id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_0_shard_00000017_processed.jsonl/22239 | Sorry, this note is going to run long ^^; I promised Narutopokefan I'd post this message in this update:
IMPORTANT: Fan-fiction is still deleting stories than contain yaoi, yuri, lemons, violence, stories based on songs, and any detailed sex scenes…so…just about every story on the site. Most everyone knows of the petition going around. If you haven't signed it, the link is on DarkHeartInTheSky's profile. But there is more we can do.
do NOT go onto 'tread,don't review, don't message your friends,don't update
. If enough people participate, then the site will notice, and will realize we take our stories seriously.
Please spread the word any way you can, in any fandom! The motto is "Unleash Your Imagination." How can we if we're being given a LONG list of what we cannot write?
June 23rd. Remember it. Please.
So may you please do it with us ;-; ! We need as many people who are willing ! So if you say yes can you message me and tell your other friends and Readers about this ? And if you don't want to than I still want to thank you for reading this anyway m(_ _)m [bows down] . thank you bye ~
:End of Message & onto author note:
Lmao! I completely used up the 10 spots given to upload stuff ;p That's ten days of fics for you and 10 days of writing for me! =D Too bad I never finished my outline ^^; That's the focus right now and I've gotten nowhere. Oh well, I'm sure it'll eventually work itself out. Anyway! This is the fic chosen by Narutopokefan. It's a request from Doomy-chan, so I hope you all enjoy it! XD
As before, I'm letting you guys choose the next post... It saves me from having to choose myself ;p Best... idea... I've ever had! Your choices are: 'A Tiger's Stripes', 'Demon of My Nightmares', or 'Hacking My Heart'!
Shiro: This had better be good! I'm a fuckin' powerful demon in Lust, a sexy incubus in Demon, an' I'm just gettin' 'round ta killin' Cirruci in Divine! I DEMON MY MOMENT! *shakes fists*
Vae: 0o Shiro, do no take that tone with me! D=
Shiro: ... *pout*
Ichi: He's having a bad day. He's not too happy about the turns Demon is taking. *conspiritorial whisper*
Vae: I don't care! I refuse to do what he asks when he's that mean about it. Besides, the readers are the ones choosing. He'll just have to get over it! *huffs* Besides... he doesn't even get to kill Cirruci.
Shiro: WHAT! D8
Vae: *running off* On with the fic! =D
Chapter 1
It was a horrible accident that led the group to where they are today, living in a jungle on an island with no name. It seems years, but was only months ago that their ship was battered by a tropical storm and they were cast into the sea. There are fifteen of them in total, three women and two children amongst the men. Their first settlement was erected upon the beach, hoping that a stray ship would catch their fires and rescue them. After weeks of this, the tides started moving closer and they were eventually forced to move to higher ground. The trek there is dangerous, the path through the jungle worn by nothing more than predators and the occasional prey, yet it's necessary.
"Yamamoto," a young woman calls. "The tides have begun to rise once more… shall I alert the others to our trek?"
"That will be fine, Cirruci, thank you," the old man comments.
He's the oldest of the group, but still one of the strongest. He's a war veteran with years of combat experience in these very conditions, so he was made the leader of their little tribe. Cirruci is young yet, barely in her mid-twenties, however her knowledge of poisons and their antidotes have been invaluable. Before getting stranded here, she lived as the daughter of a nature expert. Her childhood included quizzes and being dragged around to observe animals in their natural habitat.
"How are Masaki and her infant?" he asks as an afterthought.
Masaki was pregnant when they first arrived on this island, pushing nine months and on her way to a new home. Just a couple weeks ago, she gave birth to her son and seemed weakened after the ordeal. Had Unohana not been a fantastic medic, she would've likely died.
"Masaki is strong enough to make the journey," Cirruci ensures. "But her child has been drifting in and out of consciousness… we fear he won't survive."
"I'm sure he'll be fine, he's a strong one. Gather the others, it's time to move."
She nods and hurries off, leaving the old man to pack what little possessions he managed to gather. With a deep sigh, he wonders if he's right. Masaki's son is a fighter, he can tell, but this is a dangerous place for infants. Pushing the thoughts aside, he heads out to speak with those he leads.
"As always, we shall wait for the moon to come out before leaving," he states. "Predators hunt at night, so they'll stay around the watering holes and areas packed with game. Those places are far from our path and provide us with ample opportunity. We must stay quiet, we don't want to alert nearby animals to our presence."
"What about the baby?" Unohana wonders. "Infants aren't likely to know when to keep quiet."
"… We'll have to try our best to keep him sleeping."
"It shouldn't be hard," Masaki remarks sadly. "He's been awake for only a couple hours today, if that. I doubt he'll survive the trip."
"I'm sure he'll be fine. Though I must confess, there's a feeling of dread within me… someone won't make it this time," he admits. "Perhaps none of us will."
"Then we should stay here!"
"We either drown or risk the predators finding us, neither are options I'd like. Come on… there's safety in numbers."
The others chatter amongst themselves as they make sure to pack only the necessities, everyone sending baleful looks toward the new mother and her child. Masaki hangs her head, holding her tiny baby closer to herself as she attempts to shield him from the suspicion and hate. Though she's always been rather popular with the others, that's gone downhill since she gave birth… Cirruci can be thanked for that. Looking after a child is difficult for a first time mother, so splitting her attention between work and the boy only seems to slow her down. Cirruci never did much to begin with, so having to pitch in only made her sour toward the strawberry blonde.
"Don't worry, my precious boy… I'll protect you with my life."
It's quiet, the moon finally reaching its highest point within the sky. The jungle has never been so still, so soundless, and as the humans creep further within the brush… they fear what they may run into. Yamamoto's warning was eerie and left a horrid unease within the group, everyone too busy wondering who won't survive to worry about watching for danger. As they reach a resting point, they hear the wail of a hungry baby.
"Quiet that child, Masaki!" one of the men hisses. "The predators will hear it!"
"He's just hungry," Unohana frowns. "Masaki, just feed him like I taught you and he'll quiet."
She does as told, the baby silenced although the tribe is anything but happy. Cirruci is more for herself than the safety of others, the baby threatening that sense of survival. She glares at the tiny defenseless bundle in Masaki's arms, waiting for everyone else to move on before stepping over to the woman.
"You need to leave that child behind, Masaki," she frowns. "He won't survive anyway, just leave him."
"I won't! That's cruel and there's still a chance he'll make it!"
"Not tonight," she hisses. "I won't be killed because of that little siren."
"He'll be quiet now, he's been fed."
"You don't get it! We found that old settlement when we arrived, we found that picture! Those people had a little tagalong, too, and they ended up dead in their own camp!" she shouts in fury. "Either drop the brat or walk in the other direction, we don't need you here!"
Masaki glowers hatefully, holding the boy closer to her as he sleeps. Cirruci knows defiance when she sees it, has always known this woman to be capable of it, and lunges to rip the baby from her arms. Masaki gasps and turns, feeling a makeshift blade tear into her back and through her stomach at an angle. Cirruci slits her throat afterward for good measure, watching in sick satisfaction as Masaki falls with the baby still sleeping in her arms. She leaves them like that, hurrying to catch up with the others and hoping the predators make a quick snack of the baby before finishing off the woman.
Once she's back with the others, they don't say much about Masaki's disappearance… head count isn't taken until they're all safe within the walls of their home. She has a slight bounce in her step now, satisfaction high within her as they come closer to their sanctuary. It's too late though, the howls of wolves rising over the trees and sending fear throughout the clearing. The men grab their makeshift weapons and circle the few women they have to protect, waiting for the attack they've been warned of. Carefully, they start toward the protection of their second settlement. The gates so close and yet… not close enough. The jungle is filled with shrieks of pain and terror as the wolves rush in, claws and teeth tearing flesh as they take down the humans one by one. No one survives; all of them left half eaten and staring with glassy eyes toward the canopy.
Back within the clearing where Masaki lies, the baby stirs and tumbles from her arms. It's a short fall to the forest floor, but enough to make him cry. He's too young to understand the fact his mother is dead, her blood painting his body crimson as her figure grows cold. He doesn't know why she's not responding to him, why she's not coddling him and holding him in her warm embrace. A rustling from the brush draws his attention, vivid amber eyes staring curiously as three large tigers step from the trees.
"What have we here?" a female one wonders in delight. "Awe, it's a baby!"
"Stay away from it, Yorouchi!" an almost sandy colored tiger growls. "It could be dangerous!"
"You dumbass, it's just a baby!" she snaps as her paw slaps him. "What the hell could it possibly do? Gum me to death?"
"Can we eat it?"
"No! You most certainly can't eat it! I'm going to raise it," she purrs happily. "Someone has to, you know. I think that corpse over there is its mom."
"… Kisuke isn't going to like this," the male whines.
Yorouchi doesn't listen, waltzing over and lifting the baby carefully in her mouth by the nape of its neck. This will never be the same as the one she lost a few days ago, but it'll help to ease the pain… they need each other and she'll die to protect this baby just as its mother did before her.
There you have it! The first chapter! =D I only have two written, but I'll write more after I'm finished with Demon! In case you haven't figured it out, Doomy-chan enjoys my more animalistic GrimmIchi and requested a Tarzan theme ;p
Ichi: Grimm in a loincloth *dreamy sigh*
Shiro: Uh... Ichi, yer droolin'.
Ichi: *waves hand dismissivly* Not now Shi, I'm daydreaming. *completely spaced*
Shiro: I'm in this right? I mean... I get ta be wit Ichi? *hop around eagerly*
Vae: *caught in Ichi's daydream* Mmmmmm... mostly naked Grimmjow... *,*
Shiro: Great... I'm surrounded by pervs. Usually, I'm the perv! What's the world comin' ta? *throws hand up in irritation*
Grimm: *just arrives* What the hell's wrong with them?
Shiro: Don't even ask. *gives up* |
global_01_local_0_shard_00000017_processed.jsonl/22240 | Phil discovers it's true what they say: there really is a bright light and long, long tunnel.
But first there's a moment of deep darkness, a suffocating black pit and the terrifying sensation of falling before that light catches him. When it beckons him Phil steps forward, because there's no pain and no fear and no reason not to.
Except...except he's in the middle of the operation. He still has agents in harm's way, he can't just...he's never not seen an operation through before. Clint is still compromised; if Phil takes another step he'll never know if they get him back.
Suddenly the light isn't so alluring. Phil wants to go home, and whatever the light is he knows it's not home because he knows it's not SHIELD. He needs to be back there to mix Tasha a white russian after the debriefing, their little ritual after hard missions. Phil doesn't even remember how that started, just that it stems from a terrible, now-hazy joke that nonetheless had doubled her over with laughter when he told it. She'd confessed later she hadn't laughed since she was child and thought she'd forgotten how - Phil remembers how sad that had made him, and how glad he was that Clint had defied his orders that one time and recruited her instead of killing her, and how upset he always was that he could never quite remember that joke.
He needs to be there for the next time Clint calls his private line in the middle of the night because he's had that nightmare, the one Phil's never been about to coax him into sharing. Neither of them speak during those calls; Phil holds the line open as they listen to each other breathe, sometimes for hours until Clint falls back asleep. He's never told Clint he keeps listening.
If he steps forward Clint will never back him against another wall, the stress of a near miss making his hands shake as he skates calloused fingers over Phil's hip and kisses a slow path down to his collarbone, scraping his teeth against his skin just hard enough that Phil has to make up yet another implausible paramour to explain away the bruises. He'll never again see Tasha stretched out in his bed and feel his breath catch because humans just didn't look like that, like she'd been carved out of marble by one of the old masters. He'll never see her lips curl up into that smile that comes so rarely, the true one that gives him a glimpse of the woman she would have been had men in a red room not carved her into something glittering and lethal.
He's felt so guilty for so long over this, over touching and letting himself be touched, but he's never found the will to pull away or the words to explain why he should; he tries with Clint once only to have Clint laugh at him before kissing him so hard he goes lightheaded from lack of air. "Let me get this straight," Clint says when he finally decides to let Phil breathe again. "You think you're taking advantage of us?"
His luck with Tasha's no better; she crouches over him still in her field gear, the leather already unzipped down to her navel to expose pale skin he can't stop staring at. "I've spent my whole life with men telling me my choices," she says, a touch of the accent she's learned to hide coloring her words. "Now you want to tell me my choices are wrong. I thought you said SHIELD would be different." He eventually realizes they have him outnumbered and lets them pull him under he forgets how to breathe without them.
Phil tries to take a step back but the light is everywhere now and he doesn't know which direction is the correct one. He has too much work unfinished, some missions half-planned and others ready to execute, weeks of work put on hold by a god's petulant invasion. He's been a member of SHIELD longer than it's been called that and there are days he wakes up and wonders what he ever did to be that fortunate. He may be a small cog in the giant SHIELD machine in the grand scope of things but his work is important. How many people can really say that?
With every second the light looks colder. He met Captain America because of SHIELD. What in that light is going to compete with meeting Captain America?
He's afraid to move. A step in any direction could take him away from everything, from SHIELD, from the people who count on him – but staying still is no better. The light keeps getting brighter, keeps trying to get him to come toward it but all Phil wants to do is go home.
"Agent Coulson I gave you a motherfucking order."
Trust Director Fury to shout louder than death. Phil lunges toward the voice before he can lose his bearings again, knowing there won't be a second chance. He comes to gasping on the cold floor, the astonished faces of the med unit hovering over him. "I told you that would work," he hears Fury say but when he tries to turn his head to track the voice pain spiraling through his chest whites out his vision.
"Shh," Fury says, and Phil thinks anyone who believes gentleness beyond Nick Fury should hear him now. "You just keep breathing, Coulson. You were dead over three minutes, these hacks were ready to call it."
"Loki..." Phil whispers and oh, talking is a mistake right now.
"Worrying about Loki is my job, you just need to concentrate on breathing. That is an order, and you had damn well better follow it."
Phil nods, or at least tries to. It's about all he's capable of at the moment and he immediately regrets the attempt. He feels Fury squeeze his hand once as the medics start loading him onto the gurney. "The team's about to be pretty angry with me, so you'd better be alive in a few hours to smooth that over. I'd apologize but you know I don't do that. Technically it's your idea anyway." Phil has no idea what Fury's planning but he's so good making people hate him it could be anything. He's very ready to pass out again but just before he does Fury leans close enough to whisper in his ear. "Got the report during all the CPR that Romanov recovered Barton. Figured you'd want to know."
No tunnel of heavenly light could ever compete with that. He squeezes Fury's hand once, to make sure Fury knows he heard.
Then he manages to do it one more time to let Fury know he isn't going anywhere. |
global_01_local_0_shard_00000017_processed.jsonl/22241 | Claws sheathed so not to scrap the ground. Paws stepping lightly so not to make a sound. A lone solitary figure, body low to the ground, trekked its way through the thick underbrush of the dense Jungle.
What little light that filtered through the thick canopy of trees above reflected down upon the light golden fur of the predator that silently stalked the prey it smelt on ahead of them.
Sandy-brown eyes peered through the leaves of the bushes in front of them to behold the prey they been searching for sometime. Shoulders squaring, the figure crouched themselves lower to the Jungle floor till their stomach pressed against the cool grass beneath them.
Keeping their prey within sight. The figure felt a smirk of victory slip over their muzzle. Taking deep but silent breathes through their nose. The figure prepared itself, counting down mentally in their head…five…four…three…two….
With a roaring laugh, a golden furred lioness leapt from the bushes at her prey. Landing on the back of a brownish-gold, dark brown mane lion who roared out in surprise when he felt someone jump onto his back. Their paws wrapped around his neck. He was prepared to throw them off when their giggling voice reached his ears.
Growling, he unwound the lioness's arms causing her to fumble from his back down onto the ground in a laughing heap. "Yamile! What are you doing all the way out here?"
The young lioness, Yamile, smiled cheekily up at her big brother from where she laid on her back on the leaf littered ground. Giggling, she swiped her paw at him which he only batted back at to keep it away from him.
Sandy-brown eyes clashed with green. "Oh Jaali, don't act like you got a stick up your butt all the time. Learn to lighten up and have a little fun."
Staring at his little sister, Jaali shook his head causing bits of his mane to fall into his face. "You're speaking to the wrong lion about that dear sister. I invented fun. You just cause trouble." Reaching out he nudged Yamile until the lioness finally rolled back onto her paws with a simply roll of her eyes.
"Yeah right…you act like a sore thumb most the time…" Raising her paw, Yamile knocked a stray leaf from her head that got tangled in the small tufts of hair atop her head. She hated her fur; she thought the hair made her look too much like a boy, something her sister Tufa and Jaali both teased her about.
The only ones that didn't tease her were her mother and the few lionesses that remained of their Pride. Her mother said she was as beautiful as she was the day she was born. But sometimes she had her doubts; she still thought she had too many boyish features which her siblings would never let her forget.
A smirk spread across Jaali's muzzle. "You know you can try and smooth that down all you like. It's never going to work." He chortled waving off the glare she gave him. Jaali knew he may have become more serious since he became King; it was something he took seriously, something that reminded him of his cousin.
For it was something that Zuri had lectured him about a day after the attack on her by the hyenas. The same attack that had taken the life of his mother's sister, his aunt Zakia. In the past lectures from his cousin would have blown right over his head and been forgotten. But that was before his first battle.
The battle for the Pridelands.
Where he had spent a majority of the night fighting a large pack of hyenas. Larger than he had ever seen in his entire life. All for the sake of his friend. A small smile tugged at his mouth at the thought of Simba. He missed his friend as much as he missed his cousin. Both Zuri and Simba had been the only cubs around his age and he had been sad to depart from them that day he left the Pridelands to lead his Pride back home.
He remembered the day he returned to the Pride. It had taken a good number of days to cross the desert to remember the way they had come in the first place. But Jaali had managed to get them all home safely. Each and every lioness. He was proud to say he hadn't lost one.
That was to say he was proud…but whether his father had been. He never had been sure. That was until the day of his Father's death. When Mansa had been bitten by the black mamba, it had sent the entire pride into a panic especially given the events happened around the time they had been given the news of the birth of Simba and Zuri's cub. A son they named Kopa.
The name when he heard it made him laugh but smile at the same time that the cub was named after his late Uncle Kopa. Who he missed everyday growing up. His Father had always been the strict one, Kopa the fun one.
Thinking back to his Father, Jaali had been shocked at how proud his father had really been. For right there on his death bed everything the old King held in for years came out in his last moments of life.
But as he was saying, he may have become a somewhat serious King, but Jaali still knew how to have fun. Even if his two sisters didn't seem to think so. Speaking of which he thought, turning to Yamile he asked. "Where is Tufa? I thought you two were supposed to be out practicing your hunting with Aida?" His brow furrowed as he asked this. Looking up and over his sister's head he stared into the Jungle in trying to see whether or not his other sister lingered out there. He figured if she was, she might jump him just as Yamile did. He began to think he would get a bad back before old age if that kept up. But so far it only seemed Yamile who appeared to like to be the one to jump him.
Tufa was much more reserved than Yamile but that didn't mean she didn't like to attempt at scaring him now and again.
Shoulders stooping, Yamile grumbled at the mention of what she was supposed to be doing at that very moment. Kicking a stray pebble on the ground with her paw, she looked off to the side pouting. "What's the point of it…I mean…it's not like we ever catch anything."
"Just because you don't catch anything right now, does not mean it's not important. You need these lessons if you are to become a member of the hunting party one day or lead huntress. Mom's not going to be able to do it for much longer and I have yet to find a mate." Jaali lectured eyeing his sister with a disgruntled look. "And just because you don't catch anything right now does not mean you won't…"
"Yeah right…." Yamile muttered under her breath giving her brother a critical look. He knew he was right. Over the last coming months hunting had become difficult in their parts of the Jungle. Animals became scarcer. Reasons why this happened was something they couldn't comprehend. But what animals they had managed to catch they got them talking first to know what was going on beyond their borders but all they ever got was stories of fires destroying lots of Jungles.
So the animals were moving deeper in or away from the Jungles to get to new homes.
"Plus I don't need to be leading Huntress. Tufa's got that down. I'd rather stay back and enjoy life." Yamile smiled, she wasn't much for a huntress. She didn't even like hunting. She preferred to stay behind and watch the pride or do patrol with her brother but her mother insisted that she learned and so did Jaali.
She didn't exactly think it was fair that only males could do the patrol. She thought she was just as qualified. Yamile was happy the times her brother would take her out to patrol with him. But he couldn't always allow her too, not when their mother spoke up and said she needed to learn how to hunt and become a vital member of the pride. She thought helping Jaali did make her a vital member of the pride.
Jaali shook his head, giving his sister a crooked smile he motioned for her to follow him as he began to start his rounds again. He knew his mother wasn't going to be happy if she found out Yamile had skipped out on another hunting lesson but he was happy for the company. He often missed the company he had from Simba.
Smiling, the golden lioness bounded on after her brother. Falling into a comfortable walk beside him, holding her head high. Along with her slightly boyish features, Yamile often complained that she was small for her age. Tufa who was born the same day as her was even taller then she was. Yamile herself just came up to her brothers shoulders just a tad bit.
The two of them walked in silence but it soon became unnerving for Yamile who stated to ask her brother an array of questions. "So have you thought of something of what we're going to have to do to find more food? Are we going to have to move? What if those fires we heard of head our way….ouch! Hey!" Rubbing her head with her paw, the golden lioness gave her brother a hard stare at the fact that he had hit her over the head with his paw.
Staring at his sister, Jaali sighed after a few moments and turned to face forward again. The two of them stopped at one of the borders of their lands, a place that Jaali knew well. It was the cliff that he, Zuri and Simba had jumped down that one day that ended up with them crossing out of their prides territory.
"Have you figured something out?" asked Yamile impatiently.
Looking at his sister again, Jaali tried to think of something to say. Then sighing, the Rasheda King looked up at the sky that could be perfectly seen from the cliff that down below separated two parts of the Jungle. He had to figure out something. He knew his pride was depending on him for an answer, they been asking him many times of solutions to come up with for the scarce food problem.
Every decision he had to make was a tough one.
He knew he couldn't just move the pride away from the home that had been their's for generations. But he also knew if they didn't find a solution to the food problem they may as well starve before the next rainy season hit their part of the Jungle. It was moments like these that he wished his father was still alive…he was sure Mansa would know exactly what to do.
Like he Jaali seemed at a complete loss. He was doing better at being King than he first thought he would. That and he had his mother along side him. But he couldn't rely on her help forever. He did have Jamine in the very beginning when he took the throne, but that had been short lived when Jaali had sent him to the Pridelands for an update on what was going on there.
Everyday since they parted he worried for his cousin. More so with that lioness…what was her name…oh yes Zira. Jaali didn't like her. There was just something in the way she looked at Simba and Zuri that made him uneasy. He wanted to know how the two of them were doing with their Pride and new roles as King and Queen. He wanted to know how their son was doing. He hadn't heard word about Kopa since that day Zazu visited them to tell them of the prince's birth.
But sadly Jaali began to think that Jamine never made it there. For he never made it back home either. Leaving Jaali without a majordomo. He would have found another but Jaali hadn't quite found himself looking for he didn't know what to look for in one. It was times like this, that though Jamine often annoyed him when he was young, it would make it better for him to have Jamine to help him when he got lost in his decision making.
In a way Jamine was like his father personality wise.
Closing his eyes he fell into silence as he went over the many options he had. Then opening them he turned his head to gaze upon his little sister who watched him expectantly. "I think I have an idea…but we're going to have to discuss it as a pride tonight. It's going to have to involve all of us to work…but I think it will work…"
"And what plan is this?" Yamile eyed her brother cautiously. She hoped his plan didn't involve moving. She didn't want to move from the Grove. It was so beautiful and had great place to live because of the caves made wonderful shelter for them during the good and bad weather. She wanted food but she also didn't want to leave. "We don't have to…"
"Move?" Jaali asked, he shook his head. "No…we're not moving…but we will have to do something new and drastic if we want to survive…"
"That is?" The golden lioness pushed leaning her head in close to her brother nudging him lightly with the corner of her shoulder.
Looking at her, and then looking down over the cliff at the other side of the river, Jaali nodded his head. Yes he knew what they had to do. With a grim face he spoke, "Something the pride hasn't done in years…we need to hunt outside the territory…" turning to face her he continued.
"It's our only way…we need bigger prey to survive…and for that we must hunter deeper…and together…meaning the whole pride…including myself…" Closing his eyes, his face became sombre. Turning his gaze out over the river he spoke firmly away that his sister was watching him with worrisome looks but he knew she would call him in any decision he made that would make sure the pride survived.
"We go for our survival."
Welcome to part three of my alternate Universe fan fictions. We start with a pride we haven't looked into since chapter 3 of His True Destiny. I hope you enjoyed and look forward to the story I have to tell.
Thank you for reading and please do review. |
global_01_local_0_shard_00000017_processed.jsonl/22246 | Summer Program in Quantitative Methods of Social Research
Network Analysis: A Second Course
This workshop covers advanced methodology for network analysis. Topics to be covered in lecture and lab sessions include p* (the new exponential family of random graph distributions) and approaches to longitudinal network data (such as actor-oriented models like SIENA). Generalized blockmodeling (fit with software Pajek) and general estimating equations (as used by econometricians and networkers for the analysis of data measured over time) will be introduced, though not extensively covered in labs. The morning and afternoon sessions are coordinated so that each day presents methodological developments in the morning with afternoon computer lab sessions enabling applications to real data. The workshop will meet each day from 9:00 a.m. ? 6:00 p.m. with a break for lunch. This workshop assumes that participants have already taken a first course in network analysis, such as the ICPSR Summer Program workshop "Network Analysis: An Introduction."
Tags: networks
Course Sections
|
global_01_local_0_shard_00000017_processed.jsonl/22252 | 1. A
2. B
3. C
4. D
5. E
6. F
7. G
8. H
9. I
10. J
11. K
12. L
13. M
14. N
15. O
16. P
17. Q
18. R
19. S
20. T
21. U
22. V
23. W
24. Y
25. Z
Faith is to hope for things which are not seen, but which are true (Heb. 11:1; Alma 32:21), and must be centered in Jesus Christ in order to produce salvation. To have faith is to have confidence in something or someone. The Lord has revealed Himself and His perfect character, possessing in their fulness all the attributes of love, knowledge, justice, mercy, unchangeableness, power, and every other needful thing, so as to enable the mind of man to place confidence in Him without reservation. Faith is kindled by hearing the testimony of those who have faith (Rom. 10:14–17). Miracles do not produce faith, but strong faith is developed by obedience to the gospel of Jesus Christ; in other words, faith comes by righteousness, although miracles often confirm one’s faith.
Faith is a principle of action and of power, and by it one can command the elements, heal the sick, and influence any number of circumstances when occasion warrants (Jacob 4:4–7). Even more important, by faith one obtains a remission of sins and eventually can stand in the presence of God.
Other references to faith include JST Gen. 14:26–36 (Appendix); 2 Cor. 5:7; Eph. 2:8–9; Heb. 11; James 2:14–26; 1 Pet. 1:8–9; Enos 1:6–8; Alma 32; Moro. 10:11; D&C 46:13–16. |
global_01_local_0_shard_00000017_processed.jsonl/22261 | • My NEB
• Print
• PDF
• FAQ: What is the difference between NEB #C3010H and NEB #C3010I?
They are the same cells with the same efficiency but provided in different formats. C3010H is packaged with 20 single-use transformation tubes, each containing 50 μl of competent cells. Plasmid or ligation product can be added directly into the transformation tubes for convenience. C3010I is packaged with 6 tubes, each containing 200 μl of competent cells. The tubes should be thawed on ice and 50 μl of cells transferred into new tubes prior to transformation. Each tube contains enough cells for 4 transformations with the benefit of reducing the cost of each transformation. If you perform 3 or 4 transformations at a time, using C3010I is cost effective. Refreezing the competent cells after thawing is not recommended since it will significantly reduce transformation efficiencies. |
global_01_local_0_shard_00000017_processed.jsonl/22300 | Revision as of 12:21, 30 April 2013 by Mfranko (Talk | contribs)
Jump to: navigation, search
OWASP Cleveland
Click here to join the local chapter mailing list.
Upcoming Meetings
Thank you to everyone who joined us for the Cleveland Chapter OWASP Meeting on April 29th at Hyland Software!
Information for our next meeting will be posted HERE as it comes available.
'Would you like to speak at an OWASP Cleveland Meeting?' If we haven't approached you, but you believe you have new research that the security community would enjoy hearing about, we invite you to submit your presentation topic for consideration.
To speak at upcoming OWASP Cleveland meeting or suggest a speaker, please submit your ideas via email to Michael Wilt-
Past Events:
Matt Neely & Tom Eston - Monday, April 29th from 11:00am - 2:00pm
Presentation: "Threat Modeling - The First Step in Secure Application Development"
Abstract: Application security issues continue to be a growing concern for businesses large and small. In fact, many people would be surprised to find that some of the most popular mobile apps downloaded are vulnerable to issues found in the OWASP Mobile Top 10 list of common vulnerabilities.
To address these issues security needs to be integrated into the software development lifecycle (SDLC) used by the developers. When developing an application in a secure manner threat modeling is an important but often forgotten first step.
This talk will start out an overview of where to integrate security into the SDLC process. The remainder of the talk will focus on the threat modeling portion of the SecSDLC. During this stage the OWASP Mobile Threat Model will be introduced. To provide real world examples vulnerabilities found in many of the top 25 downloaded apps found in the Apple App Store and Google Play will be covered.
Presentation: Reverse Engineering .NET and Java
Kevin Johnson - Tuesday, March 22nd Noon – 2pm Presentation:“Ninja Developers: Application Security Testing and Your SDLC.”
Chapter Meetings
Our chapter is sponsored by SecureState.
Cleveland OWASP Chapter Leaders
The chapter leader is Ken Stasiak |
global_01_local_0_shard_00000017_processed.jsonl/22303 |
Re: [libvirt] [Qemu-devel] [PATCH v2 3/3] raw-posix: Re-open host CD-ROM after media change
On Mon, Apr 04, 2011 at 08:02:26AM -0500, Anthony Liguori wrote:
> On 04/04/2011 05:47 AM, Daniel P. Berrange wrote:
> >>I'm hoping libvirt's behavior can be made to just work rather than
> >>adding new features to QEMU. But perhaps passing file descriptors is
> >>useful for more than just reopening host devices. This would
> >>basically be a privilege separation model where the QEMU process isn't
> >>able to open files itself but can request libvirt to open them on its
> >>behalf.
> >It is rather frickin' annoying the way udev resets the ownership
> >when the media merely changes. If it isn't possible to stop udev
> >doing this, then i think the only practical thing is to use ACLs
> >instead of user/group ownership. We wanted to switch to ACLs in
> >libvirt for other reasons already, but it isn't quite as simple
> >as it sounds[1] so we've not done it just yet.
> Isn't the root of the problem that you're not running a guest in the
> expected security context?
That doesn't really have any impact. If a desktop user is logged
in, udev may change the ownership to match that user, but if they
aren't, then udev may reset it to root:disk. Either way, QEMU
may loose permissions to the disk.
> How much of a leap would it be to spawn a guest with the credentials
> of the user that created/defined it? Or better yet, to let the user
> be specified in the XML.
That's a completely independent RFE which won't fix this issue in
the general case.
|
global_01_local_0_shard_00000017_processed.jsonl/22304 |
Re: [libvirt] [RFC PATCHv4 14/15] qemu: skip granting access during fd migration
On 03/10/2011 05:19 AM, Daniel P. Berrange wrote:
> On Wed, Mar 09, 2011 at 07:18:32PM -0700, Eric Blake wrote:
>> SELinux labeling and cgroup ACLs aren't required if we hand a
>> pre-opened fd to qemu. All the more reason to love fd: migration.
> I know that holds true for cgroups which checks on open() only,
> but are you absolutely sure about for SELinux? SELinux checks
> FDs on every single syscall. I'm really fuzzy about what happens
> to an FD's associated security context when you pass it over
> an UNIX socket using SCM_RIGHTS. I think it might 'just work'
> as we already do this with TAP devices and don't label them,
> but it could be we have a generic policy rule related to TAP
> devices.
Whether surprising or not, it worked without doing any labeling on the
fd. I don't know if that's a hole in SELinux.
In fact, it's more than just the SELinux labeling - it's also the DAC
labeling (that is, pre-patch, the file is owned by qemu:qemu during the
migration, then chown'd back to root:root on completion; post-patch, the
file is never chown'd in the first place, and it is the SCM_RIGHTS of
the open fd that lets a non-root process write into a 600 root:root
file). But that's not a hole (it's always been possible in Unix to do
things on open fds where you can't do the same by attempting open()
yourself on the same underlying file - for example,
open(file,O_CREAT|O_RDWR,0000) lets you read and write into a temporary
fd that not even another process with the same uid can reopen. Or put
another way, an open fd is stateful - it remembers the permissions at
the time of the open, and not is not impacted by any intervening chmod
or chown of the underyling file).
> If it passed testing with SELinux in enforcing mode, then ACK
It does indeed pass (to my relief).
Libvirt virtualization library http://libvirt.org
Attachment: signature.asc
Description: OpenPGP digital signature
|
global_01_local_0_shard_00000017_processed.jsonl/22306 | Latest Issue of Science News
News in Brief
Under magnet's sway, fluids form simple structures
Droplets wiggle, split and coalesce into simple and dynamic configurations
Magazine issue:
Sponsor Message
View the video
Then Timonen and his team oscillated the magnet horizontally, moving it increasingly faster and over longer distances. At certain thresholds of speed and distance, the droplets suddenly coalesced into elongated globules that changed shape as the magnet yanked them back and forth.
Timonen says the demonstration should help scientists better understand and exploit dynamic self-assembly.
A rapidly oscillating magnet causes ferrofluid droplets to coalesce into elongated, dynamic structures.
Credit: Courtesy of Science/AAAS
A dollop of ferrofluid divides into daughter droplets (and several very small pellets) when exposed to a magnetic field.
Credit: Courtesy of Science/AAAS
|
global_01_local_0_shard_00000017_processed.jsonl/22318 | Article Header Image
The Shadow Rift of Umbraforge
Scales of War Adventure Path: Part 3
by Scott Fitzgerald Gray
The third installment in the Scales of War Adventure Path is here! Having saved Overlook from the threat posed by the orog Tusk, the PCs return to the city as heroes. There, they find that something new threatens the city and Elsir Vale beyond it. Their quest to discover who is behind the mountain orcs' organization, as well as their well-armed orog leaders, will take the heroes beyond this world and into the Shadowfell.
In "Siege of Bordrin's Watch," the PCs discovered that dark creepers had sold arms and tactical intelligence to the orc war chief Tusk, aiding him in his attack against the folk of the Stonehome Mountains. In this adventure, the PCs investigate the link between the orcs and the dark ones, stumbling into an arms-running operation bridging two planes and finally confronting the charismatic figure behind it.
Sarshan is an opportunistic shadar-kai arms dealer. For years, he has built an invisible mercantile empire around the sale and brokering of weapons, armor, mercenaries, and intelligence from his domain in the Shadowfell. Though Sarshan plays a significant part in this adventure, the PCs' initial focus is on one of his lieutenants -- a dark creeper shadowborn stalker named Modra.
About the Author
Follow Us
Please enter a city or zip code |
global_01_local_0_shard_00000017_processed.jsonl/22319 | Event Registration
Annual Job Fair
Event Date(s): 5/1/2012
Event Time: 10:00 AM
Step 1: (Select at least one event item)
Event ItemAttendees Per ItemPriceQuantityPurchaseTax
Annual Job Fair - Free Wifi1 $0.00
Annual Job Fair - Electric 1 $20.00
Annual Job Fair - Lunch1 $12.50
Annual Job Fair - Vendor Reservation1 $0.00
This process uses the latest SSL security encryption.
If you'd rather place your order by telephone, please call (765) 742-4044 or fax your registration along with your credit card information to (765) 742-6276. |
global_01_local_0_shard_00000017_processed.jsonl/22349 | Take the 2-minute tour ×
I have "liferea feed reader" on Linux for RSS feeds. Is there a way I could import all my added feeds there to Android? (NOTE: the extension of RSS exported file is "opml".)
share|improve this question
add comment
2 Answers
up vote 6 down vote accepted
Android doesn't have a built-in RSS feed reader, but there are many RSS feed reader apps (and websites) that will happily import an OPML file.
If you want to use a website, or an app with a website-synced back end, then Google Reader is very popular, and you can definitely import OPML files into Google Reader. On your device you can then either visit the Google Reader webpage, or use the Google Reader app, or one of the other many Android apps that sync with Google Reader.
To import an OPML file into Google Reader, click the cog/gear icon in the top-right of the page, then click Reader Settings and then Import/Export. You should then see the option to upload your OPML file.
share|improve this answer
Note that Google have announced that they're turning off Google Reader effective July 1, 2013. – Al E. Mar 18 '13 at 15:59
add comment
RssDemon imports OPML files.
JustReader says it does, but I couldn't find it and have asked the dev about it.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/22353 | Take the 2-minute tour ×
My system log is flooded with error messages like the following:
mds: (Error) Server: No store registered for scope "/Volumes/Storage"
The volume in the error was in use on a previous machine before I migrated to my current machine. Several have suggested adding and removing that volume in the Spotlight Privacy settings, but that volume no longer exists. Is there an mds configuration file somewhere that I can edit so that mds no longer looks for that volume?
share|improve this question
What version of OS X are you using? Is it a server version? – Nathan Greenstein Nov 6 '11 at 2:46
I'm running 10.7.2, not server. – mmaa Nov 6 '11 at 4:44
add comment
1 Answer
up vote 7 down vote accepted
I use Alfred, a utility similar to Quicksilver. I had previously configured it to search /Volumes/Storage for apps, but never told it to stop trying to index that volume once I migrated to the new machine.
I removed the /Volumes/Storage entry from Alfred's list of directories to index, and now the console messages have stopped.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/22359 | TY - JOUR T1 - NEutropenia complicating parenteral antibiotic treatment of infected nonunion of the tibia AU - McCluskey WP AU - Esterhai JL AU - Jr AU - Brighton CT AU - Heppenstall R Y1 - 1989/11/01 N1 - 10.1001/archsurg.1989.01410110067013 JO - Archives of Surgery SP - 1309 EP - 1312 VL - 124 IS - 11 N2 - • Fifty patients with posttraumatic tibial nonunion complicated by chronic refractory osteomyelitis were treated with intravenous antibiotics. Fifteen patients (30%) experienced 18 episodes of leukopenia; seven of these patients became neutropenic and three became severely neutropenic. No patient became neutropenic prior to the 20th day of antibiotic therapy. The classic findings of fever, pruritus, maculopapular rash, and eosinophilia did not correlate with either the onset or the severity of the neutropenia. Neutropenia can develop precipitously. Prevention of neutropenia is difficult in a patient population receiving long-term antibiotic therapy. Regular monitoring of the white blood cell count and differential cell count minimizes the risk of developing prolonged, severe neutropenia with potential complications. No patient in this series had any serious or infectious complication secondary to neutropenia.(Arch Surg 1989;124:1309-1312) SN - 0004-0010 M3 - doi: 10.1001/archsurg.1989.01410110067013 UR - http://dx.doi.org/10.1001/archsurg.1989.01410110067013 ER - |
global_01_local_0_shard_00000017_processed.jsonl/22373 | Take the 2-minute tour ×
Some months ago I set up OpenDNS. Since then, occasionally I get slow page loads and pages that redirect to a timed-out opendns page. I would like to see if removing OpenDNS will make browsing efficient again. However, I can't remember how I set it up, nor can I see where OpenDNS is configured.
The guides for setting up OpenDNS mention either the file /etc/dhcp/dhclient.conf or using the Network Manager. The conf file has no reference to OpenDNS or its IP. The Network Manager doesn't have the OpenDNS IP either.
But I know it is configured somewhere because of the redirects mentioned above, and because https://www.opendns.com/welcome/ reports success.
How do I determine where it is configured?
share|improve this question
Have you checked your modem and router? – Sly Sep 29 '12 at 23:36
Oh great idea... - Yup that's it. Thanks Sly. Please post this ^ as an answer. – Synesso Sep 29 '12 at 23:42
add comment
1 Answer
up vote 2 down vote accepted
Have you checked your modem and router?
share|improve this answer
That's where the setting was. After I changed to Google's DNS the name resolution problems went away completely. – Synesso Sep 30 '12 at 0:14
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/22374 | Take the 2-minute tour ×
For some reason I am successful in adding new directories to my $PATH but when I run the commands in the terminal the $PATH doesn't summon them.
I modified the $PATH in the ~/.bashrc file, and added the last directory
# Set the default system $PATH:
But when I run the command it says command not found. However when I type the full path of the utility I'm able to run it.
Has anyone experienced this problem before? Do you know what I can do to fix this problem?
share|improve this question
.bashrc is the wrong file, you should change PATH in .profile. See Alternative to .bashrc. Nonetheless, changing .bashrc should work when you launch applications from that terminal. Are you running a shell other than bash? Is your .bashrc read? Tell us what ps $$ shows in a terminal. If you add the line set -x at the top of .bashrc, what output do you see when you open a terminal? – Gilles Dec 30 '12 at 16:41
I think that you will get what you want entering export PATH=$PATH:$HOME/aldin/mybin/fasta-35.4.12/bin. I hope that some user confirm or refute this information. – Lucio Dec 30 '12 at 16:56
add comment
1 Answer
First, make sure that your restating your session. Either by closing the terminal window, or logging completely out and back in.
Next make sure your actually modifying the PATH with echo $PATH
If you are not aldin (or really even if you are) make sure you have permissions to see that directory and the executable file.
Finally make sure the command your trying to run is actually marked with the execute permission. Something like chmod a+x /home/aldin/mybin/fasta-35.4.12/bin/file.sh should work.
Also your modifying the PATH in a very dangerous way. Instead try:
NEVER (sometimes I wish there was a "super bold") modify the $PATH the way you are, always reference the current $PATH in there somewhere.
share|improve this answer
Gilles is also correct if your not running bash .bashrc won't do much good. – coteyr Dec 30 '12 at 16:45
Aldo is modifying .bashrc, not .profile, so he doesn't need to log out and back in, only start a new terminal. The permissions on the files are ok, otherwise he woulnd't be able to execute the command with the full path. – Gilles Dec 30 '12 at 16:52
@Gilles "logging in and out of your session".. may have been poorly phrased, but the point is, a new session is needed, either by closing and opening terminal, running bash by hand, or some other way. I will edit the answer. -- leaving log out and back in instead of assuming X. – coteyr Dec 30 '12 at 17:03
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/22375 | Take the 2-minute tour ×
I tried Boot-Repair with different options, and each time I get error: file not found.
First time I selected sda3 as a separate EFI partition (which is correct) here's the configuration http://paste.ubuntu.com/1493581/
Second time selected sda1 (Backup EFI partition), here's the configuration http://paste.ubuntu.com/1499490/
share|improve this question
Did you also changed your drive to GPT? – Uri Herrera Jan 5 '13 at 17:18
Can you see the GRUB menu? if yes, can you boot Windows from it? – LovinBuntu Jan 6 '13 at 14:57
add comment
Your Answer
Browse other questions tagged or ask your own question. |
global_01_local_0_shard_00000017_processed.jsonl/22376 | Take the 2-minute tour ×
How do I limit the updates that are installed to those from a specific set of repositories? Is this at all possible?
share|improve this question
Do you want to be able to specify repo during runtime, or should be it be more a static thing? The two answers below assume the latter option. – Tshepang Feb 21 '11 at 12:50
Ideally it would be during runtime. The static option is sufficient though. – Ton van den Heuvel Feb 22 '11 at 8:11
add comment
4 Answers
up vote 13 down vote accepted
You can specify a repository with -t option. As an example, I have added the following repository to /etc/apt/sources.list to install Iceweasel latest release:
As you know there is a same package iceweasel in the official Debian repository. If I want install Iceweasel from this specific repo I run:
apt-get install -t squeeze-backports iceweasel
from apt-get manual page:
This option controls the default input to the policy engine, it creates a default pin at priority 990 using the specified
the value of this option. In short, this option lets you have simple control over which distribution packages will be retrieved
from. Some common examples might be -t '2.1*', -t unstable or -t sid. Configuration Item: APT::Default-Release; see also the
apt_preferences(5) manual page.
I think this is a better solution,
share|improve this answer
As you see in the apt-get manual, -t specify release not repository name. There is no repository name in Ubuntu (unlike RedHat based linux such as RHEL,Fedora,CentOS, ...) – SuB Sep 20 '13 at 17:31
@SuB Yes, you're right! I confused repository name with release! – cartoonist Sep 21 '13 at 15:19
add comment
A gui based alternative would be to open software centre and select edit > software sources...
Software Sources with Ubuntu software tab selected
Software Sources with other software tab selected
all you need to do is un-tick the repositories you don't want updates from.
Hope this helps
share|improve this answer
add comment
Obvious choice is to modify /etc/apt/sources.list and comment out all other repositories, and then run
apt-get update && apt-get upgrade && apt-get autoclean
And then remove comments from sources.list. Maybe not the best way, but at least apt-get man pages do not specify any way to do that.
On related note, for example Ubuntu distribution upgrade process disables all 3rd party repositories during upgrade (and do not just run some option to exclude those temporarily).
share|improve this answer
add comment
You can disable automatic updates from certain repositories without entirely removing them via apt policies:
To disable automatic updates from repository repo, add add a file /etc/apt/preferences.d/repo with the following content:
Package: *
Pin: release n=repo
Pin-Priority: 50
Which will give all packages from this repository a lower priority than already installed packages (which have 100).
For more information man apt_preferences or check the Ubuntu Community Wiki.
share|improve this answer
It’s a shame the only apt_preferences answer is the last... – Robert Siemer Jan 25 at 9:22
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/22377 | Take the 2-minute tour ×
With fglrx, I get a small square in the bottom right that says AMD Unsupported hardware. I was wondering how one would install the open-source driver, since I can't find it in the Software Center by searching Radeon or ATI. Help would be much appreciated.
share|improve this question
You are probably using it right now. Put this into terminal "sudo lshw -c video" and in the output look for the line that starts with "configuration:". If it says that "driver=radeon" you are using open source driver ;) – Tanel Mae Jul 27 '13 at 5:13
add comment
Your Answer
Browse other questions tagged or ask your own question. |
global_01_local_0_shard_00000017_processed.jsonl/22378 | Take the 2-minute tour ×
I installed xubuntu-desktop over lubuntu-desktop in ubuntu oneiric. Now: 1) It's not possible to log into xubuntu - after entering name and password it just loops back to the login screen. 2) After a Gnome login no panels appear, making it rather difficult to do what I wanted to do in Gnome (namely remove the lubuntu install to see if that made xubuntu usable) 3) Attempting to remove the xubuntu install from LXDE (with the code from psychocats) results in this output:
requested an impossible situation or if you are using the unstable
distribution that some required packages have not yet been created
or been moved out of Incoming.
The following information may help to resolve the situation:
The following packages have unmet dependencies:
autoconf : Depends: m4 (>= 1.4.13) but it is not going to be installed
I've asked about the first problem on the ubuntu forum, where someone else has also reported it, without any reply so far. Needless to say, this is a very frustrating situation...
share|improve this question
Did you update your repositories first ? sudo apt-get update ? Did you put any packages on hold ? – bodhi.zazen Dec 18 '11 at 3:32
Thanks - I'd updated the system with update manager earlier. I haven't put any packages on hold deliberately (& indeed I didn't putting packages on hold was possible until reading your comment...) – onebir Dec 18 '11 at 11:20
I've got a suspicion xubuntu's failure to load is to do with display managers (ie ubuntu uses lightDM, lubuntu uses LXDM & doubtless xubuntu uses something else). But I have no idea how to fix this. – onebir Dec 18 '11 at 15:55
I'm having the same problem. I don't know why this was closed as too localized. – DLH Dec 28 '11 at 23:58
add comment
closed as too localized by Marco Ceppi Dec 19 '11 at 18:57
1 Answer
I ended up reinstalling... details here.
share|improve this answer
Welcome to Ask Ubuntu! Whilst this may theoretically answer the question, it would be preferable to include the essential parts of the answer here, and provide the link for reference. – Marco Ceppi Dec 19 '11 at 18:56
add comment
|
global_01_local_0_shard_00000017_processed.jsonl/22397 |
Shown Here:
Introduced in House (06/16/2010)
Debt Buy-Down Act - Amends the Internal Revenue Code to allow individual taxpayers to designate up to 10% of their adjusted income tax liability for the reduction of the public debt.
Establishes in the Treasury the Public Debt Reduction Trust Fund to hold tax revenues generated by this Act for the reduction of the public debt.
Amends the Balanced Budget and Emergency Deficit Control Act of 1985 to require a sequestration of federal spending equivalent to the estimated aggregate amount designated by taxpayers under this Act to reduce the public debt. Prohibits any reduction in social security retirement benefits, veterans benefits, or interest payments on federal debt as a result of any such sequestration. |
global_01_local_0_shard_00000017_processed.jsonl/22398 |
Shown Here:
Introduced in House (10/27/2011)
Amends the Internal Revenue Code to disallow the refundable portion of the child tax credit to taxpayers who use individual taxpayer identification numbers (ITINs) issued by the Internal Revenue Service (IRS) instead of social security account numbers to claim such credit on their tax returns. |
global_01_local_0_shard_00000017_processed.jsonl/22400 | Take the 2-minute tour ×
I am 1,85m tall, have shoes sized 58-59 (European) and have classic non sloped frame with seat tube 55cm. Problem is that my feet land with their middle on the pedals, not with the front part where the toes are.
I will try to move seat more to the back, but other than that, is it possible to look for different geometry on the frame, or are almost all frames the same in that respect?
share|improve this question
I would like to thank all for useful answers, and clarify some points. First, the frame is probably to small and for my next bike I would go with larger. But as it is now, my seat is raised enough so my legs are fully extended. So I am not sure that just larger frame would solve problem of my feet, since the distance from hip to the toe would remain the same. Maybe smaller seat tube angle. Are there seats with extra long rails available? – Davorin Ruševljan Nov 23 '12 at 8:58
Regarding seats with long rails, the longest I've found are Selle An-Atomicas. I have one and the usable portion of the rails (on which you can secure a clamp) is almost 10cm, as opposed to 6-7 on other saddles: selleanatomica.com – Zippy The Pinhead Nov 24 '12 at 20:53
add comment
6 Answers
up vote 2 down vote accepted
You could always add some toe clips to your pedals they will keep your feet positioned on the pedals better. Clipless pedals - like Shimano SPD or Crank Bros Egg Beaters - work great too, but they do require special shoes with cleats on them.
share|improve this answer
The thing is if I move my feet backwards I feel uncomfortable. – Davorin Ruševljan Nov 21 '12 at 17:52
This was why I said that clipless might be the answer, because they essentially turn your entire shoe into a pedal platform. However, I would bet that your frame is too small for you. I'm the same height as you and I feel very comfortable on a 58cm frame. If you decide to look for a new frame you might want to consider something with a more slack geometry. I.E. Has a head tube angle of < 70 degrees. Also the a less vertical down tube angle will move the bottom bracket and thus your feet further forward, relative to your hips. Slack geometry = better stability. Maybe this would work... – Wadelp Nov 22 '12 at 6:50
add comment
If I understand the problem correctly, it sounds like you're sitting too far forward on this bike. Whether you're too tall for your frame or not is difficult to diagnose without at least pictures, but you might consider that this bike is simply too small for you. (If you're having trouble getting the handlebars far enough forward, that's a sign that this could be the case.) Are you able to get the saddle high enough so your knees are locked with the heel of your foot on the pedal?
You might also consider simply moving your saddle back on the rails. That might give you a little more room.
I'd also repeat Wadelp's suggestion - toe clips will help you keep your feet correctly positioned on the pedals.
share|improve this answer
It's also possible to get offset seat posts that shift the seat back, however you can only to so much if the frames is the wrong size. – mattnz Nov 21 '12 at 21:16
add comment
Ideally, the ball of your feet (the part just below the toes), should be on the pedal to transfer power to the pedals (efficiently and bio-mechanically healthy).
This is also likely causing your knees to "flare" away from the frame (like a V). You'll want to keep your knee, toes and hip on the same vertical plane. otherwise long term could lead to knee ligament problems.
It looks like the bike is too small for you. At 185cm, I would think a 58-62cm frame is better suited depending on your leg length. see http://bicycling.about.com/od/howtoride/a/bike_sizing.htm and http://www.ebicycles.com/bicycle-tools/frame-sizer/road-bike/size-sheet?utf8=%E2%9C%93&u=in&r=man&h=1879.6&i=863.6&b=Calculate
share|improve this answer
add comment
Try an offset seat post, that will help get your seat back a little further.
Other than that, sure, a different seat tube angle would change the spatial relationship between your rear and your feet. But that angle doesn't change too much between the various road bike frames.
Perhaps shortening the effective top-tube length (forcing you more upright) might help the feeling - you can get a shorter stem, or different handlebars.
It begs the question - why do you care where your feet hit? If the current scenario is comfortable, then why change it? Unicyclists (mountain at least) ride with the pedal just in front of their heel.
Given your shoe size (58-59), I can imagine your feet are hitting the front wheel when you turn sharply - so maybe that's the reason... On some bikes I have that problem, and I wear only 48.
More drastic changes could be switching seat types, like a banana seat (yes, you might look silly). Or switching bicycle styles, say to a recumbent.
But, really, if the change doesn't "feel" right, have you tried it for an extended period of time? I'm thinking a couple hours (cumulative) - to get past the initial reaction. Maybe you've just been riding mid-foot so long it will take a while to change what feels comfortable.
share|improve this answer
ups, I have mistyped my shoe size, I am 48-49, so my feets are similar to yours. As why I am asking, I have read that one should pedal witrh the top part of the feat, and if I try to move backwards on the edge of the seat, it does feel better in deed. Thanks! – Davorin Ruševljan Nov 24 '12 at 23:36
add comment
You may want to try this online fit computer. It does require several measurements, but the results are generally pretty good.
Regarding changing the geometry, you can sometimes make a small bike work, but it will never be as good as a properly-sized bike. I know someone who rides a too-small Colnago because he's so attached to it. He has a 120mm stem (maybe longer, can't recall), and his seat is as far back as possible. He's around 1.83m tall, and his bike is a 54 or 55 (can't recall). He was commuting on the bike, around 200 miles (322 km)/week. But just because it works for him doesn't mean it will work for you. It depends on your geometry, too. Long legs, short arms would be worse on a too-small bike than short legs, long arms on the same bike, because you need a certain amount of leg extension to pedal efficiently.
share|improve this answer
add comment
What type of pedal are you using? You're a relatively tall guy for a 55 cm bike. You're almost my height, I think you would be much more comfortable on a frame that's closer to 59 cm.
share|improve this answer
mtb kind - platform – Davorin Ruševljan Nov 21 '12 at 17:14
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/22401 | Take the 2-minute tour ×
I am doing a project on expression of GFAP in the zebrafish retina. GFAP is a marker for glial cells. I have found that the glial cells are more abundant the closer they are to the optic nerve at the middle of the eye. This may just be because the cells are more tightly compacted here than at the edges of the eye... But I am wondering if it may have something to do with the glial cells being involved with neuornal processes, and the optic nerve being the transmitter of signals from the eye to the brain?
share|improve this question
add comment
2 Answers
Any particular glial cell you're noticing this with?
I know that Astrocytes modify Calcium concentrations in the synaptic cleft. Perhaps at places where there are more synapses, more Astrocytes must exist to regulate such thing? Here's an interesting paper on a possible role of Astrocytes on associative networks:
share|improve this answer
add comment
Glia serve the classic support role in the retina, similar to that served by neuroglia elsewhere in the CNS. That role mostly consists of taking used neurotransmitters and recycling them such as in the glutamate-glutamine cycle. As Preece suggested, glial cells are a heterogenous group, and with a general marker like GFAP you could very well be observing two different types of glial cell, one with a uniform presentation and one specifically in the central retina.
That being said, the most familiar type of glial cell in the retina is the Muller glial cell. It is particularly interesting in zebrafish, where it has been shown to act as a neural progenitor cell upon tissue damage in adult animals As you can see from that article, it fits your requirement of being GFAP expressing, although I couldn't find any good flat mount pictures showing whether it was preferentially expressed in the central retina.
So that gives us two potential roles for glial cells in the zebrafish: as potential multipotent retinal stem cells and as housekeeping neurons present to clean things up. You could come up with reasons either of those might be important in the central retina, but for my money the arguments are all pretty hypothetical: "the central retina is more active and therefore has a higher requirement for removing neurotransmitter" or "the central retina needs to be protected from potential damage more than the peripheral".
One thing I think we have a good basis to rule out is that it's the optic nerve. From a retinal point of view, you refer to the point where the optic nerve passes through the rest of the retina as the optic nerve head or optic disc. Axons from ganglion cells all across the retina stretch out from their soma toward this single point. By the time they reach the optic nerve, the vast majority of axons are far from their axon hillock. That means that they're being propagated from one node of Ranvier to the next. Because that process requires voltage gated ion and not neurotransmitter gated channels, there is no neurotransmitter release associated with that process and consequently no additional reason for glial cells to be present to clean up.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/22440 | National Security Agency
From Wikipedia, the free encyclopedia - View original article
National Security Agency
— NSA —
National Security Agency.svg
Seal of the National Security Agency
Flag of the United States National Security Agency.svg
Flag of the National Security Agency
Agency overview
FormedNovember 4, 1952 (1952-11-04) (61 years ago)
Preceding AgencyArmed Forces Security Agency
HeadquartersFort Meade, Maryland, U.S.
EmployeesClassified (30,000-40,000 estimate)[1][2][3][4]
Annual budgetClassified ($10.8 billion, as of 2013)[5][6]
Agency executivesGeneral Keith B. Alexander, U.S. Army, Director of the National Security Agency
John C. Inglis, Deputy Director of the National Security Agency
Parent agencyUnited States Department of Defense
(Redirected from Nsa)
Jump to: navigation, search
National Security Agency
— NSA —
National Security Agency.svg
Seal of the National Security Agency
Flag of the United States National Security Agency.svg
Flag of the National Security Agency
Agency overview
Preceding AgencyArmed Forces Security Agency
HeadquartersFort Meade, Maryland, U.S.
John C. Inglis, Deputy Director of the National Security Agency
Parent agencyUnited States Department of Defense
The National Security Agency (NSA) is the main producer and manager of signals intelligence for the United States. Estimated to be one of the largest of U.S. intelligence organizations in terms of personnel and budget,[5][7] the NSA operates under the jurisdiction of the Department of Defense and reports to the Director of National Intelligence.
The NSA is tasked with the global monitoring, collection, decoding, translation and analysis of information and data for foreign intelligence and counterintelligence purposes, including surveillance of targeted individuals on U.S. soil. The agency is authorized to accomplish its mission through clandestine means,[8] among which are bugging electronic systems[9] and allegedly engaging in sabotage through subversive software.[10][11] The NSA is also responsible for the protection of U.S. government communications and information systems.[12] As part of the growing practice of mass surveillance in the United States, the NSA collects and stores all phone records of all American citizens.[13]
Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, the NSA has no authority to conduct human-source intelligence gathering, although it is often portrayed so in popular culture. Instead, the NSA is entrusted with coordination and deconfliction of SIGINT components of otherwise non-SIGINT government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[14]
Army Predecessor[edit]
The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section and known as MI-8. It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army's organizational chart several times. It absorbed the navy's cryptanalysis functions in July 1918. World War I ended November 11, 1918, and MI-8 moved to New York City May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Herbert O. Yardley.[15]
Black Chamber[edit]
The Western Union Company allowed U.S. government officials to monitor telegraphic communications passing through the company's wires[16]
MI-8,[17] nicknamed the Cipher Bureau, was also called the Black Chamber. It was very secret. Headed by cryptologist Herbert Yardley, the Black Chamber was located on Manhattan’s East 37th Street. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber successfully persuaded Western Union, the largest U.S. telegram company at that time, to allow government officials to monitor the private communications passing through the company’s wires.[18]
Despite the American Black Chamber's initial success, however, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating that "Gentlemen do not read each other's mail".[20]
World War II and its aftermath[edit]
During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[21] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[21]
On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[21] This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[22] The AFSA was to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[22] However, the AFSA failed to achieve a centralized communications intelligence mechanism, and failed to coordinate with civilian agencies that shared its interests (the Department of State, CIA, and FBI).[22]
In December 1951, President Harry S. Truman ordered a study to correct AFSA's failures. Six months later, the four members finished and issued the Brownell Report, which criticized AFSA, strengthened it and resulted in its redesignation as the National Security Agency.[23] The agency was formally established by Truman in a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9.[24]
Since President Truman's memo was a classified document,[24] the existence of the NSA was not known to the public at that time. In recognition of its ultra-secrety, the NSA was known in the U.S. intelligence community as "No Such Agency".[25]
Vietnam War[edit]
In the 1960s, the NSA played a key role in expanding America's commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USS Maddox during the Gulf of Tonkin incident.[26]
A secret operation code-named "MINARET" was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders including Dr. Martin Luther King, and prominent U.S. journalists and athletes who criticized the Vietnam War.[27] However the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was "disreputable if not outright illegal."[27]
Church Committee hearings[edit]
In the aftermath of the Watergate Scandal, a congressional hearing led by Sen. Frank Church [28] revealed that the NSA, in collaboration with Britain’s intelligence agency GCHQ, had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[29] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of Federal Bureau of Investigation (FBI), Central Intelligence Agency (CIA), and NSA facilities.[30] Senator Frank Church uncovered previously unknown activity,[30] such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[31] The investigation also uncovered NSA's wiretaps on targeted American citizens.[32]
After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed into law. This was designed to limit the practice of mass surveillance in the United States was to be carried out.[30]
In 1999, a multi-year investigation by the European Parliament highlighted the NSA's role in economic espionage in a report entitled 'Development of Surveillance Technology and Risk of Abuse of Economic Information'.[33] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[34] The memorial is a "tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology".[34] NSA employees must be retired for more than fifteen years to qualify for the memorial.[34]
War on Terror[edit]
In the aftermath of the September 11 attacks on the World Trade Center, the NSA created new IT systems to deal with the flood of information from new technologies like the internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a 'privacy mechanism'; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread's privacy system.[36]
Trailblazer Project was ramped up circa 2000. SAIC, Boeing, CSC, IBM, and Litton worked on it. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled circa 2003-4; it was late, over budget, and didn't do what it was supposed to do. The Baltimore Sun ran articles about this in 2006–07. The government then raided the whistleblowers' houses. One of them, Thomas Drake, was charged with violating 18 U.S.C. § 793(e) in 2010 in an unusual use of espionage law. He and his defenders claim that he was actually being persecuted for challenging the Trailblazer Project. In 2011, all 10 original charges against Drake were dropped.[37][38]
Turbulence started circa 2005. It was developed in small, inexpensive 'test' pieces rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[38] It was to be a realization of information processing at higher speeds in cyberspace.[39]
Global surveillance disclosures[edit]
The massive extent of the NSA's spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of these were leaked by an ex-contractor, Edward Snowden.
Scope of surveillance[edit]
It was revealed that the NSA intercepts telephone and internet communications of over a billion people worldwide, seeking information on terrorism as well as foreign politics, economics[40] and "commercial secrets".[41] A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[42] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[43][44]
The NSA reportedly has access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk,[45] and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.[46] It has also managed to weaken much of the encryption used on the Internet (by collaborating with, coercing or otherwise infiltrating numerous technology companies), so that the majority of Internet privacy is now vulnerable to the NSA and other attackers.[47][48]
Domestically, the NSA collects metadata of the phone calls of over 120 million US Verizon subscribers[49] as well as internet communications,[45] relying on a secret interpretation of the Patriot Act whereby the entirety of US communications may be considered "relevant" to a terrorism investigation if it is expected that even a tiny minority may relate to terrorism.[50] The NSA supplies domestic intercepts to the DEA, IRS and other law enforcement agencies, who use these to intitiate criminal investigations against US citizens. Federal agents are then instructed to "recreate" the investigative trail in order to "cover up" where the information originated.[51]
Legal accountability[edit]
Despite President Obama's claims that these programs have congressional oversight, members of Congress were unaware of the existence of these NSA programs or the secret interpretation of the Patriot Act, and have consistently been denied access to basic information about them.[53] Obama has also claimed that there are legal checks in place to prevent inappropriate access of data and that there have been no examples of abuse;[54] however, the secret FISC court charged with regulating the NSA's activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.[55] It has since been reported that the NSA violated its own rules on data access thousands of times a year, many of these violations involving large-scale data interceptions;[56] and that NSA officers have even used data intercepts to spy on love interests.[57] The NSA has "generally disregarded the special rules for disseminating United States person information" by illegally sharing its intercepts with other law enforcement agencies.[58] A March 2009 opinion of the FISC court, released by court order, states that protocols restricting data queries had been "so frequently and systemically violated that it can be fairly said that this critical element of the overall ... regime has never functioned effectively."[59][60] In 2011 the same court noted that the "volume and nature" of the NSA's bulk foreign internet intercepts was "fundamentally different from what the court had been led to believe".[58] Email contact lists (including those of US citizens) are collected at numerous foreign locations to work around the illegality of doing so on US soil.[46]
Official responses[edit]
Numerous conflicting stories have been put forward by the Obama administration in response to new revelations in the media.[54] On March 20, 2013 the Director of National Intelligence, Admiral James Clapper testified before Congress that the NSA doesn't wittingly collect any kind of data on millions or hundreds of millions of Americans, but he retracted this in June after details of the PRISM program were published, and stated instead that meta-data of phone and internet traffic are collected, but no actual message contents.[61] This was corroborated by NSA Director, General Keith Alexander, before it was revealed that the XKeyscore program collects the contents of millions of emails from US citizens without warrant, as well as "nearly everything a user does on the Internet". Alexander later admitted that "content" is collected, but stated that it is simply stored and never analyzed or searched unless there is "a nexus to al-Qaida or other terrorist groups".[54]
Regarding the necessity of these NSA programs, Gen. Alexander stated on June 27 that the NSA's bulk phone and Internet intercepts had been instrumental in preventing 54 terrorist "events", including 13 in the US, and in all but one of these cases had provided the initial tip to "unravel the threat stream".[62] On July 31 NSA Deputy Director John Inglis conceded to the Senate that these intercepts had not been vital in stopping any terrorist attacks, but were "close" to vital in identifying and convicting four San Diego men for sending US$8,930 to Al-Shabaab, a militia that conducts terrorism in Somalia.[63][64][65]
Organizational structure[edit]
Keith B. Alexander, the current director of the National Security Agency
Current structure[edit]
Currently, NSA has about a dozen directorates, which are designated by a letter, although not all of them are known. The directorates are divided in divisions and units, which have a designation which starts with the letter of the parent directorate, followed by a number for the division, the sub-unit or a sub-sub-unit. New information about NSA units was revealed in top secret documents leaked by Edward Snowden since June 2013.
The main elements of the current organizational structure of the NSA are:[71]
After president George W. Bush initiated the President's Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), which had to analyze content, internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[79]
There's also an office of Information Sharing Services (ISS), lead by a chief and a deputy chief.[80]
Watch centers[edit]
The NSA maintains at least two watch centers:
The number of NSA employees is officially classified[3] but there are a number of sources providing estimates. In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA's budget and workforce were cut by one third, which led to a substantial loss of experience.[83]
In 2012, the NSA said more than 30,000 employees work at Ft. Meade and other facilities.[1] In 2012 John C. Inglis, the deputy director, said that the total number of NSA employees is "somewhere between 37,000 and one billion" as a joke,[3] and stated that the agency is "probably the biggest employer of introverts."[3] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[4] More widely, it has been described as the world's largest single employer of mathematicians.[84] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.
As of 2013 about 1,000 system administrators work for the NSA.[85] Edward Snowden's leaking of PRISM in 2013 caused the NSA to institute a "two-man rule" where two system administrators are required to be present when one accesses certain sensitive information.[85]
NSA polygraph brochure
The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[86] As part of the latter, historically EPQs or "embarrassing personal questions" about sexual behavior had been included in the NSA polygraph.[86] The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts aperiodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive "termination of employment", according to a 1982 memorandum from the director of the NSA.[87]
NSA-produced video on the polygraph process
There are also "special access examination" polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[87] NSA's brochure states that the average test length is between two and four hours.[88] A 1983 report of the Office of Technology Assessment stated that "It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions."[89] Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[86]
In 2010 the NSA produced a video explaining its polygraph process.[90] The video, ten minutes long, is titled "The Truth About the Polygraph" and was posted to the website of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays "various applicants, or actors playing them -- it’s not clear -- describing everything bad they had heard about the test, the implication being that none of it is true."[91] argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[90] George Maschke, the founder of the website, accused the NSA polygraph video of being "Orwellian".[91]
Insignia and memorials[edit]
National Security Agency.svg
The heraldic insignia of NSA consists of an eagle inside a circle, grasping a key in its talons.[92] The eagle represents the agency's national mission.[92] Its breast features a shield with bands of red and white, taken from the Great Seal of the United States and representing Congress.[92] The key is taken from the emblem of Saint Peter and represents security.[92]
When the NSA was created, the agency had no emblem and used that of the Department of Defense.[93] The agency adopted its first of two emblems in 1963.[93] The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the agency.[94]
The NSA's flag consists of the agency's seal on a light blue background.
National Cryptologic Memorial
Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.[95] The USS Liberty incident in 1967 and USS Pueblo incident in 1968 are examples of the losses endured during the Cold War.[95]
The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions.[96] It is made of black granite, and has 171 names (as of 2013) carved into it.[96] It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.[96]
Headquarters for the National Security Agency is located at 39°6′32″N 76°46′17″W / 39.10889°N 76.77139°W / 39.10889; -76.77139 in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Ft. Meade is about 20 mi (32 km) southwest of Baltimore,[97] and 25 mi (40 km) northeast of Washington, DC.[98] The NSA has its own exit off Maryland Route 295 South labeled "NSA Employees Only".[99][100] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[101] NSA is the largest employer in the U.S. state of Maryland, and two-thirds of its personnel work at Ft. Meade.[102] Built on 350 acres (140 ha; 0.55 sq mi)[103] of Ft. Meade's 5,000 acres (2,000 ha; 7.8 sq mi),[104] the site has 1,300 buildings and an estimated 18,000 parking spaces.[98][105]
The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as "a modern boxy structure" that appears similar to "any stylish office building."[106] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[106] It contains 3,000,000 square feet (280,000 m2), or more than 68 acres (28 ha), of floor space; Bamford said that the U.S. Capitol "could easily fit inside it four times over."[106]
The facility has over 100 watchposts,[107] one of them being the visitor control center, a two-story area that serves as the entrance.[106] At the entrance, a white pentagonal structure,[108] visitor badges are issued to visitors and security clearances of employees are checked.[109] The visitor center includes a painting of the NSA seal.[108] The OPS2A building, the tallest building in the NSA complex and the location of much of the agency's operations directorate, is accessible from the visitor center. Bamford described it as a "dark glass Rubik's Cube".[110] The facility's "red corridor" houses non-security operations such as concessions and the drug store. The name refers to the "red badge" which is worn by someone without a security clearance. The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.[108] NSA headquarters has its own post office, fire department, and police force.[111][112][113]
Power consumption[edit]
Due to massive amounts of data processing, NSA is the largest electricity consumer in Maryland.[102]
Baltimore Gas & Electric (BGE, now Constellation Energy) provided NSA with 65 to 75 megawatts at Ft. Meade in 2007, and expected that an increase of 10 to 15 megawatts would be needed later that year.[116] In 2011, NSA at Ft. Meade was Maryland's largest consumer of power.[102] In 2007, as BGE's largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.[115]
One estimate put the potential for power consumption by the new Utah Data Center at $40 million per year.[117]
History of headquarters[edit]
Headquarters at Fort Meade circa 1950s
When the agency was established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C.. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army's cryptographic operations.[118] Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[119]
Construction of additional buildings began after the agency occupied buildings at Ft. Meade in the late 1950s, which they soon outgrew.[119] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the "Headquarters Building" and since the NSA management occupied the top floor, workers used "Ninth Floor" to refer to their leaders.[120] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[119] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[121] The four NSA buildings became known as the "Big Four."[121] The NSA director moved to 2B when it opened.[121]
NSA held a groundbreaking ceremony at Ft. Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.[123] Called Site M, the center has a 150 megawatt power substation, 14 administrative buildings and 10 parking garages.[111] It cost $3.2 billion and covers 227 acres (92 ha; 0.355 sq mi).[111] The center is 1,800,000 square feet (17 ha; 0.065 sq mi)[111] and initially uses 60 megawatts of electricity.[124]
Increments II and III are expected to be completed by 2030, and would quadruple the space, covering 5,800,000 square feet (54 ha; 0.21 sq mi) with 60 buildings and 40 parking garages.[111] Defense contractors are also establishing or expanding cybersecurity facilities near the NSA and around the Washington metropolitan area.[111]
Other U.S. facilities[edit]
Buckley Air Force Base in Colorado
Utah Data Center
As of 2012, NSA collected intelligence from four geostationary satellites.[117] Satellite receivers were at Roaring Creek station in Catawissa, Pennsylvania and Salt Creek in Arbuckle, California.[117] It operated ten to twenty taps on U.S. telecom switches. NSA had installations in several U.S. states and from them observed intercepts from Europe, the Middle East, North Africa, Latin America, and Asia.[117]
NSA had facilities at Friendship Annex (FANX) in Linthicum, Maryland, which is a 20 to 25-minute drive from Ft. Meade;[125] the Aerospace Data Facility at Buckley Air Force Base in Aurora outside Denver, Colorado; NSA Texas in the Texas Cryptology Center at Lackland Air Force Base in San Antonio, Texas; NSA Georgia at Fort Gordon in Augusta, Georgia; NSA Hawaii in Honolulu; the Multiprogram Research Facility in Oak Ridge, Tennessee, and elsewhere.[114][117]
On January 6, 2011 a groundbreaking ceremony was held to begin construction on NSA's first Comprehensive National Cyber-security Initiative (CNCI) Data Center, known as the "Utah Data Center" for short. The $1.5B data center is being built at Camp Williams, Utah, located 25 miles (40 km) south of Salt Lake City, and will help support the agency's National Cyber-security Initiative.[126] It is expected to be operational by September 2013.[117]
In 2009, to protect its assets and to access more electricity, NSA sought to decentralize and expand its existing facilities in Ft. Meade and Menwith Hill,[127] the latter expansion expected to be completed by 2015.[128]
The Yakima Herald-Republic cited Bamford, saying that many of NSA's bases for its Echelon program were a legacy system, using outdated, 1990s technology.[129] In 2004, NSA closed its operations at Bad Aibling Station (Field Station 81) in Bad Aibling, Germany.[130] In 2012, NSA began to move some of its operations at Yakima Research Station, Yakima Training Center, in Washington state to Colorado, planning to leave Yakima closed.[131] As of 2013, NSA also intended to close operations at Sugar Grove, West Virginia.[129]
RAF Menwith Hill has the largest NSA presence in the United Kingdom.[128]
International stations[edit]
Following the signing in 1946–1956[132] of the UKUSA Agreement between the United States, United Kingdom, Canada, Australia and New Zealand, who then cooperated on signals intelligence and Echelon,[133] NSA stations were built at GCHQ Bude in Morwenstow, United Kingdom; Geraldton, Pine Gap and Shoal Bay, Australia; Leitrim and Ottawa, Canada; Misawa, Japan; and Waihopai and Tangimoana,[134] New Zealand.[135]
NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.[136] Planned in 1954, and opened in 1960, the base covered 562 acres (227 ha; 0.878 sq mi) as of 1999.[137]
The agency's European Cryptologic Center (ECC), with 240 employees in 2011, is headquartered at a US military compound in Griesheim, near Frankfurt in Germany. A 2011 NSA report indicates that the ECC is responsible for the "largest analysis and productivity in Europe" and focusses on various priorities, including Africa, Europe, the Middle East and counterterrorism operations.[138]
In 2013, a new Consolidated Intelligence Center, also to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany.[139] NSA's partnership with Bundesnachrichtendienst (BND), the German foreign intelligence service, was confirmed by BND president Gerhard Schindler.[139]
Echelon was created in the incubator of the Cold War.[143] Today it is a legacy system, and several NSA stations are closing.[129]
NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia (Defence Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group,[144] was reported to be in command of the operation of the so-called Echelon system. Its capabilities were suspected to include the ability to monitor a large proportion of the world's transmitted civilian telephone, fax and data traffic.[145]
During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill.[146] Investigative journalist Duncan Campbell reported in 1988 on the Echelon surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[147] In November 3, 1999 the BBC reported that they had confirmation from the Australian Government of the existence of a powerful "global spying network" code-named Echelon, that could "eavesdrop on every single phone call, fax or e-mail, anywhere on the planet" with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was "linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland".[148]
Data mining[edit]
Protesters against NSA data mining in Berlin wearing Bradley Manning and Edward Snowden masks.
NSA is reported to use its computing capability to analyze "transactional" data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic emails and Internet searches as well as bank transfers, credit-card transactions and travel and telephone records, according to current and former intelligence officials interviewed by The Wall Street Journal.[151] Reportedly, the majority of emails in or out of the USA are captured at "selected communications links" and automatically analyzed for keywords or other "selectors".[152]
The NSA began the PRISM electronic surveillance and data mining program in 2007.[153][154] PRISM gathers communications data on foreign targets from nine major U.S. internet-based communication service providers: Microsoft,[155] Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, video and voice chat, videos, photos, VoIP chats such as Skype, and file transfers. Another program, Boundless Informant, employs big data databases, cloud computing technology, and Free and Open Source Software (FOSS) to analyze data collected worldwide by the NSA, including that gathered by way of the PRISM program.[156]
The Real Time Regional Gateway was a data collection program introduced in 2005 in Iraq by NSA during the Iraq War. It consisted of gathering all Iraqi electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[157] Glenn Greenwald of The Guardian believes that the "collect it all" strategy introduced by NSA director Alexander shows that "the NSA's goal is to collect, monitor and store every telephone and internet communication" worldwide.[158]
In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of encryption standards that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO).[159] This memo appears to give credence to previous speculation by cryptographers at Microsoft Research.[160]
Domestic activity[edit]
Polls conducted in June 2013 found divided results among Americans regarding NSA's secret data collection.[166] Rasmussen Reports found that 59% of Americans disapprove,[167] Gallup found that 53% disapprove,[168] and Pew found that 56% are in favor of NSA data collection.[169]
Warrantless wiretaps under George W. Bush[edit]
In September 2008, the Electronic Frontier Foundation (EFF) filed a class action lawsuit against the NSA and several high-ranking officials of the Bush administration,[175] charging an "illegal and unconstitutional program of dragnet communications surveillance,"[176] based on documentation provided by former AT&T technician Mark Klein.[177]
AT&T Internet monitoring[edit]
Domestic surveillance under Barack Obama[edit]
In 2009 the NSA intercepted the communications of American citizens, including a Congressman, although the Justice Department believed that the interception was unintentional. The Justice Department then took action to correct the issues and bring it into compliance with existing laws.[179] United States Attorney General Eric Holder resumed the wiretapping according to his understanding of the Foreign Intelligence Surveillance Act amendment of 2008, without explaining what had occurred.[180]
On April 25, 2013, the NSA obtained a court order requiring Verizon's Business Network Services to provide information on all calls in its system to the NSA "on an ongoing daily basis", as reported by The Guardian on June 6, 2013. This information includes "the numbers of both parties on a call ... location data, call duration, unique identifiers, and the time and duration of all calls" but not "[t]he contents of the conversation itself".[181][182]
International activity[edit]
Edward Snowden revealed in June 2013 that between 8 February and 8 March 2013 NSA collected about 124.8 billion telephone data items and 97.1 billion computer data items throughout the world, including in Germany, United Kingdom and France. NSA made 70.3 million recordings of French citizens' telephone data from 10 December 2012 to 8 January 2013.[183]
Role in scientific research and development[edit]
Data Encryption Standard[edit]
FROSTBURG was the NSA's first supercomputer, used from 1991–97.
Clipper chip[edit]
Because of concerns that widespread use of strong cryptography would hamper government use of wiretaps, NSA proposed the concept of key escrow in 1993 and introduced the Clipper chip that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials.[188] The proposal was strongly opposed and key escrow requirements ultimately went nowhere.[189] However, NSA's Fortezza hardware-based encryption cards, created for the Clipper project, are still used within government, and NSA ultimately declassified and published the design of the Skipjack cipher used on the cards.[190][191]
Advanced Encryption Standard[edit]
The involvement of NSA in the selection of a successor to DES, the Advanced Encryption Standard (AES), was limited to hardware performance testing (see AES competition).[192] NSA has subsequently certified AES for protection of classified information (for at most two levels, e.g. SECRET information in an unclassified environment) when used in NSA-approved systems.[193]
A new hash standard, SHA-3, has recently been selected through the competition concluded October 2, 2012 with the selection of Keccak as the algorithm. The process to select SHA-3 was similar to the one held in choosing the AES, but some doubts have been cast over it,[195][196] since fundamental modifications have been made to Keccac in order to turn it into a standard.[197] These changes potentially undermine the cryptanalisis performed during the competition and reduce the security levels of the algorithm.[195]
Dual_EC_DRBG random number generator[edit]
This is now deemed to be plausible based on the fact that knowing future values of the internal state is possible if the relation between two internal elliptic curve points are known.[199] Both NIST and RSA are now officially recommending against the use of this PRNG.[200][201]
Perfect Citizen[edit]
Perfect Citizen is a program to perform vulnerability assessment by the NSA on U.S. critical infrastructure.[202][203] It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a network monitoring system named Einstein.[204][205] It is funded by the Comprehensive National Cybersecurity Initiative and thus far Raytheon has received a contract for up to $100 million for the initial stage.
Academic research[edit]
One of NSA's published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections.[209] Although no public patent exists, NSA is reported to have used a similar locating technology called trilateralization that allows real-time tracking of an individual’s location, including altitude from ground level, using data obtained from cellphone towers.[210]
NSANet is the official National Security Agency intranet.[211] It is a classified internal network,[212] and TS/SCI.[213] In 2004 it was reported to have used over twenty commercial off-the-shelf operating systems.[214] Some universities that do highly sensitive research are allowed to connect to it.[215] In 1998 it, along with NIPRNET and SIPRNET, had "significant problems with poor search capabilities, unorganized data and old information".[216]
National Computer Security Center[edit]
The DoD Computer Security Center was founded in 1981 and renamed the National Computer Security Center (NCSC) in 1985. NCSC was responsible for computer security throughout the federal government.[217] NCSC was part of NSA,[218] and during the late 1980s and the 1990s, NSA and NCSC published Trusted Computer System Evaluation Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications.[219] The Rainbow books were replaced by the Common Criteria, however, in the early 2000s.[219]
On July 18, 2013, Greenwald said that Snowden held "detailed blueprints of how the NSA does what they do", thereby sparking fresh controversy.[220]
NSA encryption systems[edit]
STU-III secure telephones on display at the National Cryptologic Museum
The NSA oversees encyption in following systems which are in use today:
See also[edit]
3. ^ a b c d "Introverted? Then NSA wants you." FCW. April 2012. Retrieved on July 1, 2013.
5. ^ a b Gellman, Barton; Greg Miller (August 29, 2013). "U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary". The Washington Post. p. 3. Retrieved August 29, 2013.
8. ^ Executive Order 13470[1] 2008 Amendments to Executive Order 12333], United States Intelligence Activities, July 30, 2008 (PDF)
9. ^ Malkin, Bonnie. NSA surveillance: US bugged EU offices. The Daily Telegraph, June 30, 2013
10. ^ Ngak, Chenda. NSA leaker Snowden claimed U.S. and Israel co-wrote Stuxnet virus, CBS, July 9, 2013
11. ^ Bamford, James. The Secret War, Wired Magazine, June 12, 2013.
13. ^ "Senators: Limit NSA snooping into US phone records". Associated Press. Retrieved 15 October 2013. ""Is it the goal of the NSA to collect the phone records of all Americans?" Udall asked at Thursday's hearing. "Yes, I believe it is in the nation's best interest to put all the phone records into a lockbox that we could search when the nation needs to do it. Yes," Alexander replied."
14. ^ Executive Order 134702008 Amendments to Executive Order 12333, United States Intelligence Activities, Section C.2, July 30, 2008
15. ^ "The National Archives, Records of the National Security Agency". Retrieved November 22, 2013.
16. ^ Hastedt, Glenn P.; Guerrier, Steven W. (2009). Spies, wiretaps, and secret operations : an encyclopedia of American espionage. Santa Barbara, Calif.: ABC-CLIO. p. 32. ISBN 1851098070.
17. ^ Yardley, Herbert O. (1931). The American black chamber. Annapolis, Md.: Naval Institute Press. ISBN 1591149894.
18. ^ James Bamford. "Building America’s secret surveillance state". Reuters. Retrieved 9 November 2013.
19. ^ "Roman Empire to the NSA: A world history of government spying". BBC. Retrieved 9 November 2013. ". Across Europe, they established departments called "black chambers" (from the French, cabinet noir) to read the letters of targeted individuals."
20. ^ Kruh, Louis (April 1988). "STIMSON, THE BLACK CHAMBER, AND THE “GENTLEMEN'S MAIL” QUOTE". Cryptologia (Taylor & Francis) 12 (2): 65–89. doi:10.1080/0161-118891862819. "In 1929, Secretary of State Henry L. Stimson withdrew State Department support from the American Black Chamber, effectively closing it. He gave as his reason, in his 1947 biography, that “Gentlemen do not read each other's mail.”"
21. ^ a b c "Army Security Agency Established, 15 September 1945". United States Army. Retrieved 9 November 2013.
22. ^ a b c Burns, Thomas L. "The Origins of the National Security Agency 1940–1952 (U)" (PDF). National Security Agency. p. 60. Retrieved August 11, 2010.
23. ^ "The Creation of NSA - Part 2 of 3: The Brownell Committee" (PDF). National Security Agency. Retrieved July 2, 2013.
24. ^ a b Truman, Harry S. "Memorandum" (PDF). National Security Agency. Retrieved July 2, 2013.
25. ^ Anne Gearan. "‘No Such Agency’ spies on the communications of the world". The Washington Post. Retrieved 9 November 2013.
26. ^ SCOTT SHANE (October 31, 2005). "Vietnam Study, Casting Doubts, Remains Secret". The New York Times. "The National Security Agency has kept secret since 2001 a finding by an agency historian that during the Tonkin Gulf episode, which helped precipitate the Vietnam War"
27. ^ a b "Declassified NSA Files Show Agency Spied on Muhammad Ali and MLK Operation Minaret Set Up in 1960s to Monitor Anti-Vietnam Critics, Branded 'Disreputable If Not Outright Illegal' by NSA Itself" The Guardian, 26 Sept. 2013
28. ^
29. ^ Cohen, Martin. No Holiday. New York: Disinformation Company Ltd. ISBN 978-1-932857-29-0.
30. ^ a b c Bill Moyers Journal (October 26, 2007). "The Church Committee and FISA". Public Affairs Television. Retrieved June 28, 2013.
31. ^ "Book IV, Supplementary Detailed Staff Reports on Foreign and Military Intelligence (94th Congress, Senate report 94-755)" (PDF). United States Senate Select Committee on Intelligence. April 23, 1976. p. 67 (72). Retrieved June 28, 2013.
32. ^ "Book II, Intelligence Activities and the Rights of Americans (94th Congress, Senate report 94-755)" (PDF). United States Senate Select Committee on Intelligence. April 26, 1976. p. 124 (108). Retrieved June 28, 2013.
33. ^ Peggy Becker (October 1999). [ DEVELOPMENT OF SURVEILLANCE TECHNOLOGY AND RISK OF ABUSE OF ECONOMIC INFORMATION] (Report). STOA, European Parliament. Retrieved November 3, 2013.
34. ^ a b c Staff (June 13, 2003). "NSA honors 4 in the science of codes". The Baltimore Sun (Tribune Company). Retrieved June 11, 2013.
35. ^ Tom Carver (8 June, 2002). "America's most powerful spy agency". BBC. "When Osama bin Laden first moved to Afghanistan, the NSA listened in to every phone call he made on his satellite phone. Over the course of two years it is believed they logged more than 2,000 minutes of conversation."
37. ^ See refs of Thomas Andrews Drake article
38. ^ a b Bamford, Shadow Factory, p 325–340
39. ^ <,0,1517618.story>
40. ^ Laura Poitras, Marcel Rosenbach and Holger Stark. "Ally and Target: US Intelligence Watches Germany Closely". Der Spiegel. Retrieved 13 August 2013.
41. ^ "Colombia asks Kerry to explain NSA spying". The Washington Post. Retrieved 13 August 2013.
42. ^ Greg Miller and Julie Tate, Oct 17 2013, "Documents reveal NSA's extensive involvement in targeted killing program", The Washington Post. Retrieved Oct 18 2013.
43. ^ Laura Poitras, Marcel Rosenbach, Fidelius Schmid und Holger Stark. "Geheimdokumente: NSA horcht EU-Vertretungen mit Wanzen aus". Der Spiegel (in German). Retrieved 29 June 2013.
44. ^ "US-Geheimdienst hörte Zentrale der Vereinten Nationen ab". Der Spiegel (in German). Retrieved 25 August 2013.
45. ^ a b Greenwald, Glenn; MacAskill, Ewen (6 June 2013). "NSA Prism program taps in to user data of Apple, Google and others". The Guardian. Retrieved 15 June 2013.
46. ^ a b Gellman and Soltani, Oct 15 2013 "NSA collects millions of e-mail address books globally", The Washington Post. Retrieved Oct 16 2013.
47. ^ Perlroth, Larson and Shane, "N.S.A. Able to Foil Basic Safeguards of Privacy on Web", The New York Times Sept 5 2013. Retrieved Sept 23 2013.
48. ^ Arthur, Charles "Academics criticise NSA and GCHQ for weakening online encryption", The Guardian Sept 16 2013. Retrieved Sept 23 2013.
49. ^ Glenn Greenwald (6 June 2013). "NSA collecting phone records of millions of Verizon customers daily". The Guardian. Retrieved 16 September 2013.
50. ^ Court Reveals 'Secret Interpretation' Of The Patriot Act, Allowing NSA To Collect All Phone Call Data, Sept 17 2013. Retrieved Sept 19 2013.
51. ^ "Exclusive: U.S. directs agents to cover up program used to investigate Americans". Reuters. Retrieved 14 August 2013.
52. ^ Glenn Greenwald, Ryan Gallagher & Ryan Grim, Nov 26 2013, "Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radicalizers'", Huffington Post. Retrieved Nov 28 2013.
53. ^ Greenwald, Glen, "Members of Congress denied access to basic information about NSA", The Guardian, August 4, 2013. Retrieved Sept 23 2013.
54. ^ a b c Eddlem, T. The NSA Domestic Surveillance Lie, Sept 22 2013. Retrieved Sept 23 2013.
55. ^ Loennig, C., "Court: Ability to police U.S. spying program limited", Washington Post Aug 16 2013. Retrieved Sept 23 2013.
56. ^ Gellman, B. NSA broke privacy rules thousands of times per year, audit finds, Washington Post, August 15, 2013. Retrieved Sept 23, 2013.
57. ^ Gorman, S. NSA Officers Spy on Love Interests, Wall St Journal, August 23, 2013. Retrieved Sept 23, 2013.
58. ^ a b Spencer Ackerman, Nov 19 2013, "Fisa court documents reveal extent of NSA disregard for privacy restrictions", The Guardian. Retrieved Nov 21 2013.
59. ^ John D Bates (3 October 2011). "[redacted] ". p. 16.
60. ^ Ellen Nakashima, Julie Tate and Carol Leonnig (10 September 2013). "Declassified court documents highlight NSA violations in data collection for surveillance". The Washington Post. Retrieved 14 September 2013.
61. ^ Kessler, Glen, James Clapper's 'least untruthful' statement to the Senate, June 12, 2013. Retrieved Sept 23 2013.
62. ^ Kube, C., June 27, 2013, "NSA chief says surveillance programs helped foil 54 plots", US News on Retrieved Sep 27 2013.
63. ^ "NSA Confirms Dragnet Phone Records Collection, But Admits It Was Key in Stopping Just 1 Terror Plot", Democracy Now Aug 1 2013. Retrieved Sep 27 2013.
64. ^ "Indictment: USA vs Basaaly Saeed Moalin, Mohamed Mohamed Mohamud and Issa Doreh". Southern District of California July 2010 Grand Jury. Retrieved Sept 30 2013.
65. ^ The Permanent Select Committee on Intelligence, Press release Jul 23 2013: "54 Attacks in 20 Countries Thwarted By NSA Collection". Retrieved 30 Sept 2013.
67. ^ "Forget Retroactive Immunity, FISA Bill is also about Prospective Immunity". The Progressive. 10 July 2008. Retrieved 16 September 2013.
68. ^ These offices are for example mentioned in a FISA court order from 2011.
69. ^ "National Security Agency". Retrieved 2013-10-09.
70. ^ Matthew M. Aid, The Secret Sentry, New York, 2009, p. 130, 138, 156-158.
71. ^ The NSA's secret org chart, September 15, 2013
72. ^ D.B. Grady. "Inside the secret world of America's top eavesdropping spies".
73. ^ Marc Ambinder, Solving the mystery of PRISM, June 7, 2013
74. ^ National Intelligence - a consumer's guide (PDF) 2009, p. 34.
75. ^ Aid, Matthew M. (10th). "Inside the NSA's Ultra-Secret China Hacking Group". Foreign Policy. Retrieved 11 June 2013.
76. ^ a b Marc Ambinder, How a single IT tech could spy on the world, June 10, 2013
77. ^ The Special Source Operations logo can be seen on slides about the FAIRVIEW program.
78. ^ National Security Agency - 60 Years of Defending Our Nation, Anniversary booklet, 2012, p. 96.
79. ^ Marc Ambinder, 3008 Selectors, June 27, 2013.
80. ^ This is mentioned in a FISA court order from 2011.
81. ^ Top Level Telecommunications: Pictures at the NSA's 60th anniversary
82. ^ National Security Agency - 60 Years of Defending Our Nation, Anniversary booklet, 2012, p. 102.
83. ^ Matthew M. Aid, The Secret Sentry, New York, 2009, p. 128, 148, 190 and 198.
85. ^ a b Drew, Christopher and Somini Sengupta (June 24, 2013). "N.S.A. Leak Puts Focus on System Administrators". The New York Times. Retrieved June 25, 2013.
86. ^ a b c Bauer, Craig P. (2013). Secret History: The Story of Cryptology. CRC Press. p. 359. ISBN 9781466561861.
87. ^ a b Bamford. Body of Secrets. p. 538.
88. ^ "Your Polygraph Examination: An Important Appointment to Keep" (PDF). National Security Agency. Retrieved June 17, 2013.
89. ^ McCarthy, Susan. "The truth about the polygraph". Salon. Retrieved July 5, 2013.
91. ^ a b Stein, Jeff. "NSA lie detectors no sweat, video says." Washington Post. June 14, 2010. Retrieved on July 5, 2013.
92. ^ a b c d "Frequently Asked Questions About NSA: 9. Can you explain the NSA and CSS seals?". National Security Agency. Retrieved July 18, 2013.
93. ^ a b "History of The Insignia". National Security Agency. Retrieved July 18, 2013.
94. ^ "The National Security Agency Insignia". National Security Agency via Internet Archive. Archived from the original on 2008-04-13. Retrieved July 18, 2013.
95. ^ a b "A Dangerous Business: The U.S. Navy and National Reconnaissance During the Cold War" (PDF). National Security Agency. Retrieved June 13, 2013.
96. ^ a b c "National Cryptologic Memorial (List of Names) – NSA/CSS". Retrieved June 13, 2013.
97. ^ "Marine Cryptologic Support Battalion: Intelligence Department: Fort Meade, MD: New Joins". United States Marine Corps. Retrieved June 11, 2013.
98. ^ a b "Just off the Baltimore-Washington Parkway, about 25 miles northeast of Washington, is a secret city. Fort Meade, in suburban Maryland, is home to the National Security Agency – the NSA, sometimes wryly referred to as No Such Agency or Never Say Anything." and "It contains almost 70 miles of roads, 1,300 buildings, each identified by a number, and 18,000 parking spaces as well as a shopping centre, golf courses, chain restaurants and every other accoutrement of Anywhere, USA." in "Free introduction to: Who’s reading your emails?". The Sunday Times. June 9, 2013. Retrieved June 11, 2013. (subscription required)
99. ^ Sernovitz, Daniel J. "NSA opens doors for local businesses." Baltimore Business Journal. August 26, 2010. Updated August 27, 2010. Retrieved on June 11, 2013. "But for many more, the event was the first time attendees got the chance to take the "NSA Employees Only" exit off the Baltimore-Washington Parkway beyond the restricted gates of the agency's headquarters."
100. ^ Weiland and Wilsey, p. 208. "[...]housing integration has invalidated Montpelier's Ivory Pass and the National Security Agency has posted an exit ramp off the Baltimore-Washington Parkway that reads NSA."
101. ^ Grier, Peter and Harry Bruinius. "In the end, NSA might not need to snoop so secretly." Christian Science Monitor. June 18, 2013. Retrieved on July 1, 2013.
102. ^ a b c Barnett, Mark L. (April 26, 2011). "Small Business Brief" (PDF). Office of Small Business Programs, NSA, via The Greater Baltimore Committee. p. 3. Retrieved June 11, 2013.
103. ^ Gorman, Siobhan (August 6, 2006). "NSA risking electrical overload". The Baltimore Sun (Tribune Company). Retrieved June 10, 2013.
104. ^ Dozier, Kimberly (June 9, 2013). "NSA claims know-how to ensure no illegal spying". Associated Press. Retrieved June 12, 2013.
105. ^ "Geeks 'R' us". The Baltimore Sun. Tribune Company. January 13, 2010. Retrieved June 11, 2013.
106. ^ a b c d Bamford, Body of Secrets: Anatomy of the Ultra-Secret National Security Agency, p. 488. "At the heart of the invisible city is NSA's massive Headquarters/Operations Building. With more than sixty-eight acres of floor space,[...]" and "Entrance is first made through the two-story Visitor Control Center, one[...]"
107. ^ Bamford, Body of Secrets: Anatomy of the Ultra-Secret National Security Agency, p. 488-489. "[...]one of more than 100 fixed watch posts within the secret city manned by the armed NSA police. It is here that clearances are checked and visitor badges are issued."
108. ^ a b c Bamford, Body of Secrets: Anatomy of the Ultra-Secret National Security Agency, p. 490. "And then there is the red badge—[...]and is normally worn by people working in the "Red Corridor"—the drugstore and other concession areas[...]Those with a red badge are forbidden to go anywhere near classified information and are restricted to a few corridors and administrative areas—the bank, the barbershop, the cafeteria, the credit union, the airline and entertainment ticket counters." and "Once inside the white, pentagonal Visitor Control Center, employees are greeted by a six-foot painting of the NSA seal[...]"
109. ^ Bamford, Body of Secrets: Anatomy of the Ultra-Secret National Security Agency, p. 489. "It is here that clearances are checked and visitor badges are issued."
110. ^ Bamford, Body of Secrets: Anatomy of the Ultra-Secret National Security Agency, p. 491. "From the Visitor Control Center one enters the eleven-story, million OPS2A, the tallest building in the City. Shaped like a dark glass Rubik's Cube, the building houses much of NSA's Operations Directorate, which is responsible for processing the ocean of intercepts and prying open the complex cipher systems."
111. ^ a b c d e f Bamford, James (June 12, 2013). "The Secret War". Wired (Condé Nast). Retrieved June 12, 2013.
112. ^ "Career Fields/Other Opportunities/NSA Police Officers section of the NSA website". Retrieved 2013-10-09.
113. ^ T.C. Carrington, Debra L.Z. Potts, "Protective Services-More Than Meets the Eye. An Overview of NSA's Protective Services", National Security Agency Newsletter, volume XLVII, No. 9, September 1999, pages 8-10
114. ^ a b "Explore NSA." (Archive) National Security Agency. Retrieved on June 12, 2013. "Other Locations" and "Our employees live along the Colonial-era streets of Annapolis and Georgetown; in the suburban surroundings of Columbia; near the excitement of Baltimore's Inner Harbor; along rolling hills adjacent to working farms; near the shores of the Chesapeake Bay; and amid the monumental history of Washington, DC."
115. ^ a b Sabar, Ariel (January 2, 2003). "NSA still subject to electronic failure". and "Agency officials anticipated the problem nearly a decade ago as they looked ahead at the technology needs of the agency, sources said, but it was never made a priority, and now the agency's ability to keep its operations going is threatened." and "The NSA is Baltimore Gas & Electric's largest customer, using as much electricity as the city of Annapolis, according to James Bamford...." in Gorman, Siobhan (August 6, 2006). "NSA risking electrical overload". and Gorman, Siobhan (January 26, 2007). "NSA electricity crisis gets Senate scrutiny". and Gorman, Siobhan (June 24, 2007). "Power supply still a vexation for the NSA". The Baltimore Sun (Tribune Company). Retrieved June 11, 2013.
116. ^ "The NSA uses about 65 to 75 megawatt-hours of electricity, The Sun reported last week. Its needs are projected to grow by 10 to 15 megawatt-hours by next fall." in Staff (January 26, 2007). "NSA electricity crisis gets Senate scrutiny". The Baltimore Sun (Tribune Company). Retrieved June 11, 2013.
117. ^ a b c d e f Bamford, James (March 15, 2012). "The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)". Wired (Condé Nast). Retrieved February 26, 2013.
118. ^ "60 Years of Defending Our Nation" (PDF). National Security Agency. 2012. p. 15. Retrieved July 6, 2013.
119. ^ a b c "60 Years of Defending Our Nation" (PDF). National Security Agency. 2012. p. 10. Retrieved July 6, 2013.
120. ^ "60 Years of Defending Our Nation" (PDF). National Security Agency. 2012. p. 23. Retrieved July 6, 2013.
121. ^ a b c "60 Years of Defending Our Nation" (PDF). National Security Agency. 2012. p. 39. Retrieved July 6, 2013.
122. ^ Scott Shane and Tom Bowman (December 4, 1995). "No Such Agency Part Four – Rigging the Game". The Baltimore Sun. Retrieved February 24, 2013.
123. ^ Brown, Matthew Hay (May 6, 2013). "NSA plans new computing center for cyber threats". The Baltimore Sun (Tribune Company). Retrieved June 11, 2013.
124. ^ "National Security Agency: FY 2014 Military Construction, Defense-Wide" (PDF). Office of the Under Secretary of Defense (Comptroller), pp. 3–4. Retrieved June 13, 2013.
125. ^ "Fort Meade". Expeditionary Combat Readiness Center, United States Navy. Retrieved June 11, 2013.
126. ^ Steve Fidel (January 6, 2011). "Utah's billion cyber-security center under way". Deseret News. Retrieved January 6, 2011.
127. ^ LaPlante, Matthew D. (July 2, 2009). "New NSA center unveiled in budget documents". The Salt Lake Tribune (MediaNews Group). Retrieved June 9, 2013.
128. ^ a b Norton-Taylor, Richard (March 1, 2012). "Menwith Hill eavesdropping base undergoes massive expansion". The Guardian (Guardian News and Media). Retrieved June 10, 2013.
129. ^ a b c "It’s kind of a legacy system, this whole idea, the Echelon," Bamford said. "Communications have changed a great deal since they built it." in Muir, Pat (May 27, 2013). "Secret Yakima facility may be outdated, expert says". Yakima Herald-Republic (Seattle Times). Retrieved June 15, 2013.
130. ^ Richelson, Jeffrey T. (August 2012). "Eavesdroppers in Disguise". Air Force Magazine (Air Force Association). Retrieved June 10, 2013.
131. ^ Troianello, Craig (April 4, 2013). "NSA to close Yakima Training Center facility". Yakima Herald-Republic. Retrieved June 15, 2013.
132. ^ "UKUSA Agreement Release: 1940-1956". National Security Agency. Retrieved July 11, 2013.
133. ^ Bamford, James (September 13, 2002). "What big ears you have". The Guardian. Retrieved July 11, 2013.
134. ^ Tangimoana listed in: "Government Communications Security Bureau [GCSB]". Federation of American Scientists. Retrieved July 11, 2013.
135. ^ "ECHELON Main Stations". Retrieved July 11, 2013.
136. ^ "UK agrees missile defence request". BBC News. July 25, 2007. Retrieved June 10, 2013.
137. ^ Campbell, Duncan (December 6, 1999). "1980 - America's big ear on Europe". New Statesman. Retrieved June 15, 2013.
138. ^ Laura Poitras, Marcel Rosenbach and Holger Stark, Ally and Target: US Intelligence Watches Germany Closely, August 12, 2013.
139. ^ a b "Snowden Interview: NSA and the Germans 'In Bed Together'". Spiegel International. July 7, 2013. and "Snowden: NSA is ‘in bed with the Germans’". RT News (TV-Novosti). July 7, 2013. Retrieved July 8, 2013.
143. ^ Hager 1996, p. 55
145. ^ Patrick S. Poole, Echelon: America's Secret Global Surveillance Network (Washington, D.C.: Free Congress Foundation, October 1998)
146. ^ Echelon", 60 Minutes, February 27, 2000
147. ^ Campbell, Duncan (August 12, 1988), "They've Got It Taped" (PDF), New Statesman via, retrieved June 19, 2007
148. ^ Bomford, Andrew (November 3, 1999). "Echelon spy network revealed". BBC. Retrieved June 7, 2013.
149. ^ "European Parliament Report on Echelon" (PDF). July 2001. Retrieved July 4, 2008.
150. ^ "Nicky Hager Appearance before the European Parliament Echelon Committee". Nicky Hager / Cryptome Archive. April 2001. Retrieved July 4, 2008.
151. ^ Gorman, Siobahn (March 10, 2008). "NSA's Domestic Spying Grows As Agency Sweeps Up Data". The Wall Street Journal Online. Archived from the original on 2009-01-24. Retrieved February 19, 2013 2008.
152. ^ Savage, Charlie (August 8, 2013). "N.S.A. Said to Search Content of Messages to and From U.S". Retrieved August 13, 2013.
155. ^ "Microsoft handed the NSA access to encrypted messages". The Guardian. July 12, 2013. Retrieved September 7, 2013.
156. ^ The Guardian, June 8, 2013 [title missing][page needed]
157. ^ Ellen Nakashima; Joby Warrick (July 14, 2013). "For NSA chief, terrorist threat drives passion to 'collect it all,' observers say". The Washington Post. Retrieved July 15, 2013. "Collect it all, tag it, store it. . . . And whatever it is you want, you go searching for it."
159. ^ a b Perlroth, Nicole, Larson, Jeff, and Shane, Scott (September 5, 2013). "The NSA’s Secret Campaign to Crack, Undermine Internet Security". ProPublica. "This story has been reported in partnership between The New York Times, the Guardian and ProPublica based on documents obtained by The Guardian. For the Guardian: James Ball, Julian Borger, Glenn Greenwald; For the New York Times: Nicole Perlroth, Scott Shane; For ProPublica: Jeff Larson"
160. ^ "Schneier on Security: The Strange Story of Dual_EC_DRBG". 2007-11-15. Retrieved 2013-10-09.
162. ^ a b David Alan Jordan. Decrypting the Fourth Amendment: Warrantless NSA Surveillance and the Enhanced Expectation of Privacy Provided by Encrypted Voice over Internet Protocol. Boston College Law Review. May 2006. Last access date January 23, 2007
163. ^ John Shiffman and Kristina Cooke (August 5, 2013) Exclusive: U.S. directs agents to cover up program used to investigate Americans. Reuters. Retrieved 12 Aug 2013.
164. ^ John Shiffman and David Ingram (August 7, 2013) Exclusive: IRS manual detailed DEA's use of hidden intel evidence. Reuters. Retrieved 12 Aug 2013.
165. ^ a b c David Kahn, The Codebreakers, Scribner Press, 1967, chapter 19, pp. 672–733.
166. ^ "Statistics on whether the NSA's Secret Data Collection is Acceptable". Statista. Retrieved July 19, 2013.
167. ^ "59% Oppose Government’s Secret Collecting of Phone Records". Rasmussen Reports. June 9, 2013. Retrieved July 19, 2013.
168. ^ Newport, Frank (June 12, 2013). "Americans Disapprove of Government Surveillance Programs". Gallup. Retrieved July 19, 2013.
169. ^ "Majority Views NSA Phone Tracking as Acceptable Anti-terror Tactic". Pew Research Center. June 10, 2013. Retrieved July 19, 2013.
171. ^ "". Retrieved 2013-10-09.
172. ^ "6th Circuit Court of Appeals Decision" (PDF). Retrieved 2013-10-09.
175. ^ KJ Mullins (20 September 2008). "Jewel Vs. NSA Aims To Stop Illegal Surveillance". Digital Journal. Retrieved 30 December 2011.
176. ^ Jewel v. NSA (complaint). 18 September 2008. Electronic Frontier Foundation. Retrieved 30 December 2011.
177. ^ Kravets, David (15 July 2009). "Obama Claims Immunity, As New Spy Case Takes Center Stage". Wired. Retrieved 30 December 2011.
181. ^ Glenn Greenwald. "Revealed: NSA collecting phone records of millions of Americans daily". Retrieved June 6, 2013.
182. ^ Charlie Savage and Edward Wyatt, "U.S. Is Secretly Collecting Records of Verizon Calls", New York Times, June 5, 2013. Accessed June 6, 2013.
183. ^ France in the NSA's crosshair : phone networks under surveillance Le Monde 21 October 2013
184. ^ Sabar, Ariel (July 20, 2013). "Congress curbs NSA's power to contract with suppliers". Baltimore Sun (Tribune Company). Retrieved June 17, 2013.
188. ^ Baker, Stewart A. "Don't Worry Be Happy". Wired (Condé Nast) (2.06). Retrieved June 28, 2013.
189. ^ "Key Escrow, Key Recovery, Trusted Third Parties & Govt. Access to Keys". Electronic Frontier Foundation. Retrieved June 28, 2013.
190. ^ Schneier, Bruce (July 15, 1998). "Declassifying Skipjack". Crypto-Gram ( Retrieved June 28, 2013.
191. ^ "SKIPJACK and KEA Algorithm Specifications" (PDF). National Institute of Standards and Technology. May 29, 1998. Retrieved June 28, 2013.
192. ^ Weeks, Bryan et al. "Hardware Performance Simulations of Round 2 Advanced Encryption Standard Algorithms" (PDF). National Institute of Standards and Technology. Retrieved June 29, 2013.
193. ^ a b "the NIST standards that define Suite B..." in "Suite B Cryptography / Cryptographic Interoperability". National Security Agency. Retrieved June 29, 2013.
194. ^ Draft NIST SP 800-131, June 2010.
195. ^ a b Lorenzo, Joseph (2013-09-24). "What the heck is going on with NIST’s cryptographic standard, SHA-3? | Center for Democracy & Technology". Retrieved 2013-10-09.
196. ^ "Twitter / marshray: Believe it or not, NIST is". Retrieved 2013-10-09.
197. ^ "kelsey-invited-ches-0820.pdf - Google Drive". Retrieved 2013-10-09.
199. ^ Matthew Green (2013-09-18). "A Few Thoughts on Cryptographic Engineering: The Many Flaws of Dual_EC_DRBG". Retrieved 2013-10-09.
200. ^ "itlbul2013 09 Supplemental". ProPublica. Retrieved 2013-10-09.
201. ^ Matthew Green (2013-09-20). "A Few Thoughts on Cryptographic Engineering: RSA warns developers not to use RSA products". Retrieved 2013-10-09.
202. ^ NSA Denies It Will Spy on Utilities, Threat Level,
203. ^ Mick, Jason (July 8, 2010). "DailyTech - NSA's "Perfect Citizen" Program: Big Brother or Cybersecurity Savior?". DailyTech. Retrieved 8 July 2010.
204. ^ Whitney, Lance (July 8, 2010). "Report: NSA initiating program to detect cyberattacks". Retrieved 8 July 2010.
205. ^ Gorman, Siobhan (2010-07-07). "U.S. Program to Detect Cyber Attacks on Infrastructure". The Wall Street Journal. Retrieved 2010-07-07.
210. ^ James Risen and Eric Lichtblau (June 10, 2013). "How the U.S. Uses Technology to Mine More Data More Quickly". New York Times. Retrieved June 13, 2013.
212. ^ DNI (2009). "2009 National Intelligence Consumer's Guide". Director of National Intelligence. Retrieved April 13, 2011. [dead link]
215. ^ Dr. Christopher Griffin (2010). "Dealing with Sensitive Data at Penn State's Applied Research Laboratory: Approach and Examples". Retrieved April 13, 2011.
217. ^ "The DoD Computer Security Center (DoDCSC) was established in January 1981..." and "In 1985, DoDCSC's name was changed to the National Computer Security Center..." and "its responsibility for computer security throughout the federal government..." in "A Guide to Understanding Audit in Trusted Systems". National Computer Security Center via National Institute of Standards and Technology CSRC. Retrieved June 30, 2013.
218. ^ "NSA and its National Computer Security Center (NCSC) have responsibility for..." in "Computer Systems Laboratory Bulletin". National Institute of Standards and Technology CSRC. February 1991. Retrieved June 30, 2013.
219. ^ a b "NSA/NCSC Rainbow Series". Federation of American Scientists. Retrieved June 30, 2013.
220. ^ Associated Press (July 15, 2013). "'Guardian' journalist: Snowden docs contain NSA 'blueprint'". USA Today. Retrieved November 28, 2013.
221. ^ Committee on C4ISR for Future Naval Strike Groups, National Research Council (2006). C4ISR for Future Naval Strike Groups. National Academies Press. p. 167. ISBN 0309096006.
222. ^ "Adkins Family asked for a pic of the KL-7. Here you go!..." in "NSA - National Cryptologic Museum". Facebook. March 20, 2013. Retrieved June 30, 2013.
223. ^ a b "Cryptographic Damage Assessment: DOCID: 3997687" (PDF). National Security Agency. 1968. Retrieved June 30, 2013.
224. ^ a b c d "Cryptologic Excellence: Yesterday, Today and Tomorrow" (PDF). National Security Agency. 2002. p. 17. Retrieved June 30, 2013.
225. ^ a b Hickey, Kathleen (January 6, 2010). "NSA certifies Sectera Viper phone for classified communications". GCN (1105 Media). Retrieved June 30, 2013.
226. ^ "JITC Networks, Transmissions, and Integration Division Electronic Key Management System (EKMS)". U.S. Department of Defense: Defense Information Systems Agency: Joint Interoperability Certifier. February 1991. Retrieved June 30, 2013.
227. ^ "6.2.6 What is Fortezza?". RSA Laboratories, EMC Corporation. Retrieved June 30, 2013.
228. ^ "AN/ARC-231 Airborne Communication System". Raytheon. Retrieved June 30, 2013.
229. ^ "NSA approves TACLANE-Router". United Press International. October 24, 2007. Retrieved June 30, 2013.
Further reading[edit]
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/22466 | Michael De Leon
Writers discuss whether Horry is Hall of Fame worthy
By Paul Garcia, Project Spurs
Some of Bloguin’s top writer’s recently got together to argue and discuss whether some of the NBA’s former players are Hall of Fame worthy.
The panelist’s were Jeff Fox of The Hoops Manifesto, College Wolf from the TWolves Blog, Don & brumbygg from With Malice and Ezra from the Purple and Gold Blog. ?
They gave their takes on players like Reggie Miller, Mitch Richmond, Mark Jackson, Ralph Sampson, and former San Antonio Spurs player Robert Horry.
Here is how things shook out for the former Spur.
Click HERE for the complete article at Project Spurs.
Michael De Leon
Michael De Leon |
global_01_local_0_shard_00000017_processed.jsonl/22474 | The Woman Citizen
The Politics of Contraception
The Politics of Contraception
A conservative (more or less) correspondent wrote to me of his dismay and despair about the freak show that is the Republican Party’s contenders for president. Even though I’m not sure birth control is a right, what do we get out of calling Sandra Fluke a slut and a prostitute? he asked me. That’s a right? We’re going to fight for this? What do we get out of this?
I wrote back to him that to understand why people object to the requirement to include birth control as part of preventative health services, we have to understand something about human reproduction.
Which is it kills women without modern medical intervention: in absolutely huge, horrendous, terrifying numbers. He’d seen the numbers I put up in Women in the Line of Fire, which estimates 840,429 maternal deaths in America just between 1900 and 1960, vs. 602,451 battle deaths, overwhelmingly of male troops between the Revolutionary and Korean Wars (or 1,079, 245 deaths if you add disease/non-battle deaths to combat deaths). Death in war for men was an episodic tragedy, death in childbirth for women, a constant bloodletting of women in their most economically and intellectually productive years. I once had access to a pre-colonial-era genealogical database, and I was absolutely haunted by how many men had two, three, four wives—and this was the elite of pre-Revolutionary America. I could never bear to do a serious count, but an educated guess is that probably half the wives of those men died either of complications of pregnancy like pre-eclampsia, in childbirth, or of complications of childbirth. The men, of course, were all named. Many of their wives were not. They were impregnated and bred—married women had no right to their own bodies; sex was their marital duty—to death. Those women who didn’t die were often horribly injured during childbirth, whereupon their husbands often took a mistress or imposed themselves upon the female household help. (Those who say that husbands should not be present in the delivery room because it might lessen their libido miss the point that this is a natural and desirable reaction to the suffering and even death that is the natural result of sexual intercourse. The woman, after all, must endure whether or not her man is there with her.) Then the widower, needing someone to run his house and care for his children, would marry another woman and repeat the process over again. For most of human history, then, it is extremely likely that at least half of all female deaths were either due to reproductive causes, or other causes that were greatly aggravated by pregnancy and childbirth.
Yes, men died young. But there was absolutely no comparable vulnerability men had to women—and these men (for these people were of the Tory class) left some kind of mark upon their societies. Their names were all handed down in that database. They were not anonymous.
This dreadful interchangeability and anonymity is the social meaning we humans gave to the hideous biological fact of maternal mortality, and it lingers long after maternal mortality rates began to plummet in the developed world. It’s probably one reason so many early feminists of the 60s and 70s refused to have children. They grew up in a world where their mother and their female relatives had died or been grievously injured in childbirth or had close friends who had or had been. In fact, it’s probably one major, if unspoken, reason that any woman who refuses to bear children does so. Another way to put it is, the human female body isn’t made to bear children. If our bodies were, we would give birth easily, at low risk, without public health measures such as sanitation and vaccination, pre- and post-natal care, medical intervention and supervision—to include both cesareans and abortions—and we simply don’t.
In the context of this biological reality, birth control that we can use—if need be without our male partner’s knowledge or permission—is one of the world’s great public health triumphs. Moreover, because morality is not a matter of “God says” or “It is written” or “In the name of Allah”—for God is neither a citizen nor a human being—but the reduction of unnecessary suffering and harm borne by other human beings and yes, animals, the availability and indeed provision of such birth control to women and adolescent girls is a profoundly moral thing.
The most common and effective type of birth control that a woman or adolescent girl can use herself—again if need be without male knowledge or permission—is birth control pills (BCPs). And even if some BCPs are $8 or 9 a pack in America, that does not mean that others are not $100 a pack. Sometimes the difference is one of advertising but often it’s not. Like hormone replacement therapy, BCPs use synthetic and natural anabolic steroids that are far more powerful than testosterone to intervene, regulate and control a hormone cycle that is more complex than the male. Getting dosage and timing wrong can be, to put it very mildly, extremely unpleasant, while working with an experienced doctor or nurse practitioner can minimize or eliminate the unpleasantness, even misery of an inappropriate prescription. If an $8-9 pack of BCPs works for you, great. If it doesn’t, we still need birth control that works for us.
This is because sex—including sexual intercourse—like food and shelter, is a basic human need, so deep that it can override even a woman’s need to live, rather than a male need women exist to satisfy. For women to have sex—including sexual intercourse—voluntarily with partners we want and enjoy, and controlling our fertility ourselves, without fear of an unwanted—for whatever reason—pregnancy is, then, profoundly moral. Unfortunately, all too many women and girls have sex all too often under conditions of manipulation and coercion that, if the law recognized as force what women and girls perceive as force when it used against us, would be considered rape. At the same time, prostitution and pornography are multi-billion dollar industries predicated upon extraordinarily violent crime—and defended as freedom of choice, commerce, and speech. And even when women and girls have sex under conditions of authentic, meaningful consent, and—if women—are physically and emotionally capable of motherhood, having a child changes and limits our lives in the way it does not a man’s life.
Because the bond between mothers and children for all of human history until half a century ago—less than an eyeblink—was not labor and delivery or nursing, but death. The value of our lives and our intellect is still circumscribed by the deep memory that the warrant for our deaths was signed at menarch, and to give one’s daughter in marriage was to give her to the man who might kill her. If sex, particularly sexual intercourse, was used as a means of dominance and control, even unto death by abortion or in childbirth, a man who loved his woman lived with the terrible knowledge that the sex and the child she, too, wanted might kill her, and if so, he was the instrument of her death—and very likely, their child’s as well.
These, then, are the reasons women and adolescent girls need access to birth control: because freedom begins with the body. Ask any slave whether it doesn’t. This is true for men, and no one would claim that a man or boy who cannot control his body is free. But it is even truer for women. For all the horrible, hideous things done to the male body—whether by criminals, the enemy in war, or the state—the perpetrators are usually other men and men are not usually controlled by sexual and reproductive means or for those purposes. Sex and reproduction, however, are the dominant and pervasive means of and excuse for controlling women and girls; this control is uniquely intimate, often astoundingly violent even in comparison to the violence done to men by other men, and has lifelong consequences. Finally, calling a woman a slut and a prostitute (as Ms. Fluke was called) has traditionally been used to justify any sexual violence (or non-sexual violence during the course of a sexual attack) visited upon a woman.
The vote may have given women a say in their lives, and modern medicine saved our lives wholesale, but it is access to contraception that frees women from the tyranny of reproduction and reproductive control.
So then, to answer my friend’s question, what does what remains of the Republican Party get out of fighting women’s access to birth control?
Cruelty. Knowing, deliberate cruelty towards women—half the species. (The opposition to renewing the Violence Against Women Act is more of the same.) Mothers, sisters, lovers, wives, friends. The only way that birth control on our own behalf as individuals as a fundamental right is debatable is if you think women should not be able to control our fertility ourselves, without the permission of anyone else. If you want to debate that, then do so on the grounds of the facts outlined above, rather than demonstrably false claims of morality or religious freedom.
The arguments against birth control are usually made by extremely privileged men to mostly men but also some women, who are profoundly hurt, angry, and humiliated—and not nearly as privileged. Their audience is that group of Americans who have a little left to lose, and can see themselves losing it, and react by wanting to hurt others whom it is safe to hurt. How can you hurt the big corporations and banks/financial institutions that have destroyed your work and your savings—who fund these extremely privileged men—who are campaigning for the Republican nomination and then the Presidency—who don’t have the slightest intention of biting the hand that funds their campaigns and lifestyles? The fact is that the Personhood Pledge, to which Romney, Santorum, Gingrich and Paul are all signatories, is the closest the Republican Party comes to a comprehensive jobs program. Leaving aside the practical matter of passing an amendment that defines personhood as occurring at the moment of conception is the brutal insult and diminution of women. To equate an undifferentiated cluster of cells with the female individual it exists inside and cannot possibly exist without means that that cluster of cells matters more than her dreams, fears and hopes. She is reduced to a host whether her pregnancy is longed-for and anticipated or a heart-breaking catastrophe. And this Pledge pretends that if women were once again subject to the tyranny of reproduction and childcare, their life options dependent on what the men in their lives choose to permit them, all would be well for men and women too.
A quick look at any society in the world where this is true should disabuse one of this notion. Afghanistan is just one case in point: the fact is that what we learn in the home becomes normal to us. We take it out into the world and it informs how we treat others and how we expect to be treated. Another way to say this is that real democracy cannot exist without women’s self-control and reproductive freedom. Because we are half of society and what happens to us profoundly effects that society.
What the Republican Party gets out of the screeching over contraception is an offer of something evil and ugly to men—and to the women who want to be their enforcers. The possibility of real, lasting control over the women in their lives, particularly their sexual partners, as well as a sop to their pride, in the offer of unearned moral authority at the real expense of others.
In the framework of the facts above, the attempt to withhold contraception from as many women as possible—whether it is employers refusing to provide contraceptive coverage or refusing to fund Planned Parenthood or pharmacists refusing to fill prescriptions or make Plan B available—is, at the most basic, profound and intimate level, about pitting men and women against each other as a way to defuse male anger and female humiliation at seeing other women live happier, less painful lives. Instead of sex, including sexual intercourse, being about mutual pleasure and affection, a bond between two human beings, it makes sex and particularly sexual intercourse a way a man imposes fear and pain and injury upon a woman even if she wants him, even if he loves her—and if he wants to, a way to use sex against a woman to revenge himself for the hurt and pain his political elites have imposed upon him. It is a safety valve meant to keep these men and women uniting against a profoundly unjust economic order.
But there is also something else people, particularly women, get out of this. And that is the same thing people do anywhere who behave this way, be they Muslim or Jewish fundamentalists or whether religion is involved at all. If your memory is long enough, think of all those members of politically extreme movements who happily abnegated their freedom for the “greater good,” whether the Volk or the Reich or the classless society. Think of Darkness at Noon and victories for the Islamists in Egypt. What we are seeing is an escape from freedom, whether their own freedom and happiness or having to deal with the freedom and happiness of others. And yes, the uproar about women’s access to contraception as a basic public health need—and right—is about freedom at its most basic and elemental: that a female should not have to become pregnant and give birth unless she wants to. Because having sexual intercourse isn’t wrong—much less a crime worthy of involuntary labor and great pain, often serious injury and sometimes death, be it in abortion or childbirth. Indeed, we rarely punish incest and rape so harshly.
Once upon a time, the Republican Party had a rationally different point of view from the Democratic Party, and both parties shared certain goals. This is no longer true: the Republican Party is slowly, deliberately purging itself of those who can legitimately be called conservative. Which is also to say, the sane, the rational and the humane. The party ceased to have room for Mr. Conservative, Barry Goldwater, who was light-years ahead of his time about women’s rights, civil rights, gay rights, the environment, long ago. His ideas are no longer even a figleaf and if his soul knows what is happening to his beloved Republic and his Party, he is in agony.
Now the Republican Party now exhibits an interesting conundrum. It advocates for massive defense spending on behalf of American security, while arguing against Americans being healthy by having access to health care—or even being free of the deadly tyranny of reproduction by having access to contraception. It stresses individual liberty while sponsoring bills that would permit employers to refuse to provide insurance coverage for birth control for “moral or religious reasons” unless a woman provided proof she was using birth control for “other purposes.” It stresses morality while turning sexual intercourse into an exercise of dominance and infliction of pain and fear and humiliation—the rapist’s ethos—even between people who love and want each other. Its “traditional family values” show that its real values are not people who love each other and commit to each other—otherwise it would embrace gay marriage—but dominance and cruelty. It claims to embrace freedom of religion yet freedom of religion means my freedom from your religion—even if I am your employee and you are the Pope himself—especially when it comes to something so personal, dangerous and permanent as pregnancy and childbirth or abortion. Belief in the Nicean creed is one thing. Eliminating basic medical care, which contraception—like blood transfusions, which were in fact first developed to save women from dying in childbirth—is, from health insurance, is something else.
And all of this will still be true no matter who the Republican nominee is.
Time was I thought that Iran would be the first nuclear power governed by men using religion and the possibility of engaging in sexual cruelty to twist and control their nation. Now, I’m not so sure.
Erin Solaro |
global_01_local_0_shard_00000017_processed.jsonl/22490 | public marks
PUBLIC MARKS from roberto with tag firefox
Selenium IDE Intro
by 5 others (via)
Google Fool - Greasemonkey Shenanigans
by 2 others (via)
This script, for the Firefox Greasemonkey extension, sets up Google (and other search engines) to do an amusing magic trick or April Fool.
Customising GMail with GreaseMonkey - SitePoint DHTML & CSS Blog
Automatically running a Javascript when visiting a given site.
by 3 others
The Firefox Screen Reader Emulator Extension.
Installing flash plugin on Firefox 1.0 PR.
WikalongExtension - Wikalong Firefox Extension
Nice extension for adding comments to a site.
by 1 other
Extension for Firefox, shows icon after links for PDF, mailto, etc.
Select a non-clickable link and open it in a new tab.
Firesomething 1.0.3 - MozillaZine Forums
by 1 other
Does awful things to the product name of your favorite browser.
roberto's TAGS related to tag firefox
accessibility + bookmarks + firebird + flash + flickr + gmail + google + greasemonkey + ide + javascript + magic + mozilla + python + ruby + script + search + web + |
global_01_local_0_shard_00000017_processed.jsonl/22496 | GP2010 - New VPC Image Released everyone, It is with great excitement, we are announcing the availability of the first of two Microsoft Dynamics GP RTM VPC images.  The VPC that is available starting today is called “CoreMR.”  Here are the details: What Are the Key Programsen-USTelligent Evolution Platform Developer Build (Build: 5.6.50428.7875) |
global_01_local_0_shard_00000017_processed.jsonl/22523 | The Motley Fool Discussion Boards
Previous Page
Retirement Discussions / Retired Fools
Subject: Re: IRS Stimulus Payment Schedule Date: 4/16/2008 6:51 PM
Author: 0x6a74 Number: 12861 of 19005
Doesn't everyone complain about paying taxes?
Not I, said the Little Red Hen. IMO beats the heck out of anarchy.
nor i .... as Shakespeare said, "the price we pay for civilisation"
..... and you were in the business, no? so you're biased <g> |
global_01_local_0_shard_00000017_processed.jsonl/22524 | The Motley Fool Discussion Boards
Previous Page
Personal Finances / Credit Cards and Consumer Debt
Subject: Re: CC Reform and Chase Date: 4/12/2010 5:22 PM
Author: akck Number: 296898 of 308045
Well, if you've checked her credit reports to be sure nothing strange has shown up on them, then you can probably chalk it up to low usage of the credit line, which made her account costly for the lender to keep at that credit level, for the return that they were getting.
You called it correctly. We just got a letter saying they adjusted it due to usage patterns. It's close to a rewards point, so I think we'll let the cell bill hit it for a couple of months, select the cash award and then stop using it. Is it better that she cancels it or let Chase cancel it in the future since it will be languishing from non-use? |
global_01_local_0_shard_00000017_processed.jsonl/22525 | The Motley Fool Discussion Boards
Previous Page
Investing/Strategies / Retirement Investing
Subject: Re: Long Term Care Date: 3/27/2011 11:01 PM
Author: Rayvt Number: 68742 of 74536
I guess you'd have to read the detailed analysis in CR. I'm assuming that they *do* show such.
Just as a S.W.A.G.: $5000/mo for Alzheimers ward (we paid $4000/mo in 3005 for my Mom). is $60K/yr. The delta is less than that, because some of the 5K is for food, etc. But even ignoring that...
That's 6% of $1M or 4% of $1.5M. A tad high, but the life expectancy of someone in that condition is not going to be more than a few years.
If they were using the entire $40K to live on, that will drop to maybe $30K, for a total of 90K, or 9% of 1M or 6% of 1.5M or 4.5% of 2M.
High, yes.
But the 4% SWR is computed for a 30 year survival period. To be blunt, nobody is going to live in a nursing home for 30 years.
But let's ignoring portfolio survival, and ignore growth, ignore earnings, say in this situation you'd hit the panic button and go to cash to ride out the storm.
A $1M portfolio where you take out 90K per year will last 11 years.
At 45 years old, you'll pay premiums for 20 years just to get to 65, and perhaps another 10 years before need.
That's a long time in which to build up your own portfolio to self-insure LT care.
I guess different people view things differently. Some people hear about LTHI and start paying premiums. We heard about it and decided to aim for a $2M retirement portfolio.
But I've always wondered---what if you die early? Is any of the premium returned? According to the SSA, only 75% of 45 year olds are still alive at 70. |
global_01_local_0_shard_00000017_processed.jsonl/22528 |
Subject: Re: How does the 250k bracket work? Date: 11/19/2012 1:33 PM
Recommendations: 0
They are talking about Adjusted Gross Income under $250K. Itemized deductions are utilized to come up with AGI. Itemized deductions come after you get your AGI determined. The AGI determines your maginal tax rate, not your effective tax rate.
This is a bit confusing. The two bolded statements are contradictory. The second one is correct. AGI is your total income less a few adjustments (if you have them) and you'll find it at the bottom of page one of the 1040. Then on page two, itemized deductions are subtracted from AGI (if you don't itemize, the standard deduction is used instead). The personal exemptions are also subtracted, leaving you with taxable income.
The question is, will the $250k cutoff apply to AGI or to taxable income? Up to now, it's taxable income that determines which tax bracket you fall into. I don't see how AGI could be the determining factor -- you can't calculate your tax before subtracting the deductions unless the tax code is massively altered to treat deductions like after-tax credits. And households with identical AGIs can have wildly varying amounts of taxable income due to various itemized deductions and the number of personal deductions.
Print the post
2013 Feste Award Nominations Now Open!
When Life Gives You Lemons
What was Your Dumbest Investment?
Community Home
Speak Your Mind, Start Your Blog, Rate Your Stocks
Community Team Fools - who are those TMF's?
Contact Us
Contact Customer Service and other Fool departments here.
Work for Fools? |
global_01_local_0_shard_00000017_processed.jsonl/22532 | Changes related to "1905-05-05 (133lbs) Jimmy Britt w rsc 20 (20) Jabez White, Woodward’s Pavilion, San Francisco, California, USA"
From Barry Hugman's History of World Championship Boxing
Jump to: navigation, search
Show new changes starting from 14:04, 16 March 2014
Page name:
No changes on linked pages during the given period.
Personal tools
Google AdSense |
global_01_local_0_shard_00000017_processed.jsonl/22533 | Changes related to "1989-10-07 John John Molina w rsc 10 Tony Lopez, Arco Arena, Sacramento, California, USA - IBF"
From Barry Hugman's History of World Championship Boxing
Jump to: navigation, search
Show new changes starting from 13:54, 16 March 2014
Page name:
No changes on linked pages during the given period.
Personal tools
Google AdSense |
global_01_local_0_shard_00000017_processed.jsonl/22560 | Take the 2-minute tour ×
The Wikipedia article on primitive reflexes, or newborn reflexes, states that they originate in the CNS. Here's the list of reflexes from the article:
• Moro
• Walking/stepping
• Rooting
• Sucking
• Tonic neck
• Palmar grasp
• Plantar
• Galant
• Swimming
• Babkin
Precisely where in the CNS do they originate?
share|improve this question
This is not one question. – Artem Kaznatcheev Jul 14 '12 at 18:05
Asking "where" may not be as meaningful as you think, as many of these are not "reflexes" in the traditional sense (compared to something like the patellar tendon reflex). Something like the swimming reflex might be composed of several spinal pattern generator circuits, which are difficult to isolate in humans. – Chuck Sherrington Jul 14 '12 at 20:07
The plantar is probably a good angle from which to start investigating these phenomena, as there's plenty of information about its origins and its manifestation in stroke victims or other victims of upper motorneuronal damage. – Chuck Sherrington Jul 14 '12 at 20:08
I believe I've found a single answer for all the primitive reflexes, so I revised the question to reflect that a single answer is expected. I'd like to reopen the question and answer it. – John Pick Jul 16 '13 at 6:41
add comment
2 Answers
It seems that there is not much research concerning the anatomical localization of primitive reflexes. For instance, Schott & Rossor (2003) state in the conclusion of their review
The complexity of many of these responses makes it perhaps unsurprising that detailed anatomical localisation, despite the availability of structural and functional imaging, has in general not been possible.
However, at least for the grasp reflex, they discuss an involvement of frontal areas.
Schott, JM Rossor M (2003). The grasp and other primitive reflexes. J Neurol Neurosurg Psychiatry 74(5): 558–560. [DOI] [PDF]
share|improve this answer
AFAIK, the involvement of the frontal areas is that they inhibit primitive reflexes. – John Pick Jul 18 '12 at 18:08
I only recited what they wrote. But actually I think the same like you. – H.Muster Jul 18 '12 at 18:17
add comment
up vote 0 down vote accepted
Primitive reflexes originate in the brainstem.
• Shewmon, D.A. (1988) Anencephaly: selected medical aspects. Hastings Cent. Rep. 18(5):11-19.
• Stumpf, D.A., Cranford, R.E., Elias, S., Fost, N.C., McQuillen, M.P., Myer, E.C., Poland, R., Queenan, J.T. (1990) The Infant with Anencephaly. NEJM. 322:669-674.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/22565 | Category:Lillian Gish
From Wikimedia Commons, the free media repository
Jump to: navigation, search
Lillian Diana de Guiche (October 14, 1893 - February 27, 1993), was an Oscar-nominated American actress, better known as Lillian Gish.
Authority control
Media in category "Lillian Gish"
|
global_01_local_0_shard_00000017_processed.jsonl/22575 | 5e Computer client?
3 posts / 0 new
Last post
The threads I have seen are mainly rules/content/balanced based, but I'd like to know if there are any plans for PC client software for D&D that would roll all the "game table" stuff such as character sheets, maps, notecards, game grids, and source books (but probably not die rolls) into one efficient machine. Such programs have existed in the past, but they have been quite clunky. A utility like this would help draw in new players who are more used to gaming through a computer than at a table. Moreover, it would not alienate traditional players as its use would be completely optional. Anyway, I realize something like this would probably have to come through a third party as, to my knowledge, WotC doesn't develop software in house. Just my two cents. Any thoughts?
I want a character and monster management tool with treasure generator that is updated each and every time a new book supplement or module comes out for D&D 5.0. I do not want it to be online only; I do not want to pay a monthly fee to use it. It should be included with every rule book supplement and module that comes out. I would be glad to pay an additional 30 bucks a book for this software. I thought that e-tools from codemonkey was pretty good for 3.5 i just wish the data sets had come out in a more timely fashion. I want this to be a rock solid piece of software that works every time I go to use it on a physical cd that I own. I don’t want the data sets to be crowd sourced, fan sourced or done by monkeys it needs to work the first time every time. Make my paperwork easy thanks.
I would agree with the following additions:
The player's module (creating characters, etc) is free to anyone for any level of any character
The DMs module (monsters, encounter creation, etc) is paid (or subscription), and allows a DM to link all the player characters together.
All of the basic rules get published at the start, all at the same time. no parsing into "upgrades" that cost more after the fact |
global_01_local_0_shard_00000017_processed.jsonl/22578 | Take the 2-minute tour ×
Yogurt is produced by the fermentation of lactose in milk by the bacteria of yogurt-ferment. Without those bacteria it is not possible to make yogurt.
But surprisingly, water buffalo milk and lemon juice mixture turns into yogurt without any third ingredient. You may first boil the milk to sterilize it; the result doesn't change. The milk must be water buffalo milk, cow milk or another animal's milk doesn't make yogurt this way. One of my relatives made yogurt this way, so this is not a myth (if you didn't hear this before). Unfortunately I couldn't find an English recipe to share with you here.
Can you please explain to me this chemical phenomenon? Is fermentation involved in this process? Is this resulting "yogurt" actually a yogurt by definition in the perspective of cooking and chemistry?
share|improve this question
add comment
1 Answer
up vote 8 down vote accepted
This is not yogurt per definition, you are making a fresh cheese. You can actually use other types of milk for such a cheese, but the mouthfeel and taste will be very different and won't be as similar to yogurt.
There is a large class of acid-curdled cheeses, including paneer, tvorog, quark and many others. I don't know if yours has a specific name. I know that there are people who for some reason can't tell the difference in taste betwen quark and yogurt. But it is still cheese, even if it tastes similar to yogurt.
share|improve this answer
See en.wikipedia.org/wiki/Clabber_(food) for more on thick, soured milk. – Kate Gregory Sep 18 '12 at 17:56
@KateGregory Interesting. This "clabber" food is still a fermented product, so it falls under the class of yogurts. There is an error in the article; quark is not the spontaneously-soured milk, it is a cheese made by curdling this spontaneously-soured milk with additional acid (but no rennet). The soured milk itself is called simply Sauermilch. – rumtscho Sep 18 '12 at 18:03
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/22580 |
Jerry: "A lot of teams have worse offensive line than the Cowboys"
Discussion in 'Fan Zone' started by Apollo Creed, Nov 10, 2012.
1. Apollo Creed
Apollo Creed Stackin and Processin, Well
8,454 Messages
231 Likes Received
Jerry told the FAN, 'a lot of clubs wish they had a line playing as well as ours.'
Discuss, cause I don't even know what to say anymore.
2. Idgit
Idgit Ice up, son. Ice up! Staff Member
26,125 Messages
2,385 Likes Received
In terms of pass blocking, that's probably true.
3. Sarge
Sarge Red, White and Brew... Staff Member
20,317 Messages
1,179 Likes Received
You'd have a lot of people disagreeing with you here. Especially serious Romo backers.
4. Apollo Creed
Apollo Creed Stackin and Processin, Well
8,454 Messages
231 Likes Received
He makes them look much better than they really are. Romo has great pocket awareness and routinely evades free rushers.
If we had a pure pocket passer in there this group would be putting up David Carr sack numbers.
This group also doesn't see much blitz action because coordinators understand they can get pressure on Romo with just 4 guys, while dropping 7 guys and taking away the vertical passing game.
Means your QB has absolutely no running game, horrible pass protection, and is throwing the ball in incredibly tight windows. Makes your offense completely one dimensional, predictable, and ineffective particularly in the red/green zones where you need your line to convert short yardage and keep drives alive.
5. big dog cowboy
big dog cowboy THE BIG DOG Staff Member
46,412 Messages
1,473 Likes Received
Memo to Jerry: Yes it is.
If Romo weren't a Jedi Knight they would look like crap.
6. Hagman
Hagman Put Niland and Green in the ROH
1,272 Messages
0 Likes Received
Well, then, that settles that. If anyone knows about high quality football talent and performance it's Jerry Jones.
7. 17yearsandcounting
17yearsandcounting Well-Known Member
2,225 Messages
1,439 Likes Received
So is this him blaming Jason or what?
8. Apollo Creed
Apollo Creed Stackin and Processin, Well
8,454 Messages
231 Likes Received
Red could do something like ice his own kicker and Jerry wouldn't blame him. Wait a sec..
9. Sarge
Sarge Red, White and Brew... Staff Member
20,317 Messages
1,179 Likes Received
I agree. The mere fact that they are better at pass blocking than they are at run blocking says nothing. They are next to worthless with regard to run blocking.
I am not the biggest Romo fan, but he has made the OL look MUCH better than they actually are for as long as he's played. Not sure if Romo is the answer, but until and/or unless they address the OL adequately, we will never know.
10. Deep_Freeze
Deep_Freeze Well-Known Member
6,592 Messages
95 Likes Received
I always find the board spin to be interesting on the OL, I mean it has to be horrible if some of the agenda carriers say it is.....right. Nevermind that we are middle of the road in sacks given up or a player of the caliber of Aaron Rodgers has been sacked twice as much but is still producing.
Of course, the issue has to be the OL right, not that Romo has had a bad season and is holding the ball too long cause he doesn't trust his receivers, its all on the OL.....right. I mean, Romo is Houdini, better than any QB in the league at avoiding sacks, even a past league MVP in Rodgers...right.
Somehow, someway, it has to be seen that it isn't just the OL, especially when we are talking about pass protection this year. Sure, the OL could be better (especially in the running game), and anyone should want the best in the league in any position group on the team.
But the OL harping gets old when it ignores all the other problems on this team, and overdrafting or spending too many resources on that area won't just fix this team, we have alot more areas that need addressing also especially on a defense who couldn't cause a turnover if their life depended on it.
11. Risen Star
Risen Star Likes Collector Zone Supporter
18,513 Messages
3,477 Likes Received
Right on, Sarge. An absolutely pathetic run blocking line. Thank God for Romo's pocket presence or we'd be talking about the same type of pass blocking.
It is the worst OL I've seen here since Jimmy arrived.
12. Deep_Freeze
Deep_Freeze Well-Known Member
6,592 Messages
95 Likes Received
Yep, run blocking has been bad......except when Phil Costa was on the field when we ran for all those yards in Baltimore with any RB we plugged in. Costa has to be one of the most polarizing guys on this line, but what happens when he returns and if we can all of a sudden run the ball again.
Can one guy as average as Costa make 'the worst OL since Jimmy' that much better......or is it that your just overstating your opinion time and time again. Last year, we were pretty middle of the road when it came to rushing offense, now we are amongst the worse in the league. Excluding the tackles cause they are the same like the RBs, Livings and Berny are just as good as Holland and Kosier were last year respectively, the main difference is Costa (being hurt) and Cook.
How hard is it to make a leap and think......hey ding ding ding.....there might be something to that.
13. Numbers921
Numbers921 Benched
817 Messages
0 Likes Received
The only reason why the Cowboys ran all over the Ravens is because the Ravens are absolute trash on defense. It wasn't because of Costa. I hate that he got hurt. Not because he's good, but because now that's going to be used as the talking point to not upgrade there. He would've been exposed as the same awful center had he stayed healthy.
14. Joe Rod
Joe Rod When Keeping it Real Goes Wrong
8,123 Messages
323 Likes Received
Was he including college teams in that statement?
15. jnday
jnday Well-Known Member
5,012 Messages
420 Likes Received
Nah, this is Jerry's way of letting the fanbase know that he is not going to draft linemen. Expect more of the same.
16. Deep_Freeze
Deep_Freeze Well-Known Member
6,592 Messages
95 Likes Received
Interesting that you say that, cause similar could be said about Church. Was he just good for a game or two before he got exposed this year, or was he the real deal.
The difference is we will find out if Costa is trash or did he make a difference cause he will play again this year. Personally, I've never been a Costa fan, but when you look at the total picture of our rushing offense, its really just too hard to ignore. Funny thing is Murray could be back by the time Costa is back (if the team hasn't quit by then), so even if Costa makes a difference most will say its cause of Murray.
You still have to look at whats the difference from last year when it wasn't as much of a problem. Common sense should tell you the answer.
17. Wolfpack
Wolfpack Well-Known Member
2,435 Messages
149 Likes Received
Imagine what would happen if you put a Drew Bledsoe type behind this OL. It would be criminal. Romo is running for his life from pressure right up the middle most plays let alone the edge. The current right side of the line is horrible.
If Red were a more flexible offensive genius, he just start calling roll outs every play and make it easier on everyone.
18. Flinger
Flinger Active Member
768 Messages
33 Likes Received
Think about it for just a moment....
That is our GM speaking...
Words matter...
19. burmafrd
burmafrd Well-Known Member
39,948 Messages
637 Likes Received
NGATA sprained his MCL early in the game
So your claim that Costa was the difference is at least suspect
And considering who was running all over the Ravens D why does that make Costa good?
20. TheCount
TheCount Pixel Pusher
20,400 Messages
472 Likes Received
Says the guy who built the offensive line.
Share This Page |
global_01_local_0_shard_00000017_processed.jsonl/22581 |
Updated Mocks
Discussion in 'Draft Zone' started by austintodallas, Jan 27, 2006.
1. austintodallas
austintodallas Consider Yourself Sucked
2,413 Messages
1 Likes Received
Football's Future...updated 1/27
18. Dallas...Michael Huff
DraftShowcase...updated 1/26
18. Dallas...Marcus McNeill
Draft King...updated 1/25
18. Dallas...Eric Winston
Draft Ace...updated 1/24
18. Dallas...Ko Simpson
Lionbacker...updated 1/24
18. Dallas...Michael Huff
Huddle Geeks...updated 1/23
18. Dallas...Jonathan Scott
NFL Gurus...updated 1/23
18. Dallas...Winston Justice
2. cobra
cobra Salty Bastard
3,134 Messages
0 Likes Received
Thank you very much for this round-up!!!!
Draftking one is cracked out. DeAngelo going 4th and DeBrick going 9th!
DraftAce has us taking OTs in 1 and 2 and Stovall in the 3rd. Interesting theory.
I think Cutler will go higher than 16th, but if makes it to the Fins at 16, I think there is no doubt they finally take a legit QB.
Share This Page |
global_01_local_0_shard_00000017_processed.jsonl/22582 | package Graph::Layout::Aesthetic::Force::ParentLeft; use 5.006001; use strict; use warnings; our $VERSION = '0.02'; use base qw(Graph::Layout::Aesthetic::Force); __PACKAGE__->new->register; 1; __END__ =head1 NAME Graph::Layout::Aesthetic::Force::ParentLeft - Try to place parents to the left of their children =head1 SYNOPSIS use Graph::Layout::Aesthetic; $aglo = Graph::Layout::Aesthetic->new($topology); $aglo->add_force("ParentLeft", 1); =head1 DESCRIPTION This module provides an aesthetic force for use by the L. It's normally implicitly loaded by using L. The aesthetic force is that it tries to place parent nodes at least 5 to the left of child nodes. If nodes are placed so that this condition is not fulfilled, the nodes try to move left or right so it will be with a force that's quadratic in how much their distance on the x-axis is wrong. =head1 METHODS This class inherits from L and adds no methods of its own. =head1 EXPORT None. =head1 SEE ALSO L, L =head1 AUTHOR Ton Hospel, [email protected] =head1 COPYRIGHT AND LICENSE Copyright (C) 2004 by Ton Hospel This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself, either Perl version 5.6.1 or, at your option, any later version of Perl 5 you may have available. Much of the underlying L code is derived from C code copyrighted by D. Stott Parker, who released it under the GNU GENERAL PUBLIC LICENSE (version 1). =cut |
global_01_local_0_shard_00000017_processed.jsonl/22586 | Dan Walsh's Blog
Got SELinux?
Previous Entry Add to Memories Share Next Entry
Understanding SELinux
A colleague or mine, Andrew, was baffled by SELinux, He ran
sudo vpnc ./default.conf
And an SELinux denial message about vpnc_t trying to read a file labeled user_home_t. He did not understand what was going on.
Three people chimed in and gave him different ways to get around the SELinux denial.
The first advised to label the file etc_t
chcon -t etc_t ./default.conf
The second advised to build a custom policy using audit2allow.
grep vpnc /var/log/audit/audit.log | audit2allow -m myvpnc; semodule -i myvpnc.pp
The third advised the user to edit the file /etc/vpnc/default.conf instead of a local file in his home dir.
Andrew found all solutions worked, lets examine what is going on, and figure out which is the best solution.
When Andrew logs into the system, SELinux assigns him the default SELinux user unconfined_t. For the most part the unconfined user is allowed to do everything he can do if SELinux were disabled. Some commands that the unconfined_t user execute have transitions rules that say when the unconfined_t user executes programs labeled vpnc_exec_t they will transition to a label of vpnc_t. vpnc_t is a confined domain that is not allowed to read files in the users home directory, labeled user_home_t. Since ./defaults.conf was created in Andrews home directory, SELinux denies access.
In the first solution Andrew changed the label of the ./defaults.conf to etc_t, default label for files in /etc, since vpnc_t is allowed to read files labeled etc_t, vpnc worked and Andrew has not changed the protection level on vpnc, application. However Andrew now has a file in his home directory labeled etc_t. The default rule for files created in the home directory is to label files user_home_t, so there is a reasonably good change that Andrew might mistakenly create a new default.conf file with the wrong label and get frustrated by SELinux in the future.
The second solution was to use audit2allow to generate a new policy module to allow vpnc_t to read files labeled user_home_t. While this works, you have just lowered the security level of your system. By installing this policy you allow vpnc_t to read almost any file in your home directory. So if vpnc_t becomes compromised, the hacker will not be prevented by SELinux for reading most content in your home directory.
The third solution was to edit the files in the default location /etc/vpnc/default.conf. The default label for these files are etc_t, and the containing directories label is etc_t, so an administrator editing files in this directory would create files by default labeled etc_t, so it is unlikely they will get mislabeled. This is the solution that I would suggest, as best.
As I wrote in the blog
SELinux is all about labeling, and as long as the labelling is correct SELinux is happy, otherwise it will complain.
what about the 4th option?
2009-07-15 03:16 pm (UTC)
How about creating a label rule for ~/.vpnc.conf that labels it as vpnc_t which vpnc_exec_t is allowed to read. Then the user is advised to run restorecon, which is generally a safe and good idea, but also gets to have a per user vpnc config.
Re: what about the 4th option?
2009-07-15 03:58 pm (UTC)
You could add a rule for ~/vpnc.conf. But I guess you could argue this is option 1. You would not label it vpnc_t since this is a domain label and is not allowed to be placed on a file system. But you could label it etc_t and set up a label for it.
I guess the option you are suggesting is
# cat myvpnc.te
policy_module(myvpnc, 1.0)
type vpnc_t;
type vpnc_home_t;
read_files_pattern(vpnc_t, vpnc_home_t, vpnc_home_t)
# cat myvpnc.fc
HOME_DIR/vpnc.conf gen_context(system_u:object_r:vpnc_home_t,s0)
# semodule myvpnc.pp
# restorecon ~dwalsh/vpnc.conf
SELinux many ways to solve the same problem. Some more secure then others.
Re: what about the 4th option?
2009-07-16 10:26 am (UTC)
I guess the good solution also is just create /etc/vpnc/user.conf and set user or group write permitions for it. But this solution is on another level :-)
You are viewing danwalsh |
global_01_local_0_shard_00000017_processed.jsonl/22595 | Joystick EdgeWrite
Joystick EdgeWrite (updated February 2012)
Joystick EdgeWrite is designed for use with any DirectX-compatible joystick. It is best used, however, with joytsicks that have square areas bounding their sticks. Examples of such joysticks are the Logitech® Cordless Rumblepad™ 2, the Logitech® Rumblepad™ 2 Vibration Feedback Gamepad, the Logitech® Dual Action™ Gamepad, the Saitek™ P880 Dual Analog Gamepad, and the Saitek™ P2500 Rumble Gamepad.
Key Publications: CHI'04, GI'04
Language: C#, SlimDX
Requirements: PC joystick, .NET 2.0 Framework (or later), SlimDX .NET 2.0 End User Runtime.
Download version 3.5.2
Can be augmented with word-level stroking. |
global_01_local_0_shard_00000017_processed.jsonl/22596 | Discussion Board
Results 1 to 2 of 2
1. #1
Registered User
Join Date
Apr 2009
Bluetooth Console Problem
I'm writing an application , in which I'm using a canvas. As you know they can be tricky to debug, so I wanted to use the bluetooth console to assist me (as I've done in the past). For some strange reason I can't execute my script.
Traceback (most recent call last):
File "<console>", line 1, in ?
IOError: [Errno 2] No such file or directory: 'e:\\python\canvasapp.py'
However, calling the script from the Options - Run script menu works and the script is in the e:\\python directory. Other scripts, which I've written in the past, execute without a problem from the bluetooth console.
It seems that I can't call execfile on any new scripts I transfer to the E:\python directory using Nokia PC Suite. Anybody else encountered this problem? Any help would be greatly appreciated.
2. #2
Nokia Developer Moderator
Join Date
May 2007
21.46 N 72.11 E
Re: Bluetooth Console Problem
Have you tried placing the scripts in C:\Python folder - if it works?
Pankaj Nathani
Similar Threads
1. Bluetooth Connection Problem
By atonical in forum Symbian C++
Replies: 4
Last Post: 2008-11-28, 12:20
2. Q: Problem with Nokia PC Suite and Bluetooth
By Juha_74 in forum General Development Questions
Replies: 0
Last Post: 2007-03-13, 14:32
3. Bluetooth serviceDiscover problem Device Not Reachable
By kashifqazi in forum Bluetooth Technology
Replies: 1
Last Post: 2006-10-13, 13:31
4. Nokia SDK Bluetooth service re-discovery problem, Help Me!:(
By tomsonxu in forum Mobile Java Tools & SDKs
Replies: 0
Last Post: 2005-11-08, 08:39
Posting Permissions
• You may not post new threads
• You may not post replies
• You may not post attachments
• You may not edit your posts |
global_01_local_0_shard_00000017_processed.jsonl/22610 |
amnestic [am-nes-tik] , adjective Unabridged
Cite This Source Link To amnesia
World English Dictionary
amnesia (æmˈniːzjə, -ʒjə, -zɪə)
[C19: via New Latin from Greek: forgetfulness, probably from amnēstia oblivion; see amnesty]
adj, —n
adj, —n
Collins English Dictionary - Complete & Unabridged 10th Edition
Cite This Source
Word Origin & History
"loss of memory," 1786, coined from Gk. amnesia "forgetfulness," from a-, privative prefix, "not" + mimneskesthai "to recall, cause to remember," a reduplicated form related to Gk. mnemnon "mindful," mneme "memory," mnasthai "to remember;" from PIE base *men- "to think, remember" (see mind (n.)).
Online Etymology Dictionary, © 2010 Douglas Harper
Cite This Source
American Heritage
Medical Dictionary
amnesia am·ne·sia (ām-nē'zhə)
The loss or impairment of memory.
The American Heritage® Stedman's Medical Dictionary
Cite This Source
American Heritage
Science Dictionary
amnesia (ām-nē'zhə) Pronunciation Key
The American Heritage® Science Dictionary
Cite This Source
American Heritage
Cultural Dictionary
amnesia [(am-nee-zhuh)]
The American Heritage® New Dictionary of Cultural Literacy, Third Edition
Copyright © 2005 by Houghton Mifflin Company.
Published by Houghton Mifflin Company. All rights reserved.
Cite This Source
Example sentences
Amnesia is still popular in the movies, as it always has been.
It is a good natured article about faith based amnesia.
He developed a syndrome neurologists call profound amnesia.
Now, that is what one could call quite an amazing case of amnesia.
Related Words
Copyright © 2014, LLC. All rights reserved.
• Please Login or Sign Up to use the Recent Searches feature |
global_01_local_0_shard_00000017_processed.jsonl/22613 |
1510–20; origin uncertain Unabridged
Cite This Source Link To jerkin
World English Dictionary
jerkin (ˈdʒɜːkɪn)
1. a sleeveless and collarless short jacket worn by men or women
2. a man's sleeveless and collarless fitted jacket, often made of leather, worn in the 16th and 17th centuries
[C16: of unknown origin]
Collins English Dictionary - Complete & Unabridged 10th Edition
Cite This Source
Word Origin & History
1519, of uncertain origin, perhaps related to Du. jurk "a frock," but this is a modern word, itself of unknown origin.
Online Etymology Dictionary, © 2010 Douglas Harper
Cite This Source
Example sentences
And his nakedness is ofttimes so much, as many times a leather jerkin gashed serves him at once for a shirt and ornament.
Related Words
Copyright © 2014, LLC. All rights reserved.
• Please Login or Sign Up to use the Recent Searches feature |
global_01_local_0_shard_00000017_processed.jsonl/22625 | XML data types and operators
To see a list of the versions of the JAXP implementation and of Apache Xalan that have been tested with Derby XML support, see to the Derby release notes. The release notes are available from the Apache Derby Downloads page.
Note: Most Java virtual machines (JVMs) that are version 1.4 or later have a JAXP parser embedded in the JVM. If you are using one of these JVMs, you do not need to add any other JAXP classes to your classpath. Additionally, if the JVM that you are using includes an embedded version of Xalan, you should confirm that the version of Xalan satisfies the minimum requirements for Derby. For example, if your JVM is Sun JDK 1.4.2, you must override the version of Xalan in the JVM with a newer version. Use Java's Endorsed Standards Override Mechanisms described at http://java.sun.com/j2se/1.4.2/docs/guide/standards/ to override the version of Xalan.
If the JVM that you are using does not have a JAXP parser or a version of Xalan, you can add external versions of those classes in your classpath and Derby will pick up those classes. |
global_01_local_0_shard_00000017_processed.jsonl/22634 | From Wikipedia, the free encyclopedia
Jump to: navigation, search
Introduced 1995
TLD type Country code top-level domain
Status Active
Intended use Entities connected with Uzbekistan
Actual use Popular in Uzbekistan, Latvia
Structure Registrations are directly at the second level; some third-level registrations also exist
Documents IANA redelegation report
Website cctld.uz
In Latvia, .uz is used as short-link address - ej.uz, which means "go to".[citation needed]
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/22635 | German Football League
From Wikipedia, the free encyclopedia
(Redirected from American Football Bundesliga)
Jump to: navigation, search
German Football League
Formerly American Football Bundesliga
Sport American football
Founded 1979
No. of teams 16
Country Germany
Most recent champion(s) New Yorker Lions
Most titles New Yorker Lions (8)
Official website
The German Football League (GFL) is the elite league for American football in Germany. Playing rules are based on those of the American NCAA.
In 1999, the league, previously called the American Football Bundesliga and formed in 1979, adopted the name German Football League.[1]
League set-up[edit]
German federal states with GFL teams in 2012.
The GFL is partitioned into north and south conferences, each with eight teams. In each conference, every team plays against every other team of its own conference, both at home and away. Until 2011, each team also played home and away interconference games against the team from the opposing conference that finished the previous season on the same rank. However, this was abandoned with the league expansion to 16 teams. After the end of the regular season, four teams from both conferences enter the playoffs, to determine the German championship. The winner of a conference plays against the 4th place team of the other group, second against third of the other conference. The final is called the German Bowl. The lowest ranked team of each conference plays against the winner of the second division, and may be relegated if they lose.
The league has been expanded from 12 to 14 teams for the 2011 season. It is planned to further increase the number of teams to 16 in 2012.[2]
Below the GFL sits the GFL 2, formerly the 2nd Bundesliga, which was formed in 1982.[3] It is also divided into a northern and southern division, with eight teams in each. For the 2011 season, both the northern and the southern champions are promoted, while the runners-up of the two divisions will play the last placed team in the GFL division above for another spot in the league in 2012.[2]
For most of its history, the GFL has been divided into a northern and southern division. Only in 1979 was it played in single division format, while, from 1986 to 1990, it was divided into four regional divisions.
As of 2010, the Munich Cowboys have played more GFL games than any other team, 335, followed by the Berlin Adler with 312, the only other team with more than 300 league games. The Cowboys have played 29 out of a possible 32 seasons at the highest level of the game in Germany, more than any other club.[4]
Early years[edit]
The history of American football in Germany, outside the US Army bases in the country, began in 1977, when the Frankfurter Löwen were formed as the first club to play the game in Germany. At first, this team was only able to play US Army teams, lacking German opposition.[1] In March 1979, the AFBD, the American Football Federation of Germany (German: American Football Bund Deutschland), was formed, the first of its kind in Europe. This organisation, in 1982, was replaced by the AFVD, the American Football Association of Germany (German: American Football Verband Deutschland).[5]
In 1979, the American Football Bundesliga, later to be renamed the German Football League,[6] was formed, consisting of six clubs, the Frankfurter Löwen, Ansbach Grizzlies, Düsseldorf Panther, Munich Cowboys, Berlin Bears and Bremerhaven Seahawks.[1] Of those six, the top two teams would contest the first ever German Bowl on 10 November 1979.[3] The first-ever league game was held on 4 August 1979, played between the Frankfurter Löwen and the Düsseldorf Panther, and ended in a victory for Frankfurt.[5]
The league saw a split in its second and third season, with Düsseldorf and Bremerhaven leaving the competition to take part in a separate, short-lived competition, the Nordwestdeutsche Football-Liga – NFL.[7] By 1981, the Bundesliga was expanded to two regional divisions of seven clubs each.[3] The early years of the league were dominated by two teams, Frankfurt and Ansbach, who met each other in the first three editions of the German Bowl. Of those, Frankfurt won the first two, remaining unbeaten in 1979, and Ansbach the last. The era of the Frankfurter Löwen was hereby ended and the club went defunct in the mid-1980s, while the Ansbach Grizzlies continued to be an outstanding team, playing in all of the first eight German Bowls.[8] Unlike the first season, play-off semi finals were played in 1980 and 1981 to determine the two German Bowl contestants. From 1982, the play-offs were enlarged to include a quarter final round as well.[3]
Ansbach vs Düsseldorf era[edit]
The 1982 season, which saw Ansbach repeat its title, remaining unbeaten all season, this time against the Cologne Crocodiles, saw an increase of clubs to fifteen, including the two break-away clubs Düsseldorf and Bremerhaven.[3] After that, the era of the Düsseldorf Panther versus Ansbach Grizzlies rivalry began, with the two teams meeting in the next four finals. Of those, the team from Düsseldorf won the 1983, 1984 and 1986 editions, while the Grizzlies earned their third championship in 1985. With the Panthers in 1983 and 1986 and the Grizzlies in 1985, both teams were able to win the title without a loss all season. With the 1986 final, the golden era of the Ansbach Grizzlies ended and the club disappeared out of the top level all together by 1991.[8]
League expansion 1986 to 1990[edit]
From 1986, a wild card round was introduced in the play-offs, taking the number of teams in the play-offs to twelve. The league had now expanded to 24 teams, divided into four divisions. Two of those were in the north, one in the south and the fourth one in Central Germany.[3]
The 1987 German Bowl saw two completely new teams compete against each other, the Badener Greifs making their only appearance in the championship game to date, while the Berlin Adler won their first of, as of 2010, six national championships. Both teams went into the German Bowl without a defeat all season. In 1988, Red Barons Cologne defeated the Düsseldorf Panther in the final, while, from 1989 onwards, the Berlin Adler became the first team to win three championships in a row, all against teams from Cologne. The Adler also managed to remain unbeaten in 1989 and 1990 and only suffered one defeat in 1991, at home against the Cologne Crocodiles.[8] After the 1990 season, the play-offs were reduced to eight teams again, dropping the wild card round, a system still in place as of 2010. The league, which had peaked at 26 clubs in four regional divisions in 1990, was reduced to the two-divisional format, with eight teams per division.[3]
Düsseldorf Panther era[edit]
The Panther earned their fourth title in 1992, defeating the Munich Cowboys, which, in the following year, won the championship themselves, against Cologne Crocodiles, who suffered their fourth defeat in their fourth German Bowl. Munichs title in an undefeated 1993 season was to be the last occasion for the next twelve years that a team from the South would reach the final, and the last time until 2011, that a team from the South would win the championship. The Bundesliga and the German Bowl were from now on dominated by the North.[8] After the 1993 season, still contested with 16 clubs, the number of clubs was gradually reduced further. In 1994, 14 clubs in two divisions of seven competed in the league, from 1995, the division strength was reduced to six. For the next 16 seasons, six teams per division was the set number, with occasional seasons going underway in reduced strength because of late withdrawals. Also, an inter conference round was introduced in 1994, with teams from different divisions now meeting for the first time during the regular season.[3]
In 1994 and 1995, the Düsseldorf Panther once more won the German Bowl, with the second title won against a new force in the game in Germany, the Hamburg Blue Devils. In 1996, the Blue Devils then reversed the fortunes and defeated the Panthers in the final.[8]
Braunschweig Lions vs Hamburg Blue Devils era[edit]
The most dominant era of any team in German football begun in 1997, when the Braunschweig Lions reached and won the German Bowl for the first time. The Lions would play in every one of the next twelve German Bowls, up until 2008, and win seven of those. Their first title, in 1997, was won against the Cologne Crocodiles, who were now five out five in German Bowl defeats. The following six seasons, the final was contested by the Lions and the Blue Devils on five occasions, with the Lions winning in 1998 and 1999, while the Blue Devils won 2001, 2002 and 2003. Only in 2000 did neither of those two win the Bowl, instead, the Cologne Crocodiles finally reversed their fortunes and won a championship in their sixth attempt.[8] In between, in 1999, the Bundesliga was renamed to German Football League.[1] In 2002, the league also lost its longest-serving founding member, the Munich Cowboys suffering relegation for the first time, alongside another one of the "original six", the Düsseldorf Panther, who had however missed the 1980 and 1981 seasons because of the league split.[3]
Braunschweig lost a fifth final in a row in 2004, when the Berlin Adler won their first title in 13 years. After this, the Braunschweig Lions set a new record, winning four German Bowls straight, beating four different teams in the finals. In 2005, the Blue Devils were once more the opposition, followed by two southern teams, the Marburg Mercenaries in 2006 and the Stuttgart Scorpions in 2007, in an unbeaten season for the Lions. The last title for the Lions came in 2008, against the new force of the Kiel Baltic Hurricanes.[8]
Kiel also played in the 2009 final, losing to the Berlin Adler, before finally being successful in 2010 and winning their first title against the same team.[8]
In 2011, the league season has been expanded from 72 to 98 games because of the enlargement of the league. It also saw the end of an 18-year title draught for the south, when the Schwäbisch Hall Unicorns defeated Kiel 48-44 to take out the national championship for the first time.[9][10]
For the 2012 season, the Mönchengladbach Mavericks, runners-up in the northern division in 2011, were refused a licence,[11] leaving an extra spot in the league which was awarded to the Lübeck Cougars. The Schwäbisch Hall Unicorns repeated their 2011 success and once more defeated the Kiel Baltic Hurricanes in the German Bowl, becoming the first team from the south to win back-to-back championships since the 1982 Ansbach Grizzlies.
The 2013 season saw a return to northern dominance with all four southern teams knocked ot in the quarter finals and the German Bowl contested by the revived Braunschweig Lions, now as the New Yorker Lions, and the Dresden Monarchs who made their first appearance in the championship final, with the Lions winning their eighth German Bowl.
North-South disparity[edit]
Success in American football in Germany and at the German Bowl differs hugely between the clubs from the northern and the southern division, with the south only winning seven German Bowls and the north the remaining 26. Similar, southern clubs have only made 17 appearances in the Bowl, while northern clubs have appeared 49 times. After the first three German Bowls, the final was never again contested by two southern clubs. Since the end of the golden era of the Ansbach Grizzlies in 1986, southern clubs have only made six appearances in the championship game and suffered a championship draught from 1993 to 2011.[8]
Restrictions on foreign players[edit]
As a sign of the strong influence of Americans in the game in Germany, upon formation of the Bundesliga in 1979, there was no restriction on how many foreigners a team could field. The only stipulation was, that every team had to field a minimum of three German nationals at any time. Soon, this changed, and the allowed number of foreigners on the field for a team at any given time, in this case specifically, Americans, was reduced to five.[5]
In 1982, this number was reduced to four, in 1983 to three and, by 1986, only two were allowed on the field for a team at any given time.[5]
In November 2010, a new Bundesspielordnung, the rule book of American football in Germany, was published. One major change was that the sport now placed citizens of European Union countries on equal footing with German nationals, meaning, restrictions on the number of these players per team on the field were now not in place anymore. However, the restrictions on non-EU nationals remained in place, unless those players could prove that they had spent at least three years playing for a youth team in the sport in Germany.[12]
For the 2011 season, a club can sign up up to ten non-EU players, have six of those on the line-up for any given game but only two of those on the field at any given time. These restrictions are specifically in place for US, Canadian, Mexican and Japanese citizens and, on request, exemptions can be made for players from countries without established structures in the sport. This rule is designed to prevent an advantage to the wealthier clubs, who could otherwise recruit a large number of players from the traditional American football countries.[13]
GFL Teams in 2014[edit]
GFL North[edit]
Team City Stadium Capacity
Berlin Adler Berlin Friedrich-Ludwig-Jahn-Sportpark 20,000
Berlin Rebels Berlin Mommsenstadion 15,005
Dresden Monarchs Dresden Heinz-Steyer-Stadion 3,000
Düsseldorf Panther Düsseldorf Stadion des VfL Benrath 14,360
Hamburg Blue Devils Hamburg Adolf-Jäger-Kampfbahn 8,000
New Yorker Lions Braunschweig Eintracht-Stadion 25,500
Kiel Baltic Hurricanes Kiel Kilia-Stadion 3,000
Cologne Falcons Cologne Südstadion 12,000
GFL South[edit]
Team City Stadium Capacity
Allgäu Comets Kempten Illerstadion 4,500
Franken Knights Rothenburg Städtisches Stadion 3,500
Marburg Mercenaries Marburg Georg-Gaßmann-Stadion 12,000
Munich Cowboys Munich Dantestadion 18,000
Rhein-Neckar Bandits Mannheim MTG-Stadion 6,000
Saarland Hurricanes Saarbrücken Ludwigsparkstadion 35,303
Schwäbisch Hall Unicorns Schwäbisch Hall Hagenbachstadion 2,200
Stuttgart Scorpions Stuttgart Gazi-Stadion auf der Waldau 12,000
German Bowls[edit]
German Bowl participants since 1979:[8]
App. Team Wins Losses Winning percentage Season(s)
13 New Yorker Lions 8 5 .615 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2013
9 Düsseldorf Panther 6 3 .667 1983, 1984, 1985, 1986, 1988, 1992, 1994, 1995, 1996
8 Berlin Adler 6 2 .750 1987, 1989, 1990, 1991, 1994, 2004, 2009, 2010
8 Hamburg Blue Devils 4 4 .500 1995, 1996, 1998, 1999, 2001, 2002, 2003, 2005
8 Ansbach Grizzlies 3 5 .375 1979, 1980, 1981, 1982, 1983, 1984, 1985, 1986
6 Cologne Crocodiles 1 5 .167 1982, 1990, 1991, 1993, 1997, 2000
5 Kiel Baltic Hurricanes 1 4 .200 2008, 2009, 2010, 2011, 2012
3 Frankfurter Löwen 2 1 .667 1979, 1980, 1981
2 Schwäbisch Hall Unicorns 2 0 1.000 2011, 2012
2 Red Barons Cologne 1 1 .500 1988, 1989
2 Munich Cowboys 1 1 .500 1992, 1993
1 Badener Greifs 0 1 .000 1987
1 Marburg Mercenaries 0 1 .000 2006
1 Stuttgart Scorpions 0 1 .000 2007
1 Dresden Monarchs 0 1 .000 2013
• Bold denotes German Bowl victory.
• Known as the "Braunschweig Lions" from 1987 to 2010.
GFL season placings[edit]
The placings in the league since the renaming of the league to GFL after the 1999 season:[3][14][15][16][17][18][19]
GFL North 00 01 02 03 04 05 06 07 08 09 10 11 12 13
New Yorker Lions 2 2 1 1 1 1 1 1 2 5 4 6 6 1
Dresden Monarchs 4 3 3 3 6 5 3 3 5 3 2
Kiel Baltic Hurricanes 4 6 6 3 1 2 1 1 1 3
Berlin Adler 4 3 2 4 5 2 3 1 2 4 2 4
Berlin Rebels 6 5 5
Hamburg Blue Devils 5 1 2 2 4 2 2 4 4 7 6
Düsseldorf Panther 3 3 5 6 6 3 4 7
Cologne Falcons 5 4 5 6 8
Lübeck Cougars 8
Mönchengladbach Mavericks 2
Assindia Cardinals 5 5 6 4 5 7
Hannover Musketeers 6
Cologne Crocodiles 1 4 3 5
GFL South 00 01 02 03 04 05 06 07 08 09 10 11 12 13
Schwäbisch Hall Unicorns 4 4 3 2 2 3 3 5 1 2 1 1 1
Marburg Mercenaries 6 1 1 1 2 1 2 1 2 3 2
Munich Cowboys 1 1 6 5 6 3 6 5 4 8 3
Rhein Neckar Bandits 2 4
Saarland Hurricanes 5 5 5 5 4 5 6 6 7 5
Stuttgart Scorpions 4 2 2 4 3 3 2 1 2 3 4 3 4 6
Franken Knights 3 6 3 2 4 5 7
Wiesbaden Phantoms 5 6 8
Plattling Black Hawks 5 3 7
Weinheim Longhorns 4 4 4 6
Darmstadt Diamonds 4 5 6
Rhein Main Razorbacks 2 3 1 1
Aschaffenburg Stallions 5
Landsberg Express 6
GFL Champions GFL Runners up Divisional champion
• In 2000, the northern division consisted of only five clubs.
• In 2005 and 2006, the southern division consisted of only five clubs.
Divisional champions[edit]
This is a list of the winners of the regional divisions of the GFL. A record nine divisional titles were won by the Berlin Adler and Düsseldorf Panther each, while the Ansbach Grizzlies still hold the record for division titles in the south, seven, despite not having competed in the league for twenty years:[3]
Year North South
1979 Frankfurter Löwen
1980 Frankfurter Löwen Hanau Hawks
1981 Frankfurter Löwen Ansbach Grizzlies
1982 Cologne Crocodiles Ansbach Grizzlies
1983 Düsseldorf Panther Ansbach Grizzlies
1984 Düsseldorf Panther Ansbach Grizzlies
1985 Düsseldorf Panther Ansbach Grizzlies
Year North A North B Central South
1986 Düsseldorf Panther Berlin Adler Badener Greifs Ansbach Grizzlies
1987 Düsseldorf Panther Berlin Adler Badener Greifs Noris Rams
Year North A North B South A South B
1988 Düsseldorf Panther Berlin Adler Bad Homburg Falken Ansbach Grizzlies
1989 Red Barons Cologne Berlin Adler Badener Greifs Noris Rams
1990 Düsseldorf Panther Berlin Adler Badener Greifs Munich Cowboys
Year North South
1991 Berlin Adler Noris Rams
1992 Berlin Adler Munich Cowboys
1993 Cologne Crocodiles Munich Cowboys
1994 Berlin Adler Munich Cowboys
1995 Düsseldorf Panther Hanau Hawks
1996 Düsseldorf Panther Noris Rams
1997 Hamburg Blue Devils Hanau Hawks
1998 Braunschweig Lions Stuttgart Scorpions
1999 Braunschweig Lions Rüsselsheim Razorbacks
2000 Cologne Crocodiles Munich Cowboys
2001 Hamburg Blue Devils Munich Cowboys
2002 Braunschweig Lions Rhein Main Razorbacks
2003 Braunschweig Lions Rhein Main Razorbacks
2004 Braunschweig Lions Marburg Mercenaries
2005 Braunschweig Lions Marburg Mercenaries
2006 Braunschweig Lions Marburg Mercenaries
2007 Braunschweig Lions Stuttgart Scorpions
2008 Kiel Baltic Hurricanes Marburg Mercenaries
2009 Berlin Adler Schwäbisch Hall Unicorns
2010 Kiel Baltic Hurricanes Marburg Mercenaries
2011 Kiel Baltic Hurricanes Schwäbisch Hall Unicorns
2012 Kiel Baltic Hurricanes Schwäbisch Hall Unicorns
2013 New Yorker Lions Schwäbisch Hall Unicorns
European Football League participation[edit]
Since the inception of the Eurobowl in 1986, German clubs have taken part in the competition in most seasons. In most cases, the German Bowl winner of the previous season was qualified. In some seasons more than one German club took part in the competition. On seven occasions clubs from Germany have won the Eurobowl. The participations of German clubs at the European Football League:[20]
Year Club Progress
1986 Ansbach Grizzlies Lost QF: United Kingdom Birmingham Bulls (18–29)
1987 not held
1988 Berlin Adler Lost SF: Netherlands Amsterdam Crusaders (28–29)
1989 Red Barons Cologne Lost SF: Italy Legnano Frogs (15–49)
1990 Berlin Adler Lost SF: United Kingdom Manchester Spartans (33–35)
1991 Berlin Adler Lost EB: Netherlands Amsterdam Crusaders (20–21)
1992 Berlin Adler Lost QF: Italy Torino Giaguari (13–35)
1993 Düsseldorf Panther Lost Qual.: United Kingdom London Olympians (29–32)
1994 Munich Cowboys Lost SF: Italy Bergamo Lions (18–25)
1995 Düsseldorf Panther Won EB: United Kingdom London Olympians (21–14)
1996 Hamburg Blue Devils Won EB: France Aix-en-Provence Argonauts (21–14)
Düsseldorf Panther Lost QF: France Aix-en-Provence Argonauts (27–28) a.e.t.
Berlin Adler Lost QF: Italy Legnano Frogs (13–45)
1997 Hamburg Blue Devils Won EB: Italy Phoenix Bologna (35–14)
1998 Hamburg Blue Devils Won EB: France La Courneuve Flash (38–19)
Braunschweig Lions Lost SF: Germany Hamburg Blue Devils (14–24)
1999 Braunschweig Lions Won EB: Germany Hamburg Blue Devils (27–23)
Rüsselsheim Razorbacks Lost Qual.: Czech Republic Prague Panthers (21–26)
Cologne Crocodiles Lost Qual.: Italy Bergamo Lions (17–41)
2000 Hamburg Blue Devils Lost EB: Italy Bergamo Lions (20–42)
Cologne Crocodiles Lost SF: Italy Bergamo Lions (56–62) a.e.t.
Braunschweig Lions Lost QF: Germany Cologne Crocodiles (15–24)
2001 no participation
2002 Braunschweig Lions Lost EB: Italy Bergamo Lions (20–27)
2003 Braunschweig Lions Won EB: Austria Chrysler Vikings Vienna (21–14)
2004 no participation
2005 no participation
2006 Braunschweig Lions Knocked out in group stage
Hamburg Blue Devils Knocked out in group stage
2007 Marburg Mercenaries Lost EB: Austria Dodge Vikings Vienna (19–70)
2008 Stuttgart Scorpions Lost QF: Austria Graz Giants (9–24)
2009 Braunschweig Lions Lost QF: Austria Tirol Raiders (7–35)
Berlin Adler Knocked out in group stage
2010 Berlin Adler Won EB: Austria Vienna Vikings (34–31)
2011 Berlin Adler Lost EB: Austria Swarco Raiders Tirol (12-27)
Kiel Baltic Hurricanes Knocked out in group stage
2012 Berlin Adler Lost SF: Austria Vienna Vikings (7–34)
Schwäbisch Hall Unicorns Lost QF: Austria Vienna Vikings (13–25)
2013 Berlin Adler Lost SF: Austria Vienna Vikings (17–41)
Schwäbisch Hall Unicorns Lost QF: Switzerland Calanda Broncos (28–42)
• Qual. = Qualifying round
• QF = Quarter finals
• SF = Semi finals
• EB = European Bowl
1. ^ a b c d Geschichte (German) AFVD website, accessed: 29 December 2010
2. ^ a b Spielplan der GFL für 2011 steht (German) GFL website, published: 8 December 2010, accessed: 29 December 2010
3. ^ a b c d e f g h i j k Football History(German) Historic American football tables from Germany, accessed: 2 January 2010
4. ^ Ewige Bundesligatabelle (German) Historic tables of American football in Germany, accessed: 3 January 2011
5. ^ a b c d Google book review: Turnen and sport: transatlantic transfers author: Annette R. Hofmann, accessed: 12 January 2010
6. ^ GFL German Football League (German) AFVD website, accessed: 29 December 2010
7. ^ TEAMGEIST – STOLZ – ENTHUSIASMUS (German) Düsseldorf Panther website – Club history, accessed: 3 January 2010
8. ^ a b c d e f g h i j Bowls GFL website, accessed: 29 December 2010
9. ^ Unicorns gewinnen German Bowl XXXIII (German) GFL website, published: 8 October 2011, accessed: 12 October 2011
10. ^ Erfolg dank Goethe (German) Sueddeutsche Zeitung, published: 10 October 2011, accessed: 12 October 2011
11. ^ Mavericks - Ende eines Football-Märchens (German) Westdeutsche Zeitung, published: 23 December 2011, accessed: 8 January 2012
12. ^ Neue Bundesspielordnung (German) AFVD website, published: 3 November 2010, accessed: 14 January 2011
13. ^ Bundesspielordnung (German) Official rules of the game in Germany, published: 31 October 2010, accessed: 14 January 2011
14. ^ GFL 2008, accessed: 2 January 2011
15. ^ GFL 2009, accessed: 2 January 2011
16. ^ GFL 2010, accessed: 2 January 2011
17. ^ GFL 2011, accessed: 13 September 2012
18. ^ GFL 2012, accessed: 13 September 2012
19. ^ GFL 2013, accessed: 9 October 2013
20. ^ Eurobowl (German) Historic tables of American football in Germany, accessed: 7 January 2011
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/22636 | Aquamole Pot
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Aquamole Pot
Map showing the location of Aquamole Pot
Aquamole Pot
Location West Kingsdale, North Yorkshire, UK
OS grid SD 69926 78338
Coordinates 54°12′00″N 2°27′45″W / 54.199909°N 2.46249°W / 54.199909; -2.46249Coordinates: 54°12′00″N 2°27′45″W / 54.199909°N 2.46249°W / 54.199909; -2.46249
Depth 113 metres (371 ft)
Length 142 metres (466 ft)
Discovery 1974
Geology Limestone
Entrances 2
Access Free
Cave survey
BRAC grade 4B
Aquamole Pot is a cave in West Kingsdale, North Yorkshire, England. It was originally explored from below by cave divers who had negotiated 550 feet (170 m) of sump passage from Rowten Pot in 1974, to discover a high aven above the river passage.[1]
The 130 feet (40 m) aven was scaled in 1980 using poles, ladders and hand bolting kits, and a radio location transmitter placed at the highest point. Having discovered it was 180 feet (55 m) from, and 180 feet (55 m) below Jingling Pot, the aven was renamed Aquamole Aven instead of Jingling Avens.[2]
Work restarted in 2000 when divers who were keen on a quick route to the sump beyond, rescaled the avens to a higher point, and radio located a position to 50 feet (15 m) below the moor. It was finally connected to the surface in June 2002.[3]
1. ^ Geoff Yeaden (July 1974). "Kingsdale master cave, Yorkshire". Cave diving group newsletter (New series No.32): page 16–18.
2. ^ Ian Watson (April 1980). "Kingsdale master cave, Yorkshire, Jingling Avens, Late reports". Cave diving group newsletter (New series No.59): page 12–13.
3. ^ Rupe Skorupka (October 2002). "A Pot Into Aquamole". Descent (magazine) (168): page 20–22. ISSN 0046-0036.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/22637 | Bailey v. Alabama
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Bailey v. Alabama
Seal of the United States Supreme Court.svg
Submitted October 20, 1910
Decided January 3, 1911
Full case name Alonzo Bailey, Plaintiff in Error, v. State of Alabama
Citations 219 U.S. 219 (more)
29 S. Ct. 141; 53 L. Ed. 278; 219 U.S. 219 (1911)
Prior history Error to the Supreme Court of Alabama
Court membership
Case opinions
Majority Hughes, joined by Harlan, Day, White, McKenna, Moody
Dissent Holmes, joined by Lurton
Bailey v. Alabama, 219 U.S. 219 (1911), was a United States Supreme Court case which overturned the peonage laws of Alabama.[1]
The Supreme Court considered the validity of the Alabama state court’s ruling that Alabama statute (§ 4730 of the Code of Alabama of 1896, as amended in 1903 and 1907) was constitutional. The law read:[2]
"Any person who, with intent to injure or defraud his employer, enters into a contract in writing for the performance of any act of service, and thereby obtains money or other personal property from such employer, and with like intent, and without just cause, and without refunding such money, or paying for such property, refuses or fails to perform such act or service, must on conviction be punished. . . “[3]
Alonzo Bailey was an African American from Alabama who agreed to work for The Riverside Company for one year at $12 per month. He received an advance of $15. After working for a little over a month he stopped work, but did not refund any money. According to Alabama law such refusal to work and refund the money was prima facie evidence of intent to defraud. The evidence presented against Bailey at trial was testimony that he stopped working, without cause, failed to repay the $15 advanced to him and that he was a Negro.
The United States Supreme Court found that holding a person criminally liable for taking money for work not performed was akin to indentured servitude, outlawed by the Thirteenth Amendment, insofar as it required that person to work rather than be found guilty of a crime.
Opinion of the Court[edit]
The Supreme Court began its majority analysis, written by Associate Justice Charles Evans Hughes, by dismissing any importance of fact that the plaintiff was a black man. The Court then analyzed the statute at issue using the Alabama Supreme Court’s decision in Ex Parte Riley, 94 Ala. 82 (1892) and stated “[t]o justify conviction, it was necessary that this intent should be established by competent evidence, aided only by such inferences as might logically be derived from the facts proved, and should not be the subject of mere surmise or arbitrary assumption.” [4] However, after the 1903 amendment to the Alabama law at issue here, the prosecution no longer had to prove intent to injure or defraud. The Court took issue with that change stating:
"[w]hatever the reason for leaving the service, if, judged by the terms of the contract, it is insufficient in law, it is not ‘just cause.’ The money received and repayable, nothing more being shown, constitutes a mere debt. The asserted difficulty of proving the intent to injure or defraud is thus made the occasion for dispensing with such proof, so far as the prima facie case is concerned.“[5]
The Court continued by stating that without the inference created by statute in this case, Bailey would not have been convicted. The Court then turned to the constitutionality of compulsory service as required by the law.
[A]lthought the statute in terms is to punish fraud, still its natural and inevitable effect is to expose to conviction for crime those who simply fail or refuse to perform contracts for personal service in liquidation of a debt; and judging its purpose by its effect, that it seeks in this way to provide the means of compulsion through which performance of such service may be secured."[6]
The Court continued by discussing the meaning of the 13th Amendment and the broad reading of involuntary servitude. Further, in discussing peonage, stated, [t]he essence of the thing is compulsory service in payment of a debt. A peon is one who is compelled to work for his creditor until his debt is paid.” [7] The Court again discussed the broad interpretation of the 13th Amendment, “in this explicit and comprehensive enactment, Congress was not concerned with mere names or manner of description . . . It was concerned with a fact, wherever it might exist; with a condition, however named and wherever it might be established, maintained, or enforced.” Analyzing the law by its effects rather than its pretense, the Court held that a contract may expose a debtor to the responsibility for his debt, but not enforced labor.
Finally, the Court states, “what the state may not do directly, it may not do indirectly.” [8] Thus, the creation of a statutory presumption to facilitate convictions for failure to pay a debt that could not be otherwise prosecuted was found to be invalid. Further, the peonage laws of Alabama were found to be contrary to the 13th Amendment and therefore unconstitutional.
Justice Oliver Holmes dissented in this case. His analysis stated that adding a criminal sanction to a law with civil liability already in place goes to strengthen the law itself. Further, if a fine may be imposed, there must be punishment for non-payment, which in this case is prison. His logic continued by stating that indentured servitude as a punishment for a crime is expressly outside the reach of the 13th amendment. Justice Holmes summarized his own argument as:
"To sum up, I think that obtaining money by fraud may be made a crime as well as murder or theft; that a false representation, expressed or implied, at the time of making a contract of labor, that one intends to perform it, and thereby obtaining an advance, may be declared a case of fraudulently obtaining money as well as any other; that if made a crime it may be punished like any other crime; and that an unjustified departure from the promised service without repayment may be declared a sufficient case to go to the jury for their judgment; all without in any way infringing the 13th Amendment or the statutes of the United States."[9][10]
See also[edit]
1. ^ Google scholar; Bailey v. Alabama- Retrieved 2011-12-18
2. ^ Leagle; BAILEY v. ALABAMA
3. ^ Id. at 227-28.
4. ^ Bailey, 219 U.S. at 232.
5. ^ Id. at 234.
6. ^ Id. at 238.
7. ^ Id. at 242.
8. ^ Id. at 244.
9. ^ Findlaw; Bailey v. Alabama- Retrieved 2011-12-18
10. ^ Id. at 249-50.
Further reading[edit]
External links[edit]
• Text of Bailey v. Alabama, 219 U.S. 219 (1911) is available from: Findlaw Justia |
global_01_local_0_shard_00000017_processed.jsonl/22638 | Charles Gordon-Lennox, Earl of March and Kinrara
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Lord March, 2010
Charles Henry Gordon-Lennox, Earl of March and Kinrara (born 8 January 1955) is the heir apparent of the 10th Duke of Richmond, 10th Duke of Lennox and 5th Duke of Gordon. He was educated at Eton College.[1]
Lord March manages the family seat, Goodwood estate, for his father, and has continued the horseracing tradition of Goodwood Racecourse, one of the highlights of the flat racing season in England. He is also a motor racing enthusiast, creating the "Goodwood Festival of Speed" in 1993 and the "Goodwood Revival" in 1998 as annual events.
March has become one of the most highly regarded characters in the motorsport and classic car scene. In early 2007, Octane magazine listed him as one of the 50 most influential figures of the classic car scene. He is also mentioned in the 20th anniversary edition (in 2002) of Classic & Sportscar Magazine as one of the ten most influential figures of that scene. He is President of the British Automobile Racing Club.
Among the charities that Lord March supports is the Greenpower Education Trust of which he is a Patron.
As Charles Settrington, he was known as a still life photographer, noted in particular for his trompe l'oeil photography.
March has been married twice, and has three sons and two daughters:
• 1) Sally Clayton (1976 to 1989); one daughter
• I) Lady Alexandra Gordon-Lennox (born 1985)
• 2) The Honourable Janet Elizabeth Astor (1991 to date); one daughter and three sons
• II) Charles Henry Gordon-Lennox, Lord Settrington (born 20 December 1994) is the Earl's heir apparent
• III) Hon. William Rupert Gordon-Lennox (born 29 November 1996)
• IV) Lady Eloise Cordelia Gordon-Lennox (born 10 March 2000)
• V) Hon. Frederick Lysander Gordon-Lennox (born 10 March 2000)
• Lord Settrington (1955–1989)
• Earl of March and Kinrara (1989–present)
1. ^ Who's Who 1987
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/22639 | Curry Hicks Cage
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Coordinates: 42°23′14″N 72°31′42″W / 42.387207°N 72.52831°W / 42.387207; -72.52831
The Curry Hicks Cage
Curry Hicks Cage is an athletic facility on the campus of the University of Massachusetts Amherst in Amherst. It was built in 1931 by alumnus Clinton Goodwin. It was named in 1941 for Curry Hicks, who had been the athletic director at the school since 1911. With a capacity of 4,000, the venue served as the site of indoor athletic contests including men's basketball from its opening until January 1993 when it was replaced by the more modern and much larger Mullins Center. The building is still very much in use today, containing a pool, an indoor track, offices, and the occasional symphony performance.
It was the site of the 1992 Atlantic Ten Conference men's basketball tournament championship game, when UMass defeated West Virginia, 97-91.
One of the most memorable events in The Cage's history may be the Temple/UMass men's basketball game on February 16, 1992. UMass had never beaten Temple in 21 attempts, but the rivalry had intensified greatly in recent contests. The capacity crowd was so loud at one point during the game that paint chips started peeling away from the ceiling and falling onto the court. Much of the crowd stormed the court after the final buzzer, as UMass won 67-52.[1] |
global_01_local_0_shard_00000017_processed.jsonl/22640 | Digital Fortress
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Digital Fortress
First edition cover
Author Dan Brown
Country United States
United Kingdom
Language English
Genre Science fiction
Publisher St. Martin's Press Transworld (United Kingdom)
Publication date
Media type Print (hardback, paperback ((audiobook)
ISBN ISBN 0-312-18087-X (first edition hardcover)
OCLC 55045760
Digital Fortress is a techno-thriller novel written by American author Dan Brown and published in 1998 by St. Martin's Press. The book explores the theme of government surveillance of electronically stored information on the private lives of citizens, and the possible civil liberties and ethical implications using such technology.
When the United States National Security Agency's code-breaking supercomputer (TRANSLTR) encounters a new and complex code—Digital Fortress—that it cannot break, Commander Trevor Strathmore calls in Susan Fletcher, their head cryptographer, to crack it. She discovers that it was written by Ensei Tankado, a former NSA employee who became displeased with the NSA's intrusion into people's private lives. Tankado intends to auction the code's algorithm on his website and have his partner, "NDAKOTA", release it for free if he dies. Essentially holding the NSA hostage, the agency is determined to stop Digital Fortress from becoming a threat to national security.
When Tankado does indeed die in Seville, of what appears to be a heart attack, Strathmore asks David Becker (Susan's fiancé) to travel to Seville and recover a ring that Tankado was wearing when he died. The ring is suspected to have the code that unlocks Digital Fortress. However, Becker soon discovers that Tankado gave the ring away immediately before his death. Each person he questions in the search for the ring is murdered by Hulohot, a mysterious assassin.
Meanwhile, telephone calls between "North Dakota" and Numataka (chairman of a large computer company in Tokyo) reveal that North Dakota hired Hulohot to kill Tankado in order to gain access to the passcode on his ring and speed up the release of the algorithm. At the NSA, Fletcher's investigation leads her to believe that Greg Hale, a fellow NSA employee, is North Dakota. Phil Chartrukian, an NSA technician who is unaware of the Digital Fortress code breaking failure and believes Digital Fortress to be a virus, conducts his own investigation into whether Strathmore allowed Digital Fortress to bypass Gauntlet (NSA's virus/worm filter). However, Chartrukian is murdered by being pushed off the catwalk in the sub-levels of TRANSLTR by an unknown assailant. Since Hale and Strathmore were both in the sub-levels, Fletcher assumes that Hale is the killer; however, Hale claims that he witnessed Strathmore killing Chartrukian. Chartrukian's fall also damages TRANSLTR's cooling system.
Chapters told from Strathmore's perspective reveal his motives. By hiring Hulohot to kill Tankado, having Becker recover his ring, and at the same time arranging for Hulohot to kill him, would facilitate a romantic relationship with Fletcher, regaining his lost honor, and enable him to unlock Digital Fortress. By making phone calls to Numataka impersonating as "North Dakota", he thought he could partner with Numataka Corporation to make a Digital Fortress chip equipped with his own backdoor Trojan so that the NSA can spy on every computer equipped with these chips. However, Strathmore was unaware that Digital Fortress is actually a computer worm once unlocked, "eating away" at the NSA databank's security and allowing "any third-grader with a modem" to look at government secrets. When TRANSLTR overheats, Strathmore commits suicide by standing next to the machine as it explodes. The worm eventually gets into the database, but soon after Fletcher figures out the password (3, the difference between the Hiroshima nuclear bomb, Isotope 235, and the Nagasaki nuclear bomb, isotope 238, a reference to the nuclear bombs that killed his mother and left him crippled), and is able to terminate the worm before hackers can get any significant data. The NSA allows Becker to return to the United States, reuniting him with Fletcher. In the epilogue, it is revealed that Numataka is Ensei Tankado's father. Numataka left Tankado the day he was born since Tankado was a deformed child.
• Susan Fletcher — The NSA's Head Cryptographer, and the story's lead character
• David Becker — A Professor of Modern Languages and the fiancé of Susan Fletcher
• Ensei Tankado — The author of Digital Fortress and a disgruntled former NSA employee. Was disabled and assassinated
• Commander Trevor Strathmore — NSA Deputy Director of Operations
• Phil Chartrukian — Sys-Sec Technician
• Greg Hale — NSA Cryptogropher
• Leland Fontaine — Director of NSA
• "Hulohot" — an assassin hired by Strathmore to locate the Passkey
• Midge Milken — Fontaine's internal security analyst
• Chad Brinkerhoff — Fontaine's personal assistant
• "Jabba" — NSA's senior System Security Officer
• Soshi Kuta — Jabba's head technician and assistant
• Tokugen Numataka — Japanese Executive attempting to purchase Digital Fortress.
Real life scenarios[edit]
The book is loosely based around recent history of cryptography. In 1976 the Data Encryption Standard (DES) was approved with a 56-bit key rather than the 64-bit key originally proposed. It was widely believed that the National Security Agency had pushed through this reduction in security on the assumption that it could crack codes before anyone else.[1]
In fact the DES was first publicly broken in 1997, 96 days after the first of the DES Challenges.[2] In 1998, the same year as Digital Fortress was published, the Electronic Frontier Foundation (featured in the book) built a piece of hardware costing less than $250,000 called the EFF DES cracker which broke it in 56 hours and by 1999 the record was under 24 hours.[3]
The brute force search used by TRANSLTR takes twice as long for each extra bit added to the key (if this is done sensibly), so the reaction of the industry has understandably been to lengthen the key. The Advanced Encryption Standard established in 2001 uses 128, 192 or 256 bits, which take at least 1021 times as long (i.e. 270) to solve by this technique.[4]
Unbreakable codes are not new to the industry. The one-time pad, invented in 1917 and used for the cold-war era Moscow-Washington hotline, was proved to be unconditionally secure by Claude Shannon in 1949 when properly implemented.[5] However it is inconvenient to use in practice and is limited mainly to military and governments.[6]
See also[edit]
1. ^ "Has the DES been broken?". RSA Labs.
2. ^ "Distributed net". Retrieved 2010-06-18.
3. ^ "Record set in cracking 56-bit crypto". CNet. Retrieved 2010-06-18.
4. ^ Schwartz, John (October 3, 2000). "TECHNOLOGY; U.S. Selects a New Encryption Technique". New York Times. Retrieved 2010-06-18.
5. ^ Shannon, Claude. (1949). Communication Theory of Secrecy Systems. 28(4). Bell System Technical Journal. pp. 656–715.
6. ^ Gary McGraw, John Viega. "Software security for developers: One-time pads". IBM. Retrieved 2010-11-02.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/22641 | Economy of Queensland
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Economy of Queensland
Currency Australian Dollar (A$ or AUD)
Fiscal year 1 July – 30 June
GDP A$283.6 billion (2011-12) [1]
GDP growth 3.5% (2012-13)
Inflation (CPI) 3.3% (2010-11) [2]
Labour force 2,313,800 (2010-11) [2]
Labour force
by occupation
Retail trade (11.7%), Construction (11%), Health care & social assistance (10.1%), Manufacturing (8.5%), Education & training (7.6%) [3]
Unemployment 5.6% (2012-13) [4]
Main industries Mining, tourism, agriculture, financial services
Exports A$49.2 billion (2010-11) [2]
Export goods Coal, beef, aluminium, copper, copper ores & concentrates, fertilizers, animal feed, zinc ores & concentrates, lead ores & concentrates, lead [5]
Main export partners Japan (29.5%), India (11.8%), Republic of Korea (11.3%), China (9.3%), Taiwan (5.8%) [5]
Imports A$41.7 billion (2008-2009) [5]
Import goods Crude petroleum, passenger motor vehicles, refined petroleum, gold, goods vehicles, civil engineering equipment & parts, rubber tyres, treads & tubes, aircraft, spacecraft & parts, furniture, mattresses & cushions, mechanical handling equipment & parts [5]
Main import partners China (11.9%), United States (11.1%), Japan (10.2%), Papua New Guinea (7.2%), Malaysia (5.7%) [5]
All values, unless otherwise stated, are in US dollars
The economy of Queensland was one of the fastest growing economies within Australia, with growth outstripping that of the wider Australian economy in every financial year between 1995-96 and 2007-08.[6] In 2009, the global financial crisis slowed Queensland's economic growth.[7] A downturn in tourism, low housing construction starts and the cancellation of a number of mining projects is hampering Queensland's economic growth.[8] The state's low growth figure of 0.2% in 2010-11 was due to the impact of widespread flooding and Cyclone Yasi affecting agricultural production and exports of commodities, particularly coal.[2]
Queensland generated 19.5% of Australia's gross domestic product in the 2008-09 financial year.[5] The economy is primarily built upon mining, agriculture, tourism and financial services. Queensland's main exports are coal, metals, meat and sugar.[9]
Western Australia and Queensland are often referred to as the "resource states" because their economies are currently dependent on exports of resources such as coal, iron ore and natural gas. However, of the two states, Queensland has a more diversified base.[10] In 2006, exports from Queensland totaled A$49.4 billion.[9] By 2009 this figure had grown to A$65.5 billion. Queensland faces a sustained period of budget deficits, increasing taxes and a shortage of both skilled labour and new housing.
A bulk sugar terminal at Mackay
In 2011, the Australian Bureau of Statistics recorded a total of 28,435 farms covering 81% of the state.[11] Sugar cane is harvested in coastal areas from Far North Queensland to the southern border and is the state's biggest rural commodity. Queensland produces 94% of Australia's total raw sugar production.[12] Customers in the Asia-Pacific region can be supplied all year round through the use of storage facilities at bulk port terminals.[13] Most of the state's sugar crop is marketed through Queensland Sugar, which until 2006 compulsorily acquired all sugar grown in the state under a single desk arrangement.[13]
Cattle grazing for beef and sheep grazing for wool production are spread across inland areas. Wheat is grown in the Darling Downs region, an area that has seen mining activities expand. This has produced a boom in construction work for the region despite the global downturn [14] but created conflict between farmers and mining companies.[15] The Lockyer Valley is a significant horticultural region, although persistent drought is forcing the local economy to diversify.[16] Farms around the coastal town of Bowen produce Australia's largest winter crop of vegetables.[17] Other major crops produced in Queensland include bananas, cotton and citrus crops. Southern coastal regions include mixed forestry and farming land uses.
Dragline at the Curragh coal mine
In the 2006-07 financial year mining contributed 9% of Queensland’s GSP.[18] Queensland has significant coal, coal seam gas and bauxite deposits and some oil shale and natural gas reserves. Coal production in the 2008-09 financial year totalled 159 million tonnes leading to exports to 38 countries.[19] Queensland exports half the world's coking coal which is used to make steel.[20]
Minerals including copper, lead, silver, zinc, bauxite, gold, phosphate rock, magnesite and silica sand are mined in the state.[21] Dimension stone, that is, stone that can be cut for domestic use, including granite, marble, sandstone and slate are produced in various locations across the state.[22]
Queensland has the largest onshore oil and gas potential in the country as the state is relatively under-explored.[22] Oil was discovered in the south west of the state in the early 1980s, leading to the construction of an oil pipeline from the Cooper Basin and Eromanga Basins to Brisbane.[22] A series of gas pipelines, which began operating in the late 1990s, connects users in Mount Isa and Brisbane to the south west.[22]
Gemstones such as sapphire, opal and chrysoprase are also mined in commercial quantities.[22] The state's first iron ore mine near Cloncurry will begin production in late 2011 and full-scale operation by early 2013.[23] In the 2008-09 financial year Queensland collected A$3 billion in mining royalties.[24]
Coal seam gas[edit]
Despite being positioned under prime agricultural land the Bowen Basin and Surat Basin are becoming intensively developed by the mining industry as Queensland's coal seam gas industry booms. In the ten from 2000, about 1200 wells have been sunk in the western Darling Downs, with that figure set to rise to 20 000 over the following decade.[25] In 2010, coal seam gas was generating 30% of the state's electricity.[25] Several international energy companies are investing in multi-billion-dollar projects to convert the coal seam gas to liquified natural gas and export it via the Port of Gladstone.[26] Landowners have raised concerns with the mining development ranging from a lack of compensation, property access, construction of gravel roads on farming land, water runoff from drill sites and the potential problems from the millions of tonnes of salt that will be brought to the surface each year.[27]
One of the largest alumina refineries in the world, Queensland Alumina, was built at Gladstone in 1967.[28] Bauxite for the refinery is transported from Weipa to Gladstone via sea.[22] Also located here is Australia's largest aluminium smelter, Boyne Smelters.[28] The state's largest oil refinery, which is owned by BP, is located at Bulwer Island in Brisbane. Near Townsville is a major nickel and cobalt refinery known as Queensland Nickel.
Until an extensive rail network developed in the state early industries depended on seaports to get their products to market.[29] The largest ports in Queensland are the Port of Gladstone, followed by the Port of Brisbane and then the Port of Townsville. Some Central Queensland ports have experienced significant backlogs in recent years. For example in 2007 there were 50 ships waiting off the coast to be loaded.[30] In 2008, the Federal Government provided Queensland an extra $20 billion for major capital works to address port and rail infrastructure shortcomings.[31]
State budget[edit]
Financial year GSP growth
rate (%)
rate (%)
2004-05 [32] 4.0 4.9
2005-06 [33] 4.5 5.0
2006-07 [34] 6.8 4.0
2007-08 [6] 5.1 3.7
2008-09 [35] 1.1 4.4
2009-10 [2] 2.2 5.7
2010-11 [2] 0.2 5.5
2011-12 4.0 5.5
2012-13 3.5 6.0
The Queensland Treasury is the state government department that devises economic and financial policy advice, prepares the state budget, organises revenue collection and provides statistical research.[36] The current Treasurer of Queensland is Tim Nicholls. Economic policy priorities for Queensland are to develop a diverse economy, to create more jobs and to manage both urban growth and develop Queensland's regions.[37]
Queensland is predicted to be in deficit until the 2015-16 budget.[24] The deficit has been partly caused by decreases in the prices for both coking coal and thermal coal.[38] Declining GST revenue is another cause that is partly attributed to the deficit.[38] Strong population growth and the demands this has placed on infrastructure spending as well as reductions in mining royalties have also strained recent state budgets, resulting in the loss of the state's AAA credit rating. Poor planning including the canceled Traveston Crossing Dam and cost blowouts in the budgets for the Gold Coast desalination plant, Wyaralong Dam, Tugun Bypass and Airport Link projects has not helped the bottom line.[39]
In 2009, Queensland Premier Anna Bligh announced plans for the privatisation of a number of government owned assets including Queensland Motorways, Queensland Rail's coal rail business QRNational, the Port of Brisbane, the Abbot Point coal terminal and Queensland Forestry Plantations.[40][41] The asset sale is expected to raise A$15 billion. There has been widespread public criticism of the sell-off which has led to slump in the Premier's popularity.[42] Unions and economists criticised the plans as unjustified and poorly timed.[24][41]
Historically Queensland has been viewed as the lowest-taxing state. Queensland has slid to third place behind Victoria and Western Australia in a comparison of taxation competitiveness between other states and territories.[43] A measure of tax per capita from 2002 to 2007 has seen the figure rise 70%, from $1,321 up to $2,226, per person.[44] Payroll tax, which is payable when an employer's total annual wage payout is greater than A$1 million and has been described as "crippling" by some businesses, accounted for 26% of Queensland government tax revenue in the 2007-08 fiscal year.[45]
Beach and Skyline of Surfers Paradise, Gold Coast
Australia Zoo was voted Queensland's top tourist attraction in 2009.
The tourism industry plays a key role in the economies of regional areas and supports thousands of small businesses. Queensland experiences the second highest volume of tourists after New South Wales. Foreign backpackers and students on working holiday visas make up a large proportion of international visitors. The tourism industry in Queensland employs 5.7% of the workforce, or about 119,000 people and accounts for 4.5% of the state's GSP,[46] directly generating A$$8.8 billion to the state’s economy.[47] Tourism Queensland is the government agency responsible for the development of the state's tourist industry.
Queensland is blessed by natural beauty, especially along the eastern coastline and it is home to a number of well-known amusement parks. Many tourists visit Queensland to see the Great Barrier Reef. In 2003, the Productivity Commission estimated that the Great Barrier Reef region generates $4.2 billion from tourism.[48] By 2012, the estimated value had reached $5.5 billion.[49]
Some of Queensland's top tourist attractions include Dreamworld and Australia Zoo in South East Queensland. Places that are highly dependant on tourism include the Gold Coast, Noosa and in Far North Queensland in the Cairns district there is the Kuranda Scenic Railway, Kuranda Skyrail and the Daintree Rainforest. Fraser Island and Hamilton Island in the Whitsundays and further south Hervey Bay, famous for its whale watching, are also popular destinations. Australia's only Club Med resort is on Lindeman Island.[50]
The 2008 financial crisis saw a reduction in both international travellers and business travellers, with the later group declining by 9% in 2009 compared to the previous year.[51] After the 2010–2011 Queensland floods many travellers cancelled trips to the state, resulting in a loss of hundreds of millions of dollars.[52] The Reserve Bank deputy governor Philip Lowe stated in February 2012 that tourism in Australia is having undergo structural changes because of a contraction in the sector due to the impact of a high Australian dollar.[53]
Labour market[edit]
Although there was a rise in the number of unemployed people, the labour market expanded 2.2% in the 2008-09 financial year.[3] The Queensland labour market was hit by skilled labour shortages in 2007.[3] A lack of people completing apprenticeships in the construction industry is a current concern.[54] The problem is particularly acute because the state is already dealing with an inadequate supply of new housing to cope with its population growth. In the past there have been shortages of doctors, nurses, teachers as well as shortages in the agriculture and hospitality sectors. A lack of university places is another factor limiting that is affecting the availability of skilled labour in some regions.
Household income[edit]
2007 median household incomes
The average weekly earnings for a full-time adult person in Queensland in 2009 was $1,177.00.[55] While Queensland generally does not have high cost of living, housing is expensive compared to other states. Housing in Queensland is the least affordable of any state or territory.[56] The average Queensland homeowner had to pay 40.5% of their household income towards home loan repayments and tenants on average paid 26.5% for rent during the first quarter of 2008.[56] Average wages rose by 7.5% in 2009, three times the national inflation rate.[51]
Economic history[edit]
19th century[edit]
Sawmills like this one at Canungra provided employment for many rural communities in the early years of Queensland's growth.
The Proserpine Central Sugar Mill was established in 1897.
One of the first industries to spread across the state was pastoralism. From the Darling Downs in the 1840s, squatters and pioneering families were establishing cattle stations up until the 1870s, as far north as the Gulf Country.[29] The early settlers of Queensland faced many problems ranging from a lack of labour, a lack of transport facilities to markets, attacks by aboriginals, a climate that was too wet, drought and falling commodity prices to name a few.[29] An Australian wide trend towards recession hit Queensland particularly hard from July 1866.[57] Immigration faltered, unemployment rose and business activity contracted. It wasn't long before gold discoveries signaled a turn around in Queensland's economic activity.
Gold was discovered in the state in 1861 at both Peak Downs near Clermont and at Gympie in 1867. Many gold miners left Victorian goldfields in the 1870s as surface gold had become scarce in that state and moved to Queensland to try their luck.[58] During the American Civil War a shortage of cotton created a cotton boom in Queensland.[29] Copper was discovered at Cloncurry in 1869.
In 1863, the first sugar cane plantation was established and the first South Sea Islanders, referred to as kanakas, arrived to provide cheap labour.[29] The sugar cane industry expanded northwards along the coast with a plantation and mill operating at Innisfail in 1881[29] and in the following year a mill opened in Bundaberg.[59] By 1890 developments in refrigeration technologies had opened new markets for produce which was previously spoiled on the two month long journey to England.[58]
During the early 1880s the Dingo Fence was constructed to protect livestock across south east Australia. It protected southern Queensland, aiming to stop attacks on sheep from Australia's native dog. The fence was maintained up until the 1970s.[60] Today it is estimated that $60 million in losses occurs annually in Queensland due to dingoes that have penetrated the barrier.[61] In 1886, the introduced rabbit reached the southern Queensland border[62] causing yields from pasture production to decrease. The rabbit also contributed to soil erosion through overgrazing.[62]
20th century[edit]
A drought in 1902 drastically reduced agricultural productivity.[57] By 1906, maize covered 25%, sugar cane 23.8% and wheat 20.5% of cropping land in the state.[63] In 1908, 700 bores were supplying artesian basin water to western Queensland, transforming an otherwise mostly arid landscape into a more productive area.[64] Refrigeration and regular steamer services between Brisbane and London allowed Queensland to become Australia's largest exporter of meat in the same year. The Franco-British Exhibition of 1908 was a good opportunity for Queensland to promote itself, particularly the desirable climate and expanses of fertile land. Tourism was promoted under the banner of "the Winter Paradise of the Southern Hemisphere".[64] A souvenir guide from the show boasted that Queensland cultivated the richest of fruits including pineapples, bananas, mangoes, grapes and citrus fruit.[64]
Australia's largest airline, Qantas was founded as Queensland and Northern Territory Aerial Services in Winton in 1920.[65] Silver, copper and lead were being mined from Mount Isa by 1925.[58] Wool became an important export for Queensland during the early 20th century, contributing to half of the state's total exports by 1930.[66] The 1950s saw a resurgence of whaling in Australia. A new whaling station was set up at Tangalooma on Moreton Island to process slaughtered whales.[58] In 1963 the world's richest deposit of bauxite was discovered at Weipa.[58] Dairying, once an important local industry in the state, declined towards the end of the 20th century. The Queensland economy last contracted during the 1990-91 financial year at a rate of -0.7%.[67]
2000 onwards[edit]
Widespread flooding reduced coal production in December 2010 by more than one third.
In 2004, a citrus canker outbreak forced farmers to destroy every citrus tree in the Emerald region. This amounted to half a million commercial trees being destroyed during an eradication program that lasted five years.[68] The banana industry was devastated in 2006 from the flooding and crop destruction left in the wake of Cyclone Larry. 90% of the country's banana crop was destroyed. The price of bananas doubled to A$6 a kilogram as a result.[69] In the 2006-07 financial year, the nominal value of the Queensland economy surpassed A$200 billion for the first time.[34] In early 2009, Queensland's credit rating was downgraded by rating agency Standard and Poor to AA+ after the state's budget deficit increased to more than A$1.5 billion.[70] In 2009, the Townsville-based Storm Financial financial services company collapsed, leaving thousands of investors experiencing economic loss.
See also[edit]
1. ^ "Queensland's pro-business economy". The State of Queensland. 12 July 2013. Retrieved 1 August 2013.
2. ^ a b c d e f "2010–11 Annual Economic Report on the Queensland economy" (pdf). Queensland Treasury. Retrieved 16 February 2012.
3. ^ a b c "2008–09 Annual Economic Report on the Queensland economy" (pdf). Queensland Treasury. Retrieved 9 January 2010.
4. ^ "Employment growth and unemployment, Queensland and Australia, 1978–79 to 2012–13". Queensland Treasury and Trade. 12 July 2013. Retrieved 1 August 2013.
5. ^ a b c d e f "Queensland". Department of Foreign Affairs and Trade. Commonwealth of Australia. November 2009. Retrieved 10 January 2010.
6. ^ a b "2007–08 Annual Economic Report on the Queensland economy". Queensland Treasury. Retrieved 18 May 2009.
7. ^ Nikole Jacobi and Andree Withey (11 January 2010). "Qld economy fifth in the nation". ABC News Online. Australian Broadcasting Corporation. Retrieved 11 January 2010.
8. ^ John McCarthy (10 January 2010). "Queensland's economy dormant as the state slips in ratings". Courier Mail. News Limited. Retrieved 10 January 2010.
9. ^ a b Jimmy Louca. "Queensland Economy: Current performance and outlook" (pdf). Queensland Treasury. Retrieved 9 January 2010.
10. ^ Andrew Main (31 January 2011). "Gap in economy waits to be filled". The Australian (News Limited). Retrieved 24 June 2011.
11. ^ "Agricultural Commodities, 2010-11". Australian Bureau of Statistics. 2 July 2013. Retrieved 5 July 2013.
12. ^ "QLD Sugar". Queensland Sugar. Retrieved 18 May 2009.
13. ^ a b "CaneGrowers - About the Industry". CaneGrowers. 2006. Retrieved 18 May 2009. [dead link]
14. ^ Alyssa Kimlin (11 May 2009). "Boom keeps builders at full stretch". Toowoomba Chronicle. APN News & Media Ltd. Retrieved 11 January 2010.
15. ^ Graham Fuller (4 April 2008). "Farmers versus mining on the Darling Downs". North Queensland Register. Fairfax Media. Retrieved 11 January 2010.
16. ^ Terry Ryder (5 February 2009). "Lockyer food bowl banks on diversification". The Australian. News Limited. Retrieved 11 January 2010.
17. ^ "Sky is not the limit for September vegetable prices". ABC Rural (Australian Broadcasting Corporation). 13 August 2010. Retrieved 13 August 2010.
18. ^ "The Queensland Economy: Built on more than just coal and sunshine" (pdf). Jones Lang LaSalle. Retrieved 11 January 2010.
19. ^ "Department of Mines and Energy: Coal". Department of Employment, Economic Development and Innovation. 28 April 2010. Retrieved 6 September 2010.
20. ^ "Australia floods 'to hit global steelmaking'". BBC News. 4 January 2011. Retrieved 5 May 2011.
21. ^ "Minerals, Gemstones & Quarry Materials". Department of Employment, Economic Development and Innovation. The State of Queensland. 17 August 2009. Retrieved 9 January 2010.
22. ^ a b c d e f Government of Queensland (2006). Queensland: Mineral, petroleum and energy resources (Map). Cartography by Graphical Services Unit, Natural Resources, Mines and Water (9 ed.).
23. ^ Barry Fitzgerald (4 December 2009). "Xstrata digs deep to boost Qld mine life". Fairfax Digital. Retrieved 9 January 2010.
24. ^ a b c Tom Dusevic (17 December 2009). "Queensland falls back with the pack". The Australian. News Limited. Retrieved 10 January 2010.
25. ^ a b Pip Courtney (2 May 2010). "Pipe Dreams". Landline. Australian Broadcasting Corporation.
26. ^ Terry Ryder (8 April 2010). "Surat Basin to become one of the nation's boom economies". The Australian (News Limited). Retrieved 2 May 2010.
27. ^ Pip Courtney (1 May 2010). "Farmers fight for their rights in gas battle". ABC News Online (Australian Broadcasting Corporation). Retrieved 2 May 2010.
28. ^ a b "Gladstone". Rio Tinto Aluminium. Retrieved 11 January 2010.
29. ^ a b c d e f Munns, Cec F.; A. McLay, J Sparkes, W. Logue, S. Paul and B. Short (1987). The way we were. Volume 3 (2 ed.). South Melbourne, Victoria: Brooks Waterlook Publicaters. pp. 270—273. ISBN 0-85568-507-7.
30. ^ "Ports backlog forces Anglo Coal jobs rethink". ABC News Online. Australian Broadcasting Corporation. 1 June 2007. Retrieved 10 January 2010.
31. ^ "Budget pays big for Queensland". Brisbane Times. Fairfax Digital. 14 May 2008. Retrieved 10 January 2010.
32. ^ "2004–05 Annual Economic Report on the Queensland economy" (pdf). Queensland Treasury. Retrieved 9 January 2010.
33. ^ "2005–06 Annual Economic Report on the Queensland economy" (pdf). Queensland Treasury. Retrieved 9 January 2010.
34. ^ a b "2006–07 Annual Economic Report on the Queensland economy" (pdf). Queensland Treasury. Retrieved 9 January 2010.
35. ^ "2009–10 Annual Economic Report on the Queensland economy" (pdf). Queensland Treasury. Retrieved 16 February 2012.
36. ^ "About Treasury". The State of Queensland. Retrieved 15 January 2010.
37. ^ "Priorities in Progress 2005-06" (pdf). Queensland Treasury. 2006. Retrieved 6 January 2010.
38. ^ a b Tony Moore (21 February 2009). "Unemployment to hit 7 per cent". Brisbane Times. Fairfax Digital. Retrieved 15 January 2010.
39. ^ Bill Hoffman (6 January 2010). "Premier accused of poor planning". Sunshine Coast Daily. APN News & Media Ltd. Retrieved 10 January 2010.
40. ^ Andrew Fraser (9 December 2009). "Bligh sweetens asset sell-off". The Australian. News Limited. Retrieved 14 January 2010.
41. ^ a b "Asset sell-off only decided last week: Bligh". ABC News Online. Australian Broadcasting Corporation. 3 June 2009. Retrieved 14 January 2010.
42. ^ Cosima Marriner (25 November 2009). "Economists slam Bligh's asset sell-off bid". Queensland Public Life. Fairfax Digital. Retrieved 14 January 2010.
43. ^ Christian Kerr (29 December 2009). "State taxes hit growth and jobs". The Australian. News Limited. Retrieved 11 January 2010.
44. ^ John McCarthy (16 October 2007). "Good times send tax take soaring". Courier Mail. Queensland Newspapers. Retrieved 11 January 2010.
45. ^ Alex Tilbury and Kerrie Sinclair (30 April 2009). "Queensland retailer fears ruin by payroll tax". Courier Mail. Queensland Newspapers. Retrieved 11 January 2010.
46. ^ "About TQ - Profile". Tourism Queensland. Retrieved 6 January 2010.
47. ^ "Industry Facts and Figures". Queensland Tourism Industry Council. Skills Link. Retrieved 15 January 2010.
48. ^ Beau Hug & Silva Larson (May 2006). "Socio-economic profile of the Great Barrier Reef region". Water for a Healthy Country. CSIRO. Retrieved 22 July 2012.
49. ^ Patrick Caruana (8 July 2012). "Time to ’step up’ on Reef protection". Brisbane Times (Fairfax Media). Retrieved 22 July 2012.
50. ^ "Club med looks for investors". Whitsunday Times (APN News & Media Ltd). 20 August 2009. Retrieved 12 August 2010.
51. ^ a b Courtney Trenwith (19 April 2010). "Queensland economy slumps to seventh". Brisbane Times (Fairfax Media). Retrieved 17 February 2012.
52. ^ Amy Pyett & Michael Smith (12 January 2011). "Queensland tourism sector faces flood, image damage". Reuters (Thomson Reuters). Retrieved 17 February 2012.
53. ^ "Dollar, mining boom spark economic shake-out". ABC Melbourne (Australian Broadcasting Corporation). 16 February 2012. Retrieved 17 February 2012.
54. ^ John McCarthy (14 January 2010). "Queensland housing industry hit by skills shortage". Courier Mail. Queensland Newspapers. Retrieved 15 January 2010.
55. ^ "Qld Stats, Dec 2009: Incomes". Australian Bureau of Statistics. 21 December 2009. Retrieved 9 January 2010.
56. ^ a b Torny Jensen (28 May 2008). "Queensland housing now the most unaffordable". Courier Mail. Queensland Newspapers. Retrieved 9 January 2010.
57. ^ a b Laverty, John (2009). The Making of a Metropolis: Brisbane 1823—1925. Salisbury, Queensland: Boolarong Press. pp. 30–31. ISBN 978-0-9751793-5-2.
58. ^ a b c d e Bereson, Itiel (2002). Australia's wealth. Port Melbourne, Victoria: Echidna Books. ISBN 1-86391-296-7.
59. ^ Hall, James; Jill Dening (1988). Beautiful Sugar Country. West End, Queensland: Child & Associates Publishing. p. 2. ISBN 0-949267-86-4.
60. ^ "The dingo fence - world's longest fence". Dalby Regional Council. Retrieved 14 January 2010.
61. ^ John Taylor (10 December 2009). "Wild dogs devastating graziers". 7.30 report transcript. Australian Broadcasting Corporation. Retrieved 14 January 2010.
62. ^ a b "Rabbits". Department of Environment, Climate Change & Water. New South Wales Government. 22 February 2008. Retrieved 14 January 2010.
63. ^ "1301.0 - Year Book Australia, 2001: Agriculture, The Early Years". Official Year Book of the Commonwealth of Australia, 1901-1907. Australian Bureau of Statistics. 3 October 2007. Retrieved 14 January 2010.
64. ^ a b c McKay, Judith (2004). Showing off: Queensland at World Expositions 1862 to 1988. Rockhampton, Queensland: Central Queensland University Press and the Queensland Museum. pp. 63—68. ISBN 1-876780-37-1.
65. ^ "Small Beginnings". Our Company. Qantas. Retrieved 11 January 2010.
66. ^ Bridgstock, Vicki (2009). Tides of Teneriffe. New Farm, Queensland: New Farm & Districts Historical Society. p. 19. ISBN 978-0-9805868-1-7.
67. ^ "Economic growth, Queensland, Rest of Australia and Australia, 1986–87 to 2008–09". Office of Economics and Statistical Research. State of Queensland. 28 October 2009. Retrieved 20 January 2010.
68. ^ Mitch Grayson (23 January 2009). "Emerald declared canker-free". ABC News Online. Australian Broadcasting Corporation. Retrieved 11 January 2010.
69. ^ Marissa Calligeros (6 February 2009). "'Floods to trigger banana price rise'". Brisbane Times. Fairfax Digital. Retrieved 11 January 2010.
70. ^ David Barbeler (21 February 2009). "Qld loses AAA credit rating after budget blow-out". Brisbane Times (Fairfax Media). Retrieved 16 September 2010.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/22642 | Fred Crisman
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Fred Lee Crisman (July 22, 1919 - December 10, 1975) was a writer, educator, broadcaster and self-described "disruption agent" from Tacoma, Washington known for claims of paranormal events and 20th century conspiracies.
Early life[edit]
Crisman was born 1919 in Washington, the only child of Fred Crisman and his wife Eva Pitchers, both from Iowa. His father was a salesman.[1]
Shaver Mystery[edit]
In the mid-1940s, his name appears in the pages of pulp magazines, reporting on his own Shaver Mystery experiences via letters to the editors, warning of a threat from subterranean-dwelling "Deros," or "detrimental robots." Crisman wrote to Ray Palmer, then editor of the science fiction magazine ‘Amazing Stories’ with details of the incident. Crisman had previously written to Palmer and had a letter published in the June 1946 issue detailing his encounters with his outlandish ideas of ‘deros’ (detrimental robots) who ran an underground super-civilisation.[2] He claimed to have encountered the beings while fighting as a commando in Burma during World War II, and wrote that he sustained injuries from a futuristic laser weapon.[3]
Maury Island incident[edit]
His name next appears in relation to the Maury Island incident, an early UFO encounter. The UFO story began with Harold A Dahl[4] who worked for Crisman. Crisman claimed to later see the object reported by his employee and to have collected slag debris dropped on his boat. Many UFO researchers have dismissed this incident as an outright hoax, most likely perpetrated by Crisman, but others still believe the incident to be a genuine paranormal event.
Murder of a City, Tacoma[edit]
Crisman next appears in Tacoma in the late 1960s, railing against the city's form of government (i.e. City Manager). He hosted a radio talk show under the pseudonym "Jon Gold," and wrote a book, The Murder of a City, Tacoma,[5] which he published in 1970 through Transistor Publishing Company. "This weird, politically slanted rant about Tacoma in the late 1960s is a window into the chaos and bitterness that led to the 1971 recall of a majority of the City Council and of the fall of Mayor R.L. Slim Rasmussen. The author, Fred Crisman, was a talk radio personality who managed in the book to tie corruption in Tacoma to everything from communist infiltrators to the Kennedy assassination. The paranoid tone of the writing, shameless personal attacks, and naming of names seems like something out of the mid-50s but as a historical artifact is much more than just a novelty."[5][dead link] Crisman was appointed by the mayor to serve on the Tacoma Public Library board.
John F. Kennedy Assassination[edit]
During this period, Crisman was subpoenaed by Jim Garrison to testify in the case against Clay Shaw in the John F. Kennedy assassination.[6] When Shaw was arrested, apparently Crisman was the first person Shaw called.[7] Various conspiracy theories place Crisman on the grassy knoll, possibly as a radio operator, or as one of the "three tramps" taken into custody near Dealey Plaza. The origin of this repeated claim appears to be the Torbitt Document. "William Torbitt" is the pseudonym for a 1969 Texas lawyer-author-Kennedy Assassination-researcher who spells Crisman "Chrismon". However, a log from Rainier High School where Crisman taught shows no substitute was required for Crisman on the day of the assassination, thus supporting Crisman's claim that Crisman was teaching at the time of the assassination.[8] Crisman's Grand Jury testimony is now public; and in Murder of a City, Tacoma, Crisman claimed no knowledge of a conspiracy,[5][dead link] nor was he called as a witness in the Clay Shaw trial.
Inslaw and The Octopus[edit]
Crisman died in 1975, but his name continues to resonate in the world of conspiracy theories. Michael Riconosciuto, a witness who testified before the House Judiciary Committee investigating the Inslaw Affair, has been described as a young electronics whiz from Tacoma who was a close acquaintance of Crisman's,[9] and who helped Crisman sweep (and possibly plant) electronic eavesdropping devices during the years Crisman wrote Murder Of A City, Tacoma.[5][dead link]
Books that mention Fred Crisman[edit]
• Beckh'am, T. E. (Thomas Beckham) Remnants of Truth ISBN 1-4243-3812-3, ISBN 978-1-4243-3812-2
• Thomas, Kenn. Maury Island UFO IllumiNet (1999)ISBN 1-881532-19-4
• Nomenclature of an Assassination Cabal AKA "The Torbit Document" republished as NASA, Nazis & JFK: The Torbitt Document & the Kennedy Assassination, AUP, US, 1996 paperback, ISBN 0-932813-39-9
• Fonzi, Gaeton. The Last Investigation.
• Sprague, Richard E.. The Taking of America 1, 2, 3.
• Marrs, Jim. Alien Agenda - Investigating the Extraterrestrial Presence Among Us HarperPaperBacks (1997)ISBN 0-06-109686-5
• UFO 34 Vol.8 No. 5 The Secret Life of Fred L. Crisman by Anthony L. Kimery pp. 34–38
See also[edit]
1. ^ 1930 Census of Tacoma
2. ^ Routley, Duncan (2005). "Roswell Incident: Book III: A Time of Confusion". Vanity Press ( Retrieved 2009-11-23.
3. ^ Amazing Stories, June 1946, Letters from Our Readers
4. ^ Routley, Duncan. "Mystery of Maury Island UFOs, 1947 (YouTube video)". YouTube. Retrieved 2009-11-23.
5. ^ a b c d Sullivan, Michael. "On A Small Tocoma Bookshelf".[dead link]. Retrieved 2009-11-23.
6. ^ Crisman, F. Lee; pages 1-32 Special Investigation, Orleans Parish Grand Jury, 21 November 1968
7. ^ Marrs, Jim. Alien Agenda. p. 128. ISBN 0-06-109686-5.
8. ^ Kenn Thomas, Maury Island UFO: The Crisman Conspiracy
9. ^ *Thomas, Kenn; Keith, Jim (1996). "Appendix Three: Prison interview with Michael Riconosciuto". The Octopus: The Secret Government and Death of Danny Casolaro. Feral House. ISBN 0-922915-39-3.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/22643 | From Wikipedia, the free encyclopedia
Jump to: navigation, search
Clinical data
AHFS/Drugs.com International Drug Names
Legal status ?
CAS number 1393-87-9 YesY
ATC code R02AB03
UNII 65DD690W0C YesY
KEGG D08002 N
Synonyms Fusafungin
Chemical data
Formula C29H51N2O8
Mol. mass 555.72 g/mol[1]
N (what is this?) (verify)
Fusafungine (INN), also known as fusafungin, is an active agent used in antibiotics for treatment of nasal and throat infection. It also possesses anti-inflammatory properties. Fusafungine is a mixture of enniatin cyclohexadepsipeptides made up of alternating D-α-hydroxyvaleric acid and L-N-methylamino acid residues,[2] produced by the ascomycete Fusarium lateritium, and marketed by Servier under the trade names Locabiotal, Bioparox, and Locabiosol.
According to a pooled analysis study done in the UK for the efficacy of fusafungine in rhinopharingitis, it was found that the proportion of patients who showed an improvement in symptoms from Day 0 to Day 4 of infection was 61.5% with fusafungine vs. 46.8% when compared to a placebo. [3]
1. ^ Fusafungine at MeSH
2. ^ Daniel Levy, Aline Bluzat, Michel Seigneuret and Jean-Louis Rigaud (1995). "Alkali cation transport through liposomes by the antimicrobial fusafungine and its constitutive enniatins". Biochemical Pharmacology 50 (12 22): 2105–2107. doi:10.1016/0006-2952(95)02045-4. PMID 8849339.
3. ^ http://www.ncbi.nlm.nih.gov/pubmed/15626253 |
global_01_local_0_shard_00000017_processed.jsonl/22645 | Hong Kong one-cent note
From Wikipedia, the free encyclopedia
Jump to: navigation, search
1 cent bill - Hong Kong.JPG
One cent Dollars
(Hong Kong)
Value 0.01 Hong Kong dollars
Width 89 mm
Height 41 mm
Security features none
Paper type Cotton
Years of printing various years depending on signature
The one cent banknote was the smallest denominated banknote issued in Hong Kong. They were issued by the government and were initially released in 30 May 1941 and printed by Noronha and Company Limited[1] to provide small change because of a lack of coinage brought on by the second world war. The first issue was 42 by 75 mm, the obverse was brown with a serial number of seven numbers with either no prefix or an A or B prefix. This side was mostly in English, except for "Government of Hong Kong" which was also in Chinese. The reverse was red and the denomination in English and Chinese. After the Japanese take over of Hong Kong the issue was replaced by the Japanese Military Yen.
After the surrender of Japan in 1945, the dollar was reestablished as the currency, a uniside brown note with a portrait of the British monarch, and no serial numbers was issued, these notes were demonetised in 1995.
Ma Tak Wo 2004, Illustrated Catalogue of Hong Kong Currency, Ma Tak Wo Numismatic Co., LTD Kowloon Hong Kong. ISBN 962-85939-3-5
1. ^ http://rodsell.com/hkgn/hkgnts.htm |
global_01_local_0_shard_00000017_processed.jsonl/22647 | From Wikipedia, the free encyclopedia
Jump to: navigation, search
JP-8, or JP8 (for "Jet Propellant 8") is a jet fuel, specified and used widely by the US military. It is specified by MIL-DTL-83133 and British Defence Standard 91-87, and similar to commercial aviation's Jet-A.
It was specified in 1990 by the U.S. government as a replacement for government diesel fueled vehicles.
The U.S. Air Force replaced JP-4 with JP-8 completely by the fall of 1996, to use a less flammable, less hazardous fuel for better safety and combat survivability.
The U.S. Navy uses a similar formula, JP-5. JP-5 has an even higher flash point of > 60 °C (140 °F), but also a higher cost.
Outside of powering aircraft, JP-8 is used as a fuel for heaters, stoves,[1][2] tanks,[3] by the U.S. military and its NATO allies as a replacement for diesel fuel in the engines of nearly all tactical ground vehicles and electrical generators, and as a coolant in engines and some other aircraft components. The use of a single fuel greatly simplifies logistics.
JP-8 is formulated with icing inhibitor, corrosion inhibitors, lubricants, and antistatic agents, and less benzene (a carcinogen) and less n-hexane (a neurotoxin) than JP-4. However, it also smells stronger than JP-4. JP-8 has an oily feel to the touch, while JP-4 feels more like a solvent.
When used in highly supercharged diesel engines with the corresponding low compression ratio of about only 14:1 or below, JP-8 causes troubles during cold start and idling due to low compression temperatures and subsequent ignition delay because the cetane index is not specified in MIL-DTL-83133G to 40 or higher. Because lubricity to the BOCLE method is not specified in MIL-DTL-83133G, modern common-rail diesel engines can experience wear problems in high-pressure fuel pumps and injectors. Another problem in diesel engines can be increased wear to exhaust valve seats in the cylinder heads, because a minimum content of sulfur is not specified in MIL-DTL-83133G. Sulfur in fuel normally contributes to a build-up of soot layers on these valve seats. According to the notes in this standard, it is intended to include a cetane index value in one of the next releases.
Alternative Fuel Technologies, Redford, Michigan, (Founder, James McCandless) has successfully completed work, through an Army/SBIR (Small Business Innovation Research) grant (Phases 1 and 2), on mitigation of the valve-wear issue pursuant to using JP-8 fuel in common rail diesel engines, and recently received an award granted by The National Science Foundation, ( and has been selected by NSF to work with them on fuel injection research for alternative fuels. The Army has recently selected Alternative Fuel Technology to move forward with Phase 3 SBIR after successful completion of the Phase 2 work. Phase 3 is commercialization. Contracts are currently being negotiated.
Workers have complained of smelling and tasting JP-8 for hours after exposure. As JP-8 is less volatile than standard diesel fuel, it remains on the contaminated surfaces for longer time, increasing the risk of exposure.[4]
JP-8+100 (F-37) is a version of JP-8 with an additive that increases its thermal stability by 56°C (a difference of 100°F). The additive is a combination of a surfactant, metal deactivator, and an antioxidant, and was introduced in 1994 to reduce choking and fouling in engine fuel systems. Commercially, this additive is used in police helicopters in Tampa, Florida.[citation needed] JP-8+100 is also used for Canadian Forces CP-140 Aurora, CC-130 Hercules and the CC-115 Buffalo.
See also[edit]
1. ^ Modern Burner Units, JP-8 is used by Army Food Service Specialists (cooks) to fuel MBUs, in accordance with U.S. Army Field Feeding Manual FM 10-23
2. ^ Babington Airtronic Burner burns JP-8 and other distillate fuels, and is the current common heat source for Marine Corps food service equipment.
3. ^ the M1 Abrams series of battle tanks uses JP fuel in its gas turbine engine
4. ^ Day, Dwayne A. "Aviation Fuel". U.S. Centennial of Flight Commission.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/22648 | MS Marina
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Ms Marina Martinique.JPG
MS Marina docked at Martinique, December 2011
Name: Marina[1]
Owner: Oceania Cruises[1]
Operator: Oceania Cruises[1]
Port of registry: Majuro, Marshall Islands
Ordered: 2007
Builder: Fincantieri Sestri Ponente[1]
Yard number: 6194
Laid down: 10 March 2009
Launched: 4 April 2010
Completed: September 2010 (planned)[1]
Maiden voyage: 22 January 2011
Identification: IMO number: 9438066
MMSI number: 538003668 [2]
Status: In Active Status as of 2011
General characteristics
Class & type: Oceania-class cruise ship
Tonnage: 66,000 GT[1]
Length: 782 ft (238.35 m)[1]
Beam: 105 ft (32.00 m)[1]
Draught: 24 ft (7.32 m)[1]
Installed power: diesel-electric[1]
Propulsion: 2 controllable pitch propellers[1]
Speed: 20-knot (37 km/h; 23 mph)[1]
Capacity: 1,252 passengers (double occupancy)[1]
Crew: 780 crew[3]
MS Marina is an Oceania-class cruise ship, which was constructed at Fincantieri's Sestri Ponente yards in Italy for Oceania Cruises. The Marina is the first in a duo of cruise ships, and was followed by the MS Riviera in May 2012,[1] the option for the third ship was declined.[4] The ship was named in Miami by Mary Hart on February 5, 2011.[5]
Concept and Construction[edit]
The finalization of contract for the construction of Marina and her sister ship, plus an option for a third, was reached on 18 June 2007.[6] The Marina is a mid-sized ship, at 66,000 tons and was designed by the Yran & Storbratten (Y&S) architectural firm.[7] The keel of Marina was laid on 10 March 2009 and included the welding of a U.S. silver dollar coin and a pre-Castro Cuban peso coin in the keel and is believed to bring fortune to the ship, its passengers and crew during their seagoing life.[3]
Marina has nine dining venues. The Grand Dining Room, more casual Terraces, and poolside Waves Grill are open seating, no-charge and open daily. Four specialty dining restaurants require reservations (typically up to two per stateroom) are available at no added charge: the cruise line's signature Polo Grill, Toscana, the new French Bistro Jacques and the Pan Asian restaurant Red Ginger. Two additional venues are available at an added charge: Privee private dining and La Reserve.[6] Marina has a diesel-electric powerplant with a pair of fixed pitch propellers.[1] The ship's interior is decorated with rich woods, Italian marble, granite, wool carpets and leather. The ship has 626 staterooms and suites, with 90% featuring private verandas.[3]
In the 626 staterooms, there are:
• 3 Owners Suites[1]
• 6 Vista Suites[1]
• 10 Oceania Suites[1]
• 121 Penthouse Suites[1]
• 440 Veranda Staterooms[1]
• 20 Ocean View Staterooms[1]
• 26 Interior Staterooms[1]
1. ^ a b c d e f g h i j k l m n o p q r s t u v "Oceania commences construction of first Oceania class newbuild "Marina"". Cruise Industry News. 5 August 2009. Retrieved 1 April 2010.
2. ^ "Marina Vessel Info". Retrieved 20 August 2012.
3. ^ a b c "Fincantieri starts construction of Oceania's Marina". Cruise Industry News. 10 March 2009. Retrieved 15 April 2010.
4. ^ "Most Popular". USA Today.
5. ^
6. ^ a b "Countdown begins for the debut of the new Oceania class". Cruise Industry News. 18 June 2007. Retrieved 1 April 2010.
7. ^ "Oceania releases first design details of the new Oceania class". Cruise Industry News. 28 February 2008. Retrieved 1 April 2010.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/22649 | From Wikipedia, the free encyclopedia
Jump to: navigation, search
The term myeloid is an adjective that relates to the granulocyte precursor cell in bone marrow or spinal cord, or a resemblance to the marrow or spinal cord. For example, myeloid leukemia is leukemia that arises from abnormal growth in the blood-forming tissue of the bone marrow.[1]
In hematopoiesis, the term "myeloid cell" describes any blood cell that is not a lymphocyte. This terminology is often seen when classifying cancers, especially leukemia.
This term may be confused with "myelin", which is an insulating layer covering the axons of many neurons.
See also[edit]
Macpherson, Gordon (2002). Black's Medical Dictionary. London: A & C Black Publishers. ISBN 02713654422 Check |isbn= value (help).
1. ^ [1]
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/22650 | From Wikipedia, the free encyclopedia
Jump to: navigation, search
Namangan Airport
Namangan Airport
Namangan is located in Uzbekistan
Location in Uzbekistan
Coordinates: 41°00′04″N 71°40′06″E / 41.00111°N 71.66833°E / 41.00111; 71.66833Coordinates: 41°00′04″N 71°40′06″E / 41.00111°N 71.66833°E / 41.00111; 71.66833
Country Flag of Uzbekistan.svg Uzbekistan
Province Namangan Province
city 1610
• Total 91 km2 (35 sq mi)
Elevation 476 m (1,562 ft)
Population (2011)
• Total 449,200
Postal code 160100[1]
Area code(s) +998 6922[1]
Twin cities
• Seongnam South Korea
Namangan (Uzbek: Namangan/Наманган; Russian: Наманган) is a city in Uzbekistan. It is the administrative, economic, and cultural center of Namangan Province. Namangan is located in the northern edge of the Fergana Valley in north-eastern Uzbekistan. The city is served by Namangan Airport.
The city takes its name from the local salt mines (in Persian نمککان (namak kan) — "a salt mine").[2] Politically, Namangan became a part of the Uyghur Empire of the Karakhanid State and was known to have been a settlement in the 15th century. The residents of the ancient city of Akhsikat, which was severely damaged by an earthquake, moved to the then-village of Namangan in 1610.[3] Namangan became a city afterward.[3] On the eve of the Russian invasion in 1867, the town had been a part of the Khanate of Kokand since the middle of the 18th century.[4][5]
Namangan, like many other cities in the Fergana valley, was originally populated by the Sogdian people, later becoming a Persian speaking city. The influx of the Turkic people into the region starting in late medieval times led to gradual turkification of the region and the city. However, until the middle of the 19th century, Namangan still had a Tajik majority. Today, the city is an Uzbek speaking city, albeit with a large Tajik minority.
Namangan was hit by a destructive earthquake in 1926 which killed 34 people, injured 72, and destroyed 4,850 houses.[6]
Since Uzbekistan's independence in 1991, Namangan has gained a reputation for Islamic revivalism, with many mosques and schools funded by charity organizations from Middle Eastern countries, including the conservative Wahhabi sect from Saudi Arabia.[7][8] This has also translated into political opposition against the secular government of Uzbekistan. Some women have discarded traditional colorful scarves for large white veils or even the black paranja.[9]
By road Namangan is 290 kilometres (180 mi) east of Tashkent, about 65 kilometres (40 mi) west of Andijan, and about 40 kilometres (25 mi) east of Chust.[10] The city is located 1476 feet (450 meters) above sea level.[11] The Qoradaryo and Naryn Rivers join together to form the Syr Darya just outside the southern edge of the city.[12]
Namangan has been an important craft and trade center in the Ferghana Valley since the 17th century. After annexation by the Russians in 1867, cotton production and food processing became the dominant economic activity, as it did in many places in the country.[13] A large number of factories were built in the city during Soviet times. Currently Namangan is a center for light industry, especially in food. There are 36 joint companies and over 400 small and medium enterprises in the city.[11]
There are three higher education institutions in Namangan city — Namangan State University, Namangan Engineering Pedagogical Institute, and Namangan Engineering Technological Institute. Namangan State University is the largest, oldest and highest ranked of the three within the country. The city is also home to ten colleges, two vocational schools, two academic lyceums, and 51 general education schools.
The Mulla Kyrgyz Madrasa (Uzbek: Mulla Qirgʻiz madrasasi) was built in 1910 by a local cotton magnate.[14] The Mosque of Ota Valikhan Tura (Uzbek: Ota Valixon toʻra masjidi), built in 1915, is one of the largest in Central Asia, now home to local branch of the Wahabi sect. The Namangan Natural History Museum houses local archaeological finds. The Hadja Amin Kabri Architectural Complex (Uzbek: Xoʻja Amin maqbarasi) has an ornate terra-cotta facade dating from the 18th to 19th century.
About 25 kilometres (16 mi) west of Namangan are the Akhsikat ruins, a 1st century settlement on the Syr-Darya River. Formerly capital of Fergana Valley, it was destroyed by the Mongols, rebuilt by the Timurids and abandoned in 1620 after an earthquake.[15]
Friendly cities[edit]
1. ^ a b "Chust Yellow Pages". SPR. Retrieved 12 March 2014.
2. ^ Lovell-Hoare, Sophie; Lovell-Hoare, Max (8 July 2013). Uzbekistan. Bradt Travel Guides. p. 111. ISBN 978-1-84162-461-7.
3. ^ a b "Namangan". Ensiklopedik lugʻat (in Uzbek) 1. Toshkent: Oʻzbek sovet ensiklopediyasi. 1988. p. 554. 5-89890-002-0.
4. ^ Pierce, Richard A. (1960). Russian Central Asia, 1867-1917: A Study in Colonial Rule. University of California Press. p. 227.
5. ^ Encyclopædia Britannica: A New Survey of Universal Knowledge. Encyclopædia Britannica. 1964. p. 470.
6. ^ The World Almanac and Book of Facts. Newspaper Enterprise Association. 1928. p. 145.
7. ^ Hughes, James; Sasse, Gwendolyn (January 2002). Ethnicity and Territory in the Former Soviet Union: Regions in Conflict. Psychology Press. p. 185. ISBN 978-0-7146-5226-9.
8. ^ Melvin, Neil J. (30 May 2000). Uzbekistan: Transition to Authoritarianism. Taylor & Francis. p. 55. ISBN 978-1-135-28751-1.
9. ^ Mikhaĭlov, Nikolaĭ Nikolaevich (December 1988). A book about Russia: in the union of equals : descriptions, impressions, the memorable. Progress Publishers. p. 167.
10. ^ Google Inc. "Namangan". Google Maps (Map). Cartography by Google, Inc. Retrieved 11 March 2014.
11. ^ a b Haydarov, Murodulla (2000-2005). "Namangan". Oʻzbekiston milliy ensiklopediyasi (in Uzbek). Toshkent: Oʻzbekiston milliy ensiklopediyasi.
12. ^ The New Encyclopædia Britannica: Macropædia : Knowledge in depth. Encyclopaedia Britannica. 2002. p. 715. ISBN 978-0-85229-787-2.
13. ^ BISNIS bulletin. Business Information Service for the Newly Independent States (BISNIS), U.S. Dept. of Commerce, International Trade Administration. 1992. p. 12.
14. ^ "Central Park and Monuments of Namangan". Retrieved 11 March 2014.
15. ^ "The ancient settlement of Akhsykent Namangan. Excavations in the Ferghana Valley". Retrieved 11 March 2014. |
global_01_local_0_shard_00000017_processed.jsonl/22653 | Mike Oldfield
From Wikipedia, the free encyclopedia
(Redirected from Oldfield Music)
Jump to: navigation, search
Mike Oldfield
Mike Oldfield by Alexander Schweigert 2.jpg
Oldfield at the Night of the Proms in 2006
Background information
Birth name Michael Gordon Oldfield
Born (1953-05-15) 15 May 1953 (age 60)
Reading, Berkshire, England
Genres Progressive rock, world, folk, pop, classical, New Age, ambient, experimental, minimalist
Occupations Musician, songwriter, producer, game designer
Instruments Guitar, bass, banjo, percussion, keyboards, vocals
Years active 1967 – present
Labels Virgin, Reprise\Warner Bros., Mercury\Universal\Virgin EMI
Associated acts Maggie Reilly, Kevin Ayers, Robert Wyatt, David Bedford, Anita Hegerland, Pekka Pohjola
Website www.mikeoldfieldofficial.com
Michael Gordon "Mike" Oldfield (born 15 May 1953) is an English musician and composer whose work blends progressive rock with world, folk, classical, electronic, ambient, New Age. It is often elaborate and complex in nature. He is best known for his 1973 album Tubular Bells – which launched Virgin Records and became a hit after its opening was used as the theme for the film The Exorcist – and for his 1983 hit single "Moonlight Shadow".[1] He is also known for his hit rendition of the Christmas piece "In Dulci Jubilo".
Oldfield has released more than 20 albums with the most recent being a rock themed album titled Man on the Rocks, released in 2014.
Oldfield's parents are Raymond Oldfield, a general practitioner, and Maureen Liston, a nurse.[2] His sister Sally and brother Terry are also successful musicians and have appeared on several of Mike's albums. He also had a younger brother, David, who had Down syndrome and died in infancy.[3] Mike Oldfield was born in the Battle Hospital in Reading, Berkshire, and he attended St. Joseph's Convent School, Highlands Junior School, St. Edward's preparatory school,[4] and Presentation College in Reading. When he was 13, he moved with his parents to Harold Wood in Essex and attended Hornchurch grammar school, where, having already begun his career in music, he took just one GCE examination, in English.[4]
Early career[edit]
Oldfield's career began fairly early, playing acoustic guitar in local folk clubs. At this time, he already had two 15-minute instrumental pieces in which he would "go through all sorts of moods", precursors to his landmark 1970s compositions. In his early teens, Oldfield was involved in a beat group playing The Shadows-style music (he has often cited Hank Marvin as a major influence, and would later cover The Shadows' song "Wonderful Land"). In 1967, Oldfield and his sister formed the folk duo The Sallyangie and were signed to Transatlantic Records after exposure in the local folk scene. An album, Children of the Sun, was issued in 1968. After The Sallyangie disbanded, he formed another duo, called Barefoot, with his brother, which took him back to rock music.[5]
In 1970, Oldfield joined The Whole World – former Soft Machine vocalist Kevin Ayers's backing group – playing bass and occasionally lead guitar. He is featured on two Ayers albums, Whatevershebringswesing and Shooting at the Moon. The band also included keyboardist and composer David Bedford, who quickly befriended Oldfield, encouraged him in his composition of an early version of Tubular Bells and later arranged and conducted an orchestral version of the Tubular Bells album.
Having recorded sections of this early version of Tubular Bells as demo pieces, Oldfield attempted to persuade record labels to take on the Tubular Bells project. Nothing came of his efforts until September 1971, when he attended recording sessions at The Manor Studio – owned by a young Richard Branson and run by engineers Tom Newman and Simon Heyworth – as bass guitarist for the Arthur Louis Band. Branson already had a number of business ventures and was about to start his own record label, Virgin Records. Newman and Heyworth heard some of Oldfield's demo music and took it to Branson and Simon Draper, who eventually gave Oldfield one week's worth of recording at The Manor. During this time, he completed "Part One" of Tubular Bells; "Part Two" was then compiled over a number of months.[6]
Virgin years (1973–1991)[edit]
Tubular Bells became Oldfield's most famous work. The instrumental composition was recorded in 1972 and launched on 25 May 1973 as the inaugural album of Richard Branson's label Virgin Records. The album was groundbreaking, as Oldfield played more than twenty different instruments in the multi-layered recording made in Branson's Manor Studio, and its style moved through many diverse musical genres. Its 2,630,000 UK sales put it at No. 34 on the list of the best-selling albums in the country. In the US, it received attention with the opening theme appearing on the soundtrack of The Exorcist film. The title track subsequently became a top 10 hit single in the US as well and is today considered to be a forerunner of the New Age movement.[7] In 1974, Oldfield played guitar on the critically acclaimed album Rock Bottom by Robert Wyatt. In the autumn of 1974, the follow-up LP, Hergest Ridge, was No. 1 in the UK for three weeks before being dethroned by Tubular Bells. Although Hergest Ridge was released over a year after Tubular Bells, it reached No. 1 first. Tubular Bells spent 11 weeks (10 of them consecutive) at No. 2 before its one week at the top. In 1979, Oldfield's music was used as the musical score for The Space Movie, a Virgin movie that celebrated the tenth anniversary of the Apollo 11 mission.[8]
Like Tubular Bells, Hergest Ridge is a two-movement instrumental piece, this time evoking scenes from Oldfield's Herefordshire country retreat. It was followed in 1975 by the pioneering world music piece Ommadawn and, in 1978, Incantations, which introduced more diverse choral performances from Sally Oldfield, Maddy Prior, and the Queen's College Girls Choir. In 1975, Oldfield recorded a version of the Christmas piece "In Dulci Jubilo" which charted at No. 4 in the UK. Oldfield's 1976 rendition of "Portsmouth" remains his best-performing single on the UK Singles Chart, reaching No. 3.[9]
In 1975, Oldfield received a Grammy award for best instrumental composition in "Tubular Bells – Theme from The Exorcist". In 1976, Oldfield and his sister joined his friend and band member Pekka Pohjola to play on his album Mathematician's Air Display, which was released in 1977. The album was recorded and edited at Oldfield's Througham Slad Manor in Gloucestershire by Oldfield and Paul Lindsay.[10]
Around the time of Incantations, Oldfield underwent a controversial self-assertiveness therapy course known as Exegesis, which had a significant effect in his personality for some years, he has described, making him more confident and out-going.[11] Possibly as a result, the formerly reclusive musician staged a major Tour of Europe to promote the album, chronicled in his live album Exposed, much of which was recorded at the National Exhibition Centre near Birmingham. In 1979, he recorded a version of the signature tune of the British children's television programme Blue Peter, which was used by the show for 10 years.[12] In 1981, Oldfield was asked to compose a piece for the Royal Wedding of Charles, Prince of Wales, and Lady Diana Spencer, titled "Royal Wedding Anthem".[13]
The early 1980s saw Oldfield make a transition to mainstream pop music, beginning with the inclusion of shorter instrumental tracks and contemporary cover versions on Platinum and QE2 (the latter named after the ocean liner). Soon afterwards he turned to songwriting, with a string of collaborations featuring various lead vocalists alongside his characteristic searing guitar solos. The best known of these is "Moonlight Shadow", his 1983 hit with Maggie Reilly. The most successful Oldfield composition on the US pop charts during this period was actually a cover version — Hall & Oates's cover of Oldfield's "Family Man" for their 1982 album H2O. Released as the album's third single, it hit the Top 10 during the spring of 1983 and was a hugely popular MTV music video.
Oldfield later turned to film and video, writing the score for Roland Joffé's acclaimed film The Killing Fields and producing substantial video footage for his album Islands. Islands continued what Oldfield had been doing on the past couple of albums, with an instrumental piece on one side and rock/pop singles on the other. Of these, "Islands", sung by Bonnie Tyler and "Magic Touch", with vocals by Max Bacon (in the US version) and Glasgow vocalist Southside Jimmy (in other versions),[14] were the major hits. In the US"Magic Touch" reached the top 10 on the Billboard album rock charts in 1988. During the 1980s, Oldfield's then-wife, Norwegian singer Anita Hegerland, contributed vocals to many songs including "Pictures in the Dark".
Earth Moving was released in July 1989 and was a moderate success. The album was the first to exclusively feature rock/pop songs, several of which were released as singles: "Innocent" and "Holy" in Europe, and "Hostage" in the USA for album rock stations. This was, however, a time of much friction with his record label. Virgin Records reportedly insisted that any future instrumental album should be billed as Tubular Bells 2.[citation needed] Oldfield's rebellious response was Amarok, an hour-long work featuring rapidly changing themes (supposedly[citation needed] devised to make cutting a single from the album impossible), unpredictable bursts of noise, and a hidden Morse code insult, stating "Fuck off RB", directed at Richard Branson.[15] It was not a commercial success. His parting shot from the Virgin label was Heaven's Open, which continued the veiled attacks on Branson[clarification needed][citation needed] but was notable for being the first time Oldfield had contributed all the lead vocals himself. It was the only album he released under the name 'Michael Oldfield'.
Warner years (1992–2003)[edit]
The very first thing Oldfield did when arriving at his new label, Warner Bros., was to write and release Tubular Bells II, the sequel to his first record on Virgin, as his final insult to his former label. It was premiered at a live concert at Edinburgh Castle. He then continued to embrace new musical styles, with The Songs of Distant Earth (based on Arthur C. Clarke's novel of the same name) exhibiting a softer "New Age" sound. In 1994, he also had an asteroid, 5656 Oldfield, named after him.[16][17]
In 1995, Oldfield continued to embrace new musical styles by producing the Celtic-themed album Voyager. In 1992, Oldfield met Luar na Lubre, a Galician Celtic-folk band (from A Coruña, Spain). The band's popularity grew after Oldfield covered their song "O son do ar" ("The sound of the air") on his Voyager album.
In 1998, Oldfield produced the third Tubular Bells album (also premiered at a concert, this time in Horse Guards Parade, London), drawing from the dance music scene at his then new home on the island of Ibiza. This album was still inspired by themes from Tubular Bells, but differed in lacking a clear two-part layout.
During 1999, Oldfield released two albums. The first, Guitars, used guitars as the source for all the sounds on the album, including percussion. The second, The Millennium Bell, consisted of pastiches of a number of styles of music that represented various historical periods over the past millennium. The work was performed live in Berlin for the city's millennium celebrations in 1999–2000.
He added to his repertoire the MusicVR project, combining his music with a virtual reality-based computer game. His first work on this project is Tr3s Lunas launched in 2002, a virtual game where the player can interact with a world full of new music. This project appeared as a double CD, one with the music, and the other with the game.
In 2003, Oldfield released Tubular Bells 2003, a re-recording of the original Tubular Bells, on CD, and DVD-Audio. This was done to "fix" many "imperfections" in the original due to the recording technologies of the early 1970s and limitations in time that he could spend in the recording studio. It celebrated the 30th anniversary of Tubular Bells, Oldfield's 50th birthday and his marriage to Fanny in the same year. At around the same time Virgin released an SACD version containing both the original stereo album and the 1975 quadraphonic mix by Phil Newell. In the 2003 version, the original voice of the 'Master of Ceremonies' (Viv Stanshall) was replaced by the voice of John Cleese, Stanshall having died in the interim.
Mercury years (since 2004)[edit]
Mike Oldfield playing a PRS Custom 24 guitar at the Night of the Proms in December 2006.
On 12 April 2004 Oldfield launched his next virtual reality project, Maestro, which contains music from the Tubular Bells 2003 album and also some new chillout melodies. The games have since been made available free of charge on Tubular.net. A double album, Light + Shade, was released on Mercury Records in 2005, with whom Mike had recently signed a three-album deal. The two discs contain music of contrasting moods, one relaxed (Light) and the other more edgy and moody (Shade). Oldfield headlined the pan-European Night of the Proms tour, consisting of 21 concerts in 2006 and 2007.[18]
His autobiography Changeling was published in May 2007 by Virgin Books.[19] In March 2008 Oldfield released his first classical album, Music of the Spheres; Karl Jenkins assisted with the orchestration.[20] In the first week of release the album topped the UK Classical chart and reached number 9 on the main UK Album Chart. A single, "Spheres", featuring a demo version of pieces from the album was released digitally. The album was nominated for a Classical Brit Award, the NS&I Best Album of 2009.
In 2008, when Oldfield's original 35-year deal with Virgin Records ended, the rights to Tubular Bells and his other Virgin releases were returned to him,[21] and then they were transferred to Mercury Records.[22] Mercury issued a press release on 15 April 2009, noting that Oldfield's Virgin albums would be re-released, starting 8 June 2009. These releases include special features from the archives.[23] As of 2013 a further seven albums have been reissued and compilation albums have been released such as Two Sides.[24][25]
In March 2010, Music Week reported that publishing company Stage Three Music (now a part of BMG) had acquired a 50% stake in the songs of Oldfield's entire recorded output in a seven-figure deal.[26][27][28]
In 2008, Oldfield contributed an exclusive song ("Song for Survival") to a charity album called Songs for Survival, in support of the Survival International.[29] Oldfield's daughter, Molly, played a large part in the project.[30] In 2010 lyricist Don Black said in an interview with Music Week that he had been working with Oldfield.[31] In 2012, Oldfield was featured on Terry Oldfield's Journey into Space album and on a track called "Islanders" by German producer Torsten Stenzel's York project. In 2013 Oldfield and York released a remix album titled Tubular Beats.
At the 2012 Summer Olympics opening ceremony, Oldfield performed renditions of Tubular Bells, "Far Above the Clouds" and "In Dulci Jubilo" during a segment about the National Health Service. This track appears on the Isles of Wonder album which contains music from the Danny Boyle-directed show.
In October 2013, the BBC broadcast Tubular Bells: The Mike Oldfield Story, an hour-long appreciation of Oldfield's life and musical career, filmed on location at his home recording studio in Nassau.[3]
Oldfield's latest rock-themed album of songs, titled Man on the Rocks, was released on 3 March 2014 by Virgin EMI. The album was produced by Steve Lipson. The album marks a return of Oldfield to a Virgin branded label, through the merger of Mercury Records UK and Virgin Records after Universal Music's purchase of EMI.
Personal life[edit]
Oldfield and his siblings were raised as Roman Catholics, their Irish mother's faith.[32] In his early life Oldfield experimented with drugs such as LSD.[33] Additionally Oldfield has been quite frank in the media with his struggle with psychological problems during his lifetime.[33]
In the late 1970s, Oldfield briefly married Diana D'Aubigny (the sister of the Exegesis group leader), but this lasted just a few weeks. Mike Oldfield has seven children. In the early 1980s, he had three children with Sally Cooper (Molly, Dougal and Luke). In the late 1980s, he had two children (Greta and Noah) with Norwegian singer Anita Hegerland. In the 2000s, he married Fanny Vandekerckhove (born 1977), whom he met during his time in Ibiza; they have two sons together (Jake and Eugene).[34] Oldfield and Fanny separated in 2013.
Oldfield is a motorcycle fan and has five bikes. These include a BMW R1200GS, a Suzuki GSX-R750, a Suzuki GSX-R1000, and a Yamaha R1. He also says that some of his inspiration for composing comes from riding them.[35] Throughout his life Oldfield has also had a passion for aircraft and building model aircraft.[2] Since 1980, he has also been a licensed pilot[36] and has flown fixed wing aircraft (the first of which was a Beechcraft Sierra) and helicopters (including the Agusta Bell 47G, which featured on the sleeve of his cover version of the ABBA song "Arrival" as a parody of their album artwork). He is also interested in cars and has owned a Ferrari and a Bentley which was a gift from Richard Branson as an incentive for him to give his first live performance of Tubular Bells.[37] He has endorsed the Mercedes-Benz S-Class in the Mercedes UK magazine. Oldfield also considers himself to be a Trekkie (fan of the popular science fiction television series Star Trek).[38] He also noted in an interview in 2008 that he had two boats.[38]
In November 2006, musician Noel Gallagher won a Spanish court case against Oldfield. Gallagher had bought an Ibiza villa for £2.5 million from Oldfield in 1999, but quickly discovered that part of the cliff-top property was falling into the sea. According to The Sun, the resulting court case awarded Gallagher a six-figure sum in compensation.
In 2007, Oldfield caused a minor stir in the British press by criticising Britain for being too controlling and protective, specifically concentrating on the smoking ban which England and Wales had introduced that year. Oldfield then moved from his Gloucestershire home to Palma de Mallorca, Spain.[39][40] He has lived outside the UK in the past, including in Los Angeles and Ibiza in the 1990s and, for tax reasons, Switzerland in the mid-1980s. He also currently[when?] has a home in Monaco. In 2009, he decided to move to the Bahamas and put his home in Mallorca up for sale.[41][42]
Although Oldfield plays various instruments, he considers himself first and foremost to be a guitarist.[43]
Over the years, Oldfield has used a various selection of guitars. Among the more notable of these are:
1963[Notes 1] Fender Stratocaster
Serial no. L08044, in salmon pink (fiesta red). Used by Oldfield from 1984 (the Discovery album) until 2006 (Night of the Proms, rehearsals in Antwerp). Subsequently sold for £30,000 at Chandler Guitars.
1989 PRS Artist Custom 24
In amber, used by Oldfield from the late 1980s to the present day.
1966 Fender Telecaster
Serial no. 180728, in blonde. Previously owned by Marc Bolan, this was the only electric guitar used on Tubular Bells.[44] Having been put up by Bonhams for auction in 2007, 2008 and 2009 at estimated values of, respectively, £25,000–35,000, £10,000–15,000 and £8,000–12,000,[45][46][47] Oldfield has since sold the guitar and donated the money received to the charity SANE.
Various Gibson Les Paul and SG guitars
Used extensively by Oldfield in the 1970s and 80s.
Oldfield used a modified Roland GP8 effects processor in conjunction with his PRS Artist to get many of his heavily overdriven guitar sounds from the Earth Moving album onwards.[44] Oldfield has also been using guitar synthesizers since the mid-1980s, using a 1980s Roland GR-300/G-808 type system, then a 1990s Roland GK2 equipped red PRS Custom 24 (sold in 2006) with a Roland VG8,[44] and most recently a Line 6 Variax.
Oldfield has an unusual playing style, using both fingers and fingernails and several ways of creating vibrato: a "very fast side-to-side vibrato" or "violinist's vibrato".[48] Oldfield has also stated that his playing style originates from his musical roots playing folk music and the bass guitar.[4]
Oldfield has self-recorded and produced many of his albums, and played the majority of the instruments that feature on them, largely at his home studios. In the 1990s and 2000s he has been mainly using DAWs such as Apple Logic, Avid Pro Tools and Steinberg Nuendo as recording suites.[49] For composing classical music Oldfield has been quoted as using the software notation program Sibelius[19] running on Apple Macintoshes.[50] He also used the FL Studio DAW on his 2005 double album Light + Shade.[51] Among the mixing consoles Oldfield has owned are an AMS Neve Capricorn 33238, a Harrison Series X,[52] and a Euphonix System 5-MC.[53]
Over the years, Oldfield has owned and used a vast number of synthesizers and other keyboard instruments. In the 1980s, he composed the score for the film The Killing Fields on a Fairlight CMI.[44] Some examples of keyboard and synthesised instruments which Oldfield has made use of include Sequential Circuits Prophets (notably on Platinum and The Killing Fields), Roland JV-1080/JV-2080 units (1990s), a Korg M1 (as seen in the "Innocent" video), a Clavia Nord Lead and Steinway pianos. In recent years, he has also made use of software synthesis products, such as Native Instruments.[54]
Oldfield has had more than 30 charting albums and 25 charting singles on the British charts and many more around the world.
Studio albums[edit]
People are very complicated machines – to get them to do what you want, you have to be very careful. You have to behave towards them in a very definite sequence.
— NME, April 1979[55]
See also[edit]
1. ^ Also quoted as 1961 and 1962.
1. ^ "Mike Oldfield profile". Decca. Retrieved 23 August 2011.
2. ^ a b "Ommadawn". Rob Miles (amarok.ommadawn.net). Retrieved 11 July 2008.
3. ^ a b "Tubular Bells: The Mike Oldfield Story". BBC. 11 October 2013. Retrieved 11 October 2013.
4. ^ a b c Oldfield, Mike (2007). Changeling. Virgin Books. ISBN 978-1-85227-381-1.
5. ^ "Not Totally Tubular by Dave Thompson". Goldmine. 18 July 1997. Retrieved 2 April 2008.
6. ^ "The Making of Tubular Bells". Q Magazine. August 2001. Retrieved 12 January 2012.
7. ^ Birosik, Patti Jean (1989). The New Age Music Guide. Collier MacMillan. p. 138. ISBN 0-02-041640-7.
8. ^ "The Space Movie website". Retrieved 25 June 2010.
9. ^ "Mike Oldfield – "Portsmouth"". EveryHit. Retrieved 8 July 2010.
10. ^ "Pekka – The Mathematician's Air Display". Discogs. Retrieved 23 June 2010.
11. ^ "This is the year of the expanding man...". Karl Dallas – Melody Maker. 25 November 1978. Retrieved 2 April 2008.
12. ^ "Blue Peter's theme tune". BBC New Talent. April 2007. Retrieved 20 June 2010.
13. ^ "Rare Tracks". Amarok.Ommadawn.net. Retrieved 24 January 2013.
14. ^ "Southside Jimmy Biography". Southside Jimmy. Retrieved 2 November 2008.
15. ^ "FAQ". Tubular.net. Retrieved 26 October 2013.
16. ^ "Oldfield 5656". Harvard-Smithsonian Center for Astrophysics. Retrieved 2 April 2008.
17. ^ "Mike Oldfield Interview". BBC Radio 2. 9 September 1998. Retrieved 2 April 2008.
18. ^ "Nokia Night of the Proms 2006". Night of the Proms. Retrieved 1 June 2006.
19. ^ a b "Craft: Mike Oldfield". Resolution Magazine. March 2007. Retrieved 2 April 2008.
20. ^ "Mike Oldfield artist details". Universal Classics and Jazz. Retrieved 2 April 2008.
21. ^ Jackson, Alan (1 March 2008). "Mike Oldfield regains control of Tubular Bells". London: The Times. Retrieved 5 April 2008.
22. ^ "News Archives". Tubular.net. 3 June 2005. Retrieved 26 May 2008.
23. ^ "Universal press release – Tubular Bells". Mike Oldfield Information Service. 15 April 2009. Retrieved 20 April 2009.
24. ^ "Universal press release – Hergest Ridge and Ommadawn". The Official Mike Oldfield Information Service / Universal Music. Retrieved 15 May 2010.
25. ^ "The next wave of Mike Oldfield Deluxe Editions is coming...". Mike Oldfield Official. 15 February 2011. Retrieved 14 March 2011.
26. ^ "Seven-figure deal ties Oldfield to Stage Three". Music Week. 1 March 2010. Retrieved 10 April 2010.
27. ^ "News". Stage Three Music. 9 March 2010. Retrieved 10 April 2010.
28. ^ "Roster". Stage Three Music. Retrieved 10 April 2010.
30. ^ "Survival Project – Album Track listing". Kensaltown Records. Retrieved 25 August 2008.
31. ^ "Masterclass: Black's Magic". California Chronicle (Music Week). 2010. Retrieved 30 October 2010. "I've just written with Mike Oldfield and he sent me Tubular Bells and I thought, "What goes with that.""
32. ^ "Interview with Mike Oldfield". BBC 1's Heaven and Earth programme. 25 August 2002. Retrieved 2 April 2008. "My mother being Irish, she was a Roman Catholic. They put me on the first stages of educating me to be a Catholic"
33. ^ a b "Full of single mothers and muggers. And over-taxed: What the Tubular Bells star of that glorious opening ceremony really thinks about Britain". The Daily Mail. 2012-08-07. Retrieved 2013-12-23.
34. ^ Jackson, Alan (1 March 2008). "Mike Oldfield regains control of Tubular Bells". London: The Times. Retrieved 17 July 2008.
35. ^ "Mike Oldfield Motorcycle News 23 may". Motor Cycle News. 25 May 2007. Retrieved 1 April 2008.
36. ^ "Mike Oldfield Biography 1". Amadian. Retrieved 6 March 2010.
37. ^ Branson, Richard. Losing My Virginity. Virgin Books. ISBN 978-0-7535-0648-6.
38. ^ a b "The 5-minute Interview: Mike Oldfield, Musician". London: The Independent. 7 April 2008. Retrieved 13 July 2008.
39. ^ Barrell, Tony (20 @ERROR@ 2007). "Ringing the changes". London: The Times. Retrieved 1 April 2008.
40. ^ "Mike Oldfield quits 'prep school Britain' over smoking ban". This is London. 21 October 2007. Retrieved 1 April 2008.
41. ^ Tyzack, Anna (26 March 2009). "Mike Oldfield's house for sale". London: The Daily Telegraph. Retrieved 26 March 2009.
42. ^ "Bunyola, Mallorca Ref:6641". Savills. 2009. Retrieved 31 March 2009.
43. ^ "Mike Oldfield video interview". RecordProduction.com. Retrieved 15 May 2008.
44. ^ a b c d "Interview with Mike Oldfield". Roland PowerOn magazine (Issue 4). 6 June 1999. Retrieved 1 April 2008.
45. ^ "Lot 391 Mike Oldfield's Fender Telecaster, used to record the album 'Tubular Bells', Film and Rock & Roll Memorabilia Auction 15242". Bonhams. 20 June 2007. Retrieved 21 April 2012.
46. ^ "Lot 361 Mike Oldfield's Fender Telecaster, used to record the album 'Tubular Bells', Entertainment Memorabilia Auction 15765". Bonhams. 15 January 2008. Retrieved 21 April 2012.
47. ^ "Lot 277 Mike Oldfield's Fender Telecaster, used to record the album 'Tubular Bells', Entertainment Memorabilia Auction 16905". Bonhams. 16 December 2009. Retrieved 21 April 2012.
48. ^ "Gareth Randall Interviews Mike Oldfield". 1 June 1995. Retrieved 1 April 2008.
49. ^ "Tubular Worlds". Sound on Sound. February 1995. Retrieved 1 April 2008.
50. ^ "I use my Mac for... Composing music". MacFormat. April 2008. Retrieved 1 April 2008.
51. ^ "Interview of Mike Oldfield by Image-Line". Image-Line. Retrieved 11 September 2008.
52. ^ "Interview with Mike Oldfield". Home & Studio Recording Magazine. March 1991. Retrieved 19 April 2008.
53. ^ "Mike Oldfield Chooses Euphonix System 5-MC Integrated DAW Controller with Apple’s Logic Pro". Euphonix. 17 July 2006. Archived from the original on 16 August 2006.
54. ^ "Light & Shade". Tubular.net. Retrieved 28 September 2010.
55. ^ Tobler, John (1992). NME Rock 'N' Roll Years (1st ed.). London: Reed International Books Ltd. p. 325. CN 5585.
External links[edit]
Official sites
Fan-based sites
Other sites |
global_01_local_0_shard_00000017_processed.jsonl/22654 | Pontyclun railway station
From Wikipedia, the free encyclopedia
(Redirected from Pontyclun station)
Jump to: navigation, search
Pontyclun National Rail
Welsh: Pont-y-clun
Pontyclun Railway Station, 2006
Place Pontyclun
Local authority Rhondda Cynon Taf
Coordinates 51°31′26″N 3°23′32″W / 51.5239°N 3.3921°W / 51.5239; -3.3921Coordinates: 51°31′26″N 3°23′32″W / 51.5239°N 3.3921°W / 51.5239; -3.3921
Grid reference ST035815
Station code PYC
Managed by Arriva Trains Wales
Number of platforms 2
Live arrivals/departures and station information
from National Rail Enquiries
Annual rail passenger usage*
2004/05 0.174 million
2005/06 Increase 0.176 million
2006/07 Increase 0.190 million
2007/08 Increase 0.208 million
2008/09 Increase 0.224 million
2009/10 Increase 0.228 million
2010/11 Increase 0.231 million
2011/12 Increase 0.241 million
2012/13 Increase 0.256 million
Original company South Wales Railway / Cowbridge Railway
Pre-grouping Great Western Railway / Taff Vale Railway
Post-grouping Great Western Railway
18 June 1850 SWR station opened as Llantrissant for Cowbridge
18 September 1865 Cowbridge Rly station opened as Llantrissant
c. 1866 GWR (ex-SWR) station renamed Llantrissant
by 1902 both stations renamed Llantrisant
21 September 1925 Stations amalgamated
2 November 1964 Closed
28 September 1992 Reopened as Pontyclun
National RailUK railway stations
* Annual estimated passenger usage based on sales of tickets in stated financial year(s) which end or originate at Pontyclun from Office of Rail Regulation statistics. Methodology may vary year on year.
Portal icon UK Railways portal
Pontyclun railway station is an unstaffed, minor railway station in Pontyclun, in the County Borough of Rhondda Cynon Taf, South Wales. The station is at street level, on Station Approach, Pontyclun. It is a stop on the South Wales Main Line, served by trains on the Maesteg Line, and occasionally by the Swanline Cardiff to Swansea regional services, as well as one early-morning daily service to Manchester and a late-night daily service to Carmarthen. The station and all trains are operated by Arriva Trains Wales.
The station was rebuilt and reopened under British Rail as Pontyclun on 28 September 1992.[1] It was previously called Llantrisant station and was originally two separate railway stations that were merged in 1925, those originally belonging to the South Wales Railway and the Cowbridge Railway,[2] whose successors, the Great Western Railway and the Taff Vale Railway respectively, had amalgamated in 1922.
A 1903 Railway Clearing House Junction Diagram showing (left) railways in the vicinity of Pontyclun (shown here as LLANTRISANT). GWR in yellow; TVR in green.
The first section of the South Wales Railway (SWR), that between Chepstow and Swansea, opened on 18 June 1850.[3] The original stations on that line included one named Llantrissant for Cowbridge.[2]
The station became a junction with the opening of the first section of the Ely Valley Railway (EVR) to Tonyrefail on 2 August 1860,[4] although passenger services along that line did not begin until 1 August 1865.[5] The EVR opened a branch to Brofiskin Colliery in 1862,[6] and another railway, the Llantrisant and Taff Vale Junction Railway, which opened in December 1863,[7] intended to use part of that branch to gain access to Llantrisant via a connection at Maesaraul Junction, but in order to do this, the Brofiskin branch had to be altered to mixed gauge - this occurred in December 1864.[8]
The station name was simplified to Llantrissant c. 1866,[2] by which time the SWR had amalgamated with the Great Western Railway (GWR) in 1863.[9] Adjacent to this station was the terminus of the Cowbridge Railway, which opened on 18 September 1865, originally being named Llantrissant.[2] The Cowbridge Railway was leased by the Taff Vale Railway (TVR) in 1876, and absorbed by that concern in 1889.[10] Both the GWR and TVR stations had their names amended to Llantrisant by 1902.[2] The TVR in its turn amalgamated with the GWR on 1 January 1922, and on 21 September 1925 their respective stations were merged as a single station.[2]
Llantrisant was a major intermediate station on the South Wales Main Line. It consisted of two central through platforms and bays for the Ely Valley line, the Llantrisant & Taff Vale Junction line and the branch to Cowbridge and Aberthaw.[11] The station was closed on 2 November 1964.[2] The station was rebuilt and reopened as Pontyclun on 28 September 1992.[1]
Extensive sidings existed around the station for the coal and mineral traffic generated by the mines in the area. At least the line to Cwm Colliery was in regular use until 1984.[citation needed]
Cwm Colliery branch line[edit]
A single track railway runs north from Pontyclun station - the remnants of the Llantrisant and Taff Vale Junction Railway. The track turns west at Talbot Green to run roughly parallel to the Afon Clun, alongside the north of the A473, which runs between Pontypridd and Bridgend. At Cross Inn the track turns north east, running south of Llantrisant and north of Caerau Hillfort, an Iron Age enclosure. Originally, it ran to the Cwm Coking Works at Tynant, Beddau, just past the former station Llantwit Fardre, although the track has been dismantled to the east of Cross Inn. The original railway paraphernalia remains intact between Talbot Green and Pontyclun, including the track, signals and bridges with cages above the track to prevent people throwing things (or themselves) onto the trains, tracks or coal wagons. The track remains embedded in the road where it crosses the A473, warning lights are at the roadside and roadsigns warn drivers to stop if they see warning lights flash at the level crossing. A consultative study in 2006 (Sewta Rail Strategy Study) considered the possibility of reopening the Pontyclun to Beddau branch line, as a passenger line rather than just for freight. This would require new stations at Talbot Green, Llantrisant, Gwaun Meisgyn and Beddau (Tynant).[12]
The former Llantrisant station in 1962
Mondays to Saturdays there is an hourly service eastbound to Cardiff Central, Newport, Chepstow, Lydney, Gloucester and Cheltenham Spa, as well as an early-morning service to Manchester via Cardiff, Newport and the Welsh Marches Line via Hereford, Shrewsbury and Crewe.
Westbound there is an hourly service to Bridgend and Maesteg, as well as occasional Swanline regional services from Cardiff Central to Swansea.
On Sundays the service decreases dramatically. There are just three trains per day in each direction: westbound services run to Milford Haven, whilst eastbound services run to Manchester.
Services in the week are operated mainly by Class 150 Sprinter units, although on some services, either Class 158 Express Sprinter units or Class 175 Coradia units are used.
On Sundays all services are operated by Class 175 units.
The station has 2 platforms:
• Platform 1, for westbound trains towards Maesteg
• Platform 2, for eastbound trains towards Cardiff
Pontyclun station is unstaffed. It has neither ticket gates nor barriers. The station has no ticket office or self-service ticket machines; passengers must either purchase tickets on board trains, or at their destinations. Both platforms have shelters. The station car park is free-of-charge to rail users.[13]
A locomotive depot, known as Llantrisant, was situated between the station and Mwyndy Junction, on the eastern side of the curve. It housed around 20 locomotives, and closed in October 1964.[14]
1. ^ a b Butt 1995, p. 188
2. ^ a b c d e f g Butt, R.V.J. (1995). The Directory of Railway Stations. Yeovil: Patrick Stephens Ltd. p. 147. ISBN 1-85260-508-1. R508.
3. ^ MacDermot, E.T. (1927). History of the Great Western Railway, vol. I: 1833-1863. Paddington: Great Western Railway. pp. 303, 563, 865.
4. ^ MacDermot 1927, p. 861
5. ^ MacDermot, E.T. (1931). History of the Great Western Railway, vol. II: 1863-1921. Paddington: Great Western Railway. pp. 82–83, 616. OCLC 55853736.
6. ^ MacDermot 1927, p. 862
7. ^ Awdry, Christopher (1990). Encyclopaedia of British Railway Companies. London: Guild Publishing. p. 32. CN 8983.
8. ^ MacDermot 1931, p. 596
9. ^ MacDermot 1927, p. 586
10. ^ Awdry 1990, pp. 23–24
11. ^ Chapman, C (1996). The Llantrisant Branches of the Taff Vale Railway. The Oakwood Press. ISBN 0-85361-481-4.
12. ^ "Sewta Rail Strategy Study Executive Summary" (PDF). Jacobs Consultancy, Sewta Rail Strategy Study, Executive Summary. South East Wales Transport Alliance. 2006. Retrieved 3&February 2011.
13. ^ "Pontyclun Station". National Rail. Retrieved 04/02/2011.
14. ^ Lyons, E.T. (1974) [1972]. An Historical Survey of Great Western Engine Sheds 1947. Headington: Oxford Publishing Co. p. 190. ISBN 0-902888-16-1.
External links[edit]
Preceding station National Rail National Rail Following station
Cardiff Central Arriva Trains Wales
Maesteg Line
Disused railways
Terminus Great Western Railway
Ely Valley Railway
Coed Ely
Line and station closed
Terminus Llantrisant and Taff Vale Junction Railway
Cross Inn
Line and station closed
Terminus Taff Vale Railway
Line and station closed
Historical railways
Line open, station closed
Great Western Railway
South Wales Main Line
Line and station open |
global_01_local_0_shard_00000017_processed.jsonl/22655 | Resm-i mücerred
From Wikipedia, the free encyclopedia
Jump to: navigation, search
The resm-i mücerred was a bachelor tax in the Ottoman Empire, related to the resm-i çift and the resm-i bennâk.[1]
The amount payable varied from year to year and from region to region, but the tax was payable annually, in March, to the timar holder (nominally a sipahi) or to the tax-farmer (iltizam). However, a muafname (tax exemption) might excuse a person, or a village, or an entire social group from paying resm-i mücerred and related taxes; alternatively, örfi taxes might be lifted from a community but they would still have to pay resm-i mücerred.
Resm-i mücerred was paid by landless poor or unmarried peasants who did not have sufficient resources to qualify for the resm-i çift and the resm-i bennâk land-taxes - whose names, taken literally, refer to one "çift" of land, and a half-çift, respectively.[2] This structure may have been directly inherited from the Byzantine system of land taxes, in areas which were conquered by the Ottomans.[3]
One 19th-century tahrir, from a group of villages in a district which is now in Iran, set çift resmi at 50 akçes, bennak resmi at 18 akçes, caba resmi (for farmers who rented rather than owned land) was 12 akçes, and mücerred resmi was valued at only 6 akçes; in this case, the tahrir set aside tax revenue from the villages to support a local charitable foundation (or trust), rather than returning it directly to the state.[4] Comparison of different tax records suggests that the ratio between tax rates for bachelors and for established farmers may have narrowed over time.[1]
Tax records show that mücerred were more likely to migrate to other areas; they had fewer ties to the land, and may have been more vulnerable. Migrant mücerred were more likely to make their way to a growing town; some may have moved locally, but a few would travel to Istanbul from a distant district.[5]
1. ^ a b "EFFICIENCY AND CONTINUITY IN PUBLIC FINANCE: THE OTTOMAN SYSTEM OF TAXATION". Int. J. Middle East Stud. 37: 567–586. 2005. doi:10.1017.S0020743805374058. Retrieved 19 April 2011.
2. ^ Motika, Raoul (1995). Türkische Wirtschafts- und Sozialgeschichte (1071-1920). Harrassowitz. p. 18. ISBN 978-3-447-03683-2.
4. ^ "HACI BEKTASH VELI’S SON: PIR SALTUK ZAVIYE FOUNDATION IN IRAN". Türk Kültürü ve Hac Bektafl Velî Arafltrma Dergisi 50: 43–44. 2009. Retrieved 19 April 2011.
5. ^ Gumuscu, Osman (2004). "Internal migrations in sixteenth century Anatolia". Journal of Historical Geography 30: 231–248. doi:10.1016/j.jhg.2003.08.021. |
global_01_local_0_shard_00000017_processed.jsonl/22657 | USS Mahan
From Wikipedia, the free encyclopedia
Jump to: navigation, search
The name Mahan was assigned to the following four United States Navy ships, in honor of Rear Admiral Alfred Thayer Mahan, naval historian and theorist on sea power.
• USS Mahan (DD-102/DM-7): (DD-102) was a Wickes-class destroyer commissioned in 1918, and converted to the light minelayer DM-7 in 1920. She was decommissioned in 1930, and sold for scrap in 1931.
• USS Mahan (DD-364) was the lead ship of the Mahan-class destroyers; commissioned in 1936, disabled by Japanese aircraft, and scuttled by friendly fire in 1944.
• USS Mahan (DLG-11/DDG-42): (DLG-11) was commissioned as a Farragut-class guided missile frigate in 1960, and reclassified as the guided missile destroyer (DDG-42) in 1975. She was decommissioned in 1993 and completely dismantled in 2004.
• USS Mahan (DDG-72) was commissioned in 1998: the Arleigh Burke-class destroyer was still in service as of 2014. |
global_01_local_0_shard_00000017_processed.jsonl/22658 | From Wikipedia, the free encyclopedia
Jump to: navigation, search
UMMAS (Unity Ministers of the Mid-Atlantic States) is a voluntary association of Unity Ministers, Spiritual Leaders, and their spouses/partners in North Carolina, South Carolina, Georgia, and Tennessee. UMMAS is a sub-region of the Southeast Unity region, one of the regional associations of churches affiliated with The Association of Unity Churches and Unity Worldwide Ministries.
UMMAS events[edit]
• UMMAS holds a 2-day Training & Networking session for Board members and ministers from UMMAS churches, usually in mid-July.
• UMMAS holds quarterly meetings of member ministers & spouses/partners in ministry for networking, brainstorming, "heart-check" (personal support), fellowship, mentoring, and planning our events.
External links[edit]
• [1] UMMAS
• [2] Unity Worldwide Ministries
• [3] UMMAS Retreat
• [4] Unity regional resources |
global_01_local_0_shard_00000017_processed.jsonl/22659 | University of Alaska Anchorage
From Wikipedia, the free encyclopedia
Jump to: navigation, search
University of Alaska Anchorage
Uaa alaska-seal.jpg
Established 1954 (as Anchorage Community College),
1969 (as Anchorage Senior College),
1976 (as UAA)
Type Public
Endowment $44,669,210 (2012)
Chancellor Tom Case
Students 17,129
Location Anchorage, Alaska
61°11′23.59″N 149°49′37.25″W / 61.1898861°N 149.8270139°W / 61.1898861; -149.8270139Coordinates: 61°11′23.59″N 149°49′37.25″W / 61.1898861°N 149.8270139°W / 61.1898861; -149.8270139
Urban area
Main campus: 141 hectares
Colors Green and Gold
Athletics NCAA
Nickname Seawolves
Affiliations UArctic, Great Northwest Athletic Conference, Western Collegiate Hockey Association, Rocky Mountain Intercollegiate Ski Association
The University of Alaska Anchorage (commonly referred to as UAA) is a public research university and currently has the highest enrollment within the University of Alaska System. With over 17,000 undergraduate, graduate, and professional students, it is also the largest institution of higher learning in Alaska. UAA's main campus is located in Anchorage, approximately four miles southeast of its downtown area in the University-Medical District, adjacent to the Alaska Native Medical Center, Alaska Pacific University and Providence Alaska Medical Center. Nestled among an extensive green belt, close to scenic Goose Lake Park, UAA has been recognized each of the past three years as a Tree Campus USA by the Arbor Day Foundation.[1] The campus is connected by a network of paved, outdoor trails, as well as an elevated, indoor "spine" that extends east to west from Rasmuson Hall, continuing through the student union and terminating inside the Consortium Library. UAA is accredited by the Northwest Commission on Colleges and Universities.[2] U.S. News and World Report has ranked UAA in the top 20 public regional universities in the West and 58th overall.[3]
UAA is divided into six teaching units at the Anchorage campus: the colleges of Education, Health and Social Welfare, Arts and Sciences, Business and Public Policy, the Community and Technical College, and the School of Engineering. Included with UAA for administrative purposes are four satellite campuses: Matanuska-Susitna College, Kenai Peninsula College, Kodiak College, and Prince William Sound Community College. UAA offers Master's Degrees and Graduate Certificates in select programs, and the ability to complete certain PhD programs through cooperating universities through its Graduate Division.[4] As of May 2012, the university is accredited to confer doctoral degrees.[5]
The University of Alaska Anchorage traces its origins back to 1954, five years before Alaska became the 49th U.S. state. That year, Anchorage Community College (ACC) was founded and began offering evening classes to 414 students at Elmendorf Air Force Base. This was the first time that college-level courses were offered in the Anchorage area. In 1962, ACC, along with other community colleges around the state, was incorporated into the University of Alaska statewide system. Five years later, ACC began offering both day and evening classes at the current campus location. ACC provided academic study for associate degrees, the first two years of work toward baccalaureate degrees, and a wide variety of adult learning, career and continuing education programs.
In the late 1960s, strong interest in establishing a four-year university in Anchorage brought about the birth of the University of Alaska, Anchorage Senior College (ASC). While ACC administered the lower division college, ASC administered upper division and graduate programs leading to baccalaureate and master’s degrees, as well as continuing education for professional programs. In 1971, the first commencement was held at Anchorage’s West High School, where 265 master’s, baccalaureate and associate degrees were awarded. ASC moved to the Consortium Library Building in 1973. The following year, when the first classroom and office facility was completed, daytime courses were offered for the first time. In 1977, ASC became a four- year university and was renamed the University of Alaska, Anchorage (UA,A). Ten years later, ACC and UA,A merged to become what is now known as the University of Alaska Anchorage (UAA).
Today, nearly 18,000 students attend UAA, a growing and expanding university of first choice. More than 200 programs, ranging from certificate programs to associate, baccalaureate, master's, and doctoral degrees are offered at campuses in Anchorage and community campuses and extension centers throughout Southcentral Alaska. The university's mission is to discover and disseminate knowledge through teaching, research, engagement and creative expression. UAA remains committed to serving the higher education needs of the state, its communities and its diverse peoples. The University of Alaska Anchorage is an open-access university, actively seeking to maintains a rich, diverse and inclusive environment.[6]
Aviation Technology[edit]
UAA offers Associate of Applied Science and Bachelor of Science degrees[7] in:
• Air Traffic Control
• Aviation Administration
• Professional Piloting
An associate of applied science degree is also offered in:
• Aviation Maintenance
UAA Aviation Technology division is part of Center of Excellence for General Aviation (CGAR)[8] which is a collaborative research effort between the following member universities:
Colleges and schools[edit]
Financial Aid[edit]
• Alaska Advantage Education Grant
• University of Alaska Grant
• and more[9]
Centers and Institutes[edit]
• Alaska Center for Rural Health/Alaska’s Area Health Education Center (ACRH/AHEC)
• Alaska Center for Supply Chain Integration (ACSCI)
• Alaska Natural Heritage Program (AKNHP)
• Alaska Small Business Development Center (Alaska SBDC)
• Center for Alaska Education Policy Research (CAEPR)
• Center for Alcohol and Addiction Studies (CAAS)
• Center for Behavioral Health Research and Services (CBHRS)
• Center for Community Engagement and Learning (CCEL)
• Center for Economic Development (CED)
• Center for Economic Education (CEE)
• Center for Human Development (CHD)
• Environment and Natural Resources Institute (ENRI)
• Ethics Center
• Institute for Circumpolar Health Studies (ICHS)
• Institute of Social and Economic Research (ISER)
• Justice Center
• Montgomery Dickson Center for Japanese Language and Culture
• Psychological Services Center (PSC)
Accolades is the University of Alaska Anchorage Magazine for Alumni and Friends.
The Alaska Quarterly Review is a literary magazine published by UAA.
The student newspaper is The Northern Light.
Understory is a magazine run by Creative Writing and Literary Arts graduate students, open for submissions from any UAA undergraduate student.
True North is a yearly magazine produced by students in the Department of Journalism and Public Communications.
The Pacific Rim Conference on Literature and Rhetoric is a yearly conference showcasing Literary Scholars and Rhetoricians from around the nation, as well as a venue for graduates from UAA and other universities to share their work. See UAA English Web site to learn more about the Pacific Rim Conference.
UAA’s highly visible athletic teams, known as the Seawolves, compete in 11 NCAA sports: men’s ice hockey, men’s and women’s basketball, men’s and women’s skiing, men’s and women’s cross country, women’s gymnastics, men’s and women’s indoor and outdoor track and field, and women’s volleyball. The university is a NCAA Division I school for gymnastics and hockey, and a member of the Western Collegiate Hockey Association. UAA is a Division II member of the Great Northwest Athletic Conference in men's and women's basketball, volleyball, men's and women's cross country, men's and women's indoor track & field, and men's and women's outdoor track and field. Other conference affiliations are the Mountain Pacific Sports Federation (gymnastics) and the Rocky Mountain Intercollegiate Ski Association.
Over the years, the Seawolves have produced multiple national champions in skiing and gymnastics as well as several NCAA Tournament bids in other sports. UAA sports receive national television exposure thanks to the annual Carrs/Safeway Great Alaska Shootout basketball tournament, held at the Sullivan Arena. The Kendall Hockey Classic is one of the top preseason college hockey tournaments in the country, and the Seawolf volleyball team hosts some of the top Division II programs every September in the UAA Invitational.
The Seawolves train and compete in some of Alaska’s top facilities, including the Sullivan Arena for hockey and the Shootout, and the Wells Fargo Sports Complex for volleyball, gymnastics and regular-season basketball. UAA’s alpine skiers take advantage of nearby Mount Alyeska, a world-class slope, while the nordic skiers and cross-country runners use Anchorage’s intricate trail system to train in a recreational getaway. The University of Alaska Anchorage will open the 5,600 seat Alaska Airlines Center later in 2014. Serving as Alaska's premier, multi-purpose arena, it will replace the Wells Fargo Sports Center as the home of UAA's athletic department and programs, including UAA Seawolves basketball and volleyball teams.[10]
Student life[edit]
UAA's student housing comprises nearly 1,000 students:
• Three co-educational residence halls (North, West, and East Halls), completed in 1998. Each holds 230 students, most living in individual bedrooms; rooms are grouped in suites of one, two, or four.
• The Main Apartment Complex (MAC), completed in 1984, was once family housing. There are 74 four-bedroom apartments in six buildings, each housing four same-sex students.
• The Templewood Apartments hold 80 students in 20 apartments.
Student government[edit]
The Union of Students of the University of Alaska Anchorage or USUAA is the student governing body for University of Alaska Anchorage. Each student pays $1 per credit hour for students registered in 3 or more credits. Maximum charge $12 and maximum credit hour is 12.
The President, Vice President and 23 Senators are elected at-large to serve on the Assembly. Four representatives (Residence Hall Association, Club Council, Greek Council and Graduate Student Association) complete the rest of the board. The President and Vice President are elected in the spring for one year terms.
The union has co-sponsored political debates in Anchorage, including a 2004 debate held at the university between Senatorial candidates Tony Knowles and Lisa Murkowski.[11]
Student Media[edit]
UAA has two primary sources of student-run media. The Northern Light is an award winning student newspaper printed every Tuesday with a wide coverage from school news sports to community events and entertainment reviews.
KRUA 88.1FM is the on-campus, non-commercial radio station run by a collective of student staff and a host of volunteers from both the school and greater Anchorage community.
Student research, scholarship and creativity[edit]
The University Honors College Office of Undergraduate Research and Scholarship (OURS) is the center for undergraduate research and experiential learning at UAA. The Honors College supports and funds research and scholarship for students across all UAA disciplines, schools, colleges, and within a global community of scholars. Fostering inspired teaching and active student learning, OURS advances the involvement of UAA students in research and creative activities—whether they be independent or with UAA faculty. OURS supports a wide variety of opportunities, including 14 campus-wide award programs.
Every April, the Undergraduate Research and Discovery Symposium celebrates and connects undergraduate research taking place across UAA and fosters scholarly discussion between students, faculty and the community. Participation in the symposium provides undergraduates with opportunities to gain valuable experience in both oral and visual presentation of their research. Attending the symposium is also a great way for students who want to become involved in undergraduate research to learn about the opportunities to do so at UAA. The symposium and UAA’s annual Student Showcase emulate professional meetings wherein student research and creative expressions are reviewed by faculty and culminate in university publications.
See also[edit]
1. ^ Accessed 15 August 2013
2. ^ Directory of Institutions S - U, Northwest Commission on Colleges and Universities, 2013. Accessed 24 Jan. 2013.
3. ^ "University of Alaska--Anchorage," Regional University West Rankings, U.S. News and World Report, 2013. Accessed 24 Jan. 2013.
4. ^ "UAA Graduate School Degrees". Accessed December 15, 2011.
5. ^ Green and Gold News. 3 May 2012. UAA. Retrieved 14 June 2012.
6. ^
7. ^ "Aviation Technology, Academics," University of Alaska Anchorage, 2012. Accessed 24 Jan. 2013.
8. ^ "Welcome to CGAR." Center For General Aviation Research, Embry Riddle Aeronautical University. 2013. Accessed 24 Jan. 2013.
9. ^ Logistics & Supply Chain Education Financial Aid at UAA
10. ^
11. ^ "Knowles, Murkowski debate Tuesday". KINY/Associated Press. October 26, 2004. Accessed March 9, 2008.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/22660 | From Wikipedia, the free encyclopedia
Jump to: navigation, search
Wallerfield is an area in Trinidad and Tobago. Located south of Arima and north of Cumuto, it served Waller Air Force Base. Since the clousure of US Army base in May 1949, it became the informal home of various types of racing (using former airstrips) for over 40 years. Today construction progresses for the site of a new multi-million dollar University of Trinidad and Tobago campus complex, several housing developments and other projects. Further projects have been planned to transform it into Trinidad and Tobago first Science and Technology Research Park, which will be known as Tamana InTech Park.
Further reading[edit]
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/22661 | William Westmoreland
From Wikipedia, the free encyclopedia
(Redirected from William C. Westmoreland)
Jump to: navigation, search
William Westmoreland
Gen William C Westmoreland.jpg
Birth name William Childs Westmoreland
Nickname "Westy"
Born (1914-03-26)March 26, 1914
Saxon, South Carolina
Died July 18, 2005(2005-07-18) (aged 91)
Charleston, South Carolina
Place of burial West Point Cemetery
Allegiance United States United States of America
Service/branch United States Army
Years of service 1936-1972
Rank US Army O10 shoulderboard rotated.svg General
Commands held
504th Parachute Infantry Regiment
187th Regimental Combat Team
101st Airborne Division
Superintendent of the U.S. Military Academy
XVIII Airborne Corps
Military Assistance Command, Vietnam
Chief of Staff of the United States Army
Battles/wars World War II
Korean War
Vietnam War
Awards Distinguished Service Medal ribbon.svg Distinguished Service Medal (3)
Legion of Merit ribbon.svg Legion of Merit (3)
Bronze Star ribbon.svg Bronze Star (2)
Air Medal ribbon.svg Air Medal (10)
William Childs Westmoreland (March 26, 1914 – July 18, 2005) was a retired United States Army four-star general, who commanded U.S. military operations in the Vietnam War at its peak (1964–68), including during the 1968 Tet Offensive. He adopted a strategy of attrition against the Viet Cong and the North Vietnamese Army. He later served as U.S. Army chief of staff from 1968 to 1972.
Early life[edit]
William Westmoreland was born in Spartanburg County, South Carolina, to Eugenia Talley Childs and James Ripley Westmoreland. His upper-middle-class family was involved in the local banking and textile industries. At the age of 15, William became an Eagle Scout at Troop 1 Boy Scouts, and was recipient of the Distinguished Eagle Scout Award and Silver Buffalo from the Boy Scouts of America as a young adult. After spending a year at The Citadel in 1932 he was appointed to attend the United States Military Academy. His motive for entering West Point was "to see the world". He was a member of a distinguished West Point class that also included Creighton Abrams and Benjamin O. Davis Jr. Westmoreland graduated as first captain—the highest graduating rank—and received the Pershing Sword, which is given to the most able cadet at the academy.[1][2] Westmoreland also served as the superintendent of the Protestant Sunday School Teachers.[3] Following graduation in 1936, he became an artillery officer and served in several different commands. In World War II he saw combat in Tunisia, Sicily, France, and Germany. He reached the temporary wartime rank of colonel, and on October 13, 1944, was appointed the chief of staff of the 9th Infantry Division.[4]
Westmoreland established a balanced reputation as a stern taskmaster who cared about his men and took a great interest in their welfare. One called him "the most caring officer, for soldiers, that I have ever known".[citation needed] After the war he completed a three-month management program at Harvard Business School. As Stanley Karnow noted, "Westy was a corporation executive in uniform."[5]
In 1962 Westmoreland was admitted as an honorary member of the Massachusetts Society of the Cincinnati.
General Westmoreland, President Lyndon B. Johnson and president of South Vietnam Nguyen Van Thieu in October 1966.
General Westmoreland with Lyndon B. Johnson decorating a soldier in Vietnam, October 1966.
General Westmoreland with Lyndon B. Johnson in the White House, November 1967.
Press conference outside the White House in April 1968.
In January 1964, he became deputy commander of Military Assistance Command, Vietnam (MACV), assuming direct control from General Paul D. Harkins. Secretary of Defense Robert McNamara told President Lyndon B. Johnson in April that Westmoreland was "the best we have, without question".[6] As the head of the MACV he was known for highly publicized, positive assessments of U.S. military prospects in Vietnam. However, as time went on, the strengthening of communist combat forces in the South led to regular requests for increases in U.S. troop strength, from 16,000 when he arrived to its peak of 535,000 in 1968 when he was promoted to Army chief of staff.
On April 28, 1967, Westmoreland addressed a joint session of Congress. "In evaluating the enemy strategy," he said, "it is evident to me that he believes our Achilles heel is our resolve. ... Your continued strong support is vital to the success of our mission. ... Backed at home by resolve, confidence, patience, determination, and continued support, we will prevail in Vietnam over the communist aggressor!"
The 29-minute speech was interrupted 19 times by applause, but congressional and popular support for the war thereafter continued to decline.
Westmoreland claimed that under his leadership, United States forces "won every battle".[7] The turning point of the war was the 1968 Tet Offensive, in which communist forces attacked cities and towns throughout South Vietnam. At the time, Westmoreland was focused on the Battle of Khe Sanh and considered the Tet Offensive to be a diversionary attack. It is not clear if Khe Sanh was meant to be distraction for the Tet Offensive or vice versa.[8] See the Riddle of Khe Sanh. Regardless, U.S. and South Vietnamese troops successfully fought off the attacks during the Tet Offensive, and the communist forces took heavy losses, but the ferocity of the assault shook public confidence in Westmoreland's previous assurances about the state of the war. Political debate and public opinion led the Johnson administration to limit further increases in U.S. troop numbers in Vietnam. Nine months afterward, when the My Lai Massacre reports started to break, Westmoreland resisted pressure from the incoming Nixon administration for a cover-up,[citation needed] and pressed for a full and impartial investigation by Lieutenant General William R. Peers. However, a few days after the tragedy, he had praised the same involved unit on the "outstanding job", for the "U.S. infantrymen had killed 128 Communists [sic] in a bloody day-long battle". Post 1969 Westmoreland also made efforts to investigate the Phong Nhị and Phong Nhất massacre a year after the event occurred.[9]
Westmoreland was convinced that the Vietnamese communists could be destroyed by fighting a war of attrition that, theoretically, would render the Vietnam People's Army unable to fight. His war strategy was marked by heavy use of artillery and airpower and repeated attempts to engage the communists in large-unit battles, and thereby exploit the anti-communists' vastly superior firepower and technology. However, the North Vietnamese Army (NVA) and the National Liberation Front of South Vietnam (NLF) were able to dictate the pace of attrition to fit their own goals: by continuing to fight a guerrilla war and avoiding large-unit battles, they denied the Americans the chance to fight the kind of war they were best at, and they ensured that attrition would wear down the American public's support for the war faster than they.[citation needed]
Westmoreland repeatedly rebuffed or suppressed attempts by John Paul Vann and Lew Walt to shift to a "pacification" strategy[7] Westmoreland had little appreciation of the patience of the American public for his time frame, and was struggling to persuade President Johnson to approve widening the war into Cambodia and Laos in order to interdict the Ho Chi Minh trail. He was unable to use the absolutist stance, "we can't win unless we expand the war" [into Cambodia and Laos]. Instead, he focused on "positive indicators," which ultimately turned worthless when the Tet Offensive occurred, since all his pronouncements of "positive indicators" didn't hint at the possibility of such a last-gasp dramatic event. Tet outmaneuvered all of Westmoreland's pronouncements on "positive indicators" in the minds of the American public.[citation needed] Although the communists were severely depleted by the heavy fighting at Khe Sanh when their conventional assaults were battered by American firepower, as well as tens of thousands of deaths in the Tet Offensive, American political opinion and the panic engendered by the communist surprise sapped U.S. support for the war, even though the events of early 1968 put the United States and South Vietnam into a much stronger military position.
Westmoreland was replaced by General Creighton Abrams in June 1968, the decision being announced shortly after the Tet Offensive. Although the decision had been made in late 1967, it was widely seen in the media as a punishment for being caught off guard by the communist assault.
Westmoreland served as Chief of Staff of the United States Army from 1968 to 1972. In 1970, as Chief of Staff, in response to the My Lai Massacre by U.S. Army forces (and subsequent cover up by the Army chain of command), he commissioned an Army investigation that compiled a comprehensive and seminal study of leadership within the Army during the Vietnam War demonstrating a severe erosion of adherence to the Army's officer code of "Duty, Honor, Country". The report, entitled 'Study on Military Professionalism',[10] had a profound influence on Army policies, beginning with Westmoreland's decision to end the policy that officers serving in Vietnam would be rotated into a different post after only six months. However, to lessen the impact of this damaging report, Westmoreland ordered that the document be kept on "close hold" across the entire Army for a period of two years and not disseminated to War College attendees. The report only became known to the public after Westmoreland retired in 1972.[11]
Many military historians have pointed out that Westmoreland became chief of staff at the worst time in history with regard to the Army. Guiding the Army as it transitioned to an all-volunteer force, he issued many directives to try to make Army life better and more palatable for America's youth—e.g., allowing soldiers to wear sideburns and to drink beer in the mess hall. However, many hard-liners scorned these as too liberal. Westmoreland ran unsuccessfully for governor of South Carolina in 1974. He published his autobiography the following year. Westmoreland later served on a task force to improve educational standards in the state of South Carolina. He was mentioned in a Time magazine article as a potential candidate for the 1968 Republican nomination.[12]
In 1986, Westmoreland served as grand marshal of the Chicago Vietnam Veterans parade. The parade, attended by 200,000 Vietnam veterans and more than half a million spectators, did much to repair the rift between Vietnam veterans and the American public.[13][14]
Westmoreland versus CBS: The Uncounted Enemy[edit]
Mike Wallace interviewed Westmoreland for the CBS special The Uncounted Enemy: A Vietnam Deception. The documentary, shown on January 23, 1982, and prepared largely by CBS producer George Crile III, alleged that Westmoreland and others had deliberately underestimated Viet Cong troop strength during 1967 in order to maintain U.S. troop morale and domestic support for the war. Westmoreland filed a lawsuit against CBS.
In Westmoreland v. CBS, Westmoreland sued Wallace and CBS for libel, and a lengthy legal process began. While the trial was in progress, Westmoreland suddenly settled with CBS for an apology, no more than CBS had originally offered. Some contend that Judge Leval's instructions to the jury over what constituted "actual malice" to prove libel convinced Westmoreland's lawyers that he was certain to lose.[15][16] Others point out that the settlement occurred after two of Westmoreland's former intelligence officers, Major General Joseph McChristian and Colonel Gains Hawkins, testified to the accuracy of the substantive allegations of the broadcast, which were that Westmoreland ordered changes in intelligence reports on Viet Cong troop strengths for political reasons. Disagreements persist about the appropriateness of some of the methods of CBS's editors.[17]
Herbert Elmer Abrams' portrait of General Westmoreland
In a 1998 interview for George magazine, Westmoreland criticized the battlefield prowess of his direct opponent, North Vietnamese general Vo Nguyen Giap. "Of course, he [Giap] was a formidable adversary", Westmoreland told correspondent W. Thomas Smith Jr. "Let me also say that Giap was trained in small-unit, guerrilla tactics, but he persisted in waging a big-unit war with terrible losses to his own men. By his own admission, by early 1969, I think, he had lost, what, a half million soldiers? He reported this. Now such a disregard for human life may make a formidable adversary, but it does not make a military genius. An American commander losing men like that would hardly have lasted more than a few weeks." In the 1974 film Hearts and Minds, Westmoreland opined that "The Oriental doesn't put the same high price on life as does a Westerner. ... We value life and human dignity. They don't care about life and human dignity."
Westmoreland's view has been heavily criticized by Nick Turse, the author of the book Kill Anything That Moves: The Real American War in Vietnam. Turse said that many of the Vietnamese killed were actually innocent civilians, and the Vietnamese casualties were not just caused by military cross-fire but were a direct result of the U.S. policy and tactics, for example the policy "kill everything that moves" which enabled the U.S. soldiers to shoot civilians who had "suspicious behavior". He concluded that, after having "spoken to survivors of massacres by United States forces at Phi Phu, Trieu Ai, My Luoc and so many other hamlets, I can say with certainty that Westmoreland’s assessment was false". He also accused Westmoreland of concealing evidence of atrocities from the American public when he was the Army Chief of Staff.[18]
In more than a decade of analyzing long-classified military criminal investigation files, court-martial transcripts, Congressional studies, contemporaneous journalism and the testimony of United States soldiers and Vietnamese civilians, I found that Gen. William C. Westmoreland, his subordinates, superiors and successors also engaged in a profligate disregard for human life.
—Nick Turse, [18]
Historian Derek Frisby also criticized Westmoreland's view during an interview with Deutsche Welle:
—Derek Frisby, [19]
For the remainder of his life, Westmoreland maintained that the United States did not lose the war in Vietnam; he stated instead that "our country did not fulfill its commitment to South Vietnam. By virtue of Vietnam, the U.S. held the line for 10 years and stopped the dominoes from falling."
Personal life[edit]
Westmoreland initially met his future wife, Katherine (Kitsy) Stevens Van Deusen, while stationed at Fort Sill; she was nine years old at the time and was the daughter of the post executive officer, Col. Edwin R. Van Deusen. Westmoreland met her again in North Carolina when she was nineteen and a student at UNC Greensboro. The couple married in May 1947 and later had three children: a daughter, Katherine Stevens; a son, James Ripley II, and another daughter, Margaret Childs.[20][21][22]
Just hours after Westmoreland was sworn in as Army chief of staff on July 7, 1968, his brother-in-law, Lieutenant Colonel Frederick Van Deusen (commander of 2nd Battalion, 47th Infantry Regiment), was killed when his helicopter was shot down in the Mekong Delta region of Vietnam.[23]
Westmoreland died on July 18, 2005, at the age of 91 at the Bishop Gadsden retirement home in Charleston, South Carolina. He had suffered from Alzheimer's disease during the final years of his life. He was buried on July 23, 2005, at the West Point Cemetery, United States Military Academy.[24]
The General William C. Westmoreland Bridge in Charleston, South Carolina, is named in his honor.[25]
In 1996, the National Society of the Sons of the American Revolution authorized the General William C. Westmoreland award. The award is given each year in recognition to an outstanding SAR veterans volunteer.[26]
Dates of rank[edit]
U.S. Military Academy COA.png United States Military Academy class of 1936
Second Lieutenant
(Regular Army)
First Lieutenant
(Regular Army)
(Army of the United States)
Lieutenant Colonel
(Army of the United States)
(Army of the United States)
O-1 O-2 O-4 O-5 O-6
Army-USA-OF-01b.svg Army-USA-OF-01a.svg Army-USA-OF-03.svg Army-USA-OF-04.svg Army-USA-OF-05.svg
12 June 1936 12 June 1939 1 February 1942
25 September 1942
28 July 1944
(Regular Army)
(Regular Army)
Brigadier General
(Regular Army)
Lieutenant Colonel
(Regular Army)
Major General
(Regular Army)
O-3 O-4 O-7 O-5 O-8
Army-USA-OF-02.svg Army-USA-OF-03.svg Army-USA-OF-06.svg Army-USA-OF-04.svg Army-USA-OF-07.svg
12 June 1946 15 July 1948 7 November 1952
7 July 1953 December 1956
(Regular Army)
Brigadier General
(Regular Army)
Lieutenant General
(Regular Army)
(Regular Army)
(Regular Army)
O-6 O-7 O-9 O-10 O-10
Army-USA-OF-05.svg Army-USA-OF-06.svg Army-USA-OF-08.svg Army-USA-OF-09.svg Army-USA-OF-09.svg
June 1961 February 1963 July 1963 August 1964
August 1965
Retired from active service in July 1972.[27]
Awards and decorations[edit]
General Westmoreland's military awards:
U.S. military decorations and awards
Distinguished Service Medal ribbon.svg Distinguished Service Medal with Three Oak Leaf Clusters[28]
Legion of Merit ribbon.svg Legion of Merit with Two Oak Leaf Clusters
Bronze Star ribbon.svg Bronze Star, with One Oak Leaf Cluster
Air Medal ribbon.svg Air Medal, with One Silver and Four Oak Leaf Clusters
American Defense Service ribbon.svg American Defense Service Medal
American Campaign Medal ribbon.svg American Campaign Medal
European-African-Middle Eastern Campaign ribbon.svg EAME Campaign Medal with One Silver and two Bronze Service Stars
World War II Victory Medal ribbon.svg World War II Victory Medal
Army of Occupation ribbon.svg Army of Occupation Medal with Germany clasp
National Defense Service Medal ribbon.svg National Defense Service Medal with One Bronze Service Star
KSMRib.svg Korean Service Medal with Two Bronze Service Stars
Vietnam Service Ribbon.svg Vietnam Service Medal with One Silver and Two Bronze Service Stars
Presidential Unit Citation ribbon.svg Presidential Unit Citation (Army)
Foreign decorations and awards
Legion Honneur Chevalier ribbon.svg French Légion d'honneur
Croix de guerre 1939-1945 with palm (France) - ribbon bar.png French Croix de guerre with Palm
Taeguk Cordon Medal.png Republic of Korea Taeguk Cordon Medal (First Class)
Tong-il Security Medel Ribbon.png Republic of Korea Tong-il Medal (First Class) with Gold Star
Gugseon Security Medal Ribbon.png Republic of Korea Gugseon Medal (Second Class)
PHL Order of Sikatuna - Commander BAR.png Order of Sikatuna, rank of Lankan (Commander) (Philippines)
Noribbon.svg Republic of Vietnam Chuong My Medal
Order of the Holy Trinity (Ethiopia) - ribbon bar.gif Knight Grand Cross of the Order of the Holy Trinity (post-nominal: GCHT) (Ethiopia)[29]
Ribbon bar Grand Cross National Order of Vietnam.gif Republic of Vietnam National Order of Vietnam, First Class
Vietnam gallantry cross-w-palm-3d.svg Republic of Vietnam Gallantry Cross with Palm
ArmyDSMribbon.png Republic of Vietnam Distinguished Service Order, First Class (Army)
Vietnam Air Force Distinguished Service Order, First Class ribbon.png Republic of Vietnam Distinguished Service Order, First Class (Air Force)
Vietnam Navy Distinguished Service Order, First Class ribbon.png Republic of Vietnam Distinguished Service Order, First Class (Navy)
Vietnam Armed Forces Honor Medal Ribbon.png Republic of Vietnam Armed Forces Honor Medal, First Class
VCAM Class 1.png Republic of Vietnam Civil Actions Medal, First Class
Order of the White Elephant - 1st Class (Thailand) ribbon.png Most Exalted Order of the White Elephant, Knight Grand Cross (First Class) (Thailand)
Ordem do mérito militar.png Ordem do Mérito Militar (Order of Military Merit, degree of Great Officer) (Brazil)
Noribbon.svg Guerrillero José Miguel Lanza Gran Official (Bolivia)
United Nations Service Medal for Korea Ribbon.svg United Nations Korea Medal
Vietnam Campaign Medal Ribbon.png Republic of Vietnam Campaign Medal with 1960-73 Device
Korean Presidential Unit Citation.png Republic of Korea Presidential Unit Citation
Civil Action Unit Citation.png Republic of Vietnam Civil Actions Medal Unit Citation, First Class, with Palm
Noribbon.svg Gallantry Cross Fourragère (Korea)
Badges, tabs, and patches
Combat Infantry Badge.svg Combat Infantryman Badge
ArmyAvnBadge.png Army Aviator Badge
US Army Airborne master parachutist badge.gif Master Parachutist Badge
USAAF - Glider Pilot 4.png Glider Badge
United States Army Staff Identification Badge.png Army Staff Identification Badge
ViPaBa.jpg Republic of Vietnam Parachutist Badge
Other honors
The Knox Trophy.jpg Knox Trophy Award, USMA highest military efficiency as a cadet at West Point, 1936.
See also[edit]
1. ^ "Papers of Gen. William Westmoreland (USCS Autumn 1999)". Retrieved 2008-02-01.
2. ^ "Obituary: General William Westmoreland". The Independent. Retrieved 2008-02-01. [dead link]
3. ^ 1936 Howitzer Yearbook.
4. ^ Headquarters Morning Report, 13 Oct 1944, Division Headquarters, 9th Infantry Division. Available on microfilm at National Personnel Records Center, St. Louis, MO. (Entry reads: "O-20223 Westmoreland, William C Col, Reld fr asdg HQ 9 Inf Div Arty & asgd to Div Hq 9 Inf Div per par 1, SO 241 HQ 9 Inf Div dtd 12 Oct 44. Joined 12 Oct 44. Detailed in G.S.C. per par 2, GO 87 Hq 9 Inf Div dtd 12 Oct 44. Primary Duty: Chief of Staff".)
5. ^ Stanley Karnow. Vietnam: A History. p. 361.
6. ^ "The Best in the Army". Presidential Recordings Program. Retrieved 16 March 2013.
7. ^ a b Sheehan, Neil A Bright Shining Lie: John Paul Vann And America in Vietnam 1988.
8. ^ Willbanks, James H. The Tet Offensive: A Concise History. Columbia University Press, 2007, pp. 104–109
9. ^ Kim Chang-seok (2000-11-15). ""한국군도 많이 당했다" 채명신 전 주월한국군총사령관 인터뷰… 남베트남군 사령관 만나 사과한 적도". Hankyoreh. Retrieved 2011-02-06.
10. ^ "Study on Military Professionalism". US Army War College. 30 June 1970. Retrieved 28 Oct 2013.
11. ^ Ricks, Thomas E (30 Oct 2012). "20". The Generals: American Military Command from World War II to Today. The Penguin Press. ISBN 1594204047.
12. ^ "The Temper of the Times". [[Time (magazine)|]]. 1967-04-14. Retrieved 2007-09-14.
13. ^ "Vietnam Veterans In Chicago Parade Cheered By Crowds". The New York Times. June 14, 1986.
14. ^ At peace, at last after 11 years and an emotional parade, Vietnam vets finally feel welcome. Chicago Tribune. August 17, 1986.
15. ^ "Westmorland v. CBS - further readings". Retrieved 2007-11-13.
16. ^ The Tet Offensive: Intelligence Failure in War. Cornell University Press. 1994. Retrieved 2007-11-13.
17. ^ "Mike Wallace". Museum of Broadcast Communications. Retrieved 2007-11-13.
18. ^ a b Turse, Nick (October 9, 2013). "For America, Life Was Cheap in Vietnam". The New York Times.
19. ^ Gabriel Domínguez Vo Nguyen Giap - 'A master of revolutionary war' Deutsche Welle, 07.10.2013
20. ^ Whitney, Craig R.; Pace, Eric (2005-07-20). "William C. Westmoreland Is Dead at 91". The New York Times. Retrieved 2011-08-04.
21. ^ McLendon, Winzola (1967-05-01). "While the General's at War His Lady Does Hospital Work". The Milwaukee Sentinel. Retrieved 2013-10-05.
22. ^ "Gen. William Childs Westmoreland Papers, ca. 1900-2000 (Gifts to Manuscripts Division 2001, South Caroliniana Library)". University of South Carolina. Retrieved 2013-10-05.
23. ^ "Westy In-law Dies in Viet". 6807PSS.AVN, 68070399.KIA. 1968-07-07. Retrieved 2007-09-14.
24. ^ "General William Westmoreland, Friend of ASA, Dies". American Sportscasters Online. 1991-05-31. Retrieved 2011-08-04.
25. ^ "South Carolina General Assembly 109th Session, 1991-1992, Bill 918". South Carolina Senate. 1991-05-31. Retrieved 2010-08-16.
26. ^ "General William C. Westmoreland Award". National Society of the Sons of the American Revolution. 2009-10-14. Retrieved 2011-08-04.
27. ^ General Westmoreland dates of rank
28. ^ Military Times Hall of Valor
29. ^ The Crown Council of Ethiopia
30. ^ Westmoreland rack
External links[edit]
Military offices
Preceded by
Garrison Holt Davidson
Superintendents of the United States Military Academy
Succeeded by
James Benjamin Lampert
Preceded by
Paul D. Harkins
Commander, Military Assistance Command, Vietnam
Succeeded by
Creighton Abrams
Preceded by
Harold K. Johnson
Chief of Staff of the United States Army
Succeeded by
Bruce Palmer, Jr.
Honorary titles
Preceded by
Lyndon Johnson
Time's Man of the Year
Succeeded by
The Generation Twenty-Five and Under |
global_01_local_0_shard_00000017_processed.jsonl/22680 | From FedoraProject
< Virtualization
Revision as of 13:31, 2 September 2009 by Markmc (Talk | contribs)
Jump to: navigation, search
Virtualization News
fedora-virt status Archive
FWN Virtualization Archive
An list of previous FWN issues which have sections covering virtualization |
global_01_local_0_shard_00000017_processed.jsonl/22681 | Participatory Impact Assessment: A Design Guide Updated Version 2014
Read More
Experiences of National Governments in Expanding Their Role in Humanitarian Preparedness and Response
By Jeremy Harkey | January 2014
Many countries’ governments are slow to assume leadership of their disaster management system. Reasons for slow assumption of national leadership include a lack of government prioritization of disaster management, minimal…
Read More
Pastoralism in Practice Monitoring Livestock Mobility in Contemporary Sudan
Read More
Taking Root The Cash Crop Trade in Darfur
Read More
Livestock, Livelihoods, and Disaster Response: PART ONE A Review of Livestock-Based Livelihood Projects in Sudan
By Merry Fitzpatrick, Helen Young | November 2013
Read More
Search Publications |
global_01_local_0_shard_00000017_processed.jsonl/22700 | Naruto Shippuden
Naruto Discussion Forum
Go Back Naruto Discussion Forum > Ninja Training Grounds > Other Naruto Games > Naruto: The Broken Bond > 360 Game Character Thoughts
Naruto: The Broken Bond Discuss the Naruto: The Broken Bond video game for Xbox 360 here.
Thread: 360 Game Character Thoughts Send Page to a Friend
Your Username: Click here to log in
Random Question
Recipient Name:
Recipient Email Address:
Email Subject:
Powered by vBulletin® Version 3.8.2
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd. |
global_01_local_0_shard_00000017_processed.jsonl/22701 | Theresa Hitchens has been Director of UNIDIR since January 2009. Previously, she was Director of the US Center for Defense Information and led its Space Security Project, in cooperation with Secure World Foundation. She is a member of the World Economic Forum’s Global Agenda Council on Space Security.Theresa Hitchens has been Director of UNIDIR since January 2009. Previously, she was Director of the US Center for Defense Information and led its Space Security Project, in cooperation with Secure World Foundation. She is a member of the World Economic Forum’s Global Agenda Council on Space Security.
Why is this issue something that worries you?
What warning signs have you seen already?
Three nations have tested anti-satellite weapons in the last three decades: the United States and the Soviet Union in the 1980s, then China in 2007. The latter shocked a lot of people. China sent a kinetic weapon – a solid warhead – slamming into one of its own weather satellites, causing an explosion which created thousands of pieces of debris in one of the most crowded orbits around earth. The worst part was not the demonstration of capability, as pretty much everyone knew China could do something like this, it was the question of why they chose to demonstrate it in the manner in which they did. What’s more, any country that has a medium-range ballistic weapon and a reasonable commercial satellite programme can develop an anti-satellite weapon, and there is no real international agreement on what norms of behaviour are acceptable. I am pretty sure that France, India and Israel all have the capacity.
What about North Korea?
Could other channels of communication not defuse the situation?
On the flip side of risk, what are the opportunities?
Image: A NASA photo taken from the International Space Station shows the Mediterranean Sea, the Nile River and the Sinai Peninsula (Reuters) |
global_01_local_0_shard_00000017_processed.jsonl/22703 | AutoCAD Civil 3D General
New Member
Posts: 1
Registered: 10-03-2012
Message 1 of 2 (199 Views)
2012 Civil 3D Slow Crosshairs. -- Please help
199 Views, 1 Replies
10-03-2012 04:42 PM
Ok..Question. Our company has moved from workstations to Pano (Virtual Desktops) no computer at desk. We installed 2012 Civil 3D. Files open and close ok, but crosshairs are slow or lag. Also mtext is painful slow. Suggestions we have tried include: Changing Windows 7 to Classic, Turn off bitlocker, trun off selectioncycle, turn off dynamic inputs, unloading Ribbon with no improvement
I have attempted to adjust (turn on) the 3d acceleration, but as you would expect "Crash" since Civil 3D is running on the server and piped through the network to the Pano box, there is no graphics card at each computer. Attached are the specs for what I can see as my virtual desktop.
Question is without 3D acceleration are we out of luck, or is it possible to allocate more graphic resources via software?
Please use plain text.
*Expert Elite*
Posts: 4,388
Registered: 12-15-2008
Message 2 of 2 (196 Views)
Re: 2012 Civil 3D Slow Crosshairs. -- Please help
10-03-2012 04:51 PM in reply to: khalilwilson1064
Check the KB there is a Performance hotfix for 2012 specifically related to cross hair lag
Thank you
HP Z210 Workstation
Intel Xeon CPU E31240 @ 3.30 Hz
12 GB Ram
Note: Its all Resistentialism, so keep calm and carry on
64 Bit Win7 OS
Please use plain text.
You are not logged in.
Need installation help?
Ask the Community |
global_01_local_0_shard_00000017_processed.jsonl/22721 | Take the 2-minute tour ×
Is it possible to adjust or apply a mod to fix the scarcity of resources? I know that some resources are scarce but sometimes they are too scarce. For example, I tripped around the globe and only got 2 uranium.
share|improve this question
add comment
1 Answer
up vote 9 down vote accepted
When setting up your game, there is an Advanced Setup button that you can press - this allows you to change a large number of more in-depth game settings, including the saturation of Luxury and Strategic Resources.
enter image description here
The default option is "Standard", with options including "Sparse" (less than Standard), "Abundant" (more than Standard), "Legendary Start" (biased towards fantastic starting positions at the spawn points for all Civs), and "Strategic Balance" (biased towards a fair balance of Strategic resources).
enter image description here
share|improve this answer
Thanks, however, does exist another way to do that?. for example, "unlimited" mines like in starcraft or c&c – magallanes Jun 13 '12 at 21:35
Not outside of any sort of modding, no. – Rilgon Arcsinh Jun 14 '12 at 3:05
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/22724 | WTAN Is All Girls, Girls, Girls This WeekendS
I got these feminist chicks, they got something to say. An interview with a porn star, whose last name is Grey. Content like this, most people would pay. Something something something, Happy Memorial Day!
We're Jezzin' it up this weekend with a whole bunch of X chromosomes in the house: We've got Amanda Marcotte of fem-political blog Pandagon; Jill Filipovic from Feministe; Jess McCabe imported from The F Word across the pond; and then, to throw in a smidgen of peen, I asked masculinist Matt Ufford of With Leather and Warming Glow to romp with the ladies. They're basically gonna get all up in the coochie of the recently launched Slate: Woman Double X blog until it's worn out and really truly knows the pain that comes with giving birth to a blog. Babies should see this level of backlash.
After all that hot mostly girl-on-girl action, we'll put up my interview with existential porn princess Sasha Grey who stars in the mucho-hyped and just-opened Stever Soderbergh meditation, The Girlfriend Experience. Then we'll send it back to Foster: Live in Vegas!
For the uninitiated, I go by the three letters you probably need a little more of in your life: TAN. Sometimes also, "The Assimilated Negro", and/or, "the black dude who's on Gawker sometimes. holla!"
Now that's out of the way, let's have Jay-Z set the tone with his classic ode to the ladies. Please place your laptop/mobile phone speakers in the loud and upright position so the whole park can hear:
image: via |
global_01_local_0_shard_00000017_processed.jsonl/22728 | The Best Sign That Occupy Wall Street Is WorkingS
Since the Occupy Wall Street movement, by design, doesn't have a list of demands, it can be hard to figure out whether or not it's "working." (Arguably, it's not supposed to "work" at all!) But this chart, put together by Politico's Dylan Byers, shows one area where the protests are succeeding: including "income inequality" in the conversation.
The chart shows mentions of the phrase "income inequality" in print, web and broadcast news as measured by Nexis, starting the week before the occupation (when it was spoken or written 91 times) to last week—when it was used almost 500 times. Not bad for a group of people who almost fell apart over a bunch of drummers. |
global_01_local_0_shard_00000017_processed.jsonl/22729 | Thumbnail Icon [Keyword='TAO']
Refine by Category
Refine by Full text
4 Titles Match Your Query
Showing 1 through 4 of 4
3. TOGA COARE Workshop Integrated Dataset [COARE_asf_tcwids]
The TOGA COARE Data Information System is responsible for distributing all information related to TOGA COARE. Link to: "". TOGA COARE was ...
4. TOGA-TAO Atlas Mooring Thermistor Chain Array Data [FWA00246]
Begun by NOAA Pacific Marine Environmental Laboratory ("") in 1984, ATLAS is an inexpensive mooring system whose data are telemetered to shore via the ARGOS system on NOAA ...
Showing 1 through 4 of 4
Click here for a static view of records.
Link to Web Site |
global_01_local_0_shard_00000017_processed.jsonl/22731 | Thumbnail Icon Data Providers > ACADEMIC > UNM/EDAC/EDACESIP
Refine by Category
Refine by Full text
2 Titles Match Your Query
Showing 1 through 2 of 2
1. BLM New Mexico Grazing Allotments Coverage [NM_RGIS_blmnmallot]
ArcInfo coverage of statewide BLM grazing allotments for New Mexico. These data were collected by the U.S. Bureau of Land Management (BLM) in New Mexico at both the New Mexico State Office and the ...
2. New Mexico MODIS LAI Image Product [NM_MODIS_LAI]
The thematic, 16-bit image represents the Leaf Area Index (LAI) for New Mexico, for the eight days ending on the date in the filename (for example, lai06092000 is an 8-day composite ending on 9 June, ...
Showing 1 through 2 of 2
Click here for a static view of records.
Link to Web Site |
global_01_local_0_shard_00000017_processed.jsonl/22734 | What DirectX 11 Is, and What It Means To YouS
The new graphics API comes with new buzzwords. We'll tell you what they mean and how they matter to your gaming experience.
Just when you think you've grasped all the jargon surrounding 3D graphics, new terms and technologies flood onto the market.
AMD has been aggressively shipping DirectX 11 GPUs in almost every price category, while cards based on Nvidia's new GTX 470 and GTX 480 DX11 parts are finally becoming available. Meanwhile, Windows 7's sales ramp has been extraordinary-the fastest-selling Microsoft OS in history. Given that Windows 7 is what Vista should have been, it's also arguable that DirectX 11 is what DX10 should have been.
When DirectX 10 games hit the streets, the new API gave users marginal improvements in image quality alongside huge performance decreases. The tiny gain in visual fidelity didn't really make up for the performance hit. On the other hand, DirectX 11 brings users some very cool potential eye-candy improvements, but also promises better performance-even if you don't have a DirectX 11 GPU.
Along with new graphics, APIs come with new buzzwords: tessellation, SSAO, HDAO, and postprocessing. That last buzzword being a catchphrase for many small but cool effects made possible with today's programmable graphics chips.
We'll take a closer look at these buzzwords to dissect what they actually deliver, plus discuss the performance impact of using high-end AMD and Nvidia GPUs.
Tessellation essentially creates something from nothing-or more properly, more from less. Hardware tessellation, which is required by DirectX 11, means that the GPU can generate more triangles from existing geometry using the hardware tessellation engine that's part of the graphics chip. Now, generating more triangles for a flat surface is pointless-after all, a flat square looks like a flat square, whether it's two triangles or 2,000. What's more interesting is generating more triangles for an actual 3D model. Let's look at a simple example, the cobblestone surface from Microsoft's DirectX developer's kit.
Bump Mapping
What DirectX 11 Is, and What It Means To YouS
Displacement Mapping
What DirectX 11 Is, and What It Means To YouS
The tessellation engine in DX11 hardware is capable of generating many more triangles from existing geometry, as seen in the screen on the lower left, to provide objects that are actually 3D.
In the top-right screen, we have a flat surface that looks somewhat more realistic by the application of a bump map. Bump maps fake you into thinking a flat polygon has depth by modeling the way light falls on a bumpy object (such as cobblestones.) However, if you were to bring the camera level with the pavement surface, you'd realize it was actually a flat surface. If geometry is tessellated, the cobblestones are actually 3D, as seen in the lower-right screen.
The tessellation in the cobblestone image is handled by a technique known as displacement mapping. A displacement map is just a special grayscale texture map in which different shades of gray define how much the geometry is displaced.
Cobblestones are nice, but will we ever see differences in real games? Let's look at the recently released Metro 2033 (below). The left image is the game with tessellation disabled; tessellation is enabled in the right image. Note how the object is more rounded in the second shot. The effect is somewhat subtle here, but the point stands: This is the beginning of the end of polygonal heads. Tessellation means that character heads will someday all be rounder.
Without Tessellation
What DirectX 11 Is, and What It Means To YouS
With Tessellation
What DirectX 11 Is, and What It Means To YouS
In this sceen from Metro 2033, you can see how tessellation makes it possible to create curved edges.
Yet another example of tessellation, from the DirectX SDK, shows a technique known as subdivision surfaces (below). The key idea in this technique is to start with a basic set of polygons, then divide them in ways that make sense for the object at hand. In this character model, we overlay the textures on top of the visible wireframe. You can see the additional geometry added in the right-side screen, as well as the more naturalistic, rounded features.
Other Uses for Tessellation
Tessellation is great for creating rounder heads and more realistic cobblestones. But it has other uses, too. Take water, for example. Instead of using pixel shaders to build better-looking water, just add more triangles… a lot more triangles, as in the case of the Nvidia Island demo.
Without Tessellation
What DirectX 11 Is, and What It Means To YouS
With Tessellation
What DirectX 11 Is, and What It Means To YouS
Tessellation makes water appear more real in Nvidia's Island demo.
In the new racing game Dirt 2, cars driving through water will throw up waves in the DirectX 11 version of the game, using hardware tessellation to generate hundreds of triangles to form the effect. In DX9 mode, you see some spray, but no waves, and the water puddle itself can be as few as two triangles.
Without Tessellation
What DirectX 11 Is, and What It Means To YouS
With Tessellation
What DirectX 11 Is, and What It Means To YouS
Tessellation adds waves and ripples to a scene in Dirt 2.
Tessellation Going Forward
Tessellation offers the promise of better, more realistic-looking 3D objects, but it's no panacea. As with any new technique, developers will have to be smart about its implementing. It's easy to use tessellation to create objects that look wrong. On top of that, there's the performance issue. While modern DirectX 11 GPUs have hardware tessellation engines, resources aren't infinite. Turn up tessellation too much, and you'll see a severe performance hit. Game developers will likely use the technology as part of sophisticated LoD (level of detail) schemes where close-up, important objects (characters) are tessellated, while distant or unimportant objects are tessellated less-or not at all.
Transparency Antialiasing Not So Special Anymore
Better-quality antialiasing with transparent textures was heavily touted by both Nvidia and AMD just a couple of years ago. Nvidia called this transparency antialiasing while AMD's term was adaptive antialiasing. This is a classic case of a feature that improves image quality at the time, but isn't really considered bleeding-edge these days.
The problem lies with the way transparency is handled in many games. Transparent objects are polygons with texture maps applied where some of the texture is transparent. Examples of this are chain-link fences, bare tree limbs, and overhead wires.
Adaptive antialiasing essentially smooths out the edges bordering on the transparent areas within those textures. Think of it as AA inside the polygon.
Without Transparency Antialiasing
What DirectX 11 Is, and What It Means To YouS
With Transparency Antialiasing
What DirectX 11 Is, and What It Means To YouS
Transparency, or adaptive, antialiasing works well when a game supports it (as seen in the screen above), but tessellation could provide a universal substitute.
For transparent AA to work, the game must test for alpha (the transparent part), but also disable alpha blend (where the transparent texture is combined with a background color to create a new color. This is sometimes used to create translucent (partially transparent) objects.
Valve's Source game engine does this, so if you enable adaptive antialiasing (AMD) or transparent antialiasing (Nvidia) in the graphics control panel, you'll see the effect, as in the Left 4 Dead screenshot here.
However, alpha blending and other techniques are used that prevent these techniques from working. For example, enabling the feature has no effect at all in most games that use the Unreal game engine. Also, technologies like tessellation may eventually make transparency AA obsolete. If those bare tree limbs can be built with polygons representing the limbs themselves, those polygons can be antialiased with standard multisampling AA, and you don't need to mess around with adaptive AA.
Ambient Occlusion
Achieving great realism through light and shadows
It's all about light. Without light, you can't see. In 3D games, all lighting is created using mathematical cheats-approximations of how real-world lighting behaves. Some of the most interesting lighting effects lie in the absence of light: darkness and shadows.
Shadows have evolved from simplistic shadow maps-where the shadows all looked the same from any angle-to the more sophisticated techniques used in today's games.
Variations on ambient occlusion are becoming increasingly more popular. Ambient occlusion takes into account how light falls on objects to create shadows, and that the properties of light and shadows change over distance. Crysis was one of the first games to attempt a form of ambient occlusion, known as screen space ambient occlusion (SSAO). SSAO techniques try to determine where a point in the scene exists relative to other points, and the effect that light falling onto that point has on other parts of the scene. Objects have reflective properties, and may in turn bounce light to other parts of the scene-even those blocked from the direct light source.
Real-world objects tend to have crevices, wrinkles, and depressions, which may not be directly lit by a light source (the sun, for example). But they aren't dark, either-they pick up light being bounced off other parts of the environment or even a nearby surface of the same object that is in direct light. Previous games often ignored this, so crevices and depressions were either completely dark or looked as brightly lit as the other parts of the object.
Other types of ambient occlusion found in newer games include high-definition ambient occlusion (HDAO) and horizon-based ambient occlusion (HBAO). These are still variations on the same idea-that where a pixel exists relative to other pixels determines how light falls on it, how it bounces that light, and what type of light it is (direct or reflected.)
Without Ambient Occlusion
What DirectX 11 Is, and What It Means To YouS
With Ambient Occlusion
What DirectX 11 Is, and What It Means To YouS
The circled areas in this DirectX 11 SDK example show how high-definition ambient occlusion (HDAO) produces more realistic details. Notice the increased depth, sharper lines, and greater shadowing.
Above is an HDAO sample from the DirectX SDK. Note the internal shadowing made possible in the lower screen by using this ambient occlusion technique. It is relatively subtle, but the overall scene seems more realistic when you're running the application in full-screen mode. In the top shot, HDAO is disabled; the bottom one has HDAO enabled.
With DirectX 11, a new technique is emerging called contact hardening. If you think about how real-world shadows behave, you'll realize that a shadow doesn't look the same along its full length. Close to the object-say, at the base of a lamp post or tree-the line between shadow and light is sharply delineated (the "hard" in contact hardening.) The farther away from the object, the shadow is more diffuse. That's because farther away, light seeps into the shadow area from the surrounding environment. Contact hardening shadows using Direct 11 graphics emulate this look. Right now, the only game using contact hardening shadows is STALKER: Call of Pripyat (below).
What DirectX 11 Is, and What It Means To YouS
In this DirectX 11 SDK sample, shadows have harder edges near the object and softer edges farther away, as in real life.
Postprocessing Effects
Making graphical magic after the image is rendered
Postprocessing is where effects are applied to the 3D image after the frame is rendered. The term postprocessing comes from the film industry, where effects are added to movies after the movie is actually shot.
Postprocessing is really a catch-all for special effects that are generated, typically with shader programs, and aren't necessarily part of an existing graphics API. Of course, the GPU itself needs to be programmable.
Adding effects to rendered frames first began to show up with DX9 games. We've seen increasing use of postprocessing effects in DX10 and now, DX11 titles. A wide variety of postprocessing effects are possible; examples include depth of field, heat distortion, wet distortion, bokeh, dynamic blur, and film grain.
Some of these effects can be used to add realism to a scene. Heat distortion above a fire or hot desert sand is a good example of that. Other effects actually make the game less realistic, but more cinematic. Examples of these include depth of field, film grain, and bokeh effects. (Bokeh is the blurriness you see in out-of-focus areas of a photograph. The quality of the bokeh is one of the parameters used to rate the quality of a camera lens.)
Without Bokeh
What DirectX 11 Is, and What It Means To YouS
With Bokeh
What DirectX 11 Is, and What It Means To YouS
In Just Cause 2, you'll see bokeh effects when you use an Nvidia graphics card.
We've all seen these effects in movies and television, but rarely experience them in real life. Game developers add these effects to make their games seem more like big-screen movies. This makes sense in some games, like the over-the-top action of the recently released Just Cause 2, which emulate big-budget action movies in their overall feel. If you have an Nvidia-based graphics card running with the PC version of Just Cause 2, you'll see bokeh effects in action.
The use of bokeh helps to focus the player's attention on whatever is nearby. Clever shader-program writing can give developers granular control over the effect, as we see in the AMD Ladybug depth-of-field demo (downloadable from the AMD developer website.) This demo gives the user control over aperture settings, as if they were shooting with a camera. Stopping the camera down results in a soft blurry background behind the sharply focused image. Opening up the aperture brings the background into better focus.
What DirectX 11 Is, and What It Means To YouS
What DirectX 11 Is, and What It Means To YouS
In AMD's ladybug demo, you can control aperture settings to change the background's focus.
The game Borderlands (below) uses depth of field to focus your attention on whatever you're aiming at with your weapon.
Programmable shaders took a big step forward with DirectX 11. Previously, if a programmer wanted to add multiple effects to a scene, the shader program became large and unwieldy. Now they can call in shader routines as needed, allowing for more efficient writing of shader programs and more efficient use of effects.
What DirectX 11 Is, and What It Means To YouS
What DirectX 11 Is, and What It Means To YouS
Borderlands uses depth of field to focus your eye on an object you're aiming at. In the screen on top, everything is in focus, but when the player takes aim, only the target in the foreground is in focus, as seen in the screen on the bottom.
The Performance Impact
How does all this graphics goodness affect frame rates?
If we set the wayback machine to a couple of years ago, we'd relive the disappointment we all experienced with the first DirectX 10 games. Visual effects added only marginally to image quality, but the performance hit was huge. What's the impact of these spiffy new DirectX 11 features? Also, what's the impact of postprocessing effects? Obviously, adding more shader programs can impact performance, but how much?
We tested performance with hardware tessellation using the Unigine Heaven 2.0 synthetic benchmark (which uses a real game engine) and STALKER: Call of Pripyat. Call of Pripyat was also used to test performance with SSAO, HBAO, and HDAO.
The performance of Nvidia's GTX 480's tessellation engine looks pretty awesome relative to AMD's part in a benchmark like Heaven, but as we can see from Call of Pripyat, the impact of tessellation on real games is less clear. There just aren't enough titles yet that make heavy use of hardware tessellation to determine which GPU is superior. Subjective experiences differ; Metro 2033's performance, for example, seems to give the edge to Nvidia, though we don't have hard numbers to back this up. On the other hand, Aliens vs. Predator is a smooth experience on both AMD and Nvidia's latest cards.
Just Cause 2 supports two interesting GPU postprocessing features if you're running an Nvidia-based card: bokeh and water simulation. Thus, we tested the GTX 480's performance with and without those features using the game's Concrete Jungle built-in benchmark.
As you can see, enabling these features incurs a performance cost. But that cost is a few percentage points, rather than the 75–80 percent decrease we saw moving from DX9 to DX10.
Final Thoughts
In the past, comparisons regarding performance versus visual features revolved around antialiasing and anisotropic filtering. DirectX 10 added some new tricks to the game developer's arsenal, but came with a severe performance penalty. DirectX 11's new features can affect performance, but the new generation of graphics cards enables you to run with much better visual fidelity while maintaining reasonable performance.
It takes time for developers to take advantage of new features. The good news is that the uptake on DirectX 11–capable GPUs has been one of the most rapid in recent history. We are starting to see increasing use of capabilities that first began showing up with DirectX 9-finally. For example, it's hard to find a current-generation game that doesn't take advantage of the postprocessing effects made possible with programmable shaders. Developers continue to experiment with postprocessing effects, as we've seen with the bokeh setting in Just Cause 2. And features like film grain and depth of field are commonplace. Newer titles bring new effects, such as emulating color filters seen in big-budget movies and TV shows.
Good tools will be the key to seeing new features take hold. One reason postprocessing has become so common is that graphics programmers have developed tools similar in concept to Photoshop filters, which allows artists to easily implement them in the art pipeline. It will be some time before similar tools are readily available for newer, DX11-capable hardware.
Then there's the multiplatform question. Larger game publishers are leery of pushing high-end, PC-exclusive features if they're shipping big-budget titles across multiple platforms, including game consoles that may not support tessellation or other features. While the PC has made something of a comeback in the gaming arena, putting additional developer resources into PC-exclusive abilities is still something of an afterthought.
Still, we are seeing new games emerge that take full advantage of new graphics possibilities. Eastern Europe seems to be an emerging haven for bleeding-edge development of PC games, if the STALKER series, Cryostasis, and Metro 2033 are any indication. And even console-oriented titles, like Dirt 2, can be architected to take advantage of new APIs on PCs.
So if you have one of the new generation of DirectX 11 cards, turn up the eye candy and experiment. Your games can look better than ever.
What DirectX 11 Is, and What It Means To YouS
Best scores are bolded. Our benchmark test bed is a 3.33GHz Core i7-975 Extreme Edition in an Asus P6X58D Premium motherboard with 6GB of DDR3/1333 and an 850TX Corsair PSU. The OS is 64-bit Windows 7 Ultimate. Benchmarks were run at 1920x1200. AA was disabled for these benchmarks. For Call of Pripyat, SSAO quality was set to high.
What DirectX 11 Is, and What It Means To YouS
Tests run in Concrete Jungle benchmark. Other graphics features were dialed up to the maximum settings, and the benchmark was run at 1920x1200.
What DirectX 11 Is, and What It Means To You
|
global_01_local_0_shard_00000017_processed.jsonl/22735 | The Touchscreen Computer for Old People Unclear on the ConceptS
I hope I never get so old as to require my progeny to buy me an idiot-proofed version of the latest technological innovation—that'd be insulting. But I might just get one of these Telikins for my Mom.
Billed as a "senior-friendly" computer system, the Telikin features an 18-inch capacitive touchscreen, Dual-core 1.8GHz processor, 320GB hard drive, 802.11b/g/n wireless, a 1.3MP webcam for video conferencing with the grandkids, and a suite of basic connectivity software including a text editor, email client, and weather tracking, and news feeds.
Don't get me wrong—I'm well-versed in elderly folks' aversion to new technology. Hell, convincing my grandfather that fuel injection wasn't the work of the devil required a six-month discussion with diagrams. But this—it's like the physical embodiment of AOL's old web portal. For one, the Telikin runs a proprietary software suite that prevents any third party software from being installed—good for preventing Trojans, bad for expanding the system's utility beyond the dozen pre-installed functions that it comes with (of which PowerPoint was somehow deemed necessary).
The 18-inch screen version costs $700 and is ready-to-go out of the box. The upgraded "Elite" version includes a 20-inch screen, 500GB hard drive, HDMI port, and runs $1200. [Telikin]
|
global_01_local_0_shard_00000017_processed.jsonl/22739 | It's Come To This: You Can Get Rewards Just for Not Texting During a Movie NowS
Hey all you IDIOT KIDS. Don't text during a movie. Don't do look at your phone. Don't touch it. Don't even think about it. That's just basic common fucking courtesy you halfwit assholes. But because we're horrible creatures that can't resist checking Instagram once every 15 minutes, Cinemark will reward you for leaving your phone alone during a movie. It's as if the Justice Department started giving tax breaks to people who don't commit murder.
Image credit: Shutterstock/CREATISTA |
global_01_local_0_shard_00000017_processed.jsonl/22788 | Watch a South American "superbird" diving 150 feet underwater
For years, it was assumed that imperial cormorants — large seabirds typically found along the southern coasts of South America — fed on fish just below the surface of the ocean. But when scientists in Argentina outfitted one with a tiny camera, they discovered that the birds are, in fact, remarkably accomplished… » 8/01/12 4:51pm 8/01/12 4:51pm |
global_01_local_0_shard_00000017_processed.jsonl/22796 | Windows Enterprise Desktop
Feb 11 2011 3:15PM GMT
There’s Never Time to Do It Right, But There’s Always Time to Do It Over
Posted by: Ed Tittel
add only super-critical drives to Windows 7 image backup savesets
use an extra internal drive for your Windows 7 image backups
Windows 7 image backup/restore has interesting quirks
Yesterday afternoon, I came back from running an errand in the afternoon only to find a BSOD waiting for me on my production Windows 7 machine. After I got it restarted, I realized something major had gone wrong. Not only had the OS “lost” all of the security updates and patches it’s had applied to it, the update process wouldn’t complete successfully, either. Downloads went fine, install completed without a hitch, but when I cycled the machine through the restart process to do the final clean-up, I saw a new WU error message “Unable to configure Windows. Reverting to previous version.”
“This is bad!” I thought. I was right, but it took me six hours to figure out how right I was, and to take the steps necessary to restore my latest image backup (taken Sunday night, February 7). Along the way I learned numerous interesting but extremely frustrating things about the Image backup facility built into Windows 7. Here’s an abbreviated list:
• Windows 7 scans only internally mounted hard disks when looking for the folder named WindowsImageBackup. I am in the habit of backing up to an eSATA-attached hard disk, so I had to copy that directory from my K: drive to my only internal data drive F:. 181GB, which took 45 minutes.
• Whatever drives go into a Windows 7 image saveset must be restored for the backup to complete. Although the interface includes an “Exclude drives” option, the backup cannot be restored if any member drives from the saveset get excluded.
• Also, no drive in the saveset can be the source for the image to be restored, because this means it would at some point have to restore itself from itself (which is the file system equivalent of the chicken and egg problem, conveniently solved by being disallowed).
• My only internal hard drive other than the system drive (also disallowed, but because it’s an 80 GB Intel SSD and thus too small to play host to a 181 GB image file anyway) is the F: and I stupidly configured it to be part of the saveset, so I couldn’t run the image restore as things stood.
Obviously, I needed to copy the WindowsImageBackup folder one more time (another 45 minutes shot) to a different drive that was neither C: (the Intel system drive) nor F: (my other internal data drive, and a part of the image saveset). Enter Drive D: already attached to my PC through a PCI-e x1 two-port eSATA card. “OK” I figured, “the reason the Windows 7 Repair Environment won’t see D: is because it doesn’t recognize eSATA drives while conducting repairs. (The Repair Environment is a special version of the pre-installation environment, or PE, that is included on install DVDs and appears on bootable UFDs created to house the various Win7 ISO files.)
My first thought was to simply disconnect the F: drive and use its power and data cables to hook up to D: and let the restore get underway. That’s when I learned that even if you exclude a drive from the restore instructions for an image backup, Windows 7 won’t allow it to proceed with a missing drive. If you image two drives, you must then restore the same two drives (or drives that are equal in size or bigger). With F: disconnected to hook up D: that meant no dice.
Next, I grabbed a motherboard cable set that plugs into a motherboard SATA port and a Molex 4-pin power connector, and essentially routes that connection outside the case. Alas, Windows 7 RE still couldn’t see that drive. I had thought that because I was using a third-party Silicon Image Sil3132 two-port eSATA adapter, that this might explain why Win7 RE overlooked scanning attached devices during repair maneuvers. But even when I hooked the D: drive up through the adapter card shown in the photo below, Win7 RE still blithely ignored its presence.
This kind of hardware comes bundled with many modern motherboards
This kind of hardware comes bundled with many modern motherboards
Nothing short of opening the case, plugging a new SATA cable from drive to motherboard, and plugging in a power output from the PSU sufficed to get Windows 7 to recognize the drive.
Finally with both C: and F: up and running, and available for an image restore, and another internal drive also avaialble from which the image file could be read to perform that restore, I was ready to rock and roll. Time required to go through all of the shenigans and scenarios involved was right about six hours. I don’t know how long the restore took to complete, because I fired it off at a little after 10:00 PM last night and went to bed shortly thereafter. When I got up this morning, the machine was back up and running in an apparently normal and healthy state. I copied my saved PST files from yet another external drive to the proper folder in my User file hierarchy, and thereby regained all my e-mail messages through yesterday’s debacle.
Now, I get to go and repeat my last two days’ work because that’s the only stuff that I lost irretrievably when this machine decided to go south on me. Here are the morals I extract from this episode:
1. When you build or buy a Windows 7 machine, if you want to use image backup, insert or acquire an extra internal drive, so you can use it to image all of your other drives if you choose to do so.
2. When you construct an image file saveset, include only those drives you want to be able to back up from any image in that set. As of today, I’m relying on conventional file-by-file backup for all of my drives, except for the system drive (where the image stuff matters most, because of the boot-up, operating system, and volume shadow copy stuff).
3. I’m reworking my backup schedule to go nightly for all important working directories, but will still keep making an image backup once a week (mine goes off at 0-dark-thirty on Sunday night when I am never, ever working late). Hopefully, I can avoid future data/work losses that way.
Comment on this Post
Send me notifications when other members comment.
REGISTER or login:
Forgot Password?
Forgot Password
Your password has been sent to: |
global_01_local_0_shard_00000017_processed.jsonl/22801 | Here's Ryan Lochte's Piss-Happy Acting DebutS
Ryan Lochte has been threatening to try acting for several days now, and he's followed through in record time (we should have expected that one of the fastest men in the water would quickly swim to an indelible part of the pop culture psyche). Here's his first installment of LochTV, a Funny or Die video series that will involve him looking at the camera, talking in a completely monotone voice, and occasionally getting dimples on half of his face, which will cause your ladyparts to twitch approvingly.
But sitting around and making pee jokes isn't all Lochte has up his sleeve — er, tucked into his hot pink paisley printed Speedo. He's been spotted in costume, with famous people filming other comedy bits as well. While this is the first we'll see Lochte onscreen, it won't be the last. For better or for worse.
[Funny or Die] |
global_01_local_0_shard_00000017_processed.jsonl/22803 | Can a Romance Novel Be Feminist?S
If you've never read a historical romance novel — sometimes called "bodice rippers" — you might think they are full of retro and regressive tropes: The woman is almost always a young, delicate, virginal flower; the man is almost always older, experienced, a scoundrel and dominant brute. If you have delved into the genre lately, then you know that the petticoats and bustles may not have changed, but the characters have: The women are stronger, less passive, more pro-active and, sometimes, straight-up bluestockings.
Writing for The Atlantic, Jessica Luther explains:
How can you create a feminist character when your story is set in a patriarchal past? What's especially feminist about a love story? It's a a challenge, that's for sure. Author Cecilia Grant puts it this way:
"A romance novel, by definition, privileges the romantic relationship above other aspects of the characters' lives," Grant says. "And in a culture that already bombards women with the message that finding and keeping a man is their most important goal in life," she argues that "it can be difficult to make a case for romance as a feminist-friendly medium."
Still, there are strong female characters and feminist points of view. Victoria Dahl — bestselling author of A Rake's Guide to Pleasure — tells Luther that her characters are "always" feminist. Olivia Waite — author of Hearts and Harbingers — points out that the romance genre has a feminist bent in that it "routinely foregrounds women's sexual desire." Luther points out:
As often as one is likely to see a romance trope that feels old and regressive, one will read a scene where the hero cannot wait to pleasure the heroine with oral sex. Looking around at pop culture at large, there is no other space where such scenes happen, especially not regularly.
It is important, romance novels — from Twilight and Fifty Shades to the hundreds of books in which the "hero" rapes or forces seduction on the heroine — are meant as entertainment, and don't always necessarily reflect what women want to happen to them in real life.
The critical space between what one reads and likes and what one actually does is something that critics of the genre must remember, especially because their own policing of women's desires is the product of the patriarchal system they are trying to criticize. [Nine Rules to Break When Romancing a Rake author Sarah MacLean] argues that "we have to give ourselves permission as women to have fantasies. We aren't saying that men should threaten sexual dominance or harassment or abuse. But it's okay if we, at some point, find the idea of that threat hot."
It's also important not to be dismissive of the romance genre, whether it be historical fiction or not: Deeming them silly smut or fluff drains these books of their potency. As Luther puts it, "A genre centered on women, written primarily by women, and consumed mainly by women cannot be ignored because it can teach us about what women want."
Beyond Bodice-Rippers: How Romance Novels Came to Embrace Feminism [The Atlantic] |
global_01_local_0_shard_00000017_processed.jsonl/22829 | Take the 2-minute tour ×
What is the difference between the words zachor and pakad?
They are used with what seems like very similar meanings throughout the Rosh HaShanah davening, as well as in the Chumash.
Here are some uses to consider:
• Noach and Rochel is recalled with zachor (Bereishis 8:1, 30:22)
• Sarah is recalled with pakad (Bereishis 21:1)
• It seems like covenants are remembered with zachor (e.g. promise to the Patriarchs to redeem Jews from Egypt in Shemos 2:24 or promise to rescue the Jews from the exile at the end of the curses in Vayikra 26:42)
All explanations I've seen relate pakod to tafkid (purpose, function, task), for example, someone tried to say that zachor is focusing on generic ideas and pakod - on what is a particular person's task in realizing these ideas. This seems to fit Sarah, but does not explain how Rochel could be recalled for childbirth (just like Sarah was) with pakod.
Would someone be able to connect these for me? Thank you very much for your help.
share|improve this question
gt6989b, welcome to Mi Yodeya and thanks for the interesting question. I hope you stick around and enjoy the site. – msh210 Sep 20 '12 at 1:09
add comment
1 Answer
up vote 3 down vote accepted
Malbim (Bereishis 21:1) explains that זכר means to remember as it is normally used, and פקד means to remember in order to do something for the person for whom you פקד-ed.
share|improve this answer
So how do you learn that Sarah and Rochel were remembered with different words for the same purpose (conception of a child)? – gt6989b Sep 19 '12 at 22:11
Another problem would be from Yirmeya 2:2 -- "I remembered (zacharti) for you the chessed of your youth" -- it would sound that G-d's rememberance for us is in order to end the exile, so pakadti would fit better according to this understanding, no? – gt6989b Sep 19 '12 at 22:13
@gt6989b Malbim explains there that the "zechirah" by Rachel was that he remembered her good deeds – b a Sep 19 '12 at 22:14
@b_a: But it just seems both rememberances were for the sake of doing something for the object of rememberance. Acoording to Malbim's take, wouldn't then pakod fit better? By te way, thank you for an answer with a source, it's very helpful. – gt6989b Sep 19 '12 at 22:19
@gt6989b The way I understood Malbim, the פקד is the actual start of the doing the thing for the person, while זכר in both of your objectionable cases is the reason for the doing – b a Sep 19 '12 at 22:28
show 1 more comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/22830 | Take the 2-minute tour ×
Does someone know anything about Rav Yaakov Moshe Hillel shlita hamekubal stating that tzitzios should be worn outside the clothes? I read it once but without any sources on a web forum. It would be quite surprising as one of the argument to tuck them is based on kabbalah and the Arizal.
share|improve this question
No answer to offer, but being an admirer of Rav Hillel shlit"a, I would love to know his opinion. – user366 Mar 25 '11 at 12:21
This is a great question, because the Mishnah Berurah really strongly criticizes those who tuck them in. And that's putting it mildly. – Seth J Feb 8 '12 at 23:39
@SethJ Rabbi Ovadiah Yosef zt'l criticizes those who do not tuck them in. – ray Oct 19 '13 at 19:34
add comment
2 Answers
up vote 5 down vote accepted
In his book Geburat HaAri (pg. 137) he brings the AriZal and explains that according to him they should be exposed because in Shaar HaKawanot (7c) the Ari says that there is a Miswa to behold the Sisiot (see Debarim 15:39).
He expounds on this immensely in his Sefer Wayashov HaYam (vol. 1 Siman 3).
share|improve this answer
@HachamGabriel Are those both your accounts? – Double AA Feb 8 '12 at 5:27
-1 Because one is not allowed to learn two things out from the same pasuk. Rashi already tells us that "uRe'item oto" refers to the necessity of them being worn during the daytime. If one was allowed to learn two things out from the same pasuk, then why do the tannaim disagree in the second chapter of M. Berakhot, where Shema Yisrael is understood to mean cause your ear to hear it, or say it in a language that you hear, i.e. that you understand. The thing is that the two tannaim who say this are arguing with each other and not agreeing, implying that there is only one way to darshen. – Adam Mosheh Feb 12 '12 at 14:07
@Adam: but are these really two separate things? Being able to see the tzitzis in itself implies both that it's during a time when you're able to see (so not at night), and that they should be visible. This is different than the two meanings of שמע, where hearing and understanding are orthogonal (you can hear something without understanding it, or conversely, understand it - thinking it in your mind - without hearing it). – Alex Feb 12 '12 at 14:51
@Alex - I believe that they are in fact orthogonal! If you hold that tzitzis must be tucked in, then you are not able to see them (as they are inside). And if you hold that they must be seen, then why do you maintain as well that they are required to be worn at night when it is dark and therefore concealed by darkness? A beged yom can be worn tucked in during the daytime or nighttime and still be defined as a beged yom. – Adam Mosheh Feb 12 '12 at 15:19
@Adam you are arguing with the smak who counts it is a separate miswa. – Hacham Gabriel Feb 12 '12 at 17:00
show 9 more comments
It may be interesting to note, I once saw in his a yeshiva a Scanning of hand written note from Rav Yitchak Keduri Ztz"l agreeing with this ruling and the argument that Rav Hillel puts forth in vayashov Hayam, also a photo of the Baba sali with very long sitzit that where hanging below his gown. Rav Hillel (because of a seeming contradiction in the kitvei haArizal) believes this practice is an authentic Kabalistic one,
share|improve this answer
Can you try to find the picture of the Baba Sali? That would be very interesting to see. – Hacham Gabriel Oct 20 '13 at 0:45
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/22840 | I think we've all been there: you're young, you're bored, you decide to write some poetry about your favorite video game.
Actress/writer/musician/etc. Felicia Day sure seems to have been there, and she's gone ahead and shared some of her 12-year-old self's video-game poetry. It's called "Avatar Isle," and it's a tribute to the Ultima series.
I know she's got her share of detractors out there, but as I've written in the past, I think a lot of Ms. Day. This kind of thing is why; it's a total goof, but it's a fun one. |
global_01_local_0_shard_00000017_processed.jsonl/22843 | The first thing that immediately stood out to me when I initially previewed Far Cry 3: Blood Dragon wasn't the neon, it wasn't the hark back to the ridiculousness of the 80's, it wasn't even the blood dragons themselves. That's because I didn't get to see much of any of that before being hit with a gay, possibly homophobic joke.
If you've played the game, maybe you've come across it. It happens right at the start, during our introduction to the game—Rex 'Power' Colt is talking to Spider. If you'd like to watch it, it's in the video above. Here's the transcript:
Spider: Wakie wakie, motherfucker. Ops says there's a delay in the feed, they need to recalibrate your ass.
Rex: Me?
Spider: Well it ain't me 'cause I'm goddamn near perfect. Men want to be me—
Rex: And you want to be with men, yeah, I got it.
[Scene pauses on Spider's face for a second before Spider says something else.]
The context here is clear: in order to take Spider down a peg for his comment about being perfect, Rex implies Spider is gay. The pause right after the comment cements it as a "GOTCHA!" moment.
But was it harmful? Was the harm intentional, even—and if it wasn't intentionally harmful, did that matter? These were the questions I had a difficult time answering.
I wasn't really sure what to think at the time, but I made sure to ask creative director Dean Evans about it.
Kotaku: So one thing I noticed, there were a couple of homophobic jokes in there. What's that about?
[Evans was drinking a beer, which at this point he starts choking on. He puts his drink down.]
Evans: It is the least homophobic game you will ever, ever play. EVER.
Kotaku: Okay. Well I just noticed a couple of things—
Evans: Like what? Like what! Give us an example.
Kotaku: Well at the start, the guy was like, I can't remember his name, but he was like, "All men want to be me," and the other guy interjected, "And you want to be with all men."
Evans: How is that homophobic?
Kotaku: You don't think that's homophobic?
Evans: No. What if he's gay?
Kotaku: What if he's gay. Is he gay? He might be?
Evans: Did you read what was on his…uh, can you read Japanese?
Kotaku: Nope.
Evans: There's a little secret for you.
Kotaku: Okay…?
Evans: Honestly, if you knew the people who were working on this game, you'd realize it's the least homophobic game, if you knew our sexual orientations, you'd realize it's the least homophobic game out there.
Later, as if nervous, in between my other questions:
Evans: The writer, Lucian, Lucien Soulban, is one of the biggest, biggest gays in the world.
[I laughed nervously at this information, it seemed to come out of nowhere.]
Evans: He's like a bear, he's amazing…massive, sculpted beard, giant, hairy back, you see him in the weekend, he's got like, ball gags. To get back to…so we can be nice and frank with each other, just so you know, we are the least homophobic core team you're probably gonna meet in the business.
I still didn't know how to feel. The next day, after I wrote about the game, I asked a couple of people what they thought. For the most part, it seemed as if the reactions fell into two camps: no, it's not homophobic, or well, it's kind of harmless, isn't it?
I let it go and decided against printing the part of the interview about the joke. I did that even though I recognized in my gut that yes, it was a homophobic joke—despite being bros, and even if Spider is actually gay, Rex tries to undermine Spider's masculinity, not laud it.
Our own Chris Person has a theory—maybe the headband somehow signifies that Spider and Rex aren't just bros, but possibly lovers?
He calls spider gay as a joke. Spider is wearing that headband. Spider gets killed, and his headband falls off, he swears vengence, and when he wears it later in the game, it's to signify some sort of spiritual change, saying that on some level he is more than a machine, he has "a human heart".
There's nothing to prove [that they were lovers], yes, but that he would specifically bring it up is interesting.
His theory partially comes from Brian Ashcraft's translation of the headband:
The first two kanji characters say ”人の" (人 = hito = person; の = no = 's), and from looking at the third character, I'm guessing it says "愛" ("ai" or "love), but it's blurry and really hard to make maybe it says "人の愛" ("hito no ai" or "A person's love").
Writing "人の愛" on a headband is just so awkward sounding to me in Japanese. Usually people would probable write something like "二人の愛" ( "futari no ai" or "two people's love"), instead of a singular ”人の愛". Writing something like "人の心" or "hito no kokoro" ("A person's heart" or "A person's spirit") seems far more natural, but even then...
Not much to go off of, in terms of contextualizing the scene, I'd say—so I'm not sure I buy the theory. On top of that, thinking about Evan's response regarding the sexuality of the developers and how that means the game couldn't possibly be homophobic—I don't think your identity somehow exempts you from saying something harmful. I've certainly said sexist things in the past despite being a woman, for example. Regardless, I decided against saying anything because it still feels like tricky territory to call someone out on something like this when the creators themselves are gay.
And more importantly than that, for some reason, all I could think was—well, maybe it is harmless? Maybe it's okay, even? Which, looking back now, seems baffling for a number of reasons. The joke isn't funny, for one. It's not a satire of the 80's or its machismo—it reinforces some archaic ideas of what a real man is. Whether or not it's homophobic is clear to me, the only thing that's left is deciding whether or not you find that offensive. Taking a step back from Far Cry 3 here, let's look at the big picture: What does it mean, to consider a homophobic joke "harmless?"
We are taught to pick our battles, that's part of it. Something small like this gets looked over for the blatant and aggressively bigoted. A 'small' joke like that looks silly in comparison to, say, the Westboro Baptist Church. With Westboro, the danger seems clear—but it's also a comically extreme position, no? Does something have to go that far for it to pose a sort of danger that's worth calling out? Does it not follow that letting "small" things pass creates a culture that silently tells people it's okay to be bigoted?
Reexamining now, after seeing someone tweet about how it took like 90 seconds before Blood Dragon needlessly threw out a homophobic joke, I can't help but wonder if I thought of it in the right way, initially.
The people this affects—they have a lifetime of 'harmless' jokes jabbing them as they go along. Does that not build up? Maybe they laugh. Maybe they shrug it off. Maybe they make the jokes too. You need to be able to do these things, really—you need to be able to take it on the chin. How else will you cope with a society that seems unable to accept who you are? How do you deal with being constantly told that you can't even be upset about it—just a joke, jeez!
Much of this is like perpetually having a tiny rock in your shoe. It's a annoyance, albeit a small one. Harmless, if you will.
Maybe you feel tired—maybe you think to yourself: god, fuck, here we are again. Talkin' about sensitive issues like sexuality and gender. We are all tired, I assure you. Some people more than others. I'm willing to bet that the people who are the most tired are those who are constantly under attack by malicious and "harmless" things alike, though. Funnily enough they are the ones who have to shrug it off.
I am not gay, but I know how these "harmless" jokes build up over time—I think, for example, having my family constantly joke about when I'm getting married, or about my weight. It is harmless; they don't intend to be hurtful—in the same way that I doubt the people behind Far Cry 3: Blood Dragon were intentionally trying to be harmful or homophobic. That's fine, though it doesn't mean it can't end up being hurtful anyway.
Much of this is like perpetually having a tiny rock in your shoe. It's a annoyance, albeit a small one. Harmless, if you will. Small enough that you could live with it if you really wanted to, maybe even ignore it despite the blisters.
Is the joke harmless? It's a pebble in a shoe. |
global_01_local_0_shard_00000017_processed.jsonl/22849 | Let's Make Robots!
Using WiFi Bot Control (Android app), you can remotely control the robot and view an IP Camera video stream. I built the app as well.
Using a
Wifi Bot Control is an Android app that allows you to remotely control a robot (or other device) via WiFi. You can also (optional) view a video stream from an IP … Read more
Lego Mindstorm C# USB
Hi there,
I have a quesiton to those of you who are familiar with Lego Mindstorms NXT brick and also C#
How can I transfer a robot C file I have created to the brick, via USB, using C#?
You don't have to give me code just point me in the right direction
Chases light source and avoids obstacles
Using a
I started 2 years ago with an autonomous rover that chases light and avoids obstacles. We're now 11 versions further and version 12 is almost ready! Eventually the … Read more
Lego mindstorms books to go.[gone]
isotope's picture
Ok, I've got these two books about Lego mindstorms as a prize for my LadyBugBot winning the RobotBox online competition lying around for a long time. Now, as I dig them out, I definitely know I will not be reading them for a long time... So, they are looking for a new owner, who is interested in Lego NXT. The books are:
Selling: Mindstorms NXT 1st generation
Markamas's picture
I am disparingly seeking money to buy parts to dive into the world of hobby robotics. I'll need some 400$ for my first order and I decided to sell just about anything I can. So here goes my NXT... Anyone interested? I'll post details and stuff if someone's interested.
Haven't touched the dusted Mindstorm NXT at corner for long time I decide to combine it with lots of parts salvage from friends for 4 leg walker. The leg idea … Read more
Mindstorm NXT 2.0 N900 - Twitter-controlled Robot
Nokia ran a competition that asked hackers and modders to push their new device, the N900, to its limits. Judges selected the three best submissions and one of those was 'NIKO The N900 Robot' - a robot controllable through commands on Twitter built out of Lego NXT Mindstorm 2.0.
Navigate around in a room very bad,
Using a
Ok after a loooong time not being active on this page I figured that I had to post another NXT robot. Ok, this is my first robot with a differential, so don't … Read more
Help! Newbie in need of Arduino programming assistance.
Hello everybody! First let me start by apologizing, I've read the "newbies start here" post and I'm afraid I must break a few of the rules. I am a student at the Columbus College of Art and Design and I'm working on an installation that requires a pretty complicated (to me) set of robotics.
Drums with its arms on the table or drum
Using a
NXT robot that drums. Programed in RobotC. The attachment is the file that I have made so far (download it and open with notepad if you don't have RobotC) It's now … Read more
This is not the first robot I made but the first one I was successful with programming in RobotC. The second video I used the sample program's and blutooth with a … Read more
Very simple robot plays xylophone using one LEGO® Mindstorms NXT servo motor to move forwards and the other one to lower and lift the bat. As every NXT robot has … Read more
This quite simple robot made with LEGO® Mindstorms NXT set is programmed in NXT-G (LEGO's visual programming language) to Avoid Obstacles using the Ultrasonic … Read more
Drive with an autonomous systems using ultrasonic sensors and GPS
Using a
This project tries to manage any RC Car which you can purchase in your city using a NXT brick and a Lattebox NXTe. Read more
Crawl around, line crawling
Using a
This is just a strange thing that crawls around using its "arm". My ultimate goal is to add CMUCam3 and get the thing to follow some objects by crawling towards … Read more
jip's picture
Goes around the four legs of a chair to meet the chair challenge
Using a
Here is the program for the robot :-) Since it just uses its encoders to do the moving it will drift over time as you can see in the video... - Jimmy Read more
jip's picture |
global_01_local_0_shard_00000017_processed.jsonl/22850 | Let's Make Robots! - graphic http://letsmakerobots.com/taxonomy/term/9640/0 en Using Gobetwino to debug your sensor data http://letsmakerobots.com/node/32504 <p><a href="http://mikmo.dk/gobetwino.html">Gobetwino</a> is a free program designed to allow Arduino boards to control PC aplications. Because it reads a serial com port it is not limited to Arduino boards and will work with Picaxe, Propeller and any other MCU capable of serial output.</p><p>I have attached Version 0.5 of Gobetwino and it's manual but I have read that A new improved V0.6 is in the pipeline. I have now attatched the code used in my robot so you can see how my Arduino code controls the Excel Spread sheet using simple Serial.print() commands.</p><p><a href="http://letsmakerobots.com/node/32504">read more</a></p> http://letsmakerobots.com/node/32504#comments Arduino Computer CPU data display gobetwino graphic Laptop MCU PC picaxe propeller robot sensor spreadsheet Any Any Thu, 03 May 2012 17:14:26 +0000 OddBot 32504 at http://letsmakerobots.com Breathalyzer http://letsmakerobots.com/node/25819 <p>Hi, this is my breathalyzer project. It's just something fun that I have been wanting to make for a while now. It uses an atmega328, alcohol gas sensor from Sparkfun, and a small graphic lcd from Sparkfun. It is very simple in operation.</p><p>1.When first turned on, it goes through a 45 second warm up period so the alcohol gas sensor has time to warm up.</p><p><img src="/files/userpics/u12477/IMG_0012.jpg" alt="" width="500" height="375" /></p><p> </p><p><a href="http://letsmakerobots.com/node/25819">read more</a></p> http://letsmakerobots.com/node/25819#comments alcohol atmega328 breathalyzer gas graphic LCD sensor sparkfun Wed, 16 Mar 2011 00:42:48 +0000 Ricco 25819 at http://letsmakerobots.com |
global_01_local_0_shard_00000017_processed.jsonl/22853 | The Top 10 Grammar Mistakes to Avoid MakingS
Proper grammar is important, whether you write for a living or only occasionally. It's especially important if you're looking for a job or trying to impress a new client. In this infographic, GrammarCheck has collected a list of some of the most common grammar errors people make and how to avoid them.
It's not a pretty graphic, but the information is valuable. Citing grammar-checking service Grammarly, the graphic shows that the most common errors are simple spelling mistakes (something easily fixed with a quick spell check). The next three most common mistakes, however, deal with missing commas, incomplete thoughts, and missing verbs.
In GrammarCheck's top 10 list, comma errors account for five of the top mistakes, and other punctuation mistakes also fill out the top 10. Here's the whole graphic (click to expand, right-click to save):
The Top 10 Grammar Mistakes to Avoid MakingS
For further reading, here are twenty other grammar mistakes, compiled by Lit Reactor.
|
global_01_local_0_shard_00000017_processed.jsonl/22859 |
RE: belittling designers, two kinds of accessibility
From: Wayne Myers-Education <[email protected]>
Date: Fri, 20 Oct 2000 15:38:23 +0100
Message-Id: <6F99E54D359CD3119FAF0001FA7ED9500178FB98@w12wcedxu02.wc.bbc.co.uk>
To: [email protected]
To respond:
> The web is probably no longer what was originally
> envisioned, but the
> original vision was limited and didn't take into account either the
> mushrooming of bandwidth and technology, or the popularity
> that the web has
> gained.
Exactly what is limiting about a vision of a system of documents that is
independent of the kit used to view them? And the mushrooming of bandwidth
on which planet are you talking about? Here in the UK, I am going to be
stuck with a 56K modem for some considerable time to come, and I know that
there are many many people around the world who connect to the internet at
still lower speeds. Fortunately, the original vision of the web is not
limited to a specific level of bandwidth. Your vision of what the web might
become, frankly, is limited to a certain minimum level of bandwidth, below
which, there is no access at all for anyone. Thanks but no thanks. And
anyway, that ain't the web.
> At some time in the years to come, the "original"
> concept of the
> web will go away and the "horseless carriage" as a toy of the
> privileged
> will be gone ... it's almost there already!
Having large amounts of bandwidth *is* currently only for the privileged,
and while this remains the case, the original concept of the web is here to
stay. Thankfully. As for the horseless carriage analogy, now that we have so
many horseless carriages running around on the roads we have serious
consequent problems due to congestion and pollution. I wouldn't take the
analogy too far, but I'd point out that the average speed for vehicles on
the road in London, where I live, is the same today as it was 100 years ago,
due to congestion and despite the fact that we 'all' have cars - in fact
precisely because we 'all' have cars - and they get in each others' way.
Similiarly, if everyone had a massive bandwidth connection to the net it is
not clear that this would speed stuff up much by itself, since the backbone
of the net too would have to see a concomitant bandwidth increase of
gargantuan proportions to handle the vastly inflated overall volume of
traffic that would be the likely result.
If we all had home pages one megabyte in size (ouch), I suspect it would be
just as annoyingly long a wait to download on a fast connection as it is
today with 100K home pages (ouch) over 56K modems. I'm not sure of the exact
maths but suspect it isn't good. Meanwhile, textfiles are small and lean and
multi-media isn't. And thus will it forever be.
> But I cannot say that any one of them came to the web
> expecting to cherish
> "documents" ... Should they be sent back to tv just because
> the originators
> of the web didn't envision they would be here? Perhaps
> purists can argue
> so, but these people are too real to me for those arguments
> to have much
> flavor.
I'm sorry, Anne, but this argument sounds absurd to me. It is as if you have
been given a fish and are complaining because it is not a bicycle. No-one is
sending anyone back to tv. No-one is asking anyone to cherish documents.
No-one is accusing anyone of not being real. But the web is still the web -
a device-independent document collection. And a large collection of putative
universally understandable multi-media documents is a large collection of
putative universally understandable multi-media documents - and not the web.
Crack the problem of device-independent multi-media and you may be onto
something - SMIL may have part of the answer here - but it's still not going
to change what the web is. That fish is still a fish, even if imaginative
folks like ourselves can close our eyes and imagine wheels and a chain on
it. The best bicycles - and I am being wholly serious - are not based on
fish. Similarly, the bicycle here - the vision of device-independent
multi-media universally understandable by all, ought not be based on the
fish that is web, but should be built as a bicycle from the ground up.
Hope this make sense.
Cheers etc.,
Received on Friday, 20 October 2000 10:38:54 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/22860 |
Re: [css4-images] element() behavior
From: Tab Atkins Jr. <[email protected]>
Date: Thu, 2 Aug 2012 10:02:34 -0700
Message-ID: <CAAWBYDDD5M9TJEdromGqywdOQ7-1udC0mz=Mgu4MK4iZDtwZ3w@mail.gmail.com>
To: Andrew Fedoniouk <[email protected]>
On Wed, Aug 1, 2012 at 11:56 PM, Andrew Fedoniouk
<[email protected]> wrote:
> On Wed, Aug 1, 2012 at 10:14 PM, Rik Cabanier <[email protected]> wrote:
>> I was talking about appearance, not CSS inheritance.
>> The image will look as if it has alpha and should render with alpha
>> according to the element() spec. The stacking context that #src belongs to,
>> has alpha.
> And where this "should render with alpha according to the element() spec"
> comes from?
> Do you mean this:
> "That is, the image must look identical to the
> referenced element, modulo rasterization quality." ?
> If "yes" then "look identical" term appears as quite
> permissive by itself. Two boxes can be treated as looking
> identical even they use different fill color.
I have no idea what definition of "identical" you're using where
different fills can be considered "identical".
> Term "rasterization quality" in CSS specification looks enthetic.
> Why it is mentioned there at all?
> And the whole element() thing treats rendering with
> transform:skew(30deg); and without it for example as identical
> for some reason. Looks like an artificial hack trying to solve
> particular use case.
Uh, no. That's not "treating it as identical". I shut off ancestor
transforms for a specific reason - it seems unlikely that it will
match what's expected (especially when you're referring to, say, a
canvas), and because it makes the rendering harder.
Received on Thursday, 2 August 2012 17:03:23 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/22862 |
Re: ACTION-655: TAG to publish XML/HTML Unification Report
From: Noah Mendelsohn <[email protected]>
Date: Wed, 18 Jan 2012 22:01:41 -0500
Message-ID: <[email protected]>
To: Larry Masinter <[email protected]>
CC: Norman Walsh <[email protected]>, "[email protected]" <[email protected]>
On 1/18/2012 7:20 PM, Larry Masinter wrote:
>> This note is not a W3C<<Recommendation Track>> document.
> I’m not sure it's needed to say this, or that there was any expectation
> that it was rec trac, was there?
Probably not. More to the point, as I said earlier, there's no need for you
to bother critiquing or refining any of the bits in my draft statement.
Feel free to start from scratch, or to cut and paste as you see fit. Use
what I contributed only if it's helpful, and otherwise don't burn time
explaining why what you're proposing is different. There's little if any of
it that I feel strongly about -- I only wrote it because we needed
something, and I'd forgotten that you were going to do it. Thank you.
Received on Thursday, 19 January 2012 03:02:05 GMT
|
global_01_local_0_shard_00000017_processed.jsonl/22863 |
Messages in this thread
SubjectRe: Make pipe data structure be a circular list of pages, rather than
On Wed, 19 Jan 2005, Larry McVoy wrote:
> I think you are going to regret making splice() a system call, it shouldn't
> be, you'll find cases where it won't work. Make it a library call built
> out of pull() and push()
Actually, if you look at my current (ugly) test-patch, the one part of it
that isn't ugly is the actual "sys_splice()" + "do_splice()" part, and the
only thing they actually do is (a) do all the required "fd -> struct file"
setup (including locking, testing readability vs writability etc), and
then (b) they check which side is a pipe, and split it up into "pull" vs
"push" at that point.
Of course, the "pull" is actually called "do_splice_from()", and the
"push" is called "do_splice_to()", but I can rename them if you want to ;)
So yes, internally it is actually a push/pull thing, with separate actions
for both. I absolutely agree that you cannot have a "splice()" action, you
need to have a _direction_. But that's actually exactly what the pipe
gives you: since all data has to originate or end in a pipe, the direction
is implicit by the file descriptors involved.
(The exception is a pipe->pipe transfer, but then the direction doesn't
matter, and you can choose whichever just ends up being easier. We happen
to consider it a "do_splice_from()" from the source pipe right now, but
that's purely a matter of "which way do you test first").
Could we show it as two system calls? Sure. It wouldn't give you anything,
though, since you need to do all the tests anyway - including the test
for whether the source or destination is a pipe which currently is the
thing that splits up the "splice()" into two cases. So it's not even like
you could optimize out the direction test - it would just become an
error case test instead.
And having just one system call means that the user doesn't need to care
(other than making sure that one end _is_ a pipe), and also allows us to
share all the code that _is_ shared (namely the "struct file *" setups and
testing - not a whole lot, but it's cleaner that way).
I think you are perhaps confused about the fact that what makes this all
possible in the first place really is the _pipe_. You probably think of
"splice()" as going from one file descriptor to another. It's not. It goes
from one (generic) file descriptor into a _pipe_, or from one pipe into
another (generic) file descriptor. So the "push"/"pull" part really is
there, but it's there in another form: if you want to copy from one file
to another, you have to
1) open a pipe - it's the splice equivalent of allocating a
temporary buffer.
2) "pull" from the fd into the pipe: splice(in, pipe[1], size)
3) "push" from the pipe into the fd: splice(pipe[0], out, size)
so it's all there. The above is 100% conceptually equivalent to
1) buf = malloc()
2) read(in, buf, size);
3) write(out, buf, size);
See? I think you'll find that the "push" and "pull" you look for really is
The advantage here is that if either the input or the output _already_ is
a pipe, you can optimize it to just do a loop of a single splice(), with
no new temporary buffer needed. So while the above three steps are the
generic case, depending on how you do things the _common_ case may be just
a simple
1) splice(in, out, maxsize);
which is why you do not want to _force_ the split. The determination of
how to do this efficiently at run-time is also very easy:
int copy_fd(int in, int out)
char *buf;
int fds[2];
for (;;) {
int count = splice(in, out, ~0UL);
if (count < 0) {
if (errno == EAGAIN)
/* Old kernel without "splice()"? */
if (errno == ENOSYS)
goto read_write_case;
/* No pipe involved? */
if (errno == EINVAL)
goto pipe_buffer_case;
/* We found a pipe, but the other end cannot accept this splice */
if (errno == ECANNOTSPLICE)
goto read_write_case;
return -1;
if (!count)
return 0;
if (pipe(fds) < 0)
goto read_write_case;
for (;;) {
int count = splice(in, fds[1], ~0UL);
if (count < 0)
if (errno == EAGAIN)
return -1;
if (!count)
return 0;
do {
int n = splice(fds[0], out, count);
if (n < 0) {
if (errno == EAGAIN)
return -1;
if (!n) {
errno = ENOSPC;
return -1;
} while ((count -= n) > 0)
buf = malloc(BUFSIZE);
for (;;) {
int count = read(in, buf, BUFSIZE);
See? THAT is the kind of library routine you want to have (btw, there's no
"ECANNOTSPLICE" error code right now, my current example code incorrectly
returns EINVAL for both the "no pipe" case and the "found pipe but not
splicable" case).
the body of a message to
More majordomo info at
Please read the FAQ at
\ /
©2003-2011 Jasper Spaans |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.