text
stringlengths 94
2.23M
| meta
stringlengths 23
1.52k
|
---|---|
France’s far-right leader Le Pen still hopes to unsettle Macron in legislative elections
by athleticinsider May 8, 2022 0
French far-right politician Marine Le Pen returned to the electoral fray on Sunday, announcing herself as a candidate in the parliamentary elections in June after weeks of silence since she lost the presidential vote to Emmanuel Macron last month.
“I hope that we will have a strong presence in parliament to lead, once again, the fight against the social policies that Emmanuel Macron wants to put in place,” she said, adding she would run for re-election in her northern constituency of Pas-de-Calais.
Le Pen was speaking on a visit to the town of Henin-Beaumont marking Victory Day — the anniversary of the Allies’ victory in 1945 over Nazi Germany in World War II.
Le Pen, defeated by Macron in the April 24 runoff election, pitched herself as the centrist president’s main opponent and took aim at hard-left politician Jean-Luc Melenchon.
Melenchon, who came third in the first round of the presidential election, is leading a coalition of left-wing parties that hope to deprive Macron of a majority in parliament. That alliance launched its campaign on Saturday.
“The reality is that Jean-Luc Melenchon helped get Emmanuel Macron elected, so that completely discredits his ability to position himself as an opponent,” Le Pen said, highlighting her disagreement with the left-wing politician on immigration and law and order issues.
Le Pen’s party, the National Rally (RN), currently holds only seven seats in the National Assembly, or lower house of parliament. The party, which has sought in recent years to soften its image, will not form an alliance with far-right pundit-turned-presidential candidate Eric Zemmour and his party Reconquete.
Macron, sworn in for a second term on Saturday, will preside over Sunday’s main Victory Day event at the Place de L’Etoile in Paris.
I'm glad Britney Spears publicly broke this pregnancy taboo
In new audio, McCarthy worried comments by certain GOP lawmakers could incite violence after Jan. 6
Twitter bans promotion of other social media sites including Facebook, Instagram and Truth Social
athleticinsider December 19, 2022 | {"pred_label": "__label__wiki", "pred_label_prob": 0.7993101477622986, "wiki_prob": 0.7993101477622986, "source": "cc/2023-06/en_head_0000.json.gz/line1447070"} |
Main Section While the “Magyar Telekom” case finishes in the US, it still remains...
While the “Magyar Telekom” case finishes in the US, it still remains stuck in the judiciary system in Macedonia
At the moment, two cases have been opened against “Magyar Telekom”, even though they started a long time ago, and whether intentionally or not, have not moved since they hit a dead end.
Yesterday, former directors of “Magyar Telekom” Elek Straub and Andras Balogh, who were accused of having secret agreements with the Prime Minister at the time and other people from Macedonia to prevent competition in the market, agreed to pay fines up to 250.000 dollars and 150.000 dollars, stated the US Investigation Commission on Securities and Exchange.
The outcome of the “Magyar Telekom” case in the US comes at a time during a severe political crisis in Macedonia and institutional blockade. At the same time, the SPO is attempting to inspect the computer systems of “Macedonian Telekom” in connection with the investigation in the “Target” case, which should determine who was part of the illegal wiretapping affair in the country.
Also yesterday, prosecutors from the SPO held “a meeting of a higher level” with representatives from “Macedonian Telecom” in connection with the investigation regarding the mass wiretapping.
In late September, 2015, Bogoevski was called for questioning and gave four hours of testimony to the prosecutors.
Special Public Prosecutor, Katica Janeva, in February last year asked Public Prosecutor Marko Zvlevski if her office could takeover the case, however he refused and passed on the case to the Council of Public Prosecutors. He decides what cases are passed on to the SPO and which cases are not.
In Macedonia, charges have been filed against former directors of “Macedonian Telekom”, Attila Szendrei, Rolf Plath and Zoltan Kisjuhász. They are being charged for organizing fictitious consultancy contracts with the Cypriot Consulting Company “Chavtex holdings Limited”, and ended up costing “Macedonian Telekom” 4 million euros, and damaging the state budget for approximately 2 million euros, because the at the time, the Government owned 47% in shares of the company.
The investigation of this case began in 2008, and 3 years later, in 2011 charges were eventually filed. However, the actual trial has still not begun, even after 6 years, as the court hearings are constantly being postponed. The defendants have never appeared in front of a Macedonian court, even with international arrest warrants and a court ruling for their detainment.
Magyar Telekom
Slobodan Bogoevski
Truthmeter.mk: Public Prosecutor’s Office operates with only a third of the planned staff
Public Prosecution: Short circuit in defibrillator cord started the deadly blaze in COVID hospital in Tetovo
North Macedonia: The Operative Technical Agency last year interposed in 853 cases of communications wiretapping | {"pred_label": "__label__wiki", "pred_label_prob": 0.6298087239265442, "wiki_prob": 0.6298087239265442, "source": "cc/2023-06/en_head_0000.json.gz/line682942"} |
Lobethal to Hahndorf
November 1, 2019 by edgar62, posted in House, Garden and Dogs
Lobethal main street
The largest Brewing Company is owned by the Japanese, but that aside, South Australian “Beer” is actually a lager beer, which the boys don’t like. Andrew has a list of the Microbrewery places in South Australia. They consider Lobethal to be one of the best. Actually I think almost all of the beer manufacturing in South Australia is foreign owned. I liked Lobethal., a quiet place, not very overtly German, like some of the other towns in the area – particularly our next stop. I had a wander around the main street, which for a weekday, was very quiet. I did, of course, find the little white church and took photographs of the 1922 foundation stone. Around the place there were many posts and posters highlighting the benefits of the Lobethal Lutheran School. All this came about in 1838 when George Fife Angas left South Australia to recruit prospective colonist for the new Province in South Australia. A number of Lutherans were anxious to leave the town of Klemzig In Prussia because of persecution by the King of Prussia. They were led by their Pastor, Augusta Ludwig Kavel. They settled in a small parcel of land by the River Torrens which they called Klemzig after the town they had left. Over the years the area has been absorbed into the City of Adelaide. The second wave of German Settlers move further into the interior of the colony and purchased land there. There were a number of settlements of which Lobethal and Hahndorf are
The old church bell at the white Church- Lobethal
but two. With the anti-German feeling during the World War One, many of the German names were abolished and changed – Lobethal became Tweedvale. Most of the names were changed back by government decree in 1934 all except Petersburg. Petersburg became simply Peterborough. In 1934 when the other towns were allowed to return to their original names, Peterborough decided not to and to remain as it was. Interestingly, the first ever Lutheran Church in Australia was built in Lobethal and the 1641 Bible of Pastor Kavel is kept there. Not too sure about that so I will have to do some searching.
We spent some time wandering around Lobethal before heading off to Hahndorf for a late lunch. John had been there before so he chose the place where we would have our meal. We had a quiet walk through the local area before entering the “German Arms Hotel” Hahndorf was one of the areas settled by the German Settlers who became prosperous in the new settlement. The South Australian Wine industry, the largest in Australia had its Genesis here with several German families who realised that the cool climate of the Adelaide Hills was perfect
The German Arms
Hahndorf SA
for growing grapes and producing wine. There are a large number of Wineries in this area and I am led to understand the the Wolf Blass Gallery and Museum will be built at Hahndorf. Unlike Lobethal, Hahndorf displays its German Heritage in a number of ways, not the least of which is its food and restaurants. Having been here several times, John took me to the German Arms a German Bierhaus and Restaurant. Because of
the long drive ahead of us we settled on Lemonade ( boo — hiss) John ordered a Trio of German Wurt with some sauce, -which he said was really good. I was less adventurous and had a Chicken and Prawn Pasta with a really nice cheese sauce. The portions were very large and I was unable to finish my meal. The staff did offer me a take-away box, but I felt it was a long drive and quite warm – too warm to carry in a car for 550 kilometers. Not being a food blogger in any way shape or form, it never really occurred to me to take photographs of our meal. The place was really nice, the staff friendly, the service excellent and it just had a really good atmosphere. I would have liked to have spent a lot more time there.
Leaving the German Arms carpark John set the Tom Tom for Tea Tree Plaza. I needed to go there to get some things for the
Lobethal: Car park at back of the Bierhaus — not customers.
church before heading home. As I said in the previous post, our drive through to Lobethal and then to Hahndorf was uphill, downhill, narrow roads, sharp twists and turns, well, less than ten minutes after leaving Hahndorf we were on the approach road to the South Eastern Freeway and a short while later at Adelaide. I asked John why we didn’t go that way in the first place, “my way was more adventurous”. Sheesh…
Tagged Adelaide, George Fife Angas\, German Arms, Hahndorf, Klemzig, Lager Beer, Lobethal, Pastor Keval, Peterborough, South Eastern Freeway, Tea Tree Plaza
Next postHahndorf to Tea Tree Plaza to Home.
6 thoughts on “Lobethal to Hahndorf”
that was interesting, thanks!!! I love it to read about history….
Thank you. That whole region, including the area called The Barossa Valley, was mainly settled and developed by German Settlers. The Barossa is a major Wine Region of South Australia
Interesting history. Shame you couldn’t sample the beer!
Yes I agree, but it was a long drive ahead. Still, the Lemonade was crisp and cold.
Just picturing your meals is making my palate salivate. Cheers to a lovely weekend. 🌭🍤🍻
The German Arms Hotel is where the main South Australian Oktoberfest is held each year. It was an interesting place.I would like to go back there – even just to take photographs. | {"pred_label": "__label__cc", "pred_label_prob": 0.7373031973838806, "wiki_prob": 0.2626968026161194, "source": "cc/2023-06/en_head_0000.json.gz/line1868019"} |
Articles Posted in National Legal Malpractice Cases
Vincent v. DeVries, 2013 VT 34, Case No. 2012-026: Supreme Court of Vermont Affirms Economic Damage Award in Legal Malpractice Case
The Supreme Court of Vermont has affirmed an economic damage award in a legal malpractice action. In Vincent v. DeVries, a client and his sister contracted to sell their home for $52,000 to buyers. Shortly before the scheduled closing, the sister died and the client refused to go forward with the sale. The buyers then sued the client seeking specific performance of the contract. The client hired an attorney to defend him in the action.
Instead of responding to the complaint, the attorney moved for summary judgment. The buyers made their own motion for summary judgment, which the trial court granted. The attorney then filed an answer to the complaint and a series of motions seeking relief from the judgment alleging that the client was fraudulently induced into signing the contract. However, the trial court enforced the judgment finding that the client was precluded from raising new legal issues after judgment had entered.
The client then terminated the attorney. He eventually entered into a settlement agreement with the buyers, which allowed him to keep his home in exchange for a payment of $103,000, which included the buyers’ attorney’s fees incurred to prosecute the case. The client then sued the attorney for legal malpractice alleging that he negligently failed to raise appropriate defenses and counterclaims to the buyers’ suit.
Updated: July 2, 2013 6:47 pm
Aseel v. Jonathan E. Kroll & Assoc., PLLC, 2013 NY Slip Op 03806: New York Appellate Court Affirms Dismissal of Legal Malpractice Action
A New York appellate court has affirmed the dismissal of a legal malpractice action. In Aseel v. Jonathan E. Kroll & Assoc., PLLC, a client hired an attorney to represent him in his divorce proceedings. The client subsequently brought a legal malpractice suit against the attorney for negligently representing him in the divorce.
The attorney moved to dismiss the case on the grounds that it was barred by a three year statute of limitations. The trial court granted the motion. The client appealed arguing that the statute of limitations was tolled by the continuous representation doctrine, which applies when there is a mutual understanding between the lawyer and client to continue the representation for the matter underlying the malpractice claim.
The appellate court affirmed. The client had removed his case file from the attorney’s office without his knowledge, which the court held constituted termination of the attorney-client relationship. Therefore, the case was properly dismissed as time barred because it was commenced more than three years from that date.
Decision: Aseel v. Jonathan E. Kroll & Assoc., PLLC.doc
Haddy v. Caldwell, No. 08-12-00131-CV: Texas Appellate Court Affirms Summary Judgment in Favor of Attorney in Legal Malpractice Action
A Texas appellate court has affirmed a summary judgment for an attorney in a legal malpractice case. In Haddy v. Caldwell, a client retained an attorney to bring a medical malpractice suit against United States Army physicians, who treated the client’s then wife. The trial court granted summary judgment in favor of the doctors and the case was dismissed.
The client then sued the attorney for negligently failing to designate an expert witness and file an expert report in the medical malpractice suit. The attorney moved for summary judgment, which the trial court granted. The client appealed.
The appellate court affirmed. In a legal malpractice case arising from litigation, in addition to proving that the attorney was negligent, the plaintiff must also prove the “case within the case”. This means that he must show that he would have succeeded in the underlying suit but for the attorney’s negligence.
Here, the client submitted an affidavit of a medical professional with his opposition to the attorney’s motion for summary judgment, but failed to present expert witness testimony regarding the attorney’s negligence. Therefore, summary judgment was appropriate because the client could not show that the attorney’s failure to designate a medical expert constituted a breach of the standard of care for a reasonable lawyer.
Decision: Haddy v. Caldwell
Updated: May 18, 2013 1:17 am
Frasco, Caponigro, Wineman, & Scheible, PLLC v. IGC Management, Inc., No. 308405: Michigan Court of Appeals Affirms Summary Judgment In Favor of Attorney In Legal Malpractice Case
A Michigan appellate court has affirmed a summary judgment in favor of an attorney in a legal malpractice action. In Frasco, Caponigro, Wineman, & Scheible, PLLC v. IGC Management, Inc., a sub-contractor hired an attorney to recover funds from a general contractor. The general contractor later filed for bankruptcy, and a bank was found to have a priority security interest against the contractor’s assets.
The attorney, who also represented other unpaid sub-contractors, negotiated a mediated settlement with the financers of the project. However, the original sub-contractor did not assent to the terms of the settlement. The attorney informed the mediator and requested that the agreement contain a separate signature line for the sub-contractor, which the mediator failed to include. Nevertheless, the attorney executed the agreement and the bankruptcy court found that the sub-contractor was bound by its terms because the attorney signed on its behalf.
The sub-contractor then sued the attorney for legal malpractice. The attorney moved for summary judgment, which the trial court granted. The sub-contractor appealed.
The appellate court affirmed, finding that although the attorney’s conduct may have breached his ethical duties, it did not constitute malpractice. Under Michigan law, liability for settling a case without a client’s consent stems from a bad faith breach of contract rather than negligence. Here, the attorney did not intend to sign the agreement on behalf of the sub-contractor and had informed the mediator that he did not have such authority. Thus, the attorney acted in good faith and summary judgment was appropriate.
Decision: Frasco, Caponigro, Wineman, & Scheible, PLLC v. IGC Management, Inc.
Posted in: Legal Ethics Issues, Legal Malpractice Issues and National Legal Malpractice Cases
Updated: May 1, 2013 4:14 pm
Lewis v. Album, No. 12-CA-854: Louisiana Court of Appeals Affirms Summary Judgment for Attorney in Legal Malpractice Case
A Louisiana appellate court has affirmed a summary judgment in favor of an attorney in a legal malpractice action. In Lewis v. Album, a client retained an attorney in order to bring a claim against the Louisiana Commissioner of Insurance. Several months later, the client terminated the attorney’s representation.
Nearly three years later, the Commissioner’s office served the attorney with an ex parte motion to dismiss the case for abandonment and a court order granting the motion. The attorney forwarded the filings to the client, and filed a motion to withdraw as counsel of record. The following month, the client moved to set aside the Order of Abandonment, which the trial court denied because the case had already been dismissed.
Over one year later, the client filed a legal malpractice claim against the attorney, alleging that he had negligently allowed the previous suit to be dismissed for lack of prosecution. The attorney moved for summary judgment, which the trial court granted on the basis that the suit was barred by a one-year statute of limitations on legal malpractice claims.
The appellate court affirmed, finding that the statutory period began to run when the attorney informed the client that his case had been dismissed, or, at the latest, the following month when the client moved to set aside the judgment. Under either scenario, the client failed to commence his action within one year of either event. Summary judgment was therefore proper.
Decision: Lewis v. Album
Vara v. Williams, No. 03-10-00861-CV: Texas Appellate Court Affirms Summary Judgment for Attorney in Legal Malpractice Case
A Texas appellate court has affirmed a summary judgment in favor of an attorney in a legal malpractice action. In Vara v. Williams, a client hired an attorney to represent her in a divorce proceeding. The parties reached a mediated settlement, and the trial court entered a final divorce decree, which included a provision directing the parties to sign an operating trust agreement (“OTA”) allocating community property assets. Subsequently, disputes arose regarding the OTA, and the client hired a new attorney to represent her in that transaction.
The client later filed an action against the first attorney for negligently handling the OTA negotiations and several other causes of action. The attorney moved for summary judgment, which the trial court granted on the basis that the client had failed to timely designate an expert witness.
The appellate court affirmed, finding that contrary to Texas law, the client had attempted to transform a single count for legal malpractice into several other claims. In failing to timely designate an expert, the client could not succeed on her malpractice claim because she could not prove that the attorney had breached the standard of care. Summary judgment was therefore appropriate.
Bailey v. Robinson, No. 2 CA-CV 2012-0098: Arizona Appellate Court Affirms Summary Judgment for Attorney in Legal Malpractice Case
An Arizona appellate court has affirmed summary judgment in favor of an attorney in a legal malpractice action. In Bailey v. Robinson, a taxpayer hired an attorney to represent him in a civil action against the Internal Revenue Service (“IRS”), seeking a refund from a prior tax year. After a trial in the U.S. District Court for the District of Arizona, the court entered judgment for the IRS. The attorney then withdrew his representation.
The client filed a motion seeking relief from the judgment, arguing that an IRS agent had perjured herself and submitted falsified documents at trial. The client also argued that his attorney failed to discover or argue these issues. The trial court denied the motion, specifically ruling that the client failed to show that the agent had lied under oath or presented falsified documents, and therefore identified no reason for the attorney to have inquired into these subjects.
Several years later, the taxpayer sued his former attorney in state court for malpractice, again alleging that the attorney negligently failed to discover the IRS agent’s alleged perjury. The attorney successfully moved for summary judgment and the taxpayer appealed.
The appellate court affirmed, finding that the taxpayer was estopped from arguing that the agent perjured herself, because this issue was fully litigated and essential to the District Court’s judgment. Thus, there were no remaining issues of material fact and summary judgment was properly granted.
Decision: Bailey v. Robinson
Updated: March 16, 2013 4:34 pm
Facchinato v. Gerds, No. 305129: Michigan Appellate Court Affirms Summary Judgment for Attorney in Legal Malpractice Action
A Michigan appellate court has affirmed a summary judgment in favor of an attorney in a legal malpractice action. In Facchiano v. Gerds.doc, a husband and wife hired an attorney to draft an agreement to transfer a 40% interest in their second home to their daughter. The transaction was completed and the daughter subsequently obtained a mortgage on her interest in the property.
Over two years later, the daughter defaulted on the loan and filed for bankruptcy. The parents consulted another attorney to investigate their options. The second attorney advised the couple that there was nothing they could do to prevent the lender from foreclosing on the mortgage. However, the attorney did not inform the couple that they might have a negligence claim against the attorney who drafted the agreement.
Almost one year later, the parents filed a legal malpractice action against the first attorney. The attorney successfully moved to for summary judgment on the basis that the claim was barred by a statute of limitations. The parents appealed.
Under Michigan law, legal malpractice actions must be brought within two years of the act or omission of the attorney, which caused the clients’ damages. The statute is tolled for an additional six months from the date when the clients discovered or should have discovered the alleged injury.
Updated: March 3, 2013 8:30 pm | {"pred_label": "__label__wiki", "pred_label_prob": 0.7367048859596252, "wiki_prob": 0.7367048859596252, "source": "cc/2023-06/en_head_0000.json.gz/line1341533"} |
Top TV Seasons Classic
apps view_module menu
Babylon 5, The Complete Series
Teenage Mutant Ninja Turtles (Classic Series), Season 1
Gilligan's Island: The Complete Series
Wonder Woman: The Complete Series
Night Court: The Complete Series
Firefly, The Complete Series
Batman: The Complete Series
Kung Fu, The Complete Series
The A-Team, Season 1
Friends, Season 1
The Scooby-Doo Show, Season 2
Miami Vice, Season 2
The West Wing, Season 2
Full House, The Complete Series
Angel, The Complete Series
Kung Fu, Pilot
Kung Fu, Season 1
Scooby-Doo! Mystery Incorporated, The Complete Series
Babylon 5, Season 5
Schoolhouse Rock, Vol. 1
Friends, Season 10
Fawlty Towers, Series 1
ER, Season 1
The Jetsons, Season 1
The Golden Girls, Season 2
Gilligan's Island, Season 1
Daria, Season 1
The Magic School Bus, Vol. 1
Night Court, Season 1
The X-Files, Season 4
Sesame Street Classics, Vol. 1
The Dukes of Hazzard: The Complete Series
S.W.A.T., Season 5
Scooby-Doo Where Are You?, Season 3
The Flintstones, Season 1
Star Trek: The Original Series (Remastered), Season 1
Gilmore Girls, Season 1
Buffy the Vampire Slayer, Season 1
NewsRadio, Season 1
Buffy The Vampire Slayer, Complete Series
Little House On the Prairie, Season 1
The Dukes of Hazzard, Season 1
WKRP In Cincinnati, Season 1
The Pink Panther Show, Season 1
Pee-wee's Playhouse: Christmas Special
Battlestar Galactica (Classic), Season 1
Scooby-Doo Where Are You?, The Complete Series
The Addams Family Kooky Collection Complete Box Set
Addams Family - The Kooky Collection, Vol. 1
Blackadder Goes Forth
Justice League: The Complete Series
Mighty Morphin Power Rangers, Season 1, Vol. 1
Wonder Woman, Season 1
Blackadder II
Blackadder the Third
Justice League Unlimited: The Complete Series
The Incredible Hulk, Season 1
Frasier, Season 4
ThunderCats (Original Series), Season 1, Vol. 1
Best of I Love Lucy, Vol. 4
Star Trek: The Next Generation, Season 1
Frasier, Season 11
Mister Rogers' Neighborhood, Vol. 2
Adam 12, Season 1
Family Matters, Season 2
The Adventures of Superman, Season 1 | {"pred_label": "__label__wiki", "pred_label_prob": 0.9808421730995178, "wiki_prob": 0.9808421730995178, "source": "cc/2023-06/en_head_0000.json.gz/line1866740"} |
NextGen Vanadium Batteries: Berkeley & Texas A&M Scientists may have solved ‘electron bottleneck’
As the appetite grows for more efficient vehicles and mobile devices based on cleaner, renewable energy sources, so does the demand for batteries that pack more punch, last longer, and charge or discharge more quickly. The compound vanadium pentoxide has grabbed the spotlight as a way to improve lithium-ion batteries. However, it’s less-than-stellar behavior has been problematic.
An international team working at the Molecular Foundry (Berkeley) revealed why the material may not perform as expected. The team discovered how interactions between electrons and ions slow the performance of electrodes made with vanadium pentoxide (Nature Communications, “Mapping polaronic states and lithiation gradients in individual V2O5 nanowires”).
This work answers, in part, why the material gets bogged down. Vanadium pentoxide’s layered atomic structure results in a vast surface area, but a bottleneck occurs. If scientists can address the bottleneck, this material may lead to the next generation of batteries, which pack more punch, last longer, and charge or discharge more quickly.
A scanning electron microscopy image of vanadium pentoxide nanowires. The inset shows a ball-and-stick model of vanadium pentoxide’s atomic structure before and after inserting lithium ions (green). (Image: Texas A&M University)
An international team of scientists working at the Molecular Foundry has revealed how interactions between electrons and ions can slow down the performance of vanadium pentoxide, a material considered key to the next generation of batteries.
The compound vanadium pentoxide has grabbed the spotlight as a potential nanostructured material for state-of-the-art lithium-ion batteries because it can provide a greater surface area for the arrival and insertion of lithium ions. That quality makes vanadium pentoxide a good candidate as a cathode, the part of a battery where electrons and lithium ions enter.
The speed with which electrons can enter and exit the cathode determines how much power the battery can provide. The entry and exit speed also determine how quickly a battery recharges.
Power density and charging are both critical factors in the world of mobile electronics or electrification of our automotive fleet. But despite vanadium pentoxide’s potential, it has yet to be widely adopted commercially because of its less-than-stellar performance when put to the test in the real world.
The new findings shed light on the slowdown. The results show that the flow of electrons in vanadium pentoxide nanowires gets bogged down as it interacts with lithium ions in a phenomenon known as small polaron formation.
The research group, which involved scientists at Texas A&M University, made 2D maps of the electronic properties of synthesized vanadium pentoxide nanowires serving as a model lithium-ion cathode using scanning transmission x-ray microscopy at the Canadian Light Source. They came to the Molecular Foundry to interpret their findings.
Source: Molecular Foundry, Berkeley Lab
Vanadium Redox Flow Batteries for Large Scale Energy Storage
Lithium batteries may reign supreme when it comes to cellphones, laptops and electric vehicles. But for larger-scale energy storage, some are looking at alternative metals and technologies.
Enter Vanadium redox batteries. First successfully created by Dr. Maria Skyllas-Kazacos of the University of New South Wales in the 1980’s, Vanadium redox flow batteries use sulfuric solutions to power themselves. A vanadium electrolyte passing through a proton exchange membrane allows the battery to work, with a solution filling two tanks on either side.
Click Here to Read More: What are Vanadium Redox Batteries?
Leave a comment Posted in Nanotechnology Tagged Batteries, Berkeley, Genesis Nanotechnology, Lithium-ion battery, Nanomaterials, Nanotechnology, Vanadium, Vanadium Redox Battery
‘Light as a Feather’-metal Cathodes for stable lithium-oxygen batteries – Li2-O2
Nanoporous nickel cathodes for lithium oxygen batteries are ultralight, shown here balanced on flower stamens. (© ACS)
Lithium-oxygen systems could someday outperform today’s lithium-ion batteries because of their potential for high energy density. However, a number of important issues, such as their poor electrochemical stability must be addressed before these systems can successfully compete with current rechargeable batteries.Today, in ACS Central Science (“Nanoengineered Ultralight and Robust All-Metal Cathode for High-Capacity, Stable Lithium–Oxygen Batteries”), researchers report a new type of cathode, which could make lithium-oxygen batteries a practical option.
Xin-Bo Zhang and colleagues note that most of the problems associated with lithium-oxygen battery systems arise from two highly reduced oxygen species that react readily with the electrolyte and the cathode. Carbon is a common strong-performing cathode, but it is unstable in these systems.
The successful development of Li–O2 battery technology depends on resolving the issue of cathode corrosion by the discharge product (Li2O2) and/or by the intermediates (LiO2) generated during cell cycling. As an important step toward this goal, we report for the first time the nanoporous Ni with a nanoengineered AuNi alloy surface directly attached to Ni foam as a new all-metal cathode system.
So, the team hypothesized that the key to unlocking lithium-oxygen batteries’ potential could be to create cathodes that are unreactive to the reduced oxygen species, but that still have the same highly conductive, low-weight, porous characteristics of carbon cathodes. The researchers succeeded in creating an ultralight all-metal cathode.
The design incorporated three forms of nickel including a nanoporous nickel interior and a gold-nickel alloy surface directly attached to nickel foam. Compared to carbon cathodes, the system has much higher capacity and is stable for 286 cycles, which is amongst the best for lithium-oxygen systems, and is nearly competitive with current commercial lithium-ion systems.
Further experimentation showed that the stability and performance arise from both the metal used and its nanoporous structure, and that both these aspects could be optimized to further improve performance.
Ji-Jing Xu, Zhi-Wen Chang, Yan-Bin Yin, and Xin-Bo Zhang*
State Key Laboratory of Rare Earth Resources Utilization, Changchun Institute of Applied Chemistry, Chinese Academy of Sciences, Changchun 130022, P. R. China
Leave a comment Posted in Nanotechnology Tagged Batteries, Nanotechnology
UC San Diego: Printed, flexible and rechargeable battery can power Wearable Sensors, Solar Cells, Electronics
Stretchable printed batteries
Nanoengineers at the University of California San Diego have developed the first printed battery that is flexible, stretchable and rechargeable. The zinc batteries could be used to power everything from wearable sensors to solar cells and other kinds of electronics.
The work appears in the April 19, 2017 issue of Advanced Energy Materials.
The researchers made the printed batteries flexible and stretchable by incorporating a hyper-elastic polymer material made from isoprene, one of the main ingredients in rubber, and polystyrene, a resin-like component. The substance, known as SIS, allows the batteries to stretch to twice their size, in any direction, without suffering damage.
The ink used to print the batteries is made of zinc silver oxide mixed with SIS. While zinc batteries have been in use for a long time, they are typically non-rechargeable. The researchers added bismuth oxide to the batteries to make them rechargeable.
“This is a significant step toward self-powered stretchable electronics,” said Joseph Wang, one of the paper’s senior authors and a nanoengineering professor at the Jacobs School of Engineering at UC San Diego, where he directs the school’s Center for Wearable Sensors. “We expect this technology to pave the way to enhance other forms of energy storage and printable, stretchable electronics, not just for zinc-based batteries but also for Lithium-ion batteries, as well as supercapacitors and photovoltaic cells.”
The prototype battery the researchers developed has about 1/5 the capacity of a rechargeable hearing aid battery. But it is 1/10 as thick, cheaper and uses commercially available materials. It takes two of these batteries to power a 3 Volt LED. The researchers are still working to improve the battery’s performance. Next steps include expanding the use of the technology to different applications, such as solar and fuel cells; and using the battery to power different kinds of electronic devices.
Researchers used standard screen printing techniques to make the batteries–a method that dramatically drives down the costs of the technology. Typical materials for one battery cost only $0.50. A comparable commercially available rechargeable battery costs $5.00 Batteries can be printed directly on fabric or on materials that allow wearables to adhere to the skin. They also can be printed as a strip, to power a device that needs more energy. They are stable and can be worn for a long period of time.
Making the batteries rechargeable
The key ingredient that makes the batteries rechargeable is a molecule called bismuth oxide which, when mixed into the batteries’ zinc electrodes, prolongs the life of devices and allows them to recharge. Adding bismuth oxide to zinc batteries is standard practice in industry to improve performance, but until recently, there hasn’t been a thorough scientific explanation for why.
Last year, UC San Diego nanoengineers led by Professor Y. Shirley Meng published a detailed molecular study addressing this question (download PDF here). When zinc batteries discharge, their electrodes react with the liquid electrolyte inside the battery, producing zinc salts that dissolve into a solution. This eventually short circuits the battery. Adding bismuth oxide keeps the electrode from losing zinc to the electrolyte. This ensures that the batteries continue to work and can be recharged.
The work shows that it is possible to use small amounts of additives, such as bismuth oxide, to change the properties of materials. “Understanding the scientific mechanism to do this will allow us to turn non-rechargeable batteries into rechargeable batteries—not just zinc batteries but also for other electro-chemistries, such as Lithium-oxygen,” said Meng, who directs the Sustainable Power and Energy Center at the UC San Diego Jacobs School of Engineering
From Innovation to Market
Rajan Kumar, a co-first author on this Advanced Energy Materials paper, is a nanoengineering Ph.D. student at the Jacobs School of Engineering. He and nanoengineering professor Wang are leading a team focused on commercializing aspects of this work. The team is one of five to be selected to join a new technology accelerator at UC San Diego. The technology accelerator is run by the UC San Diego Institute for the Global Entrepreneur, which is a collaboration between the Jacobs School of Engineering and Rady School of Management.
Kumar is excited at the prospect of taking advantage of all that the IGE Technology Accelerator has to offer.
“For us, it’s strategically perfect,” said Kumar, referring to the $50,000 funding for prototype improvements, the focus on prototype testing with a strategic partner, and the entrepreneurship mentoring.
Kumar is confident in the team’s innovations, which includes the ability to replace coin batteries with thin, stretchable batteries. Making the right strategic moves now is critical for commercialization success.
“It’s now about making sure our energies are focused in the right direction,” said Kumar.
In addition to the IGE Technology Accelerator, the team was also recently selected to participate in the NSF Innovation-Corps (I-Corps) program at UC San Diego, also administered by the Institute for the Global Entrepreneur. One of the key tenets of the I-Corps program is helping startup teams validate their target markets and business models early in the commercialization process. Through NSF I-Corps, for example, Kumar has already started interviewing potential customers which has helped the team better focus their commercialization strategy.
Through these programs, Kumar is focused on leading the team through a series of milestones in order to best position their innovations to refine “both what to build and who to build it for,” he said.
Paper Citation
“All-Printed, Stretchable Zn-Ag2O Rechargeable Battery via Hyperelastic Binder for Self-Powering Wearable Electronics” in the journal Advanced Energy Materials.http://onlinelibrary.wiley.com/doi/10.1002/aenm.201602096/full
Authors: Rajan Kumar, Jaewook Shin, Lu Yin, Jung-Min You, Prof. Shirley Meng and Prof. Joseph Wang, Department of Nanoengineering, Jacobs School of Engineering, University of California San Diego.
Joseph Wang is a distinguished professor, holds the SAIC endowed chair, and serves as chair of the Department of NanoEngineering at the UC San Diego Jacobs School of Engineering where he directs the Center for Wearable Sensors.
Shirley Meng is a professor in the Department of NanoEngineering and Director of the Sustainable Power and Energy Center at the UC San Diego Jacobs School of Engineering.
Research funders include: Advanced Research Projects Agency-Energy (DE-AR0000535); Rajan Kumar acknowledges the U.S. National Science Foundation (NSF) Graduate Research Fellowship under Grant No (DGE-1144086).
This work was performed in part at the San Diego Nanotechnology Infrastructure (SDNI), a member of the National Nanotechnology Coordinated Infrastructure, which is supported by the U.S. National Science Foundation (NSF).
Leave a comment Posted in Nanotechnology Tagged Batteries, Genesis Nanotechnology, Printable Batteries, Sensors, UC San Diego, Wearable Electronics
MIT: A BIG step toward mass-producible quantum computers
A team of researchers from MIT, Harvard University, and Sandia National Laboratories reports a new technique for creating targeted defects in diamond materials, which is simpler and more precise than its predecessors and could benefit diamond-based quantum computing devices.
Quantum computers are experimental devices that offer large speedups on some computational problems. One promising approach to building them involves harnessing nanometer-scale atomic defects in diamond materials.But practical, diamond-based quantum computing devices will require the ability to position those defects at precise locations in complex diamond structures, where the defects can function as qubits, the basic units of information in quantum computing. In Nature Communications (“Scalable focused ion beam creation of nearly lifetime-limited single quantum emitters in diamond nanostructures”), a team of researchers from MIT, Harvard University, and Sandia National Laboratories reports a new technique for creating targeted defects, which is simpler and more precise than its predecessors.
In experiments, the defects produced by the technique were, on average, within 50 nanometers of their ideal locations.
“The dream scenario in quantum information processing is to make an optical circuit to shuttle photonic qubits and then position a quantum memory wherever you need it,” says Dirk Englund, an associate professor of electrical engineering and computer science who led the MIT team. “We’re almost there with this. These emitters are almost perfect.”
The new paper has 15 co-authors. Seven are from MIT, including Englund and first author Tim Schröder, who was a postdoc in Englund’s lab when the work was done and is now an assistant professor at the University of Copenhagen’s Niels Bohr Institute. Edward Bielejec led the Sandia team, and physics professor Mikhail Lukin led the Harvard team.
Appealing defects
Quantum computers, which are still largely hypothetical, exploit the phenomenon of quantum “superposition,” or the counterintuitive ability of small particles to inhabit contradictory physical states at the same time. An electron, for instance, can be said to be in more than one location simultaneously, or to have both of two opposed magnetic orientations.
Where a bit in a conventional computer can represent zero or one, a “qubit,” or quantum bit, can represent zero, one, or both at the same time. It’s the ability of strings of qubits to, in some sense, simultaneously explore multiple solutions to a problem that promises computational speedups.
Diamond-defect qubits result from the combination of “vacancies,” which are locations in the diamond’s crystal lattice where there should be a carbon atom but there isn’t one, and “dopants,” which are atoms of materials other than carbon that have found their way into the lattice. Together, the dopant and the vacancy create a dopant-vacancy “center,” which has free electrons associated with it. The electrons’ magnetic orientation, or “spin,” which can be in superposition, constitutes the qubit.
A perennial problem in the design of quantum computers is how to read information out of qubits. Diamond defects present a simple solution, because they are natural light emitters. In fact, the light particles emitted by diamond defects can preserve the superposition of the qubits, so they could move quantum information between quantum computing devices.
Silicon switch
The most-studied diamond defect is the nitrogen-vacancy center, which can maintain superposition longer than any other candidate qubit. But it emits light in a relatively broad spectrum of frequencies, which can lead to inaccuracies in the measurements on which quantum computing relies.
In their new paper, the MIT, Harvard, and Sandia researchers instead use silicon-vacancy centers, which emit light in a very narrow band of frequencies. They don’t naturally maintain superposition as well, but theory suggests that cooling them down to temperatures in the millikelvin range — fractions of a degree above absolute zero — could solve that problem. (Nitrogen-vacancy-center qubits require cooling to a relatively balmy 4 kelvins.)
To be readable, however, the signals from light-emitting qubits have to be amplified, and it has to be possible to direct them and recombine them to perform computations. That’s why the ability to precisely locate defects is important: It’s easier to etch optical circuits into a diamond and then insert the defects in the right places than to create defects at random and then try to construct optical circuits around them.
In the process described in the new paper, the MIT and Harvard researchers first planed a synthetic diamond down until it was only 200 nanometers thick. Then they etched optical cavities into the diamond’s surface. These increase the brightness of the light emitted by the defects (while shortening the emission times).
Then they sent the diamond to the Sandia team, who have customized a commercial device called the Nano-Implanter to eject streams of silicon ions. The Sandia researchers fired 20 to 30 silicon ions into each of the optical cavities in the diamond and sent it back to Cambridge.
Mobile vacancies
At this point, only about 2 percent of the cavities had associated silicon-vacancy centers. But the MIT and Harvard researchers have also developed processes for blasting the diamond with beams of electrons to produce more vacancies, and then heating the diamond to about 1,000 degrees Celsius, which causes the vacancies to move around the crystal lattice so they can bond with silicon atoms.
After the researchers had subjected the diamond to these two processes, the yield had increased tenfold, to 20 percent. In principle, repetitions of the processes should increase the yield of silicon vacancy centers still further.
When the researchers analyzed the locations of the silicon-vacancy centers, they found that they were within about 50 nanometers of their optimal positions at the edge of the cavity. That translated to emitted light that was about 85 to 90 percent as bright as it could be, which is still very good.
Source: By Larry Hardesty, MIT
Leave a comment Posted in Nanotechnology Tagged MIT, Nanomaterials, Nanotechnology, Quantum Computing
Water is surprisingly ordered on the nanoscale
Nanometric-sized water drops are everywhere – in the air as droplets or aerosols, in our bodies as medication, and in the earth, within rocks and oil fields. To understand the behavior of these drops, it is necessary to know how they interact with their hydrophobic environment.
This interaction takes places at the curved droplet interface, a sub-nanometric region that surrounds the small pocket of water. Researchers from EPFL, in collaboration with the institute AMOLF in the Netherlands, were able to observe what was going on in this particular region.
They discovered that molecules on the surface of the drops were much more ordered than expected. Their surprising results have been published in Nature
Communications. They pave the way to a better understanding of atmospheric, biological and geological processes.
Unique perspective on miniscule droplets
At EPFL, Sylvie Roke, director of the Julia Jacobi Chair of Photomedicine -Laboratory for Fundamental BioPhotonics, has developed a unique method for examining the surface of these droplets that are as thick as one thousandth of a hair, with a volume of an attoliter (18 zeros behind the comma).
“The method involves overlapping ultrashort laser pulses in a mixture of water droplets in liquid oil and detecting photons that are scattered only from the interface”, explains Roke. “These photons have the sum frequency of the incoming photons and are thus of a different color. With this newly generated color we can know the structure of the only the interface.”
Hydrogen bonding as strong as in ice
The surface of the water droplets turns out to be much more ordered than that of normal water and is comparable to super cooled (liquid < 0 °C water) water in which the water molecules have very strong hydrogen bond interactions. In ice, these interactions lead to a stable tetrahedral surrounding of each water molecule. Surprisingly, this type of structure was found on the surface of the droplets even at the room temperature – 50 °C above were it would normally appear.
This research provides valuable insight into the properties of nanometric water drops. “The chemical properties of these drops depend on how the water molecules are organized on the surface, so it’s really important to understand what’s going on there,” explained Roke. Further research could target the surface properties of water droplets with adding salt, a more realistic model of marine aerosols that consist of salty water surrounded by a hydrophobic environment. Salt may either enhance the water network or reduce its strength. “Or, it may not do anything at all. Given the surprising results found here, we can only speculate”, says Roke.
The surface of the water droplets turns out to be much more ordered than that of normal water and is comparable to super cooled (liquid < 0 °C water) water in which the water molecules have very strong hydrogen bond interactions. @ EPFL- Julia Jacobi Chair of Photomedicine – Laboratory for fundamental BioPhotonics
The interfacial structure of water droplets in a hydrophobic liquid
Nikolay Smolentsev, Wilbert J. Smit, Huib J. Bakker & Sylvie Roke
Nature Communications 8, Article number: 15548 (2017)
doi:10.1038/ncomms15548
Leave a comment Posted in Nanotechnology Tagged Genesis Nanotechnology, Nanotechnology, water
The Lilium Jet – The world’s first all-electric VTOL jet (vertical take-off and landing): Video
*** From Lilium All-Electric Jet Services
We have incredibly exciting news to share. The Lilium Jet successfully completed its maiden test flight series in the skies above Bavaria. The 2-seater Eagle prototype executed a range of complex maneuvers, including its signature mid-air transition from hover mode to wing-borne forward flight.
Seeing the Lilium Jet take to the sky and performing sophisticated maneuvers with apparent ease is testament to the skill and perseverance of our amazing team. We have solved some of the toughest engineering challenges in aviation to get to this point. The successful test flight programme shows that our ground-breaking technical design works exactly as we envisioned. We can now turn our focus to designing a 5-seater production aircraft.
Lilium enables you to travel 5 times faster than a car by introducing the world’s first all-electric vertical take-off and landing jet: an air taxi for up to 5 people. You won’t have to own one, you will simply pay per ride and call it with a push of a button. It’s our mission to make air taxis available to everyone and as affordable as riding a car.
In 1894, Otto Lilienthal began experimenting with the first gliders and imagined a future in which we could all fly wherever we want, whenever we want. Lilium is turning that dream into reality. We are bringing personalized, clean and affordable air travel to everyone.
Read about the Lilium Jet Story and Technology
The world’s first electric vertical take-off and landing jet.
** Information obtained for this article is from the Company’s News Release and Website It is for informational purposes only and does not represent any form of endorsement. **
Leave a comment Posted in Nanotechnology Tagged Batteries, Electric Jet Flight, Lilium, VTOL
New Battery Could Power Electric Cars 620 Miles (@ 1,000km) on Single Charge
The average American drives about 30 miles (48 kilometers) per day, according to AAA, yet many people are still reluctant to buy electric cars that can travel three times that distance on a single charge.
This so-called range anxiety is one reason gasoline-powered vehicles still rule the road, but a team of scientists is working to ease those fears.
Mareike Wolter, Project Manager of Mobile Energy Storage Systems at Fraunhofer-Gesellschaft in Dresden, Germany, is working with a team on a new battery that would give electric cars a range of about 620 miles (1,000 km) on a single charge.
Wolter said the project began about three years ago when researchers from Fraunhofer as well as ThyssenKrupp System Engineering and IAV Automotive Engineering started brainstorming about how they could improve the energy density of automotive lithium batteries.
They turned to the popular all-electric car, the Tesla, as a starting point. Tesla’s latest vehicle, the Model S 100D has a 100-kilowatt-hour battery pack, which reportedly gives it a range of 335 miles (540 km).
The pack is large, about 16 feet long, 6 feet wide and 4 inches thick. It contains more than 8,000 lithium-ion battery cells, each one individually packaged inside a cylinder housing that measures about 2 to 3 inches (6 to 7 centimeters) high and about 0.8 inches (2 cm) across.
“We thought if we could use the same space as the battery in the Tesla, but improve the energy density and finally drive 1,000 km, this would be nice,” Wolter told Live Science.
One way of doing this would be to refine the materials inside the battery so that it could store more energy, she said. But another way would be to improve the system’s design as a whole, Wolter said.
Nearly 50 percent of each cell is devoted to components such as the housing, the anode (the battery’s negative terminal), the cathode (the battery’s positive terminal) and the electrolyte, the liquid that transports the charged particles.
Additional space is needed inside the car to wire the battery packs to the vehicle’s electrical system.
“It’s a lot of wasted space,” Wolter said. “You have a lot of inactive components in the system, and that’s a problem from our point of view.”
The scientists decided to reimagine the entire design, they said.
An illustration that shows how the new electric battery is stacked like a ream of paper. Credit: Fraunhofer IKTS
To do so, they got rid of the housings that encase individual batteries and turned to a thin, sheet-like design instead of a cylinder.
Their metallic sheet is coated with an energy-storage material made from powdered ceramic mixed with a polymer binder. One side serves as the cathode, and other side serves as the anode.
The researchers stacked several of these so-called bipolar electrodes one on top of the other, like sheets of paper in a ream, separating the electrodes by thin layers of electrolyte and a material that prevents electrical charges from shorting out the whole system.
The “ream” is sealed within a package measuring about 10 square feet (1square meter), and contacts on the top and bottom connect to the car’s electrical system.
The goal is to build a battery system that fits in the same space as the one used by Tesla’s vehicles or other electric vehicles, the researchers said.
“We can put more electrodes storing the energy in the same space,” Wolter said.
She added that the researchers aim to have such a system ready to test in cars by 2020.
Original article on Live Science.
Leave a comment Posted in Nanotechnology Tagged Batteries, Energy, EV's, Genesis Nanotechnology, Live Science, Nanotechnology
MIT: Tesla Not the Only Battery Game in Town ~ Electric Cars Could Be Cheaper Than Internal Combustion by 2030
German chancellor Angela Merkel visits Accumotive’s plant in Kamenz, Germany.
Tesla gets the headlines, but big battery factories are being built all over the world, driving down prices.
Battery production is booming, and Tesla is far from the only game in town.
According to Bloomberg New Energy Finance, global battery production is forecast to more than double between now and 2021. The expansion is in turn driving prices down, good news both for the budding electric-car industry and for energy companies looking to build out grid-scale storage to back up renewable forms of energy.
While Tesla gets tons of attention for its “gigafactories”—one in Nevada that will produce batteries, and another in New York that will produce solar panels—the fact is, the company has a lot of battery-building competition.
Exhibit A is a new battery plant in Kamenz, Germany, run by Accumotive. The half-billion-euro facility broke ground on Monday with a visit from German chancellor Angela Merkel and will supply batteries to its parent company, Daimler, which is betting heavily on the burgeoning electric-vehicle market.
But the lion’s share of growth is expected to be in Asia. BYD, Samsung, LG, and Panasonic (which has partnered with Tesla) are all among the world’s top battery producers, and nine of the world’s largest new battery factories are under construction in China (paywall), according to Benchmark Minerals.
That competition means the steady downward trend in battery prices is going to continue. On a per-kilowatt-hour basis, costs have fallen from $542 in 2012 to around $139 today, according to analysis by Benchmark.
That makes for a huge difference in the cost of an electric car, of which 40 percent is usually down to the battery itself.
Bloomberg’s analysts have already said that the 2020s could be the decade in which electric cars take off—and one even went so far as to say that by 2030, electric cars could be cheaper than those powered by internal combustion.
Those watching the industry might worry that a flood of cheap batteries could end up hurting profitability for producers, as happened in the solar-panel business.
That could happen, but India and China, two huge rising automotive markets, are bullish about using electric cars to help solve problems like traffic congestion and air pollution. So even as supply ramps up, there is likely to be plenty of demand to go around.
MIT Technology Review: M. Reilly Sr. Editor
Leave a comment Posted in Nanotechnology Tagged Batteries, Electric Vehicles, Energy, EV's, Genesis Nanotechnology, Nanotechnology, Tesla
BrightVolt flexible batteries using solid state lithium polymer: YouTube Video
BrightVolt (http://brightvolt.com)
develops flexible batteries using solid state thin film lithium polymer, Polymer Matrix Electrolyte (PME) for batteries enabling new small IoT devices, smart clothing, healthcare and more.
Leave a comment Posted in Nanotechnology Tagged Batteries, Flexible electronics, Flexible Screens, Nano Batteries
A Holey Graphene Electrode framework that enables highly efficient charge delivery – Making Better Batteries for the Future
This visualisation shows layers of graphene used for membranes. Credit: University of Manchester
A team of researchers affiliated with institutions in the U.S., China and the Kingdom of Saudi Arabia has developed a new type of porous graphene electrode framework that is capable of highly efficient charge delivery. In their paper published in the journal Science, the group describes how they overcame traditional conflicts arising between trade-offs involving density and speed to produce an electrode capable of facilitating rapid ion transport. Hui-Ming Cheng and Feng Li with the Chinese Academy of Sciences offer a Perspective piece on the work done by the team in the same journal issue, and include some opinions of their own regarding where such work is likely heading.
In a perfect world, batteries would have unlimited energy storage delivered at speeds high enough to power devices with unlimited needs. The phaser from Star Trek, for example, would require far more power and speed than is possible in today’s devices.
While it is unlikely that such technology will ever come about, it does appear possible that batteries of the future will perform much better than today, likely due to nano-structured materials—they have already shown promise when used as electrode material due to their unique properties. Unfortunately, their use has been limited thus far due to the ultra-thin nature of the resulting electrodes and their extremely low mass loadings compared to those currently in use. In this new effort, the researchers report on a new way to create an electrode using graphene that overcomes such limitations.
The electrode they built is porous, which in this case means that it has holes in it. Those holes, as Cheng and Li note, allow better charge transport while also offering improved capacity retention density. The graphene framework they built, they note, offers a superior means of electron transport and its porous nature allows for a high ion diffusion rate—the holes force the ions to take shortcuts, reducing diffusion.
Cheng and Li suggest the new work is likely to inspire similar designs in the search for better electrode materials, which they further suggest appears likely to lead to new electrodes that are not only practical, but have high mass loadings.
Explore further: New graphene framework bridges gap between traditional capacitors, batteries
More information: Hongtao Sun et al. Three-dimensional holey-graphene/niobia composite architectures for ultrahigh-rate energy storage, Science (2017). DOI: 10.1126/science.aam5852
Nanostructured materials have shown extraordinary promise for electrochemical energy storage but are usually limited to electrodes with rather low mass loading (~1 milligram per square centimeter) because of the increasing ion diffusion limitations in thicker electrodes.
We report the design of a three-dimensional (3D) holey-graphene/niobia (Nb2O5) composite for ultrahigh-rate energy storage at practical levels of mass loading (>10 milligrams per square centimeter). The highly interconnected graphene network in the 3D architecture provides excellent electron transport properties, and its hierarchical porous structure facilitates rapid ion transport.
By systematically tailoring the porosity in the holey graphene backbone, charge transport in the composite architecture is optimized to deliver high areal capacity and high-rate capability at high mass loading, which represents a critical step forward toward practical applications.
Journal reference: Science
Leave a comment Posted in Nanotechnology Tagged Batteries, Energy storage, Genesis Nanotechnology, Graphene, Nano Batteries, University of Manchester | {"pred_label": "__label__wiki", "pred_label_prob": 0.521187961101532, "wiki_prob": 0.521187961101532, "source": "cc/2023-06/en_head_0000.json.gz/line464053"} |
David Crosby Saddens His Fans As He Shuts Down The Rumors About Neil Young And Possible Reunion
Melek Nur Pervan
The founding member of The Byrds and Crosby, Stills & Nash, David Crosby shared a post on his official page responding to a fan’s expectations of him performing for the 2021 Grammys along with Neil Young, however, Crosby made it perfectly clear that it’s not going to happen.
As you may know, The Recording Academy revealed nominations for the 2021 Grammys on November 24 on their official website. The nominations and expectations of winners thrilled the fans since the Grammys is one of the biggest celebrations of music, however, they are also concerned with the performances on the show.
For next year’s Grammy Awards, the official website of Billboard started a poll mostly including pop star names like Beyonce, Billie Eilish, Taylor Swift and asked fans who should perform for the upcoming award show.
In addition to the musicians who were already on the list, Billboard also added another choice in which all fans got the opportunity to add a musician of their choice. Since the official Twitter page of Billboard also announced the survey, fans have already started to share their opinions.
Alongside fans, David Crosby also shared a post on his official Twitter page and revealed his choice for the performer on the 2021 Grammys. Apparently, Crosby wants to see one of the best selling artists of all time, James Taylor, three-time Grammy winner band, Snarky Puppy, and former member of Drive-By Truckers and four-time Grammy winner, Jason Isbell.
Here is what Crosby said:
“James Taylor, Snarky Puppy, Jason Isbell”
After given the opportunity, a fan shared a post on Twitter stating that David Crosby, Neil Young, Grahan Nash, and Stephen Stills, the former members of the band Crosby, Stills, Nash & Young should be performing for the upcoming Grammy Awards.
Here is what the fan said:
“David Crosby, Neil Young, Graham Nash, Stephen Stills”
David Crosby replied to that fan’s tweet and shared a post on his official Twitter page strictly revealing that it’s not going to happen which led fans to think a reunion like this does not seem quite possible.
“I guarantee that will not happen.“
You can see the Twitter posts below.
James Taylor , Snarky Puppy, Jason Isbell https://t.co/ZB6PR5QUem
— David Crosby (@thedavidcrosby) November 28, 2020
I guarantee that will not happen https://t.co/1T5MlAziDm
David Crosby News
Neil Young News
Previous articleRed Hot Chili Peppers’ Flea Shares His Opinions On Paul McCartney’s New Album
Next articleGene Simmons Daughter Sophie Looks Gorgeous In A Recent Video As She Announces Her New Book Is Out
Hi! I'm Melek. I'm a passionate writer who's also into rock and metal music. Please let me know if you have any suggestions. meleknur@metalheadzone.com | {"pred_label": "__label__wiki", "pred_label_prob": 0.9807045459747314, "wiki_prob": 0.9807045459747314, "source": "cc/2023-06/en_head_0000.json.gz/line547098"} |
Discover the Philippines
Asian Geographic TV
Asian Geographic Magazines
Home On Assignment Namasté
A group of priests performing agni puja, in which a dedication is made to Lord Shiva
The mass pilgrimage at Kumbh Mela unites Hindus in a splendid showcase of faith and devotion
Text Shirin Bhandari
Photos Gunther Deichmann
The Hindu devotee’s hands are pressed together. His palms touch, close to his chest, and his fingers point upwards. His brightly-coloured turban is in stark contrast to his thick white beard. “Namaste,” he says with a slight bow. Literally translated, the word means “I bow to the divine in you.” A respectful greeting, namaste, or namaskar, combined with the wordless hand gesture, conveys the same meaning of acknowledgement for a loved one, a guest or a stranger, regardless of the speaker’s language, culture or religion. Amidst the potpourri of more than 1,500 languages spoken in India, namaste is a universal form of salutation, understood by all, and particularly so during the Kumbh Mela. The left-to-right head wobble – would that be a yes or a no? – is another story!
Sadhus come from all over India to participate in the Kumbh Mela, held every 12 years in Ujjain (Image © Gunther Deichmann)
It is a Sensory Overload
India is not for the faint-hearted. It is sensory overload; there are no grey areas: either you’ll love to travel the country or hate it well enough to take the first flight out. India can break you with its poverty, lack of privacy and dirt; ironically, Western travellers claim to have found inner spirituality after a two-week trip. The Kumbh Mela – the largest spiritual gathering in the world, when Hindus gather en masse to bathe in a sacred river and cleanse themselves of sin – is the ultimate test.
First documented by a Chinese traveller in the seventh century, the colourful celebration of the world’s oldest religion is held once every 12 years. The exact date of the festival is determined according to a combination of the zodiac positions of Jupiter, the sun and the moon.
Hindu mythology describes how the Lord Vishnu dropped the drink of immortality over four locations as he was transporting it in a kumbha (pot), hence the name. The Mela (gathering) is centred at the banks of a river where devotees bathe to cleanse themselves of their sins. The main festival site is, of course, located on the banks of a river: the Ganges at Haridwar; the confluence of the Ganges and Yamuna and the invisible Sarasvati at Allahabad; the Sarasvati at Allahabad; the Godavari at Nashik; and the Shipra at Ujjain.
A group of priests performing agni puja, in which a dedication is made to Lord Shiva (Image © Gunther Deichmann)
The Kumbh Mela is a melting pot of the millions of people that visit from the various states who, despite speaking diversely different languages, converge peacefully in the name of religion. The event is widely known by its Sanskrit name, Kumbha, the sacred language of Hinduism and a ceremonial language in pujas (prayers) and religious rituals. Sanskrit is the sacred language of Hinduism and one of the oldest Indo-European languages in the world. The literature holds a deep tradition in drama, poetry, religious and philosophical texts.
As such, Sanskrit hymns and chants are widely heard throughout the Kumbh Mela. Kumbha is also – fittingly – the sign of the Aquarius.
The Kumbh Mela in Ujjain can be traced back to the 18th century. The ancient city, considered one of the most sacred places in India, sits along the eastern bank of the Kshipra River and is located in the state of Madhya Pradesh in central India. It is as if time has stood still here. Visitors travel to India on planes, trains and automobiles, then transfer to more eclectic, old-world modes of transportation: camels, horses, even elephants. The devotees are from all walks of life, from various castes and religious orders – Hindus, Buddhists, Sikhs, even Christian missionaries – with one purpose: to bathe and be born again, freed into an eternal life without sin and suffering. Between 22 April and 21 May 2016, approximately 75 million people visited.
The main temple of reverence in Ujjain is the Mahakaleshwar Jyotirlinga, situated on the side of the Rudra Sagar Lake. It is one of the most famous Hindu temples dedicated to Lord Shiva, and is said to be one of twelve jyotirlingams that is the most sacred abode of Lord Shiva. The Ram Ghat – one of the most popular – is located close to the Harsiddhi Temple in Ujjain. Indian astronomers have calculated that the Tropic of Cancer passes through the city of Ujjain, making it the Greenwich of India.
The Peoples
The largest crowd-pullers at the Kumbh Mela are the sadhus or the holy men of India. The root word sadh in Sanskrit means ‘to reach one’s goal’; the same word is used in the sadhana, or spiritual practice. Becoming a sadhu is the fourth stage in a Hindu’s life, and the practice is also open to women (sadvi). Coming from a variety of castes, the holy people of India practise a nomadic life and their spiritual discipline involves self-denial: renouncing the world for meditation and contemplation.
Living apart from society – in Hindu temples, ashrams, forests and caves – the sadhus focus on their yogic and spiritual beliefs. Some of them thrive in large communes while others choose a more reclusive lifestyle. They rely on donations from people to survive. It is a difficult path and sadhus are considered legally dead unto themselves and to India. Regardless, it is believed that their devotion is good karma and beneficial to Indian society.
The nanga (naked) sadhus, with their thick dreadlocks and ash-covered skin, claim to be in the company of ghosts. They certainly look the part. India has an infinite amount of rituals and traditions that can lead one to God. Their choice to live in cemeteries as part of their holy path is, however, macabre. Some are thought to possess special powers. The fascination with the Lord Shiva explains their heavy use of charas (cannabis), who was thought to have a deep affinity for the plant.
Most devotees at the event are draped in brightly-coloured fabrics, though marigold is predominant, and beads of different shapes and sizes, often mixed with silver, adorn their necks and wrists. Tents of various hues fill the horizon. Fragrant food stalls serve only vegetarian cuisine so that nobody is offended. The smell of musky incense mixed with ganja (marijuana) fills the air. The stairs leading down to the body of water are full of people patiently waiting their turn in the river. The nanga sadhus flock to bathe, proving that one can detach from worldly things. The outcome is an overwhelming, unexpected and extraordinary visual feast.
Every 144 years, a Maha (great) Kumbh Mela occurs. It is said that in 2013, more than 120 million pilgrims attended the Maha Kumbh Mela in Allahabad within a span of two months. The gathering was so huge that it was visible from space!
Whatever the reasons for the pilgrimage, the Kumbh Mela has proven for centuries that it embodies the Indian spirit. From this whirlwind of activities and swirl of languages and cultures, faith – together with the timeless journey towards forgiveness and redemption – is the one factor that unites people.
For more stories and photographs from this issue, check out Asian Geographic Issue 120.
Gunther Deichmann
Shirin Bhandari
Previous articleThe Future of Language
Next articleRevisiting the Samurai
Our Planet, Our Life: Cleaning Up Versova Beach
Nature’s Lightning Show
Education and Hope: Inheriting a Future
The Sky is Bad Today
Homeless, not Shameless
Riding the Golden Eagle: From Russia with Love
Island Nations of Asia
Articles editor - May 3, 2021
What is an Island Nation? An island country is a nation that is made up of one or more islands or land that is surrounded completely by water. Around one-fifth of Asia is made up of island nations, and while island countries are typically small with low populations, some, like...
The Pyramid of Gunung Padang
Heritage editor - May 18, 2019
Megalithic site in Indonesia could be the oldest in the world Gunung Padang Indonesia Göbekli Tepe TurkeyPyramids of Giza EgyptStonehenge EnglandBorobudur IndonesiaRapa Nui Easter IslandMacchu Picchu PeruGunung Padang is once again making headlines as the first pyramid in Southeast Asia and the oldest megalithic site in the world.Recent discoveries as deep as 90 feet found the hill-pyramid to contain...
The Hanging Gardens of Babylon
Heritage editor - June 17, 2019
(Photo: Graphicaartis/Corbis) The Hanging Gardens of Babylon has captured the imagination of historians worldwide for centuries. Yet, its existence remains a debate as years of digging have turned up nothing about the lost Gardens.First described in a book called Babyloniaca by a Chaldean priest named Berossus in 280 BC, the...
Asian Geographic Magazine celebrates Asia’s diversity, covering stunning landscapes and travel destinations, environmental issues, travel, heritage, arts and cultures.
Based in Singapore, the team has its fingers on the pulse of Asia, scouring the region to bring powerful stories and photographs to its readers and viewers.
Titles under Asian Geographic Magazines include its flagship title Asian Geographic as well as diving titles Asian Diver and Scuba Diver in print and UnderWater360 online. | {"pred_label": "__label__wiki", "pred_label_prob": 0.5210192799568176, "wiki_prob": 0.5210192799568176, "source": "cc/2023-06/en_head_0000.json.gz/line188"} |
The effect of competition by Chinese exports in international markets on the Portuguese labour market
Chinese exports may affect a given country directly through intensifying competition in the domestic market, but also indirectly in foreign markets where firms from that country compete with Chinese exports. In fact, the large export market share gains of China in low-tech, low-skill products, like textiles, clothing, footwear, and electric appliances, were accompanied by losses in the export shares of several other countries, like Portugal. These indirect effects of competition in third-country export markets are the main object of this study; they can be significant given the growing sophistication of China’s exports, implying greater competition in virtually all industries in which developed economies operate. In our work, we analyze both the direct and indirect labour market effects of rising international trade exposure to China, focusing on the case of Portugal.
Consistent with previous research, we find evidence that China’s expanding role in global trade represented a major negative shock for the Portuguese labour market. However, in contrast to evidence from other countries, the direct effects of increased imports from China are mostly non-significant. The negative labour market effects stem exclusively from the higher competition of Chinese products in the main destination markets of Portuguese exports. Portuguese workers in industries more exposed to this indirect competition from China saw their total cumulative wages and employment fall when compared to similar workers in less exposed industries. Particular groups of workers were more affected by the Chinese competition in international markets, namely women, older and less educated workers. The paper points to the relevance of differentiating the effects of trade on the cross section of workers when designing economic and social policies aimed at supporting workers hurt by globalization.
Click here to go to the paper by Sónia Cabral, Pedro S. Martins, João Pereira dos Santos and Mariana Tavares. | {"pred_label": "__label__cc", "pred_label_prob": 0.5643853545188904, "wiki_prob": 0.4356146454811096, "source": "cc/2023-06/en_head_0000.json.gz/line620273"} |
Are “The Classics” Bad for You?
February 8, 2022 • By Naomi Kanakia
IN MY FIELD, young adult fiction, there’ll be a viral Twitter thread every few months that asks, “What books should no longer be taught in high school?” And hundreds of people will inevitably name stuffy old white books that they think have no relevance to modern teens and/or which they hated reading as kids.
Now we’re not talking Homer or Plato here. Usually, people will mention The Great Gatsby or The Catcher in the Rye. Sometimes Ethan Frome comes up (deservedly so, it’s one of Wharton’s weakest works). Weirdly, people always bring up Moby-Dick, to which my response is, “What high schools are teaching Moby-Dick? Even most colleges don’t teach it anymore.”
Inevitably these exchanges become heated, as people leap in to defend “classic literature” and the general concept of “reading the Classics.” Sometimes passions really flare, and I have a number of writer-acquaintances who will, in private, shake their heads at these threads and talk about cancel culture and censorship and how you’re not allowed to think improper thoughts anymore.
The whole phenomenon is of particular interest to me for two reasons. The first is that I adore the Classics, and my extensive reading is a major part of my personal identity, so I always have to restrain myself from weighing in.
And the second is that I never did the reading in high school. The last book I remember opening for high school English was Pride and Prejudice in 10th grade, and it was so dull that I threw it across the room and finished my essay using CliffsNotes. For most of college, and even grad school, I didn’t read any of the required texts.
I have since gone back and read most of these books and loved them! I remember laughing out loud at the first page of Pride and Prejudice, which I finally read when I was 26, and wondering how my 10th-grade self could have possibly disliked it.
And yet I still hate doing the required reading. It’s antithetical to the whole spirit of reading, in my view. It’s one reason I no longer accept books for review — the process of having to read a book is simply too grueling. The freedom to read what I want when I want is a critical part of my intellectual life, and I frankly resent whenever someone tries to rob me of that freedom — even when they’re a professor I’m paying to teach me! I know, it’s messed up. The point is: I sympathize with the people who just don’t want to be forced to read books they think are bad.
On the other hand, I know a lot of people, many of them teachers or professors, who are very invested in the idea of forcing other people to read this book or that book. And I understand that, too. They see it not just as beneficial to their students but as a duty that is required of them by their profession. Others may feel a more generalized sense of responsibility to the young people of the world: I remember being shocked when another (quite good) YA writer told me that she never wrote anything that didn’t have some didactic purpose. She saw it as her responsibility to educate and inform young people.
That’s not really how I feel at all. I don’t think the work I do as a writer or a thinker has any broader purpose other than to explore ideas and raise questions. And I’m lucky to be in a field and a life situation where, honestly, nobody cares what I’ve read, and I don’t need to make choices about what other people should read.
But I think that, because I participate in the life of the mind without feeling any concomitant responsibilities toward young people, I can perhaps better see that kicking books out of high school curricula isn’t entirely an abridgment of free speech. To argue that nobody should be allowed to read a book is censorship, and it would be stifling to one’s art. To simply not be taught a book isn’t quite the same thing. I think there is a certain confusion here between the freedom we as writers and thinkers need to feel in our reading — we cannot feel like there’s anything we’re simply not allowed to read — and the wholly separate topic of what books children should be compelled to read.
To my mind, the two are very separate things. A person’s art needs to be free and unrestrained, whereas the development of curricula is a civic problem — it’s a community issue that cannot be resolved without constraint, without loss, and without change.
Now, a person can definitely have opinions about curricula. But they need to accept that their opinions won’t necessarily be privileged. For instance, I often hear other writers, especially in my field, say they don’t have time for that old stuff, especially for books by old white men. Personally, I would never in my life advise a young writer to avoid older books. But it’s not up to me. Every person has to decide for themselves what to read. And, personally, I am very interested in the question of whether a writer who is relentlessly locked into contemporary mindsets can still write thoughtful and nuanced fiction. I doubt it, but they’re the person who will suffer, not me.
In fact, sometimes, the competitive part of me is a little gleeful that so many people ignore our literary history. I think, “Wow, given the amount of talent and brilliance in the world, it would be very difficult for me to produce anything worthwhile if it weren’t for the fact that so many writers are giving themselves a massive disadvantage before they’ve begun.”
Some people try to strike a middle ground here and say, “Well, you don’t have to read white people, but you really ought to read books from before the contemporary era.” Except who are we really talking about? What nonwhite writers specifically? The Indian and Chinese and Latin American writers from before 1900 are usually just as wrapped up in prejudice and exploitation as the white writers.
I think reading white people is important, too. I would be surprised if someone writing in English could write at their best without reading any white writers. Our language and its literary history are largely a product, until relatively late in the game, of white people. A great many of those white people had terrible and reprobate political views. I wish that wasn’t the case. I wish that there were Indian writers who were writing in English in the 19th century who could’ve played the role in the development of the English language that Dickens did, but there weren’t. Instead, we have Indian writers who came fresh to the language as a result of colonialism, and in order to fully possess and work with the language, they had to read writers like Dickens. That’s not true to the same extent today — you can write fairly well in English without reading white writers — but there are still vast parts of the English literary tradition that are inaccessible if you don’t read white writers.
Others, of course, see the situation quite differently. In their opinion, Dickens is poisoned by his faults (the horrendous antisemitism of Oliver Twist comes to mind), and they can’t bear to read him, much less make him a literary model. And that’s fine. They’ll be judged, as I am, not by their reading but by their work. And many of those people are much more critically and commercially successful than I am! So, I am sure they’re laughing at me right now.
In these times, it doesn’t really serve a writer or a thinker to become too possessive of their culture or their reading. We have to put our work first and engage in actions that support our work.
I’ve been reading a lot of Kant lately, and I found it amusing that in his essay “What Is Enlightenment?” he says a society can only achieve Enlightenment if it allows “freedom to make public use of one’s reason in all matters.” After saying this, however, he immediately backtracks, twisting himself in knots trying to explain that, by “public use,” he only means “that use which a man, as scholar, makes of it before the reading public.” He contrasts this with the private use of reason, which is the use “a man makes of his reason in a civic post that has been entrusted to him.” (Yes, I know, he’s using public and private in exactly the opposite way we would use them today.) Sometimes, he argues, the same job involves both the public and the private use of a person’s reason. The private use is constrained, while the public use must be free. An example is a minister who is bound to preach the doctrines of his church to his congregation even though, as a scholar, he openly disagrees with those same doctrines.
Kant took care to make this distinction because he lived in 18th-century Prussia — a militarized, autocratic society where people clearly were not free to do as they wished. The Prussian state is nobody’s idea of a society conducive to freedom. But it allowed Kant to think freely and to communicate with other thoughtful people.
I think, similarly, we are entering a time when many academics and teachers will have to confront the difference between their public and private characters. And, for a lot of people who are used to their narrative being the dominant one, this will be an unfamiliar experience. Unlike me, they work in fields that have given them status and prestige because of their reading and their expertise in what they regard as the Classics. And they’ve been free to impose their viewpoints on other people, particularly their students.
But now they will experience what, frankly, many marginalized people have always experienced: a sense of disjunction, a sense of working within an institution whose values are at odds with their own. And they will experience the need to subject their views to the marketplace of ideas and to risk being shouted down or vilified.
I am glad I am not in charge of creating a curriculum for young writers. I have loved many writers who wrote things that a modern young person would find intolerable. I’m thinking of the ableism of Stefan Zweig’s Beware of Pity (1939), for instance; the bizarre phobia about lesbians in Proust; or the participation of the ancient Greeks and Romans in a vicious slave economy. As a trans woman, I have many times encountered transphobic jokes and remarks in works I’ve read and enjoyed, including some from as recently as the last 15 years (off the top of my head, I can name episodes of Bob’s Burgers, How I Met Your Mother, and 30 Rock). If I only read writers who thought that trans people were full human beings worthy of respect, I would have a very limited set of texts to read.
Nonetheless, that set would still be larger than any human being could ever read in a lifetime. And if a writer wanted to limit themselves to that group, then I would understand the principle behind it. But if they asked me, in my professional opinion, whether that would be conducive to them writing beautiful and nuanced literature — the sort of thing that can stand with the best that’s ever been thought or written — I would have to say, “You’re really hindering yourself. And given the difficulty of your goal, you should be aiming to shed hindrances, not take them on.”
Luckily, nobody asks me that! I’m not a professor. I’m not a teacher. I don’t design curricula. But let’s say that I were, and let’s say my student responded, quite earnestly, by saying, “I’ve heard what you have to say, and I must report that these books are harmful to me, and I believe with the core of my being that I shouldn’t be asked to read them.”
Well … you can ignore one such student. Or two. Maybe even 10. But eventually the voice becomes too loud, and the only practical thing is to say, “I think you’re wrong, but have it your way. Let’s find some overlap between what I can teach and what you’re willing to learn.”
Naomi Kanakia is the author of three novels, out and forthcoming from Little, Brown and Harper, and of a guide to the publishing industry.
Naomi Kanakia
Naomi Kanakia is the author of three novels, out and forthcoming from Little, Brown and Harper, and of a guide to the publishing industry. Her stories, poems, and essays have appeared in Clarkesworld, Gulf Coast, F&SF, The Indiana Review, West Branch, Vallum, and others. She lives in San Francisco with her wife and daughter.
Explicit and Confounding Books: On Christopher Hilliard’s “A Matter of Obscenity”
A lucid and engaging cultural history of censorship debates in Britain from 1857 to 1979....
The Myth of the Classically Educated Elite
Despite the hype, neither American nor British elites have been particularly cultured....
What Is Literature For?: A Symposium on Angus Fletcher’s “Wonderworks”
Keith P. Mankin, Ed Simon, and Erik J. Larson each review Angus Fletcher’s “Wonderworks,” and Fletcher responds....
Cancellation of the Gods
It should be easy to ignore Wagner because of his antisemitic legacy. But it’s not that simple....
The Humanities in the Age of Loneliness
"Save the planet, read a book." Robert Newman on how to prevent the Eremocene.... | {"pred_label": "__label__cc", "pred_label_prob": 0.5090673565864563, "wiki_prob": 0.4909326434135437, "source": "cc/2023-06/en_head_0000.json.gz/line134273"} |
Home Entertainment The French publisher of Harry’s memoirs has printed 130,000 new copies; James Cameron Celebrated Hollywood Made Avatar Hits and More
The French publisher of Harry’s memoirs has printed 130,000 new copies; James Cameron Celebrated Hollywood Made Avatar Hits and More
Here is a summary of current entertainment news.
The French publisher of Harry’s memoirs has printed 130,000 new copies
Strong demand for the French edition of Prince Harry’s memoirs prompted Parisian publisher Viard to print an additional 130,000 copies, a company spokesman told Reuters on Thursday, just two days after the book went on sale. “This is in addition to the 210,000 copies originally printed,” the spokesperson said, adding that more could be printed based on orders.
James Cameron celebrated in Hollywood amid the success of Avatar
As Avatar: The Way of Water climbs the box office charts, director James Cameron is putting his hands and feet in cement outside the TCL Chinese Theater in Hollywood on Thursday to celebrate his contributions to the film industry. Longtime collaborator Sigourney Weaver tricked Cameron and producer Jon Landau into going barefoot to attend the ceremony. The winners usually keep their shoes.
Best Harry Styles and Weight League UK nominations
The nominations for this year’s BRIT Awards have been announced, with Harry Styles and Waite each taking the lead with four nods each.
Global pop star Styles and rock duo Wet Leg were announced via a live webcast Thursday, both competing for the prestigious Album of the Year award alongside rap artist Stormzy, producer Fred Once Again, and pop rock band The 1975.
Warner Bros Discovery has raised prices for HBO Max for the first time in the United States
Warner Bros. announced. Discovery Inc. is increasing ad-free HBO Max subscription fees in the US for the first time since the streaming service launched in 2020, the broadcaster announced Thursday, sending its shares down 3%. The price of the platform, which currently streams shows like “The White Lotus” and “House of the Dragon,” will increase by $1 to $15.99 plus tax per month for US subscribers.
HBO’s The Last of Us gives hope to the video game adaptation market
The 2013 video game “The Last of Us” was a hit among critics and gamers alike thanks to its strong narrative. Ten years later, this story is heading to TV on HBO in what the industry hopes will be a harbinger of great video game adaptations for TV and movies. Created by video game developer Naughty Dog and published by Sony Entertainment, The Last of Us follows tough survivor Joel and his young assistant Ellie as they navigate a post-pandemic world struggling with mutated people and creatures.
Rock guitarist Jeff Beck has died at the age of 78
Geoff Beck, the influential and immortal English guitarist who rose to fame with The Yardbirds before later embarking on a solo career, has died at the age of 78, his family announced on social media on Wednesday. The family said he died peacefully on Tuesday after suddenly contracting bacterial meningitis.
“Lord of the Dance” features Flatley’s treatment of an “aggressive” form of cancer
Irish-American dancer Michael Flatley has undergone surgery for an “aggressive” form of cancer and is under medical supervision, said a statement on the “Master of Dance” maker’s Instagram account. Flatley, 64, is best known as a key member of the band Riverdance, whose breakout performance at the 1994 Eurovision Song Contest catapulted Irish dance into the global spotlight. Later he opened his own show ‘Lord of the Dance’.
The comic follows Brittney Griner from college hoops to a Russian prison
From college hoops to a Russian jail cell, basketball star Brittney Grenier’s life is chronicled in a new comic book from TidalWave Comics. Griner is part of the publisher’s Female Force series that celebrates women with inspiring stories.
Disney prepares for battle in the boardroom
Activist investor Nelson Peltz made a bid Thursday for a seat on the board of The Walt Disney Company, sparking what appears to be a boardroom battle at the Magic Kingdom. It comes after company veteran Bob Iger returned to his role at parent company Marvel to help boost the profitability of its streaming business, Disney+.
Lisa Marie Presley, daughter of Elvis, has died at the age of 54
Singer Lisa Marie Presley, the only daughter of the “King of Rock and Roll” Elvis Presley, died Thursday at the age of 54, her mother said, after being transferred to a Los Angeles hospital. “It is with a heavy heart that I must share the devastating news that my beautiful daughter, Lisa Marie, has left us,” her mother, Priscilla Presley, said in a statement.
(With agency input).
the notes of Costa Ricans after the defeat against Grenoble (4-2)
Cunard Cruise Line Celebrates 100 Years Of Sailing Around The World With ‘Sea View’ Exhibition
Stray Kids confirmed Lollapalooza Paris headline alongside Kendrick...
Oversized animal art brought Chanel’s glamorous couture show...
French director Chloe Mazlou in the skies of...
Kylie Jenner wears a fake lion head at...
The Mumbai atelier is the secret workshop for...
The French paid homage to Boney Kapoor’s “Thunivu”...
Rossville baker, 10, stuns on ‘Good Morning America’...
Gamers Leak F-16 and AIM-120 missile details in...
Agassiz’s Cheat Vista concerts start on February 13th
Financial Results | Year All LVMH Records and Bernard Arnault | {"pred_label": "__label__wiki", "pred_label_prob": 0.9902637600898743, "wiki_prob": 0.9902637600898743, "source": "cc/2023-06/en_head_0000.json.gz/line344387"} |
Tuna Salad Theater
A few years ago the New York Times had a test you could take and the point was they'd be able to tell you within some impressively small mile-radius just where you were from. The battle lines were really drawn on words like water fountain, which some people ridiculously call bubblers, traffic circles known to some as roundabouts, which, if anyone has spent as much time as I have trying to navigate DC traffic circles, they'd know they couldn't possibly be called something as charming as "roundabout." Lollipops are apparently also called suckers by some strange geographic groups. And of course there's the great soda debate. When I arrived at college I had a midwestern roommate and a southern one, and it was then that I learned that the central Ohioan called all brands of bubbly beverages, sweetened or not, caffeinated or citrusy, "pop," which actually made a kind of sense to me even though it was wrong. But my North Carolinian roommate claimed it all as Coke. Even Pepsi is Coke! The expectation when ordering at a restaurant was to request a "Coke" and then be asked what kind--Sprite, diet, root beer, and so on.
Absolutely ridiculous.
And now, all these years later, I find myself baffled by a different kind of puzzle having to do with the word theater, which my husband inexplicably pronounces "THEE-der" and my son, doubly inexplicably, pronounces "the-AY-der." My husband was born in St. Louis and grew up in Providence and his parents pronounce the word theater as I do, which is to say, correctly. And my son was born in Brooklyn and is growing up in Washington DC. So you can see why it's all very confusing to me since he says basically every single other word as I do. This is not, as some mispronunciations are, an issue of a speech impediment or childlike pronunciation, with which I am familiar.
My seven-year-old does a wonderful thing with her R's. At first she couldn't say them at all really, and they came out as W's, which I know is common. Her R's then transitioned briefly to a kind of Hebrew "resh" sound, and now there's something else happening, a kind of folding in of the sound, which is the only way I can really put it, and I absolutely love it because it's like her own sound, her own language, which is not the same thing as an inexplicable mispronunciation. And I know that some day she will be taught to fix this, and that some parents might already have gotten it taken care of, but we haven't yet seen a need. It's not that we are encouraging childish mispronunciations--except when we are, as is the case in our home with blueberries (bupahdees) and cucumbers (cucaboos and cumayas, both), because there is something so utterly charming to parents about the ways in which our children hear words, bring them into their heads and then back out of their mouths with different sounds, and in this case I simply cannot let go of the two-year-old pronunciations. But we're also not telling our children they're wrong, even in the case of the mysterious theater, because, it seems to me, as a parent I spend so very much of my time correcting, either gently, or not-so-gently.
And maybe it would be nicer to think of all of this correcting as guiding. Is it not, after all, our job as parents to guide these little beings we created? To mold them in the image we believe is best, the one that will lead them to live lives of goodness and meaning and service, to help them to be good citizens, mensches in their communities, and maybe even to pronounce words correctly, or at least within the New York Times realm of their regional dialects?
This was easier when all we were trying to teach our children was to not eat bandaids found in the playground sandbox, or not to bite other kids when they're taking too long with the play-doh. But now that my children are older--old enough, even, to notice the very many ways and styles in which other families - other parents - are doing it, are raising their children, guiding them, correcting them--this has become infinitely harder because not only are we still eking out this path for them, sometimes (okay, most of the time) as we go along and as they age, we are now also eking it out while being asked WHY we are doing it the way we are, as opposed to, say, the ways other families are, and we are being asked this by our five-, seven-, and nine- year olds whose intellectual sophistication seems to fluctuate by the minute. So my husband and I are trying to teach our children that, for now, they have no choice but to do the things the way our family does them because we think our ways are best, while at the same time attempting diplomacy on the part of their friends' families' ways, which has led me to be the kind of desperately unlikable person who says things like "well, in our family we only have one dessert after lunch and that's just the way it is."
So yes, for those of us who aren't struggling to meet our childrens' most basic physical needs, who are downright lucky enough to be able to spend time thinking about all of this stuff, there are different ways to do it, to love children and give them the platform they need to become all the things we hope for them. Heck, there are different ways to do this within a family according to each child's needs and personality! And we're all just stumbling along, hoping what we want for them is right, praying that the path we're laying for them will guide them there and that they'll learn how to continue on it someday without us. There is no one right way.
Except, obviously, when it comes to pronouncing the word theater. All of which, of course, brings me to tuna salad.
There are many ways to make tuna salad. Many of them are passable, and some of them are even quite good, but there is actually only one fully right way to make it, which is the way my mother made it, and all of the other ways are just inferior. No judgment here, just truth.
To make the right kind of tuna salad first you have to buy cans of tuna in water. Bumblebee is best because that's what my mom always bought. You have to squeeze out the excess water before dumping the fish into a bowl. This step is kind of gross but absolutely can't be avoided. Next you have to chop celery into small pieces. Not too small, though. Half an arch should do, and if you don't know what I mean about that I'm sorry. The celery goes in the bowl with the tuna. Now add the juice of a lemon, or two, depending on the size and juiciness of the lemon, as well as so very much mayonnaise (Hellman's is best here) you have to close your eyes while you're spooning it or squeezing it in. Then comes salt and pepper--more grinds of pepper than you think you need. Mix it all really well and taste it and see if you need more mayo. You do.
Keep it in a sealed container in the fridge and use it for a tuna melt on a bagel. When it's Passover, eat it on matzah. When it's not Passover, eat it on everything else, like toast or pita chips or tortilla chips or crackers.
You'll probably make it again soon.
Sometimes it's okay for there to be just one right way to do things.
Sometimes it's easier that way. | {"pred_label": "__label__cc", "pred_label_prob": 0.6346349120140076, "wiki_prob": 0.36536508798599243, "source": "cc/2023-06/en_head_0000.json.gz/line700619"} |
Hans Prinzhorn: Artistry of the Mentally Ill 1922
Hans Prinzhorn was a psychiatrist and art historian who had worked with Emil Kraepelin at the University of Heidleberg on a collection of art by mentally disturbed patients. By 1921, when Prinzhorn left Heidleberg, this collection had grown to include over 5000 works by about 350 patients. Prinzhorn’s 1922 book Artistry of the Mentally Ill (profusely illustrated with images from the Heidelberg collection), was the first attempt to analyse this type of art, that subsequently became known as ‘Outsider Art’. Prinzhorn was interested in the borderline between psychiatry and art, mental illness and self-expression, and his work became very influential among artists, especially the Expressionists and Surrealists, with their interest in self expression and in visualising the working of the unconscious mind.
As most serious artists and designers are interested in the act of perception and cognition – the way we transmute the visual and other sensual input from the outside world into mental images – and how we then illustrate these images and evoke them with works of art, Prinzhorn’s book stands out as the first major study to analyse these issues. Of course we know much more now of the workings of the brain, and have begun to develop coherent theories of the Mind (see for example Marvin Minsky’s Society of Mind, and Daniel Dennet’s Consciousness Explained), but the issues addressed by Prinzhorn are still central to these developments. ‘Outsider Art’ is the label now used to describe the art of the mentally ill, the ‘naive’ work of untrained ‘folk artists’, the work of so-called primitive tribes and other similar artefacts, and remains a source of inspiration for artists, nor merely in the radically unconventional images that are produced by ‘outsiders’ but as evidence of these process of perception, cognition and expression that are central to all our experiences of art and design.
Other good books on this subject: Steven Rose: From Brains to Consciousness, Igor Aleksander: How to Build a Mind, and Margaret Boden: The Creative Mind.
Posted on June 2, 2014 June 2, 2014 Author bobcottonFormat ImageTags 1922, Art, book, Hans Prinzhorn, Mentally Ill 1 Comment | {"pred_label": "__label__cc", "pred_label_prob": 0.6842706203460693, "wiki_prob": 0.31572937965393066, "source": "cc/2023-06/en_head_0000.json.gz/line1344195"} |
SEC Ordered to Turn Over Documents in Ripple Litigation
Pavan A Follow
United States District Court Judge Analisa Torres denied the SEC's second request for withholding documents about former Division Director William Hinman's speech.
In its legal battle with the SEC, the order marks a significant win for Ripple, since the story behind the speech may be able to undermine the SEC's core arguments. Hinman's speech at Yahoo Finance All Markets Summit in June 2018 is mainly reflected in the documents.
A court decision overturned the plaintiff's claim of attorney-client privilege by finding that the internal speech documents contain communications that primarily involve interpreting and applying legal principles.
According to the SEC, Ripple Labs' cryptocurrency, XRP, is secure because, in 2013, the company used it to raise funds. The SEC filed a lawsuit against the company and its current CEO, Brad Garlinghouse, and its previous CEO, Chris Larsen in December 2020.
According to Hinman, Ether, along with Bitcoin, is not a security, as he stated in his speech. Ripple is also facing a lawsuit by the SEC over whether the company sold XRP illegally years ago.?
Initially, it looked like Ripple was going downhill, and the company has engaged in a variety of defensive strategies to combat the charges. Ripple Labs and the Securities and Exchange Commission filed motions both on Sept. 17 in the U.S. District Court for the Southern District of New York for summary judgment.??
#SEC #Ripple #XRP
Pavan A | {"pred_label": "__label__wiki", "pred_label_prob": 0.6657766699790955, "wiki_prob": 0.6657766699790955, "source": "cc/2023-06/en_head_0000.json.gz/line126351"} |
Articles / Iconography
Dr. Constantine Cavarnos
Photios Kontoglou: The Greatest Icon Painter of 20th Century Greece
Photios Kontoglou, the greatest icon painter of modern Greece and one of her most important theologians and literary writers, died in Athens on July 13, 1965. His death, during surgury, passed almost entirely unnoticed in America, even among Greek-Americans, but he was deeply mourned throughout Greece.
I was in Greece when he died and had the good fortune of seeing and talking with this great and holy man just five days before his “falling asleep.” The editor of an Athenian religious monthly asked me to write an obituary . . . I have undertaken to write this brief biography.
Photios Kontoglou was born on November 8, 1895, at Kydoniai (Aivali), on the west coast of Asia Minor, across from Mytilene. Kydoniai was a city consisting of about 30,000 Greeks and three persons—the district governor, the judge, and the tax collector—who were Turks.
Kontoglou came from a devout family, which had its own chapel containing precious articles including a carved ancient crucifix and a large panel icon depicting Saint Paraskevi. Many of his ancestors were monks, and an uncle, Stephanos Kontoglou, was abbot of the Monastery of Saint Paraskevi near Kydoniai. Stephanos was an important influence in Photios’s life. In his book Vasanta (1923), Kontoglou dedicates the chapter of translations from the Psalms of David “to the austere soul of the Hieromonk Stephanos Kontoglou, my uncle, whose virtue I perpetually have before me as a model and rule.”
The young Kontoglou was extremely fond of the sea, sailing, and the solitude of the deserted neighboring islets. He liked to live alone, like Robinson Crusoe. Daniel Defoe’s hero fascinated Kontoglou; he mentions him in many of his writings.
After graduating from the famous Academy of Gymnasium of Kydoniai, Kontoglou spent several years in Europe, especially in France, studying art and acquiring painting techniques. He lived in Paris during the First World War, where he first gained attention, winning prizes for his paintings and his writings. His first book, a novel entitled Pedro Cazas, was written and published there in 1919.
After the armistice, Kontoglou returned to Kydoniai. In 1920 he wrote a remarkable prologue for the second edition of Pedro Cazas which was published in Athens in 1922. In this prologue he set forth some of the basic ideas by which he abided ever after.
Persecuted by the Turks, he and his family went to Thermi, Mytilene, in 1922. Later he resided in Athens, but always lived on the outskirts, as he disliked the distractions of cities. When the Kontoglou family left Kydoniai, they took only the sacred articles mentioned above and a few Church books. These were his most cherished possessions. After his death his wife, Maria, fulfilling his wish, gave them to the Monastery of Saint Paraskevi at Nea Makri in Attica.
In Athens Kontoglou soon became well-known in literary circles as a result of his highly-praised book, Pedro Cazas. His reputation as a writer grew with the appearance of two additional books: Vasanta (a Sanskrit word meaning “springtime”) in 1923, and Taxidia (“Travels”) in 1928, and the literary and art periodical Filikh Etairia (“Friendly Society”) which he founded in 1925. Within a few years, Kontoglou had won an enviable place in the Greek world of letters, admired for his style—which is characterized by clarity, simplicity, vigor and warmth—as well as his remarkable observations and profound thoughts.
As a painter, Kontoglou was slow in winning recognition. He had to overcome difficult obstacles. After leaving Europe, he became increasingly impressed by the Byzantine traditions of painting and decided to master this style of painting. But he had to become his own teacher and learn the secrets of Byzantine art. He did this by reading old manuscripts and visiting Byzantine monuments, patiently studying the works of the old masters.
Further, Kontoglou had to overcome strong prejudice on the part of the public against Byzantine art. Having won their liberation from the Turks, the Greeks began to turn the West for prototypes in art, especially the adoption of European (particularly Italian Renaissance) models and techniques. According to the European view at that time, Byzantine civilization was a lower civilization, not worthy of serious study, and Byzantine art especially was lower, almost barbaric art. Kontoglou succeeded magnificently in overcoming both obstacles, but it took time.
The first obstacle was by far easier to overcome. He learned his most important lessons about Byzantine art at the Holy Mountain of Athos and at Mystra. It is significant that while at Athos, he wrote several chapters, the preface and profound concluding chapter on the fine arts of his second book, Vasanta. It was also at Athos that one of his three poems in this book was inspired by a Byzantine painting in a very old chapel there. His debt to Athos in his development as an iconographer is evinced by a volume published in 1925 containing photographs of copies, executed by him, of Byzantine frescoes at Athos; and also by the illustrations in two issues of Filikh Etairia that year showing panel icons of the Monastery of Iviron rendered by him.
Kontoglou visited Mystra not long after. He made copies of some of the wall paintings in the Byzantine churches at Mystra. He later worked there for a long time cleaning wall paintings in the Church of Peribleptos.
Comparing Byzantine and European religious art, Kontoglou says in his book Taxidia, “In the countries of Europe there are churches with paintings that are famous for their artistic merit; yet they do not have the mystery and the power of evoking contrition (katanyxis) possessed by the icons that were done by some unlettered and simple Byzantine painters.”
Around 1930, Kontoglou was appointed technical supervisor at the Byzantine Museum in Athens. He possessed both great love for the works in the museum, and technical knowledge for cleaning and preserving them.
In 1932, Kontoglou published a slender volume entitled Icones et Fresques d’Art Byzantine, with twenty plates of Byzantine panel icons and frescoes he copied. He continued to paint panel icons during this period.
During the later thirties, Kontoglou decorated three large rooms of the City Hall of Athens with historical frescoes. This was his first large scale work as a fresco painter, and his only extensive secular one. His next major achievement as a fresco painter was the iconographic decoration of the large Church Zoodochos Peghi at Liopesi (Paiania), a town near Athens. He began the work in 1939, but could not resume it until after the Second World War. When I met Kontoglou in 1952, he showed me the beautiful Byzantine murals he had painted at Liopesi.
Kontoglou wrote at least eight books between 1942 and 1945, during the war. Most are rather short. The longest and important is Mystikos Kepos (“Mystical Garden”) in 1944. His chapters on Piety (Theosveia) and Saint Isaac the Syrian are masterpieces, full of deep religious feeling. He speaks of other remarkable ascetics of Syria and Mesopotamia, and stresses the virtues of faith, humility and purity.
The most fruitful period for Kontoglou, as both painter and writer, was the last twenty years of his life. Assisted by several of his talented pupils, he painted numerous panel icons in churches in many parts of Greece, as well as in the United States and other countries, and many thousands of square yards of wall paintings. After the church at Liopesi, mentioned above, Kontoglou frescoed the entire interior of the Church of Saint Andrew off Patission Street at Athens. He did wall paintings for the new Metropolitan Church of Evangelismos in Rhodes and the Church of Saint George at Stemnitsa, Arcadia. Finally, he decorated with fresco icons the eastern apse, central dome, pendentives and barrel vaults below the dome, and other surfaces of the following Athenian churches: Kapnikarea, Saint George at Kypseli, Saint Haralambos in the park Pedion tou Areos, Saint Nicholas at Kato Patissia, and others.
Through these works, through the training of many gifted young artists in the techniques of Byzantine iconography, and through his long, luminous and spirited defense of Byzantine art which culminated in 1961 in the monumental two-volume work entitled Ekphrasis (“Expression”) in which he teaches the theory and practice of Byzantine iconography, Kontoglou succeeded in making this art prevail in Greece. His influence spread to America, where many churches have been decorated with panel icons, frescoes and mosaics by his pupils.
During the same period, he wrote such edifying books as A Great Sign (1945), with accounts of many extraordinary recent miracles at Thermi, Mytilene; The Life and Conduct of Blaise Pascal (1947); The Life and Ascesis of Our Holy Father Saint Mark the Anchorite (1947, translated in The Orthodox Word, no. 1, Sept.-Oct., 1966, with illustrations by Kontoglou); Fount of Life (1951), presenting brief descriptions of the lives and selections from the teachings of some of the great Saints of the Orthodox Church; The Holy Gospel According to Matthew, Interpreted (1952); Expression (1961); and What Orthodoxy Is and What Papism Is (1964). Kontoglou also translated into Greek Leonid Ouspensky’s L’Icone: Quelques Mots sur son Sens Dogmatique, and published it with a preface and notes of his own. Together with the young theologian Basil Moustakis, Kontoglou founded and edited Kivotos (1952–1955), a religious periodical concerned especially with Orthodox spirituality.
Kontoglou contributed many articles to various other periodicals and encyclopedias. His articles in the Athenian daily Elephtheria are so numerous that they would fill several volumes. Many of them are among the most profound written by a Greek. Most are concerned with religious themes, such as faith and reason, religion and philosophy, religious versus secular art, Byzantine iconography and music, the lives of Martyrs and other Saints, and so on.
Kontoglou won the Academy of Athens Prize for his book Ekphrasis, in 1961, and the Purfina Prize for his book Aivali; My Native Place, in 1963. The latter is the first volume of his Erga (“Works”) which began to be published by Astir Publishing Company at Athens in 1962.
In recognition of his great achievements as an author, the Academy of Athens, the highest cultural institution in Greece, awarded him on March 24, 1965, its Aristeion Grammaton, its highest prize in letters.
Kontoglou also carried on an enormous correspondence. He once told me that he wrote about fifty letters a month, corresponding not only with Greeks, but also Americans, Finns, Frenchmen, Germans, Russians, Ugandans and others. He had countless friends and admirers throughout the world who sought his guidance on iconography, and on Orthodox doctrine and living.
In Kontoglou’s writings, we encounter a man who has unshakable religious faith, free from all skepticism and metaphysical anguish. We encounter a man who is steeped in the Holy Scriptures and writings of the Eastern Church Fathers, particularly the great mystics such as Saint Macarios the Egyptian, Saint John Climacos, Saint Isaac the Syrian, Saint Symeon the New Theologian, and Saint Gregory the Sinaite. We find a man who has the profoundest respect for the Sacred Tradition of Eastern Orthodoxy, including all its dogmas, canons and sacred arts (architecture, iconography, music), tolerating no deviations. Orthodoxy was for him the sacred Kivotos, the sacred Ark, and these its precious contents, which must be carefully guarded and not cast away, or exchanged for counterfeits.
Kontoglou was strongly opposed to the participation of Orthodoxy in “ecumenism,” seeing in such participation the dangers of compromise on matters which admit of no compromise. He was especially critical of the maneuvers of Patriarch Athenagoras, in whom he saw an apostate . . . a betrayer of Greece and Orthodoxy. In his last book, entitled Ti Einai he Orthodoxia kai ti Einai ho Papismos (“What Orthodoxy Is and What Papsim Is”) Kontoglou stressed the abyss that separates Orthodoxy from Roman Catholicism, which renders utterly absurd Athenagoras’s assertions that there are no real differences between the two.
Kontoglou was a man of adamantine Orthodox faith and impeccable character, adorned with the virtues of great humility, long-suffering, courage, wisdom, purity, hope and love. He was a devout man, a holy man, a man of God. All that he did bears the impress of these qualities.
As during his life, so at his death, it was evident that Kontoglou was free from worldly attachments, a citizen of the City of God, not of the earthly city, whose glory is temporary and whose power is doomed to pass away. He died poor, ignored by the State. His body was not accompanied to the grave by any State dignitaries, but only by friends and admirers, who loved him deeply.
This article was originally published by the Monastery of St. John, www.monasteryofstjohn.org, in The Divine Ascent Vol. 3/4. This and other publications can be found on their bookstore website, www.stjohnsbookstore.com. This article was posted here with permission. | {"pred_label": "__label__wiki", "pred_label_prob": 0.7979874014854431, "wiki_prob": 0.7979874014854431, "source": "cc/2023-06/en_head_0000.json.gz/line379929"} |
Secure 2.0 Act - Major Changes to Retirement Planning & RMDs
Season #2 January 18, 2023
In today's episode, we dive into the newly passed Secure 2.0 Act and its impact on retirement calculations, from changes to contribution limits, RMDs, and new rules for 401k. This legislation has the potential to shake up the way we plan for retirement. So join us as we break down the details and help you understand how the Secure 2.0 ACT might affect your retirement.
Secure Act 2.0 Increases RMD Age Requirement to 73 and 75 in 2023 and 2033
The Secure Act 2.0, which was recently passed, includes changes to the age at which individuals are required to take distributions from their retirement accounts, also known as Required Minimum Distributions (RMDs). Historically, the age at which RMDs were required was 70 and a half, but the original Secure Act raised that age to 72.
The latest version of the Secure Act, however, has made another change to the RMD age requirement. Starting in 2023, individuals will not be required to take RMDs until age 73. In 2033, the age requirement will increase further to 75.
Many financial experts have been discussing the possibility of this change for some time, and it is seen as a positive development for investors. This change allows for individuals to keep their retirement savings invested for longer and potentially grow their nest egg.
However, it is important to note that the 2033 implementation date for the age 75 RMD requirement means that some retirees will miss out on this change and may be required to take early RMDs. Despite this, the change to the RMD age requirement is still seen as a win for investors as it changes the considerations and planning for retirement. Additionally, the Secure Act includes other changes that will impact retirement planning.
What is a Required Minimum Distribution or RMD?
For those who may not be familiar with the term, a Required Minimum Distribution (RMD) is a requirement set by Congress for individuals to withdraw a certain amount of money from their retirement accounts. The purpose of this requirement is to prevent individuals from using their retirement accounts as a personal piggy bank and to ensure that taxes are paid on the money in these accounts.
RMDs are required for a variety of retirement accounts, including 401ks, traditional IRAs, and even some annuities. The amount that must be withdrawn is determined by the IRS and increases over time. The purpose of RMDs is to make sure that the money in these accounts is eventually depleted, and taxes are paid on the withdrawals.
However, this requirement can be a burden on retirees. For example, if an individual only needs to withdraw $20,000 or $30,000 a year to supplement their income, but the IRS requires them to withdraw a much larger amount, it can bump them up into a higher tax bracket and affect their other sources of income such as social security.
The Secure Act 2.0 has made changes to the RMD age requirement, allowing individuals to delay taking RMDs until age 73 in 2023 and age 75 in 2033. This change is seen as a positive development for investors as it allows them to keep their retirement savings invested for longer. However, some financial experts advocate for abolishing RMDs entirely as they can deplete retirement savings and bump retirees into higher tax brackets. As financial planners, retirees, and investors, it is important to be aware of these requirements and take steps to protect our retirement savings from unnecessary depletion.
Ways to Mitigate The Tax Burden of RMDs
While the changes to RMDs in the Secure Act 2.0 are positive for retirees, the question of whether or not the genie can be put back in the bottle remains. However, there are strategies that can be employed to help mitigate the tax burden in retirement and control the income that is received during retirement.
One key strategy is to be strategic about where income is received from in retirement. This may mean deferring social security benefits or taking them earlier and using retirement accounts to supplement that income. By controlling the income that is received during the years leading up to RMDs, individuals can offset it with credits, deductions, or exclusions on their tax return.
Another important change in the Secure Act 2.0 is the decrease in the penalty for not taking RMDs. The penalty has been reduced from 50% to 25%, which changes the calculus for retirees. It may now make more sense for some individuals to not take an RMD in a given year if it results in a lower tax bill. Additionally, the penalty for correcting a missed RMD has been reduced to 10%, making it easier for individuals to fix any mistakes they may have made.
It is important to note that the IRS has yet to release the rules for these changes, so it is crucial for individuals to stay informed and consult with a financial advisor to determine the best course of action for their retirement planning. It is also worth noting that a lot of the software and online tools available for retirement planning are not yet updated to reflect these new rules and regulations, which may significantly change the assumptions and plans these tools provide.
Contribution Limits Get a Boost
The Secure Act 2.0 also includes an increase in catch-up contributions for certain types of retirement accounts in 2025. This change is in line with recent updates to the tax code, which have been inflation-adjusted to better reflect the needs of individuals and to keep pace with the cost of living.
Historically, tax brackets and contribution limits were fixed dollar amounts and were not updated frequently enough to keep pace with inflation. This made it difficult for individuals to save enough for retirement and for catch-up contributions to be meaningful.
The Secure Act 2.0 addresses this issue by updating the contribution numbers and making them inflation-adjusted. This means that Congress will not need to pass a law every year or every time to update these numbers, and they will automatically reflect reality and people's needs. Additionally, this change transfers control of these updates to the IRS, which is generally more favorable to individuals saving for retirement.
Overall, the Secure Act 2.0's increase in catch-up contributions, along with the other changes it made, is a positive development for individuals saving for retirement and it shows a shift towards retirement planning and tax code that is more beneficial for individuals and less controlled by Congress.
For those looking for more information on the Secure Act 2.0 and its impact on retirement planning, there are several resources available.
One resource is this article that I have written on the Secure Act 2.0, which provides more detail on the changes and their impact on retirement planning. Additionally, I will be offering webinars and more articles in the coming weeks that delve deeper into the different areas of the Secure Act 2.0 and how they impact retirement planning.
I am also working on a tool to help individuals with social security and retirement planning in the context of the Secure Act 2.0. This tool will help individuals stress test their retirement plans and make informed decisions in light of the changes.
Fidelity also has a really great article that you can check out here: https://www.fidelity.com/learning-center/personal-finance/secure-act-2
Signup For The Course
Don't let taxes take a big chunk out of your retirement savings. Learn the 3 key strategies for reducing your taxes in retirement with our mini-course, "How to Pay Zero Taxes in Retirement." Taught by Leibel Sternbach, a retirement specialist and Enrolled Agent with the IRS, this in-depth class will teach you how to keep more of what you earn and leverage the tax code to your advantage.
Sign up now to start saving on taxes and maximizing your retirement income. Use the link below to get started.
>> Signup For The "How to Pay Zero In Taxes in Retirement" Course | {"pred_label": "__label__cc", "pred_label_prob": 0.5187813639640808, "wiki_prob": 0.4812186360359192, "source": "cc/2023-06/en_head_0000.json.gz/line1317713"} |
Researchers collaborate to improve urban infrastructure resilience
by utsaengineer / Thursday, 23 January 2020 / Published in Civil and Environmental Engineering, COE Announcements, Electrical & Computer Announcements, Electrical and Computer Engineering, General, News, UTSA COE
JANUARY 23, 2020 — Data shows that 82% of the U.S. population lives in urban areas, and it is projected that the percentage will increase to 90% by 2050. The size of the populations in urban centers is creating demands that overwhelm the capacity of infrastructures, particularly in times of distress.
Researchers at UTSA are working to remedy this problem. Through a $100,000 planning grant from the National Science Foundation, a team of researchers with expertise in engineering, computing, infrastructures, cyber-physical systems, political science, public policy and STEM education is leading the creation of the Engineering Research Center for Sustainable Urban Communities.
The Engineering Research Center for Sustainable Urban Communities will develop transforming technologies for one of the most important societal problems we currently face: engineering critical infrastructures of large population centers to achieve sustainable growth while improving equity and well-being of residents.
To achieve this mission, the center will develop the underlying science for a distributed sensor and data science framework to assist authorities and the private sector as they make decisions that yield the most benefit to urban residents.
The center will enable research and technology to improve urban infrastructure resilience. The proposed research will support superior real-time data processing, storage and dissemination to accelerate processing of large data sets in digital communities. Data analytics, machine learning and artificial intelligence experts will advance fundamental knowledge in their collective domains. Computing researchers will have access to the complete data flow chain and be able to study networking weaknesses against cyberattacks.
The networking will include narrowband and broadband wireless and wired data communication, networking with traditional and emerging sensor cloud environments, and various interfaces.
Researchers will develop critical infrastructure management and health informatics applications capable of exploring interdependences between these domains. Infrastructure researchers will leverage these advances to study efficiency and resilience of urban infrastructures during normal operating conditions and during different types of disruptions, such as hurricanes, floods and chemical spills using real-time data.
“UTSA is uniquely positioned to lead research advances in this area through an existing foundation of strategic initiatives and research centers on sustainability, climate science, water resources, data science, cybersecurity, artificial intelligence and energy,” said Adolfo Matamoros, a Peter T. Flawn Distinguished Professor in the Department of Civil Engineering at UTSA. “These strategic initiatives have been developed in close collaboration with partners from industry, the City of San Antonio, federal agencies, research institutes and the U.S. military. The Engineering Research Center for Sustainable Urban Communities will build on this foundation to advance smart city science and technology development and expand to include workforce development.”
Through this planning grant, a diverse group of stakeholders will join forces to develop consensus on advances in science and engineering needed to achieve sustainable growth of urban ecosystems through convergent research. The outcomes of the planning will provide a roadmap to guide future research efforts and foster new collaboration not previously considered.
Two stakeholder workshops will be held to develop a vision, goals and research plan that reflect the concerns and priorities of the San Antonio community. The first will be held on Friday, Jan. 24 from 7:30 a.m. to 5 p.m. in the John Peace Library, Faculty Center (JPL 4.04.16) on the Main Campus. A second stakeholder workshop will be held in April.
— Julie Paulson | {"pred_label": "__label__cc", "pred_label_prob": 0.7155593633651733, "wiki_prob": 0.28444063663482666, "source": "cc/2023-06/en_head_0000.json.gz/line223057"} |
Tag Archives: Gradus
Neal Kosaly-Meyer: Playing the Piano One Note at a Time
Posted on July 12, 2018 by maestrobeats
by Gabriela Tedeschi
Neal Kosaly-Meyer performing Gradus at NUMUS Northwest. Photo by James Holt.
Neal Kosaly-Meyer plays the piano one note at a time. Or at least, that’s the idea behind his ongoing performance series Gradus: For Fux, Tesla and Milo the Wrestler. He devotes an extended improvisation (20 minutes or longer) to each individual note on the piano, and to as many combinations of notes as possible.
This Saturday at the Chapel Performance Space he will perform one installment of the series: 40 minutes on one note (C sharp to be specific), 20 minutes on five notes in multiple octaves, and 60 minutes on two notes. Extended periods of silence are incorporated into all three sections. Kosaly-Meyer flips a coin to determine the number of notes per movement, how long the movements will be, and how much silence will be interspersed in each movement.
The idea for Gradus presented itself to Kosaly-Meyer over 30 years ago while he was a graduate student in the School of Music at the University of Washington. He had been thinking a lot about John Cage and how composers could follow in his footsteps by challenging preconceived notions of what music could be.
“It’s hard to find the frontier after a composer like Cage, who went right out to the edge of so many frontiers,” Kosaly-Meyer said. “This thought, learn to play the piano one note at a time, was kind of a thread to be able to push to do music that felt like it was on an edge, that felt like there was a risk being taken.”
Still, it wasn’t until he moved to San Diego with his wife and was able to play on a grand piano at a church he attended that he began to really explore the idea. Kosaly-Meyer believes performing on a grand piano is pivotal to Gradus.
“It’s not something you could do on an electronic keyboard or even an upright piano,” Kosaly-Meyer said. “I think to do something where you actually have enough sound, enough reverberation for a project like this to be interesting requires a grand piano.”
He began with 40 minutes improvising on the lowest A on the piano, and then began using combinations of As. Implicit in the idea of learning to play the piano one note at a time was the idea of learning to play differently by finding artistry in each sound. With attack, duration, dynamics, and intricate pedaling techniques, Kosaly-Meyer developed the ability to make a wide assortment of sounds using just one A.
His work temporarily came to a halt when he moved again and no longer had access to a grand piano. But years later, in 2001, his friend Keith Eisenbrey helped solve that problem.
Kosaly-Meyer met Eisenbrey while taking composition courses at the UW. They had done a lot of improvisation work together, and Kosaly-Meyer was able to develop the Gradus project and other works by bouncing ideas off of Eisenbrey. They became family when Eisenbrey married Kosaly-Meyer’s sister Karen, and in 2001 Kosaly-Meyer was able to continue with Gradus by rehearsing on Eisenbrey’s grand piano.
When he began sharing Gradus, it was positive feedback from Eisenbrey and other composers that emboldened Kosaly-Meyer to move forward with this musical venture. He began his annual performance series in 2002 in Seattle.
Kosaly-Meyer determined that Gradus works best with a two-hour, three-part structure that allows him to separate what he sees as three distinct ways of making music.
“I had come to a conclusion after working on this a little bit that playing with one note is a particular kind of making music, playing with two notes is another kind of making music that’s very different than just playing with one, and that playing with 3 or more notes is very different than playing with two,” he said.
Drawing inspiration from Cage, Kosaly-Meyer chose to incorporate silence—which really means all unintended ambient sounds—as an equal partner in the performance. If weather permits, Kosaly-Meyer leaves the windows open at the Chapel, allowing highway noise, barking dogs, and audiences’ creaking benches and coughs to form a chorus that supports his playing.
“I always found in improvising that music happened much more organically with an ensemble. Even if it was just an ensemble of two, it was so much easier for something musical to happen,” Kosaly-Meyer said. “Gradus is really the first kind of solo improvisation project I find that can stay musical and I think the trick is that it’s not really a solo project.”
This particular performance is dedicated to the late jazz pianist Cecil Taylor, who displayed incredible control over each and every note he played, no matter how intricate the performance. Kosaly-Meyer was also interested in exploring the interplay between the ideas of Taylor and Cage, who were at odds during their lifetimes because of Cage’s aversion to jazz and improvisation. Gradus combines Taylor’s spontaneity with Cage’s interest in silence as an equal partner.
“One thing that’s going on in Gradus is an attempt to harmonize a Cage way of thinking with a Cecil Taylor way of thinking,” Kosaly-Meyer said.
Neal Kosaly-Meyer presents Gradus: For Fux, Tesla and Milo the Wrestler this Saturday, July 14 at 8pm at the Chapel Performance Space at the Good Shepherd Center. For more information, click here.
Posted in Concerts, Events, Q & A, West Coast | Tagged and Milo the Wrestler, avant-garde, Cecil Taylor, chapel performance space, contemporary classical, Gradus, Gradus: For Fux, john cage, Neal Kosaly-Meyer, new music, piano, Tesla, wayward music series | Leave a reply | {"pred_label": "__label__wiki", "pred_label_prob": 0.8109353184700012, "wiki_prob": 0.8109353184700012, "source": "cc/2023-06/en_head_0000.json.gz/line1904056"} |
Gallery Openings and Events
Pyramid Atlantic Art Center Presents Imar Hutchins INHERITANCE
By Editorial Team on September 4, 2019
Fri, 06 September 2019 - Sun, 06 October 2019
Imar Hutchins, Banna-Ka [Benjamin Banneker], Acrylic and Collage on Canvas 2019. Courtesy of Pyramid Atlantic Art Center.
Opening Reception: Friday, September 6 from 6:30pm to 9pm
Artist Talk: Friday, September 13 from 7pm to 8:30pm
Artist Imar Hutchins exhibits six of his larger-than-life portrait collages in INHERITANCE. Each work measures 6 feet tall and 4.5 feet wide with subjects ranging from the artist’s mother to the late musician, Prince. The works combine screenprinting, collage, and painting, resulting in intensely detailed and colorful depictions of these figures: some iconic in pop culture and some iconic to the artist himself.
INHERITANCE is curated by Zoma Wallace and runs September 6 through October 6, 2019. An artist talk will take place on Friday, September 13 from 7 – 8:30 pm.
“All inheritance is not financial. All inheritance is not physical. And we can inherit from people who are not our direct ancestors. I would challenge people to think more broadly about inheritance. People, like the ones I depict, all have things to give us if we can receive them. They have lessons to teach us, but we need to be open to receiving that inheritance,” remarks Hutchins.
Much of Hutchins’ work is commission-based with a specified subject. However, Hutchins is selective about who he tackles. “I won’t do anyone’s portrait unless they are intergalactic…vibrating on a high frequency with something to share with us, with the world.” Once the figure is chosen, Hutchins begins researching his subject, which can take up to a year. “I need to be able to add something to the conversation, especially for someone who has been depicted a lot. What is it that people are missing about this person?”
Hutchins does everything himself when making a work, including milling the wood for his frames. The entire piece is imbued with intentionality from the beginning. “I want to be responsible for the whole thing. People feel it, whether it’s conscious or subconscious. You can tell when someone has put a lot of love in something.”
INHERITANCE is a rare opportunity to see multiple pieces by Hutchins in a single space. The exhibition will travel to the Muhammad Ali Center in Louisville, Kentucky before all the works move on to their patrons, including private collectors and public institutions—such as the University of Kentucky, which commissioned a portrait of Hutchins’ grandfather who brought about the University’s integration 70years ago. Upon close inspection, viewers see that Hutchins has reproduced and collaged the hate mail sent to his grandfather in this piece, turning many small works of hate into one large work of love.
In addition to the large-scale canvases, Hutchins has created a limited edition screenprint based on his James Baldwin collage that will also be on view and available for sale at Pyramid. The Baldwin print is in honor of what would have been Baldwin’s 95th birthday this month. Hutchins selects only 1 or 2 of his collages a year to re-work into a print. “I love that kind of iconic poster art look, and each of my prints is really its own work, inspired by, but separate from, the collage. The basic shape will be the same, but the print design consists solely of areas of color. In some ways the prints are simplified versions of the larger pieces…all my work is …all my work is trying to be simple and at the same time evocative.”
Hutchins is a self-taught artist based in Washington, D.C. He is owner of DC’s iconic Florida Avenue Grill and was lawyer until about 5 years ago when he grew his artistic practice to a full time commitment. Hutchins works primarily in collage, mixed media and printmaking. His portraits combine vintage Black magazines, hate mail and other historical documents as well as found objects, tissue paper and new materials. He imagines that people themselves are collages.
This exhibition is made possible in part through funding from the Maryland-National Capital Park and Planning Commission, Department of Parks and Recreation, Prince George’s County.
Tuesday through Saturday: 10 am–6 pm
Sunday: 12–5 pm
The exhibition, reception, and artist talk are FREE and open to the public.
Pyramid Atlantic is located at 4318 Gallatin Street, Hyattsville Maryland 20781. More information can be found at pyramidatlanticartcenter.org or by calling 301-608-9101.
By Editorial Team on January 23, 2023
Adah Rose Gallery Presents Jacqui Crocetta & Kyujin Lee Looking In Looking Out
Fri, 27 January 2023 - Tue, 28 February 2023
An opening is scheduled for Saturday, January 28 from 5pm to 7pm.
David C. Driskell Center Presents Faith Ringgold and Betye Saar RINGGOLD | SAAR: Meeting on the Matrix
Thu, 26 January 2023 - Mon, 22 May 2023
View the exhibitions through May 2023.
Addison/Ripley Fine Art Presents HOLY INVENTIONS Group Exhibition
Sat, 28 January 2023 - Sat, 04 March 2023
An opening reception is scheduled for Saturday, January 28 from 5pm to 7pm.
VisArts Presents Alison Kysia Art, Islam, and Activism: Works in Progress; Cecilia Kim Private Varnish; and Sound of Fire Group Exhibition
Wed, 25 January 2023 - Sun, 12 March 2023
An opening reception is scheduled for Friday, January 27 from 7pm to 9pm.
Dale McGrath The Garden Year at Green Spring Gardens
Wed, 14 December 2022 - Sun, 05 February 2023
The exhibition is currently on view.
HEMPHILL Hosts Book Signing & Print Viewing: PHOTOSCAPES AND THE EGG by Patricia Z. Smith
The book signing is scheduled for Saturday, January 28 at 3pm. | {"pred_label": "__label__wiki", "pred_label_prob": 0.959930419921875, "wiki_prob": 0.959930419921875, "source": "cc/2023-06/en_head_0000.json.gz/line1395683"} |
Searcy Public Library Board Announces $2 Million Donation for Renovation Project
By Sophie Rossitto|2022-02-11T16:36:33-06:00February 11th, 2022|News|
Searcy Public Library officials announced Tuesday, Feb. 8, the name of the donor who helped kick start fundraising for renovations at the new location on Beebe Capps Expressway.
Longtime Searcy resident and businessman Larry Crain agreed to donate $2 million for a project to renovate the Searcy Public Library, according to Jean Ann Bell, the library board president. Bell revealed the donor’s name in a press conference at 10 a.m. outside the library’s new location at 954 Skyline Drive, which was previously home to the Searcy Athletic Club.
Bell said the new library would be named the Janett Crain Memorial Library in honor of Crain’s late wife, who worked with many service organizations in Searcy. At the conference, Crain and Barry Hoffmann, the architect for the project, unveiled a rendering of the new library’s exterior.
Bell said the new public space was designed for all Searcy residents to enjoy.
“It’s really a community center, and we want people to feel that way about it,” Bell said.
Crain said he wanted to support the library renovation so people would have access to free internet services and because the project could have a positive impact on the local economy and commerce. Crain said he was also inspired to donate to this project because his wife loved education, children and serving the community.
“So she’s really the heart of this,” Crain said.
Crain said he grew up in Searcy and went on to work in the accounting and business fields. He owns multiple companies, including one that oversees car dealerships throughout Arkansas, the Crain Automotive Team website said. He also owns Crain Media, which runs seven FM radio stations in the state.
Friends of the Library Foundation board member Jan Smith said the renovation project would cost $5.3 million, according to a 2021 feasibility study. The new library would contain 33,000 square feet, three times more than the current building on East Pleasure Avenue. The money would go towards adding a coffee shop, career center, space for teenagers and children, media program room, and other features to the library, Smith said.
“I envision this new library as a showplace for Searcy and a place we can all be proud to share,” Smith said.
The board unsuccessfully campaigned for a new public library in 2017, Smith said. In early 2021, the Searcy Athletic Club building became available, so library board members teamed up with city officials to fund the purchase of the building.
Regional library director Darla Ino said she was thrilled and surprised when she learned about Crain’s donation. She said the board hopes to reach 75% of their fundraising goal before advancing to the public phase of the renovation.
Library fundraising committee member Willie Abrams said he hoped Crain’s donation would encourage others to contribute money to renovating the library.
“This is a major gift to challenge others in Searcy to step up so that we can have this in our community,” Abrams said. | {"pred_label": "__label__wiki", "pred_label_prob": 0.9951195120811462, "wiki_prob": 0.9951195120811462, "source": "cc/2023-06/en_head_0000.json.gz/line92939"} |
Robert Riddoch
Pte Robert RIDDOCK, 3965, of Unknown Unit attached to THE BLACK WATCH ROYAL HIGHLANDERS, was born in Auchterarder Perthshire. He died on 30 July 1916 F&F. He is listed on the roll of THE BLACK WATCH (ROYAL HIGHLANDERS). The cause of death is given as Killed in action. Other information given: 6th Bn.
Private R RIDDOCH, 3965, served in the 6th Bn. of the Black Watch (Royal Highlanders). He died on 30 July 1916 in France and is buried in CATERPILLAR VALLEY CEMETERY, LONGUEVAL and is commemorated on XI. G. 26.
Private Robert Riddoch, 1/6th, Black Watch, is commemorated on the War Memorial at Auchterarder.
Private Robert Riddock, 3965, 6th (Perthshire) Battalion (Territorial), Black Watch (Royal Highlanders), was killed in action on 30 Jul 1916 in France and Flanders. He enlisted at Auchterarder.
Private Robert RIDDOCH lived at Arnott Cottage, Feus, Auchterarder. He enlisted 8th November 1915 in the 1/6th battalion of the Black Watch. Home service at Bridge of Earn, Falkirk, Ripon, 1915 to 1916. Served France. Killed at High Wood. He died 31st July 1916. | {"pred_label": "__label__cc", "pred_label_prob": 0.6663256883621216, "wiki_prob": 0.3336743116378784, "source": "cc/2023-06/en_head_0000.json.gz/line61249"} |
Home » COVID-19 and Health Crisis » Building an Inside-led prison abolition movement:
Building an Inside-led prison abolition movement:
An interview with Bennu Hannibal Ra-Sun
By Devin Cole posted on January 12, 2021
On Jan. 5, Devin Cole spoke with Free Alabama Movement co-founder and freedom fighter Bennu Hannibal Ra Sun about the economic side of the ongoing 30-day Economic Blackout and Alabama prison strike in January, the growth of social media and prison abolition, and what it will take to build a truly structured prison and slavery abolition organization.
Devin Cole: Members of the Free Alabama Movement and other prison abolitionists are saying that Securus Technologies’ implementation of video visitation equipment is a front for permanently removing all in-person visitation and replacing it with video visitations only. Can you talk about these concerns and why they want to do away with in-person visitation?
Bennu Hannibal: Certain members of FAM have that interpretation and are expressing it. As for myself, I haven’t seen anything specific as to what Securus and ADOC’s plan is, but that doesn’t mean it’s not their overall plan. We do know that video visitation is already happening in other states, because Securus is a national brand. And we can extrapolate from those conversations and things that we are already aware of what the plan is for Alabama. We also know that some county jails are already using video visitation exclusively.
Whatever the decision, we know that it will be decided by economics and not what is best for the families. Under the current model, aside from the vending machines, the state doesn’t make any money on in-person visitation.
Bennu Hannibal Ra-Sun
On the flip side, they have costs associated with physical visitation, like having security staff to harass and inspect visitors, perform strip searches, etc. These are all costs to the operational budget of a prison that disappear with video visitation kiosks. So, they probably compared the numbers from what they are making off normal visitation, in contrast to what they will make off the contracts with Securus, including the other services that Securus will be charging for us to use their tablets, etc., and decided that if they go to video visitation and make whatever else they will make off these contracts — then that is more profitable and preferable to do.
I don’t know if they would switch to a system where in-person is only once a month, once every 90 days, or you have to earn it or whatever. But people in prison and our families should not have to pay to talk to our loved ones, and we should never be denied the basic need for human contact that all human beings need.
Securus is an unscrupulous company that has been caught and sued for providing location-tracking information to law enforcement, bounty hunters and bondsmen, which was used to track people and their family members — and that shows that they are willing to be a part of the police state and prison-industrial complex.
These companies have no incentive to be concerned with what the family members have to say or are going through. It is very clear that they have some perception of the financial exploitation that goes into prison plantation management, and they are not constrained by principles when it comes to human suffering to make their profits.
DC: The other four companies in this Economic Blackout that are being boycotted are JPay, Access Corrections, Union Supply Company and Alabama Correctional Industries. What are their roles in the slavery system of Alabama prisons?
BH: It’s not just about the Alabama prisons. Alabama doesn’t have JPay. The reason we added some of these companies is to give people in other states the opportunity to be a part of the Economic Blackout protest as well, because it is affecting all of us.
Even though the original idea of this economic boycott by Kinetik Justice was and has remained for the most part a statewide effort, I thought it would be wise to add other companies that provide similar services in other states to leave room for other states to get involved, to create an opportunity to build unity and to show that we are all in this together — because the actions we are taking in Alabama are related to the actions around the country.
Union Supply and Access Secure are prison profiteers involved in the overpriced incentive package and accessory programs that are used to exploit and extort money from us and our families. These companies provide their services to prisons nationwide and enjoy exclusive monopoly contracts with prisoncrats and politicians. We need to be getting at all of them, all across the country, all at the same time.
Through actions like the Economic Blackout, we want families to understand why we have to start demanding audits of these companies, so that we can show people what’s really going on.
Another thing I want to do while we raise awareness is to find five families that are willing to have their personal finances audited, so that they can see in exact dollar amount terms how much they are contributing to incarceration and enslavement by investing in these exploitative companies. When people start seeing how much money is being made, they’ll then start asking where is the money going? Family members will see that they are paying for all these weapons, the mace and rubber bullets, the night sticks and electric shields that are used to harm us — and that these suppliers and prison officials are getting rich off it all.
It is profits that are made and the kickbacks to the operating budgets that keep the structure of the incarceration system and its laws intact. It is the economic contributions and free or cheap prison labor that form the pillars that uphold the system; and when those pillars are stressed and broken, the entire system collapses.
These economic boycott campaigns are to get people to see what their money is going to and what the system would look like if they took all their JPay money out, all their Securus money out — what that would look like. Would it be better, or would it be worse? There has to be a scientific application of “What am I dealing with?”
The budget of Alabama prisons is $600,000,000. If we take the labor out, what does that do to the budget? If we take incentive packages out, what does that do to the budget? If we take the canteen money out, what does that do to the budget? And so on and so forth.
DC: In 2018, you wrote an incredible article called “Seeing the problem, being the solution, making the sacrifice.” (tinyurl.com/y4vhskez) In it, you speak extensively of the need to use social media, as in creating a mobile app for your organization that tells of all ongoing prison strikes, hunger strikes and all economic boycotts similar to that going down right now. Could you talk about the role that social media and technology have played in expanding these growing economic blackouts?
BH: We started using social media as part of our core strategy back in 2014 with our YouTube channel and Facebook page. When I came to prison back in 2001, I was shocked at the living conditions. I shared with the guys in prison that we needed a camcorder to document this stuff. I was 100% convinced that people in society had no idea that living conditions were that bad. Hell, I had friends and my brother in prison at the time, and I had no idea people were living this way.
So when the time came for me to put the blueprint for the Free Alabama Movement together, I knew that social media would play a very important role in the way we got our message and our proof out. I knew I could take that phone, create the social media platforms, and use this technology to push the Movement forward in unique ways.
As for the mobile app, I simply see this as the evolution in the area of technology for our Movement. There is a lot of activism taking place around the country on the inside of U.S. prisons, jails and detention facilities, but people don’t know how to wade through all the social media content to find out about it, because the information is hard to find.
For example, right now there is a hunger strike going on in an ICE detention center in New Jersey, with others joining in daily. There is action in Pennsylvania and other places that kicked off mostly at the start of the year. There is our economic boycott here in Alabama, which includes several hunger strikers.
Hardly any of us know about each other, even though we are all protesting and taking actions for the same issues. As things stand at the moment, our actions are all unconnected. With this app that we’re still working to develop, we could have a centralized source where people can see all these things happening, and we could reach out to organizers in Alabama, Texas, New Jersey, bring them to the table and come out with the united front. All the issues are the same, so why are we not all acting and moving and organizing together?
There is just too much information and too much trickery going on for people to be on top of what is going on and who and what is legit or not. This app will help to centralize information and actions and allow us to strengthen and grow our base from which to inform and educate.
When you look back to November 2017, you’ll see an article I wrote in the San Francisco Bay View for the Campaign to Redistribute the Pain 2018, where I presented the idea and laid out a potential structure building a nationwide, “Inside-led” organization called the National Freedom Movement (which is now growing). (tinyurl.com/y4yarmw4) The elevated levels of activity around the country today illustrate why having a national structure is so important, so that all of these campaigns can be organized and be happening simultaneously in several states. There are a lot of organizations involved in what’s going on in Alabama, New Jersey, Florida, so why can’t we all work together?
We can’t remain stuck in isolated borders when we are dealing with people who are committed to solving this gigantic problem. Prisons commissioners, police chiefs, mayors, doctors, and many other common groups, all have national meetings and platforms that they share every year. They are unified and they are together — that is why they are successful. We are not unified, and that’s why we are not successful!
There are many organizations on the outside supporting our struggle, but they already have their own agendas and plans that they organize around. The work they do for us falls within the context of the limited scope of what they are about. In other words, they are not structured exclusively to our needs and concerns.
Outside organizations are coming in and offering help, but not helping us build our own infrastructure. When they leave, or the cause of the moment dies off, they take their resources and infrastructure with them. That model is only mildly effective.
If we are to have long-term success and truly solve these problems, then we’ll have to build our own nationwide, Inside-led outside-support network ourselves. And that starts with the Inside coming together nationally first.
What I am proposing in the National Freedom Movement is that those of us on the inside come together and then organize our own outside-support organizations from the ground up: We provide the by-laws; we make the structure — and every component and every brick is set up by those of us on the inside.
We already have more than enough legit Inside-led organizations. The bottom line is we should be organizing together, planning together and dictating the action and the tempo nationwide from the inside. But we aren’t unified, and as a result, most — but not all — of our actions are reactive.
For those asking what they can do to help, help us build our own national infrastructure in the way we are describing. It’s paternalistic and destructive to the Movement to do otherwise. Over time, we see organizations pull out and take their resources with them, returning every now and then to play favorites amongst the Inside activists. They use their leverage and resources to play divide-and-conquer amongst inside factions. This benefits the government and not the struggle. That’s why we need our own outside-support structure. Without independence, we’ll always have these problems that we are having today with outside organizations.
DC: Any final thoughts or words you want to speak about?
BH: Starting out, this call was originally for a 30-day Economic Blackout in the form of work strikes, boycotts and protests. Over the past 4-to-5 days, however, we started to see the Economic Blackout aspect become overshadowed and hijacked. This was allowed to happen for a number of reasons — none of them positive.
For example, I am seeing an organization conducting a fundraiser “for the hunger strikers,” but with no offer of support for the others sacrificing. And, one of the reasons they say they are raising funds — to help pay for commissary — is a direct contradiction of the Economic Blackout. They say they are raising funds at the request of the Free Alabama Movement, but why would FAM be requesting funds to be spent in a way that directly contradicts the Economic Blackout?
Lost in the shuffle is the fact that the hunger strikers are taking action to support the Economic Blackout. Nevertheless, we have people reporting on the hunger strikers in a way that totally separates them from the Economic Blackout, where all freedom fighters are being called on to take action by quitting their jobs, rejecting visits and or foregoing canteen or incentive packages — and going on hunger strike if this is your choice.
These are obvious contradictions that compelled me to speak where I otherwise had been silent on certain matters. Supporters have to understand that their individual relationships and conversations don’t translate into universal support for FAM, and they should not be making statements and taking actions that cause contradictions or conflicts with overall Movement activities.
When the message gets hijacked, the companies to boycott are being given a pass, and the potential to expand the boycott is being lost. But this is what happens when outside support organizations put personal relationships before organizational principles. They started picking the people they like and reporting from that angle, instead of supporting the cause. And that’s another reason why we need to create our own outside-support structure.
We need everyone to stay focused on our fundamental approach to defining and solving this problem with economic direct-action campaigns, because this is how we are going to affect change. We support everyone who is making a sacrifice for freedom and all of the families, but we have to remain vigilant in our understanding that this is a comprehensive plan, not a reactionary one.
And it’s not just for 30 days. We want people to know that this is ongoing. We can’t let the State off the hook by forgetting that we are here to defund, divest and be disruptive with economic strategies and tactics. We’ll amplify that by any means necessary.
Bennu Hannibal Ra Sun is the founder of the Free Alabama Movement and Executive Director of the Campaign to Redistribute the Pain. He is the architect of the National Freedom Movement, an author, and he is fighting for the liberation of all people trapped in cages and behind walls.
Devin Cole is a transgender Marxist organizer and writer. They are the president of Strive (Socialist Trans Initiative), a transgender advocacy organization in northwest Florida, and a member of the Workers World Party – Central Gulf Coast (Alabama, Florida, and Mississippi) branch.
Ukraine: U.S./NATO-backed fascist coup & a growing people’s resistance
https://www.workers.org/2021/01/53733/?fbclid=IwAR1cdMsoWR0S501YdTGJLEzXvLQVJ24EmZRE72zewSvhWgDpu7WS7RwLb8s | {"pred_label": "__label__cc", "pred_label_prob": 0.6361367106437683, "wiki_prob": 0.3638632893562317, "source": "cc/2023-06/en_head_0000.json.gz/line196977"} |
Tag: FDRE
Ethiopia: Office of the Prime Minister – Joint Communique Issued at the End of the Official State Visit by H.E. Hassan Sheikh Mohamud, President of the Federal Republic of Somalia to the Federal Democratic Republic of Ethiopia (30.09.2022)
Author nilspeacePosted on September 30, 2022 September 30, 2022 Categories Africa, Development, Diplomacy, Governance, Government, Law, Leadership, PoliticsTags Abiy Ahmed Ali, Ethiopia, FDRE, Hassan Sheikh Mohamud, Prosperity Party, SomaliaLeave a comment on Ethiopia: Office of the Prime Minister – Joint Communique Issued at the End of the Official State Visit by H.E. Hassan Sheikh Mohamud, President of the Federal Republic of Somalia to the Federal Democratic Republic of Ethiopia (30.09.2022)
Opinion: Kenyatta will miss his old office very quickly…
It has been announced that the former Kenyan President Uhuru Kenyatta has been appointed to mediate and be a “Special Envoy” to the Democratic Republic of Congo (DRC) and Ethiopia. He will have to partake in the insurgencies in the DRC and the conflict in Northern Ethiopia (Tigray). Therefore, he has a massive take and lots of responsibility overnight.
The Former President be working with Heads of State in the DRC. Where he has to be working directly with the authorities in Kinshasa. That’s the place he has a shot and possibility to make a difference. Kenyatta already has a working relationship with President Felix Tshisekedi. Therefore, if there is hope for any substantial progress or delivery. He should hope to get somewhere in the DRC.
The M23 latest peace agreement was already made in Nairobi with the Nairobi Declaration. That’s why, Kenyatta has goodwill and could use the working relations from his years in office to make a difference, but we shouldn’t have to high hopes. However, we have to take what positives there are before downplaying this role and office.
On the other hand, in Ethiopia and Addis Ababa, is a place where Kenyatta might not be so much welcome. There won’t be much fanfare or acceptance of him. He will be a nonce and nuisance quickly. The Addis Ababa government have to already work with the African Union Envoy for the Horn, Olusegun Obasanjo. The former Nigerian President have struggled to bring any dialogue or talks between the stakeholders. This work has been stifled and his had an unforgiving role, as the FDRE and the Government of Tigray has both ceased talks or negotiations in general.
Obasanjo have tried and his hands are tied. We know the FDRE is directing how the AU Envoy can operate. While people will quickly question the mandate and what sort of mission Kenyatta has. This was quickly launched, as Kenyatta retired from the Office of Presidency. It is a way of softening the blow and give him a purpose. Though, what will the Ministry of Foreign Affairs tell Kenyatta and what is his anticipated to do?
Will he make phone-calls, conduct field-work or even try to get stakeholders to meet each other? A man of peace can do a lot. He can do little or a lot. If any of the 10 years in Office will tell us. The former President could easily create a scandal or a way of using the office for enriching himself. However, it would be hard to find a way to make this happen. Nevertheless, people shouldn’t be shocked, if he found a way or a scheme to get some additional funds. That is his way and how he has run his government.
Ruto surely sent him on his merry. Giving him a token of appreciation and an honourable task. Kenyatta should use all diplomatic channels and shouldn’t expect much. It isn’t like his through IGAD, AU or any other body. No, his just appointed by the incumbent Kenyan President and that isn’t setting a strong mandate.
This is sort of like the mandate or role Stephan Kalonzo Musyoka had in the South Sudan in the previous term. He was the Special Envoy to South Sudan and he surely cannot show much, if anything He got a few free trips to Juba, but cannot be said to helped the process significantly.
This here office should be gazetted and the mandate should be set forward. Also, the current President should give a time-frame and possible plans for it. Since, it shouldn’t just be something to keep Kenyatta busy. Kenyatta should have a target to work towards in coordination with Kinshasa and Addis Ababa. However, time will tell if they will let him or see him as outside noise. Peace.
Author nilspeacePosted on September 16, 2022 September 16, 2022 Categories Africa, Development, Diplomacy, Governance, Government, Law, Leadership, PoliticsTags Abiy Ahmed Ali, Democratic Republic of Congo, DRC, Ethiopia, FDRE, Felix Tshisekedi Tshilombo, GoK, Government of Kenya, Kenya, President Ruto, President Tshisekedi, Prime Minister Abiy, Prosperity Party, Regional Government of Tigray, Tigray, Uhuru Kenyatta, William RutoLeave a comment on Opinion: Kenyatta will miss his old office very quickly…
Ethiopia: Press Release from the Caucus of Opposition Parties (COP) – (05.06.2022)
[VOL – JUNE 05,2022] Having Noticed the fundamental differences on the approach of the National Dialogue with the government and it’s allied Parties, we here by announce the Establishment of Caucus of Opposition Parties (COP) to present our alternatives for National Dialogue that will result in genuine democratic system.
Therefore, We, the Caucus of Opposition Parties (COP) composed of below mentioned opposition political parties, who are key stakeholders with significant followers and influence in Ethiopia are fully committed to peaceful resolution of all conflicts and political differences that are flaming the current worsening political schisms and deadly hostilities.
Understanding the current dire situation Ethiopia is facing, all political parties, including the ruling party, agreed that the best way to tackle the gargantuan problems is through a National Dialogue. The government taking part in the initiative of the parties organized meetings where the modalities and process of the National dialogue was discussed. However, while the discussions were in progress and the stakeholders were debating the best way to organize the national dialogue, the government unilaterally prepared a bill regulating the process and passed it through the one party dominated parliament ignoring the concerns of the political parties.
Then, the government, exacerbating the matter further, started a dubious process of selecting the commission that will facilitate the National dialogue violating the fundamental principles of a national dialogue which are inclusivity in all facets of the process by all key stakeholders. Furthermore, no provision was put in place to allow commission to reach out to those who are currently banned and are at war with the government.
COP strongly believes that the current toxic political environment that resulted in bloody wars, economic decline and further polarization of the differences between all political forces, including the government could only be resolved through genuine, inclusive National dialogue where all stakeholders are fully engaged and given a chance to take active part in the solution.
Having seen how the National Dialogue process was compromised and misdirected, COP members decided to question their participating in a current format of the National Dialogue and present an alternative formula for organizing a genuine National dialogue in order to confront the culture of conspiratorial politics and heralding political actions that would positively contribute to the development of democratic culture and dissuade the government in a constructive way from taking a wrong direction.
Therefore, COP proposes that The National dialogues intended to address the key issues facing the politico/social and Economic landscape today shall meet the minimum of international standards and practices in order to give the process a chance to succeed include the followings:
An immediate, real cessation of hostilities and Internationally monitored ceasefire in all areas in Ethiopia including Tigray, Afar and Amhara, in Northern Ethiopia, Oromia , Benishangul, and Somali States.
Assurance by the government that it and key stakeholders take steps to restructure a commission and the edit regulating the process in a way that makes the process inclusive, representative and genuine, whereby negotiating parties have a strong support base, credible claim of legitimacy in representing their constituency, the political will and the ability to implement what was agreed upon including shared responsibility of implementation of the outcome of the National dialogue.
In order to ensure transparency, independence and inclusiveness of the commission members, political parties shall have a meaningful presence in the commission and take part in the process and criteria of selection. In addition, any discriminatory clause shall be removed from selection criteria such as holding only Ethiopian passports for people of Ethiopian origin in order to benefit from their expertise.
In the agenda setting process, there shall be a clear and transparent process that accommodates agenda presentation and approval by all stakeholders without discrimination.
Since Ethiopia is not an Island in this intricately interconnected global world and every decision we make is important to the other countries. Therefore, we demand provision that permit involvement and engagement of credible, neutral facilitators or mediators from the international community take part in the National dialogue process when deemed necessary.
Transparent and agreed upon decision making process including consensus and mediation shall be agreed by upon by all key stakeholders.
Adequate confidence building measures, including supplying security of key participants, effective international oversight, release of all political prisoners and lifting of embargo on humanitarian aid to those who are in desperate need of food and medicine.
It’s in the best interest of our people to give a guarantee and safety of all participants in the process and transparent security arrangements whereby Opposition parties leaders are not threatened by harassment, imprisonment and/or extra judicial killings.
Member Parties
1. AFAR JUSTICE AND DEMOCRATIC PARTY
2. AFAR PEOPLE’S PARTY (APP)
3. ARENA TIGRAY
4. DONGA PEOPLE’S DEMOCRATIC ORGANIZATION
5.HIBIR ETHIOPIA (HIBIR)
6. MEDREK
7. OGADEN NATIONAL LIBERATION FRONT(ONLF)
8. OROMO FEDERALIST CONGRESS (OFC)
9. OROMO LIBERATION FRONT(OLF)
10. WOLAYTA NATIONAL MOVEMENT (WNM)
Author nilspeacePosted on June 5, 2022 June 5, 2022 Categories Africa, Development, Governance, Government, Law, Leadership, PoliticsTags Afar Justice and Democratic Party, Afar People's Party, Arena Tigray, Caucus of Opposition Parties, COP, Donga People's Democratic Organization, Ethiopia, FDRE, Federal Democratic Republic of Ethiopia, HIBIR, HIBIR Ethiopia, MEDREK, OFC, Ogaden National Liberation Front, OLF, ONLF, Oromo Federalist Congress, Oromo Liberation Front, WNM, Wolayata National MovementLeave a comment on Ethiopia: Press Release from the Caucus of Opposition Parties (COP) – (05.06.2022)
Ethiopia: PM Abiy wants a Palace fitted for a King
“The Office of the Prime Minister is under preparations to construct a new national palace to the tune of 49 billion birr, becoming the second biggest public project next to the Grand Ethiopian Renaissance Dam, which has consumed over 130 billion birr thus far. Situated on a sprawling 503 hectares of land at Yeka Hill, in Yeka Sub-city, the construction touches five woredas, which will harbor the construction of halls, lakes, housing units and road infrastructures, among other facilities. Part of the government’s 10 year perspective plan, the project will see the evacuation of thousands of people. However, the residents will be given a chance to develop their own property on their land, if it fits the standard of the area, where the palace will be built. Sources told The Reporter the UAE government will contribute a portion of the budget needed to construct the palace” (The Ethiopian Reporter – ‘Government inches to build palace for over 49 billion birr’ 21.05.2022).
It seems to be official that the ruler of Addis Ababa and beyond, Prime Minister Abiy Ahmed Ali is planning to change his estate and his residence. As there are now plans to spend about a $1 billion United States Dollar on building a new Palace. That will be instead of residing in the Menelik Palace and the Grand Jubilee, which will become a museums.
The OPM and the ruling regime is prioritizing building a lavish Palace for their ruler. Instead of spending money on food security, agriculture or anything that can help the citizens. Because, the state has created a famine in Northern parts of the Republic. While it is having severe droughts in the Ogaden and surrounding areas. It is also possible hurt and suffering in the Afar region and parts of the Amhara region after warfare last year. Also, we have no estimation or idea of the damage, the pain or suffering in the Oromia region as well. Therefore, the state isn’t creating sustainable mechanisms or programs. Instead they are choosing to build a magnificent building for the Prime Minister to reside in.
The state who just received $300 million USD to “rebuild” and “retool” parts of the war-torn regions of the Republic. As the Republic is having a rising inflation hitting around the 40% rise. While also lacking foreign exchange. Meanwhile the Federal Government has also invested and imported more weaponry, tanks and other equipment to further their internal conflicts. Therefore, there is no shadow of doubt. That things will only get worse… before they get better.
As the famines, droughts and steady arrival of conflicts. The use of war to silence to silence dissent and opposition. While spending fortunes on prestige projects like the Palace of the PM. That just shows what sort of mismatched priorities the PM has and he has no ideal of how it is wrecking the economy.
In the last budget the state used 12 billion birrs on food security, 17 billion birrs on job creation, 33 billion birrs on health care and 16 billion birrs on education. So, you can easily see how the Federal Government is prioritizing the Palace over all the other necessities. Yes, some funds will come from the UAE Government, but that’s still a waste of government spending. This is not for developing the Republic or helping the citizens in need. No, this is just to boost the ego of man and his lofty ambitions.
Abiy wants so badly to be seen as a King and be a monarch. Now, his building a grand palace in his name and during his tenure. That just shows his intentions and he has no scruples either. As his government is waging war, been blocking humanitarian aid and been vicious against any critics within his realm.
Now… his starting to build a Palace and soon his trying to figure out who can make him a crown. Peace.
Author nilspeacePosted on May 22, 2022 May 22, 2022 Categories Africa, Development, Economy, Governance, Government, Law, Leadership, PoliticsTags Abiy, Abiy Ahmed, Abiy Ahmed Ali, Addis Ababa, Ethiopia, Ethiopian Prosperity Party, FDRE, Finfinne, Menelik Palace, PM Abiy, Prosperity PartyLeave a comment on Ethiopia: PM Abiy wants a Palace fitted for a King
Ethiopia: The Federal Government is cracking down on all critical media…
The latest arrest is now Meskerem Abera, the journalist who has also just been abducted at Addis Abeba airport earlier today on the 21st May 2022. She is following a long line of government critics who has been apprehended, arrested and taken to unknown location. In addition to that, another kidnapping and arrest is of Tadious Tantu as well. Who has been gone missing since yesterday.
This is a grand scale of going after anyone who isn’t following the Federal Government line in the media. That is very obvious, because this a broad-net of journalists taken into custody over the last 48 hours.
Here is some brief reports of others arrested as well.
“The Amhara region based Ashara media outlet announced that police arrested 5 of its staff last night & that it cannot establish their whereabouts today. The five are Kelemu Gelagay, Daniel Mesfin (editors/cameramen), Gashaye Negussie, Getnet Yalew, Habtamu Melese (reporters)” (Zecharias Zelalem, 20.05.2022).
“News has just broken that Solomon Shumiye current affairs talk show host with a decent following on the Gebeyanu YouTube channel, has just been taken into police custody. We’re at about 10 media staffers detained across Ethiopia in just the past 24 hours” (Zecharias Zelalem, 20.05.2022).
Earlier in the month another arrest was also done:
“Journalist Gobeze Sisay accused Ethiopia Government of crackdown on dissent media
✅Gobeze says his arrest is similar to the Tamerat Negera case, where Oromia police censor media, claiming “Oromophobia”
✅Tamera is #Oromo but opposes ethnic-federalism policy of Abiy’s OPP” (Awasa Guardian, 10.05.2022).
We can easily see that this is deliberate acts of silencing everyone and only get out the message of the state. A way of taking away anyone who speaks, thinks or even considers to question Prime Minster Abiy Ahmed Ali and his Prosperity Party. His party and Federal Government is aiming at anyone who blinks their eyes twice and thinks about questioning his actions.
That’s why these mass-arrests are happening. The sudden kidnappings of journalists, activists, civic leaders and advocates are targeted as well. This is all deliberated and by taking out the journalists the media will not report on it and neither will there be a media who questions these violations of people’s rights.
The PM and his party can rule with their tyranny, as there is no voices of reason. There is only incarceration and detention of anyone who dissent. The government is certainly showing it’s vicious side and instead of settling grievances with words. They are instead using it’s authority to silence it’s critics. That is not a shocker, as unity is spread to the sound of guns and ammo. Therefore, it follows a pattern of violence as a means of solidifying power. Peace.
Author nilspeacePosted on May 21, 2022 May 21, 2022 Categories Africa, Development, Governance, Government, Law, Leadership, PoliticsTags Abiy Ahmed Ali, Arrests of Journalist, Ashara, Daniel Mesfin, Ethiopia, Ethiopian Prosperity Party, FDRE, Gashaye Negussie, Gebeyanu YouTube channel, Getnet Yalew, Gobeze Sisay, Habtamu Melese, Kelemu Gelagay, Media, Meskerem Abera, PM Abiy, Prosperity Party, Solomon Shumiye, Tadious Tantu, Tamerat NegeraLeave a comment on Ethiopia: The Federal Government is cracking down on all critical media…
Ethiopia: If Ethiopians are joining the war in Ukraine – They are dying for a War that isn’t theirs to begin with…
“Everyone now clearly understands that Russia and all Russians lie. Trying to recruit Ethiopian Youth, Russians do not tell anybody that as of April 18, 2022, over 20000 of RU invaders has already met their Death in Ukraine. Felt defeated in Ukraine, Russia insidiously tries to mislead and play its dirty games” (Embassy of Ukraine in Ethiopia, 18.04.2022).
Today in Addis Ababa there been long lines and queues outside of the Russian Embassy. As there are reports of a total of 2000 Ethiopian citizens that has signed up to fight on the Russian side of the Ukrainian conflict.
That is only mere reports that has been refuted by the Russians, but they are willing to lie about everything. While the Ukrainian Embassy in Addis Ababa says they are recruiting. The Ukrainians are the ones who is defending their territory and nation against the Russian-Belorussian invasion, which has lasted for over 50 days now.
It is very unique, if these Ethiopians join this war. This isn’t a world war and neither is a conflict that has spiralled outside of the borders of Ukraine. No, for now it is a Russian-Belarus-Ukraine thing for the most part. The Russians warns everyone else of not to move, think or coordinate. While the Russians has already gotten Syrian mercenaries and could easily try to conscript Ethiopians to fight their battles.
There is already reports that the Russians needs reinforcement badly. As on Job-Sites and Work-Offerings the Ministry of Defence is offering unique and patriotic-based contracts for the ones who is willing to sacrifice and fight for Russia in Ukraine. The Russian Federation and it’s army needs recruits. That is evident after all the losses and the total failure of the swift invasion, which was supposed to happen within 48 hours or three days…
However, here we are and Ethiopians are queueing outside the Embassy. Some is said to have with them a passport and documents to prepare visa’s and signing up to participate in the conflict. That means Ethiopians would fight on the Russian side of the conflict.
The ones that queueing today is supposed to part of Amhara Para-Military Group “Fano” which is supported by Amhara Regional State and been vital in the war against Tigray People’s Liberation Front (TPLF). Fano is the extremist and fascists of Ethiopia who has fought for Amharian supremacy and a Greater Amhara. So, they will fit well in with the Z brigade of Moscow and be in-line quickly with the Russian propaganda of Kremlin. Therefore, if that is true. It is a match made in Hell and not in Heaven.
Nevertheless, the Ethiopian mercenaries or conscripts is signing up for a war that isn’t theirs in the first place. They will not be honoured and be respected for their efforts. These will be cannon-fodder and die like flies on the front-line. The Ethiopian soldiers will not conquer or overcome Ukrainian forces. They will only be a temporary fix and a possible strategy of cutting the losses of the Russians own brigades.
The Ethiopian Youth and “Fano” might see this as a possible way of training, expertise and a possible pay-check. They rather fight a war far away and get credit for it. In such a way of leaving desperation at home to flee to “greener” pasture in Eastern Europe. However, they will bleed and die for nothing. The Russian will not honour their sacrifice or write tales of glory for their participation. No, they are just useful pawns on the chess-set and the first to catch a bullet for them.
The Ethiopian mercenaries will not linger much hope. When the Russians themselves has struggled and lead to many tactical defeats for the last 50 days. Why would Ethiopians make a huge difference? No, I don’t think so. Not because they are not warriors and cannot fight a battle. No, it is because of the conflict they would enter and the enemy they are meeting. It is not like it will be easy and be friendly. No, it will be brutal and they spare no one. Especially, the soldiers and the ones who is representing Russian invasion force.
That’s because the Ethiopian or “Fano” will be part of the invaders and an invasion. They are not part of the defence or the ones who is defending their homeland. No, they are going after Ukraine and on Ukrainian soil. That is a death wish and they will not return home as heroes. They are joining an imperial power and partaking in unjustified war. This is why nothing good will come out of it.
The ones signing up for this… is signing up for a death sentence and Moscow will not repay them. They are just taking a bullet for Kremlin and no love will ever be lost. These youths and Ethiopians will not return or be able to tell about the war they entered. Because, the Russians wouldn’t spare them. They are the ones they can risk and send to the front-line without any costs. Since, they signed up for it and they got to fight. There will be no option to flee or seek shelter. No, they are there to fight the cause of Russia.
A cause that will end up in caskets or not even that. They will be left behind on the battlefield and forgotten. A bloodshed and a sacrifice of a willing. Youth and Amhara militia members who fought a war that wasn’t theirs. The tears and losses will be felt by their families and loved ones. Who knew that they went and never heard from them again. Families and villages who saw their sons leave for war in Eastern Europe. Where they never returned from and only got a mantle or a signed off on war-grave. However, they will not return with stories of greatness or of adventures. No, they will be scorn, torn and bleed for a conflict, which wasn’t theirs and never will be theirs to begin with. They will be the lost souls and the sons of far away who could have lived life in peace and created a future in Ethiopia. Instead they sought after glory and a pay-off from Russia. A pay-off they will not receive. Since most of them will die before the Russian Federation or Ministry of Defence has to even care about their salaries. Peace.
BTW: It would make a difference, if the Amhara or Ethiopians joined the Ukrainian side either. This is a war for the soul of Europe and a war against European imperialism. Where the NATO/EU and Russia are on each side. As the Ukrainian are fighting for its own independence and sovereignty to join whatever entity or alliance it see fit. While Russians wants to have control of their neighbours. Which is why there is no natural reason or argument to defend the participation of Ethiopian Youth or “Fano” in either sides of the conflict in Ukraine. They will not be remembered or written tales of glory. No, they are mercenaries who will die in unmarked graves, which is undignified for their sacrifice, but an end, which is most likely to happen.
BTW II: Don’t say nobody didn’t warn you or didn’t write about it. Because, I did and I am concerned, because their lives matters. Just like all lives does and this was a death that could have been avoided. However, decisions are made and there is always consequences to the actions we make. Peace.
Author nilspeacePosted on April 18, 2022 April 18, 2022 Categories Africa, Army, Development, Diplomacy, Europe, Governance, Government, Law, Leadership, PoliticsTags Abiy, Abiy Ahmed Ali, Amhara, Ethiopia, Fano, FDRE, PM Abiy, President Putin, Russia, Russian Federation, Sergei Shoigu, Ukraine, Vladimir Putin2 Comments on Ethiopia: If Ethiopians are joining the war in Ukraine – They are dying for a War that isn’t theirs to begin with…
Opinion: It seems like Abiy don’t need Hailemariam Desalegn anymore…
There is now reports that the former Prime Minister Hailemariam Desalegn has an arrest warrant on him. There is a pending corruption case, which questions missing funds $50 million, which was misused and not spent as promised on agricultural equipment from Poland. Therefore, an old case is suddenly appearing and haunting the former Prime Minister.
When these sorts of things happens years after. As we have seen the succession of Abiy and the years in power. This seems like a sting and operation to take down a former ally who paved the way for Abiy to get into office. That is how it seems to me.
The money is most likely eaten and the ones in office is doing the same. If not they are misusing funds to combat it’s own people and asking for donors for military equipment to kill their own. Surely, the former PM have to answer for his own grievances.
However, this is a political game, as Abiy is safe and has the throne. He feels superior and untouchable, as the warfare haven’t hit home and neither has the crippling economy. So, as long as the gig is working. He can focus on consolidating all power and this way go after someone who can put him in a bad light.
Which just happens to be the former Prime Minister. A man who did the noble thing and resigned after failing. A PM stepping down after misusing his office and suspending the rights of his people. Using the Command Post and the State of Emergency to further the plight of the demonstrating youths. Alas, the former PM did the graceful thing and bowed out.
Nevertheless, Abiy rather silence and get rid of his critics. That’s why this fits a pattern and now he seeks a former ally and a predecessor. In such a way to silence and stop him too. To use the past and the courts to go after him. It is just so fitting and a political move, as the same courts has been used against high profiled opposition. Therefore, we know the drill and the motivation for it now.
Just like Abiy have gone after and gotten rid of the ones that made him like Lemma Megersa. It seems like he has put the target on Hailemariam now. The one who was before him and to signal that anyone can be touched. That is how it seems… and it wouldn’t be shocking. As there are plenty of political prisoners lingering in jail and the former PM would maybe even join fellow jailbirds who he put behind bars during his reign.
Therefore, this is just a sign of cleaning the house and furthering his consolidating of power, which is a enterprise, which doesn’t seem to slow down. However, it just takes new forms and the PM isn’t done with doing so. Peace.
Author nilspeacePosted on January 31, 2022 January 31, 2022 Categories Africa, Corruption, Development, Governance, Government, Law, Leadership, PoliticsTags Abiy Ahmed Ali, Ethiopia, FDRE, Hailemariam Desalegn, Hailemariam Desalegn Boshe, Lemma Megersa, PM Abiy, Prosperity PartyLeave a comment on Opinion: It seems like Abiy don’t need Hailemariam Desalegn anymore…
Kenya: President Uhuru Kenyatta – An appeal to the Government and the People of Ethiopia (03.11.2021)
Author nilspeacePosted on November 3, 2021 November 4, 2021 Categories Africa, Army, Development, Diplomacy, Governance, Government, Law, Leadership, PoliticsTags Abiy Ahmed Ali, Ethiopia, FDRE, GoK, Government of Kenya, Kenya, PM Abiy, President Kenyatta, Prosperity Party, Uhuru KenyattaLeave a comment on Kenya: President Uhuru Kenyatta – An appeal to the Government and the People of Ethiopia (03.11.2021)
Ethiopia: Venable LLP hired to clean Abiy’s tarnished image
It is now reported that the Federal Democratic Republic of Ethiopia (FDRE) have hired the lobbying firm Venable LLP to promote Ethiopia in the United States of America (USA). This is not the first time an African Warlord or President with conflicts is hiring lobbyist to “clean-up” their image abroad. It is all done to sway the U.S. Congress and get a favourable tune from the White House. Because, the broken Washington D.C. is for sale and everyone can be bought, apparently.
Venable LLP had 81 clients in 2020 and spent $7,400,000 in lobbying fees for various of causes. The Venable LLP had 44 lobbyist working for them last year.
What is striking is the two fellas that is representing Ethiopia in Washington D.C. is Thomas Quinn and Loren Aho. Open Secrets says Quinn speciality is Taxation by a vast margin and Defence. While Aho have also Defence as speciality. This is not government affairs or foreign affairs, which is where the Ethiopian government needs help to sway public opinion about the war in Tigray and all the other atrocities across the Republic.
On a FARA form filed by Quinn on the 4th February 2021. Quinn is an attorney and a partner in the company. It states that he has three foreign principals his working for as a foreign agent. In his filing, these are: “Embassy of Ethiopia, Embassy of the State of Qatar & Hong Kong Trade Development Council”. This means that works for these others as well. While banking the thousands of dollars per month from Addis Ababa. We can wonder how much Qatar and HKDC is paying him too.
The Ethiopian Embassy is paying Venable LLP US$35,000 per month. When they have a taxation expert and minor lobbyist on his payroll. The company has an outreach and has a big team. Though, the two who is handling this has this history. This is information in the public domain from ProPublica and OpenSecrets. It is not like the American lobbyists isn’t looked into, as a public oversight to their actions and how they influence U.S. Congress.
That Quinn and Aho is hired to this is to whitewash and make Abiy’s government look good in the public eye in the US. It is to get Committee’s to act in favour of Addis Ababa. That is why they have hired these fellows. Where they are trying to sway and swing things in their direction. So, that they are not sanctioned or embargoed in any way. Especially, now that they are going into an election, warfare in Tigray and other lingering conflicts across the Republic.
Prime Minister Abiy has hired these guys to look good. That is the reason. As his team isn’t able to get positive headlines in Western Media and the use of this as a platform to get that. This is why regimes like this uses lobbyists to become “cleansed” from the “bloodstains” abroad. Also, to ensure their leadership and legitimacy across the board. In a manner, which they get vouched for by the International Community.
It is ironic that Abiy does this, as he holds a grip on local-media and accreditation of foreign media houses too. Just give people a pass, if they follows his guidelines and writes his stories. If they don’t, then they are banished from the Republic. Peace.
Author nilspeacePosted on February 17, 2021 February 17, 2021 Categories Africa, Development, Diplomacy, Governance, Government, Law, Leadership, PoliticsTags Abiy Ahmed Ali, Dr. Abiy Ali, Ethiopia, FDRE, Federal Democratic Republic of Ethiopia, Loren Aho, PM Abiy, PP, Prosperity Party, Thomas Quinn, Venable LLPLeave a comment on Ethiopia: Venable LLP hired to clean Abiy’s tarnished image
Teff-Flour Patent Belongs to Ethiopia: Sanction Roosjen and his businesses now!
It is now revealed that someone named Jans Roosjen of the Netherlands has a United States Patent on the Teff Flour, the tradition food source backing done thousands of years. Roosjen is officially a pre-historical human being, he is back-to-future, he is the mirage and the answers of all things. Since he can patent something that has been part of Ethiopian culture and their practices, without their consent and without consideration. He is not the owner of Teff Flour. The United States Patent Office shouldn’t accept this, because this is taking someones national pride and food culture and stamping their ill-gotten name on it.
This is a mockery of invention, this is cultural and staple food theft. It would be like stealing french-fries from Belgium, the Kimchi from South Korea or the Feijoada from Brazil. No one owns that invention, but you cannot patent it too. This is made for the people and owned by the people, secondly, as a foreigner you should appreciate the culture, not steal it. That is what this man has done with the Patent of Teff Flour milling. Like he invented it, he didn’t invent it, he just served a document and filing to the Patent Office. They should have dismissed it as a insane thinking of a European man, who has no ownership to the food cuisine of Ethiopia.
Teff History:
“Teff (Eragrostis Tef) is a cereal crop of Poaceae or Gramineae family with small grains. It is believed to have originated in Ethiopia between 4000 and 1000 BC [1]. Teff seeds were reported to be discovered in a pyramid which is thought to date back to 3359 BC [1]. It is a primarily cultivated cereal crop in Ethiopia with high market price and socio-economic values. Its center of origin and diversity is Ethiopia” (…) “The cultivation of teff as a major cereal crop in Ethiopia was started thousands of years ago. As mentioned in the Introduction, some researchers have indicated that teff production in Ethiopia has a history of more than 4000 years. Teff is a primarily cultivated cereal crop in Ethiopia with high market price and socio-economic values” (Daba, 2017).
Encyclopedia of Life (eol.org) states this:
“Between 8,000 and 5,000 BC, the people of the Ethiopian highlands were among the first to domesticate plants and animals for food and teff was one of the earliest plants domesticated.[4] Teff is believed to have originated in Ethiopia and Eritrea between 4,000 BCE and 1,000 BCE. Genetic evidence points to E. pilosa as the most likely wild ancestor.[5] A 19th century identification of teff seeds from an ancient Egyptian site is now considered doubtful; the seeds in question (no longer available for study) are more likely of E. aegyptiaca, a common wild grass in Egypt.[6]” (eol.org – ‘Eragrostis tef’).
That Roosjen own business, which is on his page teff-grain.com, where he states: “given the fall-numbers the mixing of teff-grain or flour with other flours/seeds is patented”. That is very insane, that a man from Netherlands or Holland is thieving a 1000 year old tradition and trying to keep it to himself. That is disgusting, it would be okay if he imported it through Prograin, the company he is owns and serves, but patenting it, is taking it a bit to far.
So the Roosjen started a shop in 2004, patent it in 2006 and has forgotten the tradition of the food. It is time for the world to patent everything for Nethlands, the wind-mills and when coming to foods. It is time for Ethiopians to patent Dutch tradition food, to retaliate like Pannenkoeken, Erwtensoep, Poffertjes and Stroopwafels. Because if a random Dutch man can patent food for centuries and get away it. The Ethiopian and government, should do similar acts until the Dutch retract this nonsense. This is demeaning and insulting of all humanity. Its like patenting human life itself, Roosjen next project could be to patent one of the pyramids of Egypt. Since he could already has stolen, the pride and staple food of injeera of Ethiopia.
Roosjen, you do not own an African Cuisine, you don’t have the rights to patent 8000-year old tradition food from Ethiopia. How dear you, you should retract it and be glad to mother, that you can still import this food and the flour itself. The Ethiopian partners of yours should stop selling to you. Since, you have betrayed their tradition and their cuisine, they should boycott you and yours families business.
A Dutch Company and a Dutch Man is lucky to be able to trade the commodity, they should sanction the man. The farmers, the traders in Addis Ababa, the ones who has traded with his company and the ones licensing sale to him. Should stop immediately, he doesn’t deserve it. Because he has stolen part of the pride of Ethiopia. No one has the right to do so. No-One has the right to do so, it is insulting and demeaning.
Daba, Tadessa – ‘Nutritional and Soio-Cultural Values of Teff (Eragrostis tef) in Ethiopia’ (May 2017)
Author nilspeacePosted on March 25, 2018 March 25, 2018 Categories Africa, Business, Civil Service, Development, Ethics, Governance, Government, Law, Leadership, Trade, TransparencyTags Eragrostis Tef, Ethiopia, FDRE, Federal Democratic Republic of Ethiopia, Food Culture, glutenvrijmeel, GoE, Government of Ethiopia, Heritage, Horn of Africa, Injeera, Injera, Prograin, Staple Food, Teff, Teff Flour, Teff Seeds, Teff-Grain-Com, Tradition2 Comments on Teff-Flour Patent Belongs to Ethiopia: Sanction Roosjen and his businesses now! | {"pred_label": "__label__wiki", "pred_label_prob": 0.6010396480560303, "wiki_prob": 0.6010396480560303, "source": "cc/2023-06/en_head_0000.json.gz/line589722"} |
Trade Union Left Forum Home / News / ‘Keep Water Public’ campaign seeks referendum date
‘Keep Water Public’ campaign seeks referendum date
Fósa is one of the unions that has formed the coalition behind the ‘Keep Water Public’ campaign. Launched at the end of October, the campaign calls on the Government to confirm a date for a constitutional referendum on the public ownership of water services. The campaign is supported by Fórsa, SIPTU, Unite, Connect and the Irish Congress of Trade Unions.
Speaking at the campaign launch, ICTU president and Fórsa general secretary, Kevin Callinan, said the campaign to name the date for a referendum represented a shared commitment by trade unions to ensure the future of public ownership of water services: “It’s time now to end any lingering uncertainty about the future of water services in Ireland. A referendum would give people the opportunity to have their say, in addition to providing us all with a unique opportunity to safeguard public ownership of water for future generations.
“In that sense, there should be no further hesitation, and we are urging the Government now to name the date. In doing so, it would be taking a welcome and positive step,” he said.
Public ownership of water services ensures safe and sustainable access to water for everyone.
Assistant general secretary Catherine Keogh, who has been working closely with Fórsa members in local authorities providing water services, has said the feeling among members is very strong: “They want the Government to name the date for a referendum, to clearly indicate when we can expect to cast a vote to protect the future of our water services. That feeling is universal, so I expect we’ll see strong support for this campaign,” she said.
Fórsa’s head of Local Government Richy Carrothers said the unions had come together to maximise participation in the campaign by union members: “Privatised water services result in higher costs and poorer services for the public. Public ownership of water services ensures safe and sustainable access to water for everyone.
“A referendum would help protect Irish water services from any future attempt at privatisation, providing a constitutional guarantee of public ownership. Opinion polls show that a huge majority of the Irish public want a referendum to ensure water services can never be privatised.
“We’re inviting all union branches and members to take part in this campaign by signing the petition and talking to their local political representatives about naming a date for this important referendum.
“This is the kind of grassroots campaign that unions excel at, and I’m confident that Fórsa members will seize the opportunity to get this message across to the Government parties,” he said.
You can sign the petition here and Fórsa members are encouraged to circulate the link among work colleagues, friends and family to seek their support for the campaign.
There’s never been a better time to join a union, and it’s never been easier. Join Fórsa today.
November 3rd, 2022 by TU Left Admin | Type: Standard | {"pred_label": "__label__wiki", "pred_label_prob": 0.9323185086250305, "wiki_prob": 0.9323185086250305, "source": "cc/2023-06/en_head_0000.json.gz/line1425395"} |
Library Home » Light Page » The role of the constitutional court of Russian-federation in annexation of Crimea-2014
The role of the constitutional court of Russian-federation in annexation of Crimea-2014
The doctrine of obligatory non-recognition provides that states are under an obligation not to recognise, through individual or collective acts, the purported statehood of an effective territorial entity created in violation of one or more fundamental norms of international law. This rationale underlies the Stimson Doctrine that was used as a justification for states not to recognise the annexation of the Baltic States by the Soviet Union. This rationale is also expressed in the International Law Commission’s Article 41 of the Draft Articles on State Responsibility. The obligation is a norm of customary international law and aims at preventing that a violation of international law becomes validated by means of recognition. It contains a “minimum resistance” and “a continuous challenge to a legal wrong”. The obligation arises where a territorial entity has been created in violation of an erga omnes norm, especially by violating the prohibition of the use of force, by violating the right to self-determination, or by violating the prohibition of systematic racial discrimination.
The “Treaty on the Accession of the Republic of Crimea to the Russian Federation” was referred to the Constitutional Court on 18 March 2014 at 17:00.16 The Constitutional Court of the Russian Federation issued a unanimous judgment (the opinion) on the constitutionality of this “Treaty” in less than a day after the “Treaty” was referred to it (actually within one night), i.e. 19 March 2014. 17 Such procedural expediency (dealing with the case actually per night) is not common for any Court, including the Constitutional Court of the Russian Federation, and raises a reasonable doubt about the independence of the Russian Constitutional Court in dealing with the requested opinion.
On-the-role-of-the-constitutional-court-of-the-Russian-federation-in-the-annexation-of-Crimea
On 21 March 2014, the Russian Federation annexed the Republic of Crimea and the city of Sevastopol. This occurred after a series of events which took place in less than a month, and in which the Russian armed forces were clearly involved. The Constitutional Court of the Russian Federation received a request for an opinion on the constitutionality of the treaty on the incorporation of Crimea on 18 March 2014, and issued its opinion on the very next day, on 19 March 2014. The annexation of Crimea was completed on 21 March 2014. The Court’s opinion was a direct instrument facilitating the internal legalisation of the annexation of part of the Ukrainian territory, which is an international crime. That is an unprecedented event, since, for the first time in history, the whole constitutional court was used for the commission of the gravest international crime – the crime of aggression.
International Consensus regarding the Illegality of the Annexation of Crimea
The occupation and annexation of Crimea were denounced by the international community as a grave breach of the ius cogens obligation of non-use of force (i.e. aggression). Such a breach triggers a corresponding international obligation erga omnes not to recognise the purported statehood of an effective territorial entity created in violation of the fundamental norm of international law, as well as not to recognise any territorial acquisition that is a result of that breach.
on-the-role-of-the-constitutional-court-of-the-russian-federation-in-the-annexation-of-crimeaDownload
Tags: 2014CE Constitutional Courts Russia
Previous: Constitutional Court of Ukraine initiates suspension of membership of Constitutional Courts of Russia and Belarus in WCCJ-04/03/2022
Next: Remarks by Indian PM at 2nd India-Australia Virtual Summit-21/03/2022 | {"pred_label": "__label__cc", "pred_label_prob": 0.5648167729377747, "wiki_prob": 0.43518322706222534, "source": "cc/2023-06/en_head_0000.json.gz/line1781936"} |
Timeline: Trump's key decisions in Israeli-Palestinian conflict
Washington, DC, USAUpdated: Sep 01, 2018, 11:15 PM IST
File photo of US President Donald Trump. Photograph:(Reuters)
From the transfer of the US embassy to Jerusalem, to the halting of US aid to Palestinians, US President Donald Trump has made key moves in the Israeli-Palestinian conflict.
Here is a timeline of the key developments since 2017:
Silence on settlements
On January 24, 2017, Trump's administration refuses to be drawn on whether he backs Israel's decision to approve 2,500 new settler homes in the occupied West Bank, the biggest project of its kind for years. "He wants to grow closer to Israel," his spokesman says.
First break with Palestinians
On February 15, welcoming Israeli Prime Minister Benjamin Netanyahu to the White House, Trump halts Washington's quest for a two-state solution to the Israeli-Palestinian conflict, saying he would back a single state if it led to peace.
On March 27 new US ambassador Nikki Haley promises an end to bias against Israel at the United Nations.
Trump at Western Wall
On May 3, Trump hosts Palestinian leader Mahmud Abbas at the White House, saying of a Middle East peace agreement: "We will get it done."
On May 22, Trump becomes the first sitting US president to visit the Western Wall in Jerusalem's Old Town. Netanyahu announces new US military aid.
'Alleged' occupation
In September, US ambassador to Israel David Friedman, a longtime friend and advisor of Trump, angers Palestinians by downplaying the Israeli occupation of the West bank.
On December 6 Trump says "it is time to officially recognise Jerusalem as the capital of Israel", breaking with the policies of his predecessors and provoking criticism worldwide.
Palestinians express rage. Palestinians have since refused all contact with the American administration, and no longer accept the United States as a peace mediator.
'Slap of the century'
On January 14, 2018 Abbas denounces White House peace efforts as "the slap of the century".
On January 16 Washington holds back $65 million, more than half of what that had been earmarked for the UN relief agency for Palestinian refugees, UNRWA.
Washington says its move is not linked to tensions over Jerusalem, but it further heightens tensions with the Palestinians.
On January 25, Trump accuses Palestinians of disrespecting the United States after it snubbed Vice President Mike Pence during his visit to the Middle East.
He threatens to withhold aid worth hundreds of millions of dollars until they accede to US-brokered talks.
US embassy in Jerusalem
On March 5 Trump hosts Netanyahu at the White House and says US-Israel ties have "never been better".
On May 14, the transfer of the US embassy from Tel Aviv to Jerusalem coincides with a bloodbath in the Gaza Strip, where about 60 are killed from Israeli fire.
On June 1 the United States vetoes a UN draft resolution calling for protection measures for the Palestinians and on June 19 announces its withdrawal from the United Nations Human Rights Council over its alleged bias against Israel.
Halt to US aid
The United States announces on August 24 it has cancelled more than $200 million in aid for the Palestinians in the Gaza Strip and West Bank, then on August 31 decides to end funding for UNRWA, saying the organisation was "irredeemably flawed".
US shuts down major ransomware network Hive, helping almost 300 victims
UN survey shows opium production in Myanmar surged to a nine-year high in 2022 | {"pred_label": "__label__wiki", "pred_label_prob": 0.7478930354118347, "wiki_prob": 0.7478930354118347, "source": "cc/2023-06/en_head_0000.json.gz/line1637087"} |
Equal Education Submits Recommendations for the Proposed National Development Plan
The Equal Education Law Centre (EELC) on behalf of Equal Education (EE) has submitted a commentary on the National Planning Commission’s (NPC) Proposed National Development Plan, Vision for 2030 (the Plan).
EE welcomes that the Plan identifies improving the quality of education as one of the highest priorities in South Africa. It is promising to see that the Plan emphasises the role that education can play in building social cohesion and promoting national unity. Improving the quality of education across the country will be fundamental in eliminating poverty and reducing inequality over the next two decades.
The Plan acknowledges that inadequate school infrastructure continues to plague the education system. It calls for the infrastructure backlogs to be addressed so as to meet the “basic infrastructure and equipment standards set by the National Department of Basic Education”. However, the Plan’s call to address the lack of basic infrastructure appears to be founded on the mistaken belief that binding “basic infrastructure and equipment standards” exist and have been set by the Department. EE recommends that the Plan call for the enactment of binding regulations governing minimum norms and standards for school infrastructure as the first step in addressing the school infrastructure crisis. The Plan should also set its own vision of what facilities should be provided to learners. EE’s recently launched court case against Angie Motshekga has highlighted the Departments failure to set binding norms and standards. Without such norms and standards, any proposal to remedy South Africa’s school infrastructure crisis will fail to prove successful.
The Plan has highlighted the plight of rural schools in South Africa. Rural schools continue to endure the consequences of chronic poverty and a critical shortage of qualified teachers. The difficult working environments often found in rural schools result in teachers leaving these posts and discourage teachers from taking up these posts. The Plan suggests that teacher bursary schemes be “strengthened and expanded” and measures be put in place to ensure “graduates are immediately absorbed into schools”. However, the Plan is silent on how to attract quality teachers to rural schools. EE recommends that an incentive structure should be introduced that sufficiently incentivises teachers to take up and continue to stay in rural teaching posts. These could include increased remuneration and accommodation and travel allowances.
EE values the opportunity to assist the NPC in shaping South Africa’s national planning strategy as it relates to the improvement of basic education. EE believes that if its recommendations are incorporated, the Plan will go a long way towards achieving the 2030 vision of quality education for all.
EE’s submission can be found online.
For more information please contact Lisa Draga (EELC Attorney) on 072 650 0214 or Yoliswa Dwane (EE Head of Policy, Communication and Research) on 072 342 7747
Carla GoldsteinEqual Education Submits Recommendations for the Proposed National Development Plan 06.12.2012 | {"pred_label": "__label__cc", "pred_label_prob": 0.7079442143440247, "wiki_prob": 0.29205578565597534, "source": "cc/2023-06/en_head_0000.json.gz/line1118517"} |
Now, so what?
So you believe in God, big deal, what are you going to do about it?
In a recent interview in Rolling Stone Magazine, Bill Gates was asked about many things — his involvement in his foundation to better our world, his return to Microsoft® as their chief technology advisor, and then a surprise question. "Do you believe in God?" Here's his answer that Rolling Stone printed:
I agree with people like Richard Dawkins that mankind felt the need for creation myths. Before we really began to understand disease and the weather and things like that, we sought false explanations for them. Now science has filled in some of the realm — not all — that religion used to fill. But the mystery and the beauty of the world is overwhelmingly amazing, and there's no scientific explanation of how it came about. To say that it was generated by random numbers, that does seem, you know, sort of an uncharitable view [laughs]. I think it makes sense to believe in God, but exactly what decision in your life you make differently because of it, I don't know.
This question grabbed my attention for many reasons. My wife and I just returned from Asia. We were there for many reasons, but one of them involved a young Chinese woman precious to us. She was struggling to truly believe that God was really there for her. The question also grabbed my attention because I know that many influential people are going to be chatting, Tweeting, and Facebooking about what Gates said.
For this precious young lady, three key messages of Genesis chapters 1 and 2 were important for her to consider and ultimately believe:
Science really can't answer the source or origin for matter and energy — something to which Gates alludes in his interview. Genesis says matter, energy, and life go back to the Creator and his desire to create.
Science has a hard time coming up with a plausible answer about order out of chaos since everything in our world suggests that chaos devolves from order — entropy rules. Genesis claims that God brought order, specificity, and purpose out of chaos.
Humanity wonders if there is anything that sets us apart from all other creatures — and yes, we are creatures (created beings) according to Scripture, but those in whom resides the image of God (Genesis 1:26-27). Genesis says God made us to have relationship with us and for us to have relationship with each other.
While we have found all sorts of things to argue about in these first two chapters of the Bible, those three claims that lie behind Genesis chapters 1 and 2 are powerful messages — really startling claims — that God is behind everything that matters and that is precious to our lives as humans.
For this young woman so precious to us, each of these was a bit hard to grasp since she was raised to not believe in any religion — that things happened "naturally." The only problem was, "naturally" could only take you so far and then you were left with your own leap of faith to believe something happened somehow, to start everything we know and bring order out of the mess it began with, and then somehow we ended up as people... all by random chance and accident, with no clear way of knowing how it all began — a beginning without the Beginning-Maker, order without the Orderer, and creation without the Creator.
However, the statement Gates shared that intrigued me most is this one:
I think it makes sense to believe in God, but exactly what decision in your life you make differently because of it, I don't know.
This question is the question I wish more of us who say we believe in God — and believe his incarnation in Jesus — would ponder. It's the "Now, so what?" question that I've spent the last 37 years of ministry trying to get people to ask for themselves.
We live in a time of interior religion — very much a part of our Western culture individualism. We also live in a time when religious people are basically told, "Be nice, stay out of the way, and please keep our mouths shut in public." So I will be a bit of a contrarian, or at least a thought-provoker, within my own cultural tribe, the God-believers. I challenge us to ask that "Now, so what?" question a lot more and let our answer make an intentional difference in how we choose to live. Too many of us are running around spouting our opinions about all sorts of things. What I'd like to see more is what an old professor of mine used to call "putting your life where your mouth is."
So you believe in Jesus? Well, that's good, "Now, so what?" How do you live differently? How do you show the Jesus lifestyle in your own life? Oh, you haven't really read much of Jesus' story, you are just going by what you heard from someone else or thought you already knew? Hmm. Wouldn't it be good to go read a little about what Jesus said and did since we are given four different accounts of his life, words, and teaching? Then after spending some time with Jesus, start asking "Now, so what" about...
the way you treat your spouse?
the way you treat your kids?
the way you treat your employees or boss or coworkers or managers or...?
the way you choose how you spend your money?
the way you choose to look at people of different cultures and races?
"I think it makes sense to believe in God and I've made these changes and set these goals for my life."
the way you view truth, morality, goodness, and virtue?
the way you treat the poor, the disenfranchised, the left out, the voiceless, the vulnerable, the widow, the foreigner, the ill, your enemies, the old, and the young?
The "Now, so what?" question is the question begging to be answered — answered with changes in our lives because we believe Jesus stated and demonstrated the truth of God; truth we are going to do our best to live!
Why all this fuss? Why, Phil, is this such a big deal to you? Why burn a couple minutes of my life that I can never get back having me read this?
Because everything that matters in the end depends on what you and I do with our "Now, so what?" questions.
How do I know? Well, remember how Jesus ended his challenging teaching we call "The Sermon on the Mount"? It's the parable of the wise and foolish builder (Matthew 7:24-27). According to Jesus, the wise man whose house stood firm in the storm is the person who "hears these words of mine and puts them into practice" (Matthew 7:24). In other words, they ask the "Now, so what?" question and adjust their lives accordingly. And the foolish person? The one whose world can't stand up in the storm? Surely it's the one who doesn't believe, right? Not in this case. The foolish person according to Jesus is "everyone who hears these words of mine and does not put them into practice" (Matthew 7:26). Jesus' message goes in one ear and out the other. The message of Jesus never moves beyond data transfer. They never get around to asking the "Now, so what?" question.
So I want to challenge each of us — those of us who claim to follow Jesus — to ask the "Now, so what?" question. Let's go read a gospel* this next week. And then let's get practical with it. Let's ask the "Now, so what?" question as we read, remember, and think about Jesus' words and his example.
Sooner or later, we are going to need to be able to say, "I think it makes sense to believe in God and I've made these changes and set these goals for my life because I learned them from 'Immanuel,' God with us" (Matthew 1:23).
* The four gospels are the first four books in the New Testament, called Matthew, Mark, Luke and John. They tell the story of Jesus' life from a little different point of view shared with people who had challenges that could be answered by the life, words, and example of Jesus.
From 'Now What?' to 'What's Next'
Creation Receives a Soul
God's Good Creation
"Now, so what?" by Phil Ware is licensed under a Creative Commons License. Heartlight encourages you to share this material with others in church bulletins, personal emails, and other non-commercial uses. Please see our Usage Guidelines for more information.
believe faith creation Creator Bill Gates atheist myths truth purpose meaning entropy Beginning-maker change transformation Sermon on the Mount put into practice | {"pred_label": "__label__cc", "pred_label_prob": 0.6957842707633972, "wiki_prob": 0.3042157292366028, "source": "cc/2023-06/en_head_0000.json.gz/line1903846"} |
Some facts about June 02, 2023
Some facts about June 02, 2023: It's Friday, 153 day of 2023, 22th week of 2023, 41.92% of 2023 | {"pred_label": "__label__wiki", "pred_label_prob": 0.9997307658195496, "wiki_prob": 0.9997307658195496, "source": "cc/2023-06/en_head_0000.json.gz/line542802"} |
Upside & Downside of Fracking
The Benefits of Fracking
Many companies and individuals recognize the benefits of fracking, but there are also potential negative consequences, which will be discussed in the next section. This has led to a situation in which fracking is currently considered a controversial technique for extracting natural gas. While tapping into these vast resources is something many people are in favor of, the concerns center on what the process of fracking may be doing to the environment.
However, there are many benefits of fracking and utilizing it to access these deposits of natural gas and oil. One of the benefits is the ability for the United States to extend its supply of natural gas, which is used in many aspects of the energy industry, including home heating. Of all the fossil fuels, natural gas is the cleanest to burn, the most efficient, and the least costly. For these reasons, many newly built electric generation plants are turning to natural gas for fuel, rather than coal, creating increased demand for natural gas.
In Focus: How Hydraulic Fracturing Works
In addition to the ability to extend and use this large supply of natural gas, fracking operations can help develop the communities where plays are located. For example, according to Chevron, operators of fracking wells at the Marcellus play in Pennsylvania, this play generated $11.2 billion in what Chevron calls, “regional equivalent of gross domestic product,” and it contributed $1.1 billion to state and local tax revenues. Chevron says Marcellus also supported nearly 140,000 jobs. Fracking has become a large industry, and some people estimate that there are currently more than a million fracking wells across the country.
Environmental Concerns Related to Fracking
As with most types of energy drilling techniques, though, there are environmental concerns about fracking, and these concerns are increasing each year, due to more information coming to light about the effects fracking is having on local regions.
The most widespread concern people have with fracking techniques is that the groundwater used for residential drinking supplies will be contaminated due to leaking of the gas and chemicals used to extract it. In most wells, more than 99 percent of the fluids used are water and sand, some chemicals are added to aid in the flow of the natural gas. While the chemicals used can vary from well to well, the most commonly used chemicals include benzene, which is a known carcinogen. According to an article in Scientific American, the concern is not about a one-time fracturing operation, but multiple wells being built and operated multiple times in a geographic region. This more extensive fracking process increases the chances that groundwater will eventually become contaminated. Since no long-term studies have been conducted to evaluate fracking’s long-term effects, there is also concern that over time, due to the amount of fissures introduced into the shale, that gas and contaminants will enter groundwater.
There is also a concern that fracking processes also utilize what can be very precious water resources for their operations. It takes between 2 million and 3 million gallons of water per well to operate them. Multiply that figure by hundreds of wells, and there is a huge quantity of water required. In 2011, almost the entire state of Texas was experiencing drought conditions. One of the largest shale plays is located in Texas. It was understandable for citizens to be concerned that these wells were utilizing a resource that was much needed by its residents and other businesses. Some fracking operations, such as the Marcellus play, are creating processes to recycle their wells’ wastewater so that less water is consumed by each well.
Fracking Plays in the US
How Fracking Works
Biggest Fracking Plays
Biggest U.S. Fracking Plays
Shale Employment & Information Resources
Top U.S. Shale Play Employers | {"pred_label": "__label__cc", "pred_label_prob": 0.7103273272514343, "wiki_prob": 0.2896726727485657, "source": "cc/2023-06/en_head_0000.json.gz/line1793837"} |
Posted inGovernment & Politics, Opinion
Jim Brown makes interesting points; some are even his own
by Mark Moseley May 9, 2011 November 7, 2019
Former Louisiana Insurance Commissioner Jim Brown hosts a radio talk show on a nationwide network of affiliates. He’s also one of the most widely reprinted political commentators in the Louisiana blogosphere. From the Daily Kingfish to the Louisiana Conservative, from Bayou Buzz to various other outlets around the state, Jim Brown’s columns have received significant exposure throughout the interwebs of our region.
His site boasts that his “syndicated column appears each week in numerous newspapers and websites throughout the South.”
Unfortunately for those outlets, Jim Brown has repeatedly lifted text from other sources and inserted it into his syndicated commentaries without citation. That’s plagiarism.
I first got a whiff of it three years ago, when fellow blogger Greg Peters noted that one of Brown’s columns borrowed “great unattributed swaths” of text from another source. At the time, I discounted the error as an example of shoddy scholarship, or a lack of familiarity with the pull-quote method of Internet commentary, in which quoted text is clearly marked or set off in a different format. But Brown was on my radar after that. And, over the years, whenever I’d notice a change in narrative “voice,” I’d Google suspicious sentences from Brown’s commentaries and find that they echoed someone else’s work. These weren’t accidents or mere coincidences, either. Brown’s columns were always published subsequent to the strikingly similar texts. It was clear to me that Brown was repeatedly and intentionally borrowing directly from other sources.
Frankly, I grew tired of seeing some of my favorite sites re-publish Brown’s lifted work. I pointed this out in the comments at these sites, linking to the the lifted work, but was told to post my grievances elsewhere.
I can do that. And I’m not above admitting that this was motivated in part by good old-fashioned writer’s block. The words were not flowing at all, and then I recalled Brown’s tendency to lift text, and it inspired me to expose him.
Below is a sampling of texts that I believe were inappropriately lifted by Brown. By no means do I consider it an exhaustive list.
In his opinion column from Feb. 4, 2010 on the “Oregon approach,” you’ll see that Brown directly lifts from an op-ed by Dave Treibel at OregonLive.com published on Feb. 1, 2010. (Note that the last sentence in Treibel’s excerpt forms the crux of the first sentence in the Brown excerpt.)
The attitude seems to be that politics is permanently entrenched in the toxicity of divisive partisanship, but bright ideas always trump cynicism. The new sleek iPad tablet is loaded with impressive, sophisticated technology that Apple’s engineers have worked on for years. It’s the kind of “thinking ahead” philosophy and culture that Steve Jobs and Apple nurture and are known for. The Oregon approach seems to be what an interesting challenge it would be if they could corral an equivalent level of ingenuity and talent available to Steve Jobs to solve some of the complex issues facing their state.
Treibel:
The new sleek tablet is loaded with impressive, sophisticated technology that Apple’s engineers have worked on for years. It’s the kind of “thinking ahead” philosophy and culture that Steve Jobs and Apple nurture and are known for. I thought, “Wouldn’t it be great if Obama could corral an equivalent level of ingenuity and talent available to Steve Jobs to solve some of the complex issues facing our country?”
American politics seem permanently entrenched in the toxicity of divisive partisanship, but bright ideas always trump cynicism.
I sent these excerpts to The Oregonian for review. After inspecting both posts, an editor at The Oregonian said (my emphasis):
My own view in looking at the two pieces is that the Brown piece is a straight-out lift from a piece by Dave Treibel in “The Stump” by a blog on OregonLive.com. The Treibel piece is dated Feb. 1, 2010 and the Brown piece is dated several days later.
I agree that it’s a “straight-out lift.” Unfortunately, it’s one of many.
In the same post, Brown lifts quite dated and inaccurate information from a Los Angeles Times article published back in 2008. Brown says:
In many cases, the train runs right up the middle of the street – stations are literally on the curb.
Portland officials also drew a square around downtown and declared it a “fare less zone.” If you ride the train or the bus only within that zone, it’s free.
An identical passage from Steve Hymon’s LA Times articlefrom Aug. 18, 2008 reads:
In many cases, the trains run right up the middle of the street — stations are literally on the curb.
Portland officials also drew a square around downtown and declared it a “fareless zone.” If you ride the train or the bus only within that zone, it’s free.
I cataloged various other similarities in this Brown column to other sources here.
Another example comes from a Brown column from December 2010, where he wrote:
Friedman’s ideas were embraced by President Reagan and British Prime Minister Margaret Thatcher in the 1980s, and lauded by many in the business world. But they were also controversial because of the deep cuts in government spending and the more restricted role they entailed for government in buffering citizens from economic forces.
Aside from an added comma, those sentences are taken vebatim from this CNNMoney.com obituary of Milton Friedman published in 2006.
Here’s another example. Brown’s July 8, 2010 column reads:
On TV cameras in the court room, that are presently prohibited, Kagan is for them. Good for her on this issue. Her colleagues have for years thrown up the hoary arguments the television would undermine the high court’s “ethos” and bring forth the justices’ faces to C-Span-watching terrorists.
Again, he has swiped text and ideas from a Los Angeles Times editorial published a few days earlier on July 3, 2010:
One of the few subjects about which Supreme Court nominee Elena Kagan was forthright at her confirmation hearings was cameras in the high court. She’s for ’em. Not for the hoary arguments that televising the court’s proceedings would undermine its “ethos” and introduce the justices’ faces to C-SPAN-watching terrorists.
Here are some excerpts from Jim Brown’s column published on January 28, 2010:
For years, conservatives have argued that judicial restraint requires deferring to the choices of the elected branches of government. Statutes have been on the books since 1906 limiting corporate spending in federal election campaigns.
This same conservative court has for years limited free speech of government employees, students, and maintained a willingness to muzzle defendants through gag orders in criminal cases, but felt compelled to look out for corporate free speech. The message seems clear that conservative justices are happy to be activists when it serves their ideological agenda.
Now look at this op-ed by UC Irvine professor Erwin Chemerinsky which appeared in the Los Angeles Times a week earlier. Note the similar passages as well as the sequence of ideas and argument:
For years, conservatives have argued that judicial restraint requires deferring to the choices of the elected branches of government. McCain-Feingold was a continuation of statutes that have existed since 1906 limiting corporate spending in federal election campaigns.
The conservative majority, which in recent years has dramatically limited free speech in other areas such as for government employees and for students was willing to expand the free speech of corporations. There is no way to see this other than as the conservative justices using judicial review to advance the traditional conservative ideological agenda.
The Los Angeles Times declined comment when I asked them about the similarities in these passages.
The sixth paragraph in this Jim Brown piece from August 19, 2010 reads:
Shortly after the Times story ran, conservative media personality Laura Ingraham interviewed Abdul Rauf’s wife, Daisy Khan, while guest-hosting “The O’Reilly Factor” on Fox. In hindsight, the segment is remarkable for its cordiality. “I can’t find many people who really have a problem with it,” Ingraham says of the mosque project, adding at the end of the interview, “I like what you’re trying to do.”
Now compare this excerpt from a Salon article published on Aug. 16, 2010:
Conservative media personality Laura Ingraham interviews Abdul Rauf’s wife, Daisy Khan, while guest-hosting “The O’Reilly Factor” on Fox. In hindsight, the segment is remarkable for its cordiality. “I can’t find many people who really have a problem with it,” Ingraham says of the Cordoba project, adding at the end of the interview, “I like what you’re trying to do.”
Again, there’s not even a hint of citation for any of the above excerpts. Brown just brazenly passes them off as his own. This pattern is too pervasive and frequent to be excused as accidental or isolated “lapses.” Also, Brown has tweaked and modified the text enough to show that this is not merely a matter of sloppiness.
The above examples are only a sampling of instances where Brown has lifted text. I’d bet the farm there’s more.
From what I’ve seen, when Brown lifts text, it’s usually only a few sentences, here and there. But it’s still wrong to do this without attribution, especially if you are being widely re-published. (In fact, if you’re using online search engines, the multitude of web sites that dutifully publish Brown’s columns serve to camouflage the original work.) He doesn’t do it in every paragraph, nor in every opinion piece. But he identifies himself as a writer, yet has repeatedly committed one of the biggest sins in writing.
Brown’s Wikipedia page says that “Though his training is in law, his knowledge of Louisiana history and politics is seemingly unlimited. Brown sometimes teaches classes in Louisiana history, of which he is an undisputed authority…”
High praise, indeed. And there seems to be some truth to that; most of the unattributed lifts occur when Brown is discussing national issues rather than Louisiana issues. Perhaps Brown is outside his comfort zone on these matters, or maybe he just gets lazy. Either way, it’s wrong to swipe ideas and words from other writers. That’s just common sense.
Granted, these lifted quotes rarely form the heart of Brown’s commentaries. They’re just sprinkled around, here and there. They aren’t the worst cases of intellectual theft I’ve ever seen, but, then again, they don’t have to be. Any intentional misappropriation of text is too much. It’s unethical, and Brown knows better. After all, he is a writer, author, publisher, radio pundit, father of Campbell Brown, the a famous TV news reporter, and “Hall of Fame” caliber ex-politician. This is a man who continues to claim he was wrongfully convicted of making false statements to the FBI, yet he needlessly harms his remaining credibility by stealing other people’s work.
Brown signs off on all his columns with the phrase “Peace and Justice.” Well, Brown does no justice to his sources when he uses their ideas and words without attribution. And if exposing this fact creates less peace for the numerous outlets which reprint his columns – so be it.
Mark Moseley blogs at Your Right Hand Thief. Until mid 2014, Mark Moseley was The Lens' opinion writer, engagement specialist and coordinator for the Charter Schools Reporting Corps. After Katrina and... More by Mark Moseley | {"pred_label": "__label__wiki", "pred_label_prob": 0.7554917931556702, "wiki_prob": 0.7554917931556702, "source": "cc/2023-06/en_head_0000.json.gz/line1201810"} |
Santa Rita Water Reclamation Facility
Alternative Site Investigation: WWTP
A New Wastewater Treatment Plant?
At the September 1, 2015 City Council Meeting, Council directed staff to amend the City's existing agreement with Mulhern, MRE and expand the scope of work to include a supplemental analysis of three privately owned parcels located on the eastside of the Animas River approximately 1.5 miles downstream of the existing Santa Rita Wastewater Treatment Plant Site. The results of this analysis are included in the attached report. WWTP Alternative Site Addendum (PDF) | Report Appendix A1 (PDF)
In June of 2015, City contracted with Mulhern, MRE for the purpose of evaluating the technical and financial feasibility and efficacy of relocating the City's wastewater treatment plant downstream of the current location. Mulhern recently completed the Santa Rita Wastewater Treatment Plant Alternative Site Investigation which outlines the findings from this analysis.
Following a review of the Dewberry cost estimates associated with relocating the City's WWTP to an alternative location, City Council instructed the City Manager to commission a more detailed study of possible alternative sites and costs associated with locating the plant downstream of the High Bridge. As part of this process the City asked Mulhern to identify and evaluate two possible site locations; investigate in detail three infrastructure conveyance alignments to transport the wastewater to a new site; and to provide costs estimates for the total relocation including the costs of a new treatment plant, land acquisition, pipelines and all necessary pumping systems.
The costs comparisons from the Study for the rehabilitation and expansion of the plant at the Santa Rita Site versus the two alternatives are include in the below table. Details of this study are included in the attached report and outlined in the Mulhern's presentation given to City Council at the August 11, 2015 Study Session and presented at a Public Meeting held on August 12, 2015.
Mulhern's August 11 Presentation (PDF) | WWTP Alternative Site Investigation Report (PDF) | Report Attachment (PDF)
A supplemental presentation given by City Manager, Ron LeBlanc at several public meetings regarding the site selection process is available here.
City Manager's Presentation (PDF)
Santa Rita Park
Project Construction Checklist
Comprehensive Interpretive Plan (PDF) | {"pred_label": "__label__cc", "pred_label_prob": 0.6841027140617371, "wiki_prob": 0.31589728593826294, "source": "cc/2023-06/en_head_0000.json.gz/line1236860"} |
Former Japanese Prime Minister Shinzo Abe Shot During Speech
Former Japanese Prime Minister Shinzo Abe was shot at a campaign address in western Japan on Friday and is now in heart failure, according to NHK public television.
According to national network NHK and the Kyodo news agency, the former leader was giving a stump speech at a gathering before Sunday’s upper house elections when what appeared to be gunshots were heard.
According to a source from his ruling Liberal Democratic Party, Abe, 67, was bleeding from the neck when he slumped.
Local police and the LDP were unable to corroborate the reports quickly.
Both NHK and Kyodo stated that Abe had been transported to the hospital and seemed to be in cardiorespiratory arrest, a term used in Japan to indicate the absence of vital signs and usually occurs before a coroner formally declares someone dead.
He appeared to have been shot from behind, maybe with a shotgun, according to a number of media outlets.
NHK provided no additional information; however, it was stated that a man had been captured.
Abe, the longest-serving prime minister in Japan, was in power from 2012 to 2020 and again from 2006 to 2006.
During Abe’s address, an NHK reporter who was on the scene reported hearing two consecutive bangs.
NHK, a local public network, initially reported that Abe had been shot during the address. | {"pred_label": "__label__wiki", "pred_label_prob": 0.915287435054779, "wiki_prob": 0.915287435054779, "source": "cc/2023-06/en_head_0000.json.gz/line1021369"} |
Dunkin Donuts Locations in Longwood, FL
United States > FL > Longwood Dunkin Donuts Locations
-81.327868 28.6923027
801 E State Road 434
Find Dunkin Donuts in Longwood FL the easy way.
Dunkin Donuts in Longwood FL is a doughnut company and coffee chain specializing in food and beverage. Dunkin Donuts was founded in 1950 by William Rosenberg in Quincy, Massachusetts and have headquarters in Canton, Massachusetts with more than 15,000 locations throughout the world.
Find the nearest FL Longwood Dunkin Donuts location. Your comments and suggestions are always welcome, visit our About page for more information.
• Dunkin Donuts in Florida City, FL • Dunkin Donuts in Leesburg, FL • Dunkin Donuts in New Smyrna Beach, FL • Dunkin Donuts in Lutz, FL • Dunkin Donuts in Wesley Chapel, FL • Dunkin Donuts in Sebastian, FL • Dunkin Donuts in Green Cove Springs, FL • Dunkin Donuts in Oviedo, FL • Dunkin Donuts in Belleair Bluffs, FL • Dunkin Donuts in Fort Myers Beach, FL | {"pred_label": "__label__cc", "pred_label_prob": 0.5826426148414612, "wiki_prob": 0.4173573851585388, "source": "cc/2023-06/en_head_0000.json.gz/line1810935"} |
Home Vincent Bohanan and the Sound of Victory Choir
Vincent Bohanan and the Sound of Victory Choir
May 14, 2022 3:00 PM to 5:00 PM
Join us for an afternoon of uplifting and inspirational gospel music with Vincent Bohanan and the Sound of Victory Choir. Vincent Bohanan founded the choir in January of 2014. Highlights include recording with Grammy Award winning gospel artist Cece Winans, backing up P. Diddy during the 2015 NBA All-Star Weekend & Bad Boy Reunion Tour, as well as Mariah Carey’s “All I Want for Christmas” Tour.
SOV has also been a featured choir for Bishop Hezekiah Walker’s annual Resurrection Sunday Concert, sharing the stage with many celebrity gospel artists. The choir has been seen on The World Network for the Dorinda Clark Show. SOV has traveled across the US and has conducted a European tour twice. In 2017, after releasing their third single “We Win: The Kingdom Declaration” which premiered at #1 on the Billboard’s Single’s Chart, SOV was nominated for two Stellar Awards in 2018. They also signed with Hez House Music Label, under the umbrella of RCA Records. Their latest release is the single "Any Day Now" which was followed by the album "Live in Chicago" in early 2021.
The choir provides young minorities who have experienced poverty-stricken circumstances or who feel alienated and rejected by society, to turn their lives around and through music share their transformation with all who will lend an open heart. The choir consists of 40-50 young singers and musicians who commute from across the New York City Metropolitan area and as far as NJ, CT, and the DMV area.
The Unity Choir of the Black Ministers’ Association (BMA) of York, PA is comprised of dynamic voices and musicians from various ministries with the goal of enhancing the community through unification and song.
Event Type Live Music
Date & Time May 14, 2022 3:00 PM to 5:00 PM | {"pred_label": "__label__wiki", "pred_label_prob": 0.7396606802940369, "wiki_prob": 0.7396606802940369, "source": "cc/2023-06/en_head_0000.json.gz/line1091691"} |
13 Aug 2006 Defamation as Tactic: Promoting Global Warming Alarmism by Misleading Readers
Posted at 11:04h in Articles, Blog, Environment and Enterprise Institute, Global Warming by Amy Ridenour
I offer here a case study in the way journalists serve the cause of global warming alarmists — in this particular case, by claiming scientists are associated with the fossil fuel industry using “evidence” even a superficial investigation would have rendered void, and by misleading readers in other ways.
In June, columnist Tom Hennessy of the Long Beach Press-Telegram wrote a laudatory column about Al Gore’s movie, “An Inconvenient Truth.” Two readers whose critical letters were published by the newspaper included the Australian scientist Dr. Bob Carter (letter published June 29), and Canadian scientist Dr. Tim Ball (letter published June 26).
Hennessy responded with another column, “Sense Wins in Heated Debate,” published July 5, in which he ignored the substance of both scientists’ letters, preferring instead to lead readers to believe two things for which he had scant-to-zero evidence: 1) both scientists had received funds from the energy industry, and 2) in exchange for these funds, the scientists have agreed to espouse views they otherwise would not.
Hennessy’s July 5 column reads, in part:
My new best friend is reader Kevin Powell. He won me over with an e-mail which, in part, said this:
“Sheeeeeesh! What’s going on at the P-T editorial room? You write a nifty, inoffensive piece on Al Gore’s new film and the anti-global warming dingbats explode with atomic force.”
Powell was referring to Tim Ball, retired University of Winnipeg climatology professor, and Bob Carter, a professor at Australia’s James Cook University. Both wrote to the P-T last week, chastising me for suggesting that Gore’s film and book, “An Inconvenient Truth,” carries a message we should all consider.
Asked reader Powell, “Isn’t the editorial board supposed to be on alert for that kind of thing and not let the P-T be used as part of a propaganda campaign?”
It’s a valid question. Hand in hand with industry polluters, Ball and Carter seem to be caught up in a movement to debunk Gore and global warming…
Let’s start with the Australian global warming skeptic, Bob Carter. Melissa Fyfe, who writes for The Age, a Melbourne newspaper, notes that Carter is a member of the so-called Lavosier Group, a collection of global warming skeptics who are discredited by “the vast majority of scientists.”
Debunking climate change, says Fyfe, “has also been taken up by right-wing think tanks, such as the Institute of Public Affairs,” which “receives funding from companies such as ExxonMobil.” Carter et al., she writes, constitute a “sophisticated machine that has successfully created the impression that climate change science is mired in uncertainty.”
In British Columbia, where skeptic Tim Ball lives in retirement, The Tee, an online publication, says “ExxonMobil has been astonishingly successful in delaying action on global warming for more than a decade.”
Tyee also says Ball “is in high demand by the front groups sponsored by the fossil fuel industry. Ball’s particular niche is the argument that since 1940, the world’s climate has actually been cooling.”
The online publication says Ball is promoted by the National Center for Public Policy Research, which has received funding from ExxonMobil, and Tech Central Station, which is supported, by, among others, General Motors…
Hennessy’s not-so-subtle message: Dr. Carter has been bought by industry, therefore, his views should be disregarded. Hennessy, however, shows no evidence linking Carter to industry, let alone that Carter’s views are for sale.
Hennessy’s attack on Dr. Tim Ball caught my eye because Hennessy dragged this institution, the National Center for Public Policy Research, into the fray.
Dr. Ball’s published letter to the Press-Telegram said, in part:
I have seen the movie [An Inconvenient Truth] and, as someone with a doctorate in climatology, have studied the subject so long that when I began, the scientific consensus was that we were heading for another ice age. But Gore doesn’t understand that consensus is not a scientific fact. It is also clear he doesn’t understand how science works.
The global warming theory assumed carbon dioxide (CO2) traps heat in the atmosphere, and if it increases because of human additions to the total, then global temperature would rise. Unfortunately, environmentalists and people who saw human use of energy to develop technology and industry as wrong saw it as an opportunity to undermine Western development and civilization.
They politicized the issue and converted a scientific theory to a fact. Scientists like myself who tried to ask questions were called skeptics or more recently deniers with all the holocaust connotations.
The real inconvenient truth is that the fundamental assumption that CO2 causes warming has proven incorrect. Not only is the human portion not the cause, but CO2 itself is not the cause of global warming or climate change. Ice core records covering 420,000 years show temperature changing before CO2, not the other way around as implied by Gore.
In the 20th century most warming occurred before 1940, when production of CO2 was low. From 1940 to 1980, global temperatures went down while human addition of CO2 increased most dramatically. Since 1998 global temperatures have declined while human production of CO2 continues to increase.
I would gladly sit down with Mr. Hennessy and go through Gore’s movie, scene by scene, and explain how it is distorted, taken out of context or otherwise manipulated.
Tim Ball
On July 7, I wrote to Tom Hennessy, for reasons the letter makes clear:
Dear Mr. Hennessey-
Via Google, I happened upon your July 5 commentary, “Sense Wins in Heated Debate.”
With all due respect, isn’t it just a bit misleading to report that “[Dr. Tim] Ball is promoted by the National Center for Public Policy Research, which has received funding from ExxonMobil”? This makes it appear as though Dr. Ball received cash from us, and by extension ExxonMobil, when in fact all we did was reprint a small amount of his writing on one of our websites.
By that standard, every newspaper that publishes an op-ed by an outside pundit is a “promoter” of the pundit, and the pundit becomes associated with the beliefs and practices of the newspaper’s advertisers.
Google also reveals that Dr. Ball has had his writing published in a number of newspapers. Are they “promoters” as well? I wouldn’t be surprised if some of those papers have from time-to-time run ads for the fossil fuel industry, or, perhaps, from automakers. Horrors.
As it happens, Dr. Ball has never received a penny from us, and our support from ExxonMobil amounts to less than one percent of our budget. This leaves Dr. Ball with zero percent of less than one percent. Not much! Yet, apparently, worthy of note in the press.
Even though I’ve never met, talked to, or otherwise communicated with Dr. Ball, I know he has extensive scientific expertise. Possibly his ideas should be evaluated on their merits, instead of on the basis of his supposed association with us?
Amy Ridenour
The National Center for Public Policy Research
Hennessy’s response:
Dear Ms. Ridenour
The next time you “happen upon” one of my columns, via Google, I hope you will read it more carefully than you did the last one. You wrote:
“With all due respect, isn’t it just a bit misleading to report that ‘{Dr. Tim} Ball is promoted by the National Center for Public Policy Research, which has received funding from ExxonMobil.'”
That comment did not originate with me. It came from the Tyee, an online publication based in British Columbia. The sentence clearly attributed the thought to the online publication. I assume you have written to them as well.
You also said, “As it happens, Dr. Ball has never received penny from us…” I never said he did.
Since you seem to present yourself as something of an expert on climate change, I assume you are well aware that Dr. Ball’s views are among a minority in the scientific community.
Although we seem to be on opposite sides re this change, I appreciate your having written me to share your views.
Tom Hennessy, Columnist
Press-Telegram, Long Beach, Ca
I responded, somewhat less cordially:
Dear Mr. Hennessey,
Thank you for your reply. I appreciate it.
I hope my reference to “happening” upon one of your columns was not taken as an insult, as none was intended. If I lived in your area of the country, I am sure I would be a subscriber and a regular reader.
As to the column we are discussing, I read it quite carefully, several times, and again after reading your recent correspondence. I am unable to draw any conclusion other than that you intended to undermine Dr. Ball’s credibility as an honest scientist after a letter by him disagreeing with you was published by your newspaper.
You refer to Dr. Ball and another scientist, Dr. Bob Carter, as acting “hand in hand with industry polluters” and say “some readers appear to have been taken in by them.”
You use juxtaposition to imply a connection between Dr. Ball and ExxonMobil: “In British Columbia, where skeptic Tim Ball lives in retirement, The Tyee, an online publication, says ‘ExxonMobil has been astonishingly successful in delaying action on global warming for more than a decade.'” Whether ExxonMobil has been successful in influencing public policy in British Columbia actually says nothing about Dr. Ball, but a casual reader will infer from your construction that the two are connected.
You further write: “Tyee also says Ball ‘is in high demand by the front groups sponsored by the fossil fuel industry…’“ In the Tyee, author Donald Gutstein identifies two organizations as having received “policy briefings” by Dr. Ball. These, presumably, are the “front groups.” The first is one of the most respected think-tanks in the world, the 32-year-old Fraser Institute, which receives one percent of its funding from ExxonMobil. It is best known internationally for its work on health care and economics. According to its website, Dr. Ball spoke there in 2005 and co-wrote a paper for them in 2004 on “limitations that hinder the usefulness of climate models.” The other “front group” is the Frontier Centre for Public Policy, which, according to its website, receives less than 20 percent of its income from all corporate sources combined, and which does not appear to consider energy policy/climate change among its top priorities. Based on a search of their website, its one connection to Dr. Ball is that he delivered a lecture there in 2004.
The best that can be said in your favor is that these facts paint a far more nuanced picture than what your readers learned from you after you chose to run an unchallenged quote that Ball “is in high demand by the front groups sponsored by the fossil fuel industry.”
A more factual description more likely is that, over a two-year period, a retired academic spoke once time each to two of Canada’s most prestigious think-tanks, and co-wrote a paper for one of them. I can understand why this latter formulation would not strike a propagandist as a good way to undermine Dr. Ball’s professional credibility, but the fact that the Tyee’s formulation was stretched beyond reason should have been obvious to a professional journalist, if that professional journalist was doing any fact-checking whatsoever.
Then your article asserts a connection between our group and Dr. Ball: “The online publication says Ball is promoted by the National Center for Public Policy Research, which has received funding from ExxonMobil…” I explained why this is simply silly in my earlier e-mail to you. In your reply, you essentially disavowed responsibility, blaming Donald Gutstein’s article in the Tyee for any errors, as that was your source.
I am unwilling to let you off the hook so easily. Donald Gutstein and the Tyee misled its readers, but you misled yours. First, you used juxtaposition and implication to undermine a scientist’s reputation for honesty. Then you found and quoted another columnist who was doing the same thing — tarring a man’s reputation by misleading readers. You had the choice of checking the Tyee’s facts, and apparently did not take it (let us hope that you did not). Yet, it is your professional responsibility to check your facts. You write a professional column for a significant newspaper. When you write about serious issues, your readers expect more fact-checking than they would from a drunken sophomore posting his personal views for his frat buddies to read on MySpace. They didn’t get it. Depending on the sophomore, they may have gotten less.
You could have picked up the telephone. You could have done something even easier, and Googled the terms “Tim Ball” and the name of our group. The #1 entry when one does this is a May 3, 2006 blog post by me demonstrating the unreliability of Donald Gutstein’s Tyee article. Likewise, a joint search for “Tim Ball” and “Donald Gutstein” brings up the refutation of the Gutstein piece in #1 position. Even “Tim Ball” and “ExxonMobil” will do it, or “Tim Ball” and “coal.”
I realize this e-mail may be considered harsh, but imagine how your column made your targets feel.
Columnist Tom Hennessy did not respond to my second e-mail. I checked the Long Beach Press-Telegram later to see if a correction or clarification had been run to acknowledge that the Press-Telegram, through a staff column, had defamed two scientists, but I found no acknowledgement or apology. | {"pred_label": "__label__wiki", "pred_label_prob": 0.5640589594841003, "wiki_prob": 0.5640589594841003, "source": "cc/2023-06/en_head_0000.json.gz/line1904875"} |
The Minnesota State system is the largest single provider of higher education in the state of Minnesota and the third largest system of colleges and universities in the United States. The system includes 37 state colleges and universities (30 colleges, 7 universities and 54 campuses) spanning across 47 Minnesota communities serving more than 340,000+ students annually.
Minnesota State Colleges and Universities offer 3,885 academic programs, including 802 fully online programs. Minnesota State Colleges and Universities also deliver 13,500 customized training, occupational and professional classes to businesses and other employers.
South Central College is a Minnesota Community and Technical College with campuses in North Mankato and Faribault. South Central offers a variety of educational opportunities including: Associate of Arts, Associates of Applied Science, Associates in Science, diplomas and certificates.
South Central College is leading the way in business partnership for gainful employment, manufacturing, and applied research. South Central College has an excellent Center of Business and Industry that provides credit and non-credit continuing education and training for businesses, non-profits and government agencies.
Minnesota West Community and Technical College
Minnesota West is a comprehensive community and technical college with five campuses in Minnesota: Canby, Granite Falls, Jackson, Pipestone and Worthington. Minnesota West also has centers in Fairmont, Luverne, Marshall and Redwood Falls.
Students at Minnesota West have the opportunity to earn an Associate’s Degree, diploma or certificate in over 60 disciplines.
Southwest Minnesota State University is located in Marshall, MN. On July 1, 2014, SMSU permanently established the School of Agriculture. The School of Agriculture is a part of SMSU's College of Business, Education and Professional Studies.
Southwest Minnesota State University is a four-year public university offering a high quality education in the liberal arts and professions to prepare you for a life that is successful both personally and professionally. SMSU has grown into a university of choice with high national rankings, producing scholars who become the leaders, thinkers, and entrepreneurs of the future. Students and faculty alike come here to engage in the rich "Southwest Experience," which starts with strong academics, fulfilling social opportunities and support from fellow Mustangs.
Riverland Community College has campuses in Albert Lea, Austin, and Owatonna. Riverland has six new agricultural programs including Precision Agriculture, Food Science, Food Science Technology, Agricultural Sciences, Biotechnology, and Agribusiness. These programs join Riverland’s established Farm Business Management program, one of the college’s most popular programs.
Riverland Community College is dedicated to our students, our mission, and our communities.
Minnesota State University, Mankato is a four-year public university in Mankato offering degrees and programs across a wide variety of majors. Minnesota State-Mankato is a place where big ideas become real-world solutions that have a positive impact across Minnesota.
Rochester Community and Technical College
Rochester Community and Technical College is located in Rochester, MN and provides accessible, affordable, quality learning opportunities to serve a diverse and growing community.
Rochester Community and Technical College will be a universal gateway to world class learning opportunities.
Dakota County Technical College
Dakota County Technical College is located in Rosemount, MN and endeavors to serve students within nearby communities, as well as those coming from countries around the world. The majority of students work toward degrees and diplomas in a variety of programs to prepare them for employment.
DCTC has become a leader in delivering sustainable technologies, service-learning opportunities, and community engagement into the curricula of most programs. | {"pred_label": "__label__wiki", "pred_label_prob": 0.6967706084251404, "wiki_prob": 0.6967706084251404, "source": "cc/2023-06/en_head_0000.json.gz/line767860"} |
How to Watch All Thirteen (!) <i>Halloween</i> Movies In Order
How to Watch All Thirteen (!) Halloween Movies In Order
Michael Myers simply will not die.
By Justin Kirkland
Imagine being a cool girl, just trying to live your life in Haddonfield, Illinois. It's fall, and my God, you love fall. You offer to do your dad (a realtor in town trying to sell a house) a favor by dropping off a key at one of his properties. Of course, it just so happens that at the same time, the boy who used to live there sees you, remembers everything about you, and then tries to kill you. This is why you should never do anyone any favors.
This is the start of the Halloween franchise, for you non-Michael Myers heads in the room. (Which is based on a true story, FYI.) Though, I suppose you should have been tipped off to the multi-film run by the headline of this article. You're here because you're searching out how to watch Halloween the right way, which is understandable. It's a stellar seasonal film that should be in the top 10 of any slasher movie fan. (It certainly is in ours.) But when you get into the details of the Halloween franchise, you'll quickly learn that there aren't just a couple of sequels. There are thirteen films in total. A full baker's dozen. And there are more planned! To what end, Michael Myers? TO WHAT END?
Something important to know: not all Halloween films are created equal, and thus, we take no responsibility for the time you will inevitably waste if you choose to watch Halloween: Resurrection. That's on you. But for the hell of it, let's explore all 13 and their respective timelines because, yes—you bet your ass there's multiple. (Need more gore? Check out the best zombie flicks ever next.)
It's the OG. The indisputable GOAT of the franchise. The film introduces us to Laurie, who seemingly gets mixed up with Michael Myers at random (more on that in a minute). He begins to stalk her, intent on killing her, but as the multiple movies suggest, Laurie doesn't go down without a fight. Of all the scream queens out there, Jamie Lee Curtis is the one to beat.
Picking up almost directly where the first left off, Michael and Laurie square up again—this time, ending in an all out hospital brawl. And while neither of them make it out unscathed, the fate of a central figure comes to a close... for now.
Halloween III: Season of the Witch
For purists, this film is garbage, largely because it doesn't even feature Michael Myers. For horror fans, it's become a cult favorite as the single standalone film in the franchise. There's witchcraft, Stonehenge, and commercials. Make of that what you will.
Like, well, most fourth installments (except Land Before Time, which is a perfect franchise), Halloween 4 will leave you feeling deflated. As the title suggests, it does feature the return of Michael Myers, but it spends most of its time chasing the high of the first film with little to no effectiveness.
Halloween 5: The Revenge of Michael Myers
Good for Donald Pleasance for, presumably, working a multi-film deal into his contract.
Halloween: The Curse of Michael Myers
To be frank, we're still on the downward slope here, but Donald Pleasance returns as Dr. Loomis, offering a bit of consistency. This one also features Paul Rudd playing Tommy, the boy Laurie Strode babysat in the first film.
Great news: the timeline starts over with Halloween H20, which is an objectively terrible name for a subjectively decent movie. Following the events of 1981's Halloween II, the film brings back Jamie Lee Curtis, alongside a list of upcoming actors from 1998. Michelle Williams! Josh Hartnett! Joseph Gordon Levitt! I mean, LL Cool J is here, too. This is a party.
Halloween: Ressurection
Michael Myers is beheaded (and survives). Laurie Strode is thrown off a building (and dies—after 24 years in the franchise??). Make it make sense!
Rob Zombie really said, "I'm going to take this concept and just create my own universe." Classic Rob. A bit of a reimagining based on the original, Halloween manages to give Michael Myers a bit more backstory (and falls heavily on Laurie Strode being Michael's sister), but truly had no chance of unseating the original.
For some reason, Octavia Spencer and Weird Al Yankovich are in this sequel. That's all I can remember because the rest of my mind is absolutely drenched in all the blood and gore that outweighs the rest of the movie.
In the 2018 reboot, Myers and Strode face off one more time. Reworking the timeline, this Halloween only incorporates the first film into its timeline. All these years later, Laurie is still vexed by Michael knowing he's out there, though her family thinks she's nuts. That's fine... until he actually does show up again.
Following up on the massively successful reboot from 2018, Halloween Kills surpassed expectations and made over $131 million at the box office. Though it appeared that Myers was quite literally toasted in that house fire, he is back and Laurie Strode has someone on her side that she's never had before: Judy Greer.
Will Halloween truly end in the upcoming finale to David Gordon Green's latest Michael Myers trilogy? We doubt it! But that hasn't stopped Jamie Lee Curtis from touting her last appearance in the horror series as the "final reckoning."
Justin Kirkland Writer Justin Kirkland is a Brooklyn-based writer who covers culture, food, and the South.
19 Facts You Didn’t Know About Deadpool
When Will James Cameron Let Us Stream Avatar?
We Need an Academy Award For Best Animal Actor
Your Lord and Savior 'M3GAN' Is Streaming
The Most Anticipated Documentaries of 2023
Steven Spielberg Says 'The Dark Knight' Was Robbed
Check Out These Vintage Awards Show Photos
'Dungeons & Dragons' Looks Deliciously Batshit
Paul Mescal's Family Is Hyped About His Oscar Nom
There's One Way You Can Right Tom Cruise's Snub | {"pred_label": "__label__wiki", "pred_label_prob": 0.8308677673339844, "wiki_prob": 0.8308677673339844, "source": "cc/2023-06/en_head_0000.json.gz/line909991"} |
Man gets 9 years in prison for plane sex assault
Detroit – An Indian man living in the U.S. on a work visa was sentenced to nine years in prison Thursday for sexually assaulting a sleeping woman during an overnight flight to Detroit.
Prabhu Ramamoorthy was in a middle seat sitting next to the victim while his wife was in an aisle seat on a Spirit Airlines flight from Las Vegas last January. The 23-year-old victim said he unzipped her pants, unbuttoned her shirt and molested her with his hands.
Prosecutors asked for a sentence of nearly 11 years, but U.S. District Judge Terrence Berg settled on a nine-year term. He said he hoped it would be “grave enough” to deter others from committing similar crimes.
A jury convicted Ramamoorthy in August . He will be deported to India after serving his sentence.
The victim, a model, declined an opportunity to speak in court. She watched the hearing from the first row with her boyfriend and a support dog.
At trial, she testified that she woke up during the flight and “saw his hands inside me.” She said she felt “petrified, frozen.”
“Everyone has the right to be secure and safe when they travel on airplanes. … We appreciate the victim in this case for her courage to speak out,” U.S. Attorney Matthew Schneider said.
Ramamoorthy, 35, has lived in suburban Detroit since arriving in the U.S. on a work visa in 2015. He and his wife were returning to Detroit on the Las Vegas flight after a trip to the Grand Canyon.
Speaking through a Tamil interpreter, Ramamoorthy said he didn’t want to make a statement before getting his sentence. The judge noted a lack of remorse but acknowledged that Ramamoorthy had a right to stay silent.
Defense attorney James Amberg asked for a prison sentence of less than 10 years. He said the conviction will bring “severe and lifelong consequences” to Ramamoorthy and his wife when they return to southern India.
“His life is effectively over,” Amberg told Berg. | {"pred_label": "__label__wiki", "pred_label_prob": 0.9458049535751343, "wiki_prob": 0.9458049535751343, "source": "cc/2023-06/en_head_0000.json.gz/line1517322"} |
Home News Boudica is NOT a terrorist: Supreme Court rules Celtic warrior queen is a 'national hero' in modern-day mock trial... nearly 2000 years after she sacked three Roman cities and left '80,000 dead' during brutal rampage
Boudica is NOT a terrorist: Supreme Court rules Celtic warrior queen is a 'national hero' in modern-day mock trial... nearly 2000 years after she sacked three Roman cities and left '80,000 dead' during brutal rampage
As queen of the Iceni tribe, she burnt London to the ground and was responsible for the deaths of 80,000 civilians.
But yesterday, Boudica was acquitted in a 'trial' at the Supreme Court of having committed terrorist acts against a 'rotten and illegitimate Roman government' nearly 2,000 years ago.
The female warrior led the Iceni's revolt against occupying Roman forces from AD60-61 after they reneged on a deal to let her people rule themselves.
She is also believed to have been flogged and her daughters raped.
Thousands of members of the tribe marched from their home in what is now Norfolk to ravage the Roman cities of Camulodunum (Colchester), Londinium and Verulamium, which was near what is now St Albans in Hertfordshire.
In her trial, which was run by the education charity Classics for All and involved QC lawyers, the warrior queen was 'charged' under the Terrorism Act 2000.
However, by a margin of ten to one, the 50-strong jury accepted that the atrocities committed by Boudica and her people were justified acts of self-defence, The Times reported.
After she was acquitted, judge Lord Justice Stephens said Boudica was free to leave 'without any stain on your character and remain as a national symbol of an inspirational hero'.
As queen of the Iceni tribe, she burnt London to the ground and was responsible for the deaths of 80,000 civilians. But yesterday, Boudica was acquitted in a 'trial' at the Supreme Court of having committed terrorist acts against a 'rotten and illegitimate Roman government' nearly 2,000 years ago
Roman historian Tacitus described the subsequent march on the three ancient cities, saying that Boudica's tribe targeted places where 'loot was richest and protection weakest'
She was accused of using 'action involving serious violence against persons, namely the inhabitants of Camulodunum, Londinium and Verulamium.'
The indictment added that her action was designed to 'influence the government of Rome or to intimidate the public or a section of the public, for the purpose of advancing a political or ideological cause, namely Iceni dissidence and secession.'
The prosecution, which was brought on behalf of the 'Senate and People of Rome', was led by high-flying QC Alison Morgan.
She was the leading counsel in the case of Khairi Saadallah, who murdered three men in a terrorist attack in Reading last year.
Morgan reportedly urged the jurors not to 'buy the hype'. She said that whilst the Romans had flogged the queen and raped her daughters after the death of her husband, Prasutagus, 'that cannot justify an act of mass murder'.
However, defence lawyer Thomas Grant QC called Boudica a 'brave woman' who had been a victim of Roman 'propaganda'.
In her trial, which was run by the education charity Classics for All and involved QC lawyers, the warrior queen was 'charged' under the Terrorism Act 2000
The indictment added that her action was designed to 'influence the government of Rome or to intimidate the public or a section of the public, for the purpose of advancing a political or ideological cause, namely Iceni dissidence and secession.' Above: The trial held at the Supreme Court yesterday
The REAL story behind 'The Last Duel': How warring knights... Ex-Bishop of Rochester converts to Catholicism after...
After she was acquitted, judge Lord Justice Stephens (left) said Boudica was free to leave 'without any stain on your character and remain as a national symbol of an inspirational hero'. The prosecution was led by high-flying QC Alison Morgan and the defence were represented by Thomas Grant QC (right)
He added that he was 'confident' the jury would 'do justice to a Briton' because her actions were the only 'conceivable response' to the Romans' actions.
Before his death, Boudica's husband had been ruler of the Iceni people. The Romans had allowed him to continue as king, ruling on their behalf.
He made a deal with the Romans that when he passed away, his heirs would be his two daughters and the Roman Emperor Nero.
Prasutagus hoped that he could this way preserve his kingdom and his family fortune.
But when he died, the Romans decided to rule the Iceni directly and confiscated the property and estates of his family, as well as allegedly abusing Boudica and her own children.
The Roman historian Tacitus described the subsequent march on the three ancient cities, saying that Boudica's tribe targeted places where 'loot was richest and protection weakest'.
'They could not wait to cut throats, hang, burn and crucify, as though avenging, in advance, the retribution that was on its way,' he added.
Their major military victory came in Camulodunum, where they destroyed the city's Roman colony, including much of the famous Ninth Legion – which later disappeared entirely from the historical record.
Boudica and her forces then forced the Roman Governor of Britain, Paulinus to evacuate London, which was also destroyed. An estimated 70,000 people were killed there.
After they went on to also destroy what is now St Albans, Paulinus collected 10,000 troops and lured the Britons into battle. Whilst the exact site of the conflict is unknown, it is believed to have been somewhere in the Midlands.
The Britons gathered in huge numbers, and their 'confidence was so great that they brought their wives with them to see the victory, installing them in carts stationed at the edges of the battlefield', according to Tacitus.
The warrior is said to have addressed her group from the back of a chariot, showing them her bruised body and her violated daughters.
Tactitus records that her speech ended with the words: 'Win this battle or perish. That is what I, a woman, plan to do. Let the men live in slavery if they will.'
However, the historian claims that more than half of the British army were women, with the outcome being an easy Roman victory.
Tacitus says that around 80,000 Britons were killed, whilst the Roman side lost 400 men.
Boudica is said to have poisoned herself to avoid capture.
Their major military victory came in Camulodunum, where they destroyed the city's Roman colony, including much of the famous Ninth Legion – which later disappeared entirely from the historical record
The Roman general Gaius Suetonius Paulinus defeated Boudica and her forces in battle. Above: The status of Paulinus at the entrance to the Roman Baths in Bath, Somerset
However, the Roman senator Cassius Dio – who wrote a mammoth history of Rome – put the number of slain Romans at 80,000.
He added that the shame was made worse because 'all this ruin was brought about by a woman'.
Dio also claims that the final battle was far from an easy victory, it was ultimately very close.
He said that the Britons mourned the loss of Boudica 'deeply and gave her a costly burial. But feeling that now at last they were really defeated, they scattered to their homes.'
Her trial on Thursday was the sixth held by Classics For All. Previous trials have featured the Greek philosopher Socrates and Brutus, one of the assassins of Julius Caesar.
The charity was founded in 2010 with the aim of reversing the decline in the teaching of the ancient world and the take-up of its languages, such as Ancient Greek and Latin, in state schools.
It has gone on to work with nearly 100,000 pupils in 1,000 schools and trained more than 3,000 staff to teach the subject.
THE BOUDICCAN REVOLT
The Boudiccan Revolt raged from 60-61AD and saw British tribes, under Boudicca of the Iceni, unsuccessfully try to defeat the Roman army.
Boudicca was Queen of the Iceni people, a British tribe who lived in what is today Norfolk and parts of Suffolk and Cambridgeshire.
Her name is an early for of the more commonly known name 'Victoria'.
Her husband, Prasutagus, was ruler of the Iceni people, and the Romans allowed Prasutagus to continue as king, ruling on their behalf.
But, when Prasutagus died, the Romans decided to rule the Iceni directly and they confiscated the property of the leading Iceni families.
The Romans are also said to have stripped and whipped Boudicca, and raped her daughters.
The Boudiccan Revolt raged from 60-61AD and saw British tribes, under Boudicca of the Iceni, unsuccessfully try to defeat the Roman army. Above: Statue of Boudica at Thames Embankment in Central London
The subsequent revolt began in Camulodunum (Colchester), where they destroyed the city's Roman colony, including much of the famous Ninth Legion – which later disappeared entirely from the historical record.
Boudica is NOT a terrorist: Supreme Court rules Celtic warrior queen is a 'national hero' in modern-day mock trial... nearly 2000 years after she sacked three Roman cities and left '80,000 dead' during brutal rampage Reviewed by free heip on October 15, 2021 Rating: 5 | {"pred_label": "__label__wiki", "pred_label_prob": 0.9697936177253723, "wiki_prob": 0.9697936177253723, "source": "cc/2023-06/en_head_0000.json.gz/line658130"} |
Events | UCalgary Alumni
Alumni Culinary Experience
Alumni Exclusive Tours
Class of 2022: Enterprising student pinpoints promising regions for future geothermal projects in Alberta
Sustainable energy development grad Gordon Brasnett visualizes the most economically viable sites
David Hedley, Advancement
Gordon Brasnett presents the highlights of his geothermal research at the downtown University of Calgary campus in September. David Hedley, Advancement
Deep beneath the Earth’s surface lies an almost endless supply of energy. Gordon Brasnett remembers even as a child being intrigued by the possibilities. “Family camping trips where we visited hot springs in Alberta and B.C. probably reinforced this interest,” he says.
Today, as the world looks for ways to reduce its reliance on fossil fuels, geothermal energy holds great promise as an alternative, especially in western Canada. But tapping the resource won’t be easy or cheap. Brasnett, a geophysicist who graduates this fall with a Master of Science in Sustainable Energy Development (SEDV) from the School of Public Policy at the University of Calgary, tackled a big question: Where in Alberta are the most economically viable locations to build new geothermal projects?
His answer, created as a capstone research project toward his degree, includes a publicly available, interactive model that considers the economic viability of particular areas across Alberta for future geothermal development. His visualizations draw on a matrix of data sources, such as pioneering research by University of Alberta scientist Dr. Jacek Majorowicz, who estimated the drilling depths required to reach progressively hotter geothermal sources.
Mapping the potential for future projects
Brasnett’s interactive model looks at all of Alberta, illustrating the geothermal depths yielding temperatures between 40°C and 80°C — for direct-heating uses such as warming buildings or greenhouses — and temperatures between 120°C and 150°C — hot enough to generate electricity as well as ambient heat.
He continues: “The regions with the highest gradients and therefore the shallowest estimated depths to 120°C are found west of Zama City, east of Rainbow Lake, and north of Rimbey. The estimated depths to reach 120°C in these areas are in the range of 2,250 to 2,800 metres.”
Finding an optimal geothermal location means balancing other factors too, such as: distance to where heat energy can be used, up-front costs of drilling and construction, and opportunities to generate future revenue. “My model showed that the regions with the highest gradients may not necessarily be the cheapest areas to develop for a project, as they may be too far from existing roads, transmission lines, and customers to use heat. As a result, the model showed that areas closer to Grande Prairie, Fox Creek, and Lacombe may be developed more economically for a 120°C project.”
Brasnett hopes his map helps spark conversations and inspire site-specific feasibility studies by remote municipalities and other early geothermal adopters. “In my opinion, the early adopters of geothermal projects will be people who need large quantities of heat, but who don’t want the greenhouse gas emissions or price uncertainty associated with burning hydrocarbons.
“This could be people developing district heating systems for warehouses, industrial parks, office parks, campus spaces, greenhouses, or residential buildings.”
Map shows the rate at which subsurface temperatures change as a function of depth. Yellow, orange and red regions get hotter faster, with subsurface temperatures in the range of 35-50°C at a depth of 1000m, compared to the green and blue regions.
Capstone project by Gordon Brasnett. Click on the map to see the online interactive model.
New engine for economic growth
Alberta has a successful history of applying innovation and technology to resources such as agriculture and the oilsands. Brasnett believes geothermal energy can grow into a new economic engine.
His interest in the field led him to study in UCalgary’s multidiscipinary SEDV program, offered through the School of Public Policy, Haskayne School of Business, Schulich School of Engineering, School of Architecture, Planning, and Landscape, and Faculty of Law. In the 16-month professional master’s program, SEDV students learn about energy systems, both current and future, through the lenses of technology, policy, business, and social impact. Students in the program build skills in collaboration, teamwork, communication, and research, enabling them to advance their careers across the energy sector. The emphasis is on developing energy projects that maximize social and economic benefits, and minimize negative environmental impacts.
Students like Brasnett are watching closely as the first large-scale geothermal projects take shape. For example, the Alberta No. 1 Geothermal Energy Project, a partnership developed by Terrapin Geothermics near Grande Prairie, will contribute clean geothermal energy to the grid while supplying heat for local industry. The Indigenous-led Tu-Deh-Kah partnership near Fort Nelson, B.C., is developing geothermal heat from a depleted natural gas field to support electricity, agriculture, and other local initiatives. The Latitude 53 project by Novus Earth Energy near Hinton focuses on renewable energy and food security. Calgary-based Eavor Technologies is testing its ultra-deep, closed-loop geothermal drilling system near Rocky Mountain House.
Opening new doors
The SEDV program opened new doors for Brasnett. The research capstone project is a core part of the curriculum, where students apply concepts learned in the program to a real-world question, in partnership with industry, NGOs, government, and academic partners. His research project was supported by the Mitacs Business Strategy Internship program. His supervising professor was Dr. Roman Shor, director of the Energi Simulation Centre for Geothermal Systems Research at UCalgary. For the project they collaborated with Dr. Catherine Hickson, CEO of the Alberta No. 1 Geothermal Energy Project.
“There are a lot of interesting pilot projects around the world today that may kick off a flurry of development throughout the 2020s in countries where geothermal is still a new technology,” Brasnett says. “I’m optimistic that Alberta can be a leader in this space given the geoscience, engineering, drilling skills, and technologies that the oil and gas sector has developed over the past 60-plus years.”
Thinking about your next career move? Start with UCalgary’s interdisciplinary MSc in Sustainable Energy Development and join the next generation of energy leaders in just 16 months! Learn more
Entrepreneurial UCalgary grads make an impact in health care, culture, law, business, the environment, and more. Read more stories about Class of 2022 students.
A note for soon-to-be UCalgary Alumni! As you prepare to transition from student life, we encourage you to check out our Life Kit for Recent Grads – custom built to inform you about the programs, benefits and services available to you as a member of the UCalgary alumni community.
Class of 2022: Law’s role in environmental protection inspires UCalgary grad
Class of 2022: From UCalgary main campus to Munich
Class of 2022: Nursing grad drawn to help the vulnerable and bring change to addictions and mental health research
Class of 2022: Imagine living in a futuristic apartment suspended above a Calgary parking lot
Class of 2022: Badly injured engineering student refused to let crosswalk collision detour his dreams
It’s official! UCalgary installs its 15th chancellor
students in profile
Sign up for UToday
Delivered to your inbox — a daily roundup of news and events from across the University of Calgary's 14 faculties and dozens of units
Your personal information is collected under the authority of section 33(c) of the Freedom of Information and Protection of Privacy Act, and is required for updating your email subscription preferences. If you have any questions about the collection or use of this information, please visit our Access to Information page. | {"pred_label": "__label__wiki", "pred_label_prob": 0.6563815474510193, "wiki_prob": 0.6563815474510193, "source": "cc/2023-06/en_head_0000.json.gz/line63175"} |
Home Construction Law Michigan Freeland
Freeland Construction Lawyers
Saginaw, MI Construction Law Attorney with 17 years of experience
(989) 399-7575 4800 Fashion Square Blvd
Construction, Animal and Personal Injury
Chicago-Kent College of Law, Illinois Institute of Technology
Eric Steinberg graduated from the University of Michigan with a Bachelor in Business Administration in 2001. After graduating, he worked as a financial consultant in Chicago. Not satisfied with spending his days in the financial field, Eric turned to the law. He attended the Chicago-Kent College of Law and earned a law degree in 2006. While receiving his legal education, Eric worked in the employment discrimination law clinic at Chicago-Kent, helping victims of discrimination receive just compensation and peace of mind. Eric joined the Law Offices of Lee B. Steinberg, P.C. full time in 2006. As a member of the Michigan...
W. Jay Brown
Midland, MI Construction Law Attorney with 24 years of experience
(989) 486-3676 414 Townsend, Suite 201
Construction, Business, Collections and Real Estate
Originally a teacher, W. Jay Brown became a lawyer in 1998 and has been in practice in the Great Lakes Bay Region ever since. Mr. Brown graduated first in his law school class and joined Midland’s largest law firm as a litigation associate. While with the firm, Mr. Brown embarked on his litigation career and was soon promoted to member of the firm. In 2009, W. Jay Brown left the law firm to start his own practice based on his vision for the practice of law – where technology and innovation are leveraged to provide clients superior customer and...
Mr. Denis J McCarthy
Caro, MI Construction Law Attorney with 31 years of experience
(989) 672-0999 429 North State Street
Caro, MI 48723
Free ConsultationConstruction, Criminal Defense, Personal Injury and Real Estate
Michigan State University College of Law
Brandon Fraim
Flint, MI Construction Law Attorney
(810) 733-2050 2377 S. Linden Rd.
Construction, Appeals, Business and Real Estate
Mark J. Newman
Flint, MI Construction Law Attorney with 26 years of experience
(810) 733-0579 5085 Miller Rd
Construction, Business, Real Estate and Tax
Michael Zamzow
Grand Rapids, MI Construction Law Lawyer with 9 years of experience
(616) 965-2621 300 Ottawa Ave NW, Suite 220
Construction, Business, Energy and Real Estate
Michael Zamzow is primarily an attorney litigator. This means his practice focuses on lawsuit proceedings in front of the court, also known as a trial lawyer. Mr. Zamzow advises his clients on complicated litigation to defendants and plaintiffs. These topics include construction issues, breach of contract matters, including the uniform commercial code and common law. He has years of experience representing clients in courthouses across Michigan.
Mr. Zamzow also provides clients and attorney from other jurisdictions local counsel representation and support in Michigan.
Mr. Zamzow also represents clients as general counsel on civil matters. These matters include business formation, negotiations, real property...
Laura McMahon Lynch
Grosse Pointe Farms, MI Construction Law Lawyer with 39 years of experience
(313) 885-6697 21 Kercheval Ave
Construction, Business, Probate and Real Estate
For over 25 years, Laura McMahon Lynch has earned a reputation as a highly respected Real Estate litigator, as well as a compassionate, driven Estate Planning attorney. Using her 11 years of experience as both a Special and Assistant Attorney General defending the State of Michigan, Laura aggressively represents clients in a wide range of litigation including real estate title disputes, construction lien foreclosure as well as complex contract-based lawsuits. She has become the confidant of countless clients who continue to trust her sensitivity and discretion. Laura is a certified Facilitative Mediator for the 3rd Circuit Court of Michigan. She has...
Reese Serra
Rochester, MI Construction Law Lawyer with 11 years of experience
(248) 840-3139 805 Oakwood Dr Ste 101
Free ConsultationConstruction, Business, Communications and Real Estate
Thomas M. Cooley Law School
Mr. Serra concentrates his practice on tirelessly representing the needs of Michigan businesses and business owners. Reese Serra has counseled businesses ranging from a wide variety of industries with an expertise in representing technology clients of all sizes.
As a civil litigator, Mr. Serra has procured victories for his clients at all levels of State and Federal courts, including numerous successful appeals.
Mr. Serra focuses his practice in the areas of real estate matters, business and financial transactions, including: mergers, acquisitions and reorganizations of business entities; complex commercial and real estate lending and restructuring transactions; international business transactions; real estate sale...
Stuart M. Feldheim
Farmington Hills, MI Construction Law Attorney with 47 years of experience
(248) 737-0700 30300 Northwestern Hwy
Construction, Medical Malpractice, Personal Injury and Workers' Comp
University of Cincinnati College of Law
Stuart M. Feldheim has lived and worked in metro Detroit for almost four decades. He specializes in personal injury, medical malpractice, workplace injury, products liability, and premises liability claims. Mr. Feldheim has extensive experience representing injured claimants. He has practiced in the field of personal injury since graduating from the University of Cincinnati College of Law and obtaining his Juris Doctor in 1976.
Mr. Feldheim opened his own firm in 1992. He helps injured people in both Michigan and Ohio, as he is licensed to practice before the state courts and Federal District Courts of both states. Mr. Feldheim is...
Sean Patrick Murphy
Farmington Hills, MI Construction Law Lawyer with 8 years of experience
(248) 686-3861 34705 W. Twelve Mile Road
Free ConsultationConstruction, Business, Probate and Real Estate
University of Detroit Mercy School of Law
Sean is currently the founder of the Murphy Law Firm PLC. He is licensed to practice law in the State of Michigan and the United States District Court for the Eastern District of Michigan. Sean was named a Super Lawyers' Rising Star every year since 2019, and he was named a DBusiness Top Lawyer in 2019 and 2022. Sean graduated from Western Michigan University with a Bachelor of Business Administration in Economics and Business Administration. After Western Michigan, Sean went on to graduate from the University of Detroit Mercy School of Law, graduating summa cum laude and first in his class....
Michael Simon
Farmington Hills, MI Construction Law Lawyer with 33 years of experience
(800) 533-3733 30500 Northwestern Highway
Construction, Insurance Claims and Personal Injury
Michael Simon earned a Bachelor of Science in Business Administration from Wayne State University in 1987 and his law degree from Thomas M. Cooley Law School in 1990. While receiving his college and graduate education, he remained active in numerous organizations, including the Helenic Bar Association and the Delta Theta Phi Law Fraternity. After obtaining his law degree, he worked as a law clerk at the U.S. Attorney’s office, the Department of Justice in Grand Rapids and later at several metropolitan law firms. As a Trial/Litigation attorney, he has dedicated himself to the representation of persons who have been seriously injured...
Franci Silver
Construction, Animal and Social Security Disability
Franci Silver graduated from Oakland University, with a degree in Political Science. After graduating Oakland University, she attended the Detroit College of Law, receiving her Juris Doctorate in 1988. She immediately went to work for a personal injury law firm before coming to work for the Law Offices of Lee B. Steinberg in 1991. During her law practice, she has obtained several jury verdicts and awards against numerous defendants. Ms. Silver specializes in social security disability (SSD) appeals, helping numerous clients obtain SSD awards after initially being denied by the Social Security Administration. She also specializes in premises liability law and...
Holland Locklear
Detroit, MI Construction Law Lawyer with 5 years of experience
(833) 424-4466 607 Shelby Street
Free ConsultationConstruction, Animal, Arbitration & Mediation and Personal Injury
Wayne State University Law School
Holland Locklear has represented thousands of clients and won millions of dollars on their behalf. A native son of metro Detroit, he is fiercely devoted to his community, which drives him to zealously represent their interests in court. Holland gained expertise while working for the Detroit region’s top civil litigation firms. Holland has successfully litigated automobile accidents, wrongful terminations, discrimination, police and government misconduct, civil rights, dog bites, premises liability, contract disputes, landlord/tenant disputes and more. Holland is a graduate of Wayne State University Law School. In law school, Holland served on the boards of the National Lawyers Guild, Student...
Evan A. Burkholder
Dearborn, MI Construction Law Lawyer with 51 years of experience
Ext. 955 290 Town Center Drive
Dearborn, MI 48126
Construction, Appeals, Asbestos and Business
The George Washington University Law School
Mr. Burkholder heads the LeClairRyan Detroit office and has over 30 years of trial experience in business litigation, wrongful death actions, catastrophic injury cases, design defect cases, and product recall actions. He has represented architects, engineers and accountants in professional liability actions and has defended insurers in first party policy (fire, all risk property or business interruption) cases, as well as bad faith and excess liability claims. He has worked on complicated construction projects, representing design-build firms. He has defended pharmaceutical companies in medical device cases, ethical drug litigation and in generic drug registration litigation. His toxic tort experience includes...
Paul Callam
Ann Arbor, MI Construction Law Lawyer with 41 years of experience
(734) 995-9908 2723 South State St.
Construction, Business and Real Estate
Vanderbilt University Law School
Paul A. Callam is the owner and principal attorney in the Law Office of Paul A. Callam, PLC, located in Ann Arbor, Michigan. Mr. Callam’s practice is concentrated in the areas of business organizations, contracts, including IT and licensing agreements, franchise agreements, commercial disputes, construction and real estate development issues. Mr. Callam has been practicing law for over 25 years. He divides his practice between counseling businesses in all phases of development, and litigation and arbitration of disputes.
Zacharia Spencer Bonham
Okemos, MI Construction Law Lawyer with 10 years of experience
(517) 381-2663 4121 Okemos Rd., Suite 10
Free ConsultationConstruction and Immigration
My practice is focused on Immigration Law. I represent clients seeking family-based petitions, asylum, special immigrant juvenile visas, naturalization, obtaining Provisional Waivers for Unlawful Presence, preparing documents for consulate interviews, removal proceedings, and the appellate process. I have represented clients in Immigration Court, the Board of Immigration Appeals, and the U.S. Sixth Circuit Court of Appeals.
Robert J. Gavin
Stanwood, MI Construction Law Attorney with 14 years of experience
11313 Troon Drive
Stanwood, MI 49346
Free ConsultationConstruction, Estate Planning, Municipal and Real Estate
DePaul College of Law
Robert Gavin is the Senior Associate at Shifman & Carlson, P.C. He has been practicing law since 2008, and was named a Super Lawyers Rising Star in 2015, 2018, and 2019. He was also listed by DBusiness Magazine as a Top Lawyer in the Metro Detroit Area for Public Finance Law in both 2014, 2017, and 2018.
Rob brings a wide variety of skills and a diverse background to bear for his clients, including his experience with contract negotiation, employee issues, construction issues. Rob's undergraduate degree is in engineering, which has also been useful to clients during construction issues and in...
Robert Gardella
Brighton, MI Construction Law Lawyer with 30 years of experience
(810) 220-4200 134 N. First Street
Free ConsultationConstruction, Business, Personal Injury and Real Estate
Lee Steinberg
Construction, Animal, Medical Malpractice and Personal Injury
Lee Steinberg graduated from Wayne State University with a Bachelor of Arts degree in 1967. After graduating Wayne State University, he taught in the Detroit School System while going to night school at the Detroit College of Law. After graduating from the Detroit College of Law, he worked for personal injury firms before opening his law practice 1976. Lee has obtained substantial jury verdicts and awards against defendants, both local and national including British Petroleum, the City of Detroit and numerous insurance companies. He also tried cases in the State of Texas and obtained the first medical malpractice verdict in San...
John A. Ruemenapp
Bingham Farms, MI Construction Law Lawyer
(248) 258-2700 30100 Telegraph Rd
Bingham Farms, MI 48025
Construction, Arbitration & Mediation, Business and Real Estate
University of Michigan Law School and Wayne State University Law School
Patrick Drueke
Grand Rapids, MI Construction Law Lawyer with 24 years of experience
(616) 235-5175 161 Ottawa Ave NW
Free ConsultationConstruction, Business, Municipal and Real Estate
I am a shareholder at Rhoades McKee, P.C. I help individuals and businesses facing real estate disputes, land development challenges, condemnation, real estate transactions and construction matters achieve their objectives through a defined and realistic strategy. I can provide a detailed understanding of the emerging legal issues in green building and the LEED rating system. I am the only attorney in West Michigan that has achieved the LEED Accredited Professional (LEED AP) designation through the United States Green Building Council, and an environmental certification from Green Advantage®. I understand the issues faced by those individuals and businesses in the real...
John Brennan
Eastpointe, MI Construction Law Attorney
(586) 778-0900 22805 Kelly Rd.
Free ConsultationConstruction, Business, Divorce and Real Estate
Practicing since 1976 serving businesses, professionals and individuals in all aspects of the law. Decades of experience in all aspects of the law and life generally with the philosophy that the goal is swift and economical dispute resolution, by an agreement if possible and through litigation if necessary.
Seth Seidell
(248) 413-6117 805 Oakwood Drive, Suite 202
Free ConsultationConstruction, Business, Employment and Social Security Disability
Seth was born and grew up in Northern Michigan. Prior to and while going to college he worked in the construction field with a general contracting firm. He received his Bachelor of Arts Degree in Political Science from Oakland University in 1992. He received his Juris Doctorate (Cum Laude, Law Review) from Thomas M. Cooley Law School in 1997. During law school, he clerked for a mid-sized, full service law firm as well as for the Michigan Attorney General’s office. He began his law career working for a short period of time for both a construction and asbestos litigation firm....
Peter J. Cavanaugh
Royal Oak, MI Construction Law Lawyer with 27 years of experience
(248) 543-8320 1027 S. Washington Ave.
Free ConsultationConstruction and Business
My practice is concentrated on business and construction law matters, including litigation of contract, construction lien and payment bond claims. I represent owners, design professionals, contractors, subcontractors, and suppliers. I also represent clients who specialize in water and wastewater construction.
Matthew N Morrow
Farmington Hills, MI Construction Law Attorney with 7 years of experience
(800) 757-1681 37887 West Twelve Mile Road
Construction, Business, Estate Planning and Real Estate
University of Miami School of Law, Michigan State University College of Law and Michigan State University
Adam J. Sheridan
Conklin, MI Construction Law Lawyer with 18 years of experience
(616) 304-0987 1706 Coolidge Street
Conklin, MI 49403
With over eighteen years' experience in both law firm and large corporate environments, handling local, national, and international transactions of various types, I am able to assist clients in structuring and completing complex transactions while maintaining a personalized focus. Our firm appreciates each opportunity we have to learn a client's needs and provide customized solutions to the client's legal issues. I have substantial experience in real estate, corporate structure and governance, commercial contracts and procurement, mergers and acquisitions, estate and succession planning, and construction.
Richard Delonis
Southfield, MI Construction Law Lawyer with 29 years of experience
(248) 716-3600 29777 Telegraph Road
Kimberly Bowlin
Brighton, MI Construction Law Attorney
(810) 844-2520 10315 Grand River Rd
Ms. Bowlin concentrates her practice in corporate/small business, real estate, and construction law. She is a leading practitioner in the areas of construction liens, land use development, zoning, and condominium association law. She is a 1995 graduate of the University of Detroit Mercy School of Law and received her undergraduate degree from James Madison College at Michigan State University. Prior to founding this law firm, she specialized in municipal and public corporation law, representing several village, townships, and cities in Livingston and Oakland County.
Michael Bartnicki
Plymouth, MI Construction Law Attorney with 31 years of experience
(734) 455-1320 134 N Main St
Plymouth, MI 48170
Construction, DUI & DWI, Family and Traffic Tickets
Miller & Bartnicki, P.C., is a small firm that provides individuals throughout southeastern Michigan with the personalized attention they need. We have 60 years combined experience and offer the comforting atmosphere you would expect from an established small firm in a small town.
Areas of practice include construction litigation and liens, divorce, custody, visitation, child support, alimony, drunk driving, traffic tickets, contract disputes and corporate and LLC set ups.
Sanford J. Melder
Royal Oak, MI Construction Law Attorney
(248) 541-3400 2304 E 11 Mile Rd
Construction, Bankruptcy, Personal Injury and Real Estate
Sanford J. Melder has helped thousands of people as an attorney. He was admitted to the State Bar of Michigan in 1974. He graduated from Wayne State University with a Jurist Doctor in 1973, and Wayne State University with a Bachelor of Science in 1968. Sanford J. Melder has practiced law for over 30 years, representing clients in legal matters including Family Law, Divorce, Adoption, Real Estate, Debt Collection/Debt Collection Defense, Wills, Trusts & Estate Planning, Asset Protection, Criminal Defense, Traffic Matters, Drunk Driving, Business Law and Personal Injury. Areas of Practice: Family Law Divorce Adoption Real Estate Debt Collection/Debt Collection Defense Wills, Trusts & Estate Planning Asset...
Pavol Fabian
141 Ionia Ave NW Fl 2
Free ConsultationConstruction, Business, DUI & DWI and Real Estate
Mr. Trevor A Stewart
Northville, MI Construction Law Lawyer with 9 years of experience
(248) 912-0670 41000 West Seven Mile Road, Ste 230
Free ConsultationConstruction, Arbitration & Mediation, Estate Planning and Real Estate
Our attorneys have over 28 years of experience in serving our client's personal and business legal needs in several practice areas. We are fully committed to zealously protecting our client's interests through diligent representation.
Alan Himelhoch
Grand Blanc, MI Construction Law Attorney with 34 years of experience
(810) 767-3600 G9460 South Saginaw Road
Grand Blanc, MI 48439
Construction, Arbitration & Mediation, Business and Collections
Clifford Dovitz
Bloomfield Hills, MI Construction Law Lawyer with 40 years of experience
(248) 758-2141 1750 S Telegraph Rd
Construction, Bankruptcy, Business and Collections
John M. Freel
Tawas City, MI Construction Law Lawyer with 30 years of experience
540 W Lake St
Tawas City, MI 48763
Construction, Insurance Claims, Insurance Defense and Personal Injury
David Oppliger
Port Huron, MI Construction Law Attorney
(810) 966-1881 1111 Pine Grove Ave
Construction, Environmental, Personal Injury and Real Estate
Attorney with over 25 years experience. Practice is located in Port Huron Michigan which is one hour north of Detroit on the shores of the St. Clair River and Lake Huron.
Mr. Denis C. Monahan
Troy, MI Construction Law Attorney with 48 years of experience
Troy, MI 48099-4328
Eleanor Cattron Smith
(313) 961-1000 SOUTHFIELD, MI 48037
Construction, Bankruptcy, Business and Consumer
Robert Giroux
Southfield, MI Construction Law Attorney with 29 years of experience
Free ConsultationConstruction, Civil Rights, Medical Malpractice and Personal Injury
Roger Quentin Hyde
Clinton Township, MI Construction Law Lawyer with 42 years of experience
(586) 263-9380 42815 Garfield
Construction, Business, Personal Injury and Real Estate
Wide array of experience in 40 years of practice.
Construction Attorneys in Nearby Cities
Construction Attorneys in Nearby Counties
The Oyez Lawyer Directory contains lawyers who have claimed their profiles and are actively seeking clients. Find more Freeland Construction Lawyers in the Justia Legal Services and Lawyers Directory which includes profiles of more than one million lawyers licensed to practice in the United States, in addition to profiles of legal aid, pro bono and legal service organizations. | {"pred_label": "__label__cc", "pred_label_prob": 0.7466211318969727, "wiki_prob": 0.25337886810302734, "source": "cc/2023-06/en_head_0000.json.gz/line730090"} |
NBC’s first borrower says Ryan knew he couldn’t pay | business news
Kenneth Charity, a key witness in the bank fraud trial of former First NBC Bank CEO Ashton Ryan, said he racked up $18 million in bad loans from the bank before it collapsed, spending money on luxury cars, watches and renovations. on his $3 million Covington. he marries, while working with Ryan to hide that he couldn’t pay.
Through the minutiae of Charity’s testimony, along with loan forms and other documents, federal prosecutors tried to prove Friday that Ryan had known since 2011 that Charity was a bad businessman who spent the bank’s money instead of using it on property remodeling and other businesses. offers
Former First NBC executive Ashton Ryan, Jr. walks to the US District Court in New Orleans for his trial on Tuesday, January 10, 2023. (Photo by Chris Granger | The Times-Picayune | The New Orleans Advocate)
STAFF PHOTO BY CHRIS GRANGER
Charity, who already pleaded guilty to conspiracy to commit bank fraud in a plea deal with prosecutors, was the latest in a series of prosecution witnesses during the first two weeks of Ryan’s federal trial related to the $1,000 bank collapse. millions.
Most of the witnesses so far have testified on variations on the same theme: that Ryan, despite knowing that the borrowers would not be able to repay their loans, allegedly kept that from his board.
Ryan’s lawyers have tried to deny the claims, saying he was personally dealing with some of the bank’s most troublesome customers and trying to keep them afloat.
Testimony and cross-examination on Friday followed the same pattern.
A benefactor relationship
Charity described how he had entered into a business relationship with Ryan when First NBC was founded in 2006. He said that in the early years of their relationship, First NBC loaned him hundreds of thousands of dollars to buy houses for post-Hurricane Katrina renovations, he and Ryan developed a personal bond.
“I got to know Ryan very well and we were friends,” said Charity, noting that Ryan was the godfather of two of her children and had vouched for him at expensive local private schools. “I trusted him unconditionally. He had a solid reputation, he was highly respected.”
Charity said Ryan eventually helped him get involved in bigger projects, including a $1 million condo and beignet deal in the Jax Brewery building on Decatur Street in the French Quarter.
He also bought three gas stations on the North Shore and a defunct shopping center on Robert E. Lee Boulevard (now Allen Toussaint Boulevard), which had been badly damaged by Hurricane Katrina.
‘Lies like a rug’
But the government argued that Ryan realized as early as 2011 that Charity was a poor businessman who consistently failed to hold meetings, file documents, pay business taxes owed to the city, file permit applications and handle other routine business tasks. . .
Brian DeJean, a former Charity accountant, testified that he had dropped him as a client in 2012 because he consistently failed to provide basic documents and was lying about it.
“He wasn’t trustworthy,” DeJean said. “He lied and lied again. He lied like a rug.”
DeJean said that Ryan had been told in a meeting of Charity’s chronic shortcomings, but agreed that Ryan seemed to be doing everything he could to help Charity.
In testimony earlier this week, two program directors who oversee grants to renovate New Orleans buildings after Katrina, Adrienne Celestine and Aimee Quirk, testified that the Charity had been turned down for grants because it had failed to provide the documents that were requested. they had repeatedly requested.
Prosecutors said Ryan had told banking supervisory boards that the grant money was on the way when he knew it had been turned down. His defense attorney responded that Ryan had helped Charity reapply for the grants and hoped they would still be able to get the funds.
Former First NBC executive Ashton Ryan, Jr., right, walks with his wife Jolene to the US District Court in New Orleans for his trial on Tuesday, January 10, 2023. (Photo by Chris Granger | The Times-Picayune | The New Orleans Advocate )
Despite his mounting debts, the government argued that Ryan continued to lend more and more to Charity and claimed in bank documents that Charity was using the money to develop property, when in fact it was using the loan proceeds to pay off older loans and to cover personal expenses. .
In one case, they pointed to a series of three $500,000 loans made to Charity in the spring of 2015, ostensibly to renovate the forecourt of Beignet’s Decatur Street store, but used largely to pay interest on outstanding loans and to personal expenses.
Charity agreed with prosecutors that Ryan had known he was essentially broke since at least early 2015 and was using the money to give the appearance that the loans were current.
During cross-examination, Ryan’s defense attorney, Edward Castaing Jr., tried to show that Charity was lying about Ryan’s extent of knowledge in order to get a lighter sentence. He also painted Ryan as someone Charity regularly lied to.
not a sister
He questioned Charity about her relationship with Stephanie Carter-Stinson, a Washington, DC-based physician who had been a guarantor for all of Charity’s loans.
Charity, 58, married with five children, agreed that she had represented Carter-Stinson to Ryan and other bank officials as her sister, when in fact she was someone with whom he was romantically involved.
Castaing pointed out, and Charity agreed, that Carter-Stinson had an income of more than $500,000 a year, net assets of more than $5 million, and was the main reason the loans kept flowing. The loans were also backed by property liens.
Castaing also pointed out that Charity blamed his wife for out-of-control personal spending when she agreed to cooperate, saying she had a bipolar condition and couldn’t help but spend money.
Castaing then listed the purchases Charity had made for himself, including gold and diamond necklaces and cufflinks, a dozen Rolex watches, as well as other high-end watches like a Breitling Bentley and a TAG Heuer, which together would cost more than $ 100,000. .
The evidence showed that the relationship between Ryan and Charity soured over time. An email exchange in November 2016 showed Ryan rejecting Charity’s efforts to get another loan to buy a new SUV.
“You’re an asshole,” Ryan wrote to Charity, noting that he already owned two five-year-old Mercedes-Benz cars and needed to prioritize paying off the loans.
Charity agreed to plead guilty in July 2019 in the hope of a reduced sentence in exchange for her testimony. Ryan’s trial, which began on January 9, is expected to last four to six weeks.
India’s Adani Group plans to spin off more businesses; dismiss worries about debt
Nasdaq rises 2.7% as tech leads Friday’s stock rally | {"pred_label": "__label__wiki", "pred_label_prob": 0.9499750137329102, "wiki_prob": 0.9499750137329102, "source": "cc/2023-06/en_head_0000.json.gz/line760770"} |
Simon Hardy Tue, 23/03/2010 - 17:46
Many are hailing the new Healthcare bill in the US, but there are serious problems, reports Simon Hardy
With the passing of the Affordable Health Care for America Act in the US House of Representatives by a narrow 219-212 majority, the Democrats are now arguing that Obama has fulfilled one of his main campaign pledges. On the surface, the bill is an advance on what came before. As of March 23rd 2010, an extra 32 million US citizens now have health insurance, insurance can no longer be refused based on medical histories, and there is a sizeable increase of Medicare coverage for people on low incomes.
But most healthcare campaigners are highly critical about the new bill and the way it was arrived at. The bill will still leave 23 million Americans uninsured. The new law will force middle income earners to buy insurance, costing as much as 9.5 per cent of their income, which would still only cover about 70% of medical expenses. To cap it all off, the already incredibly powerful insurance companies will be given an extra $450 million a year in public money to subsidise their insurance packages, handing over more money to the private sector.
In short, this Act does nothing to really challenge the profit-driven stranglehold of the insurance companies over healthcare in the US. Many Americans will not see any benefit until 2014 when all the measures of the bill finally come into force, and by then the insurance companies could have increased their premiums substantially. Physicians for a National Health Program likened the new bill to “using an aspirin to treat cancer.”
Right up to the last minute, concession after concession was made to the Republican (and Democrat) opponents of universal healthcare entitlement. Under the new law, thanks to Democrat Senator Bart Stupak, an agent of the Catholic Bishops’ Conference, women will have to pay for insurance cover on abortions “100% out of their own pocket”. “Pro-choice” activists expressed concern that, if insurance for abortions has to be paid separately to the health care companies, some might drop it as an option.
A further problem in the provision of healthcare for women is that, although the bill bans using gender as a factor when costing premiums (currently many women have to pay more for the same insurance package as a man, and workplaces with a majority female workforce have to pay more insurance) these provisions will not come fully into force until 2017. No wonder the National Organisation of Women referred to the bill as a “a giant leap backward for women”.
Many of his supporters are enraged that Obama caved in on so many key points of the Act as it made its way through the congress. The problem stems from two points, the first is that the Democrat party, wedded to capitalism and heavily funded by the health insurance companies, did not want too radical a reform bill. The second point, related to the first, is that Obama refused to use his campaigning base to establish more support for a radical version of the bill. The right mobilised significant pressure from its base, with demonstrations and protests across the country, designed to put pressure on wavering politicians to oppose the legislation, or fight for it to be further watered down. The right wing populist Tea Party movement, organised a protest on Capitol Hill the day before the act was passed where Democrat politicians were harassed, some were called “niggers” and “faggots” and even subjected to physical abuse, reported the Huffington Post.
The language from the Republican politicians themselves was designed to provoke emotional and irrational anger, “a little bit of freedom dies here today” declared Marsha Blackburn. “Will we choose the path of individual liberty or will we choose the path of government tyranny” asked Ted Poe, using the popular buzzwords from the Tea Party campaigners demanding that the tree of liberty be watered with the blood of tyrants. And when John Shadegg said that the bill was destroying freedom in the US, he was clearly referring to the total freedom of the insurance companies to make money from people’s illnesses.
For their part, Obama and the Democrats purposefully kept a lid on the activist base, clearly concerned that, if they mobilised such forces, the expectations of the movement would far outstrip anything that the Democrats were willing to offer in congress. This is because the Democrats cannot actually provide what so many people want and need, fully funded, free healthcare available at the point of demand.
The choice was over a continuation of the appalling free market system, which has ruled health care for generations, or some modest government intervention which would help paper over the cracks of healthcare provision in the US, whilst maintaining the profit system for the insurance companies. When stripped down to its bare essentials, this is a reform package which does not slay the beast of market profits in healthcare, but tries to tame it.
Now the battle is on to destroy even what has been achieved so far. The Republicans will be running in the mid term elections in the Autumn under a “repeal the Bill” ticket, no doubt accusing the Obama administration of “socialism” and “government take over of healthcare”. The Democrats are promising to defeat the Republicans but they have a track record of caving in under pressure and conceding strategic ground to the populist right on such issues. Of course, many Democrats themselves (the so called blue-dog Democrats) opposed the bill and act as a fifth column within their own party ranks on the health care issue. Currently, the Republicans stand united on their hatred of the healthcare reforms.
This highlights the problem of the reformist logic. Making concessions to the Republicans did not lead to any increase in bipartisan support, instead it resulted in a watered down bill and an entrenched opposition. The “public option” government health insurance provision as an alternative to the private pension schemes was unceremoniously dropped. If this is the best reform that can be brought about through the mechanisms of the US government, then it is clear that a more radical route is needed – “Power to the (Working) People!” Working people in the US, who most desperately needed, and still need, a genuine free health care system, should bear in mind Lenin's words “reforms are the by-product of the revolutionary struggle”, and that is what is lacking in the US today. | {"pred_label": "__label__cc", "pred_label_prob": 0.6757528185844421, "wiki_prob": 0.32424718141555786, "source": "cc/2023-06/en_head_0000.json.gz/line1073196"} |
Everyday Low’s Hair Care Brand Is a New Kind of Dragon
‘House of the Dragon’ Hair Inspires an Icy Blond Renaissance
Everyday Low, a haircare company, makes its brand the butt of jokes on its Tumblr.
Photograph by David McNew
Everyday Low is not a new name. In fact, its headquarters, a small strip mall on a busy road in San Diego’s Mission Valley, is little more than a year old. But its founder and manager, Jennifer Bancroft, says the name itself has become something of a joke. “They’ve been calling me House of the Dragon, and they were saying it’s a new kind of Dragon,” she says. “I don’t know what Dragon means.”
Everyday Low’s hair-care products were first introduced in 2012. They have since seen a steady rise in demand; the company has expanded to 15 international locations, and has even opened one in London. It’s become a cult-favorite online brand, with a social-media following of over 100,000 people. But its products may never have made it out of the San Diego market, according to Bancroft. “We’re very small,” she says. “When we first started we were very lean.”
Bancroft came up with the brand name and the marketing strategy for Everyday Low in about 2011. She wanted to sell a product that was more than just moisturizing hair. She looked to make a bigger statement. “I came up with this idea of ‘House of the Dragon’ for an Asian dragon in the Asian culture,” Bancroft says. “It was like, look what we’re doing here.”
The term House of the Dragon was originally coined, she says, “by a friend of mine, who is Korean, called ‘dongi,’
Categories latest Tags celebrity, chemistry, clinical trials, coronavirus, nobel prizes
Kamala Harris is the only candidate running for the Democratic Party
Paul Pogba says he would have preferred to play for City
The City of Baltimore has approved only 9% of the low-cost housing projects it says it was supposed to approve
Twitter’s CEO, Jack Dorsey, made the changes on the day after Twitter disclosed quarterly earnings.
The Persuaders: A New Generation of Politicians
Serena Williams loses to world number six Vesnina in US Open quarterfinals
The Journey to San Francisco State
ZEBRAS CULLED in Kenya’s Famine
Public Health Nutrition: The New Normality of Life Without Public Health | {"pred_label": "__label__wiki", "pred_label_prob": 0.9901843070983887, "wiki_prob": 0.9901843070983887, "source": "cc/2023-06/en_head_0000.json.gz/line1731534"} |
Authors S-T
Scarborough, Roscoe C. 2016. "Making It in a Cover Music Scene: Negotiating Artistic Identities in a 'Kmart Level Market.'" Sociological Inquiry. DOI: 10.1111/soin.12153
Scarborough, Roscoe C., and Charles Allan McCoy. 2016. "Moral Reactions to Reality TV: Television Viewers' Endogenous and Exogenous Loci of Morality." Journal of Consumer Culture 16(1):164-91.
Schrader, Abby M. "Market Pleasures and Prostitutions in St. Petersburg." In Matthew P. Romaniello and Tricia Starks, eds., Russian History Through the Senses: From 1700 to the Present, (London: Bloomsbury Academic, 2016), pp. 67-94.
Schuyler, David. "Saving Olana." The Hudson River Valley Review. Vol. 32, No. 2, pp. 2-26.
Aleman MG, Marconi LJ, Nguyen NH, Park JM, Patino MM, Wang Y, Watkins CS, Shelley C. (2016). "The influence of assay design, blinding, and Gymnema sylvestre on sucrose detection by humans." Journal of Undergraduate Neuroscience Education, 15, A18-A23.
Smith, Scott C. 2016. Landscape and Politics in the Ancient Andes: Biographies of Place at Khonkho Wankane. Albuquerque: University of New Mexico Press.
Yitao Liang, Marlos Machado, Erik Talvitie, and Michael Bowling. "State of the Art Control of Atari Games Using Shallow Reinforcement Learning." In Proceedings of the 2016 International Conference on Autonomous Agents and Multi-agent Systems, p. 485-493, 2016.
Brannon D. Ingram, J. Barton Scott, and SherAli K. Tareen, eds. Imagining the Public in Modern South Asia. Routledge Press, 2016.
Thompson, R. K. R., Flemming, T. M., & Hagmann, C. E. (2016). "Can old-world and new-world monkeys judge spatial above/below relations to be the same or different? Some of them, but not all of them." Behavioral Processes, 123: pp. 74-83.
Troy, A. S., Ford, B. Q., McRae, K., Zarolia, P., & Mauss, I. B. (2016, August 25). "Change the Things You Can: Emotion Regulation Is More Beneficial for People From Lower Than From Higher Socioeconomic Status." Emotion. http://dx.doi.org/10.1037/emo0000210
<< Previous: Q-R
Next: U-V >> | {"pred_label": "__label__cc", "pred_label_prob": 0.6979474425315857, "wiki_prob": 0.3020525574684143, "source": "cc/2023-06/en_head_0000.json.gz/line1490756"} |
Usher Live in Taipei 2010
Posted on: June 5th, 2018 10:56 am
Time is testament to the mark of greatness, and for this era that mark belongs to Usher Raymond IV, the consummate entertainer who transcends the boundaries of popular culture, redefining the nature of superstardom. Usher’s considerable achievements begin with over 45 million records sold world wide and a stable of five Grammy awards. The singer, composer, producer, actor, businessman, designer and philanthropist is the quintessential contemporary icon, celebrated for nearly two decades.
Country: Taipei
Usher, a self-described “master of the moment,” was born to lead-from the stage to the boardroom. Over the course of his exemplary career, Usher has led by countless examples, creating a rich catalog of hit songs and crowning achievements. With the release of his monumental seventh album, Raymond v Raymond, Usher returns to his original medium – making songs into masterpieces that illuminate the struggle between man and legend.
The DVD was declared seven times platinum. He won over fans and critics alike with accolades, which continue to multiply: 5 Grammy Awards, 4 American Music Awards, 8 Soul Train Music Awards, 4 BET Awards, 3 Nickelodeon Kids Choice Award, 6 Teen Choice Awards, a Blockbuster Music Award, 3 R&B Hip Hop Conference Awards, 9 ASCAP Awards, a staggering 17 Billboard Music Awards and countless other international awards from several countries.
Usher may indeed have super hero DNA, which is one plausible explanation for how one man is able to accomplish so much. Usher, a seasoned television and film actor, hit the Broadway stage in 2006 playing the riveting lead, Billy Flynn in Chicago to a sold-out audiences as the youngest cast member in the lead role of the slick-talking lawyer persona. “They say to be an entertainer, you have to do it all,” says Usher. “When I was young and decided I wanted to be in entertainment, I watched people like Bob Fosse, Sammy Davis Jr. and Ben Vereen. They were triple threats – dancing, acting, and singing. It really inspired me. I want to live up to that title and showcase all of my talents and be able to say I’ve experienced it all, and had fun in the process.”
www.ushernow.com
www.twitter.com/UsherRaymondIV
www.myspace.com/usher
www.facebook.com/usher
Shared this page:
Pitbull Live in Jakarta 2011
Usher Live in Kuala Lumpur 2010 | {"pred_label": "__label__wiki", "pred_label_prob": 0.8408347368240356, "wiki_prob": 0.8408347368240356, "source": "cc/2023-06/en_head_0000.json.gz/line1513778"} |
WLF Urges Supreme Court To Reaffirm Limits on General Personal Jurisdiction
Mallory v. Norfolk Southern Railway Co.
Countering the Plaintiffs' Bar | Personal Jurisdiction / Standing to Sue
“The Supreme Court long ago abandoned Pennsylvania Fire’s reasoning. It is time for the Court to officially overrule that mistaken precedent.”
—John Masslon, WLF Senior Litigation Counsel
Click here for WLF’s brief.
WASHINGTON, DC— Washington Legal Foundation (WLF) today filed an amicus curiae brief urging the U.S. Supreme Court to uphold constitutional limits on Pennsylvania state courts’ exercise of general personal jurisdiction over nonresident defendants. In a brief filed in Mallory v. Norfolk Southern Railway Co., WLF argued that Pennsylvania’s long-arm statute, which provides that any out-of-state corporation registering to do business in Pennsylvania may be sued there for any dispute arising from anywhere, violates the Due Process Clause.
The case arises from Mallory’s alleged exposure to toxic chemicals while he worked for Norfolk Southern in Ohio and Virginia. Even though the company was headquartered in and incorporated in Virginia at the time of suit, Mallory was a resident of Virginia, and the exposure occurred outside Pennsylvania, Mallory sued in the Philadelphia Court of Common Pleas. The Pennsylvania courts held that the Commonwealth’s long-arm statute violates the Fourteenth Amendment’s Due Process Clause. The Georgia Supreme Court, relying on Pennsylvania Fire v. Gold Issue, however, reached the opposite conclusion for a similar Georgia statute and the Supreme Court agreed to resolve the split in authority.
In its brief supporting Norfolk Southern, WLF examines the stare decisis factors and explains why the Court should overrule its 1917 Pennsylvania Fire decision. That decision is unworkable in the e-commerce era, was poorly reasoned, and there are no reliance interests that warrant keeping the decision. Most importantly, however, Pennsylvania Fire cannot be reconciled with the Court’s more recent personal-jurisdiction decisions. Thus, the time has come for the Court to explicitly overrule Pennsylvania Fire. WLF’s brief also explains why the Court should not address Mallory’s historical arguments that he raised for the first at the Supreme Court. The case is set for oral argument on November 8.
Celebrating its 45th year, WLF is America’s premier public-interest law firm and policy center advocating for free-market principles, limited government, individual liberty, and the rule of law. | {"pred_label": "__label__wiki", "pred_label_prob": 0.5625442266464233, "wiki_prob": 0.5625442266464233, "source": "cc/2023-06/en_head_0000.json.gz/line1301128"} |
Sec 530F
[1]>
530F Obligation on principals to deduct tax.
(1) A principal to whom a deduction authorisation is issued under section 530D shall deduct tax from the relevant payment concerned only in accordance with the terms of the deduction authorisation.
(2) Subject to subsection (3), a principal to whom section 530A applies who makes a relevant payment to a subcontractor in circumstances other than those referred to in subsection (1) shall—
(a) be liable to pay tax to the Revenue Commissioners at the rate of 35 per cent on the amount of the relevant payment, and
(b) without prejudice to any other penalty to which the principal may be liable and without prejudice to section 1078, be liable to a penalty of €5,000 or the amount of the tax payable under paragraph (a), whichever is the lesser, unless the principal submits the details of the relevant payment in the return required under section 530K for the period concerned, on or before the due date for that return.
<[2]
(b) without prejudice to any other penalty to which the principal may be liable and without prejudice to section 1078, be liable to a penalty of €5,000 or the amount of the tax payable under paragraph (a), whichever is the lesser.
(2) A principal to whom section 530A applies who makes a relevant payment to a subcontractor in circumstances other than those referred to in subsection (1) shall, without prejudice to section 1078, be liable to a penalty of—
(a) 35 per cent of the relevant payment, where the person to whom the relevant payment was made was a subcontractor who has not had a determination made by the Revenue Commissioners under section 530I,
(b) 20 per cent of the relevant payment, where the person to whom the relevant payment was made was a subcontractor who has had a determination made by the Revenue Commissioners under section 530I and where neither section 530G nor section 530H applies to the subcontractor concerned,
(c) 10 per cent of the relevant payment, where the person to whom the relevant payment was made was a subcontractor to whom section 530H applies, and
(d) 3 per cent of the relevant payment, where the person to whom the relevant payment was made was a subcontractor to whom section 530G applies.
(3) [3]>(a) Where subsection (2)(a) applies and the principal submits the details of the relevant payment in a return for the relevant return period, the Revenue Commissioners shall establish the amount of tax that would have been due from the principal in respect of that payment had the rate of tax been the rate of tax last notified by the Revenue Commissioners to the sub-contractor concerned under section 530I and, notwithstanding subsection (2)(a), the tax due from the principal in respect of that payment by virtue of that subsection shall be the amount so established.<[3][3]>(a) Where subsection (2)(a) applies and the principal submits the details of the relevant payment in a return for the relevant return period [7]>by the due date for the return<[7] and, if appropriate, provides the Revenue Commissioners with such details, in relation to the relevant contract in respect of which the relevant payment was made, as may be required by the Revenue Commissioners, the Revenue Commissioners shall establish the amount of tax that would have been due from the principal in respect of that payment had the rate of tax been the rate of tax last notified by the Revenue Commissioners to the subcontractor concerned under section 530I and, notwithstanding the provisions of subsection (2)(a), the tax due from the principal in respect of that payment by virtue of that subsection shall be the amount so established.<[3]
(b) Where paragraph (a) applies, the Revenue Commissioners shall notify the principal of whether any adjustment to his liability for the period arises on account of the application of that paragraph and the Revenue Commissioners may include provision in any regulations made by them under this Chapter to give effect to this subsection.
(c) The amount of the penalty under subsection (2)(b) shall be calculated without reference to any adjustment of the tax due as a result of the application of paragraph (a).
(3) (a) Where subsection (2) applies, a principal shall submit an unreported payment notification to the Revenue Commissioners.
(b) The Revenue Commissioners shall make regulations for the purposes of this subsection and such regulations may—
(i) specify the manner by which principals shall submit an unreported payment notification to the Revenue Commissioners, and
(ii) provide for the details to be supplied to the Revenue Commissioners by a principal in relation to an unreported payment notification.
(4) Where a principal makes a relevant payment to a subcontractor, the principal shall issue a copy of the deduction authorisation in relation to that payment to the sub-contractor.
(4) Where, in making a relevant payment to a subcontractor, a principal deducts tax from the payment, the principal shall—
(a) provide the subcontractor with a copy of the deduction authorisation related to that payment, or
(b) arrange for the following details from the deduction authorisation to be given to the subcontractor by written or electronic means:
(i) the name and tax reference number of the principal,
(ii) the name and tax reference number of the subcontractor,
(iii) the gross amount of the payment, including the amount of tax deducted,
(iv) the amount of tax deducted,
(v) the rate at which tax was deducted,
(vi) the date of the payment, and
(vii) the unique reference number issued by the Revenue Commissioners on the deduction authorisation.
(5) The amount of tax which a principal is liable to deduct under subsection (1) from a relevant payment shall be due and payable by the principal concerned to the Revenue Commissioners in respect of the return period in which the payment is made.
[10]>
(6) The amount of tax which a principal is liable to pay to the Revenue Commissioners by virtue of subsection (2)(a) shall be due and payable by the principal concerned to the Revenue Commissioners in respect of the return period in which the payment is made.
<[10]
(7) Where, due to a persistent technology systems failure, a principal is unable to give notification to the Revenue Commissioners under section 530C(1) and has no option but to make a relevant payment without complying with that provision, subsection (2) shall not apply to that payment if the principal—
(a) deducts tax from that payment at the rate last notified to the principal in respect of the subcontractor concerned, or if there was no such notification, deducts tax at a rate of 35 per cent from that payment,
(b) immediately upon rectification of the technology systems failure notifies the Revenue Commissioners, in accordance with this Chapter or regulations made under this Chapter, that the payment has been made,
(c) provides all details in relation to the payment that the Revenue Commissioners may require, and
(d) pays the tax deducted in accordance with paragraph (a) to the Revenue Commissioners on or before the due date for the making of a return for the period within which the principal notifies the Revenue Commissioners under paragraph (b).
(8) Where a principal complies with the requirements of subsection (7)—
(a) the principal shall be deemed to have deducted tax from a relevant payment in accordance with the terms of a valid deduction authorisation, and
(b) for the purposes of section 530K, the payment shall be deemed to have been made in the return period in which the principal notifies the Revenue Commissioners under subsection (7)(b).
(9) A principal shall, on request, provide the Revenue Commissioners with information in relation to the circumstances and details of a persistent technology systems failure under subsection (7).
Inserted by FA11 s20(1)(k). With effect from 1 January 2012 as per S.I. No. 660 of 2011.
[-] [+]
Substituted by FA12 s22(1)(m). Comes into operation on and from 31 March 2012.
Substituted by FA12 s22(1)(n). Comes into operation on and from 31 March 2012.
Inserted by FA12 s22(1)(o). Comes into operation on and from 31 March 2012.
Substituted by FA12 s22(1)(p). Comes into operation on and from 31 March 2012.
Inserted by FA12 s22(1)(q). Comes into operation on and from 31 March 2012.
Deleted by F(No.2)A13 s26. Comes into operation on 1 January 2014.
Substituted by FA14 s17(b)(i). Comes into operation on 1 January 2015.
Substituted by FA14 s17(b)(ii). Comes into operation on 1 January 2015.
Deleted by FA14 s17(b)(iii). Comes into operation on 1 January 2015. | {"pred_label": "__label__wiki", "pred_label_prob": 0.9518957138061523, "wiki_prob": 0.9518957138061523, "source": "cc/2023-06/en_head_0000.json.gz/line637436"} |
Attempt to Close LGBT Organization in Turkey Stalls
October 31, 2007 Julie Bolcer and GO Staff
Turkish LGBT organizations are under fire from the government.
An effort by officials in Turkey to close one of the country’s leading LGBT organizations has been placed on hold until Jan 31, according to pinknews.co.uk. Citing the need for the prosecution to compile a report, a judge adjourned the trial in which the Istanbul Governor’s office is charging that the group, Lambda Istanbul, violates Turkish laws on morality.
Since 1993, according to Human Rights Watch, Lambda Istanbul has lobbied for legal protections against discrimination based on sexual orientation or gender identity. It operates a counseling hotline, and raises awareness about LGBT individuals through cultural, educational and political activities.
The Governor asked earlier this year that Lambda Istanbul be closed, and after the complaint was rejected, the case reached a higher court in July. A second hearing began on Oct. 18 before it was placed on hold.
Although homosexual sex is legal for adults over 18 in Turkey, the LGBT community often is harassed through unclear laws about public morality. Vaguely worded legal provisions on public morals are often used to harass LGBT people. The country, which is a candidate for EU membership, is a party to the International Covenant on Civil and Political Rights and the European Convention on Human Rights and Fundamental Freedoms. The treaties protect freedom of expression and association, and prohibit discrimination based on sexual orientation.
gay rights turkeyhuman rights watchinternational lgbt issueslambda instanbullgbt rights turkeyturkey
December 13, 2022 Clare Hand
Turkish Pop Star Arrested For Making Joke About Religious Schools
August 30, 2022 Robin Kish
Georgia Prez Says No to Anti-LGBT Referendum
August 15, 2016 GO Staff | {"pred_label": "__label__cc", "pred_label_prob": 0.5567107200622559, "wiki_prob": 0.44328927993774414, "source": "cc/2023-06/en_head_0000.json.gz/line1759062"} |
Team, Inc. Reports Second Quarter 2021 Results
Quest Delivered 51.4% Year-over-Year Revenue Growth
IHT Revenue Increased by 46% Year-over-Year
Team, Inc.
SUGAR LAND, Texas, Aug. 3, 2021 /PRNewswire/ -- Team, Inc. (NYSE: TISI), a global leading provider of integrated, digitally-enabled asset performance assurance and optimization solutions, today reported its financial results for the second quarter ended June 30, 2021.
Second Quarter 2021 Results:
Revenue of $238.9 million, up $49.6 million, or 26.2%, from Q2 2020
IHT and Quest segment revenue increased by 46.0% and 51.4%, respectively from Q2 2020
Gross margin was $62.8 million, up $5.4 million from Q2 2020
Quest adjusted EBITDA margin of 26.6%, surpassing the 2020 full year average of 24.1%
"TEAM's second quarter results reflect a mix of activity recovery and challenging market dynamics," said Amerino Gatti, TEAM's Chairman and Chief Executive Officer. "Although we are not pleased with our overall results, revenue was at the upper end of our outlook. All three segments achieved revenue growth over Q2 2020 with Quest reporting the largest overall percent increase at 51%. Inspection & Heat Treating followed at approximately 46% and Mechanical Services at 4.7%. The year-over-year topline growth was driven by strong April activity levels from several large turnaround projects. May and June activity benefited from increased economic activity as COVID-related restrictions began to lift. While COVID continued to force project delays, especially internationally, activity levels throughout the quarter were mostly in line with expectations, highlighting improved economic growth across the various end markets in which we serve.
"TEAM faced margin headwinds in the second quarter. We experienced inflation in several areas, such as raw materials, transportation, and labor as well as increased technician training, and lingering COVID-related pricing concessions. We remain focused on cost discipline and continue to look for ways to mitigate overall inflationary pressures. Pricing negotiations have started with our clients to reflect current market conditions. Given these proactive actions, combined with the transitory nature of the cost increases, we expect our gross margin to improve in the second half of the year.
"We continued our long-standing culture of technology innovation. After several successful field tests, the Mechanical Services segment commercialized our new, patent pending SmartStopTM Isolation Technology. This new double block and bleed isolation system increases integrity and overall safety, further strengthening our competitive advantages in the hot tapping market. Additionally, we entered into an agreement to become the exclusive provider of Credosoft Integrity Management Software in North America. The software enhances TEAM's ability to monitor assets, ensure compliance and provide inspection and repair solutions. The Credosoft service offering provides TEAM a stable, subscription-based revenue profile and further positions the company to be a leading provider of integrated digitally-enabled asset performance optimization solutions.
"As we enter the second half of 2021, we are cautiously optimistic about increased activity levels associated with an improving economy. While the recent emergence of COVID variants is concerning and could negatively impact our activity levels, the outlook for the fall turnaround season looks solid since operators are now in a better financial position to start previously postponed maintenance projects. Additionally, our international operations should benefit from progress of the vaccine rollout and the gradual removal of lockdown restrictions in key markets. Therefore, we expect sequential revenue growth to continue in the third quarter.
"We are making advances towards further revenue diversification into new markets, such as renewable energy and expanding regulatory services that include emissions control. Our revenue diversification efforts as well as investments in technology and digital are poised to be future growth drivers. TEAM is well-positioned to benefit from a strong economic recovery by capitalizing on built-up demand and pursuing opportunities that utilize the depth and breadth of our portfolio. We have a clear strategic plan to become more capital efficient, capture profitable growth, and generate positive cash flow," concluded Mr. Gatti.
Consolidated net loss in the second quarter of 2021 was $17.5 million ($0.57 loss per diluted share) compared to a loss of $13.5 million ($0.44 loss per diluted share) in the second quarter of 2020. Consolidated Adjusted EBITDA, a non-GAAP measure, was $9.1 million for the second quarter of 2021 compared to $12.7 million for the prior year quarter.
Consolidated revenue for the second quarter of 2021 was $238.9 million compared to $189.3 million in the prior year quarter. Revenue increased due to higher activity levels from increased economic activity in the U.S. and select international markets as economies opened from COVID-related shutdowns. In the second quarter of 2021, consolidated gross margin was $62.8 million, or 26.3%, compared with 30.3% in the same quarter a year ago. Gross margin was negatively impacted by cost inflation pressure combined with lingering COVID-related price discounts and the reinstatement of temporary cost reductions that TEAM enacted in 2020.
SG&A for the second quarter was $68.5 million, up $9.6 million, or a 16.3% increase from the second quarter of 2020. The company's adjusted measure of net income/loss, Consolidated Adjusted EBIT, a non-GAAP measure was a loss of $3.4 million in the second quarter compared to a loss of $0.2 million in the prior year comparable quarter.
Second quarter 2021 reported results include certain net charges not indicative of TEAM's core operating activities, including: $0.7 million of professional costs related to the previously announced new strategic organizational structure ("Operating Group Reorganization"), $0.3 million of severance charges primarily associated with the Operating Group Reorganization, and $1.6 million for accrued legal matters and other legal fees. Net of tax, these items totaled $2.6 million or $0.08 per diluted share.
Adjusted net loss, consolidated Adjusted EBIT, and Adjusted EBITDA are non-GAAP financial measures that exclude certain items that are not indicative of TEAM's core operating activities. A reconciliation of these non-GAAP financial measures to the most comparable GAAP financial measures is at the end of this release.
Segment Results
The following table illustrates the composition of the company's revenue and operating income (loss) by segment for the quarters ended June 30, 2021 and 2020 (in thousands):
June 30,
Increase (Decrease)
Revenues by business segment:
Quest Integrity
Corporate and shared support services
All three business segments delivered year-over-year revenue growth due to higher activity levels from increased economic activity in the U.S. and select international markets as economies opened up from COVID-related shutdowns. IHT results included a 46.0% year-over-year improvement in revenue primarily due to increased activity levels in the U.S. and Canada and 56.0% increase in operating income. MS delivered a 4.7% year-over-year improvement in revenue due to an increase in Turnaround projects and call-out work. However, MS's operating income declined due to inflationary cost pressures in raw materials and labor. Quest Integrity's results included a 51.4% year-over-year improvement in revenue and a $5.0 million increase in operating income. The increase in Quest Integrity is primarily the result of easing COVID-related global restrictions, additional subsea inspection work, and increased demand for Quest's proprietary services.
Cash and Debt
Consolidated cash and cash equivalents were $18.4 million at June 30, 2021. The company's net debt (total debt less cash and cash equivalents) was $338.1 million at June 30, 2021, compared to $287.9 million at Dec. 31, 2020.
The non-GAAP measures in this earnings release are provided to enable investors, analysts, and management to evaluate TEAM's performance excluding the effects of certain items that management believes impact the comparability of operating results between reporting periods. These measures should be used in addition to, and not in lieu of, results prepared in conformity with generally accepted accounting principles (GAAP). A reconciliation of each of the non-GAAP financial measures to the most directly comparable historical GAAP financial measure is contained in the accompanying schedule for each of the fiscal periods indicated.
Conference Call and Webcast Details
Team, Inc. will host a conference call on Wednesday, August 4, 2021 at 10:00 a.m. Eastern Time (9:00 a.m. Central Time) to review its second quarter 2021 results.
By Phone: Dial 1-877-407-5794 inside the U.S. or 1-201-389-0869 outside the U.S. at least 10 minutes before the call. A telephone replay will be available through August 11, 2021 by dialing 1-877-660-6853 inside the U.S. or 201-612-7415 outside the U.S. using the Conference ID 13720696#.
By Webcast: The call will be broadcast over the web and can be accessed on TEAM's website, www.teaminc.com under "Investor Relations." Please log on at least 10 minutes in advance to register and download any necessary software. A replay will be available shortly after the call.
About Team, Inc.
Headquartered in Sugar Land, Texas, Team Inc. (NYSE: TISI) is a global leading provider of integrated, digitally-enabled asset performance assurance and optimization solutions. We deploy conventional to highly specialized inspection, condition assessment, maintenance and repair services that result in greater safety, reliability and operational efficiency for our client's most critical assets. Through locations in more than 20 countries, we unite the delivery of technological innovation with over a century of progressive, yet proven integrity and reliability management expertise to fuel a better tomorrow. For more information, please visit www.teaminc.com.
Certain forward-looking information contained herein is being provided in accordance with the provisions of the Private Securities Litigation Reform Act of 1995. We have made reasonable efforts to ensure that the information, assumptions and beliefs upon which this forward-looking information is based are current, reasonable and complete. However, such forward-looking statements involve estimates, assumptions, judgments and uncertainties. There are known and unknown factors that could cause actual results or outcomes to differ materially from those addressed in the forward-looking information. Although it is not possible to identify all of these factors, they include, among others, the duration and magnitude of the COVID-19 pandemic, related economic effects and the resulting negative impact on demand for oil and gas and such known factors as are detailed in the Company's Annual Report on Form 10-K, Quarterly Reports on Form 10-Q and Current Reports on Form 8-K, each as filed with the Securities and Exchange Commission, and in other reports filed by the Company with the Securities and Exchange Commission from time to time. Accordingly, there can be no assurance that the forward-looking information contained herein, including projected cost savings, will occur or that objectives will be achieved. We assume no obligation to publicly update or revise any forward-looking statements made today or any other forward-looking statements made by the Company, whether as a result of new information, future events or otherwise, except as may be required by law.
TEAM, INC. AND SUBSIDIARIES
SUMMARY OF CONSOLIDATED OPERATING RESULTS
(unaudited, in thousands, except per share data)
Six Months Ended
Restructuring and other related charges, net
Goodwill impairment charge
Other expense, net
Loss before income taxes
Provision (benefit) for income taxes
Loss per common share:
Basic and diluted
Weighted-average number of shares outstanding:
SUMMARY CONSOLIDATED BALANCE SHEET INFORMATION
Current portion of long-term debt and finance lease obligations
Long-term debt and finance lease obligations, net of current maturities
TEAM INC. AND SUBSIDIARIES
SUMMARY CONSOLIDATED CASH FLOW INFORMATION
(unaudited, in thousands)
Allowance for credit losses
Non-cash compensation cost
Working capital changes
Other items affecting operating cash flows
Cash used for business acquisitions, net
Proceeds from disposal of assets
Other items affecting investing cash flow
Net cash used in investing activities
Net payments under Credit Facility revolver
Net borrowings under ABL facility
Payments under Credit Facility term loan
Payments for debt issuance costs
Taxes paid for net share settlement of share-based awards, net
Other items affecting financing cash flows
Net change in cash and cash equivalents
SEGMENT INFORMATION
Operating income (loss) ("EBIT")
Segment Adjusted EBIT
Segment Adjusted EBITDA
Includes goodwill impairment charge of $191.8 million for the six months ended June 30, 2020. Excluding the goodwill impairment charge, operating income for IHT would be $4.4 million for the six months ended June 30, 2020.
The Company uses supplemental non-GAAP financial measures which are derived from the consolidated financial information including adjusted net income (loss); adjusted net income (loss) per diluted share, earnings before interest and taxes ("EBIT"); adjusted EBIT (defined below); adjusted earnings before interest, taxes, depreciation and amortization ("adjusted EBITDA") and free cash flow to supplement financial information presented on a GAAP basis.
The Company defines adjusted net income (loss), adjusted net income (loss) per diluted share and adjusted EBIT to exclude the following items: costs associated with our OneTEAM program, costs associated with the Operating Group Reorganization, non-routine legal costs and settlements, restructuring charges, certain severance charges, goodwill impairment charges, loss on debt extinguishment and certain other items that we believe are not indicative of core operating activities. Consolidated adjusted EBIT, as defined by us, excludes the costs excluded from adjusted net income (loss) as well as income tax expense (benefit), interest charges, foreign currency (gain) loss, and items of other (income) expense. Consolidated adjusted EBITDA further excludes from consolidated adjusted EBIT depreciation, amortization and non-cash share-based compensation costs. Segment adjusted EBIT is equal to segment operating income (loss) excluding costs associated with our OneTEAM program, costs associated with the Operating Group Reorganization, non-routine legal costs and settlements, restructuring charges, certain severance charges, goodwill impairment charges and certain other items as determined by management. Segment adjusted EBITDA further excludes from segment adjusted EBIT depreciation, amortization, and non-cash share-based compensation costs. Free cash flow is defined as net cash provided by (used in) operating activities minus capital expenditures. Net debt is defined as the sum of the current and long-term portions of debt, including finance lease obligations, less cash and cash equivalents.
Management believes these non-GAAP financial measures are useful to both management and investors in their analysis of our financial position and results of operations. In particular, adjusted net income (loss), adjusted net income (loss) per diluted share, consolidated adjusted EBIT, and consolidated adjusted EBITDA are meaningful measures of performance which are commonly used by industry analysts, investors, lenders and rating agencies to analyze operating performance in our industry, perform analytical comparisons, benchmark performance between periods, and measure our performance against externally communicated targets. Our segment adjusted EBIT and segment adjusted EBITDA is also used as a basis for the Chief Operating Decision Maker to evaluate the performance of our reportable segments. Free cash flow is used by our management and investors to analyze our ability to service and repay debt and return value directly to stakeholders.
Non-GAAP measures have important limitations as analytical tools, because they exclude some, but not all, items that affect net earnings and operating income. These measures should not be considered substitutes for their most directly comparable U.S. GAAP financial measures and should be read only in conjunction with financial information presented on a GAAP basis. Further, our non-GAAP financial measures may not be comparable to similarly titled measures of other companies who may calculate non-GAAP financial measures differently, limiting the usefulness of those measures for comparative purposes. The liquidity measure of free cash flow does not represent a precise calculation of residual cash flow available for discretionary expenditures. Reconciliations of each non-GAAP financial measure to its most directly comparable GAAP financial measure are presented below.
RECONCILIATION OF NON-GAAP FINANCIAL MEASURES
(unaudited, in thousands except per share data)
Adjusted Net Income (Loss):
Professional fees and other1
Legal costs2
Severance charges, net3
Tax impact of adjustments and other net tax items4
Adjusted net loss
Adjusted net loss per common share:
Consolidated Adjusted EBIT and Adjusted EBITDA:
Foreign currency loss (gain)6
Pension expense (credit)5
Consolidated Adjusted EBIT
Amount included in operating expenses
Amount included in SG&A expenses
Total depreciation and amortization
Non-cash share-based compensation costs
Consolidated Adjusted EBITDA
Free Cash Flow:
Cash provided by (used in) operating activities
For the three and six months ended June 30, 2021, includes $0.7 million and $1.5 million, respectively, of costs associated with the Operating Group Reorganization (exclusive of restructuring costs). For the three and six months ended June 30, 2020, includes $0.2 million and $2.0 million, respectively, associated with the OneTEAM program (exclusive of restructuring costs).
For the three and six months ended June 30, 2021, primarily relates to accrued legal matters and other legal fees. For the three months and six months ended June 30, 2020, primarily relates to costs associated with international legal matters.
For the three months and six months ended June 30, 2021, $0.3 million and $2.2 million, respectively, associated with the Operating Group Reorganization. For the three and six months ended June 30, 2020, severance charges are associated with the OneTEAM program, including international operations.
Represents the tax effect of the adjustments. Beginning in Q2 2021, we now use the statutory tax rate, net of valuation allowance by legal entity to determine the tax effect of the adjustments. Prior to Q2 2021, we used an assumed marginal tax rate of 21% except for the adjustment of the goodwill impairment charge in Q1 2020 for which the actual tax impact was used. We have restated the prior period tax impact to use the statutory tax rate by legal entity, net of valuation allowance.
Represents pension expense (credit) for the U.K. pension plan based on the difference between the expected return on plan assets and the cost of the discounted pension liability. The pension plan has had no new participants added since the plan was frozen in 1994 and accruals for future benefits ceased in connection with a plan curtailment in 2013.
Represents foreign currency gain/loss. For prior period, includes other nominal fees.
RECONCILIATION OF NON-GAAP FINANCIAL MEASURES (Continued)
Segment Adjusted EBIT and Adjusted EBITDA:
Operating income (loss)
Adjusted EBIT
Primarily relates to severance charges incurred associated with the Operating Group Reorganization for the three and six months ended June 30, 2021. For the three and six months ended June 30, 2020, relates to severance charges associated with the OneTEAM program, including international restructuring under the OneTEAM program.
For the three and six months ended June 30, 2021, primarily relates to accrued legal matters and other legal fees. For the three and six months ended June 30, 2020, primarily relates to costs associated with international legal matters.
SOURCE Team, Inc.
www.teaminc.com | {"pred_label": "__label__cc", "pred_label_prob": 0.5762543082237244, "wiki_prob": 0.42374569177627563, "source": "cc/2023-06/en_head_0000.json.gz/line1182439"} |
Young Heart Patient Recovering from Successful Surgery, Uganda
Well wishes to Patricia
August 24, 2017 - Uganda
Alphonse Mwanamwolho
RMF Uganda would like to thank you for all your kind support to our young heart patient, Patricia Biira. Today, August 24, 2017, she has been discharged from the Uganda Heart Institute after her successful surgery on Wednesday, August 16, 2017. The surgeons have assured us that Patricia is in a stable condition and she will gradually heal from the post-surgery pain. Patricia has started standing and walking on her own, and she can smile and laugh.
Patricia was born with holes in her heart, which prevented her from growing and developing normally. Her mother is a housewife and her father is a primary school teacher. Before receiving help from Real Medicine Foundation, they sold everything they had, including a piece of land, to preserve Patricia’s life, but even that was not enough to pay for services at the Uganda Heart Institute. When RMF learned about Patricia’s situation in 2016, we agreed to cover expenses for her treatment at the Uganda Heart Institute. With treatment, Patricia has gradually improved, and thanks to RMF’s support, she underwent heart surgery on August 16, 2017 as a durable solution to her illness.
Patricia’s parents are thankful to RMF beyond what words can express, and RMF is grateful to the Uganda Heart Institute for every special consideration they offered to our young patient. We also thank our donors, whose support made Patricia’s treatment and surgery possible.
Patricia is now 3 years and 4 months old, and after recovering from the surgery, she will join school. It is our goal to support Patricia’s education so that she is empowered to contribute to the wellbeing of others when she grows up. Please contact RMF to donate towards Patricia’s education and medical check-ups, which still require funding. Patricia’s next check-up will be on September 21, 2017. We wish her a quick recovery.
Categories: Medical Support of Individual Children Uganda or View All | {"pred_label": "__label__cc", "pred_label_prob": 0.7419472932815552, "wiki_prob": 0.2580527067184448, "source": "cc/2023-06/en_head_0000.json.gz/line1154257"} |
Surging Democratic early voting prompts Republican concern
Jeremy Wallace, Austin Bureau
Feb. 26, 2018 Updated: Feb. 26, 2018 8:12 p.m.
A person enters the early voting site Tuesday at the Lions Field Adult and Senior Center on the first day of early voting for the March 6 joint primary elections. Through the first six days of early voting, about 10,000 more people voted in the Democratic primary elections than in the Republican primaries in the state’s 15 largest counties.William Luther /San Antonio Express-News
AUSTIN — Strong early voting numbers by Democrats are beginning to worry some of Texas’ biggest Republican names.
Gov. Greg Abbott’s campaign sent out an email blast to supporters Monday warning that Democrats are surging and becoming a real concern headed into the midterm election cycle.
“If these trends continue, we could be in real trouble come Election Day,” the email says.
Through the first six days of early voting, about 10,000 more people voted in the Democratic primary elections than in the Republican primaries in the state’s 15 largest counties. Four years ago — the most recent year with a gubernatorial election — Republicans were 54,000 voters ahead of Democrats.
In Bexar County, 16,463 voters cast a ballot in the Democratic primary through the first six days; 12,654 voted in the Republican primary.
Overall, 186,000 Democrats have voted through the first week of early voting, well ahead of the 101,000 who voted at the same point in 2014.
For Democrats, the numbers are more evidence that their voters are energized going into the midterm elections. Texas Democratic Party chair Gilberto Hinojosa has pointed to frustration with President Donald Trump as a major reason for the Democratic surge this year in early voting.
“Your vote is your voice; the best way to stop Donald Trump, protect our communities, and promote our progressive economic values is to vote in the Democratic Primary,” Hinojosa said about the early turnout numbers.
It also comes at a time that Democrats have been winning special elections in places Trump won in 2016.
“Democrats are already on a winning streak, flipping seats in special elections across the country in GOP strongholds,” the Abbott campaign email warns. “We’ve seen a surge of liberal enthusiasm in deep red states like Georgia, Alabama and Oklahoma. We had always hoped the liberal wave would never hit Texas, but these Early Voting returns aren’t encouraging so far.”
The letter calls on supporters to vote in the primaries and to make donations to help fund get-out-the-vote efforts.
Democrats have been boosted this year by a combination of factors. Opposition to Trump has been a big factor, but Democrats also have been aided by more candidates running for office and more competitive primaries than four years ago.
While early voting and vote-by-mail ballots are up this year, election experts warn this doesn’t necessarily mean there will be record turnout overall in the primary. Partly, Texas voters have been shifting from voting on Election Day to voting earlier as it has become more convenient.
Early voting started Feb. 20 and runs through Friday. Election day is March 6.
Jeremy Wallace
Jeremy Wallace has covered politics and campaigns for more than 20 years. Before joining the Hearst Texas newspapers in 2017 he covered government and politics for the Tampa Bay Times, The Miami Herald and the Sarasota Herald-Tribune. Previously he covered Congress for the Boston Globe and Detroit Free-Press. Originally from San Antonio, he attended the University of North Texas and earned his bachelor's degree from the University of Missouri. You can follow him on Twitter, @JeremySWallace, or email him at Jeremy.wallace@chron.com. | {"pred_label": "__label__wiki", "pred_label_prob": 0.9258610010147095, "wiki_prob": 0.9258610010147095, "source": "cc/2023-06/en_head_0000.json.gz/line446515"} |
Alster History, Family Crest & Coats of Arms
Origins Available:
Family Crest Download (JPG) Heritage Series - 600 DPI
On the western coast of Scotland and on the Hebrides islands the Alster family was born among the ancient Dalriadan clans. Their name comes from the given name Alexander, which in turn was originally derived from the Greek name, which means defender of men. In the late 11th century, Queen Margaret introduced the name, which she had heard in the Hungarian Court where she was raised, into Scotland by naming one of her sons Alexander. The popularity of the name Alexander was ensured by the fact that it was born by three Scottish kings, the first being Margaret's son who succeeded to the throne of Scotland following the death of Malcolm III.
Early Origins of the Alster family
The surname Alster was first found in Kintyre, where they held a family seat from ancient times.
"As a surname Alexander is very common on the west coast, where, according to the authors of Clan Donald, some of the descendants of Godfrey, second son of Alastair Mor, appear to have settled in the Carrick district of Ayrshire. " [1]
The Clan MacAllistair, Alisdair being the Gaelic for Alexander, are descended from the great King Somerled. Somerled had five sons, by his marriage to Ragnhildis, daughter of the Norwegian King of the Isles, Olaf Morsel. In the MacAllister line, Ranald had two sons, Ruari and Donald, and Donald had two sons, Angus and Alisdair. Alisdair living about 1230 to 1295 claimed the territory in South Knapdale, Kintyre, the ancient Clan seat was at Ard Phadraid (Patrick's Point) on the south side of Loch Tarbot. Alisdair (known as Alisdair Mor (the big)) is the recognized founder of the Clan. On his death, his estates were given to his brother and heir who was one of Bruce's supporters, Angus Mor.
Early History of the Alster family
This web page shows only a small excerpt of our Alster research. Another 462 words (33 lines of text) covering the years 1230, 1295, 1475, 1602, 1200, 1605, 1615, 1765, 1846, 1431, 1570, 1640, 1614, 1588, 1655, 1640, 1643, 1619, 1681, 1665, 1681, 1620, 1665, 1660, 1665, 1653, 1686, 1743, 1797 and are included under the topic Early Alster History in all our PDF Extended History products and printed products wherever possible.
Alster Spelling Variations
In various documents Alster has been spelled Since medieval scribes still spelled according to sound, records from that era contain an enormous number of spelling variations. Alexander, Alistair, MacAlexander, Alisandre, Alischoner, Alsinder, Alastair, MacAlexter, Callestar, Aleckander, Alexandri, Alisdair, Alaisder, Alestare, Alistare and many more.
Early Notables of the Alster family (pre 1700)
Notable amongst the Clan from early times was Sir William Alexander (circa 1570-1640), 1st Earl of Stirling, Scottish government official, knighted in 1614, appointed Governor of the barony of Nova Scotia; William Allestry (Allestrie) (1588-1655), an English politician who sat in the House of Commons of England (1640-1643)...
Another 48 words (3 lines of text) are included under the topic Early Alster Notables in all our PDF Extended History products and printed products wherever possible.
Migration of the Alster family to Ireland
Some of the Alster family moved to Ireland, but this topic is not covered in this excerpt.
Another 153 words (11 lines of text) about their life in Ireland is included in all our PDF Extended History products and printed products wherever possible.
Alster migration to the United States +
Dalriadan families proliferated in North America. Their descendants still populate many communities in the eastern parts of both the United States and Canada. Some settled in Canada as United Empire Loyalists, in the wake of the American War of Independence. Families on both sides of the border have recovered much of their heritage in the 20th century through Clan societies and highland games. Analysis of immigration records indicates that some of the first North American immigrants bore the name Alster or a variant listed above:
Alster Settlers in United States in the 19th Century
Reinhard Alster, who landed in Allegany (Allegheny) County, Pennsylvania in 1868 [2]
Reinhart Alster, who arrived in Allegany (Allegheny) County, Pennsylvania in 1868 [2]
Related Stories +
Family Crests: the Heraldic Artist
Family Crests: Timeline
Family Crests: Elements
Family Crests and Genealogy: how they relate
Spelling variations
Family seat
Clan seat
The Alster Motto +
The motto was originally a war cry or slogan. Mottoes first began to be shown with arms in the 14th and 15th centuries, but were not in general use until the 17th century. Thus the oldest coats of arms generally do not include a motto. Mottoes seldom form part of the grant of arms: Under most heraldic authorities, a motto is an optional component of the coat of arms, and can be added to or changed at will; many families have chosen not to display a motto.
Motto: Per mare, per terras
Motto Translation: By sea, by land.
Citations +
^ Smith, George (ed), Dictionary of National Biography. London: Smith, Elder & Co., 1885-1900. Print
^ Filby, P. William, Meyer, Mary K., Passenger and immigration lists index : a guide to published arrival records of about 500,000 passengers who came to the United States and Canada in the seventeenth, eighteenth, and nineteenth centuries. 1982-1985 Cumulated Supplements in Four Volumes Detroit, Mich. : Gale Research Co., 1985, Print (ISBN 0-8103-1795-8)
Alster (Scottish)
© 2000- 2023 Swyrich Corporation, all rights reserved. See Terms of Use for details.
We use cookies to enhance your personalized experience for ads, analytics, and more. Understand it all by viewing our Privacy Policy.
Removing this item from your shopping cart will remove your associated sale items.
Are you sure you want to delete this item from your shopping cart?
HouseofNames E-Newsletter Sign Up | {"pred_label": "__label__wiki", "pred_label_prob": 0.8847008943557739, "wiki_prob": 0.8847008943557739, "source": "cc/2023-06/en_head_0000.json.gz/line195089"} |
Experienced Drug Crimes Defense Lawyer
Experienced Criminal Defense Lawyer Representing Individuals Charged with Serious Drug Crimes in State and Federal Court
John Floyd is Board Certified in Criminal Law by Texas Board of Legal Specialization and is a recognized expert in criminal law. He has over twenty years experience representing individuals accused of serious drug crimes before the state courts in Houston, throughout Texas and in Federal Courts Nationwide.
Respected and Trusted Advocate
Mr. Floyd has been featured on national television programs, world-wide radio and printed media commenting on issues relating to criminal law. He is listed in Thomson Reuters’ prominent list of Super Lawyers and many other respected publications featuring the best and brightest criminal defense lawyers in America. Mr. Floyd represents high-profile individuals, professionals, celebrities and business people who have been charged with drug crimes for whom a drug conviction could be disastrous.
If You Must Take Your Drug Case Seriously
If you have been charged with a drug crime and must take the case seriously, please contact Mr. Floyd and discuss the facts of your case and a possible successful defensive strategy.
Serious Felony Drug Crimes in Texas
Drug offenses in Texas are among the most serious in the state’s arsenal of criminal laws. Penalties of drug violations can be extremely severe and carry with them a host of collateral consequences.
A drug charge in Texas does not necessarily mean a drug conviction. There are several effective defenses for narcotics offenses that a talented drug crimes attorney with experience investigating the circumstances surrounding an search and arrest for a drug crime should know and be able to use to your advantage. Mr. Floyd has published hundreds of articles relating to criminal law, search and seizure and trial procedures and can use his knowledge and experience to create a successful defense strategy and force the government to follow the law and meet its burden of proof.
Defensive Strategies in Drug Crimes Cases
For instance, an knowledgeable and prepared criminal defense lawyer could demonstrate that your arresting officers did not have just cause to search your home, vehicle, or person. He could show that you were a victim of entrapment, or argue that the drugs belonged to someone else or were not intended for human consumption. It is even possible that drugs found in your vicinity, or even in your vehicle, were hidden, unknown to you and therefore not in your possession. There are many possible successful defenses n drug cases, if your lawyer dedicates the time and resources to investigate your case and is familiar with the law.
Do Not Talk to the Police or Federal Agents without a Lawyer
If you believe you are being investigated for a drug trafficking crime, or have already been arrested or charged with this type of offense, consult with a knowledgeable attorney with experience in drug defenses immediately. Your lawyer can listen to your side of the story before helping you determine the best possible defense strategy in the unique circumstances of your case. With the help of a drug crimes attorney with a successful track record, you may be able to avoid crippling consequences to your freedom and future.
Texas Drug Crime Laws
Texas courts look at five primary factors in determining the sentence to be imposed upon a conviction of any of the above drug offenses:
The type of drug involved. For example, a drug found in penalty group 1 (heroin) will result in a much harsher sentence than a drug found in penalty group 3 (prescription drugs).
The amount of drugs involved. Greater amounts of the same drug, regardless of the penalty group, will result in a longer sentence.
The purpose for which the drug is used. A simple possession is less severe than intent to distribute, manufacture, or deliver drugs.
Location of the violation. Drugs possessed or sold near schools or day care centers, for example, are treated more harshly than on an average street corner.
Whether the drug offense was tied to another offense. Drug offenses associated with crimes of violence or involve the possession or use of a firearm will result in a significantly more severe sentence.
Texas Drug Statutes
Manufacture or delivery of controlled substances (drugs)
Minimum Punishment: Confinement in jail for a term of not more than 2 years, or less than 180 days, and a fine not to exceed $10,000
Maximum Punishment: Confinement in prison for life or for a term of not more than 99 years nor less than 15 years, and a fine not to exceed $250,000
Possession of controlled substances (drugs)
Minimum Punishment: Confinement in jail for a term of not more than 180 days, and a fine not to exceed $2,000 or both
Delivery of Marijuana
Minimum Punishment: Confinement in jail for a term of not more than 180 days, a fine not to exceed $2,000, or both
Possession of Marijuana
Maximum Punishment: Confinement in prison for life or for a term of not more than 99 years nor less than 5 years, and a fine not to exceed $50,000
These offenses are set out in Chapter 481 of Health and Safety Code. There are five penalty groups in this chapter. Each group designates the offense and punishment. The groups are governed by two factors: the type of the drug and the quantity involved. Section 481.032 contains exhaustive lists (with new drugs added each year) that are in Penalty Groups I, 1-A, 2, 3, 4, and 5.
CONSEQUENCES OF DRUG CONVICTIONS
There are also many collateral consequences for having been convicted of a drug offense in Texas.
Employment. Many occupations (such as barber, plumber, nurse, etc.) require a license to work. Section 53.021 of the Texas Occupations Code authorize Texas licensing authorities to revoke, suspend, or deny a license to anyone convicted of a felony or a misdemeanor involving moral turpitude.
Education: Any student convicted of the possession or sale of a controlled substance can lose or be denied financial assistance under the Federal Student Loans and Grants program, or the forfeiture of a prepaid scholarship.
Asset forfeiture: Serious drug convictions can result of forfeiture of cash, vehicles, homes, personal property, and businesses.
Firearm: A drug conviction of more than one year will result in loss of the right to own or possess a firearm or ammunition.
Housing: Federal housing policies permit the exclusion of drug offenders from federally subsidized or funded housing.
Civil rights: A drug conviction results in the loss of the right to vote, run for public office, be appointed to a public office, or serve on a jury.
Because of the wide range of criminal penalties associated with drug offenses and the vast array of civil penalties, disqualifications and disabilities associated flowing drug convictions (and, yes, probation is a conviction), any one charged with a drug offense needs an aggressive and experienced criminal defense attorney.
Experienced Federal Criminal Defense Lawyer
There are significant misconceptions about federal crimes. Many people assume that federal crimes are “white collar” or “national security” offenses. Nothing could be further from the truth. Approximately 55% of all federal prisoners, more than 30,000 of them, stand convicted of drug offenses. The U.S. Congress has enacted 38 drug statutes that proscribe penalties and fines for 165 drug-related offenses. The high end of these offenses carries penalties of 10 years to life imprisonment with $10 to $50 million fines while the lower end of these offenses carries penalties of 3 years imprisonment and fines up to $250,000.
Crimes with Mandatory Minimums
Below is a list of drug offenses that carry a mandatory minimum sentence under 28 U.S.C. § 841:
The mandatory minimum can be 5 to 10 years without parole depending upon the quantity of the drug involved.
The five-year minimum drug case can double to 10 years with one prior felony conviction while the 10-year minimum drug case can double to 20 years with a prior felony conviction.
Both the five-year and ten-year minimum cases increase to a mandatory minimum of 20 years if a death results. The minimum increases to life without parole if both a death results and the offender has one prior felony conviction.
Finally, the ten-year mandatory minimum drug type increases to life without parole if the offender has two or more prior felony convictions.
Drug sentencing Reform in Debate
Currently pending before Congress is the Smarter Sentencing Act that would cut in half the length of many drug sentences, but a significant group of lawmakers oppose the Act, labeling its supporters as being part of a “leniency industrial complex.”
Forfeiture of Property and Money
As with Texas drug convictions, federal drug convictions can also lead to civil forfeitures that result in the loss of personal property, including cash, homes, vehicles, planes, and other personal belongings
The proceeds from forfeited property go into the coffers of law enforcement agencies, not the government treasury. Thus, the police have an incentive to seize and forfeit as much property as possible, regardless of whether it is actually tied to an offender’s drug activity.
Drug Convictions can Destroy Lives, Professions
Beyond these serious to severe penal consequences, federal drug convictions have significant personal collateral consequences. They can disqualify you for a job in the health care industry, government, private security, law enforcement, many areas of the criminal justice system, and any other job requiring a security clearance.
They can, and most likely will, have adverse impact on your employment prospects with companies that routinely run criminal background checks prior to their decision to hire. They can also have a serious impact on your ability to rent a suitable residence as property owners also frequently run background checks, refusing to rent or lease to drug offenders.
Federal Drug Task Forces
Federal and state law enforcement officials often work together on drug enforcement offenses. They generally employ “task forces” that generally target one individual with the hope that he or she will lead them to a wider network of suspects. The primary objective of these kinds of investigation is to develop reasonable, articulable suspicion to arrest the initial target with the hopes that law enforcement can pressure the individual into cooperating with them to make a case against the wider network.
Contact a Criminal Defense Lawyer with Experience Defending Drug Cases
If you find yourself in a position facing a serious drug charge, you should immediately seek a qualified criminal defense lawyer who has experience defending individuals accused of serious drug charges. A skilled criminal defense attorney is more likely than not to develop a successful defense strategy against the drug charge, or, in the correct circumstances, to have the charge dismissed altogether.
Possible Defenses
Defenses against drug charges include: unlawful search and seizures, faulty crime lab analysis, lost or tampered with evidence, drugs that were planted, drugs that belonged to someone else, entrapment, or the medical marijuana exception.
Developing these defenses requires a criminal defense lawyer who has the knowledge and experienced necessary to apply the law to your case. In the proper circumstances your lawyer should have access to a team of investigators, paralegals, and experts, who can assist in providing a vigorous and thorough defense investigation, strategy preparation and trial plan that will lead to a successful outcome in the case.
Dedicated to the Best Possible Outcome
The primary goal of the John T. Floyd Law Firm is to produce the best outcome possible for our clients: dismissal of charges, acquittal at trial, verdict of a lesser offense, or the lowest sentence possible should a guilty verdict be rendered.
We Fight to get Our Clients out on Bail
A successful defense in a serious drug case begins with efforts to get you released on bail as soon as possible.
Obviously, detention in jail pending trial is not the best situation for our clients. No one wants to spend a day in jail. But pre-trail detention also interferes with our ability to communicate freely with our client and interferes with their ability to assist in preparing a defense. Pretrial detention is not good for the client, not good for the defensive strategy and interferes with personal obligations. Therefore, we demand bail in every case possible.
Too Many Guilty Pleas
97 percent of all federal drug offenders plead guilty to a reduced charge or to a lower recommended sentence than would result from a trial. We do not, however, undertake a plea bargain strategy unless our client directs us to do so. If the Government proffers a deal, we are ethically bound to convey that deal to you. At that point it is our duty to convey to the client the pros and cons of such a agreement, including the legal ramifications and consequences of a guilty plea. But the ultimate decision to enter into a plea bargain rests exclusively with you. It is your life and we will respect whatever decision you make regarding plea agreement or trial, will stand behind you 100 percent and will fight for the best possible result under the circumstances.
System Not Always Fair and Just
Our legal system is supposed to be fair and just. We know that is not always the case. Our duty, as criminal defense attorneys, is to fight for the fairness and justice that the Government is not always willing to extend to our clients. The Government’s prosecution of drug crimes is often rife with prosecutorial misconduct, unethical behavior before and during the trial, and an overzealousness that translates into downright meanness. We provide our clients a safeguard against these Government actions.
Proudly Fighting for the Rights of the Accused
At the John T. Floyd Law Firm, we are dedicated to protecting the rights of people accused of drug crimes in both state and federal courts. Our firm is headed by John T. Floyd, a Houston-based criminal lawyer who has helped countless clients across Texas defeat drug charges of all kinds, from complicated international drug trafficking and distribution cases down to minor possession charges that would have had a major impact of the lives of our clients.
We Will Fight for You
Mr. Floyd and his legal team have the experience, talent, and knowledge you need to fight back against overzealous prosecutors and law enforcement agents. With John T. Floyd in your corner, you will be in the best position possible to have your drug crime charges dismissed or reduced and avoid the life-altering penalties to your freedom and future. | {"pred_label": "__label__cc", "pred_label_prob": 0.7231287360191345, "wiki_prob": 0.2768712639808655, "source": "cc/2023-06/en_head_0000.json.gz/line1142576"} |
Search results for FOREST
1. [Bookplate for C. A. Walkinshaw] In black ink, an architectural border surrounds an image of a stylized Greco-roman figure sitting on a seat, reading a book, with others at his feet. There is also a bird and scroll imposed on the white space within the side of the seat.
2. [Bookplate for Jac Balfour Paul Ado] Using black ink on white paper, the background of this pictorial bookplate portrays a window frame and windowsill. The top left side of the window is latticed, below which is an image of a rocky mountain and forest above which the sun is rising or setting. On the right side of the window frame is a shelf with three books. Leaning against the shelf is an unravelled scroll reading "In Soli / tudine / Solamen" [comfort in solitude]. Below this text is a lit lamp. On the windowsill are three figures. From left to right, the first figure is standing, nude and holding a comedy mask to its face. The second nude is sitting holding a cape over its shoulder (on the cape is a heraldic emblem: The shield is argent with a rampant lion). The third figure is sitting with its right leg crossed over the left leg, clothed in a judge/lawyer's wig, clothed in robes and holding a large open book in its lap.
3. [Bookplate for F. H. Barlow] Black ink on white paper. A frame with crosses in the four corners surrounds the text.
4. [Bookplate for David L. G. Dryden] A yellow frame surrounds the central image. The central image is of a young man in medieval armour leading a white horse to the left of the image. The image is in a forest setting with several trees observable. Two notable trees are standing, one on the left, and one on the right side of the man providing a frame for the image. The entire scene is evocative of a Pre-Raphaelite painting.
5. [Bookplate for Wallace Wilson and Ethel Wilson] Executed in green ink on a white background, this bookplate depicts a peaceful scene of nature redolent of British Columbia. In the foreground is an evergreen tree behind which birds soar in the distance over mountains. Below the mountains is a forest that frames a lake. Overlooking the lake is a cabin emitting smoke from its roof, while in the lake's center is a fishing boat with two occupants. The text is placed beneath this scene and is framed in each of its four corners by an open book and scroll at the top, and closed books at the bottom.
6. [Bookplate for Emil Eerme and A. Lavdovsky by O. Kubse] In black, forest scene done in watercolour, bordered on sides and base by ruled lines.
7. [Bookplate for Convent of the Sacred Heart] Black ink on tan paper. Text is in medieval script.
8. [Bookplate for I. O. Körner and J. E. Horvath by K. M. S.] A central panel with the ownership text is surrounded by mantling that comes out of a vase at the bottom. Flanking the ownership panel there are two figures holding books at each side. Hanging from the mantling on the bottom are a drum and lyre, and surrounding the top are various animals. The top of the bookplate is crowned with a globe.
9. [Bookplate for William Arnold Bromfield by William West] In black ink, a belt/garter provides the border. Within is a demi-lion atop a curved crest wreath. In its paws is a sword, with point severed. The belt contains the French motto.
10. [Bookplate for Eliab Harvey] In black ink, an oval escutcheon, or (gold), with a dancette chief, sable (black), containing three crescents, argent (silver). The crest is a dexter hand couped at the wrist and erected, floating above is an inverted crescent, argent. The Latin motto is found encircling the escutcheon on the bordure, argent. A wreath made of two laurel branches encapsulates the escutcheon. A banner, containing the German motto, is wrapped around the base of the wreath with the Badge of a Companion of the Order of the Bath hanging between it.
11. [Bookplate for Octavius Wigram by Suffield] In black ink. Argent, a pallet, gules, charged with three escallops, one over two divided by a chevronnel, engrailed, countercharged, gules (red). A chief, argent (silver), a ship representing an English vessel of war of the 16th century, with four masts, sails furled proper, and a flag, azure (blue), sitting on the water. Above the escutcheon is a straight crest wreath on which is a mount supporting a hand in armour, in fess, couped at the wrist proper, charged with an escallop and holding a fleur-de-lis erect. Below the escutcheon is a banner containing the Latin motto.
12. [Bookplate for Charles Fyfe by R. P.] Bookplate printed in black ink, with a purple/blue ink, rubber-stamped annotation. This ex-libris depicts a woman reading to a young boy on a park or garden bench. The idyllic landscape behind them features a lake with two swans swimming in it. Further in the distance is a forest with the silhouettes of two figures standing among the trees and large dramatic clounds sweeping by in the background.
13. [Bookplate for Edmund Murton Walker by Thoreau MacDonald] In black ink on white paper, a dragonfly is flying past some large rocks next to a body of water, likely a river. In the background is a forest of tall evergreen trees.
14. [Bookplate for P. Gagnon] Black ink on cream paper. Crest features a beaver lying on a crest-wreath. There are maple leaf branches extending from both sides of the beaver. The beaver is surrounded by a half-circle border with the motto in black, capitalized sans-serif font written across the arc. The shield is divided per fess, with the top half being further divided per pale and the upper left hand portion is divided into three horizontal sections. The topmost left hand section is argent with sable dots charged with two fleurs-de-lis. The middle left hand section is argent with sable stripes charged with a lion passant. The bottom left hand section is argent with sable dots charged with three maple leaves connected at the stem. The upper right hand side is argent charged with two pieces of equipment, one atop the other, and a pair of scissors below. The equipment has a small curved bottom with two long, curving handles on top with a spike pointing through the lower end of the handles. Below the top half is a thin black banner with white capitalized sans-serif text. Below the banner is an image of a natural forest and coastal landscape with a ship with two tall masts in the water. On the coast, there are people, possible colonizers, interacting. A large cross has been erected on the coast on the right hand side of the image. The dexter supporter and sinister supporter are moose standing a curling ribbon with text in capitalized black sans-serif font.
15. [Bookplate by William Walker Alexander] Black ink on cream paper, depicting a satyr playing reed pipes in a field with some flowers, surrounded by wildlife (moose, rabbit, squirrel, beaver, birds). There is a forest and water nearby, and signs of human life (tent, canoe). Pictured within a circular frame, with ribbon and text, and a crow standing on a branch at the very top looking down. | {"pred_label": "__label__cc", "pred_label_prob": 0.6143912076950073, "wiki_prob": 0.3856087923049927, "source": "cc/2023-06/en_head_0000.json.gz/line537365"} |
var videoState={
create: function(){
var video;
var sprite;
video = game.add.video('storyvideo');
video.play(false);
sprite = video.addToWorld(game.world.centerX, game.world.centerY, 0.5, 0.5, 2, 2);
//pause
var picLabel= game.add.image(game.width/2, game.height-30, 'skip');
picLabel.anchor.setTo(-1,1);
picLabel.inputEnabled = true;
picLabel.events.onInputDown.add(this.start, this);
//skip video
// var picLabel= game.add.image(game.width/2, game.height-30, 'skip');
// picLabel.anchor.setTo(-2,1);
// picLabel.inputEnabled = true;
// picLabel.events.onInputDown.add(this.startgame, this);
// game.time.events.add(Phaser.Timer.SECOND * 10, this.fadeState, this);
// game.stage.backgroundColor= '#ffffff';
game.physics.startSystem(Phaser.Physics. ARCADE);
game.renderer.renderSession.roundPixels=true;
},
// fadeState: function(){
// game.state.start('play');
// },
start: function(){
game.paused = (game.paused) ? false : true;
game.state.start('play');
},
// startgame: function(){
// game.state.start('play');
// },
}; | {'content_hash': '1c932c7359417cc3e05f3380eabb7fac', 'timestamp': '', 'source': 'github', 'line_count': 51, 'max_line_length': 89, 'avg_line_length': 25.41176470588235, 'alnum_prop': 0.5601851851851852, 'repo_name': 'nickchulani99/ITE-445', 'id': 'd9d5cb9bb5e54f95b73df6a87d4bcecebdc40318', 'size': '1296', 'binary': False, 'copies': '1', 'ref': 'refs/heads/gh-pages', 'path': 'final/alien copy 4/js/video.js', 'mode': '33188', 'license': 'mit', 'language': [{'name': 'HTML', 'bytes': '16832'}, {'name': 'JavaScript', 'bytes': '451272'}]} |
package mts
//Licensed under the Apache License, Version 2.0 (the "License");
//you may not use this file except in compliance with the License.
//You may obtain a copy of the License at
//
//http://www.apache.org/licenses/LICENSE-2.0
//
//Unless required by applicable law or agreed to in writing, software
//distributed under the License is distributed on an "AS IS" BASIS,
//WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
//See the License for the specific language governing permissions and
//limitations under the License.
//
// Code generated by Alibaba Cloud SDK Code Generator.
// Changes may cause incorrect behavior and will be lost if the code is regenerated.
import (
"github.com/aliyun/alibaba-cloud-sdk-go/sdk/requests"
"github.com/aliyun/alibaba-cloud-sdk-go/sdk/responses"
)
// SearchMedia invokes the mts.SearchMedia API synchronously
func (client *Client) SearchMedia(request *SearchMediaRequest) (response *SearchMediaResponse, err error) {
response = CreateSearchMediaResponse()
err = client.DoAction(request, response)
return
}
// SearchMediaWithChan invokes the mts.SearchMedia API asynchronously
func (client *Client) SearchMediaWithChan(request *SearchMediaRequest) (<-chan *SearchMediaResponse, <-chan error) {
responseChan := make(chan *SearchMediaResponse, 1)
errChan := make(chan error, 1)
err := client.AddAsyncTask(func() {
defer close(responseChan)
defer close(errChan)
response, err := client.SearchMedia(request)
if err != nil {
errChan <- err
} else {
responseChan <- response
}
})
if err != nil {
errChan <- err
close(responseChan)
close(errChan)
}
return responseChan, errChan
}
// SearchMediaWithCallback invokes the mts.SearchMedia API asynchronously
func (client *Client) SearchMediaWithCallback(request *SearchMediaRequest, callback func(response *SearchMediaResponse, err error)) <-chan int {
result := make(chan int, 1)
err := client.AddAsyncTask(func() {
var response *SearchMediaResponse
var err error
defer close(result)
response, err = client.SearchMedia(request)
callback(response, err)
result <- 1
})
if err != nil {
defer close(result)
callback(nil, err)
result <- 0
}
return result
}
// SearchMediaRequest is the request struct for api SearchMedia
type SearchMediaRequest struct {
*requests.RpcRequest
ResourceOwnerId requests.Integer `position:"Query" name:"ResourceOwnerId"`
Description string `position:"Query" name:"Description"`
Title string `position:"Query" name:"Title"`
PageNumber requests.Integer `position:"Query" name:"PageNumber"`
CateId string `position:"Query" name:"CateId"`
PageSize requests.Integer `position:"Query" name:"PageSize"`
From string `position:"Query" name:"From"`
Tag string `position:"Query" name:"Tag"`
KeyWord string `position:"Query" name:"KeyWord"`
ResourceOwnerAccount string `position:"Query" name:"ResourceOwnerAccount"`
OwnerAccount string `position:"Query" name:"OwnerAccount"`
OwnerId requests.Integer `position:"Query" name:"OwnerId"`
SortBy string `position:"Query" name:"SortBy"`
To string `position:"Query" name:"To"`
}
// SearchMediaResponse is the response struct for api SearchMedia
type SearchMediaResponse struct {
*responses.BaseResponse
TotalNum int64 `json:"TotalNum" xml:"TotalNum"`
PageSize int64 `json:"PageSize" xml:"PageSize"`
RequestId string `json:"RequestId" xml:"RequestId"`
PageNumber int64 `json:"PageNumber" xml:"PageNumber"`
MediaList MediaListInSearchMedia `json:"MediaList" xml:"MediaList"`
}
// CreateSearchMediaRequest creates a request to invoke SearchMedia API
func CreateSearchMediaRequest() (request *SearchMediaRequest) {
request = &SearchMediaRequest{
RpcRequest: &requests.RpcRequest{},
}
request.InitWithApiInfo("Mts", "2014-06-18", "SearchMedia", "mts", "openAPI")
request.Method = requests.POST
return
}
// CreateSearchMediaResponse creates a response to parse from SearchMedia response
func CreateSearchMediaResponse() (response *SearchMediaResponse) {
response = &SearchMediaResponse{
BaseResponse: &responses.BaseResponse{},
}
return
}
| {'content_hash': '4765aae0af2406ea691fb001ea5a83df', 'timestamp': '', 'source': 'github', 'line_count': 116, 'max_line_length': 144, 'avg_line_length': 38.23275862068966, 'alnum_prop': 0.7019165727170237, 'repo_name': 'aliyun/alibaba-cloud-sdk-go', 'id': 'e23386a31fa5de227e10f19984b8f3e7eb736f22', 'size': '4435', 'binary': False, 'copies': '1', 'ref': 'refs/heads/master', 'path': 'services/mts/search_media.go', 'mode': '33188', 'license': 'apache-2.0', 'language': [{'name': 'Go', 'bytes': '734307'}, {'name': 'Makefile', 'bytes': '183'}]} |
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8" />
<title>Invitation to calendar</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
</head>
<body>
<h2>You was invited to calendar.</h2>
<p>You can login and set password procceed by link:</p>
<a href="<?php echo $link?>"><?php echo $link?></a>
</body>
</html> | {'content_hash': '324efbc1ad28fdfe902cd1e51f7e095e', 'timestamp': '', 'source': 'github', 'line_count': 15, 'max_line_length': 76, 'avg_line_length': 23.733333333333334, 'alnum_prop': 0.6432584269662921, 'repo_name': 'vchukhalyonock/calendar', 'id': '5ca5e852381e8a65c1d2612696445e148aa8677b', 'size': '356', 'binary': False, 'copies': '1', 'ref': 'refs/heads/master', 'path': 'application/views/email/invite.php', 'mode': '33188', 'license': 'mit', 'language': [{'name': 'ApacheConf', 'bytes': '366'}, {'name': 'CSS', 'bytes': '39144'}, {'name': 'HTML', 'bytes': '5502'}, {'name': 'JavaScript', 'bytes': '460150'}, {'name': 'PHP', 'bytes': '1807984'}]} |
import os
from flask import Flask,render_template,url_for,request,session,redirect
from flask_login import LoginManager
from flask_bootstrap import Bootstrap
from flask_script import Manager,Shell
from flask_sqlalchemy import SQLAlchemy
from flask_mail import Mail
from flask_moment import Moment
from flask_socketio import SocketIO
from flask_gravatar import Gravatar
app = Flask(__name__)
basedir = os.path.abspath(os.path.dirname(__file__))
app.config['SQLALCHEMY_DATABASE_URI'] =\
'sqlite:///' + os.path.join(basedir, 'data.sqlite')
#app.config['SQLALCHEMY_DATABASE_URI'] = 'mysql+pymysql://sql6140009:Y1912zwYwC@sql6.freemysqlhosting.net/sql6140009'
app.config['SQLALCHEMY_TRACK_MODIFICATIONS'] = False
app.config['SECRET_KEY'] = 'hard to guess string'
app.config['MAIL_SERVER'] = 'smtp.googlemail.com'
app.config['MAIL_PORT'] = 587
app.config['MAIL_USE_TLS'] = True
app.config['MAIL_USERNAME'] = os.environ.get('MAIL_USERNAME')
app.config['MAIL_PASSWORD'] = os.environ.get('MAIL_PASSWORD')
manager = Manager(app)
bootstrap = Bootstrap()
db = SQLAlchemy(app)
mail = Mail(app)
moment = Moment(app)
socketio = SocketIO(app)
gravatar = Gravatar(app)
login_manager = LoginManager()
login_manager.session_protection = 'strong'
login_manager.login_view = 'auth.login'
# app.config['SECRET_KEY'] = 'hard to guess string'
# app.config['SQLALCHEMY_COMMIT_ON_TEARDOWN'] = True
#app = create_app('DEVELOPMENT')
bootstrap.init_app(app)
#db.init_app(app)
login_manager.init_app(app)
from app import models
@app.route('/')
def index():
return render_template('index.html')
from app.auth.views import admin
app.register_blueprint(auth.views.admin,url_prefix = '/authentication')
from app.main.views import welcome
app.register_blueprint(main.views.welcome,url_prefix = '/welcome')
from app.twitterAPI.views import api
app.register_blueprint(twitterAPI.views.api,url_prefix = '/api')
| {'content_hash': 'a9735eefc6ff4807441825a5f2811599', 'timestamp': '', 'source': 'github', 'line_count': 58, 'max_line_length': 117, 'avg_line_length': 32.62068965517241, 'alnum_prop': 0.7563424947145877, 'repo_name': 'sumedh123/debatify', 'id': '89d78b1a48e585a5353b33fa5344659ba9f8770a', 'size': '1892', 'binary': False, 'copies': '1', 'ref': 'refs/heads/UI', 'path': 'app/__init__.py', 'mode': '33188', 'license': 'mit', 'language': [{'name': 'C', 'bytes': '5939'}, {'name': 'CSS', 'bytes': '347155'}, {'name': 'HTML', 'bytes': '102503'}, {'name': 'JavaScript', 'bytes': '608373'}, {'name': 'Python', 'bytes': '8393673'}, {'name': 'Shell', 'bytes': '3298'}]} |
/*
* String hash computation (interning).
*/
#include "duk_internal.h"
/* constants for duk_hashstring() */
#define STRING_HASH_SHORTSTRING 4096
#define STRING_HASH_MEDIUMSTRING (256 * 1024)
#define STRING_HASH_BLOCKSIZE 256
duk_uint32_t duk_heap_hashstring(duk_heap *heap, duk_uint8_t *str, duk_size_t len) {
/*
* Sampling long strings by byte skipping (like Lua does) is potentially
* a cache problem. Here we do 'block skipping' instead for long strings:
* hash an initial part, and then sample the rest of the string with
* reasonably sized chunks.
*
* Skip should depend on length and bound the total time to roughly
* logarithmic.
*
* With current values:
*
* 1M string => 256 * 241 = 61696 bytes (0.06M) of hashing
* 1G string => 256 * 16321 = 4178176 bytes (3.98M) of hashing
*
* After an initial part has been hashed, an offset is applied before
* starting the sampling. The initial offset is computed from the
* hash of the initial part of the string. The idea is to avoid the
* case that all long strings have certain offset ranges that are never
* sampled.
*/
/* note: mixing len into seed improves hashing when skipping */
duk_uint32_t str_seed = heap->hash_seed ^ len;
if (len <= STRING_HASH_SHORTSTRING) {
return duk_util_hashbytes(str, len, str_seed);
} else {
duk_uint32_t hash;
duk_size_t off;
duk_size_t skip;
if (len <= STRING_HASH_MEDIUMSTRING) {
skip = (duk_size_t) (16 * STRING_HASH_BLOCKSIZE + STRING_HASH_BLOCKSIZE);
} else {
skip = (duk_size_t) (256 * STRING_HASH_BLOCKSIZE + STRING_HASH_BLOCKSIZE);
}
hash = duk_util_hashbytes(str, (duk_size_t) STRING_HASH_SHORTSTRING, str_seed);
off = STRING_HASH_SHORTSTRING + (skip * (hash % 256)) / 256;
/* FIXME: inefficient loop */
while (off < len) {
duk_size_t left = len - off;
duk_size_t now = (duk_size_t) (left > STRING_HASH_BLOCKSIZE ? STRING_HASH_BLOCKSIZE : left);
hash ^= duk_util_hashbytes(str + off, now, str_seed);
off += skip;
}
return hash;
}
}
| {'content_hash': 'bab3317c67f40063ff7a69f3bcc74bb0', 'timestamp': '', 'source': 'github', 'line_count': 64, 'max_line_length': 95, 'avg_line_length': 32.140625, 'alnum_prop': 0.6684491978609626, 'repo_name': 'JoshEngebretson/duktape', 'id': '29411796cbb56b7d91920771a24db254493ccfc8', 'size': '2057', 'binary': False, 'copies': '1', 'ref': 'refs/heads/master', 'path': 'src/duk_heap_hashstring.c', 'mode': '33188', 'license': 'mit', 'language': [{'name': 'C', 'bytes': '1972812'}, {'name': 'C++', 'bytes': '20922'}, {'name': 'CoffeeScript', 'bytes': '895'}, {'name': 'JavaScript', 'bytes': '15926045'}, {'name': 'Objective-C', 'bytes': '6054'}, {'name': 'Python', 'bytes': '136104'}, {'name': 'Shell', 'bytes': '12610'}]} |
--TEST--
Runkit_Sandbox_Parent Class -- Echo
--SKIPIF--
<?php if(!extension_loaded("runkit") || !RUNKIT_FEATURE_SANDBOX) print "skip";
/* May not be available due to lack of TSRM interpreter support */
if(!function_exists("runkit_sandbox_output_handler")) print "skip"; ?>
--FILE--
<?php
$php = new Runkit_Sandbox();
$php['output_handler'] = 'test_handler';
$php['parent_access'] = true;
$php->ini_set('display_errors', true);
$php->ini_set('html_errors', false);
$php->eval('$PARENT = new Runkit_Sandbox_Parent;
echo "Foo\n";
$PARENT->echo("BarBar\n");');
function test_handler($str) {
if (strlen($str) == 0) return NULL; /* flush() */
/* Echoing and returning have the same effect here, both go to parent's output chain */
echo 'Received string from sandbox: ' . strlen($str) . " bytes long.\n";
return strtoupper($str);
}
--EXPECT--
Received string from sandbox: 4 bytes long.
FOO
Received string from sandbox: 149 bytes long.
WARNING: RUNKIT_SANDBOX_PARENT::ECHO(): ACCESS TO ECHO DATA IN THE PARENT CONTEXT IS NOT ENABLED IN UNKNOWN(0) : RUNKIT_SANDBOX EVAL CODE ON LINE 3
| {'content_hash': '009fcdd5cf234bb851939760b7bb2bec', 'timestamp': '', 'source': 'github', 'line_count': 30, 'max_line_length': 147, 'avg_line_length': 36.93333333333333, 'alnum_prop': 0.6796028880866426, 'repo_name': 'lzpfmh/runkit', 'id': '44237969acec682b89517ba99d074aa575d5c09a', 'size': '1108', 'binary': False, 'copies': '4', 'ref': 'refs/heads/master', 'path': 'tests/Runkit_Sandbox_Parent__.echo.access.phpt', 'mode': '33188', 'license': 'bsd-3-clause', 'language': [{'name': 'C', 'bytes': '263129'}, {'name': 'C++', 'bytes': '372'}, {'name': 'PHP', 'bytes': '141611'}, {'name': 'SourcePawn', 'bytes': '193'}]} |
package org.codehaus.groovy.grails.scaffolding;
import grails.build.logging.GrailsConsole;
import groovy.text.SimpleTemplateEngine;
import groovy.text.Template;
import java.io.BufferedWriter;
import java.io.File;
import java.io.FileWriter;
import java.io.IOException;
import java.io.InputStream;
import java.io.Writer;
import java.util.Collections;
import java.util.HashMap;
import java.util.HashSet;
import java.util.Map;
import java.util.Set;
import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
import org.codehaus.groovy.grails.commons.GrailsApplication;
import org.codehaus.groovy.grails.commons.GrailsDomainClass;
import org.codehaus.groovy.grails.commons.GrailsDomainClassProperty;
import org.codehaus.groovy.grails.plugins.GrailsPluginInfo;
import org.codehaus.groovy.grails.plugins.GrailsPluginManager;
import org.codehaus.groovy.grails.plugins.GrailsPluginUtils;
import org.codehaus.groovy.grails.plugins.PluginManagerAware;
import org.codehaus.groovy.runtime.IOGroovyMethods;
import org.codehaus.groovy.runtime.StringGroovyMethods;
import org.springframework.context.ResourceLoaderAware;
import org.springframework.core.io.AbstractResource;
import org.springframework.core.io.FileSystemResource;
import org.springframework.core.io.Resource;
import org.springframework.core.io.ResourceLoader;
import org.springframework.core.io.support.PathMatchingResourcePatternResolver;
import org.springframework.util.Assert;
import org.springframework.util.StringUtils;
public abstract class AbstractGrailsTemplateGenerator implements GrailsTemplateGenerator, ResourceLoaderAware, PluginManagerAware {
protected static final Log log = LogFactory.getLog(AbstractGrailsTemplateGenerator.class);
protected String basedir = ".";
protected boolean overwrite = false;
protected SimpleTemplateEngine engine = new SimpleTemplateEngine();
protected ResourceLoader resourceLoader;
protected Template renderEditorTemplate;
protected String domainSuffix = "";
protected GrailsPluginManager pluginManager;
protected GrailsApplication grailsApplication;
protected AbstractGrailsTemplateGenerator(ClassLoader classLoader) {
engine = new SimpleTemplateEngine(classLoader);
}
public void generateViews(GrailsDomainClass domainClass, String destDir) throws IOException {
Assert.hasText(destDir, "Argument [destdir] not specified");
File viewsDir = new File(destDir, "grails-app/views/" + domainClass.getPropertyName());
if (!viewsDir.exists()) {
viewsDir.mkdirs();
}
for (String name : getTemplateNames()) {
if(log.isInfoEnabled())
log.info("Generating ["+name+"] view for domain class ["+domainClass.getFullName()+"]");
generateView(domainClass, name, viewsDir.getAbsolutePath());
}
}
public void generateController(GrailsDomainClass domainClass, String destDir) throws IOException {
Assert.hasText(destDir, "Argument [destdir] not specified");
if (domainClass == null) {
return;
}
String fullName = domainClass.getFullName();
String pkg = "";
int pos = fullName.lastIndexOf('.');
if (pos != -1) {
// Package name with trailing '.'
pkg = fullName.substring(0, pos + 1);
}
File destFile = new File(destDir, "grails-app/controllers/" + pkg.replace('.', '/') + domainClass.getShortName() + "Controller.groovy");
if (canWrite(destFile)) {
destFile.getParentFile().mkdirs();
BufferedWriter writer = null;
try {
writer = new BufferedWriter(new FileWriter(destFile));
generateController(domainClass, writer);
try {
writer.flush();
}
catch (IOException ignored) {}
}
finally {
IOGroovyMethods.closeQuietly(writer);
}
log.info("Controller generated at ["+destFile+"]");
}
}
@Override
public void generateAsyncController(GrailsDomainClass domainClass, String destDir) throws IOException {
Assert.hasText(destDir, "Argument [destdir] not specified");
if (domainClass == null) {
return;
}
String fullName = domainClass.getFullName();
String pkg = "";
int pos = fullName.lastIndexOf('.');
if (pos != -1) {
// Package name with trailing '.'
pkg = fullName.substring(0, pos + 1);
}
File destFile = new File(destDir, "grails-app/controllers/" + pkg.replace('.', '/') + domainClass.getShortName() + "Controller.groovy");
if (canWrite(destFile)) {
destFile.getParentFile().mkdirs();
BufferedWriter writer = null;
try {
writer = new BufferedWriter(new FileWriter(destFile));
generateAsyncController(domainClass, writer);
try {
writer.flush();
}
catch (IOException ignored) {}
}
finally {
IOGroovyMethods.closeQuietly(writer);
}
log.info("Controller generated at ["+destFile+"]");
}
}
public void generateView(GrailsDomainClass domainClass, String viewName, Writer out) throws IOException {
String templateText = getTemplateText(viewName + ".gsp");
if (!StringUtils.hasLength(templateText)) {
return;
}
GrailsDomainClassProperty multiPart = null;
for (GrailsDomainClassProperty property : domainClass.getProperties()) {
if (property.getType() == Byte[].class || property.getType() == byte[].class) {
multiPart = property;
break;
}
}
String packageName = StringUtils.hasLength(domainClass.getPackageName()) ? "<%@ page import=\"" + domainClass.getFullName() + "\" %>" : "";
Map<String, Object> binding = createBinding(domainClass);
binding.put("packageName", packageName);
binding.put("multiPart", multiPart);
binding.put("propertyName", getPropertyName(domainClass));
generate(templateText, binding, out);
}
protected abstract Object getRenderEditor();
public void generateView(GrailsDomainClass domainClass, String viewName, String destDir) throws IOException {
File destFile = new File(destDir, viewName + ".gsp");
if (!canWrite(destFile)) {
return;
}
BufferedWriter writer = null;
try {
writer = new BufferedWriter(new FileWriter(destFile));
generateView(domainClass, viewName, writer);
try {
writer.flush();
}
catch (IOException ignored) {}
}
finally {
IOGroovyMethods.closeQuietly(writer);
}
}
public void generateController(GrailsDomainClass domainClass, Writer out) throws IOException {
String templateText = getTemplateText("Controller.groovy");
Map<String, Object> binding = createBinding(domainClass);
binding.put("packageName", domainClass.getPackageName());
binding.put("propertyName", getPropertyName(domainClass));
generate(templateText, binding, out);
}
public void generateAsyncController(GrailsDomainClass domainClass, Writer out) throws IOException {
String templateText = getTemplateText("AsyncController.groovy");
Map<String, Object> binding = createBinding(domainClass);
binding.put("packageName", domainClass.getPackageName());
binding.put("propertyName", getPropertyName(domainClass));
generate(templateText, binding, out);
}
@Override
public void generateAsyncTest(GrailsDomainClass domainClass, String destDir) throws IOException {
generateTest(domainClass, destDir, "AsyncSpec.groovy");
}
public void generateTest(GrailsDomainClass domainClass, String destDir) throws IOException {
generateTest(domainClass, destDir, "Spec.groovy");
}
private void generateTest(GrailsDomainClass domainClass, String destDir, String templateName) throws IOException {
File destFile = new File(destDir, domainClass.getPackageName().replace('.', '/') + '/' + domainClass.getShortName() + "ControllerSpec.groovy");
if (!canWrite(destFile)) {
return;
}
String templateText = getTemplateText(templateName);
Map<String, Object> binding = createBinding(domainClass);
binding.put("packageName", domainClass.getPackageName());
binding.put("propertyName", domainClass.getLogicalPropertyName());
binding.put("modelName", getPropertyName(domainClass));
destFile.getParentFile().mkdirs();
BufferedWriter writer = null;
try {
writer = new BufferedWriter(new FileWriter(destFile));
generate(templateText, binding, writer);
try {
writer.flush();
}
catch (IOException ignored) {}
}
finally {
IOGroovyMethods.closeQuietly(writer);
}
}
@SuppressWarnings("deprecation")
protected Map<String, Object> createBinding(GrailsDomainClass domainClass) {
boolean hasHibernate = pluginManager.hasGrailsPlugin("hibernate") || pluginManager.hasGrailsPlugin("hibernate4");
Map<String, Object> binding = new HashMap<String, Object>();
binding.put("pluginManager", pluginManager);
binding.put("domainClass", domainClass);
binding.put("className", domainClass.getShortName());
binding.put("renderEditor", getRenderEditor());
binding.put("comparator", hasHibernate ? DomainClassPropertyComparator.class : SimpleDomainClassPropertyComparator.class);
return binding;
}
protected void generate(String templateText, Map<String, Object> binding, Writer out) {
try {
engine.createTemplate(templateText).make(binding).writeTo(out);
}
catch (ClassNotFoundException e) {
throw new RuntimeException(e);
}
catch (IOException e) {
throw new RuntimeException(e);
}
}
protected String getPropertyName(GrailsDomainClass domainClass) {
return domainClass.getPropertyName() + domainSuffix;
}
protected String getTemplateText(String template) throws IOException {
InputStream inputStream = null;
if (resourceLoader != null && grailsApplication.isWarDeployed()) {
inputStream = resourceLoader.getResource("/WEB-INF/templates/scaffolding/" + template).getInputStream();
}
else {
AbstractResource templateFile = getTemplateResource(template);
if (templateFile.exists()) {
inputStream = templateFile.getInputStream();
}
}
return inputStream == null ? null : IOGroovyMethods.getText(inputStream);
}
protected AbstractResource getTemplateResource(String template) throws IOException {
String name = "src/templates/scaffolding/" + template;
AbstractResource templateFile = new FileSystemResource(new File(basedir, name).getAbsoluteFile());
if (!templateFile.exists()) {
templateFile = new FileSystemResource(new File(getPluginDir(), name).getAbsoluteFile());
}
return templateFile;
}
protected File getPluginDir() throws IOException {
GrailsPluginInfo info = GrailsPluginUtils.getPluginBuildSettings().getPluginInfoForName("scaffolding");
return info.getDescriptor().getFile().getParentFile();
}
protected boolean canWrite(File testFile) {
if (overwrite || !testFile.exists()) {
return true;
}
try {
String relative = makeRelativeIfPossible(testFile.getAbsolutePath(), basedir);
String response = GrailsConsole.getInstance().userInput(
"File " + relative + " already exists. Overwrite?", new String[] { "y", "n", "a" });
overwrite = overwrite || "a".equals(response);
return overwrite || "y".equals(response);
}
catch (Exception e) {
// failure to read from standard in means we're probably running from an automation tool like a build server
return true;
}
}
protected String makeRelativeIfPossible(String fileName, String base) throws IOException {
if (StringUtils.hasLength(base)) {
fileName = StringGroovyMethods.minus(fileName, new File(base).getCanonicalPath());
}
return fileName;
}
protected Set<String> getTemplateNames() throws IOException {
if (resourceLoader != null && grailsApplication.isWarDeployed()) {
try {
PathMatchingResourcePatternResolver resolver = new PathMatchingResourcePatternResolver(resourceLoader);
return extractNames(resolver.getResources("/WEB-INF/templates/scaffolding/*.gsp"));
}
catch (Exception e) {
return Collections.emptySet();
}
}
PathMatchingResourcePatternResolver resolver = new PathMatchingResourcePatternResolver();
Set<String> resources = new HashSet<String>();
String templatesDirPath = basedir + "/src/templates/scaffolding";
Resource templatesDir = new FileSystemResource(templatesDirPath);
if (templatesDir.exists()) {
try {
resources.addAll(extractNames(resolver.getResources("file:" + templatesDirPath + "/*.gsp")));
}
catch (Exception e) {
log.error("Error while loading views from " + basedir, e);
}
}
File pluginDir = getPluginDir();
try {
resources.addAll(extractNames(resolver.getResources("file:" + pluginDir + "/src/templates/scaffolding/*.gsp")));
}
catch (Exception e) {
// ignore
log.error("Error locating templates from " + pluginDir + ": " + e.getMessage(), e);
}
return resources;
}
protected Set<String> extractNames(Resource[] resources) {
Set<String> names = new HashSet<String>();
for (Resource resource : resources) {
String name = resource.getFilename();
names.add(name.substring(0, name.length() - 4));
}
return names;
}
public void setGrailsApplication(GrailsApplication ga) {
grailsApplication = ga;
Object suffix = ga.getFlatConfig().get("grails.scaffolding.templates.domainSuffix");
if (suffix instanceof CharSequence) {
domainSuffix = suffix.toString();
}
}
public void setResourceLoader(ResourceLoader rl) {
if(log.isInfoEnabled())
log.info("Scaffolding template generator set to use resource loader ["+rl+"]");
resourceLoader = rl;
}
public void setPluginManager(GrailsPluginManager gpm) {
pluginManager = gpm;
}
public void setOverwrite(boolean shouldOverwrite) {
overwrite = shouldOverwrite;
}
}
| {'content_hash': '8970b7709bd54fcfed5f3a9952916ba2', 'timestamp': '', 'source': 'github', 'line_count': 401, 'max_line_length': 151, 'avg_line_length': 34.53366583541147, 'alnum_prop': 0.7154823801270942, 'repo_name': 'eptresmo/dbMigrationTest', 'id': 'e723c197e0218138ec76d778e67165fef6866c91', 'size': '14445', 'binary': False, 'copies': '5', 'ref': 'refs/heads/master', 'path': 'dbMigrationTest/target/work/plugins/scaffolding-2.0.1/src/java/org/codehaus/groovy/grails/scaffolding/AbstractGrailsTemplateGenerator.java', 'mode': '33188', 'license': 'apache-2.0', 'language': []} |
// --------------------------------------------------------------------------------------------
// <copyright file="EffortProviderFactory.cs" company="Effort Team">
// Copyright (C) 2011-2014 Effort Team
//
// Permission is hereby granted, free of charge, to any person obtaining a copy
// of this software and associated documentation files (the "Software"), to deal
// in the Software without restriction, including without limitation the rights
// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
// copies of the Software, and to permit persons to whom the Software is
// furnished to do so, subject to the following conditions:
//
// The above copyright notice and this permission notice shall be included in
// all copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
// THE SOFTWARE.
// </copyright>
// --------------------------------------------------------------------------------------------
namespace Effort.Provider
{
using System;
using System.Data;
using System.Data.Common;
#if !EFOLD
using System.Data.Entity.Core.Common;
#endif
/// <summary>
/// Represents a set of methods for creating instances of the
/// <see cref="N:Effort.Provider"/> provider's implementation of the data source classes.
/// </summary>
public class EffortProviderFactory : DbProviderFactory, IServiceProvider
{
/// <summary>
/// Provides a singleton instance of the <see cref="EffortProviderFactory"/> class.
/// </summary>
public static readonly EffortProviderFactory Instance = new EffortProviderFactory();
/// <summary>
/// Prevents a default instance of the <see cref="EffortProviderFactory" /> class
/// from being created.
/// </summary>
private EffortProviderFactory()
{
}
/// <summary>
/// Returns a new instance of the <see cref="T:EffortConnection" /> class.
/// </summary>
/// <returns>
/// A new instance of <see cref="T:EffortConnection" />.
/// </returns>
public override DbConnection CreateConnection()
{
return new EffortConnection();
}
/// <summary>
/// Gets the service object of the specified type.
/// </summary>
/// <param name="serviceType">
/// An object that specifies the type of service object to get.
/// </param>
/// <returns>
/// A service object of type <paramref name="serviceType" />.-or- null if there is
/// no service object of type <paramref name="serviceType" />.
/// </returns>
public object GetService(Type serviceType)
{
if (serviceType == typeof(DbProviderServices))
{
return EffortProviderServices.Instance;
}
return null;
}
}
}
| {'content_hash': '767841cdd80110458b083c02f09c4e70', 'timestamp': '', 'source': 'github', 'line_count': 84, 'max_line_length': 96, 'avg_line_length': 42.023809523809526, 'alnum_prop': 0.5781869688385269, 'repo_name': 'wertzui/effort', 'id': '62bcbbc5cb1dad86155bd8a97196855269b6d236', 'size': '3532', 'binary': False, 'copies': '3', 'ref': 'refs/heads/develop', 'path': 'Main/Source/Effort/Provider/EffortProviderFactory.cs', 'mode': '33188', 'license': 'mit', 'language': [{'name': 'Batchfile', 'bytes': '1104'}, {'name': 'C#', 'bytes': '2446943'}]} |
import { VGrid } from '../v-grid';
import { BindingContextInterface, OverrideContextInterface } from '../../interfaces';
export declare class VGridAttributesImageFix {
private vGrid;
private element;
private value;
private bindingContext;
private overrideContext;
constructor(element: HTMLImageElement, vGrid: VGrid);
valueChanged(newValue: string): void;
bind(bindingContext: BindingContextInterface, overrideContext: OverrideContextInterface): void;
}
| {'content_hash': '288050943bddd389f02d6c1488f7c9da', 'timestamp': '', 'source': 'github', 'line_count': 12, 'max_line_length': 99, 'avg_line_length': 40.5, 'alnum_prop': 0.7551440329218106, 'repo_name': 'vegarringdal/vGrid', 'id': '7a892151b3f517aeff4464ab7de2c01ac475f8d0', 'size': '486', 'binary': False, 'copies': '4', 'ref': 'refs/heads/dev-rebuild', 'path': 'dist/es2015/grid/attributes/v-image.d.ts', 'mode': '33188', 'license': 'mit', 'language': [{'name': 'CSS', 'bytes': '24447'}, {'name': 'HTML', 'bytes': '19771'}, {'name': 'JavaScript', 'bytes': '7057'}, {'name': 'TypeScript', 'bytes': '1639454'}]} |
layout: page
title: Cliffs Tech Executive Retreat
date: 2016-05-24
author: Beverly Snyder
tags: weekly links, java
status: published
summary: Vivamus sed ligula quis mi cursus venenatis sed sed nunc.
banner: images/banner/people.jpg
booking:
startDate: 05/29/2018
endDate: 05/31/2018
ctyhocn: HSTFLHX
groupCode: CTER
published: true
---
Mauris id odio eget libero fermentum egestas vel vitae ligula. Suspendisse vestibulum ipsum sem, vel ornare ex lacinia ac. Etiam a sem auctor, dignissim tellus vitae, consequat arcu. Cras rutrum lorem metus, sed lacinia nunc sollicitudin non. Praesent quam mi, aliquet ut lorem at, dictum faucibus ante. Vivamus sit amet ligula vulputate, sollicitudin arcu at, ullamcorper elit. Aenean aliquet molestie tincidunt. Nulla sed lectus diam. Donec gravida enim ut lorem blandit, sed ultricies arcu auctor. Donec odio ante, fringilla id lacus vel, sagittis dignissim elit. Duis mattis turpis tellus, at pulvinar leo commodo at. Etiam in lectus odio. Curabitur ipsum nisi, tincidunt eu ligula ac, cursus pellentesque lacus. Quisque enim sem, tempor non convallis maximus, semper id nisl. Donec eu sapien vel sapien posuere semper. Cras nisi justo, rhoncus ac urna at, cursus scelerisque libero.
1 Proin bibendum tortor at ipsum commodo, vel gravida elit pretium
1 Phasellus tincidunt lorem vitae elit ultrices, id volutpat mi fermentum
1 Nunc interdum orci vel lobortis sodales.
Praesent at risus ipsum. Morbi mattis blandit mauris, in fermentum nibh condimentum ut. In mattis risus et diam sagittis euismod. Sed vel dolor id dui dapibus viverra. Praesent efficitur ut quam et auctor. Sed venenatis convallis ex, nec vulputate est tincidunt vitae. In pulvinar faucibus odio, eu viverra tortor pharetra iaculis. Nunc cursus sagittis mauris, at blandit nisi auctor eget. Sed mollis diam eu volutpat pulvinar. In a luctus felis. Integer lobortis purus id lacus porta rutrum. Etiam sit amet lobortis magna. Nulla id libero convallis, luctus lorem ac, fermentum orci. Integer vel maximus sapien, non blandit sapien. Vivamus a tempus purus.
| {'content_hash': '43f9f6179677a71fbbce864c5125cf6a', 'timestamp': '', 'source': 'github', 'line_count': 22, 'max_line_length': 887, 'avg_line_length': 94.31818181818181, 'alnum_prop': 0.8043373493975904, 'repo_name': 'KlishGroup/prose-pogs', 'id': '6f3c04ea1edb8b269359b353872dd5964911f4eb', 'size': '2079', 'binary': False, 'copies': '1', 'ref': 'refs/heads/gh-pages', 'path': 'pogs/H/HSTFLHX/CTER/index.md', 'mode': '33188', 'license': 'mit', 'language': []} |
namespace igl
{
// Subdivide a mesh without moving vertices: loop subdivision but odd
// vertices stay put and even vertices are just edge midpoints
//
// Templates:
// MatV matrix for vertex positions, e.g. MatrixXd
// MatF matrix for vertex positions, e.g. MatrixXi
// Inputs:
// V #V by dim mesh vertices
// F #F by 3 mesh triangles
// Outputs:
// NV new vertex positions, V is guaranteed to be at top
// NF new list of face indices
//
// NOTE: V should not be the same as NV,
// NOTE: F should not be the same as NF, use other proto
//
// Known issues:
// - assumes (V,F) is edge-manifold.
template <
typename DerivedV,
typename DerivedF,
typename DerivedNV,
typename DerivedNF>
IGL_INLINE void upsample(
const Eigen::PlainObjectBase<DerivedV>& V,
const Eigen::PlainObjectBase<DerivedF>& F,
Eigen::PlainObjectBase<DerivedNV>& NV,
Eigen::PlainObjectBase<DerivedNF>& NF);
// Virtually in place wrapper
template <
typename MatV,
typename MatF>
IGL_INLINE void upsample(
MatV& V,
MatF& F);
}
#ifndef IGL_STATIC_LIBRARY
# include "upsample.cpp"
#endif
#endif
| {'content_hash': 'a1cdb7cff1bb173dd9cbbff48005f1e2', 'timestamp': '', 'source': 'github', 'line_count': 44, 'max_line_length': 71, 'avg_line_length': 26.772727272727273, 'alnum_prop': 0.6612903225806451, 'repo_name': 'FabianRepository/SinusProject', 'id': '5ca05336dfac2db8a87a07b48ee4c4d7219d853e', 'size': '1710', 'binary': False, 'copies': '6', 'ref': 'refs/heads/master', 'path': 'Code/include/igl/upsample.h', 'mode': '33188', 'license': 'bsd-3-clause', 'language': [{'name': 'C', 'bytes': '1822674'}, {'name': 'C++', 'bytes': '11420706'}, {'name': 'CMake', 'bytes': '20858'}, {'name': 'Makefile', 'bytes': '4050'}, {'name': 'Objective-C', 'bytes': '11880'}, {'name': 'Shell', 'bytes': '15321'}]} |
/*___Generated_by_IDEA___*/
package com.grafixartist.androidn;
/* This stub is only used by the IDE. It is NOT the BuildConfig class actually packed into the APK */
public final class BuildConfig {
public final static boolean DEBUG = Boolean.parseBoolean(null);
} | {'content_hash': '26542977f302c1033ce570a5d275b19c', 'timestamp': '', 'source': 'github', 'line_count': 8, 'max_line_length': 101, 'avg_line_length': 33.375, 'alnum_prop': 0.7490636704119851, 'repo_name': 'Suleiman19/Android-N-Sample', 'id': '3f2817dcd993334f72e2c9570e2c1671e560df79', 'size': '267', 'binary': False, 'copies': '1', 'ref': 'refs/heads/master', 'path': 'gen/com/grafixartist/androidn/BuildConfig.java', 'mode': '33188', 'license': 'mit', 'language': [{'name': 'Java', 'bytes': '10473'}]} |
<?php
namespace Molajo\Query\Builder;
use CommonApi\Fieldhandler\FieldhandlerInterface;
use DateTime;
/**
* Query Builder Sql Class
*
* External API - all other class methods are called by this class
* DB-specific adapters extend this class
*
* Sql - BuildSql - BuildSqlElements - BuildSqlGroups - SetData - EditData - FilterData - Base
*
* @package Molajo
* @license http://www.opensource.org/licenses/mit-license.html MIT License
* @since 1.0
*/
abstract class Sql extends BuildSql
{
/**
* Constructor
*
* @since 1.0.0
*/
public function __construct(
FieldhandlerInterface $fieldhandler,
$database_prefix
) {
$this->fieldhandler = $fieldhandler;
$this->database_prefix = $database_prefix;
}
/**
* Get SQL
*
* At this point, all values have been input, filtered and set in element-specific item arrays
* Now, generate the full SQL statement, building the SQL statement and quoting/escaping data
*
* @param null|string $sql
*
* @return string
* @since 1.0.0
*/
public function getSql($sql = null)
{
if ($sql === null || trim($sql) === '') {
$this->generateSql();
} else {
$this->sql = '';
$this->getExternalSql($sql);
}
return $this->sql;
}
/**
* Get the current value (or default) of the specified property
*
* @param string $key `````
* @param mixed $default
*
* @return mixed
* @since 1.0.0
*/
public function get($key, $default = null)
{
if ($this->$key === null) {
$this->$key = $default;
}
return $this->$key;
}
/**
* Clear Query String
*
* @return $this
* @since 1.0.0
*/
public function clearQuery()
{
$this->query_type = 'select';
$this->distinct = false;
$this->columns = array();
$this->update_columns = array();
$this->values = array();
$this->from = array();
$this->insert_into_table = null;
$this->where_group = array();
$this->where = array();
$this->group_by = array();
$this->having_group = array();
$this->having = array();
$this->query_object = 'list';
$this->order_by = array();
$this->use_pagination = 0;
$this->offset = 0;
$this->limit = 0;
$this->sql = '';
return $this;
}
/**
* Set Query Type
*
* @param string $query_type
*
* @return $this
* @since 1.0.0
*/
public function setType($query_type = 'select')
{
if (in_array(strtolower($query_type), $this->query_type_array)) {
$this->query_type = strtolower($query_type);
} else {
$this->query_type = 'select';
}
return $this;
}
/**
* Retrieves the current date and time formatted in a manner compliant with the database driver
*
* @return string
* @since 1.0.0
*/
public function getDate()
{
$date = new DateTime();
return $date->format($this->date_format);
}
/**
* Returns a value for null date that is compliant with the database driver
*
* @return string
* @since 1.0.0
*/
public function getNullDate()
{
return $this->null_date;
}
/**
* Retrieves the PHP date format compliant with the database driver
*
* @return string
* @since 1.0.0
*/
public function getDateFormat()
{
return $this->date_format;
}
/**
* Set Distinct Indicator
*
* @param boolean $distinct
*
* @return $this
* @since 1.0.0
*/
public function setDistinct($distinct = false)
{
if ($distinct === true) {
$this->distinct = true;
} else {
$this->distinct = false;
}
return $this;
}
/**
* Used for select, insert, and update to specify column name, alias (optional)
* For Insert and Update, only, value and data_type
*
* @param string $column_name
* @param null|string $alias
* @param null|mixed $value
* @param null|string $data_type
*
* @return $this
* @since 1.0.0
*/
public function select($column_name, $alias = null, $value = null, $data_type = null)
{
$this->editRequired('column_name', $column_name);
if ($data_type === 'special') {
} else {
if ($value === null) {
$data_type = 'column';
}
}
$this->columns[$column_name]
= $this->setItem($column_name, $data_type, $value, $alias, null, false);
return $this;
}
/**
* Set From table name and optional value for alias
*
* @param string $table_name
* @param null|string $alias
* @param boolean $primary
*
* @return $this
* @since 1.0.0
*/
public function from($table_name, $alias = null, $primary = false)
{
$this->editRequired('table_name', $table_name);
$key = $this->setFromKey($table_name, $alias);
$this->from[$key] = $this->setItem($table_name, 'string', null, $alias, null, false);
if ($this->findFromPrimary() === true && $primary === false) {
return $this;
}
$this->setFromPrimary($key);
return $this;
}
/**
* Set Insert Into Table Name
*
* @param string $table_name
*
* @return $this
* @since 1.0.0
*/
public function setInsertInto($table_name)
{
$this->editRequired('table_name', $table_name);
$this->insert_into_table = (string)$table_name;
return $this;
}
/**
* Set From table key
*
* @param string $table_name
* @param null|string $alias
*
* @return $this
* @since 1.0.0
*/
public function setFromKey($table_name, $alias = null)
{
return ($table_name . ' ' . $alias);
}
/**
* Create a grouping for 'and' or 'or' groups of where conditions
*
* @param string $group
* @param string $group_connector
*
* @return $this
* @since 1.0.0
*/
public function whereGroup($group, $group_connector = 'AND')
{
$this->where_group
= $this->setGroup($group, $group_connector, 'where', $this->where_group);
return $this;
}
/**
* Create a grouping for 'and' or 'or' groups of having conditions
*
* @param string $group
* @param string $group_connector
*
* @return $this
* @since 1.0.0
*/
public function havingGroup($group, $group_connector = 'AND')
{
$this->having_group
= $this->setGroup($group, $group_connector, 'having', $this->having_group);
return $this;
}
/**
* Set Where Conditions for Query
*
* @param string $left_filter
* @param string $left
* @param string $condition
* @param string $right_filter
* @param string $right
* @param string $connector
* @param null|string $group
*
* @return $this
* @since 1.0.0
*/
public function where(
$left_filter = 'column',
$left = '',
$condition = '',
$right_filter = 'column',
$right = '',
$connector = 'and',
$group = null
) {
$item = $this->setLeftRightConditionals(
$left_filter,
$left,
$condition,
$right_filter,
$right,
$connector,
$group
);
$this->where[] = $item;
return $this;
}
/**
* Set Having Conditions for Query
*
* @param string $left_filter
* @param string $left
* @param string $condition
* @param string $right_filter
* @param string $right
* @param string $connector
* @param null|string $group
*
* @return $this
* @since 1.0.0
*/
public function having(
$left_filter = 'column',
$left = '',
$condition = '',
$right_filter = 'column',
$right = '',
$connector = 'and',
$group = null
) {
$item = $this->setLeftRightConditionals(
$left_filter,
$left,
$condition,
$right_filter,
$right,
$connector,
$group
);
$this->having[] = $item;
return $this;
}
/**
* Group By column name
*
* @param string $column_name
*
* @return $this
* @since 1.0.0
*/
public function groupBy($column_name)
{
$this->group_by[] = $this->setGroupByOrderBy($column_name, 'group by');
return $this;
}
/**
* Order By column name
*
* @param string $column_name
* @param null|string $direction
*
* @return $this
* @since 1.0.0
*/
public function orderBy($column_name, $direction = 'ASC')
{
$this->order_by[] = $this->setGroupByOrderBy($column_name, 'order by', $direction);
return $this;
}
/**
* Offset and Limit
*
* @param int $offset
* @param int $limit
*
* @return $this
* @since 1.0.0
*/
public function setOffsetAndLimit($offset = 0, $limit = 0)
{
$this->setOffsetOrLimit($offset, $type = 'offset');
$this->setOffsetOrLimit($limit, $type = 'limit');
return $this;
}
}
| {'content_hash': '4cba7c7b8d58f8f451db992b967927b1', 'timestamp': '', 'source': 'github', 'line_count': 423, 'max_line_length': 99, 'avg_line_length': 23.6903073286052, 'alnum_prop': 0.4923660313341982, 'repo_name': 'Molajo/Query', 'id': '35418dea65445de82454beeae6395b58c24ef1b5', 'size': '10218', 'binary': False, 'copies': '1', 'ref': 'refs/heads/master', 'path': 'Source/Query/Builder/Sql.php', 'mode': '33188', 'license': 'mit', 'language': [{'name': 'PHP', 'bytes': '512092'}]} |
package org.apache.beam.sdk.extensions.sql.impl.interpreter.operator.math;
import java.math.BigDecimal;
import java.util.ArrayList;
import java.util.List;
import org.apache.beam.sdk.extensions.sql.impl.interpreter.BeamSqlFnExecutorTestBase;
import org.apache.beam.sdk.extensions.sql.impl.interpreter.operator.BeamSqlExpression;
import org.apache.beam.sdk.extensions.sql.impl.interpreter.operator.BeamSqlPrimitive;
import org.apache.calcite.sql.type.SqlTypeName;
import org.junit.Assert;
import org.junit.Test;
/**
* Test for {@link BeamSqlMathUnaryExpression}.
*/
public class BeamSqlMathUnaryExpressionTest extends BeamSqlFnExecutorTestBase {
@Test public void testForGreaterThanOneOperands() {
List<BeamSqlExpression> operands = new ArrayList<>();
// operands more than 1 not allowed
operands.add(BeamSqlPrimitive.of(SqlTypeName.INTEGER, 2));
operands.add(BeamSqlPrimitive.of(SqlTypeName.INTEGER, 4));
Assert.assertFalse(new BeamSqlAbsExpression(operands).accept());
}
@Test public void testForOperandsType() {
List<BeamSqlExpression> operands = new ArrayList<>();
// varchar operand not allowed
operands.add(BeamSqlPrimitive.of(SqlTypeName.VARCHAR, "2"));
Assert.assertFalse(new BeamSqlAbsExpression(operands).accept());
}
@Test public void testForUnaryExpressions() {
List<BeamSqlExpression> operands = new ArrayList<>();
// test for sqrt function
operands.add(BeamSqlPrimitive.of(SqlTypeName.SMALLINT, Short.valueOf("2")));
// test for abs function
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.BIGINT, -28965734597L));
Assert.assertEquals(28965734597L,
new BeamSqlAbsExpression(operands).evaluate(record, null).getValue());
}
@Test public void testForLnExpression() {
List<BeamSqlExpression> operands = new ArrayList<>();
// test for LN function with operand type smallint
operands.add(BeamSqlPrimitive.of(SqlTypeName.SMALLINT, Short.valueOf("2")));
Assert.assertEquals(Math.log(2),
new BeamSqlLnExpression(operands).evaluate(record, null).getValue());
// test for LN function with operand type double
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DOUBLE, 2.4));
Assert
.assertEquals(Math.log(2.4),
new BeamSqlLnExpression(operands).evaluate(record, null).getValue());
// test for LN function with operand type decimal
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DECIMAL, BigDecimal.valueOf(2.56)));
Assert.assertEquals(Math.log(2.56),
new BeamSqlLnExpression(operands).evaluate(record, null).getValue());
}
@Test public void testForLog10Expression() {
List<BeamSqlExpression> operands = new ArrayList<>();
// test for log10 function with operand type smallint
operands.add(BeamSqlPrimitive.of(SqlTypeName.SMALLINT, Short.valueOf("2")));
Assert.assertEquals(Math.log10(2),
new BeamSqlLogExpression(operands).evaluate(record, null).getValue());
// test for log10 function with operand type double
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DOUBLE, 2.4));
Assert.assertEquals(Math.log10(2.4),
new BeamSqlLogExpression(operands).evaluate(record, null).getValue());
// test for log10 function with operand type decimal
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DECIMAL, BigDecimal.valueOf(2.56)));
Assert.assertEquals(Math.log10(2.56),
new BeamSqlLogExpression(operands).evaluate(record, null).getValue());
}
@Test public void testForExpExpression() {
List<BeamSqlExpression> operands = new ArrayList<>();
// test for exp function with operand type smallint
operands.add(BeamSqlPrimitive.of(SqlTypeName.SMALLINT, Short.valueOf("2")));
Assert.assertEquals(Math.exp(2),
new BeamSqlExpExpression(operands).evaluate(record, null).getValue());
// test for exp function with operand type double
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DOUBLE, 2.4));
Assert.assertEquals(Math.exp(2.4),
new BeamSqlExpExpression(operands).evaluate(record, null).getValue());
// test for exp function with operand type decimal
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DECIMAL, BigDecimal.valueOf(2.56)));
Assert.assertEquals(Math.exp(2.56),
new BeamSqlExpExpression(operands).evaluate(record, null).getValue());
}
@Test public void testForAcosExpression() {
List<BeamSqlExpression> operands = new ArrayList<>();
// test for exp function with operand type smallint
operands.add(BeamSqlPrimitive.of(SqlTypeName.SMALLINT, Short.valueOf("2")));
Assert.assertEquals(Double.NaN,
new BeamSqlAcosExpression(operands).evaluate(record, null).getValue());
// test for exp function with operand type double
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DOUBLE, 0.45));
Assert.assertEquals(Math.acos(0.45),
new BeamSqlAcosExpression(operands).evaluate(record, null).getValue());
// test for exp function with operand type decimal
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DECIMAL, BigDecimal.valueOf(-0.367)));
Assert.assertEquals(Math.acos(-0.367),
new BeamSqlAcosExpression(operands).evaluate(record, null).getValue());
}
@Test public void testForAsinExpression() {
List<BeamSqlExpression> operands = new ArrayList<>();
// test for exp function with operand type double
operands.add(BeamSqlPrimitive.of(SqlTypeName.DOUBLE, 0.45));
Assert.assertEquals(Math.asin(0.45),
new BeamSqlAsinExpression(operands).evaluate(record, null).getValue());
// test for exp function with operand type decimal
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DECIMAL, BigDecimal.valueOf(-0.367)));
Assert.assertEquals(Math.asin(-0.367),
new BeamSqlAsinExpression(operands).evaluate(record, null).getValue());
}
@Test public void testForAtanExpression() {
List<BeamSqlExpression> operands = new ArrayList<>();
// test for exp function with operand type double
operands.add(BeamSqlPrimitive.of(SqlTypeName.DOUBLE, 0.45));
Assert.assertEquals(Math.atan(0.45),
new BeamSqlAtanExpression(operands).evaluate(record, null).getValue());
// test for exp function with operand type decimal
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DECIMAL, BigDecimal.valueOf(-0.367)));
Assert.assertEquals(Math.atan(-0.367),
new BeamSqlAtanExpression(operands).evaluate(record, null).getValue());
}
@Test public void testForCosExpression() {
List<BeamSqlExpression> operands = new ArrayList<>();
// test for exp function with operand type double
operands.add(BeamSqlPrimitive.of(SqlTypeName.DOUBLE, 0.45));
Assert.assertEquals(Math.cos(0.45),
new BeamSqlCosExpression(operands).evaluate(record, null).getValue());
// test for exp function with operand type decimal
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DECIMAL, BigDecimal.valueOf(-0.367)));
Assert.assertEquals(Math.cos(-0.367),
new BeamSqlCosExpression(operands).evaluate(record, null).getValue());
}
@Test public void testForCotExpression() {
List<BeamSqlExpression> operands = new ArrayList<>();
// test for exp function with operand type double
operands.add(BeamSqlPrimitive.of(SqlTypeName.DOUBLE, .45));
Assert.assertEquals(1.0d / Math.tan(0.45),
new BeamSqlCotExpression(operands).evaluate(record, null).getValue());
// test for exp function with operand type decimal
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DECIMAL, BigDecimal.valueOf(-.367)));
Assert.assertEquals(1.0d / Math.tan(-0.367),
new BeamSqlCotExpression(operands).evaluate(record, null).getValue());
}
@Test public void testForDegreesExpression() {
List<BeamSqlExpression> operands = new ArrayList<>();
// test for exp function with operand type smallint
operands.add(BeamSqlPrimitive.of(SqlTypeName.SMALLINT, Short.valueOf("2")));
Assert.assertEquals(Math.toDegrees(2),
new BeamSqlDegreesExpression(operands).evaluate(record, null).getValue());
// test for exp function with operand type double
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DOUBLE, 2.4));
Assert.assertEquals(Math.toDegrees(2.4),
new BeamSqlDegreesExpression(operands).evaluate(record, null).getValue());
// test for exp function with operand type decimal
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DECIMAL, BigDecimal.valueOf(2.56)));
Assert.assertEquals(Math.toDegrees(2.56),
new BeamSqlDegreesExpression(operands).evaluate(record, null).getValue());
}
@Test public void testForRadiansExpression() {
List<BeamSqlExpression> operands = new ArrayList<>();
// test for exp function with operand type smallint
operands.add(BeamSqlPrimitive.of(SqlTypeName.SMALLINT, Short.valueOf("2")));
Assert.assertEquals(Math.toRadians(2),
new BeamSqlRadiansExpression(operands).evaluate(record, null).getValue());
// test for exp function with operand type double
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DOUBLE, 2.4));
Assert.assertEquals(Math.toRadians(2.4),
new BeamSqlRadiansExpression(operands).evaluate(record, null).getValue());
// test for exp function with operand type decimal
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DECIMAL, BigDecimal.valueOf(2.56)));
Assert.assertEquals(Math.toRadians(2.56),
new BeamSqlRadiansExpression(operands).evaluate(record, null).getValue());
}
@Test public void testForSinExpression() {
List<BeamSqlExpression> operands = new ArrayList<>();
// test for exp function with operand type smallint
operands.add(BeamSqlPrimitive.of(SqlTypeName.SMALLINT, Short.valueOf("2")));
Assert.assertEquals(Math.sin(2),
new BeamSqlSinExpression(operands).evaluate(record, null).getValue());
// test for exp function with operand type double
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DOUBLE, 2.4));
Assert.assertEquals(Math.sin(2.4),
new BeamSqlSinExpression(operands).evaluate(record, null).getValue());
// test for exp function with operand type decimal
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DECIMAL, BigDecimal.valueOf(2.56)));
Assert.assertEquals(Math.sin(2.56),
new BeamSqlSinExpression(operands).evaluate(record, null).getValue());
}
@Test public void testForTanExpression() {
List<BeamSqlExpression> operands = new ArrayList<>();
// test for exp function with operand type smallint
operands.add(BeamSqlPrimitive.of(SqlTypeName.SMALLINT, Short.valueOf("2")));
Assert.assertEquals(Math.tan(2),
new BeamSqlTanExpression(operands).evaluate(record, null).getValue());
// test for exp function with operand type double
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DOUBLE, 2.4));
Assert.assertEquals(Math.tan(2.4),
new BeamSqlTanExpression(operands).evaluate(record, null).getValue());
// test for exp function with operand type decimal
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DECIMAL, BigDecimal.valueOf(2.56)));
Assert.assertEquals(Math.tan(2.56),
new BeamSqlTanExpression(operands).evaluate(record, null).getValue());
}
@Test public void testForSignExpression() {
List<BeamSqlExpression> operands = new ArrayList<>();
// test for exp function with operand type smallint
operands.add(BeamSqlPrimitive.of(SqlTypeName.SMALLINT, Short.valueOf("2")));
Assert.assertEquals((short) 1
, new BeamSqlSignExpression(operands).evaluate(record, null).getValue());
// test for exp function with operand type double
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DOUBLE, 2.4));
Assert.assertEquals(1.0, new BeamSqlSignExpression(operands).evaluate(record, null).getValue());
// test for exp function with operand type decimal
operands.clear();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DECIMAL, BigDecimal.valueOf(2.56)));
Assert.assertEquals(BigDecimal.ONE,
new BeamSqlSignExpression(operands).evaluate(record, null).getValue());
}
@Test public void testForPi() {
Assert.assertEquals(Math.PI, new BeamSqlPiExpression().evaluate(record, null).getValue());
}
@Test public void testForCeil() {
List<BeamSqlExpression> operands = new ArrayList<>();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DOUBLE, 2.68687979));
Assert.assertEquals(Math.ceil(2.68687979),
new BeamSqlCeilExpression(operands).evaluate(record, null).getValue());
}
@Test public void testForFloor() {
List<BeamSqlExpression> operands = new ArrayList<>();
operands.add(BeamSqlPrimitive.of(SqlTypeName.DOUBLE, 2.68687979));
Assert.assertEquals(Math.floor(2.68687979),
new BeamSqlFloorExpression(operands).evaluate(record, null).getValue());
}
}
| {'content_hash': '0f912d403eeb23eb9c577b43291462b1', 'timestamp': '', 'source': 'github', 'line_count': 296, 'max_line_length': 100, 'avg_line_length': 44.7195945945946, 'alnum_prop': 0.72675077434464, 'repo_name': 'wangyum/beam', 'id': 'd80a67071e9aebc3146dcaa4f1479f5802c1f00f', 'size': '14042', 'binary': False, 'copies': '6', 'ref': 'refs/heads/master', 'path': 'sdks/java/extensions/sql/src/test/java/org/apache/beam/sdk/extensions/sql/impl/interpreter/operator/math/BeamSqlMathUnaryExpressionTest.java', 'mode': '33188', 'license': 'apache-2.0', 'language': [{'name': 'Go', 'bytes': '109377'}, {'name': 'Groovy', 'bytes': '84452'}, {'name': 'Java', 'bytes': '14117162'}, {'name': 'Python', 'bytes': '3165393'}, {'name': 'Shell', 'bytes': '55385'}]} |
set -e
git clone https://github.com/nanomsg/nnpy.git
# top of tree won't install
cd nnpy
git checkout c7e718a5173447c85182dc45f99e2abcf9cd4065
sudo pip install cffi
sudo pip install .
cd ..
| {'content_hash': '2df4b09d1debc62ee0178e0ebf554c12', 'timestamp': '', 'source': 'github', 'line_count': 8, 'max_line_length': 53, 'avg_line_length': 23.75, 'alnum_prop': 0.7947368421052632, 'repo_name': 'hanw/behavioral-model', 'id': '77a7d63afe47a1741d549f97580015fe9cbc31ca', 'size': '200', 'binary': False, 'copies': '3', 'ref': 'refs/heads/master', 'path': 'travis/install-nnpy.sh', 'mode': '33188', 'license': 'apache-2.0', 'language': [{'name': 'C', 'bytes': '93627'}, {'name': 'C++', 'bytes': '2126481'}, {'name': 'M4', 'bytes': '69750'}, {'name': 'Makefile', 'bytes': '44234'}, {'name': 'P4', 'bytes': '37531'}, {'name': 'Python', 'bytes': '271835'}, {'name': 'Ruby', 'bytes': '5182'}, {'name': 'Shell', 'bytes': '11424'}, {'name': 'Thrift', 'bytes': '25904'}]} |
package au.net.zeus.rmi.tls;
import java.net.Socket;
import java.security.AccessController;
import java.security.GeneralSecurityException;
import java.security.NoSuchAlgorithmException;
import java.security.NoSuchProviderException;
import java.security.Principal;
import java.security.cert.CertPath;
import java.security.cert.CertificateException;
import java.security.cert.X509Certificate;
import java.util.ArrayList;
import java.util.Collection;
import java.util.Collections;
import java.util.List;
import java.util.Set;
import java.util.logging.Level;
import java.util.logging.Logger;
import javax.security.auth.Subject;
import javax.security.auth.x500.X500PrivateCredential;
import net.jini.io.UnsupportedConstraintException;
import net.jini.security.AuthenticationPermission;
import org.apache.river.logging.Levels;
/**
*
* @author peter
*/
class ClientSubjectKeyManager extends SubjectKeyManager {
/** Client logger */
private static final Logger logger = CLIENT_LOGGER;
/** Returns the client logger */
Logger getLogger() {
return logger;
}
ClientSubjectKeyManager(Subject subject) throws NoSuchAlgorithmException, NoSuchProviderException {
super(subject);
}
@Override
public String[] getClientAliases(String keyType, Principal[] issuers) {
List certPaths = getCertificateChains(getSubject());
if (certPaths == null) {
return null;
}
Collection result = null;
for (int i = certPaths.size(); --i >= 0;) {
CertPath chain = (CertPath) certPaths.get(i);
Exception exception;
try {
if (checkChain(chain, keyType, issuers) != null) {
if (result == null) {
result = new ArrayList(certPaths.size());
}
result.add(getCertificateName(firstX509Cert(chain)));
}
continue;
} catch (SecurityException e) {
exception = e;
} catch (GeneralSecurityException ex) {
exception = ex;
}
Logger logger = Logger.getLogger(SubjectKeyManager.class.getName());
if (logger.isLoggable(Levels.HANDLED)) {
logger.log(Levels.HANDLED, "Swallowed SecurityException thrown", exception);
}
}
if (result == null) {
return null;
} else {
return (String[]) result.toArray(new String[result.size()]);
}
}
@Override
public synchronized String chooseClientAlias(String[] keyTypes, Principal[] issuers, Socket socket) {
/*
* Only choose new client credentials for the first handshake.
* Otherwise, just use the previous client credentials.
*/
if (clientCredential == null) {
for (String keyType : keyTypes) {
try {
if (exceptionMap.get(keyType) != null) {
// Prior exception found for keytype
return null;
}
clientCredential = chooseCredential(keyType, issuers);
if (clientCredential != null) {
// clientCredential found
exceptionMap.put(keyType, null);
break;
} else {
exceptionMap.put(keyType,
new GeneralSecurityException("Credentials not found"));
}
continue;
} catch (GeneralSecurityException e) {
exceptionMap.put(keyType, e);
} catch (SecurityException e) {
exceptionMap.put(keyType, e);
}
}
if (clientCredential == null) {
return null;
}
}
X509Certificate cert = clientCredential.getCertificate();
clientPrincipal = cert.getSubjectX500Principal();
credentialsValidUntil = Math.min(credentialsValidUntil, certificatesValidUntil(getCertificateChain(getSubject(), cert)));
authenticationPermission = getAuthenticationPermission(cert);
String result = getCertificateName(clientCredential.getCertificate());
if (logger.isLoggable(Level.FINE)) {
logger.log(
Level.FINE,
"choose client alias for key types {0}\nand issuers {1}\n" +
"returns {2}",
new Object[] { toString(keyTypes), toString(issuers), result });
}
return result;
}
/* -- X500TrustManager -- */
/**
* Override this X509TrustManager method in order to cache the server
* principal and to continue to choose the same one.
*/
@Override
public synchronized void checkServerTrusted(X509Certificate[] chain, String authType) throws CertificateException {
super.checkServerTrusted(chain, authType);
if (serverPrincipal == null) {
serverCredential = chain[0];
serverPrincipal = serverCredential.getSubjectX500Principal();
setPermittedRemotePrincipals(Collections.singleton(serverPrincipal));
credentialsValidUntil = certificatesValidUntil(chain);
} else if (!serverCredential.equals(chain[0])) {
throw new CertificateException("Server credentials changed");
}
}
@Override
public String[] getServerAliases(String arg0, Principal[] arg1) {
return null;
}
@Override
public String chooseServerAlias(String arg0, Principal[] arg1, Socket arg2) {
return null;
}
/**
* Returns the permission needed to connect to the last server principal
* with the specified client certificate.
*/
AuthenticationPermission getAuthenticationPermission(X509Certificate cert) {
Set client = Collections.singleton(cert.getSubjectX500Principal());
Set server = (serverPrincipal == null) ? null : Collections.singleton(serverPrincipal);
return new AuthenticationPermission(client, server, "connect");
}
/**
* Gets the private credential for the specified X.509 certificate,
* checking for AuthenticationPermission to connect with the last server
* principal.
*
* @param cert the certificate for the local principal
* @return the associated private credential or null if not found
* @throws SecurityException if the access control context does not have
* the proper AuthenticationPermission
*/
@Override
synchronized X500PrivateCredential getPrivateCredential(X509Certificate cert) {
return getPrivateCredential(cert, getAuthenticationPermission(cert));
}
/**
* Gets the private credential for the specified X.509 certificate,
* checking for the specified AuthenticationPermission.
*
* @param cert the certificate for the local principal
* @param ap the permission needed to connect to the peer
* @return the associated private credential or null if not found
* @throws SecurityException if the access control context does not have
* the proper AuthenticationPermission
*/
protected X500PrivateCredential getPrivateCredential(X509Certificate cert, AuthenticationPermission ap) {
Subject subject = getSubject();
if (subject == null) {
return null;
}
SecurityManager sm = System.getSecurityManager();
if (sm != null) {
sm.checkPermission(ap);
}
return (X500PrivateCredential) AccessController.doPrivileged(new GetPrivateCredentialAction(subject, cert));
}
/**
* Checks if the subject still contains the proper credentials, and the
* current access control context has the proper AuthenticationPermission,
* to use the current session. Callers should only call this method if
* client authentication is being used.
*
* @throws SecurityException if the access control context does not have
* the proper AuthenticationPermission
* @throws UnsupportedConstraintException if the subject does not contain
* the proper credentials
*/
synchronized void checkAuthentication()
throws GeneralSecurityException
{
if (clientCredential == null) {
throw new GeneralSecurityException(
"Client is not authenticated");
} else if (clientCredential.isDestroyed()) {
throw new GeneralSecurityException(
"Private credentials are destroyed");
} else if (System.currentTimeMillis() > credentialsValidUntil) {
throw new GeneralSecurityException(
"Certificates are no longer valid");
}
if (subjectIsReadOnly) {
SecurityManager sm = System.getSecurityManager();
if (sm != null) {
sm.checkPermission(authenticationPermission);
}
} else {
Subject subject = getSubject();
X509Certificate cert = clientCredential.getCertificate();
if (getPrincipal(subject, cert) == null) {
throw new GeneralSecurityException("Missing principal");
}
CertPath chain =
getCertificateChain(subject, cert);
if (chain == null) {
throw new GeneralSecurityException(
"Missing public credentials");
}
X500PrivateCredential pc = getPrivateCredential(
cert, authenticationPermission);
if (pc == null) {
throw new GeneralSecurityException(
"Missing private credentials");
} else if (!equalPrivateCredentials(clientCredential, pc)) {
throw new GeneralSecurityException(
"Wrong private credentials");
}
}
}
}
| {'content_hash': '527a69c207200fca5e44fa300086269f', 'timestamp': '', 'source': 'github', 'line_count': 259, 'max_line_length': 122, 'avg_line_length': 33.87258687258687, 'alnum_prop': 0.7045480451384931, 'repo_name': 'pfirmstone/river-internet', 'id': '01c4d486d5a17fffaaacedcc4db47435ee148cca', 'size': '9363', 'binary': False, 'copies': '2', 'ref': 'refs/heads/trunk', 'path': 'JGDMS/jgdms-rmi-tls/src/main/java/au/net/zeus/rmi/tls/ClientSubjectKeyManager.java', 'mode': '33188', 'license': 'apache-2.0', 'language': [{'name': 'CSS', 'bytes': '2047'}, {'name': 'Groff', 'bytes': '863'}, {'name': 'Groovy', 'bytes': '35711'}, {'name': 'HTML', 'bytes': '4398920'}, {'name': 'Java', 'bytes': '33660467'}, {'name': 'Makefile', 'bytes': '3046'}, {'name': 'Shell', 'bytes': '69126'}]} |
(function(root) {
//------------------------------------------------------------------//
// Compatibility
//------------------------------------------------------------------//
var emptyFn = function() {};
var console = root.console || {};
var document = root.document;
console.error = console.error || emptyFn;
root.GLOBAL = root;
//------------------------------------------------------------------//
// Base64 encoding
//------------------------------------------------------------------//
function toBase64Digit(value) {
var digits =
'ABCDEFGHIJKLMNOPQRSTUVWXYZ' +
'abcdefghijklmnopqrstuvwxyz' +
'0123456789+/';
return digits[value & 0x3F];
}
function strToUTF8Base64(str) {
function decodeSurrogatePair(hi, lo) {
var resultChar = 0x010000;
resultChar += lo - 0xDC00;
resultChar += (hi - 0xD800) << 10;
return resultChar;
}
var bytes = [0, 0, 0];
var byteIndex = 0;
var result = [];
function output(s) {
result.push(s);
}
function emitBase64() {
var toDigit = toBase64Digit;
// --Byte 0-- --Byte 1-- --Byte 2--
// 1111 1122 2222 3333 3344 4444
var d1 = toDigit(bytes[0] >> 2);
var d2 = toDigit(
((bytes[0] & 0x03) << 4) |
(bytes[1] >> 4));
var d3 = toDigit(
((bytes[1] & 0x0F) << 2) |
(bytes[2] >> 6));
var d4 = toDigit(
bytes[2] & 0x3F);
if (byteIndex === 1) {
output(d1 + d2 + '==');
}
else if (byteIndex === 2) {
output(d1 + d2 + d3 + '=');
}
else {
output(d1 + d2 + d3 + d4);
}
}
function emit(chr) {
bytes[byteIndex++] = chr;
if (byteIndex === 3) {
emitBase64();
bytes[0] = 0;
bytes[1] = 0;
bytes[2] = 0;
byteIndex = 0;
}
}
function emitLast() {
if (byteIndex > 0) {
emitBase64();
}
}
// Converts the string to UTF8:
var i, chr;
var hi, lo;
for (i = 0; i < str.length; i++) {
chr = str.charCodeAt(i);
// Test and decode surrogate pairs in the string
if (chr >= 0xD800 && chr <= 0xDBFF) {
hi = chr;
lo = str.charCodeAt(i + 1);
if (lo >= 0xDC00 && lo <= 0xDFFF) {
chr = decodeSurrogatePair(hi, lo);
i++;
}
}
// Encode the character as UTF-8.
if (chr < 0x80) {
emit(chr);
}
else if (chr < 0x0800) {
emit((chr >> 6) | 0xC0);
emit(((chr >> 0) & 0x3F) | 0x80);
}
else if (chr < 0x10000) {
emit((chr >> 12) | 0xE0);
emit(((chr >> 6) & 0x3F) | 0x80);
emit(((chr >> 0) & 0x3F) | 0x80);
}
else if (chr < 0x110000) {
emit((chr >> 18) | 0xF0);
emit(((chr >> 12) & 0x3F) | 0x80);
emit(((chr >> 6) & 0x3F) | 0x80);
emit(((chr >> 0) & 0x3F) | 0x80);
}
}
emitLast();
return result.join('');
}
// VLQ Base64 encoding used in source maps
function toVLQ(value) {
var vlq, result, digit;
// The LSB in the encoded result is used to indicate the sign of
// the original value
vlq = value < 0 ? ((-value) << 1) + 1 : (value << 1);
// Digits are encoded least significant first.
result = '';
do {
// Each Base64 digit encodes 5 bits. The sixth bit is a
// continuation bit.
digit = vlq & 0x1F;
vlq = vlq >> 5;
digit = digit | (vlq > 0 ? 0x20 : 0);
result += toBase64Digit(digit);
}
while (vlq > 0);
return result;
}
//------------------------------------------------------------------//
// Source maps
//------------------------------------------------------------------//
function getSourceMap(file, source, lineOffset) {
var mappings = [];
var lineCount = source.split(/\r\n?|\n/).length;
var map;
var curLine, i;
var lastOriginalLine = 0;
function addLineMapping(originalLine) {
var generatedColumn = 0;
var sourceIndex = 0;
var originalColumn = 0;
var segment = [
toVLQ(generatedColumn),
toVLQ(sourceIndex),
toVLQ(originalLine - lastOriginalLine),
toVLQ(originalColumn)
].join('');
lastOriginalLine = originalLine;
mappings.push(segment);
}
for (i = 0; i < lineOffset; i++) {
mappings.push('');
}
for (i = 0; i < lineCount; i++) {
addLineMapping(i);
}
map = [
'{',
'"version":3,',
'"sources":[',
JSON.stringify(file),
'],',
'"names":[],',
'"mappings":',
JSON.stringify(mappings.join(';')),
',',
'"sourcesContent":[',
JSON.stringify(source),
']',
'}'
].join('');
return map;
}
//------------------------------------------------------------------//
// Path manipulation
//------------------------------------------------------------------//
var basePath = window.location.pathname.replace(/\/[^\/]*$/, '');
var hrefOrigin = window.location.origin;
function concatPath(basePath, path) {
var baseParts, pathParts, i, it;
var result = [];
// If path is absolute, ignore the base path.
if (path[0] === '/') {
// Run the concatPath to normalize path.
return concatPath(path, '');
}
// Remove leading and trailing slashes and split the base path.
// Note that basePath is always handled as absolute.
baseParts = basePath.replace(/^\/|\/$/g, '').split('/');
// Remove any trailing slash and split the path.
pathParts = path.replace(/^\/$/, '').split('/');
// Append the parts of basePath to the result, solving . and ..
// in the path.
for (i = 0; i < baseParts.length; i++) {
it = baseParts[i];
if (it === '.' || (i === 0 && it === '')) {
// Ignore '.' or an empty part (result of an empty
// basePath).
continue;
}
else if (it === '..') {
result.pop();
}
else {
result.push(it);
}
}
// Append the parts of path to the result, again solving . and ..
for (i = 0; i < pathParts.length; i++) {
it = pathParts[i];
if (it === '.' || it === '') {
// Ignore '.' or an empty part (result of an empty path).
continue;
}
else if (it === '..') {
result.pop();
}
else {
result.push(it);
}
}
return '/' + result.join('/');
}
function solvePossiblePaths(path, relativeTo) {
var isRelative = /^(\.){0,2}\//.test(path);
var possiblePaths = [];
var basePath, curPath;
if (!/\.js/i.test(path)) {
path += '.js';
}
if (isRelative) {
curPath = concatPath(relativeTo, path);
possiblePaths.push(curPath);
}
else {
basePath = relativeTo;
while (true) {
curPath = concatPath(basePath, 'node_modules');
curPath = concatPath(curPath, path);
if (possiblePaths.indexOf(curPath) >= 0) {
break;
}
else {
possiblePaths.push(curPath);
}
basePath = concatPath(basePath, '..');
}
}
return possiblePaths;
}
//------------------------------------------------------------------//
// Ajax request
//------------------------------------------------------------------//
var requestCache = {};
var pendingRequests = {};
function sendRequest(path, callback) {
var request, pending;
// Check for a cached result
if (requestCache[path]) {
setTimeout(function() {
callback(requestCache[path]);
}, 0);
return;
}
else if (pendingRequests[path]) {
pendingRequests[path].callbacks.push(callback);
return;
}
// If the request is not on the cache, makes the Ajax request:
if (root.XMLHttpRequest) {
request = new root.XMLHttpRequest();
}
else if (root.ActiveXObject) {
request = new root.ActiveXObject('Microsoft.XMLHTTP');
}
pending = pendingRequests[path] = { callbacks: [callback] };
request.onreadystatechange = function() {
var response, callbacks, i, cb;
if (request.readyState === 4) {
requestCache[path] = response = parseResponse(request);
response.originPath = path;
callbacks = pendingRequests[path].callbacks;
delete pendingRequests[path];
for (i = 0; i < callbacks.length; i++) {
cb = callbacks[i];
cb(response);
}
}
};
request.open('GET', path, true);
request.send(null);
}
function parseResponse(request) {
var result = {};
if (request.status === 200) {
result.success = true;
result.source = request.responseText;
}
else if (request.status === 404) {
result.success = false;
result.notFound = true;
result.error = 'Not found (404)';
}
else {
result.success = false;
result.error = 'Server error (' + request.status + ')';
}
return result;
}
//------------------------------------------------------------------//
// Module loading
//------------------------------------------------------------------//
var pending = [];
var moduleMap = {};
var moduleError = {};
var execOrder = [];
function getRequires(source) {
var len;
var lines;
var i, it, match;
var requires = [];
// Strips multiline comments from source.
do {
len = source.length;
source = source.replace(/\/\*([^\*]|\*(?!\/))*(\*\/|$)/, '');
}
while (len !== source.length);
lines = source.split(/\r\n?|\n/);
for (i = 0; i < lines.length; i++) {
it = lines[i];
it = it.replace(/^\s*((?:var)?\s*(?:\w+\s*=))?\s*/, '');
match = it.match(
/^require\s*\(\s*(\'|\")((?:(?!\1).)+)\1\s*\)\s*(;|$)/);
if (match) {
requires.push(match[2]);
}
}
return requires;
}
function loadModule(response, request, callback) {
var originPath = response.originPath;
var pendingIndex = pending.indexOf(request);
var module;
var requireCount = 0;
var requires, i, it;
function callCallbackWhenOver() {
if (requireCount <= 0 && typeof callback === 'function') {
callback(module, request);
}
}
function onRequiredLoaded(depModule, depRequest) {
module.dependencies.push(depModule.path);
module.requireMap[depRequest.path] = depModule.path;
requireCount -= 1;
callCallbackWhenOver();
}
pending.splice(pendingIndex, 1);
module = moduleMap[originPath];
if (!module) {
module = moduleMap[originPath] = {
path: originPath,
basePath: concatPath(originPath, '..'),
error: response.success ? false : response.error,
request: request,
response: response,
source: response.source,
dependencies: [],
requireMap: {},
moduleObject: {
exports: {}
}
};
if (!module.error) {
requires = module.requires = getRequires(module.source);
requireCount = requires.length;
for (i = 0; i < requires.length; i++) {
it = requires[i];
loadFile(it, module.basePath, module.path, onRequiredLoaded);
}
callCallbackWhenOver();
}
else {
callCallbackWhenOver();
}
}
else {
callCallbackWhenOver();
}
}
function loadFile(path, relativeTo, requestedBy, callback) {
var requestInfo = {
path: path,
basePath: relativeTo,
solvedPaths: solvePossiblePaths(path, relativeTo),
nextIndex: 0
};
pending.push(requestInfo);
function onSuccess(response) {
loadModule(response, requestInfo, callback);
}
function onError(response) {
console.error(
'Failed to load `' + path +
'` requested by `' + requestedBy +
'`: ' + response.error);
loadModule(response, requestInfo, callback);
}
function tryLoadNext() {
var nextPath = requestInfo.solvedPaths[requestInfo.nextIndex++];
var isLast = requestInfo.nextIndex >= requestInfo.solvedPaths.length;
// Send the request for the next possible path.
sendRequest(nextPath, function(response) {
if (response.success) {
// The file was successfully loaded, process the
// result.
onSuccess(response);
}
else if (response.notFound && !isLast) {
// The file was not found, but there are other
// possible paths, so continue trying.
tryLoadNext();
}
else {
// The request failed or the last possible path was
// not found. Generate an error.
onError(response);
}
});
}
// Try load the first possible path.
tryLoadNext();
}
//------------------------------------------------------------------//
// Module execution
//------------------------------------------------------------------//
function getModule(modulePath) {
var module = moduleMap[modulePath];
if (!module) {
throw new Error('Module `' + modulePath + '` not loaded');
}
return module;
}
function getLoadingOrder(module) {
var result = [];
var deps, i, it, subResult;
if (module && !module.visited) {
module.visited = true;
deps = module.dependencies;
for (i = 0; i < deps.length; i++) {
it = getModule(deps[i]);
subResult = getLoadingOrder(it);
result = result.concat(subResult);
}
result.push(module);
}
return result;
}
function beforeModuleLoading(module) {
}
function afterModuleLoading(module) {
if (!axloader._moduleFn) {
// Assume a syntax error.
module.syntaxError = true;
}
module.moduleFunction = axloader._moduleFn;
module.executed = false;
delete axloader._moduleFn;
}
function executeModule(module, afterCallback) {
var order = getLoadingOrder(module);
function loadNext() {
var nextModule = order.shift();
var script, source, sourceMap;
if (nextModule && !nextModule.error) {
beforeModuleLoading(nextModule);
source = 'axloader._moduleFn = (' +
'function(require, module, exports, global) { // ' +
nextModule.path + '\n' +
nextModule.source +
'\n})';
source += '\n//# sourceMappingURL=' +
'data:application/json;charset=utf-8;base64,';
sourceMap = getSourceMap(
hrefOrigin + nextModule.path, nextModule.source, 1);
source += strToUTF8Base64(sourceMap);
script = document.createElement('script');
script.id = nextModule.path;
script.type = 'text/javascript';
script.src =
'data:text/javascript;charset=utf-8;base64,' +
strToUTF8Base64(source);
script.innerHTML = source;
script.onload = function() {
afterModuleLoading(nextModule);
setTimeout(loadNext, 0);
};
document.head.appendChild(script);
}
else if (nextModule) {
nextModule.notFound = true;
setTimeout(loadNext, 0);
}
else {
doExecute(module);
if (typeof afterCallback === 'function') {
afterCallback();
}
}
}
function doExecute(theModule) {
function require(path) {
var solvedPath = theModule.requireMap[path];
var requiredModule = solvedPath && getModule(solvedPath);
if (!requiredModule) {
throw new Error(
'require: the module `' + path + '` was not preloaded');
}
else if (requiredModule.notFound) {
throw new Error('Cannot find module \'' + path + '\'');
}
else if (requiredModule.error) {
throw new Error(
'require: the module `' + path + '` could not be loaded: ' +
requiredModule.error);
}
if (!requiredModule.executed && !requiredModule.executing) {
doExecute(requiredModule);
}
return requiredModule.moduleObject.exports;
}
var fn = theModule.moduleFunction;
var moduleObject = theModule.moduleObject;
var moduleExports = moduleObject.exports;
if (theModule.syntaxError) {
throw new SyntaxError(theModule.path);
}
else if (theModule.notFound) {
throw new Error('module not found: ' + theModule.path);
}
try {
theModule.executing = true;
fn.call(root, require, moduleObject, moduleExports, root);
}
finally {
theModule.executing = false;
}
theModule.executed = true;
}
loadNext();
}
//------------------------------------------------------------------//
// Public API
//------------------------------------------------------------------//
var axloader = {};
axloader.require = function require(path, afterCallback) {
loadFile(path, basePath, 'axloader.require', function(module) {
executeModule(module, afterCallback);
});
};
axloader.getPending = function getPending() {
return pending;
};
axloader.getModuleMap = function getModuleMap() {
return moduleMap;
};
root.axloader = axloader;
}(this));
| {'content_hash': '4743262d432c18a51e55f21bb8262f7e', 'timestamp': '', 'source': 'github', 'line_count': 671, 'max_line_length': 71, 'avg_line_length': 22.758569299552907, 'alnum_prop': 0.5774998362910091, 'repo_name': 'ricardobm/ax-loader', 'id': '26a7854d505d1e5992646f05b596e9df22dda295', 'size': '15271', 'binary': False, 'copies': '1', 'ref': 'refs/heads/master', 'path': 'src/ax-loader.js', 'mode': '33188', 'license': 'mit', 'language': [{'name': 'JavaScript', 'bytes': '21108'}]} |
package jugsaar12.nio.networking;
import java.net.ServerSocket;
import java.net.Socket;
import java.util.concurrent.ExecutorService;
import java.util.concurrent.Executors;
/**
* TODO MAX_POOL_SIZE to 1000
* <p/>
* TODO show RejectedExecutionHandler -> Default AbortPolicy, CallerRunsPolicy
*/
public class C_ExecutorServiceMultiThreadedEchoServer {
public static void main(String[] args) throws Exception {
System.out.println("C_ExecutorServiceMultiThreadedEchoServer running");
ExecutorService es = Executors.newCachedThreadPool();
try (ServerSocket ss = new ServerSocket(1337)) {
while (true) {
Socket s = ss.accept(); // blocking-call, never returns null!
es.submit(() -> Util.process(s));
}
}
}
} | {'content_hash': '35befc48d23f03d692415d764e21ff48', 'timestamp': '', 'source': 'github', 'line_count': 30, 'max_line_length': 78, 'avg_line_length': 25.333333333333332, 'alnum_prop': 0.7144736842105263, 'repo_name': 'jugsaar/jugsaar-meeting-12', 'id': 'aec0332d325665aa4bb0aec3abf2abd31679f07c', 'size': '760', 'binary': False, 'copies': '1', 'ref': 'refs/heads/master', 'path': 'java-nio-networking/code/jugsaar12-java-nio-networking/src/main/java/jugsaar12/nio/networking/C_ExecutorServiceMultiThreadedEchoServer.java', 'mode': '33188', 'license': 'apache-2.0', 'language': [{'name': 'Java', 'bytes': '17468'}]} |
import pyxb.binding.generate
import pyxb.utils.domutils
from xml.dom import Node
import os.path
schema_path = os.path.abspath(os.path.join(os.path.dirname(__file__),
'../schemas/po1.xsd'))
code = pyxb.binding.generate.GeneratePython(schema_location=schema_path)
#file('code.py', 'w').write(code)
rv = compile(code, 'test', 'exec')
eval(rv)
from pyxb.exceptions_ import *
from pyxb.utils import domutils
def ToDOM (instance, tag=None, dom_support=None):
return instance.toDOM(dom_support).documentElement
import unittest
class TestPO1 (unittest.TestCase):
street_content = '''95 Main St.
Anytown, AS 12345-6789'''
street_xml = '<street>%s</street>' % (street_content,)
street_dom = pyxb.utils.domutils.StringToDOM(street_xml).documentElement
address1_xml = '<name>Customer</name><street>95 Main St</street>'
address2_xml = '<name>Sugar Mama</name><street>24 E. Dearling Ave.</street>'
def tearDown (self):
pyxb.RequireValidWhenGenerating(True)
pyxb.RequireValidWhenParsing(True)
def testPythonElementSimpleContent (self):
elt = USAddress._ElementMap['street'].elementBinding()(self.street_content)
self.assertEqual(self.street_content, elt)
self.assertEqual(ToDOM(elt).toxml("utf-8"), self.street_xml)
def testDOMElementSimpleContent (self):
elt = USAddress._ElementMap['street'].elementBinding().createFromDOM(self.street_dom)
self.assertEqual(ToDOM(elt).toxml("utf-8"), self.street_xml)
def testPythonElementComplexContent_Element (self):
addr = USAddress(name='Customer', street='95 Main St')
self.assertEqual('95 Main St', addr.street)
addr = USAddress('Customer', '95 Main St')
self.assertEqual('95 Main St', addr.street)
addr.street = '43 West Oak'
self.assertEqual('43 West Oak', addr.street)
#self.assertEqual('<s>%s</s>' % (self.address1_xml,), ToDOM(addr, tag='s').toxml("utf-8"))
def testDOM_CTD_element (self):
# NB: USAddress is a CTD, not an element.
xml = '<shipTo>%s</shipTo>' % (self.address1_xml,)
dom = pyxb.utils.domutils.StringToDOM(xml)
addr2 = USAddress.Factory(_dom_node=dom.documentElement)
#self.assertEqual(xml, ToDOM(addr2, tag='shipTo').toxml("utf-8"))
def testPurchaseOrder (self):
po = purchaseOrder(shipTo=USAddress(name='Customer', street='95 Main St'),
billTo=USAddress(name='Sugar Mama', street='24 E. Dearling Ave'),
comment='Thanks!')
xml = ToDOM(po).toxml("utf-8")
xml1 = '<ns1:purchaseOrder xmlns:ns1="http://www.example.com/PO1"><shipTo><name>Customer</name><street>95 Main St</street></shipTo><billTo><name>Sugar Mama</name><street>24 E. Dearling Ave</street></billTo><ns1:comment>Thanks!</ns1:comment></ns1:purchaseOrder>'
self.assertEqual(xml, xml1)
dom = pyxb.utils.domutils.StringToDOM(xml)
po2 = purchaseOrder.createFromDOM(dom.documentElement)
self.assertEqual(xml1, ToDOM(po2).toxml("utf-8"))
loc = po2.shipTo._location()
self.assertTrue((not isinstance(loc, pyxb.utils.utility.Locatable_mixin)) or (58 == loc.columnNumber))
loc = po2.billTo.name._location()
self.assertTrue((not isinstance(loc, pyxb.utils.utility.Locatable_mixin)) or (131 == loc.columnNumber))
po2 = CreateFromDocument(xml)
self.assertEqual(xml1, ToDOM(po2).toxml("utf-8"))
loc = po2.shipTo._location()
self.assertTrue((not isinstance(loc, pyxb.utils.utility.Locatable_mixin)) or (58 == loc.columnNumber))
loc = po2.billTo.name._location()
self.assertTrue((not isinstance(loc, pyxb.utils.utility.Locatable_mixin)) or (131 == loc.columnNumber))
xml2 = '<purchaseOrder xmlns="http://www.example.com/PO1"><shipTo><name>Customer</name><street>95 Main St</street></shipTo><billTo><name>Sugar Mama</name><street>24 E. Dearling Ave</street></billTo><comment>Thanks!</comment></purchaseOrder>'
bds = pyxb.utils.domutils.BindingDOMSupport()
bds.setDefaultNamespace(Namespace)
self.assertEqual(xml2, ToDOM(po2, dom_support=bds).toxml("utf-8"))
def testGenerationValidation (self):
ship_to = USAddress('Robert Smith', 'General Delivery')
po = purchaseOrder(ship_to)
self.assertEqual('General Delivery', po.shipTo.street)
self.assertTrue(po.billTo is None)
self.assertTrue(pyxb.RequireValidWhenGenerating())
self.assertRaises(pyxb.DOMGenerationError, po.toxml)
try:
pyxb.RequireValidWhenGenerating(False)
self.assertFalse(pyxb.RequireValidWhenGenerating())
xmls = po.toxml("utf-8", root_only=True)
self.assertEqual('<ns1:purchaseOrder xmlns:ns1="http://www.example.com/PO1"><shipTo><street>General Delivery</street><name>Robert Smith</name></shipTo></ns1:purchaseOrder>', xmls)
finally:
pyxb.RequireValidWhenGenerating(True)
self.assertRaises(pyxb.UnrecognizedContentError, CreateFromDocument, xmls)
self.assertTrue(pyxb.RequireValidWhenParsing())
try:
pyxb.RequireValidWhenParsing(False)
self.assertFalse(pyxb.RequireValidWhenParsing())
po2 = CreateFromDocument(xmls)
finally:
pyxb.RequireValidWhenParsing(True)
self.assertEqual('General Delivery', po2.shipTo.street)
self.assertTrue(po2.billTo is None)
if __name__ == '__main__':
unittest.main()
| {'content_hash': '919acf526bf392f33f5376056b08089f', 'timestamp': '', 'source': 'github', 'line_count': 119, 'max_line_length': 269, 'avg_line_length': 46.739495798319325, 'alnum_prop': 0.6650485436893204, 'repo_name': 'jonfoster/pyxb1', 'id': 'bf3c9d2f0c5635eae42a36b08b6241bea6e6e94f', 'size': '5562', 'binary': False, 'copies': '1', 'ref': 'refs/heads/master', 'path': 'tests/drivers/test-po1.py', 'mode': '33188', 'license': 'apache-2.0', 'language': [{'name': 'Python', 'bytes': '1564427'}, {'name': 'Shell', 'bytes': '18946'}]} |
using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using System.Threading.Tasks;
using Newtonsoft.Json;
namespace VJeek.Microdata.Intangible.StructuredValue
{
public partial class OpeningHoursSpecification : StructuredValue
{
[JsonProperty("closes")]
public TimeSpan Closes { get; set; }
[JsonProperty("dayOfWeek")]
public DayOfWeek DayOfWeek { get; set; }
[JsonProperty("opens")]
public TimeSpan Opens { get; set; }
[JsonProperty("validFrom")]
public DateTime ValidFrom { get; set; }
[JsonProperty("validThrough")]
public DateTime ValidThrough { get; set; }
}
}
| {'content_hash': 'ebe952e1b2b29a2152f4caea184b6845', 'timestamp': '', 'source': 'github', 'line_count': 27, 'max_line_length': 65, 'avg_line_length': 23.22222222222222, 'alnum_prop': 0.7384370015948963, 'repo_name': 'vjeek/microdata', 'id': 'eee2c6ba0e8520d9bd949baba07a99f7c5b3b95c', 'size': '629', 'binary': False, 'copies': '1', 'ref': 'refs/heads/development', 'path': 'Sources/VJeek.Microdata/Intangible/StructuredValue/OpeningHoursSpecification.cs', 'mode': '33188', 'license': 'mit', 'language': [{'name': 'Batchfile', 'bytes': '746'}, {'name': 'C#', 'bytes': '19991'}, {'name': 'PowerShell', 'bytes': '95259'}]} |
The GraphQL module allows client applications to query the content handled by an Orchard website.
It enables the GraphiQL Explorer view to test GraphQL queries, and provides HTTP endpoints to send client queries.
## HTTP Methods, Headers, and Body
### GET request
When receiving an HTTP GET request, the GraphQL query should be specified in the "query" query string. For example, if we wanted to execute the following GraphQL query:
```graphql
{
me {
name
}
}
```
This request could be sent via an HTTP GET like so:
`http://myapi/graphql?query={me{name}}`
Query variables can be sent as a JSON-encoded string in an additional query parameter called variables. If the query contains several named operations, an operationName query parameter can be used to control which one should be executed.
### POST request
#### application/json content type
A standard GraphQL POST request should use the `application/json` content-type header, and include a JSON-encoded body of the following form:
```graphql
{
"query": "...",
"operationName": "...",
"variables": { "myVariable": "someValue", ... }
}
```
`operationName` and `variables` are optional fields. `operationName` is only required if multiple operations are present in the query.
#### application/graphql content type
Another option is to use the `application/graphql` content-type header, and the HTTP POST body contents is treated as the GraphQL query string.
#### query string
In addition to the above, If the "query" query string parameter is present (as in the GET example above), it will be parsed and handled in the same way as the HTTP GET case.
### Response
Regardless of the method by which the query and variables were sent, the response is returned in the body of the request in JSON format.
A query might result in some data and some errors, and those are returned in a JSON object of the form:
```json
{
"data": { ... },
"errors": [ ... ]
}
```
If there were no errors returned, the "errors" field is not present on the response.
If no data is returned the "data" field is only included if the error occurred during execution.
## Authentication
Executing a GraphQL query requires the issuer to have the `ExecuteGraphQL` permission. Like any other API in Orchard Core, the GraphQL API supports
cookie and OAuth 2.0 authentication. This means it's compatible with the OpenId module and supports JSON Web Token (JWT).
By default anonymous users are not able to execute a GraphQL query.
## Configuration
It's possible to configure graphql options for exposing exceptions and max depth, max complexity and field impact.
Configuration is done via the standard shell configuration, as follows.
```json
{
"OrchardCore": {
"OrchardCore_Apis_GraphQL": {
"ExposeExceptions": true,
"MaxDepth": 50,
"MaxComplexity": 100,
"FieldImpact": 2.0,
"DefaultNumberOfResults": 100,
"MaxNumberOfResults": 1000,
"MaxNumberOfResultsValidationMode": "Default"
}
}
}
```
*ExposeExceptions (bool, Default: false for production, true for development)*
If set to true stack traces are exposed to graphql clients
*DefaultNumberOfResults (int, Default: 100)*
The default number of results returned by all paged fields/types.
*MaxNumberOfResults (int, Default: 1000)*
The maximum number of results returned by all paged fields/types.
*MaxNumberOfResultsValidationMode (enum, Values: Default|Enabled|Disabled, Default: Default)()*
Specify the validation behaviour if the max number of results is exceeded in a pager parameter
* Default - In production info will be logged and only the max number of results will be returned. In development a graphql validation error will be raised.
* Enabled - a graphql validation error will be raised
* Disabled - Info will be logged and only the max number of results will be returned
*MaxDepth (int?, Default: 20)*
Enforces the total maximum nesting across all queries in a request.
*MaxComplexity (int?, Default: null)*
*FieldImpact (double?, Default: null)*
For more information on MaxDepth, MaxComplexity, FieldImpact & protecting against malicious queries view the graphql-dot-net documentation at <https://graphql-dotnet.github.io/docs/getting-started/malicious-queries/>
| {'content_hash': '8ee80330a70b8aded11c89b2578ddc87', 'timestamp': '', 'source': 'github', 'line_count': 117, 'max_line_length': 237, 'avg_line_length': 36.43589743589744, 'alnum_prop': 0.7522871217452498, 'repo_name': 'xkproject/Orchard2', 'id': '2a44f43220f1cc656cf5d84f218eeb9a33797940', 'size': '4308', 'binary': False, 'copies': '3', 'ref': 'refs/heads/master_PCCOM', 'path': 'src/docs/reference/modules/Apis.GraphQL/README.md', 'mode': '33188', 'license': 'bsd-3-clause', 'language': [{'name': 'C#', 'bytes': '7779422'}, {'name': 'CSS', 'bytes': '2900240'}, {'name': 'Dockerfile', 'bytes': '424'}, {'name': 'HTML', 'bytes': '1472436'}, {'name': 'JavaScript', 'bytes': '2184254'}, {'name': 'Liquid', 'bytes': '43273'}, {'name': 'PHP', 'bytes': '2484'}, {'name': 'PowerShell', 'bytes': '142165'}, {'name': 'Pug', 'bytes': '55503'}, {'name': 'SCSS', 'bytes': '215570'}, {'name': 'TypeScript', 'bytes': '41644'}]} |
Namespace Ribbons.Document.Create
Public Class FromProfile
Inherits RibbonButtonBase
Public Sub New()
_Image = ""
_Order = 1
_Text = "From Profile"
_ToolTip = ""
End Sub
Protected Friend Overrides Sub OnClick()
End Sub
Protected Friend Overrides Sub OnIsEnabled()
End Sub
End Class
End Namespace
| {'content_hash': '81adc258cf3c3d2de8198ac49cb880ff', 'timestamp': '', 'source': 'github', 'line_count': 24, 'max_line_length': 52, 'avg_line_length': 17.375, 'alnum_prop': 0.5539568345323741, 'repo_name': 'nublet/DMS', 'id': '51e57b874a4c962bdaa2f2ba00ff815d1485c81b', 'size': '417', 'binary': False, 'copies': '1', 'ref': 'refs/heads/master', 'path': 'DMS.Forms/Ribbons/Items/Document/Create/FromProfile.vb', 'mode': '33188', 'license': 'mit', 'language': [{'name': 'Visual Basic', 'bytes': '2291940'}]} |
package com.dfyy.bussiness;
import java.io.Serializable;
import java.util.Date;
import javax.persistence.Column;
import javax.persistence.Entity;
import javax.persistence.FetchType;
import javax.persistence.GeneratedValue;
import javax.persistence.Id;
import javax.persistence.JoinColumn;
import javax.persistence.ManyToOne;
import javax.persistence.Table;
import javax.xml.bind.annotation.XmlAccessType;
import javax.xml.bind.annotation.XmlAccessorType;
import javax.xml.bind.annotation.XmlElement;
import javax.xml.bind.annotation.XmlRootElement;
import javax.xml.bind.annotation.XmlTransient;
import javax.xml.bind.annotation.adapters.XmlJavaTypeAdapter;
import org.hibernate.annotations.GenericGenerator;
import com.dfyy.util.JaxbDateSerializer;
@Entity
@Table(name = "user")
@XmlRootElement
@XmlAccessorType(XmlAccessType.NONE)
public class User implements Serializable {
private static final long serialVersionUID = 8517308475246169441L;
@Id
@Column(name = "id")
@GenericGenerator(name = "idGenerator", strategy = "assigned")
@GeneratedValue(generator = "idGenerator")
@XmlElement
private String id;
@Column(name = "phone")
@XmlElement
private String phone;
@Column(name = "password")
@XmlTransient
private String password;
@Column(name = "alias")
@XmlElement
private String alias;
@Column(name = "thumbnail")
@XmlElement
private String thumbnail;
@Column(name = "address")
@XmlElement
private String address;
@Column(name = "point")
@XmlElement
private Integer point;
@Column(name = "description")
@XmlElement
private String description;
@Column(name = "status")
@XmlElement
private Integer status;
@Column(name = "x")
@XmlElement
private Double x;
@Column(name = "y")
@XmlElement
private Double y;
@Column(name = "currency")
@XmlElement
private Integer currency;
@Column(name = "money")
@XmlElement
private Integer money;
@Column(name = "scoring")
@XmlElement
private Double scoring;
@Column(name = "tjcode")
@XmlElement
private String tjcode;
@Column(name = "tjcoin")
@XmlElement
private Integer tjcoin;
@Column(name = "time")
@XmlJavaTypeAdapter(JaxbDateSerializer.class)
private Date time;
@ManyToOne(fetch = FetchType.EAGER)
@JoinColumn(name = "level")
@XmlElement
private UserLevel level;
@ManyToOne(fetch = FetchType.EAGER)
@JoinColumn(name = "aid")
@XmlElement
private Area area;
@Column(name = "activity")
private Integer activity;
@Column(name = "teamwork")
@XmlElement
private boolean teamwork;
@Column(name = "acceptcoupon")
@XmlElement
private boolean acceptCoupon;
public User() {
}
public String getId() {
return id;
}
public void setId(String id) {
this.id = id;
}
public String getPhone() {
return phone;
}
public void setPhone(String phone) {
this.phone = phone;
}
public String getPassword() {
return password;
}
public void setPassword(String password) {
this.password = password;
}
public String getAlias() {
return alias;
}
public void setAlias(String alias) {
this.alias = alias;
}
public String getThumbnail() {
return thumbnail;
}
public void setThumbnail(String thumbnail) {
this.thumbnail = thumbnail;
}
public String getAddress() {
return address;
}
public void setAddress(String address) {
this.address = address;
}
public Integer getPoint() {
return point;
}
public void setPoint(Integer point) {
this.point = point;
}
public String getDescription() {
return description;
}
public void setDescription(String description) {
this.description = description;
}
public Integer getStatus() {
return status;
}
public void setStatus(Integer status) {
this.status = status;
}
public Double getX() {
return x;
}
public void setX(Double x) {
this.x = x;
}
public Double getY() {
return y;
}
public void setY(Double y) {
this.y = y;
}
public Integer getCurrency() {
return currency;
}
public void setCurrency(Integer currency) {
this.currency = currency;
}
public Double getScoring() {
return scoring;
}
public void setScoring(Double scoring) {
this.scoring = scoring;
}
public Date getTime() {
return time;
}
public void setTime(Date time) {
this.time = time;
}
public UserLevel getLevel() {
return level;
}
public void setLevel(UserLevel level) {
this.level = level;
}
public Area getArea() {
return area;
}
public void setArea(Area area) {
this.area = area;
}
public String getTjcode() {
return tjcode;
}
public void setTjcode(String tjcode) {
this.tjcode = tjcode;
}
public Integer getActivity() {
return activity;
}
public void setActivity(Integer activity) {
this.activity = activity;
}
@XmlElement
public String getIdentifier() {
if (activity == null) {
return "新人";
} else if (activity >= 2000) {
return "特级";
} else if (activity >= 1000 && activity <= 1999) {
return "高级";
} else if (activity >= 500 && activity <= 999) {
return "中级";
} else if (activity >= 200 && activity <= 499) {
return "初级";
}
return "新人";
}
public boolean isTeamwork() {
return teamwork;
}
public void setTeamwork(boolean teamwork) {
this.teamwork = teamwork;
}
public Integer getTjcoin() {
return tjcoin;
}
public void setTjcoin(Integer tjcoin) {
this.tjcoin = tjcoin;
}
public boolean isAcceptCoupon() {
return acceptCoupon;
}
public void setAcceptCoupon(boolean acceptCoupon) {
this.acceptCoupon = acceptCoupon;
}
public Integer getMoney() {
return money;
}
public void setMoney(Integer money) {
this.money = money;
}
}
| {'content_hash': '09961152c255dd2b8ffd2e6fccc1ddbc', 'timestamp': '', 'source': 'github', 'line_count': 323, 'max_line_length': 67, 'avg_line_length': 17.340557275541794, 'alnum_prop': 0.7064809855382967, 'repo_name': 'secondflying/dfyy', 'id': 'b7211ffdebc40d47216eaaef59f1a68cb1ada1fc', 'size': '5625', 'binary': False, 'copies': '1', 'ref': 'refs/heads/master', 'path': 'src/main/java/com/dfyy/bussiness/User.java', 'mode': '33188', 'license': 'apache-2.0', 'language': [{'name': 'ActionScript', 'bytes': '70896'}, {'name': 'Batchfile', 'bytes': '113'}, {'name': 'CSS', 'bytes': '215364'}, {'name': 'Java', 'bytes': '2098669'}, {'name': 'JavaScript', 'bytes': '1312338'}, {'name': 'PHP', 'bytes': '1193'}]} |
In order to translate the labels of the families and attributes, as well as some few other things, you only need to
create a standard Symfony translation file with the proper syntax.
| WARNING |
| ------- |
| Data translation is done using [*EAV* context](09-context.md) |
### Translating Families
The label of a family can be directly provided in the configuration of the family by setting the "label" configuration
key. This is not recommended as it will not allow you to translate the attribute in multiple languages.
The translation system will look for this keys in order to translate a family:
````yml
eav:
family:
<family_code>:
label: <label>
````
### Translating Attributes
The label of an attribute can be directly provided in the configuration of the attribute by setting the "label"
configuration key. This is not recommended as it will not allow you to translate the attribute in multiple languages.
The translation system will first look for this keys in order to translate an attribute:
````yml
eav:
family:
<family_code>:
attribute:
<attribute_code>:
label: <label>
````
However, if your attribute exists in multiple families and has the same label, you can use this syntax instead:
````yml
eav:
attribute:
<attribute_code>:
label: <label>
````
### Translating error messages
The following keys will be tested:
````yml
eav:
family:
<family_code>:
attribute:
<attribute_code>:
validation:
<type>: <error_msg>
eav:
attribute:
<attribute_code>:
validation:
<type>: <error_msg>
eav:
validation:
<type>: <error_msg>
````
The following translations parameters will be available:
- ````%attribute%````: The translated label of the attribute.
- ````%family%````: The translated label of the family.
| {'content_hash': 'f8a0e815459eb9d1844470c45af1fd57', 'timestamp': '', 'source': 'github', 'line_count': 71, 'max_line_length': 118, 'avg_line_length': 27.690140845070424, 'alnum_prop': 0.6495422177009156, 'repo_name': 'VincentChalnot/SidusEAVModelBundle', 'id': 'ca512ca1b4e7c65e4b2965c9ea74f21843dfcb63', 'size': '1997', 'binary': False, 'copies': '1', 'ref': 'refs/heads/v1.2-dev', 'path': 'Documentation/08-translate.md', 'mode': '33188', 'license': 'mit', 'language': [{'name': 'HTML', 'bytes': '14277'}, {'name': 'PHP', 'bytes': '371627'}]} |
<html>
<body>
<xml:namespace ns="urn:schemas-microsoft-com:vml" prefix="v" />
<!-- Include the VML behavior -->
<style>v\: * { behavior:url(#default#VML); display:inline-block }</style>
<!--p-->
<v:shape id="rect01" style="HEIGHT:50px; LEFT:1px; TOP:1px; WIDTH:50px"
coordsize = "200,200" fillcolor = "green" strokecolor = "green"
path = "m1,1l1,200,200,200,200,1xe"/>
<!--/p-->
<script language="JavaScript" type="text/javascript">
<!--
//document.getElementById("rect01").onmouseover = Change;
function Change() {
rect01.fillColor = (rect01.fillColor == "red") ? "green" :
(rect01.fillColor == "green") ? "blue" : "red";
}
-->
</script>
</body>
</html>
| {'content_hash': '441a77285ee46cfe558d617a3a512135', 'timestamp': '', 'source': 'github', 'line_count': 25, 'max_line_length': 73, 'avg_line_length': 28.32, 'alnum_prop': 0.6031073446327684, 'repo_name': 'doubleblacktech/learn-plumb', 'id': '110cc3191991610eecc4e02c1f52bbf5f0a6e9f5', 'size': '708', 'binary': False, 'copies': '18', 'ref': 'refs/heads/master', 'path': 'tests/miscellaneous/ie6-vml-mouseover.html', 'mode': '33261', 'license': 'mit', 'language': [{'name': 'JavaScript', 'bytes': '65950687'}]} |
package org.vaadin.spring.i18n;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import java.io.IOException;
import java.io.InputStream;
import java.io.InputStreamReader;
import java.io.Reader;
import java.io.UnsupportedEncodingException;
import java.text.MessageFormat;
import java.util.Locale;
import java.util.MissingResourceException;
import java.util.PropertyResourceBundle;
import java.util.ResourceBundle;
/**
* Implementation of {@link org.vaadin.spring.i18n.MessageProvider} that reads messages
* from {@link java.util.ResourceBundle}s with a specific base name.
*
* @author Petter Holmström (petter@vaadin.com)
*/
public class ResourceBundleMessageProvider implements MessageProvider {
private static final Logger LOGGER = LoggerFactory.getLogger(ResourceBundleMessageProvider.class);
private final String baseName;
private final String encoding;
/**
* Creates a new {@code ResourceBundleMessageProvider} with the given base name and UTF-8 encoding.
*
* @param baseName the base name to use, must not be {@code null}.
*/
public ResourceBundleMessageProvider(String baseName) {
this(baseName, "UTF-8");
}
/**
* Creates a new {@code ResourceBundleMessageProvider} with the given base name and encoding.
*
* @param baseName the base name to use, must not be {@code null}.
* @param encoding the encoding to use when reading the resource bundle, must not be {@code null}.
*/
public ResourceBundleMessageProvider(String baseName, String encoding) {
this.baseName = baseName;
this.encoding = encoding;
}
@Override
public MessageFormat resolveCode(String s, Locale locale) {
final ResourceBundle resourceBundle = getResourceBundle(locale);
final String message = getString(resourceBundle, s);
return getMessageFormat(message, locale);
}
private ResourceBundle getResourceBundle(Locale locale) {
try {
return ResourceBundle.getBundle(baseName, locale, new MessageControl());
} catch (MissingResourceException ex) {
LOGGER.warn("No message bundle with basename [{}] found for locale [{}]", baseName, locale);
return null;
}
}
private String getString(ResourceBundle bundle, String s) {
if (bundle == null) {
return null;
}
try {
return bundle.getString(s);
} catch (MissingResourceException ex) {
return null;
}
}
private MessageFormat getMessageFormat(String message, Locale locale) {
if (message == null) {
return null;
}
return new MessageFormat(message, locale);
}
private class MessageControl extends ResourceBundle.Control {
@Override
public ResourceBundle newBundle(String baseName, Locale locale, String format, ClassLoader loader, boolean reload) throws IllegalAccessException, InstantiationException, IOException {
if ("java.properties".equals(format)) {
final String resourceName = toResourceName(toBundleName(baseName, locale), "properties");
final InputStream stream = loader.getResourceAsStream(resourceName);
if (stream == null) {
return null; // Not found
}
Reader reader = null;
try {
reader = new InputStreamReader(stream, encoding);
return new PropertyResourceBundle(reader);
} catch (UnsupportedEncodingException ex) {
stream.close();
throw ex;
} finally {
if (reader != null) {
reader.close();
}
}
} else {
return super.newBundle(baseName, locale, format, loader, reload);
}
}
}
}
| {'content_hash': '02b7a0c49ffcee61d1c511f616cd85bd', 'timestamp': '', 'source': 'github', 'line_count': 111, 'max_line_length': 191, 'avg_line_length': 35.4054054054054, 'alnum_prop': 0.6399491094147582, 'repo_name': 'GJRTimmer/vaadin4spring', 'id': '4ecee6be5a613a67d1526d5bbe902c27d847beca', 'size': '4532', 'binary': False, 'copies': '4', 'ref': 'refs/heads/master', 'path': 'addons/i18n/src/main/java/org/vaadin/spring/i18n/ResourceBundleMessageProvider.java', 'mode': '33188', 'license': 'apache-2.0', 'language': [{'name': 'CSS', 'bytes': '665'}, {'name': 'Java', 'bytes': '353774'}]} |
#include "../Precompiled.h"
#include "../Math/MathDefs.h"
#include "../Math/StringHash.h"
#include <cstdio>
#include "../DebugNew.h"
namespace Urho3D
{
const StringHash StringHash::ZERO;
StringHash::StringHash(const char* str) noexcept :
value_(Calculate(str))
{
}
StringHash::StringHash(const String& str) noexcept :
value_(Calculate(str.CString()))
{
}
unsigned StringHash::Calculate(const char* str, unsigned hash)
{
if (!str)
return hash;
while (*str)
{
// Perform the actual hashing as case-insensitive
char c = *str;
hash = SDBMHash(hash, (unsigned char)tolower(c));
++str;
}
return hash;
}
String StringHash::ToString() const
{
char tempBuffer[CONVERSION_BUFFER_LENGTH];
sprintf(tempBuffer, "%08X", value_);
return String(tempBuffer);
}
}
| {'content_hash': '0fcd3d919b139550937694076bcb75e2', 'timestamp': '', 'source': 'github', 'line_count': 49, 'max_line_length': 62, 'avg_line_length': 18.122448979591837, 'alnum_prop': 0.6081081081081081, 'repo_name': 'victorholt/Urho3D', 'id': '7a30f2e214ef14ac1b11dffc3f48ea0c807b8192', 'size': '2037', 'binary': False, 'copies': '6', 'ref': 'refs/heads/master', 'path': 'Source/Urho3D/Math/StringHash.cpp', 'mode': '33188', 'license': 'mit', 'language': [{'name': 'AngelScript', 'bytes': '1435828'}, {'name': 'Batchfile', 'bytes': '16483'}, {'name': 'C++', 'bytes': '8325877'}, {'name': 'CMake', 'bytes': '446542'}, {'name': 'GLSL', 'bytes': '154112'}, {'name': 'HLSL', 'bytes': '178063'}, {'name': 'HTML', 'bytes': '1375'}, {'name': 'Java', 'bytes': '78624'}, {'name': 'Lua', 'bytes': '568614'}, {'name': 'MAXScript', 'bytes': '94704'}, {'name': 'Objective-C', 'bytes': '6539'}, {'name': 'Ruby', 'bytes': '65069'}, {'name': 'Shell', 'bytes': '27373'}]} |
// This file was generated by St4mpede.Poco 2016-06-08 22:18:52
/*
Reading xml C:\DATA\PROJEKT\St4mpede\St4mpede\St4mpede\RdbSchema\St4mpede.RdbSchema.xml.
Read database with tables: Customer, Project, User.
Included classes are:
Name=Customer
Name=Project
Name=User
Writing the output file C:\DATA\PROJEKT\St4mpede\St4mpede\St4mpede\Poco\PocoGenerator.xml.
Writing 3 classes in C:\DATA\PROJEKT\St4mpede\St4mpede\St4mpede\..\..\TheDAL\Poco.
*/
//
//
//
//
//
//
//
//
| {'content_hash': '928c42c20fba38c6343e5ad8317a1a9f', 'timestamp': '', 'source': 'github', 'line_count': 22, 'max_line_length': 90, 'avg_line_length': 21.727272727272727, 'alnum_prop': 0.7364016736401674, 'repo_name': 'LosManos/St4mpede', 'id': 'd431056b37b6b1b0534e5cbceb4481788390d7fb', 'size': '480', 'binary': False, 'copies': '1', 'ref': 'refs/heads/master', 'path': 'St4mpede/St4mpede/St4mpede.Poco.cs', 'mode': '33188', 'license': 'apache-2.0', 'language': [{'name': 'C#', 'bytes': '111411'}]} |
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<title>classical-realizability: Not compatible</title>
<link rel="shortcut icon" type="image/png" href="../../../../../favicon.png" />
<link href="../../../../../bootstrap.min.css" rel="stylesheet">
<link href="../../../../../bootstrap-custom.css" rel="stylesheet">
<link href="//maxcdn.bootstrapcdn.com/font-awesome/4.2.0/css/font-awesome.min.css" rel="stylesheet">
<script src="../../../../../moment.min.js"></script>
<!-- HTML5 Shim and Respond.js IE8 support of HTML5 elements and media queries -->
<!-- WARNING: Respond.js doesn't work if you view the page via file:// -->
<!--[if lt IE 9]>
<script src="https://oss.maxcdn.com/html5shiv/3.7.2/html5shiv.min.js"></script>
<script src="https://oss.maxcdn.com/respond/1.4.2/respond.min.js"></script>
<![endif]-->
</head>
<body>
<div class="container">
<div class="navbar navbar-default" role="navigation">
<div class="container-fluid">
<div class="navbar-header">
<a class="navbar-brand" href="../../../../.."><i class="fa fa-lg fa-flag-checkered"></i> Coq bench</a>
</div>
<div id="navbar" class="collapse navbar-collapse">
<ul class="nav navbar-nav">
<li><a href="../..">clean / released</a></li>
<li class="active"><a href="">8.5.1 / classical-realizability - 8.7.0</a></li>
</ul>
</div>
</div>
</div>
<div class="article">
<div class="row">
<div class="col-md-12">
<a href="../..">« Up</a>
<h1>
classical-realizability
<small>
8.7.0
<span class="label label-info">Not compatible</span>
</small>
</h1>
<p><em><script>document.write(moment("2020-07-19 14:21:56 +0000", "YYYY-MM-DD HH:mm:ss Z").fromNow());</script> (2020-07-19 14:21:56 UTC)</em><p>
<h2>Context</h2>
<pre># Packages matching: installed
# Name # Installed # Synopsis
base-bigarray base
base-num base Num library distributed with the OCaml compiler
base-threads base
base-unix base
camlp5 7.12 Preprocessor-pretty-printer of OCaml
conf-findutils 1 Virtual package relying on findutils
coq 8.5.1 Formal proof management system.
num 0 The Num library for arbitrary-precision integer and rational arithmetic
ocaml 4.05.0 The OCaml compiler (virtual package)
ocaml-base-compiler 4.05.0 Official 4.05.0 release
ocaml-config 1 OCaml Switch Configuration
# opam file:
opam-version: "2.0"
maintainer: "Hugo.Herbelin@inria.fr"
homepage: "https://github.com/coq-contribs/classical-realizability"
license: "BSD"
build: [make "-j%{jobs}%"]
install: [make "install"]
remove: ["rm" "-R" "%{lib}%/coq/user-contrib/ClassicalRealizability"]
depends: [
"ocaml"
"coq" {>= "8.7" & < "8.8~"}
]
tags: [ "keyword: classical realizability" "keyword: Krivine's realizability" "keyword: primitive datatype" "keyword: non determinism" "keyword: quote" "keyword: axiom of countable choice" "keyword: real numbers" "category: Mathematics/Logic/Foundations" ]
authors: [ "Lionel Rieg <lionel.rieg@ens-lyon.org>" ]
bug-reports: "https://github.com/coq-contribs/classical-realizability/issues"
dev-repo: "git+https://github.com/coq-contribs/classical-realizability.git"
synopsis: "Krivine's classical realizability"
description: """
The aim of this Coq library is to provide a framework for checking
proofs in Krivine's classical realizability for second-order Peano arithmetic.
It is designed to be as extensible as the original theory by Krivine and to
support on-the-fly extensions by new instructions with their evaluation
rules."""
flags: light-uninstall
url {
src:
"https://github.com/coq-contribs/classical-realizability/archive/v8.7.0.tar.gz"
checksum: "md5=6299c2ee7d52c1535eece3376983263c"
}
</pre>
<h2>Lint</h2>
<dl class="dl-horizontal">
<dt>Command</dt>
<dd><code>true</code></dd>
<dt>Return code</dt>
<dd>0</dd>
</dl>
<h2>Dry install</h2>
<p>Dry install with the current Coq version:</p>
<dl class="dl-horizontal">
<dt>Command</dt>
<dd><code>opam install -y --show-action coq-classical-realizability.8.7.0 coq.8.5.1</code></dd>
<dt>Return code</dt>
<dd>5120</dd>
<dt>Output</dt>
<dd><pre>[NOTE] Package coq is already installed (current version is 8.5.1).
The following dependencies couldn't be met:
- coq-classical-realizability -> coq >= 8.7
Your request can't be satisfied:
- No available version of coq satisfies the constraints
No solution found, exiting
</pre></dd>
</dl>
<p>Dry install without Coq/switch base, to test if the problem was incompatibility with the current Coq/OCaml version:</p>
<dl class="dl-horizontal">
<dt>Command</dt>
<dd><code>opam remove -y coq; opam install -y --show-action --unlock-base coq-classical-realizability.8.7.0</code></dd>
<dt>Return code</dt>
<dd>0</dd>
</dl>
<h2>Install dependencies</h2>
<dl class="dl-horizontal">
<dt>Command</dt>
<dd><code>true</code></dd>
<dt>Return code</dt>
<dd>0</dd>
<dt>Duration</dt>
<dd>0 s</dd>
</dl>
<h2>Install</h2>
<dl class="dl-horizontal">
<dt>Command</dt>
<dd><code>true</code></dd>
<dt>Return code</dt>
<dd>0</dd>
<dt>Duration</dt>
<dd>0 s</dd>
</dl>
<h2>Installation size</h2>
<p>No files were installed.</p>
<h2>Uninstall</h2>
<dl class="dl-horizontal">
<dt>Command</dt>
<dd><code>true</code></dd>
<dt>Return code</dt>
<dd>0</dd>
<dt>Missing removes</dt>
<dd>
none
</dd>
<dt>Wrong removes</dt>
<dd>
none
</dd>
</dl>
</div>
</div>
</div>
<hr/>
<div class="footer">
<p class="text-center">
<small>Sources are on <a href="https://github.com/coq-bench">GitHub</a>. © Guillaume Claret.</small>
</p>
</div>
</div>
<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.1/jquery.min.js"></script>
<script src="../../../../../bootstrap.min.js"></script>
</body>
</html>
| {'content_hash': '6953417c96203c08c70ca885216d50c6', 'timestamp': '', 'source': 'github', 'line_count': 168, 'max_line_length': 340, 'avg_line_length': 43.81547619047619, 'alnum_prop': 0.5651406058959381, 'repo_name': 'coq-bench/coq-bench.github.io', 'id': '7a2fb7424f897c58b824ccbe499d4bd7f93f33f2', 'size': '7363', 'binary': False, 'copies': '1', 'ref': 'refs/heads/master', 'path': 'clean/Linux-x86_64-4.05.0-2.0.6/released/8.5.1/classical-realizability/8.7.0.html', 'mode': '33188', 'license': 'mit', 'language': []} |
import React from 'react'
import '!style!css!react-loading-bar/dist/index.css'
export default function Loading() {
return (
<div>
<span className="fa fa-cog fa-spin fa-3x fa-fw" />
<span className="sr-only" aria-hidden="true">Loading...</span>
</div>
)
}
| {'content_hash': '79f42d9ca7021bd62d432c1472260f62', 'timestamp': '', 'source': 'github', 'line_count': 10, 'max_line_length': 68, 'avg_line_length': 27.9, 'alnum_prop': 0.6415770609318996, 'repo_name': 'moimikey/react-boilerplate', 'id': '0c6503845d209715b51d2b93dbf7650d78360700', 'size': '279', 'binary': False, 'copies': '1', 'ref': 'refs/heads/redux', 'path': 'src/app/components/Loading.js', 'mode': '33188', 'license': 'mit', 'language': [{'name': 'CSS', 'bytes': '4797'}, {'name': 'HTML', 'bytes': '3946'}, {'name': 'JavaScript', 'bytes': '29033'}]} |
from __future__ import unicode_literals
from django.conf import settings
from django.contrib.contenttypes import generic
from django.contrib.contenttypes.models import ContentType
from django.db import models
from django.dispatch.dispatcher import receiver
from model_utils.models import TimeStampedModel
from registration.signals import user_registered
_all = ["Asset", "Profile", "user_registered_callback"]
__author__ = "pmeier82"
# PROFILE
class Profile(models.Model):
"""user profile model"""
class Meta:
app_label = "base"
user = models.OneToOneField(
settings.AUTH_USER_MODEL,
unique=True)
title = models.CharField(
max_length=255,
default="",
)
affiliation = models.CharField(
max_length=255,
default="",
)
research_area = models.TextField(
default=""
)
# TODO: build a meaningful profile
# special
def __str__(self):
return self.user.username
def __unicode__(self):
return unicode(self.__str__())
def user_registered_callback(user, request, **kwargs):
profile, is_new = Profile.objects.get_or_create(user=user)
profile.title = request.POST.get("title", "test")
profile.save()
user_registered.connect(user_registered_callback)
# ASSET
def UPLOAD_TO_HANDLER(obj, fname):
folder = getattr(obj, "kind", "default")
return "{}/{}".format(folder, fname)
class Asset(TimeStampedModel):
"""generic file asset model"""
class Meta:
app_label = "base"
UPLOAD_TO = "default"
# fields
name = models.CharField(max_length=255, unique=False)
data_orig_name = models.CharField(max_length=255, unique=False)
data = models.FileField(upload_to=UPLOAD_TO_HANDLER)
kind = models.CharField(max_length=255, unique=False, null=False, default=UPLOAD_TO)
# generic foreign key
content_type = models.ForeignKey(ContentType, null=True)
object_id = models.PositiveIntegerField(null=True)
content_object = generic.GenericForeignKey()
# special methods
def __unicode__(self):
return unicode("{}: {}".format(self.__class__.__name__, self.name))
# django special methods
@models.permalink
def get_absolute_url(self):
return "asset:serve", (self.pk,), {}
@models.permalink
def get_delete_url(self):
return "asset:delete", (self.pk,), {}
# interface
def save(self, *args, **kwargs):
super(Asset, self).save(*args, **kwargs)
def delete(self, *args, **kwargs):
super(Asset, self).delete(*args, **kwargs)
@receiver(models.signals.pre_delete, sender=Asset)
def asset_file_delete(sender, instance, **kwargs):
instance.data.delete()
if __name__ == "__main__":
pass
| {'content_hash': '85f7dee85ba6de3d5a267ea68a913604', 'timestamp': '', 'source': 'github', 'line_count': 107, 'max_line_length': 88, 'avg_line_length': 25.757009345794394, 'alnum_prop': 0.6556603773584906, 'repo_name': 'pmeier82/spike_gnode', 'id': '2411abbf4b4c2c62fd144aaa9261d587c405219b', 'size': '2781', 'binary': False, 'copies': '1', 'ref': 'refs/heads/master', 'path': 'base/models.py', 'mode': '33188', 'license': 'bsd-3-clause', 'language': [{'name': 'CSS', 'bytes': '11360'}, {'name': 'HTML', 'bytes': '56070'}, {'name': 'JavaScript', 'bytes': '734'}, {'name': 'Nginx', 'bytes': '4758'}, {'name': 'Python', 'bytes': '37001'}, {'name': 'Shell', 'bytes': '2475'}]} |
package org.eclipse.lsp4j;
import java.util.List;
import org.eclipse.lsp4j.Position;
import org.eclipse.lsp4j.TextDocumentIdentifier;
import org.eclipse.lsp4j.WorkDoneProgressAndPartialResultParams;
import org.eclipse.lsp4j.jsonrpc.validation.NonNull;
import org.eclipse.lsp4j.util.Preconditions;
import org.eclipse.xtext.xbase.lib.Pure;
import org.eclipse.xtext.xbase.lib.util.ToStringBuilder;
/**
* A parameter literal used in selection range requests.
* <p>
* Since 3.15.0
*/
@SuppressWarnings("all")
public class SelectionRangeParams extends WorkDoneProgressAndPartialResultParams {
/**
* The text document.
*/
@NonNull
private TextDocumentIdentifier textDocument;
/**
* The positions inside the text document.
*/
@NonNull
private List<Position> positions;
public SelectionRangeParams() {
}
public SelectionRangeParams(@NonNull final TextDocumentIdentifier textDocument, @NonNull final List<Position> positions) {
this.textDocument = Preconditions.<TextDocumentIdentifier>checkNotNull(textDocument, "textDocument");
this.positions = Preconditions.<List<Position>>checkNotNull(positions, "positions");
}
/**
* The text document.
*/
@Pure
@NonNull
public TextDocumentIdentifier getTextDocument() {
return this.textDocument;
}
/**
* The text document.
*/
public void setTextDocument(@NonNull final TextDocumentIdentifier textDocument) {
this.textDocument = Preconditions.checkNotNull(textDocument, "textDocument");
}
/**
* The positions inside the text document.
*/
@Pure
@NonNull
public List<Position> getPositions() {
return this.positions;
}
/**
* The positions inside the text document.
*/
public void setPositions(@NonNull final List<Position> positions) {
this.positions = Preconditions.checkNotNull(positions, "positions");
}
@Override
@Pure
public String toString() {
ToStringBuilder b = new ToStringBuilder(this);
b.add("textDocument", this.textDocument);
b.add("positions", this.positions);
b.add("workDoneToken", getWorkDoneToken());
b.add("partialResultToken", getPartialResultToken());
return b.toString();
}
@Override
@Pure
public boolean equals(final Object obj) {
if (this == obj)
return true;
if (obj == null)
return false;
if (getClass() != obj.getClass())
return false;
if (!super.equals(obj))
return false;
SelectionRangeParams other = (SelectionRangeParams) obj;
if (this.textDocument == null) {
if (other.textDocument != null)
return false;
} else if (!this.textDocument.equals(other.textDocument))
return false;
if (this.positions == null) {
if (other.positions != null)
return false;
} else if (!this.positions.equals(other.positions))
return false;
return true;
}
@Override
@Pure
public int hashCode() {
final int prime = 31;
int result = super.hashCode();
result = prime * result + ((this.textDocument== null) ? 0 : this.textDocument.hashCode());
return prime * result + ((this.positions== null) ? 0 : this.positions.hashCode());
}
}
| {'content_hash': '1fc19c21c3959ccaf37336d3bc383346', 'timestamp': '', 'source': 'github', 'line_count': 116, 'max_line_length': 124, 'avg_line_length': 27.396551724137932, 'alnum_prop': 0.6913152926368785, 'repo_name': 'smarr/SOMns-vscode', 'id': 'ca95621514251184457f1372dec09436068539dd', 'size': '3598', 'binary': False, 'copies': '1', 'ref': 'refs/heads/master', 'path': 'server/org.eclipse.lsp4j-gen/org/eclipse/lsp4j/SelectionRangeParams.java', 'mode': '33188', 'license': 'mit', 'language': [{'name': 'ANTLR', 'bytes': '12820'}, {'name': 'Java', 'bytes': '1782848'}, {'name': 'Shell', 'bytes': '182'}, {'name': 'Slash', 'bytes': '241'}, {'name': 'TypeScript', 'bytes': '26804'}, {'name': 'Vim Script', 'bytes': '3730'}, {'name': 'Xtend', 'bytes': '197426'}]} |
package com.github.mortido.extra.behavioral.nullObject;
public class NullUser extends User {
@Override
public String getName() {
return "User doesn't exist";
}
@Override
public int getId() {
return -1;
}
}
| {'content_hash': '13680e8fb0ec1fd4f5088b9f8c0ac55a', 'timestamp': '', 'source': 'github', 'line_count': 13, 'max_line_length': 55, 'avg_line_length': 19.076923076923077, 'alnum_prop': 0.625, 'repo_name': 'mortido/DesignPatterns-Java', 'id': '56cf92ed5e528869f70fcc4d8bd985ba8f3b2836', 'size': '248', 'binary': False, 'copies': '1', 'ref': 'refs/heads/master', 'path': 'src/com/github/mortido/extra/behavioral/nullObject/NullUser.java', 'mode': '33188', 'license': 'mit', 'language': [{'name': 'Java', 'bytes': '72591'}]} |
import { Arr, Optional } from '@ephox/katamari';
import { SugarElement } from '@ephox/sugar';
import * as Structs from '../api/Structs';
import * as GridRow from '../model/GridRow';
import { CellElement, CompElm } from '../util/TableTypes';
type Subst = () => SugarElement<HTMLTableCellElement>;
// substitution: () -> item
const merge = (grid: Structs.RowCells[], bounds: Structs.Bounds, comparator: CompElm, substitution: Subst): Structs.RowCells[] => {
const rows = GridRow.extractGridDetails(grid).rows;
// Mutating. Do we care about the efficiency gain?
if (rows.length === 0) {
return grid;
}
for (let i = bounds.startRow; i <= bounds.finishRow; i++) {
for (let j = bounds.startCol; j <= bounds.finishCol; j++) {
// We can probably simplify this again now that we aren't reusing merge.
const row = rows[i];
const isLocked = GridRow.getCell(row, j).isLocked;
GridRow.mutateCell(row, j, Structs.elementnew(substitution(), false, isLocked));
}
}
return grid;
};
// substitution: () -> item
const unmerge = (grid: Structs.RowCells[], target: SugarElement<HTMLElement>, comparator: CompElm, substitution: Subst): Structs.RowCells[] => {
const rows = GridRow.extractGridDetails(grid).rows;
// Mutating. Do we care about the efficiency gain?
let first = true;
// tslint:disable-next-line:prefer-for-of
for (let i = 0; i < rows.length; i++) {
for (let j = 0; j < GridRow.cellLength(rows[0]); j++) {
const row = rows[i];
const currentCell = GridRow.getCell(row, j);
const currentCellElm = currentCell.element;
const isToReplace = comparator(currentCellElm, target);
if (isToReplace && !first) {
GridRow.mutateCell(row, j, Structs.elementnew(substitution(), true, currentCell.isLocked));
} else if (isToReplace) {
first = false;
}
}
}
return grid;
};
const uniqueCells = <T extends CellElement>(row: Structs.ElementNew<T>[], comparator: CompElm): Structs.ElementNew<T>[] => {
return Arr.foldl(row, (rest, cell) => {
return Arr.exists(rest, (currentCell) => {
return comparator(currentCell.element, cell.element);
}) ? rest : rest.concat([ cell ]);
}, [] as Structs.ElementNew<T>[]);
};
const splitCols = (grid: Structs.RowCells[], index: number, comparator: CompElm, substitution: Subst): Structs.RowCells[] => {
// We don't need to split rows if we're inserting at the first or last row of the old table
if (index > 0 && index < grid[0].cells.length) {
Arr.each(grid, (row) => {
const prevCell = row.cells[index - 1];
let offset = 0;
const substitute = substitution();
while (row.cells.length > index + offset && comparator(prevCell.element, row.cells[index + offset].element)) {
GridRow.mutateCell(row, index + offset, Structs.elementnew(substitute, true, row.cells[index + offset].isLocked));
offset++;
}
});
}
return grid;
};
const splitRows = (grid: Structs.RowCells[], index: number, comparator: CompElm, substitution: Subst): Structs.RowCells[] => {
// We don't need to split rows if we're inserting at the first or last row of the old table
const rows = GridRow.extractGridDetails(grid).rows;
if (index > 0 && index < rows.length) {
const rowPrevCells = rows[index - 1].cells;
const cells = uniqueCells(rowPrevCells, comparator);
Arr.each(cells, (cell) => {
// only make a sub when we have to
let replacement = Optional.none<SugarElement<HTMLTableCellElement>>();
for (let i = index; i < rows.length; i++) {
for (let j = 0; j < GridRow.cellLength(rows[0]); j++) {
const row = rows[i];
const current = GridRow.getCell(row, j);
const isToReplace = comparator(current.element, cell.element);
if (isToReplace) {
if (replacement.isNone()) {
replacement = Optional.some(substitution());
}
replacement.each((sub) => {
GridRow.mutateCell(row, j, Structs.elementnew(sub, true, current.isLocked));
});
}
}
}
});
}
return grid;
};
export {
merge,
unmerge,
splitCols,
splitRows
};
| {'content_hash': 'ca65adc511ae0aedbdd6e75bf700d63b', 'timestamp': '', 'source': 'github', 'line_count': 113, 'max_line_length': 144, 'avg_line_length': 37.13274336283186, 'alnum_prop': 0.6348903717826502, 'repo_name': 'tinymce/tinymce', 'id': '98e0abc2909ea0a3267c1a8d7d87f92f13e3584d', 'size': '4196', 'binary': False, 'copies': '1', 'ref': 'refs/heads/develop', 'path': 'modules/snooker/src/main/ts/ephox/snooker/operate/MergingOperations.ts', 'mode': '33188', 'license': 'mit', 'language': [{'name': 'CSS', 'bytes': '9733'}, {'name': 'HTML', 'bytes': '183264'}, {'name': 'JavaScript', 'bytes': '117530'}, {'name': 'Less', 'bytes': '182379'}, {'name': 'TypeScript', 'bytes': '11764279'}]} |
<?xml version="1.0" encoding="utf-8"?>
<config version="1" xmlns="http://skynav.com/ns/ttv"/>
| {'content_hash': '6b3dadea3ba647025bc678e04d6487e0', 'timestamp': '', 'source': 'github', 'line_count': 2, 'max_line_length': 54, 'avg_line_length': 47.0, 'alnum_prop': 0.648936170212766, 'repo_name': 'RBMHTechnology/ttt', 'id': 'af62bb6ae91ead9584202716b1b01ca7703b5c03', 'size': '94', 'binary': False, 'copies': '4', 'ref': 'refs/heads/master', 'path': 'ttt-ttv/src/main/resources/com/skynav/ttv/app/config.xml', 'mode': '33188', 'license': 'bsd-2-clause', 'language': [{'name': 'CSS', 'bytes': '22996'}, {'name': 'HTML', 'bytes': '2348'}, {'name': 'Java', 'bytes': '2833329'}, {'name': 'Shell', 'bytes': '2808'}, {'name': 'XSLT', 'bytes': '5232'}]} |
from __future__ import print_function
from __future__ import unicode_literals
from __future__ import division
import json
from django.conf import settings
from django.contrib.gis.geos import Polygon
from django.core.urlresolvers import reverse
from django.db import transaction
from django.db.models import Q
from django.http import HttpResponseRedirect, HttpResponseForbidden, Http404
from django.shortcuts import get_object_or_404
from django.utils.timezone import now
from libs.data import merge
from libs.formatters import humanize_bytes
from libs.pdf_maps import create_event_map_pdf
from libs.sql import get_group_tree_count
from apps.core.helpers import (user_is_group_admin,
user_is_eligible_to_become_trusted_mapper)
from apps.core.decorators import group_request
from apps.core.models import Group
from apps.mail.views import notify_group_mapping_approved
from apps.users.models import Follow, TrustedMapper
from apps.users.forms import GroupSettingsForm
from apps.survey.models import Territory, Survey, Blockface
from apps.survey.layer_context import (get_context_for_territory_layer,
get_context_for_territory_admin_layer)
from apps.event.models import Event, EventRegistration
from apps.event.event_list import EventList
GROUP_EVENTS_ID = 'group-events'
GROUP_EDIT_EVENTS_TAB_ID = 'events'
def group_list_page(request):
# TODO: pagination
groups = Group.objects.filter(is_active=True).order_by('name')
group_ids = Follow.objects.filter(user_id=request.user.id) \
.values_list('group_id', flat=True)
user_is_following = [group.id in group_ids for group in groups]
group_infos = zip(groups, user_is_following)
return {
'groups': group_infos,
'groups_count': len(group_infos),
}
@group_request
def _group_events(request):
qs = Event.objects.filter(group=request.group, is_private=False)
user_can_edit_group = user_is_group_admin(request.user,
request.group)
extra_context = {'user_can_edit_group': user_can_edit_group,
'group_slug': request.group.slug}
return qs, extra_context
group_detail_events = EventList(
_group_events,
name="group_detail_events",
template_path='groups/partials/detail_event_list.html')
group_edit_events = EventList(
_group_events,
name="group_edit_events",
template_path='groups/partials/edit_event_list.html')
def group_detail(request):
user = request.user
group = request.group
if not user_is_group_admin(user, group) and not request.group.is_active:
raise Http404('Must be a group admin to view an inactive group')
event_list = (group_detail_events
.configure(chunk_size=2,
active_filter=EventList.Filters.CURRENT,
filterset_name=EventList.chronoFilters)
.as_context(request, group_slug=group.slug))
user_is_following = Follow.objects.filter(user_id=request.user.id,
group=group).exists()
show_mapper_request = user_is_eligible_to_become_trusted_mapper(user,
group)
follow_count = Follow.objects.filter(group=group).count()
tree_count = get_group_tree_count(group)
group_blocks = Territory.objects \
.filter(group=group) \
.values_list('blockface_id', flat=True)
group_blocks_count = group_blocks.count()
if group_blocks_count > 0:
completed_blocks = Survey.objects \
.filter(blockface_id__in=group_blocks) \
.distinct('blockface')
block_percent = "{:.1%}".format(
float(completed_blocks.count()) / float(group_blocks.count()))
else:
block_percent = "0.0%"
events_held = Event.objects.filter(group=group, ends_at__lt=now())
num_events_held = events_held.count()
num_event_attendees = EventRegistration.objects \
.filter(event__in=events_held) \
.filter(did_attend=True) \
.count()
return {
'group': group,
'event_list': event_list,
'user_is_following': user_is_following,
'edit_url': reverse('group_edit', kwargs={'group_slug': group.slug}),
'show_mapper_request': show_mapper_request,
'counts': {
'tree': tree_count,
'block': block_percent,
'event': num_events_held,
'attendees': num_event_attendees,
'follows': follow_count
},
'group_events_id': GROUP_EVENTS_ID,
'layer': get_context_for_territory_layer(request, request.group.id),
'territory_bounds': _group_territory_bounds(request.group),
'render_follow_button_without_count': request.POST.get(
'render_follow_button_without_count', False)
}
def redirect_to_group_detail(request):
return HttpResponseRedirect(
reverse('group_detail', kwargs={
'group_slug': request.group.slug
}))
def _group_territory_bounds(group):
blockfaces = Blockface.objects \
.filter(territory__group=group) \
.collect()
if blockfaces:
return list(blockfaces.extent)
else:
return None
def edit_group(request, form=None):
group = request.group
if not form:
form = GroupSettingsForm(instance=request.group, label_suffix='')
event_list = (group_edit_events
.configure(chunk_size=2,
active_filter=EventList.Filters.CURRENT,
filterset_name=EventList.chronoFilters)
.as_context(request, group_slug=group.slug))
pending_mappers = TrustedMapper.objects.filter(group=request.group,
is_approved__isnull=True)
all_mappers = TrustedMapper.objects.filter(group=request.group,
is_approved__isnull=False)
return {
'group': group,
'event_list': event_list,
'form': form,
'group_slug': group.slug,
'max_image_size': humanize_bytes(
settings.MAX_GROUP_IMAGE_SIZE_IN_BYTES, 0),
'pending_mappers': pending_mappers,
'all_mappers': all_mappers,
'group_edit_events_tab_id': GROUP_EDIT_EVENTS_TAB_ID,
}
def update_group_settings(request):
form = GroupSettingsForm(request.POST, request.FILES,
instance=request.group)
if form.is_valid():
form.save()
return HttpResponseRedirect(request.group.get_absolute_url())
else:
return edit_group(request, form=form)
def follow_group(request):
Follow.objects.get_or_create(user_id=request.user.id, group=request.group)
return group_detail(request)
def unfollow_group(request):
Follow.objects.filter(user_id=request.user.id, group=request.group) \
.delete()
return group_detail(request)
def start_group_map_print_job(request):
# TODO: implement
pass
def give_user_mapping_priveleges(request, username):
mapper_context = _grant_mapping_access(request.group, username,
is_approved=True)
mail_context = notify_group_mapping_approved(request, request.group,
username)
return merge(mapper_context, mail_context)
def remove_user_mapping_priveleges(request, username):
return _grant_mapping_access(request.group, username, is_approved=False)
def _grant_mapping_access(group, username, is_approved):
mapper, created = TrustedMapper.objects.update_or_create(
group=group,
user__username=username,
defaults={'is_approved': is_approved})
return {
'mapper': mapper
}
def request_mapper_status(request):
user, group = request.user, request.group
if not user_is_eligible_to_become_trusted_mapper(user, group):
return HttpResponseForbidden()
mapper, created = TrustedMapper.objects.update_or_create(
group=group, user=user)
return {
'success': True
}
def group_unmapped_territory_geojson(request, group_id):
# Get unmapped blockfaces
blockfaces = Blockface.objects.filter(is_available=True)
my_territory_q = Q(territory__group_id=group_id)
if request.body:
# Get potentially selectable blockfaces in polygon
# (those in my territory or unclaimed)
point_list = json.loads(request.body)
point_list.append(point_list[0]) # Close the polygon
polygon = Polygon((point_list))
no_reservations_q = \
Q(blockfacereservation__isnull=True) \
| Q(blockfacereservation__canceled_at__isnull=False) \
| Q(blockfacereservation__expires_at__lt=now())
nobodys_territory_q = Q(territory__group_id=None)
unclaimed_q = no_reservations_q & nobodys_territory_q
blockfaces = blockfaces \
.filter(geom__within=polygon) \
.filter(my_territory_q | unclaimed_q) \
.distinct()
# Return just blockface data
# (skipping expensive queries to make tiler URLs)
return _make_blockface_data_result(blockfaces)
else:
# Get all blockfaces in group's territory
blockfaces = blockfaces.filter(my_territory_q)
return _make_blockface_and_tiler_urls_result(
request, blockfaces, group_id)
def group_update_territory(request, group_id):
group = get_object_or_404(Group, id=group_id)
_update_territory(group, request)
# Recreate PDF maps to show updated group territory
_update_event_maps(request, group)
result_blockfaces = Blockface.objects.filter(territory__group=group)
return _make_blockface_and_tiler_urls_result(
request, result_blockfaces, group_id)
@transaction.atomic
def _update_territory(group, request):
new_block_ids = set([int(id) for id in json.loads(request.body)])
old_block_ids = set(Territory.objects
.filter(group=group)
.values_list('blockface_id', flat=True))
ids_to_add = new_block_ids - old_block_ids
ids_to_kill = old_block_ids - new_block_ids
# Make sure no unavailable or already-assigned blocks slipped in
filtered_ids_to_add = Blockface.objects \
.filter(id__in=ids_to_add) \
.filter(is_available=True) \
.filter(territory=None) \
.values_list('id', flat=True)
new_territory = [Territory(group=group, blockface_id=id)
for id in filtered_ids_to_add]
Territory.objects.bulk_create(new_territory)
Territory.objects \
.filter(blockface_id__in=ids_to_kill) \
.delete()
def _update_event_maps(request, group):
events = Event.objects \
.filter(group_id=group.id, begins_at__gt=now()) \
.select_related('group')
for event in events:
create_event_map_pdf(request, event)
def _make_blockface_and_tiler_urls_result(request, blockfaces, group_id):
result = {
'blockDataList': _make_blockface_data_result(blockfaces),
'tilerUrls': get_context_for_territory_admin_layer(request, group_id)
}
return result
def _make_blockface_data_result(blockfaces):
block_data_list = [{'id': bf.id, 'geojson': bf.geom.json}
for bf in blockfaces]
return block_data_list
| {'content_hash': '245a3f944cd4eac948a49263f01aee37', 'timestamp': '', 'source': 'github', 'line_count': 336, 'max_line_length': 78, 'avg_line_length': 34.25595238095238, 'alnum_prop': 0.635881841876629, 'repo_name': 'RickMohr/nyc-trees', 'id': '0430d00d3c50a470409f54b8f021ae97848c2ee7', 'size': '11534', 'binary': False, 'copies': '1', 'ref': 'refs/heads/develop', 'path': 'src/nyc_trees/apps/users/views/group.py', 'mode': '33188', 'license': 'apache-2.0', 'language': [{'name': 'CSS', 'bytes': '171372'}, {'name': 'CartoCSS', 'bytes': '878'}, {'name': 'HTML', 'bytes': '157969'}, {'name': 'JavaScript', 'bytes': '286316'}, {'name': 'Makefile', 'bytes': '1524'}, {'name': 'PLpgSQL', 'bytes': '3210'}, {'name': 'Python', 'bytes': '404021'}, {'name': 'Shell', 'bytes': '23399'}]} |
function configure() {
# List n-application using most space
# @param $1|size number of biggest application to list
# @return void
function du-app() {
size="${1:-10}"
dpkg-query --show --showformat="\${Package;-50}\t\${Installed-Size}\n" \
| sort -k 2 -n \
| grep -v deinstall \
| awk '{printf "%.1f MB \t %s\n", $2/(1024), $1}' \
| tail -n "$size"
}
# human-readable sizes
function df() {
command df \
--human-readable \
--print-type \
--exclude-type squashfs \
--exclude-type tmpfs \
--exclude-type devtmpfs \
"$@"
}
# show sizes in MB
function free() { command free -m; }
}
configure
| {'content_hash': '73da57189a7a28882b91e1fe9a32a92a', 'timestamp': '', 'source': 'github', 'line_count': 28, 'max_line_length': 80, 'avg_line_length': 27.357142857142858, 'alnum_prop': 0.49216710182767626, 'repo_name': 'edouard-lopez/dotfiles', 'id': '4d9fd2c0bf074292bae2b10a9a53a4d841befd56', 'size': '787', 'binary': False, 'copies': '1', 'ref': 'refs/heads/master', 'path': 'includes/posix/monitoring.bash', 'mode': '33188', 'license': 'mit', 'language': [{'name': 'Python', 'bytes': '63'}, {'name': 'Shell', 'bytes': '38660'}, {'name': 'Vim Script', 'bytes': '5525'}]} |
package org.ops4j.pax.exam.sample2.model;
import javax.persistence.Entity;
import javax.persistence.GeneratedValue;
import javax.persistence.GenerationType;
import javax.persistence.Id;
import javax.persistence.Lob;
import javax.persistence.ManyToOne;
import javax.persistence.Table;
@Entity
@Table(name = "rating")
public class Rating {
@Id
@GeneratedValue(strategy = GenerationType.AUTO)
private int id;
private int stars;
@Lob
private String comment;
@ManyToOne
private User user;
@ManyToOne
private Movie movie;
/**
* @return the id
*/
public int getId() {
return id;
}
/**
* @param id
* the id to set
*/
public void setId(int id) {
this.id = id;
}
/**
* @return the stars
*/
public int getStars() {
return stars;
}
/**
* @param stars
* the stars to set
*/
public void setStars(int stars) {
this.stars = stars;
}
/**
* @return the comment
*/
public String getComment() {
return comment;
}
/**
* @param comment
* the comment to set
*/
public void setComment(String comment) {
this.comment = comment;
}
/**
* @return the user
*/
public User getUser() {
return user;
}
/**
* @param user
* the user to set
*/
public void setUser(User user) {
this.user = user;
}
/**
* @return the movie
*/
public Movie getMovie() {
return movie;
}
/**
* @param movie
* the movie to set
*/
public void setMovie(Movie movie) {
this.movie = movie;
}
}
| {'content_hash': '4901789fd2534feffdc9e9d6efb0ceb9', 'timestamp': '', 'source': 'github', 'line_count': 104, 'max_line_length': 51, 'avg_line_length': 17.009615384615383, 'alnum_prop': 0.5313736574335783, 'repo_name': 'bimargulies/org.ops4j.pax.exam2', 'id': '0188ac1c47c0896fbf7d103e1a14246e8d489d25', 'size': '2379', 'binary': False, 'copies': '4', 'ref': 'refs/heads/master', 'path': 'samples/pax-exam-sample2-model/src/main/java/org/ops4j/pax/exam/sample2/model/Rating.java', 'mode': '33188', 'license': 'apache-2.0', 'language': [{'name': 'Java', 'bytes': '1271799'}, {'name': 'Shell', 'bytes': '198'}]} |
//
// MODULE: JdbcDebug.cpp
//
#include "org_apache_trafodion_jdbc_t2_JdbcDebug.h"
#include "Debug.h"
/*
* Class: org_apache_trafodion_jdbc_t2_JdbcDebug
* Method: getDebugHandle
* Signature: (I)I
*/
JNIEXPORT jlong JNICALL Java_org_apache_trafodion_jdbc_t2_JdbcDebug_getDebugHandle(JNIEnv *jenv, jclass jcls,
jlong method_name_handle)
{
jlong handle = 0;
#if defined(_BENCHMARK)
handle = (jlong) new Benchmark((const char *) method_name_handle);
#endif /* _BENCHMARK */
return(handle);
}
/*
* Class: org_apache_trafodion_jdbc_t2_JdbcDebug
* Method: getMethodNameHandle
* Signature: (Ljava/lang/String;)I
*/
JNIEXPORT jlong JNICALL Java_org_apache_trafodion_jdbc_t2_JdbcDebug_getMethodNameHandle(JNIEnv *jenv, jclass jcls,
jstring method_name)
{
jlong rc = 0;
#if defined(_DEBUG) || defined(_BENCHMARK)
if (method_name) rc = (jlong) jenv->GetStringUTFChars(method_name,NULL);
if (rc==0) rc = (jlong) "Unknown";
#endif /* _DEBUG || _BENCHMARK */
return(rc);
}
/*
* Class: org_apache_trafodion_jdbc_t2_JdbcDebug
* Method: methodEntry
* Signature: (III)V
*/
JNIEXPORT void JNICALL Java_org_apache_trafodion_jdbc_t2_JdbcDebug_methodEntry(JNIEnv *jenv, jclass jcls,
jlong debug_handle,
jint debug_level,
jlong method_name_handle)
{
#if defined(_DEBUG)
DebugFunctionEntry((const char *) method_name_handle, debug_level, NULL , NULL, 0);
#endif /* _DEBUG */
#if defined(_BENCHMARK)
((Benchmark *) debug_handle)->Entry();
#endif /* _BENCHMARK */
}
/*
* Class: org_apache_trafodion_jdbc_t2_JdbcDebug
* Method: methodReturn
* Signature: (ILjava/lang/String;)V
*/
JNIEXPORT void JNICALL Java_org_apache_trafodion_jdbc_t2_JdbcDebug_methodReturn(JNIEnv *jenv, jclass jcls,
jlong debug_handle,
jstring comment)
{
#if defined(_DEBUG)
const char *commentStr;
if (comment) commentStr = jenv->GetStringUTFChars(comment,NULL);
else commentStr = NULL;
DebugFunctionReturn("JAVA", commentStr, false, "RETURNING", NULL, 0);
if (commentStr) jenv->ReleaseStringUTFChars(comment,commentStr);
#endif /* _DEBUG */
}
/*
* Class: org_apache_trafodion_jdbc_t2_JdbcDebug
* Method: methodExit
* Signature: (I)V
*/
JNIEXPORT void JNICALL Java_org_apache_trafodion_jdbc_t2_JdbcDebug_methodExit(JNIEnv *jenv, jclass jcls,
jlong debug_handle)
{
#if defined(_DEBUG)
DebugFunctionReturn("JAVA", NULL, true, "EXITING", NULL, 0);
#endif /* _DEBUG */
#if defined(_BENCHMARK)
((Benchmark *) debug_handle)->Exit();
#endif /* _BENCHMARK */
}
/*
* Class: org_apache_trafodion_jdbc_t2_JdbcDebug
* Method: traceOut
* Signature: (IILjava/lang/String;)V
*/
JNIEXPORT void JNICALL Java_org_apache_trafodion_jdbc_t2_JdbcDebug_traceOut(JNIEnv *jenv, jclass jcls,
jlong debug_handle,
jint debug_level,
jstring comment)
{
#if defined(_DEBUG)
const char *commentStr;
if (comment) commentStr = jenv->GetStringUTFChars(comment,NULL);
else commentStr = NULL;
if (DebugActive(debug_level,NULL,0)) DebugOutput(commentStr , NULL, 0);
if (commentStr) jenv->ReleaseStringUTFChars(comment,commentStr);
#endif /* _DEBUG */
}
| {'content_hash': '1abd718dce3bc752ab0955f9348f9b61', 'timestamp': '', 'source': 'github', 'line_count': 109, 'max_line_length': 114, 'avg_line_length': 29.853211009174313, 'alnum_prop': 0.6717885679164106, 'repo_name': 'mashengchen/incubator-trafodion', 'id': '25ae2a001185445481545ef9e80b702621cbfedb', 'size': '4264', 'binary': False, 'copies': '3', 'ref': 'refs/heads/master', 'path': 'core/conn/jdbc_type2/native/JdbcDebug.cpp', 'mode': '33188', 'license': 'apache-2.0', 'language': [{'name': '1C Enterprise', 'bytes': '27762'}, {'name': 'Awk', 'bytes': '20971'}, {'name': 'Batchfile', 'bytes': '27013'}, {'name': 'C', 'bytes': '18877152'}, {'name': 'C++', 'bytes': '68786466'}, {'name': 'CSS', 'bytes': '99092'}, {'name': 'GDB', 'bytes': '62692'}, {'name': 'Groff', 'bytes': '46673'}, {'name': 'HTML', 'bytes': '4618'}, {'name': 'Inno Setup', 'bytes': '14579'}, {'name': 'Java', 'bytes': '12232679'}, {'name': 'JavaScript', 'bytes': '883279'}, {'name': 'LLVM', 'bytes': '42952'}, {'name': 'Makefile', 'bytes': '321639'}, {'name': 'Objective-C', 'bytes': '637659'}, {'name': 'PHP', 'bytes': '8438'}, {'name': 'PLpgSQL', 'bytes': '197622'}, {'name': 'Perl', 'bytes': '549860'}, {'name': 'Protocol Buffer', 'bytes': '121282'}, {'name': 'Python', 'bytes': '330201'}, {'name': 'QMake', 'bytes': '3622'}, {'name': 'Ruby', 'bytes': '8053'}, {'name': 'SQLPL', 'bytes': '60330'}, {'name': 'Shell', 'bytes': '1999068'}, {'name': 'Tcl', 'bytes': '2763'}, {'name': 'XSLT', 'bytes': '6100'}, {'name': 'Yacc', 'bytes': '1368077'}]} |
package com.alibaba.dubbo.common.serialize.support.java;
import java.io.IOException;
import java.io.InputStream;
import java.io.OutputStream;
import com.alibaba.dubbo.common.URL;
import com.alibaba.dubbo.common.serialize.ObjectInput;
import com.alibaba.dubbo.common.serialize.ObjectOutput;
import com.alibaba.dubbo.common.serialize.Serialization;
/**
* @author ding.lid
*/
public class CompactedJavaSerialization implements Serialization {
public byte getContentTypeId() {
return 4;
}
public String getContentType() {
return "x-application/compactedjava";
}
public ObjectOutput serialize(URL url, OutputStream out) throws IOException {
return new JavaObjectOutput(out, true);
}
public ObjectInput deserialize(URL url, InputStream is) throws IOException {
return new JavaObjectInput(is, true);
}
} | {'content_hash': '51165a6abb524dd739da671e283beb68', 'timestamp': '', 'source': 'github', 'line_count': 34, 'max_line_length': 81, 'avg_line_length': 25.61764705882353, 'alnum_prop': 0.7416762342135477, 'repo_name': 'kaven12/dubboo', 'id': 'f0a0f0a249f804c6984b2925e343fb0702f0600c', 'size': '1480', 'binary': False, 'copies': '20', 'ref': 'refs/heads/master', 'path': 'dubbo-common/src/main/java/com/alibaba/dubbo/common/serialize/support/java/CompactedJavaSerialization.java', 'mode': '33188', 'license': 'apache-2.0', 'language': [{'name': 'Batchfile', 'bytes': '3343'}, {'name': 'CSS', 'bytes': '18582'}, {'name': 'Java', 'bytes': '5237817'}, {'name': 'JavaScript', 'bytes': '63151'}, {'name': 'Lex', 'bytes': '2077'}, {'name': 'Shell', 'bytes': '7011'}, {'name': 'Thrift', 'bytes': '668'}]} |
package com.jxd.android.bookinventtory.bean;
import io.realm.RealmModel;
import io.realm.RealmObject;
import io.realm.annotations.RealmClass;
/**
* 图书盘点
* Created by Administrator on 2017/10/17.
*/
@RealmClass
public class ShelfBookScanBean implements RealmModel {
private String title;
private String barcode;
private String shelfno;
private String updatetime;
private String uid;
private String callno;
private int inshelf;
private String status;
private String machine_mac;
/**
* 盘点状态
*/
private String scanStatus;
public String getTitle() {
return title;
}
public void setTitle(String title) {
this.title = title;
}
public String getBarcode() {
return barcode;
}
public void setBarcode(String barcode) {
this.barcode = barcode;
}
public String getShelfno() {
return shelfno;
}
public void setShelfno(String shelfno) {
this.shelfno = shelfno;
}
public String getUpdatetime() {
return updatetime;
}
public void setUpdatetime(String updatetime) {
this.updatetime = updatetime;
}
public String getUid() {
return uid;
}
public void setUid(String uid) {
this.uid = uid;
}
public String getCallno() {
return callno;
}
public void setCallno(String callno) {
this.callno = callno;
}
public int getInshelf() {
return inshelf;
}
public void setInshelf(int inshelf) {
this.inshelf = inshelf;
}
public String getMachine_mac() {
return machine_mac;
}
public void setMachine_mac(String machine_mac) {
this.machine_mac = machine_mac;
}
public String getStatus() {
return status;
}
public void setStatus(String status) {
this.status = status;
}
public String getScanStatus() {
return scanStatus;
}
public void setScanStatus(String scanStatus) {
this.scanStatus = scanStatus;
}
public void transfor(BookBean bookBean){
this.setBarcode( bookBean.getBarcode() );
this.setCallno(bookBean.getCallno());
this.setInshelf(bookBean.getInshelf());
this.setMachine_mac(bookBean.getMachine_mac());
this.setTitle(bookBean.getTitle());
this.setUid(bookBean.getUid());
this.setShelfno(bookBean.getShelfno());
this.setStatus( bookBean.getStatus() );
this.setUpdatetime(bookBean.getUpdatetime());
}
@Override
public int hashCode() {
return super.hashCode();
}
@Override
public boolean equals(Object obj) {
return super.equals(obj);
}
}
| {'content_hash': '1cc8e2853ac762829180de45eeec8132', 'timestamp': '', 'source': 'github', 'line_count': 130, 'max_line_length': 55, 'avg_line_length': 21.0, 'alnum_prop': 0.6201465201465202, 'repo_name': 'jxdong1013/bookinventory', 'id': '577e0a27b8901851282783433ef072283019b34b', 'size': '2746', 'binary': False, 'copies': '1', 'ref': 'refs/heads/master', 'path': 'src/android/bookinventory/app/src/main/java/com/jxd/android/bookinventtory/bean/ShelfBookScanBean.java', 'mode': '33188', 'license': 'apache-2.0', 'language': [{'name': 'ASP', 'bytes': '98'}, {'name': 'C#', 'bytes': '199875'}, {'name': 'CSS', 'bytes': '21629'}, {'name': 'HTML', 'bytes': '6682'}, {'name': 'Java', 'bytes': '261073'}, {'name': 'JavaScript', 'bytes': '438316'}, {'name': 'PowerShell', 'bytes': '112665'}]} |
#include "../../inc/MarlinConfig.h"
#if HAS_M206_COMMAND
#include "../gcode.h"
#include "../../module/motion.h"
#include "../../lcd/marlinui.h"
#include "../../libs/buzzer.h"
#include "../../MarlinCore.h"
void M206_report() {
SERIAL_ECHOLNPAIR_P(
LIST_N(DOUBLE(LINEAR_AXES),
PSTR("M206 X"), home_offset.x,
SP_Y_STR, home_offset.y,
SP_Z_STR, home_offset.z,
SP_I_STR, home_offset.i,
SP_J_STR, home_offset.j,
SP_K_STR, home_offset.k,
)
);
}
/**
* M206: Set Additional Homing Offset (X Y Z). SCARA aliases T=X, P=Y
*
* *** @thinkyhead: I recommend deprecating M206 for SCARA in favor of M665.
* *** M206 for SCARA will remain enabled in 1.1.x for compatibility.
* *** In the 2.0 release, it will simply be disabled by default.
*/
void GcodeSuite::M206() {
LOOP_LINEAR_AXES(i)
if (parser.seen(AXIS_CHAR(i)))
set_home_offset((AxisEnum)i, parser.value_linear_units());
#if ENABLED(MORGAN_SCARA)
if (parser.seen('T')) set_home_offset(A_AXIS, parser.value_float()); // Theta
if (parser.seen('P')) set_home_offset(B_AXIS, parser.value_float()); // Psi
#endif
if (!parser.seen(LINEAR_AXIS_GANG("X", "Y", "Z", "I", "J", "K")))
M206_report();
else
report_current_position();
}
/**
* M428: Set home_offset based on the distance between the
* current_position and the nearest "reference point."
* If an axis is past center its endstop position
* is the reference-point. Otherwise it uses 0. This allows
* the Z offset to be set near the bed when using a max endstop.
*
* M428 can't be used more than 2cm away from 0 or an endstop.
*
* Use M206 to set these values directly.
*/
void GcodeSuite::M428() {
if (homing_needed_error()) return;
xyz_float_t diff;
LOOP_LINEAR_AXES(i) {
diff[i] = base_home_pos((AxisEnum)i) - current_position[i];
if (!WITHIN(diff[i], -20, 20) && home_dir((AxisEnum)i) > 0)
diff[i] = -current_position[i];
if (!WITHIN(diff[i], -20, 20)) {
SERIAL_ERROR_MSG(STR_ERR_M428_TOO_FAR);
LCD_ALERTMESSAGEPGM_P(PSTR("Err: Too far!"));
BUZZ(200, 40);
return;
}
}
LOOP_LINEAR_AXES(i) set_home_offset((AxisEnum)i, diff[i]);
report_current_position();
LCD_MESSAGEPGM(MSG_HOME_OFFSETS_APPLIED);
BUZZ(100, 659);
BUZZ(100, 698);
}
#endif // HAS_M206_COMMAND
| {'content_hash': 'd5f7b1a89aaf43eebda85cc3e0a7bc6e', 'timestamp': '', 'source': 'github', 'line_count': 83, 'max_line_length': 82, 'avg_line_length': 28.771084337349397, 'alnum_prop': 0.6134840871021775, 'repo_name': 'limtbk/3dprinting', 'id': '51f3e7c14c049e582236c468f1a1c40acf5e4c5a', 'size': '3249', 'binary': False, 'copies': '2', 'ref': 'refs/heads/master', 'path': 'Firmware/src/Marlin/src/gcode/geometry/M206_M428.cpp', 'mode': '33188', 'license': 'apache-2.0', 'language': [{'name': 'C', 'bytes': '16427042'}, {'name': 'C++', 'bytes': '1508812'}, {'name': 'Makefile', 'bytes': '58317'}, {'name': 'Objective-C', 'bytes': '195319'}, {'name': 'Processing', 'bytes': '407203'}, {'name': 'Python', 'bytes': '11892'}, {'name': 'Scilab', 'bytes': '10211'}]} |
/*
A helper function to diagram all routes in a `fluid.express` instance.
*/
"use strict";
var fluid = fluid || require("infusion");
fluid.registerNamespace("fluid.test.express");
/**
*
* Diagram all routes within an express instance.
*
* @param {Object} expressComponent - A `fluid.express` component.
* @return {Object} A JSON Object representing all routes within a `fluid.express` instance.
*
*/
fluid.test.express.diagramAllRoutes = function (expressComponent) {
return fluid.test.express.diagramOneLevel(expressComponent, expressComponent.router._router);
};
/**
*
* Diagram the routes for a single component. To preserve the routing order of the stack, each level's children
* are represented in a `children` Array.
*
* @param {Object} component - A `fluid.express.middleware` component.
* @param {Object} router - The router instance within the component (if there is one).
* @return {Object} A JSON Object representing the routes from this level down as well as the method and path for this level.
*/
fluid.test.express.diagramOneLevel = function (component, router) {
var thisLevel = fluid.filterKeys(component.options, ["method", "path"]);
thisLevel.typeName = component.typeName;
if (router) {
thisLevel.children = fluid.transform(router.stack, function (layer) {
// This is a `fluid.express.router` instance
if (layer.handle && layer.handle.that) {
return fluid.test.express.diagramOneLevel(layer.handle.that, layer.handle.that.router);
}
// This is a `fluid.express.middleware` instance
else if (layer.route) {
var wrapper = fluid.filterKeys(layer.route, ["path", "methods"]);
wrapper.children = fluid.transform(layer.route.stack, function (middlewareLayer) {
return fluid.test.express.diagramOneLevel(middlewareLayer.handle.that, middlewareLayer.handle.that.router);
});
return wrapper;
}
// This is something outside of our scope (i.e. native middleware).
else {
return "Native middleware '" + (layer.name || "unknown") + "'";
}
});
}
return thisLevel;
};
| {'content_hash': '1e7085b56a339027cd32730d523f680f', 'timestamp': '', 'source': 'github', 'line_count': 59, 'max_line_length': 127, 'avg_line_length': 38.389830508474574, 'alnum_prop': 0.6512141280353201, 'repo_name': 'GPII/gpii-express', 'id': '34a60008e12253be09206b56a5d1c3b76b4d7c29', 'size': '2265', 'binary': False, 'copies': '2', 'ref': 'refs/heads/main', 'path': 'tests/js/lib/diagramAllRoutes.js', 'mode': '33188', 'license': 'bsd-3-clause', 'language': [{'name': 'HTML', 'bytes': '214'}, {'name': 'JavaScript', 'bytes': '208501'}]} |
package com.lru.memory.disk.cache;
/**
*
* @author sathayeg
*/
public interface DirLocate {
public String getPathToFile(String key) throws Exception;
public boolean isDiskPersistent();
}
| {'content_hash': '3f8be3bb0d892f5fdc57eeeaa392bc41', 'timestamp': '', 'source': 'github', 'line_count': 10, 'max_line_length': 61, 'avg_line_length': 20.0, 'alnum_prop': 0.72, 'repo_name': 'gaurangsathaye/JavaSimpleCache', 'id': '00f1f658cb5c38b6e518eccef7f979c9316fdd38', 'size': '200', 'binary': False, 'copies': '2', 'ref': 'refs/heads/master', 'path': 'src/main/java/com/lru/memory/disk/cache/DirLocate.java', 'mode': '33188', 'license': 'apache-2.0', 'language': []} |