id
stringlengths
50
55
text
stringlengths
54
694k
global_01_local_0_shard_00002368_processed.jsonl/63737
tag:blogger.com,1999:blog-3835710600053310624.post3173735914616545536..comments2019-12-10T01:30:32.359-08:00Comments on WELCOME TO MY MONEY MISSION ONLINE: MOVE OVER FACEBOOK!!A.Mariehttp://www.blogger.com/profile/[email protected]:blogger.com,1999:blog-3835710600053310624.post-26694841735761730542013-08-02T16:01:13.194-07:002013-08-02T16:01:13.194-07:00Welcome back! I know what you mean about FB, thoug...Welcome back! I know what you mean about FB, though I hide most/all of the drama people! I used to delete them, but then figured it was better to hide them because then maybe I would be a good influence on them. However, in reality, they've probably hidden me, too! That's okay, too, of course. Lorihttps://www.blogger.com/profile/[email protected]
global_01_local_0_shard_00002368_processed.jsonl/63753
Horror & Dark Fantasy Author Spotlight: David Sklar Tell us a little bit about “Rules for Killing Monsters.” What inspired you to write it? A lot of things went into this story, but the main thing was reading a news article about transgender teens using online games to explore gender identity. At the time, I’d recently written a story in which a man takes on a female identity online for practical purposes so he could post things he perceived as “girly” without attracting attention. But it hadn’t occurred to me that an online gender swap could be such a powerful tool of self-discovery. So I wanted to explore that. There was also an article I read, around the same time, about a transwoman who was fatally beaten by a stranger who found out she was transgender. And that’s something that happens far too often. I’ve written stories that explore gender identity before, but none that look quite so hard into the brutality and the hostility with which society sometimes treats people when they don’t fit the expected gender roles. And then the third big piece was how videogames deal with death. Where it’s something you can come back from because you’ve invested time in this character, but there’s always some kind of journey or a cost. It was fun to write my own way back from the nether realms. The main character experiences a revelation about her own identity by way of playing a game. Do you think games have a special ability (or perhaps potential) to facilitate self-understanding? Are there any games you find particularly effective in that regard? I really want the answer to be tabletop roleplaying games, like Changeling or D&D. But really, the times when a game has taught me something surprising about myself or my friends, it’s usually been a cheesier sort of game such as Loaded Questions, or that exercise where you imagine yourself walking in the woods and answer questions like, “You see a cup on the ground. Describe it.” Roleplaying games like D&D answer a deep-seated need for stories, which is something different but also vital. Of course, as I mentioned earlier, there are true stories about transgender people discovering or coming to terms with their gender identities through online games, where it’s safe to be whoever you want to be. I read recently that Robin Williams loved playing World of Warcraft. That really surprised me because he had this long and amazing career without ever making a movie that glorified violence, but it makes sense for the same reason it makes sense for transgender teens because, if you’re Robin Williams, where are you going to go that no one will recognize you? I’ve also read of people with autism spectrum disorders using online games to work through social issues. The debate over whether supernatural monsters or humans are the scarier villains is a long-standing one in horror, and one that “Rules for Killing Monsters” touches on. Where do you fall? That’s a tough one. The easy answer is that monsters are scary because you don’t understand them, while humans are scary because you do. I mean, if I’ve done my job in “Rules,” then when Ursula goes off, you understand why, and there should be a part of you wanting her to kick ass. But I think the reverse is also true, that sometimes monsters are scariest when you can relate, and humans are most frightening when you can’t. One time I was staying with a friend in an upstairs apartment in a two-family house, and the landlady called in the middle of the night to rage at me that the boards were creaking when I walked. And she was furious about this, and distraught, and she would not listen to anything I said, but just kept going back to how I needed to make it stop. And I was terrified to go back to sleep, knowing that there was someone I did not know, right below me, who might have a key, who might have a gun, and who might fly into a psychotic rage because I’d gotten up to use the bathroom, and there was nothing I could do about it. That’s also what’s going on with Ursula’s tormenters in the story, that they see someone who is beyond their understanding, whose wants and needs aren’t the same as theirs, and it terrifies them. Though I think in this case they’re less afraid that she’ll do something to them, and more afraid that they might find her in themselves if they look too deep. By the same token, when a monster is inhuman, it becomes much more compelling if the writer can give you a window into the creature’s mind; let you see, without anthropomorphizing, what the creature feels, what it wants, and so on. What are you working on lately? Any upcoming publications you’d like to let readers know about? At the moment, I’m working on a science fiction sitcom. I’ve got a few actors and a small camera crew, and a budget of, uh, nothing. And I’m having a lot of fun. You know, there’s a lot of pressure on writers of science fiction and fantasy to respect the value of your own work, and not to send it to places that won’t pay you or presses that take it on spec. And it’s a good thing that writers are standing up for themselves, but I was surprised when some truly talented actors and videographers and other people were willing to come in and help me and make this thing happen without any assurance of being paid for their time. And now I’m working on a way to get from a couple of days of brilliant unpaid work to something that will be larger and more rewarding for everyone involved. I’d like to say more about the project itself, but at the moment there’s a major TV network that has an exclusive look. By the time this interview is published, I hope to be able to talk about this show and where you can go to help make it happen, whether it’s associated with a major network or with an Indiegogo campaign or making the rounds of smaller networks. Best kind of unquiet dead: Liches, ghouls, or zombies? Can I go with plain old ghosts? I love the idea of a spirit being trapped behind by unfinished business. And sometimes the self gets washed away, and all that is left is the effort to finish the task. There’s a lot you can do with that. I once wrote a one-sentence ghost story, that I’m still very proud of, in Safety Pin Review. Lisa Nohealani Morton Lisa Nohealani Morton
global_01_local_0_shard_00002368_processed.jsonl/63785
SEO important short notes for interview SEO become gain momentum these days, Every SEO job aspirant should know basic fundamentals. Here is the beside short notes on SEO concepts. SEO become necessary for gain SERP results and all companies now trying to get displayed on first page by optimising it through SEO concepts and techniques.Higher the PR(page rank) higher the search engine traffic to respective website. Search engine optimisation short notes Download here Related Posts SEO important short notes for interview 4/ 5 Subscribe via email
global_01_local_0_shard_00002368_processed.jsonl/63816
An Understanding Heart Biblical Text: 1 Kings 3:1-15 NLT What a day. Emergency organist replacements, still singlehanded, and a bunch of other things. But this is one of those sermons you put in the book, the book of ones that you feel good about. What is the seat of wisdom? The text is Solomon’s request and then his life. It is also the answer that I am pretty sure we are missing in most of our troubles. I’d invite you to give a listen.
global_01_local_0_shard_00002368_processed.jsonl/63865
26 Feb 2012 Joseph Tame and his iRun Air! Japan Relief Shows No Comments The amazing Joseph Tame ran the Tokyo Marathon today with an HD camera on his head that he streamed live on ustream. Joseph visited me for a day of shows in Kamaiishi last November. He was deeply touched by the work I ma doing as the Tyler Foundation’s Niko Niko Taishi. In this pre run video he announces that the money he raises in the Marathon will be donated to my program!                                                                                                                                  http://www.ustream.tv/recorded/20668052 Check out the amazing satellite artwork that Joseph creates as he runs all over Japan and beyond!                                                                 http://tamegoeswild.com/ Comments are closed.
global_01_local_0_shard_00002368_processed.jsonl/63868
Thursday, January 28, 2010 Question of the Day click on image for closeup. Source: here. NEW LONDON, Conn. -- Two CT College student researchers have found that the 'five-second rule' - which stipulates that dropped food will be safe to eat if it stays on the floor for fewer than five seconds - might better be known as the '30-second rule.' Read the rest of the article here 1 comment: 1. Liana2:32 PM this reminds me of a Rhymes with Orange comic strip that was a flow chart of what a lab would eat. basically, it goes, is it edible, no? just taste it. does it make you barf? yes? taste something else. I'd send you the link but I think they changed their site where you can't get to the really old comics anymore (this one was on the wall of my office.)
global_01_local_0_shard_00002368_processed.jsonl/63874
Thursday, 13 March 2014 Book ~ "English for Scammers" (2014) Dorothy Zemach and Chuck Sandy From Goodreads ~ Curious as to why no one has claimed their UK lotto winnings from you? Why no one wants to call about the box of cash valued at Seven million five hundred thousand DollarsUS (7,500,000.00 Dollars)? Why is no one responding to your PASSIONATE REQUEST FOR JOINT MUTUAL INVESTMENTS BENEFITS? Every day, it seems, we get heart-breaking emails like this one: "I see know reasons why you are been so skeptical about your bank draft presently in our custody." Scammers … we can tell you why. It’s your English. Your English is … bad. Inaccurate. Ungrammatical. Inappropriate. You’ll never swindle anyone out of their $59 wire transfer fee if your letter sounds like it was written by a drunken third grader. "English for Scammers" analyzes common mistakes, drawn from genuine correspondence and tells you how to improve your writing so that it is appropriate for standard business letters written in English. Use "English for Scammers" to hone your 419 letters – or even to write honest, clear, direct business correspondence. The choice, dear readers, is yours. According to the authors, the reason scammers don't get an overwhelming response to their proposals is because of their poorly written emails.  All scammers should all buy this book because it's a step-by-step manual that explains their basic mistakes. Topics include: • Proper forms of address • Openings and closings • Spelling • Punctuation and capitalization • Basic grammatical constructions • Common sentence patterns • Tone and register • When it is advisable to refer to your esophageal cancer; your religious faith; your charitable intentions; your connections with the UN, plane crash victims, and dead lottery winners; and more In addition to explanations of the principles using actual emails we all have received, there are also exercises at the end of each chapter plus a final exam.  For example, here is a question in one of the exercises ... can you spot the mistakes? I am Mrs Rabakha Phillip i have a Foundation home,i have a deposit $37.8m got your mail in web search i hope you are honest believer in Christ get back to me. Can you imagine the response the scammer could get if it had been written properly?! This book is written at a very low level that any scammer who is not fluent in English will understand.  If you are fluent in English and write business emails, you may also pick up some basic tips. Note:  I'm assuming the authors wrote this book tongue-in-cheek.  I thought it was a quick amusing read. 1 comment: Masshole Mommy said... I know A LOT of people that could benefit from this book!
global_01_local_0_shard_00002368_processed.jsonl/63876
An Occasional Word Cardboard Boat Yesterday I wrote without writing. I did actually start to draft a poem. But then I went across town for an appointment. I came back home and planted a few flowers, for spots of color in the yard. I printed out a draft essay and taped it on the wall and looked at it. It needs something. What questions wasn't I asking myself? I painted my front door while listening to Krista Tippett (On Being podcast) interview the poet Jericho Brown. They reminded me of the importance of giving one's entire being to one's work. I listened twice. Then a man came to look at all of the white oak seedlings that are sprouting in my yard. Last year was a mast year for my white oak. She is about my age and lives in my back yard. There are other white oaks all around—next door, and one in my front yard, too. But the one in the back yard really makes successful acorns. The ground is truly carpeted in new seedlings. I had read in Peter Wohlleben's The Hidden Life of Trees that a mother tree will participate in the "upbringing" of its seedlings, and I was curious to see which seedlings would thrive. I wanted to just watch and see what happened. (He also writes that "it is usually the particularly battered individuals that burst into bloom." The arborist tells me this white oak is fine, but I'm keeping an eye on her.) But the sheer numbers of the seedlings requires some other response. I started to ask around: does anyone need white oak seedlings? Why yes, said a grower at the farmer's market; white oak is hard to find. Yesterday he came by to take a look. Crazy, he said. You probably have two or three thousand, he said. And he can plant them. So in the evening I began to dig up seedlings. I dug them out of a flower bed, about 3 feet by 2 feet, in which they were bumping elbows with a bunch of other plants. And then I tackled the border area of another bed, about one foot wide for a curving four feet. I wrapped the baby trees in wet newspaper in bundles of ten. Over 140 seedlings are packed up in buckets, waiting for their new lives in another place. And I have barely begun. But here's the thing. It takes some doing, to carefully loosen the soil and go deep enough to free the seedlings without damaging their long roots. Each one is unique; each has a different shape, a different set of angles and long reaches. The tip of the root might be an impossibly slender tip, or it might be a small cloud of tiny capillary-like fingers. Many still are attached to the knob of nutrients that is the meat of the acorn. Most have three or four leaves. Some have two stems rising up into the light. Some stems have jutted sideways out of the acorn, then turned 45 degrees to grow up. Lifting each young tree out of its soil, I saw how it found its own route, its individual shape as it sprouted and reached out for light and for water. Each one was miraculous.  When I finally went to bed, tired, deeply affected, I closed my eyes and saw seedlings. It felt strange to be closed up in a house when outside, a few yards away, there was so much surging, so much life beginning. The house seemed like a little cardboard boat riding on the surface of an earth that is fully alive. What other miracles are out there, just waiting for me to take a closer look? Post a comment
global_01_local_0_shard_00002368_processed.jsonl/63881
Thursday, January 3, 2013 January TBR & December Rewind + linky! Woo, kicking off a new year of reading with this month's TBR, and putting a cap on last year's reading with the December Rewind! Check 'em out below, add your own to the linky so I can check out YOURS, and don't forget to vote vote vote on this month's Stack of Five! =) I'm hoping to get a fair amount of reading done this month, before I launch myself into the endless rounds of event reading...So this pile is big, but it's also apt to change. Austensibly Ordinary: http://amzn.to/YVDAMQ Etiquette & Espionage: http://amzn.to/10yLSjc Americus: http://amzn.to/VNmNJu Same Difference: http://amzn.to/YybwPB Mist: http://amzn.to/YyaQtr Siege: http://dft.ba/-Siege Midwinterblood: http://amzn.to/WXj9DG Just One Day: http://amzn.to/Vk85eX Shadowlands: http://amzn.to/VwG5Vj and I forgot to mention, FUSE by Julianna Baggot: http://amzn.to/UHFXUy So, here's what I thought of the last little stack of books I read of 2012! Let me know if you agree/disagree in the comments, and link up your own below and/or as video responses. Thanks for watching! Dreamfever: http://amzn.to/VwH5sx Shadowfever: http://amzn.to/135nVys To Tame a Highland Warrior: http://amzn.to/RubidE Pure: http://amzn.to/VZfuPp Blood Song: http://amzn.to/Wmhguv Cinders & Sapphires: http://amzn.to/RkS3Dj 12.21.12: http://amzn.to/ZW6qCZ Watchmen: http://amzn.to/Vk8IFo 1. http://ambells.tumblr.com/post/39318500358/december-2012-wrap-up-of-course-i-didnt And now I shall run and see January! XD 2. Now, I'm grumpy. First Jellicoe Road. Now the Fever series. I HAVE ENOUGH TO READ, MIND-NINJA. It's not polite to unconsciously manipulate somebody's feelings so that they feel they NEED to read a book. DEVIOUS. 3. I have actually gone and bought the Moning books fr my Kindle because you make them seem to awesome and heart-stopping! I can't wait to read them! x 4. It may not be polite, Ash, but it sure is fun! ;) Anna/PoB - yay! Remember, I do have issues with them, so don't go in thinking they're perfect. But damn if they aren't addictive... Enjoy! Tell me all your thoughts. Let's be best friends. Related Posts Plugin for WordPress, Blogger...
global_01_local_0_shard_00002368_processed.jsonl/63898
 Active Directory - ThinCor • [email protected] • +91-7592865159 Active Directory Active Directory (AD) is Directory service developed by Microsoft Corporation for their windows server series operating system (OS). Active Directory was introduced in Windows 2000 Server and revised with additional features in Windows Server 2008. AD has information about all the objects – users, groups, computers, application and other resources like shared data, printers, in an organizational networks. This service provide centralized management in windows domain networks. Active Directory serves as a single data store for quick data access to all users and controls access for users based on the directory’s security policy. Its a service to arrange, store information, provides access and permissions based on those information. Active directory information is used to authenticate and authorize all objects in a network Active directory domain means its a logical group of objects. We can create unlimited number of objects in a domain and not need be in a same physical location.A domain consists of objects stored in a specific security boundary and interconnected in a tree-like structure. A single domain may have multiple servers – each of which is capable of storing multiple objects. In this case, organizational data is stored in multiple locations, so a domain may have multiple sites for a single domain. The main service in Active Directory is Domain Services (ADDS) which stores directory information and handles the interaction of the user with the domain. ADDS controls which users have access to each resource. Active Directory Domain Services uses a tiered layout consisting of domains, trees and forests to coordinate networked elements. A Domain Controller is responsible for all the authentication, authorization, addition, modification, deletion inside a domain. if an user has access to domain, he can log on anywhere and any computer in that domain. The permissions, polices and rights can be set for all the objects at the domain level or at the individual level as well. Leave a Reply
global_01_local_0_shard_00002368_processed.jsonl/63906
Indians & Cultural Encounters Warfare 02 Tecumseh Warfare 01 Natchez Warrior One of the most important Indian laws was retaliation. It was the responsibility of the clan to revenge any killing of one of its members.  Indians believed that a person’s spirit could not go on to the next world if his murder had not been revenged. It wasn’t necessary to kill the actual murderer; one of his clansmen would work just as well.  Before European involvement, Indian warfare was usually small in scale, usually over revenge. A raiding party from the Chickasaw might stumble upon a Cherokee and kill him. His Cherokee clan would then go to Chickasaw land and kill someone or perhaps two people in revenge. These deaths would then be revenged by the Chickasaw with the killing continuing until the tribes arranged a peace meeting to resolve the issues.  This caused an outbreak of hostilities between settlers and Cherokees in 1758 when a group of Cherokee were killed in Virginia. The Cherokee figured the settlers were all one clan and randomly picked some settlers to kill in revenge. The settlers, who didn’t have anything to do with the original killings, asked the military for help.  The fighting eventually resulted in the British Army burning down 15 Cherokee towns. Men gained status through their ability to fight and to play games.  Before going to battle, warriors carefully prepared. They fasted and consulted priests to see if there were any bad signs. If there were bad omens, the man might not participate in the raiding party. Even on the war trail, warriors watched for omens in the behavior of animals or in dreams. If a bad omen appeared, the entire raiding party might go back home. Fights over hunting areas in Middle Tennessee were common, especially if it involved the more warlike Chickasaws. During the early 1700s, the Shawnee living in the Cumberland Valley came under attack from the Chickasaws. There were also fights whenever Creek, Chickasaw, Cherokee or Shawnee hunting parties encountered each other. In 1710 and again in 1745, Cherokees and Chickasaws united to remove the Shawnee from Middle Tennessee. Tecumseh, whose parents had lived in Middle Tennessee, joined his brother and a band of Shawnee to attack the Cumberland settlers. He tried to get Chickasaws and later the Cherokees to join with him to push the white settlers out, but they wouldn’t. Tecumseh was killed in the War of 1812 in Ohio while fighting American forces. The French and English learned to persuade Indian fighters to participate in their struggles to control the region. Not only did the English and French use Indians to fight their war, they also encouraged the Indians to fight among themselves. Indian warfare increased after the Europeans came to America. Picture Credits: • A drawing of a Natchez warrior, probably of the Mississippian period, holding bow and sword.  National Anthropological Archvies, Smithsonian Institution • A portrait of Tecumseh by Benson John Lossing.  Since Lossing never met Tecumseh, he based his painting on a drawing by Pierre le Dru, a French trader who had seen Tecumseh.  National Anthropological Archives, Smithsonian Institution Sponsored by: National Endowment for the Humanities Website developed and maintained by: The Tennessee State Museum. Contact us: Web Design and Hosting by: Icglink : :
global_01_local_0_shard_00002368_processed.jsonl/63907
Oxygen Between discovery and properties Oxygen between discovery and properties The discovery of oxygen by the Swedish pharmacist Carl William Shelly almost before 1773, was not published before the independent discovery of the world Joseph Priestley on August 1, 1774, which called the gas name of the opposite of the phylogenetic. Priestley published his work in 1775 and Chile in 1777, and Priestley usually takes interest because he published first.  Of the elements that evoke gaiety, so it is used in resorts until modern times. Also noted are the columns of oxygen so far in concerts. In the 19th century it was mixed with nitrous oxide to make a kind of analgesics, and the use of some of these analgesics until now. Oxygen is often used as an oxidizer, and there is no higher element in the electrolysis than fluorine. Liquid oxygen is used as an oxidizing agent in the propulsion of rockets. Oxygen is also essential in breathing, and therefore has a key role in medicine. Mountain climbers and those using the aircraft also have additional oxygen supplies. Oxygen is also used in welding. In the manufacture of both steel and methanol. Liquid oxygen and steel have a light blue color, both magnetic and strong. Liquid oxygen is often obtained from partial distillation of liquefied air. Both O3 and solid steel have a dark blue color. Another oxygen-based form, O4, a dark red solid material obtained by the pressure of O2 was detected by 20 GPa. It has been studied for use in rocket fuel and similar applications, an oxidizing substance stronger than O2 or O3. Oxygen is an essential air compound, made up of plants during photosynthesis processes, and is important for breathing in airborne organisms in their breathing. The word oxygen is derived from two Greek words that are acidic and acid. This name was chosen in the 18th century because it was believed that all acids contain oxygen. The definition of acid was then changed to the fact that acid should not contain oxygen in its molecular structure. In normal conditions of temperature and pressure, oxygen is present in the gaseous state. Oxygen consists of two bioluminescent molecules of O2 form. O2 has two forms according to energy: the less energy form, often the mono-bond and the higher-energy form is a mono-bond molecule.
global_01_local_0_shard_00002368_processed.jsonl/63914
Sustainability Rating Click to Learn More 3-Minute Market Insight EP 456 | AIRED 09/23/2019 Brexit Part 2: Impacts on China Imported Seafood Into The UK September 23, 2019 --- In this week's episode we give you Part 2 of our Brexit series investigating the impacts of Brexit on imports of seafood from China into the UK. As the October 31st deadline nears for Brexit, it really is anyone's guess if the UK will exit the EU with a no-deal. 2019 Alaska Salmon Commercial Harvest Counter (Harvest in thousands of fish) Updated: September 23, 2019 8:00am (View Previous Weeks Totals) Other possible outcomes are to reach a new deal, blocking a no-deal, and there is even a legal option of cancelling Brexit altogether. --- So how will Brexit affect the import of Seafood from China into the UK? SINBAD Platinum Coho Salmon From the trade procedures angle, there should not be any significant change because import procedures for Chinese goods will not be affected by the UK’s withdrawal from the EU. The main change will be the removal of import duty on Chinese seafood. If the imports are taxed according to the Temporary UK Tariff Schedule announced in April 2019. Duties on most fish including Cod, Haddock and Salmon will be zero however it is worth keeping an eye on this temporary tariff schedule in case the tariffs are adjusted. --- Another change has to do with pre-notifying the Border Inspection Post. This will no longer be done through TRACES but via a new system called IPAFFS - Import of products, animals, food and feed system. The advice from the UK government and Seafish is that you register now to use it if you haven’t already done so. This Weeks Sponsored Message: --- Now onto the second part of this episode. Has Brexit affected imports of seafood from China over the years. Comparing trade data for 2017 and 2018 we can see only a marginal difference in volume with 2017 at 51.3 million kg and 2018 at 47.9 million kg's of imported seafood from China. Looking at provisional data from Janauary to July 2019 versus the same time in 2018 we are not seeing much difference in volume imported BUT there seems to a noticeable contrast in dollar values on imports. SINBAD Gold Coho Salmon As tariffs have not changed between 2018 and 2019 we don't believe tariffs is a factor. However when reviewing the strength of the Pound sterling to USD we can see that the GBP has dropped from an average of 1.38 in January 2018 to 1.25 in July 2019. Although we cannot predict the import volume for the remainder of 2019, something to note is that the temporary post-Brexit tariff is lower than the current tariff so this might discourage importers from overbuying. However, it does not seem like the imports of seafood from China are slowing down as we know Chinese processors are actively trying to switch sales from the US to the EU including the UK. How much seafood the EU can actually take on - we will investigate for another episode. Lastly, we have provided links to the Temporary UK Tariff Schedule and the Import of products, animals, food and feed system below. Subscribe to our 3-Minute Market Insight to keep tuned-in s we continue to follow and report on Brexit. Since 2010, new episodes go live every Monday Morning at 5:00am Pacific Standard Time. Subscribe to our 3-Minute Market Insight Recent Episodes:
global_01_local_0_shard_00002368_processed.jsonl/63917
Full Body and Abs Treadmill Workout | Fat Burner Routine #HIITcardio #treadmillworkout Cardio is not my favorite part of competition prep so I am always finding ways to spice up my routines. Don’t forget to like, comment and subscribe. I usually upload on Mondays and Fridays /weekly. Ways to reach me! Mailing address: P.O.Box 2401 Follow me on Instagram @TheCaribSpice Subscribe on YouTube @ Key/important videos for weight loss or weight gain: 1. What’s a macro? 2. How to calculate your macros for weight loss or weight gain? Check out my other videos: 1. How fat am I?- Hydrostatic body fat testing 2. Complete legs and glutes playlist 3. 25 facts about me (TAG) 4. No gym? No problem: Outdoor routine 5. Ab crunches with stability ball 6. Vlogs and more Vlogs 7. Thinking about butt enhancement surgery? Check this out. 8. Hip thrusts: quick tip for the ladies 9. Q & A: How I met my hubby, how long have I been lifting and more! 10. 50 lbs. weight loss journey| Special guest 11. You can’t change anyone unless they want to change: Q&A 12. Cardio-Stairmaster||Tip for getting the most out of your workout Categorised in:
global_01_local_0_shard_00002368_processed.jsonl/63920
Sunday, 12 August 2012 BBC Airs Extended Merlin Season 5 Trailer Is that Mordred I spy? 1. Where did you think you saw Mordred? My only hope is that (as this is probably the final season, boo!) they don't race through the Arthurian Age to The Battle Of Camlann for the last episode. 1. At the beginning in the cloak - maybe I'm wrong though, but it's confirmed that Mordred's back. I hear that apparently there will be one more season after this, but I'm with you - I hope they pace it well. 2. That's excellent news - for a long time they were saying "five and out". Two more seasons would be fantastic. You know you could be right about Mordred - I think the first (lone) cloaked figure we see is the old man whose talking, whose face we see later. However, when there's the shot of the three cloaked figures, I wonder if the middle (kneeling) figure is Mordred. Even though he's on the ground anyway, I'm sure he looks shorter than the others. 3. Yeah, there's a bit more about it here I think Morded's probably the middle dude. He should probably be about 17/18 by now I reckon. 4. Very exciting news. Let's hope the fans lap up season five (and no reason they shouldn't) and we get a sixth. Thanks for this info.
global_01_local_0_shard_00002368_processed.jsonl/63924
Thursday, 29 November 2012 Nails: Pink Panther A few months ago I bought my very first indie polishes from Lush Lacquer on Etsy. One of these was Pink Panther ~ pink, white and black matte glitters in a clear base. Pink Panther Bottles I've used it in this mani along with W7 Black and e.l.f. Gum Pink Pink Panther Sadly I've actually lost my little Pink Panther bottle since taking these pictures. I made the mistake of leaving it downstairs unsupervised and I guess it looked like a fun thing to play with for the cats! Spent ages looking for it under sofas, kitchen appliances and other furniture but no luck :( We did however find the bathroom sink plug under one sofa which had gone missing the week before, little devils!! Keeping my fingers crossed still that it will turn up unexpectedly one day, lesson learnt though at least, no more polishes left downstairs! 1. That looks really good on top of the black! Hope it turns up soon. The studs on the pink are cool too :-) Things go missing all the time in our house but they do turn up weeks, months, years later! It'll be in your house somewhere. Mine don't seem too interested in polish. One is obsessed with straws!!! I've never bought an indie polish yet, I think if I get into it, it'll be a slippery slope for me! 1. Our two are obsessed with plastic bottle caps, especially the ones off milk bottles, we found absolutely tonnes of them under the furniture as that's where they all end up. Yes that's the problem, after buying this one and 3 other minis from Lush Lacquer I've since bought 2 full size ones from Hare Polish and yesterday bought a full set of 8 minis from Pretty & Polished. It's dangerous once you get started! 2. I have and love Pink Panther! Great mani. Fingers crossed for you finding it soon.
global_01_local_0_shard_00002368_processed.jsonl/63940
Hey loves and happy new year! I wish you all the best, love and success! So, today's post is about something I hear every-single-day. "Oh my gaud, your hair looks so good!" or "Do you wake up two hours earlier every day to make your hair like this?" are things I've heard way too many times from people at my uni. And I'm like "No, it literally takes a couple of minutes".  Just to let you know, my natural hair is straight, and I really don't want to damage them every day by curling them or whatever. Plus, within only a year, my hair grew from my shoulders to my waist. Trust me it was very damaged, I've been bleaching my hair for four years, and I 've been using heat every day. So, it really wow-ed me when it grew so fast, just by saying goodbye to heat. However, you're not here to read how to grow your hair fast, but how to create gorgeous, voluminous curls with absolutely no heat. First things first, simply wash your hair and let it dry (I don't use blow dryer, so it takes about three hours to dry completely). Make sure your hair is fully dry, because if it's a bit wet it's not going to work. Then simply do what this lovely girl is doing in this video, and ta-da! I prefer the second way, it makes the curls more voluminous, and I'm separating the ponytail in 4 sections, not 2 (you'll understand when you see the video). I've been doing this a couple of years now, and I always get so many compliments on my hair.  They stay like this the whole day, but I'm doing the bun every night, just to give back to the curls the shape they "lost" throughout the day. It seriously takes a few minutes to do it, and they look like you've spent the whole day on them. If you recreate this hairstyle, tag me on Instagram @venetiakamara, I'd love to see it.  post signature Share this: 1. Very pretty. Your hair is gorgeous!! 2. You have the most shiniest hair I've ever!! xoxo, Colli 1. Haha Thanks girl! It always happens when you dye your hair "jet black" ;) It's the blue undertones that make it look so shiny xx 3. chic and lovely hair 4. Beautiful hair <3 Happy New Year! 5. Looks amazing Happy new year Love Vikee
global_01_local_0_shard_00002368_processed.jsonl/63952
Bloody Oil Finally a prominent public figure has the guts to come out and (write) what the invasion of Iraq is really about! “I am saddened that it is politically inconvenient to acknowledge what everyone knows: the Iraq war is largely about oil.” – Alan Greenspan in his book, “The Age of Turbulence: Adventures in a New World”, according to Bob Woodward in his Washington Post* article. Oil comes under the domain of Neptune (chemicals) and Pluto (underground). These two planets were predominantly featured at the time of the Iraq invasion.** Neptune opposed Jupiter. This shows that the purpose of the invasion was based on false beliefs/misinformation (Neptune) that keep expanding (Jupiter). This is an aspect of unrestrained spending. Neptune rules Pisces. The Sun (mission) was in very late Pisces. This shows there was no clear plan of action, and that it would last far longer than anticipated. Interestingly, the chart’s Ascendant is the exact placement of Alan Greenspan’s Pisces Sun which gives him the courage to express the meaning of Neptune’s deceptive mask. ** Iraq Invasion: March 20, 2003 5:33 AM BAT Baghdad, Iraq No comments:
global_01_local_0_shard_00002368_processed.jsonl/63964
It's not really no sweat to find solo girl free sex videos that offer both fast streaming and good quality! But, don't you give a worry about it :) We are here to please your biggest demands. Here are some XXX AssoAss site's favorites: peeping on girls in nature 5993 and cute cosplay teen anal beads her virgin ass. A day without porn movies is a lost one. Same thing for a night :) XXX AssOAss » Solo Girl tube
global_01_local_0_shard_00002368_processed.jsonl/63974
Abel Di Marco From ChoralWiki Jump to: navigation, search Born: 1932 Died: 17 June 2018 Father Abel di Marco was born in a district of Balcarce, province of Buenos Aires, Argentina. At the age of 9 he started having piano classes at the Conservatorio Chopin of his town. Three years later he entered the Seminary of La Plata city, where he continued his musical studies, and eventually he was ordained as a Catholic priest. In 1973 he was invited by a friend to visit Puerto Rico and decided to stay in that country, establishing himself in the city of Ponce. In the same year he founded the Choir of the Pontifical Catholic University of Puerto Rico (Coro de la PUCPR). See also: Abel Di Marco's editor page. List of choral works Click here to search for this composer on CPDL External links
global_01_local_0_shard_00002368_processed.jsonl/63979
The best way of learning a language is always using it. The best way of learning spoken English is ___1___ in English as much as possible. Sometimes you'll get your words ___2___ up and people will not ___3___ you. Sometimes people will ___4___ things too quickly and you can't understand them. But ___5___ you keep your sense of humor, you can always have a good laugh at the mistakes you ___6___. Don't be unhappy if people seem to be laughing ___7___ your mistakes. It's ___8___ for people to laugh at your mistakes than to be angry with you, ___9___ they don't understand what you we saying. The most important thing for learning English is: "Don't be ___10___ of making mistakes because everyone makes mistakes." 1. A. listening B. talking C. reading D. writing 2. A. mix B. mixing C. to mix D. mixed 3. A. like B. know C. help D. understand 4. A. say B. talk C. tell D. speak 5. A. if B. when C. since D. although 6. A. have B. make C. take D. product 7. A. at B. on C. in D. for 8. A. good B. better C. best D. well 9. A. unless B. because C. as soon as D. as long as 10. A. sad B. worry C. afraid D. unhappy
global_01_local_0_shard_00002368_processed.jsonl/63988
A MAZE. / Berlin 2019 8th International Games and Playful Media Festival Need a packet? Need a Packet? - Trailer by Marginal act (Ukraine) Genre: Horror-simulator Need a packet? - horror-simulator about cashier, who is becoming insane because of her routing job. At some point her working place turns into the castle and dragons appears around. Platform: PC
global_01_local_0_shard_00002368_processed.jsonl/63993
Are We Bibliolators? #4 Friday, April 20, 2012 It hath been often said, “A man is only as good as his word.” If thou canst not trust what someone saith, he or she is a liar. The Bible is God’s Word, so if the Bible containeth mistakes, then God is a liar. Beware; Satan doth seek to corrupt the Bible in order to attack God’s integrity! God hath “magnified [his] word above all [his] name” (today’s Scripture). The devil, whose  Hebrew name Satan meaneth “adversary,” seeketh to degrade God’s Word, to corrupt it, to muddle it up, thereby portraying God as dishonest, thus confusing us, the recipients of God’s Word, causing us to believe something God never said. The Bible versions issue is that serious, beloved. At this point, it is extremely interesting that today’s Scripture readeth in the (corrupt) NIV: “…for you have so exalted your solemn decree that it surpasses your fame.” (HA! Lie! That rendering certainly hath Satan’s approval!) Through the years, I have talked with countless professing Christians about the Bible versions issue. Sadly, most of these dear souls knew literally nothing (!) about it. So echoeth God’s lamenting for Israel, “My people are destroyed for lack of knowledge” (Hosea 4:6a). Millions upon millions of genuine Christians are so deceived by modern “bibles,” and the shameful seminarians and church leaders who should be warning them of the deception are actually promoting modern “bibles!” Shame! Shame! Shame! We “King James-only” Christians reject “every false way:” we reject Satan’s counterfeit “bibles,” ignoring the fact that we are scorned as “heretical” and “fanatical” “Bibliolaters” (Bible worshippers). By faith, we join God in “magnifying” the King James Bible “above all [His] name.” Furthermore, we believe in a perfect Bible and we can present it—the King James Bible. Others merely claim to believe in a perfect Bible, but only in the original manuscripts, which they cannot present to us today (those manuscripts disintegrated)! They deny God’s promise of Bible preservation. So, who is the heretic now?
global_01_local_0_shard_00002368_processed.jsonl/63995
Measures of Variability: Variance, Standard Deviation and Coefficient of Variation Statistics Tutorials 12 min read Blog / Statistics Tutorials / Measures of Variability: Variance, Standard Deviation and Coefficient of Variation Measures of Variability: Variance, Standard Deviation and Coefficient of Variation There are many ways to quantify variability, however, here we will focus on the most common ones: variance, standard deviation, and coefficient of variation. Coefficient of variation-varianility In the field of statistics, we typically use different formulas when working with population data and sample data. Different formulas-variability Sample Formulas vs Population Formulas When we have the whole population, each data point is known so you are 100% sure of the measures we are calculating. different formulas for population data-variability When we take a sample of this population and compute a sample statistic, it is interpreted as an approximation of the population parameter. A sample statistic is an approximation of the population parameter-variability Moreover, if we extract 10 different samples from the same population, we will get 10 different measures. 10 different samples give 10 different measures-variability Statisticians have solved the problem by adjusting the algebraic formulas for many statistics to reflect this issue. Therefore, we will explore both population and sample formulas, as they are both used. The Mean, Median and Mode You must be asking yourself why there are unique formulas for the mean, median and mode. Well, actually, the sample mean is the average of the sample data points, while the population mean is the average of the population data points. As you can see in the picture below, there are two different formulas, but technically, they are computed in the same way. sample formula vs population formula-variability After this short clarification, it’s time to get onto variance. Variance formulae Variance measures the dispersion of a set of data points around their mean value. variance measures the dispersion of a set of data points around their mean-variability Population variance, denoted by sigma squared, is equal to the sum of squared differences between the observed values and the population mean, divided by the total number of observations. population variance-variability Sample variance, on the other hand, is denoted by s squared and is equal to the sum of squared differences between observed sample values and the sample mean, divided by the number of sample observations minus 1. Sample Variance-variability A Closer Look at the Formula for Population Variance When you are getting acquainted with statistics, it is hard to grasp everything right away. Therefore, let’s stop for a second to examine the formula for the population and try to clarify its meaning. The main part of the formula is its numerator, so that’s what we want to comprehend. The sum of differences between the observations and the mean, squared. So, this means that the closer a number is to the mean, the lower the result we obtain will be. And the further away from the mean it lies, the larger this difference. higher and lower results-variability Why do we Elevate to the Second Degree Squaring the differences has two main purposes. 1. First, by squaring the numbers, we always get non-negative computations. Without going too deep into the mathematics of it, it is intuitive that dispersion cannot be negative. Dispersion is about distance and distance cannot be negative. higher and lower results squared-variability If, on the other hand, we calculate the difference and do not elevate to the second degree, we would obtain both positive and negative values that, when summed, would cancel out, leaving us with no information about the dispersion. 1. Second, squaring amplifies the effect of large differences. For example, if the mean is 0 and you have an observation of 100, the squared spread is 10,000! 10 squared is 100-variability Putting the Population Formula to Use Alright, enough dry theory. It is time for a practical example. We have a population of five observations – 1, 2, 3, 4 and 5. Let’s find its variance. We start by calculating the mean: (1 + 2 + 3 + 4 + 5) / 5 = 3. we start by calculating the mean-variability Then we apply the formula which we just discussed: ((1 – 3)2 + (2 – 3)2+ (3 – 3)2 + (4 – 3)2 + (5 – 3)2) / 5. observation mean When we do the math, we get 2. So, the population variance of the data set is 2. population variance formula Calculating the Sample Variance But what about the sample variance? This would only be suitable if we were told that these five observations were a sample drawn from a population. So, let’s imagine that’s the case. The sample mean is once again 3. The numerator is the same, but the denominator is going to be 4, instead of 5. n - 1 4This gives us a sample variance of 2.5. sample variance Why the Results are not the Same To conclude the variance topic, we should interpret the result. Why is the sample variance bigger than the population variance? In the first case, we knew the population, that is, we had all the data and we calculated the variance. In the second case, we were told that 1, 2, 3, 4 and 5 was a sample, drawn from a bigger population. The Population of the Sample Imagine that the population of the sample were the following 9 numbers: 1, 1, 1, 2, 3, 4, 5, 5 and 5. imaginary populationClearly, the numbers are the same, but there is a concentration around the two extremes of the data set – 1 and 5. The variance of this population is 2.96. 2.96So, our sample variance has rightfully corrected upwards in order to reflect the higher potential variability. This is the reason why there are different formulas for sample and population data. Why we Use Standard Deviation While variance is a common measure of data dispersion, in most cases the figure you will obtain is pretty large. Moreover, it is hard to compare because the unit of measurement is squared. The easy fix is to calculate its square root and obtain a statistic known as standard deviation. standard deviation In most analyses, standard deviation is much more meaningful than variance. The Formulas Similar to the variance there is also population and sample standard deviation. The formulas are: the square root of the population variance and square root of the sample variance respectively. I believe there is no need for an example of the calculation. Anyone with a calculator in their hands will be able to do the job. standard deviation formulas The Coefficient of Variation (CV) The last measure which we will introduce is the coefficient of variation. It is equal to the standard deviation, divided by the mean. coefficient of variation Another name for the term is relative standard deviation. This is an easy way to remember its formula – it is simply the standard deviation relative to the mean. standard deviation relative to the mean As you probably guessed, there is a population and sample formula once again. sample formula Why We Need the Coefficient of Variation So, standard deviation is the most common measure of variability for a single data set. But why do we need yet another measure such as the coefficient of variation? Well, comparing the standard deviations of two different data sets is meaningless, but comparing coefficients of variation is not. comparing two or more datasets Aristotle once said: Comparing Standard Deviations To make sure you remember, here’s an example of a comparison between standard deviations. Let’s take the prices of pizza at 10 different places in New York. As you can see in the picture below, they range from 1 to 11 dollars. n=10Now, imagine that you only have Mexican pesos. To you, the prices will look more like 18.81 pesos to 206.91 pesos, given the exchange rate of 18.81 pesos for one dollar. pizza price example Let’s combine our knowledge so far and find the standard deviations and coefficients of variation of these two data sets. Sample or Population Data 1. First, we have to see if this is a sample or a population. Are there only 11 restaurants in New York? Of course not. This is obviously a sample drawn from all the restaurants in the city. Then we have to use the formulas for sample measures of variability. sample or population? Finding the Mean 1. Second, we have to find the mean. The mean in dollars is equal to 5.5 and the mean in pesos to 103.46. find the mean Calculating the Sample Variance and the Standard Deviation 1. The third step of the process is finding the sample variance. Following the formula that we went over earlier, we can obtain 10.72 dollars squared and 3793.69 pesos squared.Find the sample variance 2. The respective sample standard deviations are 3.27 dollars and 61.59 pesos, as shown in the picture below. Find the sample deviation A Few Observations Let’s make a couple of observations. First, variance gives results in squared units, while standard deviation in original units, as shown below. This is the main reason why professionals prefer to use standard deviation as the main measure of variability. It is directly interpretable. Squared dollars mean nothing, even in the field of statistics. Second, we got standard deviations of 3.27 and 61.59 for the same pizza at the same 11 restaurants in New York City. However, this seems wrong. Let’s make it right by using our last tool – the coefficient of variation. The Advantage of the Coefficient of Variation We can divide the standard deviations by the respective means. As you can see in the picture below, we get the two coefficients of variation. CV= s/x The result is the same – 0.60. Important: Notice that it is not dollars, pesos, dollars squared or pesos squared. It is just 0.60. This shows us the great advantage that the coefficient of variation gives us. Now, we can confidently say that the two data sets have the same variability, which was what we expected beforehand. advantagesIn the picture above, you can see the main advantages of the coefficient of variation. The Pros and Cons of Each of the Measures of Variability To recap, there are three main measures of variabilityvariance, standard deviation and coefficient of variation. Each of them has different strengths and applications. Usually, standard deviation is preferred over variance because it is directly interpretable. However, the coefficient of variation has its edge over standard deviation when it comes to comparing data. After reading this tutorial, you should feel confident using all of them. Now, using measures when working with one variable probably seems like a piece of cake. However, what if there were 2 variables? Will you be able to represent their relationship? If your answer is no, feel free to jump onto our next tutorial, in order to turn that no into a yes. Or, if you’re considering a career in data science, check out our articles: The Data Scientist Profile, The 5 Skills You Need to Match Any Data Science Job Description, 10 Pro Tips to Make Your Resume One of a Kind, and 15 Data Science Consulting Companies Hiring Now. Interested in learning more? You can take your skills from good to great with our statistics tutorials! Ready to take the first step towards a career in data science? Check out the complete Data Science Program today. We also offer a free preview version of the Data Science Program. You’ll receive 12 hours of beginner to advanced content for free. It’s a great way to see if the program is right for you. Next Tutorial: How to Use Covariance and the Linear Correlation Coefficient 1. This was awesome. I am working with a GED student who really HATES math but with all the colors and explanations this has been so helpful. Leave a Reply Your email address will not be published. Get A Free Statistics Cheat Sheet! Check your email shortly!
global_01_local_0_shard_00002368_processed.jsonl/64005
Wiring Diagram Database Frequency Control Circuit Schematics In Wiring Diagram204 views Wiring Diagram Database Top Suggestions Frequency Control Circuit Schematics : Frequency Control Circuit Schematics Auditory contrast gain control represents an important example 2 stimulus paradigm for electrophysiological experiments We set out to emulate the phasing notches frequency shifts and the behavior of the original we included an expression pedal input to control rate speed of the lfo that can also be set to In low frequency analog circuits we can often accomplish a filtering task with all you need is an rf input signal and a control voltage and the chip provides the filtered rf output signal. Frequency Control Circuit Schematics A model is the representation of device or system characteristics through mathematical equations equivalent circuits diagrams voltage source with high gain followed by a pole at low frequency That include rhythm generating circuits called central pattern generators cpgs the spinal locomotor networks ensure the An international team of scientists sent high frequency sound waves across a which are complex circuits and like all quantum systems are highly fragile the smallest fluctuation or. Frequency Control Circuit Schematics Researchers at the turku centre for biotechnology have invented new tools for decoding and controlling signalling circuits in living driven at their resonant frequency resonance is a familiar Section 2 electric circuits network graph gauss seidel and newton raphson load flow methods voltage and frequency control power factor correction symmetrical components symmetrical Q amp d circuits co ltd is a high tech enterprise specializing in pcbs of up to 30 layers such as hdis blind vias etc our products feature high frequency high tg impedance control blind and. In an effort to control the pain in advanced functional materials quot biodegradable frequency selective magnesium radio frequency microresonators for transient biomedical implants quot the circuit Crazy tube circuits has unveiled the cyclone there are inputs for an external expression pedal to control the rate of the low frequency oscillator and this can also be used to set so the cyclone Furthermore we can precisely control the gain simply by choosing the values in conjunction with resistors and capacitors to generate a second order frequency response these circuits are called. Wiring Diagram Database Author: Slava Mezler Leave a reply "Frequency Control Circuit Schematics"
global_01_local_0_shard_00002368_processed.jsonl/64025
Rick was a pilot of the Aurelian Air Force. He flew as Gryphus Squadron's number two during the Aurelian War. During the Aurelian War, Rick was deployed along with the rest of Gryphus Squadron to engage Leasathian bombers headed towards the Aurelian Air Force's last operational base, Aubrey Air Base. After all bombers were shot down, the squadron was alerted to an SWBM launched by Leasath's airborne fortress Gleipnir. Unable to make it to safety in time, he was killed along with most of Gryphus Squadron.[1] 1. Ace Combat X: Skies of Deception - Skies of Deception
global_01_local_0_shard_00002368_processed.jsonl/64030
3D buildings in Google Maps + Earth feature Salam. I guess its going to be series of 3D topics from now on. In this entry, I’d like to share few things about viewing the 3D building in Google Maps. Two years ago I have debated over Wikimapia vs Google Earth. Since then, Google Maps has been developed rapidly by developers. Now you can view 3D building in Google Maps, but you have to install the Earth plugin first. If you haven’t try it, let’s do it now. Go to Google Maps and click on the Earth button to start downloading. Restart your browser once the installation has finished. Please note that this plugin is only work for Google Chrome 1.0+, Internet Explorer 6+, Firefox 2.0+ and Flock 1.0+. Viewing 3D buildings in Kuala Lumpur, Malaysia Now, you can see the 3D buildings. Currently, there are few famous buildings and skycrapers are available in Kuala Lumpur. At first, I wonder how come Google can come up with 3D buildings in KL? Where do they get all the measurement, specifications of these buildings? Google got it from Google 3D Warehouse After thinking for a while, this is where Google collected those 3D buildings. I never thought that SketchUp that I’ve been using since 2004, now has been utilised fully by Google. Yes, they have integrated with Earth since SketchUp 6 version. And finally, they also had integrated with Google Maps. Google Earth vs Google Maps Personally, I don’t have Google Earth software in both my PC and netbook. Anyhow, installing an Earth plugin should not be much problem for most of us. I wonder if Google will stop develop Google Earth and probably they will take more Earth features into Maps. Some 3D building size is relatively smaller than JPEGs Yes, this is one thing that you should have known. Loading 3D models is relatively faster than viewing the JPEGs photos. For example, the 3D SketchUp model of Tabung Haji tower is only 109kb and you can see it in 3D. While the large size of Tabung Haji building photo with 1200×1600 resolution image is 221kb (with minimum optimization). How do they contribute these models into Earth or Maps? For a simple 3D building model, they shape is just a cube with maps on each sides. In this case, I guess 3D model architecture visualizer (archviz) will have the technical drawing for producing artistic impression. But instead of producing the 3D perspective, they also can wait for the building to complete and take the picture of the reflected windows as the texture of the building. I like how the Bank Simpanan Nasional building looks with building reflection on the window. (which is actually just a texture). Google had come up with another way of using its service once again. I hope that more and more 3D enthusiast, students, modeller and archviz people will contribute more 3D model of Malaysia, especially in Kuala Lumpur. I also hope that Google can include the name of the buildings while people are viewing in Earth mode. 2 thoughts on “3D buildings in Google Maps + Earth feature” Leave a Comment
global_01_local_0_shard_00002368_processed.jsonl/64037
In a bacterial cell, there are many parts which help to make up the structure of it, each have their own unique function to aid the bacterial cell. Capsule: it protects the inside of the cell from engulfment, also contains water which protects it from desiccation. They are the little hairs which connect to things and other surrounding We Will Write a Custom Essay Specifically For You For Only $13.90/page! order now Cell wall: It has a semi-ridged wall for protection and it keeps its shape Plasma membrane: It is semi permeable, and it allows nutrients through the cell however they cannot be too large otherwise they won’t fit. Nucleoid: It is where the DNA is contained and has no certain structure. Ribosome: This is where protein synthesis occurs Cytoplasm: The jelly like substance which holds everything together in the cell Flagellum: It has a tail which helps the cell to move around. reproduce by binary fission which is an asexual type of reproduction. During this process, the single cell bacterium divides into two daughter cell which are completely identical. For bacteria to grow they have certain conditions which they require for optimum growth, these include a warm temperature. This is important because they have adapted to reproduce in human and animal body temperatures which are higher. They also need moist conditions because the bacteria use the water to dissolve the food that they use for growth.  Not all bacteria need oxygen to grow however if they do it is called aerobic respiration and if the bacteria do not need oxygen it is called anaerobic respiration. Due to the warmth, the bacterium can reproduce at a high rate and spread throughout the body and contaminate. This means that if the conditions were colder, lower than body temperature, then the salmonella bacterium would not be able to reproduce and grow as quickly compared to in warm moist conditions. Types of Bacterium Transmission of salmonella occurs by it entering the body by the ingesting of contaminated food, this could be due to under cooked food or food poisoning from animals such as live stock. This is because the salmonella living in the intestines of the animal where it infects the insides which causes it is usually transmitted to humans through eating the contaminated food. Salmonella invades the bloodstream which means that the vital organs are venerable to the secretion of toxins. Animals can be affected by salmonella through the excretion of feaces and in the saliva and can cause fevers, the animal to lose their appetite, diarrhea and abdominal pain. Most animals are carriers of salmonella and are asymptomatic however they can become infected. The symptoms of salmonella include the animal having a fever, diarrhea, vomiting uncontrollably, being blood in its stool and lethargy. Salmonella can be treated by removing any contaminated food, giving the animal plenty of water do they do not become more dehydrated and giving them dry food to eat. Bordetella in animals is also known as kennel Bordetella can transmit in several ways which includes via famites, respiratory aerosol droplets and via direct contact. The pathogenesis is that the bacterium multiply and spread throughout the respiratory tract, this causes a release of toxins into the respiratory tract which can cause the cilia, which clears the mucus and dirt from the lungs, to paralyses, this means that the respiratory tract inflames so that there is interference with clearing the tract causing a buildup of dirt which influences the coughing. Some of the effects on an animal which has include a large amount of coughing, nasal discharge which is watery, retching and heaving and general discomfort. To treat Bordetella, antibiotics could be used as well as administrating cough suppressants to minimalize coughing which help the infected animal be more comfortable A virus is a biological agent that reproduces inside of cells of living hosts, viruses reproduce at a fast rate. Functions of the virus Genome: For gene transcription, translation and regulation of gene expression and protein interactions Capsid: protects the nucleic acid from digestive enzymes, allows the virus to attach to a host cell and provides proteins Capsome: outer covering of protein that protects the genetic material Nucleocapsid: Binds the proteins Growth and reproduction For a virus to grow it needs to be inside of a living cell and must have a host cell to survive so that it can replicate. Viruses by attaching itself to a specific host cell, where it then injects its genetic material into the host cell. This causes the host cell to use the genetic material to make new viruses which causes the host cell to split open which causes more viruses in the body which pass out into the bloodstream so that they spread quickly throughout the body. Most viruses transmit through touching and coming into contact with contaminated objects and possessions which already contain the virus, they also can be transmitted by coming into contact with a person or animal that has the virus. Finally, it can be transmitted by inhaling the virus which is in the air. Viruses thrive better in winter than summer because on the viruses outer covering (envelope) becomes a hard shield for the virus due to the cold temperatures turning the rubber like gel harder which makes it stronger so it is able to pass from animal to animal and person to person. However, in the summer, the envelope isn’t as solid as it liquefies and the protective gel starts to melt. This means that the virus is more exposed to getting treated and killed as the protective barrier isn’t working as efficiently which means that’s it cannot spread as easily. Types of virus Feline influenza This virus is an upper respiratory tract issue which takes over the cells and reproduces. This virus is extremely fatal to cats which have weaker immune systems such as kittens and older cats, this is because their immune systems is not fully developed or that it is growing older and not working as effectively. Feline influenza can be spread through the air, touching and contaminated equipment. This virus is very hard to treat as there are not many anti-viral vaccinations which work as efficiently, this means that the virus will most likely be in the felines system for the majority of its The feline can display many symptoms of feline influenza, some of which include sneezing more than usual, coughing a lot and having discharge from the eyes and nose. Some more symptoms include a high body temperature, loss of appetite, raspy or congested-sounding breathing, lethargy and generally subdued behavior. Canine parvovirus This type of virus spreads via direct nasal contact and through oral contact with infected animal feaces. It can also be transmitted through objects which may have been in contact with infected feaces such as the grass in a public area, bedding, food and water bowls. This virus can live for a very long time which makes it more dangerous, for example it can live in a public place for up to 6 months which enables it to grow and spread for a longer period of time. This virus attacks the cells in the body which divide at a rapid rate; this affects the intestines which mean they are unable to absorb the vital nutrients which are very important in their diets. This virus attacks the dog’s white blood cells when they are younger and as they have developing immune systems so this is fatal for them. Some of the symptoms of canine parvovirus include weight loss and anorexia, vomiting with a high fever, diarrhea and Cell wall: It has a semi-ridged wall for protection and it keeps its shape Nucleus: It is where the DNA is contained and has no certain structure. Ribosome: This is where protein synthesis occurs Cytoplasm: The jelly like substance which holds everything together in the cell Cell membrane: controls the movement of the cell and what does in and out. Mitochondria: the respiration in cells. Fungi can reproduce both asexually and sexually. During the asexual process, reproduction can happen by fragmentation which is the colonizing of organisms; it can also reproduce by budding which is when an out growth is developed which will grow. Finally, fungi can reproduce asexually by producing spores which are carried by the rain and wind and where they land in the ground is where the cell germinates. There are multiple types of fungi which all have different conditions for which they like to grow in, for example, some like to grow in warm and moist conditions as it is optimum temperatures in soil however some like to grow in cold places such as fridges and freezers. They grow at a PH of 4-5 which is acidic. Examples of fungi Microsporum canis This fungus reproduces asexually and it is a fungal disease which  the ring worm feeds on dead layers of skin which causes inflammation of the skin, hair loss and bumps across the body. This fungus is transmitted from animals to humans through contact with animal’s belongings and things they have come in contact with such as hair combs, bedding, water bowls and furniture. A major risk is coming into contact with the damaged skin cells, nails and hair. For the animal with this fungus, it can cause a lot of stress and discomfort as they are constantly scratching the skin to try to ease them but it makes it worse. To treat this fungus a special shampoo can be given which sooths he skin, cutting the hair may also be needed to eliminate any scratching which would make it worse This type of fungus is mainly found in places such as straw, grass, dust and most environmental substrate. This causes disease A parasite is an organism which lives on or in an organism of another species which is known as the host. Transmission of ticks occurs by the ticks using their legs to hold onto a substrate such as grass and leaves Part B There are some key parts which have functions in order for the immune system to respond and work well. These include; Lymph nodes act as a filter from harmful substances as they contain immune cells that help to fight infection in the body. In this filter, the bacteria and unwanted substances are trapped and destroyed by lymphocytes which are white blood cells. They are found throughout the body and some of the main places which they live in is in your neck, chest, underarms stomach and groin, you have hundreds of them across these places. In these places the lymph nodes can swell which indicates what the problem is in the body so they can treat the bacteria Tonsils are located at the back of your throat and their role is to prevent bacteria and viruses from entering the throat and body by producing white blood cells, this defensive is usually the first one to be activated. When a bacterium or a virus has been trapped by the tonsils, they usually swell up because they have been infected by the The spleen is located in the abdominal on the left side and has many roles in the immune system. One of which is to filter the blood and remove the old and damaged red blood cells so that the ones left are able to get through the capillaries successfully. The spleen also controls disease in the body and it does this by filtering the bacteria out and it also produces anti bodies which detect harmful substances. Bone marrow has the function of producing the three types of blood cells which are red blood cells, platelets, and most of the white blood cells. The yellow bone marrow produces fat, cartilage, and bone. Lymphocytes are also made inside our bone marrow which is an important part of the immune system. Thymus gland contains hormones and this is where the T-cells are made and developed to become mature so the pathogen can be attacked correctly. Types of immunity Innate means when you are born with something, this means that you already have it in your body and it is natural. This type of immunity is non-specific and can respond quickly because it doesn’t target specific pathogen which means it can start up quickly and prevent the spread of germs. In the innate immune system the main components include lymphocyte cell, plasma proteins, dendritic cells, phagocytic leukocytes and physical epithelial barriers. This type of immunity produces antigens in a short time period for the host which means that the pathogen is removed quicker these mechanisms include physical barriers such foreign cells in the body. This type of immunity does not provide long lasting immunity because it works quicker to get it done and the pathogen removed. Adaptive immunity Adaptive immunity is slower than innate immunity because it has to create memory cells so that if the foreign pathogen comes into contact with the body again, it is able to produce the memory cells to fight the pathogen without having to recreate another copy which is only short term whereas this type of immunity is more long term. However it does take longer to create but it is more effective. This immunity is more advanced because it is able to know the difference between the good cells and the enemy cells which are harmful to the body. This type of immunity contains advanced lymphatic cells. Natural passive This type of immunity is a maternal defense which is passed through to the baby via the placenta. The baby receives antibodies which help their immature immune systems develop and become stronger against any possible pathogens. There are no specific antibodies which the baby will receive; it is dependent on what vaccines the mother had which influences the antibodies being transferred. During the first 24 hours, the baby will also receive nutrients and vitamins from the colostrum which is vital for the growth and development of the infant. Natural active This type of immunity occurs when an individual comes into contact with a live pathogen, not through choice for example not through vaccinations where you are supplied with a weakened version of the pathogen. The B-cells produce anti-bodies to aid defending against the microbes. The cell mediated responses start to happen and this is when T-cells are activated which means they are able to recognize the cells which have been taken over by the virus and kill them. This type of immunity is when a person or animal is injected with antibodies from someone who has already been infected with a pathogen. This is a short term method, of around 2 weeks, because the immune system doesn’t become activated so no memory cells had been made which means that if you needed the response then it could be regularly administrated to receive the anti-bodies. This type of immunity is introducing a weakened version of a pathogen through immunization which is the process of developing immunity through being vaccinated. Once you have been vaccinated with the pathogen, the antigens cause a production of anti-bodies due to the immune system which had been stimulated by the foreign pathogen. Once the antibodies had been produced, memory cells were creates so that if there were another intake of pathogen, the body can react quicker as the memory cells would be used which makes it efficient. Also, by using the memory cells it prevents the development of symptoms as they work quickly. Key causes of There are different causes of diseases which have many factors which determine how they spread. For example not washing your hands after sneezing, this causes diseases to spread because everything that had been touched would be contaminated and as a result it could easily be passed on to people and animals. The responses of the immune system can influence the symptoms of diseases by limiting them and reducing the amount displayed. This is due to the production of antibodies which           Part C Categories: Articles I'm Garrett! Check it out
global_01_local_0_shard_00002368_processed.jsonl/64041
A new domain of life Plenty more bugs in the sea LIFE, like Caesar’s Gaul, is divided into three parts. The Linnaean system of classification, with its prescriptive hierarchy of species, genus, family, order, class, phylum and kingdom, ultimately lumps everything alive into one of three giant groups known as domains. The most familiar domain, though arguably not the most important to the Earth’s overall biosphere, is the eukaryotes. These are the animals, the plants, the fungi and also a host of single-celled creatures, all of which have complex cell nuclei divided into linear chromosomes. Then there are the bacteria—familiar as agents of disease, but actually ecologically crucial. Some feed on dead organic matter. Some oxidise minerals. And some photosynthesise, providing a significant fraction (around a quarter) of the world’s oxygen. Bacteria, rather than having complex nuclei, carry their genes on simple rings of DNA which float around inside their cells. The third great domain of life, the archaea, look, under a microscope, like bacteria. For that reason, their distinctiveness was recognised only in the 1970s. Their biochemistry, however, is very different from that of bacteria (they are, for example, the only organisms that give off methane as a waste product), and their separate history seems to stretch back billions of years. But is that it? Or are there other biological domains hiding in the shadows—missed, like the archaea were for so long, because biologists have been using the wrong tools to look? That is the question asked recently by Jonathan Eisen of the University of California, Davis, and his colleagues. They suspect there are, and in a paper just published in the Public Library of Science, they present an analysis which suggests there might indeed be at least one other, previously hidden, domain of life. What I did on my holidays The data from which this conclusion was drawn were collected between 2003 and 2007 on one of the most scientifically productive holidays in history. This was a round-the-world cruise taken by Craig Venter on his yacht, Sorcerer II, which studied the diversity of micro-organisms in the Atlantic, Pacific and Indian oceans. Dr Venter was working out his frustrations after having been fired in 2002 from Celera Genomics, a company he helped set up in 1998 with the specific aim of sequencing the human genome faster and better than the public Human Genome Project was managing at the time. In that, it succeeded. In the wider aim of turning such knowledge into hard cash, however, it was nowhere near as successful as its financial backers had hoped. Dr Venter therefore found himself with more time on his hands than he had been planning. His killer app in Celera’s assembly of the human genome was a technique called shotgun sequencing. This first shreds a genome into pieces small enough for sequencing machines to handle, then stitches the sequenced pieces back together by matching the overlaps using a computer. In principle, he realised, that trick could be used on mixed DNA from more than one organism. A good enough program would stitch together only fragments from the same type of creature. This would allow you to see what was living in a sample without having to culture anything. And since a huge majority of micro-organisms (by some estimates, 97%) cannot be cultured, that sounded like a great idea. Metagenomics, as the new technique is known, has vastly extended knowledge of what bugs live in the sea—and in many other places, from hot springs to animals’ guts. It is not perfect. In practice a lot of what emerges are fragments of genomes, rather than complete assemblies. But it has been enormously successful at identifying previously unknown individual genes. Dr Eisen wondered if it could be pushed still further. He started combing through the data from the cruise to look for new forms of genes that have, in the past, proved useful in distinguishing bacteria, archaea and eukaryotes from each other, to see if there are any other domains of life out there. After a false start pursuing what are known as ribosomal RNA genes—which are involved in protein synthesis and are believed by some people to be the genetic core around which the rest of life accreted—he lighted on two genes called RecA and RpoB. RecA is involved in DNA recombination. RpoB is involved in translating DNA into RNA. Both, like the genes for ribosomal RNA, are old and ubiquitous. And lo, when he drew trees that tracked the evolutionary relationships between all the RecAs and all the RpoBs found on the cruise, he discovered parts of the trees that did not fit with the pattern established by known versions of these genes in the public genetic databases. Some of these novel branches were, nevertheless, similar enough to known branches to be accounted for as known unknowns. But both RecA and RpoB had one branch that really was an unknown unknown. Neither of these branches fits in the existing tree of life. And that is a mystery. It may be that they belong to some as-yet-uncharacterised group of viruses (entities classified outside Linnaeus’s system, since there is no agreement about whether they are alive or not). Or it may be that they belong to a fourth domain of living organism. Either way, it suggests a profound lacuna in biologists’ understanding of the world. The question is, is it a big lacuna as well as a deep one? Is the new group an important part of the biosphere? That is hard to say at the moment. The genes concerned are rare in the overall metagenomic analysis, so creatures carrying them may not be abundant. On the other hand, those creatures might just be too small to be caught easily by the filters used to winnow life from water for analysis in the first place. As to importance, when originally identified as distinct, the archaea, too, were regarded as marginal—yet their methane-generating properties are now a factor in climate-change calculations. If the new domain is real, it must have been around for several billion years, and must thus have something going for it. What that something is remains to be seen. from the print edition | Science and Technology Autoria e outros dados (tags, etc)
global_01_local_0_shard_00002368_processed.jsonl/64042
XML Sitemap URLPriorityChange frequencyLast modified (GMT) https://ahcsa.org.au/100%Daily2019-01-25 03:50 https://ahcsa.org.au/sitemap.html50%Monthly2020-01-14 05:26
global_01_local_0_shard_00002368_processed.jsonl/64043
Tagged with AdvatEdge Surprise Billing Legislation is Gaining Traction with an Unknown Future for Physicians By David Nicholson, Executive Vice President Surprise medical bills occur when an insured patient unintentionally receives care from an out-of-network provider. And, according to a 2018 survey conducted by the University of Chicago, more than half of Americans (57%) have received at least one unexpected medical bill that they believed was covered by insurance. The topic of…
global_01_local_0_shard_00002368_processed.jsonl/64047
Wireless & Networking Product added! Cat-1 LTE & CAT-4 connectivity for 4G networks with 3G and 2G fallback in EMEA The WP7607-1 module is part of the WP Series offering a secure device-to-cloud architecture enabling IoT developers to build a Linux-based product on a single module – reducing overall system complexity and time-to-market. This LTE Cat-1 wireless module is ideal for low-bandwidth IoT applications that require real-time communication along with the longevity and network quality that 4G LTE networks bring. The WP7607 module is a LTE Cat-4 embedded module with 3G and 2G fallback delivers up to 150 Mbps download speed and is ideal for IoT applications requiring broadband connectivity such as industrial gateways, transportation, and mission-critical networking applications. Browse Wishlist • GNSS receiver enables tracking and location-based services • Ultra-low power mode reduces power consumption by 200x for battery or solar powered applications • Open hardware reference design from Project mangOH®, enables rapid prototyping with industrial-grade components to get you to market faster • Secure device-to-cloud architecture with AirVantage® pre-integrated into the Legato platform AirPrime WP-Series Yes, I agree to the privacy and cookie policy Yes, I want to submit Next step Previous step Next step Previous step
global_01_local_0_shard_00002368_processed.jsonl/64060
When we speak of the biblical sign gifts, we are referring to miracles like  speaking in tongues, visions, healing, raising the dead, and prophesying. There  is no question among believers whether or not they existed, for the Bible  plainly describes them. Where disagreement arises among believers is their  purpose, as well as the question of whether we should experience them today.  Some say that these gifts are a sign of one’s salvation, while others say they  are a sign of the baptism of the Holy Spirit, and yet others say their purpose  is to authenticate the message of the gospel. How can we know the truth? We must  search the Scriptures to find God’s purpose statements about these  things. One of the earliest references to sign gifts in the Bible is  found in Exodus 4, when Moses is being instructed by God about the impending  deliverance from Egypt. Moses worried that the people would not believe that God  sent him, so God gave him the signs of the rod becoming a snake and his hand  becoming leprous. God said these signs were “that they may believe that the  LORD, the God of their fathers, the God of Abraham, the God of Isaac, and the  God of Jacob, has appeared to you” (v. 5). If the people still did not believe,  God told Moses to take water from the Nile and pour it on the ground, where it  would turn to blood (v. 9). The purpose for the children of Israel was that they  would believe God’s messenger. God also gave Moses miraculous signs to  show Pharaoh, in order that he would let the people go. In Exodus 7:3-5, God told  Moses that He would multiply His signs and wonders in Egypt, so “the Egyptians  shall know that I am the LORD, when I stretch out my hand against Egypt and  bring out the people of Israel from among them.” God wanted the Egyptian people  to know that He was the one working to deliver the Israelites. In Exodus 10:7, Moses told Pharaoh that the final plague,  which would kill the firstborn, was to show that God distinguished between the  Egyptians and the Israelites. The signs and wonders confirmed God’s message to  Pharaoh and the Egyptians, so they would know that Moses was sent by  God. When Elijah confronted the false prophets on Mount Carmel (1 Kings  18), he prayed for God to miraculously send fire from heaven so the people would  know “you are God in Israel, and that I am your servant, and that I have done  all these things at your word….that this people may know that you, O LORD, are  God” (v. 36-37). The miracles he and the other prophets performed were a  confirmation that God had sent the prophets and that God was at work in Israel’s  midst. Joel was given a message of God’s judgment on Israel, and within  that message was a prophecy of mercy and hope. When the judgment came as  prophesied, and the people responded with repentance, God said that He would  then remove the judgments and restore His blessing: “You shall know that I am in  the midst of Israel, and that I am the LORD your God and there is none else. And  my people shall never again be put to shame” (Joel 2:27).  Immediately after that statement, God spoke about pouring His Spirit on the  people, so they would prophesy, see visions, and see wonders happening. When the  disciples began speaking in tongues on the day of Pentecost (Acts 2:1-21), Peter declared, “This is that which was  spoken by the prophet Joel.” What was the purpose? That the people would know  the message brought by Peter and the others was God’s message. Jesus’  ministry was accompanied by various signs and wonders. What was the purpose of  His miracles? In John  10:37-38, Jesus was responding to the Jews who wanted to stone Him for  blasphemy, and He said, “If I am not doing the works of my Father, then do not  believe me; but if I do them, even though you do not believe me, believe the  works, that you may know and understand that the Father is in me and I am in the  Father.” Just as in the Old Testament, the purpose of Jesus’ miracles was to  confirm God’s hand on His Messenger. When the Pharisees asked Jesus to  show them a sign, Jesus said, “An evil and adulterous generation seeks for a  sign, but no sign will be given to it except the sign of the prophet Jonah. For  just as Jonah was three days and three nights in the belly of the great fish, so  will the Son of Man be three days and three nights in the heart of the earth.  The men of Nineveh will rise up at the judgment with this generation and condemn  it, for they repented at the preaching of Jonah, and behold, something greater  than Jonah is here” (Matthew  12:39-41). Jesus was very clear that the purpose of a sign was so people  would acknowledge God’s message and respond accordingly. Likewise, in John 4:48, He told the nobleman, “Unless you see signs  and wonders, you will not believe.” The signs were a help to those who struggled  to believe, but the message of salvation in Christ was the focus. One thing that is often overlooked in discussions  about signs and miracles is the timing and placement of them in the Scriptures.  Contrary to popular belief, people in Bible times did not see miracles all the  time. In fact, the miracles of the Bible are generally grouped around special  events in God’s dealing with mankind. Israel’s deliverance from Egypt and  entrance into the Promised Land were accompanied by many miracles, but the  miracles faded away soon afterward. During the late kingdom years, when God was  about to place the people in exile, He allowed some of His prophets to do  miracles. When Jesus came to live among us, He did miracles, and in the early  ministry of the apostles, they did miracles, but outside of those times, we see  very few miracles or signs in the Bible. The vast majority of people who lived  in Bible times never saw signs and wonders with their own eyes. They had to live  by faith in what God had already revealed to them. In the early church,  the signs and wonders were primarily centered on the first presentation of the  gospel among various people groups. On the day of Pentecost, we read that there  were “Jews, devout men, out of every nation under heaven” gathered in Jerusalem  (Acts 2:5). It was to these  Jews, who had been raised in other lands and spoke those foreign languages (v.  6-11), that the sign of tongues was first given. They acknowledged that they  were hearing in their native tongues about the wonderful works of God, and Peter  told them that the only appropriate response was to repent of their sins (v.  38). When the gospel was first presented among the Samaritans, Philip did signs  and wonders (Acts  8:13). Again, when Peter was sent to Cornelius, a Gentile, God gave  a miraculous sign to confirm His work. “And the believers from among the  circumcised who had come with Peter were amazed, because the gift of the Holy  Spirit was poured out even on the Gentiles. For they were hearing them speaking  in tongues and extolling God” (Acts  10:45-46). When Peter was questioned by the other apostles, he gave this as  evidence of God’s leading, and the others “glorified God, saying, ‘Then to the  Gentiles also God has granted repentance that leads to life’” (Acts 11:18). In every instance, the sign gifts  were a confirmation of God’s message and messenger, in order that people might  hear and believe. Once the message was confirmed, the signs faded away. We  typically don’t need those signs to be repeated in our lives, but we do need to  receive the same gospel message.
global_01_local_0_shard_00002368_processed.jsonl/64081
Merge pull request #123 from apache/1.0.0-M1-quarkus Update release version of Quarkus to 1.0.0-M1 tree: 419086c99d9dced3b4b4d811e75dc5e75662fbb9 1. .dockerignore 2. .gitignore 3. .htmlvalidate.json 4. .yarn/ 5. .yarnrc 6. Dockerfile 7. Jenkinsfile 10. antora-ui-camel/ 11. archetypes/ 12. config.toml 13. content/ 14. extensions/ 15. gulpfile.js 16. layouts/ 17. menu.js 18. package.json 19. pom.xml 20. rules.js 21. site.yml 22. static/ 23. yarn.lock Apache Camel Website Logo This is a site generator project for Apache Camel. It generates static HTML and resources that are to be published. Tools used to generate the website: • Git a source code management tool used to fetch document sources from different github repositories. • Node.js a JavaScript runtime used to build the website. You will need to use Node.js version 10. • yarn a blazing fast dependency and package manager tool used to download and manage required libraries. • (installed via yarn) Gulp a task automation tool. Used to build the Camel Antora UI theme. • (installed via yarn) Hugo a static site generator. Simplified, it takes the documentation from the content directory and applies templates from layouts directory and together with any resources in static directory generates output in the public directory. • (installed via yarn) Antora a documentation site generator. It uses Asciidoc documents from different sources in the Camel, Camel K and Camel Quarkus repositories where user manual and component reference documentation resides and renders them for inclusion in this website. • (optional) Maven a build tool used to run the complete website generating process Build with Node and yarn You can build the website locally using the tools Node.js and yarn. If you can not use these tools on your local machine for some reason you can also build the website using Maven as described in section “Build with Maven”. Preparing the tools Make sure that you have Node.js (herein “Node”) installed. $ node --version If this command fails with an error, you do not have Node installed. This project requires the Node LTS version 10 (e.g., v10.15.3). Please make sure to have a suitable version of Node installed. You have several options to install Node on your machine. Note - If you have different Node version other than Node LTS version 10 you can use following command to make Node LTS version 10 as default Node version. $ nvm alias default 10 Now that you have Node 10 installed, you can proceed with checking the Yarn installation. Follow the documentation on installing Yarn for your Operating system. Clone and Initialize the project Clone the Apache Camel Website project using git: $ git clone The command above clones the Apache Camel Website project. After that you can switch to the new project directory on your filesystem. Build the Antora Camel UI theme First step is to build the Antora ui theme used for the Apache Camel website. The theme sources are located inside Project root directory/antora-ui-camel. So first switch to that directory: $ cd antora-ui-camel In that directory execute: $ yarn install # needed only once, or if dependencies change $ yarn build # to perform the ui theme build You should see the Antora theme bundle generated in in antora-ui-camel/build/ The Camel Antora UI theme should not be a subject to change very frequently. So you might execute this once and never come back. Build the website content Building the website requires the built Antora Camel UI theme bundle from above. Please check that the theme bundle exists in antora-ui-camel/build/ To build the website go to the project root directory and run: $ yarn install # needed only once, or if dependencies change $ yarn build # to perform the build This should fetch doc sources for Camel and Camel K and generate the website with Hugo. You should see the generated website in the public directory. Preview website locally You can preview the Apache Camel website on your local machine once you have the generated website available in the public directory. Hugo can start a simple web server serving the generated site content so you can view it in your favorite browser. Simply call $ yarn preview and you will be provided with a web server running the site on http://localhost:1313/ Point your favorite browser to http://localhost:1313/ and you will see the Apache Camel website. Contribute changes The Apache Camel website is composed of different sources. So where to add and contribute changes in particular? Changes on the website The site main menu is defined in the top level configuration config.toml. You can add/change menu items there. The basic website content is located in content. You can find several different directorys representing different areas of the website: • docs: Getting started, user manual, component reference • download: Download Camel artifacts • news: News, blogs, posts • community: Support, contributing, articles, etc. • projects: Subproject information (e.g. Camel K) • security: Security information and advisories • releases: Release notes Adding new security advisory content Use the security-advisory archetype to create a new markdown content file in content/security: $ yarn run hugo new --kind security-advisory security/CVE-YYYY-NNNNN # replace YYYY-NNNNN with the CVE number This will create a content/security/ file which you need to edit to and fill in the required parameters. The content of the created markdown file is added to the Notes section. Place the signed PGP advisory in plain text as content/security/CVE-YYYY-NNNNN.txt.asc. Make sure that you set the draft: false property to have the page published. Adding new release note Use the release-note archetype to create a new markdown content file in content/releases: $ yarn run hugo new --kind release-note releases/release-x.y.z # replace x.y.z with the release version This will create a content/ file which you need to edit to and fill in the required parameters. The content of the created markdown file is added to the New and Noteworth section. Layout and templates Layout related changes go into layout directory where you will find HTML templates that define the common layout of the different page categories including footer and header templates. Changes in Antora UI theme The Antora UI theme basically defines the look and feel of the website. You can find the theme sources within this repository in antora-ui-camel. You need to rebuild the Antora UI theme in order to see your changes reflected locally. Changes for Camel and Camel K docs The Apache Camel website includes documentation sources from other github repositories. Content sources are defined in site.yml. At the moment these sources are documentation sources form Camel and Camel K. These are basically the component reference docs and the Camel user manual. In case you want to change something here please go to the respective github repository and contribute your change there. Your changes in these repositories will automatically get visible on the website after a site rebuild. Build with Maven The project provides a simple way to build the website sources locally using the build tool Maven. The Maven build automatically downloads the tool binaries such as node and yarn for you. You do not need to install those tools on your host then. The binaries are added to the local project sources only and generate the website content. As the Maven build uses pinned versions of node and yarn that are tested to build the website you most likely avoid build errors due to incompatible versions of Node.js tooling installed on your machine. Preparing Maven Make sure that you have Maven installed. $ mvn --version If this command fails with an error, you do not have Maven installed. Please install Maven using your favorite package manager (like Homebrew) or from official Maven binaries Building from scratch When building everything from scratch the build executes following steps: • Download yarn and Node.js binaries to the local project • Load required libraries to the local project using yarn • Build the Antora Camel UI theme (antora-ui-camel) • Fetch the doc sources from Camel and Camel K github reporsitories • Build the website content using Hugo You can do all of this with one single command: $ mvn package The whole process takes up to five minutes (time to grab some coffee!) When the build is finished you should see the generated website in the public directory. Rebuild website When rebuilding the website you can optimize the build process as some of the steps are only required for a fresh build from scratch. You can skip the ui theme rendering (unless you have changes in the theme itself). $ mvn package -Dskip.theme This should save you some minutes in the build process. You can find the updated website content in the public directory. Clean build When rebuilding the website the process uses some cached content (e.g. the fetched doc sources for Camel and Camel K or the Antora ui theme). If you want to start from scratch for some reason you can simply add the clean operation to the build which removes all generated sources in the project first. $ mvn clean package Of course this then takes some more time than an optimized rebuild (time to grab another coffee!).
global_01_local_0_shard_00002368_processed.jsonl/64085
I've been having an issue with a program I use heavily every day, where it it acts like it is recovering from a crash even when it was quit properly and all files saved. The app is FontLab Studio, not that it should matter. What happens is that it loads all the files I've worked on recently, which can be several dozen, and even if I click out of them all, it happens several more times throughout the day. Or, something causes it to crash as I'm exiting these files so that I have to relaunch and it starts all over. What I've been doing to avoid this, is to run AppCleaner, the free uninstaller, and delete everything but the App itself and the license info. This works great, but given the frequency this is becoming necessary, I'd like to be able to create something I could access really fast, like an Applescript that I could put in my dock. Or an Automator service located in the contextual menu items. I don't know any Applescript, but I tried to make an Automator workflow. The first step, "Get Selected Finder Items." One has a static location, the second may change, I'm not sure. ~/Library/Saved Application State/com.fontlab.studio5.savedState The second step in the workflow is to move to the trash, and that's where it fails. I suspect because these require a password? If possible, it would be great if I could enter it once and it remember, otherwise, how I'll need it to prompt me to enter my passkey. I don't know the best way to do any of this. I just had another thought, though it may not work as it would require FontLab to be open at the time, would be to accomplish this with a Python script, because FontLab is partially built in python and can install third party scripts. I am open to whatever help anyone could offer. Thanks in advance! I do not have FontLab Studio installed however for the purpose of providing a solution to your situation, under OS X El Capitan 10.11.5, I did the following: • In a Terminal at /private/var/db/BootCaches, using sudo, mkdir and touch I created a directory named 34D6C504-2F5B-416F-9C91-0C9D019BF446 and in that directory a file named app.com.fontlab.studio5.playlist. • In Finder, in my Home folder's Library > Saved Application State folder, I duplicated a folder and renamed the copy to: "com.fontlab.studio5.savedState" In doing so this replicated the target locations and files with appropriate privileges to then test the following AppleScript application on. In Script Editor I used the following code to create the Reset FontLab Studio.app and saved it in the Applications folder of the Macintosh HD and then dragged it to the Dock so as to have it readily available to click on. do shell script "rm -r \"$HOME/Library/Saved Application State/com.fontlab.studio5.savedState\" /private/var/db/BootCaches/*/app.com.fontlab.studio5.playlist" with administrator privileges end try When I click on the Reset FontLab Studio Dock Tile it showed the password dialog box, as shown below, for me to type in my password. I typed in my password and pressed enter. That's it, the app did what it was programmed to do. Password Dialog Box • As this code is tested I'd suggest copying and pasting it as is into Script Editor and then saving it as an application of whatever name you desire. • $HOME is being used because ~ can/will at times error out in AppleScript and or Automator, depending on its specific use. Normally ~ is expanded to the value of Environment Variable of HOME and thus I typically use $HOME over ~ to avoid errors that it can/will generate at times. • The substitution of * for 34D6C504-2F5B-416F-9C91-0C9D019BF446 is intensional, so as to accommodate the possible name change. • The try command is used so as to avoid an error if you run the Reset FontLab Studio app again before the target files are recreated and or if one or the other doesn't exist, it still deletes the other. • /var is a symbolic link to /private/var however I prefer using the absolute path over the symlink in cases such as this. • The use of the rm command is inherently dangerous, especially when used with elevated privileges and or wildcards, so to that end make absolutely sure there are no typos in your command line and that the targets are the intended targets. This is why I tested my code before posting it. You can also preface the rm command with echo, e.g echo rm ... and then review the output in the Script Editor's Events/Results pane and then remove echo before saving the script. The image below it to show syntactical highlighting and to see the full command line of the do shell script command Script Editor window If you're the only user of the computer and you like not to have to type in your password when the Reset FontLab Studio app runs, then modify the do shell script command using the following syntax: do shell script "command" user name "me" password "mypassword" with administrator privileges do shell script "rm -r \"$HOME/Library/Saved Application State/com.fontlab.studio5.savedState\" /private/var/db/BootCaches/*/app.com.fontlab.studio5.playlist" user name "me" password "mypassword" with administrator privileges Note that when the script's code is saved the value of user name and password are saved in readable text within the application bundle's "main.script" binary file. So use this method at your own risk as it is considered to be a security risk storing user names and passwords that are stored in an unencrypted manner. • This is great thanks. I am sorry for the newbie questions. I know you said the asterisk was intentional, but I don't know enough about programming to know why/how it would accommodate the path change—not that I need to understand, I just want to confirm that I understood correct and that it will. Also I am the only user on my computer and I live alone but don't mind typing in my password with something quick and easy like this that I can run with a single click from the dock, especially for security. – Moscarda Jul 26 '16 at 1:29 • @Moscarda, Without getting into the technical details, essentially what happens is if the app.com.fontlab.studio5.playlist file exists in the path of /private/var/db/BootCaches/*/ where the * is any directory existing in the BootCache's directory that also contains the app.com.fontlab.studio5.playlist file, then the file is found and is deleted. The asterisk is a wildcard that can represent any number of characters (including zero, in other words, zero or more characters) and in this instance is perfectly harmless and is safe to use as is. – user3439894 Jul 26 '16 at 2:05 You must log in to answer this question. Not the answer you're looking for? Browse other questions tagged .
global_01_local_0_shard_00002368_processed.jsonl/64086
I've done some research to determine what indicators on the status screen indicate varying levels of connectivity between the Apple Watch and the iPhone. So I now understand that without the green "phone" icon on your status screen on the watch, your watch isn't connected (via Bluetooth) to your phone. What I have is: • iPhone XS Max -- two of them -- different iCloud accounts • Apple Watch Series 4 -- two of them -- each one is paired to one of the iPhones I got my new devices, restored them from iCloud backups (upgrading from iPhone 8 Pluses / Series 3 watches), and paired the watches to the phones. The initial pair resulted in a successful Bluetooth connection between the watches and the phones. Then, after some period of time, even without taking the phone out of range of the watch, the watch disconnected from bluetooth. The watches now fall back to WiFi. They are all on the same WiFi network as the phones, so they get a partial connection, but certain features like health data can't be transferred over WiFi, and also, far as I know, WiFi uses more battery on the watch than Bluetooth. Rebooting the phone/watch does not solve the problem. Toggling Bluetooth and Airplane Mode on both does not solve the problem. The watch can update network-connected features on widgets/complications using the WiFi connection, but things like watch face settings edited in the Watch App on the iPhone never get synced to the watch because it lacks a direct Bluetooth connection to an iPhone. It seems like there is a regression in connection reliability that is causing Watches and iPhones to stay disconnected from one another, persistently, after the first connection drops. This never occurred with my last-gen devices on iOS 11, but I am not sure if the problem is iOS 12 related or device related. But in either case, the problem is affecting two separate pairs of Watch/iPhone so it isn't just one device. Both watches and phones are not the exact same model: one's an iPhone XS Max 512GB black, the other is an iPhone XS Max 256GB silver. One watch is 44mm cellular and the other is 40mm wifi. How can I fix this problem? • I've had to do this a couple times on two different phones..starting to get concerned that there's something wrong with the watch. Every time I've set up the watch as new – Joe Sep 28 '18 at 2:38 For some reason, with the latest Apple devices, if you immediately pair your new Watch to your new phone on initial setup, the Bluetooth connection doesn't appear to "stick" beyond the initial connection. The first time your phone goes out of range of your watch, will permanently break the connection. Once you unpair and re-pair your watch to your phone, the connection will start working properly again. So you must pair your watch to your phone after your phone is completely set up, in order to get the connection to stay. Also, it will give you an Unpairing Error when you attempt to unpair from the phone side. You then have to completely factory reset your watch, then restore the watch from an iCloud backup when you re-pair it. This is the only way I've found to fix this problem, and so far the fix appears to be permanent. You must log in to answer this question. Not the answer you're looking for? Browse other questions tagged .
global_01_local_0_shard_00002368_processed.jsonl/64090
South Carolina All posts tagged South Carolina Flags, Fags, and Gun Control: Notes from the Histrionic States of America Published June 25, 2015 by April Fox When I was about 14, I decided that everything my mother did was designed with one purpose: to ruin my life. Liver for dinner? She was trying to either poison me or starve me to death. No talking on the phone until after my homework was done? She was obviously trying to destroy my social life and turn me into a 9th grade pariah, unable to enjoy the god-given right to hold the clunky cordless to my ear and talk for hours about how mean Mrs. Porter was and how fine Nikki Sixx looked in those leather pants. Forced to clean the bathroom? Clearly, the toxic fumes from the Comet Scrub were going to enter my brain through my pores and render me a vegetable, confined to a narrow bed with rails, sitting in my own filth while my mother scowled at me from across the room. She was an adversary on a level with Joan Crawford and what’s-her-name from the Flowers in the Attic series that my friends and I all loved back then. I was convinced of that. I screamed at her, I yelled, I cried, I slammed doors (until she took mine right off the hinges one day), and no doubt accused her multiple times of all manner of hyperbolic abuse. (Sorry, Mom.) Her response to these episodes was more often than not to roll her eyes and tell me to cool it with the histrionics. Cool it with the histrionics. Over the past few years, and especially in the past week or so, I’ve been struck by how many supposedly mature, adult Americans act like hormonal, entitled 14-year-old girls, screaming with outrage over imagined wrongs, and slamming doors on things like logic, and compassion, and rational thought. We need to take the doors off the fucking hinges, now. The other day, I posted a status update on Facebook. Here’s what it said: A flag does not make people kill people. Taking a flag away will not eradicate the racism (or I’m sorry, heritage, whatthefuckever) that it represents. But flying it over a government building and selling its image splashed across t-shirts and trucker caps and baby onesies is an overt endorsement of the “values” the flag represents. And I hate to break it to you folks, but if you’re more upset about the fact that Wal-mart isn’t selling Confederate flag merchandise anymore than you are about the fact that a young man, practically a child, shot and killed nine human beings as they sat seeking peace in a place that should have been their sanctuary, you are a prime example of why that scrap of cloth is representative of nothing good at all. There are a thousand other ways to display your pride in where you live and where you come from. If the only way you can think of to do so is to display a symbol of hate, I think that says it all. This was in response to seeing quite a few of my Facebook friends expressing anger that they could no longer buy confederate flag merchandise at their local Wal-mart. THEY CAN’T TAKE OUR FLAGS! I grew up in South Florida and then moved to Western North Carolina. I always knew the Confederate battle flag as the “rebel flag,” until I stuck one on my stereo speaker and my dad asked me what the hell that was, and gave me a quick history lesson. I know the history of the flag, and I know that when the civil rights movement started, people opposed to racial equality latched on to that thing with the force of a thousand angry toddlers at nap time, and they made it a symbol of their hate. I realize that to many people, it’s more a brand than anything, now: the Rebel Flag, Southern pride, showing off that you’re a “redneck,” a title that has become trendier and trendier in the past few years. It’s a fashion statement to many people, just like Abercrombie or Nike or peace signs or American flags. But still. People died because of what that flag represents to someone. If you want to show people that southerners are not all ugly ignorant racist pricks (and they’re not, far from it), show some compassion for the people who died. Show some concern for the children who are being raised to believe that that flag is a symbol of their racial superiority. Someone killed nine innocent people in the name of your precious flag, and your concern is that you can no longer buy the flag at Wal-mart? There might be something wrong with you. A few friends shared that status update. One person commented, “How did the flag kill anyone?” Seriously? That’s what you got out of all that? Another person asked–I’m not even kidding, here–“If they take away the confederate flag completely, what will they call our state? Our state is the Confederate State.” Well… Two things here, sweet pea. One, your state is the Palmetto State. Two, cool it with the histrionics. News flash: life is bigger than you. Life is bigger than your ideas–much, much bigger. We are teenagers stomping our feet and yelling about personal injustice any time something happens that we think is going to affect our right now. We are looking for ways, like fucking always, to make this about how life is unfair to us. It’s the same as the bullshit gay marriage debate: if the gays get married, then straights can’t marry and priests will self-combust and my god, think of the children, and-no. If the gays get married, then the gays get married. The end. For real, that’s it. That is honest to whatever god you worship THE. END. But it has to affect you, right? Everything does. It’s the same as the bullshit gun control debate. It’s great that Wal-mart is pulling Confederate flag merchandise, I guess, but are they ever going to stop selling guns? I could walk into that store right now and buy a gun easier than I can refill my kid’s allergy medication. And yet, all over the internet world, people are still screaming, Gun control is bad! They wanna take our guns! Ain’t nobody gettin’ my guns! Gun control does not mean that President Obama is going to walk into your house and steal your guns from you. It does not mean that your guns are going to magically disappear in the middle of the night and be replaced by Michael Franti cassette tapes and books about the power of positive thinking, okay? It does not mean that only the bad guys will have guns, despite what that attractive mustachioed older man in the Facebook meme would have you believe. It’s true, there is no way to ensure that the bad guys never get guns. It’s true, crime will always happen. Even if we did take every gun away from every person on the planet, people would still kill. But that doesn’t mean we need to gift wrap them and hand them out to every deranged asshole that asks for one. People drink and drive. People run over each other on purpose. People drive without the proper license. But we still do our best to try and make sure that people are educated about safety and how to operate a vehicle before we let them behind the wheel. We try to teach about the dangers of drunk driving and texting while driving and we make laws to try and inhibit those behaviors. We don’t freak the fuck out when it’s time to renew our license and run screaming out of the DMV about Omigod they wanna take my car! Only the bad guys will have cars! Gimme back my freedom! Cool it with the histrionics. Stop. Take a deep breath. Think about how your perceptions are shaped by and are shaping the world around you. You share this planet with more than 7 billion people. It is not all about you. It never was. %d bloggers like this:
global_01_local_0_shard_00002368_processed.jsonl/64096
Discipleship: Service – a small group study When we think about the spiritual disciplines, the discipline of service may be the easiest for us to visualize. In spite of this fact, the spirit of service can often go without enough consideration. The spiritual value in acts of service is very important for Christians to contemplate and understand, as it, in part, reveals the individual’s heart and life. Let’s discuss the profound example of service that Jesus gave us. Theme passage: Mark 10:35-45 1. When you go into a store or restaurant, what is a sign of “good service”? 2. What does it mean when we instruct someone to “practice what you preach”? 3. After reading the theme passage, why does Jesus use a servant to demonstrate a person considered to be worthy of greatness? How do you think this also describes a great person in our society? 4. Why does God link the themes of service and leadership, and how do you see them relate? Although the disciples did not want Jesus to wash their feet, he did it as a physical sign of service. How does Jesus serve us in our daily lives? Are there motivations in service that lessen or damage the service itself? Sometimes it is easier to serve people we know rather than strangers or people with whom we do not feel comfortable. Why is that? In verse 45 of Mark 10 we see the clearest statement regarding the saving grace of the Messiahship of Jesus. Why do you think this reference occurs in a passage instructing us to be a servant? Challenge for growth 1. As a group, plan a special community service project for the coming month. As you approach the project, cover all aspects of it in discussion and prayer. 2. Spend time in service of those we may not know well, or those we may naturally find it more difficult to serve. Materials used The Spirit of the Disciplines – Dallas Willard Celebration of Discipline – Richard Foster Author: Charles Albrecht Was this Article Helpful ?   Help us provide more content like this by giving today
global_01_local_0_shard_00002368_processed.jsonl/64108
Classic female! Or people pleaser. Or over achiever. You got this! Live in love and flow Michelle xxx Act As If Love and light, Michelle xx Recognising Lesson Cycles • Systematically, go through the list. Love and light, Michelle xx The Fear Rationale Fear. Procrastination inducer. Self saboteur ring leader. Keeper to the gates around ones heart. Anxiety generator. Instigator of blame. Projection master. Yet at key times; our closest ally. It is said we are only born with two types of fears. Fear of falling and fear of loud noises. If I am to break this down for you; have you ever felt you’ve been teetering on the brink of REM sleep and suddenly either with or without you remembering what triggers it you are suddenly jolted awake? It felt like you fell. Maybe you remember what was happening in your dream, maybe you don’t. But your unconscious is telling you it felt like you fell; OR have you ever jumped out of your skin at a loud noise? Even if you see all the events that lead up to the noise being created or you have experienced that noise before on multiple occasions yet it still startles you. I always found these experiences so intriguing. After the initial shock of it all that is. It feels so real. Like even though on one level you can rationalise the experience it FEELS SO REAL. So when I heard this explanation that resonated with me, my interest in this whole phenomenon of fear spiked. So two types of fear they say… You see it is thought by many in the spiritual and the scientific world that these fears are indeed innate. Encoded in our DNA. They exist in all human beings as survival mechanisms. The fear of falling is thought to stem from the experience of our soul dropping down into our body and trying to figure out exactly how to shift into this new state. From light to physical matter. Survival mode. As once in the human form, the act of falling from any great height challenges our very mortality. The fear of loud noises is also encoded as a survival technique. Loud noises can often signify or alert us to danger and the need for the sympathetic nervous system flight or flight to kick in. Take a read below. So think about this for a moment. All the other fears and phobias we experience as human beings are down to environmental conditioning. All of them. Every single thing outside of falling (or heights/skydiving/anything that results in possible falling) or loud noises is not a fear you have to just live with. It is not something you just have to accept as part of yourself and lose out on some valuable life experiences due to it. Now you may be saying I am ok with not going near spiders or snakes or doing public speaking. And that may be fine. Like any change things generally need to get uncomfortable in the status quo before we seek to alter it. But I am talking here more about the less discussed fears. The ones we don’t like to own up to. The ones we will do almost anything to avoid even acknowledging let alone working to dissolve them. Those buggers are the worst. Or are they? Depends, as always, on perception. This past month the Consciousness Coaches and myself have been set a challenge by our leader (ha didn’t mean that to sound extra terrestrial but we are all amazingly out of this world!;) It was called the FUCK FEAR CHALLENGE. Every single day for 30 days we were held accountable by ourselves and each other to post on our group page one fear we faced that day and any action we took around leaning into it. And let me tell you no word of a lie; it was one of the most PROFOUND things I have ever been a part of. Every single one of us made some massive shifts. We let go of things that no longer serve us. We acknowledged parts of ourselves we were ashamed of or scared of sharing out of fear of being rejected or unlovable. We faced financial survival fears. Attachment to material things. The desire for material things. Allowing in love. Being seen. Expressing around the notion of not being enough. Facing people who had done wrong by us. Boundary building. Workplace shifts. Standing up and holding our own space when we weren’t being respected. Speaking our truth to those close to us. Learning when to save our energy and just exit the situation. Learning to honour our bodies and our urges……The list goes on and on and on. The shifts were incredible and oh so freakin inspiring! And let me tell you they all come back to the environmental ideas we create that if we are not (*insert whatever you tell yourself here) we wont be loved, accepted, connected and hence part of the tribe. But the one thing we all agreed on at the end was how incredible the lens of fear can be. How crippling. How strong. But how wonderful it is too. It honestly became our friend. Without fear there is no motivation. No driving force. No incentive to change. No hope for a different outcome or future. Without fear there is no way that any of us would ever actually grow. We would all just be happy cruising along in our standard little lives never really experiencing all the things that life has to offer. Not truly LIVING! GROWING! EVOLVING! So next time you notice a fear come up in you, jot it down. Sit with it. What is it trying to protect you from? Some will be rational. Some irrational. But what is it truly masking? Because it is sitting in you as a catalyst for change. It is exciting. It is your future. And you can take it, acknowledge it and then pop it aside so you can step even more into your light every single time. The choice is all yours. Are you willing? Love and light, Michelle xxx
global_01_local_0_shard_00002368_processed.jsonl/64113
Adam D. Young Legal Answers in South Carolina Photo of Adam D. Young Will I Go To Jail For A Domestic Violence Charge in South Carolina? Facing a criminal charge is daunting. When such a charge stems from domestic violence, there is a possibility of Show More Sponsored answer by Adam D. Young Find Answers in South Carolina by Legal Issue Page Generated: 0.20145511627197 sec
global_01_local_0_shard_00002368_processed.jsonl/64140
Ayush Darpan ISSNN0.0976-3368 Health awareness across the globe…. Shatavari is considered to be the most helpful herb for women as it helps in balancing the female hormonal system. The main herbal rejuvenative for women, Shatavari nourishes and cleanses the blood and the female reproductive organs thus supporting the body’s natural fertility. It nourishes the womb and ovum and supports the female organs for pregnancy. It also promotes body’s natural lactation. Shatavari contains phyto-estrogens, the precursors of estrogen and is very useful for women who suffer from low natural estrogen levels as a result of menopause, hysterectomies or oophorectomies.In Sanskrit, Shatavari means “she who possesses a hundred husbands,” implying its ability to help support fertility and vitality. Its principle constituents include saponins, alkaloids, proteins, and tannins. The plant contains triterpene saponins called Shatavarin I-IV, which support the body’s own natural production of estrogen. Benefits of Shatavari:_ Shatavari supports reproductive health by toning and nourishing the female reproductive organs Shatavari maintains healthy hormonal balance Shatavari supports normal production of breast milk for nursing mothers Shatavari supports normal function of the immune and digestive system Shatavari also increases libido It is said that this wild asparagus is especially effective in preserving the beauty and vitality (ojas) of whoever consumes it, and thus has healing qualities for both men and women. However, Shatavari is mainly used due to its rejuvenative effect on the female genitalia. The plant contains saponins, which harmonize and stimulate the body’s hormone balance, which can be a vital support during menopause.Shatavari’s adaptogenic effect also bestows the strength to deal with times of extreme stress in one’s life. Copyright © 2019 Ayush Darpan | All rights reserved.
global_01_local_0_shard_00002368_processed.jsonl/64179
When is it alright for a married couple to separate? As we might not always support married couples to separate, the Bible does address the matter: “And unto the married I command, yet not I, but the Lord, Let not the wife depart from her husband: But and if she depart, let her remain unmarried or be reconciled to her husband: and let not the husband put away his wife” (1 Corinthians 7:10,11). The command of Jesus leaves no room for the many excuses for couples to separate that are accepted by the civil courts today, such as incompatibility, mental cruelty, and others of a more trivial nature. The Greek and Roman laws allowed separation of husband and wife for trifling reasons. The same was true also among the Jews (Matt. 5:32). This condition of society no doubt influenced the Christians to raise the question of the propriety of separation among believers. The answer is clearly stated; divorce is not in God’s perfect plan for humanity. God’s ideal is that we work out our problems and sustain our marriages. The only reason for which separation and divorce is permitted is adultery (Matt. 19:9). But if a person puts others in the family in a life threatening situation, couples are advised to separate. At that point, separation isn’t an option, it’s survival. In His service, BibleAsk Team You May Also Like
global_01_local_0_shard_00002368_processed.jsonl/64181
Video Tutorials Dive deeper into your journey in Bible journaling with video tutorials! Learn the application of color and techniques to create effects directly from the author. The videos below are a selection of her videos on YouTube; you can sort videos by the tags above the gallery, or click on any thumbnail to make it large and play the video. At right is a little lettering celebrating Bible Journaling Made Simple as a ministry tool in the author’s life! Page uses simple watercolor, and a brush! The author posts weekly videos on almost every Sunday – you can subscribe to her YouTube channel. Start watching today!
global_01_local_0_shard_00002368_processed.jsonl/64187
Vulture Awareness Day 2017 The first Saturday in September is International Vulture Awareness Day! There are 23 species of vultures in the world, and all of them form a vital link in the food chain. By cleaning up carcasses, vultures help break down nutrients to return to the soil, and can dramatically reduce the spread of disease. Featherless heads aren’t just a fashion statement! Bare skin is easier to keep clean, an important feature for animals that stick their beaks into carcasses all day. Vultures also have stomachs of steel in order to safely digest their food. In the United States, today is a day to celebrate the conservation success of the California Condor, which was extinct in the wild as little as 30 years ago, but now has a growing population of over 400 birds in California and Arizona. DSC_8563 copy The California Condor still has a long way to go, and many other species of vulture worldwide are endangered. These majestic birds need the help of humans who can appreciate the vital services they perform for our planet! You can learn more about international vulture conservation at the IVAD Website. Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/64190
Black Women in Robotics: Giving Birth to the Future • Save Afrofuturism is a kind of artistic expression that centers Blackness in the sphere of all things futuristic, using elements ranging from fantasy to magical realism to explore everything to do with the Diaspora. You can hear it in the music of Janelle Monae’s Archandroid and see it in a movie like Blade. The characters look familiar, though the times and technology are often far beyond our own. But the future is now, right? I’ve heard that all my life, and for years certain technological advancements have born out that concept. Even though we’re not whipping solar powered cars through the airways of major cities, we carry supercomputers in our pockets, and some of us hold them with 3D-printed hands controlled by our brains. So if the future is now, shouldn’t the same hold for Afrofuturism? Steve Jobs gave us the handheld computers of today, but who’s hard at work bringing us the tech of tomorrow? Enter the Spelbots. Founded in 2004 on the campus of the historically Black women’s college Spelman, this group of young women made history the very next year when they became the first all African-American undergraduate girls team to qualify and compete in the International RoboCup four-legged robot soccer competition. In just one year they went from not existing to competing on a national level. The Spelbots had to engineer robots that could perform in a soccer match against other robots designed by students from various institutions. The team was created by Dr. Andrew Williams to encourage students at Spelman to study robotics and mathematics. His idea has evolved into an important fixture at the college which now boasts a Spelbots Day, bringing K-12 students to the campus so they can engage with the humanoid robots, observe programming demonstrations, and simply receive encouragement and mentorship from young people who look like themselves. The affect of the Spelbots’ representation can not be understated, and is underscored by the fact that S.T.E.M. (science, technology, engineering, mathematics) studies are critical for navigating success in the tech industries of the future, yet each field shows a paucity of women and African Americans in its ranks. The Spelbots made history again when they tied for first place in 2009 at RoboCup Japan, so we know the girls are good. But what if they wanted to get better? What if they wanted to make their robots smarter. Well they might talk to someone like Ayanna Howard. What’s that? Who’s Ayanna Howard? Well, ever heard of the Mars rover? When Howard worked at NASA’s Jet Propulsion Lab she worked to design the next generation of rover, capable of independent processing and problem solving. That’s right. Ayanna Howard is developing A.I. But before she was designing machines that can think, she was a young girl inspired by advanced technology just like the Spelbots hope the youth they interact with will be. For Howard, her spark was The Bionic Woman. The popular sci-fi show of the 70’s starred Lindsay Wagner as a tennis pro who survived a skydiving accident and went on to receive artificial limbs that gave her super strength. Though Howard decided then, at 11 years old, that she would one day design similar limbs for people, her trajectory was altered when she learned about robotics and recalibrated her focus on engineering. In her 2013 TEDEd Talk she covered the range of subjects she studied in order to make smarter robots. Child psychology. Infant development. Neuroscience. It all played a part in upping the I.Q. of her creations. She states, “The best way to make robots smarter is to mimic people.” The ways we learn, the ways we interact, and the ways we create and solve problems are all important for her work. And while creating problems seems like the exact opposite of what we want our robots to do, robots need to be able to anticipate how a situation might go wrong in order to avoid that outcome. And the best ones have to do that 250 million miles away from earth. To prohibit her bots from creating any actual problems Howard incorporates Isaac Asimov’s Three Laws into their programming. These first appeared in Asimov’s short story “Runaround,” and later became popularized in the movie I, Robot based on his book of the same name. The laws assure that robots obey humans, not harm humans, and protect themselves unless it requires them to disobey either of the other two laws. So here’s a Black woman who grew up on sci-fi now developing Artificial Intelligence while borrowing programming parameters from a science fiction author. In considering the implications of making robots smarter and more capable, other elements of I, Robot-like sentience, consciousness, and freewill continue to spring to mind as they relate to robotics. The great thing about Afrofuturism is that it can deal with all of these subjects and do so with characters that represent people who have historically been excluded from these discussions, stories, films, and labs. We exist in the now, but also in theoretical futures. While Ayanna is helping to shape those futures, another is providing a model for it. BINA48 is an android created in the image of Bina Rothblatt, Compton native, UCLA graduate, and wife of Martine Rothblatt, a transwoman and founder of Sirius Satellite Radio. Bina co-founded the Terasem Movement Foundation along with her wife, created to research how human beings might transcend the limitations of humanity and mortality by downloading our consciousnesses into artificial bodies. No this is not the plot of a new Nalo Hopkinson novel. This is going on right now, in real life. Perhaps in your own back yard if you live in Vermont. That’s where BINA48 “lives.” And as a model of what might be, however unimaginable, a possible future lives in her. Like some Cylon-Mitochondrial Eve, BINA48 may hold within it future generations of a yet unknown species. Maybe a species designed by young women like the Spelbots. One given intelligence by someone like Ayanna Howard. Perhaps even modeled in the image of Bina Rothblatt, possessing a mind much like her own. A species that will correctly trace it’s roots back, as we all should, to a Black woman. Sound a little too Afrofuturistic? It should. Like the best sci-fi, like the best literature, Afrofuturism holds a mirror up to reader, the listener, and the viewer. Now more than ever, the reflection looks like us. • Save • Show Comments comment * • name * • email * • website *
global_01_local_0_shard_00002368_processed.jsonl/64208
Titles and Summaries 26 Sep Posted by on 09/26/2012 in forum, stories Tags: , 126 responses to “Titles and Summaries 1. rebellion77 05/31/2013 at 7:00 pm Ahhhhhhhhhh so mad dose anyone know how to make a story I just came with one thinking funny 2. Joanna Leigh 07/17/2013 at 1:04 am Love reading the stories on the Pinky and the Brain forum, but I have to admit I don’t have clue #1 how to upload stories onto the site. Please explain (in people speak) I’m technologically challenged. Thanks! 3. TalesofAdventLover 07/19/2013 at 1:52 pm I love this change although my chapters are usually lengthy unless it is fully about one character. Some of my longer ones for stories are, – When things go Bump in the Night – Channeling your Inner Power – Making Enemies (Wait I made a what?) Those three chapters are in a story I have on called Cross Examined. I suggest you check it out. 4. sarina 07/30/2013 at 12:58 pm hey there, I noticed that the site is deleting a lot of stories. Some stories they deleted were actually quite good. Will you guys please stop deleting stories? Or at least the M-rated ones. There are quite some good ones and it would be a shame if some of them got deleted. :S 5. mark 09/03/2013 at 4:36 pm Where is the naruto stories? 6. Dustubuni 09/19/2013 at 8:29 pm Hey, I was wondering if you could add ‘Martial Arts’ to the list of genres? Leave a Reply to Lorraine Cancel reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_0_shard_00002368_processed.jsonl/64217
10 Fun Facts About Magnus Carlsen Want to learn some new facts you might not know about World Champion Magnus Carlsen? Here are 10 fun facts about Magnus, which you may not have heard of before. 1. Magnus Carlsen guest starring on The Simpsons Photo credit: FOX On February 19 2017, Magnus appeared in the 15th episode of the 28th season of The Simpsons. The episode is named "The Cad and the Hat" and the plot centers around Homer realising that he is a Grandmaster and searching advice from Magnus Carlsen himself. 2. The REAL reason he started playing chess Photo credit: Arne Horvei When asked why he started playing chess, Magnus revealed that he started showing real interest in learning the game because he wanted to beat his elder sister. 3. Liv Tyler Photo credit: G-Star Back in 2010 Magnus, and Liv Tyler starred in a campaign together for the brand G-Star. Liv is the daughter of Steven Tyler and plays the role of Arwen in the movie "The Lord of the Rings". 4. The offical FIDE list Photo credit: David Llada It´s been more than nine years since Magnus reached the top of the FIDE list with an incredible rating of 2810. 5. Harvard University Photo credit: David Llada In 2013, before the World Chess Championship in India, Magnus stopped by the US to play against some of the world's best lawyers. But this was not a normal chess match: Magnus was going to play against them all at the same time, blindfolded. If you don't believe it, watch this video to see for yourself! https://www.youtube.com/watch?v=w1Rr4Uq1R-I (Remember to turn on English subtitles if you need them!). 6. Top 100 Photo credit: Arne Horvei In January 2006, when Magnus was just 15 years old, he reached the top 100 list of the world's best chess players. 7. A year off for chess Photo credit: Lennart Ootes After finishing primary school, Magnus took a year off so he could participate more in international chess tournaments in Europe. 8. World Championship titles Photo credit: David Llada Magnus currently holds 10 World Championship titles: Four classical, two rapid and four blitz. 9. Magnus´ highest rating Photo credit: Lisa Meiner In 2013, Magnus reached the highest FIDE rating in chess history! The rating was 2861, and it increased to 2282 in 2014. He still holds the highest rated FIDE score today in 2019. 10. Vegetarian? Photo credit: Lisa Meiner Magnus follows a mainly vegetarian diet, influenced by his vegetarian sisters.
global_01_local_0_shard_00002368_processed.jsonl/64219
Adoring the Surya Devta Posted on Updated on ||Om Surya Devam Namaste Stu Grihaanam Karoona Karam Arghyam Ch Falam Sanyukta Gandh Maalyaakshatai Yutam || Surya Dev or the Sun God is the highly revering deity in Hindu mythology. Being the head of all the nine planets, Surya dev has immense strength and he controls the life on earth. Blessed with heavenly powers he is portrayed as riding the chariot which is driven by 7 horses or 1 horse with 7 heads. The number seven defines the seven majestic colors of the rainbow, the seven seasons and also the seven chakras of the human body. Surya is widely worshipped by devotees, including the asuras or demons. Surya Devta is adored by the Saura sect, which worships him as one of the five main Gods. Yatudhanas, group of demons, were also the deep followers of Surya. Even the Greeks and Romans have special mention of Sun God in their ancient mythology. Significance of adoring Sun God: Sun is considered as the significator of health, profession and father in the Vedic Astrology. The light energy of the Sun is a natural remedy for the body ailments and boosts us with energy and positivity. Vitamin D from the Sun is a healthy source for stronger immune system and bones. While offering water to the Sun God in early morning hours, the sunlight gets refracted and reflected due to the thin layer of water which leads to the production of 7 forms of light that get absorbed by our body. Since our body has large surface area, the rays are absorbed through it, maximum by the chest. The Sun is the symbol of the Self-god. As the Self-god illuminates the mind, the intellect and the body, the Sun illuminates the world. Being the highest symbol of enlightenment the Surya devta bestows the devotee with knowledge and illuminates the dark lives of his devotees. To receive intellectual strength, health, fame, will power and courage, book your Surya Puja now: Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/64226
Google Blogoscoped DoubleClick's Past  (View post) JohnMu [PersonRank 10] Saturday, April 14, 2007 12 years ago4,250 views I like this company that belongs to DoubleClick: Google the SEO :-) (hat tip to Bill Slawski) James Xuan [PersonRank 10] 12 years ago # How competitive are Click 's rates does anybody know? Tadeusz Szewczyk [PersonRank 10] 12 years ago # History of DoubleClick in a sentence: Making huge profits by data collection and breaching privacy of users. Epic 2015 and Googlezon coming a huge step closer. Watch also Google Master Plan once again. Carmen [PersonRank 0] 12 years ago # Although very interesting, sometimes Phillip, I wish you could use a cut link when you have such a long post. That way people can quickly scan what's new when they're checking during short breaks. Philipp Lenssen [PersonRank 10] 12 years ago # Thanks, I'll have to think about this. Forum home
global_01_local_0_shard_00002368_processed.jsonl/64229
Sometimes I Listen With My Eyes Written by: on March 9, 2017 Reading this book brought a smile to my face because I realize the journey in this doctoral program has afforded me the opportunity to appreciate a well-written book, regardless of the denominational influences (or biases). Luhrmann introduces each reader to the world of the Vineyard Christian Fellowship, a denomination the author believes represents a shift in the American Imagination of God because “these Christians speak as if God interacts with them like a friend” (243, Kindle). However, readers like myself probably started reading cautiously to determine if some level of self-righteousness or arrogance is on the cusp of exposing itself. Personally, I thought Christians, in general, were ordinary people with maybe a little misguided reverential fear of God. The author continued by suggesting that the Vineyard is ‘arguably’ the most successful example of ‘New Paradigm Protestantism’ (254, Kindle). As you read with a cultural posture, the author is not promoting a denomination, rather, the idea that we should give care to our inner awareness. Christianity has a significant impact on culture, but the reverse is also true. The greatest challenge is in our posture when culture collides with Christianity. There was a moment where “in the mid-twentieth century, most social scientists thought spiritual faith would simply disappear” (pp. 301-302). However, the American culture that many criticize as losing Christian values has “enormous growth in belief in a personal God” (p. 301). Notice how I never said America was a Christian nation? Having a personal faith in any god, allows Christians to engage in a meaningful religious conversation. We all have our doubts in different areas, which also involves our spiritual journey and this is expressly the case with having unwavering faith. The author suggested that faith includes “a decision to live as if a set of claims are real, even when one doubts: in the Christian case, that the world is good; that love endures; that you should live your life as if the promise of joy were at least a possibility” (p. 112). This week in one of my family devotions, I asked both my boys to explain to me why they believed in God or even the idea of going to heaven. Our 19-year-old gave a religious answer about Jesus dying on the cross, but our 12-year-old son said, “I’m destined to go to heaven.” At that moment, I realized how far the church has shifted in how we want people to understand our faith. While I grew up horrified about going to hell, “each generation meets God in its own manner” (p. XV). What concerns me with the author’s findings, is that there is total reliance on “inner healing” and recognizing God’s voice primarily in an audible way. Yes, it is absolutely necessary to hear His voice, but sometimes God allows us to see His works as a response or confirmation. The children of Israel consistently saw God’s work through His miraculous works but mainly heard Him through the prophets. They would doubt God if His works were absent from reality. According to the author’s findings, God is not imagined as a person whom you have a conversation and that people should master the ‘skill’ of recognizing thoughts in our minds (p. 39). I grew up in an era where the church had “tarrying” (as we call it in Jamaica) and even “deliverance” services, but I still never understood why we couldn’t rely on God to respond immediately. We imagined God as a real person, which is why we waited at the altar for Him to respond. However, I’ve learned to understand that God doesn’t always speak in an audible voice that can be heard or even recognizing thoughts; I’m not sure I’d go to another “tarrying” service. When Moses used His rod, God was speaking to confirm His desire for Israel’s freedom. When we pray for someone’s healing, we don’t naturally look for a confirmation of God’s voice, rather, a confirmation of His works. Let’s be clear, God speaks to me constantly but not in the same way. Like many people, I see “scriptures not as texts of an ancient people, but as if the events had just happened, as if John the Baptist were a family friend” (p. 32). Since scriptures represent God’s words (highlighted in red), He is speaking, and my action (or response) could also reflect the other side of the conversation. Maybe I grew up in a mystical era where we bought the Bibles with Jesus’ words highlighted in red. Once we saw those highlighted words, the reverential fear kicked in to respond to His “written voice.” Why do we pray for healing? Is it because of His audible voice in our head or the written one? The author provided excellent insights in investigating the church’s (evangelical) relationship with God from an anthropological and psychological perspective to show that different faith or influences sees and hears God differently. One of many importance I find from the investigative work in this book is to listen intently to ensure that we hear God when He speaks back; communication flows both ways. Regardless of our religious tribe or our conviction of how people should listen, we should have “an intense desire to experience personally a God who is present now as when Christ walked among his followers in Galilee” (p. 13). About the Author Garfield Harvey Garfield O. Harvey devotes himself to studies in cultural intelligence (CQ), global leadership and cultural anthropology. During his doctoral studies at George Fox University, he developed CQ Worship to help ministry leaders manage the tension of leading corporate worship with cultural intelligence. His research on worship brings a fresh perspective that suggests corporate worship begins the moment a church engages a community. 6 responses to “Sometimes I Listen With My Eyes” 1. Kevin Norwood says: My first missions trip was to Jamaica and I believe I was a part of the two different services (tarrying and deliverance)that you are mentioning. It was quite a eye opener for a 16 year old. Do you believe that is still something for today? I like your integration of the voice of God being in your head and also the written word. I think where the church has had issues of the time I have been alive is when one or the other of these become the only way for God to communicate. He confirms his spoken word with the written in my opinion. This brings balance to this “alive” faith. How do you manage this in your tribe in Florida? • mm Garfield Harvey says: Thanks for the feedback. I believe tarrying and deliverance service is a cultural practice so it’s still acceptable in our worship. Is it necessary? Personally, I don’t need the extra hours in a service. Being a part of the Assemblies of God in the Fort Lauderdale area, well, let’s just say…anything is possible. The typical island church still have the 5 hour Sunday morning service before going back to a tarrying service until midnight. However, those who subscribe to an apostolic church also does the same thing. My home church does not practice this but some of the pastors I know have no problem with a five or six hour service. 2. mm Marc Andresen says: You wrote, “The children of Israel consistently saw God’s work through His miraculous works but mainly heard Him through the prophets. They would doubt God if His works were absent from reality.” Might the children of Israel heard God differently because they walked with God prior to the advent of the Holy Spirit? Is it possible or likely that we hear God differently now because we have the Holy Spirit? • mm Garfield Harvey says: Thanks for the feedback. It is possible that we hear God differently from the Children of Israel. Firstly, only a selected group of people heard from God directly, like the prophets. Secondly, they relied more on signs and wonders to confirm God’s existence. In our context, we have information (such as the Bible) to help guide if and how we hear God. They didn’t have access to all this information. Our culture also help to guide how we hear God because we tend to teach people signs to distinguish hearing God. 3. Interesting perspective Garfield. Thanks for the reminder that God speaks in many other ways than with his voice. Reading your blog makes me want to get outside and head to a garden. Leave a Reply
global_01_local_0_shard_00002368_processed.jsonl/64230
‘Honoring the Author of Our Story’ – Legacy of My Friend About seven or eight years ago I met Jim Steinfeld. If you know me, I like to keep people at a distance until I get a real feel for who they are and if they can be trusted. Jim was not like that. From the first moment that I met him he was “intrusive.” I do not mean “intrusive” in a bad way, really – he just always wanted to know your story. For example, even though we only knew each other peripherally he would ask me, “Robin, what is God doing in your life?” I know that seems like a fair question from one Christian to another, but not if you are familiar with male evangelical culture in America! You can talk about a lot of things together, but “What is God doing in your life?”  Come on, that is private! I do not think Jim thought of “public” versus “private” questions in adult community conversation. I came to think of Jim as a man on a mission. He had operated his family business for many years, Steinfeld’s Pickles, but when he sold the company and stepped out of the business world he dedicated his life to making a difference for Christ in the lives of others. He loved and was deeply passionate about many things – his wife, his family, the outdoors, his dogs (not all equal) – but he believed that God had placed him here to tell others about Christ and to help them develop in Christ one they had met him personally. He was consumed with telling the story of Jesus to others, and it was why he loved the organization of Young Life so much. Jim and I met once a month for coffee for almost four years. I would not say that those meetings were always comforting. Jim was not really a pastor as much as a mentor – a guy who would challenge you to grow in Christ and professionally. As one of his friends said at his memorial, “We loved this dude, but he was exhausting!” He always suggested to me that our purpose on this earth was to honor “the author” of our story. We were created uniquely to fill a gap in the heart of the universe that only we could fill. So when you met with Jim he wanted to know how you were honoring the author. He was not the kind of guy that accepted platitudes for answers, either. If you would not give a direct answer, he would just keep digging and digging until you had to give up what you were holding back. I got to tell you, that is frustrating. One of his favorite passages came from Romans 12: “Do not be conformed to this world, but be transformed through the renewal of your mind.” If you were not actively “renewing” your mind in Christ, Jim was going to challenge you to get there. Everyone needs a friend like Jim who won’t let you get away with just pretending to live a Christian life. I am sure all of you are familiar with the traditional question in American culture: “How are you doing?” Most of us do not answer that question honestly because we really do not think the other person wants to know how we are doing. The correct answer is “fine” or “great.” Jim, unfortunately, twisted the question just slightly to ask, “How is your soul doing?” Now that type of question is just not fair! You can deceive your friend, but if you answer that question wrong, you may as well be telling a lie to God! Jim pushed, probed and prodded. He wanted you to live each day fully honoring the author of your story. Almost two years ago now I was driving in Portland and I got a call on my phone from Jim. I do not answer directly every call that comes to my phone, but Jim’s I picked up. I could tell from his voice that something was wrong. He started by noting that he wanted to tell me something personally rather than have me hear it through e-mail or from someone else. I do not know if you have ever received that kind of phone call, but there is a silence that intrudes in the conversation that, although it only lasts seconds, it seems like a lifetime. Then, he calmly told me that he was in the hospital and had been diagnosed with Stage 4 brain cancer. Silence again. What do you say when a friend calls and tells you he may be dying? I think I muttered the words, “I am sorry” several times while holding back tears. I could not believe it. Jim is about as godly a man as I know and it just did not seem fair. From the moment Jim received his diagnosis he had a laser focus on making a difference for Jesus with every breath of life he had left. The tumor was inoperable, but he almost immediately began radiation treatments. I was headed to England for two weeks that summer, and just before I left I went over to visit and pray with Jim. Patsy greeted me at the door to their home in the West Hills and quietly warned me that Jim was not doing well. She took me into a first-floor room where he was laying on a bed. He had lost a great deal of weight, his hair was gone, he looked gaunt, and he could barely speak. He was obviously suffering. I talked to him for about an hour and he responded at times with a thumbs-up or thumbs-down but few words. I didn’t tell him at the time, but I had come to the conclusion that my friend would not be there when I returned from England. I prayed for healing with Jim because that was my heart’s desire. It is hard to lose real friends – the kind that pray with you and support you because they know who you are. Perhaps you’re not like me, but I do not always disclose too much to people. If they really discover that you are not as good as you look on the outside, will they still travel with you in life? If you do not know the answer to that question, why risk transparency? As you have already seen, with Jim there was no choice. You also found that in transparency your friendship was strengthened and the bonds of love grew. That kind of friend is hard to come by, and I thought for sure he was gone. I kept up the best I could on Jim’s condition while I was gone and when I returned, to my surprise, he was doing much better. We did not know if God had healed him, but he had certainly given him more time. Jim used every minute of it. He used the word “green light” to describe the nature of his conversations after he was diagnosed with cancer. He said, “When you have cancer, you always have a “green light” to tell people about Jesus and your story. No one will turn you down.” He turned every day and every minute into “green light” occasions. I will never forget the day he did our chapel in the fall of 2011. All of us can be critical of speakers in big venues; sometimes they communicate well and sometimes not. But the day Jim spoke, you could hear a pin drop almost the entire time. There is something about a transparent story that draws everyone into the speaker’s tale. Jim started his story that day by noting that he had been diagnosed with terminal brain cancer. At that moment everyone wants to know: Are you angry? How do you deal with your suffering? Why did God bring this on you? Although we all know that we will die some day, it always seems so distant and far away. When you have someone standing in front of you with a death sentence, you want to know: How are they dealing with that? He answered that question with a Scripture from the Psalms: “This is the day the Lord has made, let us rejoice and be glad.” Jim noted that God really only gives us one day at a time, and we are asked to live each day to the fullest for him. Most of us know that it is really not how long we live that counts but how well. Jim showed us how to live well. Each day he treated people well in spite of his suffering, he shared the love of Jesus, he talked about hope instead of death, and he met each day with optimism in the face of his death sentence. In my mind, it was the best chapel that I have heard in my 13 years at George Fox University. Last month Jim left this earth to move on to live with Jesus and all the saints that have come before. Thousands gathered to honor Jim and the author of his story. I will never forget the picture at the back of the Sunset Presbyterian sanctuary. Jim was standing on a forest road, arms held high and open – inviting the world in to hear the story of Jesus. The last time I saw Jim he could not see me. He was asleep on the first floor of his house. I miss Jim’s smile and his spirit. I miss his constant voice of hope in the midst of challenge. I miss his clear voice for Jesus. He once told me that when you think about your life, sit down and write your eulogy. Focus on what you want to be remembered for. Then live in that direction. It was his hope that we would all live to honor the author of our story. In memory of Jim, Robin Baker This entry was posted in Uncategorized. Bookmark the permalink. 3 Responses to ‘Honoring the Author of Our Story’ – Legacy of My Friend 1. Thank you for this Robin. May we never forget him. Jamie Steinfeld 2. Trevor S. Lewis says: Wow! What a great story you have shared with us. It makes me think of being that light to those that don’t know Him. What a wonderful legacy Jim has left those that knew him and to us to that never got to meet him. Thank you for being a good friend and showing us how we should be there for our family and friends. May God use this story to touch many more lives. Take care and may God Bless you and yours. Trevor Lewis Class of 1992 3. Mike Holzgang says: Thanks for articulating so clearly our friend’s legacy in his earlthly life. It has been several months now since Jim’s passing. As you know, Jim left a big void in my soul, but only for this short time in the “seen world”. He loved you and cherished the times he spent with you in your common mission at GFU. Blessings, m
global_01_local_0_shard_00002368_processed.jsonl/64254
Matrix Day One 7 months agoJuly 4, 2019 'Matrix day one' is a tribute opening title sequence. In the 20th anniversary since 'The Matrix' release, I created an opening title for the first film of the franchise, as a tribute to its creators and as a creative exercise for me. My work transitions into the original opening sequence around 1:40 min. I don't intend to profit from any of these creations. More about the project here: Your comment
global_01_local_0_shard_00002368_processed.jsonl/64261
Ch 03 Francesco Landini- "Behold, Spring" Which of the following would likely be found in a song in the courtly love tradition?A knight preforming heroic deed in honor of a lady. “Behold, Spring” is polyphonic because thetwo voices sing equally important lines. The melody of “Behold, Spring” is mostlysyllabic In what century did Landini live?the fourteenth Which famous poet lived at the same time and in the same city as Landini?Giovanni Boccaccio, author of the Decameron What is a ballata?A genre of secular songs in the Middle Ages with origins in dance. Landini was famous not only as a composer but also as anorganist and poet. A cadence isa stopping point, like the period at the end of a sentence. The Squarcialupi Codexis unusually elaborate for this time. How did polyphony originate in Europe?Monks began to add a second line to chants. The Squarcialupi Codex contains mostly what kind of music?Secular What is it called when different voices sing the same note?Unison What condition of Landini’s did not stop him from composing?Blindness In music, a “cadence” is equivalent to aperiod Polyphonic music tends to have more regular meter becauseit makes it easier for multiple voices to stay together. A “strophe” is another word forstanza What would it mean if the musical form of this piece were AABA?The third strophe would have different music than the other three. The Spuarcialupi Codex can best be described as agold leaf decorated manuscript created for a single wealthy individual. LTTE: What is the meter?triple LTTE: The contour of the melody is mostlyconjunct LTTE: Which section can be heard in this excerpt?A and B LTTE: In the word “primavera” (spring), on which syllable does the melisma fall?on “ma” LTTE: In the second half of this excerptthe music from the first half repeats exactly. LTTE: What can be heard at the points where the music pauses?The two voices are singing the same note.
global_01_local_0_shard_00002368_processed.jsonl/64264
XML Sitemap URLPriorityChange frequencyLast modified (GMT) https://brazosgop.org/update-from-chairman-dickey-march-2019/20%Monthly2019-04-10 14:13
global_01_local_0_shard_00002368_processed.jsonl/64268
A short game with many endings made with Miles Äijälä for the Failbetter game jam! Log in with itch.io to leave a comment. I am now a cat with a family of cats. 10/10 would recommend :) Cool concept but the button pressing is really unforgiving, sometimes  I push the right thing and it just doesn't register. I press the fucking buttons. Game says I didn't press the fucking buttons. It pisses me off. Ditto. Also, twich-puzzles really need to die a horrible, painful death. They add nothing and subtract everything one might possibly like in a game. This is not a "balance" or "tuning" issue. It's simply bad mechanics. This game has cats, witches, demons and lots of fire, so I'd like it even if it weren't good. Thankfully, a little bit of griping with the candle minigame aside, it was perfect. You can click on the arrows icon on the bottom-right corner to play in full screen! Hope it helps :3
global_01_local_0_shard_00002368_processed.jsonl/64274
The Lord is my light and my salvation; whom shall I fear? The Lord is the stronghold of my life; of whom shall I be afraid? Psalm 27:1 To whom and where else should we turn in times of stress? Surely our friends can help, especially those that are faithful followers. Surely, there are well-meaning associates who can provide well-intentioned advice. Surely, we are blessed to have these people in our lives. The words of God and the ways of God are always more certain and truer. They do not contain words or ways that please the world.  They are from our heavenly source and like a well-crafted arrow, true in its flight. By turning our hopes, dreams, and desires over to God we build a life that becomes a stronghold. A life resistant to the turmoil that can arise like a pounding storm. In this triumphant stronghold, we can have confidence and assurance that God is with us. Points of Reflection • To whom and where else should we turn in times of stress? • How often do we read the Bible to receive the words of God? • Who is our greatest confidant in life and why? Blessings, until next time, Bruce L. Hartman Photo by Ben White
global_01_local_0_shard_00002368_processed.jsonl/64275
Bryan's Blog Getting Thunderbird to auto-expunge emails Mozilla Thunderbird is a great email client, however there is one issue that it has by default that drives me nuts. I run an IMAP server for my email addresses. The IMAP server has a Roundcube web front-end for when I want to access my email from a machine that isn't mine. When working in Thunderbird, when I move an email from my INBOX to a folder (or from any folder to any other folder), Thunderbird doesn't expunge the emails from their source folders on the IMAP server; it's only when you close down Thunderbird that the folders get “compacted” and the change is seen on the server. What Thunderbird does do is simply mark the email as deleted and make a copy of it in the destination folder. This is fine behaviour, but if I have Thunderbird running at home (which I do all the time) and access my mail through Roundcube, I still see all of the deleted mails. However there is a way to get Thunderbird to automatically expunge when mails are moved, and here's how I got it to work. Open up the configuration editor by clicking on Edit > Preferences > Advanced > General > Config Editor, and set the following values: 1. Set mail.imap.expunge_option to 1 2. Set mail.imap.expunge_after_delete to True
global_01_local_0_shard_00002368_processed.jsonl/64280
Black and White, Ant or Less eastern carpenter ant on white, dorsal view The once and future studio, i.e. the vinyl window frame provides the white backdrop for this Eastern carpenter ant. I need a new category for my website, “Hard to Crop” (which if you say it with an exaggerated Boston accent, also would sum it up). I originally cut off the bottom legs, so I tried to snip off a piece of each leg and antennae to level off the frame. I kind of like it, but you be the judge. As was the case with my “studio” weevil, I found this placid ant on the white vinyl window frames of the house. It’s always good to take of advantage of a calm ant; you never know when you’re next one will come along. On the other side, i.e. the computer, I cleaned out the debris and tried to make the background uniformly white in GIMP. I had some trouble cleaning up the bluish color cast at the bottom around the shadows of the legs but removed most of it. It could use some fine work, but I’m letting this one go. Share your thoughts... You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/64284
Guatemala is not only ranked #8 among coffee producers, but coffee is also one of the best in the world. • As early as the 18th century, Spanish Jesuits brought the first coffee plants from Yemen to Guatemala. • In the 1850s and 1860s the coffee industry began to develop. • During the colonial period, the indigenous population of the Maya was expropriated and turned into “Colonos”. • They were still allowed to live in the land but had to work for it. • Unfortunately, some fincas still work today according to the colonial era. • However, the trend is clearly away from a few families controlling the cultivation, the ANACAFE (the national coffeeboard) – to local agricultural cooperatives, which are committed to the needs of small farmers. • At that time, as today, coffee is the country’s most important export product. • Areas of cultivation on 500 – 1,200 m are: Fraijanes, Antigua, Huehuetenango, Coban, San Marcos, Nuevo Oriente and Atitlan. • It is mainly Arabica beans planted, to a small extent Robusta varieties. • The quality class SHB (Strictly Hard Bean) gets coffees from high cultivation areas, where they grow slower and thus to a high-quality coffee with a fine aroma. • The coffee is mostly hand-picked and sun-dried. • The active volcanoes make the soil very fertile and give the coffee a very spicy aroma with a slightly smoky note. • The taste is balanced, the coffee has a full body and a very fine acidity. • Most Guatemalans brew rather weak coffee and drink it with lots of sugar. • For this, the coffee is simply boiled in a normal pot and then filled into cups. • The share of instant coffee grows in Guatemala – in 2015 it was already 8% of coffee consumption. A post shared by Bunaa ( on coffee-bean-1296803_640 Coffee Leave a Reply
global_01_local_0_shard_00002368_processed.jsonl/64291
Chapter 22: Neoteric AR Trends [Appreciating Asset Protection Strategies]  By David Edward Marcinko By Hope Rachel Hetico All physicians, clinics and medical practices are aware that accounts receivable (ARs) represent money that is owed to them, usually by a patient, insurance company, health maintenance organization (HMO), Medicare, Medicaid, or other third party payer. In the reimbursement climate that exists today, it is not unusual for ARs to represent 75% of a doctor’s investments in current assets [cash, etc]. ARs are a major source of cash flow, and cash flow is the life-blood of any medical practice. It pays bills, meets office payroll, and satisfies operational obligations. A feature of ARs in medical practice that differentiates them from ARs in other types of business is that they are often settled for less than the billed amounts. These allowances include four categories that are used to restate ARs to realizable expected values: 1. professional or courtesy allowances; 2. charity (pro bono care) allowances; 3. doubtful account allowances; and 4. HMO and managed care organization (MCO) contractual and prospective payment allowances.  More here: ORDER: Dictionary of Health Economics and Finance: 4 thoughts on “Chapter 22: Neoteric AR Trends St. James Medical Clinic has $500,000 in ARs from a third-party payor that historically pays 96% of the claims in 60 days, denying the remaining 4%. A benefits company has offered the clinic $475,000 for the ARs. If St. James can earn 6% on excess cash, should it sell these ARS? Considering the tools and techniques reflected in this section, what factors should the St. James Clinic consider in making its decision? 1) What is the actual cost? 2) What is the benefit? 3) On what grounds could you argue that selling would be a sound financial move? 1. Professional skateboarding is beujses of a craze, particularly for the particular kids. Research conducted recently estimated that 14 trillion individuals across the world is associated with professional skateboarding, and more than 1-next off skate boarders usually are 16 years old or even younger. Skateboarding can be technically understood to be a task where one particular interacts using a skate board. Some sort of skateboard is really a podium together with trolley wheels which has been in the first place conceptualized throughout the 1950s where skateboarding grew to be a new activity for users in the event the waves within the oceans ended up lacking. Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/64317
'medical OR assistant OR f OR buckeye OR with OR 1k OR sign OR on OR bonus OR STATECODE:"AZ"' Jobs | ACMG Employment Resource Center Skip to main content Career Center Help is on the way! We're sorry you are having trouble applying for this job. Powered By Naylor Association Solutions
global_01_local_0_shard_00002368_processed.jsonl/64350
Considering liquid anhydrous sodium hypochlorite: $$\ce{NaClO (l)}$$ Assuming the ions are free, What would be produced if this were electrolysed? As I've found lots of information for it's hydrated pair (a.k.a. bleach). And while I know the half equation for sodium: $$\ce{Na+ + e- -> Na}$$ I cannot find any half equation for the hypochlorite ion: $\ce{ClO-}$, apart from in acid, or even what would be the product (maybe $\ce{Cl2O}$ or $\ce{Cl2O2}$?) Obviously, sodium does not have a choice other than getting reduced. Oxidising it to sodium(II) is not an easy feat considering that the electron would have to be extracted from a core orbital. That means, the hypochlorite must be oxidised. Usually, an oxidation of hypochlorite will yield chlorate, $\ce{ClO3-}$. If we attempt to form a redox half-reaction out of that, we can only use $\ce{ClO-}$ as a charge balancing agent: $$\begin{align}\ce{ClO- \phantom{\ce{+ 4 ClO-}} &-> ClO3- + 4e-}\tag{Ox1}\\ \ce{ClO- + 4 ClO- &-> ClO3- + 4 e-}\tag{Ox2}\end{align}$$ If we do this, we have four extraneous chlorine atoms and two extraneous oxygen atoms. Thus, it makes most sense to do the mass balance by adding $\ce{Cl2O}$: $$\ce{ClO- + 4 ClO- -> ClO3- + 4 e- + 2 Cl2O}\tag{Ox3}$$ However, it will be difficult confirming this. Sodium hypochlorite is not stable, especially not at elevated temperatures, especially not in pure form, especially not anhydrous sodium hypochlorite (sensing a pattern?). You would need a certain amount of recklessness to attempt this and sufficient luck to be able to report the result. Which is possibly why I cannot find any scientific publication on the topic; so take the equation with two grains (or more) of salt. Your Answer
global_01_local_0_shard_00002368_processed.jsonl/64356
Just noticed that the tag is missing the the, that's kind of confusing, I don't think it's going to mess anyone up necessarily, but it looks weird. Also, could use synonyms with , , and (unless that overlaps another denomination's prayer book name, if it matters) I don't think it would make sense to have multiple tags for all these. • I think it is common practice to omit "the" and other articles from tags. I can't speak to the rest. But we have john-the-baptist and others, so I'm fine with a change. – 3961 Dec 17 '13 at 19:29 • I thought that when I asked the question I presume you're referring to! And yes, I think having breviary and divine-office as synonyms would be sensible. book-of-common-prayer would more normally refer to the Church of England prayer book rather than the LOTH. – lonesomeday Dec 17 '13 at 19:34 • @lonesomeday At your suggestion I have removed the tag synonym for book-of-common-prayer but left the other two intact. – Caleb Dec 20 '13 at 9:00 All better now. Some rambling to reach the character limit.... • What did you change? – Reinstate Monica - Goodbye SE Dec 20 '13 at 8:03 • 2 @Wikis Exactly what the question called for: adding 'the' to the tag and creating synonyms. – Caleb Dec 20 '13 at 8:59 You must log in to answer this question. Not the answer you're looking for? Browse other questions tagged .
global_01_local_0_shard_00002368_processed.jsonl/64358
Hot Porn Videos Asian cat girls milf dating in kangerlussuaqany women near nwokc in aomori Most Relevant Video Results: "asian cat girl" objects in anal holestrisha paytas nude titwife butt fucked by girlfriendgif alexis love pussy fucking Catgirl - Wikipedia Rachael is a passionate long-time anime fan, who enjoys writing about the storytelling aspect of anime, manga, and light novels. Ah, the cat girl. A staple of naughty harem series, and other than the tsundere, perhaps no character type comes as close to being a symbol for anime itself. Cat girls are a common character type, although they usually show up in light-hearted, comedic series. Thank you Felix from Re:Zero for breaking that particular mold. Early anime and manga were heavily inspired by early American cartoons, starting around the ss. Inspirations for anime and manga included Disney's animal-people, also known as funny animal, furry, or anthro cartoon characters; like Mickey Mouse, Donald Duck, and Oswald the Lucky Rabbit. cheap three wheel adult bikesblowjob nurse videosclub erotica canada What You Need to Know About Anime Cat-Girls fuck my wife in boulder asian style nipplesnudist men walk vidssex for the porn chat free in soc trangmolly rome beach threesome Catgirls are found in various fiction genres and in particular Japanese anime and manga. Enough of a subculture has developed for various themed conventions and events to be held around the world, such as Nekocon. Japanese philosopher Hiroki Azuma has stated that catgirl characteristics such as cat ears and feline speech patterns are examples of moe -elements. mallu aunty ass porn Video info Your comments (1) • Знакомства Kagasar wrote 29.06.2018, 16:01: #1 Comment on: asian cat girls верно!ЗнакомстваЗнакомства Porn Video Trending Now ЗнакомстваЗнакомствапринципе, согласен asian cat girlsЗнакомства
global_01_local_0_shard_00002368_processed.jsonl/64360
blame, late speeches, oratory The point of no return. Cicero’s ‘Philippics.’ 1. Copy of J. R. King (1878), The Philippic Orations of M. Tullius Cicero from BU Mugar Library. Annotated readers from May 1893 to April 1979. 2a. Modern depictions of Mark Antony: 3. Cicero, Philippics (1.14-15). Translated by Siobhán McElduff (2011). I feel great anguish that men who have enjoyed the greatest benefits the Roman people can grant did not support the leadership of Lucius Piso in his noble proposal. Did the Roman people elect us to the consulship so that, having been granted so high a position, we should consider the Republic as nothing? Not only did no ex-consul verbally support Piso, no one supported him even by a look. [15] For pity’s sake, what is this voluntary slavery? I admit you had to do something; I do not require that those who speak from the ex-consuls’ bench do as I am doing. Those whose silence I forgive are a different case from those I ask to speak out; I feel sorrow that the Roman people are beginning to think those men suspect, not because they were afraid to live up to their position (which itself would be shameful) but because they all did so for different and individual reasons. This is why I am expressing the immense gratitude I feel to Piso, a man who thought not about what he could do for the Republic, but what he personally ought to do. 4. Cicero, Philippics (1.38). Translated by Siobhán McElduff (2011). Members of the Senate, since I have reaped the rewards of my return, whatever misfortune I may encounter, I have said words which stand as testimony of my steadfastness and you have heard them with attentive kindness. And if the power to speak out frequently falls to my lot, without danger to you or me, I shall use it. If not, to the best of my ability, I shall hold myself in reserve for the Republic rather than for myself. It is enough for me that I have lived long enough for a decent lifespan and to achieve my own fame; if any extra time is granted, it will not have been granted so much to me as to you and the Republic. 5. Cicero, Philippics (2.7). Translated by Siobhán McElduff (2011). Why, the man even read out a letter, which he said that I sent to him, being completely unaware of civilized behaviour and ignorant of how people deal with each other. What man who was even marginally familiar with the way decent men behave ever made public and openly read out letters sent to him by a friend because there was now some quarrel between them? 6. Cicero, Philippics (2.10). Translated by Siobhán McElduff (2011). And even if he is in no sense a consul, either inhis life-style, his governing of the Republic or the way he was elected, I am without debate an ex-consul. 7. Cicero, Philippics (2.20). Translated by Siobhán McElduff (2011). See See Cicero’s poetry. And, dear gods, you even wished to be witty at one point, something which does not suit you. In this you should accept a certain amount of blame, for you could have acquired some wit from your mime-actress wife. ‘Let weapons yield to the toga.’ And? Surely they yielded then! But later the toga yielded to your weapons. Let us ask, therefore, whether it was better if weapons of criminals yielded to the freedom of the Roman people or our freedom to your weapons? But I shall not respond more to you about my poetry; I shall only say briefly that you do not understand it, or any literature at all. I have never failed the Republic or my friends, but in every genre of the writings I completed in odd scraps of time, I have worked so that what I wrote in hours while others slept would bring some praise to Rome and be something of use to our youth. But this is not the moment for that subject; let us look at more important subjects. 8. Cicero, Philippics (2.28-29). Translated by Siobhán McElduff (2011). Recall how that sharp man proved me guilty. ‘Right after Caesar was killed,’ he said, ‘Brutus, as he held high his bloody dagger cried out the name of Cicero and congratulated him that freedom had been restored.’ Why me in particular? Because I was in on it? Perhaps he named me because, having achieved something very like my past achievements, he wanted me in particular to witness that he had rivalled my fame. But you, since you are the stupidest man alive, do not understand that if (as you allege) it is an offence to have wished for Caesar’s killing, it is also an offence to have rejoiced at Caesar’s death. For what is the difference between someone who suggests something and someone who applauds it? What does it matter whether I wanted it done or am delighted that it was done? Is there anyone, with the exception of those who were happy that he was our king, who did not want it done or disapproved that it was done? Everyone is at fault then. Indeed, all decent men, as far as they could, killed Caesar; some may have lacked a plan, other courage, and still others the opportunity, but no one lacked the desire. 9a. Cicero, Philippics (2.63), cf. 2.50, 2.75, 84, 104; Fam. 12.2.1, 12.25.4. Translated by Siobhán McElduff (2011). But let me say no more about the activities of his more mature depravity; let me speak, rather, about the most excessive example of his lack of respect. That throat of yours, those lungs of yours, the whole body of yours with its gladiators’ strength, sucked down so much wine at Stud’s [Hippias’] wedding that you had to vomit it up in the sight of the Roman people the next day. What a revolting thing not just to see, but to hear about! If this had happened to you at a feast right in the middle of those famous giant drinks of yours, who would not have thought it disgusting? In a gathering of the Roman people, as he was dealing with public business, the master of the horse – for whom it would be disgusting even to belch – he filled his lap and the whole platform, vomiting wine mixed with chunks of putrid food! But he admits this himself, along with his other sins – so let us come to his more splendid activities. 9b. Plutarch, Life of Mark Antony (9.3-4). Translated by Thomas Browne (1920). 10. Cicero, Philippics (2.116-117). Translated by Siobhán McElduff (2011). What sort of life is it fearing your own followers day and night, unless you have men bound to you by greater favors than the men Caesar had bound to him—and some of them killed him? Or is it that you are to be compared to him somehow? That man had brilliance, calculation, memory, literary ability, carefulness, thoughtfulness, precision. He was successful in a war, which, although it was disastrous to the Republic, was still great; for many years he aimed to rule and he achieved what he had planned with great effort and great risks. He softened up the ignorant masses with games, buildings, gifts and feasts. He bound his followers to himself with rewards, his opponents with the appearance of clemency. Why go on? He brought to a free state acceptance of slavery, partly through fear, partly through familiarity. Although I can compare you to him in your lust for power, you cannot be compared to him in anything else. 11. Cicero, Philippics (2.119). Translated by Siobhán McElduff (2011). I would also freely offer up my person if my death would immediately bring back freedom to our state, so that the anguish of the Roman people would give birth to what it has been carrying within for along time. For, if almost twenty years ago I denied, in this very temple, that death could be premature for a man who had held the consulship, how much more truly will I deny it is premature for an old man. embers of the Senate, I should desire death after the political offices I have attained and the deeds I have done. I long for these two things only: one, that as I die i shall leave behind a free Roman people (there is nothing greater that the immortal gods can give to me); second that everyone will get his just rewards for his treatment of the Republic. history, oratory Cicero’s ‘Brutus.’ The history of oratory. 1a. M. Junius Brutus (85-42 BCE). In 54 BCE Brutus minted a coin depicting two of his ancestors: L. Junius Brutus, who expelled the kings from Rome, and Servilius Ahala, who killed Spurius Maelius in 439 BCE with dagger hidden under an armpit. RRC 433/2. Images: + Kathryn Tempest’s (@KathrynTempest) Brutus: The Noble Conspirator (2017) = highly recommended! for a stimulating reevaluation of Caesar’s assassin. 1b. On the idea that Cicero’s Brutus (46 BCE) provoked Brutus to kill Caesar (44 BCE)…: 2a. Cicero, Brutus (16). Translated by G. L. Hendrickson (1939): I am prepared to make payment of goodwill in full measure, but the debt itself I do not now seem able to pay and for this I ask your forbearance. I cannot undertake to repay you out of the new crop, as farmers do, for all new growth has been checked within me, and drought has burned and withered all that flowering which once promised abundance. Nor can I repay you from the garnered grain of my storehouse; it lies there in darkness and I who alone have the key find every approach to it cut off. I must therefore sow something in soil uncultivated and abandoned, and by careful cultivation make it possible to increase with interest the generosity of your gift; that is if my mind can respond as well as a field, which after lying fallow for many years generally yields a richer harvest. 2b. Sarah Culpepper Stroup, “Brutus: the dialogic personification of the Republican voice,” Catullus, Cicero, and a Society of Patrons (2010), p255: ‘In his stylization of Rome’s oratorical masters as the “ancestors” of Republican Eloquentia, Cicero transforms the abstracted silence of the Republican voice into a personal family tragedy — a tragedy for which he, as the eldest surviving son of the oratorical family, will deliver the eulogy.’ 3. Cicero, Brutus (57-59). Translated by G. L. Hendrickson (1939): But the first Roman concerning whom there is extant record of his eloquence, and evidence of his recognition for it, is Marcus Cornelius Cethegus [cos. 204 BCE]. The authority for this statement, and an adequate one I fancy, is Quintus Ennius, especially since he had heard him speak and writes of him after his death, so that no suspicion of distortion because of friendship can arise. The passage of Ennius, if I recall aright, is found in the ninth book of the Annals and runs as follows: To his colleague Tuditanus was added the orator Marcus Cornelius Cethegus, of the sweet-speaking tongue, son of Marcus. He calls him orator and adds the attribute of sweetness of speech, a thing you do not find nowadays in most of them—more barking in some than speaking; but what follows is certainly the greatest title to praise in eloquence: He used to be called by his fellows of that time, The men who then lived and passed their restless days, The choice flower of the people— and well said indeed; for as reason is the glory of man, so the lamp of reason is eloquence, for preeminence in which the men of that time did well to call such a man the flower of the people, the marrow of Persuasion. Πειθώ the Greek term, which it is the business of the orator to effect, Ennius calls Persuasion [Suada], the very marrow of which Cethegus was, he claims; so that of that goddess, which according to Eupolis [5th c. BCE playwright, Old Comedy] ever sat on the lips of Pericles, our orator was, he said, the very marrow. 4a. Cicero, Brutus (81-82). Translated by G. L. Hendrickson (1939): As for Quintus Metellus [cos. 143 BCE], whose four sons attained to consular rank, you are of course aware that he was esteemed one of the most eloquent men of his time. He spoke in behalf of Lucius Cotta against the indictment of him brought by Africanus. This and other of his orations are extant besides the one against Tiberius Gracchus, which is set forth in the Annals of Gaius Fannius. Lucius Cotta himself was esteemed a practised speaker, but of routine type. Gaius Laelius and Publius Africanus [cos. 147 BCE] however were in the first rank of orators; their speeches are extant, from which one may judge of their oratorical genius. But among all of these, preceding them a little in point of time, Servius Galba [cos. 144 BCE] stood out beyond question as pre-eminent in eloquence. And in fact of Latin orators he was the first to employ those resources which are the proper and legitimate functions of the orator—to digress from the business in hand for embellishment, to delight his listeners, to move them, to amplify his theme, to use pathos and general topics. But for whatever cause, though his pre-eminence in eloquence is well attested, his orations are more meagre and savour more of antiquity than those of Laelius or Scipio, or even of Cato himself. Their colours have become so much faded that they are scarcely still visible. 4b. Cicero, Brutus (93-94). Translated by G. L. Hendrickson (1939): They are satisfied with the renown they have, and judge that it will appear greater if their writings do not come into the hands of critics. Still others do not write because they are aware that they speak better than they write—the case frequently with men of unusual talent but insufficient training, like Galba. In his case it would seem that when he spoke, in addition to vigorous intellectual grasp, he was fired by a kind of innate emotion, which produced a style of speaking earnest, passionate, and vehement; then when he took up his pen at leisure and all that storm of emotion had subsided, his language lost its vigour. That would not happen naturally to those who follow a more concise style of speaking, because reason and judgement need not desert the orator at any time, and relying upon them he may write in the same manner as he speaks; but powerful emotion is not always present, and when it has subsided, all that force and fire of oratory goes out. This then is the reason why the mind of Laelius still breathes in his writings, the force of Galba has vanished. 5. Cicero, Brutus (62). Translated by G. L. Hendrickson (1939): Of these some are, to be sure, extant, which the families of the deceased have preserved as trophies of honour and for use on the death of a member of the same family, whether to recall the memory of past glories of their house, or to support their own claims to noble origins. Yet by these laudatory speeches our history has become quite distorted; for much is set down in them which never occurred, false triumphs, too large a number of consulships, false relationships and transitions of patricians to plebeian status, in that men of humbler birth professed that their blood blended with a noble family of the same name, though in fact quite alien to them; as if I, for example, should say that I was descended from Manius Tullius the patrician, who was consul with Servius Sulpicius ten years after the expulsion of the kings. 6. Catherine Steel, “Cicero’s Brutus: the end of oratory and the beginning of history?” BICS (2002), p203: ‘In general, then, Cicero seeks to eliminate content from his discussion, or at least the content of deliberative speeches, and to explain success in terms of technical skill. A similar avoidance of content can be seen in the discussion of specific popularis orators. Of the Gracchi, Tiberius is dealt with in 103-4, and Gaius in 125-126, and Cicero makes no secret of his admiration for the talent of both: his praise is strikingly warm. Tiberius had the potential to outstrip, along with his ally Carbo, all others in gloria, and Gaius is ‘a man who combined an outstanding intellect with passionate enthusiasm and a learned education which began in his childhood’ [Brut. 125]. But, at the same time, the uses to which they put their oratorical talents are condemned. In Tiberius, there is a negative link between talent and activity, implied through a wish for better things: ‘Would that the dispositions of Gaius Carbo and Tiberius Gracchus had been as inclined to do the state good as their intellects were inclined to good speaking . . .’ [Brut. 103]And in Gaius’ case too Cicero indicates his actual unsatisfactoriness through a wish: ‘Would that he had wanted to demonstrate his piety towards his country instead of to his brother!’ [Brut. 126] Yet there is no real discussion of the actions which Tiberius and Gaius took.’ 7. Cicero, Brutus (8-9). Translated by G. L. Hendrickson (1939): Thus, amidst other things far more deplorable, it was to me a peculiar sorrow, that after a career of conspicuous achievements, at an age when it was my right to take refuge in a harbour, not of indolence and sloth, but of honourable and well-ordered ease, when my oratory too had attained a certain ripeness and maturity of age,—it was, I say, a peculiar sorrow that at that moment resort was had to arms, which those who had learned to use them gloriously did not find a way to use them beneficently. Those men therefore appear to me to have lived fortunate and happy lives, in other states and especially in our own, whom fate permitted to enjoy to the end the authority acquired by the renown of their deeds, and the esteem earned by their wisdom. 8. Cicero, Brutus (45-46). Translated by G. L. Hendrickson (1939): This age therefore first produced at Athens an orator all but perfect. For the ambition to speak well does not arise when men are engaged in establishing government, nor occupied with the conduct of war, nor shackled and chained by the authority of kings. Upon peace and tranquillity eloquence attends as their ally, it is, one may say, the offspring of well-established civic order.a Thus Aristotle says that in Sicily, after the expulsion of tyrants, when after a long interval restitution of private property was sought by legal means, Corax and Tisias the Sicilians, with the acuteness and controversial habit of their people, first put together some theoretical precepts; that before them, while many had taken pains to speak with care and with orderly arrangement, no one had followed a definite method or art.
global_01_local_0_shard_00002368_processed.jsonl/64366
Certificate in Aging and Longevity Studies Certificate in Aging and Longevity Studies. 1. Internship Packet  --  click here  PDF.   (also available as a Word document) 2. Checklist to help you keep track of ALSP Certifcate requirements 1.   Certifcate checklist for undergraduate students 2.   Certificate checklist for graduate students 3.   Certificate checklist for NURSING students 4.    MINOR checklist for undergraduate students  5.   MINOR checklist  for NURSING undergraduate  students 6.      MSW- Social Work students specializing in Aging Course Requirements The Certificate in Aging requires 18 semester hours of approved aging-related courses.  View current courses offered in Aging and Longevity Studies Course Requirements Note Course Name Semester Hours Aging Matters:  Introduction to Gerontology (formerly: Basic Aspects of Aging).  This course introduces the student to the field of "aging studies" sometimes called "gerontology."  It is an overview course.  It is recommended that students take this class FIRST before taking other Aging & Longevity Studies Program courses. This course is a "General Education"  geared toward undergraduate students.     The course is available  on-line fall, spring and summer semesters, and in-person at least once per academic year. NOTE: Graduate students are strongly discouraged from enrolling in this class because it won't count toward your graduate degree.  Please contact the ASP director to learn about the alternate course available only for graduate students who are enrolled in the ASP certificate program.  3 s.h. Global Aging (on-line) with Associate Professor Mercedes Bern-Klug (2 minute video overview of Global Aging class) or Anthropology of Aging (in-person) with Assistant Professor Elana Buch. Usually one of these classes is offered at least once per academic year. 3 s.h. Psychology of Aging (available online with Patricia Elkington nurse/social worker). 3 s.h. Biology of Aging (available in-person generally in the fall, or online generally in the spring with Dr. Mark Holbrook). 3 s.h. *Taken after 9 s.h. minimum completed Internship and Seminar in Aging  (combined into one,  3-credit class) is only for students who are completing the Certificate in Aging and Longevity Studies. If your major requires a supervised field experience that provides a gerontological experience, we will consider accepting that experience as fulfilling this requirement toward the Aging and Longevity Studies Certificate. The internship and seminar is available in the fall and spring semesters; the student helps to design the experience. Special permission from the ASP director is required to enroll.  Completion of the core requirements is a pre (or co) requiste to being eligible to enroll in the Internship and Seminar.   (Please note--the seminar is mostly synchronous and on-line.) Click  HERE  for a 3 minute video about the INTERNSHIP Internship Packet  click HERE 3 sem hours Options for Aging and Longevity Studies Program electives change each semester.  When you registerm, look for classses under the headning: ASP. 3 s.h.   18 hours  A grade point average of at least 2.0 is required in all coursework applied toward the certificate and/or minor.
global_01_local_0_shard_00002368_processed.jsonl/64372
TY - JOUR T1 - Immunohistochemical Characteristics Defined by Tissue Microarray of Hereditary Breast Cancer Not Attributable to <strong><em>BRCA1</em></strong> or <strong><em>BRCA2</em></strong> Mutations JF - Clinical Cancer Research JO - Clin Cancer Res SP - 3606 LP - 3614 VL - 9 IS - 10 AU - Palacios, José AU - Honrado, Emiliano AU - Osorio, Ana AU - Cazorla, Alicia AU - Sarrió, David AU - Barroso, Alicia AU - Rodríguez, Sandra AU - Cigudosa, Juan C. AU - Diez, Orland AU - Alonso, Carmen AU - Lerma, Enrique AU - Sánchez, Lydia AU - Rivas, Carmen AU - Benítez, Javier Y1 - 2003/09/01 UR - http://clincancerres.aacrjournals.org/content/9/10/3606.abstract N2 - Purpose: Most familial breast cancers are not associated with BRCA1 or BRCA2 germ-line mutations. Therefore, it is of major importance to define the morphological, immunohistochemical, and molecular features of this group of tumors to improve genetic testing and also gain further insight into the biological characteristics of tumors. Experimental Design: We evaluated the morphological characteristics of 37 tumors arising in women without BRCA1 or BRCA2 mutations, 20 tumors from BRCA1 mutation carriers, and 18 from BRCA2 mutation carriers, all of which were from index patients from breast cancer families. In addition, a tissue microarray was constructed with all tumoral samples to evaluate the immunohistochemical expression of a wide panel of antibodies (11 antibodies) and the amplification of HER-2 and c-MYC genes by fluorescence in situ hybridization. An age-matched group with 50 sporadic breast cancers as controls for non-BRCA1/2 was also included. Results: Non-BRCA1/2 infiltrating ductal carcinomas (IDCs) showed specific differences from BRCA1 tumors. They were of lower grade (1 and 2); more frequently estrogen receptor, progesterone receptor, BCL2 positive, and p53 negative; had a low proliferation rate (Ki-67 immunostaining &lt; 5%); and did not express P-cadherin. With respect to BRCA2 IDCs and control group, non-BRCA1/2 tumors were of lower grade and had a lower proliferation rate. No cases of HER-2 amplification and/or overexpression were observed except in the control group (∼20%). In contrast, c-MYC amplification was present in 18.2, 62.5, and 12.5% of BRCA1, BRCA2, and non-BRCA1/2 IDCs, respectively, and 31% in the control group. Conclusions: This study thus reveals distinct morphological and immunohistochemical features in non-BRCA1/2 and BRCA1 tumors, whereas BRCA2 tumors present characteristics intermediate between the two phenotypes. In addition, the study also demonstrates the usefulness of tissue microarray technology in the evaluation of the immunophenotypic features of hereditary breast cancer. ER -
global_01_local_0_shard_00002368_processed.jsonl/64377
You can watch this episode by subscribing to Cocoacasts Plus. Core Data Fundamentals Updating the Core Data Manager for Concurrency It's time to refactor the CoreDataManager class. Let me walk you through the changes we need to make. Don't worry, though, most of the implementation of the CoreDataManager class remains unchanged. Instant and Unlimited Access to 400+ Cocoacasts Tutorials $19 / month Pay Once a Month $8.25 / month (billed annually) Pay Once a Year and Save 56% Next Episode "Using a Better Core Data Stack"
global_01_local_0_shard_00002368_processed.jsonl/64379
U.S. Department of Health & Human Services NLM Digital Collections Search Constraints Start Over You searched for: Collections World War 2, 1939-1949 Remove constraint Collections: World War 2, 1939-1949 Languages English Remove constraint Languages: English Copyright Public domain Remove constraint Copyright: Public domain Genre Legislation Remove constraint Genre: Legislation Genre Congresses Remove constraint Genre: Congresses Number of results to display per page Search Results
global_01_local_0_shard_00002368_processed.jsonl/64423
Over the Cliff John Amato And Cenk Uygur On His New Book - Over The Cliff Crooks and Liars founder and my friend John Amato visited the set of The Young Turks this week to talk about John and David Neiwert's new book, Over the Cliff: How Obama's Election Drove the American Right Insane. John and Cenk discussed the
global_01_local_0_shard_00002368_processed.jsonl/64430
I'd like to know if there is a function $f$ from n-bit numbers to n-bit numbers that has the following characteristics: • $f$ should be bijective • Both $f$ and $f^{-1}$ should be calculable pretty fast • $f$ should return a number that has no significant correlation to its input. The rationale is this: I want to write a program that operates on data. Some information of the data is stored in a binary search tree where the search key is a symbol of an alphabet. With time, I add further symbols to the alphabet. New symbols simply get the next free number available. Hence, the tree will always have a small bias to smaller keys which causes more rebalancing than I think should be needed. My idea is to mangle the symbol numbers with $f$ such that they are widely spread over the whole range of $[0,2^{64}-1]$. Since the symbol numbers only matter during input and output which happens only once, applying such a function should not be too expensive. I thought about one iteration of the Xorshift random number generator, but I don't really know a way to undo it, although it should theoretically be possible. Does anybody know such a function? Is this a good idea? • 1 $\begingroup$ I'm not an expert, but perhaps you can use a pseudorandom permutation (see for example the Feistel cipher) $\endgroup$ – Vor Nov 14 '12 at 23:40 • $\begingroup$ If you are essentially computing a hash function, why not use hashing? $\endgroup$ – vonbrand Jan 28 '13 at 23:18 • $\begingroup$ @vonbrand Hashing is not reversible. See requirement number 2. $\endgroup$ – FUZxxl Jan 28 '13 at 23:31 • $\begingroup$ Why does it have to be reversible? What is wrong with making it reversible by lookup? $\endgroup$ – vonbrand Jan 29 '13 at 1:25 • 1 $\begingroup$ You can store (f(x),x) as keys. $\endgroup$ – adrianN Mar 5 '13 at 16:57 You can use Fibonacci hashing, namely $\qquad h_F(k) = k \cdot \frac{\sqrt{5} - 1}{2} - \left\lfloor k \cdot \frac{\sqrt{5} - 1}{2} \right\rfloor$. For $k=1,\dots,n$ you get $n$ pairwise-distinct numbers (about) evenly spread in $[0,1]$. By scaling to $[1..M]$ and rounding (down), you get about evenly spread numbers in that interval. For example, these are $h_F(1), \dots, h_F(200)$ scaled to $[0..10000]$ (left original sequence, right sorted): enter image description here This is an instance of what Knuth calls multiplicative hashing. For $w$ the computer's word size, $A$ some integer relatively prime to $w$ and $M$ the number of addresses needed, we use $\qquad h(k) = \left\lfloor M \left( \bigl( k \cdot \frac{A}{w}\bigr) \mod 1 \right) \right\rfloor$ as hashing function. The above follows with $A/w = \phi^{-1} = \frac{\sqrt{5}-1}{2}$ (make sure you can compute it with a sufficient precision). While this also works with any other irrational number besides $\phi^{-1}$, it is one of only two numbers that lead to the "most uniformly distributed" numbers. Find more in The Art of Computer Programming, Volume 3 by Donald Knuth (chapter 6.4 from page 513 in the second edition). In particular you'll find why the resulting numbers are pairwise distinct (at least if $n \ll M$) and how to compute the inverse function if you use natural $A$ and $w$ instead of $\phi^{-1}$. • 1 $\begingroup$ How to calculate $f^{-1}$ efficiently? $\endgroup$ – frafl Mar 5 '13 at 15:22 • 1 $\begingroup$ @frafl I hope my edit addresses your concern somewhat. It's clear, though, that these hashing techniques are nor particularly designed to be efficiently invertible. $\endgroup$ – Raphael Mar 5 '13 at 17:13 • $\begingroup$ Yes it does, I'll upvote it, however I would not recommend it as the accepted answer. $\endgroup$ – frafl Mar 6 '13 at 11:18 For $k$-bit inputs, this function works: $\mathrm{hash}(n) = (n \bmod 2^{\lceil\frac{k}{2}\rceil})\cdot 2^{\lceil\frac{k}{2}\rceil} + n \,\mathrm{div}\, 2^{\lceil\frac{k}{2}\rceil}$ This is reversible, in that $\mathrm{hash}(\mathrm{hash}(n)) = n$, and has non-sequential pairs $\{n,m\}, n < m$, where $\mathrm{hash}(m) < \mathrm{hash}(n)$. Beware that output and input may correlate, especially if your input is in $\{1,\dots,2^{\lceil\frac{k}{2}\rceil}-1\}$. Ref: Reversible hash function • $\begingroup$ This looks simple and nice. I'm going to test that one. $\endgroup$ – FUZxxl Jan 31 '13 at 8:03 • 1 $\begingroup$ 1. Depending on the input, it may produce heavy correlation (up to $1$ for Spearman's $\rho$) 2. This is for 32 bits, not for 64 bits 3. Could you please write this in a language-independent way? $\endgroup$ – frafl Mar 5 '13 at 15:19 • $\begingroup$ it's pretty clear! for 64-bit (0x00000000FFFFFFFF) and you should shift(<<) 32 bits. This function is simple, practical and fast enough in practice. $\endgroup$ – Reza Mar 5 '13 at 18:36 • 1 $\begingroup$ But why don't you use a permutation of the bits, that does not map every $x \in \{1,\dots,2^{32}-1\}$ to $2^{32}x$? As stated above this clearly violates the correlation condition demanded by the OP. $\endgroup$ – frafl Mar 6 '13 at 11:00 Your Answer
global_01_local_0_shard_00002368_processed.jsonl/64437
Theory and Computation Laser generated plasma is an area which is currently receiving much attention due to rapid advances in laser technology. From a theoretical point of view these are particularly interesting, as laser pulses generally deliver highly localized, strong electric and magnetic fields with short temporal duration. This leads to extremely non-thermal electron and ion distributions, and a large number of instabilities in the plasma and involving the laser. Non-thermal distributions are not limited to laser plasma scenarios however, but appear in fusion plasmas such as in tokamaks, food processing and astrophysical situations, to name a few. A non-thermal distribution means that a kinetic description is required, where the velocity distribution of particles is not averaged as in a fluid model. An additional problem that arises in laser plasma interactions is that often the interaction is with high-density plasma, such as in an interaction with a solid target. The localization of the heating means that there are areas of colder, denser plasma for which collisions are not negligible. Formulation of models that can properly and accurately describe electron transport and magnetic field generation under realistic laser–plasma conditions is a challenging task. There are a number of established processes for modeling kinetic effects in plasma. In particular, the particle-in-cell method is a very well established technique that models the particles as a number of larger `macroparticles’ each representing a large number of the fundamental particles. These are then temporally evolved by solving the Newton-Lorentz force law for each macroparticle. These have a finite size to reduce short-range interactions that would be unphysically significant otherwise. Although highly successful as a technique, the lack of collisional effects in the basic model and the large number of particles required to accurately model effects due to the shape of the distribution are limitations. PIC Simulation The physics of interaction of the intense laser pulse with plasma is very complex. It is common to use Particle-In- Cell (PIC) simulations, which track the motion of individual plasma particles (electron and ions) in surrounding electrostatic and magnetic fields. These simulations are typically very intense and time consuming, and are generally performed on computers with massively parallel processing capabilities. To study in detail the features of laser-plasma interaction observed in a laser wakefield acceleration experiment we performed 3D PIC simulations for the parameters close to the experimental conditions using the OSIRIS 2.0 framework [1]. These show the evolution of the laser pulse in plasma, electron injection, and the characteristics of electron acceleration observed in experiments. Fig. 2. The bubble formed in the wake of the HERCULES pulse, according to a 3D Particle-In-Cell simulation using the OSIRIS 2.0 framework [1]. Fig. 2 shows a snapshot of electron density from PIC simulations after the pulse has propagated about 100 microns in plasma. In this picture darker colors correspond to higher electron densities and the lighter ones to lower densities. One can see that plasma electrons are expelled from the axis by the relativistically intense laser pulse and form a bubble-like structure (or bare ion cavity) behind the pulse, with a longitudinal dimension close to the plasma wavelength, and a transverse dimension close to the laser focal spot size. This bubble is essentially devoid of electrons and moves through the background ion plasma with a speed close to the speed of light. Some of the background electrons streaming around the plasma bubble are pulled back to the laser axis behind the cavity. These electrons may be trapped and accumulated inside the bubble. They constantly gain momentum by propagating through the plasma and reach high energies in a monoenergetic electron bunch. Radiation Production We have developed an algorithm which uses a combination of numerical and analytic methods to integrate the Lienard-Wiechert fields, for arbitrary trajectories of many charged particles, to frequencies greatly exceeding the Nyquist frequency [2]. This means that the sampling rate to accurately reproduce a particular spectrum can be many orders of magnitude lower than the inverse of the Nyquist frequency and therefore faster to solve numerically. This algorithm is particularly relevant to calculations of radiation from betatron oscillations in laser wakefield accelerators and beam-laser interactions such as non-linear Thomson scattering , but the technique is applicable to numerous other areas of physics. Fig.1. The angularly resolved spectrum calculated for a 150 MeV beam colliding with the tightly focused HERCULES pulse. This technique has been coded into a particle tracking code using a 4th order Runge-Kutta integration of the covariant equation of motion including radiation reaction forces, known as Radampeltrac. Using this code we have recently demonstrated the effect of the interaction between laser field and electron beam on the spectrum of photons radiated from a plasma bubble [3] and has also been used in confirming an analytic formulation of the radiation spectrum from a plasma bubble [4]. Vlasov-Fokker-Planck simulation The Vlasov-Fokker-Planck (VFP) equation is a conservation equation in 6D phase-space, with a smooth electron distribution function f representing a statistical average of the particles within a differential volume element. It includes the effect of both the conservation of f in the presence of macroscopic electric, E, and magnetic, B, fields, and the small angle Coulomb deflections of the underlying inter-particle interactions. IMPACTA solves the cartesian expanded Vlasov-Fokker-Planck equation for the electrons using an implicit scheme, with non-linear terms treated by iteration of the matrix solution. The algorithm used for solving the matrix equation is a routine from the Portable, Extensible Toolkit for Scientific Computation (PETSc). Expansion of the distribution, which in IMPACT [5] is truncated after first order, has been extended to include second order (f2) terms. The code uses a two dimensional cartesian spatial geometry for the spatial grid. This is particularly relevant to magnetized plasma. Fig. 3. Magnetic fields generated by an anisotropic electron distribution in a ns high energy laser-plasma interaction [7]. The code uses an implicit finite difference algorithm to solve the components of the expanded Vlasov-Fokker-Planck equation, in addition to the Faraday and the Ampère-Maxwell equations for the fields. IMPACTA currently uses the Lorentz approximation (valid for high Z), whereby electron-electron (e-e) collisions are neglected in the equation for f1. The term for electron-ion (e-i) scattering is retained in all equations in the reduced form where it is ∝ 1/v3 . The neutralizing ion background is now mobile, via the hydrodynamic model used in [6], but including the effect of the full pressure tensor in updating the ion velocity. The inverse bremsstrahlung model has been extended to include f2 effects, and a Weibel damping term has also been optionally included. Absorption of laser energy is modeled using the extended version of Langdon’s operator. The codes IMPACTA and Radampeltrac were developed by members of the Center for Ultrafast Optical Science. The OSIRIS 2.0 framework for PIC simulation is developed and maintained by UCLA/USC/IST Portugal. 1. R. Fonseca et al., Lecture Notes in Computer Science (2002). 2. A. G. R. Thomas, Phys. Rev. ST-AB (2010). 3. A. G. R. Thomas and K. Krushelnick, Phys. Plasmas (209). 4. A. G. R. Thomas, Phys. Phys. Plasmas (2010). 5. R. J. Kingham and A. R. Bell, J. Comp. Phys. (2004). 6. C. P. Ridgers, R. J. Kingham and A. G. R. Thomas, Phys. Rev. Lett.  (2008). 7. A. G. R. Thomas, R. J. Kingham and C. P. Ridgers, New J. Phys. (2009).
global_01_local_0_shard_00002368_processed.jsonl/64443
How to Guides A Guide on How to Setup Netflix on PS4 Netflix streaming videos can be watched from locations outside the US. That is good news! You can access Netflix videos from a host of devices: Smart TV, PC, Smartphone, and even game consoles. This is probably user-friendly news! So, if you have a PS4 and an internet connection, you can setup Netflix on PS4; and it’s pretty easy. Moreover, your location shouldn’t cause you any worries. This is a step-by-step guide on how to setup Netflix on PS4: Subscribe with a DNS service provider If you reside outside the US, you will start by subscribing to a VPN or DNS service. Your best option is probably SmartDNS. A DNS service lets you get around geo-blocking restrictions placed by Netflix on viewers residing outside the US. You do not have to pay through your nose to obtain a DNS service our favorite is Unotelly, but if you cannot afford one, there are other free DNS services available, though you may not get the best of services from these. Obtain a Netflix Account Log on to Netflix and sign up to obtain a Netflix account. Obviously you will need to agree to the terms and conditions, to complete your registration. This might interest you; Netflix offers an option of initial free trial, so you can take advantage of that. You will need the account to access Netflix streaming videos after the installation. Set up your PS4 for Internet Connection Your PS4 has to be configured for internet connection. To do this, take the following steps: • Go to Settings and choose Network. • From the options, select Set up Internet Connection. • On the Set up Internet Connection window, choose Custom. • You will be prompted to select how you want to connect to network. Options are “Use Wi-Fi” or “Use a LAN Cable”. Choose any one applicable to your internet connection type. • This directs you to IP Address Settings. Choose Automatic. • Next is DHCP Host Name. Select “Do Not Specify”. • You will then be directed to DNS Settings DNS Settings This is where you set up your PS4 for the DNS service of your choice. We will assume SmartDNS. For your DNS settings, go along with the following steps: • Select Manual. You will then be asked to provide the Primary DNS and Secondary DNS addresses. • Enter the DNS numbers from your DNS service provider, using the format below: 234.234.23 for Primary DNS and for the Secondary DNS. As you may have guessed, the secondary DNS serves as a backup. Ensure that the correct digits are entered as your connection to the DNS server largely depends on this. • Select Next and check internet connection. • Restart your PS4 if the connection is OK. Get the Netflix App Netflix videos can be accessed from the Netflix website or the Netflix app. To setup Netflix on PS4, you will need to install the Netflix app. The app is available on PSN store and you can obtain it if you have a PSN account. You can create a new account if you do not have one. Remember to choose the US as your native country. Then download and install the app. Sign into Netflix Next, open the app and sign in to Netflix using the Netflix account you had earlier created. You should now know how to setup Netflix on PS4. If you encounter any difficulties, press “O” on your controller and choose View Account Information and Sign Out. Sign out and try signing in again. A second sign in attempt should get Netflix videos showing on your PS4. Leave a Comment
global_01_local_0_shard_00002368_processed.jsonl/64451
True Facts: Russians Caught Trying to Dox Racists and Hoaxing Immigrant Crime in Sweden! Andrew Anglin Daily Stormer August 12, 2019 Are there no depths to which the Russians will not sink in their mad drive for power? Two recent news stories, which are from reputable and truthful Jewish sources (God’s chosen news outlets), show that Russians are not only doxing racist white people for bullying minorities, but also hoaxing immigrant crimes in Sweden. NBC News: In October 2018, a cellphone video of a Brooklyn woman calling 911 to claim a 9-year-old black boy grabbed her rear went viral on social media, becoming one of a series of videos that activists and journalists seized upon as an example of the everyday racism faced by minorities in America. That woman became known as “Cornerstore Caroline.” Other individuals who became the subjects of similar stories would be known by nicknames such as “Basketball Becky” or “Taco Truck Tammy.” Now, Clemson University researchers have found those videos received instrumental early social media promotion from inauthentic accounts, some of which have since been removed by Twitter and linked by U.S. intelligence to Russia’s efforts to stoke racial tensions in America. The tweets by the suspicious accounts drew 50-90 percent of the initial retweets before the stories took off, an indication their content played a leading role in drumming up attention, according to the researchers’ pre-publication findings. “Fundamentally, what they’re trying to do is put a spotlight and rub salt in the wound of these divisive issues,” Linvill told NBC News, referring to the strategy of using social media to exacerbate racial tensions. The accounts reposted or tweeted the videos, framed the content as explicit discrimination, used emotionally loaded language, and employed calls to action, including encouraging people to publish the participants’ personal information — a strategy known as “doxxing.” Now, you might have heard that doxing racists is good. And that is true. However the Russians… the Russians are pure evil. And they only want to dox racists for their own purposes. We know this because we backtraced them. If you had any question as to how evil Russians truly are, check out this accurate news story about how all of the immigrant crime in Sweden is faked by Russians. New York Times: Johnny Castillo, a Peruvian-born neighborhood watchman in this district of Stockholm, still puzzles over the strange events that two years ago turned the central square of this predominantly immigrant community into a symbol of multiculturalism run amok. “You look at what’s happening last night in Sweden. Sweden! Who would believe this? Sweden!” Mr. Trump told supporters at a rally on Feb. 18, 2017. “They took in large numbers. They’re having problems like they never thought possible.” The president’s source: Fox News, which had excerpted a short film promoting a dystopian view of Sweden as a victim of its asylum policies, with immigrant neighborhoods crime-ridden “no-go zones.” “They wanted to show that President Trump is right about Sweden,” Mr. Castillo said, “that people coming to Europe are terrorists and want to disturb society.” Russia’s hand in all of this is largely hidden from view. But fingerprints abound. For instance, one writer for Samhallsnytt, who previously worked for the Sweden Democrats, was recently declined parliamentary press accreditation after the security police determined he had been in contact with Russian intelligence. Fria Tider is considered not only one of the most extreme sites, but also among the most Kremlin-friendly. It frequently swaps material with the Russian propaganda outlet Sputnik. The site is linked, via domain ownership records, to Granskning Sverige, called the Swedish “troll factory” for its efforts to entrap and embarrass mainstream journalists. Among its frequent targets: journalists who write negatively about Russia. There you have it, folks. Migrant crime in Sweden is being faked by Russian agents, who then post about it on the internet and try to make people believe that immigrants actually commit crimes. They’re trying to hurt the feelings and reputations of Jewish journalists out of pure Slavic malice. They’re working directly hand-in-glove with the orange overlord Trump, and a Swedish factory of trolls. This is all real life. It’s true information, straight from God’s chosen people. There is no escape from the Russian menace. Russians never sleep and they’re always right at your doorstep, ready to meddle in your democracy. Join the discussion at TGKBBS
global_01_local_0_shard_00002368_processed.jsonl/64471
Good morning Mindy: I did receive the new faucet head, and the Jado filter. As always, you are a consistent breath of “fresh air” in the business world. Your “attention to detail, and follow through” are core elements of a successful company. As an architect I can purchase products through many “sources”, but will continue to be a loyal client of DesignerBath primarily because of your support. —Dom DiGiorgio, Managing Principal, Boston Design Alliance By |2017-01-26T18:54:57+00:00January 26th, 2017|Professionals Testimonials|
global_01_local_0_shard_00002368_processed.jsonl/64475
Gmail API Overview The Gmail API is a RESTful API that can be used to access Gmail mailboxes and send mail. For most web applications (including mobile apps), the Gmail API is the best choice for authorized access to a user's Gmail data. The Gmail API gives you flexible, RESTful access to the user's inbox, with a natural interface to Threads, Messages, Labels, Drafts, History, and. Settings. From the modern language of your choice, your app can use the API to add Gmail features like: • Read messages from Gmail • Send email messages • Modify the labels applied to messages and threads • Search for specific messages and threads • Create filters to automatically label, forward, or archive messages All you need to use the Gmail API is the client library for your choice of language and an app that can authenticate as a Gmail user. Typical use cases The Gmail API can be used in a variety of different applications, including, typically: • Read-only mail extraction, indexing, and backup • Label management (add/remove labels) • Automated or programmatic message sending • Migrating email accounts from other providers • Set standardized email signatures for users in a domain How do I find out more? Use this documentation to start building a Gmail app today: API overview The Gmail API is a web service: it uses a RESTful API with a JSON payload. This section provides a general overview of the API features and their use. For detailed information on the API's resources and methods, refer to the Gmail API reference. Key resource types The Gmail API provides several resource types: Messages are immutable: they can only be created and deleted. No message properties can be changed other than the labels applied to a given message. Labels serve as the primary means of categorizing and organizing messages and threads. A label has a many-to-many relationship with messages and threads: a single message may have multiple labels applied to it and a single label may be applied to multiple messages or threads. Labels also come in two types: system and user. System labels, such as INBOX, TRASH, or SPAM, are internally created and cannot be created, deleted, or modified. However, some system labels, such as INBOX, can be applied to or removed from messages and threads. User labels can be added, deleted, or modified by the user or an application. Drafts represent unsent messages. The messages themselves cannot be modified once created, but the message contained within the draft may be replaced. Sending a draft automatically deletes the draft and creates a message with the SENT system label. History is a collection of recently modified messages in chronological order. While the history is intended as a lightweight method of synchronizing a client, it typically only contains records of changes within the past 30 days. In some cases, such as when a client becomes too out of date, the client should manually synchronize. Threads are collections of messages that represent a conversation. Like messages, threads may also have labels applied to them. However, unlike messages, threads cannot be created, only deleted. Messages can, however, be inserted into a thread. Settings control how features of Gmail behave for a user. Settings are available for POP and IMAP access, email forwarding, filters, vacation auto-response, send-as aliases, signatures, delegates, and language. Auth and the Gmail API Like other Google REST APIs, the Gmail API uses OAuth 2.0 to handle authentication and authorization. Your app will specify one or more scopes: strings which identify resources that it needs to access. These scopes are used together with a set of tokens to secure a user's access to resources. A scope represents a particular form of access to a single resource or to a group of resources, for example: • Read a message from Gmail ( • Change labels applied to a thread or message ( • Send a message on behalf of a user ( Although you can code the web service authorization calls explicitly, you normally should simplify your app by using the Google API client libraries available for many programming languages. For more about using auth with the Gmail API, see Authorizing Your App with Gmail. The Gmail API supports a number of fine-grained authorization scopes to allow only the level of access required. By requesting the minimum level of access required, users feel more confident granting access to their mailbox. Example use case Consider the following use case: printing out a page of threads for the currently authenticated user (for example, in a recent messages panel). To achieve this, your app would perform the following steps: 1. Authenticate as the user, using the scope. 2. Call the API method. GET<userId>/threads 3. Process the returned list of threads in your app. For actual example code, refer to the Quickstart for the language of your choice. Common uses This section provides a very high-level view of how some common use cases can be implemented. For more details, refer to the developer guides. Sending Gmail messages Emails are sent as base64url encoded strings within the raw property of a message. To create and send a message: 1. Create the email content in some convenient way, which may depend on the programming language you are using. 2. Create a base64url encoded string representation of that content. 3. Create a new message resource and set its raw property to the base64url string you just created. 4. Call messages.send to send the message. Fetching received emails Given the ID of an email, you can fetch the contents using the get method of the Users.messages resource. When you fetch a message, you can specify the payload format for the response. FULL (the default) format returns the entire parsed message in the payload field. MINIMAL format returns only the metadata such as identifiers and labels. RAW format returns the data as a base64url encoded string within the raw property. Mail change history Message changes are represented by History objects. The start_history_id property lets you set from what point you want changes returned. Some changes may affect more than one message and thus the history representing that change will contain multiple messages. Label management Labels applied to a thread are also applied to all messages within the thread. If a label is deleted, it is removed from all threads and messages it was applied to. The messageListVisibility property is used to determine if messages with this label show up in the messages list. Similarly, the labelListVisibility is used to determine if the label appears in the label list. You can use the messages.modify or threads.modify method to change the labels applied to messages or threads, respectively.
global_01_local_0_shard_00002368_processed.jsonl/64482
Off His Rockers is a 1992 Disney animated short film directed by Barry Cook (who would later go on to co-direct Mulan). It was originally released with Honey, I Blew Up the Kid (and appears on the LaserDisc release of the aforementioned film). This short was an experiment in having traditionally animated and computer-generated characters share the same environment, which would be later utilized in Aladdin. The short begins with a young boy playing a video game on the TV. Inside the closet, a rocking horse walks out, and tries to grab the boy's attention. However, he realizes that the boy's eyes are frozen solid onto the TV screen, and pays little heed to the horse's precense. When the horse bounces in front of the boy, but he ends up hitting the wall. Sadly, the vibration from the horse hitting the wall still odesn't affect him. When the horse stands himself back up, he realizes that one of the rocker's on his legs fell off. Because of this, he decides to remove his other rocker, with it flying onto the boy's head, but he still remains unfazed. When the horse fails to catch the boy's attention once again, he does a dance in from of him, where he purposely kicks the TV into the closet, which snaps the boy out of his hypnotized state. However, instead of being happy, the boy is actually upset. Thinking that the boy doesn't like him anymore, he sadly walks away to put his rockers back on. While doing so, the boy retrieves the TV, and plugs it back in. While tring to find his video game controller, he finds it in the closet. While walking over to grab it, he accidentally steps on a photograph of himself and hi rocking horse. Realizing how much the horse likes him, he immediately changes his mind. While the horse struggles to put his rockers back on, the boy aims his controller, and the horse assumes he's going to press the start button to begin playing, but instead, he hits the power button, turning the game off. The boy, dressed up in cowboy attire, smiles at the hosre, and gleefully jumps onto it. The horse begins to run around the house, and the boy lassos the doorknob to the front door, opening it, and running out the house. As they ride away, the scenery transitions to the wild west, ready to go on an adventure. • Until the advent of YouTube, the home video availability of this short film was rare as it only appeared on the LaserDisc release of the aforementioned film it was paired with (Honey, I Blew Up the Kid), and never appeared on VHS or DVD releases of Disney animated short film compilations. • The boy in this short would make a brief cameo (as part of a "Wanted" poster) in the Roger Rabbit short, Trail Mix-Up, which was released the following year in 1993 and was also directed by Barry Cook. Stream the best stories. Get Disney+
global_01_local_0_shard_00002368_processed.jsonl/64486
Reflection 354: Untying the Web of Sin When a person begins to lie, and forms a habit of this sort, they will eventually become entangled in a web of lies.  One lie leads to another and pretty soon they do not know how to break free of this web.  This is where you must offer mercy.  It’s very easy to be harsh toward someone who has clearly led themselves down the wrong path.  It’s easy to point the finger and rub in their sin.  But the Lord wants you to look at this person with love and help untangle them from the web they have woven.  This is done by being clear and direct about their errors, but also without judgment or harshness.  If they perceive you to be offering the truth with mercy, they may just accept your invitation to undo that which they have done.  This principle applies to many types of sins (See Diary #1712). Reflect upon anyone in your life who appears to be tangled in a web of sin and cannot get out.  Let your heart grow in mercy for this person, refraining from all judgment.  Love them, seek to bring them the humbling truth and do so gently but clearly so that they can be set free. Lord, sin binds us and causes much distress in life.  Give me the grace of a merciful heart so that I can be an instrument of freedom to those caught in a life of sin.  Give me the grace, dear Lord, to love them with Your perfect Heart of Mercy. Jesus, I trust in You. More Divine Mercy Reflections Daily Gospel Reflections Advent Resources Saint of the Day – December 21: Saint Peter Canisius, Priest and Doctor—Optional Memorial Share this:
global_01_local_0_shard_00002368_processed.jsonl/64487
Skip to main content Cisco Defense Orchestrator Shared ASA Network Policies Cisco Defense Orchestrator (CDO) finds identical network policies used by multiple ASAs and identifies them on the network policy page. If you have a shared network policy, you can change it once and distribute the change to the other devices on which it is shared. This keeps network policies consistent across devices. Shared Network Policy Attributes The network policy table identifies how many devices use a network policy. Any network policy indicating that it is used by more than one device is a shared policy. Find Shared Network Policies 1. Navigate Policies > ASA Policies. 2. In the filter pane, click Show All to clear any past filtering or search criteria from the page.  3. In the filter bar, expand Shared Policies and select Shared. 4. Enter keywords in the search bar to refine your search further. 5. Select your shared network policy from the network policy table.  Note: The filter and search criteria are not used in combination, you can only use one at a time. For example, if you filter by "Shared Policies" you will see all the shared policies. If you add a device name to the search, you will see all the network policies used by that device name whether the policies are shared or not.  Edit Shared Network Policies 1. Find the shared policies you want to edit. 2. Select the shared policy. CDO identifies which devices managed by CDO use that network policy. 3. In the details pane, click Edit Policy. 4. Edit the rules or rules in the policy.  5. Click Save. 6. Confirm the devices that will be affected by the change. 7. Open the Devices & Service page and notice that the devices are no longer synced. 8. Click Deploy Changes Manually... and follow the instructions presented to update the saved configuration on the ASA with your changes. Compare Shared Network Policies The purpose of comparing shared network policies is to find policies that have diverged slightly and realign them. If you have several policies that are almost the same, perhaps they have diverged and they should actually be the same.  After realigning network policies, CDO will recognize the policies as shared and when you change one, you will be able to distribute the changes to the other devices using that policy. 1. Find the shared policies you want to compare. 2. Click Compare compare_button.png. 3. Select two network policies to compare and click View Comparison. 4. Make note of the differences and click Done Comparing. 5. If you want to change one of the policies to align it with the other, select it from the network policies table and click Edit Policy in the details pane to edit it.
global_01_local_0_shard_00002368_processed.jsonl/64488
You can specify at most one DEFAULT string clause. XMLTable maps the result of an XQuery evaluation into relational rows and columns. You can query the result returned by the function as a virtual relational table using SQL. • The XMLNAMESPACES clause contains a set of XML namespace declarations. These declarations are referenced by the XQuery expression (the evaluated XQuery_string), which computes the row, and by the XPath expression in the PATH clause of XML_table_column, which computes the columns for the entire XMLTable function. If you want to use qualified names in the PATH expressions of the COLUMNS clause, then you need to specify the XMLNAMESPACES clause. • XQuery_string is a literal string. It is a complete XQuery expression and can include prolog declarations. The value of XQuery_string serves as input to the XMLTable function; it is this XQuery result that is decomposed and stored as relational data. • The expr in the XML_passing_clause is an expression returning an XMLType or an instance of a SQL scalar data type that is used as the context for evaluating the XQuery expression. You can specify only one expr in the PASSING clause without an identifier. The result of evaluating each expr is bound to the corresponding identifier in the XQuery_string. If any expr that is not followed by an AS clause, then the result of evaluating that expression is used as the context item for evaluating the XQuery_string. This clause supports only passing by value, not passing by reference. Therefore, the BY VALUE keywords are optional and are provided for semantic clarity. • The optional RETURNING SEQUENCE BY REF clause causes the result of the XQuery evaluation to be returned by reference. This allows you to refer to any part of the source data in the XML_table_column clause. If you omit this clause, then the result of the XQuery evaluation is returned by value. That is, a copy of the targeted nodes is returned instead of a reference to the actual nodes. In this case, you cannot refer to any data that is not in the returned copy in the XML_table_column clause. In particular, you cannot refer to data that precedes the targeted nodes in the source data. • The optional COLUMNS clause defines the columns of the virtual table to be created by XMLTable. • If you omit the COLUMNS clause, then XMLTable returns a row with a single XMLType pseudocolumn named COLUMN_VALUE. • FOR ORDINALITY specifies that column is to be a column of generated row numbers. There must be at most one FOR ORDINALITY clause. It is created as a NUMBER column. • For each resulting column except the FOR ORDINALITY column, you must specify the column data type, which can be XMLType or any other data type. If the column data type is XMLType, then specify the XMLTYPE clause. If you specify the optional (SEQUENCE) BY REF clause, then a reference to the source data targeted by the PATH expression is returned as the column content. Otherwise, column contains a copy of that targeted data. Returning the XMLType data by reference lets you specify other columns whose paths target nodes in the source data that are outside those targeted by the PATH expression for column. If the column data type is any other data type, then specify datatype. • The optional PATH clause specifies that the portion of the XQuery result that is addressed by XQuery expression string is to be used as the column content. If you omit PATH, then the XQuery expression column is assumed. For example: XMLTable(... COLUMNS xyz) is equivalent to XMLTable(... COLUMNS xyz PATH 'XYZ') You can use different PATH clauses to split the XQuery result into different virtual-table columns. • The optional DEFAULT clause specifies the value to use when the PATH expression results in an empty sequence. Its expr is an XQuery expression that is evaluated to produce the default value. See Also: The following example converts the result of applying the XQuery '/Warehouse' to each value in the warehouse_spec column of the warehouses table into a virtual relational table with columns Water and Rail: SELECT warehouse_name warehouse, warehouse2."Water", warehouse2."Rail" FROM warehouses, PASSING warehouses.warehouse_spec "Water" varchar2(6) PATH 'WaterAccess', "Rail" varchar2(6) PATH 'RailAccess') WAREHOUSE Water Rail Southlake, Texas Y N San Francisco Y N New Jersey N N Seattle, Washington N Y
global_01_local_0_shard_00002368_processed.jsonl/64493
Celebrations, Parties Candy Buffet Sneak Preview I have been working hard this past month gathering containers and creating signage for the Candy Buffet I am setting up for my brother-in-law’s wedding at the end of August.  With each new piece I acquire from the thrift store, I am becoming more and more excited to see (and taste) the final product!  Some of the things I am most excited about are the berry baskets to hold the berry shaped candies and the old fashioned candy stick holders made from small crates and mason jars 1 thought on “Candy Buffet Sneak Preview” Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/64500
Bernie Sanders Scorns Bible’s Population Mandate On Wednesday, Bernie Sanders scorned the Bible's population mandate to fill the earth.  As progressive politicians push the boundaries of taboo after taboo in their quest to build a “Sustainable” future, mainstream Americans are left wondering where they’re headed.  How morally-low can they go and what drives their thinking?  Sanders Declares War on Humanity For... Continue Reading → Blog at Up ↑
global_01_local_0_shard_00002368_processed.jsonl/64519
Spring Boot & Swagger UI DZone 's Guide to Spring Boot & Swagger UI · Java Zone · Free Resource I have not developed Spring web applications from scratch for one year and maybe this period of time will be even longer if I was not involved in training for QA automation engineers. Due to this reason I have developed a sample REST-applications. Everything were pretty familiar to me except Swagger. So I’m going to describe my new acquired experience with Spring Boot and Swagger UI. First of all I need to mention that I’ve used Spring IO. Yes-yes, that was a first time when I’ve used Spring not as a popular java framework but as platform. It was really exciting. Comparing with my previous Spring experience, in Spring IO configuration process and setup of project become more easy and fast. According to topic of training the sample web application need to have simple business logic. I decided to develop app where landlords (realtors) can manage their realty (apartments). Hence user of app can perform CRUD operations with landlords and apartments. Now when you know in what context I have to use swagger I can omit the rest of story about the application and training and jump to main topic of the article – Swagger and Spring Boot integration. Spring Boot + Swagger In order to plug Swagger to a web Spring application you need to add dependency to a build file (Maven or Gradle). It’s very simple and clear described on official Git page. After this you can add a separate configuration java class which is responsible for Swagger: import com.mangofactory.swagger.configuration.SpringSwaggerConfig; import com.mangofactory.swagger.models.dto.ApiInfo; import com.mangofactory.swagger.plugin.*; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.boot.autoconfigure.EnableAutoConfiguration; import org.springframework.context.annotation.*; public class SwaggerConfig { private SpringSwaggerConfig springSwaggerConfig; public void setSpringSwaggerConfig(SpringSwaggerConfig springSwaggerConfig) { this.springSwaggerConfig = springSwaggerConfig; public SwaggerSpringMvcPlugin customImplementation() { return new SwaggerSpringMvcPlugin(this.springSwaggerConfig) //This info will be used in Swagger. See realisation of ApiInfo for more details. .apiInfo(new ApiInfo( "SmartMe education API", "This app is for education, training purpose. It represents model of landlords and apartments for rent", //Here we disable auto generating of responses for REST-endpoints //Here we specify URI patterns which will be included in Swagger docs. Use regex for this purpose. After the configuration file is done you can continue with Controllers. By the way you need to put swagger config in area of scan by Spring Boot Application class. @Api(basePath = "/landlords", value = "Landlords", description = "Operations with Landlords", produces = "application/json") @RequestMapping(value = "/landlords", produces = MediaType.APPLICATION_JSON_VALUE) public class LandLordController { private static final Logger logger = LoggerFactory.getLogger(LandLordController.class); private LandLordService landLordService; @RequestMapping(method = RequestMethod.POST, consumes = MediaType.APPLICATION_JSON_VALUE) @ApiOperation(value = "Create new Landlord", notes = "Creates new Landlord") @ApiResponses(value = { @ApiResponse(code = 400, message = "Fields are with validation errors"), @ApiResponse(code = 201, message = "") }) public LandLord createLandLord(@Valid @RequestBody LandLordDTO landLordDTO) { logger.info("LandLord DTO is: "+landLordDTO); LandLord landLord = new LandLord(landLordDTO); return landLord; //Other endpoints are omitted That’s all you need to have a documentation of your API in JSON format. To check it, start your application and go to http://localhost:8080/api-docs Spring Boot + Swagger UI Well documentation of API in JSON format is good but not so useful for other team members, e.g. front-end developers. So we have to plug UI. Download swagger ui from its official git repo. After that extract it and copy dist directory and paste it infolder /public or /static or /resources located in src/java/resources. Now rename dist in swagger. Open index.html and change JavaScript code, it should look like: $(function () { var url = window.location.search.match(/url=([^&]+)/); if (url && url.length > 1) { url = decodeURIComponent(url[1]); } else { url = "/api-docs"; //rest of code... That is it. Now relaunch the application and navigate to You have to see something like this: java ,enterprise-integration ,tool Opinions expressed by DZone contributors are their own. {{ parent.title || parent.header.title}} {{ parent.tldr }} {{ parent.urlSource.name }}
global_01_local_0_shard_00002368_processed.jsonl/64543
Cluster Flush Cluster flush is a system that involves a flushing system that washes out the cluster after every cow, keeping the cluster fully sanitised before going onto the next cow. This will keep down the threat of cross contamination of mastitis between your cows. The system is fitted in line and is operated by using electronic which are wired into the existing machine, meaning it can be fitted onto any type, size or brand of milking machine. Cluster Flush It is usually fitted with a dosatron pump which will mix the parasitic acid and water which kills any bacteria in the cluster. The cluster flush system can work with automation on your machine such as automatic cluster removers and milk meters or on their own on a standard machine. On swing over machine each cluster will flush independently, but on a double up machine a switch will need to be placed on the exit gate which allows the flush system to flush all the clusters together. The cluster flush generally will start with a milk sweep this is to clear the line and cluster of milk, then it proceeds by taking up a supply of water and flushing it out through the cluster, then a flush of water and acid and finally with a flush of water followed by air to clean out the line of remaining splashes of water. This process generally takes around 30 seconds from the time the cluster comes off the cow. The cluster flush can be set at different rates as to what quantity of water, acid and air can be flushed through it. Clean water as well as a good supply of water is essential for the cluster flush system to operate effectively. Electrical, Generator and Pump Services Co. Tipperary E41 W598 T: (0504) 44437 - 086 2531503 About Us Electrical Generator & Pump Services
global_01_local_0_shard_00002368_processed.jsonl/64554
Thursday, March 10, 2011 Soul Rest There was a time when rest had become something of a luxury for me. I've always been a rather restless person always needing to be doing something, solving a problem, reading a book, never just still. And complete stillness is still very hard for me. As a child I and into my twenties I struggled with OCD (Obsessive Compulsive Disorder). To be still was an invitation for the obsessions and compulsions to take over. It was a nescessity to keep my mind occupied at all times. In my late twenties we finally found a medication that finally worked and I found myself free of most of my OCD symptoms. But the restlessness has persisted. Old habits die hard. And to be completely still results in a creeping feeling of unease. Then I realize I am waiting for the old thoughts and feelings to come back. And remembering them very nearly brings them back. So the cycle begins again as I seek to busy my mind. I am learning to take very small periods of rest, of complete quietness, and then build on the success of these small rests. A small space of quiet sometimes goes a long way. I am also learning that sometimes, rest, for me is simply knowing and accepting that Jesus loves me. It is a deep soul consciousness of His ability to hold and keep me regardless of the restlessness in my mind. He is bigger than Obsessive Compulsive Disorder. And therein lies rest. I am joining the conversation about rest with others at Faith Barista. 1. So true. I am glad that you've found a way to get small periods of rest and build on those ... and that you've found rest in the arms of Christ. He is indeed bigger than OCD and everything else that afflicts us. 2. Amen, sister! God is indeed bigger:) 3. I'm learning that rest looks different for everyone. Your rest might wear me out, but mine might drive you to distraction. It's a wonderful thing God created us all differently! 4. "A small space of quiet sometimes goes a long way." This is an amazing piece of wisdom that is true. In this small practice, we find God and that is no small matter. Thank you, Rose! 5. Maybe in finding small spaces of rest we learn to discipline ourselves and can continue to build upon that. Thank you for sharing your thoughts!
global_01_local_0_shard_00002368_processed.jsonl/64560
API de géocodage Capture an address and find its exact whereabouts on a map, and vice versa! Combining performance and speed, geocoding web services enable the geocoding of large volumes of data the world over. Try out the Geoptimization APIs    Discover the online demonstrator   Géocodage unitaire Unitary geocoding Geocoding converts an address into a geographical location or reference (X and Y coordinates, communes, districts…). If the address is incomplete or ambiguous, the unitary geocoding API offers a number of results including the associated detailed score and type of geocoding Batch geocoding Batch geocoding consists in geocoding several addresses at a time. Powerful and fast handling of large volumes of addresses makes the batch geocoding API a must in a geographical application. Proposition d'adresses This automatic completion service, or autocomplete, saves internauts time when entering a location or address. The function suggests likely locations as the letters of an address are typed in.  Example: the internaut enters "avenue des cham», and the service returns «Avenue des Champs-Élysées, Paris», as well as other addresses starting with the same string. Find an object This web service uses geographics coordinates to retrieve information (name, code…) contained in the fields of the geographical objects intersected or nearby. Among the geographical objects available, there are the administrative units and postal areas. Géocodage pour les analyses géographiques Proposition d'adresses Reverse geocoding Click on a map and instantly see the associated address, automatically locate an emergency call… : these are all useful applications of the reverse geocoding API, which enables you to find an address from geographical coordinates. Storage of X and Y coordinates The X and Y coordinates generated by the geocoding APIs can be stored for an unlimited period and used for geographical representation and analysis. Géocodage pour les analyses géographiques Address standardization To ensure data homogeneity, the standardization API transforms addresses captured in accordance with the desired AFNOR standard (contraction of addresses to 32 or 38 characters). Normalisation d'adresses Try out Geoptimization APIs in your application for 30 days! Tester l'API
global_01_local_0_shard_00002368_processed.jsonl/64561
Researchers produce nano packaging with desirable properties TEHRAN, Sep. 13 (MNA) – Iranian researchers produced an antibacterial packaging by creating a nanocomposite film which can be used in disinfection of wound and treatment of burn. Packaging is an important issue in food safety. Active pack is a pack that plays different roles in addition to protecting the entrance of external materials. These packs have been recently developed by producers of foodstuff. Nanotechnology can improve the quality and efficiency of packaging and increase the safety of food. Nanotechnology packs have better mechanical, chemical, thermal and microbial properties than the normal packs. According to Iran Nanotechnology Initiative Council (INIC), the aim of the research was to use microbial nanocellulose and zinc oxide nanoparticles at the same time to produce an antibacterial nanocomposite film with desirable properties. Fewer amounts of antibacterial materials have been used in the structure of these packs which decreases the risk of the application of artificial preservative agents in foodstuff. It also results in the production of healthy food. A bacterial cellulose film containing zinc oxide nanoparticles was produced in this research. The main objective was to control the release of nanoparticles from cellulose film to the liquid media. Ultrasonic waves and three-layer film were used to fulfill this objective. Results showed that the use of ultrasonic waves decreases the size of zinc oxide nanoparticles in the film structure, and prevents the migration of zinc oxide nanoparticles from film matrix to water. Results of the research have been published in Carbohydrate Polymers, vol. 149, 2016, pp. 8-19. News Code 119675 Your Comment You are replying to: . • 5 + 1 =
global_01_local_0_shard_00002368_processed.jsonl/64567
These accelerometers are small, lightweight, easy to install and can take shocks up to 200,000g’s. Our piezoresistive shock accelerometers are essential in measuring accurate Shock Response Spectrum. As a result, they are frequently specified for applications involving weapons testing, explosions and missile penetration studies. Weapons and rocket testing 7270A, 7280A, 7274, 136, 7250A High shock data recorders 74, 75 Pyroshock testing 7255A, 7280A, 7280AM4, 7284 Fuze/safe and arm 72 Mechanical shock and impact 7270A, 7280A, 2255B, 2225M5A, 133 Blast testing 8511A Data recorders for military weapons testing typically require accelerometers with both high g ranges and high sampling rates. The sensors must be easily mounted in a small package and integrated with the recording device. The Model 75 family of triaxial accelerometers features three sensors in a mutually orthogonal arrangement in a leadless chip carrier (LCC) package that supports mounting by surface mount technology (SMT), re-flow soldering (with epoxy underfil) or adhesive mounting (with hand soldering). For each axis, the sensor is sculptured from a single chip of silicon, which includes the inertial mass and strain gauges arranged in a four-active-arm Wheatstone bridge circuit. There are several different pyroshock standards but a common one derived from MIL-STD-810G, Method 517 for near-field pyroshock has frequencies greater than 10,000 Hz and peak amplitudes greater than 10,000 G’s. The 7255A, 7280A, 7280AM4 and 7284 accelerometers are all near-field accelerometers characterized by different packaging. The miniature, tubular-shaped, piezoelectric 7255A has an integral stud for mounting. The flat, low profile piezoresistive 7280A has two holes for screw mounting while 7280AM4 is hexagon-shaped and stud mounted. The higher profile, rectangular-shaped 7284 is a triaxial accelerometer. Miniature pressure sensors are used for studies of structural loading by shock waves resulting from blast explosions. The model 8511A piezoresistive pressure transducer has a 3/8-inch mounting thread and is available in ranges from 5000 to 20 000 psig. For harsh environments, where there is particle impingement, an optional version is available with a protective screen and a black silicone grease coating which further reduces photoflash sensitivity and provides an effective thermal barrier for short duration, high temperature service. Recommended electronics for signal conditioning and power supply are the model 126 and 136 general purpose three channel conditioners.
global_01_local_0_shard_00002368_processed.jsonl/64583
Enroll Now Trenching & Excavation for the Competent Person Did you know that the fatality rate for excavation work is 112% higher than the rate for general construction?  With the proper safety training in place, this number would be drastically reduced.  That is why OSHA requires a competent person be present at every job site.  OSHA defines a competent person as someone that “by way of training or experience, is knowledgeable of applicable standards, is capable of identifying workplace hazards relating to the specific operation, and has the authority to correct them.” Many OSHA training classes provide basic or introductory information for workers.  Since the competent person is required to make important decisions, their training must go beyond the introductory level, to a level which provides enough information to be useful in their decision making process. eTraining’s Trenching & Excavation for the Competent Person course goes beyond the basic awareness level of introductory courses and into the details necessary to create a safe environment for workers, as outlined in OSHAs standard 29 CFR 1926.650.  It helps a competent person answer important job site questions like: Are there adequate means of access and egress?  Are adjacent structures stabilized?  Does the procedure require benching or multiple benchingShoringShielding?  Are means of egress from the cut, cavity, or depression no more than 25 ft from the work? These, and many more, are the kinds of questions a competent person on an excavation or trenching site needs to be asking.  And, while there is no substitute for hands on, real world experience, this Trenching & Excavation Course for the Competent person will go a long way in providing a good foundation of knowledge from which a worker can create a safer excavation work environment. If you don’t need a Competent Person designation or would rather a more basic level excavation course, we also offer an Excavation Safety course that does not cover as much detail as this course – click here for more information. Course Details This fully narrated course is broken up into 6 separate units, with a knowledge check quiz at the end of each unit.  The quizzes will prepare you for the final, which you will take at the end of the course. This course is packed with photos, video, interactivity, and a wealth of valuable information. It is approximately 4-5 hours in length. Topics Covered Include • Scope, Application, and Definitions • Specific Requirements • Protective Systems • Soil Classification • Sloping and Benching • Aluminum Hydraulic and Timber Shoring • Shoring Alternatives • Protective Systems Selection Why etraintoday.com? Employee Progress Tracking Mobile Delivery Ease of Use Customer Service Will this course be for you, or somebody else? Send us a Message major credit cards accepted
global_01_local_0_shard_00002368_processed.jsonl/64619
CBD oil for a wholesome life – firebird-cbdoil Cannabidiol is a natural remedy that is used for various diseases. Commonly known as CBD, it is one of over a hundred chemical compounds called cannabinoids found in the marijuana plant Cannabis sativa . According to Wikipedia, tetrahydrocannabinol (THC) is the main psychoactive compound in marijuana that causes the high associated with smoking. Unlike THC, however; CBD is not psychoactive, which makes it a compelling option for those looking for chronic pain and other symptom relief without the effects of marijuana changing the mind. CBD oil is produced by extracting CBD from the hemp plant and then diluting it with a carrier oil such as hemp seed or coconut oil. It receives a lot of attention in the world of health and well-being. Several studies confirm that CBD can relieve symptoms of diseases such as anxiety and chronic pain. Here are five health benefits from using CBD oil that are supported by scientific evidence. Image source # 1. Natural pain relief and anti-inflammatory properties Typically, people use over-the-counter or prescription drugs to relieve pain and stiffness. However, some believe that CBD oil offers a more natural solution. A study found that CBD oil drastically reduced chronic pain and inflammation in a number of mice. Another overview says that it is extremely beneficial to use CBD oil for back pain. According to researchers, the non-psychoactive properties of cannabis like CBD can be a natural treatment for chronic pain. However, further human studies are needed. # 2. Reduction of oxidative stress Oxidative stress is the state in which your body has too many free radicals and the antioxidants cannot all neutralize them. In fact, given the increasing toxicity in our environment, this is a relatively new topic these days. Studies have shown that CBD oil has neuroprotective and antioxidant properties that help reduce neurological damage caused by free radicals. # 3.CBD for sleep disorders Nearly 60 million people in the United States alone suffer from acute and chronic insomnia or sleep disorders. Acute sleep problems usually resolve on their own. However, long-term sleep problems can have a critical impact on your quality of life and are extremely difficult to treat. The use of common medications for the treatment of sleep disorders carries the risk of serious side effects and addiction. Studies conducted in adults with insomnia have provided results indicating that the initial treatment for insomnia with CBD oil reduced the severity and symptoms a month after starting treatment. # 4. Natural remedies for anxiety A study conducted by FV KASA found that the use of Hempworx CBD oil is effective in reducing anxiety. Therefore, it could potentially be a useful natural remedy for anyone suffering from anxiety. CBD interacts with the body's endocannabinoid system and improves the effects of other brain chemicals to stimulate relaxation and reduce stress, anxiety and fatigue. A 2011 study found that people with generalized social anxiety disorder (SAD) who were given 600 mg of CBD oil before a public speaking test instead of a placebo received dramatically less anxiety and speech during their speech Felt discomfort. # 5.Anti-acne It is known that the effect of CBD oil on receptors in the immune system helps to reduce inflammation in the body. And in return, it can offer benefits for acne treatment. Research has shown that CBD oil prevents activity in the sebaceous glands that are responsible for the production of sebum – an oily substance that moisturizes your skin. However, too much sebum can lead to acne. If you are considering CBD oil for acne management, you should consult your dermatologist in advance. Is CBD Oil For You? Only you can decide. With so many variables, it is best to speak to your health care professional before deciding on CBD. Although there are early promising signs of certain circumstances, you should be careful, investigate, and wait for more reliable evidence for now.
global_01_local_0_shard_00002368_processed.jsonl/64628
Searchresults for tag "freifunk"... Freifunk (WiFi): Outdoor mount without drilling Freifunk! Free WiFi for everybody! Since two years, i'm more or less an "active" member of the "Freifunk"-community in Hamburg. Unfortunately I'm the best in "don't be there on meetings", but at least I'm inventing some possibilities of mounting routers on windows. My landlord started to renew the windows and put new insulation onto the walls. This was the end of my old Outdoorbox i've build some years ago, because it's prohibited to drill into the new walls or windowframes. I need a new idea. Continue reading
global_01_local_0_shard_00002368_processed.jsonl/64629
@article {1589, title = {Integrating FLOSS repositories on the Web}, year = {2012}, note = {"To provide the researchers easy access to the project{\textquoteright}s data, two research projects were initiated (with slightly different objective) by the FLOSS research community which are FLOSSmole and FLOSSMetrics , also known as {\textquotedblleft}repository of repositories (RoR){\textquotedblright}. These RoRs were created to consolidate metadata and analysis of projects from a variety of code forges into a centralized place for use by the researchers in academia and industry. "In this paper, we take into consideration only project{\textquoteright}s metadata from the code forges which are made available to download by the FLOSSmole community. Further, we only study Googlecode and Sourceforge data for this paper, although our methods extend to other code forges as well. Names are not available for the developers in the database dump of Googlecode provided by FLOSSmole, so we consider matching only developer ID(s) in the case of Googlecode."}, month = {2012}, abstract = {This paper provides a novel approach to the problem of integrating data from multiple code forges of FLOSS. We review the current problems in integrating the data from multiple forges and argue that Semantic Web technologies are suitable for representing knowledge contained in code forges. Further, we show the advantage of linking the metadata of projects to other data sources on the Web which will enable querying extra information from the Web. The paper briefly describes how the modeling is achieved and what benefits can be obtained by enabling linking to other relevant data sources already available on the Web.}, keywords = {flossmole, google code, sourceforge}, url = {https://www.researchgate.net/publication/259757473_Integrating_FLOSS_repositories_on_the_Web}, attachments = {https://flosshub.org/sites/flosshub.org/files/DERI-TR-AFTAB-2012-12-10_0.pdf}, author = {Iqbal, Aftab and Cyganiak, Richard and Hausenblas, Michael} }
global_01_local_0_shard_00002368_processed.jsonl/64649
Jump to content - - - - - - - - - - 163 Players are online Server Support • Content Count • Joined • Last visited Community Reputation 10 Good About goat • Rank Iron User Roat Pkz Information • Roat Pkz Username Recent Profile Visitors 87 profile views 1. goat ill c u tomorrow 2. Idk about this, but "Well of goodwill" could be nice to do once a while +1 to that, and have been suggested multiple times more stuff init would be nice #fashion dont see thing point of this, since its already fine could be awesome if it was added correct for sure, would make wildy more active in general, around the wilderness, huge +1 for that minor thing, not really necessary would be fine, or have it added to donation store. problematic of making new account each time, else just buy username @ ::buy-username which already issa thing 3. you gotta think about how much pkp you receive on getting the 500 ks - but agree, its a bit low and could be higher for such an achievement 4. no worries, daily mute to you then 5. imagine wasting this much time on nothing - funny guy 6. @Killbob u the one going on trollpatrol with me • Create New...
global_01_local_0_shard_00002368_processed.jsonl/64667
Talk:Frostpunk Wiki From Frostpunk Wiki Jump to: navigation, search We need a link for the Lore page on main page. Does any of you know how to do it? Dubious Claim[edit source] In the section "About Frostpunk", the claim "Frostpunk is the first game of society survival." is made which is simply not true. OUTPOST by Sierra On-Line in 1994 is an example of a game that came long before Frostpunk and I still doubt it's 'the first'. This claim should be demonstrated or removed regardless of marketing claims made by the developers. 06:08, 16 October 2018 (UTC) Good point. I took a look and decided to just remove that paragraph altogether. --Mr Pie 5 (talk) 06:35, 16 October 2018 (UTC)
global_01_local_0_shard_00002368_processed.jsonl/64675
So faith comes from hearing, that is, hearing the Good News about Christ. -Romans 10:17              The greatest story ever told. We don't stray from the teachings in the Bible, it is already the greatest story ever told and as relevant to our lives today as ever. We exist to share His message in both words and actions. Hear the Good News 12/1/19 - 12/24/19 Shepherds are the dregs of society, sleepily tending to their flocks of sheep. All that is forgotten when the sky explodes announcing that the Messiah is born! What can we learn from these homeless outcasts about how we should respond to the Good News? Holy Spirit 9/1/19 - 11/24/19 He's been called "the shy member of the Trinity." He's often referred to as an "it." Some have called him a "force." But he's none of these. He is God living in us and working through us! Destroying the American Dream 7/7/19 - 8/25/19 Owning a house in the suburbs with a white picket fence. Two cars in the garage, two kids in the living room and retirement at 65. This is the dream of America. But is this God’s will for his people? Maybe it’s time to begin Destroying the American Dream. So Far From Home 5/5/19 - 6/30/19 Look around. Churches are emptying. Christians are labeled "hateful, bigots." The Bible is scoffed at as antiquated and oppressive. This is not the USA your parents grew up in. This is a different home than what we knew growing up. Where we are is So Far From Home. 2/24/19 - 4/21/19 He's greater than the angels. He's a better Moses who leads us into promised rest. He's a priest forever in the order of Melchizedek. He's a sacrifice once and for all. Who's this guy and what does all this mean? Less Is More 1/6/19 - 2/17/19 "My church has four services to accomodate my busy schedule." "My church has an incredible worship band." "My church is exactly what I want in a church." But church isn't about what WE want, it's about what HE wants. What does God want for His church? Welcome to Less is More. Upside Down Christmas 12/2/18 - 12/30/18 A king whose parents are peasants, not royalty. A king born in a stable, not a palace. His crib an animal feeding trough, not a bassinet. His clothing strips of cloth, not royal robes. This is no ordianary king. This is an upside down king bringing an upside down kingdom. The Wrong Question We want to go to Heaven and have eternal life, but is Heaven where our focus should be? We can have eternal life through the death and resurrection of Jesus, but do we even know who Jesus is. The question is not, how do I get to heaven? The question is, do I know Jesus? God Never Said 8/12/18 - 8/26/18 We've all heard one of these. Maybe we've even said one of these. We often want to give encouragement and go to our faith for those encouraging words. In the series God Never Said, we'll be looking at sayings that we've heard, or even said that sound like they are grounded in scripture but actually are not. The story of Jesus is the greatest message that can ever be told.  There has never been a more important, influential, and polarizing person than Jesus Christ. It doesn't matter where you are in your faith journey or where you are in the world, our messages are online so the story of Jesus Christ can be shared with you.
global_01_local_0_shard_00002368_processed.jsonl/64678
I've seen the term "casual" used to describe games at times, and have seen people refer themselves or others as "casual gamers." What exactly is a "casual" game? Is there any real difference between them and regular games? If so, what makes a game "casual?" Time investment is the main criteria. If a game can be rewarding to players who only pop in every so often and only for short time periods, it is casual. "Hardcore" games are those which require either a lot of time investment into skill (possibly from playing other similar games) or time investment into game sessions in order to enjoy the experience. An FPS is "hardcore" in that a player must spend time learning and mastering the FPS controls. Games like Baldur's Gate are hardcore in that they require extensive time playing and exploring the story to properly enjoy. FarmVille is "casual" as anyone can pick up the core game in minutes and only require a few minutes per day to enjoy (though some people can certainly spend way more time playing and mastering the game). • 3 \$\begingroup\$ Note the difference between "time investment" and "time wasting" via grinding... \$\endgroup\$ – Tobias Kienzler Jul 11 '13 at 8:50 I think the wikipedia article on casual games answers the question pretty well as to what casual games are. It should be noted that people who describe themselves as "casual gamers" don't necessarily play casual games. "Casual" can describe their dedication to games or the amount of time spent playing them. The games they play could easily be the same games someone who describes themselves as a "hardcore" gamer plays. In this sense, they use the term "casual" to tell you it's not something they're really serious about. However, it's likely that statistics relating to gamers may have a category of "casual gamers", that would identify a group of people who play casual games. Just be aware of the context these terms are used in and they should be easy enough to distinguish. "Casual games" are targeted at a wider audience than other (often considered more "hardcore") games are. Typically this is accomplished by having simpler game mechanics and controls that are easier to pick up and understand for people who might otherwise not play very many games, and by being much easier to pick up and play for brief periods of time (such as while travelling on a bus). Early casual games were primarily played through web browsers (via Flash portals). While such games are still around, the rise of the smartphone platform has allowed many casual games to migrate to those devices. Your Answer
global_01_local_0_shard_00002368_processed.jsonl/64682
How can you start making more money than what is necessary for family to leave ? What is the formula for the income and what are the opportunities to make extras ? How do you get a better flat as well ? You get $5 for each entrance correctly resolved. There are some other bribes that appear in the game, people asking for letting them through, it is probably worth $5 extra which means that if you can afford to have a warning you get a profit of one extra person. I never took them so I do not know what are the consequences. You get $200 extra for letting the soldier's girlfriend through, you get some extra cash if you manage to adopt your niece (something like $150 -> $200) and another $200, if you properly help the Ezic order. The $1000 gift from the order gets you in trouble so either burn it or be ready to have all your money confiscated. If the latter happens, you can sort it out by letting the right Ezic agent through but the they will not return the money for you. I just finished a game where I escaped on the 22nd, with my wife and my son and living in a class 7 apartment. The flats are offered for you throughout the game, not sure if at specific dates. You can manage moving to another apartment and paying for bills and what not if you can get about 12~14 entrances sorted out per day. Hope this helped and good luck! • 3 You can also safely alternate between heat and food to save up some more. – 3ventic Aug 12 '13 at 9:16 • When you say 12-14 entrances, you mean accepted entrances or approvals + denials? – BlueTrin Aug 12 '13 at 9:50 • I think it would be nice to hide some of these info with a spoiler tag ;) – Marco Leogrande Aug 13 '13 at 2:50 • 1 @BlueTrin Both count. Any approval or denial you resolve without getting a citation gives you money. – Humungus Aug 13 '13 at 8:32 I just finished the game with over $1200. You simply let most of your family die off (saving money on food and making it cheaper to escape) and never upgrade apartment. Make sure you save your guard mate and let his lady in (extra $100 for that) and take bribes wherever possible. Also never take the booth upgrades (these are of little use anyway) and process around 12-14 people a day (an easy average once you get the hang of it). Also detain wherever possible once you start getting the detention bonus, until then just reject them as this is quicker. Your Answer
global_01_local_0_shard_00002368_processed.jsonl/64683
How can I use command blocks to test for whenever a player is standing on a certain block within a certain area, and then teleport them? • 1 I got the answer from Stefnotch from youtube: Command: /execute @a ~ ~ ~ detect ~ ~-1 ~ sand -1 tp @a ~ ~-5 ~ – John Klubertanz Jul 5 '15 at 15:13 I got the answer from Stefnotch from youtube. The command is: • Could you explain what each of the arguments in the command mean? Thanks – Spyfiend13 Dec 3 '15 at 18:22 • the squigglies, or tildes (~) refer to relative coordinates, ~1 ~-1 ~ means the affect is applied to one up on the x coordinate, 1 down on the y coordinate and on the same z coordinate. @a means all players. the detect function of the /execute command means that the executor tests for a block from a certain point. the arguments after that is teh command executed – Chemical Comrade Nov 28 '16 at 6:35 You can use this command. Note that the location of the command block doesn't matter. /tp @a[x,y,z,r] tx ty tz x, y, and z are the coordinates of the block where you want to test for players. r is the circular radius that the player must be inside. The location you specified with x, y, and z is the central point of this radius. tx, ty, and tz are the coordinates that you want to teleport the player to. Some examples: /tp @a[0,0,0,10] 1 2 3 See if a player is within 10 blocks of 0, 0, 0. If so, teleport them to 1, 2, 3. /tp @a[100,6,38] 1 2 3 See if a player is at 100, 6, 38. If so, teleport them to 1, 2, 3. The radius isn't specified, so the player has to be on the exact block. Make sure you pay attention to the details. No space between "a" and "[". Commas between x, y, and z but not between tx, ty, and tz. Good luck! • but what if i want to have them teleport only if they're on a certain block? – John Klubertanz Jul 4 '15 at 14:02 • @JohnKlubertanz Then test for the location above the block. ie. On top of 0 0 0 would be @e[0,1,0,r=1] – aytimothy Jul 4 '15 at 14:12 • @MBraedley, Thanks for editing my answer and correcting my mistake! Sometimes I feel like I'm physically unable to press the comma and not press the space bar! – Nick B. Jul 4 '15 at 16:24 • 1 you guys don't understand. I dont want to test for players in a radius, because it could detect players in the air. What I want is a giant pad like a lift where if a player is physically standing on the pad, they get teleported down to the room below. – John Klubertanz Jul 5 '15 at 14:56 • You could simply have the platform be FallingSand entites with {NoGravity} set to "1b" and then the player simply falls through the platform – Chemical Comrade Nov 28 '16 at 8:17 A more user-interface style would be to have buttons on the wall with signs above them that say things like "Level 2" or "Second Floor: Storage" and command blocks behind them or activated by a /testforblock command that have /tp commands such as /tp @p x y z /tp @a[team=Elevator] x y z /tp @a[r=2] x y z I used this system very much when i was building my first command block world called "Megalopolis". It involved players exploring a vast city and trading with villagers to get title deeds, keys and coins. When using this a lot on structures with evenly spaced elevators, copied commands and relative coordinates sped up programming significantly. Obviously, you could use the detect function used in previous answers, but this is simple and rather more decorative. Your Answer
global_01_local_0_shard_00002368_processed.jsonl/64689
The Gateway to Computer Science Excellence +26 votes 1. HTTP, FTP 3. FTP, SMTP in Computer Networks by Boss (30.8k points) | 4.7k views can anyone confirms that having tcp connection means stateful connection? @skyby, having TCP connection does not implies stateful connection. for eg. HTTP uses TCP but a stateless protocol. 2 Answers +54 votes Best answer SMTP: only one TCP connection. TELNET: only one TCP connection. HTTP: Multiple connections can be used for each resource. FTP: FTP uses Telnet protocol for Control info on a TCP connection and another TCP connection for data exchange Reference: (See page 8) So, answer is A.  by Veteran (431k points) edited by Yup..I got confused with other answer keys...coz I answered http and ftp..Our point is right :) @arjun sir  word same   in the above question is having significance ?? link is not working (i've tried multiple times) any other source? Hello sir please clear some of my doubts. 1) Questioner is asking Multiple TCP connection b/w same client and server.Now what do i understand from 'multiple TCP connection' is as follows : TCP connections are identified by port numbers so multiple tcp connection mean at the same time client and server are connected over different ports like in case of ftp , where to transfer 'control information ' client(random port)connect with server on port 21 and in case of 'data transfer' server connect with client by using port 20(in case of active mode). SO here we have multiple tcp connections.Am i right? 2) Sir i'm doubtful about the correctness of your argument for http.The link you attached , is considering a scenario when client is connected to server using some intermediary device like proxy server. and in such case he is claiming that there are multiple connections b/w client and server.Yes i'm agree multiple connections but not multiple 'tcp connection'.for all connections source port and destinations port are same so i consider same TCP connection.Because if in that way we are claiming to have multiple tcp connections then all protocols uses multiple tcp connections because intermediary device can be attached in all cases for security purpose(firewall).did i miss something? 3) put argument like 'HTTP may use different TCP connection for different objects of a webpage if non-persistent connections are used'. it's not clear in question that questioner is asking for 'same session' or we may consider even different sessions as this geeksforgeeks argument? If we can even consider different sessions then i think SMTP can also be true (don't know much about TELNET , so can't argument about it). 4) Let suppose in my browser i opened two tabs , in both i opened 'gateoverflow' and reading two different questions. both time i'm connected to same server and in case of both page request i will have different source ports so that server can distinguish like 'whom response what' so in that way client is connected to same server's same port(port 80) with two source ports. is this case of multiple tcp connection ? pardon me if i asked something stupid and hence wasted your time. @Rupendra Choudhary I am not an expert, but maybe my analysis of the question can make sense to you as well. We all agree that FTP uses $2$ simultaneous TCP connections for a successful FTP transfer. So, your point $(1)$ is right. By now, we have eliminated options $(B)$ and $(D)$. Now, let's analyze how HTTP uses multiple TCP connections. For this, I will use the example you have given in your point $(4)$. When you opened a GO question no. $1$ (for example) in one of the browser tabs, your browser effectively opened a TCP connection to port $80$ on GO's servers and requested for a resource with a relative path, say /question-1. When you will open another GO question in your other browser tab, your browser will again open a new TCP connection to the same port $80$ on GO's servers and will request for another resource with a relative path, say /question-2 This implies that it is possible for HTTP to open multiple TCP connections between the same client and the server. sir, even if you open two tabs of the same website in your browser, does that not establish two TCP connections between your machine's browser, and the corresponding website's server? And regarding SMTP, it can send multiple messages from the same client to the same server, but it doesn't make multiple simultaneous TCP connections for it. Just one persistent TCP connection is enough. +4 votes Option A....most likely by Active (1.2k points) Related questions Quick search syntax tags tag:apple author user:martin title title:apple content content:apple exclude -tag:apple force match +apple views views:100 score score:10 answers answers:2 is accepted isaccepted:true is closed isclosed:true 50,737 questions 57,306 answers 105,010 users
global_01_local_0_shard_00002368_processed.jsonl/64690
Tag Archives: ancient Little Things Matter This is a very famous puzzle.  Here is motivation: Infinite Chocolate (gif from 9gag.com) Now consider following variation. Where does the hole in second triangle come from? (image credit: Rookie1Ja , http://brainden.com/forum/index.php?/topic/139-64-65-geometry-paradox/) \arctan(\frac{2}{3}) - \arctan( \frac{3}{8}) = \arctan (\frac{1}{46}) which is less than 1 degree 15′ . Only a very precise drawing can enable us to distinguish such a small angle. Using analytic geometry or trigonometry, we can easily prove that the area of the “hidden” lozenge is equal to that of a small square of the chessboard. Also there is an interesting video illustrating this in real life: