0_shard_00000017_processed.jsonl/3917
National Historic Preservation Act of 1966 From Wikipedia, the free encyclopedia Jump to: navigation, search National Historic Preservation Act of 1966 Great Seal of the United States. Long title An Act to Establish a Program for the Preservation of Additional Historic Properties throughout the Nation, and for Other Purposes Colloquial acronym(s) NHPA Enacted by the  89th United States Congress Public Law 89-665 Stat. 80 Stat. 915 U.S.C. sections created 16 U.S.C. § 470 Legislative history • Introduced in the Senate as S. 3035 • Signed into law by President Lyndon B. Johnson on October 15, 1966 The National Historic Preservation Act (NHPA; Public Law 89-665; 16 U.S.C. 470 et seq.) is legislation intended to preserve historical and archaeological sites in the United States of America. The act created the National Register of Historic Places, the list of National Historic Landmarks, and the State Historic Preservation Offices. Senate Bill 3035, the National Historic Preservation Act, was signed into law on October 15, 1966, and is the most far-reaching preservation legislation ever enacted in the United States. Several amendments have been made since. Among other things, the act requires federal agencies to evaluate the impact of all federally funded or permitted projects on historic properties (buildings, archaeological sites, etc.) through a process known as Section 106 Review. Early development[edit] Preservation is a rather early development in America. Although there was no national policy regarding preservation until 1966, efforts in the 19th century initiated the journey towards legislation. One of the earliest efforts of the preservation movement occurred around the 1850s when George Washington’s home, Mount Vernon was in shambles. His nephew attempted to sell it to the federal government for $200,000, but no one bought it.[1] To prevent further destruction or conversion to a resort, Ann Pamela Cunningham created the Mount Vernon Ladies’ Association to fight for this house. After establishing the first group promoting preservation efforts, they raised the money to acquire the property and protect it from ruin. Due to their efforts, not only does this house stand to represent the nation and the birth of independence, but it also, “served as a blueprint for later organizations.”[2] In 1906, an act was passed on the behalf of the nation’s history and land. President Roosevelt signed the Antiquities Act that “prohibited the excavation of antiquities from public lands without a permit from the Secretary of Interior.”[3] It also gave the president authority to declare a specific piece of land a national monument, therefore protecting it from scavengers and proclaiming national identity.[4] In 1916, the Department of the Interior established a new entity known as the National Park Service, the nation’s first agency to regulate and manage public space, including the national monuments.[5] “Over the past fifty years the NPS has acquired more than 26,000,000 acres (110,000 km2) of land, including not only the great chain of parks preserved for their natural beauty and value, but an extraordinary variety of historic buildings, monuments, and sites.”[6] By 1935, Congress formed the Historic Sites Act that established a national policy for preservation and permitted the Secretary of Interior to create programs on behalf of preservation efforts.[7] Historic American Buildings Survey (HABS), one of the established programs, provided jobs for architects, engineers, and surveyors who suffered from the Great Depression era. They were to record, document, interpret, and survey historic properties.[8] The Historic Sites Act, also, organized the national parks under the National Park Service, which created the foundation for the future development of National Register of Historic Places.[9] Although the Antiquities Act and Historic Sites Act were major stepping stones for the preservation movement, it did not create a public “national awareness.”[10] On October 26, 1949, President Truman signed the National Trust for Historic Preservation act “to facilitate public participation in the preservation of sites, buildings, and objects of national significance or international interest." In addition, the bill enforced public participation in preserving and protecting the sites, buildings, objects of national significance in American history.”[11] Initially, the National Trust for Historic Preservation did not provide funds for preservation projects. Today, they are able to offer funds for planning and education, providing a plethora of information, techniques, and methods to assist people in applying preservation locally.[12] Post WWII and Urban Renewal[edit] In 1956, President Eisenhower signed into law the National Interstate and Defense Highways Act of 1956 which established the interstate highway system, which provided an easy and efficient way for troops to depart if under attack. Due to this new construction, many historic properties were destroyed. In the 1960s, the Kennedy administration launched the Urban Renewal Program. Hoping the plan would rejuvenate the cities, it in fact increased the destruction in the downtown areas.[13] The increase in population around this time, as well, and the manufacturing of cars called for a rapid change, therefore hindering our nation and its culture.[14] “With the urbanization, tear downs, and rebuilding is destroying the physical evidence of the past.”[15] During the 1950s and 1960s people saw the negative changes in their city and developed a concern for their “quality of life that reflected their identity.”[16] As a response to the nationwide destruction brought about by federally initiated programs, a report coordinated by Lady Bird Johnson analyzed the country and the effects of urban renewal. With Heritage So Rich, an accumulation of essays, wrote “an expansive inventory of properties reflecting the nation’s heritage, a mechanism to protect those properties from unnecessary harm caused by federal activities, a program of financial incentives, and an independent federal preservation body to coordinate the actions of federal agencies affecting historic preservation.”[17] The book triggered public awareness of the issue and offered a proposition to handle the situation through the National Historic Preservation Act.[10] National Historic Preservation Act[edit] The National Historic Preservation Act was signed into law by Lyndon B. Johnson on October 15, 1966.[18] This act established several institutions: Advisory Council on Historic Preservation, State Historic Preservation Office, National Register of Historic Places, and the Section 106 review process.[16] The Section 106 Process is further explained and defined in 36 CFR Part 800. Meeting four times a year, the Advisory Council on Historic Preservation consists of 23 members from both public and private sectors, with the chairman appointed by the president.[19] The Council’s role is to advise the President and Congress on historic preservation issues, to develop policies and guidelines handling any conflicts of federal agencies, and to participate in the Section 106 review process.[20] The National Register of Historic Places, overseen by the National Park Service, is nation's official list of districts, sites, buildings, structures, and objects worthy of preservation,[21] and are officially designated "historic properties" regardless of whether they are archaeological or historic. To be eligible for listing, a property must meet one of four criteria and have sufficient integrity.[22] Being listed on or eligible for listing on the National Register does not automatically prevent damage or destruction but it qualifies these approved properties for grants, loans, and tax incentives.[23] The State Historic Preservation Office (SHPO) and Officer was established by the NHPA to coordinate statewide inventory of historic properties, nominate properties to the National Register, maintain a statewide preservation plan, assist others, and advise and educate locals.[24] There are a total of 59 SHPO officers, one for each state with eight additional ones, which include the District of Columbia, Puerto Rico, the Virgin Islands, and others.[25] Section 106 Review Process[edit] Section 106 of the National Historic Preservation Act mandates federal agencies undergo a review process for all federally funded and permitted projects that will impact sites listed on, or eligible for listing on, the National Register of Historic Places. Specifically it requires the federal agency to "take into account" the effect a project may have on historic properties. It allows interested parties an opportunity to comment on the potential impact projects may have on significant archaeological or historic sites. The main purpose for the establishment of the Section 106 review process is to minimize potential harm and damage to historic properties.[26] Any federal agency whose project, funding or permit may affect a historic property, both those listed or eligible for inclusion in the National Register of Historic Places, must consider the effects on historic properties and "seek ways to avoid, minimize or mitigate" any adverse effects on historic properties. The typical Section 106 Review involves four primary steps: 1 - Initiation of the Section 106 Review; 2 - Identification of Historic Properties; 3 - Assessment of Adverse Effects; and 4 - Resolution of Adverse Effects. Further steps may be required if there is a disagreement among the consulting parties on adverse effects or the resolution of the effects.[27] The federal agency overseeing the project inventories the project area (or contracts with a qualified consultant) to determine the presence or absence of historic properties. They then submit to the SHPO a Determination of Effect/Finding of Effect (DOE/FOE) outlining to the SHPO the project, the efforts taken identify historic properties, and what effects, if any, the project may have on historic properties. If the project is believed to have no adverse effect on eligible historic resources and the SHPO and other consulting parties agree, then the Section 106 process is effectively closed and the project may proceed. Alternatively, if an adverse effect is expected, the agency is required to work with the local State Historic Preservation Office to ensure that all interested parties are given an opportunity to review the proposed work and provide comments. This step seeks ways for the project to avoid having an adverse effect on historic properties. Ideally, a Memorandum of Agreement is reached between all consulting parties outlining agreed to mitigation or avoidance of historic properties, but this is not always the case. Without this process historical properties would lose a significant protection. This process helps decide different approaches and solutions to the project, but does not prevent any site from demolition or alteration.[16] Later amendments[edit] The NHPA of 1966 made a huge impact in the communities and cities of America.[citation needed] Later amendments only strengthened the previously developed act. In 1969, the National Environmental Policy Act (NEPA) opened more opportunities for the NHPA to take effect. The NEPA protects a larger amount of area of property compared to the NHPA, because it includes the environment around it, which will sometimes inherently include historic sites. In 1976, Congress extended the Section 106 review process to include buildings, archaeological sites, and other historic resources eligible for listing, not just those already on the the National Register of Historic Places. In 1980, Section 110 was added. It added further requirements for federal agencies such as the need to establish their own internally staffed historic preservation programs. In 1992, amendments increased protection for Native American and Native Hawaiian preservation efforts.[10] Early preservation efforts were driven by patriotism and a desire to protect the new establishment of the nation by wealthy, private individuals. Early efforts focused primarily on individual structures as opposed to areas such as a neighborhood in a city or a rural landscape. The preserved structures were often turned into museums to create a showcase and generate tourism.[28] The focus of preservation eventually shifted from patriotism to the aesthetics of a structure or area and ultimately to the their structural relationships with society at large.[29] Today, individuals and groups in a community work towards preservation as a whole. According to Dr. Robin Elizabeth Datel, modern motivations for preservation can be summed up in four points: 1. to retain diverse elements of past 2. to perpetuate the distinctive identities of places 3. to involve amateurs in landscape care 4. to practice a conservation approach to environmental change.[30] The economic benefits of preservation continue to become more important and better understood and documented. Preservation efforts produce the most number of jobs in the nation’s economy[31] and these jobs create new businesses and tourism, increase property values, and enhanced the quality of life in a community.[32] Effects of the NHPA[edit] The National Historic Preservation Act has led to major changes in the employment trends in historic preservation fields. Archaeologists, historians, historic architects, and others have been employed in vast numbers in the field of cultural resource management. Cultural resource management is an umbrella term which encompasses archaeology, historic preservation and other disciplines when employed for the purposes of compliance with NHPA and other federal and state-mandated historic preservation laws. Prior to the passage and subsequent enforcement (through litigation) of the National Historic Preservation Act of 1966 and other laws, most archaeologists, historians, and other historic preservation specialists were employed primarily in the field of academia, working at universities or other places of higher learning. However, since the passage of the NHPA, ever-increasing numbers of these professionals are employed in support of the cultural resources management industry. Large public works projects often require that teams of archaeologists perform limited excavations in order to properly inventory buried archaeological remains and assess their eligibility for the National Register of Historic Places. This industry has also allowed a larger swath of individuals to participate in archaeology and history as, unlike in the academic arena, a PhD is not required to earn a professional livelihood. The Secretary of the Interior's Professional Qualification Standards require a graduate degree plus at least one year of full-time experience, at least four months of fieldwork, and demonstrated ability to carry research to completion. As a result, most cultural resource management firms (as well as environmental consulting firms which possess a cultural resource management component) staff masters-degreed professionals to manage particular projects while typically a PhD-level professional may maintain oversight of several projects. Additionally, the basic field work often required in support of performing the Section 106-mandated inventories of cultural resources is conducted by individuals with or earning bachelors degrees. As a result, many undergraduates and recent graduates in the fields which support the implementation of the National Historic Preservation Act have found gainful employment. In the past, they stood little chance of earning a living in these fields without an advanced degree. However, CRM is still one of the lowest paying fields for educated professionals. “Preservation...this reaching back and looking forward may enable current residents to feel that they are part of a continuum and to achieve a “sense of stability and belonging.”[33] “There is a need in every generation to study the past, to absorb its spirit, to preserve its’s a collaboration of ourselves and our ancestors, the result is a deeper understanding for individuals and in consequence, a broader culture for the nation.”[34] “Americans aware of the value inherent in many older structures: not that they are old, but that they contains so much of ourselves. This awareness of human values, whether conscious or hidden behind the expression of other motivations, plays a real part in the growing movement for preservation of older structure.”[35] “Recognizing that increased knowledge and better administration of historic resources would improve the planning and execution of Federal undertakings and benefit economic growth and development nationwide.”[10] “If the preservation movement is to be must attempt to give a sense of orientation to our society, using structures, and objects of the past to establish values of time and place.”[36] 1. ^ Christopher J. Duerken et all., A Handbook on Historic Preservation Law, edited by Christopher J. Duerken (Washington D.C.: Conservation Foundation: National Center for Preservation Law, 1983), 1. 2. ^ Christopher Tunnard, “Landmarks of Beauty,” With Heritage So Rich, chaired by Albert Rains, directed by Laurence G. Henderson (New York: Random House, 1966), 30. & Mitchell Schwarzer, “Myths of Permanence and Transience in the Discourse on Historic Preservation in the United States,” Journal of Architectural Education 48, no. 1 (September 1994): 3-4. 3. ^ Thomas F. King, Cultural Resource: Law and Practice, 2nd ed. (New York: Altamira Press, 2004), 19. 4. ^ Duerken, 8. 5. ^ King, 19. 6. ^ Walter Muri Whitehall, “The Right of Cities to be Beautiful,” With Heritage So Rich, chaired by Albert Rains, directed by Laurence G. Henderson (New York: Random House, 1966), 48. 7. ^ Adina W. Kanefield, Federal Historic Preservation Case Law, 1966-1996, rev. ed., (accessed April 19, 2008). 8. ^ King, 20. 9. ^ Duekern, 8. 10. ^ a b c d Kanefield. 11. ^ Whitehall, 49. 12. ^ Ibid. 13. ^ King, 21. 14. ^ Tunnard, 30. 15. ^ Ibid, 204. 16. ^ a b c King, 22. 17. ^ Robert Stipe, A Richer Heritage: Historic Preservation in 21st Century (Chapel Hill: University of Chapel Hill Press, 2003), 35. 18. ^ Stipe, 35. 19. ^ Stipe, 38. 20. ^ Duerken, 9. & Kanefield. 21. ^ King, 40. 22. ^ Interestingly, a property does not have to be officially listed on the National Register of Historic Places to receive protection, they just have to be considered eligible for listing on the NRHP. One historian notes that National Park Service administrators "responded enthusiastically to their growing professional authority by issuing a new, systematic outline of American history to serve as a guideline for the agency." John Matzko, Reconstructing Fort Union (University of Nebraska Press, 2001), p. 65. 23. ^ Charles E. Fisher, “Promoting the Preservation of Historic Buildings: Historic Preservation Policy in the United States,” APT Bulletin 29, no. ¾ (1998): 8. 24. ^ King, 42. 25. ^ Ibid, 41. 26. ^ Stipe, 49. 27. ^ Advisory Council on Historic Preservation, "Protection Historic Properties: A Citizen's Guide to Section 106 Review," Updated Brochure 2011. 28. ^ Fisher, 7. 29. ^ Schwarzer, 2. 30. ^ Robin Elizabeth Datel, “Preservation and a Sense of Orientation for American Cities,” Geographical Review 75, no. 2 (April 1985): 125. 31. ^ Donovan D. Rypkema, The Economics of Historic Preservation: A Community Leader’s Guide (Washington D.C.: National Trust for Historic Preservation, 1994), 11. 32. ^ Ibid, 13. 33. ^ Datel, 130. 34. ^ Tunnard, 29. 35. ^ George Zabriskie, “Window to the Past,” With Heritage So Rich, chaired by Albert Rains, directed by Laurence G. Henderson (New York: Random House, 1966), 57. 36. ^ With Heritage So Rich, 207. External links[edit]
global_01_local_0_shard_00000017_processed.jsonl/3920
Personal network From Wikipedia, the free encyclopedia Jump to: navigation, search Personal networking is often encouraged by large organizations, in the hope of improving productivity, and so a number of tools exist to support the maintenance of networks. Many of these tools are IT-based, and use Web 2.0 technologies. Care should be taken not to confuse a personal network with a Personal area network. Notes and references[edit]
global_01_local_0_shard_00000017_processed.jsonl/3921
Ralph of Coggeshall From Wikipedia, the free encyclopedia Jump to: navigation, search Ralph of Coggeshall (d. after 1227), English chronicler, was at first a monk and afterwards sixth abbot (1207–1218) of Coggeshall, an Essex foundation of the Cistercian order. Chronicon Anglicanum[edit] Ralph himself tells us these facts; and that his resignation of the abbacy was made against the wishes of the brethren, in consequence of his bad health. He took up and continued a Chronicon Anglicanum belonging to his house; the original work begins at 1066, his own share at 1187. He hoped to reach the year 1227, but his autograph copy breaks off three years earlier. Ralph makes no pretensions to be a literary artist. Where he had a written authority before him he was content to reproduce even the phraseology of his original. At other times he strings together in chronological order, without any links of connection, the anecdotes which he gathered from chance visitors. Unlike Benedictus Abbas and Roger of Hoveden, he makes little use of documents; only three letters are quoted in his work. On the other hand, the corrections and erasures of the autograph show that he took pains to verify his details; and his informants are sometimes worthy of exceptional confidence. Thus he vouches Richard's chaplain Anselm[clarification needed] for the story of the king's capture by Leopold of Austria. The tone of the chronicle is usually dispassionate; but the original text contained some personal strictures upon Prince John, which are reproduced in Roger of Wendover. The admiration with which Ralph regarded Henry II is attested by his edition of Ralph Niger's chronicle; here, under the year 1161, he replies to the intemperate criticisms of the original author. On Richard I the abbot passes a judicious verdict, admitting the great qualities of that king, but arguing that his character degenerated. Towards John alone Ralph is uniformly hostile; as a Cistercian and an adherent of the Mandeville family he could hardly be otherwise. Ralph refers in the Chronicon (s.a. 1091) to a book of visions and miracles which he had compiled, but this is no longer extant. He also wrote a continuation of Niger's chronicle, extending from 1162 to 1178 (printed in R. Anstruther's edition of Niger, London, 1851), and short annals from 1066 to 1223. The autograph manuscript of the Chronicon Anglicanum is to be found in the British Library (Cotton, Vespasian D. X). The same volume contains the continuation of Ralph Niger. The Chronicon Terrae Sanctae, formerly attributed to Ralph, is by another hand; it was among the sources on which he drew for the Chronicon Anglicanum. The so-called Libellus de motibus anglicanis sub rege Johanne (printed by Martène and Durand, Ampl. Collectio, v. pp. 871–882) is merely an excerpt from the Chronicon Anglicanum. This latter work was edited for the Rolls series in 1875 by Joseph Stevenson.
global_01_local_0_shard_00000017_processed.jsonl/3922
From Wikipedia, the free encyclopedia Jump to: navigation, search Type Private Industry Retail Founded 1987 Headquarters Warrendale, Pennsylvania Number of locations 1002- EOY 2013 Key people Bob Fisch; CEO Kim A. Reynolds; SVP-Merchandising Dirk Armstrong; SVP-Store Ops Keith McDonough, SVP-CFO Michael Holland; SVP-CIO Mark Chrystal; SVP-Planning, Allocation & Ecommerce Products Apparel Owner(s) Apax Partners rue21 Inc., formerly known as Pennsylvania Fashions Inc. (as well as $9.99 Stockroom, rue21) , is headquartered in the Pittsburgh suburb of Warrendale, Pennsylvania and is a specialty discount retailer of young men and women’s casual apparel and accessories. In 2013, Apax Partners, a global private equity firm, acquired the company by funds advised for $42.00 per share in cash.[1][2] In February 2002 Pennsylvania Fashions Inc., filed for Chapter 11 bankruptcy protection.[3] It was then that SKM emerged as the majority stakeholder three years after Cary Klein sold a 50% stake to the Stamford, Connecticut-based investment firm. At the time sales among the nearly 250 stores were thought to be between $180 and $200 million annually with approximately 1,800 employees. The company exited Chapter 11 as rue21 Inc. in May 2003 after undergoing voluntary reorganization.[4] It set out an ambitious plan to expand its 170 stores over the next five years. Their ability to expand into underserved markets is evident by the store growth from their 500th store in Harlingen, TX on July 23, 2009 through November 14, 2013, when they opened their 1000th store in Enid, OK. 1. ^ Apax Partners Completes Takeover of rue21 2. ^ Funds Advised by Apax Partners Complete Acquisition of rue21 6. ^ Weirton Daily Times. “rue21 expands distribution center” 27 June 2012. Web. 7. ^ [3], ecomm. External links[edit]
global_01_local_0_shard_00000017_processed.jsonl/3923
BitTorrent tracker From Wikipedia, the free encyclopedia   (Redirected from Torrent tracker) Jump to: navigation, search A BitTorrent tracker is a server that assists in the communication between peers using the BitTorrent protocol. In peer-to-peer file sharing a software client on an end-user PC requests a file, and portions of the requested file residing on peer machines are sent to the client, and then reassembled into a full copy of the requested file. The "tracker" server keeps track of where file copies reside on peer machines, which ones are available at time of the client request, and helps coordinate efficient transmission and reassembly of the copied file. The BitTorrent tracker is also, in the absence of extensions to the original protocol, the only major critical point, as clients are required to communicate with the tracker to initiate downloads. Clients that have already begun downloading a file communicate with the tracker periodically to negotiate faster file transfer with new peers, and provide network performance statistics; however, after the initial peer-to-peer file download is started, peer-to-peer communication can continue without the connection to a tracker. Trackers and indexers[edit] Public trackers[edit] Public or open trackers can be used by anyone by adding the tracker address to an existing torrent, or they can be used by any newly created torrent. The most popular are OpenBitTorrent, PublicBitTorrent and[1] The Pirate Bay operated one of the most popular public trackers until disabling it in 2009 amid legal trouble, opting to offer only magnet links.[2] Private trackers[edit] A private tracker is a BitTorrent tracker that restricts use, by requiring users to register with the site. The method for controlling registration used amongst many private trackers is an invitation system, in which active and contributing members are given the ability to grant a new user permission to register at the site.[3] Legal issues[edit] Legal uses[edit] Improving torrent reliability[edit] Multi-tracker torrents[edit] Trackerless torrents[edit] Vuze (formerly Azureus) was the first BitTorrent client to implement such a system through the distributed hash table (DHT) method. An alternative and incompatible DHT system, known as Mainline DHT, was later developed and adopted by the BitTorrent (Mainline), µTorrent, Transmission, rTorrent, KTorrent, BitComet, and Deluge clients. Current versions of the official BitTorrent client, µTorrent, BitComet, Transmission and BitSpirit all share compatibility with Mainline DHT. Both DHT implementations are based on Kademlia. As of version, Vuze (formerly Azureus) also supports Mainline DHT in addition to its own distributed database through use of an optional application plugin [MainlineDHT Plugin]. This potentially allows the Vuze (formerly Azureus) client to reach a bigger swarm. IPv6 support[edit] One of the options for this HTTP based tracker protocol is the "compact" flag. This flag specifies that the tracker can compact the response by encoding IPv4 addresses as a set of 4 bytes (32 bits). IPv6 though are 128 bits long, and as such, the "compact" flag breaks IPv6 support. Trackers which support IPv6 clients thus currently ignore the compact flag. There have been mentions of a "compact6" flag,[by whom?] but this mechanism has not been adopted yet by the various BitTorrent clients. See BitTorrent tracker software for a list of BitTorrent tracker software. BitStorm[5] is a small tracker written in PHP which does not require a database and runs on any PHP compatible web server. Anybody with even a little technical knowledge can use it to add a tracker functionalty to their webserver. Hefur[6] is a standalone BitTorrent tracker written in C++, under the MIT license. See also[edit] 1. ^ Top BitTorrent Trackers Serve 30 Million Peers Across 4.5 Million Torrents. TorrentFreak. 6 July 2013. Retrieved 27 October 2013. 2. ^ "Worlds most resiliant tracking". November 17, 2009. Retrieved February 18, 2012. "... Now that the decentralized system for finding peers is so well developed, TPB has decided that there is no need to run a tracker anymore, so it will remain down! ..."  3. ^ Jones, Ben (15 January 2008). "Trading BitTorrent Tracker Invites, Commodity or Curse?". TorrentFreak. Retrieved 23 October 2010.  4. ^ 5. ^ 6. ^ External links[edit]
global_01_local_0_shard_00000017_processed.jsonl/3924
Werner von Fritsch From Wikipedia, the free encyclopedia Jump to: navigation, search Werner Freiherr von Fritsch Bundesarchiv Bild 183-R16862, Werner von Fritsch.jpg Werner Freiherr von Fritsch, 1932 Born (1880-08-04)4 August 1880 Benrath, German Empire Died 22 September 1939(1939-09-22) (aged 59) Warsaw, Poland Buried at Invalidenfriedhof Berlin Allegiance German Empire German Empire (to 1918) Germany Weimar Republic (to 1933) Nazi Germany Nazi Germany Years of service 1898–1939 Rank Generaloberst Commands held 1st Cavalry Division 3rd Infantry Division Awards Pour le Mérite Iron Cross Werner Thomas Ludwig Freiherr von Fritsch (4 August 1880 – 22 September 1939) was a prominent Wehrmacht officer, member of the German High Command, and the second German general to be killed during World War II. Early life[edit] Fritsch was born in Benrath in the Rhine Province of the German Empire. He entered the Imperial German Army (Reichsheer) at the age of 18, and won the attention of the German General Staff with his superior military qualities. In 1901, at the age of 21, he transferred to the Prussian Military Academy (Preußische Kriegsakademie). As a First Lieutenant (Oberleutnant) in 1911, he was appointed to the General Staff. During World War I, he gradually increased in importance and received, among other awards, the Iron Cross First Class and a black wound badge for a head wound he received while visiting the front lines. Interwar period[edit] During the interwar period, Fritsch served in the Weimar Republic's Armed Forces (Reichswehr). In 1924, Fritsch wrote a letter to Joachim von Stülpnagel where he expressed his hatred of democracy and his hope that General Hans von Seeckt would carry out a putsch to establish a military dictatorship.[1] Fritsch declared he was totally opposed to seeing another "black, red and gold cur" as Chancellor and wrote that he believed that Germany was being ruined by "the propaganda of the Jewish papers".[2] Fritsch ended his letter with a list of all whom he hated: "For in the last resort Ebert, pacifists, Jews, democrats, black, red, and gold, and the French are all the same thing, namely the people who want to destroy Germany. There may be small differences, but in the end it all amounts to the same."[3] The German historian Wolfram Wette wrote that Fritsch had come close to high treason with his letter as Fritsch had taken the Reichswehreid oath to defend democracy, and in calling for a putsch to destroy the democracy that Fritsch had taken an oath to defend was an act of "...extreme disloyalty to the republic to which he had sworn an oath".[4] Fritsch was heavily involved in the secret rearmament of the 1920s, in which Germany sought to evade the terms of Part V of the Treaty of Versailles, which had essentially disarmed Germany, limiting the country's Army to 100,000 soldiers, plus destroying all its aircraft and tanks.[5] As such, Fritsch who worked closely with the Soviet Union in secret rearmament favored a pro-Soviet foreign policy, and had an extreme hatred for Poland.[5] In 1928, Fritsch began work on the plan that became Fall Weiss, the invasion of Poland in 1939.[5] He was promoted to Major-General (Generalmajor) in 1932 by Kurt von Schleicher, who regarded him as a promising young officer.[6] Schleicher then assigned Fritsch and Gerd von Rundstedt the duty of carrying out the Rape of Prussia that saw the Reichswehr oust the Social Democratic government of Prussia.[7] After the Nazis came to power in 1933, Fritsch was a warm supporter of the new regime, which he saw as a radical force that, provided it was influenced by people like himself, would be a force for the good.[8] Wette wrote that as Fritsch was a member of "...group of hardened anti-Semitics" in the officer corps, the anti-Semitism of Adolf Hitler was one of Fritsch's most important reasons for supporting the Nazi regime.[9] Fritsch was promoted to Commander-in-Chief of the Army (Oberkommando des Heeres, or OKH), in February 1934 partly because Hitler saw him as a supporter of his regime and partly because the Defence Minister Werner von Blomberg valued Fritsch for his professionalism.[10] In February 1934, when Blomberg ordered that all soldiers who might be considered Jewish (that is, had at least Jewish parent or grandparent who converted; long before the Nazis, the Reichswehr did not accept Jews) be given dishonorable discharges, Fritsch made no objection and carried out the order.[11]According to William Shirer in The Rise and Fall of the Third Reich, Fritsch played a pivotal role when he balked at Hitler's initial overture to the Army to succeed ailing President von Hindenburg upon his death. Fritsch ultimately betrayed the officer corps to the Führer by agreeing to this demand after consulting with his generals.[12] On 31 December 1934 Fritsch announced that it "goes without saying that an officer [should seek] a wife only within Aryan circles" and that any officer who married a Jewish woman would be dishonorably discharged at once.[13] He was named Commander-in-Chief of the Army in 1935. In late 1934-early 1935, Fritsch and Blomberg successfully pressured Hitler into rehabilitating the name of the assassinated General von Schleicher, claiming that as officers they could not stand the press attacks portraying him as a traitor working for France.[14] Through Fritsch supported the Nazi regime, he was not friendly towards attempts to create rivals to the Army. In particular, he grew increasingly hostile toward the SS, which he saw as a rival to the Army. Shirer recalled hearing Fritsch make sarcastic remarks about the SS, as well as several Nazi leaders from Hitler on down, at a parade in Saarbrücken. He was also worried that Hitler would cause a war with the Soviet Union; like most of his fellow officers, he had supported the Weimar liaison with Moscow. Wette wrote that "It is indisputable that the conservative and nationalistically minded General von Fritsch affirmed the National Socialist state, and he accepted Hitler as a dictator fully and completely. Given this compatibility of outlook, one may doubt whether Fritsch's pronounced anti-Semitism reflected "political naïveté" as the historian Klaus-Jürgen Müller has asserted".[15] In 1936, when Blomberg was promoted to Field Marshal, Fritsch received promotion to Blomberg's vacated rank of Colonel General (Generaloberst). Fritsch was among the officers present at the Hossbach Conference in 1937 where Hitler announced that he wanted to go to war as early as 1938. He was very critical of this demand, as he knew the army was not ready. The Blomberg-Fritsch Affair[edit] Heinrich Himmler and Hermann Göring—inspired by the resignation of Blomberg—accused the unmarried Fritsch of engaging in homosexual activity. Fritsch had never been a womaniser and had preferred to concentrate on his army career. He was forced to resign on 4 February 1938. His replacement—Walther von Brauchitsch—was recommended for the post by Fritsch. Adolf Hitler took advantage of the situation through the replacement of several generals and ministers with Nazi loyalists, which strengthened his control of the German Armed Forces (Wehrmacht). It soon became known that the charges were false, and an honour court of officers examined the Blomberg-Fritsch Affair, although it was presided over by Göring himself. The successful annexation of Austria into Greater Germany (Anschluss) of 12 March silenced all critics of Hitler, Göring and Himmler. Fritsch was acquitted on 18 March, but the damage to his name had been done. Following his acquittal, Fritsch attempted to challenge SS leader Heinrich Himmler to a duel. Fritsch composed a formal challenge and reportedly practiced his pistol skills in his free time, of which he had plenty as an officer without a command. The letter was given to General Gerd von Rundstedt for delivery, but Rundstedt, seeking to bridge the distrust between the Wehrmacht and SS, ultimately convinced Fritsch to abandon the idea. (It is unlikely the encounter could have come about regardless, as Hitler had forbidden highly placed party members, such as Himmler, from dueling.)[16] Despite the false charges, Fritsch remained loyal to the Nazi regime, and maintained his firmly held belief Germany was faced with an international Jewish conspiracy out to ruin the Reich.[17] After the Kristallnacht pogrom of November 1938, Fritsch wrote in a letter to a friend on 22 November 1938 that "Of course the battle with international Jewry has now officially began, and as a natural consequence that will lead to war with England and the United States, the political bastions of the Jews".[18] In another letter to his friend, the Baroness von Schutzbar on 11 December 1938 Fritsch wrote: "It is very strange that so many people should regard the future with growing apprehension, in spite of the Führer's indisputable successes in the past...Soon after the War, I came to the conclusion that we have to be victorious in three battles, if Germany were again to be powerful:. (1) The battle against the working class. Hitler has won this; (2) Against the Catholic Church, perhaps better expressed as Ultramontanism and (3) Against the Jews. We are in the midst of these battles, and the one against the Jews is the most difficult. I hope everyone realizes the intricacies of this campaign."[19] Fritsch told Ulrich von Hassell—when the latter tried to involve him in an anti-Nazi plot—that Hitler was Germany's destiny, and nothing could be done to change that fact.[20] World War II[edit] Commemorative stone placed by Germans in the spot where Werner Freiherr von Fritsch died. Just before the outbreak of World War II, Fritsch was recalled, and chose to personally inspect the front lines as the "Honorary Colonel of the 12th Artillery Regiment"[21] during the Invasion of Poland, a very unusual activity for someone of his rank. On 22 September 1939, in Praga during the Siege of Warsaw, a Polish bullet (either a machine gun or a sharpshooter) tore an artery in his leg.[22] Lieutenant Rosenhagen, adjutant to Fritsch and an eyewitness to his death, wrote in his original, official report: "[...] In this moment the Herr Generaloberst received a gunshot in his left thigh, a bullet tore an artery. Immediately he fell down. Before I took off his braces, the Herr Generaloberst said: "please leave it", lost consciousness and died. Only one minute passed between receiving gunshot and death."[22] Werner von Fritsch was the second German general to be killed in combat in World War II—the first being Generalmajor der Ordnungspolizei and SS Brigadeführer Wilhelm Fritz von Roettig (KIA on 10 September 1939 (around 14:15) near Opoczno, Poland). As Fritsch was the second general to be killed in action, the event was closely examined. The official verdict was that he deliberately sought death. Fritsch received a ceremonial state funeral four days later in Berlin. William Shirer covers the event in his diary entry dated 26 September 1939. "They buried General von Fritsch here this morning. It rained, it was cold and dark – one of the dreariest days I can remember in Berlin. Hitler did not show up, nor Ribbentrop, nor Himmler, though they all returned to Berlin from the front this afternoon." The "Freiherr von Fritsch Kaserne" (barracks) in Darmstadt was named after Fritsch after his death. It was later combined with the adjoining Cambrai Kaserne. The facilities were combined when the United States Army occupied Darmstadt in 1945. The Cambrai-Fritsch Kaserne was scheduled to be turned over to the German government in about March 2009.[23] Regarding personal names: Freiherr was a title, translated as Baron, not a first or middle name. Before 1919 preceding the first name, former titles are with people alive after 1919 dependent parts of the surname, thus preceding the main surname and not to be translated. The female forms are Freifrau and Freiin. 1. ^ Wette, Wolfram The Wehrmacht Cambridge: Harvard University Press, 2006 page 83. 5. ^ a b c Wheeler-Bennett, John The Nemesis of Power, London: Macmillan, 1967 page 302. 6. ^ Wheeler-Bennett, John The Nemesis Power, London: Macmillan, 1967 page 302. 7. ^ Wheeler-Bennett, John The The Nemesis of Power, London: Macmillan, 1967 page 302. 8. ^ Wheeler-Bennett, John The Nemesis of Power, London: Macmillan, 1967 page 293. 9. ^ Wette, Wolfram The Wehrmacht Cambridge: Harvard University Press, 2006 page 84. 10. ^ Wheeler-Bennett, John The Nemesis of Power, London: Macmillan, 1967 page 303. 11. ^ Wette, Wolfram The Wehrmacht Cambridge: Harvard University Press, 2006 page 72. 12. ^ Shirer, William (1960). The Rise and Fall of the Third Reich. Simon and Schuster. pp. 214–215.  14. ^ Wheeler-Bennett, John The Nemesis of Power, London: Macmillan, 1967 page 336. 15. ^ Wette, Wolfram The Wehrmacht Cambridge: Harvard University Press, 2006 page 85. 16. ^ Deutsch, Harold. Hitler and His Generals: The Hidden Crisis. January – June 1938. Minneapolis: University of Minnesota, 1974. p 365-68. 17. ^ Wheeler-Bennett, John The Nemesis of Power, London: Macmillan, 1967 page 494. 18. ^ Wheeler-Bennett, John The Nemesis of Power, London: Macmillan, 1967 page 433. 19. ^ Wheeler-Bennett, John The Nemesis of Power, London: Macmillan, 1967 pages 379–380. 20. ^ Wheeler-Bennett, John The Nemesis of Power, London: Macmillan, 1967 page 380. 21. ^ Barnett, Hitler's Generals, p. 40 22. ^ a b DER SPIEGEL 34/1948 – 21 August 1948, page 18 – original official protocol written by Leutnant Rosenhagen, his adjutant and eyewitness 23. ^ DoD announces more Germany closings (from the Army Times website) Further reading[edit] • Deutsch, Harold C. Hitler and his generals: the hidden crisis, January–June 1938 (1974), pp 78–215; the standard scholarly monograph on 1938 crisis excerpt and text search • Faber, David, Munich, 1938: Appeasement and World War II (2008) pp 46–75 • Barnett, Correlli, ed., Hitler's Generals Grove Weidenfeld, New York, NY, 1989. • Read, Anthony, The Devil's Disciples: The Lives and Times of Hitler's Inner Circle Pimlico, London, 2003, 2004. • Berlin Diary – Page 179, William Shirer. • Wheeler-Bennett, Sir John, The Nemesis of Power: The German Army in Politics 1918–1945 Palgrave Macmillan, London, 1953, 1964, 2005.
global_01_local_0_shard_00000017_processed.jsonl/3925
Wieland Wagner From Wikipedia, the free encyclopedia Jump to: navigation, search Wieland Wagner W. Wagner, U. Boese Bayreuth 1958.jpg Ursula Boese and Wieland Wagner (1958) Born (1917-01-05)5 January 1917 Bayreuth, Germany Died 17 October 1966(1966-10-17) (aged 49) Munich, Germany Cause of death Lung cancer Residence Haus Wahnfried, Bayreuth Nationality German Occupation Opera director Known for Member of Wagner family and Opera director Children Iris, Wolf-Siegfried, Nike and Daphne Parents Siegfried Wagner and Winifred Wagner Relatives Richard Wagner, Friedelind Wagner, Wolfgang Wagner, Verena Wagner Wieland Wagner (5 January 1917 – 17 October 1966) was a German opera director. Wieland Wagner was the elder of two sons of Siegfried and Winifred Wagner, grandson of composer Richard Wagner, and great-grandson of composer Franz Liszt through Wieland's paternal grandmother. In 1941, he married the dancer and choreographer Gertrud Reissinger. They had four children: Iris (b. 1942), Wolf Siegfried (b. 1943), Nike (b. 1945) and Daphne (b. 1946).[1] Late in his life, Wieland had a love affair with the much younger Anja Silja, one of the singers he had recruited for Bayreuth.[2] In 1965, he was awarded the Pour le Mérite. He died of lung cancer in October 1966. Wieland Wagner is credited as an initiator of Regietheater through ushering in a new modern style to Wagnerian opera as a stage director and designer, substituting a symbolic for a naturalist staging and focusing on the psychology of the drama. Wieland began his directorial career before World War II, working on operas by his father and grandfather. His innovative approach did not become clear until after the war. His design for the 1937 Bayreuth production of Parsifal, for example, was conservative, though it did have film projections during the transformation scenes. When the Bayreuth Festival reopened after the war in 1951, Wieland and his brother Wolfgang became festival directors in place of their mother, whose association with Adolf Hitler had made her unacceptable. (Wieland's own past was, however, suppressed.) The revolutionary productions evoked extreme views both for and against.[3] Wieland's long-lasting 1951 production of Parsifal included many features with which he later would be identified. Post-war austerity and his own interest - influenced by Adolphe Appia - in lighting effects led to the use of round minimalist sets lit from above.[4] Wieland's first post-war Siegfried represented Fafner with a 30 ft statue of a dragon belching fire. In his later production of the opera he instead used pairs of giant eyes, which were picked out in turn from the back-projected forest, to suggest the movements of a huge creature stretching halfway down the Bayreuth hill. Wieland's 1956 "Mastersingers without Nuremberg" was the symbolic culmination of his campaign to move away from naturalism in Wagner production with the medieval town represented by the cobbled shape of a street and, above the stage, a ball suggestive of a flowering tree.[5] Wieland's minimalism extended beyond the stage furniture and props. The performer of Gunther, for example, was expected to sing leaning forward in Act 1 of Götterdämmerung until he felt his authority challenged by Hagen and sat up straight. It is hard to imagine a greater contrast with traditional operatic acting. Although Wieland is best remembered for productions of his grandfather's works at Bayreuth, he was often asked to work elsewhere in Germany and Europe. For example, he produced Tannhäuser and Der fliegende Holländer in Copenhagen, the Ring in Naples, Stuttgart and Cologne, and Beethoven's Fidelio in Stuttgart, London, Paris and Brussels.[6] Wieland's wife Gertrud collaborated with him to develop his interpretations of the operas and devise stage movement for the solo singers and chorus. Trained in modern dance, she is credited in the Bayreuth programs with choreography for Parsifal, Tannhäuser, and Die Meistersinger von Nürnberg, but in fact she assisted him in all of his Bayreuth productions and many that he staged elsewhere, sometimes taking rehearsals on her own. This was not revealed until after Wieland's death, and Wolfgang Wagner claims in his memoirs that it's not true.[7] But biographer Renate Schostack recounts many particulars of this collaboration,[8] as does the daughter of Wieland and Gertrud, Nike Wagner. [9] The great love of his life was the German soprano Anja Silja. Only twenty years old, she took over as Senta in 1960 in Bayreuth when Leonie Rysanek cancelled, and created a sensation. Blessed with a strong, agile, youthful and gleaming voice, and with an extraordinary talent for acting, she embodied Wieland's ideals. She sang Elsa in Lohengrin, Elisabeth and Venus in Tannhäuser and Eva in Meistersinger at Bayreuth. Elsewhere, he cast her as Isolde, Brünnhilde, Richard Strauss's Elektra, and Salome, and Alban Berg's Lulu and Marie in Wozzeck. She even sang Desdemona in Verdi's Otello in Wieland's production. Among the other celebrated singers who worked with Wieland were Hans Hotter, George London, Dietrich Fischer-Dieskau, Eberhard Wächter, Thomas Stewart, Theo Adam, Josef Greindl, Jerome Hines, Wolfgang Windgassen, Ramón Vinay, Jess Thomas, Jon Vickers, Martha Mödl, Astrid Varnay, Régine Crespin, Rita Gorr, Leonie Rysanek, Birgit Nilsson, Jean Madeira, Grace Hoffman, Franz Crass, Victoria de los Ángeles, Grace Bumbry, Christa Ludwig, Martti Talvela, Carlos Alexander, Isabel Strauß, James King, Claude Heater, Ticho Parly, Dame Gwyneth Jones, and Fritz Wunderlich. Wieland wanted great actors, but he also wanted the singers to execute his plans faithfully. Conductors with whom he collaborated were Hans Knappertsbusch, Clemens Krauss, André Cluytens, Pierre Boulez, Herbert von Karajan, Erich Leinsdorf, Heinz Tietjen, Lorin Maazel, Wolfgang Sawallisch, Karl Böhm, Bruno Maderna, and Thomas Schippers. Wieland Wagner's life and work are discussed in Tony Palmer's 2011 film, The Wagner Family. Associations with Hitler and Nazism[edit] Winifred Wagner's close friendship with Hitler meant that, as a teenager and young man, Wieland knew the dictator as "Uncle Wolf".[10] In 1938 he joined the Nazi Party on Hitler's personal insistence. From September 1944 to April 1945 he held a sinecure at the Institut für physikalische Forschung in Bayreuth, founded by his brother-in-law Bodo Lafferentz, which was a satellite of the Flossenbürg concentration camp devoted to research and development of an improved guidance system of the V-2 rocket bomb. This enabled him to avoid being called into the Wehrmacht for the final defense of Germany. At the Institut he built models of stage sets and developed new stage lighting systems with the assistance of prisoner Hans Imhof, an electrical technician. At his denazification hearing in Bayreuth, on December 10, 1948, he was classified as a "Mitläufer" (follower), the fourth and lowest category, and fined DM100 plus the court costs.[11] • Wagner: Tristan und Isolde (Nilsson, Windgassen, Töpper, Andersson, Hotter; Boulez, 1967) [live] Bayreuth Festival at Osaka International Festival • Wagner: Die Walküre (Silja, Dernesch, Thomas, Adam, Nienstedt, Hoffmann; Schippers, 1967) [live] Bayreuth Festival at Osaka International Festival • Berg: Lulu (Silja, Alexander, Holm, Cervena, Ferenz, Wildermann; Leitner, 1968) Stuttgart Staatsoper See also[edit] • Wieland Wagner: The Positive Sceptic, by Geoffrey Skelton, New York: St. Martin's Press, 1971. • Das Aussenlager Bayreuth des KZ Flossenbürg : Wieland Wagner und Bodo Lafferentz im "Institut für physikalische Forschung", by Albrecht Bald and Jörg Skriebeleit, Bayreuth: Rabenstein, 2003. Further reading[edit] • Wessling, Berndt W., Wieland Wagner: Der Enkel. Cologne: Tongen Musikverlag, 1997. • Kapsamer, Ingrid, Wieland Wagner: Wegbereiter und Weltwirkung, Salzburg: Styria Books, 2010. • Schostack, Renate, Hinter Wahnfrieds Mauern: Gertrud Wagner, Ein Leben, Hamburg: Hoffmann und Campe Verlag, 1997. • Wagner, Nike: The Wagners: The Dramas of a Musical Dynasty. Princeton University Press, 1998. 1. ^ The Wagner Family tree (in German) 2. ^ Interview: soprano Anja Silja | | Guardian Unlimited Arts 3. ^ Twilight of the Gods - TIME 4. ^ (Wagner Operas.Com) 5. ^ Wagner Operas - Productions - Die Meistersinger, 1956 Bayreuth 6. ^ Listings of Wieland's productions - in Spanish. 7. ^ [Wolfgang Wagner, Acts, London: Weidenfeld & Nicolson 1994, pp. 112-13] 8. ^ [in Hinter Wahnfrieds Mauern: Gertrud Wagner, ein Leben] 9. ^ [in The Wagners: The Dramas of a Musical Dynasty] 10. ^ Richard Wagner News - The New York Times 11. ^ Bald, A and J Skriebeleit, Das Aussenlager Bayreuth des KZ Flossenbürg : Wieland Wagner und Bodo Lafferentz im "Institut für physikalische Forschung." External links[edit] • Wieland Wagner: New Bayreuth at Wagneroperas.com includes pictures of Wieland's Bayreuth productions. • [1] is a Spanish site listing Wieland's productions. • [2] YouTube: An excerpt from Wieland Wagner's production of Die Walküre, with Anja Silja and Theo Adam (1967).
global_01_local_0_shard_00000017_processed.jsonl/3927
Take the 2-minute tour × Consider a company called: The Association of Examples Ltd. When you refer to this company, should you have to capitalize "the" when it's mid-sentence and would have been used even if it wasn't in the name? It looks odd to me: In other news, The Association of Examples announced that... Sarah is the founder of The Association of Examples and has... But I imagine it's the correct way. For the grammar-conscious, why or why not? To give you context, I am asking also when branding ones own company like that. The Economist did it (as did Fitzgerald for The Great Gatsby) and Wikipedia authors adhere, but I can imagine it can cause confusion. share|improve this question It looks horrible. I ignore them and capitalize correctly, which means leaving the caps off articles mid-sentence. –  tchrist Jul 15 '13 at 22:20 "The Great Gatsby" wouldn't be so great without the definite article. –  Kris Jul 18 '13 at 6:25 add comment 3 Answers The Guardian Style Guide gives the following: [Lowercase] for newspapers (the Guardian), magazines (the New Statesman), pubs (the Coach and Horses), bands (the Black Eyed Peas, the Not Sensibles, the The), nicknames (the Hulk, the Red Baron), and sports grounds (the Oval). [Uppercase] for books (The Lord of the Rings), films (The Matrix), poems (The Waste Land), television shows (The West Wing), and placenames (The Hague) I think these things are convention more than anything else. Worth noting that they decide on the format 'The Lord of the Rings' rather than 'The Lord Of The Rings'. share|improve this answer Good source — so which does a company fall under? –  Baumr Jul 16 '13 at 8:30 Ever wondered why 'The Lord of the Rings' rather than 'The Lord Of The Rings'? Not idiosyncracy, not chance. –  Kris Jul 18 '13 at 6:28 add comment Strictly, this depends on whether the "The" is formally part of the company's name (e.g. its registered name). If it is part of the formal name, then it should be capitalised as part of the proper noun. If it is not part of the formal name, then it should not be capitalised. [Your 'bonus' question is merely asking for opinions ("is it wise ...?") and is strictly off-topic on ELU.] share|improve this answer I clarified the bonus question part –  Baumr Jul 16 '13 at 8:33 add comment I almost never capitalize the 'the' in something like your Association of Examples. It looks awkward, and it's really not even part of the name. For instance, you wouldn't refer to a medical study as "a the Centers for Disease Control study." As far as branding, I think a capitalized 'The' is a subtle way to make your brand name stand out, but it carries with it a certain pretension, as well as a certain... conservatism, for lack of a better word. It seems to hearken back to the 19th century, somehow. share|improve this answer This is a statement of opinion, not really a factual answer. –  MετάEd Jul 16 '13 at 1:33 Can there really be a factual answer to a question like this? Like the answer above mine says, this is, to some extent, a matter of convention. –  Ben C. Jul 16 '13 at 1:44 The point of the site is to provide expert answers to questions using facts, reliable sources, and specific expertise. Questions which purely invite opinion are generally taken offline with a close reason of: "Primarily opinion-based. Many good questions generate some degree of opinion based on expert experience, but answers to this question will tend to be almost entirely based on opinions, rather than facts, references, or specific expertise." –  MετάEd Jul 16 '13 at 1:52 I'll keep that in mind. –  Ben C. Jul 16 '13 at 1:59 @MετάEd, I don't see why there can't be reliable sources for this question — I've clarified the bonus part –  Baumr Jul 16 '13 at 8:33 add comment Your Answer
global_01_local_0_shard_00000017_processed.jsonl/3928
You are viewing this Taxon as classified by: IUCN threat status: Least Concern (LC) Read full entry Range Description This species has a circumpolar distribution, being found in Antarctica, the South Sandwich Islands (Islas Sandwich del Sur), the South Orkneys, South Shetland and South Georgia (Georgia del Sur), Bouvet Island (to Norway) and the Balleny Islands (del Hoyo et al. 1992). © International Union for Conservation of Nature and Natural Resources Source: IUCN Belongs to 1 community
global_01_local_0_shard_00000017_processed.jsonl/3956
Take the 2-minute tour × My bodybugg gadget actually seems to think that I'm burning more calories when I'm in the sauna, but I'm kinda skeptical. Does sauna time really accomplish anything? share|improve this question add comment 1 Answer up vote 6 down vote accepted I would be skeptical as well. Although there may be an increased metabolic load to cool the body, it seems to me that the readings are more likely to be related to measurement error of the Bodybugg. According to the company, the Bodybugg contains four sensors: 1. Accelerometer 2. Heat Flux (amount of heat being dissipated by the body) 3. Galvanic Skin Response (skin conductivity) 4. Skin Temperature The heat flux and skin temperature sensors are likely calibrated for room temperature and could be thrown off by the relatively high ambient temperature of a sauna. The GSR sensor could be affected by the humidity in the sauna (wet skin is more conductive than dry skin). share|improve this answer Are you sure about burning fewer calories in a sauna? The ideal body temperature is 98F, and the human body will work rather hard to stay as close to that as possible. It strikes me that it would be far less difficult to warm oneself from ~70F ambient temperature to 98F internal than it would be to cool oneself from ~150F (or more!) ambient temperature to 98F internal. I'd also be skeptical about burning mass calories simply by being in a sauna, but even the act of sweating has metabolic processes associated with it. –  YYY May 16 '11 at 22:26 @YYY good point, I think the heart rate does increase in order to circulate blood faster to cool down. I'm not sure how much this or sweating would translate to in terms of actual calories burned... I don't think that affects the error vectors for the heat-related sensors above, but my first paragraph probably needs to be edited. –  Greg May 16 '11 at 22:49 While working out requires a higher heart rate, that doesn't necessarily mean that a higher heart rate means you're working out! Sure you'll burn some additional calories, while sitting in the sauna, but it won't be anything significant unless you work out in it. –  Ivo Flipse May 16 '11 at 23:01 add comment Your Answer
global_01_local_0_shard_00000017_processed.jsonl/3977
Posts: 12 Registered: ‎03-07-2012 Message 21 of 21 (110 Views) Re: 2011 Type Libraries Breaks 2010 03-08-2012 11:26 PM in reply to: dhorger hi,  do you have the api  using the com elements to  secondary development for autocad. dhorger wrote: Got it! I was trying to load the COM elements instead of the dll's directly. Loading the dll's worked! Thanks, Norman! Please use plain text. You are not logged in. Need installation help? Ask the Community
global_01_local_0_shard_00000017_processed.jsonl/3978
Update DIV when typing in input field Results 1 to 3 of 3 Thread: Update DIV when typing in input field 1. #1 Join Date Aug 2005 Update DIV when typing in input field I have an input field, and when I type in it, I want a div to be updated at the same time. I have a script that works this way, but I've just copied it, and it uses very much code. So I want a very simple one to work. Here's what I've got so far: function goCheck() { var u_name = document.getElementById('username').value; if (u_name!="") { document.getElementById('output').innerHTML = "<h3>Please Wait, getting results....</h3>"; var url = 'test1.php'; var pars = 'output=normal&username='+u_name+''; var myAjax = new Ajax.Updater( 'output', url, { method: 'get', parameters: pars, onlyLatestOfClass:"htmlfetcher" }); <input type="text" id="username" size="25" onkeyup="goCheck();"> <span id="output"><h3><font color="#D55121" face="arial">The usename will be here</font></h3></span> What should I do to make this work? Thanks in advance 2. #2 PeejAvery's Avatar PeejAvery is offline Super Moderator Power Poster Join Date May 2002 Re: Update DIV when typing in input field Take a look at this. It explains it much simpler. 3. #3 Join Date Mar 2007 Re: Update DIV when typing in input field Where are the class "Ajax.Updater"?? Posting Permissions • You may not post new threads • You may not post replies • You may not post attachments • You may not edit your posts Azure Activities Information Page Windows Mobile Development Center Click Here to Expand Forum to Full Width HTML5 Development Center
global_01_local_0_shard_00000017_processed.jsonl/3979
I'm using this javascript code, per Mozilla docs, but it's not working in Mozilla, just in Chrome and Opera (don't know if it's working in ie 10--FormData is supposedly supported in IE version 10--but I'm only really concerned about Firefox). var data = new FormData(document.getElementById("uploadform")); var selected_file = document.getElementById('file').files[0]; data.append('file-0', selected_file); firefox also causes server error on the ajax file upload: [Wed Jun 05 21:34:53 2013] [error] [client ::1] PHP Notice: Undefined index: file-0 in /home/jeff/public/website.com/public/upload.php on line 11, referer: http://localhost/ I have no idea why "files" does not seem to be working. I've posted on Mozilla support forum with no answers, and on stack overflow with one attempted answer. Here's the relevant Mozilla docs page: Using FormData Objects. I've tested firefox 21, 24 nightly, and 10 on a linux machine, and tested firefox 21 on a windows machine, all with the same results.
global_01_local_0_shard_00000017_processed.jsonl/3981
SMplayer and Diablo 3...sound cuts out All Gurus once were Newbies Forum rules Before you post please read this SMplayer and Diablo 3...sound cuts out Postby venom104 on Wed Aug 22, 2012 5:44 pm Ok here is my story. I play diablo 3 quite a bit and it works great...the problem is whenever I am playing something in smplayer and open Diablo 3...the entire sound goes out. I don't understand why this happens. It ONLY happens with smplayer and Diablo 3. What do I do to solve the problem? Level 1 Level 1 Posts: 47 Joined: Sun Sep 05, 2010 11:58 am Linux Mint is funded by ads and donations. Return to Newbie Questions Who is online Users browsing this forum: No registered users and 3 guests
global_01_local_0_shard_00000017_processed.jsonl/3986
View Full Version : App crash Jul 28, 2010, 12:22 PM I'm working on a class project (iPhone application), and I'm trying to troubleshoot a crash. I'm taking a randomly generated number (Integer) and re-formatting it as a NSString to send through my outlet to an UILabel field. It works twice, then crashes the app. Thoughts? int randomIntergerA = 1+ arc4random() %(100); statusTextA.text = [NSString stringWithFormat:@"%d",randomIntergerA]; Jul 28, 2010, 12:38 PM It works twice, then crashes the app. Thoughts? What does the crash log say is the cause? Jul 28, 2010, 01:22 PM Thank you for responding. I'm new to the mac world. Where would I find it in Xcode? Jul 28, 2010, 02:00 PM Since you're new, you should probably start here: Debugging Applications (http://developer.apple.com/iphone/library/documentation/xcode/conceptual/iphone_development/130-Debugging_Applications/debugging_applications.html)
global_01_local_0_shard_00000017_processed.jsonl/4007
RSS 4 projects tagged "OS Independent" Download No website Updated 17 Oct 2003 pysync Pop 173.70 Vit 3.19 Download Website Updated 17 Jan 2010 python-fchksum Pop 53.83 Vit 3.59 python-fchksum is a module used to find checksums of files (or stdin). It supports md5, crc32, cksum, bsd-style sum, and sysv-style sum. The advantage of using fchksum over the Python md5 and zlib(.crc32) modules is both ease of use and speed. You only need to tell it the filename, and the work is done by C code. Download Website Updated 25 Feb 2009 picurl Pop 47.07 Vit 2.19 Picurl is a client for uploading, downloading, querying, and sorting files on remote stores, like HTTP directory listings, HTML pages, FTP servers, or Flickr photo albums. The focus of this project is making tagging and dealing with metadata as easy as possible. Download No website Updated 13 Feb 2010 Pop 29.34 Vit 2.01 is a Python module for accessing the interface exposed by the uTorrent Web UI. Current features include getting and setting uTorrent parameters, viewing information and statistics on torrents and files, and setting torrent state and file priorities. Small example utilities are included. Note that the download file is a 7zip archive, not a PNG image. Project Spotlight The Horde calendar application. Project Spotlight BugHotel Reservation System A hotel booking and accounting package.
global_01_local_0_shard_00000017_processed.jsonl/4009
Army Orders Bible Verses on Scopes Removed The Army has put out instructions that Bible verses etched into scopes on military rifles by the company that produces them be removed. Todd Starnes, who is paid by Fox News to turn every molehill he finds into a mountain, is predictably outraged. Here’s my favorite part: Trijicon did not return phone calls seeking comment. A company spokesman told ABC News in 2010 that the inscriptions had always been on the sights and there was nothing wrong or illegal with including them. The company told ABC they believed the issue had been raised by a group that is “not Christian.” Yeah, that’s relevant. Imagine that, a non-Christian having an opinion on something, and a correct one at that. 26 comments on this post. 1. Kevin: Seriously, if I were a Christian, I’d be outraged that bible verses were put on an instrument of death. That Jesus fellow never said anything like “pop a cap in his ass”, or “make sure you account for crosswinds when sighting your scope — then shoot your target in the head.” These people are seriously fucking scary. 2. whirligig: I wonder why they didn’t choose EXO 20:13. 3. Larry: Book of Winchester, V30.06: And thus Jesus did say, “Yea, and ye shall bust a cap in thy brother’s ass”. 4. Gregory in Seattle: Because weapons etched with Bible references could NEVER offend the Muslims who already see US troops as imperialist Crusaders. 5. d.c.wilson: John 8:12 King James Version (KJV) 2nd Corinthians 4:6 I guess in these cases “light” is a poetic way of saying “eat hot lead motherfucker!” 6. Kevin: 7. Didaktylos: I seem to recall that when it was decided to name one of the Los Angeles-class nuclear submarines after Corpus Christi, Texas, the official name of the vessel was “City of Corpus Christi” in order to forestall possible protests from the Catholic Church. 8. Gregory in Seattle: @d.c.wilson #5 – Maybe they are intended as magical incantations to grant night vision? 9. Raging Bee: …or the Muslim US troops. 10. Marcus Ranum: The crusaders used to pray using the cross-shaped hilts of their swords. Because: god is love. Someone must have been inspired by the bible-quoting redneck sniper in “Saving Private Ryan” – so inspired they forgot their oath to defend the constitution. 11. Kevin: In order, the religious preferences of US Troops: 1. Roman Catholic — 284,000 3. No Religious Preference — 283,000 Yes, No Religious Preference is the second-most popular listing. If you add in atheists and agnostics, which are separate categories, it’s 292,000. Out of a total of 1.4 million (wow, that’s a lot of soldiers). From US Department of Defense 2009 data, reported by CNN. 12. slc1: Hey Ranum and Bee, how does this grab you? 13. theophontes (恶缓步动物): …shall have the light of life… This on that component of a weapon, that uses light to aid in the killing of people. Welcome to goddist doublespeak. 14. weaver: What’s outrageous is that this order came out more than 5 years ago, when I was in Iraq, with much wailing and gnashing of teeth. That we STILL haven’t corrected the problem speaks volumes about the real desire of the bible thumpers to keep their privileges intact. 15. blf: I presume Mr Starnes also wants the Army to use square bullets in Muslim-dominate locales. 16. baal: I presume the army didn’t ask for bible verses in the spec to the manufacture. As such, they should just ship them all back and demand replacements. Were I still christian, I would still be offended. 17. reverendrodney: blf # 15: Interesting link. So Puckle, being a typical arms manufacturer, designed bullets for both sides! 18. composer99: The manufacturer may be correct, when referring to private clients (and perhaps other national clients with differing constitutional arrangements regarding religion), about the legality of the inscription. But as far as I can see citing Christian New Testament verses on hardware intended for the US Army violates the US Constitution, and is therefore illegal, full stop. 19. Reginald Selkirk: Kevin #1: Seriously, if I were a Christian, I’d be outraged that bible verses were put on an instrument of death. Uh, Kevin: these are people whose primary symbol is an instrument of torture. 20. Brain Hertz: Obviously, the correct bible verse in this case should be Ezikiel 25:17 21. Pierce R. Butler: …“The biblical verse (JN8:12) must be removed …” read instructions … So the verse from Corinthians will remain? 22. eamick: So the verse from Corinthians will remain? No, it’s just that the scope pictured in the instructions has the verse from John. The instructions specifically mention the other verse and even throw in “will include, but not be limited to” in case there are other verses to deal with. 23. democommie: Every time I read about this sort of foolishness I think of that late 20th century crusader, Jerry Boingboningboykin. And, when I think of Boykin, I imagine him acting like Rod Steiger’s character in “Mars Attacks”. 24. Raging Bee: Hey, slc1, it “grabs” me as totally irrelevant to this thread. 25. peterh: @ #10, Somehow I recall the sniper in Ryan as being Jewish. I was indeed reminded of him as I read this thread’s opening. 26. Nomad: Just to make it totally clear what Trijicon did, and how amazing it is that all the touchy feely moderate Christians out there that want us to believe that they’re not all bible thumping lunatics aren’t up in arms over this, you have to understand the nature of the sights they make. They’re not the traditional rifle scope style sight with black crosshairs over the target. They use an illuminated reticle, the target point glows. One of their distinguishing features is that they use a fiber optic line to let sunlight illuminate the reticle in daylight so you don’t need to burn up batteries illuminating it constantly, which can be a problem with a competing sight that uses a simple red dot. So light plays a significant part in the design of their scope, they use light to assist in killing people. So, moderate Christians, how do you feel about a reference to your god being “the light of life” being imprinted on a device that uses light to help in killing people? Is it your understanding that a verse talking about making the light of your god’s glory shine in people’s hearts means aiming an assault rifle at people’s hearts using that light? How about you, Catholic church? You’re so upset at the thought of your tax dollars paying for contraception even though they never were, you get so up in arms over a made up controversy like that. But you’re totally cool with the concept of the light of your god meaning the aiming device on a weapon of war, and your tax dollars paying to support that concept. Go fuck yourselves you hypocritical douchebags. You’ve forever given up the rights to the term “pro life”. Leave a comment You must be
global_01_local_0_shard_00000017_processed.jsonl/4011
.^.+ +.^. .*=@ %#@";.. ..:"@&% @=*. *+;:%###*$""';:=... ...+:;'""$*$^##@$+* .+&%%@$@<''%#$=". ."=9^&@#$$^(<@#+. )#*@&^%@&*&=*+#&@&>>. ._ _. .<<&@&#^%$#>@&#$^&%@( .)+^*ioansreko. ... . (#*> . <*#) . ... .okkhdfsau&^*+(. *"""""" _#PSOdAM( >#@&&^ &^@HBSQAHJNYQ&^&% ^&&@#P< )KSJMH#_ """"""* #(_ )%!$o oJKAHGSDJDUBNJAOo @#@G( _)# +*##=- ###" HHX::XHHHHHX::XHH "### -=##*+ _="@@@@>" "" :NJKASJKANKXAIKLQN: "" "<@@@@"=_ _-"#####( @*(!@ &*#^!SG^& GWUA@ )#####"-_ -"""* ***@SSo )#&$&#&$( oSS@*** *"""- (#(' )YANyn( ')#) ! +IAQUSNM+ ! ( !#! ) D I R G E O F C E R B E R U S : Final Fantasy V-II Chapter Missions guide by sephirosuy This guide is written and compiled by sephirosuy, you may not copy or reproduce under any circumstances except for personal, publicly without advance written permission. Use of the guide on any other violation of copyright. Let me know through e-mail before you want to use it, I would like to know where you going to use it. Update List - version 1.0 - 03/07/2006 - version SEP - 19/08/2006 - Renamed the mission names - Listed out the differences between NA ans JP version. | Menu | 1. About the guide 2. About the missions in the game 3. Missions list 4. Contact 5. Credit 1. About the guide Thanks for clicking on the guide. This is a missions guide for the game Dirge of Cerberus: Final Fantasy VII, it's about all missions and side missions in each chapter in the game. The guide is base on japanese NTSC/J version. All missions are not the actual name, I'm just translate them to be easier understanding. The guide may contain SPOILERs of the game. 2. About the missions in the game Everytimes when you clear a chapter you will see your chapter end result, and the missions in the chapter would affected the gils that you gain in the You can actually skip the mission, or even fail the mission also you won't get game over as long as you don't die, but again, if you can complete the mission you will get more gils in the end of chapter. A few side missions in the game will not counting in the chapter end result, however if you complete them you will get some special reward. But there is still a few missions which are not counting in the chapter end result and also no reward even completed them, they are just let you to gain some experiences during the mission, something like killing the enemies, after you killed them, you gain experience. And this kind of missions are not be included in the guide. 3. Missions list - Protect the Civilians Take down the enemies before they kill the civilians. They're 25 civilians in this chapter. - Save the abducted girl! Open the machine crate and kill the enemies, the girl would be saved. - Locate the Cardkey Get all 4 Card Keys in the chapter. For English version, there is 5 Card Key counted. - Assist the WRO The WRO force will fight together with you from the middle part of the chapter, and they've limited health. Total 12 WROs. - Eradicate the Guard Hounds During the time you're still in WRO lorry, kill the beasts as many as possible. There are 70 beasts. - Protect the kid Protect him until reached his destination. - Eliminate the Snipers in hiding! Kill all of 15 of them in this chapter. - Assist the WRO members! All togther 20 soldiers you have to protect, just kill the enemies around them, when they stop shooting and running, means they're save now. - Hurry to the command center! When the mission started, you can see the time is running. Reach there before one minute is the highest rank. - Kill the enemies After you see Arul, the door at opposite now is open, enter that door and come out from the other side, operate the heavy machine gun and kill the enmies whoever comes out. - Eliminate the Sahagin The green monsters, you will encounter 33 in the sewer. For English version, there are 45 Sahagin. - Sneak by the DG soldiers When you're playing as Cait Sith, reach to your destination and don't let the enemies see you. You can push the barrel to them some of them in the bottom level. - Collect the Omega Report files! 1.You will get one after the scene. 2.Go to the two connected room in West area, the Omega report is in the 3.Reached the Shinra Mansion after the cave, then search the Western round 4.Bottom floor, head to the narrow corridor at your left hand side, until the room, find the last Omega Report in the corner of the room. - Deactive the mines! ( M ( | (_ ) ""-_ ( ## ""--_ \ """----__ ) ## ### M ) | M ####### ## ) \ ###### ___) ) #### (_ \ ##### "-. \_ #### #### M ) G = Gate with laser "-. ### ) M = Land mine \ ) # = Block \ ) - Destroy the choppers attacking headquarters! In front of the base, destroy 15 enemies' airship, use the heavy machine gun there is a good idea. - Save the WRO members! Just clear the enemies who are trying to kill them, but now enemies having the more powerful damage than the pass chapters. 12 WRO soldiers in this chapter. no mission in this chapter CHAPTER-8 part 1/2 - Escort the WRO squad to the central complex! Rescue them and reach to the central building, they're 5 totally. - Save the surviving WRO member! Save them from the enemies, they're 9 totally. - Defeat the Deepground commander Kill all enemies until you found the DG commander, then defeat him. CHAPTER-8 part 2/2 - Aviod the aerial mines! In a passage where you needed to pass it, there are 3 aerial mines you need to dodge while passing there. - Destroy the robotic assault unit! In a straight passage, a robot would pops out and dash to you, you need to destroy it before it crush itself. There's another one in the different place. Use Blizzard to shoot it. - Assist the WRO members! One of them will goes to the machine open the locks, if he/she killed by enemies, the second soldier will goes and continue to open the locks and so on. You need to protect them until finish open all 40 locks. - Destroy the sentry robot! Just destroy all 10 robot. - Collect top secret Deepground data files! here is the map where you came out from lift. ________ ________ | __ | |G __ | | | |___----___| | | _____________ |I_ " " __| | ____ | / \ | | | |_______ | ---- |_____.--___________--.____| | | | | S|E | O____MO ___________O __________| / | | ---- | '-- --' |D | __\ /__ \ | | ,___ ___, I| ______ | | | |__ \ ---- / __| | / \ |_______ | |D_____| |______| | __ | | ) | \| |___----.| ) | |______________| / / / / D = DG Information / N / E = Elevator G = Gil I = Item M = MP aura N = Next area O = Openable door S = Starting the other map where is in the office \ N \___________________________/ S / | | D ----- | _____ | | | | | | | | | | | _____ | __|__ | | | | | _____ | | | | _____ | | | | \ / | | | | | | |_____ ____|____ _____| | | | _____ | | / \ | | D | | __|__ | | | | | __| | | | | |-- | | D = DG Information | | |_____| | --| | N = Next area |____|___________|__D________|____| S = Starting - Destroy the surveillance mines You will see the surveillance mines are keep coming during the elevator is moving. There are 99 in the chapter. - Eliminate the persuers! During the motor cart, some enemies will chase and attack you, just kill them. The last one is an airship, all together is 10 chasers. - Swiftly neutralize the enemy onslaught! Kill whoever comes out by using the heavy machine gun. The result will count as the number of the main robot that you defeated here, you will see 4. - Defeat 100 enemies Defeat 100 enemies inside the hall without escape or die. Once you go out form this hall, the mission will end and you couldn't continue anymore. If you success the mission, you will get a Golden Moogle, it can sell 35,000 gils. - Obtain 4 items This 4 items are blocking by the laser gates, here are the step to get them: 1.Get in to the building where the DG soldiers shoot you just now, in the sewer behind, pay attention on the ceiling, you can see a black bomb there, shoot it for the first Card Key. 2.Reached to the heavy mcahine gun, it aim to the rooftop of the building in front, turn slightly left, you can see a white crate there, shoot it down then go to destroy it for the Card Key. 3.Now stand at the left side from machine gun, use your long range weapon as well as pluging the Snipe Scope, direct to right hand side, aim to the building just now, find a black bomb inside the broken huge pipe, shoot it down, then go to destroy it for the Card Key. 4.Advance to the following building beside, when climbing the long ladder, you can see a Card Key in the air, you have to jump from the top to get it. 5.Climb from the long ladder just now, search behind the Shop Machine, another Card Key hiding there. 6.Destroy the crate near the Shop Machine to get one more Card Key. 7.Jump down from though the window, go to the side of the precipice, there is another Card Key there, coordinate is G-6. Becareful when taking it, if you fall down, the mission will end here. 8.Back to the area where you begin the mission, there is a laser gate locking two Card Keys inside, use one of your Card Key to get two more. 9.Now you should have enough Card Key to unlock the item with seven laser gate blocking in the sewer, the coordinate is I-7. Open all seven laser gate for the Lucky S Barrel (gun barrel) and two more Card Keys here. Unlock the other laser gates at coordinate J-8 for ƒoƒˆƒlƒbƒgƒ‰ƒCƒtƒ‹(Weapon), K-9 and H-7 for ƒGƒŠƒN’ƒ (an item, fully restore HP and MP, also can revive from dead like Phoenix Down). - Defeat the Gargoyle! Gargoyle is the flying monster that you encounter at the beginning of chapter 10. This group has only 2. - Defeat the Gargoyle!2 Same as the first mission of the chapter, but they're 3 together. - Defeat all targets on the central pillar! In the the second section of this chapter, you will see a group of enemies shoot you from the opposite tower. Some of them with cannon, and the rest are the soldiers with protection spell. Defeat all 8 of them. - Defeat the Gargoyle!3 Now you have to face 9 Gargoyle. There is a heavy machine gun at the lower no mission in this chapter 4. Contact 5. Credit Special thanks to: - levelup.cn for some missions translation, and the objective. COPYRIGHT (C) 2006 by sephirosuy All Right Reserved
global_01_local_0_shard_00000017_processed.jsonl/4012
Take the 2-minute tour × I'm not sure whether I want to become a vampire or a werewolf, or just remain a normal human being. I'd like a chance to explore all my options. I know there are ways to cure vampirism and lycanthropy. And I'm pretty sure there's ways, at least with vampirism, to re-acquire the conditions. What I want to know is if there is ever a point of no return? Is there a point past which you become immune to either or both of these, or a point past which one or both can no longer be cured? How many times can I change my mind before reaching one of these points? share|improve this question add comment 4 Answers DLC Dawnguard Information If you have the DLC Dawnguard you can flip back and forth between the too. From the Skyrim Wiki: "In Dawnguard, if you are cured of Lycanthropy or if you become a vampire lord you can talk to Aela and she can make you a Werewolf again and it cancels out your vampirism vice versa. If you would like to be a Vampire Lord again, speak to Serana." Skyrim without Dawnguard Without the DLC once you are cured of Lycanthropy. You can not get it again, with the exception Hircine's Ring. As long as you don't have Lycanthropy, you can contract Sanguinare Vampiris (which turns you into a vampire) from a vampire. There is a 10% chance to contract it when they cast Vampric Drain on you. If you cure it you can contract it again with the same method. The important thing to note is Lycanthropy cures Sanguinare Vampiris. So if you have Sanguinare Vampiris and then get Lycanthropy you will cease being a vampire. share|improve this answer I understand Vampirism can be contracted repeatedly, as long as there are still vampires to give it to you. So, you're saying that there is an infinite supply of both cures as well, and the Companions will never refuse to make you a werewolf again no matter how many times you're cured? –  Iszi Feb 1 '13 at 6:51 @iszi Do you have Dawnguard DLC? If you do the the Companions will never refuse to make you a werewolf again. If you DO NOT have the Dawnguard DLC, it is a one time deal with the Companions about them giving you Lycanthropy. –  Halfwarr Feb 1 '13 at 6:55 +1. Also don't forget about the Glenmoril Witch Head which is needed to cure Lycanthropy after you do the Companions main quest. You can get only max 5(-1 for Kodlak's cure) of it and can also use it to cure your fellow companions (Falkas ans Vilkas). BTW, IMO you'll have only one choice, either be a werewolf forever or not without Dawnguard DLC. –  Samir Izmier Chong Feb 1 '13 at 7:33 @SamirIzmierChong Does that limit of 5 lycanthropy cures still exist with Dawnguard? –  Iszi Feb 1 '13 at 15:51 @Iszi there are two ways to get cured of lycanthropy. To return to "normal" you need a witch head, of which there are only 5, even with Dawnguard. (Up to 3 of those will be used if you cure all the Companions that want it.) However, you can be "cured" of lycanthropy by becoming a vampire, then go through "Rising at Dawn" to get cured of that as many times as needed. –  Michael Edenfield Feb 28 '13 at 4:41 show 1 more comment Lycanthropy limitation With or without the Dawnguard DLC, you can't (without the use of PC-only console commands) switch back and forth as many times as you would like between being a werewolf and being a vampire. According to the UESP wiki's "Aela the Huntress" article (emphasis mine): If you have cured yourself of lycanthropy, there is no way to regain it in the base game. However, the Dawnguard add-on provides a one-time opportunity to restore your lycanthropy by speaking to Aela. After being cured of lycanthropy, simply find Aela and speak with her. You will have the option to tell her you wish to regain the gift of beast blood. She will respond, "Do you, now? Hircine doesn't usually bestow his favor on the fickle. But you've proven your worth. I'm willing to try. Are you ready now?" If you tell her you need more time to prepare yourself, she will end the conversation by answering, "Go. Reconsider your plight." If you then return to her you can go through the conversation again, and it will continue as before. When you choose to tell her you are ready, she simply says "Hold still, then." Your screen will turn black for a second, then a magical aura will circle around you and a message will appear on the top left of your screen stating "Beast Blood Added". The conversation is now over, and if you choose to cure your lycanthropy again, there will not be another chance for Aela to restore it. TLDR: Without the Dawnguard DLC, you can only become a werewolf once. With the Dawnguard DLC, you can become a werewolf twice, if you've cured yourself of lycanthropy the first time around. Console commands If you are playing on the PC and have the Dawnguard DLC installed, you can use console commands that will allow Aela to turn you into a werewolf after your second time to be turned (allowing you to easily switch to being a vampire and werewolf back and forth as many times as you would like). You can do this by entering the console commands then conversing with Aela to turn you into a werewolf, and conversing with Serana to turn you into a Vampire Lord (or just be a vanilla vampire). You can enable the conversation option "I wish to regain the gift of beast blood" to Aela with the console command: resetquest 0200f899 If you encounter issues with the above console command, enter player.setstage F6090 100 to force a cure before using the console command to enable the conversation option. Console commands info from: The Nexus forums post, "Dawnguard Regifting Lycanthropy " Serana won't be able to turn you into a Vampire Lord if she has cured herself of vampirism. share|improve this answer add comment According to the wiki, Aela will only give you Lycanthrope once more if you cure it (with Dawnguard DLC), so there is a point of no return. You can only become a lycanthrope twice with the DLC, or once without it. share|improve this answer add comment If you have the Dawnguard DLC you can use Vampire Lord to cure Lycanthrophy and then just use a Cure Disease potion to get rid of the Vampire Lord. Then just choose which one you want to be again. Wash, rinse, repeat. This can be done unlimited times. share|improve this answer Cure Disease removes Vampire Lord? Sounds iffy. By that reasoning, getting a Blessing from an Altar should do the same - and I know it doesn't. –  Iszi Feb 28 '13 at 4:51 add comment protected by Community Jul 17 '13 at 9:17
global_01_local_0_shard_00000017_processed.jsonl/4013
Take the 2-minute tour × Solo queue and our team needs support; lock in Sona. Go to lane, AD carry turret dives 60% health Sion and Taric. Complains to Sona for not supporting well enough. Game goes on and AD carry continues to make terrible decisions and complains about support. What should a support character do in this sort of situation? share|improve this question This is a very tricky kind of question with much of a definitive answer. I did my best below, but can you rephrase the question to more directly access the information you want? Maybe something along the lines of "How do I support an over-aggressive carry?" or even "How do I support an over-aggressive carry as Sona?" –  Deotronic Mar 25 '12 at 18:05 add comment 3 Answers up vote 2 down vote accepted This is a tough question to answer because you aren't in control of the other person's actions. Generally speaking, it's far easier to support more passive gameplay, and the difficulty of supporting increases as the carry becomes more aggressive. Ultimately, like in the situation you present, supporting becomes impossible in any meaningful manner. The way I see it, you have three options: • You can voice your concerns to them and see if you can get them to be less aggressive, which makes supporting them easier (or possible) • You can accept that they're going to be very aggressive and tune your play to match as best you can. • If things are truly hopeless, you can switch to a more roaming role and try to help other lanes win their matchups. Careful about stealing experience, but with Sona's ultimate and some well-placed heals (for instance), you can be a force for good for the rest of the team. The first option is the one you should pursue first. The relationship between AD Carry and Support needs to be tight-knit for success. Often, even aggressive AD carries realize this. The second option is what you'll be doing a lot. You have a duty to your carry to support them (hence the name of the role). Try not to die, obviously, but do everything else in your power to help them accomplish whatever they're trying to do. The third option should be an absolute last resort. Just giving up on your lane isn't something to be done lightly. share|improve this answer add comment If the AD carry is aggressive you should be prepared to ward the river for ganks, and force trades too if possible. If he's being overly retardet and just impossible to co-operate with, hit up the fancy ignore button. What if the support is bad? I'm a decent AD player and I sometimes get way too passive supports. For example, i was playing corki and had a Leona supporting me who should be an aggressive laner who forces trades and keeps the opposing carry in fear of the pull-stun combo, but instead she just literally AFK'd at our bush. They had Graves & Blitzcrank combo which was hella aggressive, so i was forced to play passively because 2v1 was not an option. Once blitz caught me off guard with his pull, i was able to valkyrie away and stay alive with heal, but right afterwards the leona decides to go in 2v1 while i had literally 100 hp left? and dies right off the bat, giving the graves 1-0 lead. From then on the lane just snowballed to their favour making us lose the lane and i got all the blames from it from the team. ''Nice feed corki'' etc So its not just the AD carry who needs to be good, its also the support. When i do get a good support i usually end up with a 12-4, 8-2 17-4 ~~ ish score on any AD. share|improve this answer add comment There is not not much you can do. The support role is about supporting good carries; if the carry is bad, support during the lane phase can only help so much. share|improve this answer add comment Your Answer
global_01_local_0_shard_00000017_processed.jsonl/4014
Take the 2-minute tour × I notice that most weapons other than the original weapons have a level above 1. Can this number be different from player to player (or even item to item in the backpack of one player) for the same item? If so, does it have any effect in game? share|improve this question add comment 1 Answer up vote 14 down vote accepted Most items have a set number -- before the Scout update introduced the Sandman, no item went higher than level 10. About the time of the Spy / Sniper update, there was a glitch in the random drop system, and normal weapons (that usually have a fixed level number) were generated with a random level between one and one hundred. This has since been fixed, so if you see, to use one of my own items for example, a level 56 Dead Ringer, that means the item is very old. (And now with the latest patch, you'll never see a non-vintage oddly leveled item) On the other hand, hats will always have a random level. This means nothing, but certain levels are certainly more valuable for trading, for pure sentimental value. (1, 100, 69, 42, etc.) The singular exception to all of the above is the new Dueling Badge medal misc item, which actually "levels up" as you kill folks during your duels. A level 100 dueling badge works out to 1000 kills (Might be off a factor of ten) during duels, and likewise the rarity of the badge itself (bronze, silver, gold, platinum) is based on level increment. 0-25,26-50,51-75,76-99,100, etc. In no case does the level of an item have any effect on gameplay. share|improve this answer "random level between one and one hundred." between zero and one hundred you mean. I know someone with a level 0 Sandvich. –  user2974 Oct 5 '10 at 17:10 Incidentally, hats also have random levels. That hasn't changed, but you can't see that level in game, only through an external website like tf2items. –  user2974 Oct 5 '10 at 17:12 @Powerlord, check the first sentence in the third paragraph. :) –  Raven Dreamer Oct 5 '10 at 20:35 add comment Your Answer
global_01_local_0_shard_00000017_processed.jsonl/4027
Take the 2-minute tour × Say I want to find 20 closest business near me. My table structure is like this: BusinessID varchar(250) utf8_unicode_ci No None Browse distinct values Change Drop Primary Unique Index Fulltext Prominent double No None Browse distinct values Change Drop Primary Unique Index Fulltext LatLong point No None Browse distinct values Change Drop Primary Unique Index Fulltext FullTextSearch varchar(600) utf8_bin No None Browse distinct values Change Drop Primary Unique Index Fulltext With selected: Check All / Uncheck All With selected: Print viewPrint view Propose table structurePropose table structureDocumentation Add new fieldAdd field(s) At End of Table At Beginning of Table After Indexes: Documentation Action Keyname Type Unique Packed Field Cardinality Collation Null Comment Edit Drop PRIMARY BTREE Yes No BusinessID 1611454 A Edit Drop Prominent BTREE No No Prominent 0 A Edit Drop LatLong BTREE No No LatLong (25) 0 A Edit Drop sx_mytable_coords SPATIAL No No LatLong (32) 0 A Edit Drop FullTextSearch FULLTEXT No No FullTextSearch 0 There are 1.6 million bizs. Of course it's stupid to compute distance for all of them and then sort it. That's where geo spatial index kicks in right? So what SQL comman I need to cast? 1. I am using mysql myisam spatial index. However I did not specify this before. So I will accept those who answer it to show my appreciation and ask another question. 2. I do not want to compute distance for the whole table 3. I do not want to compute distance for any region which are still inefficient 4. I do want to compute distance for reasonable number of points because I want to sort the points by distance and be able to display point 1-20, 21-40, 41-60, etc. share|improve this question Why the downvotes? –  Jim Thio Jun 21 '12 at 7:49 add comment 3 Answers up vote 5 down vote accepted Spatial queries are definitely the thing to use. With PostGIS I would first try something simplistic like this and tweak the range as needed: FROM table AS a WHERE ST_DWithin (mylocation, a.LatLong, 10000) -- 10km ORDER BY ST_Distance (mylocation, a.LatLong) This would compare points (actually their bounding boxes) using the spatial index, so it should be fast. Another approach that comes to mind is buffering your location and then intersecting that buffer with the original data, which may be even more efficient. share|improve this answer will this fine 20 closest points? I don't care about filter. I just want 20 closest points. Result should be sorted based on distance and the 20 closest points will show up first, the the next 20, etc. –  Jim Thio Jun 20 '12 at 21:14 You skipped the ORDER BY step. Cull to a reasonable size with the WHERE, then do and sort by the proper distance measurement. –  zebediah49 Jun 20 '12 at 21:18 thanks, I ammended the answer. Jim, if you need all within the arbitrary range, just remove the LIMIT, which is now set to return only the 20 closest points. –  lynxlynxlynx Jun 20 '12 at 21:34 you sure they don't compute distance for all points within 10000? There are 67k points and that's still too many. –  Jim Thio Jun 21 '12 at 2:40 Actually this is what I need because there is nothing better. Would this work in mysql? –  Jim Thio Jun 21 '12 at 6:56 show 2 more comments With PostGIS 2.0 on PostgreSQL 9.1, you can use the KNN indexed nearest neighbour operator, e.g.: SELECT *, geom <-> ST_MakePoint(-90, 40) AS distance FROM table ORDER BY geom <-> ST_MakePoint(-90, 40) The above should query within a few milliseconds. For the next multiples of 20, modify to OFFSET 20, OFFSET 40, etc ... share|improve this answer add comment If all you are looking for are proximity point searches (nearest neighbour queries), then you don't want to use the old ST_DWithin or ST_Distance + ORDER BYs for that. Not anymore. Now that PostGIS 2.0 shipped, you should be using the knngist index support (a native PostgreSQL feature). It will be orders of magnitude faster. An excerpt from this blog entry that describes how to use knn gist without PostGIS: $ create table test ( position point ); Table created. Now let’s insert some random points: $ insert into test (position) select point( random() * 1000, random() * 1000) from generate_series(1,1000000); INSERT 0 1000000 1 million points should be enough for my example. All of them have both X and Y in range <0, 1000). Now we just need the index: $ create index q on test using gist ( position ); And we can find some rows close to center of the points cloud: $ select *, position <-> point(500,500) from test order by position <-> point(500,500) limit 10; position | ?column? (499.965638387948,499.452529009432) | 0.548548271254899 (500.473062973469,500.450353138149) | 0.65315122744144 (500.277776736766,500.743471086025) | 0.793668174518778 (499.986605718732,500.844359863549) | 0.844466095200968 (500.858531333506,500.130807515234) | 0.868439207229501 (500.96702715382,499.853323679417) | 0.978087654172406 (500.975443981588,500.170825514942) | 0.990289007195055 (499.201623722911,499.368405900896) | 1.01799596553335 (498.899147845805,500.683960970491) | 1.29602394829404 (498.38217580691,499.178630765527) | 1.81438764851559 (10 rows) And how about speed? QUERY PLAN Limit (cost=0.00..0.77 rows=10 width=16) (actual time=0.164..0.475 rows=10 loops=1) -> Index Scan using q on test (cost=0.00..76512.60 rows=1000000 width=16) (actual time=0.163..0.473 rows=10 loops=1) Order By: ("position" <-> '(500,500)'::point) Total runtime: 0.505 ms (4 rows) Interesting enough, the index traversal will return the features in order of proximity, so no need to do a sort (i.e order by) for the results! However, if you want to use it alongside PostGIS, now it is really easy. Just follow these instructions. The relevant part is this: SELECT name, gid FROM geonames ORDER BY geom <-> st_setsrid(st_makepoint(-90,40),4326) But don't take my word of it. Time it yourself :) share|improve this answer This will be a good answer. However, I am using mysql myisam. I forget to add that. –  Jim Thio Jun 21 '12 at 2:41 So +1 but I can't select this as my answer. Should I create another question? –  Jim Thio Jun 21 '12 at 3:52 @JimThio MySQL does not have a nearest neighbor index so you will have to rely on the PostGIS-like approach before there was a nearest neighbor query (ST_Dwithin with ORDER BY ST_Distance). Welcome back to the middle ages :) –  Ragi Yaser Burhum Jun 21 '12 at 6:29 So I got to go to mongodb? Let me guess. What's the point of having a spatial index on mysql if you cannot even do the simplest thing like finding 20 closest points? –  Jim Thio Jun 21 '12 at 6:31 You can find the closest point using a window. The same is true for any other spatial database as described by @lynxlynxlynx. You can keep increasing the window by multiplying it by two. Yes, the same is true for Mongo or any other database. The point is that you cut down in most of the other features. Besides, everyone knows that until just recently, MySQL was never a serious contender for anything spatial. –  Ragi Yaser Burhum Jun 21 '12 at 6:37 show 5 more comments Your Answer
global_01_local_0_shard_00000017_processed.jsonl/4028
Take the 2-minute tour × I got a database with a column of type geography(Point,4326), the data contained looks like 0101000020E610000092E057F66EF73140930035B56CBD4840. How can I convert it to GPS coordinates? share|improve this question add comment 2 Answers up vote 5 down vote accepted It looks like this column is in Well Known Binary (WKB) or Extended Well Known Binary (EWKB) Format. You should try to query it using something like: select astext(your_column_name) from your_table_name That will give you the textual representation. Not sure what you mean by GPS co-ordinates? Do you want to convert it into a .gpx file or just get the lat/lon. In which case the former will do that, although you might have to clean up the output in text editor or something. The alternative would be select ST_X(your_column_name),ST_Y(your_column_name) from your_table_name which will give you the numeric lats and longs in two columns as your query table. ---- EDIT These are functions on Geometry columns --- on Geography columns, the following is correct: select ST_AsEWKT(your_column_name) from your_table_name share|improve this answer What I mean by GPS coordinates is just lat/lon. I've tried the functions you proposed but both returned an error ERROR: function astext(geography) does not exist ERROR: function st_x(geography) does not exist. Is there something I have to install to get it working? –  Elwhis Sep 2 '12 at 21:28 Try ST_AsEWKT(your_column_name) –  Stev_k Sep 3 '12 at 0:41 Yep, that worked, thank you very much! –  Elwhis Sep 3 '12 at 1:13 add comment The ST_X/ST_Y functions are only defined on the geometry type, so cast there before calling them. SELECT ST_X(geogcolumn::geometry), ST_Y(geogcolumn::geometry) FROM thetable; share|improve this answer According to my tests (postgres 9.2, postgis 2.0.1), this is a bit faster than ST_AsEWKT –  Laurent Debricon Sep 18 '12 at 15:15 add comment Your Answer
global_01_local_0_shard_00000017_processed.jsonl/4031
The Pudding Machine That Yells At KidsS You know what kids don't deserve? Free pudding. And you know why? Because they're too damn eager. Puppy dog eyes may work on spineless parents, but they're not gonna move Kraft's stone hearted sample dispenser. Jell-O's Temptations dessert is being marketed to adults so this vending machine has built-in face recognition to check the age of anyone who approaches. And if you're too young the dispenser will shut down and ask you to step aside without giving you a sample. Rules are rules, people. Developed by Intel, the dispenser uses facial data, like the size of your eyes and their distance apart, to figure out how old you are. It can also determine gender and whether or not you start smiling once your sample is dispensed. The device does not take or store photos, because that would make this whole idea super creepy. Unlike that smiling thing. Ed Kaczmarek, Kraft's director of innovation and consumer experiences, says that the machine "has a big gee-whiz factor." Clearly, this marketing experiment is better left to the adults. Today's youngins don't know the first thing about delicious treats or wonderment, much less the meaning of gee-whiz. [USAToday via Eater]
global_01_local_0_shard_00000017_processed.jsonl/4033
How Mars May Have Looked if It Was Covered in WaterS By now, we all know that Mars was once home to water and may have even supported life. But what would the planet have looked like when it was lush and verdant? According to Kevin Gill, like this. Created using elevation data from NASA's Mars Reconnaissance Orbiter, this rendering shows what Mars would have looked like if water was present on the surface. It reveals a massive ocean on one side of the planet, and one of the longest valleys in the solar system, Vallis Marineris. Elsewhere, over on the left you can see the peaks of Olympus Mons, Pavonis Mons, Ascraeus Mons and Arsia Mons poking up out of the atmosphere. Gill explains how he made the image: This is a view of the Western hemisphere with Olympus Mons on the horizon beyond the Tharsis Montes volcanoes and the Valles Marineris canyons near the center. The height of the clouds and atmosphere are largely arbitrary and set for the sake of appearance and coverage over the exaggerated terrain elevations (~10 times elevation exaggeration). The eye is about 10,000 km (~6,200 miles) from the surface. The resulting model was then brought into GIMP were I painted in land features using a NASA Blue Marble Next Generation image for the source textures... I tried to envision how the land would appear given certain features or the effects of likely atmospheric climate. Obviously, there's a fair deal of artistic license involved in creating a render of what Mars would look like as a planet supporting life. But that doesn't stop the image being a fascinating insight into the possible past life of Mars—and a refreshing change from seeing it as a dusty red ball. [Kevin Gill via Discovery] Image by Kevin Gill
global_01_local_0_shard_00000017_processed.jsonl/4045
GTA Wiki Bloodring Banger 9,262pages on this wiki Revision as of 14:25, June 14, 2013 by Jeansowaty2 (Talk | contribs) The Bloodring Banger is a vehicle that is used in the Bloodring and Blood Bowl stadium challenges in Grand Theft Auto: Vice City and Grand Theft Auto: San Andreas, respectively. Bloodring Bangers are evidently vehicles modified for use in demolition derbies, and as such are stripped down with added safety features for the driver. The Bloodring Banger is originally available in GTA Vice City in the form of either a modified Glendale (internally named "bloodra") or Oceanic (internally named "bloodrb"); in GTA San Andreas, however, only the Glendale is used. Cosmetic modifications of the Banger include roll bars (which varies depending on their car number) and netting for the driver's compartment for GTA Vice City, and roll bars and welded bars of metal in GTA San Andreas. Bloodring Bangers are only capable of seating two, unlike the Glendale and Oceanic, which both seat four. The GTA San Andreas rendition does not even feature opening doors; in CJ's entry animation, he climbs in through the window. Girlfriends or recruited gang members can access the car the same way with no problems. The vehicle acts as if it has no doors; If an NPC is angered and proceeds to pull CJ out of it, he will do so, but CJ will fall through the panel that is in place for the door, as if it was not there. Also, Policemen are able to Bust CJ without opening the door and pulling him out. Oddly, if an NPC is in a Bloodring Banger, CJ can't steal the car from him or pull the NPC out of it. Being vehicles outfitted for demolition derbies, Bangers typically feature unconventional color schemes, including some with checkered roofs. Being fitted with protection bars all around its body, the car won't get any visual damage after bumps and scratches with other vehicles. Also, they have only one license plate, the rear one, partially covered by the protection bars. Another minor difference is the roof-mounted racing numbers on Bloodring Bangers in the PlayStation 2 and PC versions; while the PS2 version has scribbled numbers, the same signage is completely black in PC versions, likely a programming mistake during porting. While the GTA Vice City renditions of the Bloodring Banger sport well-known Vice City and Liberty City businesses as sponsors, GTA San Andreas' Bloodring Bangers do not feature any advertising. Bloodring Bangers in both games may appear with any of 6 racing numbers. • bloodra (VC): #11, #41, #48, #59, #73 or #83 • bloodra (SA): #100, #172, #284, #328, #469 or #505. Performance wise, the vehicles receive minor modifications. The car retains its rear-wheel drive configuration, but acceleration and speed for the car is very good, being much faster than the original Glendale and Oceanic. However it can't be modified in any mod shop. It has much tighter suspensions, which results in tighter cornering. The Oceanic Banger in GTA Vice City is lighter than the Oceanic, while the Glendale Banger is heavier than the Glendale. Racing numbers and sponsors for both the "bloodra" Bloodring Banger in GTA Vice City, and the removed "bloodrb" Bloodring Banger in GTA San Andreas. • The Bloodring Banger plays the following radio stations by default when entered: • The "bloodrb" model, textures and handling line exist in GTA San Andreas, but they are not used. However, it does not appear to be based on the Oceanic, but on another Glendale, similar to the "bloodra" in Vice City. Sponsors (GTA Vice City) Vice City San Andreas See also Advertisement | Your ad here Around Wikia's network Random Wiki
global_01_local_0_shard_00000017_processed.jsonl/4047
Cabal- A framework for packaging Haskell software This deals with the configure phase. It provides the configure action which is given the package description and configure flags. It then tries to: configure the compiler; resolves any conditionals in the package description; resolve the package dependencies; check if all the extensions used by this package are supported by the compiler; check that all the build tools are available (including version checks if appropriate); checks for any required pkg-config packages (updating the BuildInfo with the results) Then based on all this it saves the info in the LocalBuildInfo and writes it out to the dist/setup-config file. It also displays various details to the user, the amount of information displayed depending on the verbosity level. configure :: (GenericPackageDescription, HookedBuildInfo) -> ConfigFlags -> IO LocalBuildInfoSource Perform the "./setup configure" action. Returns the .setup-config file. writePersistBuildConfig :: FilePath -> LocalBuildInfo -> IO ()Source After running configure, output the LocalBuildInfo to the localBuildInfoFile. getPersistBuildConfig :: FilePath -> IO LocalBuildInfoSource Read the localBuildInfoFile. Error if it doesn't exist. Also fail if the file containing LocalBuildInfo is older than the .cabal file, indicating that a re-configure is required. checkPersistBuildConfig :: FilePath -> FilePath -> IO ()Source Check that localBuildInfoFile is up-to-date with respect to the .cabal file. ccLdOptionsBuildInfo :: [String] -> [String] -> BuildInfoSource Makes a BuildInfo from C compiler and linker flags. This can be used with the output from configuration programs like pkg-config and similar package-specific programs like mysql-config, freealut-config etc. For example: ccflags <- rawSystemProgramStdoutConf verbosity prog conf ["--cflags"] ldflags <- rawSystemProgramStdoutConf verbosity prog conf ["--libs"] return (ccldOptionsBuildInfo (words ccflags) (words ldflags))
global_01_local_0_shard_00000017_processed.jsonl/4048
name: SGdemo version: 1.0.1 synopsis: An example of using the SG and OpenGL libraries description: This program serves as a demonstration of the functions of the SG library (to be found on Hackage: )) by visualising it with OpenGL. It also serves as a sort of informal test suite for the SG library. Documentation is available at the top of the main module's source code. category: Graphics license: GPL license-file: LICENSE author: Neil Brown maintainer: copyright: Copyright (c) 2009, Neil Brown stability: Provisional build-depends: base > 3 && < 5, SG, OpenGL < 2.3, GLUT < 2.2 build-type: Simple executable: sgdemo main-is: SGdemo.hs ghc-options: extensions: MultiParamTypeClasses FlexibleContexts
global_01_local_0_shard_00000017_processed.jsonl/4050
Thread: Value of: Sens 1st and Fisher to move up View Single Post 05-09-2009, 10:55 AM Registered User TheLeastOfTheBunch's Avatar Join Date: Jun 2007 Location: Toronto Country: Canada Posts: 30,771 vCash: 50 Originally Posted by trentmccleary View Post So there's 2 lines difference between Pocahonsky and Fisher? That's pretty cool. Playing on the one team in the NHL bad enough to play him as a 1st liner for 1 season increased his per season point total by 10 points over 5 year? Wow. Still missed the playoffs though right? Maybe the next team will realize that many minutes going to pocahonsky is a problem. What the , just stop please like honestly ...... TheLeastOfTheBunch is offline   Reply With Quote
global_01_local_0_shard_00000017_processed.jsonl/4051
View Single Post 10-13-2010, 07:41 PM Repeat Offender... GopherState's Avatar Join Date: Aug 2008 Location: X Marks The Spot Posts: 22,696 vCash: 500 On a much more positive note, what is everyone's thoughts on having a post-game thread rather than just continuing to talk about the game in the game-day thread? "Will beats skill when skill doesn't have enough will." -Doug Woog 1974 1976 1979 2002 2003 2014? GopherState is offline   Reply With Quote
global_01_local_0_shard_00000017_processed.jsonl/4092
How to make your own brainwave-controlled cat earsS Remember those hilariously bizarre Japanese cat ears you could manipulate with your mind? If you have a 3D printer, a Mindwave headset, some technical know-how, and a little bit of elbow grease, you can build your own pair. Over at Thingiverse, Joshua DiMauro has posted a guide on how to build these ears. The project isn't exactly for beginners, as Josh concedes — "Let's be honest, this is a lot of work to go to in order to make some kitty ears [and] I'm releasing it here because I'm curious what else people could make based on it."
global_01_local_0_shard_00000017_processed.jsonl/4094
Answers to: is having friends who are girl is allowed<p>I have some of my school friends who are girl so is it allowed in islam we dont hang out togather at present we are in different cities so sometimes we just had a talk on phone or chat online. I dont have any feelings for them I mean to make them my girlfriend neither they have any feeling for me so is it halal to have girls as a friend or I hae to cut off from them totally.</p>enMon, 04 Mar 2013 18:18:24 -0500Answer by pargali<p>bullshit. of course Islam promotes friendship. all over Quran it states that men and women carry equal responsibility (except when their biological roles do not allow it). dont listen to maniacs. any kind of friendship is allowed. remember what Rumi said: we accept everyone</p>pargaliMon, 04 Mar 2013 18:18:24 -0500 by EnesNadir<p>So we're not allowed to make any friends from the opposite gender. Then how exactly do we get to meet the person whom we're going to get married? Surely, a spouse doesn't just pop up out of nowhere. You understanding is that you have friends of the opposite gender, one of whom you eventually fall in love with, and later on you get married. Is that not how it works? I really don't understand these prohibitions. My parents met each other in college, and started dating. After graduating, they got married, and I happened to be born. Are you telling me my parents are sinners because they met and started dating in college? Can't we date the person whom we want to marry? What are we supposed to do, keep our distances from each other until graduation? If we kept our distance, it would only discourage the affection we have for one another. By the time we graduated, the desire to get married would have faded. Am I wrong?</p>EnesNadirMon, 04 Mar 2013 18:01:54 -0500 by MSS<p>I know that it is difficult especially in the West to avoid being friends with the opposite gender. But it is true that such friendships aren't allowed (not judging here! It's great that you want to find out about it), and there are logical reasons as to why it isn't allowed. </p> <ol> <li>Firstly, when you start a friendship with someone of the opposite sex you become closer, and eventually one of you may start liking the other, whether it takes a week or years. Think about it, when someone is kind to you and you get along well with them it's hard not to like them and you may start fancying them. </li> <li>Also, at first you may not ever think about dating them, but taking the first step (aka making friendships with them) may lead you to commit this sin, and eventually others too like adultery etc. That's why spending time with the opposite sex who we aren't married to or are family is forbidden, this removes the temptation. </li> </ol> <p>There are other reasons too, but I hope this helped :) </p> <p><strong>I'd recommend listening to some talks from scholars though on this issue</strong> aswell (try youtube?), <strong>as they are a lot more knowledgeable in these matters.</strong></p>MSSThu, 21 Feb 2013 16:22:51 -0500 by sandn<p>just think about it, do some research and you'll find that only when you high five a girl it is worse than putting your hand in allahs fire</p>sandnWed, 20 Feb 2013 21:20:44 -0500 by UnknownMuslimTeen<p>It is just like fire and petroleum. Prophet Muhammad stated that it is a big sin. <img alt="alt text" src="/upfiles/Untitled4.png"></p>UnknownMuslimTeenWed, 13 Feb 2013 18:46:52 -0500 by Vision821 on NIGERIA KANO's answer<p>Brother,</p> <p>Family can't afford private school, thus kid goes to public school with girls. In Islam is this right? Well a family without money, what can they do? All the boy can do is lower his gaze, maybe even ignore women...but then, he is not social, could be bullied, and does not gain experience with the society he is trying to educate himself in and prosper. I am speaking about being practical, there's so many "hiram police" out there.</p> <p>As far as the limits of conversation, I think you uncovered a gem here. Well said, I think you gave the best answer for sure.</p>Vision821Mon, 11 Feb 2013 17:37:47 -0500 by believer on NIGERIA KANO's answer<p>Brother Islam is for every age and era, so you can not say that it was for this or that time. The thing is, man and woman can talk but only to the purpose and not useless talks, even women came to Prophet Muhammad (S.A.W) to ask in matters, to know the ruling of Islam. I think there is a hadith (S.A.W) as well regarding the limits for conversation between a man and woman but I don't have the exact reference.</p>believerMon, 11 Feb 2013 03:04:54 -0500 by Vision821 on NIGERIA KANO's answer<p>This person needs to use his head a little more. There were no telephones during the time of Muhammad(saw) he was speaking about PHYSICAL contact. Obviously, if you are to engage in trading certain pictures and certain perverse talk this is forbidden, but by this above poster's logic, I can't even call my local shop-rite to see if their open if a woman answers. Also, take the fact that many Muslims live in the West, where men and women mingle all the time, WORK TOGETHER, school TOGETHER, I guess we should stay home on welfare instead.</p>Vision821Mon, 11 Feb 2013 02:59:11 -0500 by Afjal<p>It is not allowed in Islam.</p>AfjalSun, 10 Feb 2013 09:51:48 -0500 by NIGERIA KANO<p>No!!! it is impermissible to make a friend with a girl in islam.Becouse the prophet of Allah said"when a women and a man are along together,is like a fire along with a petroleum.</p>NIGERIA KANOSun, 10 Feb 2013 04:19:41 -0500 by UnknownMuslimTeen<p>Yes, as long as you are getting along with each other.</p>UnknownMuslimTeenFri, 08 Feb 2013 15:47:21 -0500
global_01_local_0_shard_00000017_processed.jsonl/4095
Questions Tagged With drugs tagged <span class="tag">drugs</span>enTue, 21 Jan 2014 23:27:47 -0500DRUGS & ISLAM AND FORGIVENESS/CORRECTION?<p>I have never been a practicing Muslim, although I was born one. I am 30 now, but when I was 26 I witnessed my father die in front of me from a heart attack...I hated god for subjecting me to that, witnessing my father’s death haunted me for years..I still have nightmares. I was introduced to cocaine shortly after, it worked at first and took away the pain and I have not stopped, it’s ruining me and I’m drifting darker and darker, but I feel a light in the distance a faint light or presence that tells me I’m loved and makes me want to change. lately I’ve realized I can’t live like this, I feel drawn now to Islam more than ever, I never cared about prayers, but now even though I don’t speak Arabic the prayers intrigue me, I feel like god feels my pain, and even though turned my back, he hasn’t. Islamic prayers move me emotionally I feel a stronger connection to it...I feel as if somewhere god is trying to call me back. What is the best way for me to become a good Muslim and learn how to pray..Will god forgive me for being angry, and doing drugs? My father was an alcoholic when he died, he was suffering alot of pain and drank to cope. what can I do to have Allah forgive him? And myself? Any prayers can do for my father and myself in English at his grave?</p>rb198303Tue, 21 Jan 2014 23:27:47 -0500 sister is addicted to drugs and alcohol, i need Islamic guidance please.<p>Asalam alakum ruhtimillah barakatoo, i have a younger sister of 21 years old, we still live with our parents and she is constantly bringing shame to my parents(who are very pious Mashallah). She has gone astray years ago, cocaine and alcohol and drugs.i tried everything, but I keep hiding her condition because i dont want my traditional parents to have a heart attack or grieve any longer, im scared she will grief them so much that they won't be able to handle it. Please tell me what i should do. (telling my parents is out of the question because they think she is clean from before but she has gone back to her old ways, i Cant tell them anything because of their health. Help? </p> <p>Salam </p>aymarchWed, 04 Dec 2013 00:03:47 -0500 help needed.<p>I have had a childhood friend who has been very close to me, we both had feelings for each other but kept everything halal as we just stayed friends and never looked at one another in that way. I still care for the guy, he has gone astray and on the wrong path. He sells drugs, is obsessed to halal money and hurts the people who care about him. He wasn't like this, in a week he suddenly changed and it is affecting me because I have been raised up with him from childhood. Is there anything I can do to get him back on to the right path of islam? I pray for him daily but I really need some advice because I have been depressed for 6 months now over this matter.</p>UnknownUserThu, 11 Jul 2013 07:41:34 -0400 using marijuana permissible in Islam?<p><strong>Salaams, brothers and sisters. Please take the time to read this, I know its a huge post, but please help a brother in need of guidance.</strong></p> <p>I am a 24 year old Muslim from India. I pray my salaah often (not as much as I would like, InshaAllah, I will pray more). I constantly (like 4-5 times an hour) read ayat-ul-kursi or one of the 4 Qul Surahs, or recite Allah-hu-Akbar or Alhamdulillah or Ashadu-an-la-ilaha-illallah-wa-ashadu-anna-muhammadan-abduhu-wa-rasooluhu. I always remember Allah.</p> <p>I want to know whether using marijuana is allowed in Islam, or whether it is makroo, or haraam.</p> <p>I know that most of you out there will say that anything that intoxicates you is outright haraam, but lets take a moment to define "intoxication".</p> <p>In my opinion, intoxication, when speaking from an Islamic standpoint, is a mental state where a person cannot bear witness to the fact that there is no deity worthy of worship except Allah SWT and Muhammad SAW is his messenger. A mental state where a person only wants to act upon his primal instincts without second thought, or concern for consequences and/or liabilities. A state of inebriation where only base desires and instincts are considered. A state of mind where a man cannot speak properly and/or forgets Allah and his messenger, his books, his angels and jinns and the final day of judgement.</p> <p>Now, I have been smoking marijuana for about 6 years. I feel that it has made me a more open-minded person (verily, everything in the Heavens and Earth is sent from Allah since infinite time), I'm not trying to say that marijuana has made me awesome or anything, all I'm saying is that it has opened my mind to new ways of thinking and experiencing or interpreting situations and phenomena in the same way as a work of literature or art would have. It has enabled me to be more empathetic and understanding, its made me a calmer person, less anxious. It's made me more inclined towards studying and understanding things we usually take for granted. It's made me more able to appreciate art in all its forms, to understand the mood and mental state of the artist. I understand the math behind art and the math behind science, at least how much we have defined as "science". It's enabled me to explore parts of my mind that I would not venture into because something else would distract me. It's enhanced my focus in this way. I feel lighter and less worried, I'm able to let go of things I usually hold on to like grudges and enmities. I'm able to come to terms with traumatic instances in my childhood, like being picked on at school, or being talked down to by teachers, or being insulted and ragged. (These are all verifiable changes I've noticed in myself since before and after taking marijuana, of course, I could be wrong and it could be because of something else entirely.).</p> <p>I'm not an atheist and I believe that science is only what we have been able to define so far. Many theories and concepts in science, physics, astro-physics, etc. exist only as hypothesis, hanging on very weak experiments (whose results may have been mis-read or mis-interpreted), and only exist because they cannot be disproved by any yet known method of scientific exploration. Much in the same way that many of Einstein's theories are being proved wrong now.</p> <p>There are many questions I have that are unanswered. Like, Allah puts everything in people's paths. Marijuana was put before me by Allah SWT, but I want to know whether it was some kind of a test, like whether I would take it, or whether it was given to me as some kind of answer to my anxiety, or my questions about life. I don't know, I'm very lost and confused right now, I hope I'm not committing a sin by asking these questions. Verily, Allah knows my intentions are pure and for knowledge only.</p> <p>The reason I'm feeling so lost and confused is because, on some level deep down, I feel that taking marijuana is bad. I don't know if its because the Governments of the world have deemed it "illegal" or whether its because we've been told all our lives that things like this are "wrong" or whether its because I'm programmed in such a way as to feel guilty for being associated with it.</p> <p>Brothers and sisters, please answer my questions. You'd really be helping me out.</p>HamzaCMon, 08 Apr 2013 03:41:12 -0400
global_01_local_0_shard_00000017_processed.jsonl/4102
Comments on: How to know which program uses a particular module? Sat, 15 Mar 2014 18:43:36 +0000 hourly 1 By: bvining Mon, 13 May 2013 15:26:04 +0000 #comment-119356 I wrote a series of articles, starting with Module, Module, Who’s Got My Module located at, almost five year ago now, which provides this capability. The full series is:*srvpgms-on-the-system.html By: Anu143 Mon, 13 May 2013 12:22:20 +0000 #comment-119334 Right Tom, Many companies use this API.. Many will have the utility developed.. As just to enter the module name or file name and to list all the modules and programms using it By: tomliotta Thu, 14 Jun 2012 07:03:10 +0000 #comment-108461 There should only be one program that uses it. If a module is to be used in multiple programs, bind it into a service program. However, you can call the List ILE Program Information (QBNLPGMI) API in a loop passing in the name of a different program each time. It can list the modules in each program into a user space. You can check the list for a module name or write the list to a file. When all modules of all programs are in a file, you can query it for module names. I run a job every night over my program libraries to build a list of modules just so I’ll have them handy. I do the same for service programs.
global_01_local_0_shard_00000017_processed.jsonl/4103
IT Answers » File server software Sun, 16 Mar 2014 01:13:02 +0000 en-US hourly 1 virus – W32.STUXNET!INK Sat, 07 Aug 2010 12:35:17 +0000 2 Windows server 2003 file server configuration Fri, 11 Mar 2011 13:09:18 +0000 3 How to recover deleted files of file server from client? Thu, 14 Oct 2010 07:48:03 +0000 How to recover deleted files of file server from client, and server is not running with shadow copy?? ]]> 0 Stress testing network and file servers before launch Mon, 13 Sep 2010 13:33:04 +0000 Is there an application I can run to stress test my network and file servers? I want to make sure they will not die under stress when we go live with 2000+ users. Is there a product that can do this or will we need to script something? If that is the case are there any whitepapers or guides on setting this up? ]]> 1 Shared Folder Structure Tue, 05 Feb 2008 10:12:45 +0000 Hi, My company runs a file server (windows 2003 R2) which is many years old, and contains a shared drive which holds a large number of folders and documents. Everyone has full access to this shared drive, and over the years it has become very disorganised. Sometimes folders and documents are accidentally moved around and I have to waste time trying to locate things. The company now has a new file server, and I am ready to start moving things over to it. Can anyone recommend the best way to organise it? I was thinking of creating a fix folder structure so that people don’t have access to move things, but this wouldn’t prevent documents being accidentally moved. Is there a way to prevent folders that have been created by users being moved out of the folder they are created in? Or is there a different way around this altogether? Also, can anyone recommend any software which can create easily readable reports out of the audit logs? ]]> 0
global_01_local_0_shard_00000017_processed.jsonl/4104
IT Answers » Network Scanners Sun, 16 Mar 2014 01:13:02 +0000 en-US hourly 1 scanning over the network Wed, 24 Jun 2009 12:16:17 +0000 3 Antivirus Fri, 21 Sep 2012 12:07:26 +0000 2 Scanning the entire network for spyware Tue, 28 Jun 2011 19:03:51 +0000 Is it possible to scan the entire network for spyware/viruses? We are all running Windows 7 with 2008 AD. ]]> 1 McAfee’s EPO server scan Mon, 13 Jun 2011 15:59:30 +0000 Using Mcaffe’s EPO server can I schedule a scan on all network clients at a specific date and time? How do I set this up? How can I modify the time the clients download their updates? ]]> 0 University, is infected and starts a network scan… ]]> 1 How can I scan the network for changes like stolen memory or removed hardware? Spiceworks? Fri, 16 Jul 2010 13:58:51 +0000 Does anyone use Spiceworks in a corporate environment? I need to scan the network for changes like stolen memory or removed hardware. Is this possible and how can I do it? ]]> 1 Avision AV2800 Scanner Thu, 27 May 2010 05:39:20 +0000 I am almost at the point of purchasing a new Avision AV2800 Network Scanner for our Company. Problem I have is whether it will enable us to save our scanned files directly on to an iSeries5 IBM Server. I have heard other companies with a “Windows” file server do not have any problems with this, but unfortunately I am unable to find a source that has it networked to an IBM Server. The Filing spec on the Scanner for communication protocols are: FTP-HTTP-CIFS-AVPP-HTTPS.  Can anyone help out please.  ]]> 1 looking into a networked document scanner Wed, 01 Jul 2009 19:48:09 +0000 My boss recently has asked me to find a networked document scanner. I’ll be honest and say i’ve never in my life used or seen one lol. I’ve been looking around and doing some shopping for one tho. I’ve turned up a promising one, but its a very pricey one. I need one that can scan multiple pages from a remote location to a file located on a server. of course this will all be done over a local network and though a VPN. Apparently this should not be a problem, the problem comes in where I need this machine to have some form of option per user. I need the machine to be able to (once selected to) send to a specific file per user. Maybe something like how a fax machine has an address book that you select with place to send it to, the users will be able to select an option and that option will print the document to their specific file on the server. the Fujitsu fi-6010N is the machine i’ve found , it looks like a good one and will possibly do all that my boss wants it to do. Has anyone here had any experience with this machine or my specific problem and may offer any help please do. THANKS!! ]]> 6
global_01_local_0_shard_00000017_processed.jsonl/4114
Baby Names: The Ultimate Celebrity Popularity IndexS According to the list of 2009's most popular baby names, parents are drawing inspiration from pop culture. Specifically, Twilight: Cullen skyrocketed in popularity and Isabella's the top girl name. But other celeb-inspired names are out, namely Lindsay, Kimora, and Rihanna. The Social Security Administration released its annual list today, and the Associated Press reports that Jacob is the most popular boys name for the 11th year in a row, while Isabella has usurped Emma, which spent only two years at the top. Jacob's longevity means its spot at the top can't be attributed to parents naming their kids after their favorite underage werewolf. However, parents do want their boys to take after the Sparkle Vamp: Cullen is the male name that changed the most in popularity, rising 297 spots in the last year. Before Twilight-haters get too discouraged about the future of our society, the fastest riser for girls names this year was Maliyah, with Malia (the way the First Daughter spells her nickname) coming in ninth. But even being the first African-American president isn't enough to convince parents to name their son Barack; it's a little more popular, but only 69 parents picked the name. Though the AP was too polite to point it out, the list of the biggest changes in popularity also illustrates which celebrities' reputations were sullied in the last year. Lindsay made the sixth biggest drop, and Kimora, Rihanna, Jonas, and Miley (plus Mylee) all became significantly less-desirable names in the last year. (The author of this rant from The New York Times against unconventional spelling must be happy to see Mylee plummet to the bottom of the list.) All this goes to show that giving your baby a pop culture-inspired moniker is a risky venture. Naming your child after a movie/book franchise also means putting a lot of faith into its durability. Sure, Star Wars is still incredibly popular, and Leia is kind of nerdy-chic. But what if your parents' had really bad taste? You could've ended up living the rest of your life as or Rambo, Qui-Gon, or Urkel. Future parents, consider this a warning. Will the pressures of fame finally drive Robert Pattinson insane in 2010, causing him to lash out at fans in a neck-biting rampage? Probably not, but you never know. Popular Baby Names 2009 [SSA] Isabella Top Name For Girls; Jacob No. 1 For Boys [AP] Change In Name Popularity 2009 [SSA] <a href="Complaint Box | Brittney, Brittny, Brittneigh [NYT] [Image via TV Guide.]
global_01_local_0_shard_00000017_processed.jsonl/4115
How To Treat Female Investors Like WeirdosS This video on investment advice from the Wall Street Journal has a simple message: Women are women. They're weird and need their weirdness to be attended to. But they don't want to think that you're treating them like women. They want to think that you're treating them like human beings (whatevs!). So, whatever you do, never let them know that you're treating them like women. If you do this, you will make gazillions off of them. Go forth! The video after a short commercial (selected transcription below): Selected transcription: We all know women can be a little difficult… no one wants to feel that they are… being treated differently from the men, so what can advisers do to try to connect with women and keep from following that stigma? In other words, women are different and also more annoying than real people (e.g., men), so you need to treat them accordingly. But they don't know that they're different from real people (they're "difficult," after all), so you have to work around that. First… you can't approach women as women… don't treat her like a lady, treat her like a person… women need more time, they ask more questions… get to know what motivates her… if you connect with her on that level, not on the basis of her gender, that's the first mistake most advisers make… In other words, pretend like you're treating her like an individual, but know that what you're really dealing with is a creature named W.O.M.A.N. Second… she's gonna triangulate, women seek many sources of opinions… just know she's gonna do that, why don't you play along… give her other sources of information that augment the advice that you're giving her… that's a good way to play to women's natural ability and need to triangulate on advice that they're getting. She's gonna do it anyway, put that to your advantage. In other words, the goal here is to manipulate her essential woman-ness to your advantage. Don't actually help her learn more about investing, just feed her information that confirms what you're telling her. She'll never know the difference! Third… be aware and be prepared to invest. It's gonna take more to serve her… It takes time, she needs education… she's gonna ask a lot of tough questions… but if you invest that time up front… she's a better client… what advisers tell me time and time again: women are more fun. In other words, women are "better clients," even though they're a drag because they're "more fun"! Woo hoo! If women aren't good for fun, what are they good for! The conversation just goes on from there… the expert here tries so hard to balance the essentialization of women's nature and the social construction of gender, but she just really fails because she goes back and forth between both and her interviewer keeps cornering her with questions about how frustrating it is to work with women. Video submitted by Sarah P. This post originally appeared at Sociological Images. How To Treat Female Investors Like WeirdosS Republished with permission. Want to see your work here? Email us!
global_01_local_0_shard_00000017_processed.jsonl/4118
25 Burning Questions I Have About Vagina MurderS At 9:15pm Thursday night, my evening was on a romcom heroine pre-makeover trajectory — stretchy inside-pants donned, computer open, a half eaten 1 lb bag of Red Vines on my bed, and a Pac Man tumbler of white wine on the bedside table. There may or may not have been string cheese involved (I'm gross!). When suddenly, a Tweet appeared in my feed that Changed Everything. "I want @drake to murder my vagina," said Amanda Bynes or a lab chimp pumped full of sex hormones that had taken control of Amanda Bynes' Twitter account. I. Want. Drake. To. Murder. My. Vagina. I want Drake to murder my vagina. IwantDraketomurdermyvagina. What could it mean? Why couldn't I stop reading it? Why did getting fucked in the decency feel so good? I haven't been this preoccupied and disturbed by something since I was at a sleepover and accidentally looked in on my friend Jenny's mom's boyfriend watching a particularly not for kids part of Blue Velvet when I was in 5th grade. Murder my vagina. Vagina murder. The more I pull on it, the more I don't know. The more I need to know. Here are 25 of the mental dead ends I've encountered since I first learned of Vagina Murder. Maybe you can help me. 1. Is Vagina Murder covered by any provisions of the Violence Against Women Act? 2. What, if any, penalties would Drake face if he were to in fact murder Amanda Bynes' Vagina? 3. Would Drake face extradition to Canada if he were arrested for the murder of Amanda Bynes' Vagina? 4. What if Amanda Bynes is planning to fake her own vagina's death and then frame Drake for the murder? Can someone write a Law & Order: SVU episode about this? 5. What does Vagina Murder entail? I'm assuming from the fact that Amanda Bynes has really been GOING FOR IT — sexual histrionics-wise — lately that she intended the Tweet to be a sexual overture to Drake. Would that mean that only a penis can murder a vagina? 6. Can other things besides penises murder vaginas? Could a vibrator murder a vagina? How about a knotted sheet? Could I theoretically murder my vagina with my own fingers? 7. Is Amanda Bynes offering her vagina as a sort of spiritual sacrifice to Drake? Was this a public offering of her vagina in the same way that Aslan publicly offered himself to the White Witch in The Lion, The Witch & The Wardrobe? 8. Is Drake a known murderer of vaginas? If so, why are we only paying attention to his vagina murder when a pretty, rich, famous girl publicly brings it to our attention? How many thousands of non-famous, non-rich, possibly non-pretty vaginas has Drake murdered? What does this say about us as a society? 9. What possible benefit could Amanda Bynes gain from having a murdered vagina? 10. Did Amanda Bynes recently take out an insurance policy on her vagina that pays out millions in the event that her vagina is murdered? Maybe she should delete that Tweet then because insurance investigators will find it in, like, a second. 11. What does Amanda Bynes' vagina have to say about this? 12. Is there any way that vagina protective services can intervene and perhaps seize temporary custody of Amanda Bynes' vagina, since she's calling for its murder and clearly shirking her responsibilities as the caretaker of a vagina? 13. Because this was broadcast on the internet, if Amanda Bynes' vagina were to be murdered, would this become a matter for the FBI? 14. Is Amanda Bynes really mad at her vagina or something? I feel like the vagina must have done something to make Amanda angry with her, otherwise Amanda publicly call for her vagina's execution. 15. What would my vagina have to do for me in order for me to take a hit out on it? 16. What if Amanda Bynes just realized that her sexual urges were becoming a detriment to her happiness? If that's the case, why does Drake need to be the one to murder her vagina? 17. Has Amanda Bynes considered less extreme means of vagina surrender than murder? Has Amanda Bynes considered vagina adoption? 18. What if Drake tried to murder Amanda Bynes' vagina and it didn't work because her vagina is tenacious and then her vagina came out of a coma and was like, Now it's my turn, bitches, and then Quentin Tarantino made a movie about it? I'd watch. No, I actually probably wouldn't. 19. Is it possible that Amanda Bynes just made a typo and she actually wanted Drake to murder something other than her vagina? 20. If you murder a vagina in Texas, can you still get the death penalty? 21. What if during sex people yelled "Murder me! Murder my cock/pussy!" instead of the normal stuff that people yell? Gross. 22. How amazing would it be if Drake responded, "Sry, @AmandaBynes, I only murder buttholes."? 23. Seriously though what do you think Drake did in response? If I were his publicist, I'd have driven over to his house and been like GET OFF THE COMPUTER NOW! STOP LOOKING AT THE INTERNET! 24. Oh man, do you think there's going to be a reference to vagina murder on Drake's next album? Do you think he'll actually use the word "vagina" or will he call it something Drake-y like "vajay-jaaaaaaayyyyyy"? 25. Why would you Tweet that? Any insight, readers? Any burning questions of your own? Leave them in the comments.
global_01_local_0_shard_00000017_processed.jsonl/4120
Now that Obamacare's implementation is all but inevitable, conservatives are doing all sorts of nutty shit to try to stop it at the last minute. They're threatening to shut down the whole government over it, which is the political equivalent of cutting off one's head to spite one's face. They're filing a metric crapton of lawsuits against it. But my favorite conservative freak out is where they tell people not to sign up for it — with this unbelievably ironic video aimed at young women. "Obamacare is letting the government into your vag!" says the party of the transvaginal ultrasound. Let's go on a journey through the destruction of irony, like, as a concept. Here are other ways that this ad is among the most hilariously self-implicating pieces of propaganda: • "OPT OUT" as the name of a conservative-helmed program when, like, it's written right into the GOP's platform that women who become pregnant should not be able to OPT OUT or pregnancy. Other things women seeking abortions would not be able to "OPT OUT" of, if the conservative party had its way: listening to a fetal heartbeat, looking at a fetal ultrasound, a transvaginal ultrasound, a condescending lecture from a doctor about scientifically debunked non-dangers of abortion. One proposed Texas law suggested women who seek abortions should have to take a mandatory adoption class. OPTING OUT! • "Don't let the government play doctor," says the tag line of an ad created by the same people who do exactly that, like, fucking constantly. • Uncle Sam long ago became young women's creepy uncle when the government first got into all this vagina policing in the first place. • Remember when Rick Santorum was all "birth control pills give women a license to 'do things'" and by "things" he meant "fuck"? Creeeee-pyyyyy. • What if we replaced the soundtrack of this ad with Republicans talking about female bodies? It would actually be a better ad. Planned Parenthood responded swiftly and without pity. Here's a statement from Eric Ferrero, VP of Communications for PPFA, “It is hard to tell if this is real or if it’s a ‘Saturday Night Live’ parody about the hypocrisy of extremists who want to be in every exam room in America but don’t want to expand access to quality health care. These are the same extreme Koch-funded political groups who have tried to pass transvaginal ultrasound laws and other laws allowing politicians to interfere with people’s personal medical decisions. These videos are the height of hypocrisy, but more importantly they are irresponsible and dangerous, designed to spread misinformation and discourage people from getting access to high quality, affordable health care.” Guys. Guys. This ad contains literally the most projection I've ever seen, and the other day stood next to a train to a male hipster reading Oscar Wilde who whispered "fag" under his breath as a trans woman deboarded. This is madness.
global_01_local_0_shard_00000017_processed.jsonl/4124
Now You Can Have Tilda Swinton and David Bowie All Over Your AssS If you have thirty dollars burning a hole through your shark leggings, you might want to take that shit next level and fashion your crotch, buttocks, and legs with these earth angels. The seller writes on Etsy: These urban chic psychedelic leggings feature an intricate pattern of portraits of two of our favorite celebrities in the world of music and cinema, David Bowie and Tilda Swinton. The merging of the photos cleverly assumes an abstract floral appearance when seen from afar and explodes in intricate detail when inspected closely and believe me when I say that everyone around you is going to be craning their necks for a longer glance and trying to sneak in a closer look at this awesome piece of leg wear. So are we all buying these? Or what? Okay, it's or what. I get it; I get it. [Etsy, inspired by Tilda Stardust]
global_01_local_0_shard_00000017_processed.jsonl/4150
Tabassaran in Turkmenistan Largest Religion Main Language Profile Source: Bethany World Prayer Center Introduction / History The Tabasaran live in southern Daghestan and in the former Soviet Republics. They inhabit the areas along the upper Rubas-chai and Chirakh-chai Rivers, north of the Samur valley. In Daghestan, they compose nearly 5% of the population. Ethnically, they are very united, having resisted pressure from foreign rulers for centuries. The Tabasaran speak several languages. Their native tongue is called Tabasarantsy; however, Azerbaijani, Lezgin, and Russian are also widely spoken. The development of writing in the Tabasaran area came with the spread of Islam, as first the Arabic language and later the Arabic script were introduced. Most Tabasaran live in rather mountainous areas, but some have moved to the lowlands and the foothills. The climate of their territory is moderate to warm, with fairly mild winters, hot summers, and rainy and humid autumns. The mountains are thus used as summer pastures, and the plateaus, as winter pastures. What are Their Lives Like? The Tabasaran were traditionally divided into clan groups called tukhums. These clans included several households related to a common male ancestor. Today, the clan system remains intact, and vendettas (blood feuds) still occur. Traditionally, marriages were arranged by not only the immediate family but also a wide circle of relatives. The couple was usually young (15 or 16) and came from the same social and economic level. The newlyweds often lived with the groom's family. Until the early twentieth century, extended families were common, consisting of even three or four generations. Now, the nuclear family is the norm. Traditionally, every village had a gathering place (usually near the blacksmith's shop or mosque) where village meetings where held. However, during the Soviet years, new areas with special buildings for social or cultural activities were sometimes built next to the villages. New villages arose in the lowlands, with straight streets, running water, and electricity. Traditional Tabasaran houses were usually two-storied stone dwellings. In mountain areas, houses often had three or four stories. During Soviet times, modern two-storied houses were built with large windows, shingled or metal roofs, and yards; but traditional floor plans and decorations were kept. The Tabasaran economy was originally based on growing crops such as wheat, rye, millet, buckwheat, beans, and maize; raising livestock; and growing grapes for wine. Cows, bulls, and steers were kept in the foothills and sheep were kept in the higher areas. The typical diet included grains, beans, wild herbs, meat, and milk. The main beverage was a buttermilk drink. Some mildly alcoholic drinks were also popular. Today, the diet is basically the same but with more variety, and includes vegetables and preserves. The Tabasaran often held trades as embroiderers, rug weavers, wood crafters, carvers of wood and stone, coppersmiths, silversmiths, felt makers, tanners, and weavers of wool, flax, and cotton. Today, only rug weaving, embroidering, woodworking, and silver- and coppersmithing are still practiced. In Soviet times, the craftsmen united into cooperative groups, but today many work in neighboring districts. What are Their Beliefs? The Tabasaran remain virtually all Muslim, as they have been since the Arab conquests of the ninth century. Before that time, Christian elements were part of their culture. Today, every village has a mosque, and larger villages may have more than one, often with Islamic schools nearby. Nevertheless, remnants of their pre-Islamic beliefs are still evident. There are cults associated with fire, stones, trees, and caves. Traces of earth, sun, sky, and moon worship still exist, as well practices that include worshiping the graves of holy men, using magic, and performing rituals to bring sunshine or rain. Many also believe in protective deities and spirits. What are Their Needs? The Tabasaran are in desperate need of a viable Christian witness. Prayer, laborers, and evangelistic tools are urgently needed if the Tabasaran are to come to know Jesus. Prayer Points * Ask the Lord of the harvest to send forth laborers who will share the love of Christ with the Tabasaran. * Ask God to raise up prayer warriors who will intercede for the Tabasaran. * Pray that strong local churches will be raised up among the Tabasaran. Submit a new profile or correction Submit an update Country Turkmenistan Continent Asia Region Central Asia 10/40 Window No Location in Country Submit an update People Name General Tabassarian People Name in Country Tabassaran ROP3 Code 109671 Joshua Project People ID 15158 Indigenous Yes Population in Turkmenistan 220 Least-Reached Yes Alternate Names for People Group Ghumghum, Submit an update Tabassaran 216 Submit an update Affinity Bloc Eurasian Peoples People Cluster Caucasus People Name General Tabassarian Ethnic Code CEW17b Submit an update Largest Religion Islam 0.00%    ( Evangelical  0.00% ) Ethnic Religions Other / Small Christian Segments Other Christian Roman Catholic Photo Source: Anonymous Profile Source: Data Sources: Data is compiled from various sources. Read more Get Involved Register ministry activity for this group
global_01_local_0_shard_00000017_processed.jsonl/4164
One of England&#39;s Biggest Rock Stars Blames Games for RiotsS The reason for a city's youth rioting for days are no doubt complex and many. But, hey, let's blame video games, because that's exactly what rocker Noel Gallagher is doing. "We live in this age of violence—and I don't care what other people say: Brutal TV and brutal videogames are a reason for this pointless violence as well," Gallagher told Bang Showbiz. "The people are immune to violence, they are used to it. And if they get caught they aren't punished the right way. The prisons are already full? Then build new ones!" Meanwhile, a Malaysian student got his jaw broken when his PSP was stolen from him (the suspect has since been arrested). So...not sure how that factors in when you have an innocent gamer getting brutally attacked and has his PSP stolen. It's all a wash. Gallagher was the former singer songwriter for UK band Oasis; he's now gone solo. This isn't the first time that Gallagher's pinned video games for crime. In 2008, he thought that video games could be behind UK knife crime. Gallagher does like some video games! He once said that Guitar Hero was "better than two goblins trying to fuck a donkey up the arse with a laser beam." I like Noel Gallagher better when he talks about stuff he knows and understands and less so when it sounds like he's parrotting the London Evening Standard. Noel Gallagher wants more prisons [News Junkie via NME Thanks, mr_raccoon!] (Top photo: Chris Pizzello | AP)
global_01_local_0_shard_00000017_processed.jsonl/4165
Nintendo Just Made Sony&#39;s Life Difficult with the Monster Hunter Smash and GrabS The secret to Sony's success in Japan is summed up in two words: "Monster" and "hunter". The series has sold millions of PSP copies and millions of PSPs. It looks set to do the same thing. This time, MH won't only be doing that Sony's handheld portable, but for the Nintendo 3DS. Since launch, gamers have been down on the Nintendo 3DS's games, or lack thereof. Today in Tokyo, Nintendo went though a healthy line-up of revealed titles like Kid Icarus: Uprising and teased new ones like Mario Tennis. During the build up to today's event, it was expected that Nintendo would show of its second circle add-on, which was revealed recently in a Japanese gaming magazine. Nintendo did not. Even when when Monster Hunter 3 G's producer took the stage, Nintendo did not show the tacked on circular slide pad. Perhaps it the universally bad reaction the add-on circle pad got that might have made Nintendo decide not to show the add-on circle pad. There is something going on with that pad. Monster Hunter 3 G uses it, and Metal Gear Solid 3D: Snake Eater developer Kojima Productions received one. Kid Icarus: Uprising was delayed, leading to speculation that the game is being retrofitted for the second circle pad. The second circle pad chatter became utterly irrelevant in Japan by the end of the press conference when Nintendo revealed that Monster Hunter 4 was in development—for the 3DS. Monster Hunter is not nearly as popular in the West as in Japan, but for Japanese gamers, an announcement like this will have them second guessing any decisions to buy the PS Vita over the 3DS. Nintendo just turned this into a good old fashioned hardware war. Tomorrow, Sony is holding its press conference, and it better have some aces up its sleeve. Nintendo just went for the jugular. (Top photo:
global_01_local_0_shard_00000017_processed.jsonl/4179
XMenu Adds Custom Menus to Your OS X MenubarS By default, XMenu will only provide you with an Applications menu, but if you command- or control-click that Applications menu you'll be able to select Preferences and decide how you want things to work. You can add menus for Developer Apps, your home folder, Documents, Snippets, and one for whatever you want. In the picture above, you can see I set it to my Dropbox. One downside is that the custom menu can't be set to a specific path, but rather has to reside in XMenu's Application Support folder, but this is really easy to work around. Basically, you just command-click the custom menu, choose "Open Folder in Finder," and then delete the Custom folder in XMenu's Application Support folder. Now make an alias of whatever folder you want and move that alias into XMenu's Application Support folder. Rename it as "Custom" and XMenu will think the alias is the folder it's looking for. All in all, XMenu provides a handy way to access a wide variety of stuff from the menubar. Its look is also pretty customizable and the app is free to download. XMenu Adds Custom Menus to Your OS X Menubar XMenu | Devon Techonologies via Addictive Tips via @ibn_adem
global_01_local_0_shard_00000017_processed.jsonl/4180
&quot;Want It? Get It.&quot;S This quotation comes from entrepreneur Andy Swan, and reminds us that we have a tendency to overcomplicate things. Sometimes when you want something, you just need to formulate and act on a plan to get it. Not everything is quite so complicated as we often believe. Want It? Get It | Andy Swan via The Michael Galpert Experience
global_01_local_0_shard_00000017_processed.jsonl/4187
Re: <meter> and <progress> (was RE: Implementor feedback on new elements in HTML5) From: Tab Atkins Jr. <[email protected]> Date: Wed, 2 Sep 2009 08:27:21 -0500 Message-ID: <[email protected]> To: Jonas Sicking <[email protected]> Cc: Leif Halvard Silli <[email protected]>, Adrian Bateman <[email protected]>, Maciej Stachowiak <[email protected]>, HTMLWG WG <[email protected]> On Wed, Sep 2, 2009 at 12:31 AM, Jonas Sicking<[email protected]> wrote: > The problem with temperatures is that they're generally unbounded. Or > at least doesn't have a hard upper limit. So I'm not sure how you'd > use a <meter> with them. When used in non-scientific contexts, temperatures are bounded; the typical limits are something like -20F to 100F, with some slight variation roughly by latitude. The visual analogy is virtually always a thermometer, which obviously has an upper and lower bound. On Wed, Sep 2, 2009 at 3:21 AM, Leif Halvard > So, if you accept that usecase description, then I think we can conclude > that the words in a tag cloud represent meters - typically the font-size of > each word represents the relative "hotness" of each tag. Theoretically, yeah, those are totally (labelled) meters. Realistically, I don't know if it's possible to style them sufficiently to make that work (you'd have to somehow vary font-size based on the meter's %). Definitely a use-case to keep in mind when discussing styling, though. Received on Wednesday, 2 September 2009 13:28:28 GMT
global_01_local_0_shard_00000017_processed.jsonl/4188
[Bug 16222] New: editorial: "surrounds ... by'' From: <[email protected]> Date: Sat, 03 Mar 2012 17:43:49 +0000 To: [email protected] Message-ID: <[email protected]/Bugs/Public/> Summary: editorial: "surrounds ... by'' Product: HTML WG Version: unspecified Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: HTML/XHTML Compatibility Authoring Guide (ed: Eliot AssignedTo: [email protected] ReportedBy: [email protected] QAContact: [email protected] [email protected], [email protected] Section 7 says: Polyglot markup surrounds attribute values by either single quotation marks or by double quotation marks. Those two occurrences of "by" need to be "with" (values can be surrounded by quotation marks, or markup can surround value with quotation marks, but markup can't surround them by quotation marks; that doesn't make sense grammatically (mixing passive and active voice, or something like that)). You are on the CC list for the bug. Received on Sunday, 4 March 2012 13:43:29 GMT
global_01_local_0_shard_00000017_processed.jsonl/4190
Re: a guy with 5 first names, from I18N comments on P3P, for vCard/RDF From: Dan Connolly <[email protected]> Date: Fri, 17 Nov 2006 04:21:05 -0600 To: Ivan Herman <[email protected]> Cc: [email protected] Message-Id: <1163758865.3997.195.camel@dirk> On Fri, 2006-11-17 at 11:08 +0100, Ivan Herman wrote: > Indeed, and van Mierlo's name was by no means unusual by Dutch > standards. Although I might consider A.F.M.O. as middle names; I am not > really sure what 'middle name' means... The term in the vCard spec isn't 'middle name' but 'additional name'; who knows if that's any clearer... Is there software that Dutch people commonly use to manage their contacts? Does it read/write vCard format? Does it exploit anything beyond the fullname field? After all, this isn't a philosophical excercise; it's software engineering. I didn't put the "van" prefix in any of the n sub-fields. Is there one that it belongs in? Does this name get alphabetized under 'v' or under 'M' in the phonebook? > > > > -- http://www.w3.org/2002/12/cal/rfc2426#sec3.1.2 D3C2 887B 0F92 6005 C541 0875 0F91 96DE 6E52 C29E Received on Friday, 17 November 2006 10:21:14 GMT
global_01_local_0_shard_00000017_processed.jsonl/4193
From: Gez Lemon <[email protected]> Date: Wed, 18 Jul 2007 20:35:59 +0100 Message-ID: <[email protected]> To: "Ben Maurer" <[email protected]> > Once a user solves a specific CAPTCHA, they can not be allowed to use the > CAPTCHA again. Otherwise you could amplify a human based attack by > re-using human solutions. It's not that the code can't be done, however > getting the security aspect of it right is a bit harder. The usability aspects make it worth the extra work to getting the security aspect right, in my opinion. At the moment, AOL do re-present the same CAPTCHA, so if they're not safe-guarding against this right now, it's something they will need to address. > Also -- it's a lot easier to just validate in JS on the client side. Then > on the server side you only need to validate for non-js clients (and to > protect against evil users). In this case, having the "hide the CAPTCHA" > functionality would be unnecessary. That would depend on how the errors are reported to the user. Client-side validation could also be used to verify the CAPTCHA with Ajax, and removed if it is okay. Supplement your vitamins Received on Wednesday, 18 July 2007 19:36:08 GMT
global_01_local_0_shard_00000017_processed.jsonl/4194
Re: Conditional HTML Alternatives Paul Prescod ( Fri, 22 Mar 1996 16:01:52 -0500 Date: Fri, 22 Mar 1996 16:01:52 -0500 Message-Id: <> To: "David W. Morris" <> From: Paul Prescod <> Subject: Re: Conditional HTML Alternatives Cc: Paul Prescod <>, At 01:17 AM 3/21/96 -0800, David W. Morris wrote: >These proposals break because they demand that there be a DTD which >which describes all possible combinations as opposed to having two >DTDs which are applied conditionally. Websoft has always maintained such a DTD as have others (InContext, for example). Is there any reason to expect that they would stop? >THe CPP and MARKED section >approachs don't require: > 1. COntent providers to be DTD lawyers They don't have to be DTD lawyers. They just have to download the latest experimental DTD from W3C, WebSoft or someone else? > 2. Every UA to be capable of groking every arbitrary DTD and mapping > it against the UA's capabilities. No they don't. If you don't recognize an element name, you look around for the NO.XXX element. You don't have to be able to read a DTD to do that! >In addition, there are UA characteristics which are not ever likely to >be represented in a DTD. For example, hardware characteristics of the >UA's execution environment. We are talking about a platform for experimentation, right? I didn't mean to suggest that my convention would replace marked sections _everywhere_. HTML already supports marked sections. I'm saying that the existing marked section mechanism is not the best tool to use for experimental feature support. It is too hard to validate and (subsequently) edit. >THe <ALT> proposals, the <NO*> proposals etc. all become rather quickly >embroiled in discussion of how to order things what the content model >might have to be, what the restrictions are on extensions to make it >work, etc. Discussion isn't bad. Sure, the proposals seem more complicated, but they are complications for the UA vendors and DTD writers instead of complications for authors. >We need and will continue to need a solution which transcends those >concerns. Lets create an extensiblity environment where we can devote >our energies to design of the functionality not how to retrofit it >to the existing world. The whole point of this discussion is about how to retrofit functionality into the existing world! How can we ignore that issue??? >Don't presume that a situation has a single alternative. Don't require >any understanding, including access to new DTDs, on the part of >already deployed UAs for the new features/markup to be tolerated My proposal used several redundant conventions so that UAs would _not_ need to get new DTDs. That was a major concern of the proposal. My solution is no more or less dependant on new DTDs than is any marked section-based proposal. Paul Prescod
global_01_local_0_shard_00000017_processed.jsonl/4195
OL starting with zero From: Joachim Noreiko <[email protected]> Date: Tue, 26 Mar 2002 00:25:45 +0000 (GMT) Message-ID: <[email protected]> To: [email protected] Is there a simple way to set the starting number of an ordered list in CSS, an equivalent of the HTML start attribute for OL? It's possible with "counter", I know, but currently few browsers seem to support this. Might I suggest an extra list-style-type, say "code" which is equivalent to "decimal" but starts with zero? Do You Yahoo!? Everything you'll ever need on one web page from News and Sport to Email and Music Charts Received on Monday, 25 March 2002 19:25:45 GMT
global_01_local_0_shard_00000017_processed.jsonl/4196
link colors need to be set From: Daniel Convissor <[email protected]> Date: Fri, 21 Nov 2003 00:16:00 -0500 To: [email protected] Message-ID: <[email protected]> Hi Validator Crew: Thanks for the great resource. The http://validator.w3.org/ site sets the background and text colors, but doesn't indicate colors for a:link or a:visited. Thus, the links aren't guaranteed to show up in a colors contrasting with the background. Can you please add these two items to base.css? data intensive web and database programming 4015 7th Ave #4, Brooklyn NY 11232 v: 718-854-0335 f: 718-854-0409 Received on Friday, 21 November 2003 00:16:52 GMT
global_01_local_0_shard_00000017_processed.jsonl/4230
Subject: Re: NetBSD 1.5 on PowerBok 165C To: gabriel rosenkoetter <> From: Frederick Bruckman <> List: port-mac68k Date: 07/01/2001 09:04:24 On Sun, 1 Jul 2001, gabriel rosenkoetter wrote: > On Sun, Jul 01, 2001 at 08:38:25AM -0500, David C. Hacker, DVM wrote: > > Jul 01 08:35:10 CDT 2001 PowerBook165C getty [174]: /dev/ttyE0: No such file > > or directory > Myssing ttyE0 is either a symptom of coming from the time before > wscons (which uses ttye0, if memory serves--at the least a different > file name, for the console) or of not having created the device > files properly. It's a known bug with NetBSD 1.5. The wscons-friendly updated Mac OS NetBSD Installer has been in the current directory for some time, but 1.5, as distributed, will forever require the work-around you posted. It's actually a FAQ:
global_01_local_0_shard_00000017_processed.jsonl/4232
Subject: Re: CVS commit: syssrc/sys/dev/ic To: None <> From: Atsushi Onoe <> List: source-changes Date: 04/18/2002 16:36:27 > Log Message: > (force commit: no changes in the code) > WI_RID_SCAN_APS in previous commit works for Intel Pro/Wirelss 2011 > with firmware 2.51.1. > It seems that the firmware automatically updated after the card runs on > Windows 2000 with 2011_2011B_CD_3.0 in Intel web site. The update may be done by WinXP version of the driver 'Intel_2011_PCcard_WinXP' from Intel WWW site. I can't confirm which takes in effect... Atsushi Onoe
global_01_local_0_shard_00000017_processed.jsonl/4234
Subject: Re: kqueue and NFS To: Jason R Thorpe <> From: Jaromir Dolecek <> List: tech-kern Date: 09/29/2002 09:44:04 Jason R Thorpe wrote: > > I'd think that polling would be appropriate in this context, > > since that's basically what apps would do before kqueue. > > but at least with kqueue it's being done in the kernel > > so that apps don't have to know about it. if kqueue doesn't do this > > then kqueue is pretty much useless for NFS. > Hm, okay, but presumably this behavior would only be enabled if there > are actually active kqueues watching a given vnode? Yes, that's the plan. Jaromir Dolecek <>
global_01_local_0_shard_00000017_processed.jsonl/4241
Subject: Re: bind/named and nslookup To: Michael Graff <> From: Not for internal consumption <> List: tech-userlevel Date: 02/19/1999 12:14:45 Michael Graff sez: * (Greg A. Woods) writes: * > I think nslookup (and host) should be in /usr/bin, not /usr/sbin. * And dig. And traceroute. And ping in /sbin is annoying. :) Well, one could argue that dig and traceroute and ping are "not for general consumption", i.e. they're intended for people who know what they're doing. I think those kinds of people put /sbin and /usr/sbin in their path as a matter of course. * --Michael
global_01_local_0_shard_00000017_processed.jsonl/4253
Sony's Cute Speaker Ball Is Music to our Ears At least mine does, but that's probably because it's raven colored. I really wanted one of the bright pink ones — it just seems to go better with the spherical shape — but black still makes a statement, if a quieter one. And by quiet, I'm referring to the design, of course — not the sound. Veronica actually plays fairly loud for a tiny ball. She's not going to sustain a house party, but a hotel room, definitely. Part of a growing trend among accessories, Sony's egg is equipped with NFC (near-field communication) for instant pairing with any NFC phone. That includes almost all top-line Android models, including Sony's as well as franchise players such as the Samsung Galaxy S4 and HTC One, but not the iPhone. To pair, just enable NFC through the phone's settings and hold it over the top "bridge" over the driver, where the NFC tag sits. This will immediately links the phone with the speaker via Bluetooth. Those without NFC phones can fall back to the plain old Bluetooth pairing, which is hardly cumbersome, but still complicated enough that it prevents many from ever using it. There's also a mini-jack input for a hard-wire connection. I had some trouble pairing Veronica with my iPhone 4S via Bluetooth (I kept seeing "ubuntu-0" appear as the speaker's name in my Bluetooth device list, which never paired), so I switched to an HTC One with NFC. A few seconds later, I was rocking out to Pandora on the Sony. I listened to various types of music — from the slow, airy notes of the soundtrack to Chocolat to the rough-and-tumble Three Days of Grace's "Animal I Have Become" — and Veronica performed extremely well. That is, except when I turned the volume all the way up. At maximum volume, her sound started to break up with distortion, so I kept things a couple notches down for the rest of my listening (side note: volume controls aren't integrated, which is a tad disappointing). That was still loud enough to fill a conference room with good sound. Comparing the Sony's performance with that of the little Jambox, Veronica held her own. She couldn't match the Jambox's volume, but her small 360-degree driver gave a little extra oomph to the midrange. Overall, though, the Jambox won. Still, not bad for $69.99 (the li'l Jambox is $179.99). My favorite Bluetooth speaker right now is still the UE Boom, but for something a little more portable, pairable and — let's face it — pretty, Veronica ... er, the Sony SRS-BTV5, is a great cheap date for a casual night out. Images by Emil Lendof, Mashable Load Comments The New Stuff The Next Big Thing What's Hot
global_01_local_0_shard_00000017_processed.jsonl/4258
Take the 2-minute tour × Update : Should have left the Arithmetic out of this question, the new modified question is posted here : $\wedge,\cap$ and $\vee,\cup$ between Logic and Set Theory always interchangeable? Although have not seen this anywhere stated, but so often mentally swapping the frameworks of Logic, Set Theory and Arithmetic following operation $\wedge,\cap,\times$ and $\vee,\cup,+$ are seem to be always interchangeable (Isomorphic?). My question is are $\wedge,\cap,\times$ the same thing and just different symbols are being used depending on the framework? same question regarding $\vee,\cup,+$ PS: In arithmetic setting we get the case of $[0, \text{any number other than 0}] \equiv [false , true] $ For example De Morgan's laws for Sets and Logic just becomes the distributive and associate laws. What about infinite cases? does this type of intuition break down between Arithmetic, Logic and Set theory? share|improve this question In Set Theory, $\cap$ and $\cup$ distribute over each other: $a\cap(b\cup c) = (a\cap b)\cup (a\cap c)$ and $a\cup(b\cap c) = (a\cup b)\cap (a\cup c)$. In arithmetic, $\times$ distributes over $+$, but $+$ does not distribute over $\times$; that is, $a\times(b+c) = (a\times b)+(a\times c)$, but in general, we do not have $a+(b\times c) = (a+ b)\times (a+ c)$. So even in this very basic setting, you have that $\cap$ and $\times$ have different properties relative to $\cup$ and $+$, respectively. –  Arturo Magidin Feb 18 '12 at 23:11 @ArturoMagidin : That is the counter example I needed, can you please post it as an answer so I can accept it? Thank you –  Arjang Feb 18 '12 at 23:23 But still $x \in A \cap B$ is the same as $(x\in A) \wedge (x \in B)$ and the same for infinite cases (but I have never seen an infinite conjunction contrary to infinite intersection). Similarly for $\cup, \vee$: $x \in \{y: \phi(y)\} \cup \{y: \psi(y)\}$ is the same as $\phi(x) \vee \psi(x)$. –  savick01 Feb 18 '12 at 23:39 @savick01: Infinite conjunctions and disjunctions are sometimes seen, e.g., $\bigwedge\limits_{n\in\omega}(x\ne c_n)$. –  Brian M. Scott Feb 18 '12 at 23:51 I've seen "$+$" used to denote the symmetric difference between sets, since that corresponds to mod-2 addition of indicator functions. So that's certainly not the same as "$\cup$". –  Michael Hardy Feb 19 '12 at 0:05 show 1 more comment 2 Answers up vote 9 down vote accepted As requested; (I think the question is a bit confused and fuzzy as it stands, but...) In set theory, $\cap$ and $\cup$ distribute over each other: $$a\cap(b\cup c) = (a\cap b)\cup (a\cap c)\qquad\text{and}\qquad a\cup(b\cap c) = (a\cup b)\cap (a\cup c).$$ However, in arithmetic (by which I understand the Peano arithmetic or its extensions to $\mathbb{Z}$, $\mathbb{Q}$, etc), while $\times$ distributes over $+$, $+$ does not distribute over $\times$. We always have $a\times(b+c) = (a\times b)+(a\times c)$, but almost never have $a+(b\times c) = (a+b)\times(a+c)$. So $\cap$ and $\cup$ in set theory have properties, relative to one another, that are different from the properties of $\times$ and $+$ in arithmetic. share|improve this answer Thank you Arturo, including arithmatic in this question was wrong, the similarity is extreeme in Logic and Set Theory –  Arjang Feb 19 '12 at 0:29 add comment "+" isn't like "$\lor$". (x+x)=(2*x). On the other hand, in classical logic, (x $\lor$ x)=x. Specifically, (1+1)=2, while (1 $\lor$ 1)=1. It comes as more useful to compare "∧,∩, min" and "∨,∪, max". Logical and set-theoretic operations behave more like the minimum of two numbers, and the maximum of two numbers than anything else (and max and min are dual operations if we have (1-x) as the complement of x). share|improve this answer agreed, it was a mistake to include arithmatic the new question is posted here : math.stackexchange.com/questions/110760/… –  Arjang Feb 19 '12 at 0:27 Not "more than anything else". They're just all lattice operations, and there are plenty of other examples. Also, $+$ is a bit like $\vee.$ There are differences, but there are similarities too. –  user23211 Apr 3 '12 at 23:59 @user2311 A lattice L can get defined as a partially ordered set where for all x, for all y in L, sup{x, y} exists and inf{x, y} exists. Do you deny that max is closer to sup than anything else, and that min is closer to inf than anything else? –  Doug Spoonwood May 23 '13 at 20:36 add comment Your Answer
global_01_local_0_shard_00000017_processed.jsonl/4259
Take the 2-minute tour × For example how come $\zeta(2)=\sum_{n=1}^{\infty}n^{-2}=\frac{\pi^2}{6}$. It seems counter intuitive that you can add numbers in $\mathbb{Q}$ and get an irrational number. share|improve this question Every real number is the sum of countably many rational numbers. –  Did Mar 4 '12 at 9:47 Properties that are preserved under a finite number of operations are not necessarily preserved under an infinite number of them. –  Rahul Mar 4 '12 at 9:57 Real numbers have the property that the bounded infinite sum of positive real numbers is a real number because of completeness. This is not a property of rational numbers, so I would intuitively expect some bounded infinite sums of positive rational numbers not to be a rational number. –  Henry Mar 4 '12 at 10:15 because real number are closure of rational numbers. –  quartz Mar 4 '12 at 12:12 Another example to illustrate Rahul's point: the product of infinite positive reals can yield zero: $\prod_{n=1}^\infty 1/n = 0$ or more simply $\prod_{n=1}^\infty 0.5 = 0$ –  leonbloy Apr 30 '12 at 18:36 show 1 more comment 6 Answers up vote 183 down vote accepted But for example $$\pi=3+0.1+0.04+0.001+0.0005+0.00009+0.000002+\cdots$$ and that surely does not seem strange to you... share|improve this answer +1 - This is lovely. –  boehj Mar 4 '12 at 11:57 Interesting... as a side note, you can determine the size of an infinite set by seeing if it can fit inside another infinite set. This isn't directly relevant here, but still is something important to understand. en.wikipedia.org/wiki/Aleph_number –  JSWork Mar 5 '12 at 15:06 @JSWork, not only would I say that that isn't directly relevant here: it is quite irrelevant, in fact! :D –  Mariano Suárez-Alvarez Mar 7 '12 at 4:11 add comment This has to see with the rate at which the sum/series converges to its limit and the Roth-Thue-Siegel theorem which allows you to use the rate of convergence to decide if the limit is rational or not. Maybe Emile (the OP) meant to ask something of this sort (please let me know, Emile): why do some (convergent, of course) infinite sums of rationals are rational and others are irrational? share|improve this answer this is a different question.. –  AIB Mar 6 '12 at 9:41 How so? The conditions/rate of convergence affect whether the limit is rational or not. Don't they? –  AQP Mar 6 '12 at 16:54 add comment You can't add an infinite number of rational numbers. What you can do, though, is find a limit of a sequence of partial sums. So, $\pi^2/6$ is the limit to infinity of the sequence $1, 1 + 1/4, 1 + 1/4 + 1/9, 1 + 1/4 + 1/9 + 1/16, \ldots $. Writing it so that it looks like a sum is really just a shorthand. In other words, $\sum^\infty_{i=1} \cdots$ is actually kind of an abbreviation for $\lim_{n\to\infty} \sum^n_{i=1} \cdots$. share|improve this answer Good point to observe! –  user21436 Mar 4 '12 at 10:25 @TonyK, nop, you really cannot. What you can do is to take the limit of sequences of partial sums: there is a difference between that and «summing an infinite sequence of numbers». In particular, the latter simply does not make sense. –  Mariano Suárez-Alvarez Mar 5 '12 at 2:06 @TonyK, Dear TonyK: if you read Rudin with care you will see that it nowhere does that. –  Mariano Suárez-Alvarez Mar 5 '12 at 20:05 Oh well. ${}{}$ –  Mariano Suárez-Alvarez Mar 5 '12 at 22:07 @TonyK Quoting from Rudin: "The number $s$ is called the sum of the series, but it should be clearly understood that $s$ is the limit of a sequence of sums and is not obtained simply by addition." –  Pedro Tamaroff Apr 15 '13 at 19:31 show 7 more comments It is counter-intuitive only if you are adding a "finite" number of rational numbers. Otherwise, as @Mariano implied, any irrational number consists of an infinite number of digits, and thus can be represented as a sum of rational numbers. share|improve this answer This is my point. There is nothing magic with irrational numbers and they just use the same digits that rational numbers, so there is no surprise or counter-intuition in having irrational numbers representable as an infinite sum of rational numbers. –  Rafid Mar 4 '12 at 10:41 @RahulNarain: In the decimal expressions of rational numbers, there is always either a terminating or an infinitely repeating string of digits. Irrational numbers have neither of these properties, but can still be expressed as an infinitely long non-repeating sequence digits. Though there may not be an explicit formula for this sequence, it can still be thought of as an infinite sum of rational numbers, as Rafid indicated. –  Paul Mar 4 '12 at 15:00 @Paul, I was making a joke on the phrase "must have digits from 0 to 9" that appeared in the original version of the answer. –  Rahul Mar 4 '12 at 22:31 add comment Besides that. Given a sequence of positive rational numbers such that their sum converges and such that $a_n > \sum_{k = n + 1}^\infty a_k$. Then choosing a $\pm$ sign for each term of the sequence gives a new convergent series, each to a different number. By a countable-uncountable argument you get nonnumerable examples of that kind of series :). share|improve this answer add comment Others have demonstrated some examples that make clear why this can happen, but I wanted to point out the key mathematical concept here is "Completeness" of the metric space. A metric space is any set with "distance" defined between any two elements (in the case of $\mathbb{Q}$, we would say $d(x,y) = |x-y|$). A sequence $x_i$ is "Cauchy" if late elements stop moving around very much, a necessary condition for a sequence to have a finite limit. To put it formally, ${x_i}$ is cauchy for $\epsilon>0$, there is a sufficiently large $N$ so that for every $m,n>N$ we have $d(x_n,x_m)<\epsilon$. A metric space is complete if all Cauchy sequences have a limit in the space. The canonical complete metric space is $\mathbb R$, which is in fact the completion of $\mathbb{Q}$, or the smallest complete set containing $\mathbb Q$. We think of an infinite sum as the limit of a sequence of partial sums: $$\sum_{n=1}^\infty x_n = \lim_{N\to\infty}\left( \sum_{i=1}^Nx_n \right)$$ As others have pointed out with a number of good counter-examples (my favorite of which is the decimal representation of an irrational number), $\mathbb{Q}$ is not complete, therefore an infinite sum of elements of $\mathbb Q$, for which partial sums are necessarily elements of $\mathbb Q$, can converge to a value not in $\mathbb Q$. share|improve this answer add comment Your Answer
global_01_local_0_shard_00000017_processed.jsonl/4260
Take the 2-minute tour × Let $R$ be an integral domain and $P,Q$ be proper prime ideals of $R$. Let $R_P,R_Q$ be localizations of $R$ at $P,Q$. If $R_P\subseteq R_Q$, is $Q\subseteq P$? share|improve this question Presumably, you mean $\subseteq$ when considered as subsets of the field of fractions of $R$? –  Thomas Andrews Jan 14 '13 at 19:03 add comment 2 Answers up vote 2 down vote accepted More generally, if $R$ is a commutative ring, then $R$-algebra homomorphisms $R_P \to R_Q$ exist and are unique - by the universal property of localizations - iff $R \to R_Q$ maps $R \setminus P$ to $(R_Q)^* = R_Q \setminus Q R_Q$ iff (since $Q R_Q \cap R = Q$) $R \setminus P \subseteq R \setminus Q$ iff $Q \subseteq P$. More generally, if $X$ is a scheme with points $x,y$, then $x$ is a specialization of $y$ iff there is a morphism of $X$-schemes $\mathrm{Spec}(\mathcal{O}_{X,y}) \to \mathrm{Spec}(\mathcal{O}_{X,x})$. share|improve this answer thank you very much Martin –  Azadeh Jan 20 '13 at 9:49 add comment Take any element $q\in Q$. If it was not it $P$, then it would be invertible in $R_P$, but not in $R_Q$, which would contradict the fact that $R_P\subseteq R_Q$. share|improve this answer Thank you very much –  Azadeh Jan 14 '13 at 19:20 add comment Your Answer
global_01_local_0_shard_00000017_processed.jsonl/4261
Take the 2-minute tour × Let $A=k[[t]]$ Let $B$ a flat $A$-finite algebra which is etale and Galois at the generic point. Then by Artin lemma 3.12 (ii) in his IHES paper on approximation, we know that there exists an integer $c$ such that: if we have an other $A$-finite flat algebra generically étale and Galois $B'$ such that $B/\pi^{c}\cong B'/\pi^{c}$ implies $B\cong B'$. Can we be more precise about the value of $c$ for exemple how can we relate it to $B$? Moreover, can we get a isomorphism $\phi: B\cong B'$ which lifts the isomorphism mod $\pi^{c}$? share|improve this question add comment Your Answer Browse other questions tagged or ask your own question.
global_01_local_0_shard_00000017_processed.jsonl/4262
Take the 2-minute tour × Let $M$ be a closed smooth manifold. A generic diffeomorphism $\phi: M\rightarrow M$ has non-degenerate fixed points, i.e. the intersections of its graph with the diagonal in $M\times M$ are all transverse. In a generic one-parameter family $(\phi_t)$ of diffeomorphisms (say starting at the identity) we cannot request that the fixed points of $\phi_t$ be non-degenerate for all $t$. Nonetheless we can arrange that degenerate fixed points occur only for finitely many values of $t$ and that they be of "birth-death" type. In particular, the fixed point set of each $\phi_t$ is still isolated. How "non-generic" is it for a diffeomorphism to have a fixed point set that "carries topology", i.e. not only its fixed point set $F$ is infinite but it has non-trivial homology and the map $H_\ast(F)\rightarrow H_\ast(M)$ is non-trivial at some positive degree? The reasoning above shows that the codimension of these diffeomorphisms in $Diff(M)$ is at least 2. Is it finite/very high/infinte? As a particular example, let $M=\mathbb{CP}^n$ and consider the set $\mathcal {E}$ of diffeomorphisms whose fixed point set contains a line, i.e. the restriction of a generator $u\in H^2(\mathbb{CP}^n;\mathbb Q)$ to its fixed point set is non-zero. Does $\mathcal{E}$ have codimension greater than $2$ in $Diff(M)$? Analogous questions can be asked in the volume-preserving or symplectic cases. share|improve this question add comment Your Answer Browse other questions tagged or ask your own question.
global_01_local_0_shard_00000017_processed.jsonl/4268
about me I'm Mel, a nomadic hack-of-all-trades who frequently geeks out about {open source and, engineering} education communities of practice and just about everything else under the sun. There's a longer bio and a CV if you like, but the best way to get a grasp on my thoughtstream is to read my blog, which I write for my future self. I don't believe in formal introductions or compartmentalizing one's life, so everything here is tumbled together; that's how I roll. I believe that everybody has a mission, and try to live with awareness and intent so that I can discern mine. I'm overly excitable and struggle with balance; when I'm not too stubbornly overindependent, my friends and family bring me back to center. I try to be blunt and radically transparent about the spontaneous bursts of unstable equilibrium that mark my ongoing journey. I give, I have fun, and I'm learning more about happiness and life all the time. assembly required I'm a quiet introvert, so if you'd like to reach out, I'd love to meet you, and I promise I don't bite. (Quite the opposite - I'll probably be thankful that you reached out, because I'll often have been too shy to do the same.) I value bluntness, openness, and honesty. I struggle with formality and properness. Email accordingly. ;-)
global_01_local_0_shard_00000017_processed.jsonl/4269
If not, is there another Stack Exchange site where it would be a better fit? CSS, as we know, stands for Cascading Style Sheets, which is a plural phrase. One would say "Cascading Style Sheets are used to provide a central location for all of the stylings of a project" (note the 'are'). However, it seems to be the prevalent usage to say "CSS is used to provide a central location for all of the stylings of a project" (singular). Why do we do this, and is this correct? (I realize I used this form in the first sentence, but that was referring to the acronym itself, not Cascading Style Sheets) Update: This question has been posted at EL&U. share|improve this question How about English Language & Usage? –  hammar Aug 30 '11 at 15:00 I thought english.SE might be best, but since it seemed pretty specific to programming, I thought maybe here or programmers.SE might be acceptable, and probably provide a more relevant answer, as the people using SO and P.SE are the people using the terms in my question. –  Jim Aug 30 '11 at 15:08 As long as you provide some basic explanation of what CSS means, as you did in your example, this should be perfectly answerable by the people at english.SE. –  hammar Aug 30 '11 at 15:14 add comment 2 Answers up vote 5 down vote accepted It seems a question for English Language and Usage. The FAQ reports the following text: The English Language and Usage Stack Exchange is for linguists, etymologists, and (serious) English language enthusiasts. Questions on the following topics are welcomed here: • Usage, word choice, and grammar • Etymology (history of words’ development) • Dialect differences • Pronunciation (phonetics and phonology, dialectology) • Spelling and punctuation • Problems encountered by people learning English But please, don’t ask any questions about these topics. They are out of scope for this site. • Please proofread my document ("are there any mistakes in this text?") • Languages other than English (including translation) • How to improve my English • How to name this function/variable in my program • Criticism, discussion, and analysis of English literature • Peeving about grammar disguised as a question • "Explain this joke to me", except in the case where the crux of the joke relies on an aspect of English covered by one of the welcomed topics above. share|improve this answer Sidenote: There have been questions about programming specific language questions on Meta.English: Could we add tags for domain-specific language questions, such as programming? Is Python a snake or a programming language? If the latter, why is it choking my dog? Those are providing some guidelines for such questions. –  Time Traveling Bobby Aug 30 '11 at 15:12 The second question you linked is the reason why the FAQ reports "How to name this function/variable in my program" as question you should not ask on EL&U. –  kiamlaluno Aug 30 '11 at 15:24 add comment No, this is off-topic on Stack Overflow; it's a question about grammar and language. Let's make the FAQ-Test: • a specific programming problem: No • a software algorithm: No • software tools commonly used by programmers: Nope • matters that are unique to the programming profession: Naaahhhh... That's 0 out of 4. share|improve this answer add comment You must log in to answer this question. Not the answer you're looking for? Browse other questions tagged .
global_01_local_0_shard_00000017_processed.jsonl/4270
Registering for a Stack Exchange OpenID is a huge pain; it took me 20-30 attempts. I ran into two problems you might want to look into: First, there's no indication of password policies: • Password length • Character repetition • Mixture of uppercase, lowercase, numerals and, quote, "special characters" I tried a bunch of passwords before I hit on one that worked. Second, 50% of the time I can't make out what the CAPTCHA displays, so I kept getting it wrong share|improve this question If you'd like, I can make you a much worse registration system. Oh, I can picture it now... –  Blender Oct 14 '11 at 1:47 Isn't there an option the play the captcha audibly if you can't read it? I don't see why that's an issue to you. –  MDMarra Oct 14 '11 at 1:49 There's nothing worse than when sites don't allow some special characters in usernames and passwords. I think Gravatar is probably the worst as I remember, lowercase letters only. That's why I never bothered to get a custom gravatar. –  Lance Roberts Oct 14 '11 at 2:06 add comment migrated from Oct 14 '11 at 1:45 This question came from our site for professional and enthusiast programmers. 1 Answer That is why you should use OpenId or Google Account or facebook or yahoo. Why would you even want to reenter that information, if you can keep it one place? share|improve this answer I the Google button. It's so useful! –  Blender Oct 14 '11 at 1:52 add comment You must log in to answer this question.
global_01_local_0_shard_00000017_processed.jsonl/4271
Today, I tried something new when editing on Stack Overflow. I tried searching for "Thank you in advanced". I found several hundred posts, and got rid of quite a few - anything posted this month, as a matter of fact. I then tried "Thanks you in advance", and again, got rid the phrase from posts created in December. I tried "Thank you in advance", and found over 10,000. I got rid of all that I found from today, but they keep coming back. I tried "Thanks", and was horrified to find millions of them! And there's no way I can even edit the ones created in the past hour! So, I'd be thankful for your help if you would help me edit some more of these. I'll even "allow" you to use the same ad-hoc comment I use: Unlike forum sites, we don't use "Thanks", or "Any help appreciated", or signatures on [so]. See [Should 'Hi', 'thanks,' taglines, and salutations be removed from posts?](Should 'Hi', 'thanks,' taglines, and salutations be removed from posts?). Warning: I have also been asked if I'm grumpy today1. I'd like some help before they get around to asking me who peed in my cornflakes. John Saunders 1.Hell no, I'm not grumpy! Note: I have been improving the whole question. I never make targeted edits only. I always fix all typos, tags in titles, etc. that I see. Note carefully: I am not advocating a mass campaign to remove only the salutations. I, personally, never do that, unless the salutation is the only thing wrong with the post. I am trying to point out that we're leaving a lot of these minor "broken windows" and "litter" hanging around, and I'd like us to start doing better at cleaning them up. That is, cleaning them up, in addition to whatever else is wrong with the post. I'm also advocating leaving a comment telling the OP why the edit is done. I believe that will not only be good for the OP, but for others who will read the comment and decide not to leave a salutation to begin with. P.S. The "Thanks" in this post is meant to be facetious. Editors, kindly leave it alone. share|improve this question Feel free to do that but there really isn't a point - waste of energy. It's not like these salutations are actively degrading the site. Clean them up when other stuff needs to be cleaned up, but going on a crusade like that is a bit pointless (IMO). –  Mat Dec 22 '13 at 18:48 And even if you go on a crusade, please don't just blindly remove the lines your searching for. Give the whole post a once over. Correct everything you see. You're causing a bump. That's fine, but please bump content that doesn't require other users to jump in and fix other obvious issues. (P.s. not saying that is what you did) –  Bart Dec 22 '13 at 18:50 @Mat: Well, MHO differs, of course. I think it's part of making it clear to newer users that they're not posting in a discussion forum, or in fact, anywhere like places they've used before. It's part of making it clear that they're somewhere new, with different rules. Because if they follow those roles, then it works. –  John Saunders Dec 22 '13 at 18:50 @Bart: I'm also fixing typos and such, but I'm limited by the fact that I don't know all of the languages of these questions. I don't want to accidentally damage a Python question, for instance, by "fixing" the indentation. –  John Saunders Dec 22 '13 at 18:52 Sure, and that's not what I'm referring to. But many of these requests end up in blind removals of the offending lines pointed out. Not the overall cleanup necessary. –  Bart Dec 22 '13 at 18:54 The thing I have been doing is marking any suggested edit that fails to take care of the thanks---which is most of them---as not helpful after I improve it. The goal is to train the up and coming editors to look for this as they go. –  dmckee Dec 22 '13 at 18:55 IIRC, There is an implementation of a standard filter that comes between the writing and the actual posting. It does a "good" job at deleting opening salutations but, as stated in [wherever I read it here], as closing phrases are a little more tricky, it usually isn't filtered. –  Doktoro Reichard Dec 22 '13 at 19:02 @MartijnPieters: I think I'll put it back. It was kind of a punchline. –  John Saunders Dec 22 '13 at 19:26 In any case, I think that are many other more worthy causes to focus the community's attention on than "Thanks". I think way too much time and effort is wasted in removing just the signature –  yoda Dec 22 '13 at 19:45 @yoda: That's what I had assumed, until I saw the numbers. And I'm a believer in fixing broken windows, though I'll admit this may be more like litter than broken windows. –  John Saunders Dec 22 '13 at 19:47 I only started removing salutations/thanks messages after I noticed a large portion of my proposed edits were being "improved" by the reviewer to delete them. –  Tim Seguine Dec 22 '13 at 21:46 @yoda I disagree. People that use the site regularly, do not need to read an extra 100 sentences every day. Neither do people that are coming here from google looking for help. They don't need to see Please Help! in a question or the name of the person or their life story. The more clear and concise the question is the better. It makes SO that much better. –  LowerClassOverflowian Dec 22 '13 at 22:05 @Pëkka: I don't understand - in what way do my edits affect the review queue? And I hope that, by reading this discussion, anybody else who starts looking for these will also edit the entire question. –  John Saunders Dec 22 '13 at 23:42 @JohnSaunders well, we set examples by the edits we make. While I have no doubt you make great edits, outspoken crusades may give new users the impression that they can earn 2000 rep by simply searching for something that's technically wrong with a post, and remove the technicality. It happens all the time. I don't have a problem with the practice, but I do have one with large-scale campaigns –  Pëkka Dec 22 '13 at 23:46 @SamIam: everyone has to have priorities –  John Saunders Dec 23 '13 at 7:14 show 10 more comments 2 Answers up vote 6 down vote accepted John, I would love to help out some more. I have already done a lot of that while editing new posts that I see come in that need other edits. I think that there should be a permanent text stating (Do NOT write useless text like: "thanks", "thanks in advance", "please help", etc). This text should be placed as a div over the question input field and should not be removed until the user clicks an "Ok, I won't button". Once they've asked 5 questions and clicked "Ok, I won't button" those 5 times, then it shouldn't appear anymore for that user. share|improve this answer That seems a little extreme for a problem with such a small impact. I think that if some overlay were to exist at all, it should only appear when it detects something that looks like one of those phrases at the bottom. –  icktoofay Dec 22 '13 at 22:03 add comment If you only remove salutations then theses are unnecessary minor edits. Every post you edit gets pushed in the active questions queue. So mass edits should have a good reason and removing just thank you without improving the whole post is not really helpful. share|improve this answer That's good, since I have been improving the whole question. –  John Saunders Dec 22 '13 at 19:05 @John still, you find them by actively looking for something that doesn't need super-urgent fixing. It should be the other way round - you fix a post and when you see a salutation, you remove it while you're at it –  Pëkka Dec 22 '13 at 23:35 @Pëkka: I guess my underlying point is, in order for there to be so many of these, many people must either not editing those posts at all, or else ignoring the salutations. I have to admit that in general, I'm mostly editing for "tags in title", bad titles, or else some question that I actually open in the hopes of answering. If I don't edit it, I will often miss the salutation at the end. Consider all those users who think that the salutation is a good thing because nobody is telling them otherwise. –  John Saunders Dec 22 '13 at 23:39 @Pëkka: It seems to me that the number of "tags in title" went down after I started looking for them. It can't be just because of me, but because, little by little, by making people aware of it (I leave a comment), I helped change the culture. –  John Saunders Dec 22 '13 at 23:40 @John I don't disagree with that, I'm just very reserved about large-scale calls to action. (See comment above) –  Pëkka Dec 22 '13 at 23:47 add comment You must log in to answer this question. Not the answer you're looking for? Browse other questions tagged .
global_01_local_0_shard_00000017_processed.jsonl/4272
Does anybody know of a company or person making physical badges? Like an embroidered patch or something? Sure, it's kind of old school, but some people like to attach pieces of flair to backpacks or whatever. share|improve this question Badges!? BADGES?! WE DON'T NEED NO STEENKIN' BADGES!!! –  Adam Davis Feb 24 '10 at 19:04 @Pollyanna: ... personally i've always preferred the UHF rendition: "Badgers? Badgers?! [...]" –  quack quixote Feb 24 '10 at 21:40 add comment 2 Answers Making badges is easy. The hard part is implementing badge rights management (BRM) that prevents malicious users from duplicating badges that they haven't earned. Badge piracy is a serious issue. For every legitimate, physical badge made by hard-working badge manufacturers and developers, there are sixteen (16) illegally created badges in the world. Fraudulent badges can be identified from their frayed edges, cheap colours that wash out in the rain and increased likelihood of being infused with narcotics and/or bloody pieces of glass. While these badges may be cheaper and easier to find than authentic badges, their quality is nowhere near the same level of standards as the real deal. So please, if you find a badge that doesn't have the BRM seal on it, please report it to the Badge Manufacturers Association of America (BMAA). share|improve this answer I didn't think about that. Maybe we need badges that connect to the internet and authenticate themselves every 5 minutes. –  Bearddo Feb 24 '10 at 15:11 I love your answers and comments... I just do –  jmfsg Feb 24 '10 at 15:11 I hate those posers who wear frayed badges that you just know are brand new, like they've been a fan of the site for years. If it's not Beta or Yearling, it shouldn't be frayed, hipster! –  Bill the Lizard Feb 24 '10 at 15:17 +1 for hilarity –  Kevin Laity Feb 24 '10 at 15:20 There must be a [defective-by-design] joke somewhere in here –  balpha Feb 24 '10 at 17:10 This sounds exactly like what a member of BMAA's propaganda machine would say. What Mr. Posse - if that is his real name - fails to mention is that there is a plentitude of alternative Badge Making associations - the Association of Caribbean Badge Makers, the west indies badge manufacturers conglomerate, and the North American Badge Manufacturers' organization (NABMO), to list just a few - united in the struggle against the corporate monster that is the BMAA. –  Pëkka Feb 25 '10 at 17:46 For years, BMAA has been dominating the badge market using unscrupulous business practices, extortion, extremely high membership fees, and lobbyism in both Washington and Brussels. The BRM seal is only the latest ploy in the BMAA's efforts to achieve total market domination. Their lobbyists are currently trying to pressure democratic lawmakers into introducing legislation making the BRM seal mandatory for any badge sold in the U.S.. –  Pëkka Feb 25 '10 at 17:47 add comment I'm thinking that keeping my SO reputation up to date on a physical badge attached to my backpack is NP-hard. share|improve this answer badges != flair –  fretje Feb 24 '10 at 15:44 @fretje -- since he referenced flair in the question. I assumed he meant "blog badges". –  tvanfosson Feb 24 '10 at 16:09 Actually, a little LCD with wifi-enabled embedded Linux would probably work on campus, hmmm.... Download the config via USB key. Maybe it's not so hard after all. :-) –  tvanfosson Feb 24 '10 at 16:11 I meant flair in the more general sense, as in a small ornament attached to an object to show one's preference or support for something. Physical badges be flair in this case. I was referring to the "Guru" badge or the "Supporter" badge, not to the blog "flair" that you can put on your website. –  Bearddo Feb 24 '10 at 16:52 @Bearddo -- ah, I see now. Make sure you put your "Supporter" badge far away from your "Athletic" badge. –  tvanfosson Feb 24 '10 at 17:04 With as much time as I spend in front of a computer I won't be getting any sort of "Athletic" badge anytime soon. –  Bearddo Feb 24 '10 at 19:54 add comment You must log in to answer this question. Not the answer you're looking for? Browse other questions tagged .
global_01_local_0_shard_00000017_processed.jsonl/4298
Export (0) Print Expand All 12 out of 29 rated this helpful - Rate this topic Guidelines for app settings (Windows Store apps) Windows provides a Settings pane by default for every Windows Store app. The top portion of the Settings pane lists "entry points" for your app settings. Each entry point opens a Settings flyout that displays the settings options themselves. This topic describes best practices for creating and displaying app settings. See this feature in action as part of our App features, start to finish series:  Windows Store app UI, start to finish Users swipe from the side of the screen to display the charms and then press the Settings charm to show a Settings pane. The settings flyout for the OneDrive app. Note  Windows adds two default entry points to every Settings pane in a Windows Store app: Permissions and Rate and review. Note that if your app isn't installed through the Windows Store (if, for example, it's a side-loaded enterprise app), your app's Settings pane won't include a Rate and review entry point. The bottom portion of the Settings pane includes system settings like volume, brightness, and power. Should my app include app settings? All Windows Store apps include a Settings pane with Permissions and Rate and Review sections by default. Following are examples of additional settings that belong in the Settings pane: • Configuration options that affect the behavior of the app and don't require frequent readjustment, like choosing between Celsius or Fahrenheit as default units for temperature in a weather app, or changing account settings for a mail app. • Options that depend on the user’s preferences, like music, sound effects, or color themes. • App info that's not needed very often, such as privacy statements, help, app version, or copyright info. • A link to your Privacy Policy if you have Internet Connection declared in your capabilities. Forgetting to link to this policy is the most common certification blocker! See App certification requirements for the Windows Store for more detailed info. Commands that are part of the typical app workflow (for example, changing the brush size in an art app) shouldn't be in the Settings pane. Instead, put commonly used commands on the top or bottom app bar. To learn more about command placement, see Command patterns. Guidelines for app bars provides recommendations for app bar use. Do and don'ts General principles • Create entry points for all of your app settings in the Settings pane. • Keep your settings simple. Define smart defaults and keep the number of settings to a minimum. • If necessary, link from elements of your app's UI to the Settings pane or deep-link to a specific Settings flyout. For example, you can link to your help Settings flyout from a "Help" button in the bottom app bar as well as from a "Help" entry point in the Settings pane. • When a user changes a setting, the app should reflect the change immediately. Apply settings changes instantly or as soon as a user is done interacting with the flyout. • Use the Settings flyout controls available for WinJS (WinJS.UI.SettingsFlyout) and XAML (Windows.UI.Xaml.Controls.SettingsFlyout). These controls implement the UI design guidelines (described in the Design a Settings UI section) by default. • Don't include commands that are part of common app workflow, like changing the brush color in an art app, in app settings. These commands belong on an app bar or on the canvas. For more info, see Command patterns for a conceptual overview and Guidelines for app bars. • Don't use an entry point in the Settings pane to perform an action directly. Entry points should open Settings flyouts. • Don't use the Settings pane for navigation. When the Settings pane closes, a user should be in the same place in the app that they were when they clicked the Settings charm. The top app bar is a more appropriate place for navigation. • Don't use the Settings flyout classes as all-purpose controls. They're intended only for Settings flyouts launched from entry points in the Settings pane. Entry points Entry points are the labels that appear at the top of the Settings pane and open Settings flyouts, where you can display one or more settings options. Once you have a list of settings you want to include, consider these guidelines for the entry points: • Group similar or related options together under one entry point. Avoid adding more than four entry points to your Settings pane. • Display the same entry points regardless of the app context. If some settings are not relevant in a certain context, disable them in the Settings flyout. • Use descriptive, one-word labels for your entry points when possible. For example, for account-related settings, call the entry "Accounts" rather than "Account settings." If you want only one entry point for your settings and the settings don't lend themselves to a descriptive label, use "Options" or "Defaults." • If an entry point is linking directly to the web instead of a flyout, let the user know with a visual clue, for example, "Help (online)" or "Web forums" styled as a hyperlink. Consider grouping multiple links to the web into a flyout with a single entry point. For example, an "About" entry point could open a flyout with links to your terms of use, privacy statement, and app support. • Combine less-used settings into a single entry point so that more common settings can each have their own entry point. Put content or links that only contain information in an "About" entry point. • Don’t duplicate the functionality in the "Permissions" pane. Windows provides this pane by default and you can't modify it. Design a Settings UI Note  The Settings flyout controls available in WinJS and XAML follow these guidelines by default, except for those pertaining to header and border color. Use these controls (WinJS.UI.SettingsFlyout or Windows.UI.Xaml.Controls.SettingsFlyout) to ensure that your Settings flyouts follow UI guidelines and deliver a consistent user experience. • Always launch a Settings flyout from entry points in your Settings pane. • Use a light-dismiss surface that appears on top of the main app content and disappears when the user clicks outside the flyout or resizes the app. This lets people change a setting quickly and get back to the app. • Make sure that your Settings flyout appears on the same side of the screen as the charms and Settings pane. Use the SettingsEdgeLocation property to determine which side of the screen the Settings charm appears on. • Slide the flyout in from the same side of the screen as your Settings pane, rather than from the top or bottom of the screen. • A flyout must be full screen height, regardless of orientation, and should be narrow (346 pixels) or wide (646 pixels). Choose the width that's appropriate for the content and don't create custom sizes. • The flyout header should include a back button, the name of the entry point that opened the flyout, and the app’s icon. • The header background color should be the same as the background color of your tile. • The border color should be the same color as the header, but 20% darker. • Display Settings content on a white background. Add settings content to Settings flyouts • Present content from top to bottom in a single column, scrollable if necessary. Limit scrolling to a maximum of twice the screen height. • Use the following controls for app settings: • Toggle switches: To let users set values on or off. • Radio buttons: To let users choose one item from a set of up to 5 mutually exclusive, related options. • Select control: To let users choose one item from a set of 6 or more text-only items. • Text input box: To let users enter text. Use the type of text input box that corresponds to the type of text you're getting from the user, such as an email or password. • Hyperlinks: To take the user to another page within the app or to an external website. When a user clicks a hyperlink, the Settings flyout will be dismissed. • Buttons: To let users initiate an immediate action without dismissing the current Settings flyout. • Add a descriptive message if one of the controls is disabled. Place this message above the disabled control. • Animate content and controls as a single block after the Settings flyout and header have animated. Animate content using the enterPage or EntranceThemeTransition animations with a 100px left offset. • Use section headers, paragraphs, and labels to aid organize and clarify content, if necessary. • If you need to repeat settings, use an additional level of UI or an expand/collapse model, but avoid hierarchies deeper than two levels. For example, a weather app that provides per-city settings could list the cities and let the user tap on the city to either open a new flyout or expand to show the settings options. • If loading controls or web content takes time, use an indeterminate progress control to indicate to users that info is loading. For more info, see Guidelines for progress controls. • Don't use buttons for navigation or to commit changes. Use hyperlinks to navigate to other pages, and instead of using a button to commit changes, automatically save changes to app settings when a user dismisses the Settings flyout. Related topics For designers Command patterns Guidelines for app help Guidelines for app bars For developers (Windows Store apps using JavaScript and HTML) Laying out your UI Quickstart: Adding app settings Quickstart: Add app help Controls list For developers (Windows Store apps using C#/VB/C++ and XAML) Laying out your UI Quickstart: Add app settings Quickstart: Add app help Controls list Application settings sample Did you find this helpful? (1500 characters remaining) Thank you for your feedback © 2014 Microsoft. All rights reserved.
global_01_local_0_shard_00000017_processed.jsonl/4299
Toast notification overview (Windows Store apps) This topic discusses the concepts and terminology surrounding toast notifications, which are notifications that appear in the upper-right corner of your screen (upper-left corner for right-to-left (RTL) languages) to allow the app to communicate with the user whether the user is in another app, on the Start screen, or on the desktop. A toast can originate either from a local API call or from the cloud. Toast notifications A toast notification is a transient message to the user that contains relevant, time-sensitive information and provides quick access to related content in an app. It can appear whether you are in another app, the Start screen, the lock screen, or on the desktop. Toasts should be viewed as an invitation to return to your app to follow up on something of interest. Toast notifications are an optional part of the app experience and are intended to be raised only when your app is not the active foreground app. For your app to communicate through a toast notification, you must declare that it is Toast Capable in your app's manifest file. This action adds your app to the Notifications section of PC settings, from which the user can disable or enable toast notifications for your app at any time. A toast notification can contain text and/or images, but secondary actions such as buttons are not supported. A toast can also play a system-defined sound when it displays. A toast notification appears in the upper-right corner of your screen (top-left corner for right-to-left (RTL) languages). Toast notifications can be activated, dismissed, or ignored by the user. When a user taps or clicks the notification, the associated app is launched and the user can expect that the resulting view is related to the content of the notification. It is the only mechanism by which one app can interrupt a user in another app. A toast notification should be used only for information of high interest to the user, typically involving some form of user opt-in. Therefore, it is a good choice for incoming IM chat requests, and information that the user has opted in to receive. However, it is extremely important that when you consider using a toast notification, you must realize that, due to its transient nature, or because of the user's settings, the user might never see it. Toast is designed to be used in combination with badges, tile notifications, and in-app UI to keep the user informed of events or items of interest in your app. Raising a toast notification is essentially the same as sending a tile notification, just using different classes: create an XML payload for a specific template and pass that payload to a manager object to display. A toast notification is visually distinct from a tile but the markup structure is nearly identical. There are two types of toast notification: • Standard toast: Most developers should use the standard toast notification. This toast remains on the screen for seven seconds, playing a brief sound to alert the user when it appears. The standard toast is best for notifications such as an IM contact sign-in, or a social media update. • Long-duration toast: This notification looks the same as a standard toast but stays on the screen for 25 seconds and optionally can play longer, looping audio. This type of toast is used in situations where you want to grab the user's attention because there is a human waiting on the other end of the connection. This is appropriate for person-to-person communication like instant messages and VOIP calls. This type of toast can also be used for calendar reminders. Scheduled and recurring toast notifications A toast notification can be scheduled to appear at a specific time. Use this feature for alarms, calendar reminders, and notifications that depend on precise timing. These notifications do not depend on the app's state or the computer's network connection. A scheduled toast can also display multiple times within a short period to increase the user's chance of seeing it. For instance, you might want to show an important meeting reminder three times, five minutes apart. Scheduled toast notifications specify the date and time when Windows should raise that toast notification. In the case of a recurring scheduled toast notification, the specified time is the first time that Windows will display the notification. Working with toast templates Toast notifications are based on a set of Windows-provided XML templates, each with varying content and layout. They can contain an image, text, or both. Use of these templates enables an app to maintain the expected Windows look and feel in their notifications. A template supplies a framework for the necessary XML image and text elements that can be specified in the notification. While tile and toast notifications share many similarities in definition, a toast notification also comes with a sound that is played when the notification is shown. The elements of a toast notification are defined in the toast schema. For a full list of available toast notification templates, with explanations of each, see Choosing a toast template. Sending toast notifications from desktop apps Generally, sending a toast notification from a desktop app is the same as sending it from a Windows Store app. However, you should be aware of these differences and requirements: • The app must have a shortcut installed (though not necessarily pinned) to the Start screen or in the Apps view • The shortcut must have an AppUserModelID • Desktop apps cannot schedule a toast • All toasts raised by desktop apps are the same system-defined color • Desktop apps cannot use web images • Desktop app notifications will not appear on the lock screen For more information, see these topics: Showing toast on the lock screen Toast associated with an app that has a tile or badge on the lock screen will also appear on the lock screen. Toast shown on the lock screen is identical to toast shown elsewhere. It differs in that all toasts on the lock screen are shown for the length of a long-duration toast. For more information, see the Lock screen overview. Related topics Toast notifications sample Quickstart: Sending a toast notification How to opt in for toast notifications How to handle activation from a toast notification The toast template catalog Guidelines and checklist for toast notifications Toast XML schema Windows.UI.Notifications API reference © 2014 Microsoft. All rights reserved.
global_01_local_0_shard_00000017_processed.jsonl/4300
Export (0) Print Expand All This topic has not yet been rated - Rate this topic WebClient.UploadValuesTaskAsync Method (Uri, String, NameValueCollection) .NET Framework 4.5 Uploads the specified name/value collection to the resource identified by the specified URI as an asynchronous operation using a task object. Namespace:  System.Net Assembly:  System (in System.dll) [HostProtectionAttribute(SecurityAction.LinkDemand, ExternalThreading = true)] public Task<byte[]> UploadValuesTaskAsync( Uri address, string method, NameValueCollection data Type: System.Uri The URI of the resource to receive the collection. Type: System.String The HTTP method used to send the collection to the resource. If null, the default is POST for http and STOR for ftp. Type: System.Collections.Specialized.NameValueCollection The NameValueCollection to send to the resource. Return Value Type: System.Threading.Tasks.Task<Byte[]> Returns Task<TResult>. The task object representing the asynchronous operation. The Result property on the task object returns a Byte array containing the response sent by the server. The address parameter is null. The data parameter is null. The URI formed by combining BaseAddress, and address is invalid. method cannot be used to send content. There was no response from the server hosting the resource. An error occurred while opening the stream. The Content-type header is not null or "application/x-www-form-urlencoded". This operation will not block. The returned Task<TResult> object will complete after the name/value collection has been uploaded to the resource. The name/value collection is sent asynchronously using thread resources that are automatically allocated from the thread pool. If the Content-type header is null, this method sets it to "application/x-www-form-urlencoded". .NET Framework Supported in: 4.5.1, 4.5 Did you find this helpful? (1500 characters remaining) Thank you for your feedback © 2014 Microsoft. All rights reserved.
global_01_local_0_shard_00000017_processed.jsonl/4301
Export (0) Print Expand All This topic has not yet been rated - Rate this topic OlkTimeControlEvents Interface This is an event interface in a COM coclass that is required by managed code for interoperability with the corresponding COM object. This interface is not intended to be used in your code. Namespace:  Microsoft.Office.Interop.Outlook Assembly:  Microsoft.Office.Interop.Outlook (in Microsoft.Office.Interop.Outlook.dll) public interface OlkTimeControlEvents Did you find this helpful? (1500 characters remaining) Thank you for your feedback Community Additions © 2014 Microsoft. All rights reserved.
global_01_local_0_shard_00000017_processed.jsonl/4303
Export (0) Print Expand All Expand Minimize 0 out of 1 rated this helpful - Rate this topic Binding Object (Model Designer) The virtual Binding object contains the information about how an Entity, Attribute, Role, or Inheritance object binds to a physical data source. The Binding object is not used. When Binding is specified, a subtype is used instead. Entities must be bound to Tables or Columns; Attributes must be bound to Columns; Roles and Inheritances must be bound to Relations. A Binding object is a reference from the model to an object in the data source view (DSV). The binding object is used by the report server to translate semantic queries into SQL. Did you find this helpful? (1500 characters remaining) Thank you for your feedback Community Additions © 2014 Microsoft. All rights reserved.
global_01_local_0_shard_00000017_processed.jsonl/4304
Export (0) Print Expand All Expand Minimize This topic has not yet been rated - Rate this topic /WX (Treat Linker Warnings as Errors) /WX causes no output file to be generated if the linker generates a warning. This is similar to /WX for the compiler (see /w, /Wn, /WX, /Wall, /wln, /wdn, /wen, /won (Warning Level) for more information). However, specifying /WX for the compilation does not imply that /WX will also be in effect for the link phase; you must explicitly specify /WX for each tool. By default, /WX is not in effect. To treat linker warnings as errors, specify /WX. /WX:NO is the same as not specifying /WX. To set this linker option in the Visual Studio development environment 2. Click the Linker folder. 3. Click the Command Line property page. 4. Type the option into the Additional Options box. To set this linker option programmatically Did you find this helpful? (1500 characters remaining) Thank you for your feedback © 2014 Microsoft. All rights reserved.
global_01_local_0_shard_00000017_processed.jsonl/4306
Export (0) Print Expand All 1 out of 1 rated this helpful - Rate this topic PropertyDescriptor.GetValue Method When overridden in a derived class, gets the current value of the property on a component. Namespace:  System.ComponentModel Assembly:  System (in System.dll) public abstract Object GetValue( Object component Type: System.Object The component with the property for which to retrieve the value. Return Value Type: System.Object The value of a property for a given component. Typically, this method is implemented through reflection. This method automatically calls the pre-change method, OnComponentChanging, and post-change method, OnComponentChanged, of the IComponentChangeService. Notes to Inheritors When you override this method, it gets the current value of the property by invoking a "GetMyProperty" method that you need to implement. An exception in that method should pass through. .NET Framework .NET Framework Client Profile Supported in: 4, 3.5 SP1 Did you find this helpful? (1500 characters remaining) Thank you for your feedback Community Additions © 2014 Microsoft. All rights reserved.
global_01_local_0_shard_00000017_processed.jsonl/4307
Export (0) Print Expand All 1 out of 1 rated this helpful - Rate this topic TraceContext.TraceFinished Event Raised by the TraceContext object to expose trace messages after all request information is gathered. Namespace:  System.Web Assembly:  System.Web (in System.Web.dll) public event TraceContextEventHandler TraceFinished The TraceFinished event is raised during the EndRequest stage of HTTP request processing. It is raised by a TraceContext object after all request information is gathered, to expose the collection of TraceContextRecord messages to registered TraceContextEventHandler delegates. Walkthrough: Using Tracing in Visual Web Developer to Help Find Web Page ErrorsBuilding ASP .NET Web Applications in Visual Studio The following code example demonstrates how you can register a TraceContextEventHandler to handle the TraceFinished event. In this example, the delegate iterates through the trace messages and writes them to the response stream; however, you could write the same information to a database or a profiling tool consumer. <%@ Page language="c#" Trace="true" %> <script runat="server"> void Page_Load(object sender, EventArgs e) // Register a handler for the TraceFinished event. Trace.TraceFinished += new // Write a trace message. Trace.Write("Web Forms Infrastructure Methods", "USERMESSAGE: Page_Load complete."); // A TraceContextEventHandler for the TraceFinished event.  void OnTraceFinished(object sender, TraceContextEventArgs e) TraceContextRecord r = null; // Iterate through the collection of trace records and write   // them to the response stream.  foreach(object o in e.TraceRecords) r = (TraceContextRecord)o; Response.Write(String.Format("trace message: {0} <BR>", r.Message)); .NET Framework Supported in: 3.5, 3.0, 2.0 Did you find this helpful? (1500 characters remaining) Thank you for your feedback Community Additions © 2014 Microsoft. All rights reserved.
global_01_local_0_shard_00000017_processed.jsonl/4308
Export (0) Print Expand All This topic has not yet been rated - Rate this topic ToolStripPanelRenderEventArgs Members Provides data for ToolStripPanel drawing. The following tables list the members exposed by the ToolStripPanelRenderEventArgs type.   Name Description Public method ToolStripPanelRenderEventArgs Initializes a new instance of the ToolStripPanelRenderEventArgs class for the specified ToolStripPanel that uses the specified graphics for drawing.   Name Description Public property Graphics Gets or sets the graphics used to paint the ToolStripPanel. Public property Handled Gets or sets a value indicating whether the event was handled. Public property ToolStripPanel Gets the ToolStripPanel to paint. (see also Protected Methods )   Name Description Public method Equals  Overloaded. Determines whether two Object instances are equal. (inherited from Object) Public method GetHashCode  Serves as a hash function for a particular type. (inherited from Object) Public method GetType  Gets the Type of the current instance. (inherited from Object) Public method Static ReferenceEquals  Determines whether the specified Object instances are the same instance. (inherited from Object) Public method ToString  Returns a String that represents the current Object. (inherited from Object)   Name Description Protected method Finalize  Allows an Object to attempt to free resources and perform other cleanup operations before the Object is reclaimed by garbage collection. (inherited from Object) Protected method MemberwiseClone  Creates a shallow copy of the current Object. (inherited from Object) Did you find this helpful? (1500 characters remaining) Thank you for your feedback Community Additions © 2014 Microsoft. All rights reserved.
global_01_local_0_shard_00000017_processed.jsonl/4309
This topic has not yet been rated - Rate this topic TypeBuilder.GetFields Method (BindingFlags) Returns the public and non-public fields that are declared by this type. Namespace:  System.Reflection.Emit Assembly:  mscorlib (in mscorlib.dll) public override FieldInfo[] GetFields( BindingFlags bindingAttr Type: System.Reflection.BindingFlags This must be a bit flag from BindingFlags : InvokeMethod, NonPublic, and so on. Return Value Type: System.Reflection.FieldInfo[] Returns an array of FieldInfo objects representing the public and non-public fields declared or inherited by this type. An empty array is returned if there are no fields, as specified. This method is not implemented for incomplete types. The GetFields method does not return fields in a particular order, such as alphabetical or declaration order. Your code must not depend on the order in which fields are returned, because that order can vary. Retrieve the type using Type.GetType or Assembly.GetType and use reflection on the retrieved type. .NET Framework .NET Framework Client Profile Supported in: 4, 3.5 SP1 Did you find this helpful? (1500 characters remaining) Thank you for your feedback Community Additions © 2014 Microsoft. All rights reserved.
global_01_local_0_shard_00000017_processed.jsonl/4311
This topic has not yet been rated - Rate this topic WebBrowser.Navigated Event Occurs when the document being navigated to is located and has started downloading. Namespace:  System.Windows.Controls Assembly:  PresentationFramework (in PresentationFramework.dll) public event NavigatedEventHandler Navigated <object Navigated="NavigatedEventHandler" .../> Navigated event handlers are passed an instance of the NavigationEventArgs class, which provides contextual information about the navigation, including Web response details. This event will only be fired for top-level navigations. .NET Framework Supported in: 4, 3.5 SP1, 3.0 SP2 .NET Framework Client Profile Supported in: 4, 3.5 SP1 Did you find this helpful? (1500 characters remaining) Thank you for your feedback Community Additions © 2014 Microsoft. All rights reserved.
global_01_local_0_shard_00000017_processed.jsonl/4312
This topic has not yet been rated - Rate this topic Color.Inequality Operator Tests whether two Color structures are not identical. Namespace:  System.Windows.Media Assembly:  PresentationCore (in PresentationCore.dll) public static bool operator !=( Color color1, Color color2 Type: System.Windows.Media.Color The first Color structure to compare. Type: System.Windows.Media.Color The second Color structure to compare. Return Value Type: System.Boolean true if color1 and color2 are not equal; otherwise, false. Floating-point values can acquire a small degree of error when they are operated upon. The Equals method, the Equality operator, and the Inequality operator do not compensate for this and thus may not return the expected Boolean result. The AreClose method uses a fuzzy equality algorithm that compensates for this floating-point arithmetic error by returning true for a comparison of two Color structures that are practically identical, but whose values may differ by a minuscule amount. .NET Framework Supported in: 4.5.1, 4.5, 4, 3.5, 3.0 .NET Framework Client Profile Supported in: 4, 3.5 SP1 Did you find this helpful? (1500 characters remaining) Thank you for your feedback © 2014 Microsoft. All rights reserved.
global_01_local_0_shard_00000017_processed.jsonl/4317
Diseases & Conditions Polyarteritis Nodosa What is polyarteritis nodosa? Polyarteritis nodosa (PAN) is a rare disease that results from blood vessel inflammation ("vasculitis") causing injury to organ systems. The areas most commonly affected by PAN include the nerves, intestinal tract, heart, and joints. PAN can also affect the blood vessels to the kidney resulting in high blood pressure and damage to kidney function. What is vasculitis? Vasculitis is a general term that refers to inflammation of the blood vessels. When blood vessels become inflamed, they can only react in limited ways. When inflamed, the blood vessel may become weakened and stretch in size, which can lead to aneurysms, or become so thin that they rupture resulting in bleeding into the tissue. Vasculitis can also cause blood vessel narrowing to the point of closing off entirely so that organs become damaged from loss of oxygen and nutrients that were being supplied by the blood. PAN exclusively affects medium sized blood vessels. What are the symptoms of PAN? Because many different organ systems may be involved, a wide range of symptoms are possible in PAN. Patients who have PAN may feel generally ill and fatigued, have fevers, or have loss of appetite and weight. They may have symptoms related to areas of involvement such as pain in the muscles and/or joints, skin sores that may appear as hard tender nodules or ulcers, abdominal pain or blood in the stools occurring as a result of intestinal tract involvement, or shortness of breath or chest pain from disease affecting the heart. High blood pressure is common in PAN and usually due to vasculitis decreasing blood flow to the kidneys. PAN may affect nerves and cause abnormal sensations, numbness or loss of strength. Any combination of these symptoms may be present. What causes PAN? The cause of PAN is unknown. PAN is not a form of cancer, it is not contagious, and it does not usually occur within families. Evidence from research laboratories strongly supports that the immune system plays a critical role in PAN, causing blood vessel and tissue inflammation and damage. A form of vasculitis that mimics PAN can occur in people with hepatitis B or C, so performing blood tests for these viruses is important. Who is affected by PAN? PAN can occur in people of all ages, from children to the elderly and appears to affect men and women equally. How is PAN diagnosed? A doctor may suspect PAN based on information gathered from a variety of sources, including: • Medical history to look for the presence of PAN symptoms • Physical examination to detect sites of organ involvement and to exclude other illnesses that may have a similar appearance • Blood tests and urinalysis to look for features that may suggest inflammation or sites of organ involvement • Imaging tests such as x-rays, computed tomography (CT) or magnetic resonance (MR) scans may show abnormalities in affected areas Once the diagnosis of PAN is suspected, confirmation of the diagnosis is usually pursued by obtaining an arteriogram or a biopsy. An arteriogram involves the injection of a dye into the blood stream that allows visualization of the blood vessels and may show aneurysms or blood vessel narrowing suggestive of vasculitis. A biopsy of an affected area is often performed to try to confirm the presence of vasculitis within the tissue. Biopsies and arteriograms are only recommended for organ sites in which there are abnormal findings present by examination, laboratory tests, or other types of imaging studies. How is PAN treated? Medications that suppress the immune system form the foundation of treatment for PAN. There are a variety of immunosuppressive medications that are used in PAN, each of which has individual side effects. People with PAN who have critical organ system involvement are generally treated with a corticosteroid such as prednisone or prednisolone combined with another immunosuppressive medication such as cyclophosphamide (Cytoxan®). Cyclophosphamide is given at high doses as a treatment for certain types of cancer and therefore is sometimes referred to as "chemotherapy". In cancer treatment, cyclophosphamide works by killing or slowing the growth of rapidly multiplying cancer cells. In vasculitis, cyclophosphamide is given at doses that are 10 to 100 times lower than those used to treat cancer. In this setting, its primary effect is to influence the behavior of the immune system in a manner that results in immunosuppression. In rare instances, people who do not have manifestations affecting the nervous system, heart, kidneys, intestinal tract or other features of severe disease might do well with corticosteroid therapy alone. All immunosuppressive medications can have side effects. Monitoring for side effects plays a critical role in preventing or minimizing their occurrence. Each medication has a unique side effect profile that forms the basis for the monitoring plan. The fact that someone with PAN may initially tolerate treatment does not guarantee that the person will have the same degree of tolerance over time. This makes ongoing monitoring essential, and in some instances, monitoring for long-term effects may be important even after the medication is stopped. The goal of treatment is to eliminate features of inflammation due to PAN. When that is achieved it is referred to as "remission." Once it is apparent that the disease is improving, doctors slowly reduce the corticosteroid dose and eventually hope to discontinue it completely. When cyclophosphamide is used, it is often only given until the time of remission (usually around 3-6 months), after which time it may be switched to another immunosuppressive agent such as methotrexate or azathioprine (Imuran®) to maintain remission. The treatment duration of the maintenance immunosuppressive medication may vary between individuals. In most instances, it is given for a minimum of 1 to 2 years before consideration is given for whether it would be appropriate to slowly reduce the dosage to discontinuation. In people who have a PAN-like vasculitis that is associated with hepatitis B or C, antiviral medications used to treat the hepatitis form an important part of care. Immunosuppressive agents are often given initially to control the vasculitis but may be withdrawn more quickly than in other settings so as to allow the anti-viral medications a better chance to control the infection. What is the outlook for patients with PAN? Because PAN is a rare disease, accurate statistics on overall outcome are only approximate. On average, after 5 years of illness, over 80% of people have survived the effects of PAN. How people with PAN do is strongly related to the severity of their illness. Although PAN can be a sudden and serious illness, many people with PAN do extremely well. The best opportunity to minimize damage comes when treatment has been promptly initiated and is carefully monitored by a physician who is knowledgeable about PAN. Even patients who have the most severe PAN can achieve remission when treated promptly and followed closely. After achieving remission, it is possible for the PAN to recur (referred to as a "relapse"). Estimates of the rate of relapse for PAN vary widely but range from 10 to 40%. Such relapses may be similar to what the person experienced at the time of their diagnosis or they may be different. The likelihood of experiencing a severe relapse can be minimized by promptly reporting any new symptoms to a physician, regular physician follow-up, and ongoing monitoring with laboratory tests. The treatment approach for relapses is similar to that of newly diagnosed disease, remission again being possible for most people with PAN. Can't find the health information you’re looking for? Cleveland Clinic Mobile Site
global_01_local_0_shard_00000017_processed.jsonl/4327
Narutopedia:Blocking policy 5,354pages on this wiki Revision as of 19:20, July 22, 2013 by Speysider (Talk | contribs) This is the policy for blocking. Bad Edits In practice, users are not to be blocked just because they've made a bad edit. Many users who come by the wiki are probably not aware of the various wiki policies in use so blocking just because of one edit is likely to create acrimony and bad feeling between the user and the administration. If a user persists in reverting page revisions to show their bad edit or continually makes the same bad edit in multiple pages and ignores their talkpage warnings to stop making such edits, a block is valid. Repeat Edits A repeat edit can only be considered on a user if the contributions page indicates a fair gap in time between the edits or if another editor has sent the user a message telling them to stop making that edit which they've ignored or have been given plenty of time to not make that edit again. The blocking of obvious vandals is pointless and achieves nothing. Some vandals simply come to make one bad edit and leave and shouldn't be blocked for just one instance of vandalism (a temporary 3 day block may be appropriate, depending on the severity of the vandalism). Temp Blocking If a user is ignoring warnings from other editors to stop persisting in vandalism or ignorance of Narutopedia policies, a temporary block may be appropriate. This is useful when the user is currently making such edits while the temporary block is being applied. It should be noted that the block reason will show up to the user when they try to edit pages, so this is a good place to put a message because it will be "in their face". Even though user talkpages send out a notification to the user, they can be passively ignored by the recipient whereas a block cannot. The Narutopedia expects a certain level of civility between the editors and administrators. Users who do not show any kind of civility towards other users and ignore warnings to remain civil may be blocked. Permanent Blocks Permanent blocks should not be applied without valid reasoning. Examples of reasoning which may warrant a permanent block include: • Continued harassment and intimidation of other editors • Repeated violations of Narutopedia policies after constant warnings to stop • Large scale vandalism which is intended to start an "interwiki" war Talkpage Revocation Users should not be blocked from editing their own talkpage for any reason. The only instance in which a user should have that privilege revoked is if the user has made contributions which abused this privilege or is a persistent vandal or troll who is very likely to abuse the privilege and would have no reason to be allowed to send messages. The same goes towards the ability for users to email other editors. A temporary block may be advised if a user makes a large batch of uploads which violate the Image policy and the user has not read the policy in detail. A permanent block should be used as a follow up if it is clear the violator has completely ignored the block and has not bothered to read the policy (in some cases, users may read the policy and just choose to deliberately ignore it) Advertisement | Your ad here Around Wikia's network Random Wiki
global_01_local_0_shard_00000017_processed.jsonl/4328
5,354pages on this wiki Revision as of 12:24, December 11, 2012 by Aged Goblin (Talk | contribs) Chapter 489 Shinobi as seen in the series. Shinobi (忍) otherwise referred to as ninja (忍者) in the English translation of Naruto, are the primary focus and the main military power in the series. A female ninja is known as a kunoichi (くノ一). Most come from a hidden village, of which some come from specialised ninja clans, and will perform missions for a fee. These missions can include: doing manual labour, acting as escorts, gathering secret information, retrieving stolen items, carrying out assassinations, etc. In times of war, ninja will come together to defend their villages and land. The clearest characteristic of a shinobi is their ability to manipulate chakra to create and use techniques. Shinobi are expected to be loyal to their villages for life, and any defectors are considered to be missing-nin, and will be marked for death. Shinobi can use a variety of techniques often based on the utilisation of chakra. This allows shinobi to perform extraordinary feats such as walking on water or walking up trees. Jutsu are separated into three groups, ninjutsu, genjutsu, and taijutsu. Ninjutsu implies performing a supernatural or beyond normal ability, the most common of which is the elemental jutsu. These are created by the user transforming their chakra into a specific nature or 'release'. The chakra types are Lightning, Earth, Fire, Wind, and Water. Other sub-types of chakra natures such as Wood Release and Ice Release also exist, created by combining two of the basic five releases. Taijutsu implies physical body techniques, which may or may not require chakra. Genjutsu manipulates the chakra in an enemy's mind and disrupts their chakra flow. Their senses get fooled which creates illusions, things that the foe believes to be real that are in fact fake. Genjutsu is the least-used of the three groups, possibly due to the difficulty required in performing the technique. Main article: Ninja Tools Ninja tools are used as alternatives to jutsu. They can include weapons, accessories, and even clothing. Some ninja such as Tenten have mastered the use of such tools, but all ninja are able to use the most common to some degree. A standard shinobi will have a pouch equipped with many such tools, and nearly every ninja is equipped with at least a shuriken holster. Most also possess and wear a forehead protector with the symbol of the village they derive from, though the ninja does not necessarily have to wear it over their forehead. The Inuzuka clan's ninken and Aburame clan's insects are also classified as tools. Start a Discussion Discussions about Shinobi Advertisement | Your ad here Around Wikia's network Random Wiki
global_01_local_0_shard_00000017_processed.jsonl/4329
5,354pages on this wiki Revision as of 20:18, December 12, 2012 by Aged Goblin (Talk | contribs) Menma's Chakra Enhancing Music 2 Multiple tenketsu. Tenketsu (点穴; English TV "Chakra Points"; Literally meaning "Pressure points") are simply nodes from which chakra can be released. There are 361 tenketsu in the body, each one being a checkpoint on the Chakra Pathway System. Though ninja use chakra regularly, very few ninja possess any great control over their tenketsu. Even of jōnin, the vast majority are only capable of releasing a small amount of chakra through their hands or feet to increase the power of punches, jumps, or kicks. For the Hyūga clan, whose entire fighting style is based around manipulating the chakra pathway system, controlling the tenketsu is a regular matter. Neji and Hiashi Hyūga in particular have demonstrated the ability to use Eight Trigrams Palms Revolving Heaven, expelling chakra from all 361 tenketsu simultaneously in order to guard against and repel enemy attacks. The Eight Trigrams Sixty-Four Palms closes sixty-four tenketsu.[1] Though not explicitly stated, it is logical to say that the Hyūga clan (and Neji independently) calculated the exact tenketsu that would be required to shut down an opponent's combat ability, leaving them without the strength to even use taijutsu, let alone ninjutsu. This attack, however, is not lethal, though a lethal blow can be accomplished with one strike by attacking the tenketsu linked to the heart, or by attacking all 361 tenketsu, though the one strike to the heart would be much more efficient. See Also Other Reading 1. Naruto chapter 101, page 13 Start a Discussion Discussions about Tenketsu Advertisement | Your ad here Around Wikia's network Random Wiki
global_01_local_0_shard_00000017_processed.jsonl/4366
Paama or Paamese is an Austronesian language spoken by about 7,000 people in Paama island, a part of Malampa Province in Northern Vanuatu, and in others parts of Vanuatu. It is a member of the Oceanic branch of the Malayo-Polynesian languages, and is closely related to Southeastern Ambrym, though the two languages are not mutually intelligible. Paama alphabet and pronunciation Paama alphabet and pronunciation Tower of Babel in Paama Information about Paama language Malayo-Polynesian languages Other languages written with the Latin alphabet Learn Chinese Characters with the Omniglot Chinese app | Language Jobs at Hosted by Kualo
global_01_local_0_shard_00000017_processed.jsonl/4373
The vote is in, with the results to be announced Jan. 9, and so to say this will change nothing, but still: The only thing in baseball more embarrassing than the voting for the Hall of Fame is the discourse around that voting. A tedious inquiry into ontology at best, at worst a pretext for character assassination, it needs to change or go away. The problem is simple: The elections are carried out by writers who have been members of the Baseball Writers Association of America for at least 10 years, and consequently, the debates aren't about baseball or ballplayers but about sportswriting and sportswriters—much less interesting subjects. A young fan looks at Hall of Fame plaques in Cooperstown, N.Y. Getty Images An obvious solution—one so elegant it's surprising it wasn't put in place decades ago—is to simply strip writers of the vote and give it to the public. Writers and traditionalists would cry to the heavens, and all would fret over the perils of mass democracy, but we'd at least be rid of an inherently toxic structure. Hall of Fame arguments are so bad because they serve as way for rival sets of writers to have a proxy battle. The less offensive half of this equation is the set of writers who highly value statistical analysis; they argue for various players on the basis of derivative mathematical appraisals and tend to disregard such issues as alleged drug use. This is bad only because the idea that an institution devoted to the historiography of the American game should be mainly organized around accounting techniques doesn't really hold. The more offensive half of the equation comprises the older writers who do nearly all of the voting. They judge ballplayers by personal impressions, bad statistics like runs batted in and how they meet vaguely defined notions of morality because that's the way things have always been done. If rating players by strict readings of value is a bit silly, this is ridiculous, especially since many of these purported guardians of the game's history are now using their votes to accuse great players of using drugs even when such claims haven't been backed by solid reporting. So far as the debate here is essentially an ideological one about how the sport should be covered, it is fundamentally nonsensical, irrelevant to an appreciation of great ballplayers like Kenny Lofton and Larry Walker. The worst element, though, is that the writers debating all of this have the franchise even though there's no real reason for them to have it: They have no special knowledge of the game relative to anyone else, and they've never done a good job. The first point here, that writers know little more than anyone else, shouldn't be especially controversial. The voters are (theoretically) good at writing about baseball, which has no obvious connection to assessing what players' legacies mean within the broad context of 160 years of history. No one who wanted to know who the most important presidents of all time were would think to poll political reporters rather than historians or the public. Why do the same in baseball? The second point should be even less controversial. In 1938, there were more than 50 future Hall of Famers on the ballot, including Eddie Collins and Rogers Hornsby, the two best second basemen of all time. One player, Pete Alexander, was elected. This year, with at least a dozen truly great players on the ballot, it seems quite likely that none, or one at most, will be voted in. The intervening years comprised an uninterrupted run of botches and inexplicable calls. In light of this, it's hard to understand how the public would do a clearly worse job. Average baseball fans may not have any special insight into the men who play the game, but then neither do most Hall voters, who in many cases haven't actively covered the sport for years. The fans wouldn't always pick the right players, but then neither does a voting body that never got around to electing Johnny Mize and Arky Vaughan, genuine all-time greats. The best thing about a public vote, though, would be its inherent legitimacy. If baseball fans were to vote in Roger Clemens and Barry Bonds, that would end all sorts of handwringing over whether players who used (or, more often, are weakly alleged to have used) performance enhancing drugs are worthy of being honored alongside past greats of dubious character. If they weren't voted in, that would offer clear proof that the public really does consider the use of steroids different from the use of amphetamines, racism, violent tendencies, or other characterological defects displayed by the already enshrined. Either way, the focus would be on baseball and memory, not on the useless philosophizing of 600 or so sportswriters. That group would, of course, have their say. So would all the younger writers who want to dismiss them as done. So would the historians and the players themselves. So would every fan. Give the vote to the same people who are responsible enough to elect mayors and senators, and everyone will make their arguments, based on appeals to authority or readings of math or the position of the stars or whatever you will, and in the end the most convincing will win. In the depth of every winter, we would have something lovely. It might even come near to being a debate. Write to Tim Marchman at
global_01_local_0_shard_00000017_processed.jsonl/4386
User:Nick Broadbent From OpenWetWare Jump to: navigation, search I am a new member of OpenWetWare! Contact Info Nick Broadbent (an artistic interpretation) Nick Broadbent (an artistic interpretation) I work in the Your Lab at XYZ University. I learned about OpenWetWare from Faculty Member, and I've joined because Necessary for in class research.. • Year, PhD, Institute • Year, MS, Institute • Year, BS, Institute Research interests 1. Interest 1 2. Interest 2 3. Interest 3 leave a comment about a paper here All Medline abstracts: PubMed HubMed Useful links Personal tools