id
stringlengths
50
55
text
stringlengths
54
694k
global_05_local_4_shard_00000656_processed.jsonl/72297
Age: 58 Background: Angela B. Corey is an American attorney currently serving as the State Attorney in Florida's Fourth Judicial Circuit Court, which includes Duval, Nassau and Clay counties. She was elected in 2008. Involvement in case: Corey was appointed by Rick Scott as the new lead prosecutor in the investigation of the shooting death of Trayvon Martin. She replaced the Central Florida State Attorney who was handling the case, Norman Wolfinger.
global_05_local_4_shard_00000656_processed.jsonl/72300
Article Date: 3/1/2001 contact lens primer Tear Lens = Base Curve ­ Corneal Curve March 2001 The tear lens (TL) is an often ignored and under-appreciated component of rigid contact lens success. The tear lens is formed by the back surface, or base curve (BC), of the contact lens and the front surface of the cornea (K).  Since the cornea flattens in radius of curvature from its apex towards the limbus, you generally need to prescribe a base curve flatter than the average measured central keratometry readings in order to obtain an alignment fitting relationship. This will create a minus tear lens. If the average keratometry reading is 43.00 diopters, a reasonable base curve to achieve an alignment fit is approximately 42.50 diopters. The tear lens in this case is ­0.50D. Factor the Tear Lens into the Prescription The tear lens contributes power to the optical correction afforded by the rigid contact lens. A minus tear lens (base curve flatter than corneal curve) contributes minus power. You must therefore offset this effect by adding the same amount of plus power to the rigid contact lens prescription. In the above example, a ­0.50D tear lens would dictate that you order the contact lens power with +0.50D more than the vertexed equivalent sphere of the manifest refraction. You can verify this relationship by over-refracting with a trial rigid lens. Tear Lens Figure 1. The tear lens affects the power in RGP fitting. Conversely, if you prescribe a plus tear lens (steep fitting relationship), plus power is contributed to the optical system. There-fore, additional minus power is indicated for the lens power. Many of us memorized the abbreviations SAM (steep add minus) and FAP (flat add plus) (Table 1). "Dye"ing to See the Tear Lens We observe the tear lens when we evaluate fluorescein patterns. If we prescribe a spherical base curve, the toricity we see in the fluorescein pattern is the same amount and orientation as the patient's corneal toricity. If we prescribe a toric back surface rigid lens, the amount of toricity in the fluorescein pattern will equal the difference in toricity between the base curve and cornea. If the base curve toricity equals the corneal toricity, we anticipate a spherical fluorescein pattern. Remember the exchange of tears beneath a rigid contact lens allows for removal of debris and flow of fresh oxygenated tears. Contact Lens Spectrum, Issue: March 2001
global_05_local_4_shard_00000656_processed.jsonl/72319
Amazon Kindle: Hands-on first impressions The Amazon Kindle is here, and we've got a first look. Amazon Kindle In the house: Amazon's new Kindle Sarah Tew/CNET Networks The slow drip of rumors and leaks about the Amazon Kindle e-book reader exploded into a full-blown flood over the weekend, once it was revealed as this week's Newsweek cover story . Amazon founder and CEO Jeff Bezos filled in all of the remaining blanks (or most of them, anyway) at this morning's New York press conference that officially introduced the product to the world. Some relevant details, finally confirmed: • Measurements: The Kindle weighs 10.3 ounces and is about the size of a trade paperback book. It's both taller and thicker than the Sony Reader. • Books: Once you're online via EVDO, electronic books are available directly from Amazon for up to $10--just click on the title you want, and it's downloaded (and you're charged) in about a minute's time. Amazon is currently offering more than 90,000 titles, including 90 percent of the current New York Times bestsellers. The first chapter of most books can be previewed on the Kindle for free. Amazon keeps track of your purchases, so you can delete the file on the Kindle (to make space for more content) and then download it again later for no additional charge. • Blogs: The Kindle also offers more than 300 blogs, including Slashdot, The Onion, BoingBoing, and Techcrunch--but these are customized Kindle versions that cost at least $1 a month. Moreover, unlike your RSS feeds, you can't add your favorite blog--if it's not on Amazon's list, you can't subscribe to it. • Web browsing: The Kindle can also browse the Web at large (it has its own QWERTY keyboard directly below the screen), but--unlike the Kindle-ized premium content listed above--most standard Web pages are something of a disaster. The CNET home page, for instance, was rendered as 18 separate pages. Likewise, don't expect support for any plug-ins such as Flash. • Price and availability: The Kindle reader is now available from for $400. CNET got one of the first review samples, and we've gotten a chance to put it through its paces. What do we think so far? Here's a quick and dirty appraisal, based on just a couple of hours of use: The Good: Excellent high-contrast screen does a great job of simulating a printed page; large library of tens of thousands of e-books, newspapers, magazines, and blogs via Amazon's familiar online store; built-in "Whispernet" data network--no PC needed; built-in keyboard for notes; SD card expansion slot; long battery life. The Bottom Line: With its built-in wireless capabilities and PC-free operation, Amazon's Kindle is a promising evolution of the electronic book (and newspaper, and magazine)--but overpriced content could be its Achilles' heel. In other words, the Kindle is a very promising gadget that offers the potential to revolutionize how we read books and periodicals--but I just don't see myself buying one (and I read about two books a month). But again, that's a very preliminary evaluation. The full review is coming soon. In the meantime, let us know if you have any questions about the Kindle's capabilities. And, of course, your opinions: is the Kindle the next must-have gadget, or is there a dealbreaker or two that keeps it from missing the mark? And how many of you are just holding out for the iTunes Bookstore on your iPhone or iPod Touch? Or would prefer to spend your $400 on an Asus EEE PC instead? Correction: This article initially misstated the Kindle's built-in connectivity options. It connects to the Web via a high-speed wireless network called Amazon Whispernet. Join the discussion Conversation powered by Livefyre Don't Miss Hot Products Trending on CNET Mac running slow?
global_05_local_4_shard_00000656_processed.jsonl/72341
Throughout my feebly short life I had have entirely too much experience with drunk dialing.   I don't know what it is about me that makes the idea of ex-girlfriends, Jack-in-the-Box and old hook-ups so enticing at three o'clock in the morning, but even on nights when I tell myself over and over again not to call anyone, when it comes time to either hit the sack or party on, my hand dives into my pocket, flips open my phone, and dials away. But it's not only me calling others that has become a problem.  What's happening now is that I'm receiving important phone calls when I'm drunk, and therefore involving myself in something I like to call Alcoholic Answering.  I have since learned to let calls go to voice mail so I can listen and devise a plan before calling them back.  The number of times I have actually followed through with this logic can be counted with my elbow. Below are eight drunken phone conversations I have had over the years. All of them are true, at least to my best recollection, which I'll be the first to admit is absolutely terrible.  Don't be like me. (Calling an ex-girlfriend during a night of drunken nostalgia) Alex: "So what are you up to these days?" Jess: "Just hanging out with my husband; still trying to play soccer whenever I-"" Alex: "Nice talking to you!" (Trying to help a friend get to the bar I was at) Alex: "I don't know the name of the bar." Aaron: "Well, describe it to me then." Alex: "Ok, there's some pool tables, a dance floor, and a bunch of fire on the table." Aaron: "Oh, you mean the Ballroom; they have those little fire pits and-" Alex: "I found it! The sign says…Red Door.  We're at the Red Door in Fremont." Aaron: "Alex, there's no fire pits at the Red Door. Alex: "I don't suppose fire trucks are a part of the décor?" Aaron: "I'm staying home." (Walking back from the bars to find my girlfriend) Alex: "Where are you?" Bonnie: "Your house – do you need me to come get you from the bars again?" Alex: "No I walked back." Bonnie: "Alex that's like three miles." Alex: "Three miles ain't got shit on me. I'll fucking kill three miles." Bonnie: "Alex where are you?" Alex: "Going to your house to pick you up." Bonnie: "But I'm at your house." Alex: "Gimme like thirty seconds I'll be outside." Bonnie: "No, Alex, I'm at your house. I'm at the annex with the other guys and-" Alex: "About ten steps I'll be at your door." Bonnie: "Jesus Christ Alex I'm at YOUR HOUSE. On 19 and 47 just before-" Alex: "Bonnie they won't let me into your house." Bonnie: "Oh my fucking God I'm not at my hou-" Alex: "I'm going to try the back entrance. Wish me luck babe!" (Calling a girl I wanted to come over) Alex: "Hi Casey! Remember me?!" Casey: "Huh?" Alex: "It's me, Alex. The guitar guy. Remember? I even knew that one Sense Field song you claimed no one had heard of." Casey: "Yeah…" Alex: "Oh come on! We hung out for like two hours!" Casey: "What did you say your name was again?" Alex: "Fuck this; I'm calling Chelsea." Casey: "Relax Alex, I'm kidding.  We've been hooking up for almost a month now you dork.  And wait, who the fuck is Chelsea?  Are you fucking playing me?" (Long silence) Alex: "I really need a girlfriend." (Calling my girlfriend from South Padre Island) Alex: "I think I'm lost." Bonnie: "How are you lost?" Alex: "Well, me and Chris got kicked out of the club and then snuck back in and hid under the stage and then got caught and ran and jumped over the fence and fell through a tree and ran and ran and ran and now I don't know where I am. Bonnie: "Where's Chris?" Alex: "Probably in jail." Bonnie: "Oh my God!" Alex: "Nah it's cool he was in jail last week too; he'll be fine." Bonnie: "Alex you need to find him!" Alex: "I think I'm being chased." Bonnie: "By who? Alex you need to call the police!" Alex: "Meh. They don't look too threatening. I should probably put down the phone though so I can run faster.  Who knew Spring Break would be such a good workout?!" (Calling my roommate from…somewhere) Mikey: "What?" Alex: "Want me to pick you up anything from Burgerville?" Mikey: "The fuck are you talking about?" Alex: "We're going through the drive-through at Burgerville; you want a shake or something?" Mikey: "The closest Burgerville to Seattle is almost 200 miles away." Alex: "I see…" Mikey: "Dude, who are you with?" (long pause) Alex: "I'm gonna have to call you back." (Calling Teebs while watching football the morning after he got arrested) Teebs' Phone: "You've reached Teebs' phone, leave a message and I'll get back to you as soon as I can." Alex: "Teebs!  You're in fucking jail, man!  That sucks!" TheOrangutan: "We're gonna come break you out, so listen up. Alex: "Fuck jail!" TheOrangutan:  "I have a Jeep, you have a truck.  Somehow I'm sure we can make that work." Alex: "Dude, I think he's like ten stories up." TheOrangutan: "Fuck. Well, how high can you jump?" Alex: "I can't believe you're actually in jail Teebs.  I mean, come on, bro." TheOrangutan:  "New plan; we're gonna gather everyone from the pledge class and bum rush the front desk." Alex: "After the game though." TheOrangutan:  "Right." Alex: "We should give him updates so he feels more connected." TheOrangutan:  "Good idea." Alex: "So, we just kicked off to them, and they ran it about fifteen yards until-" Alex: "Teebs, bro, you really just need to get out of jail." TheOrangutan: "Final plan: push the skinny button until you can squeeze out, then float out the window like a piece of paper." Alex: "Just don't let some hobo make you into a sign." TheOrangutan: "Unless it's one of those funny ones about ninjas." Alex: "Right.  You hear that Teebs?  Only if it has ninjas." (Calling jack-in-the-Box for the new delivery service they apparently started offering) Alex: "Yeah, can I get three cheese burgers, a diet coke, and two orders of-" Alex's Mom: "Alex?" Alex: "Shhh, not done yet.  And two orders of fries.  What do you want, Doug?" Doug: "Hi Jack-in-the-Box. I'll have four hamburgers and a vanilla shake. And can I have a few fries to dip in the shake? That'd be super sweet." Alex's Mom: "Alex, I' don't know what you think you're-" Alex:  "Oh!  Can I change my three cheeseburgers to FOUR cheeseburgers? Please please please please please?" (long silence) Alex's Mom: "Sure." Alex and Doug: "YAY!!" (sound of high-fiving)
global_05_local_4_shard_00000656_processed.jsonl/72351
Marvels: Eye of the Camera #3 by Greg McElhatton, Reviewer | Story by Kurt Busiek, Roger Stern Art by Jay Anacleto Colors by Brian Haberlin Letters by Richard Starkings Cover by Jay Anacleto Marvel Comics Cover Price $3.99 (USD) Release Date Jan 28th, 2009 Sun, February 1st, 2009 at 4:44PM (PST) I will admit it, I was a little unsure at first on just why "Marvels: Eye of the Camera" really needed to be told. At first, it felt somewhat like "Untold Tales of the Marvels," with Busiek telling stories that slotted in-between other issues of his original "Marvels" mini-series. Now, Busiek certainly proved on his "Untold Tales of Spider-Man" series that if there's someone who can handle such a task, it's him. But at the same time, the original "Marvels" mini-series was such a seminal event for the company that it seemed a little, well, odd to just be telling missing stories in the early ages of the characters. With this latest issue, "Marvels: Eye of the Camera" has earned its existence. With the series ever-closer to the present day, we're starting to get a very different sort of Marvel Universe than the first "Marvels" mini-series presented. Things aren't as simple and rosy as before; no one is sure who to trust, the media is more interested in tearing down heroes than holding them up, and vigilantes and beings like the Punisher and Ghost Rider seem to be blurring the lines between hero and villain with every single day. It's this different world that Phil Sheldon is trying to find his way in, and Busiek and Roger Stern do a good job of showing Sheldon's confusion and frustration with everything around him. In many ways he echoes the frustration of readers from that era, seeing their favorite heroes forever misunderstood and not trusted by the people they're trying to protect, and Busiek and Stern do a good job of making sure that we get all sorts of reaction from the public in "Marvel: Eye of the Camera." It's fun to see all the different reactions from the public towards the big and small events of the Marvel Universe, and Busiek and Stern bring the little person's view to life perfectly. For people who have never seen Jay Anacleto's art before now, they're certainly not going to forget it -— hopefully this will make him a superstar in the same way that the original "Marvels" propelled Alex Ross into the spotlight. Anacleto's art is beautifully realistic, able to handle not only superheroes but regular people, and even average city skylines. He's got a very strong sense of movement and action, too; so often overly-realistic comic art looks stiff and posed, but that's not the case here at all. Even a single panel of a kid mimicking Iron Fist has energy and spirit to it, and it's gorgeous, especially with Brian Haberlin's soft colors over Anacleto's art. For those who were unsure at first with "Marvels: Eye of the Camera," check out the new issue, you'll be pleasantly surprised. It may have gotten off to a slow start, but it really feels now like this mini-series is firing on all cylinders. I'm looking forward to the remaining three issues. Marvels: Eye of the Camera #6 Posted Sun, February 21st Marvels: Eye of the Camera #2 Posted Sun, January 4th Marvels: Eye of the Camera #1 Posted Tue, December 2nd
global_05_local_4_shard_00000656_processed.jsonl/72400
Check out the Corvette Championship Game at by Keith Cornett on April 15, 2009 The Corvette Championship Game at I’ve been hanging out quite a bit lately at – a new Corvette social networking site that went live late last year. Over the last few weeks, Scott and gang have been entertaining us with the Corvette version of the Sweet Sixteen. After several weeks of voting, its all come down to two of the most iconic Corvettes ever produced: A 1963 Corvette Split Window vs the 1967 427 ci Roadster. To get to the championship vote, the split window 1963 Corvette took on a rookie – the 2009 Competition Sport Corvette and then defeated the 1990 Corvette ZR-1 in round two of voting. In the final four vote, the SWC took on and defeated the 1971 Corvette armed with a 454 cubic inch engine. For the 1967 427 Corvette, the path was much easier. In the first round, the hapless 1984 Corvette didn’t put up any defense whatsoever and round two saw the big block Corvette take on and defeat the 2004 Z16 Commemorative Edition Z06. In the final four vote, it was a battle of 427′s as the Sting Ray took on a 1968 big block Corvette and remained undefeated. Click here for the large bracket version and view the road to the Corvette Championship game. If you want your vote to count in this epic battle of midyear Corvettes, visit the Corvette Championship Game at now. But you better hurry, the voting ends Thursday night at Midnight. And after you vote, why not stick around and see what VetteBlock has to offer. You can set up your own home page, upload photos and videos of your Corvette, connect with other Corvette enthusiasts and you can even set up a Corvette blog of your own. Pretty cool! And finally, make sure to check out CorvetteBlogger’s profile at! Related: is Now on Twitter! Technorati Tags: | | VetteBlock | | | | | | Advertise with us Previous post: Next post:
global_05_local_4_shard_00000656_processed.jsonl/72410
Count On Puzzle of the Day Start with any number and if it is even halve it but if it is odd add one. Now if this number is even halve it, if odd add one, and so on. Write each number down until you get to one. For instance 27 (add 1), 28 (halve it), 14 (halve it), 7 (add 1),8 (halve it), 4 (halve it), 2 (halve it),1 (stop). Which start number has the longest chain of numbers? Answer: single digit is 9, 2-digit is 65, 3-digit is 513, 4-digit is 819 Puzzle Archive
global_05_local_4_shard_00000656_processed.jsonl/72422
MooseX-Daemonize version 0.06 INSTALLATION To install this module, run the following commands: perl Makefile.PL make make test make install Alternatively, to install with Module::Build, you can use the following commands: perl Build.PL ./Build ./Build test ./Build install DEPENDENCIES Moose MooseX::Getopt MooseX::Types::Path::Class COPYRIGHT AND LICENCE Copyright (C) 2007, Chris Prather This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself.
global_05_local_4_shard_00000656_processed.jsonl/72433
Skip to content Today's Creation Moment Meerkat School Exodus 4:15b Biblical Critics Disproved Again 1 Samuel 11:1 Over the last couple of centuries, many Bible scholars have developed a skeptical approach to the Bible. Their treatment of the Bible as nothing more than a human document stems from their belief in evolution. According to them, Christianity has evolved from earlier religions just as humans evolved. biblical criticsAs a result, critics reject the idea that the Bible is God's inerrant, inspired, trustworthy Word. Because they hold this low view of the Bible, they believe that they have found many errors in the Bible over the years. At one time they said that the Hittites mentioned in the Old Testament never existed. They said that ancient biblical writers invented these people so that Israel could make up pretend victories over them. Eventually, the Hittites were discovered, one of the first evidences being hard-to-ignore six-foot-tall jars! Over the years, these critics have been consistently proven wrong by new discoveries. Likewise, critics have said that the Israelites could not have entered Canaan when the Old Testament says they did. They reason that because the Old Testament mentions the Ammonites – which critics said didn't live in Canaan until later – the Bible's dating is in error. However, in the summer of 1989, biblical archaeologists proved that the Ammonites were in Canaan well before the Bible's date for the exodus. Again, Bible critics have been proven wrong. As one biblical archaeologist wrote, "As usual, the absence of evidence is not necessarily the evidence of absence." When the Bible says something is true, there is no question of its truth. Dear Father, I thank You that Your Word is always true, because people are easily fooled and fall into error. Build me up in both faith and the knowledge of Your Word. In Jesus' Name. Amen. "Late bronze city found in Jordan." Archaeology and Biblical Research, v. 4, n. 1., Winter 1991. p. 27. Photo: Hittite chariot from an Egyptian relief.
global_05_local_4_shard_00000656_processed.jsonl/72445
In her article "Genuine Pluralism and Reformed Christology," Sara J. Melcher attempts to lay genocide, including the Holocaust, at the feet of the doctrine of the exclusivity of Christ. She fails to make a distinction between those who are biblical Christians and those who simply claim to be Christians. The unification of the Protestant churches in Germany into a national church was one of Hitler's goals when he came to power. So-called "German Christians" attempted to justify Nazism and anti-Semitism on Christian principles, something which, of course, is impossible to do. Some refused to comply and a resistance was born consisting of approximately 10 percent of all Protestants. The primary resistance movement came to be called the "Confessing Church" comprised of Lutheran, Reformed, and Union church pastors and lay persons. In 1934, the "Barman Declaration" declared that the proclamation of the church consists only in Jesus Christ and not Nazism. Those within the movement hid Jews, trained pastors, and some involved themselves in plots to assassinate Hitler. Bonhoeffer was a key leader in the movement and executed by the Nazis in 1945. Based upon her inclusion of the German state church in the Reformed tradition, Melcher asserts that exclusivist Christology is derived from a narrow reading of Scripture. She further appeals to the Reformed principle of allowing Scripture to interpret Scripture. In so doing, she posits that Christians have tended to treat "passages that express an exclusivist christology [sic] as having a higher level of authority than other parts of scripture [sic]. Christians tend to read a passage like John 14:6--Jesus said to him, 'I am the way, the truth, and the life. No one comes to the Father except through me'--as having the power somehow to 'trump' other, more inclusive passages. The theological constructions of the Reformed tradition tend to read the rest of Scripture as necessarily conforming with passages like Matt 11:27; John 14:6; and Acts 4:12, among others." Note that she does affirm that these passages do teach the exclusivity of Christ. The problem is that she goes on to posit that the author's of Scripture in effect contradict one another. In her words, "Job challenges some of the traditional wisdom perspectives represented within the book of Proverbs or within some poems from the Book of Psalms. Ecclesiastes, too, seems to challenge the world view of traditional wisdom. The theological perspective of the Letter of James may challenge the perspective of Paul's Letter to the Romans or it may seek to correct a common misinterpretation of Paul's letter. There are additional intra-biblical challenges." Her notion is that Scripture's framers intended to offer divergent perspectives on the way of salvation. Melcher's contention is that conservative Christians have read the Scriptures wrongly when it comes to the issue of salvation. "We of the Reformed churches often seem determined to make all Scripture conform to a few, special passages." Melcher interprets Romans 11 to say that all Jews will ultimately be saved. She interprets the account of the Rich, Young, Ruler as Jesus Himself teaching works salvation. She interprets the parable of the Good Samaritan as teaching that "love of God and love of neighbor will suffice" for salvation. She states that "Matthew 25:31-46 implies that something besides faith in Christ alone might be a factor in how one spends eternity." She notes that Amos 9:7 "may serve to challenge the idea that Christians alone are the recipients of God's salvation." Suffice it to say that Melcher has read each one of these texts out of context. Of course, when one asserts that Scripture contradicts Scripture, then one has rejected the authority of Scripture. Those who would affirm Scripture's authority would also affirm that Scripture cannot contradict itself. In a sense, the debate must end here. It cannot go any further (on a non-presuppositional approach) as the Christian and non-Christian argue from different sources of authority. Those who reject the authority of Scripture and affirm that Scripture contradicts itself must indeed be deemed non-Christians. The evidence lies in Melcher's own gross misinterpretations of Scripture cited above. But she continues. Melcher argues that Reformed theologians, and PC USA theologians in particular, fail to use the Hebrew Bible. In so doing they misunderstand God's way of salvation. She asks, "If the Hebrew Bible suffers neglect in some of the individual churches, how will readers and listeners be confronted by the idea that God saves--in passages that lack an explicit reference to Jesus Christ?" In response, indeed God does save. But, who is God and to whom does the Old Testament refer? Consider the words of our Lord Jesus Christ Himself: "O foolish ones, and slow of heart to believe in all that the prophets have spoken! Ought not the Christ to have suffered these things and to enter into His glory? And beginning at Moses and all the Prophets, He expounded to them in all the Scriptures the things concerning Himself (Lk. 24:25-27)." Referring to the Hebrew Bible, Jesus said, "You search the Scriptures, for in them you think you have eternal life; and these are they which testify of Me (Jn. 5:39)." Ironically, in that text, the Lord Jesus is refuting religious leaders who deny His claim, even as Melcher does. The Hebrew Bible speaks of the gospel of Jesus Christ. Consider Gal. 3:8: "And the Scripture, foreseeing that God would justify the heathen through faith, preached before the gospel unto Abraham, saying, in thee shall all nations be blessed." Further, "By faith Moses, when he became of age, refused to be called the son of Pharaoh's daughter, choosing rather to suffer affliction with the people of God than to enjoy the passing pleasures of sin, esteeming the reproach of Christ greater riches than the treasures in Egypt; for he looked to the reward (Heb. 11:24-26)." Moses esteemed the reproach of Christ as greater riches. Melcher's argument falls to the ground as she demonstrates her lack of understanding of the Scriptures as a whole. Christ is found on every page, declared to be the Creator, equated with God the Father throughout the New Testament, and affirmed as the sole, sufficient Savior for both Jews and Gentiles. It was Jesus who said, "before Abraham was, I am (Jn. 8:58)." Incredibly, she next moves to pit the "rule of faith" against the "rule of love." Again, she opines, "While the doctrine that salvation comes only through Christ follows the principle of Scriptural interpretation called "The Rule of Faith" (which means that one should be guided by the doctrinal consensus of the church), does the doctrine as it is currently formulated, understood, and taught adhere to "The Rule of Love?" Is it loving to focus on those passages of Scripture that confirm our sense of religious superiority, when there are passages that offer a broader point of view? Is it loving to hold on to theologies that reinforce barriers between the Reformed churches and people of other faiths?" The more appropriate question would be: "is it loving not to warn someone of the coming wrath? Is it loving to leave someone dead in their sins for the sake of a shallow union?" The fact that Christ is the exclusive way of salvation does not mean that Christians affirm religious superiority in a pejorative way. Christians view themselves as beggars telling other beggars where to find bread. Any other attitude is sub-Christian. It is Melcher who feels religiously superior by virtue of the so-called wideness in her mercy. The problem lies in the fact that affirming ways of salvation apart from Christ is not merciful at all. Melcher then challenges the traditional and scholarly understanding of the historical and sociological background to passages that promote an exclusivist Christology. Her position is that differing factors led the writers of Scripture to promote such a position and that in our current context, that position must be rejected as contemporary factors have changed. (Her logic is that if you can't refute the text, simply deny the text). In a postmodern world, truth is not static. To borrow from the ancient postmodern philosopher Hereclitus, truth is in a state of flux. One can never be certain of anything. One can never step into the same river twice for fresh waters are always flowing upon him. Hereclitus and Melcher are not the only ones who hold to such non-sensical notions. The church is drowning in the flowing waters of flux as new currents of truth rush past those who stand in the river not knowing which current to ride or even how to get out of such a torrent. Two other Reformed principles of interpretation are cited by Melcher: the principle that Christ is that to which all Scripture points and the principle of dependence upon the leadership of the Holy Spirit in interpreting and applying God's message in Scripture. She notes that the first principle suggests that Jesus' attitude should inform our interpretation of Scripture and then reflects upon whether or not the "doctrine of salvation only through Christ is something that Jesus himself would promote. If the purpose of the incarnation was to reconcile human beings to God, does the doctrine of salvation only through Christ serve that primary purpose? Or, does this exclusivist doctrine work against the reconciliation of human beings to one another and so represent an attitude that would not be supported by Jesus himself?" We can only respond that Jesus did promote Himself as the exclusive Savior of the world. Note too how Melcher confuses two issues. She states that the purpose of the incarnation is to reconcile human beings to God and then states the doctrine of the exclusivity of Christ works against the reconciliation of human beings to one another. While it does no such thing, Melcher has inserted her humanist bent. She forgets that which is ultimate: reconciliation to God, and substitutes that which is her main concern and agenda: the reconciliation of human beings to one another. She is not so much concerned that we get our theology right, but that we don't appear to be narrow or bigoted. Getting along with Muslims or Jews is more important that remaining true to God and/or seeing them saved from eternal judgment. Consider the words of John R.W. Stott with reference to the exclusivity of Christ and the reconciliation of human beings to God and to one another. "It is understandable that since the holocaust Jews have demanded an end to the Christian missionary activity among them, and that many Christians have felt embarrassed about continuing it. It is even mooted that Jewish evangelism is an unacceptable form of anti-Semitism. So some Christians have attempted to develop a theological basis for leaving Jews alone in their Judaism. Reminding us that God's covenant with Abraham was an 'everlasting covenant', they maintain that it is still in force, and that therefore God saves Jewish people through their own covenant, without any necessity for them to believe in Jesus. This proposal is usually called a 'two-covenant theology'. Bishop Krister Stendahl was one of the first scholars to argue for it, namely that there are two different salvation 'tracks'-the Christian track for the believing remnant and believing Gentiles, and the track for historical Israel which relies on God's covenant with them. Romans 11 stands in clear opposition to this trend because of its insistence on the fact that there is only one olive tree, to which Jews and Gentile believers both belong... 'The irony of this,' writes Tom Wright, 'is that the late twentieth century, in order to avoid anti-Semitism, has advocated a position (the non-evangelization of the Jews) which Paul regards precisely as anti-Semitic.'" The second principle Melcher cites implies that the Spirit guides us in the interpretation of Scripture and thus we should "continue to invoke the help of the Holy Spirit as [we] interpret Scripture in reference to the christology [sic] of Christ as the only savior [so that we] will be led to deeper understandings of the issue of salvation in Scripture." Her prayer is that the Spirit would give us a man-centered understanding of Scripture as opposed to a God-centered and accurate understanding of the same. The Spirit hears no such prayers. The failure to make a distinction between those who are biblical Christians and those who simply claim to be Christians is a problem that is all too pervasive throughout the Christian and non-Christian worlds alike. We must maintain that distinction for understanding to be had and to prevent wrongheaded conclusions from the likes of Melcher. Christ is the only way of salvation. That doctrine does not foster persecution or indifference as Melcher suggests. Rather, sin in the human heart produces such. To expect anything other than indifference as the very best from a great many of those who don't know Christ is to expect an illusion. Individuals from every philosophical and religious commitment can be and have been guilty of the dynamic Melcher laments. Again, the root of the problem is not exclusivist Christology but human depravity. Melcher maintains that Reformed Christians should revisit their notions of an exclusive Christology. In her appeal, she cites the Presbyterian Confession of 1967 which states, "Repeatedly God has used the insight of non-Christians to challenge the church to renewal." Again, the renewal of which Melcher speaks is the paring away of biblical truth so that Christians might join with persons in other faith traditions in the spirit of brotherhood. That brotherhood is grounded in a willingness to set aside truth. Of course, in a postmodern world, truth is relative and at the same time irrelevant. The danger is that if Melcher's version of Christianity is realized, the true church will be irrelevant. If that happens, life itself will be irrelevant and the relevance of truth will not be realized until it's too late.
global_05_local_4_shard_00000656_processed.jsonl/72460
David A. Naumann Professor of Computer Science at Stevens Institute of Technology. Here's contact info and resume. Publications etc. Spring 2014 CS 496/510 Principles of Programming Languages Fall 2013 CS 115 Introduction to Computer Science Spring 2013 CS 135 Discrete Structures Fall 2012 CS 115 Introduction to Computer Science and CS 465/810 Category Theory for Computer Scientists Spring 2012 CS 135 Discrete Structures Fall 2011 CS 115 Introduction to Computer Science and CS 510 Principles of Programming Languages Fall 2010 & Spring 2011: on sabbatical leave at Microsoft Research, Cambridge and at IMDEA Software Institute, Madrid PhD positions available (to start Fall 2013 or later). For research on secure information flow in software: policies, static analysis, and runtime monitoring for Android and other platforms. Full funding is provided. (Supported by NSF and DHS.) The ideal candidates have background in programming language theory and implementation or formal methods. Details here. For undergrad and MS students: Scholarships for Service. Undergraduate summer research: Contact me early in Spring semester for projects, supported by NSF and the Stevens Scholars program. My focus is on formal methods and software security, including: ad hoc network application security; JavaScript and web security; fine-grained confidentiality/integrity policies; program analysis, verification, and transformation; correctness by construction; and methodology for formal specification of system components. For details see publications and tools. Affiliated with: CASSIA, the Center for the Advancement of Secure Systems and Information Assurance. Current and past PhD students: Mohammad Nikouei; Andrey Chudnov; Chunyu Tang (finished Fall 2013); Stan Rosenberg (finished Summer 2011); Qi Sun (finished Fall 2007). I'm working with Anindya Banerjee (IMDEA Software), Gary Leavens (U. Central FL.), and others on Flexible and Practical Information Flow Assurance for Mobile Apps (NSF award 1228930) --see the FlowSpecs project. With support from DHS I'm working on Tunable Information Flow with researchers at HRL Laboratories. I'm working with Gary Leavens and others on the Java Modeling Language (JML), and with Leila Silva (UFS Brazil) and Augusto Sampaio (UFPE Brazil) on refactoring (NSF awards CNS-0708330 and CCF-0915611). With support from Microsoft Research I worked with Andy Gordon and François Dupressoir on Verifying Cryptographic Code in C. And collaborated on the Spec#/Boogie software specification/verification project. With support from NSF I worked with Anindya Banerjee on Access Control and Downgrading in Information Flow Assurance, collaborating with Tamara Rezk and Gilles Barthe (INRIA), Marco Pistoia (IBM), Qi Sun and Stan Rosenberg. See our Secure Information Flow Inferencer and Verifier for Region Logic. With support from Telcordia and the U.S. Government I'm working with Susanne Wetzel and Chunyu Tang on high assurance for security in wireless networking Selected recent program committees and editorial boards 20th International Symposium on Formal Methods (FM) 2015 4th Conference on Principles of Security and Trust (POST) 2015 5th International Symposium on Unifying Theories of Programming (UTP) 2014 (PC chair) Programming Languages and Analysis for Security (PLAS) 2014 5th International Conference on Runtime Verification, 2014 Workshop on Foundations of Computer Security (FCS) at LICS/CSF 2013 Verified Software: Theories, Tools, Experiments 2008, 2010, & 2013 1st ACM Workshop on Higher-Order Programming with Effects (HOPE) at ICFP 2012 ACM Principles of Programming Languages (POPL) 2011 ACM Conference on Computer and Communication Security (CCS) 2010 ECOOP Workshop on Formal Techniques for Java-like Programs (FTfJP) 2013 New Jersey Programming Languages Seminar (NJPLS) co-organizer, April 2010. International Conference on Formal Engineering Methods 2009. Brazilian Symposium on Formal Methods 2007, 2008, 2009, 2010, 2011 (also Steering Committee, and co-chair of PC 2012) ACM Workshop on Program Analysis for Security (PLAS) 2008 & co-chair for PLAS 2009 Mathemetics of Program Construction 2004, 2010, 2012 Formal Methods for Security Engineering 2007 & 2008 European Symposium on Research in Computer Security 2007 IBM Programming Languages Day 2009, co-organizer Formal Methods for Open Object-based Distributed Systems 2007 & 2008 IEEE/ACM Workshop on Automated Formal Methods (AFM) 2007, 2008, & 2009 European Symposium on Programming 2006 & 2008 Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis 2007 ECOOP International Workshop on Aliasing, Confinement and Ownership in object-oriented programming 2008 Int'l Symposium on Unifying Theories of Programming 2006, 2008, 2010, 2012 TOOLS Europe 2008 7th IFIP Int'l Conference on Theoretical Computer Science 2012 Workshop on Specification And Verification of Component-Based Systems 2007 14th Int'l Conference on Formal Methods 2006 Brazilian Symposium on Programming Languages 2004 -- 2008 I co-chaired (with Rohit Gheyi) the 15th Brazilian Symposium on Formal Methods. I co-chaired (with Stephen Chong) the 4th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security associated with PLDI 2009 in Dublin. I co-chaired (with Peter O'Hearn) the 2008 Theory Workshop of the Second IFIP Working Conference on Verified Software: Theories, Tools, Experiments and I co-chaired the Theory Workshop for 2010. I chaired the Theory Panel of the Verified Software Initiative and am a Corresponding Member of the Verified Software Repository Network. Editorial Board, The Journal of Object Technology A series of noun phrases (lacunae not shown) My stylish home page, speed limits for chumps, Lore-El Center for Women in Engineering and Science, air quality, life above 20 kHz, my Capoeira Angola master, news for nerds, quanta, the African diaspora, my Smyrneika, sax, and voice teachers, shaking away like a rattlesnake, pop record ageing fan, Pandora's locked box, the desk upon which it may not sit, the cry of the imaginary cuica. David Naumann 2014-06-17
global_05_local_4_shard_00000656_processed.jsonl/72461
@conference {15, title = {Data Management Challenges in Cloud Computing Infrastructures}, booktitle = {DNIS}, year = {2010}, month = {03/2010}, pages = {1-10}, publisher = {Springer}, organization = {Springer}, address = {Aizu, Japan}, abstract = {The challenge of building consistent, available, and scalable data management systems capable of serving petabytes of data for millions of users has confronted the data management research community as well as large internet enterprises. Current proposed solutions to scalable data management, driven primarily by prevalent application requirements, limit consistent access to only the granularity of single objects, rows, or keys, thereby trading off consistency for high scalability and availability. But the growing popularity of cloud computing, the resulting shift of a large number of internet applications to the cloud, and the quest towards providing data management services in the cloud, has opened up the challenge for designing data management systems that provide consistency guarantees at a granularity larger than single rows and keys. In this paper we analyze the design choices that allowed modern scalable data management systems to achieve orders of magnitude higher levels of scalability compared to traditional databases. With this understanding, we highlight some design principles for systems providing scalable and consistent data management as a service in the cloud. }, keywords = {Cloud, Databases}, doi = {10.1007/978-3-642-12038-1}, url = {http://www.cs.ucsb.edu/~sudipto/papers/dnis2010.pdf}, author = {Divyakant Agrawal and Amr El Abbadi and Shyam Antony and Sudipto Das} }
global_05_local_4_shard_00000656_processed.jsonl/72479
Get an Epic Experience with Premium Anti-Griefing Tools Login to Add Favorites • Minecraft • 883 Monthly Downloads • Supports: CB 1.1-R8 • 177,781 Total Downloads • Updated 03/26/2012 • Created 08/25/2011 • 22 Favorites • Project Site • Release Type: Release • License: GNU General Public License version 3 (GPLv3) • Newest File: Web Interface v1.0.7d Support development! ** About HawkEye HawkEye is the ultimate tool for hunting down rule breakers and keeping track of what goes down on your server. It gives you the ability to log changes, search through them, roll edits back and much, much more. What makes HawkEye different? As most people are aware there are already two perfectly good logging plugins out there - BigBrother and LogBlock. These plugins are fine, but they haven't changed an awful lot since their first steps in the days of hMod. It is high time for a new plugin that takes inspiration from existing plugins and combines it with a host of new features to create the perfect anti-grief and logging tool out there. So what are these 'unique features'? • Logging of over 30 different actions • Rollback commands with simple-to-use parameters • Advanced interactive web interface for viewing logs • WorldEdit selection rollbacks - rollback everything in your WE selection • Configurable search tool to quickly see edits on single blocks • API so other plugins can interact with the HawkEye database I don't want to lose my existing data!? No problem! Simply use one of the import scripts I have created. See this wiki page for more details: Importing from other logging plugins What do I need? • Recent version of CraftBukkit • MySQL Database (preferrably on the Minecraft server) • (Optional) Web Server (preferrably on the Minecraft server) Installation and Configuration? 1. MySQL and Web Server 2. Installation 3. Configuration 4. Permissions Got any more information? 1. Dev Builds 2. Usage 3. Importing from other logging plugins 4. What does it log? 5. API for other plugins 6. Screenshots 7. Language Packs 8. JavaDoc I can't set it up! I can't use the commands Go over the links above again. If you still can't do it, go to the forums: and make a new thread in the right section I enjoy bagels and can't remember commands? One of the mods on my server made a 'cheat sheet' just for people like you! Give this to your derp moderators so they won't keep bugging you about how the commands work: Cheat Sheet How can I help you? Making Bukkit plugins takes a lot of time, however I do it as a hobby. Because of this I don't expect any kind of donation from anyone. The best way people can help me out is by simply spreading the word about HawkEye and providing me with decent bug reports if you find issues. You can also help me by translating the web interface into other languages: Get Localization . If you would still like to make a donation to my coding-beer fund, feel free to use the following link: • Fixed interface.php and json.php issues Login to Curse Don't have an account? Create One. Get an epic experience with Curse Premium • Faster addon downloads • Premium-Only Beta Giveaways • Ad-Free Curse experience • Premium Curse Client • and many More Features • Learn More » Landmark Beta Key Giveaway! Get My Code!
global_05_local_4_shard_00000656_processed.jsonl/72498
Daily Dothttp://www.dailydot.com/Daily Dot Articleen-usTue, 11 Dec 2012 20:39:35 +0000Governments want to take over your Internet: At stake at WCIT-12http://www.dailydot.com/opinion/albon-governments-want-to-take-your-Internet/<p><img src='//cdn0.dailydot.com/cache/1b/8f/1b8f67369aa4554d7c656c48ac860e0f.jpg'></p><p> By&nbsp;<strong>CHRIS R. ALBON</strong></p> <p> <em>Chris R. Albon is a political scientist and writer on the global politics of science and technology. Presently, Chris leads the Governance Project at FrontlineSMS. Prior to FrontlineSMS, Chris earned a Ph.D. in Political Science from the University of California, Davis.</em></p> <p> This past week, members of the <a href="http://www.itu.int/en/Pages/default.aspx">International Telecommunication Union</a> (ITU), the United Nations agency charged with coordinating global information and communication technology regulations, is holding its most important (and very rare) conference. The event is called the <a href="http://www.itu.int/en/wcit-12/Pages/default.aspx">World Conference on International Telecommunications</a> (WCIT) and was last held in 1988 in Melbourne. That conference established the foundational rules on which the Internet has been built.</p> <p> At first glance, the latest conference (called WCIT-12) is an attempt to allow communication ministers from almost 200 countries to update those basic rules of telecommunications which were first established when the Internet was clearly still in its infancy. But this latest ITU event is doing much more than that. It is setting up the war for the Internet&#39;s soul.</p> <p> <img alt="" src="http://cdn0.dailydot.com/uploaded/images/original/2012/12/11/Screen_shot_2012-12-11_at_12.28.58_PM.png" style="width: 425px; height: 175px; margin: 6px 5px; float: left;" />When the first WCIT conference took place, the focus of discussion was on large &nbsp;telecommunication firms like AT&amp;T, not on service providers like Google and Facebook (yet to be founded). Put another way, the first WCIT was mostly about regulating the pipes between the countries, not the data that flowed over them. This time is different.</p> <p> The WCIT-12 conference runs for two more days, until December 14th. Already two very troubling proposals have appeared. First, the ITU <a href="http://www.techdirt.com/articles/20121203/07493221209/itu-approves-deep-packet-inspection-standard-behind-closed-doors-ignores-huge-privacy-implications.shtml">has approved a standard of deep packet inspection</a>. As originally conceived, networks on the Internet did not examine the contents of the packets that travelled over their systems. They only looked at the packet&#39;s header to see where they should send that packet next. In <a href="http://en.wikipedia.org/wiki/Deep_packet_inspection">deep packet inspection</a>, the network examines both the header and the packet&#39;s content before forwarding it on. To put this simply, it&rsquo;s like a postal worker taking a peek at your letters before putting them in your mailbox.&nbsp;<img alt="" src="http://cdn0.dailydot.com/uploaded/images/original/2012/12/11/Albon_ITU_2.jpg" style="width: 430px; height: 287px; margin: 5px; float: right;" /></p> <p> It may be true that, as <a href="http://www.theregister.co.uk/2012/12/06/dpi_standard_leaked/">Richard Chirgwin points out in The Register</a>, the standardization of deep packet inspection means little in the near term. Governments like <a href="http://www.wired.com/dangerroom/2012/11/russia-surveillance/all/">Russia</a>, <a href="http://boingboing.net/2011/11/01/blue-coat-deep-packet-inspection-tools-used-by-syrian-secret-police-and-other-repressive-regimes.html">Syria</a>, and the <a href="http://www.wired.com/science/discoveries/news/2006/04/70619">United States</a> have inspected packets before, and they will continue to do so in the future. The approved proposal is not a new acceptance of deep packet inspection, rather a best practice standard for governments conducting surveillance against citizens and for corporations in prioritizing more profitable data. Frankly, a global acceptance of deep packet inspection seems more disturbing in the long run.</p> <p> The second proposal is more immediately worrisome. Last week Russia, the United Arab Emirates, China, Saudi Arabia, Algeria, Egypt and Sudan <a href="http://arstechnica.com/tech-policy/2012/12/authoritarian-regimes-push-for-larger-itu-role-in-dns-system/">put forward a proposal</a> to bring more of the Internet under state control through undermining the current bodies governing domain names and IP addresses. These organizations&mdash;<a href="http://www.icann.org/">ICANN</a> and <a href="http://www.iana.org/">IANA</a>&mdash; only developed after 1988. While they have had their own host of problems, they have done relatively well at maintaining neutrality in managing the technical aspects of the Internet. The new proposal would instead putting governments in charge of the domain names and IP addresses of communication services within their borders. Thankfully, a wave of support <a href="https://www.google.com/takeaction/">lead by Google </a>and others was able to <a href="http://www.webpronews.com/open-internet-scores-a-win-at-itu-china-and-russia-withdrawal-bids-for-internet-control-2012-12">pressure the governments to table to proposal</a>.</p> <p> </p> <p> Make no mistake, this proposal was not some technocratic proposition to improve network performance. It was an attempted coup by some of world&#39;s most authoritative governments to take the commanding heights of the Internet. And it won&#39;t be the last. So much of the Internet&#39;s freedom, and its power for democratization, lies with the serendipitous freedom that the rules set up in 1988 allowed, letting much of the Internet develop outside government control. While there <a href="http://www.theregister.co.uk/2006/06/30/icm_registry_foia_three/">has been political interference</a> in ICANN, cases are thankfully uncommon. If this proposal had been approved, it would have brought the most critical element of the Internet&#39;s infrastructure firmly under the control of governments, and fundamentally changed the Internet as we know it.</p> <p> With a few days of WCIT-12 left to go, we can already take away a larger lesson from these two proposals. The era between the first and second WCIT conferences was about building the technical structure of the Internet and the content riding over its networks; the era between the second and third WCIT conferences will be something else entirely. It will be a war for the freedom of the soul of the Internet from government interference and control.</p> <p> <em>Photographs by <a href="http://www.flickr.com/photos/itupictures/8241146168/in/set-72157632073685626/">itupictures</a></em></p> Tue, 11 Dec 2012 20:39:35 +0000http://www.dailydot.com/opinion/albon-governments-want-to-take-your-Internet/PoliticsOpinion
global_05_local_4_shard_00000656_processed.jsonl/72509
  (Source: AP) Source: Pew Research Center Comments     Threshold RE: Defnition By BRB29 on 6/12/2013 12:02:47 AM , Rating: 2 Why can we not have a safe society while also preserving the precious liberties our forefathers granted to us with their lives? Look at Israel. It's a relatively democratic state in the midst of a very hostile, autocratic region, with enemies camped out along its national borders. Its citizens enjoy great freedom, yet at the same time they are highly protected from danger. WTF You must not be thinking about the same Israel. This must be in a dream. Now look at America. We gave up a lot of our liberties, yet the country is increasingly more dangerous, not safer, ever since the Twin Towers fell. Best of all, we have a government whose various departments, agencies and repressive regimes are actively plotting against us, under the disguise of "national security". What country are you comparing the US to? We actually have much more freedom than almost all 1st world countries and amongst the safest also. You're a worthless pro-government shill. You tell us to shut our mouths, because you clearly believe your own backstabbing government can never ever do any wrong. Yep, you have gone full speed delusional retardation. Coming from the guy that thinks Israel is a utopia of some sorts lol RE: Defnition By ritualm on 6/12/2013 12:19:01 AM , Rating: 2 For a country whose mainstream media has admitted to self-censorship over black-on-white racial violence because it would be politically incorrect to report straight facts to the people. Safest? You're just pulling a clump of poop out of your ass and calling it a brick of 99.99% pure gold. More freedom? Not by most accounts. Oh yeah, the guy who accused me of dreaming is himself living in a dream. Pot, kettle, black.
global_05_local_4_shard_00000656_processed.jsonl/72512
Cattle genetics and heritability Cattle genetics and heritability Dairy cow breeding has become highly complex as progress is made into the understanding of which genes are responsible for which traits and how well a particular trait is passed from one generation to the next. Most work in dairy breeding has obviously centred around those characteristics associated with milk yield and productivity, but an increased appreciation for the value of genetics in breeding livestock that suffer fewer mobility problems, have greater resistance to parasites and are generally healthier and longer-lived has led to work in defining which genes are responsible for conferring resistance to mastitis causing pathogens as well as the traits most likely to infer reduced susceptibility to the disease. The heritability for Somatic Cell Counts (SCC) and clinical mastitis is relatively low. SCCs have been genetically linked to mastitis incidence, and thus selecting for a low SCC will inevitably lower the incidence of mastitis. However, there is evidence for an unfavourable correlation between resistance to mastitis and those traits associated with milk production, which means that, in simple terms, selecting for general resistance to mastitis is likely to result in lower-yielding cows. There has been a great deal of research work to define the heritability for the various genes responsible for resistance or susceptibility to specific mastitis-causing pathogens but at farm level this information is not of particular use as dairy breeders are already selecting for a large number of traits. Many udder and teat traits or characteristics associated with a susceptibility to mastitis have a relatively high heritability. At this level, breeders have the possibility of rejecting herd replacements from cows with undesirable traits; these characteristics include short teat canals with a wide cross-section diameter that have been identified as being prone to mastitis. Unfortunately, cows with these particular traits also tend to be faster milkers due to the ease with which milk can be drawn from their teats, and their offspring may indeed be chosen for these very traits of milking speed. Furthermore, milking speed and milk yield tend to co-relate, so many cows chosen as breeders because they milk quickly and yield well may well be those that are more prone to mastitis due to teat canal length. Other physical traits such as udder suspension can also be selected for; breeding from cows with good long-lasting udder suspension promises longevity and avoids the large, pendulous udders that result in awkward teat angles which can be prone to liner slippage and the risk teat damage and infection with environmental mastitis pathogens.
global_05_local_4_shard_00000656_processed.jsonl/72535
Take You There Promote your Business on Take You There Experience the next evolution of mobile tourism marketing technology with Take You There, the mobile app developed by Datatrax. Take You There puts your dynamic promotion in the pockets of mobile users everywhere. TourismTouchscreen promotions can be adapted for display on Take You There. Why Go Mobile with Take You There? • It’s completely free for users. There is absolutely no barrier to mobile users viewing your information. Take You There is totally free with no download fees, no add-ons, and no subscriptions. • It’s compatible with both major mobile operating system types. Unlike many other travel apps, Take You There has been developed for iPhone, iPad, and Android phones and tablets. • It uses GPS technology to display the most relevant information to the user first. Take You There‘s GPS-driven interface shows the tourist the businesses they’re closest to, so your market is more targeted and captive than ever before. They’re looking at your promotion because they are near your town and looking for information. • It displays the entire network. Users can access the entire network of operators from anywhere in the world, so even when they’re further afield, a traveller could be looking at your promotion at any time. • It links the user directly to your business. Take You There requires no commissions or booking fees to list your business, and instead provides the user with your contact details and the option to call or email you directly to book. download Take You There for iPhone, iPad and Android
global_05_local_4_shard_00000656_processed.jsonl/72537
Tuesday, 19 November 2013 I want some EU money too The Vatican has recently announced that new LED lights are to be installed in the Sistine Chapel. There are benefits all round: the new lights will produce less heat than traditional light bulbs so that it will be possible to better illuminate the chapel and we will all get a better view of the magnificent art. The Vatican will save on its air-conditioning bill because of the reduced heat. Moreover, the LED is cheaper and the Vatican will save 60% of the lighting costs. Installing the new system will cost 1.9 million Euro and here’s the rub: for some reason the wise men in Brussels have decided to subsidise the (non-member and cash rich) Vatican with €870,000 EU money for this project. Bringing in hell, as in what-the-hell, is unlikely to shock the Vatican. They are used to more exciting sins than an occasional mentioning of hell. Not even what-the-f*** will cause a stir.  Could the explanation be the granting of an umbrella absolution to the corrupt apparatus of the European Union? But the Vatican, I imagine, would have charged more than 870,000 Euros for that service. Or are EU officials just like the girl-who-can’t say-no? You apply for a grant and get one. In that case, how about one for me?  1 comment: 1. If you were Michelangelo perhaps they would! ......btw you did not mention the Devil - OSRAM!
global_05_local_4_shard_00000656_processed.jsonl/72632
[DDC-1241] Additional parameters for EntityRepository::findAll() and EntityRepository::findOneBy() Created: 01/Jul/11  Updated: 23/Aug/13  Resolved: 06/Nov/12 Status: Resolved Project: Doctrine 2 - ORM Component/s: ORM Affects Version/s: 2.1 Fix Version/s: 2.3.1 Security Level: All Type: Improvement Priority: Trivial Reporter: Jasper N. Brouwer Assignee: Benjamin Eberlei Resolution: Fixed Votes: 1 Labels: None In the Doctrine 2.1 versions the method EntityRepository::findBy() accepts additional parameters for ordering, limit and offset. Great feature! (While waiting for it I extended the EntityRepository class and implemented these parameters myself using a QueryBuilder.) It would be nice for the method EntityRepository::findOneBy() to accept an additional parameter for ordering as well. It could use the following signature: public function findOneBy(array $criteria, array $orderBy = null); This would be useful for various cases, for example: finding the newest blog-post. And maybe update EntityRepository::findAll() as well with the signature: public function findAll(array $orderBy = null); Looking forward to your thoughts. Comment by Dieter Provoost [ 27/Jul/11 ] I can't seem to find the implementation of this even though this issue has been resolved. Is this possible? Comment by Benjamin Eberlei [ 27/Jul/11 ] It was only added to "findBy" Comment by Jasper N. Brouwer [ 27/Jul/11 ] So the resolution is actually a "won't fix" (in stead of "fixed")? I know this was added to "findBy", but my request was to extend the "findOneBy" and "findAll" as well... Comment by Dieter Provoost [ 27/Jul/11 ] Can it also be added to "findOneBy"? It would come in very handy for the use case above (for example: finding the newest blog-post). Otherwise, I think we are limited to the alternative using "findBy" with the orderBy parameter (thus fetching all entries, followed by returning only the first/last) or using a native query. Comment by Benjamin Eberlei [ 27/Jul/11 ] Reopened for 2.2 with implementation for "findOneby()" Comment by Guilherme Blanco [ 20/Dec/11 ] Updating fix version Comment by Paweł Nowak [ 05/Nov/12 ] A proposed implementation of findOneBy with ordering is available with the following pull request: https://github.com/doctrine/doctrine2/pull/504. Comment by Fabio B. Silva [ 06/Nov/12 ] Fixed : https://github.com/doctrine/doctrine2/commit/283ed55824b7c713611e4b1e336551be805c48b5 Comment by Dmitry Pashkevich [ 23/Aug/13 ] What about extending the signature of EntityRepository::findAll() to this? public function findAll(array $orderBy = null); I like this idea, it would allow cleaner code when querying records without criteria: instead of $users->findBy(array(), array('name'=>'ASC')); Generated at Tue Jul 29 12:56:31 UTC 2014 using JIRA 6.2.3#6260-sha1:63ef1d6dac3f4f4d7db4c1effd405ba38ccdc558.
global_05_local_4_shard_00000656_processed.jsonl/72663
Pill Identifier App In the US, Bystolic (nebivolol systemic) is a member of the drug class cardioselective beta blockers and is used to treat High Blood Pressure and Mitral Valve Prolapse. US matches: Ingredient matches for Bystolic Nebivolol is reported as an ingredient of Bystolic in the following countries: • United States International Drug Name Search
global_05_local_4_shard_00000656_processed.jsonl/72690
Mergriet van Wijenhorst From EastKingdomWiki Jump to: navigation, search Griet (me) with mini-Griet Heraldry Needed Awards & Offices (Lady) Mergriet van Wijenhorst • Lived in the Barony of Ruantallan in the late 90's • Within this time I received my AoA (2002), Maunche (2004) and Burdened Tyger (2008) • The Barony of Septentria (Ealdormere) from 2009-2010 • The Shire of Bordergate (An Tir) from 2010 to 2013 • Ruantallan, canton of Seashire, 2013 In the SCA I basically like to research stuff, cook and make things (like award scrolls), it's that simple. I also enjoy learning more about my persona and improving my in-game appearance Presently the (Tir Mara) Princess's Champion for Arts and Sciences Her present place of residence is at the Eik en Zwijn Offices & Positions In the past I held onto long term positions of Webminister and Chronicler for Lyndhaven and was the Minister of Children for the Northern Shores area (now Tir Mara), I also filled in for many more temporary jobs and deputy positions within the shire of Lyndhaven and for the area now known as Avonmore. Event Staff During the years I lived in Lyndhaven, I both co-ran events as well as cooked feasts, shared kitchens and ran day-boards. The majority of these events took place in what is now known as the incipient shire of Avonmore, though I have also cooked/worked part in regional (now principality) and kingdom events. Projects & Publications More Information Personal tools
global_05_local_4_shard_00000656_processed.jsonl/72711
EconStor > University of Oslo > Department of Economics, University of Oslo > Memorandum, Department of Economics, University of Oslo > Please use this identifier to cite or link to this item: Title:Is there a green paradox? PDF Logo Authors:Hoel, Michael Issue Date:2010 Series/Report no.:Memorandum // Department of Economics, University of Oslo 2010,13 Abstract:A sufficiently rapidly rising carbon tax may increase near-term emissions compared with the case of no carbon tax. Even so, such a carbon tax path may reduce total costs related to climate change, since the tax may reduce total carbon extraction. A government cannot commit to a specific carbon tax rate in the distant future. For reasonable assumptions about expectation formation, a higher present carbon tax will reduce near-term carbon emissions. Moreover, whatever the expectations about future tax rates are, near-term emissions will decline for a sufficiently high carbon tax. However, if the nearterm tax rate for some reason is set below its optimal level, increased concern for the climate may change taxes in a manner that increases near-term emissions. Subjects:Climate change exhaustible resources green paradox carbon tax Document Type:Working Paper Appears in Collections:Memorandum, Department of Economics, University of Oslo Files in This Item: File Description SizeFormat 635685434.pdf233.39 kBAdobe PDF No. of Downloads: Counter Stats Download bibliographical data as: BibTeX Share on:
global_05_local_4_shard_00000656_processed.jsonl/72712
EconStor > Bard College, Annandale-on-Hudson (NY) > Levy Economics Institute of Bard College > Working Papers, Levy Economics Institute of Bard College > Please use this identifier to cite or link to this item: Title:Is reregulation of the financial system an oxymoron? PDF Logo Authors:Kregel, Jan Issue Date:2010 Series/Report no.:Working paper, Levy Economics Institute 585 Abstract:The extension of the subprime mortgage crisis to a global financial meltdown led to calls for fundamental reregulation of the United States financial system. However, that reregulation has been slow in implementation and the proposals under discussion are far from fundamental. One explanation for this delay is the fact that many of the difficulties stemmed not from lack of regulation but from a failure to fully implement existing regulations. At the same time, the crisis evolved in stages, interspersed by what appeared to be the system's return to normalcy. This evolution can be defined in terms of three stages (regulation and supervision, securitization, and a run on investment banks), each stage associated with a particular failure of regulatory supervision. It thus became possible to argue at each stage that all that was necessary was the appropriate application of existing regulations, and that nothing more needed to be done. This scenario progressed until the collapse of Lehman Brothers brought about a full-scale recession and attention turned to support of the real economy and employment, leaving the need for fundamental financial regulation in the background. Subjects:financial regulation financial crisis subprime crisis mortgage affiliate regulation Document Type:Working Paper Appears in Collections:Working Papers, Levy Economics Institute of Bard College Files in This Item: File Description SizeFormat 621627313.pdf131.02 kBAdobe PDF No. of Downloads: Counter Stats Download bibliographical data as: BibTeX Share on:
global_05_local_4_shard_00000656_processed.jsonl/72713
EconStor > Technische Universität Ilmenau > Institut für Volkswirtschaftslehre, Technische Universität Ilmenau > Ilmenau Economics Discussion Papers, Technische Universität Ilmenau > Please use this identifier to cite or link to this item: Title:International antitrust institutions PDF Logo Authors:Budzinski, Oliver Issue Date:2012 Abstract:The paper discussed the economic theory of international antitrust institutions. Economic theory shows that non-coordinated competition policies of regimes that are territorially smaller than the international markets on which business companies compete violate cross-border allocative efficiency and are deficient with respect to global welfare. At the same time, some diversity of antitrust institutions and policies promotes dynamic and evolutionary efficiency so that globally binding, worldwide homogenous competition rules do not represent a first-best solution either. After reviewing the existing international antitrust institutions and their prospects and limits from an economic perspective (with a focus on the International Competition Network, ICN), the paper discusses reform proposals from economic literature. Subjects:international competition policy international antitrust Competition Network global governance international organizations Document Type:Working Paper Appears in Collections:Ilmenau Economics Discussion Papers, Technische Universität Ilmenau Files in This Item: File Description SizeFormat 718788923.pdf633.39 kBAdobe PDF No. of Downloads: Counter Stats Download bibliographical data as: BibTeX Share on:
global_05_local_4_shard_00000656_processed.jsonl/72727
The effect that an electric shock has on your body depends on the path that the current flows through your body. This is because the body components such as your skin, fatty tissues, muscles and bones have different resistance's that vary with external influences, such as if your skin is wet or dry as wet skin has a lower resistance than dry skin, the amount of contact surface area and the contact pressure. The duration of the shock and the frequency of the voltage also determine the effect that the shock has on your body. The extent of the electric shock can vary from a tingling sensation to muscular contraction causing respiratory paralysis, ventricular fibrillation and the danger of severe internal and surface bums if not death. The effect will vary from individual to individual due to each person's unique physiology. The resistance of the skin can vary considerably for voltages below 50 volts and usually restricts the current to relatively safe levels. This is why electrical regulatory bodies such as The Office Of Energy in Western Australia classify Extra Low Voltage as 0 to 50 volts and do not require an electrical license when working on equipment operating up to 50 volts. The skin's resistance can decrease rapidly for voltages above 50 volts and the current flow through vital organs such as the heart is often life threatening, which is why an electrical license is usually required when working on equipment operating above 50 volts. The Office Of The Energy in Western Australia classify Low Voltage as 50 volts to 1000 volts and regulations require a Restricted Electrical License, an Electrical License or an Electrical Contractors License to work on equipment that operates with these voltage levels. Involuntary muscular contraction can occur at low levels of current and can lead to physical actions such as falling off ladders which will then lead to more serious physical injuries. One of the problems with electrocution is the failure for the victim to let go of the conductor or appliance because of muscular contraction, a factor that the rescuer must be always remember. The main cause of death from electric shock is ventricular fibrillation which is a condition of the heart in which bundles of muscles respond erratically caused by incorrect muscle timing, so consequently no blood is pumped, resulting in oxygen starvation to the brain which leads to death. Once ventricular fabrication is established it is extremely unlikely the normal operation of the heart will resume by its self This is why ambulance officers use a device called a defibrillator. Because the heart is made up from a lot of bunches of muscles, if a large DC voltage is applied directly to the body via the defibrillator's pads, the muscles can be made to squeeze together for a period of time then released. The heart muscles are momentarily exhausted for a while, until hopefully the heart will attempt to resume its normal rate.If fibrillation reoccurs again the procedure may have to be repeated. All electric shocks have to be reported to The Office Of Energy on 1800 678 198 so that they can investigate the cause of the shock and change work practices, regulations etc to try and ensure that it can be prevented from occurring again. All employers have to report electrical shocks, accidents and potential accidents to The Office Of Energy to ensure work standards are safe. It is absolutely imperative to seek medical attention after receiving a severe shock because internal parts that may have been burnt may release poisonous toxins after a few days which may kill the person even if they seen healthy. A first aid certificate would be usefull if you found a person lying on the floor unconscious from electrocution who was still touching the active appliance, as you would know how to assess and remove the danger, check for a response, clear the airway and check for breathing, check for circulation, carry out Expired Air Rescuscitation and Cardio-Pulmonary rescuscitation if required and call for help. AS 3859-1991 Effects of current passing through the human body. 50 Hz AC current Effect on human body (typical) 0.5 - 2 mA Threshold of perception 2 - 16 mA muscular contraction, experience pain 16 - 30 mA Respiratory paralysis 50 mA - 200 mA Ventricular fibrilation 200 mA ---> Burns to tissue and organs 1 amp is 1000 mA
global_05_local_4_shard_00000656_processed.jsonl/72750
Death To Planet Earth Lyrics Death to planet earth. Human scums infect your mind. Sodomize the earth and let your hatred be your guide! There is nothing more to see, nothing worthy your beliefs. Terrorize their world and see their hierarchy fall down! Co-operate with all Satanic forces of the world! Death to planet earth! Blood stained whores! Beings of our works: make dreams reality! Crush the unpure race of god! Death to planet earth! Assault those whores! - Fall down on the ground! Rape their minds! Death to planet earth! Correct these lyrics Official lyrics powered by Rate this song (current rating: not rated yet) Meaning to "Death To Planet Earth" no entries yet (*) required (*) required Characters count : (*) min. 100 characters required
global_05_local_4_shard_00000656_processed.jsonl/72751
Third Planet Lyrics Everything that keeps me together is falling apart, Your heart felt good it was drippin' pitch and made of wood Baby cum angels fly around you reminding you we used to be three and not just two And that's how the world began And that's how the world will end A 3rd had just been made and we were swimming in the water, didn't know then was it a son was it a daughter When it occurred to me that the animals are swimming around in the water in the oceans in our bodies and another had been found another ocean on the planet given that our blood is just like the Atlantic And how Correct these lyrics Official lyrics powered by Rate this song (current rating: not rated yet) Meaning to "Third Planet" no entries yet (*) required (*) required Characters count : (*) min. 100 characters required
global_05_local_4_shard_00000656_processed.jsonl/72752
Nonpoint - Circles Related Nonpoint Links Nonpoint Circles Circles Lyrics Going around in circles again. Pedal to floor, back in the seat, purpose and will verus modern machine. Passing the slow, defeating the weak, all with the tar on the street, and the weight of my feet the sweat on my face. Wanting first place for than you can understand. Going around in circles again. Photo finish race. Rear veiw stare chase. Satisfaction only when I finish at the end. If i follow all the rules, promise that i'll win? Driven so confused that im going around in circles again. Going around in circles again. Holding on by a thread. Cut me loose so I can contend. Hoping for something more then second place, first place or more. Where will I be when I get to the end? Doesn't matter what place i begin three hundred sixty-one degree's and then. Going around in circles again. Correct these lyrics Official lyrics powered by Rate this song (current rating: not rated yet) Meaning to "Circles" no entries yet (*) required (*) required Characters count : (*) min. 100 characters required
global_05_local_4_shard_00000656_processed.jsonl/72765
Sometimes inspiration hits when you're shooting zombies -- and often times, that inspiration is in the form of new, better ways to shoot zombies. Since this sort of thing (shooting zombies) is one of our passions here, we were pretty psyched when we ran across this video. Summoning all of his worldly resources -- including GlovePIE, PPJoy, and about a gazillion lines of code -- this guy is able to rock Left 4 Dead PC in split-screen mode with two Wiimotes. He's even added shake controls for reloading and spinning 180 degrees. The only catch? As it stands, the only way to power the sensor bar is by turning on the Wii -- a condition that should be remedied shortly. Hit the read link for instructions and code, and be sure to check out the video after the break. [Via Nowhere Else] Left 4 Dead PC Wiimote hack for the gamer who has it all, hates zombies
global_05_local_4_shard_00000656_processed.jsonl/72766
Here are five words you've heard before: "the world's fastest notebook GPU." Why, NVIDIA made just that claim two weeks ago, when it touted the GeForce GTX 580M as the nimblest card this side of Pluto. Not so fast, says AMD. The outfit just unveiled the Radeon HD 6990M with DirectX11 and HD3D support, and it insists this is the speediest GPU on the block -- specifically, up to 25 percent faster than any other GPU that's been announced to the public. And yes, AMD's well aware of that 580M. Just like NVIDIA came out swinging, making pointed comparisons to the Radeon HD 6970M, AMD's got some fighting words of its own: the company says the 6990M can whip the 580M in the benchmark AvP and games such as Batman Arkham Asylum, Dragon Age 2, Shogun 2, BattleForge, Left 4 Dead, Metro2033, Wolfenstein MP, The Chronicles of Riddick, and ET: Quake Wars. We don't need to remind you that these numbers merely represent the story each company wants to tell. Still, you get the idea: these are the top-of-the-line cards each has to offer at the moment, and they'll likely be competing for space in your next gaming rig. As you can imagine, the 6990M joins other Radeon HD cards in supporting the company's Eyefinity technology, as well as GPU app acceleration. Let it be known, too, that while the 6990M supplants the popular 6970M as far as performance claims go, AMD tells us the 6970M will still be available for the foreseeable future. Speaking of availability, the 6990M will be offered in the Alienware M18x -- right alongside NVIDIA's 580M. Additionally, you'll find it packed inside Clevo's P170HM and P150HM. And you didn't think we forgot about specs, did you? Head on past the break to find the full PR, along with a handful of technical details straight from the horse's mouth. Show full PR text AMD Launches AMD Radeon™ HD 6990M - World's Fastest Single Mobile Graphics Processor -- Newest addition to AMD Radeon™ family raises the bar on unprecedented GPU power for mobile gaming enthusiasts -- SUNNYVALE, Calif. - Jul. 12, 2011 – AMD (NYSE: AMD) today launched the AMD Radeon™ HD 6990M GPU – the world's fastest single mobile graphics processor – an uncompromising GPU that delivers massive computing power to mobile users. The AMD Radeon HD 6990M GPU was measured to be up to 25% faster than any other announced notebook enthusiast GPU1. Furthermore, hardcore gamers can experience additional gaming performance through AMD CrossFireX™ technology. The AMD Radeon HD 6990M also represents a significant upgrade from AMD's current gaming notebook graphics solution, the AMD Radeon HD 6970M, raising the bar from both a performance and image quality perspective. With support for DirectX® 11, users can expect ultra-fast frame rates and superior image quality, which gives gamers every advantage their desktop computers once enjoyed exclusively. With AMD Eyefinity technology users can immerse themselves in an ultra-rich environment that supports up to six displays.5 The AMD Radeon HD 6990M graphics processor also delivers AMD App Acceleration technology6, which uses the power of the GPU to improve video playback, streaming and faster web browsing with Internet Explorer 9 and Mozilla Firefox. AMD HD3D technology7 ensures mobile users aren't just watching videos or viewing pictures -- rather they become immersed in a truly stereoscopic 3D environment backed by an open ecosystem with supporting software and hardware. "At its core, the Alienware brand is about pushing the limits and finding new extremes in gaming performance," said Arthur Lewis, Vice President and General Manager for Alienware. "By offering two AMD Radeon HD 6990M graphics processors in our flagship M18x laptop, Alienware and AMD have come together to provide gamers the ultimate mobile experience." As the PC gaming technology leader, AMD is dedicated to delivering the fastest technology and industry support needed to help create the best possible gaming experience on the PC. Whether it's driving up frame rates, extending quality settings or pushing clock speeds8, the AMD Radeon HD 6990M GPU is the ideal notebook for hardcore gamers looking to run the industry's most demanding DirectX 11 games such as Dragon Age 2, DiRT 3 and Shogun 2. "Eurocom high performance notebooks offer exceptional performance with the addition of AMD Radeon HD 6990M graphics," said Mark Bialic, President, Eurocom. "Our customers can expect record breaking gaming with unmatched realism and blistering speeds in all Eurocom systems powered by AMD Radeon HD 6990M in both single and AMD CrossFireX configurations!" AMD announces the Radeon HD 6990M, has some pointed words for NVIDIA
global_05_local_4_shard_00000656_processed.jsonl/72774
AMP: Novell Pumps up the Volume on Open Source - Page 2 By Hallett German | Posted Jan 28, 2003 Page 2 of 4   |  Back to Page 1 Print ArticleEmail Article • Share on Facebook • Share on Twitter • Share on LinkedIn NAMP 101 We will now discuss some Novell extensions and standard features for each of the four components -- Apache, MySQL, PHP, and Perl -- in the AMP suite. Apache HTTP (Web) Server, based on the old NCSA Web Server, has been available since 1995. It is overflowing with features "out of the box" such as built-in CGI, Perl, PHP, Java Servlets, Server-Side Includes (SSI), Multi-homed support, customized logging/error messages, and much more. Apache's most popular features include: • Highly extensible and configurable web server -- Using the Apache API, you can create or use third-party modules to provide additional functionality. Configuration is handled by changing values in various text files. The main file is httpd.conf. These files also have numerous command line arguments that can be set. • Multi-platform support/portability -- This includes various flavors of UNIX, Windows, Mac OS X, and others. • Robust and scalable server performance -- This includes Multi-process Modules (MPM) that are operating system-specific. • Strong security -- SSL support, granular file access protection (i.e. host name, IP address, group), and more. Netware-specific Apache features • Apache Farm configuration administration can be done using eDirectory • LDAP and caching modules • Two sample applications, PHPMyAdmin, a GUI-based MYSQL database and server manager, and John's LDAPWeb, an LDAP tree browser compatible with eDirectory MySQL was developed by TcX in 1996. It has become a popular multi-threaded relational database and management system that offers: • Robust and scalable performance -- Support for many simultaneous connections. • Comprehensive database functionality -- Support for commit, rollback, crash-recovery, row-level locking, database replication, query caching and more. • Very strong security -- SSL encryption, ability to limit access by columns/rows, ability to limit host privileges, etc. • Multiple platform support/portability -- This includes various flavors of UNIX, Windows, and Mac OS X, as well as support for ODBC, C++, Perl, JDBC, ANSI SQL 92, PHP, etc. Netware-specific MySQL features • Particularly useful for MySQL application vendors, AMP MYSQL includes a commercial license for MySQL. • PHPMyAdmin for MySQL management. • Nakoma will likely include disk/hardware features such as MySQL cluster failover, the ability to implement cluster architecture to eliminate single points of failure, and dramatically improved performance. • The Perl directory tree includes a script called used as a starting point for creating MySQL queries, as well as other scripts to access other types of databases (Oracle,Btrieve, etc.) and network volumes. PHP or PHP: Hypertext Processor -- In 1995 Rasmus Lerdorf created PHP as a server-side scripting language that doesn't require sysadmin privileges (PHP originally stood for Personal Home Page). The highly portable language is currently supported on many UNIX flavors, Windows, and other environments with built-in seamless connectivity with other databases, standards, and programming languages. It is simple to use and integrates well with HTML. For example, the following PHP script: <?php echo "<b>PHP rocks</b>"; ?> produces the HTML code: PHP rocks. PHP can easily be used to add dynamic features to existing static HTML web pages. Server-Side Include (SSI) support allows PHP code to be stored in one file and invoked from multiple places like CGI scripts. It also has stronger security features "out of the box" than CGI scripting languages. Netware-specific PHP features Novell has successfully tested the following third-party PHP and Perl scripts: PHProjekt, PHPNuke, XOOPS, and Incyte Project Manager. Many other scripts will work with AMP as well, including a large collection available from Novell has conveniently included PHP extensions for LDAP access, MySQL access, SMTP mail access, and a webdemo directory that contains some sample scripts to try out (FTP session, LDAP Query, etc.). Perl was created in 1987 by Larry Wall as a reporting, extraction, and utility language. • Multiple platform support/portability -- This includes support for many UNIX flavors, Windows, Mac OS X, and other environments. • Extensive interoperability with other software -- Interoperability with third-party databases through DBI interface, network sockets, C/C++, LDAP, NNTP, HTML, and much more. Powerful data extraction and reporting capabilities make it a particularly attractive platform. It leverages the strengths of the best languages in the UNIX world. • Strong security support -- This includes access control, TaintPerl to check for security holes, and support for secure setuid and setgid scripts. Netware-specific Perl features Perl will execute any scripts located in or under sys:\perl\web\. Perl can run any scripts from the system console command line if they are located in or under the sys:\perl\scripts. If scripts are stored in sys:\perl web directory, then they can be run from a Web browser with the following command: http://<servername>/perl/<script_name> Novell has included a number of modules to access databases. The DBD:mysql module is specifically for MySQL access, but Pervasive.SQL 2000 and MS-Access are accessible as well. For other databases, UCX (Universal Component Extension) and other methods are also provided. Novell has also provided a LDAP module to access eDirectory. Page 3: AMP Interoperability Comment and Contribute (Maximum characters: 1200). You have characters left. Get the Latest Scoop with Enterprise Networking Planet Newsletter
global_05_local_4_shard_00000656_processed.jsonl/72783
February 19, 2013, 11:26 am Content Cover Image Mexican (or Brazilian) Free-Tailed Bats, Tadarida brasiliensis, emerging from Carlsbad Caverns, Carlsbad Caverns National Park, New Mexico. (Source: Nick Hristov) The term endotherm refers to animals (birds, mammals, some fishes and insects, and even some plants) that are capable of generating sufficient amounts of heat energy to maintain a high core temperature (e.g. 37-40 °C in birds and mammals) by metabolic means – usually derived from aerobic activity of locomotor muscles in animals and by unique biochemical mechanisms in plants (e.g., skunk cabbage). Endotherms differ from an ectotherm because they typically have core temperatures above that of the surrounding environment, whereas the core temperatures of ectotherms depend on external sources of heat – primarily from solar radiation. caption Brazilian free-tailed bat (Tadarida brasiliensis). (Photo: J.S. Altenbach) Endothermic animals, birds, and mammals that regulate their core body temperature at a relatively constant level are referred to as homeotherms (Greek homeo = similar). To maintain a constant body temperature, a homeotherm must balance heat loss with heat production. Heat loss is minimized in most mammals by having a thick coat of fur or thick layer of subcutaneous (beneath the skin) fat, whereas heat loss is promoted by sweating, panting, or by seeking shelter in cooler environments. Endotherms are sometimes referred to as "warm-blooded," but this term is inaccurate and misleading, as is the term "cold-blooded" for ectotherms. For example, the body temperature of a small tropical fish in warm water or desert lizard on hot sand (both of which are considered ectotherms) may have body temperatures higher than birds or mammals in the same environment-largely because of the insulation provided by feathers and fur and associated behavioral and physiological heat-dissipating mechanisms that prevent their body temperatures from increasing above critical temperatures. Many ectotherms are able to regulate their body temperature behaviorally, by moving into and out of sunlight. Most endotherms are homeotherms, but by definition, some large reptiles (crocodiles and some of their extinct relatives-dinosaurs), as well as some large fish (tuna) and night-flying moths, are considered endotherms, because of the metabolic activity of skeletal muscles that generate large amounts of heat. However, because these endotherms lack a layer of insulation and do not have a thermostat that regulates either heat production or heat dissipation, they are considered poikilotherms (Greek poikolos = changeable). Some mammals and birds that at times have high and well-regulated body temperatures, but at other times they are more like ectotherms and are referred to as heterotherms (Greek hetero = different). Heterothermy is characteristic of small hibernating rodents and bats. Further Reading Kunz, T. (2013). Endotherm. Retrieved from http://www.eoearth.org/view/article/152422 To add a comment, please Log In.
global_05_local_4_shard_00000656_processed.jsonl/72787
No matter if you use a DHCP connection (which means you have a different IP address for each connection – every 56k and ISDN line, and some DSL and Cable lines) or a static IP one, if you have a server installed on your machine, you may take advantage by "changing" your IP with a named address (for example, "" instead of ""); for instance, the users of your server would easily remember your address. This can be done for free, using both a service which mantains a DNS (Domain Name Server – a server which is capable of telling you the IP corresponding to an alias, like "", that would correspond to "" as in the example above), and a small program which checks your IP every "n" minutes, and if it changed since the last time, sends the updated information to the service itself. So, very briefly, someone who knows you have an FTP server responding, for example, at the address, port 21, would have his FTP client asking to the DNS of the service to tell him your true IP, and then would directly connect to that IP… still the only information he must remember is "", and not your true IP, which is much more difficult to keep in memory). To the practice now: there are more than one way to achieve this, and they depend from the small program you use to send out your IP. Every free service suggests free utilities to update the IP automatically, and since I wrote this guide years ago, the only service still operating is DynDNS allows you to choose aliases different from the principal domain (which means, you can get "", but also "", "", and several others).
global_05_local_4_shard_00000656_processed.jsonl/72807
From Dust PC release date pushed back For heaven's sake. The PC version of From Dust, Eric Chahi's striking attempt to reinvent the god game, has been pushed back until 17th August, Ubisoft has confirmed to Joystiq. It had been due to launch in tandem with the Xbox Live Arcade version later this week. No reason for the delay was offered. A PlayStation 3 version is also planned, but is currently without a release date. Take a look at our recent From Dust preview for more on what to expect from Chahi and his team. Mesmerising new From Dust footage Comments (63)
global_05_local_4_shard_00000656_processed.jsonl/72821
From Evoio Jump to: navigation, search Phylotastic logo.png Phylotastic at iEvoBio 2013! Sorry! This wiki is a bit of mess. Right now, the best ways to find out about the project are 1. play the live demos and screencasts 2. read the recent BMC paper (open access) 3. talk to someone who is involved (see the participants of hackathon #2 or leadership team roster 4. for the stout-hearted, dive into the code on GitHub If you want to comment on the project, use the hashtag #phylotastic or leave a comment on the recent BMC paper Please bear with us while we work to refactor and update the material on this page. fixing this page (burn after reading) Our web home at points to this page as the "wiki". This should be the place where people come to find out more about the project. In particular we want to make this site useful for: • personnel from other projects who might want to work with us to integrate resources • anyone who might be in a position to offer support ($$, programmer hours, meeting resources) or influence decisions • programmers who might be interested in contributing • end-users who might want to use the system, or make suggestions Here is a list of things to be done: miscellaneous links to keep (use or discard after rewriting) this section should have an up-to-date lead (short!) summarizing the current state of the project and future challenges Phylotastic is conceived as a community-sustainable delivery system for tree-of-life knowledge, enabling convenient, computable, credible access to expert knowledge of species phylogeny through composition of separate web services that follow defined interfaces. When complete, Phylotastic will allow any scientist, educator or student to input a list of species and obtain a phylogeny in ready-to-use form on the fly. Phylotastic is the primary product of the NESCent’s Hackathons, Interoperability, Phylogenies (HIP) working group. It was conceived by the HIP leadership team in January 2012, and was initiated by several dozen participants at a NESCent hackathon on June 4-8, 2012. A second hackathon took place at iPlant’s headquarters in Tucson, Arizona on January 28 through February 1, 2013. What's phylotastic Tree Storage • Architastic (page in progress) Ben • demo with 2 different treestores-- OToL and RDF-- including TNRS + tree finding + pruning • wiki page by Shannon • + DateLife is in progress • Ben, Karen, Derrick, Shannon, Naim, Mark, Cody, Rutger • google folder • Tree Annotation - Enrico, Hilmar, Ramona, Joachim, Arlin and part of Andrea • slide presentation - 10 trees annotated, checklist form, MIAPA ontology, • demo (Joachim) • wiki documentation (Arlin) Shiny stuff this is a stub for a catch-all section with links to technical content, resources, and further information browse site
global_05_local_4_shard_00000656_processed.jsonl/72846
My First Kiss i can still feel the feeling within my stomache. we were in the stairwell at school. i was 11 in the 6th grade. we had it all planned. i still remember everything about him. His blonde hair blue eyes. we were standing on the fourth stair from the top we hurried and kissed and i bit his lip. it happened so fast. his face turned red and im sure mine was red too, seeing how i just bit him. we went on 2 class and that was that. luvlitabby luvlitabby 26-30, F 3 Responses Jan 20, 2011 Your Response I envision it being with us that way too.<br /> <br /> Oh btw, when are going to make love? aww that's really sweet Hmm, That was all? ...go on Mss
global_05_local_4_shard_00000656_processed.jsonl/72862
Flower Power Makeup Part II: Lips Welcome to Part II of Flower Power Makeup. This installment features floral inspired lip glosses. Spring is here and that means all things flowery. These three glosses are a bit cheeky but they make for great gifts with their bright colors and springtime cheer. Enjoy! Fresh Gloss Absolute, $24, is a gloss with a sweet citrucy smell and taste that helps to keep your lips hydrated! It is made with pomegranate extract to plump and vitamin E to soothe. Available in: Rose Parfait (sheer red), Bellini (light, shimmery pink) and Dahlia (sparkly peachy/apricot color). This is a Fab favorite - she just adores the packaging and texture of this gloss! For two more flower power lip glosses, read more Claire's Flower Lip Gloss, $5.50, is a clear plastic set of 18 sparkly and super sheer lip glosses that are shaped in the form of a flower. Each gloss snaps open and the stem even holds a clear gloss as well as a mini lip brush. This is too cute! Tropez Lip Gloss in Baby's Breath, $2, is a potted lip gloss that won't break the bank and is available in six different and fresh shades - all of which have cute, floral names. Flower Power Makeup Part II: Lips  originally posted on POPSUGAR Beauty
global_05_local_4_shard_00000656_processed.jsonl/72866
Matthew Thornton Thornton, Matthew, 1714–1803, political leader in the American Revolution, signer of the Declaration of Independence, b. Ireland. Taken to America as a child, he studied medicine and in 1740 began practice at Londonderry, N.H. He served as an army surgeon in the French and Indian Wars and held political posts in New Hampshire before and after his term in the Continental Congress (1776–77). See biography by C. T. Adams (1903). More on Matthew Thornton from Fact Monster: See more Encyclopedia articles on: U.S. History: Biographies
global_05_local_4_shard_00000656_processed.jsonl/72873
Home>Topics>Water Softener Repair Water Softener Repair Solve your hard water problems with these water softener repairs. 1. Water Softener Problems Other Projects for DIYers from The Family Handyman: 1. How to Rebuild a Water Softener Rebuild the control valve on your water softener and restore your softened water flow. It only takes an hour once you find the correct rebuild kit. 2. How to Repair a Water Softener 3. Fix a Water Softener You can often fix water softeners by checking the brine tank for salt problems or simply cleaning the resin bed or several other key parts. All are easy to do and you might avoid the expensive service call. 4. Replace a Water Softener Resin Bed 5. How to Plumb a Water Softener The plumbing hookups on a water softener can be confusing, but we'll show you how the connections should be made. You don't have to be a plumber to connect a water softener. We make it easy to understand even for a beginning DIYer. Free OnSite Newsletter Follow Us Featured Product Buy Now
global_05_local_4_shard_00000656_processed.jsonl/72932
SPECIAL OFFER: - Limited Time Only! (The ad below will not display on your printed page) Skin-Sational: 5 Ways to Rewind the Beauty Clock You'll jump through hoops to keep your body looking young (and you have the legs to prove it!), but what are you doing to stave off the signs of aging skin? Here's how to turn back the clock. Healthy, glowing skin Prevent Dullness As we get older the rate of skin-cell turnover starts to slow, causing a buildup of dead skin. And the pace at which these cells are shed isn't the same all over your face. Cells in the T-zone, where there are more oil glands, tend to get replaced faster than the skin on the sides of your face. The result? A patchy effect that interrupts light reflection. But it's easy to get glowing again. Your superstar ingredient: Glycolic acid It helps break apart the gluelike substance holding dead skin cells together, Dr. Alster says. The result: An even, more luminous surface. How to use it: Glycolic acid can irritate skin. If you can tolerate the ingredient, smooth on a moisturizer containing it daily, or try it two times a week if you have sensitive skin. If that's still too aggravating, try a glycolic-based cleanser, which rinses away dead skin. FITNESS faves: Peter Thomas Roth Glycolic Acid 10% Moisturizer ($45, sephora.com), and DermaDoctor Litmus Test Glycolic Acid Facial Cleansing Gel ($25, ulta.com).
global_05_local_4_shard_00000656_processed.jsonl/72933
Follow us on Pinterest Welcome! Log In | Register | Basics: How to Apply Bronzer Beauty Basics: How to Apply Bronzer Bronzer can be intimidating—one wrong brushstroke and you can look orange, streaky or fake baked. But with these easy tricks from Giorgio Armani makeup artist, Tim Quinn, we'll show you how to get a subtle, sun-kissed glow in seconds. Hey guys. I'm Molly, the Associate Beauty Editor at Fitness Magazine, and today we're talking about bronzer. So, bronzer can be intimidating. Nobody wants to look orange, or streaky. But I recently got the chance to sit down with Tim Quinn, a Giorgio Armani makeup artist. And he gave me all the insider tricks. To get a sun-kissed glow like this in just seconds. Okay, so the first thing we need are the right tools. So, for foundation, I just like to use a flat foundation brush like this one from Bobby Brown. And for bronzer, I just like to use a big powder brush. So this one is from Eco Tools. It's called their domed bronzer brush. And the bristles are medium length and medium density. So somewhere in between really fluffy and super tightly packed. For your bronzer, Tim told me that powder formulas are the easiest to apply. So the trick is to look for one that's two shades darker than your natural skin tone. So this one here is from Physician's Formula. And this works really well for light skin tones, and this one is from Giorgio Armani, and it works really well for medium to dark skin tones. Both of these have a little touch of shimmer in them. Anything that is too matte can look muddy on your skin, and anything that's too shimmery looks glittery and fake, so you want to find something with just a hint of shimmer in it. Okay, so now that we have all of our tools, we can just get started. So I'm gonna start by applying a light layer of foundation on my skin. And this is going to even out my skin tone. If you don't usually apply foundation, that's totally fine. You can. Just apply your moisturizer and put your bronzer right on top. But I find that applying your foundation kind of gives your bronzer something to grip onto, and that's gonna help it last longer and not fade away so quickly. So I'm just applying this all over my face and blending in. [MUSIC] Next up, bronzer. So you're just gonna take your bronzer and swirl your brush in. Kind of tap it in. And then blow off any excess. [NOISE] It's very easy to build up your color, but it's very hard to take it down if you've gone too dark, so start light and build it up. [MUSIC] And then Tim told this amazing trick. So, you're gonna start at your temple and make kind of a three with your brush as you go down the side of your face. So you're gonna start here, come around under your cheek bone, back and around your jaw line. And I just like to use really quick short strokes. You don't have to do it all in one. It doesn't have to be perfect. Just go with whatever feels comfortable. So I kind of start here and I can tell just by feeling my brush if I need more product so I'm just gonna tap more bronzer on as I go. You're going to come around the side, and it's okay to brush it back into your hairline. That looks natural, it looks like where the sun has naturally kissed your face. You're going to come down here underneath the cheekbone, and if you need help finding that area just do a fish face, and then you're going to come down here underneath the jaw line. And what's, what that's doing is tracing your bone structure and it's kind of defining those areas. [MUSIC]. Okay, so now I'm gonna do my three, but on the other side of my face. To balance it out. So again, you're just gonna start right up here at your hairline, on your temple. Come down underneath your cheek bone, around and underneath your jaw. Okay, so I have my threes completed on either side of my face, and if you can see, the effect is that the hint of light is kept in the center of your face, kind of here on the center of your forehead, but there's a bit of shading around your bone structure. And that's the most flattering effect, but it looks very natural. So at the end I just connect underneath my chin here connect up at the forehead and then you want to tackle the nose so your going to come down on your nose and brush on either side you don't have to go too dark but remember your nose is one of the highest points of your face so that does get a lot of sun. So you don't wanna forget about that. So one stroke down, a couple on each side, and then you're just gonna kinda blend all around. Now I'm gonna go back and take my foundation brush from early, and it still has a tiny bit of foundation left on it, and this is gonna help me blend even further. You don't want any lines. The demarcation on your face. That's gonna look too obvious. So, just a tiny bit of foundation on your brush. Your just gonna blend underneath the eyes, around the mouth, up into the forehead. And like I said. You wanna keep the focus of light in the center of your face. That's gonna be very flattering. [MUSIC] This next part is so important, how many times have we seen a girl with. Her face a different color than her neck. So you have to remember to blend everything down into your neck. So I'm gonna load my brush up again. And you basically just connect your chin and your jaw line with your neck. So this big brush makes it really easy to do so. Don't forget behind your ears. Especially if you're pulling your hair up. Then I just take it straight down. And if you have, like, a low cut top you can just take it down your decalotage. [MUSIC] Okay. So the last step to finishing off this bronzed look is I like to just apply a little bit of pink blush to the apples of my cheeks. So, you're just gonna smile [INAUDIBLE] the apples of your cheeks. Dust a little bit on, and you're all set, perfectly sun-kissed. [MUSIC] More Smart Savings
global_05_local_4_shard_00000656_processed.jsonl/72935
Gisele Bundchen's Weight Loss Secret Was Exercising During Pregnancy Gisele's Secret to Losing 30 Pounds of Baby Weight Sporting referee stripes, Brazilian model Gisele hit the runway last weekend in a sheer shirt/bra ensemble. It's not a big deal for a model to show some skin, but it's the first time she's hit the runway since giving birth to her son Benjamin last October. It didn't take Gisele very long to shed her baby weight — just six months after giving birth, she modeled a bikini in the pages of Vogue. One of the reasons she bounced back so quickly is that she stayed active while pregnant. Gisele told a Brazilian newspaper, "I did kung fu up until two weeks before Benjamin was born, and yoga three days a week." She was also "mindful" of what she ate, which meant not overindulging or eating for two. It's important for women, whether they're models or not, to remain active during pregnancy. As with Gisele, it can make it easier to drop the baby weight once your little one arrives, but there are also numerous benefits during the pregnancy. Many women swear that it helps them maintain a healthy weight while pregnant. It can also alleviate uncomfortable symptoms including back pain, leg cramps, fatigue, and sleep issues, and can lift your mood when hormones get the best of you. Not to mention, it'll keep your body strong and prepare you for childbirth. It's recommended to do 30 minutes of moderate exercise a day, including running (if you were doing it pre-pregnancy), walking, swimming, yoga, and strength training. Be sure to check in with your doctor about appropriate forms of exercise for you. Above all else, listen to your body, don't overdo it, and if certain types of exercise cause pain, don't do them. And once that little bundle of joy is born, talk with your doctor about when it's appropriate for you to get back to a workout routine. Source: Getty
global_05_local_4_shard_00000656_processed.jsonl/72951
Jump to content  Welcome to FlyTyingForum.com Drying small feathers • Please log in to reply 6 replies to this topic #1 JockeH • Members • PipPip • 10 posts Posted 02 October 2006 - 08:13 AM I got a shopping bag full of feathers from my friend who is a hunter. After i washed them i got thinkin how shoulld i dry and sort them. This is what i came up with. I put all feathers in a bucket and took a hairdryer and started drying them, when a feather was dry it automaticly "fly" out of the bucket. So i sat down on the floor and sorted all feather afterwards. /Joakim H #2 fly time fly time I love country boys!! • Members • PipPipPip • 2,753 posts Posted 05 October 2006 - 10:20 PM Makes sence! #3 Joe Hard Joe Hard Will Work For Bolgna • Members • PipPipPip • 7,829 posts Posted 05 October 2006 - 10:48 PM Great idea, I think I would of swept them up and put them on a table, then sorted. I am to lazy to sit on the floor. Got me thinking now, that a screen over the bucket would save us bowth a hassle. #4 steelprince Advanced Member • Members • PipPipPip • 79 posts Posted 07 October 2006 - 12:45 AM I use a square cardboard box. i glue the flaps down on the inside bottom, remove a pair of flaps from the top, cut a square flap out for inserting and removing materials, cut a circle hole to fit blow dryer nozzle, and tape most of the open edges closed to trap as much air as possible, but allowing for circulation. I cover the flap with a book or what ever is available. #5 JockeH • Members • PipPip • 10 posts Posted 07 October 2006 - 03:16 AM I use speed 1 on the hairdryer so the feathers didn't fly so long just about maximum 1 meter from the bucket. I didn't have any table with enough free space so my only options was to clean a table or use the floor, i chosed the later one cool.gif #6 hectortmc Advanced Member • Members • PipPipPip • 43 posts Posted 27 October 2006 - 12:17 AM When I dry feathers I use a mesh dryer bag and put the feathers in it and throw it in the clothes dryer. Check on them a couple of times when they are dry just unzip the bag and sort them out. #7 MTtyer Advanced Member • Members • PipPipPip • 131 posts Posted 28 October 2006 - 11:39 PM I used a vaccum cleaner bag once...had to punch a jillion little holes in it with a bodkin to allow for circulation but the opening fit over the hair dryer just fine. I kept the dryer on low and shook the bag as the material dried...worked just fine. "....how a culture relates to and encounters nature is the only valid criterion for judging it's quality." - John Gierach
global_05_local_4_shard_00000656_processed.jsonl/72958
Tested and Perfected by Food and Wine Crispy Pork Cutlets with Citrus Sauce • FAST Regular dry bread crumbs can be used to coat the pork slices here, but the coarser panko (Japanese bread crumbs) make a crisper crust. Plus: More Pork Recipes and Tips 1. 1 tablespoon soy sauce 2. 2 teaspoons Dijon mustard 3. 1/4 cup fresh orange juice 4. 1/2 cup all-purpose flour 5. 2 large eggs 6. 2 tablespoons water 7. 2 1/2 cups Japanese panko or dry bread crumbs 8. 1 pound pork tenderloin, cut into twelve 1/2-inch-thick slices and pounded 1/8 inch thick 9. Salt and freshly ground pepper 10. Vegetable oil, for frying 11. 1/2 cup coarsely chopped fresh orange or tangerine sections 1. In a small bowl, stir the soy sauce with the mustard and the orange juice until combined. Set the sauce aside. 2. Put the flour in a shallow bowl. In another shallow bowl, beat the eggs with the water. Spread the bread crumbs in a third shallow bowl. Season the pork slices with salt and pepper, then dredge them in the flour, shaking off the excess. Dip the slices in the beaten egg and then coat them completely with the pankobread crumbs. 3. In a large skillet, heat 1/4 inch of vegetable oil until shimmering. Working in batches, fry the pork slices over high heat until they are browned and crisp, about 2 minutes per side; if the pork browns too quickly, lower the heat. Transfer the fried pork to paper towels to drain, then keep the slices warm in a low oven while you fry the rest. 4. Arrange the pork slices on plates. Top the pork slices with the chopped orange sections and serve, passing the citrus sauce at the table.
global_05_local_4_shard_00000656_processed.jsonl/72959
Tested and Perfected by Food and Wine Rich and Creamy Salsify Gratin • ACTIVE: 1 HR • SERVINGS: 10 Salsify is a root vegetable that's shaped like a skinny parsnip and has blackish skin with white flesh. It tastes a little like artichoke hearts. It's available from June through February. Plus: Ultimate Holiday Guide 1. 3 pounds salsify 2. 2 tablespoons unsalted butter 3. 2 tablespoons all-purpose flour 4. 1 quart half-and-half 5. Salt and freshly ground pepper 6. Freshly grated nutmeg 7. 1/4 pound Monterey Jack cheese, shredded (1 cup) 8. 1/4 pound Gruyère cheese, shredded (1 cup) 1. Fill a large bowl with water. Peel the salsify and trim the ends. Transfer the salsify to the water as you peel it. Using a mandoline or the slicing blade in a food processor, slice the salsify 1/4 inch thick. Return the salsify to the water to keep it white. 2. In a large soup pot, melt the butter. Add the flour and cook over moderate heat for 2 minutes, whisking constantly. Add the half-and-half and bring to a boil, whisking constantly. Cook, whisking, for about 3 minutes, or until the half-and-half is slightly thickened. Season with salt, pepper and nutmeg. Drain the salsify and pat it completely dry. Add the salsify to the pot and cook over moderate heat, stirring occasionally, until tender, 25 to 30 minutes. 3. Preheat the oven to 400° and position a rack in the upper third. Pour the salsify mixture into a 9-by-13-inch baking dish and sprinkle with the cheeses. Bake for about 20 minutes, until the cheese is melted and the gratin is bubbling. Preheat the broiler and broil the gratin for about 5 minutes, or just until the cheese is golden and crusty. Let the gratin stand for 10 minutes before serving.
global_05_local_4_shard_00000656_processed.jsonl/72986
Foresight Nanotech Institute Logo Image of nano Laying pure nanotubes in square grids from the square-one-for-nanotube-chips? dept. IBM grows nanotube patterns on silicon wafers, a September 30 EETimes article reported that IBM has grown catalyst-free nanotube networks on silicon carbide substrates, producing "grids of nanotubes (in rows and columns), bringing the promise of nanotube transistors arrayed across silicon chips one step closer to reality". The carbon nanotubes were produced by an IBM-patented process that uses no metal catalyst, and thus produces purer nanotubes without metal contamination. "We have shown that pure, catalyst-free nanotubes that follow the atomic structure of a surface can be grown," said Phaedon Avouris, manager of nanoscale science at IBM Research. "Using atomic-force microscopy, we also showed that at high temperatures they can be moved on the surface, and that [when they cool] they become stabilized in directions that are parallel and perpendicular to the [wafer's patterned] step edges. Leave a Reply
global_05_local_4_shard_00000656_processed.jsonl/73016
Pick a Free OS One chapter is devoted to differences between resources in the material world on the one hand, and the software/infoware world on the other. “Widespread use of open source software tends to increase its value, as users fold in their own fixes and features. In this inverse commons, the grass grows taller when it’s grazed on,” Raymond contrasts. The hacker culture has some elements of a ‘gift culture,’ where participants compete for prestige by giving away time, energy and creativity. “In a gift culture, social status is determined not by what you control but what you give away,” observes Raymond. Raymond digs deeper into hacker culture to reveal variations in ideology and beliefs: anti-commercial, un-commercial, market-friendly, and pragmatic. “Not until the Linux explosion of 1993-94 did pragmatism find a real power base. The typical pragmatist attitude is only moderately anti-commercial, and its major grievance against the corporate world is not ‘hoarding’ per se but that world’s perverse refusal to adopt superior approaches incorporating open standards and open software,” according to Raymond. Linus Torvalds, for example, looked benignly on the growth of a commercial Linux industry, publicly endorsed the use of high-quality commercial software for specific tasks, and gently derided the more purist and fanatical elements in the hacker culture. Outside of Linux, other Open Source communities developed around languages like Perl, Tcl and Python. Typical styles of Open Source project management are ‘benevolent dictator’ (Linux), voting among co-developers (Apache), and ‘rotating dictatorship’ (Perl). One chapter is devoted to for-profit and non-profit business models of Open Source development. It is important for companies to identify which business models create niches where open source development can flourish. For instance, the Apache Web server was built by an Internet-connected group of Webmasters who realized that it was smarter to pool their efforts into improving one code base than to run a large number of parallel development efforts. Cisco open-sourced its print spoolers to effectively hedge against the loss of the software’s original developers. Netscape open sourced its browser code to prevent extinction at the hands of Microsoft; Apple has also open-sourced Darwin, the kernel which is the core of the Mac OS X operating system. Cygnus Solutions and Red Hat sell branded versions of bundled open source software with support contracts; the Linuxcare startup was funded to specialize in Linux technical support.
global_05_local_4_shard_00000656_processed.jsonl/73018
MSK imaging: There are two fundamental tenants of MSK imaging :  Definition of normal anatomy 2.  Detection of abnormal fluid or abnormal enhancement(pathology): Therefore, basic MR protocols include anatomy defining sequences such as: T1, GRE's and Proton Density (PD or 1st echo T2) and fluid sensitive sequences such as Inversion Recovery (IR) and PD fat saturation, although there is overlap between them.  T1 post-intrarticular and post-intravenous contrast are also used, for definition of anatomy and detection of pathology respectively. All MR protocols assume 1.5T or greater and appropriate phased array surface coils where possible. The positioning of the patient must also be taken into account in certain instances to better align the anatomical structure being studied. Sequences Defining Anatomy Proton Density (intermediate-weighted) T1FS intra-articular Gradient Echo • What attributes make a sequence good for defining anatomy? 1. Proper balance between signal to noise ratio (SNR) and resolution 2. Optimizes visualization of inherent tissue contrast 3. Fast acquisitions (reduces motion artifact) 4. Orientation along anatomical structure being studied T1 (short TR/TE) Note how the inherent T1 tissue contrast is optimized by the sequence, and how the bladder is low signal. Bright On T1: • Fat • Gadolinium • (And occasionally encountered in musculoskeletal imaging: proteinaceous fluid and subacute hemorrhage Proton Density (long TR/short TE) Confusing terminology: The term Proton Density is actually an inaccurate term, as it implies that the only contrast mechanism of the image is based on differences in proton density. In fact, contrast is predominantly derived from intermediate weighting between T1 and T2.  Most, so called PD sequences have TRs that are too short to completely eliminate T1 contrast and TEs that are too long to completely eliminate T2 contrast.  Intermediate-weighted is a more accurate term, as is well depicted by the bladder in this image. The PD sequence is also often the 1st echo of a dual-echo T2 sequence. T1 fat suppressed, intra-articular gadolinium T1 fat suppressed, intra-articular gadolinium sequences result in a high signal to noise ratio and joint distension.  This allows visualization of structures that are normally too crowded to fully visualize. Note: the subcutaneous fat is bright due to inhomogeneous fat suppression, a very common artifact. 3D, fat suppressed, Gradient Echo Gradient echo techniques are particularly effective in assessing cartilage due to their ability to obtain thin sections.  Fat suppression may be used with gradient echo and eliminates chemical shift artifact that can distort the cartilage-bone interface. In addition, fat suppression narrows the gray scale range, providing greater contrast. Sequences detecting abnormal fluid/enhancement: Proton Density (PD) (intermediate-weighted) fat suppressed Inversion Recovery (IR) T2 fat suppressed T1 post IV gadolinium fat suppressed • PD/T2 fat suppressed and IR sequences are all sensitive to the detection of fluid, although they obtain these results by different mechanisms.  PD gives higher SNR, while T2 and IR are more sensitive to fluid. • T1 post gadolinium fat suppressed (T1 PGfs) sequences are more commonly used in MSK MR for additional evaluation of a lesion rather than the initial detection of that lesion. • *Keep in mind that chronic injuries/changes may not have edema, and that detection of chronic pathology may solely depend on detection of aberrations in anatomy. PD Fat saturation (Long TR/Short TE) The conspicuity of fluid is maximized while maintaining a high SNR. Fat suppression narrows the gray scale range, allowing for increased contrast. Inversion Recovery Note how the T1 signal intensity of fat has been nulled, resulting in decreased SNR but distinct fluid, as is well depicted by the bladder in this image. T2 fat suppressed T2 fat suppressed sequences allow detection of fluid while avoiding magic angle artifact that can occur with short TE sequences such as PD or IR. T1 fat suppressed, IV gadolinium T1 fat suppressed IV gadolinium sequences, are used to help detect small lesions/recurrence, or to further define a lesion's properties such as vascularity, inflammation, soft tissue involvement, relation to neurovascular bundles, etc.
global_05_local_4_shard_00000656_processed.jsonl/73050
Review by KasketDarkfyre Dungeon crawlers are a good way to pass the long miles and ten hour breaks while driving out over the road. When you think of a good dungeon crawler, Diablo and Diablo 2 come to mind immediately with maybe a passing glance at Dungeon Siege and it's subsequent spawns. Fate is another dungeon crawler that, unfortunately, has too many resemblances to Diablo and has very little in terms of originality to be anything more than a cash in on a tried and true formula. Although it promotes character building and adventuring, it ends up becoming a game of mindless hacking and slashing through ‘randomly generated' dungeons to attempt to give you a unique experience each time. The story of Fate is the same as it is in most games of this type where you play the role of a hero attempting to rid the town of some named evil that rests deep within the dungeon. Usually, the demon is spawned on a random level with a random name and your job is to dive deep into the dungeons in order to find the demon and kill him. As you progress through the levels of the dungeon, you gain experience and fame as well as different armor and weapons to help you with your quest. Quests from the different townsfolk up above give you a little more flavor and something more to do than just mindlessly hacking and slashing your way through the depths. The introduction of a pet is slightly new and gives you the ability to have a companion on your journey, but I found that the only real use that I had for the pet after the first ten levels was for holding the extra items I found. Once your pet becomes laden with items, you can send the pet back in order to sell off the excess items for gold back in the town and then come back to your side in order to load him up again. Honestly, it will save you time in the respect that you never really have to leave the dungeon in order to sell off the hordes of weapons and armor that you'll find. Money really is never a problem as the items seem to drop in huge quantities after every kill. One of the more interesting aspects of Fate is that there is a fame system that opens up more options for items that you can buy from the townsfolk. Generally, you'll gain fame from doing the different quests that appear from the townsfolk and you can spend several hours finding and killing monsters or picking up items that the quest-givers want. Although it is an interesting idea, I really didn't find much of a use for the system and leveling it from one to twenty took several hours of back and forth travel in order to rise through the ranks. Once you've reached the top level of fame, it simply opens up more weapons and armor that you can wear and use. If you're not in the mood to travel, then collect gold and raise your level that way by buying your fame. Another familiar system is the skill points in which you use to build your character stats. Strength, vitality, magic and dexterity are all here with a secondary set of points that you can use in order to build a certain character type, whether it is a magic user, a long-distance attacker or an up-close and personal fighter. While the character types are interesting, you'll find quickly that the magic using build will be the easiest way to complete the main quest, simply burning through the hordes of enemies with lightening or fire. I would have wished for a slightly more diverse or perhaps more in-depth character building option. Once you've completed the main quest, you can either run back into the dungeon and explore more deeply, finding stronger items and continuing the game, or you can retire your character and create a new one. This aspect is interesting in which you can play through the game and then ‘hand down' an item of your choosing to the new character for them to use, which after a couple of generations becomes ridiculously powerful in its scope and use. However, once you have retired your character, you can never re-active that avatar and you're stuck moving to a new character each time. Different difficulty levels only change the types of monsters that you encounter and should be reserved if you want a challenge. Control of your avatar is fairly simple, with point and click of the mouse and very few keyboard presses. I had a little trouble at first getting my character to stand the right way and hack away at the wave of enemies, but after a few minutes, it became fairly easy. Moving through the menus is easy enough to do, with most of the menu options being on the lower hotbar. Allocating skill points is simple point and click and the equipping of armor and weapons is done with a drag and drop interface that is familiar if you've played Diablo. Pet control is completely up to the computer and really the only time that you'll have a use to click on the pet is when you need to load him down with items to send back to town, otherwise, the pet attacks automatically. Visually, Fate is a dark and dreary affair with plenty of shadow and darkness effects. As you move through the various dungeons, you'll see fog, flame and even heat effects in different areas that really put you in the mood to explore. However, the enemy designs are the same on most levels with slight coloring changes to show a difference between a normal and an elite monster. Your character changes slightly with the different items and weapons that you place on him/her, which is neat to see, but most of the time, you're looking at the avatar from a &frac34; top-down view, so you only see it in detail on the character select screen. Other effects include flames or ice flowing off of the weapons, or the magic effects that you can produce with mass destruction all around you. Enemies do not bleed however, and merely throw off stars when you kill them, but with a code, you can turn on blood effects. The audio honestly isn't all that great, adding very little to the overall experience, with a single tune playing through most of the levels of the dungeon. Effects from battle clatter through the speakers, and the constant mewing or growling of your pet gets old after the first twenty minutes or so, and I found myself playing through without the sound on after level ten. Occasionally, a voice will blare through the speakers to tell you that you are getting low on health, magic or that your pack is full, but that is the extent of the voice effects. All in all, it is lackluster at best. Fate isn't a bad game if you're looking to pass the time, but if you've played other games of the same type, you might find that the story is the same as you've played before. The overall game experience is just like Diablo and even the point allocation, character builds, items and weapons seem to have been lifted from the more popular series. From a gamer standpoint, the only differences I've seen is with the extra storage and item selling of the pet and the fame system, but both are limited in their usefulness, and the heirloom ability is neat, but you‘ll be hard pressed to give up a character you‘ve spent hours building. If you need a game to buy for the kids, or something that is cheap entertainment, then Fate is for you, but if you're looking for something more unique, you won't find it here. Reviewer's Score: 5/10 | Originally Posted: 12/23/08 Game Release: FATE (US, 05/18/05) Submit Recommendation Got Your Own Opinion?
global_05_local_4_shard_00000656_processed.jsonl/73053
Game Informer Live – Dark Souls II - Features - Switch Lights The lights are on What's Happening Game Informer Live – Dark Souls II Join PC Editor Daniel Tack on a journey of Hearthstone, WildStar, and more! We’ll kick things off with some Hearthstone Arena and switch off to other games – Feel free to discuss suggestions in chat and we’ll boot up almost anything to play! The action goes live at 2:30 CT and will go all afternoon! You can find the stream here! Email the author , or follow on , and .
global_05_local_4_shard_00000656_processed.jsonl/73056
Forza Motorsport 4 Alpinestars Car Pack Trailer Ten additional cars to be added to the game next month (1:30) Microsoft has released a trailer for Alpinestars Car Pack, the next Forza Motorsport 4 content set to be available for download starting Tuesday, 3 April on Xbox LIVE Marketplace, adding a new crop of cars for Forza players to collect, drive, and customise. Available for 560 Microsoft Points, the April Alpinestars Car Pack will feature ten rides, including precision-tuned German race cars, rotary engine masterpieces, and classic late-50s American style, as well as a few surprises along the way.
global_05_local_4_shard_00000656_processed.jsonl/73065
Games with Gold: Dust: An Elysian Tail free today on Xbox 360 Posted by: Matt Liebl It's May 1st which means its time for your first free Xbox 360 Games with Gold title. First up, we have Dust: An Elysian Tail, an action RPG first release on XBLA in 2012. If you didn't didn't play it back then, now's your chance to snag this game for free. Dust: An Elysian sees you awake in the beautifully hand-painted world of Falana. Unable to remember the past, you -- Dust -- find yourself approached by a floating, sentient sword. Dust must master the ancient Blade of Ahrah to battle dozens of enemies, complete a variety of quests, discover powerful upgrades, and uncover the story of an ancient civilization on the bring of extinction -- all while you uncover his past. Dust: An Elysian Tail is the first of two free Xbox 360 games planned for May. On May 16, Xbox LIVE Gold members will be able to download Saints Row: The Third for free. Tags: Dust: An Elysian Tail, Games with Gold Anonymous User
global_05_local_4_shard_00000656_processed.jsonl/73070
Gram stain From Ganfyd Jump to: navigation, search A Gram positive organism A Gram negative organism The area used for Gram Stains can become very messy very quickly! In 1884 the Danish bacteriologist Hans Christian Gram developed a staining method to differentiate between Streptococcus pneumoniae and Klebsiella pneumoniae. This basic staining technique can be used to group bacteria into two major types depending on the make-up of their cell walls (Gram-negative and Gram-positive bacteria). Gram positive organisms are violet while Gram negative ones are red/magenta. So-called Gram-positive organisms have a peptidoglycan cell wall. When stained using a basic para-rosaniline dye (such as crystal violet or gentian violet) followed by a mordant (such as iodine), this peptidoglycan cell wall takes up the dye. Subsequent application of a decolourisation agent (such as ethanol or acetone) doesn't lead to removal of the dye. This is because the peptidoglycan cell wall has a low lipid content leading to poor permeability to the organic decolourising solvent. Also, it is thought that the cell wall structure allows the dye-iodine complex to become trapped within it. Gram-negative bacteria on the other hand have a lipid outer membrane, separated from a thin peptidoglycan cell wall by the periplasmic space. The organic decolouriser easily permeates the lipid-rich outer membrane which dissolves, taking the stain with it. Subsequent counter-staining with a red dye is carried out in order to make any decolourised organisms visible. Gram's method Gram's original method utilised aniline-gentian violet as the first stain, with Lugol's iodine as the mordant. This was then decolourised with absolute ethanol and counter-stained with Bismarck brown. This method has been surpassed by subsequent improvements to the stain, counter-stain and decolouriser. Jensen's modification This is the method most commonly encountered in UK laboratories. Primary stain: Methyl violet/Crystal violet • Methyl violet 6B/Crystal violet - 5g • Distilled water - 1 litre Mordant: Iodine solution • Iodine - 10g • Potassium iodide (KI) - 20g • Distilled water - 1 litre Dissolve the potassium iodide in 250ml water, then add the iodine. When fully dissolved, add the remaining water to 1 litre. Leave to stand overnight before use. NB: Acetone decolourises much faster than ethanol. Counter-stain: Neutral red/Safranin • Neutral red/safranin - 1g • Distilled water - 100ml • Neutral red/safranin - 1g • Acetic acid 1% solution - 2ml • Distilled water - 1 litre 1. Fix specimen with 95% methanol or using heat fixation. 2. Stain with primary stain for 20 seconds. 3. Wash off and flood with iodine solution for 1 minute. 4. Wash with decolouriser for a few seconds. The trick is to keep washing with decolouriser until no more crystal violet is seen being dissolved. This is very difficult in practice and over-decolourisation is often a problem. 5. Wash immediately with water. 6. Add counterstain and leave for 30 seconds. 7. Wash again and allow to dry, using hot-plate if necessary. In reality, the length of time for each stain and counterstain is not fully agreed upon. • Over-decolourisation can lead to Gram-positive organisms appearing Gram-negative, as judicious use of the decolouriser has led to the primary stain being washed away. Some advocate the use of a streak of a control organism such as Staphylococcus aureus alongside the test organism on the slide - if this appears Gram-negative you can be sure you have over-decolourised your stain and may need to start again. Some say avoiding over-decolourisation is an art. • Fibrin will stain Gram-positive and may sometimes look similar to small Gram-positive cocci or bacilli. • Likewise, stain deposit left behind when a slide is not washed sufficiently can give misleading results. Personal tools
global_05_local_4_shard_00000656_processed.jsonl/73092
Reference Index - Disease & Conditions Back to Health Library Food guide pyramid Food guide pyramid Food allergies Food allergies Read food labels Read food labels Dermatitis, perioral Dermatitis, perioral Food allergy Alternative Names: Allergy to food Causes, incidence, and risk factors: The cause of food allergies is related to your body making a type of allergy-producing substance called immunoglobulin E (IgE) antibodies to a particular food. Although many people have a food intolerance, food allergies are less common. In a true food allergy, the immune system produces antibodies and histamine in response to the specific food. Any food can cause an allergic reaction, but a few foods are the main culprits. In children, the most common food allergies are to: • Eggs • Milk • Peanuts • Shellfish (shrimp, crab, lobster) • Soy • Tree nuts • Wheat A food allergy frequently starts in childhood, but it can begin at any age. Fortunately, many children will outgrow their allergy to milk, egg, wheat, and soy by the time they are 5 years old if they avoid the offending foods when they are young. Allergies to peanuts, tree nuts, and shellfish tend to be lifelong. In older children and adults, the most common food allergies are: • Fish • Peanuts • Shellfish • Tree nuts Food additives -- such as dyes, thickeners, and preservatives – may rarely cause an allergic or intolerance reaction. An allergy syndrome that affects the mouth and tongue may occur after eating certain fresh fruits and vegetables. These foods contain substances similar to certain pollens. For example, melon contains substances similar to ragweed pollen, and apples have allergens similar to tree pollen. Many Americans believe they have food allergies, while in reality fewer than 1% have true allergies. Most symptoms are caused by intolerances to foods such as: If you develop symptoms shortly after eating a specific food, you may have a food allergy. Key symptoms include hives , hoarse voice, and wheezing . Other symptoms that may occur include: Symptoms of mouth (oral) allergy syndrome: • Itchy lips, tongue, and throat • Swollen lips (sometimes) Signs and tests: Blood or skin tests are sometimes used to confirm that you have an allergy. However, there is no well-accepted criteria for diagnosing food allergies. With elimination diets, you avoid the suspected food until your symptoms disappear. Then the foods are reintroduced to see if you develop an allergic reaction. In provocation (challenge) testing, you eat a small amount of the suspected food allergen under medical supervision. This type of test may provoke severe allergic reactions. Challenge testing should only be done by a doctor. Never try to deliberately cause a reaction or reintroduce a food on your own. These tests should only be performed under the guidance of a health care provider -- especially if your first reaction was severe. See: Allergy testing If you suspect you or your child has a food allergy, consult an allergy specialist. If you have symptoms on only one area of the body (for example, a hive on the chin after eating the specific food), you may not need any treatment. The symptoms will likely go away in a brief time. Antihistamines may relieve the discomfort. Soothing skin creams may provide some relief. Consult your doctor if you think you have had an allergic reaction to food, even if it is only a local reaction. Anyone diagnosed with a food allergy should carry (and know how to use) injectable epinephrine at all times. If you develop any type of serious or whole-body reaction (even hives) after eating the offending food, inject the epinephrine. Then go to the nearest hospital or emergency facility, preferably by ambulance. Seek immediate medical attention after injecting epinephrine for a food reaction. Support Groups: Food Allergy and Anaphylaxis Network -- Expectations (prognosis): Calling your health care provider: Review Date: 6/29/2010
global_05_local_4_shard_00000656_processed.jsonl/73110
E-mail this page Print this page Curtil-Vergy: France SpanishFrenchSimplified ChineseGermanRussianHindiArabicPortuguese This page presents the geographical name data for Curtil-Vergy in France, as supplied by the US military intelligence in electronic format, including the geographic coordinates and place name in various forms, latin, roman and native characters, and its location in its respective country's administrative division. Full Name (see definition): Curtil-Vergy Primary Country Code (see definition): FR (France) First-order administrative division code (see definition): A1 (Bourgogne ) Unique Feature Identifier (see definition): -1423334 Unique Name Identifier (see definition): -2041057 Latitude in decimal degrees (see definition): 47.166667 Longitude in decimal degrees (see definition): 4.883333 Latitude in degrees, minutes, and seconds (see definition): 47° 10' 00" N Longitude in degrees, minutes, and seconds (see definition): 4° 53' 00" E Military Grid Reference System coordinates (see definition): 31TFN4273425406 Joint Operations Graphic reference (see definition): NL31-03 Populated Place Classification (see definition): No data Population Figures (see definition): No data Elevations (see definition): No data Secondary Country Code (see definition): No data Language Code (see definition): No data Substitute for full name (see definition): Curtil Full Name with QWERTY characters (see definition): Curtil-Vergy Modify Date (see definition): 1994-01-06 NOTE: The information regarding Curtil-Vergy in France on this page is published from the data supplied by the National Geospatial-Intelligence Agency, a member of the Intelligence community of the United States of America, and a Department of Defense (DoD) Combat Support Agency. No claims are made regarding the accuracy of Curtil-Vergy information contained here. All suggestions for corrections of any errors about Curtil-Vergy should be addressed to the National Geospatial-Intelligence Agency. Copyright © 1995-2012 ITA all rights reserved. France names alphabetically Global names alphabetically . . . Feedback
global_05_local_4_shard_00000656_processed.jsonl/73119
Find Lesson Plans on! GettyGames Re: slides from digital Date: Tue Oct 23 2001 - 16:48:34 PDT I send my film to Photoworks. They send me digital images via the internet while I wait for my slides. They are the only service I know of that uses slide film as a standard- and make "prints" from that. They do very good work -been using them for over 10 years. Kathy in Kalamazoo
global_05_local_4_shard_00000656_processed.jsonl/73145
Even the Tone Deaf Can Rock Out on This Self-Playing Harmonica By Eric Limer on at The harmonica is already a bit of a beginners instrument. Even if you just blow through the thing, you'll get notes that are all in the same key. A listenable mess. This "Rolmonica" from 1928 makes it even easier by playing the right notes for you; all you have to do is blow. The concept is basically the same as that of a player piano. You load up the Rolmonica with song scrolls, and then just crank the lever as you blow—out or in—and the Rolmonica does the rest. The example in the video above sounds a little bit off, but it certianly is playing a bunch of different notes automatically as advertised. Could this tech be posed to make a comeback? Probably not. Should it? Only if there are song scrolls for the Ashoken Farewell out there. [Boing Boing]
global_05_local_4_shard_00000656_processed.jsonl/73148
Did you hear that Barbie is 50 years old this year? In celebration, she had her own Fashion Week runway show over the weekend (Andrea's bringing you more on that shortly). I know not every girl grew up loving her, but man, was I obsessed. Not only did I collect the dolls, outfits and a vast array of clunky plastic accessories (cars, jacuzzis), but I spent a good deal of time staging makeovers for Barbies I felt were in need of a fresh look. I'd cut their hair, highlight it with markers, and draw lipstick and shadow on their faces. I would have loved to dye a doll's hair as hot-pink as this Tarina Tarantino Barbie's! I did enough babysitting in my day to know I'm not alone, so fess up, former Barbie lovers: What kind of crazy makeovers did you give your dolls? Also: Who was your all-time favorite Barbie (do you even remember)? Will you want your daughters to play with Barbies? Photo: Getty Images
global_05_local_4_shard_00000656_processed.jsonl/73149
Well, maybe not right this second. If you're not by your makeup bag, you've got to get to it first. But I've got fast tricks to making your whole face look a little brighter and more refreshed, though, and that's what matters. Brightener 1: Really go for it with pink blush like Miranda Kerr. Brightener 2: Add a little light shimmer under your eyes like Michelle Williams. Brightener 3: Toss on sweet pink lipgloss like Anna Kendrick. What makeup trick do you turn to when you want to look a little more refreshed? More Ways to Get Glamour: Like freebies? Enter the latest Glamour sweepstakes. Photos: Getty Images
global_05_local_4_shard_00000656_processed.jsonl/73192
Two hours after Kaepernick went thirty-sixth in 2011's draft, he met head coach Jim Harbaugh at the Niners compound to study film. It speaks to his character, this studiousness of Kaepernick's—the grit and willfulness of it. Yet there's something about it that's beyond will and character, something involuntary. "All my life I've had these flashbacks, these dreams, nightmares, daymares, like visions, where I relive certain plays," he says. It's never the highlight-reel stuff. Just the junk. "Only the bad plays. I see them over and over, as if somebody's rewinding a tape and forcing me to watch. Some of these are recent." The three goal-line incompletions that preserved Baltimore's slim lead as time dwindled in the Super Bowl play frequently and vividly. "But some of them go back to high school. Every time I relive these mistakes of mine, I'm also forced to ask, What could I have done different? What decisions could I have made? This stuff haunts me, but I like it, because it makes the game hard. And the more I study, the more comfortable I feel with what a defense is going to do. "Sometimes, when things are going really well, I feel like I've already seen things—it's the flashback feeling in a good way. Like I'm watching a rerun, because I've studied this defense and know what comes next. Now, that is a good feeling, when your mind is working fast because you've studied and you realize, I've seen this before." Compliment Kaepernick on his marquee moments—that monster fifty-six-yard TD run against the Packers in the playoffs, say—and he'll smile politely and, in his reedy, almost faint voice, thank you. But the only time he gladly accepts and engages with a compliment about his game is if it concerns the way he uses his head on the field (focused, calm, confident) and off (focused, calm, humble). He doesn't have much to say about his talent. Not really. Only about what he chooses to do with it. "I think the biggest part of my game that's underestimated is the mental part of it," he says. "Probably because it's invisible. You can't see the hours I put in. It is funny to me that because I can run, because I'm athletic, people tend to see that as my only asset. And that's fine—I hope they continue to see it that way [and underestimate me]. Look, I won't say that view is 'racist.' I will say it's stereotypical. I've just heard it so many times before." Another funny thing about the guy: He was considered a better baseball than football prospect coming out of high school—ninety-five-mile-per-hour fastball, two no-hitters—and when he was in college the Cubs drafted him. So why football? Given his family background, Kaepernick's explanation is striking—and not one you'd expect to hear in the era of free agency, when a typical ten-year football career may span five franchises. "You know what I love most about this game? You know what I miss the most when I'm away from it? Being around my teammates. That's it! Growing up, when I dreamed about playing in the NFL, it was never about being famous, never about the roar of the crowd. It was about other players, because there is no other sport where you rely on your teammates so much. The fact that you can go out there and trust ten other people without even looking at them, that's amazing. That you can build that type of trust and have that type of confidence where you can throw a ball without seeing where a receiver's at, and just trust he's gonna be there and make a play. You have to have that trust because it's a physical sport where people get hurt. There's that much more at stake. I love trusting my well-being to those ten other people. And I love the trust those ten people put in me to lead them, to figure out what they need in order to make them as good as they can be. An amazing amalgam, Colin Kaepernick. Stylistically, an acrobat. Mentally and spiritually, old-school, with the Knute Rockne-ish non-self-regarding self-regard of a faceless soldier in a Crusade. Something Joe Namath once exclaimed about another quarterback applies to Kaepernick, both for its ebullience and for its smack-yer-head literality: "He's a football player! On a football team! That likes to throw...the football!" In other words, Kaepernick is a guy who's earned the right to be taken at face value. He doesn't want to be an icon, and his tats aren't ghetto or anti-authoritarian or disrespecting or black. They don't mean anything other than what they literally say. (God is good!) He dislikes and distrusts fame—it's never been about "the grades," the accolades—and certainly doesn't want to deploy it in any way. He's a devout Christian who wants his god "to shine through" everything he does. But he's not looking to "signify" anything at this point in his life, and to his credit, he doesn't. He just is. And what he is, and wants to be seen as now, is... Well, Colin Kaepernick said it simplest and best in a letter he wrote to himself back in the fourth grade: Andrew Corsello is a GQ correspondent.
global_05_local_4_shard_00000656_processed.jsonl/73196
Mondrian plugin • Tags: chart, functionality, olap • Latest: 0.5 • Last Updated: 11 March 2011 • Grails version: 1.3.0 > * • Authors: null 0 vote compile ":mondrian:0.5" Just execute following from your application directory: grails install-plugin mondrian 0.1 If above method is not working for some reason you can download plugin distribution from and install it with: grails install-plugin /path/to/downloaded/plugin/distr The latest version of the plugin is 0.1. This plugin works with Grails 0.5.6+ See JIRA for known issues. What is Mondrian? Mondrian is an open source Relational OnLine Analytical Processing (OLAP) engine that enables self-service analysis and reporting for users. Data is retrieved from a generic star-schema database so that any variable can be compared by any variable. Database structure Databases are generally structured for transactional processing (OLTP) in that there are a number of tables each representing a domain object (aka 3rd Normal Form) so that data integrity is maintained and data is only held in one place (e.g. an address is not repeated if two people live there). Database queries tend to be atomic, e.g. updating a single customer's record. Analysis and reporting requires the complete opposite as the data is static and queries tend to span large quantities of data, e.g. tell me the average age of customers split by country. The OLAP approach is to flatten the data into a single central 'fact' table linking to multiple 'outrigger' tables containing lookup data like 'description' for a country code and hierarchical grouping information. This database schema is often described as a 'star-schema'. The plugin doesn't strictly use grails controllers, however we created a controller to simply display a list of available mondrian queries (and their appropriate URLs) but hang on, i'm getting ahead of myself, let me start again. The plugin installs, amongst other things, 3 jsps into the web-app folder of your grails application, these are testpage.jsp, busy.jsp and error.jsp. The testpage.jsp is the interesting one as it implements a mondrian jpivot table displaying the mdx query of your choice. In it's freshly installed guise, the testpage.jsp takes the querystring value of 'query' and looks for a jsp page in the /WEB-INF/queries folder, if none is found, the testpage will forward you to the index.gsp of the project. For example, the URLhttp://localhost:8080/yourgrailsapp/testpage.jsp?query=foodmart Would result in the testpage.jsp looking for If the queries folder doesn't exist you'll need to create it (for this example at least). Now assuming you have an appropriate database setup for analysis you can create your query page and accompanying mondrian schema xml. Your query jsp might look a bit like this: <%@ page session="true" contentType="text/html; charset=ISO-8859-1" %> <%@ taglib uri="" prefix="jp" %> <jp:mondrianQuery id="query01" jdbcDriver="com.mysql.jdbc.Driver" jdbcUrl="jdbc:mysql://localhost/foodmart?user=username&password=password" catalogUri="/WEB-INF/queries/foodmart.xml"> select {([Promotion Media].[All Media], [Product].[All Products])} ON rows from Sales where ([Time].[1997]) </jp:mondrianQuery> <c:set var="title01" scope="session">FoodMart using Mondrian OLAP</c:set> \\ Note the jdbc connection to a mysql database and the location of the appropriate mondrian schema file in the mondrianQuery. The schema file would be the same as any normal Mondrian schema file with dimensions, hierarchies etc corresponding to your database, like so: <?xml version="1.0"?> <Schema name="FoodMart"> <Dimension name="Product"> <Hierarchy hasAll="true" primaryKey="product_id" <Join leftKey="product_class_id" rightKey="product_class_id"> <Table name="product"/> <Table name="product_class"/> <Level name="Product Family" table="product_class" column="product_family" uniqueMembers="true"/> <Level name="Product Category" table="product_class" column="product_category" uniqueMembers="false"/> <Level name="Product Name" table="product" column="product_name" uniqueMembers="true"/> ...etc etc Once you have your schema and query pages set up you should be able to navigate to the testpage and see the jpivot table, drill down, etc.
global_05_local_4_shard_00000656_processed.jsonl/73206
Tulsa Schools Nearby Cities Top-Rated Tulsa Public Schools Compare the top-rated Want your own SchoolFinder? Recent Reviews Kendall-Whittier Elementary School My nephew attends this school who also has a disability, and from what I know most pare... Posted yesterday Berryhill High School Very clique-y - even the parents. Despite the small size, my child was never given any... Posted 21 days ago Bell Elementary School My daughter was bullied to such an extent that I had to pull her out of Bell. Since the... Posted 41 days ago What's it like to live in Tulsa? Median household income $44,904 $44,836 $50,935 Median home price $92,300 $97,200 $152,300 Unemployment 6% 6% 9% Violent crime index (1 is lowest)964 Days per year with some sun: 227 Days per year with some precipitation: 90 More about this data Source: Sperling's Best Places Population: 391,906 Tulsa Community More conversations » Got a question about Tulsa? Post conversation Magnifying glass Compare cities near:
global_05_local_4_shard_00000656_processed.jsonl/73217
The tail wags the dog… Posted By Howard Kaplan On April 7, 2006 @ 1:55 pm In Web Analytics | 4 Comments In the next edition of our newsletter, GrokDotCom [1], John Quarto-vonTivadar and I co-wrote a piece discussing the comedy of errors that ensues when having your report jockey advise you on business decisions.  Here’s the article, hot off the press: The Great Debate “When All You Have is a Reporter, Every Analysis Looks like A Nail” Analysis doesn’t happen in a vacuum. And as we’ve said a thousand times: you can torture the numbers to confess, uh, I mean, rationalize just about anything. Matt Belkin of Omniture blogged recently about the differences between Visits and Unique Visitors [2], as they relate to measuring reach and as they factor into the Conversion Rate formula. That is, Matt argues that Conversions per Visit is more important than Conversions per Unique Visitor. On occasion, we see our own clients make this sort of slip-up, so it’s worth examining the arguments on their merits. Matt writes: “[Measured] Visits…always. Sure, call me crazy – but my logic is actually quite simple.” Simple? A finer description of this approach would be simplistic. Perhaps that’s the root of the problem. Matt is clearly an intelligent guy. But from a software vendor stand-point, it’s very easy to fall into the trap of seeing the Reporting software itself as the end, rather than as a means to an end. From a business owner’s perspective (and let’s face it, from a customer’s perspective), what she really needs is Analysis. If she could, the business owner would interview every one of those successful (and failed) customers to find out what the company did right and did wrong. Each of those customers is a Unique Visitor and it’s the totality of the unique visitor experience that caused (or inhibited) a conversion. Reporting is often times simple; Analysis is rarely so. Reporting requires condensation into sound-bites; Analysis requires segmentation into knowledge-bites. There’s rigor involved in real analysis, wherein the software is the tool, not the talent. Let’s look at Matt’s three reasons for preferring Visits over Visitors. As we’ll see, his blanket statements are superficially true – at least upon first glance, but that a deeper understanding illustrates just how little reasoning supports them. Reason #1: Visits are more accurate than Unique Visitors. Technically, this is correct, but only if your definition of “accurate” is to simply “account for all data”. That’s like arguing we can reduce the crime rate simply by making Theft or Assault a legal activity. Will that make the citizenry safer from Theft or Assault? Or does it only remove those factors from the measured crime statistic? From a data confidence standpoint, measured Visits are more likely to measure actual visits because measured visits are no more and no less than the actual visits we could measure – hence their name. However, there’s more to this story. Measured Visits is no more “accurate” at measuring reach than is Unique Visitors. In fact, they’re far less so. How can visits possibly tell us about Reach, in anything other a relative sense?  Reach is about people, not sessions. The value of Visits in quantifying relative Reach is identical to that of Unique Visitors: the two are both apples-to-apples comparisons. In short, measured visits accounts more accurately for actual visits, but actually provides you, the business owner, with less answers to the questions you’re actually asking. Why is tracking Visits of less value? Matt’s Reason #2 explains: Reason #2: Every Visit represents an opportunity to persuade or convert a visitor to a customer. Yes, absolutely this is correct, but not without some stipulations. Do you understand the concepts of Macro vs. Micro conversions? Have you planned your scenarios accordingly, taking into account the three critical questions to planning any persuasive system ? Are you willing to optimize your scenarios for each visitor segment, summing these pipelines to have an Optimal Conversion Rate, rather than an Average Conversion Rate? In the world of averages, every session does not represent an opportunity to persuade or convert a visitor to a customer. What every session does represent is an opportunity to persuade a visitor to decide to take an action (a micro-conversion) which brings her further into her buying process, and brings her closer to the end goal; the macro-conversion we’re looking to optimize (i.e. our revenue generating conversions). Take for example, a visitor beginning their search for a new car online. Does Cars.com truly have an opportunity to persuade visitors to convert themselves during a single session? Imagine a scenario where our online car buyer visits once, researching various styles and brands. She comes back a few days later, narrows her search to a few targeted makes and models, and downloads their fact sheets. She returns the next day and makes her purchase. That’s three visits in the course of a week, and in Matt’s software-only approach, that’s a 33% conversion rate.  How much time and effort should we spend trying to guess ways to optimize the 33% CR we’d report if we used Measured Visits as opposed to Unique Visitors? The Conversion Rate in this scenario is the maximum it could be — there was one visitor, and she could only provide one sale. By focusing on Unique Visitors we keep our focus on the thing that matters most: a single, unique, prepared-to-part-with-money customer. Matt continues with: Reason #3: Measuring visits is based on fairly established industry standards  True, and that’s exactly why it has less value to you. Are you industry standard? “What do you want to be when you grow up, Tommy? “ “Oh, just average.” Is that the sort of business you’re running, to be just like everyone else? Or is your business gunning to be an Astronaut or a Fireman, or an Olympic swimmer? It’s disappointing to return back to the world of averages. I recall a time when Amazon was the “industry standard” for online checkout processes. Many an e-tailer went belly up trying to copy their method, with similar lack of regard for the notion that maybe, just maybe, Amazon only worries about doing what’s right for Amazon. And what industry is setting these standards anyway? It’s the Software Vendor’s industry, not your business’ industry, because their reporting tools report certain statistics more easily than others Yes, they’re doing what’s right for them. And there’s nothing wrong with that; we just have to recognize it as a limitation of the reporting tools, and stop thinking that some magical black box can substitute for rational planning and analysis. Matt goes on to talk about how Unique Visitors are a subjective measure, one the industry can’t agree on in terms of length. He says this as if it’s a bad thing. Our clients often ask us for benchmarks so they can measure the size of their, uh, foot. We categorically refuse. What’s a benchmark? When your system for conversion actively persuades 97% of your visitors to go elsewhere, benchmarks have little value beyond making you feel like a winner. I’d suggest a better way to make you feel like more of a winner: gobs and gobs of revenue. The only benchmarks you should worry about are internal benchmarks. Bottom Line, how much money am I making? Am I making all that I should, given the resources I’m allocating to the process? Can I make more? Matt closes with this gem: “The longer your unique visitor timeframe, the more you effectively overstate success.” This is the purest evidence yet that you do not want to subscribe to these theories if your job, your company, or your family’s income is on the line. Instead, knowledge of your customers, and more specifically, their buying process is the real key. And, for the record, the buying process is non-linear, and is not the same across products and companies. One cannot guarantee a buying decision can be made in a single sitting, for every sale, across all the products on the face of the planet, simply because the software vendors only know how to measure one way. We help define the complexity of our client’s sales in 4-dimensions. Not all sales are equally as complex. There’s the issue of compacted and non-compacted information, as it relates to the various handles of information your customers grab onto, and their angle of approach. The length of time you define for your Unique Visitors should be long enough to encapsulate their buying process, but short enough to take into account when they fail to convert at the macro-level. It’s tremendously more important that some simple Reporting software. If that last paragraph found you lost in a sea of vocabulary, a life-preserver in the form of our new bookWaiting for Your Cat to Bark [3]awaits you (but not before June 13th). You won’t be drowning for long. In the meantime, trust me, there’s nothing simple about truly analyzing your visitor behavior… unless of course you start with the conclusion and work backwards. URL to article: http://www.grokdotcom.com/2006/04/07/the-tail-wags-the-dog/ URLs in this post: [1] GrokDotCom: http://www.grokdotcom.com [2] differences between Visits and Unique Visitors: http://www.omniture.com/blog/node/14 [3] Waiting for Your Cat to Bark: http://cattobark.com
global_05_local_4_shard_00000656_processed.jsonl/73230
Thread: Where? View Single Post Old 12-08-2013   #1 Programming and modding freak HarshIV's Avatar Join Date: May 2013 Location: M. P., India Posts: 15 HarshIV is an unknown quantity at this point Question Where? Hey, Anonymous brothers Please tell me where is the location of Getalife buildings models and textures, in OpenIV? And what're GIM tools? Copyright (c) HarshIV HarshIV is offline   Reply With Quote
global_05_local_4_shard_00000656_processed.jsonl/73262
Printer Friendly Version ] [ Report Abuse ] Horrible Horcrux by wild4harryp01231 Chapter 1 : What we Never Fathomed Rating: MatureChapter Reviews: 79 Background:   Font color:   ~*~Horrible Horcrux~*~ What we Never Fathomed Ginny ran through the dim forest, tears falling down her cheeks. She ran blindly, branches and twigs scarring her face. Her gray eyes were foggy in desperation, sadness, hate. She needed to get away; needed to think, to pray, to run. Her flaming red hair flew behind her like a torch being blown out and the purple skirt fluffed behind her. Her tears and streaking mascara were staining her white top, but she didn’t care. Nothing mattered anymore. When she felt as though she could run no more, she collapsed onto the ground. The brown pine needles that blanketed the forest floor dug into her bare arms and legs, but Ginny didn’t care. Nothing could be worse than her internal pain. Physical pain could not compare in the least. She curled up into a ball, still sobbing. Maybe if she got into a small enough ball, she would just disappear. That’d be wonderful.  As much as she wanted to forget the earlier conversation, it kept playing in her head over and over like a skipping CD. She couldn’t help it. “Gin, we need to talk,” Harry had told her with piercing emerald eyes that looked shiny, wet. “Harry, what’s the matter? Tell me,” she had answered. She was frightened. The only other time that she had seen Harry this distraught was when Sirius and Dumbledore were killed. At that moment, Ron and Hermione walked over, Ron wearing a grim expression nearly identical to Harry’s imbedded in his countenance. But Hermione was crying openly into Ronald’s shoulder. Ron kept biting his lower lip, like he was trying to keep his composure even though Hermione hadn’t kept hers. He seemed to be openly struggling with this. He also kept opening and closing his mouth, as though he wanted to comfort Hermione, but he didn’t know what to say. “What’s the matter, you guys?” Ginny had asked, a tremor in her voice. When she received no answer, she yelled, “Tell me!!!” Harry had tears on his cheeks now and his eyes were red from holding them in for so long. After Ginny had spoken, Ron had broken out in tears as well, his head resting Hermione’s. “Gin, I don’t want you to freak out and do anything rash. Understand? We’ll figure something out; I promise,” Harry had told her through tears, grabbing her hand. “Harry,” she had said in a mere whisper, pulling her hand away. “Just tell me.” Taking in a breath, tears still streaming down the trio’s faces, Harry replied, “You’re the last horcrux.” Ginny had gaped at her three bawling friends, comprehension dawning on her face. That’s why they hadn’t been able to find the last one after searching for over three months. Voldemort must have put a horcrux into her when he had held her captive in the Chamber of Secrets. That’s why her best friend, brother and lover had been distant from her for days. They hadn’t known what to say…. Hermione came up and hugged her best friend, still bawling. “Ginny, I’m so sorry.” Then Harry offered, “But we’ll find a way, Gin. There must be a way to expel the horcrux without you…dieing. Hermione’s been searching for weeks. She’ll find a spell, I promise." But Ginny knew that this was a right-out lie. If Hermione had been searching for weeks, and had been working as hard as Ginny knew she had been, and had found nothing, then there was nothing. No way to expel a horcrux without killing the organism in which it resided. No way. No way at all. At this point, Ginny had started weeping as well. And then she did the only thing that she could think to do. She grabbed Harry, pulled him close and kissed him. Kissed him with all her might, all her soul. Shivers ran up and down her spine as she thought of what she had to do when she had released him. But it was best for them all. Best for the whole wizarding world. “Hermione,” Ginny had said as she approached her. “You’re like my sister. I love you.” Then the two embraced and she walked over to her brother. “Ron,” she said in nothing more than a whisper. “Ginny!” he had croaked, and the two siblings had embraced each other. Then, when they released, she ran into the large forest behind Godric’s Hollow. “Ginny, NO!!!” Hermione had screamed, running after her. Ginny was still haunted by how the trio had looked the last time she had seen them. Tears on all of their faces. Their frightened and heartbroken countenances made her distraught. How desperate her best friends had looked at that moment. But as much as she knew it broke their hearts, Ginny had to leave them. She was Voldemort’s lifeline. And she couldn’t continue to let him be her leech. The pine needles were still digging into Ginny’s flesh as she lay on the forrest floor, remembering what was so painful to remember. She knew what she had to do, but it was so difficult. She was so afraid. She stood and walked. She didn’t know where she was going; her legs seemed to be leading her with her conscious mind having nothing to say in the matter. Though tears were still running down her face, they were not self-pity tears any longer. These tears were for her family, her friends, anyone who knew her. This would hit so hard for them. Especially Harry. She didn’t know how he would take it. After quite a bit of walking and many, many tears, Ginny reached a beautiful pool of water in which she could see her reflection. She looked dreadful. She threw a stone into the previously still water, to rid it of her expression. A waterfall was running into it and lily pads had settled onto the surface. Goldfish were barely visible under the water. It looked so peaceful in contrast to the turmoil going on inside Ginny. Then, right at that moment, she whipped out her wand and picked up three large stones. And with two complex flicks of her wand, she turned the first two into a handsome eagle-feather quill and a large roll of parchment. Then, with another flick, she transfigured the third into a bottle of black ink. Then she wrote. She wrote letters to Harry, Hermione, Ron, Fred and George, Bill, Charlie, her parents, Tonks, Lupin, Moody, Percy, even Fleur. Everyone. They were letters of thanks. Letters of hope. Letters of kindness. Letters of love. When she finished with the last and most important letter she wrote, the one to Harry, she gathered them all up and walked again. She searched without really knowing what she was searching for. But the second she saw it, she knew this was the place. And with a sigh, Ginny Weasley walked into the meadow. There were so many flowers of so many different colors and varieties in the meadow; it was gorgeous. Dozens of butterflies flew about the meadow. It was so peaceful. Ginny crouched down and put all the letters under a stone to keep them all in place. Then, she sent red sparks into the air, to let her friends know where she would rest. Ginny Weasley had never been suicidal. She loved life. But she had to do this. For the good of humanity. For the good of all her friends and family. She took out her wand; she was shaking horribly. And with a flick of her wand and an almost inaudible whisper, she ended her life. Everyone was dressed entirely in black and all the ladies had veils covering their faces. Ginerva Weasley lay in her coffin, wearing jeans and a t-shirt. Hermione hadn’t let Mrs. Weasley put Ginny in a dress. She knew how much Ginny had hated them. And Mrs. Weasley had solemnly approved. All the letters were handed out at the funeral, after everyone had said a few words and Ginny had been buried. No one could not break into a surge tears while reading their letter. Even Moody didn’t have dry eyes. Harry read his and it nearly broke his heart: Dear Harry, By the time you read this, I’ll be gone. Up in heaven with your mum and dad, Sirius, and Dumbledore. Don’t cry for me Harry. Please, please don’t. I’m up in heaven. I really should be the one crying for you. I know that I have broken your heart, Harry. But you aren’t a good liar. Hermione wouldn’t have found anything, and we both know it. If I had stayed any longer, it just would have made saying goodbye to you all so much harder. It was torture enough. Harry, I will always love you. I wish our relationship didn’t have to end the way that it did. We could have had so many more happy years. But don’t dwell on me, Harry. Marry some nice girl and have a happy life. I’ll be waiting for you. Harry, don’t let my death affect you. You need to defeat Voldemort so the whole world can live. Don’t let Dumbledore, Sirius, your mum and dad and I die in vain. Defeat him, Harry. I know you can. Oh, and do me a favor, Harry. Get Ron and Hermione together. It's going to bug me, seeing them pretend much longer. I’ll be waiting, Harry. Ginny Weasley Favorite |Reading List |Currently Reading Review Write a Review Horrible Horcrux: What we Never Fathomed (6000 characters max.) 6000 remaining Your Name: Prove you are Human: Other Similar Stories Don't Tell A... by kiree mariee I Did It To Him by have quil... Looking Thro... by claireabella
global_05_local_4_shard_00000656_processed.jsonl/73265
[Haskell-cafe] RE: [Haskell] [Fwd: undecidable & overlapping instances: a bug?] Simon Peyton-Jones simonpj at microsoft.com Thu Oct 18 04:21:16 EDT 2007 | I believe that this "weak coverage condition" (which is also called | "the dependency condition" somewhere on the wiki) is exactly what GHC | 6.4 used to implement but than in 6.6 this changed. According to | Simon's comments on the trac ticket, this rule requires FDs to be | "full" to preserve the confluence of the system that is described in | the "Understanding Fds via CHRs" paper. I have looked at the paper | many times, and I am very unclear on this point, any enlightenment | would be most appreciated. Right. In the language of http://hackage.haskell.org/trac/ghc/ticket/1241, last comment (date 10/17/07), it would be *great* to replace the Coverage Condition (CC) with the Weak Coverage Condition (WCC) as Mark suggests. BUT to retain soundness we can only replace CC with WCC + B WCC alone without (B) threatens soundness. To retain termination as well (surely desirable) we must have WCC + B + C (You'll have to look at the ticket to see what B,C are.) And since A+B+C are somewhat onerous, we probably want to have CC or (WCC + B + C) At least we know of nothing else weaker that will do (apart from CC of course). Like you, Iavor, I find it very hard to internalise just why (B) and (C) are important. But I believe the paper gives examples of why they are, and Martin is getting good at explaining it. Martin: can you give an example, once more, of the importance of (B) (=fullness)? Anyway that's why I have been moving slowly in "fixing" GHC: the rule CC or (WCC + B + C) just seems too baroque. More information about the Haskell-Cafe mailing list
global_05_local_4_shard_00000656_processed.jsonl/73266
[Haskell-cafe] Mutable arrays Don Stewart dons at galois.com Wed Feb 6 11:33:59 EST 2008 > On Feb 6, 2008 1:18 AM, Jonathan Cast <[1]jonathanccast at fastmail.fm> > wrote: > On 5 Feb 2008, at 10:14 PM, Jeff I* wrote: > On Feb 5, 2008 4:58 PM, ChaddaA- FouchA(c) > <[2]chaddai.fouche at gmail.com> wrote: > 2008/2/5, Jeff I* <[3]jeff1.61803 at gmail.com>: > > This is interesting. I've been programming in Concurrent Clean > for a while. > > Instead of monads, Clean supports unique types for mutable arrays > and IO. > > In Clean, I can write code that iterates through a mutable array > by > > converting it to a lazy list. This is convenient because I can > use all the > > nice list processing functions that are available. > > > You could absolutely write something like that in Haskell, but as > some > have pointed out, this is probably _not a Good Idea_, even though it > works in your particular case, the array could be modified between > the > time you get the lazy list and the time you actually read it... And > there's no way to insure it's not happening in Haskell, and I > strongly > doubt there is in Concurrent Clean, could you confirm ? > Concurrent Clean can handle this in a safe way. Here's a code snippet > for normalize_2D_ary from ArrayTest.icl: > uToList_2D :: *(a u:(b c)) -> (.[c],*(a u:(b c))) | Array a (b c) & > Array b c > map_in_place_2d_arr :: (a -> a) *(b *(c a)) -> *(b *(c a)) | Array b > (c a) & Array c a > normalize_2D_ary :: *(a *(b c)) -> *(a *(b c)) | Array a (b c) & Array > b c & / c & Ord c > normalize_2D_ary ary = > let (lst,ary2) = uToList_2D ary > max_elem = foldl1 max lst > in map_in_place_2d_arr (\ x -> x / max_elem) ary2 > uToList_2D takes a unique array, ary, and returns a tuple containing a > list of the array elements and a "new" array, ary2. uToList_2D does > not modify ary, but Clean's type system forces any function that > accesses a unique array to thread the array through and return a "new" > array. Under the hood the "new" array actually uses the same memory > storage as the original array. So, it is effecient. Threading the > array serializes access insuring the array won't be modified until > the list is complete. > I'm confused --- does uToList_2D return the head of the list before or > after it finishes reading the array? If before, then I don't see how > the type system prevents me from modifying the array before I finish > examining the list, as you claim. If after, then the list isn't truly > lazy. > uToList_2D can return the head of the list before it finishes reading the > array. I could modify the code so that it is ambiguous whether the array > is modified before the list processing is finished. > normalize_2D_ary ary = > let (lst,ary2) = uToList_2D ary > max_elem = foldl1 max lst > in map_in_place_2d_arr (\ x -> x / max_elem) ary // I changed ary2 > to ary > However, the type system will generate an error with this code because > ary is no longer unique because it is referenced in two expressions. > Clean produces this error message: > Uniqueness error [ArrayTest.icl,55,normalize_2D_ary]: "ary" demanded > attribute cannot be offered by shared object > I should mention that a problem with the code I've shown is that it is > very sensitive to the order in which the expression graph is evaluated. > Simple changes can cause lst to become strict and the program to run out > of heap. > By the way, Clean has it's share of rough edges. The reason I'm hanging > out on Haskell-Cafe is because I'm trying to get away from those rough > edges. But, I am missing Clean's uniqueness types. I'm starting to > see Haskell's unsafe functions as a blunt work around that could be fixed > elegantly and safely by implementing uniqueness types. That's a reasonable critique : its hard to enforce uniqueness, in the type system in Haskell, -- I'd be interesting to see approaches that avoid extending the compiler. -- Don More information about the Haskell-Cafe mailing list
global_05_local_4_shard_00000656_processed.jsonl/73267
[Haskell-cafe] How do you make constant expressions? Daniel Fischer daniel.is.fischer at web.de Sun Jul 18 16:26:09 EDT 2010 On Sunday 18 July 2010 22:19:21, Eitan Goldshtrom wrote: > Silly question, but I can't find the answer on the net. I think I'm just > using the wrong words in my search. I'm looking for a way to create > constant expressions in Haskell. The C/C++ equivalent of what I'm > talking about is > #define NAME VALUE > I want an expression, or really just numbers for what I'm doing, that > the compiler will put into the program at the designated places, instead > of storing it in memory like a variable. > -Eitan Just make a top-level definition name = value and if you want to make sure it's inlined, {-# INLINE name #-} Or you can use {-# LANGUAGE CPP #-} with the #define More information about the Haskell-Cafe mailing list
global_05_local_4_shard_00000656_processed.jsonl/73269
Christoph Schlingensief "18 Images a Second" Exhibition 25.05 – 16.09.07 The film and theatre director and artist Christoph Schlingensief will present his installation "18 Images a Second" at the Haus der Kunst, a work created especially for the building's former Hall of Honour. Over the last two years Schlingensief has once again begun to deal with the medium film more intensely, something that is clearly reflected in his work for the Haus der Kunst. Two filmic work complexes form the installation's focus: "African Twin Towers" and short films that have been shot while the artist directed the "Flying Dutchman" at the Teatro Amazonas in Manaus, Brazil. Christoph Schlingensief presents the uncut version of his film, "African Twin Towers", in which he unites the Nordic and European world of legends with African Shamanism and the present, the music of Patti Smith with texts by Elfriede Jelinek and the acting of the Fassbinder actress Irm Hermann. At the same time he has designed a portrait of everyday occurrences in which political "heroes" appear, as well as other figures.  The film location is a "rotating disk", referred to as an "Animatograph" by Schlingensief, on which a ship with two masts stands. On these masts hang the twin towers. All this stood in Lüderitz in Namibia, a former German colony in South West Africa. The German present is staged and each day the movie begins anew under the constant surveillance of different cameras. This time Schlingensief is everything: director, actor and one of four cameramen. In Manaus Schlingensief has been shooting many short films in connection with his work on the "Flying Dutchman". The project's central theme is the idea of salvation. Richard Wagner was constantly preoccupied with this idea and in his last opera, Parsifal (1882), which Schlingensief staged in 2004 for the Bayreuth Festival, he tried to come to terms with it once and for all. These films are embedded in the Haus der Kunst installation, which is dominated by an over-sized scene of the Lord's Supper with Mohammed. A carnival float from Manaus serves as the installation's model. Underneath this depiction of the Lord's Supper are various booths, in which the films from Manaus and Africa rattle away on old-fashioned projectors. Schlingensief's radicalism lies in his subjective selection and in the non-hierarchical juxtaposition of images, themes and people. He believes in the sensual power of images and in the observer's ability to free himself from his desire for linearity. "For Schlingensief it is not a question of sharply focused things but rather haziness. I would like to endorse this belief since things that are clear are not inspiring. The world in its entirety is, in fact, incomprehensible." (Stephanie Rosenthal, curator of the exhibition) Christoph Schlingensief's installation at Haus der Kunst is funded by Kulturstiftung des Bundes. In cooperation with Xi Festival Amazonas de Ópera and Goethe-Institut São Paulo Stretch your view Stretch your view Christoph Schlingensief The leaflet (in German) provides an overview of the installation in Haus der Kunst, as well as of Schlingensief's work in general. MORE Utopia Station 07.10.04 – 16.01.05 This "Utopia Station", curated by Molly Nesbit, Hans Ulrich Obrist and Rirkrit Tiravanija, follows from several others, some of them gatherings, some of them virtual, some of them exhibitions. "Utopia Station" was designed to occupy the former "Ehrenhalle" of Haus der Kunst. MORE
global_05_local_4_shard_00000656_processed.jsonl/73304
Bitter Valentine's Day Poetry Challenge Three Sides to the Same Story 3. Túrin "Then the heart of Finduilas was turned from Gwindor and against her will her love was given to Túrin; but Túrin did not perceive what had befallen. And being torn in heart Finduilas became sorrowful; and she grew wan and silent." (The Silmarillion, J. R. R. Tolkien) To Fate: A Haiku, by the pools of Ivrin Elves' joyless sunlight-- Accursed foul-wind, Morgoth's breath I shall outrun you! In Challenges Story Information Author: Starlight Status: Reviewed Completion: Complete Rating: General Last Updated: 08/12/11 Original Post: 04/21/03 Back to challenge: Bitter Valentine's Day Poetry Challenge Go to story: Three Sides to the Same Story Keyword Search Results are ordered alphabetically by title.
global_05_local_4_shard_00000656_processed.jsonl/73334
February 20 This Day in History Feb 20, 1998: Tara Lipinski becomes youngest Olympic figure skating gold medalist On February 20, 1998, 15-year-old Tara Lipinski wins the gold medal in women's figure skating at the Olympic Winter Games in Nagano, Japan, and becomes the youngest gold medalist in her sport. Lipinski donned her first pair of skates at age six. In 1994, at age 12, she won a gold medal at the U.S. Olympic Festival, a junior-level competition. In 1997, Lipinski, then 14, took first place at both the national and world figure skating championships, beating out her American rival and perennial fan favorite, Michelle Kwan. Lipinski was the youngest person ever to take home either title. At the 1998 Winter Games in Nagano, Lipinski and teammate Michelle Kwan were both considered favorites for the gold medal. Earlier that season, the diminutive Lipinski, known for her energetic jumps, had been defeated twice in competition by Kwan, who was considered the more artistic skater of the two. Both Kwan and Lipinski turned in strong performances; however, Lipinski's program was considered more technically difficult and she was awarded the gold medal. Kwan took home the silver medal and China's Chen Lu won the bronze. Lipinski, then 15, was the youngest person in figure skating history to capture Olympic gold. (At the 1994 Winter Olympics in Lillehammer, Norway, 16-year-old Oksana Baiul from Ukraine won the gold in women's figure skating.) In April 1998, Lipinski announced she was turning professional. She went on to perform in skating shows such as "Stars on Ice" and also pursued an acting career. In 2006, she was inducted into the U.S. Figure Skating Hall of Fame. What Happened on Your Birthday? Pick a Date
global_05_local_4_shard_00000656_processed.jsonl/73399
kravet oberlin chair Back Next Courtesy of Manufacturer Oberlin Chair The Oberlin chair from Kravet offers a modern take on a classic wing back chair. Versatile and sophisticated, the chair is upholstered in a smart Ralph Lauren paisley from the Townhouse collection, rendered in bold black and white. By Kravet Which Old Hollywood films by a famous director feature wing back chairs like this one? So Haute tells us.
global_05_local_4_shard_00000656_processed.jsonl/73416
Historically Black Colleges and Universities Following are questions about Historically Black Colleges and Universities [HBCUs]. The published resources listed below will be helpful in finding the answers. You can find additional information about each institution on its website using the Howard University HBCU Gateway at www.howard.edu/HBCU-Gateway/ [When finished, click here for the answers.] 1997-1998 Guide to Historically Black Colleges and Universities. Chicago:  Johnson Publishing Company, 1997. Hill, Levin. Black American Colleges and Universities: Profiles of Two Year, Four-Year, and Professional Schools. Detroit: Gale Research, Inc., 1994. 1. Which college is the oldest Black women's college in the United States? 2. Spelman College appointed its first Black woman as president in 1987. What was her name? 3. What is the name of the Florida college, founded by Mary McLeod Bethune, which was originally the Industrial Training School for Girls? 4. Which is the only Black college with its own fleet of airplanes? 5. What is the name of the Black private four-year liberal arts college founded for men in Augusta that moved to Atlanta? [HINT: Martin Luther King, Jr. is one of this institution's most famous graduates.] 6. What Georgia university was formed by the merger of two separate institutions? 7. Besides Spelman, what is the name of the other four-year college for women? 8. What is the name of the oldest historical Black university in the South? 9. Which HBCU is the oldest Black private university in the nation? 10. What is the name of the only HBCU in Oklahoma? 11. Which HBCU was the home of the Fisk Jubilee Singers? [HINT: Look in Gallery I of the August 1999 issue of HUArchives Net.] <back to previous page continued on next page> cologo2.gif (6450 bytes) May 2000
global_05_local_4_shard_00000656_processed.jsonl/73419
Huffpost UK uk Charles Taylor Trial: Verdict Due In Landmark Sierra Leone War Crimes Case Posted: Updated: Print Article Charles Taylor is facing 11 charges of war crimes and crimes against humanity Former Liberian leader Charles Taylor will likely be imprisoned in the UK if international judges find him guilty of war crimes after a five year trial on Thursday. A verdict is due on 11 charges of war crimes and crimes against humanity at the Special Court for Sierra Leone in The Hague. Taylor is accused of building a rebel army which used terror tactics to slaughter and mutilate thousands during Sierra Leone's 11-year civil war. If found guilty, Taylor would become the first former head of state to be convicted of war crimes by an international court since the Nuremburg trials after the Second World War. It is likely Taylor would be imprisoned in the UK, after the Netherlands agreed to host the trial only if he served his term abroad. More than 120,000 people died in the Sierra Leone conflict between 1991 and 2002. Taylor is accused of providing guns to the Revolutionary United Front (RUF) in return for diamonds while he was leader of Liberia. The RUF was infamous for using child soldiers, who were often drugged on cocaine and gunpowder when they carried out their killings. The RUF was also known for brutally amputating its victims' limbs with machetes, with up to 20,000 victims reported. Taylor was indicted by a United Nations Special Court in 2003 on charges of murder, rape and sexual slavery. After the indictment Taylor fled into Nigeria, but was arrested in 2006 after attempting to cross the border into Cameroon, and forced to face the Special Court for Sierra Leone. His trial at The Hague began in 2007 but quickly descended into chaos after Taylor fired his lawyer and attempted to boycott proceedings. The trial resumed in 2008, and hit the headlines again in 2010 when supermodel Naomi Campbell and actress Mia Farrow gave evidence. The prosecution has attempted to prove Taylor used 'blood diamonds' to pay for the RUF by linking uncut stones he gave Campbell in 1997. Around the Web Court to issue verdict in trial of Charles Taylor Judges poised to deliver verdicts in Taylor trial Charles Taylor Faces Verdict From Brutal African War Charles Taylor: How Naomi Campbell 'blood diamond' evidence was critical Charles Taylor's child soldiers struggle as adults in Liberia Day of reckoning as warlord Taylor awaits verdict at The Hague
global_05_local_4_shard_00000656_processed.jsonl/73435
Click photo to enlarge (Eds: With AP Photos.) To say that the new Adam Sandler movie, "Blended," is better than some of his other recent work — "Jack and Jill," for example — isn't saying much. After all, some natural disasters cause less damage than others. But none are a positive development. OK, that's overly harsh to "Blended" — though not to "Jack and Jill." But please understand the frustration. Some of us are old enough to recall a time when Sandler made movies that were authentically funny, and didn't merely earn laughs by reminding people of their most puerile instincts. We also remember acting work by Sandler that deserved real admiration— remember the 2002 "Punch-Drunk Love"? Not to mention some classic moments on "Saturday Night Live" — but now we're REALLY dating ourselves. From Sandler's early, goofy, charming humor, we've traveled to a point where we're trying to analyze, in "Blended," whether his mocking of feminine hygiene products is better or worse than his jokes about a young boy's sexual explorations or a teen girl's futile efforts to boost her flat chest. But there's something else disappointing about "Blended," which stars Sandler and Drew Barrymore (in their third collaboration) as single parents thrown together on an African family vacation. The fact is, there are actual sparks of sweetness, actual moments of tenderness, mostly thanks to Barrymore's sunny and grounded presence (one shudders to imagine this movie without her) and the relaxed chemistry between the stars. But the moments don't stay sweet. They'll end with something like Sandler loudly urinating. Or two rhinos copulating. Tee hee. Sandler plays Jim, a widower with three daughters who works at a sporting-goods store. Barrymore is Lauren, divorced from her narcissistic husband and trying to juggle parenting two boys with running a closet-organizing service with her gal pal (Wendi McLendon-Covey). They first meet on a disastrous blind date. But, of course, they keep running into each other again. Like at the drugstore, where Jim is buying sanitary products for his teen daughter (much hilarity ensues, including from the cashier, who dishes about her own reproductive system, as cashiers so often do when you're checking out) and Lauren is trying to replace a centerfold she's ripped up from her son's girlie magazine. The coincidences keep happening, and so, eventually, and don't ask how — director Frank Coraci and screenwriters Ivan Menchell and Clare Sera don't lose sleep over plausibility — Jim and Lauren are both in South Africa, not only in the same resort, but the same suite! They're appalled to discover each other there, but of course, there's much to be learned over the ensuing days, about parenting, friendship, romance, family and wildlife. In case we didn't absorb those lessons, we're reminded of them by our singing — and bumping, and grinding — musical narrator, Terry Crews. There's also a not-very-funny side-plot involving a leering husband (Kevin Nealon) and a bride who expresses excitement by shaking her boobs (tee hee again). Not surprisingly, there is little attempt to depict real Africans. The most promising scenes involve the children, especially Jim's daughters and their attempts to replace their late mother's presence (although these can veer toward the maudlin). There's a little blonde moppet called Lou, a middle daughter named Espn, after the network (OK, that's funny) and a tomboy teen named Larry, for Hilary (Jim clearly wants sons). We're supposed to believe everyone thinks she's a boy, but, really? She's played by glamorous Bella Thorne, disguised only by an unattractive haircut, but otherwise looking a lot like Keira Knightley. Still, when Lauren, who's as happy to have daughters around as Jim is to have sons, gives Larry/Hilary a makeover at the salon, the scene unexpectedly warms the heart. And it reminds us that there's a fairly decent movie trying to breathe here, underneath the infantile humor. Maybe one day, Sandler will liberate that movie. "Blended," a Warner Bros. release, is rated PG-13 by the Motion Picture Association of America "for crude and sexual content, and language." Running time: 117 minutes. One and a half stars out of four.
global_05_local_4_shard_00000656_processed.jsonl/73457
(Heidelberg Catechism. part 3) Q. 67. Are both word and sacraments, then, ordained and appointed for this end, that they may direct our faith to the sacrifice of Jesus Christ on the cross, as the only ground of our salvation? (a) Yes, indeed: for the Holy Ghost teaches us in the gospel, and assures us by the sacraments, that the whole of our salvation depends upon that one sacrifice of Christ which he offered for us on the cross. (a) Rom.6:3; Gal.3:27. Q. 68. How many sacraments has Christ instituted in the new covenant, or testament? Two: namely, holy baptism, and the holy supper. Of Holy Baptism 26. Lord's Day Q. 69. How art thou admonished and assured by holy baptism, that the one sacrifice of Christ upon the cross is of real advantage to thee? Thus: That Christ appointed this external washing with water, (a) adding thereto this promise, (b) that I am as certainly washed by his blood and Spirit from all the pollution of my soul, that is, from all my sins, (c) as I am washed externally with water, by which the filthiness of the body is commonly washed away. (a) Matt.28:19. (b) Matt.28:19; Acts 2:38; Matt.3:11; Mark 16:16; 1:33; Rom.6:3,4. (c) 1 Pet.3:21; Mark 1:4; Luke 3:3 Q. 70. for the sake of Christ's blood, which he shed for us by his sacrifice upon the cross; (a) and also to be renewed by the Holy Ghost, and sanctified to be members of Christ, that so we may more and more die unto sin, and lead holy and unblamable lives. (b) (a) Heb.12:24; 1 Pet.1:2; Rev.1:5; Rev.7:14; Zech.13:1; (b) John 1:33; John 3:5; 1 Cor.6:11; 1 Cor.12:13; Rom.6:4; Q. 71. Where has Christ promised us, that he will as certainly wash us by his blood and Spirit, as we are washed with the water of baptism? In the institution of baptism, which is thus expressed: "Go ye, therefore, and teach all nations, Holy Ghost", Matt.28:19. This promise is also repeated, where the scripture calls baptism Acts 22:16. (a) (a) Tit.3:5; Acts 22:16. 27. Lord's Day Q. 72. Is then the external baptism with water the washing away of sin itself? Not at all: (a) for the blood of Jesus Christ only, and the Holy Ghost cleanse us from all sin. (b) (a) Matt.3:11; 1 Pet.3:21; Eph.5:26,27. (b) 1 John 1:7; 1 Q. 73. Why then does the Holy Ghost call baptism "the washing of regeneration," and "the washing away of sins"? God speaks thus not without great cause, to-wit, not only thereby to teach us, so our sins are removed by the blood and Spirit of Jesus Christ; (a) but especially that by this divine pledge and sign he may assure us, that we are spiritually cleansed from our sins as really, as we are externally washed with water. (b) (a) Rev.1:5; Rev.7:14; 1 Cor.6:11. (b) Mark 16:16; Gal.3:27. Q. 74. Are infants also to be baptized? for since they, as well as the adult, are included in the covenant and church of God; (a) and since redemption from sin (b) by the blood of Christ, and the Holy Ghost, the author of faith, is promised to them no less than to the adult; (c) they must therefore by baptism, as a sign of the covenant, be also admitted into the christian church; and be distinguished from the children of unbelievers (d) as was done in the old covenant or testament by circumcision, (e) instead of which baptism is instituted (f) in the new covenant. (a) Gen.17:7. (b) Matt.19:14. (c) Luke 1:15; Ps.22:10; Acts 2:39. (d) Acts 10:47. (e) Gen.17:14. (f) Col.2:11-13. Of The Holy Supper Of Our Lord Jesus Christ 28 Lord's Day Q. 75. How art thou admonished and assured in the Lord's Supper, that thou art a partaker of that one sacrifice of Christ, accomplished on the cross, and of all his benefits? Thus: That Christ has commanded me and all believers, to eat of this broken bread, and to drink of this cup, in remembrance of him, adding these promises: (a) and his blood shed for me, as certainly as I see with my eyes, the bread of the Lord broken for me, and the cup communicated to me; and further, that he feeds and nourishes my soul to everlasting life, with his crucified body and shed blood, as assuredly as I receive from the hands of the minister, and taste with my mouth the bread and cup of the Lord, as certain signs of the body and blood of Christ. (a) Matt.26:26-28; Mark 14:22-24; Luke 22:19,20; 1 Cor.10:16,17; 1 Cor.11:23-25; 1 Cor.12:13. Q. 76. What is it then to eat the crucified body, and drink the shed blood of Christ? It is not only to embrace with believing heart all the sufferings and death of Christ and thereby to obtain the pardon of sin, and life eternal; (a) but also, besides that, to become more and more united to his sacred body, (b) by the Holy Ghost, who dwells both in Christ and in us; so that we, though Christ is in heaven (c) and we on earth, are notwithstanding "flesh of his flesh and bone of his bone" (d) and that we live, and are governed forever by one spirit, (e) as members of the same body are by one soul. (a) John 6:35,40,47-54. (b) John 6:55,56. (c) Col.3:1; Acts 3:21; 1 Cor.11:26. (d) Eph.3:16; Eph.5:29,30,32; 1 Cor.6:15,17,19; 1 3:24; 1 John 4:13; John 14:23. (e) John 6:56-58; John 15:1-6; Q. 77. Where has Christ promised that he will as certainly feed and nourish believers with his body and bleed, In the institution of the supper, which is thus expressed: (a) took bread, this do in remembrance of me. After the same manner also he took the cup, when he had supped, saying: this cup is the new testament in my blood; this do ye, as often as ye drink it, in remembrance of me. For, as often as ye eat this bread, and drink this cup, ye do show the Lord's death till he come." 1 Cor.11:23-26. "The cup of blessing which we bless, is it not the communion of the blood of Christ? The bread which we break, is it not the communion of the body of Christ? For we being many are one bread, and one body: for we are all partakers of that one bread." 1 Cor.10:16,17. (a) 1 Cor.11:23-25; Matt.26:26-28; Mark 14:22-24; Luke 22:19,20; 1 Cor.10:16,17. 29 Lord's Day Q. 78. Do then the bread and wine become the very body and blood of Christ? Not at all: (a) but as the water in baptism is not changed into the blood of Christ, neither is the washing away of sin itself, being only the sign and confirmation thereof appointed of God; so the bread in the Lord's supper is not changed into the very body of Christ; (c) though agreeably to the nature and properties of sacraments, (d) it is called the body of Christ Jesus. (a) Matt.26:29. (b) Eph.5:26; Tit.3:5. (c) Mark 14:24; 1 Cor.10:16,17,26-28. (d) Gen.17:10,11,14,19; Exod.13:9; 1 Pet.3:21; 1 Cor.10:1-4. Q. 79. Why then doth Christ call the bread "his body", Christ speaks thus, not without great reason, namely, not only thereby to teach us, that as bread and wine support this temporal life, so his crucified body and shed blood are the true meat and drink, whereby our souls are fed to eternal life; (a) but more especially by these visible signs and pledges to assure us, that we are as really partakers of his true body and blood by the operation of the Holy Ghost as we receive by the mouths of our bodies these holy signs in remembrance of him; (b) and that all his sufferings and obedience are as certainly ours, as if we had in our own persons and made satisfaction for our sins to God. (a) John 6:51,55. (b) 1 Cor.10:16,17. 30. Lord's Day Q. 80. What difference is there between the Lord's supper and the popish mass? The Lord's supper testifies to us, that we have a full pardon of all sin by the only sacrifice of Jesus Christ, which he himself has once accomplished on the cross; (a) and, that we by the Holy Ghost are ingrafted into Christ, (b) who, according to his human nature is now not on earth, but in heaven, at the right hand of God his Father, (c) and will there be worshipped by us. (d) But the mass teaches, that the living and dead have not the pardon of sins through the sufferings of Christ, unless Christ is also daily offered for them by the priests; and further, that Christ is bodily under the form of bread and wine, and therefore is to be worshipped in them; so that the mass, at bottom, is nothing else than a denial of the one sacrifice and sufferings of Jesus Christ, and an accursed idolatry. (e) (a) Heb.7:27; Heb.9:12,25-28; Heb.10:10,12-14; John 19:30; Luke 22:19,20. (b) 1 Cor.6:17; 1 Cor.10:16. (c) Heb.1:3; John 20:17. (d) Matt.6:20,21; John 4:21-24; Luke 24:52; Acts Col.3:1; Philip.3:20,21; 1 Thess.1:10; Heb.9:6-10. (e) Heb.9:26; Q. 81. For whom is the Lord's supper instituted? For those who are truly sorrowful for their sins, and yet trust that these are forgiven them for the sake of Christ; and that their remaining infirmities are covered by his passion and death; and who also earnestly desire to have their faith more and more strengthened, and their lives more holy; but hypocrites, and such as turn not to God with sincere hearts, eat and drink judgment to themselves. (a) (a) 1 Cor.10:19-22; 1 Cor.11:28,29. Q. 82. Are they also to be admitted to this supper, who, by confession and life, declare themselves unbelieving and ungodly? for by this, the covenant of God would be profaned, and his wrath kindled against the whole congregation; (a) therefore it is the duty of the christian church, according to the appointment of Christ and his apostles, to exclude such persons, by the keys of the kingdom of heaven, till they show amendment of life. (a) 1 Cor.11:20,34; Isa.1:11-15; Isa.66:3; Jer.7:21-23; Ps.50:16. 31. Lord's Day Q. 83. What are the keys of the kingdom of heaven? The preaching of the holy gospel, and christian discipline, or excommunication out of the christian church; by these two, the kingdom of heaven is opened to believers, and shut against unbelievers. Q. 84. How is the kingdom of heaven opened and shut by the preaching of the holy gospel? Thus: when according to the command of Christ, it is declared and publicly testified to all and every believer, whenever they receive the promise of the gospel by a true faith, all their sins are really forgiven them of God, for the sake of Christ's merits; and on the contrary, when it is declared and testified to all unbelievers, and such as do not sincerely repent, that they stand exposed to the wrath of God, and eternal condemnation, so long as they are unconverted: (a) both in this, and in the life to come. (a) Matt.16:18,19; Matt.18:15-19; John 20:21-23. Q. 85. How is the kingdom of heaven shut and opened by christian discipline? Thus: when according to the command of Christ, those, who under the name of christians, maintain doctrines, or practices inconsistent therewith, and will not, after having been often brotherly admonished, renounce their errors and wicked course of life, are complained of to the church, or to those, who are thereunto appointed by the church; and if they despise their admonition, are by them forbidden the use of the sacraments; whereby they are excluded from the christian church, and by God himself from the kingdom of Christ; and when they promise and show real amendment, are again received as members of Christ and his church. (a) (a) Matt.18:15-18; 1 Cor.5:2-5,11; 2 Thess.3:14,15; 2 Cor.2:6-8. The Third Part - Of Thankfulness 32. Lord's Day Q. 86. Since then we are delivered from our misery, merely of grace, through Christ, without any merit of ours, why must we still do good works? Because Christ, having redeemed and delivered us by his blood, also renews us by his Holy Spirit, after his own image; that so we may testify, by the whole of our conduct, our gratitude to God for his blessings, (a) and that he may be praised by us; (b) that every one may be assured in himself of his faith, (c) by the fruits thereof; and that, by our godly conversation others may be gained to Christ. (d) (a) Rom.6:13; Rom.12:1,2; 1 Pet.2:5,9,10; 1 Cor.6:20. (b) 1 Pet.2:12; 1 Pet.1:6,7. (c) 2 Pet.1:10; Matt.7:17; Gal.5:6,22,23. (d) 1 Pet.3:1,2; Rom.14:19. Q. 87. Cannot they then be saved, who, continuing in their wicked and ungrateful lives, are not converted to God? By no means; for the holy scripture declares that no unchaste person, idolater, adulterer, thief, covetous man, drunkard, slanderer, robber, or any such like, shall inherit the kingdom of God. (a) (a) 1 Cor.6:9,10; Eph.5:5,6; 1 John 3:14. 33. Lord's Day Q. 88. Of how many parts does the true conversion of man consist? Of two parts; of the mortification of the old, and the quickening of the new man. (a) (a) Rom.6:1,4-6; Eph.4:22-24; Col.3:5-10; 1 Cor.5:7; 2 Cor.7:10. Q. 89. What is the mortification of the old man? It is a sincere sorrow of heart, that we have provoked God by our sins; and more and more to hate and flee from them. (a) (a) Rom.8:13; Joel 2:13; Hos.6:1. Q. 90. What is the quickening of the new man? It is a sincere joy of heart in God, through Christ, (a) and with love and delight to live according to the will of God in all good works. (b) (a) Rom.5:1; Rom.14:17; Isa.57:15. (b) Rom.6:10,11; Gal.2:20. Q. 91. But what are good works? Only those which proceed from a true faith, (a) are performed according to the law of God, (b) and to his glory; (c) and not such as are founded on our imaginations, or the institutions of men. (d) (a) Rom.14:23. (b) Lev.18:4; 1 Sam.15:22; Eph.2:10. (c) 1 (d) Deut.12:32; Ezek.20:18,19; Isa.29:13; Matt.15:7-9. (continued in part 4...) file: /pub/resources/text/ipb-e/epl-03: hbctch-3.txt
global_05_local_4_shard_00000656_processed.jsonl/73460
Tribunal Criminal Tribunal for the Former Yugoslavia Page 11225 1 Monday, 26 September 2005 2 [Open session] 3 --- Upon commencing at 9.08 a.m. 4 [The accused entered court] 5 JUDGE AGIUS: Yes, could you call the case, please, Madam? 6 THE REGISTRAR: Yes, good morning, Your Honours. This is case 8 JUDGE AGIUS: I thank you. 10 THE ACCUSED: [Interpretation] Good morning, Your Honours, 11 gentlemen. Yes, I can follow the proceedings in my mother tongue. 12 JUDGE AGIUS: I thank you. You may sit down. 13 Appearances for the Prosecution. 14 MR. WUBBEN: Good morning, Your Honours, and also good morning to 15 my learned friends of the Defence. My name is Jan Wubben, lead counsel 16 for the Prosecution. I'm here together with co-counsel, Mrs. Patricia 17 Sellers, and our case manager, Mrs. Donnica Henry-Frijlink, and later on,, 18 with apologies, also counsel Gramsci di Fazio will join the team. 20 your team. Present and future. 21 Appearances for Naser Oric. 23 Vasvija Vidovic. Good morning to my friends from the Prosecution. 24 Together with Mr. John Jones I'm representing Mr. Naser Oric, and together 25 we have our legal assistant, Ms. Adisa Mehic and our CaseMap manager, Page 11226 1 Mr. Geoff Roberts. 2 JUDGE AGIUS: Okay. I thank you, Madam, and good morning to you 3 and your team. 4 While we are at preliminaries, let us go for a little while in 5 private session because I need to give some information, confidential 6 information, to the parties. 7 [Private session] 8 (redacted) 9 (redacted) 10 (redacted) 11 (redacted) 12 (redacted) 13 (redacted) 14 (redacted) 15 (redacted) 16 (redacted) 17 (redacted) 18 (redacted) 19 (redacted) 20 (redacted) 21 (redacted) 22 (redacted) 23 (redacted) 24 (redacted) 25 (redacted) Page 11227 11 Page 11227 redacted. Private session. Page 11228 11 Page 11228 redacted. Private session. Page 11229 11 Page 11229 redacted. Private session. Page 11230 11 Page 11230 redacted. Private session. Page 11231 1 (redacted) 2 (redacted) 3 (redacted) 4 (redacted) 5 (redacted) 6 (redacted) 7 (redacted) 8 (redacted) 9 (redacted) 10 [Open session] 11 JUDGE AGIUS: Yes. On Friday, as you know, Defence filed an 12 urgent request for certification of the Trial Chamber's confidential 13 decision on second Defence motion for protective measures for Witness 14 D002. When are we hopefully expecting the response? I think I left a 15 message that this is urgent, not just from the motion itself but also 16 because the witness is amongst those which is listed to be coming over 17 shortly. 18 MR. WUBBEN: Your Honour, we intend to file our response by 19 tomorrow morning. 20 JUDGE AGIUS: All right. If you could file it by this evening, it 21 will be better. 22 MR. WUBBEN: We do our best, Your Honour. 23 JUDGE AGIUS: Because we will be having meetings on several 24 issues, the three judges, tomorrow and if it's on our table by the end of 25 the day then we can deal with it first thing tomorrow. Page 11232 1 MR. WUBBEN: Yes, Your Honour, we do our best. 2 JUDGE AGIUS: All right. 3 Then later on, this week, we hope to be able to give you our 4 decision on whether the late disclosure of C4 and C6 was in violation 5 of -- by the Prosecution was in violation of Rule 68. 6 The -- is there a problem? No problem? All right. 7 I'm still waiting for a document from the Registrar's office 8 detailing the procedure or the protocol they would expect, which will not 9 be binding on us, but I mean, it's for our information and more or less 10 for information purposes and then we decide, what the procedure for 11 allowing exhibits to be examined by forensic teams outside of the 12 Netherlands. I don't know if it has been done before here but if it has 13 been done, I will get details of the procedure and of course then I will 14 let you both parties but particularly Madam Vidovic and Mr. Jones. 15 We are still waiting, unless it has been filed in these last 16 couple of days, your reply to the Prosecution's response on the Rule 70 17 matter. 18 MR. JONES: Yes, we have filed a reply. 19 JUDGE AGIUS: When did you file it? 20 MR. JONES: I believe Friday. It may only actually be going 21 through the system today but we filed on Friday. 22 JUDGE AGIUS: I haven't seen it anyway and I haven't been informed 23 of it in any case. 24 Then I think, having handed down our decision on Avdo Huseinovic, 25 you need to decide whether to bring him over or not. That's up to you. Page 11233 1 We're not going to involve ourselves in that. But -- we are awaiting your 2 motion regarding the two witnesses Hans Vlens and Rene Caravielhe. 3 MR. JONES: Yes, and that raises issues related to what we 4 discussed earlier. It's one of the reasons for the delay. But it will 5 be, I imagine, within certainly a fortnight. 6 JUDGE AGIUS: And I think that covers the preliminaries that we 7 needed to raise. 8 Any preliminaries on your part? 9 MR. WUBBEN: Yes, Your Honour. It's about a year ago that the 10 issues has been discussed about an interview by Murat Efendic of alleged 11 to be Naser Oric and that was a year ago. We were able to provide the 12 Trial Chamber, as you might recall, a transcript but there was no video of 13 it and so we did do some actions in that respect and we can now confirm 14 that we could track the video and we will disclose it as soon as possible. 15 JUDGE AGIUS: I thank you, Mr. Wubben. 16 Madam Vidovic, any preliminaries on your part? 18 JUDGE AGIUS: Okay. I thank you. 19 MS. VIDOVIC: [Interpretation] Your Honour, just in regard with 20 Mr. Murat Efendic, we know that there was a video of his interview but 21 that's not what it's about. We are expecting the audio material of the 22 transcript that we received. So we are not talking about audio -- video 23 material but audiotapes. We know about the existence of the video 24 material but that has nothing to do with the transcript in question. 25 JUDGE AGIUS: Yes, Mr. Wubben. Page 11234 12 Blank page inserted to ensure pagination corresponds between the French and 13 English transcripts. Page 11235 1 MR. WUBBEN: Your Honour, to inform the parties, the video of 2 course include images, footage and audio. 3 JUDGE AGIUS: What's happening to -- okay. All right. It's 4 leveled down because I was hearing -- all right. 5 But, Ms. Vidovic, when we get this video we will see what the 6 position is. I mean -- of course if you have issues to raise arising out 7 of the filing of the video or the availability of that video, we'll deal 8 with it at that time. 9 Can we bring in the witness? Yes. 10 Registrar, 28th, we are still sitting in the afternoon, make again 11 another effort to see if we could sit in the morning because we will have 12 to rise early on the 28th if we sit in the afternoon. 13 [The witness entered court] 14 JUDGE AGIUS: And then I explain -- I will explain to the parties 15 why the three of us have to rise early, stop early, the sitting on 16 the 28th, if we sit in the afternoon. 17 So good morning to you, Mr. Malagic. 18 THE WITNESS: [Interpretation] Good morning. 19 JUDGE AGIUS: Welcome to this Tribunal. 20 THE WITNESS: [Interpretation] Thank you. 21 JUDGE AGIUS: You should be, and I take it that you are, receiving 22 interpretation of what I'm saying in English in your own language, which 23 enables you to follow the proceedings. If at any time there is something 24 wrong with the reception of interpretation, either you're not receiving it 25 or it's too loud or you can't hear it, or too low, please draw our Page 11236 1 attention straight away so that we'll rectify the problem. 2 You are about to start giving evidence in this case against Naser 3 Oric. You are a Defence witness. And our rules require that before you 4 start giving evidence, you enter a -- you make a solemn declaration 5 equivalent to an oath in several domestic jurisdictions, consisting in a 6 commitment on your part to speak the truth, the whole truth and nothing 7 but the truth throughout the entire testimony. 8 The text of the solemn declaration is going to be handed to you 9 now. Please read it out aloud, and that will be your solemn undertaking 10 with us that you will be testifying the truth. 14 [Witness answered through interpreter] 15 JUDGE AGIUS: I thank you, Mr. Malagic. Please do take a seat, 16 make yourself comfortable. 17 Have you ever given testimony before in your life? 18 THE WITNESS: [Interpretation] No, never. 19 JUDGE AGIUS: I'll explain to you a little bit briefly the whole 20 procedure. 21 Usher, please make sure that it is not in the way of Madam 22 Vidovic. 23 As I said, you are a Defence witness and very soon you will start 24 answering the questions that will be put to you, first by Madam Vidovic, 25 who is lead counsel for Naser Oric, and then by Ms. Sellers, who is Page 11237 1 co-counsel in the Prosecution team. 2 Let me introduce myself. I am the presiding Judge in this trial. 3 My name is Carmel Agius and I come from Malta. To my right I have Judge 4 Hans Henrik Brydensholt from the Kingdom of Denmark. To my left I have 5 Judge Professor Albin Eser from Republic of Germany. Together we are 6 presiding over this trial. We are the three of us professional judges. 7 You are expected to be here for two or three days. There is a 8 chance of staying here even longer if instead of answering the questions 9 that are put to you, you try to give more information than is required 10 from you. Whether you will go back home in time as expected pretty much 11 depends on you. I can assure you that the lawyers will do their best to 12 be very concise and very precise in the questions and the information that 13 they need from you but it is the tendency of many witnesses to volunteer 14 more information than what is being asked from them. We don't want more 15 information. So please, my advice to you and my recommendation to you is 16 that in the course of the questioning, both from Madam Vidovic and from 17 Ms. Sellers, you answer the question, the whole question and nothing but 18 the question. 19 Did I make myself clear? 20 THE WITNESS: [Interpretation] Yes, completely. 21 JUDGE AGIUS: The last thing, I know that Madam Vidovic would have 22 explained this to you but I'm explaining it also is that both you and 23 Madam Vidovic speak the same language, and if you don't allow a small 24 pause, small interval of time, both of you, between questions and answer, 25 you will create a lot of problems to our interpreters, who have already Page 11238 1 got a very difficult job in interpreting into Serbo-Croat, into English 2 and into French while the words are being spoken, and if you rush and jump 3 to put questions or answer questions without allowing this short interval 4 of time, we won't have all the transcript that we require. There will be 5 problems. So between Madam Vidovic's questions and your answer, please 6 allow a short interval of time so that the interpreters in the meantime 7 would have translated the words into English and into French. Okay. 8 Mr. Malagic, Madam Vidovic. 9 Examined by Ms. Vidovic: 10 MS. VIDOVIC: [Interpretation] 11 Q. Good morning, Mr. Malagic. 12 A. Good morning. 13 Q. I would kindly ask you to respond to my questions as briefly as 14 possible, as was explained to you by Your Honour. 15 Mr. Malagic, could you please state your full name for the record? 16 A. My full name is Azir Malagic. 17 Q. You were born on the 1st of July of 1967 in Voljavica, 18 municipality of Bratunac? 19 A. Yes. 20 Q. Your father's name is Enes, your mother's is Saliha and her maiden 21 name was Salihovic? 22 A. Yes. 23 Q. Your sister's name is Revda, and you have three brothers, Senad, 24 Reuf, and Hajrudin? 25 A. Yes. Page 11239 1 Q. You completed your primary education in Voljavica and then in 2 Bratunac in 1982; is that correct? 3 A. Yes. 4 Q. You completed your secondary education in 1986 in Ljubovija and 5 there was an agricultural school? 6 A. Yes. 7 Q. Mr. Malagic, it might be easier for you if you moved your chair 8 closer to the microphones. 9 Thank you. You served your military term in Kraljevo in Serbia 10 from 1986 to 1987? 11 A. Yes. 12 Q. In 1999, you started studying at the school of political science 13 in Sarajevo and you haven't completed your degree yet? 14 A. Yes. 15 Q. You were employed in 1991 in Bratunac and you worked there for 16 only six months in Oka enterprise? 17 A. Yes. 18 Q. You spent the war in the area of Srebrenica and Bratunac? 19 A. Yes. 20 Q. When Srebrenica fell, your father went missing, together with 21 around 20 members of your extended family? 22 A. Yes. 23 Q. After the war, you became a professional soldier with the army of 24 the Federation of Bosnia-Herzegovina? 25 A. Yes. Page 11240 1 Q. You underwent military training under the auspices of the 2 government of the United States? 3 A. Yes. 4 Q. You are now employed with the military school in Tuzla as sergeant 5 first class, and you teach the recruits who have come to serve their 6 military term and you cover the subject of artillery? 7 A. Yes. 8 MS. VIDOVIC: [Interpretation] I would kindly ask the usher to put 9 a map before the witness. We will use this map throughout the testimony. 10 It is a map of the Srebrenica area. 11 Q. Witness, could you please mark some of the villages on the map 12 that I will ask you to point to us? 13 Could the witness please use our pen? 14 Witness, I believe the map is in front of you. Please mark 15 Srebrenica for the Trial Chamber. Then Likari. Then your own village of 16 Voljavica. 17 A. [Marks]. 18 Q. Please mark for the Chamber the village of Zaluzje next. Then 19 Prisoj, Biljaca, Lasovac, Poloznik, Pirici, a bit further there is 20 Dimnici. Could you please mark that? Predola. Petinici. Lokva. And 21 Potocari. 22 Please explain to the Trial Chamber what was the ethnic makeup of 23 these villages prior to the war. 24 A. Yes. These villages were exclusively inhabited by the Muslim 25 population. Page 11241 1 Q. Could you please point out to the villages of Pobrdje now, 2 Rakovac, Bjelovac, Sikiric, Sase, Gradina, Kostanovice, Neskovici, and 3 Zalazje. 4 Could you please tell us the ethnic makeup of those villages prior 5 to the war? 6 A. The villages of Pobrdje, Bjelovac, Sikiric, Sase and Gradina, the 7 population there was mixed. 8 Q. And Kostanovice, Neskovici and Zaluzje? 9 A. Kostanovice, Neskovici and Zaluzje, those villages were 10 exclusively populated by Serbs. 11 Q. Thank you. Your native Voljavica, prior to the war, was that 12 exclusively a Muslim village? 13 A. Yes, only Muslims lived in Voljavica. 14 Q. Thank you. 16 an exhibit number to this map as a Defence Exhibit? And I would kindly 17 ask the witness to keep the map because we will be referring to it 18 throughout the testimony. 19 JUDGE AGIUS: Yes, one moment, Madam Vidovic. This will be D7 -- 20 THE REGISTRAR: D757, Your Honour. 21 JUDGE AGIUS: Thank you. 22 MS. VIDOVIC: [Interpretation] 23 Q. Witness, could you initial this map in one of its corners? You 24 can initial or sign. 25 A. [Witness complies]. Page 11242 1 Q. Thank you. If it's easier, you can look straight at me to answer 2 the questions. 3 Before the war, the area of Voljavica and the environs, was that a 4 peaceful area? 5 A. Yes. 6 Q. Could you please explain briefly for the Chamber when did you 7 notice the situation changed? 8 A. Yes. In that area, we started noticing things right after the 9 cessation of Slovenia and particularly after the war broke out in Croatia, 10 and then we noticed that the situation in that area started changing and 11 that the Serbs started insisting on the thesis that their population was 12 endangered, particularly in the areas where Muslims were in majority. 13 Q. By which means did they try to disseminate that idea of the Serbs 14 being endangered? 15 A. It usually went via the media, newspapers, the television. 16 Q. During 1990 and 1991, did you have any knowledge on the 17 organisation and the activities of the SDS in that area? 18 A. Yes. 19 Q. What was it that you noticed? 20 A. We noticed that in the villages surrounding Voljavica, 21 particularly in the village of Pobrdje, Miroslav Deronjic was a frequent 22 guest there, and he was the local SDS representative from Bratunac and he 23 used to meet with the people in Pobrdje. 24 Q. Did you notice something that made you conclude that some 25 arrangements of the SDS are being implemented in the field? Page 11243 1 A. Yes. At the time, they had already begun collecting volunteers to 2 be sent to the war in Croatia to fight the Croatian Catholic population. 3 Q. All right. How did you attain such information? How come you 4 know of that personally? Did the Serbs try to cover up those departures 5 to fight in Croatia? 6 A. No. They used to state it publicly. They didn't even try to hide 7 it. They were proud of it. 8 JUDGE AGIUS: Yes, Ms. Sellers? 9 MS. SELLERS: Your Honour, thank you. I would just like to ask 10 the Trial Chamber to note that the Prosecution will not be making 11 objections in terms of leading questions during what we consider this 12 background period building up to things a bit more relevant to our 13 indictment, but just to note that the witness is being asked about how did 14 he reach conclusions and things of that nature which we haven't had a 15 proper foundation, but seeing that we are with a lengthy witness that 16 might take time, the Prosecution will allow some of the leading questions 17 but we just would like to let the Trial Chamber understand that's the 18 reason we are not at this point offering objections. 19 JUDGE AGIUS: Thank you. That's pretty much in conformity with 20 the practice that we are adopted so far. Thank you, Ms. Sellers. 21 Madam Vidovic. 22 MS. VIDOVIC: [Interpretation] Your Honour, I was trying to get 23 through this part of the testimony as quickly as possible in that way. 24 Q. During 1991, that is the latter part of 1991, did you know of an 25 event that related directly to the war in Croatia and pertaining to your Page 11244 12 Blank page inserted to ensure pagination corresponds between the French and 13 English transcripts. Page 11245 1 area? 2 A. Yes. 3 Q. What was it about? 4 A. At that time, the Serbs had a propaganda show, so to say, in order 5 to show how endangered they were in that area, and that was broadcast by 6 the Belgrade television. They found several people who sold some of their 7 property, much earlier, and they tried to portray those people as being 8 expelled from that area. 9 Q. Were you in possession of any information that some people from 10 your area were being killed in Croatia? And did you know of some 11 funerals? 12 A. Yes. 13 Q. Did you see any such funeral? 14 A. Yes. The particularly well known funeral is the funeral of a 15 fighter from Zaluzje who was killed in the Croatian front. 16 Q. Was that just a regular funeral or was it something completely 17 different? 18 A. The Serbs made the best use of that funeral to promote their 19 Chetnik insignia. They displayed the so-called cockades that they used to 20 wear in the Second World War, and the Muslims have been injured greatly, 21 in particular, by that insignia and the people who used to wear it then. 22 Q. In the area of Voljavica and the surrounding Muslim villages, were 23 there any crimes committed at that time in the Second World War by the 24 Chetniks, by the people who used to wear cockades? 25 A. Yes. My grandfather was killed in the Second World War by the Page 11246 1 Chetniks, as well as a lot of other people from Voljavica. In this recent 2 war, my father was killed by them, and it seems that it moves on from one 3 generation to the next and it is always the same insignia. 4 Q. Is it true that at the beginning of 1992, you became a member of 5 the reserve forces of the Ministry of the Interior of Bosnia-Herzegovina? 6 A. Yes. 7 Q. Performing those tasks, did you used to cover the area of 8 Voljavica? 9 A. Yes. 10 Q. Did you move about in the wider area at that time when you were a 11 reserve policeman at the beginning of 1992? Did you move about a wider 12 area including the area of Bratunac and the villages associated with that 13 municipality? 14 A. Yes. 15 Q. As a member of the police reserve force, did you used to carry a 16 semi-automatic rifle? 17 A. Yes. 18 Q. Performing the tasks of a reserve policeman, were you in position 19 to acquire certain information and to have some knowledge about the events 20 in the field starting from 1991 all the way to the beginning of the war in 21 1992? 22 A. Yes. 23 Q. Were you in contact with a lot of people, both Muslim and Serb, 24 from your area? 25 A. Yes. Performing my duties, I did. Page 11247 1 Q. Via those contacts, did you acquire some information? 2 A. Yes. 3 Q. Did you forward such information to anyone? 4 A. Yes. To the public security station in Bratunac. 5 Q. As a reserve policeman, were you in a situation to be able to 6 notice something pertaining to the activities of the SDS of that area? 7 A. Yes. 8 Q. A minute ago you mentioned that you knew Mr. Miroslav Deronjic; is 9 that correct? 10 A. Yes. 11 Q. Could you please again tell the Chamber who Miroslav Deronjic was? 12 A. Miroslav Deronjic was the leader of the Bratunac SDS, their 13 president. 14 Q. You also mentioned that he contacted two people, Nikola Ostojic 15 and Branko Obrenovic. Could you tell the Chamber who those two people 16 were? 17 A. Yes. Those are people from our neighbouring village of Pobrdje 18 and they were the local SDS representatives for their localities. 19 Q. Thank you. I would kindly ask the usher to put a Defence Exhibit, 20 D625, before the witness. 21 This is a document of the Serbian Democratic Party of 22 Bosnia-Herzegovina. It's a document of the Main Staff of the Serbian 23 Democratic Party of Bosnia-Herzegovina, and it's called instruction on 24 organising and the activities of organs of the Serbian people in 25 Bosnia-Herzegovina in extraordinary circumstances. This was issued in Page 11248 1 Sarajevo on the 19th of December, 1991. 2 First of all, Witness, before you look at this document, I would 3 like to ask you something. Is it true that the Bratunac municipality, 4 before the war, was a municipality with a majority Muslim population, if 5 we look at it overall? 6 A. Yes. 7 Q. This is a long document referring to the organisation and 8 activities of the organs of the Serb people in Bosnia-Herzegovina in 9 extraordinary circumstances, but I would like to ask you about things that 10 you yourself were able to notice while working out in the field as a 11 reserve police officer. 12 Please, I would like to draw your attention to page -- do you have 13 the document in front of you? Can you open it at page that has 2, the 14 number 2 up in the corner, and that's the page that contains item 5 there. 15 Do you see it? 16 A. Yes. 17 Q. I'm going to quote to you this item 5. 18 MS. VIDOVIC: [Interpretation] Your Honours, in the English 19 translation this is on page 3. Item 5 of the instructions of the SDS Main 20 Board states: "Preparations are to be made for the formation of municipal 21 state organs an executive board, administrative organs, magistrate's 22 court, public security stations, et cetera, and proposals are to be made 23 for personnel that will be holding the posts and carrying out duties in 24 these organs. Preparations are to be made for taking over the staff 25 facilities and equipment of security services, centres and their Page 11249 1 attachment to a newly established body for internal affairs at the centre 2 headquarters." 3 What I would like to ask you now is the following: Did you, in 4 early 1992, notice anything specific in the behaviour of Serb police 5 officers? We are talking about the beginning of 1992. 6 A. Yes. In that period they no longer wanted to work together with 7 us, to go on patrols, on mixed patrols, patrols of mixed composition. 8 Q. Could you please look at item 9 now, which is on page 3? Could 9 you please find item 9? Could you please turn the page and find item 9 10 now? 11 On the English -- in the English version it's on page 3. I'm 12 going to read to you this item 9. Quoting: "Estimates are to be made of 13 the necessary number of members of an active and reserve police structures 14 of the TO, Territorial Defence, units and civil protection units. And in 15 keeping with that, these structures are to be reinforced and all other 16 necessary steps are to be taken for their activation according to how the 17 situation develops." 18 What I would like to ask you now is the following: Could you 19 please comment on this part that refers to the reserve police forces? Did 20 you notice -- 21 A. Yes. At this time, the Serbs had many more cadres in the police 22 reserve force, even though their settlements were much smaller than the 23 Muslim settlements. For example, the village of Voljavica is much bigger 24 than the village of Voljavica -- of Bjelovac, and we only had five reserve 25 police officers there. While there were twice as many reserve police Page 11250 1 officers in Bjelovac. There were ten. And the situation was similar in 2 other places in the Bratunac area. 3 Q. Did you have any -- did you see anything in particular regarding 4 the arming of the reserve police officers? 5 A. The weapons that we were issued were mostly old weapons. I was 6 issued a semi-automatic rifle. Very few Muslims received an automatic 7 rifle. Most frequently it was the M48 which means that it was 8 manufactured in 1948. While the Serbs mostly were issued with automatic 9 weapons of more recent manufacture. 10 Q. Thank you very much. 11 Could you please tell the Trial Chamber how was it possible for 12 something like that to happen? And to go on happening? 13 A. Yes. It was very possible, because all the leading or the 14 leadership cadre at the Bratunac MUP were of Serb ethnicity. There were 15 some Muslims but not so many. 16 Q. The chief of the SJB in Bratunac was Sead or Senad Hodzic. He was 17 a Muslim. According to what you know, was he in a position to prevent 18 this type of conduct, if you know? 19 A. Yes. I do. He wasn't or he didn't have very much say in these 20 matters. 21 Q. Thank you very much. I would like to take you back to the 22 document again. You were talking about propaganda activities. Could you 23 please look on this same page, item 8 of the instruction of the Main Board 24 of the SDS? This is also on page 3 of both the Bosnian and English 25 versions. I will quote. "Information propaganda activities are to be Page 11251 1 intensified in order to inform the Serb people promptly and completely 2 about the political and security situation in the municipality and further 3 afield." 4 Mr. Malagic, do you agree that in this period, from early 1992 up 5 until the war, the propaganda information activities were intensified in 6 relation to the Serbian people? 7 A. Yes. 8 Q. Let us continue now with this document. Could you please look at 9 item 11 of the instruction? It's on the same page that you were just 10 looking at. I am quoting: "Preparations are to be made, organisational 11 and other conditions created for the protection of children, pregnant 12 women, elderly people, sick people, invalids or disabled people including 13 preparation force protection and evacuation to less endangered areas in 14 full cooperation with the commands and headquarters of our armed forces, 15 (JNA)." 16 So this is an instruction by the Serbian Democratic Party. Do you 17 agree that the Serbian Democratic Party considered as its own the JNA 18 forces? 19 A. Yes. 20 Q. Was this actually demonstrated out in the field, in practice? 21 A. Yes. We, the members of the police reserve forces, always knew 22 when they were carrying out an evacuation of children, elderly women, the 23 elderly, mostly to Serbia. All of this was covered by Radio Television 24 Belgrade. Men of military age and younger women were the ones who mostly 25 stayed at home. Page 11252 1 Q. My question is: Did you have information whether they were 2 assisted in this by the JNA? 3 A. Yes. 4 Q. Please, this part of the instruction by the SDS Main Board, which 5 I just pointed out to you, was this implemented in Serbian villages in 6 your area around Voljavica and in the Bratunac area? 7 A. Yes. It was absolutely implemented. 8 Q. Along with what was happening in the early months of 1992, did you 9 notice if anybody around you was receiving weapons or being armed? 10 The usher can now remove the document. 11 A. Yes, I did notice. 12 Q. Do you have any specific information about who was being armed in 13 that area? Which people? 14 A. Yes. The population of Biljaca, Bjelovac. Most often Lasovac, 15 constantly reported to us that they were seeing armed Serbs who were 16 leaving in columns from Bjelovac towards Kunjarac in uniforms of 17 olive-drab colour, and they were carrying out shooting practice and 18 training there. 19 Q. You said they reported to us, the citizens of certain villages 20 reported to us. When you say, "Us," who do you mean? Are you thinking of 21 yourself and somebody else most probably? Could you please explain that 22 to the Trial Chamber? 23 A. Yes. I'm thinking of us, members of the reserve forces of the 24 police who were working in that area at the time. I can also give you 25 their names. Page 11253 1 Q. Yes. 2 A. Esad Alic, Samir Vlic, Munid Suljagic, Kadrija Jusic. They were 3 my colleagues. 4 Q. When you mentioned that they -- that people from Biljaca reported 5 to you that they were seeing columns of armed and uniformed Serbs moving 6 from the direction of Bjelovac towards Kunjarac and were undergoing 7 training there, can you remember who was it who reported this to you? 8 A. Yes. Most often, this was reported to us by Sadif Zukic and many 9 others. 10 Q. Did you have similar information for other regions as well? For 11 example, for Pobrdje? 12 A. Yes. The citizens of Lasovac and the citizens of Voljavica who 13 lived closer to Pobrdje constantly reported to us that they were also 14 seeing large groups of armed and uniformed men who were leaving from 15 Pobrdje through Tablja in the direction of Obadi. 16 Q. Can you indicate this on the map? 17 A. Yes. Pobrdje, Tablja is not drawn in and then towards the Obadi 18 road. 19 Q. Could you please mark with the letter T the settlement of Tablja 20 because that is something that we will be mentioning during your 21 testimony. 22 Very well. Could you please tell us these things that the people 23 reported to you, was this -- did this become more intense in a certain 24 period? Did this intensify or not? 25 A. Yes. In March, in mid-March, and in -- and early April, this was Page 11254 12 Blank page inserted to ensure pagination corresponds between the French and 13 English transcripts. Page 11255 1 something that happened every day. 2 Q. Are you thinking of 1992? 3 A. Yes, 1992. 4 Q. You, a member of the police reserve forces, and other members of 5 these police forces, in general Muslims, did you exchange information 6 amongst yourselves, information that you received? 7 A. Yes. 8 Q. Did you inform the public security station in Bratunac about that? 9 A. Yes. It was our duty to send reports to the station. 10 MS. VIDOVIC: [Interpretation] Your Honours, could the witness now 11 be shown three documents? These are similar documents. They follow one 12 another. These are Exhibits D101, D102 and D103. 13 Q. Witness, could you please look at document D101? These are 14 salaries for May 1992. It says Rakovac, the first company. Have you 15 found that? 16 THE INTERPRETER: Interpreter's correction, first platoon. 17 MS. VIDOVIC: [Interpretation] 18 Q. Rakovac, first platoon, there is a large computer number 01320211. 19 That's the page. 20 A. Yes. 21 Q. Could you please look at the list? I will draw your attention to 22 certain persons. 23 Could you please look at the name under number 7, Vujadin 24 Prodanovic? 25 A. Yes. Page 11256 1 Q. And then number 22, Dragan Prodanovic? 2 A. Yes. 3 Q. Now, could you please turn the page and then look where it says 4 the second platoon, and if you can look at the names of the persons under 5 number 2, Djordjo Djurkovic; 4, Dragojlo Neskovic; 15, Dusan Prodanovic; 6 25, Stevo Jakovljevic; number 32, Slavko Alempic, and now I would like you 7 to turn to the next page and look at number 24, the name Goran Vasic, and 8 I would like to ask you if you know any of these people? 9 A. Yes. I know these people very well. They are from Rakovac, it's 10 a neighbouring village next to Voljavica. 11 Q. In the course of March and April 1992, did you receive any 12 information or any reports regarding these people or not? 13 A. Yes. These people that you just -- whose names you just read out 14 were all seen armed and uniformed. The citizens -- a citizen from the 15 village of Voljavica who was transporting stones from the River Drina once 16 reported that he encountered these people who were with weapons and 17 uniforms and they were leaving towards the Drina. 18 Q. Did you compile a report about this and send it to Bratunac? 19 A. Yes. That was our duty. 20 Q. Could you please now look at this document again? And I would 21 like to draw your attention to these markings next to the names. For 22 example, under number 7, Vujadin Prodanovic, it says, PAP and so on and so 23 forth. Could you please explain to the Trial Chamber what this means, 24 PAP, M48, what you see in this document under the column that's titled 25 "weapons"? Page 11257 1 A. Yes. These are abbreviations for infantry weapons from the 2 ex-JNA. For example, PAP, means semi-automatic rifle. AP means automatic 3 rifle. MP means machine-gun. Then another machine-gun, it's a 53, as it 4 was called. So all these are abbreviations indicating artillery weapons 5 which were used in the former JNA. 6 Q. Thank you. When Mr. Sirucic [phoen] reported this event or 7 incident, did he describe what these people whom we mentioned had, in 8 terms of weapons? 9 A. Yes. 10 Q. Could you please look at these names that we talked about? Did he 11 mention these specific weapons? 12 A. Yes. He did mention the weapons that are indicated here on this 13 list. 14 Q. Very well. Thank you very much. Did he tell you what -- or did 15 he report to you what these people were wearing, what kind of clothing 16 they were wearing? 17 A. Yes. The majority of the people were wearing olive-drab uniforms, 18 JNA uniforms. Some of them also had multi-coloured uniforms. It's 19 probably something that was brought from the Croat front. 20 Q. Thank you very much. Now I would like to you look at D103. It's 21 also a list of salaries for May 1992. The title of the document is, "List 22 of soldiers of the MB 120 Squad." Do you have that document in front of 23 you, Witness? 24 A. Yes. 25 Q. Could you please look at the document. Under number 1, it says, Page 11258 1 Savo Lukic, Pobrdje? 2 A. Yes. 3 Q. Then number 4, it states, Dragan Neskovic? 4 A. Yes. 5 Q. And then under number 15 it says Mico Gavric. Do you know these 6 people? 7 A. Yes. Dragan Neskovic was a policeman before the war in Bratunac. 8 Mico Gavric was the foreman at the Sase mine. He was actually my father's 9 foreman and all of us from that area knew him. 10 Q. In relation to these people, in the second half of April 1992, did 11 you receive any information? 12 A. Yes. In the -- on the outskirts of Voljavica, the Bekric family 13 lived. They were above Pobrdje and Tablja. I remember very well. He was 14 very disturbed. He came to our checkpoint in Voljavica and said that 15 there were mortars stationed at Tablja. He saw that very well. I mean he 16 knew those weapons. He was evidently upset and he said that they were 17 pointing towards Voljavica. 18 Q. You said Bekric. Do you remember the full name of that person? 19 A. Yes. Bekric, Selman. 20 Q. Did you talk some more about that with him? Did he see any people 21 there? 22 A. Yes. He confirmed to me that Neskovic, Dragan was there, and Mico 23 Gavric, and he was expecting the police to do something. 24 Q. Thank you very much. 25 MS. VIDOVIC: [Interpretation] Could the usher now please show the Page 11259 1 witness document D102? 2 Q. This is a list for payment of salaries for May 1992. It states 3 here, list for payment of salaries for May 1992, and then in parentheses, 4 it says various TOs. Could you please look at name under number 2, Simic, 5 Zoran, Bjelovac; and then the number -- the name under number 7, Dragan 6 Prodanovic, Rakovac. Do you know these people? 7 A. Yes. I spoke about Prodanovic a little bit earlier. He was on 8 that TO list in the Rakovac second platoon. And I knew Zoran Simic 9 personally. He was from Bjelovac or Kunjarac more precisely. People from 10 Bileca often said about him that he was an extremist, that he insulted the 11 Muslim population in Bileca and Lasovac, that he was always in uniform, 12 even in April, that they often saw him armed, that he threatened people 13 and so on and so forth. 14 Q. Thank you very much. 15 Did you personally, while you were working as a reserve police 16 officer, have any contact with an arms shipment to the Serbs in April 17 1992? 18 A. Yes. 19 Q. Do you remember when this was and exactly what it was about? 20 Could you please tell the Trial Chamber about it? 21 A. Yes. This was in April 1992. 22 Q. And just one moment, please. In April 1992. This event that you 23 will tell the Trial Chamber about, is that something that you saw 24 yourself, by yourself, or were there any other people with you and if you 25 were in the company of other people, who were they? Page 11260 1 A. There were people from the reserve police forces, such as Esad 2 Alic, Samir Vilic, and an active police officer, Mujo Husic. While we 3 were on routine patrol on the road towards our football pitch in 4 Voljavica, we noticed that from across the Drina, from Ljubovija, from the 5 Brioni hotel there were some light signals being made with a flashlight, 6 and shortly after that we noticed the same signals on the other side, the 7 Bosnian side, in Pobrdje to be more precise, and we set off in the 8 direction of those signals. As we were walking, we could see that there 9 was a boat coming close from other side of the Drina. We couldn't see 10 exactly how many people were there in the boat. We could see that there 11 were some cases there. When we approached the light signals we could hear 12 the voice, "Halt," and then there was a burst of fire. 13 We threw ourselves on the ground. We were scared. We were 14 shouting, "This is the MUP Bratunac police here. Don't shoot." We also 15 perhaps fired one or two bullets in the air. We heard a voice from the 16 other side, "Police officers, don't shoot. Kosta is here." Then we got 17 up. We approached them. There was a man there standing from Pobrdje, 18 that was Kosta Neskovic. He had his hands up in the air, "Don't shoot, 19 brothers." He thought we were Serbs. He said, "Brother Serbs from Serbia 20 are shipping weapons to us." However, when the shooting broke out, the 21 boat returned to the other side, towards Serbia, and we brought Kosta into 22 the Bratunac police station. 23 Q. On the way there, did you talk with Kosta? What did he tell you? 24 A. Yes. He was slightly intoxicated. He said that there were more 25 people there, the rest of them ran off, I don't know why. He said that Page 11261 1 they were cowards, and he said that they were constantly receiving weapons 2 from Serbia. 3 Q. Tell me, according to your information, this statement of his 4 about weapons, was that something that he provided in a statement to the 5 Bratunac public security station? 6 A. Yes, to Inspector Fehim. Because the next day they came out for 7 an on-the-scene investigation, and they found shells of a certain type of 8 weapon, Ruskie [phoen] Dobosar, that was used in the TO at the time. Drum 9 cartridges. 10 MS. VIDOVIC: [Interpretation] I would now like the witness to look 11 at another document before the break. Could we please show the witness an 12 excerpt from a book? It's a book, "The Truth about Bratunac," written by 13 Nijaz Masic. 14 Q. I would like to show you an excerpt on page 26. Could you please 15 follow what I am reading very carefully, Mr. Malagic? 16 This is written by Nijaz Masic and it's from his book, "Truth 17 about Bratunac." And it states here: "Using the current situation after 18 the murder in Kajici and the completed programme of evacuation of the 19 Serbs from Bratunac municipality, the same day when Koljevic visited 20 Kravica, the delivery of weapons to Serbs was organised by boats from 21 Serbia over the River Drina. During the same night, after Koljevic left 22 the village guard of Voljavica, local community, discovered the transfer 23 of weapons from Ljubovija by boats on the section of the Drina River that 24 lies below the Pobrdje village. On that occasion, the village guard 25 arrested Kosta Neskovic from Pobrdje who was captured while securing the Page 11262 1 boat which was loaded with weapons. The arrested Neskovic was delivered 2 to the public security station of Bratunac immediately. However, the 3 village guard did not manage to seize the weapons because fire was opened 4 from across the Drina from Ljubovija, from the Brioni area." 5 I would like to ask you the following about this: This excerpt of 6 Nijaz Masic's book, does that truthfully represent the event that you 7 talked about? 8 A. No, it does not. 9 Q. Could you please tell the Trial Chamber when this incident in 10 Kajici occurred and when did Mr. Nikola Koljevic visit that area, if you 11 remember? 12 A. Yes, I remember. The murder of two Muslims in Kajici took place 13 in September 1991. And this event on the Drina took place in April 1992. 14 So it's considerably later than this other event, and these two events are 15 not linked in any way at all. 16 Q. Another thing: It states here that on the arrival of Koljevic, 17 the village guard discovered the weapons shipment from Ljubovija. You 18 participated in these events. Was this something that involved the 19 village guard at all or was this something else? 20 A. No. We were regular members of the public security station in 21 Bratunac. We were the reserve forces and there was also an active police 22 officer with us and we had instructions to carry out our duties. 23 Q. We are still talking about this time period when this incident 24 occurred. Did the Public Security Service in Bratunac still function 25 jointly? Page 11263 1 A. Yes. 2 Q. So this excerpt of Nijaz Masic's book, which talks about this 3 whole incident, including the visit by Nikola Koljevic, the time period, 4 as well as -- which mentions the village guard, is this incident true or 5 not? 6 A. No, it is not true at all. 7 Q. Thank you very much. 8 MS. VIDOVIC: [Interpretation] Your Honour, we would like to have a 9 number for this Defence exhibit, please. 10 JUDGE AGIUS: Yes, thank you, Madam Vidovic. This document, which 11 is being tendered in both the original language and in the English 12 translation of it, consisting of the photocopy of the title of the book 13 and of the publishing details, and page 26 of the original language, 14 accompanied as stated by the corresponding English translation, is being 15 marked as Defence Exhibit D758. Thank you. 16 MS. VIDOVIC: [Interpretation] Your Honours, perhaps this would be 17 a good time for the break. 18 JUDGE AGIUS: We'll have a 25-minute break starting from now. 19 Thank you. 20 --- Recess taken at 10.29 a.m. 21 --- On resuming at 11.00 a.m. 22 JUDGE AGIUS: Yes, Madam Vidovic. 23 MS. VIDOVIC: [Interpretation] 24 Q. Mr. Malagic, according to what you knew then, did the Muslim 25 population of the area know of the arming of the Serbs, speaking Page 11264 12 Blank page inserted to ensure pagination corresponds between the French and 13 English transcripts. Page 11265 1 generally? 2 A. Yes, even the children knew. 3 Q. Did that cause fear and panic amongst the Muslims? 4 A. Yes. The people of Lasovac were frightened in particular, as well 5 as people in Biljaca and Bjelovac, because they knew that even at that 6 time there were strong armed units in the Serb village of Bjelovac and 7 Kunjarac in particular. They knew that there were about 100 armed people 8 there, as well as at the Sase mine. As of March, the Serbs occupied an 9 ammunition and explosives depot used for the mine and since then the 10 regular workers stopped coming to work. 11 Q. Did you learn of that personally from the local populace as a 12 policeman? 13 A. Yes. 14 Q. Did murders start taking place at a certain point? 15 A. Yes. The initial murders happened in the Bratunac municipality. 16 I remember the first victim, a rather victims, these are the Skenderovic 17 brothers, Emir, and his brother as well as their father. That murder was 18 infamous for its brutality. They were not only murdered but they were 19 also fixed with equipment used -- usually used for horses, that was 20 attached to their bodies. That was particularly brutal. 21 Q. Can you remember the period approximately when such murders 22 started taking place? 23 A. Around the 17th of April. 24 Q. Can you remember what was happening with the police at that time? 25 A. A policeman of Serb nationality simply established another police Page 11266 1 station in the old elementary school, Midhat Haca, in Bratunac and they 2 took their weapons with them. 3 Q. Did they choose amongst themselves their chief, and who was it, if 4 you remember? 5 A. Yes, I remember it well. It was Luka Bogdanovic. 6 Q. Did they do anything in relation with the Muslim policemen? 7 A. Yes, they did. They issued an ultimatum that all Muslim policemen 8 turn over their weapons, so the Muslim policemen did in order to prevent 9 an outbreak of a conflict, according to their chief's orders and his name 10 was Senad Hodzic. 11 Q. If you remember, did you speak with Senad Hodzic personally and if 12 you did, did he ever explain his order that the Muslim policemen turn over 13 their weapons? 14 A. Yes. I did talk to him. He told us, "You should do the same. 15 You should turn over your weapons. We want to avoid conflict. We will 16 turn over our weapons and then we'll see what they wish to do next." 17 Q. Therefore, the Muslim policemen of Bratunac turned over their 18 weapons? Did I understand you correctly? 19 A. Yes. All of them. 20 Q. Did -- was the conflict avoided with the Serbs as was hoped for? 21 A. No. Quite the contrary. 22 Q. Could you please explain to the Chamber what was happening in the 23 next few days with the Muslim villages? 24 A. I remember the murder of Sukrija Gusic and his underage son. Then 25 came the attacks against the villages of Hranca. Page 11267 1 Q. Could you please point it at the map? 2 A. I don't see that on the map. Yes, there is Hranca, and Suha, 3 Borkovac but Hranca and Borkovac were particularly under attack. 4 Q. Just a moment, please. Provide brief answers and answer to my 5 questions. 6 Can you remember anything in particular concerning the attack on 7 Hranca? Could you describe that for us and how did you come to know such 8 information? 9 A. Yes. My wife was from Hranca. She was 18 at that time. She was 10 attending high school. And her father was executed in front of her. Her 11 brother was beaten and taken to the Vuk Karadzic school and they attempted 12 to rape her. They ripped off her clothes but only thanks to her mother, 13 they didn't. She stood up to the attackers, and my wife managed to escape 14 through the woods to Konjevic Polje, and the people there found her 15 half-naked, and she was hysterical for a month, and for the next five 16 years she knew nothing of her immediate family, and they didn't know what 17 happened to her and she is still traumatised today. 18 Q. Can you tell us what happened with the remainder of the population 19 of Hranca at that day? 20 A. Some families were completely executed, like the Salkic and Ramic 21 families. They were exhumed only last year. And they received a decent 22 funeral then. 23 Q. How about the rest of the population? 24 A. In the village of Borkovac, I believe 35 people were executed. 25 Only Hamidalic survived that and I believe he testified as to that before Page 11268 1 the Tribunal. Then the village of Suha. That was torched. A lot of 2 people were killed, and those who survived fled towards Voljavica, Zaluzje 3 and Biljaca. Some were taken to the Vuk Karadzic school while others were 4 killed right there. Women were raped systematically and a group was taken 5 to the Gradina camp at Sase and then their fate is unknown until last year 6 when their bodies were exhumed from a mass grave. 7 Q. You mentioned several mass executions, including the one in 8 Borkovac. Could you tell the Chamber whether the people that were 9 executed were armed or were they civilians? For example, Mr. Alic, can 10 you remember who was executed alongside with him? 11 A. Yes. I can. His wife Halima was killed. His father, who was an 12 elderly person. Then a young girl by the name of Alma; I knew her well. 13 And all of them were women and elderly, more or less. 14 Q. Did the same fate befall Mihajlevici and Redzic? 15 A. Yes, completely the same. The people who survived fled to 16 Voljavica and Zaluzje. 17 Q. You heard their stories personally as to what happened? 18 A. Yes. 19 Q. What happened in early May of 1992 in Glogova? Do you know 20 anything about that? 21 A. Yes. In Glogova, next to the local mosque, 65 people were 22 executed. Their bodies were found two years ago in a mass grave close to 23 the mosque. The DNA identification was carried out, and they received a 24 decent funeral and the place of their execution is marked. 25 Q. What happened with the population that survived from those Muslim Page 11269 1 villages? 2 A. They fled whichever way they could. They hid in the forests, some 3 fled towards Bljecevo and Glogova, some towards Voljavica, and towards the 4 villages that were up on the hill. 5 Q. Do you know anything of a certain part of that population that was 6 taken to some camps? 7 A. Yes. We learned that a lot of people were taken to the Gradina 8 camp at Sase and some girls spent years literally at the Fontana at 9 Bratunac. They were raped and abused, and we learned of that later at 10 Likari via communication means. 11 Q. I want to interrupt you. When you refer to this group of girls 12 that was raped at the Fontana Hotel, I have a question regarding that. Do 13 you know Edina Karic? 14 A. Yes, very well. 15 Q. When you referred to that group of girls, is that a group that she 16 was a part of? 17 A. No. That was not the same group. Edina was from Vlasovac and 18 that was a separate group. And the other group I referred to included 19 women from various areas like Suha, Mihajlevici, Glogova and so on. 20 Q. Who had the Fontana Hotel under control at that time, the Serb or 21 the Muslim forces? 22 A. There were no Muslims in Bratunac at the time. They were either 23 expelled or killed. They went towards Tuzla and Kladanj. 24 Q. Just a correction for the transcript. Witness, it is stated here 25 that people from Glogova fled towards Glogova. I believe you said Page 11270 1 something different. Where did the people from Glogova flee to? 2 A. They fled towards Bljecevo which is across the hill, towards 3 Srebrenica. 4 JUDGE AGIUS: If I am reading the same line, that is -- was 5 missing and I thank you for it, Ms. Vidovic and then it says also some 6 towards Voljavica as well. I mean, perhaps he can confirm that because 7 the direction to Srebrenica is one way, to Voljavica is another. 8 MS. VIDOVIC: [Interpretation] 9 Q. Could you please clarify for the Chamber the movement of the 10 population? What were the directions they took? 11 A. People from Glogova fled towards Bljecevo, a majority of them, but 12 several of them fled the other way, they didn't know that Mihajlevici and 13 the villages alongside the Drina were torched. So -- and then they took 14 the route towards Voljavica but via the Drina. They went through the 15 fields. 16 Q. Hence some of them reached Voljavica in the end. A further 17 clarification, is Cizmici a part of Bljecevo? 18 A. Yes, that's a small portion of Bljecevo. 19 Q. Did you have any knowledge of the murders of Muslims in Bjelovac 20 at the beginning of May of 1992? 21 A. Yes. 22 Q. Could you briefly describe for the Chamber the situation? 23 A. In the vicinity of Bjelovac, next to the Drina, there was a site 24 where gravel was extracted, and two brothers of Muslim origin used to 25 extract bodies that were floating in the Drina, and I remember clearly Page 11271 1 that Mujic Kiram was the first victim from Vlasovac, then Asim Redzic from 2 Srebrenica. He was taken there and killed. And he used to be a football 3 coach of the Guber team. Then Sahim [phoen], who was a police inspector, 4 as well as numerous others who were buried unidentified, some were buried 5 in Voljavica, for example, Redza [phoen], he was buried in Voljavica. 6 Q. I have a follow-up question, then. 7 In your knowledge, did the Serb population of Bjelovac know of 8 these murders? 9 A. Yes, absolutely. Some were even present when bodies were taken 10 out of the river and the murders usually took place at night. 11 Q. If a Serb inhabitant of Bjelovac would say that he didn't know of 12 any murders or expulsions of Muslims in May of 1992, that is early May, 13 would that be correct? 14 A. No. 15 JUDGE AGIUS: Yes, Ms. Sellers? 16 MS. SELLERS: Your Honour, prior to the witness answering the 17 question, I would state that that question is not a question that he's 18 capable, if a Serb did say that. I mean, there is a possibility a Serb 19 did say that and he wouldn't know. 20 JUDGE AGIUS: But it doesn't make a difference. I mean, the 21 question I think it is -- it's you know what the relevance of the question 22 is. 23 MS. SELLERS: Your Honour, certainly, I do. 24 JUDGE AGIUS: So basically it's being put to the witness that he 25 needs to comment on what his conclusion would be as regards such an Page 11272 1 allegation or such a statement forthcoming from a Serb. 2 MS. SELLERS: In the hypothetical, I would imagine. 3 JUDGE AGIUS: Of course, he doesn't know who we are talking about. 4 Obviously he probably would be in a position to answer better if he knew 5 exactly who we are talking about because it does make a difference between 6 someone who just makes a statement simply because he happens to be a Serb 7 and someone who makes a statement who happens to be a Serb but also living 8 in the area during the time in question, who should be in a position to 9 know what happened and what did not. 10 But anyway, let's move. I mean, I think we are there. I mean, if 11 it's possible, Madam Vidovic will try and restrict her questions to what 12 is basically relevant. I didn't stop you as regards all these killings 13 because I knew where you were heading, but on the other hand, we don't 14 need to protect it unduly. Already, please do remember that. 15 MS. VIDOVIC: [Interpretation] No, Your Honour. Just to the extent 16 that relates to the credibility of the witnesses that testified as to this 17 topic. 18 JUDGE AGIUS: I know that, Ms. Vidovic. Go ahead. 19 MS. VIDOVIC: [Interpretation] 20 Q. Could you explain how come the people from the area, including the 21 Serbs, knew of such information? 22 A. Every person that was killed had a last name. They lived in the 23 same area. They knew each other. Kiram Mujic was the first victim, and 24 he lived with his Serb neighbours. He was related to some of them and 25 some of them even came to his funeral. They knew that information. Page 11273 1 People were living house to house. It couldn't be hidden. 2 Q. Thank you. To move on, can you remember what took place in the 3 first half of May of 1992 in your village? 4 A. Yes. The local SDS representatives from Pobrdje invited our local 5 commune representatives. They told them that weapons should be turned 6 over, including hunting rifles held by the people in Voljavica, and the 7 ultimatum stated the 11th of May for the handing over of the weapons and 8 that they had to appear personally. 9 Q. Did you do that? 10 A. Yes. Our people, the elderly in particular, thought that our 11 houses would be torched unless we did that. Perhaps some younger people 12 would refuse but we knew what happened in Hranca and Glogova and 13 Mihajlovici, but we obeyed what the elders said and some hunting rifles 14 from turned over as well as a couple of guns that had licences. 15 Q. Did you turn in your own weapon? 16 A. Yes. I turned over my semi-automatic rifle that I was given by 17 the police. 18 Q. Did anything take place on the 12th of May of 1992? 19 A. Yes. If you have Voljavica in mind? 20 Q. Yes, I do. 21 A. Right after the weapons were turned over, people started leaving 22 Voljavica en masse, moving towards Poloznik and Pirici. Voljavica is a 23 rather big place. Some people who still trusted Serbs, who worked with 24 them or were related to them, remained. But most of the people moved 25 towards other localities. Page 11274 12 Blank page inserted to ensure pagination corresponds between the French and 13 English transcripts. Page 11275 1 Q. Your father, did he remain in the village or did he leave the 2 area? 3 A. We had a large number of cattle there at that time and he remained 4 behind to feed them. The rest of the family left the village. 5 Q. Where did you personally go? 6 A. I left with my mother and my brothers to Poloznik. 7 Q. Did you learn from anyone as to what happened in your village on 8 that day? 9 A. Yes. I learned that from my parent, from my father, who told me 10 that on the 12th of May, Voljavica was attacked from all directions, from 11 Pobrdje, from Tablja, and right on the spot, Avdo Ahmici was killed as 12 well as Sabet Sjosic [phoen]. He told me that the population was taken to 13 the bus station, put on buses that took them to Tuzla and Kladanj. A part 14 of the inhabitants managed to hide away, including my father, next to a 15 water utility facility, and they observed it all, and in three days later 16 they reached us and then at the they told us the story. 17 Q. Did your father tell you who attacked Voljavica? Were those 18 people from afar or did he know them? 19 A. My father told me very emotionally what happened. He recognised 20 many of the attackers, and other people who were telling me that story 21 were telling me the same. 22 Q. What did he say? Where did those people come from? 23 A. He recognised a lot of them, and he mainly said that those were 24 our neighbours from Pobrdje, Bjelovac and Sase. 25 Q. Did he tell you that the attack was organised or anything in that Page 11276 1 sense? 2 A. Yes. He said that they had commanders who issued directions, who 3 were familiar with Voljavica and they told them which directions to take. 4 Q. Did he mention anyone in specific? 5 A. Yes. He was very surprised to see Slavoljub Rankic, aka Slavko. 6 He knew him well, as well as his father, Nedjo. They passed by close to 7 him with a group of people issuing orders. He told me that in that group, 8 there was Krsto Rankic as well. And he knew all of them very well. Then 9 Slavoljub Filipovic, all from Bjelovac. He mentioned some people from 10 Pobrdje, Sreten Ilic, Golub Lukic. I knew those people as well. Then 11 Radomir Ostojic, who was right -- who lived next to Voljavica. 12 Q. Could we please now show D83 to the witness? It is a list of the 13 Bjelovac TO, salaries paid for June of 1992. 14 Witness, please take a look at some names. Please turn to the 15 third page and the number is 01335441. At the top, it says, TO Bjelovac. 16 Please look at number 571, and the name there. Can you see that? 17 A. Yes. 18 Q. Krsto Rankic. Then 572, Slavko N. Rankic? 19 A. Yes. 20 Q. 584, Slavoljub D. Filipovic? 21 A. Yes. 22 Q. Are these the people that your father mentioned to you as 23 participants of the attack? 24 A. Yes. He knew all of them and, if I may add, he said that Krsto 25 was very intoxicated and that he kept asking Slavko to let him join the Page 11277 1 Bule and that was the name he used for the Muslim women. 2 Q. Slavko Rankic, does that person have some other name or is this a 3 short name? 4 A. His full name is Slavoljub Rankic but everyone called him Slavko. 5 Q. Thank you. Apart from the conversation you had with your father, 6 did you discuss this issue of the attackers against Voljavica with some 7 other people from Voljavica? 8 A. Yes. I spoke with my uncle, who is an elderly person, as well as 9 Camil Mehmedovic and many others. They all confirmed the same story 10 because they knew these Serbs from before. 11 Q. Did they tell you what they -- who they thought commanded the 12 attack? 13 A. They all kept mentioning Slavko Rankic as the commander or the 14 leader of the attack. 15 Q. Thank you. 16 MS. VIDOVIC: [Interpretation] I would kindly ask the usher to put 17 another document before the witness. 18 Q. This is a new document, the number is 01335456, TO Pobrdje, 19 salaries for June of 1992. The number is 01335456. 20 Witness, please take a look at this document. Please go to the 21 page that starts with TO Pobrdje and take a look at the number 1382. 22 Radomir Ostojic; can you see that? 23 A. Yes. 24 Q. Then number 1371, Sreten Ilic? 25 A. Yes. Page 11278 1 Q. 1375, Golub Lukic. Are those the people your father mentioned as 2 the attackers in Voljavica on the 12th of May of 1992? 3 A. Yes. These are precisely the people and he knew them very well, 4 and I know them because they were our neighbours. 5 Q. Thank you. 6 MS. VIDOVIC: [Interpretation] Could we please give this document 7 an exhibit number? 8 JUDGE AGIUS: Yes. Thank you, Madam Vidovic. Let me just ask a 9 couple of questions before I do. It will of course become Defence 10 Exhibit D759. But in order to be precise for the record, I see that the 11 first page as ERN number 01335404 and that is the front page of this 12 document. I'm referring to the original language, B/C/S. Then the next 13 page is 01335456. Then that page is followed by 01335457. Then I have a 14 next page which at least in the photocopy, and this is why I am putting a 15 question to you, in the photocopy that I have for the next page, and the 16 one following, I do not have an ERN number. I would take it that the 17 first of these is -- ends with 5458 and 5459 because the page immediately 18 following does have an ERN number and would complete the sequence as it 19 is 5460. So if you confirm to us that these two pages where we have the 20 photocopy without an ERN number are indeed pages with -- ending in 5458 21 and 5459, we can confirm that for the record. It's probably a problem of 22 photocopying more than anything else. 23 MS. VIDOVIC: [Interpretation] Yes, Your Honours. I can confirm 24 that. It happens when we are printing that the number cannot be seen or 25 you can only see half the number. However, as you can see here, the Page 11279 1 numbers that follow when you look at the order of the people, then it's 2 clear, whereas the first column during printing is also missing one 3 number, and a part of the next number. But this is something that is 4 really beyond our influence because we -- it was printed and then we 5 copied what we received. 6 These are large documents, for example, and they are entitled 7 personal salary for June 1992, and then there is a large group of units of 8 the Bratunac Brigade. We only take just the relevant parts. Otherwise we 9 would have to be providing you with very, very large documents, and then 10 the numbers actually go the way you mentioned it. 11 JUDGE AGIUS: I understand. I just wanted a confirmation that 12 those two pages which do not show an ERN number are indeed 5458 and 5459 13 and I think I'm satisfied, at least -- Judge Eser, are you satisfied too? 14 That we are satisfied that it is so. 15 So let's describe this new exhibit. In the original language it 16 consists of six pages. The first one ending in -- having ERN number 17 01335404, followed by five pages starting with 01335456 and ending in 18 5460, accompanied by three pages in English purporting to be translation 19 of the original documents. The totality is being tendered in evidence and 20 marked as Defence Exhibit D759. The corresponding English part would have 21 an E at the end. 22 Thank you. Let's proceed. 23 MS. VIDOVIC: [Interpretation] 24 Q. Witness, could you please tell the Trial Chamber what happened 25 with the population, the Muslim population, that was expelled from the Page 11280 1 villages that you mentioned, including Voljavica, after these events in 2 May 1992. 3 A. Yes. The expelled population was together in columns and they 4 sought shelter around the villages of Poloznik, Pirici and Lokva. 5 Q. Do you know where the Muslim population from Lasovac, Gradina and 6 Sase went? 7 A. Yes. They had -- they were together in a large column of people 8 in Loznik, in Bare, to be more precise. That's what that place was 9 called. 10 Q. And how many of them were there? 11 A. There were thousands of them there. 12 Q. And where did the expelled population of Voljavica, Zaluzje and 13 Biljaca concentrate? 14 A. These citizens got together in columns and went near the village 15 of Podloznik or at the location of Ljuljaska to be more precise. 16 Q. How many people were there in that column? 17 A. That was the largest group of people in that area, because these 18 were large Muslim villages. It was terrible to see those groups of people 19 in camps. They found it very hard to believe that they could get killed 20 just because they were Muslims, that their houses could be burned, that 21 they could be left with no property overnight. They had with them only 22 those things that they had taken with them from their homes. They were 23 afraid. They had small children. There was no water. They slept in the 24 open air and it was still cold in May there. 25 Q. How many of them were there at Ljuljaska? Page 11281 1 A. You couldn't establish the exact number but it was approximately 2 up to 2.000 people. There were smaller such refugee camps also. There 3 was one in the area of the village of Pirici. 4 Q. And these groups of people, you described that they lived in very 5 difficult conditions, did they have any houses where they could take 6 shelter? 7 A. No. These were makeshift camps with housing made from trees, 8 branches, pieces of plastic, they spread leaves on the ground. It was 9 hard to conceive this in the 20th century that rich people would have to 10 leave their homes and then would be reduced to such living conditions. 11 Q. Besides the fact that they were living in such conditions and in 12 very difficult material conditions, were they able to live at least 13 peacefully, even though they were in such dire straits? 14 A. No. Immediately in May, these makeshift camps were shelled 15 intensely from Serb positions at Kunjarac, Jovanovici, and Sase. These 16 were powerful mortar shellings, and people did not have peace because of 17 this shelling. They even had to shelter small children in makeshift 18 trenches in order to protect themselves. 19 Q. Could you please tell us whether you yourself personally knew -- 20 you mentioned these locations but what I want to ask you is the following: 21 How do you know that these makeshift camps were shelled from Kunjarac, 22 Sase, these places that you mentioned? 23 A. I know this very well. We went to the village of Bojeca [phoen] 24 very often with some other men, and we saw Bjelovac and we could see where 25 the smoke was coming from. We had an old set of hunting binoculars so we Page 11282 1 were able to observe that through that. 2 Q. And these people, were they civilians, were they soldiers in these 3 makeshift camps? 4 A. They were all civilians. We didn't have an army. 5 Q. At some point, did a group of people form which managed to get 6 their hands on some weapons at some point? Now I'm talking about the 7 Muslims. 8 A. Yes. Us younger people felt that it was necessary to protect 9 these people from Voljavica, Bileca, Zaluzje, because there was a Serb 10 incursion into this makeshift camp where the Vlasovac citizens were, and 11 there was a massacre there. We had some hunting weapons and we received 12 some weapons from the Podloznik citizens because they joined us, so we 13 kind of made a line in front of our makeshift camp at Ljuljaska. 14 Q. At one point, did you leave that area? 15 A. Yes. There was hunger, the conditions were terrible. We found 16 out from some people from Stozerska that Srebrenica was liberated and that 17 perhaps the conditions, the living conditions, were better over there, so 18 we set off through Podloznik, Lokva, Petinici, Predola, Dimnici, 19 Skenderovici, Pribicevac towards Srebrenica, and a group of our people 20 went with us, who were in these makeshift camps. It was not possible to 21 stay in these camps any longer, so those who were braver amongst them came 22 with us and we set out in the direction of Srebrenica. 23 Q. You mentioned Skenderovici. Did you go through that location or 24 did you bypass it? 25 A. Skenderovici was a Muslim settlement but we had to pass by the Page 11283 1 village of Pribicevac which was inhabited by Serbs. The pen is not 2 working. Where the Serbs were living. And that is where we were 3 attacked. We noticed -- 4 Q. Just one moment, Witness. You will get a fresh pen. 5 A. I'm going to mark Pribicevac. This is where we were noticed 6 because it was a fairly large column. We were attacked. There were 7 wounded people. The trip took us all day because we went through the 8 woods, along creeks, and finally we managed to reach the Srebrenica area 9 above Crni Guber and to go down to Srebrenica itself. 10 Q. When you arrived at Srebrenica, do you remember what you saw 11 there? 12 A. Yes. We were all disappointed. We thought we would see what we 13 knew about Srebrenica before. However, Srebrenica was burned. The 14 mosques were demolished. It was a ghost town. You would see the odd 15 inhabitant wandering around. It was a catastrophic defeat for us, what we 16 saw in that town. 17 Q. Could you just tell us, do you remember when this was, what time, 18 which month? 19 A. It was mid-June, 1992. I'm speaking about 1992. 20 Q. At one point, you mentioned that a group of young people was 21 armed -- 22 A. No, the whole group did not leave. There was a group of men who 23 formed the group at Pirici and they believed that they would be closer to 24 Biljaca. They stayed with Sadif Zukic. He was their leader. We set off. 25 We had our own leader, Osman Malagic. We set out towards Srebrenica. And Page 11284 12 Blank page inserted to ensure pagination corresponds between the French and 13 English transcripts. Page 11285 1 then from there we went to Likari. 2 Q. [Microphone not activated]. 3 THE INTERPRETER: Microphone, please. 4 MS. VIDOVIC: [Interpretation] 5 Q. At one point, when you came to Srebrenica, did you find out about 6 a group of your people from Voljavica somewhere near Srebrenica? 7 A. Yes. There was a young man who was in Hakija Meholjic's group in 8 Srebrenica and we found out at Likari, it's a village above Potocari, 9 there were some people from Voljavica who had managed to get to Srebrenica 10 earlier. 11 Q. And did you then go to Likari? 12 A. We weren't thinking for too long. We went to Likari right away. 13 We thought when we get there we would be closer to Voljavica and in that 14 way we would be able to take food from our houses and food stores. 15 Voljavica was a rich village so we had a lot of agricultural products 16 there. 17 Q. When you got to Likari, what was the situation that you found 18 there? What I want to ask you actually is the following, where Likari, 19 was Likari what inhabited place before the war? 20 A. Yes, Likari was a small but very nice settlement, very pretty. 21 When we got there, only two houses were intact. All the others were 22 burned. 23 Q. Before the war, was Likari a Muslim village? 24 A. Yes. Only Muslims lived in Likari. 25 Q. When you got there, were there any citizens there from Likari that Page 11286 1 you saw there? 2 A. Very few. When we got there, we found people who had fled from 3 Potcaus while the inhabitants of Likari actually, the ones who survived 4 the attack on Likari had escaped towards Pecista, Gosti [phoen] and 5 Potocari in order to save themselves. I remember that they told us that 6 Serbs captured four women at that time, that they kept at Likari all the 7 time and they were systematically raped there, those four women. 8 Q. Just one moment. Let me ask you this. Now you're talking about 9 four raped women but what I want to ask you is: Did you find out who 10 attacked the village and when? When was the village of Likari burned, 11 attacked and now you're talking about rapes? Who told you that? 12 A. We knew about it. The inhabitants told us from Obadi and Likari 13 that they were attacked by Serbs from Obadi and Serbs from Zalazje because 14 these were villages near Likari. 15 Q. If I understood you properly, you came to Likari in mid-June 1992 16 with a group of people. Did your group have anyone that was leading it? 17 A. Yes. Our leader was Osman Malagic. 18 Q. When you got there, did you encounter this other group of people 19 and who led that group? 20 A. Yes. When we arrived, the first thing was we were disappointed. 21 We had come to the worst possible place and the most difficult line at the 22 time in Srebrenica, and we met a small group of people from Potcaus and 23 this group was led by a certain Naser Sabanovic. I remember the name 24 well. 25 Q. Why do you say that you came to the worst possible line in Page 11287 1 Srebrenica? 2 A. We understood that Likari was a location or an elevation that was 3 very important to the Serbs but it was also important to our inhabitants 4 from Potocari, Gosti, and Pecista that they -- had they captured Likari, 5 none of those people could be living in those villages because that was 6 the highest elevation and they could fire at them. As long as they had 7 that elevation every house in Potocari was hit by at least ten times [as 8 interpreted] with artillery weapons. That is why that location was very 9 important and it was also constantly under attack. 10 Q. So you talked about two different groups, a group led by Osman 11 Malagic and another group led by Naser Sabanovic. Did these groups unite 12 at any point in time? 13 A. Yes. We joined together and we guarded Likari together. 14 Q. Could you please tell us who decided to join these two groups? 15 Did you do that or did some outside order come to this effect? 16 A. We joined together by ourselves. We knew each other. Some people 17 knew one another. We didn't need anybody to tell us. We joined together 18 on our own. And Naser Sabanovic remained to be the leader for the whole 19 of Likari because they had come earlier and they knew the terrain better 20 than we did. 21 Q. Do you remember whether in the second half of June of 1992 there 22 were attacks on Likari? And where did these attacks come from? 23 A. There were daily attacks on Likari. That is a story in itself. 24 Most frequently, the attacks would come from the direction of Obadi, 25 Zalazje and Sase. Page 11288 1 Q. How do you know that the attacks came from Sase? 2 A. If you look on the map, you will see that Likari is on a large 3 plateau above those places and that you have a good of the view of the 4 roads towards Zalazje, Obadi, and you can also see Sase spread out below. 5 Q. That group that you were in, what kind of weapons did it have and 6 how many weapons? 7 A. Our group and this group were Potcaus had about 25 rifles 8 altogether, old hunting rifles -- weapons, some of the old M48s, and that 9 was it. We had very, very few weapons for such a dangerous region. 10 Q. Did you receive any assistance in ammunition, weapons and so on 11 from anyone up until early July 1992? 12 A. No. We never received any assistance in food or ammunition or 13 weapons. 14 Q. Do you remember whether or not in early July 1992 there were any 15 particularly intense attacks on Likari? 16 A. Yes. I remember the 2nd of July, I get always very emotional when 17 I talk about that attack. I almost died. Likari almost fell that time. 18 I remember that attack very well. 19 Q. Did you receive any assistance from anywhere on that occasion? 20 A. Yes. At the last minute, a group of fighters arrived from 21 Potocari, and it was only with their help that we managed to defend 22 Likari. We didn't have any more ammunition. I recall that I only had two 23 bullets left for my M48 repeat action rifle. 24 Q. Do you remember any people who were in that group of people from 25 Potocari? Page 11289 1 A. Yes. I remember that Naser Oric was in that group of people. 2 Q. Other than this group from Potocari, did any other people come 3 there? 4 A. Yes. Since the attack lasted all day, a group from Srebrenica 5 came to help us. I remember that this group was led by Becir Bogilovic, a 6 police officer from Srebrenica. He was wounded in that attack. I 7 remember very well. 8 Q. And how was Naser Oric introduced to you or presented to you at 9 that time? 10 A. Naser did not introduce himself to us at Omerovic. We saw him 11 with a group of people from Potocari. In the course of the attack. He 12 was with them, amongst them, in front of them, a fighter like any other 13 fighter who was in Potocari. 14 Q. You also mentioned this group of people that had arrived from 15 Srebrenica. Was it your impression that Oric was commanding in any way, 16 that he was in charge of that group of people that came with Becir 17 Bogilovic as well? 18 A. No. He didn't command anyone. Everybody had their own group. We 19 were under the command of Osman Malagic. Becir had his own group. 20 Naser's group was brought from Potocari. There was no coordination at 21 all, once the attack started, you would look to find the best possible 22 shelter. 23 Q. And during this battle, did Oric coordinate the group? Did he 24 issue any instructions, orders or anything like that? Do you recall? 25 A. That was one of the fiercest battles. Nobody issued any Page 11290 1 instructions at all. When a bullet made a parting in my hair, I was the 2 one who decided where I would hide. Had there been a mouse hole and there 3 were shells, I would have fled there. This is the time when personal 4 courage is demonstrated. Nobody listened to anyone else once the attack 5 really started and got underway. 6 Q. I understood that you did manage to defend Likari on that 7 occasion. Is that true? 8 A. Yes. 9 Q. After that, did you have an opportunity to speak with Oric and, if 10 you did, did he explain why he had come there? 11 A. After the battle, all the fighters got together. There were dead. 12 We were discussing who had been killed, who had been wounded, and I 13 remember that Naser said that they had heard a powerful or loud shooting 14 and shelling in Potocari. I mean, you can hear that and they understood 15 that Likari would fall and that is why they came to help us. 16 Q. At the time, did you, in Likari, and these people that you saw 17 there, did you have uniforms? 18 A. No. I was wearing jeans and a reserve police forces jacket, and 19 we had civilian clothing, a shirt and so on. 20 Q. I wanted to ask you one more question about Oric. At any point in 21 time, do you remember seeing Oric ordering Osman or Becir or issuing 22 instructions to them? 23 A. No. He didn't issue orders to anyone. After the attack, they 24 simply returned to Potocari, Becir returned to Srebrenica, and we stayed 25 at Likari. So nobody issued any orders to anyone. Page 11291 1 Q. Now we are talking about July 1992. Did you hear that in May 1992 2 there was a meeting of some kind in Bajramovici, where a staff was elected 3 to be in command of all the armed forces in Srebrenica? 4 A. No, I never heard of anything like that. 5 JUDGE AGIUS: Yes, Ms. Sellers. 6 MS. SELLERS: Your Honour, I would just ask that some caution be 7 exercised because these are issues quite relevant to the indictment, to 8 the case. And I do believe that we do have an amount of leading here. 9 JUDGE AGIUS: Yes, I agree 100 per cent with you, Ms. Sellers. In 10 any case, the witness has answered that he's not aware of such a meeting. 11 So ... 12 Yes, Madam Vidovic, please your discretion. You don't need 13 lecturing from me. Certain questions when it comes to pivotal matters, 14 try not to lead. Thank you. 15 MS. VIDOVIC: [Interpretation] Your Honours, in order to get a 16 negative response or to get a response, I had to ask this question but I 17 will rephrase it. 18 Q. Witness, please, before you talked with me, did you ever hear 19 about a meeting in Bajramovici before? 20 A. No, never. This is the first time that I'm hearing about it. I 21 don't know anything about a meeting in Bajramovici. 22 Q. Were you very close to Osman Malagic? 23 A. Yes. I was one of his closest associates. He was also my cousin. 24 I was amongst the people who were very close to Osman Malagic. 25 Q. Did he ever mention a meeting in Bajramovici to you? Page 11292 1 A. No, never. Had he known about it, I would have known about it for 2 sure. 3 Q. From your testimony, I understood that until mid-June 1992, you 4 were in Pirici, in the Pirici and Podloznik region? 5 A. Yes. 6 Q. Is this true? 7 A. Yes. 8 Q. In that period, did you ever hear from those people there mention 9 Bajramovici in the context of that meeting? 10 A. No, I never heard anything like that. The most important thing 11 for us was to survive and to find food. 12 Q. I would like to ask you something about the groups of people you 13 mentioned. The group at Pirici and the group you mentioned as headed by 14 Osman Malagic, and the group brought along with Naser. What did you used 15 to call them, those groups? Did you use military terminology? 16 Designations of establishment? In that period in July of 1992 and for the 17 rest of 1992, what did you used to call those groups? 18 A. People who stayed in Srebrenica, we called them Hakija's men or 19 Akif's men. The people from Potocari, Naser's men. We were called 20 Osman's guys. We were all young. Or the people of Osmace, of Podloznik 21 and so on and so forth. No military terminology was used. 22 Q. To move on to a different topic, how long did you stay at Likari 23 personally? 24 A. Until the 14th of December of 1992, to be precise. 25 Q. During that period, did your group have any contact with Oric's Page 11293 1 group from Potocari? 2 A. No. Just in case of fierce attacks. They would come to our aid. 3 Otherwise, there were no other contacts. 4 Q. Between July of 1992 and December 1992, did that happen on one or 5 two occasions or more often, if you could tell the Chamber? 6 A. There were several strong attacks against Likari and people had to 7 come at least five or six times, otherwise we would not have been able to 8 defend it ourselves. And other people came as well, not only from 9 Potocari but from Kazani, for example. They all knew we needed help. 10 Q. What was the role of Mr. -- 11 JUDGE AGIUS: Just to try and understand better, Kazani, where is 12 it exactly? I don't think it has been marked already on the map. If the 13 witness can show it to us. 14 MS. VIDOVIC: [Interpretation] 15 Q. Yes? 16 A. Kazani is here on the outskirts of Srebrenica. 18 Q. Witness, could you just write the name of Kazani, if it's not 19 there? 20 JUDGE AGIUS: It is there. It's very small print. Barely 21 visible. But it is there. Judge Eser would like to put -- sorry, Madam 22 Vidovic. Judge Eser would like to put a question. 23 JUDGE ESER: I just have an additional question with regard to 24 Likari. Likari is written here in the map in a way that it seems to 25 indicate a mountain region, was there a special place in Likari where you Page 11294 12 Blank page inserted to ensure pagination corresponds between the French and 13 English transcripts. Page 11295 1 were stationed? Because on the map it's not possible to identify the 2 location of Likari. Could you perhaps clarify a little bit where you have 3 been stationed with your group? 4 THE WITNESS: [Interpretation] Yes. Likari is on a plateau. You 5 can see here these are the houses marking the settlement. We were located 6 towards Obadi. There were lines around the houses because we spent our 7 time in the houses, and we were at the Zanik hill as well. That's where 8 our positions were. And Likari was then behind our back. And that's 9 where we would spend the night. 10 JUDGE AGIUS: Zanik is also shown on the map, making it -- if you 11 can mark it, please. 12 THE WITNESS: [Interpretation] I will circle it again. Zanik is 13 the highest hill in the Likari region. 14 JUDGE AGIUS: Before I hand you back to Madam Vidovic, you've 15 described Likari as situated on a plateau. Is there a town or a village 16 which is also in the area and on this plateau that is known by the name of 17 Likari? Or is it just the area that is referred to as Likari? 18 THE WITNESS: [Interpretation] Yes. There was a settlement by the 19 name of Likari of about 20 houses. During the attacks of May, they were 20 torched. Only two houses remained intact, which we could use to spend our 21 time in. It used to be a very pretty place. 22 JUDGE AGIUS: And this is why I'm asking you because you described 23 it already as a very pretty place. And if you look at the map, 24 Mr. Malagic, just beneath the L and the I, the first two letters of 25 Likari, there is a tiny circle there. Page 11296 1 THE WITNESS: [Interpretation] Yes. 2 JUDGE AGIUS: Would that indicate this small hamlet of a few 3 houses which was referred to by the name of Likari? Or would it indicate 4 something else? 5 THE WITNESS: [Interpretation] No. We have the same thing in mind. 6 The small circle that you indicated is blue. This is Knjesavica [phoen], 7 a river that flows through Potocari. The settlement of Likari is up 8 above, close to A. You can see a few houses there, the black spots. 9 JUDGE AGIUS: I thank you. Madam Vidovic, let's proceed. 10 MS. VIDOVIC: [Interpretation] Your Honour, just to clarify 11 something with the witness. 12 Q. Judge Eser asked the following question: Where were you 13 accommodated in Likari? And I wanted to ask you the following: Did you 14 have accommodation? Did you have disposition in your lines or did you go 15 there by yourselves? 16 A. I said earlier that we went from Srebrenica to Likari by 17 ourselves. Nobody told us, Go up there and keep the line. You can see 18 where Voljavica is or where Likari is. We thought that we could go 19 through the woods to reach Voljavica to get some food out. 20 Q. Another question concerning this topic, the group you met there, 21 did anyone put that group there in your knowledge or were they 22 self-organised? 23 A. That group was from Potcaus which was a hill up above Bratunac. 24 When they were attacked, the closest settlement to them was Likari, and 25 that's where they found some shelter. Page 11297 1 Q. You said that Mr. Oric came to that area on several occasions. 2 A. Yes. 3 Q. What was his behaviour like during those attacks? To ask you 4 again, was he issuing instructions? What was he behaving like? 5 A. He was ahead [Realtime transcript read in error "a head"] of his 6 people from Potocari. 7 MS. SELLERS: Your Honour, excuse me. 8 JUDGE AGIUS: Ms. Sellers. 9 MS. SELLERS: I wanted to stop before the witness completed the 10 answer, and that would be an example that I say is getting too close to 11 leading, what was his behaviour like, was he ordering. Let the witness 12 answer what was his behaviour like, let's not suggest it. Thank you. 13 JUDGE AGIUS: Yes, thank you, Madam Sellers. Doesn't really make 14 much difference in my opinion. I mean, I don't see much difference 15 between the question as asked and your suggestion, but -- 16 THE WITNESS: [Interpretation] As I explained already, when I was 17 describing the attack of the 2nd of July, every time they came, Naser was 18 ahead of them. Otherwise there were no instructions. Those were heavy 19 shellings and everyone tried to find the best shelter. People were being 20 killed there. 21 MS. VIDOVIC: [Interpretation] 22 Q. Did you receive any logistical support from the people of 23 Potocari? 24 A. They didn't have any support and we didn't expect anyone to give 25 us anything. Page 11298 1 Q. To move on to a different topic, between July of 1992 and further, 2 did you have any knowledge as to what was happening with the Muslim 3 population of Voljavica, Zaluzje, Biljaca and other Muslim villages in the 4 area? 5 A. Yes. We had quite a lot of knowledge because the families of some 6 of our men stayed in the area of -- and Podloznik with the refugees, and 7 we know what they were going through, that they were short of food and 8 that the conditions were very bad. 9 MS. VIDOVIC: [Interpretation] In line 13, the transcript states 10 that the witness said that he was ahead of his people in Potocari but the 11 witness meant something different. He meant ahead in the -- in combat. 12 Q. Could the witness please clarify? 13 A. Each of our leaders, including Naser for his Potocari group and 14 Osman Malagic, who was the leader of our group, was in front of us. 15 Otherwise they couldn't be the leader. So Naser was in front of his 16 Potocari people. Osman was in front of us. 17 Q. What does that mean? He was fighting in front of us? 18 A. Yes. His behaviour was important for other fighters to see. 19 MS. SELLERS: I do not mean to interrupt you, Mr. Malagic, but I 20 would just like the witness to answer the question without a suggestion 21 following what does it mean that he was ahead so we could be enlightened 22 by your answer, sir. 23 JUDGE AGIUS: At this stage, you are encountering opposition -- 24 THE WITNESS: [Interpretation] I said that previously. 25 JUDGE AGIUS: One moment. Page 11299 1 THE WITNESS: [Interpretation] If you remember. 2 JUDGE AGIUS: Mr. Malagic, one moment. Madam Vidovic, we try to 3 stick to the practice that we have adopted, that as long as you don't 4 encounter opposition from the Prosecution, you can fire leading questions. 5 When you do encounter opposition, let's stick to the normal rules of -- on 6 not -- not resorting to leading question or making suggestion to the 7 witness. I leave this entirely in your hands. 8 And, Ms. Sellers, whenever you wish to object to the way a 9 question is being put to the witness, please draw our attention and we'll 10 decide accordingly. 11 All right. I think the rules -- we know what the rules of the 12 game, if I can call them that, are. As far as this trial goes. And let's 13 try and stick to them. Yes. 14 MR. JONES: If I may just say one thing. One is just that with 15 that -- the last correction, because in English you have a head of the 16 people and ahead -- 17 JUDGE AGIUS: Yes, I know. 18 MR. JONES: That's why the clarification. 19 As for leading, I did wonder whether at least the practice was 20 followed that if you need to elicit a denial that you're allowed to put a 21 leading question. So that if it's the case the Prosecution that Oric was 22 issuing orders one of course can say was he issuing orders, otherwise 23 there is no way to get the denial. 24 JUDGE AGIUS: I certainly did not mean to exclude such questions 25 being put. We are used to the same procedure, you and I. Page 11300 1 MR. JONES: Thank you. 2 JUDGE AGIUS: But it's -- the other part, the transcript, yes, it 3 says, a head, it says, if there is an article and a noun but I had 4 understood it as being ahead meaning in front of. That's how I understood 5 it. In fact, I don't watch the transcript all the time as we go along 6 because I have other responsibilities like watching everyone else in the 7 courtroom. So please, when there is something like that, do draw our 8 attention because sometimes it is important and we need to take notice of 9 it. Thanks. 10 Madam Vidovic. 11 MS. VIDOVIC: [Interpretation] 12 Q. Witness, you described the suffering of the Muslim population of 13 the area. Does the word Predola mean anything to you? 14 A. Yes. Predola is a place where Muslims used to live. It had an 15 elementary school with only two classrooms. A lot of refugees assembled 16 there, refugees from our region. And in the classrooms there were usually 17 children. They spent the night there whilst adults were slope outside. 18 They had some water there as well. They could use it for washing or 19 cooking. 20 Q. These refugee camps and groups in Predola itself, did such a 21 situation continue until the 14th of September of 1992, that is in winter 22 conditions as well? 23 A. Yes. The situation persisted until the 14th of December. For all 24 those months people slept outside in makeshift camps without food or any 25 conditions [as interpreted]. Page 11301 1 Q. Could you tell the Chamber what the consequences were for those 2 people? 3 A. Catastrophic. They were sick often. There was no medical 4 attention. The elderly could not survive that. Most of them died. Then 5 the rains came and occasionally some of the local inhabitants would take 6 them in until the rain would stop. And then there was no food. People 7 tried to reach their previous settlements to get some. 8 Q. Could you see the Muslims moving about the area in search of food? 9 A. Yes. We saw that on a daily basis. They moved below Likari 10 through the woods towards Voljavica, Zaluzje, and they would bring back 11 corn and whatever they could find. 12 Q. Concerning this, I wanted to ask you the following: Was there 13 something unusual at that time to see a line, a column of 1.000 people 14 searching for food in that area? 15 A. No. It was a regular sight that we saw daily. We saw their 16 suffering. It was a very difficult route to travel and they didn't know 17 who would survive it and who wouldn't. 18 Q. I would kindly ask the usher to put a new document before the 19 witness. 20 This is a document by the command of the eastern Bosnian corps of 21 the 28th of July of 1992. 22 Active effect, order to all units. Quoting: "The order was 23 issued by commander Colonel Dragutin Ilic on the 28th of July." 24 Quoting: "All units are to set up ambushes on a daily basis and 25 to have incursions in -- among enemy lines and to introduce sabotage Page 11302 1 groups in order to inflict casualties and cut off communication of enemy 2 movement. And daily reports, the tasks carried out should be reported. 3 All units within their zones should conduct cutting off of all enemy 4 communications." 5 Mr. Malagic, it is stated here on the 28th of July that enemy 6 lines or communications should be broken. Do you remember that area or 7 that period? What was really taking place? 8 A. During that time, our people, who -- that went in search of food 9 constantly came on ambushes. There were people being killed and wounded 10 or captured. We tried to warn them but one couldn't stop a hungry person 11 looking for food. 12 Q. Hence this pattern of ambushes. Was it widespread in the area 13 that you are mentioning? 14 A. Yes. It was very widespread and I can give you the names of 15 people who disappeared because of these ambushes. 16 Q. Thank you. I wanted to ask you the following. In July of 1992, 17 did you know of the existence of the east Bosnian corps? Could you please 18 responds with yes or no? 19 A. Yes, we did. 20 Q. If you remember, when you came to Likari, did you find an 21 apparatus there? 22 A. Yes, an old radio station. 23 JUDGE AGIUS: [Microphone not activated]. 24 MS. VIDOVIC: [Interpretation] Yes, Your Honour, thank you. Could 25 we please give it an exhibit number? Page 11303 1 JUDGE AGIUS: Yes, before we move to something else, this document 2 which consists of two pages, one in the original language, having ERN 3 number 0438203 -- says if it's O and the corresponding translation into 4 English is being tendered and received as a Defence Exhibit and marked as 5 Defence Exhibit D760. 6 Yes. Sorry for interrupting you. The question to you, 7 Mr. Malagic, was if you remember when you arrived in Likari whether you 8 found an apparatus there, and you answered -- or you had just started 9 giving your answer by saying, yes, an old radio station. As it is -- as 10 it shows in the transcript. I don't know if it was a station or whether 11 it was just a radio transmitter. Perhaps you can explain. 12 MS. VIDOVIC: [Interpretation] Yes. He said a radio device. 13 Q. Witness, could you describe specifically the device? 14 A. When we came to Likari we were shown this by the people who came 15 there before us. I believe they brought it from Srebrenica, from the 16 police station. It was broken. It could receive but couldn't transmit. 17 So they used it to listen in on conversations of the local Serb units in 18 that area of Likari. That's how we learned of the eastern Bosnian corps 19 because it had frequent contact with the garrison in Bratunac. 20 Q. Did you personally spend some time next to the device? 21 A. Yes, often. Whenever I was not in the trenches I was present 22 there because it was interesting to listen to the conversations. 23 Q. Were you in a situation to overhear some data pertaining to Serb 24 formations, apart from the eastern Bosnian corps? 25 A. Yes. We were listening to the communication of the local units Page 11304 12 Blank page inserted to ensure pagination corresponds between the French and 13 English transcripts. Page 11305 1 from Andrici, Pobrdje, Bjelovac, Kunjarac. They discussed issues openly 2 because they thought we couldn't hear. They didn't use any encryption, 3 and we always listened to their conversations. 4 Q. Did the device have several channels? 5 A. Yes, it had several frequencies. Some of the frequencies used in 6 encryption, we couldn't understand that but as for the other channels that 7 we could hear, we could listen to their daily contacts from their 8 positions, Bjelovac, Kunjarac, Pobrdje and Sase. That's what we 9 overheard. 10 MS. VIDOVIC: [Interpretation] Your Honour, I am about to move to a 11 different topic, and if we may have a break now. 12 JUDGE AGIUS: Yes, before we do. I thank you for that. Perhaps 13 he can explain two things on this subject. 14 Are you in a position, considering your training in the army, to 15 tell us what was the make of the radio and the model? That's number one. 16 And secondly, how was it powered at this time? These are the two 17 questions that I have for you. 18 THE WITNESS: [Interpretation] Yes. It was made by Iskra which 19 used to be a Slovenian company in the former Yugoslavia, usually used by 20 the police administration to communicate with their patrols. 21 As for the battery, we had an old car battery that soon died out 22 and then some of the people remembered to create mini-generator plants 23 using the flow of the water. We used an electrical engine. And the wheel 24 was moved by the stream creating enough electricity to make the device 25 work. Page 11306 1 JUDGE AGIUS: I thank you. 2 We'll have a 25-minute break starting from now. Thank you. 3 --- Recess taken at 12.27 p.m. 4 --- On resuming at 1.02 p.m. 5 JUDGE AGIUS: Yes, Ms. Sellers. 6 MS. SELLERS: Thank you, Your Honours. The Prosecution would like 7 to bring up an issue related to some of the recent motion filings. We 8 would probably need more than three or four minutes in private session. I 9 just ask the Trial Chamber whether they would like to do that at the close 10 of today's session so that Madam Vidovic could continue as opposed to the 11 beginning. 12 JUDGE AGIUS: Well, I would suggest that we leave everything until 13 the end. Also I need about one minute, maximum two minutes, to provide on 14 a matter that we discussed in closed -- in private session this morning, 15 just a temporary order pending the outcome of what we are expecting. 16 Yes, so let's finish ten minutes before quarter to 2.00, and then 17 we will use the last few minutes to deal with these matters, all right? 18 MS. SELLERS: Thank you, Your Honour. 19 JUDGE AGIUS: Thanks. Madam Vidovic. 21 Q. Witness, we talked about the device and we also talked about 22 whether you had heard any communications regarding Serb formations. Do 23 you remember such communications coming through that device? 24 A. Yes. I remember well. They communicated often from Pobrdje and 25 the communication was between Dragolub Lukic, Dragan Ilic from Bjelovac. Page 11307 1 We often heard communications between Sreten Petrovic. He would report 2 from Spat first. And then also from Sase. 3 Those are the communications that I remember best because they 4 were of interest particularly to us in that area. 5 Q. Thank you very much. 6 MS. VIDOVIC: [Interpretation] I would now like the usher to show 7 the witness a new document. It's a document 004358251. A document by the 8 Bratunac garrison command dated 12 October 1992. The document is called 9 decision on appointment. I would like to read it to the witness: "I 10 hereby appoint Dragan, son of Ivko, Ilic as commander of the first platoon 11 of the Bjelovac company." So the Bratunac garrison command is appointing 12 Ivko Ilic as commander of the first platoon of the Bjelovac company and 13 asks that the order be executed immediately. 14 Q. Witness, could you please look at this document and tell us 15 whether Dragan Ilic was a person whose communications you had heard with 16 Dragolub Lukic? Did you know Dragan Ilic at all? 17 A. Yes. I'm sure that it's the same person because at one time we 18 heard Dragolub Lukic congratulating him on the appointment through this 19 radio communication, and I knew Dragan Ilic slightly. I knew his father 20 much better. His father was a bus driver on the route that we travelled 21 on quite a lot. 22 Q. And on what basis did you conclude that it was Dragan Ilic who was 23 being talked about? 24 A. Dragan Lukic congratulated him, this command appointment, when 25 they were talking. They were not trying to conceal their names at all. Page 11308 1 Dragan, Dragolub, and so on. 2 Q. Was there anybody around you who knew him better? 3 A. Yes. There was Juso Cvrk from our group who used to go to school 4 with Dragan, and he -- we always called him to listen when he was talking. 5 He liked to listen to Dragan when he was talking. 6 Q. Thank you very much. 7 MS. VIDOVIC: [Interpretation] Your Honours, could this document be 8 given an exhibit number, please? 9 JUDGE AGIUS: Yes. This document, which consists of two pages, 10 one in Serbo-Croat and the other one purportedly the English translation 11 thereof, is being tendered and received as Defence Exhibit number D761. 12 The Trial Chamber, however, points out that while on the B/C/S version the 13 ERN number is 04358251, at the left bottom section of the English 14 translation, the ERN number is erroneously indicated as being -- as ending 15 with the four digits 9251. And then there is another four -- there are 16 another four numbers, 9118/HMH. This anyway is document 761, D761. We 17 don't need to bother any further with the discrepancy that there is. 18 Yes. 19 MS. VIDOVIC: [Interpretation] Thank you, Your Honour, for the 20 clarification. 21 Q. Witness, I would now like you to look at a new document. 22 MS. VIDOVIC: [Interpretation] Could the usher please show the 23 witness a new document? It's a document of the Bratunac garrison command, 24 dated the 14th of August 1992, bearing the number 04358235. It's also an 25 order. Page 11309 1 The Bratunac garrison command, on the 14th of August 1992, states 2 the following: The -- I'm ordering the Bjelovac company to hold the 3 positions in Bjelovac every day, organise a duty team by day and by night 4 on the bridge in Bjelovac and secure the road towards Kunjarac as well as 5 the bunker at the crossroads to Kunjarac and Kovacevici. The commander of 6 the Bjelovac TO company and the platoon commanders are responsible for 7 carrying out this task. 8 Q. Witness, could you please comment on this document? Do the 9 contents of this document mean anything to you? 10 A. Yes. The contents mean a lot. While listening in to their 11 communications, we knew about this problem that they had. They were 12 frequently criticised by the garrison command because they were not 13 holding the bridge in Bjelovac as well as this bunker that was important 14 to them and that was on the road towards Kunjarac. Later they captured 15 the bunker but it was important to our people who were going towards 16 Biljaca for the food because it was controlling this road along which 17 people had to pass. 18 Q. Thank you very much. 19 MS. VIDOVIC: [Interpretation] Your Honour, could this document be 20 given an exhibit number, please? 21 JUDGE AGIUS: This document, which consists of two pages, the 22 original in Serbo-Croat, bearing ERN number 04358235, the corresponding 23 translation into English being the second page being tendered as Defence 24 Exhibit and marked D762. Page 11310 1 please be shown the next document? That's document -- another document by 2 the Bratunac garrison command dated 11th of October, 1992. It 3 states: Based on necessity and with the aim of performing combat 4 activities and implementing the planned tasks, I order, item 1, carry out 5 preparations to lift the Tomica hill, Andrici. Units to be activated are 6 the Pobrdje company, the Red Beret Platoon and the Sase detachment. 7 Persons responsible for implementing this task is first class captain 8 Jovan Zivanovic." 9 Could you please look at item 2 as well, which says: "To perform 10 blocking of the Kunjerac-Kostanovice-Andrici line, units which should be 11 activated are the Mostanice company 1, Kostanovice first platoon and 12 Andrici platoon. Responsible persons for fulfilling this task are Angel 13 Andjelko Obrenovic and Sreten Petrovic. 14 I would now like to ask you also about the communications that you 15 monitored over the radio device. 16 In October, at this time, in mid-October 1992, did you know of the 17 existence of the Pobrdje company, the Red Beret platoon, and the Sase 18 detachment. 19 A. Yes. We knew about the formations that existed at those 20 locations. 21 Q. How did you know this? 22 A. We knew about that based on their communications. And also during 23 our reconnaissance activities, we could see from neighbouring elevations 24 where the mortars were located at Sase, Andrici and all of these other 25 locations. Page 11311 1 Q. Could you please pay particular attention to item 2 of this order, 2 which states: "To carry out the blocking of the 3 Kunjerac-Kostanovice-Andrici line, the units which should be activated as 4 Mostanice company, Kostanovice first platoon and Andrici platoon. The 5 responsible persons for fulfilling this task are Andjelko Obrenovic and 6 Sreten Petrovic." 7 Is Sreten Petrovic the person you said was calling from Sase? 8 A. Yes, yes. He very frequently was the one who was calling from 9 Sase. 10 Q. And in relation to this I want to ask you the following: Is there 11 any information or do you have any information or not whether in October 12 1992 the Kunjerac-Kostanovice-Andrici line was actually closed? 13 A. Yes. In that period, they did manage to close that line. 14 Q. Could you please show this to the Trial Chamber, if you have the 15 map in front of you? 16 A. Kunjarac was not put here on the map. 17 Q. Could you please tell us whether this is not part of Bjelovac? 18 A. Yes. That is it a hill above Bjelovac. The line cut the road 19 from Kostanovice and Andrici. Andrici is not here, but it's between Obadi 20 and Kostanovice, so that complete line was closed. And it made it more 21 difficult for our civilians to get food, especially to go -- going from 22 the villages which were going down to Biljaca. They couldn't approach 23 that area and also a stronger ring was placed around Likari. 24 Q. Thank you very much. 25 MS. VIDOVIC: [Interpretation] Your Honours, could this document be Page 11312 1 given an exhibit number? 2 JUDGE AGIUS: All right. So this document, which consists of two 3 pages, bearing in the original format, ERN number 04358245, one page in 4 Serbo-Croat and one corresponding translation page in English, is being 5 received and marked as Defence Exhibit D763. 6 MS. VIDOVIC: [Interpretation] Could the usher please show the 7 witness Defence Exhibit D256? 8 Q. This is a list of the 2nd Battalion. It's their salary list for 9 the month of December. Witness, could you please look through the 10 document and then turn to the last page, which bears the number 01320830. 11 MS. VIDOVIC: [Interpretation] Your Honours, that is page 18, also 12 the last page in the English version. 13 Q. Witness, have you found this part on the last page where it 14 states, recapitulation? 15 A. Yes. 16 Q. Could you please look at what it says underneath that? It says 17 recapitulation, payment for soldiers of the 2nd Infantry Battalion for 18 December 1992, and, look, it says battalion command, detachment I Jelav, 19 detachment II Pobrdje, Drina detachment III, accompanying squad-mortar 20 reconnaissance, and then it says, total 502 soldiers. 21 A. Yes. 22 Q. Please, could you comment on this recapitulation or summary? Did 23 you hear of the existence of these units before December 1992 or not? 24 A. Yes. We did hear of all of these units through the 25 communications. These are units from the local regions. Pobrdje, and Page 11313 1 Drinska, and companies were made in that area, and these are the same 2 units that attacked Voljavica, Zaluzje, Biljaca, at the beginning, except 3 that at the time they were called the TO units of a certain place, Jelav, 4 Pobrdje, and so on, and then they had grown into proper companies and they 5 had an accompanying mortar squad. 6 Q. Now I would like to ask you a question in relation to that. When 7 we are talking about mortars, did you hear anything through the radio 8 about that? 9 A. We constantly listened about the mortars, because they were always 10 asking for mortar support over the radio. This helped us a lot to be able 11 to seek shelter or move away whenever they asked for support. 12 Q. Thank you. Could you please now look at page 013208220? That's 13 page 8 in English. It's also page 8. Have you found it? 14 A. Yes. 15 Q. Could you look at the bottom of the page where it states squad 16 from Kunjarac, and under 91 it says Andjelko Obrenovic, squad commander, 17 Kunjarac squad. 18 My question is: Did you hear of this person before? Did you know 19 this person? 20 A. Yes. Andjelko Obrenovic was my maths teacher. He was born in 21 Pobrdje. He worked in Bratunac. Later he started working in the 22 elementary school in Voljavica. 23 Q. Did you know his voice? 24 A. Yes, I knew his voice very well. 25 Q. Was it his voice that you heard in the communications in the Page 11314 12 Blank page inserted to ensure pagination corresponds between the French and 13 English transcripts. Page 11315 1 course of October, November and December 1992? 2 A. Yes, I heard his voice many times in that period. I knew his 3 voice very well. 4 Q. Thank you. Could you please look at page 16 now? In the English 5 version it's also page 16. It bears the number 01320828. And if you look 6 at the top of the page, you can see that it states here: "Reconnaissance 7 platoon" and underneath it says Bosko Neskovic. Did you hear anything 8 about this in the communications that you were monitoring? 9 A. Yes. We heard of Neskovic. They always said, can Crveni respond? 10 He was called by the name Crveni, red. And he was very important to them 11 because there were reservoirs for the local water supply there in 12 Bratunac, and that's why Crveni had special units there at Kunjarac. 13 JUDGE AGIUS: One moment, Ms. Vidovic. I notice that in the 14 transcript, the words reconnaissance platoon were used. In the document 15 itself, we have reconnaissance squad, and then brackets, red and Perica. 16 I'm raising this because you yourself have raised the matter in the past. 17 You don't agree that the words platoon and squad ought to be used as 18 meaning the same thing. And the second thing is -- in other words whether 19 you accept that this was a platoon as translated to us during the 20 interpretation. 21 Second, what's the meaning of that Perica? 22 MS. VIDOVIC: [Interpretation] 23 Q. Witness, please, the witness is better versed in these military 24 questions and that's why I will ask him. Do you agree that in this 25 document it says [B/C/S spoken], reconnaissance platoon? Page 11316 1 A. Yes. 2 MS. VIDOVIC: [Interpretation] Your Honours, the word is squad, 3 according to how I understand it. "Vod" in B/C/S is platoon. In the 4 original the words are [B/C/S spoken] vod. 5 JUDGE AGIUS: I'm raising the matter. To us the only significance 6 of all this is that in the past you have raised this distinction or 7 pointed at this distinction between a squad and a platoon, and perhaps you 8 can tell us exactly whether we are to accept platoon or whether we are to 9 ignore the translation into squad as it appears on the document itself, in 10 the English version of the document. 11 MS. VIDOVIC: [Interpretation] Your Honours, we insist always that 12 the word be translated the way it is in the Bosnian original. Sometimes 13 the word "vod" is used and sometimes the word "odeljenje." In this case, 14 in this document, the word used is "vod" so you cannot mix these two 15 things simply. 16 JUDGE AGIUS: And according to you -- 17 MR. JONES: I think -- 18 JUDGE AGIUS: What does it mean according to you. 19 MR. JONES: And to be perfectly honest, offhand I can't remember 20 whether "vod" is platoon or squad. I think "vod" is platoon and 21 "odeljenje" is squad, in which case it should be correctly translated as 22 it has been on the transcript as platoon. And this exhibit would need to 23 be corrected to that extent. 24 JUDGE AGIUS: Okay. Thank you, Mr. Jones. 25 And Perica, what does Perica mean? Page 11317 1 MS. VIDOVIC: [Interpretation] 2 Q. Witness, could you please help us whether Perica is a formation or 3 something? Do you have any information about that? 4 A. No. Perica was a man who was contacting with Crveni from 5 Kunjarac. So he would frequently pick up when they talked with the 6 Bratunac garrison. Sometimes they would ask for Perica and sometimes they 7 would ask for Crveni. 8 Q. Actually, in our language, the word "Perica" signifies a name, 9 Petar or Perica. It's a name. 10 JUDGE AGIUS: One moment. 11 JUDGE ESER: And what means "red" in this context? Is it 12 indicating a colour or also a person or some unit or whatever? 13 THE WITNESS: [Interpretation] Crveni was a unit that was stationed 14 in that area. The reconnaissance platoon had a code name, a symbolic 15 name, Crveni, Reds, that's the name they gave themselves. 16 JUDGE AGIUS: All right. Yes, Madam Vidovic. Please go ahead. 17 MS. VIDOVIC: [Interpretation] 18 Q. Were these the terms that you heard during these radio 19 communications, just to clarify that? 20 A. Yes. These were the terms that they used. 21 Q. All right. 23 witness another document now? It's number 0436999, and it's a document by 24 the Bratunac garrison command of the 11th of October, 1992, sent to the 25 Birac Brigade, to the command of the Birac Brigade. Could you please look Page 11318 1 at this document and focus on items 1, 2 and 3 of the document? I'm going 2 to read item 1 to you. "Together with the forces from Kravica, we have 3 laid strong ambushes in order to prevent fresh forces from Srebrenica from 4 being brought into battle. In the course of today, the 5 Voljavica-Pobrdje-Andrici line was moved, and we have joined up with the 6 forces from Sase. In this way, we have considerably shortened the front 7 line. We are also setting up the Bratunac-Glogova line at the 8 Kaolin-Ladja, elevation 488, on positions Vresje [phoen], trig point 532, 9 together with the Kravica forces. We have established communications 10 according to the Kravica plan." 11 I would like to ask the following based on that document: Did you 12 have information about coordinated action between the forces from Kravica 13 and these forces that you described a little bit earlier, in order to move 14 the Voljavica-Pobrdje-Andrici line and its joining together with the Sase 15 forces? But I would like to ask you just to give a little more time 16 before you begin answering so that the interpreters could translate until 17 the end. And you can reply now. 18 A. As soon as you heard the name of Jolje, Nikolic, Jovan being 19 mentioned over the communications, we knew that these units were Kravica 20 were helping these units in Pobrdje and that in joint action with them 21 they were moving these lines towards Likari. By moving this line, the 22 front towards Srebrenica became even tighter. Actually towards Likari, 23 because Likari was the entry point to Srebrenica. And the departure of -- 24 or actually, the forages of our civilians for food were becoming more and 25 more difficult. Page 11319 1 Q. I would just like to ask you the following: This movement of the 2 Serb lines, Voljavica, Pobrdje, Andrici and joining together with the Sase 3 forces, did this actually happen? 4 A. Yes. This report fully reflects the situation in the field. 5 Q. Thank you. 7 given an exhibit number, please? 8 JUDGE AGIUS: [Microphone not activated]. 9 THE INTERPRETER: Microphone, please. 10 JUDGE AGIUS: The document that the Defence seeks to tender 11 consists of one page in B/C/S which bears ERN number 04336999 and the 12 corresponding translation into English which appears in two pages. The 13 Trial Chamber points out, in case the Defence wishes to make any comments, 14 that on the original B/C/S version, on the right-hand side of the 15 document, there is an indication that this is a telegram or a telex. This 16 does not -- is not reflected in the English translation. Also, in the 17 original, just beneath the stamp, there are some words and a circle -- and 18 a square which seem to be handwritten. I don't know what they mean but 19 there is no corresponding entry in the English version. And also, in the 20 original document, the bottom are the words [B/C/S spoken]. And this is 21 also not repeated in the English version. In case any of this has any 22 important -- importance for you, please feel free to make your comments. 23 The document will be -- is being received and marked as Defence 24 Exhibit D764. If the points that I raised are of any significance to you, 25 please go ahead. If not, let's proceed with the next question. Page 11320 1 MS. VIDOVIC: [Interpretation] Your Honour, these are official 2 translations. Thank you for pointing it out, and in the future I will pay 3 attention to such details because it came from the official translation 4 service, and it seems we need to check as to whether everything is 5 contained in the translation. But this issue was not directly relevant to 6 us. I guess we have given an exhibit number to this document already. 7 Q. Witness, I wanted to ask you the following: Up until now, you 8 have been describing the events until mid-October 1992 and the military 9 situation in the field as you witnessed it or overheard it via radio 10 communication. After mid-October of 1992, were there any other military 11 activities in the -- in your area that you can remember? 12 A. Yes. I particularly remember that listening to their 13 communication we learned of a strong offensive that was to be launched 14 against Pirici and Poloznik, and there was a high concentration of our 15 refugees there. We tried to tell that to the people there, as well as to 16 Salihovic Midhat who was there with his group. We sent one lad who wanted 17 to go there himself. His name was Samir Omerovic and his family was there 18 somewhere, but unfortunately during those activities he was killed. 19 Q. Thank you. I would kindly ask the usher to put a new document 20 before the witness. 21 JUDGE AGIUS: In the meantime, let's give this a number, 22 Ms. Vidovic. This last document that has been made use of by the Defence 23 consisting of, in the original language, one page with ERN number 04336995 24 and the corresponding translation into English is being tendered received 25 and marked as Defence Exhibit D765. Page 11321 1 MS. VIDOVIC: [Interpretation] 2 Q. Witness, you have the document before you? 3 A. Yes. 4 Q. Please take a look at it. This is a document from the garrison 5 command of Bratunac from the 13th of November of 1992. It is stated 6 during the day, from 9.00 onwards an attack was conducted against Poloznik 7 and Pirici. The enemy suffered great casualties. Until this moment we 8 are positive about the 20 killed enemy soldiers as well as significant 9 physical damage. Detailed report to follow tomorrow. Since the action is 10 still ongoing. As of yesterday, in the village of Kravica and Kamenica, 11 three enemy soldiers were killed in an ambush. 12 I wanted to ask you the following regarding this. This document 13 apparently was compiled by Captain Vaso Gujic [phoen]. Have you ever 14 heard of that name before? 15 A. Yes, several times. That was the person who usually contacted the 16 troops in the field from the garrison command. 17 Q. The attack on Pirici that you mentioned, does this document 18 reflect the situation in the field mentioning the attack you mentioned 19 when Samir Omerovic was killed? 20 A. Yes. This report fully reflects the situation and the offensive 21 as it was in mid-October. It lasted until the beginning of December. 22 Pirici suffered strong attacks there as well as Podloznik and the various 23 refugee camps and a lot of people were killed during those attacks. 24 People were forced to withdraw further towards Prezovica [phoen] and 25 together with the inhabitants of Podloznik and Pirici, and they remained Page 11322 1 there until early December. 2 MS. VIDOVIC: [Interpretation] Your Honour, I believe now is the 3 time that you asked me to leave at your disposal. 4 Thank you, Witness, for today. I believe we are finished for the 5 day, continuing tomorrow. 6 Did I understand properly, Your Honour, that this document has 7 already been given an exhibit number? 9 Mr. Malagic, we have to stop here today because we need to discuss 10 a couple of other matters which do not concern you. So you will be now 11 escorted out of the courtroom by Madam Usher. You will return again 12 tomorrow to continue with your examination-in-chief and hopefully finish 13 with it after which we will start with the cross-examination. 14 In the meantime, please I wish to draw your attention to a very 15 important matter. You are not to discuss with anyone between today and 16 tomorrow, and that applies also for the following days, the subject matter 17 of your testimony. It doesn't mean to say that you cannot ring up your 18 family and say hello or receive calls from family or friends, et cetera, 19 but the -- any discussion on the subject matter of your testimony or on 20 this case in general is prohibited and you must not engage in it. Did I 21 make myself clear? 22 THE WITNESS: [Interpretation] Yes, completely. 23 JUDGE AGIUS: Thank you. You will return back tomorrow morning 24 at 9.00. 25 Usher, please. Page 11323 1 [The witness stands down] 2 JUDGE AGIUS: Now, there are two matters that need to be dealt 3 with. 4 Ms. Sellers, the matter that you wished to raise, is it going to 5 be raised in public session or in private session? 6 MS. SELLERS: Private session, please, Your Honour. 7 JUDGE AGIUS: I thought you had mentioned that. So let's move 8 into private session for a while, please. 9 [Private session] 10 (redacted) 11 (redacted) 12 (redacted) 13 (redacted) 14 (redacted) 15 (redacted) 16 (redacted) 17 (redacted) 18 (redacted) 19 (redacted) 20 (redacted) 21 (redacted) 22 (redacted) 23 (redacted) 24 (redacted) 25 (redacted) Page 11324 11 Page 11324 redacted. Private session. Page 11325 11 Page 11325 redacted. Private session. Page 11326 11 Page 11326 redacted. Private session. Page 11327 1 (redacted) 2 (redacted) 3 (redacted) 4 (redacted) 5 (redacted) 6 (redacted) 7 (redacted) 8 (redacted) 9 (redacted) 10 [Open session] 11 JUDGE AGIUS: We are in open session. I thank you for your 12 cooperation. These two matters will be handled in due course accordingly, 13 and we can now adjourn until tomorrow morning at 9.00, I think, in this 14 same courtroom? No? In courtroom ... 15 THE REGISTRAR: Courtroom III, Your Honour. 16 JUDGE AGIUS: All right. Thank you. 17 --- Whereupon the hearing adjourned at 1.49 p.m., to 18 be reconvened on Tuesday, the 27th day of September, 19 2005, at 9.00 a.m.
global_05_local_4_shard_00000656_processed.jsonl/73476
Resident Evil: Deadly Silence Release Date: February 7, 2006 Resident Evil DS Wiki Guide Edit Page    Last Edit: 2 years 4 months ago Welcome to the Resident Evil: Deadly Silence wiki guide. Deep within the shadows of the Arklay Forest lays a dreadful secret in the deadly silence... Within the mansion beyond the rusted gates are things that will certainly bump in the night, and eat your face off in the process. Your helicopter is down, you're in that mansion, and nobody is coming to save you. The only thing that divides you from the walking dead is the scent of rotting flesh in the air. What will you do as that scent grows closer? Hey, relax! IGN Guides works faster on zombies than bug spray on roaches! After all, we're zombie-proof! If you're still curious about Umbrella's line of shaving cream, you're stuck with us in the Intro. If you're wondering why you walk like a drunk in survival horror games, check out the Basics. Looking to check yo'self before you wriggity-wreck yo'self? Browse your arsenal in the Weapons section. Wondering why when you consume the herbs your spiritual mind awakens? Gander at our Items section. Wanna know why that blue guy doesn't have genitals? Well, we don't wanna know, but look at our Enemies section for analysis on everything else. Need to beat the game with either character? View our Walkthrough for both the Original and the Rebirth modes of the game. In this Resident Evil: Deadly Silence strategy guide, you'll find: Basic tips for Resident Evil rookies. Weapons info with tips for using your arsenal effectively. Items list—know what to do with what you've got. Enemy details, including strategy for killing the lot of 'em. Four Resident Evil: Deadly Silence walkthroughs, including both Original and Rebirth modes with both characters! Because in this world, the zombies are our [expletive lyrics]. Yeaw, [expletive lyrics]! This wiki was automatically converted from the Resident Evil: Deadly Silence Guide (Nintendo DS), Resident Evil DS Walkthrough guide at http://guides.ign.com/guides/767640/ and may require cleanup. Please help improve this wiki if you can, and remove this notice if appropriate. Contributor Assistance blog comments powered by Disqus Download PDF Top Wiki Contributors See All Top Contributors » Wiki Help Need assistance with editing this wiki? Check out these resources:
global_05_local_4_shard_00000656_processed.jsonl/73501
12 Ways Tech Companies Boost Creativity 3 of 13 Google offers "20 percent time" Google famously gives its engineers time to work on creative projects. Up to 20 percent of their workweek can go toward them. The most famous Google service to come out of a "20 percent project," as Google calls it, is Gmail.
global_05_local_4_shard_00000656_processed.jsonl/73502
Why You Should Listen to Your Rotten Customers When your business is facing disruption by a competitor, your best customers aren't the ones who will provide the most valuable feedback. If your ship is leaking customers little by little, you better find the crack and plug it. A leak can turn into a flood quickly, especially if the cause of it is a disruptive new technology offered by a competitor. Maxwell Wessel, vice president of innovation at enterprise software company SAP and an investor with Washington, D.C.'s NextGen Angels, says customers, especially low-profit ones, can hold the answers to your company's problems.  "Most businesses aren't listening to the right customers. Most businesses spend their time listening to their most demanding customers--not only because those customers tend to be the most profitable, but also because our listening techniques direct us towards the customers who speak the loudest," Wessel writes in the Harvard Business Review. "And we end up ignoring--sometimes not even hearing--other customers who may become equally valuable in the future." Below are the listening practices Wessel suggests you use when a disruptive competitor presents itself. Perform customer exit interviews. If you aren't doing exit interviews with former customers, you're missing out on a trove of valuable information. Why did they leave? What product or service replaced you? "The customers who opt to buy different products instead of your own are those who can tell you the most about the appeal of those products," Wessel writes in HBR. "Those customers can articulate where you fell short and where others did better. Often, to identify who these customers are, you need to set up different types of listening systems." He suggests putting people in stores to observe purchases, emailing former loyal customers you haven't heard from in a while, and starting an open conversation with people about your company's failure. Engage your less lucrative customers. You are probably having lots of conversations with customers every day. Most likely, the customers are those that drive your profits, but this group only gives you one side of the story. "When it comes to disruption, you need tools to engage those in other segments of the market. You need to identify who's on the margin of your business and actively open channels for communication with them. Start advisory groups and user communities intentionally populated with people who only engage with your core products peripherally," Wessel writes. "They won't feel as invested as your best customers, so you'll need to make sure you do the work to get them involved and contributing feedback. Unfortunately, if you don't do the work, you may remain stuck in the echo chamber associated with daily business." Assess the scope of the disruption. Wessel says your company's history can be a powerful tool in measuring your competitors' threat level. "If the customers that are leaving today had left 10 years ago, what would have been the impact on your growth? If they'd left 20 years ago, how much profit would have been lost? Would you even be in business today? This type of listening to economic indicators can both help you understand the speed and scope of your disruption as well as position the significance of the threat to your executives," Wessel writes. "There is no better tool than a rational and realistic description of risk to get large companies to move." Last updated: Apr 8, 2014 WILL YAKOWICZ | Staff Writer | Reporter, Register on today to get full access to: All articles  |  Magazine archives | Livestream events | Comments Or sign up using:
global_05_local_4_shard_00000656_processed.jsonl/73532
Allemang, Dean and Hendler, James. Semantic Web for the working ontologist: modeling in RDF, RDFS and OWL. Burlington, MA: Morgan Kaufmann, 2008. xvii, 330 p. ISBN-13 9780123735560 $49.95 The expression working ontologist infers the existence of the complementary expression: a non-working ontologist. Consideration of this complement suggests why the authors modified ontologist with working: 'The aim of this book is not to motivate or pitch the Semantic Web but to provide the tools necessary for working with it' (p. 1). While many ontological tools remain theoretical achievements, a working ontologist gets his hands dirty applying ontologies to information stores in use. The impulse to enrich Internet resources with ontologies flows from the ambitions of the Semantic Web to architect information so that inferences can be made. Allemang and Hendler focus on the relationships among data points and links among data stores that can be exploited to make information smarter. The Linking Open Data movement [1] and its goal of extending the Web with a data commons comprising open data sets architected as RDF (Resource Description Framework), which would include links among data items from different data sources, compel the need for this book. Practicality poses the questions Which ontology to use? And, How does one apply it? This book answers both questions. The self learner will be delighted to discover an appendix of frequently asked questions, such as 'How can I represent tabular data in RDF' with page directions to chapter discussion. The tone of the book reflects the authors experience in teaching workshops to non-programmers who face the challenge of transforming their relational databases to RDF web resources. The authors bridge to their fundamental discussion of RDF with a database metaphor. This strategy seemed very clever to me because many legacy information stores are relational databases, and their database administrators will need both the motivation and a clear pathway to RDF architecture in order to ease the transformation of a data silo to a pool of RDF records. Step-by-step, the authors point to the similarities between relational tuple architecture and the RDF triple architecture. The implication is that by transforming a relational database and enriching it with ontologies, the data resource becomes more expressive, and therefore more useful. The intellectual progression of the book is from RDF as information architecture to RDF schema (RDFS) as a method of conceptually manipulating RDF records. The focus is on terms such as rdfs:subClassOf and rdfs:subPropertyOf with solutions of challenges such as how to represent researcher is a special case of analyst in RDFS. Blocked-out discussions that consider parallel concepts of object-oriented programming are nested in the text. For example, one discussion considers the sets created by RDFS from the point of view of sets in object-oriented programming. Obviously the authors have realized that a major segment of their readership will be programmers with an object-oriented background who have been assigned the task of applying ontologies to RDF stores. The authors use a presentation of RDFS-Plus as a gateway to OWL (Web Ontology Language). RDFS-Plus represents the authors' selection of OWL constructs that are common to many vendors and have proven useful among the early adopters of Semantic Web technologies. Included are terms such as owl:inverseOf, owl:TransitiveProperty and owl:equivalentClass. The presentation of RDFS-Plus and OWL is a step up in complexity and sophistication. There are two chapters that consider ontology applications in the wild or, put another way, examples of real-world working systems. RDFS-Plus is illustrated with a discussion of SKOS (Simple Knowledge Organization System) and FOAF (Friend of a Friend). The SKOS discussion will feel very familiar to librarians as the focus is on broader terms, narrower terms, and scope notes, and so on. OWL is illustrated by reference to a United States federal government initiative to organize information to facilitate sharing, and the thesaurus of the National Cancer Institute. The latter exemplifies the strength of OWL is precisely specify relationships among terms. This book makes a very positive contribution to the transformation of the Semantic Web into an everyday reality. There are very rapid changes in this area of technology, semantics and the Web: One can only hope that the authors issue a new edition in a year or two and continue to guide the working ontologist. Terrence A. Brooks Associate Professor Information School University of Washington Seattle, WA 98133 1. Linking open data: W3C SWEO community project. (2009). Retrieved 16 August, 2009 from (Archived by WebCite® at
global_05_local_4_shard_00000656_processed.jsonl/73550
Picture of airsoft bazooka just something me and my friend made we made it in my friends basement using the materials listed. The tools we use were a saw to shorten the pipe itself, and a drill for "smoke holes if you will." there was a lot of trial and error like how to make the missile fire accurately we fixed this by adding a nose cone but adding fins was the biggest problem that we still haven't solved because the rocket fits so snugly in the pipe. Another thing that we added on after our first trial was to add the shield in the front to prevent the user from being hit by the back blast of the rocket. If we were to try this again we would probably make the pvc pipe wider so we could fit the fins inside the pipe.  Remove these adsRemove these ads by Signing Up Step 1: What u need 1inch pvc pipe model rocket model rocket launcher cardboard duct tape pipe that fits inside the pvc Step 2: Build it first take the pvc pipe and the smaller pipe and put the smaller one in it. make sure the smaller pipe is no longer than 1 inch. The pvc pipe should be abot 2 and a half feet long. Step 3: Build it next tape the control pad to the top of the pvc. wrap the wire around the the pipe. Make sure the wire has enough slack for the clamps to reach the engine inside Step 4: Build it take a piece of cardboard(your choice for size) and cut a one inch circle in the center and slide it on to the front. your bazooka is now complete Enjoy!! (i suggest b5 engines) lwulfe1 year ago hey dude go look at the Mortar on the missles they use are a oval shape allowing for space on the bottom for the fins MeGusta1 year ago Cut slits in the area where the fins are and make them spring loaded to pop out lhsk8r1 year ago Me and my friends did similar a while back but made them automatic on a robotic swivel stand on the back of a utv ebaneser1 year ago My rockets were made out of a plastic Easter egg (the ones that come apart) and had a cardboard tail with fins on it I may post an instructable ebaneser1 year ago I had an Idea almost exactly the some but it looked like a gauntlet and it was for paintball then I scrapped the idea because the paint leaked into the engine and prevented it from launching
global_05_local_4_shard_00000656_processed.jsonl/73584
Information for "Main Page" Jump to: navigation, search Basic information Display titleMain Page Default sort keyMain Page Page length (in bytes)890 Page ID1 Page content languageEnglish (en) Search engine statusIndexable Number of views7,914 Redirects to this page0 Page protection EditAllow all users MoveAllow all users Edit history Page creatorMediaWiki default (Talk) Date of page creation21:11, 28 August 2013 Latest editoradmin0 (Talk | contribs) Date of latest edit22:07, 16 July 2014 Total number of edits12 Total number of distinct authors2 Recent number of edits (within past 91 days)4 Recent number of distinct authors1
global_05_local_4_shard_00000656_processed.jsonl/73598
Boat racing for Chinese New Year Boat racing Credit: John Stillwell/PA Archive/Press Association Images Anaconda paddlers will be taking part in this year's Chinese New Year celebrations in Nottingham. Dragon boats are a traditional part of Chinese culture and date back to the 2nd Century. A poet, Qu Yuan, killed himself, by throwing himself into the Miluo River after being banished from court. Villagers failed to save him, but to keep fish and evil spirits from his body they banged drums and beat the water with paddles. Today's top stories
global_05_local_4_shard_00000656_processed.jsonl/73615
About Yifan Peng Yifan is a senior CIS PhD student in University of Delaware. His main researches include relation extraction, sentence simplification, text mining and natural language processing. He does not consider himself of a Java geek, but all his projects are written in Java. Let’s first look at an example. Say I’m creating a string frequency list, using a Map, where each key is a String that is being counted and the value is an Integer that’s incremented each time a String is added. A straightforward way of achieving it is int count = map.containsKey(string) ? map.get(string) : 0; map.put(string, count + 1); This piece of code runs quite slowly because it contains three potentially expensive operations on a map, namely containsKey(), get(), and [put()](http://docs.oracle.com/javase/7/docs/api/java/util/Map.html#put(K, V)). Each requires to search the key in the map. Now let’s refactor the code for better performance. Integer vs MutableInteger vs AtomicInteger One important reason that we have to invoke three expensive operations is using Integer for counting. In Java, Integer is immutable. It prevents us modifing the integer value after construction. Therefore, to increment a counter, we have to first get the integer from the map, then create another new integer by adding one, and put it back to the map. To make the counter mutable, there are several ways. One is to simply create your own MutableInteger, like what I showed below. public class MutableInteger { private int val; public MutableInteger(int val) { this.val = val; public int get() { return val; public void set(int val) { this.val = val; Another way might be using AtomicInteger in Java, which is used in applications such as atomically incremented counters. But the main choice for AtomicInteger is if you want to achieve thread safety with the operations on the integer. Therefore it cannot be used as a replacement for an Integer. Based on this, if thread-safety is not a strong consideration of your project, I won’t recommend using AtomicInteger. Search the key only once After using the MutableInteger, we can change the above code to if (map.containsKey(string)) { MutableInteger count = map.get(string); count.set(count.get() + 1); } else { map.put(string, new MutableInteger(1)); MutableInteger count = map.get(string); if (count != null) { count.set(count.get() + 1); } else { map.put(string, new MutableInteger(1)); In the worst case, when the key has not been seen before, the code will search the key twice: one for retrieving, one for setting. It is much better than the previous one. But we should NOT be satisfied right now and stop. If you checked the [Map.put()](http://docs.oracle.com/javase/7/docs/api/java/util/Map.html#put(K, V)) method in Java document, you will find that this method will return the previous value associated with key. This means we can merge the retrieving and setting into one. However, you may wonder: if we don’t retrieve the counter first, how we can set the new counter? Now we are finally touching the most tricky part in this post: we can simplify put a zero-frequency counter! public int incrementCount(K key, int count) { MutableInteger tmpCount = new MutableInteger(0); MutableInteger oldCount = map.put(key, tmpCount); if (oldCount != null) { count += oldCount.get(); return count; Yet another Counter It looks like putting all necessary operations into a class will be helpful for the future use. Therefore I create a class called Counter and make it public available. The Counter defines a collection that counts the number of times an object appears in the collection. Suppose you have a Counter that contains {a, a, b, c}. Calling getCount() on “a” would return 2, while calling keySet() would return {a, b, c}. This class works like a Map, but with different methods for easily getting/setting/incrementing counts for objects and computing various functions with the counts. The Counter constructor and addAll() method can be used to copy another Counter’s contents over. The Counter class is modified according IntCounter and AbstractMapBag. Some highlighted operations on Counter include • incrementCount() and decrementCount(): Adds/subtracts the given count to the current count for the given key. If the key hasn’t been seen before, it is assumed to have count 0, and thus the increment method will set its count to the given amount. The decrement will set its count to -1. • getCount(): returns the current count for the given key, which is 0 if it hasn’t been seen before. • keysAt(), keysAbove(), and keysBelow(): returns the set of keys whose counts are at, above, or below the given threshold. This set may have 0 elements but will not be null. • argmin() and argmax(): finds and returns the key in this Counter with the smallest/largest count. If there are several min/max counts, random value is returned. Returns null if this Counter is empty. Related Whitepaper: Get it Now!   10 Responses to "Most efficient way to increment a Map value in Java – Only search the key once" 1. Antonios says: map.put(string, count + 1); For a HashMap the amortized time complexity of containKey, get and put is O(1). Pretty inexpensive I would have though. 2. Anton Kazennikov says: Or, one could use Trove library for primitive collections. It has TObjectIntHashMap that contains a handy .adjustOrPutValue(key, adjust_amount, put_value) 3. Or, one could use Guava’s Multiset: int count = multiset.count(string); // count == 2 4. This is a clever usage of put’s return value. My only cautions are that: 1) This assumes there is no cost to putting a new value at the key. When handing maps on disk this is not the case and so the clever code must only be used for maps in memory. 2) Too much clever code raises maintenance costs. 5. Peter Daum says: Interesting and clever usage of map api, but I’m a little bit curious about the extra effort for create a new instance of MutableInteger each time the value has to be increased. Do you have any numbers? Leave a Reply eight × 9 = Sign up for our Newsletter • Fresh trends • Cases and examples • Research and insights • Two complimentary e-books
global_05_local_4_shard_00000656_processed.jsonl/73617
Against All Hope—Romans 4:18 Written by Juli Camarin on . "Against all hope, Abraham in hope believed and so became the father of many nations, just as it had been said to him, "So shall your offspring be" (Romans 4:18) I have prayed for many people over the years for various things. One girl, in particular stands out because her body was sick and robbing her of life. The doctors could do nothing for her and as we talked, I looked into her eyes and saw that she had no hope. I remember thinking to myself, that this was a great place to be... fed up with the circumstances and hopeless for a solution. No matter what anyone says, we all have faith. Because of this, we put our faith in what we believe. If we believe we will receive the answer from the doctor, then we will exercise our faith by seeking that answer, from the doctor. If we believe we have a chance at the million dollar jackpot, then we will buy a lottery ticket. If we believe the building we are in, is on fire, then we will leave the building. When we believe something, it show by how we appropriate our faith in that belief. In this example from Abraham, he used his faith to believe God. The difference between us and Abraham, is that 'against all hope, Abraham in hope believed'. The Amplified Bible puts it this way, "[For Abraham, human reason for] hope being gone, hoped in faith that he should become the father of many nations, as he had been promised, So [numberless] shall your descendants be." ( Romans 4:18; Amp ). His human hope was gone because there was no possible way physically, that he should father a child by Sarah. Both well pass the age or capability. But the scriptures say, that he didn't hope with his limited understanding, instead he hoped through the supernatural hope imparted by God. He took what had been spoken to him as fulfilled even before it had begun. To do that, faith first has to rise on the inside. Hoping with a supernatural hope in the promise of God. When we base our faith in God's word and what he has promised, then our faith is based in truth. Thank God that Abraham operated in faith because he saw the fulfillment of God's promise and we were also blessed through it. The circumstances surrounding him, ceased to exist when he clung to that hope, riding on God's word. In the same way, the lady, whose eyes held disappointment and hopelessness, lit up at hearing this very scripture because all of a sudden her hope wasn't based on anything but God and his word. As we spent a couple hours pouring over this passage in Romans, faith rose on the inside of her until she couldn't contain herself. As we prayed together for her body to heal and the sickness to leave in Jesus' name, she showed that she believed God's word by her faith. And her faith made her well that very hour. Every day she grew strong and healthier until it was physically evident that her health was completely restored. She choose to operate in faith, believing God for the impossible according to human standards. She hoped in hope, and saw fulfillment of what had been promised her in the scriptures. Today, I encourage you to find just one promise in God's word and believe it with all your heart, mind and strength. Whatever you are needing from him. Find it, read it, meditate on it until you believe it with all your heart. When you start operating in faith, based on truth, then you will be blessed and completely changed by it. And like Abraham, your faith and the fulfillment of the promise will also bless many others as well! Amen.
global_05_local_4_shard_00000656_processed.jsonl/73625
NP249 seal questions - Sign Up   Today's Posts User: Pass: Remember? Advertise Here Go Back > Models > Jeep Grand Cherokee & Commander Forums > ZJ Grand Cherokee Forum > NP249 seal questions Unread 04-28-2013, 06:00 PM   #1 Registered User 1995 ZJ  Join Date: Mar 2013 Location: Charlotte, NC Posts: 13 NP249 seal questions I finally bit the bullet and picked up a new viscous coupler and seal kit for my 1995 Grand Cherokee with the NP249. After several hours of pain and suffering, I got the case out and taken apart. For those of you who have bought the vc and seal kit through ebay, does the rear output seal for the rear drive shaft look like a different design than whats from the factory? The factory piece looks like it has almost a little rubber boot on the end of it whereas the ebay seal looks flat. Should I use the one that came with the kit, or is the extra rubber on the factory piece needed? Also, for reattaching the tailshaft back to the transfer case housing, what gasket sealant do you all recommend? venom8lss is offline   Reply With Quote
global_05_local_4_shard_00000656_processed.jsonl/73639
Sproxy FAQ What Is It? ^ Sproxy is the Siege PROXY server. It is designed to harvest URLs into a file that can be read by siege. To create a siege urls.txt file, just configure your browser to use sproxy then browse the website you want to test. How Does It Work? ^ Sproxy is the Siege PROXY server. This program is a perl daemon that sits between your browser and a web server. After you start the sproxy server, you configure your browser to use it as a proxy. With sproxy as your proxy, all you need to do is click on the URLs you want to siege. Sproxy will harvest the URL along with all the page elements, style sheets, images, javascript, etc. BE CAREFUL. Sproxy will harvest external elements as well. Before you feed the URL list to siege, make sure you edit it. You don’t want to siege your partners. Does Sproxy Work With HTTPS? ^ Unfortunately, no. In order to support HTTPS, sproxy needs to establish a secure tunnel between itself and the web server. Thus far, we haven’t had the need to incorporate this feature. If you hack HTTPS support, please send us the code and we’ll get it into the base. Posted in | 8 Comments 8 Responses to “Sproxy FAQ” 1. M Nair says: Great product ! My question is how do you configure the browser to use the sproxy when its running locally ? Thanks • Jeff Fulmer says: When sproxy comes up, it should tell you which host it’s bound to. That will either be the hostname or localhost. If no hostname is mentioned, that means its set to “any”. In that case, you should be able to use localhost. NOTE: At some point I’ll delete these comments and make this part of the FAQ. 2. m nair says: Thanks for reply. But I am still confused … Lets say my apache server runs on localhost port 80. I will run >sproxy localhost…. Now I open up the browser and go to http://localhost and I see the apache home page. How would I route the http get through from browser through the sproxy ? are you saying I select ‘sproxy’ and port 9001 in the PROXY tab in browser before I access the site? • Jeff Fulmer says: You have to configure your browser to use sproxy as your PROXY server. On Chrome, for example, it’s Wrench => Preferences => Under the hood => Change Proxy Settings… 3. M Nair says: 4. M Nair says: I started my sproxy on my mac as follows listening on default port to my local host ( GC-MNAIR-ML1:Documents mnair$ sproxy SPROXY v1.02 listening on port 9001 …appending HTTP requests to: /Users/mnair/urls.txt …default connection timeout: 120 seconds In Chrome I change my web proxy(http) setting to SPROXY PORT 9001. Then I go to Chrome and try and i get this proxy connection error. Unable to connect to the proxy server Here are some suggestions: If you use a proxy server, check your proxy settings or contact your network administrator to make sure the proxy server is working. If you don’t believe you should be using a proxy server, adjust your proxy settings: Go to Applications > System Preferences > Network > Advanced > Proxies and deselect any proxies that have been selected. Error 130 (net::ERR_PROXY_CONNECTION_FAILED): Proxy server connection failed. 5. Ovidiu says: First of, you’ve done a great job with Sproxy. Thanks for this software. We have added some patches to it in order to fix some issues ( get rid of dead children, setting custom output file, set the process run as a daemon – we needed that for our work ). If you feel the code is right ( I’m still a beginner in Perl ) maybe you will add these patches in upcoming releases. If you need the patches in another format, just contact me. # diff -u src/sproxy.in.orig src/sproxy.in — src/sproxy.in.orig 2012-07-12 23:42:41.000000000 -0700 +++ src/sproxy.in 2012-07-13 00:15:51.000000000 -0700 @@ -13,14 +13,14 @@ use JoeDog::Config; use Getopt::Std; use FileHandle; -use vars qw($opt_V $opt_v $opt_f $opt_h $opt_p $opt_o $opt_t); +use vars qw($opt_V $opt_v $opt_f $opt_h $opt_p $opt_o $opt_t $opt_P); use vars qw($VERSION $PROGRAM $DATE); use strict; $VERSION = ‘%_VERSION%’; $PROGRAM = ‘%_PROGRAM%’; $DATE = ‘%_DATE%’; my($ua, $conf, %conf, $port, $host); @@ -40,17 +40,30 @@ $ua->timeout(($conf{‘timeout’} eq int($conf{‘timeout’}))?$conf{‘timeout’}:120); + my $pid = fork; + defined ($pid) or die “Sproxy daemon running…..[ FAILED ]\n$!\n”; + if ($pid){ + print “Started Sproxy daemon. ( $pid )\n”; + open (PID, “>”.$conf{‘pid’} ) or die “Can’t open PID file “.$conf{‘pid’}.” : $! \n”; + print PID “$pid”; + close ( PID ); + exit 0; + } + $SIG{CHLD} = ‘IGNORE’; my $port = ($conf{‘port’} eq int($conf{‘port’}))?$conf{‘port’}:9001; my $parent = new HTTP::Daemon( LocalAddr => $conf{‘host’}, LocalPort => $port, - ); + ReuseAddr => 1 ) or die “ERROR! Couldn’t start Sproxy service: $!\n”; my $child; my $FILE = open_file(); printf(“%s v%s listening on port %d\n”, uc($PROGRAM), $VERSION, $port); - printf(“…appending HTTP requests to: %s\n”, $conf{‘file’}); + printf(“…appending HTTP requests to: %s\n”, $conf{‘output’}); printf(“…default connection timeout: %s seconds\n”, $conf{‘timeout’}); while($child = $parent->accept){ connection_handler($FILE, $child); @@ -63,6 +76,7 @@ my $file = $ENV{‘HOME’} . “/urls.txt”; + my $pid_file = $ENV{‘HOME’} . “/sproxy.pid”; $conf = new JoeDog::Config($opt_f); @@ -74,7 +88,8 @@ %conf = $conf->getHash(“=”); $conf{‘host’} = ($ARGV[0])?$ARGV[0]:(($conf{‘host’})?$conf{‘host’}:”localhost”); $conf{‘port’} = ($opt_p)?$opt_p:(($conf{‘port’})?$conf{‘port’}:9001); - $conf{‘file’} = ($opt_o)?$opt_o:(($conf{‘file’})?$conf{‘file’}:$file); + $conf{‘output’} = ($opt_o)?$opt_o:(($conf{‘output’})?$conf{‘output’}:$file); + $conf{‘pid’} = ($opt_o)?$opt_P:(($conf{‘pid’})?$conf{‘pid’}:$pid_file); $conf{‘timeout’} = ($opt_t)?$opt_t:(($conf{‘timeout’})?$conf{‘timeout’}:120); $conf{‘verbose’} = ($opt_v)?”true”:(($conf{‘verbose’})?$conf{‘verbose’}:”false”); @@ -137,10 +152,10 @@ my $FILE; $FILE = new FileHandle(); - if($FILE->open(“>>”.$conf{‘file’})){ + if($FILE->open(“>>”.$conf{‘output’})){ flock($FILE, $LOCK_EX); } else { - die $PROGRAM.” error: cannot open “.$conf{‘file’}; + die $PROGRAM.” error: cannot open “.$conf{‘output’}; return $FILE; # diff -u doc/sproxy.conf.in.orig doc/sproxy.conf.in — doc/sproxy.conf.in.orig 2012-07-13 01:32:22.000000000 -0700 +++ doc/sproxy.conf.in 2012-07-13 00:12:22.000000000 -0700 @@ -48,3 +48,12 @@ # timeout = 90 # timeout = +# this directive tells %_PROGRAM% to write daemon pid +# to this alternative file. The default +# file is $HOME/sproxy.pid You may also specify an +# alternative pid file with the -P option on the +# command line. +# example: pid = /var/run/sproxy.pid +# pid = # diff -u doc/sproxy.1.in.orig doc/sproxy.1.in — doc/sproxy.1.in.orig 2012-07-13 01:33:43.000000000 -0700 +++ doc/sproxy.1.in 2012-07-13 01:37:46.000000000 -0700 @@ -48,6 +48,9 @@ \fB\-o FILE\fR OUTPUT FILE, change the default output file from $HOME/urls.txt to FILE. This is the siege-friendly file of URLs. +\fB\-P PID FILE\fR +PID FILE, change the default pid file from $HOME/sproxy.pid to PID FILE. If %_PROGRAM% is invoked without a hostname, it will bind to the address given by the “host = ” directive in the %_PROGRAM%.conf file. If a host directive is not present in that file, then %_PROGRAM% will bind to localhost. To use %_PROGRAM% to create a urls.txt file, configure your web browser to use a proxy server at the address and port that %_PROGRAM% is listening for requests. Also created a init/start-up script for this (tested only on CentOS): # cat /etc/init.d/sproxy # Sproxy as daemon # chkconfig: 2345 99 10 # processname: sproxy # Source function library. . /etc/rc.d/init.d/functions # Source networking configuration. . /etc/sysconfig/network PID=$( cat $PID_FILE 2>/dev/null) status -p $PID_FILE >/dev/null 2>&1 conf_check() { [ -x $PROG_BIN ] || exit 5 start() { [ "$EUID" != "0" ] && exit 4 # Check that networking is up. [ ${NETWORKING} = "no" ] && exit 1 # Start daemons. echo -n $”Starting Sproxy daemon: ” $PROG_BIN 2>/dev/null 1>&2 if [ $RETVAL -eq 0 ]; then failure $”$PROG_BIN start” return $RETVAL stop() { # Stop daemons. echo -n $”Shutting down Sproxy daemon: ” kill $PID [ $RETVAL -eq 0 ] && rm -f $PID_FILE return $RETVAL # See how we were called. case “$1″ in if [ $running -eq 0 ]; then echo “Script already running ($PID) !” exit 0 [ $running -eq 0 ] || exit 0 && failure status -p $PID_FILE [ $running -eq 0 ] || exit 0 exit 2 exit $? 6. Magentron says: Hi Jeff, Thanks for your great tools. I have a small patch which allows to not follow redirects inside sproxy. If you’re interested, please contact me. Thanks. Leave a Reply
global_05_local_4_shard_00000656_processed.jsonl/73645
Mark Andrew owes Minneapolis American Indian community an apology Share this: October 19, 2013 By: Peggy Flanagan Peggy Flanagan I've spent the majority of my career working to increase civic engagement in Native American communities. I believe in this work passionately and see it as a significant part of my vocation. That's why my heart was overflowing due to the incredible turnout of hundreds of members of our community to the Minneapolis American Indian Mayoral Forum sponsored by the Native American Community Development Institute on October 17th. Unfortunately, much of that joy was overshadowed by the fact that Minneapolis mayoral candidate Mark Andrew didn't attend the forum. He promised he'd be there -weeks before- and then cancelled at the last minute and sent staffers instead. We asked his staff where he was and they could not tell us. We have waited for an explanation from Mark Andrew. We have heard nothing. Tragically, the American Indian community is used to broken promises by politicians. My hope was that this forum would provide an opportunity for all candidates to engage in an honest, open and direct dialogue with our community. Mark Andrew's absence felt like political "business as usual" and only serves to exacerbate the distrust between Native people and local government. In politics and in life, actions speak louder than words. Mark Andrew's absence from the first ever Minneapolis American Indian Mayoral Forum speaks volumes. The American Indian community deserves an apology and an explanation from Mark Andrew. Peggy Flanagan Member, White Earth Nation of Ojibwe Former Director, Minneapolis Public Schools Board of Education
global_05_local_4_shard_00000656_processed.jsonl/73646
G. Christou Regional Editor, Polyhedron Dept. of Chemistry, University of Florida, PO Box 117200, Gainesville, FL 32611-7200, Florida, USA Send an email to G. Christou To send an email to G. Christou please complete the short form below. Please note that all enquiries should relate specifically to Polyhedron. All the fields are required so please make sure you complete them all otherwise we won't be able to send your message. Your First Name Your Last Name Your Email Confirm Your Email Message Subject Your Message Upload File (max. 2 MB) Share this page: Email a Friend Your Name Your Email Friend's Name Friend's Email
global_05_local_4_shard_00000656_processed.jsonl/73722
Kiss Me Deadly Join the deadlies for news and deals! Your basket: empty Sign In Your Account The Kitten Club Kiss Me Deadly are proud to sponsor The Kitten Club and their Burlesque Cabaret shows. You can regularly see them perform in our lingerie and Cervin seamed stockings at a number of West End and Central London venues, including the New Players Theatre and the Volupte Lounge. The Kitten Club are an amazing troupe of four women, headed by the formidable Delores Deluxe, each with their own acting and performance background and skills. We love them because they have more in common with original British Burlesque; satire, skit and parody, with cultural references to everything from mental health to the monetary system. Join The Kitten Club Burlesque Cabaret for a glamorous night of song, dance, satire, comedy, magic and more (or less as the case may be – miaow!). Visit their website for future performances!
global_05_local_4_shard_00000656_processed.jsonl/73754
• Service: Audit • Type: Business and industry issue • Date: 9/9/2011 Integrated Reporting  Volatile markets and a lack of trust between businesses and investors are complicating factors when it comes to raising capital. In a discussion paper, KPMG demonstrates how integrated reporting also involves regulatory, environmental and social aspects and why this can help to reduce the costs of capital procurement. Download Now PDF files require Adobe Reader to view The discussion paper is based on the proposals of the International Integrated Reporting Committee (IIRC), whose members include leading companies, authorities and NGOs from all over the world. Reading and understanding annual reports rollup image
global_05_local_4_shard_00000656_processed.jsonl/73769
Mouse cell transplants for Huntington’s patients February 12, 2002 | Source: New Scientist There are theoretical concerns that potentially deadly viruses from the donor animal cells could be passed to the human recipients. Other groups of researchers are transplanting fetal tissue into the brains of Huntington’s patients. In theory, an unlimited number of cells for treatment could be generated from the mouse, and from the human, stem cell lines. At the moment, ReNeuron’s human line is too genetically unstable, with unpredictable chromosomal abnormalities appearing as the cells repeatedly divide.
global_05_local_4_shard_00000656_processed.jsonl/73783
Bezel Setting From Antique Jewelry University Jump to: navigation, search A bezel setting is one where a ring or rim of metal, perpendicular to the surface of the item, surrounding the girdle of a stone, is used to hold the stone in place. Also know as a collet setting. Lang Antiques Lang Antiques
global_05_local_4_shard_00000656_processed.jsonl/73799
News Center Prenatal DNA Sequencing Publication Date:  April 23, 2013 MIT Technology Review Antonio Regalado Professor Hank Greely spoke with Antonio Regalado from MIT Technology Review about whole-genome sequencing and why he believes it could open "Pandora's box. Earlier this year Illumina, the maker of the world’s most widely used DNA sequencing machines, agreed to pay nearly half a billion dollars for Verinata, a startup in Redwood City, California, that has hardly any revenues. What Verinata does have is technology that can do something as ethically fraught as it is inevitable: sequence the DNA of a human fetus before birth. Verinata is one of four U.S. companies already involved in a rapidly expanding market for prenatal DNA testing using Illumina’s sequencers. Their existing tests, all launched in the last 18 months, can detect Down syndrome from traces of fetal DNA found in a syringeful of the mother’s blood. Until now, detecting Down syndrome has meant grabbing fetal cells from the placenta or the amniotic fluid, procedures that carry a small risk of miscarriage. The problem is that having more information about a fetus’s traits could present doctors and parents with a deluge of information they aren’t able to understand or act on. And if they do act, that could be controversial, too. “Whole-genome sequencing could open Pandora’s box,” says Henry Greely, a law professor who studies bioethics at Stanford. “You’d have the whole sequence, so you might be able to look for straight nose, curly hair. How many parents are going to abort a fetus because of male pattern baldness? I don’t think many. But it’s probably more than zero.” Greely says that because fetal DNA is detectable in the bloodstream so early in pregnancy—as early as six or eight weeks—the pregnancy could be ended relatively easily.
global_05_local_4_shard_00000656_processed.jsonl/73803
Web Google Home | Site Map | Tell a friends Journal of Management Management Tutorials Computer Science OS - Linux and Unix Source Code Script & Languages About Us Contact Us Sign up for our Email Newsletter Get Paid for Your Tech Turorials / Tips Home > Tutorial > Cache Mapping and Associativity Cache Mapping and Associativity Cache Mapping and Associativity A very important factor in determining the effectiveness of the level 2 cache relates to how the cache is mapped to the system memory. What this means in brief is that there are many different ways to allocate the storage in our cache to the memory addresses it serves. Let's take as an example a system with 512 KB of L2 cache and 64 MB of main memory. The burning question is: how do we decide how to divvy up the 16,384 address lines in our cache amongst the "huge" 64 MB of memory? There are three different ways that this mapping can generally be done. The choice of mapping technique is so critical to the design that the cache is often named after this choice: Direct Mapped Cache: The simplest way to allocate the cache to the system memory is to determine how many cache lines there are (16,384 in our example) and just chop the system memory into the same number of chunks. Then each chunk gets the use of one cache line. This is called direct mapping. So if we have 64 MB of main memory addresses, each cache line would be shared by 4,096 memory addresses (64 M divided by 16 K). Fully Associative Cache: Instead of hard-allocating cache lines to particular memory locations, it is possible to design the cache so that any line can store the contents of any memory location. This is called fully associative mapping. N-Way Set Associative Cache: "N" here is a number, typically 2, 4, 8 etc. This is a compromise between the direct mapped and fully associative designs. In this case the cache is broken into sets where each set contains "N" cache lines, let's say 4. Then, each memory address is assigned a set, and can be cached in any one of those 4 locations within the set that it is assigned to. In other words, within each set the cache is associative, and thus the name. This design means that there are "N" possible places that a given memory location may be in the cache. The tradeoff is that there are "N" times as many memory locations competing for the same "N" lines in the set. Let's suppose in our example that we are using a 4-way set associative cache. So instead of a single block of 16,384 lines, we have 4,096 sets with 4 lines in each. Each of these sets is shared by 16,384 memory addresses (64 M divided by 4 K) instead of 4,096 addresses as in the case of the direct mapped cache. So there is more to share (4 lines instead of 1) but more addresses sharing it (16,384 instead of 4,096). Conceptually, the direct mapped and fully associative caches are just "special cases" of the N-way set associative cache. You can set "N" to 1 to make a "1-way" set associative cache. If you do this, then there is only one line per set, which is the same as a direct mapped cache because each memory address is back to pointing to only one possible cache location. On the other hand, suppose you make "N" really large; say, you set "N" to be equal to the number of lines in the cache (16,384 in our example). If you do this, then you only have one set, containing all of the cache lines, and every memory location points to that huge set. This means that any memory address can be in any line, and you are back to a fully associative cache. Comparison of Cache Mapping Techniques There is a critical tradeoff in cache performance that has led to the creation of the various cache mapping techniques described in the previous section. In order for the cache to have good performance you want to maximize both of the following: Hit Ratio: You want to increase as much as possible the likelihood of the cache containing the memory addresses that the processor wants. Otherwise, you lose much of the benefit of caching because there will be too many misses. Search Speed: You want to be able to determine as quickly as possible if you have scored a hit in the cache. Otherwise, you lose a small amount of time on every access, hit or miss, while you search the cache. Now let's look at the three cache types and see how they fare: Direct Mapped Cache: The direct mapped cache is the simplest form of cache and the easiest to check for a hit. Since there is only one possible place that any memory location can be cached, there is nothing to search; the line either contains the memory information we are looking for, or it doesn't. Unfortunately, the direct mapped cache also has the worst performance, because again there is only one place that any address can be stored. Let's look again at our 512 KB level 2 cache and 64 MB of system memory. As you recall this cache has 16,384 lines (assuming 32-byte cache lines) and so each one is shared by 4,096 memory addresses. In the absolute worst case, imagine that the processor needs 2 different addresses (call them X and Y) that both map to the same cache line, in alternating sequence (X, Y, X, Y). This could happen in a small loop if you were unlucky. The processor will load X from memory and store it in cache. Then it will look in the cache for Y, but Y uses the same cache line as X, so it won't be there. So Y is loaded from memory, and stored in the cache for future use. But then the processor requests X, and looks in the cache only to find Y. This conflict repeats over and over. The net result is that the hit ratio here is 0%. This is a worst case scenario, but in general the performance is worst for this type of mapping. Fully Associative Cache: The fully associative cache has the best hit ratio because any line in the cache can hold any address that needs to be cached. This means the problem seen in the direct mapped cache disappears, because there is no dedicated single line that an address must use. However (you knew it was coming), this cache suffers from problems involving searching the cache. If a given address can be stored in any of 16,384 lines, how do you know where it is? Even with specialized hardware to do the searching, a performance penalty is incurred. And this penalty occurs for all accesses to memory, whether a cache hit occurs or not, because it is part of searching the cache to determine a hit. In addition, more logic must be added to determine which of the various lines to use when a new entry must be added (usually some form of a "least recently used" algorithm is employed to decide which cache line to use next). All this overhead adds cost, complexity and execution time. N-Way Set Associative Cache: The set associative cache is a good compromise between the direct mapped and set associative caches. Let's consider the 4-way set associative cache. Here, each address can be cached in any of 4 places. This means that in the example described in the direct mapped cache description above, where we accessed alternately two addresses that map to the same cache line, they would now map to the same cache set instead. This set has 4 lines in it, so one could hold X and another could hold Y. This raises the hit ratio from 0% to near 100%! Again an extreme example, of course. As for searching, since the set only has 4 lines to examine this is not very complicated to deal with, although it does have to do this small search, and it also requires additional circuitry to decide which cache line to use when saving a fresh read from memory. Again, some form of LRU (least recently used) algorithm is typically used. Here's a summary table of the different cache mapping techniques and their relative performance: Cache Type Hit Ratio Search Speed Direct Mapped Good Fully Associative Best Moderate N-Way Set Associative Very Good, Better as N Increases Good, Worse as N Increases
global_05_local_4_shard_00000656_processed.jsonl/73811
Event: All Other Signs of Spring Date of Sighting: 04/30/2013 Latitude: 37.1336 Longitude: -91.7055 Town: Summersville State/Province: MO Country: After playing in the yard with my girls, I found two ticks crawling on my leg. It didn't have a white spot on it's back so it wasn't a deer tick. About the Observer Name: Shauna P Teacher's Name: City: Summersville   School:   State/Province: MO   Grade:   Contact the Observer: email this observer Journey North Home Page   Facebook Pinterest Twitter   Annenberg Media Home Page
global_05_local_4_shard_00000656_processed.jsonl/73834
Illinois Newspaper Project bullet Project Staff bullet History of the INP bullet History of Illinois Newspapers Our Work bullet Identify Newspapers bullet Catalog Newspapers bullet Microfilm Newspapers bullet Digitize Newspapers bullet INP Database Newspaper titles we've found throughout Illinois. bullet Participant Locator Places we've visited along the way. bullet Gallery A sampling of some treasures we've discovered. Can you Help? bullet Donate Your Papers Have rare papers you want to donate? Search this site: INP Database Search Results  Back to Results  ¦  New Database Search Printable View oclc no. 54067543 Published in: South Bend, IN (Saint Joseph County) Years Published: 1899 - 1uuu Subject: SWEA Where we found this title: bulletSwenson Swedish Immigration Research Center (Augustana College) Holdings: <1899:11:39-12:27> <1900:1:17>
global_05_local_4_shard_00000656_processed.jsonl/73852
          Home News Software Applications Mixing Proprietary Software and Linux Mixing Proprietary Software and Linux Article Source LinuxPlanet There are also users (such as myself) who want to know that the applications we use are running code that is not locked in by any one company. This gives us freedom of choice. Where things tend to go wrong, however, is that we do not live in a world where Open Source software and mainstream needs are always on the same page. No matter how much I might wish that everything could just be Open Source, sometimes the issue is a bit more complicated than it seems on the surface... Read More Subscribe to Comments Feed Who we are ? More About the foundation... Frequent Questions Join / Linux Training / Board
global_05_local_4_shard_00000656_processed.jsonl/73854
Building virtual appliances with VMware Studio and SUSE Studio Appliance Builder © Peter Galbraith, Fotolia © Peter Galbraith, Fotolia Article from Issue 98/2009 Appliances are electronic gadgets placed in a server room to do one specific job. In the IT space, hardware-based appliances index documents, provide firewall security, and serve as content management systems. These hardware appliances are easy to deploy and configure, but they still take up space. If you're worried about the complications of adding more iron to your rack, you might be looking for something a little more virtual. A virtual appliance is a virtual machine (VM) that includes a minimal operating system with only the most essential applications – typically centered around a custom tool designed for a specific business need. Virtual appliances can do almost anything a hardware appliance can do. Virtual appliances are deployed as intrusion detection devices, honeypots, firewalls, mail servers, DNS servers, CMS appliances, and much more. A virtual appliance has all the advantages of other virtual systems – easy deployment, lower utility cost, minimal hardware expense – and it even offers some advantages over conventional virtual systems, such as a smaller OS footprint and reduced memory requirements. Virtual appliances also provide some security benefits: because the system is pared to absolutely minimal functionality, fewer ports are open to intruders. Many virtual appliances get by with only a single dedicated service plus sshd for administrative access. Dozens of pre-built, ready-to-use virtual appliances are available on the Internet (see a list of sites in the Info box at the end of the article), but you'll find that most virtual appliances are of the VMware variety. Although other virtualization technologies are perfectly capable of running appliances, the alternatives don't have the broad support VMware's products enjoy. As Xen, Sun's xVM, and KVM gain wider acceptance, appliance support for these technologies will grow as well. A VMware-based appliance is run in VMware's free VMware Server or VMware Player. To use appliances with ESX or ESXi, you'll need to convert them to OVF format using the VMware Converter tool. Most of the appliances you find on the Internet are ready to go to work with very little customization, and many are web-enabled for easy management. If you can't find what you're looking for online, you might want to build your own virtual appliance. Built-from-scratch appliances offer one thing you can't get from a pre-built appliance: complete creative control. A number of options exist for creating home-grown virtual appliances. Of course, you could start with a full Linux distro and remove the tools and services you don't need. However, if you prefer a simpler and more structured approach, a number of tools have appeared recently for the purpose of creating virtual appliances. Two of the best known and most developed applications are VMware Studio and SUSE Studio. These tools perform a similar function, but they take very different approaches. VMware Studio is an appliance used exclusively for creating other appliances. SUSE Studio, on the other hand, is a 100 percent web-based solution. Automated tools such as VMware Studio and SUSE studio are not intended for building fully customized and localized appliances. The idea is to create an extremely minimal system with only the services you need. Once this system is created, you can adapt the configuration as necessary and roll out one or many instances of the finish version. In this article, I will explain how to start building a virtual appliance in VMware Studio or SUSE studio. VMware Studio Features VMware supports features such as: • Web console with appliance templates • Virtual appliance customization and build engine • Patch repository creation and publication • Build process automation with a command-line interface • Open Virtualization Format (OVF) support for VMware ESX and ESXi • Integration with the VMware infrastructure • Integration with third-party management software VMware Studio As I mentioned earlier, VMware Studio is itself a virtual appliance that you can use to create other virtual appliances. To use it, you'll need access to a VMware Server host or VMware Player. First, download VMware Studio 1.0 from the VMware website [1], then unzip the VMware Studio virtual machine and start it in VMware Server or VMware Player. Once the system is fully booted, VMware Studio provides a URL to use for the web-based appliance console (see Figure 1). From the VMware Studio console, log in to use the command-line interface, configure your network settings, and set your time zone. To get started, open a browser and point it to the URL provided on the VMware Studio startup screen (e.g., Now log in as root, using the password you created on first boot of the VMware Studio VM. Once you are logged in to VMware Studio, you'll see the appliances you have created in previous sessions. To begin creating a virtual appliance, click the Create Appliance button under Actions on the right-hand side of the screen. The Create New Appliance wizard screen now appears (Figure 2). First enter a unique appliance profile name for the new appliance and select an operating system template from the list. For this demonstration, use web_database for the profile name and Centos 5.2 for the template. Note: To use any of the listed operating system templates, you must download the ISO images from the vendor sites and place them in the VMware Studio directory /opt/vmware/www/ISV/ISO. To continue, click the Create New Appliance button. The pages that follow provide customization prompts that you can use to configure your appliance. The first page (shown in Figure 3) allows you to name and set the version number, vendor name, and description of the appliance. Additionally, enter your EULA (if any), Welcome text, logo and related information, boot scripts, and SSL certificate information. Select the Hardware tab to edit the number of CPUs (1 or 2), RAM (MB), number of network adapters, disk names and sizes, partitions, mount points, filesystem types, and swap space. Also, you can add additional virtual disks. The OS tab provides a location for your chosen operating system, the root password for the new appliance, and any pre-install and post-install scripts you want to run. On this page, you can also add other users. The Application tab allows you to select additional application package repositories and add or remove software packages to your appliance. By default, this appliance includes libcurl3, libglib2.0-0, libpcre3, librpm4.4, openssh-server, and openssl. To add new packages, enter the package name in the Additional Packages field and click the Add button. The Output tab prompts you for a name and distribution format (OVF or ZIP) for your appliance. If you're going to maintain updates for your appliance, use the Update Repository area to provide information to your appliance users. Once you complete all configuration settings for your appliance, click the Validate button to check your profile for errors. You'll receive a dialog box notifying you of errors, if any. If your profile is correct, your message reports: Profile Validation Passed. When validating an appliance configuration, you might receive a successful validation but still get an error such as openssl-0.9.7 not found. To remedy this error, create the following symbolic links on the host machine and try your validation again. ln -s /usr/bin/libcrypto.so /usr/bin/libcrypto.so.0.9.7 ln -s /usr/bin/libssl.so /usr/bin/libssl.so.0.9.7 Use these two links on your VMware host regardless of the actual version of OpenSSL you are running. To finish your creation, you have to apply remedies to any errors that the validation process finds and continue to run the validation process until the appliance configuration is free of errors. When your profile validation comes back clean, click the Save and Build buttons. Finally, click the Build Appliance button when prompted with the Build Summary. While the build is in progress, the build log and live status display on the screen. When the build is complete, your appliance is ready for download and deployment in the format you chose (OVF or ZIP). SUSE Studio SUSE Studio, which is still in alpha development and not publicly available as of this writing, is a 100 percent web-based appliance creation studio [2]. The web interface works in Firefox and Safari, but not Internet Explorer. SUSE Studio appliances use an openSUSE 11.0 JeOS (Just Enough OS) template. From that basic template, you can choose one of the following generic appliance types: Text Only, Minimal X, KDE 3, KDE 4, or GNOME. For this demonstration, I'm using the Text Only template, which is intended for systems with no graphic user interface. Text Only appliances typically serve as small server systems that require very little user interaction. To create a new virtual appliance with SUSE Studio, you must log in at http://www.susestudio.com. After login, SUSE Studio presents you with the options page, as shown in Figure 4. Select the Text Only option, and, on the Start page, name your appliance. Clicking the Software tab takes you to the Software screen (Figure 5), where you will add software packages to your appliance to customize it. In this case, the sample appliance will be a web database, so I need Apache, MySQL, PHP, and Perl. To add a package, either select a software group or type the name into the Quick Add field and then choose Add. This is the fastest method if you know the package name. Once you've added all the software you want, click the Configuration tab. This tab contains the main settings area for your appliance, with several configuration subcategories: General, Startup, Server, Desktop, Storage & memory, and Personalize. The General subcategory prompts you to set the default locale (language), keyboard layout, region, time zone, network settings (including Firewall), and any additional users and groups. Startup sets your default run level (1,2,3, or 5). The Server section is for specific settings related to any configurable server packages that you chose in the Software tab. (MySQL database configuration is one example of a server configuration you can accomplish through the Software tab.) Desktop allows you to set an automatic login with a particular user account and add any programs that launch at startup. The Storage & memory subcategory is where you set up RAM (MB), virtual disk size (GB), and swap partition size (MB). With the Personalize subcategory, you can upload or choose a logo and a background for your appliance. Select the Files tab to add custom files to your appliance. When you're ready to create your appliance, select the Build and choose the type of image you want to generate: a hard disk or USB stick (the Disk image option), a Live CD/DVD image, or a VMware image (.vmdk and .vmx). It is a good idea to use the versioning system. For example, enter 1.0. Figure 6 shows the VMware virtual machine image I created. The new image created in this demo is 603MB, which is compressed to a more download-efficient size of 212MB. Click the Build button to build the appliance. Depending on your choices, the build might take from a few to several minutes. Once the build is finished, an Action button appears with the following options: Download, View log, Testdrive, File browser, and Remove. The Testdrive option is a SUSE Studio bonus for appliance troubleshooting. Selecting this option boots your appliance and allows you to work with it for 30 minutes. Testdrive lets you see whether your appliance performs as you expect before committing to a completed image. After your new appliance build is complete, you can download, untar, deploy, and start the new VM in either VMware Server or VMware Player. Virtual appliances are the latest buzz in the virtualization world. The small footprint and single-purpose orientation makes them easy to deploy and maintain in any virtual data center. Between the two appliance studio applications reviewed in this article, I prefer SUSE Studio over VMware's virtual appliance because of its completely web-based architecture, ease of use, and speed. The Testdrive is an excellent add-on because it saves time on appliance creation, download, deployment, and testing. Currently, SUSE Studio only supports appliances that run in VMware Server or Player, but in the future, you'll have the choice of saving your appliances in a variety of formats, including Microsoft's Hyper-V, VMware, OVF, Xen, and Amazon EC2. 1. VMware Studio: http://www.vmware.com/download/va_authoring 2. SUSE Studio: http://www.susestudio.com 3. VMware's Appliance Marketplace: http://www.vmware.com/appliances 4. ThoughtPolice VMware Images: http://www.thoughtpolice.co.uk 5. JumpBox VMware Appliances: http://www.jumpbox.com 6. Enterprise Virtual Appliances: http://virtualappliances.net The Author Ken is a freelance technical writer and journalist. He covers a variety of open source topics, including Linux, databases, and virtualization. You can reach him via his website at http://www.kenhess.com. Buy this article as PDF Express-Checkout as PDF Price $2.95 (incl. VAT) Buy Linux Magazine Get it on Google Play US / Canada Get it on Google Play UK / Australia Related content comments powered by Disqus Direct Download Read full article as PDF: 032-036_vm-appliance.pdf  (500.11 kB)