id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_05_local_4_shard_00000656_processed.jsonl/47040
|
MSpace - DSpace at UofM >
Browsing by Author Upadhyay, Jagdish Prasad.
or enter first few letters:
Showing results 1 to 1 of 1
Issue DateTitleAuthor(s)
1995The child-related health care perceptions and behaviour of the Punjabi speaking people in ManitobaUpadhyay, Jagdish Prasad.
Showing results 1 to 1 of 1
|
global_05_local_4_shard_00000656_processed.jsonl/47084
|
This move is easier when you understand that branding is the most powerful concept in consumer sales. Whoever owns the brand and branding process will capture extra profits often unrelated to production costs.
In commodity chains, which have exhausted the cost reduction options, branding offers the possibility of increasing sale value without loss of market share, thus increasing profitability.
Branding is a way for manufacturers or sellers of goods to distinguish their products from like commodities. For many centuries, the concept of branding was limited to the "maker's mark." This mark, applied to everything from knives to brandy, assured the buyer of a consistent quality.
Brands based on technical attributes were always subject to being displaced by competitive products. Brands based on low or moderate prices are always subject to erosion from the cheaper, better and faster competitor.
Lifestyle Branding In the last 50 years, with the advent of mass media and rising per capita incomes, branding has become much more revolutionary. It has shifted from assurances of technical quality or performance to defining the very relationship between product and buyer. This form of branding, referred to as emotional or lifestyle branding, offered something performance-based claims could never do. And the instrument of modern branding - mass media advertising - has greatly reduced the time it takes to establish brand identity, though much more than advertising is needed to successfully develop a brand.
Fresh meat branding can take place around attributes that are both observable and unobservable. Examples of observable attributes include color, size, absence of visible fat, etc. Unobservable attributes include "family farm raised," safety, U.S. produced, corn-fed and so on.
Unobservable attributes require the trust of the consumer and therefore require information systems and/or strict production and processing protocols since, if the trust is violated even once and discovered, the equity in the brand is eroded forever.
Price Differentiation In economic theory, successful branding allows price differentiation. It makes the demand for the branded product more inelastic. This means if you increase the price of successfully branded pork chops by a certain percent, say 5%, it will result in less than a 5% loss in sales to unbranded, commodity chops or other substitute meats. Commodity pork chops are price elastic as beef and poultry prices fall. This means even small percentage increases in price will result in larger declines in quantities purchased as consumers seek cheaper alternatives.
Branding in meat has been almost exclusively reserved for processed products, such as hams, bologna, luncheon meats, bacon, etc. But in the fresh meat case, with the exception of poultry, most fresh meat brands have failed because actual and perceived differences are difficult to demonstrate and maintain.
Perdue brand was one of the first successful fresh meat brands in poultry. A perception of extra quality was established partly because of successful branding of Perdue eggs and partly because of a truly superior quality, uniformity and color of Perdue brand chickens.
Several attempts at branding U.S. pork are underway. Most only promise a leaner and, by implication, healthier product. Others try to capture and transfer successful brand names from the processed case to fresh products.
In Europe, fresh pork branding has been very successful around attributes such as "outdoor-raised" and product traceability. In Great Britain and France some fresh pork cuts have a tracking number on the package that identifies the farm and the animal from which the cuts came. These attributes command a higher price since they provide a certain reassurance.
Branding transforms perfectly competitive markets to monopolistically competitive ones. Prices can exceed the long-term average cost of production. These extra profits are called brand "rents" and if maintained over time, create brand equity.
With the advent of costly fixed asset investment and the savings associated with economies of scale, finding a profitable long-term market for the increased amount of pork is critical.
Successful pork branding will allow prices at the retail level to increase while reducing the normal substitution of beef and poultry when they become relatively cheaper. For this reason, branding is the next frontier as commodity pork markets move into the 21st century. The big question: How to establish an emotional relationship between the buyer and pork? Unlike technical attribute branding, this brand could last a lifetime.
|
global_05_local_4_shard_00000656_processed.jsonl/47089
|
November 10, 2008
Blog Stew, Recycled
• Walking in the cities.
Walking can do that to you: take you to places you don't expect to go, people you don't expect to meet, entanglements you hadn't planned on.
• A Grand Junction paper reports that Sen. Ken Salazar does not wish to be Secretary of the Interior but predicts some changes in BLM's approach to oil and gas drilling. My pre-election thoughts about Obama and the West are here. (Via Coyote Gulch.)
Five myths about recycling, debunked by Popular Mechanics. Hat tip: Glenn Reynolds.)
• Michael Pollan (writing before the election) warns the president that food is a big, if somewhat occluded, issue for him to deal with.
NorCal Cazadora said...
I'd missed that Pollan piece, so I'm glad you pointed it out!
Chas S. Clifton said...
You're welcome!
Steve Bodio said...
The Pollan piece is good as always, but latest word is that O is going to appoint a corn biofuel- loving Big Ag guy from Iowa as Sec Ag. He may be reading but he is not listening.
NorCal Cazadora said...
My boyfriend and I were talking about this last night. He said, wisely, "Well, he is from Illinois..."
Oh well, change is rarely dramatic and immediate. Though we have noticed people are behaving better at four-way stop signs since the election.
|
global_05_local_4_shard_00000656_processed.jsonl/47097
|
Mira Bartok Tunes Out the Noise
Commentator Mira Bartok is having a hard time escaping the din of life, at the Y and elsewhere. Bartok lives in western Massachusetts. Her memoir, The Memory Palace, is a 2012 ALA Notable Book and a National Book Critics Circle Award finalist. The winners will be announced in March.
|
global_05_local_4_shard_00000656_processed.jsonl/47099
|
Nevermind The Posers
See ya in the pit.
Top 5 Songs with Lyrics That Make No Sense August 16, 2010
Filed under: Manic Monday Top 5 — NVMP @ 9:11 PM
TNT’s Top 5
5. “Eyeball” by Meat Puppets – “Since I hurt myself, I feel so much better/Suck my eyeball.” What a chorus! Seriously, no idea what this song means.
4. “Money for Nothing” by Dire Straits – Is the line “Money for nothing, chicks for free” referring to someone who works at MTV? It sounds like a list of things to move and install, then goes into a random conversation with no one in particular. If you want your MTV, do you really need to install microwave ovens and/or move refrigerators? I can’t believe this song won a Grammy in 1985.
3. “Tubthumping” by Chumbawamba – This can barely qualify as a song, it sounds more like a drink order. Do not think about picking this one to karaoke, it just repeats the lyric ‘I get knocked down, but I get up again, you’re never going to keep me down’. In England, a tubthumper is a politician, so I’m going to assume it’s a protest song. Any thoughts?
2. “Loser” by Beck - Everyone knows the chorus and some of the verse, but can anyone make sense of the song besides the obvious fact of being a loser and asking to be killed? I love Beck because his lyrics don’t have to make sense. This song is the result of not making sense…on purpose. We’re listening now Beck, you have our attention.
1. “Lisztomania” by Phoenix - What? Lisztomania, like when women went crazy for classical pianist Franz Liszt? Or that movie by Ken Russel about Franz Liszt’s life, played by Rodger Daltrey? If you try to look up the lyrics online, each site has something different. Why is this love for gentlemen only? Correction, the wealthiest gentlemen only. I could go on and on, but why don’t you just read the lyrics and get back to me if you can make any sense out of them.
Hoverbee’s Top 5
5. “Modern Love” by David Bowie – There’s no sign of this song making sense. I understand that Mr. Bowie is never going to fall for modern love, but what’s that have to do with the paper boy, standing in the wind, and never waving bye-bye? I try to understand this song, I try.
4. “De Do Do Do, De Da Da Da” by The Police – It is true that every lyric in this song makes sense except for the chorus. Still, the chorus is the most repeated line in the song! I do love it, but feel especially strange when singing along. All of a sudden, I’m a toddler and I want my binky.
3. “Shock the Monkey” by Peter Gabriel – According to Mr. Gabriel, this song is about the jealousy brought out by a lover in a relationship. It took several readings of the lyrics for this explanation to make sense to me. Still, a great tune! Fox the fox. Rat on the rat. You can ape the ape; I know about that.
2. “Levon” by Elton John – This song is about a guy named Levon who names his son Jesus and has a father named Alvin Tostig. They count money, blow up balloons, and think about going to Venus. Fantastic.
1. “Unwritten” by Natasha Bedingfield – It is true that I dislike this song and wish to never hear it again, but it got ridiculous play and so I was forced to listen. I understand that the end is not yet written, but what’s that got to do with opening a dirty window and feeling the rain on your skin? It seems that this song is a sad attempt to be deep or have some special message. She really should have left this song unwritten.
Mark’s Top 5
5. “Tarzan Boy” by Baltimora- Probably one of the greatest 80s novelty songs, but to this day makes ZERO sense. I know what the song is about and I can understand the lyrics, but it still confuses the hell out of me. I guess the biggest question is why is Tarzan Boy so alone? He’s friends with the animals for Christ’s sake.
4. “Psycho Killer” by Talking Heads – Psycho Killer…Qu’est Que C’est…what? It probably means “what are you trying to say”? It seems to be about a killer, but why the french add-ons? So David Byrne can sing nonsense in a different language, that’s why…he’s so worldly.
3. “Chop Suey” by System of a Down – Ahh, good ol’ Serj…such profound and hard-hitting lyrics, offering heavy-handed criticisms of the government and societal travesties and faux pas…if only you weren’t speaking complete fuck-tard. Here’s what I hear: something about makeup, leaving keys on tables, suicides and angels. You are supposed to sing into the microphone, not try to eat it mid-chorus.
2. “Put Your Hands Where My Eyes Could See” by Busta Rhymes – Seriously, what the fuck is Busta Bust saying? All I could ever make out is his repeating of the song title. Thank god the video was cool.
1. “Even Flow” by Pearl Jam – Eddie Vedder + Lyrics – Message / Douche factor = Lost. Resting your head on concrete? Thoughts like butterflies? He doesn’t know so he chases them away? Fuck, I don’t know either, so I’m out. But you have to admire Eddie’s persistence, as not many people have made a career out of singing with oatmeal constantly in their mouths. It seems like such a high level of self-importance comes with a price…and a flannel shirt.
Stigz’s Top 5
I want to preface this list with the assertion that many songs are amazing, but many a time don’t make sense. On this list are some of these- tracks that I love and understand on my own level, but lyrically at times make absolutely no sense.
5. “Gylcerine” by Bush - Like many songs you can groove to and like without knowing why, this song makes no sense if you read the lyrics. But again, if you connect with it, you tend to ignore that.
4. “Voodoo Child” by Jimi Hendrix – One of my all time favorites, sometimes the lyrics take a foray into nonsense akin to the acid trip they were written on (fact…look it up). And to quote White Men Can’t Jump “You might be listening, but you don’t hear Jimi.” If you hear him, the song makes perfect sense.
3. “B.O.B. (Bombs Over Baghdad)” by Outkast – The lyrics make sense if you read them, but if you listen to the words you can catch, they still don’t make any. Da da da stop the train bum bum drop the brain. You get it…
2. “By The Way” by Red Hot Chili Peppers – Specifically the part in the song when the lyrics are comprised of such random words as “Steak Knife /Caro Shark /Con Job /Boot Cut.” All of the songs make sense if you know their music and their backgrounds, but if I heard this for the first time, I’d think it was the soundtrack for Tourette’s Syndrome.
1. Anything by Lady Gaga…Specifically “Pokerface.” I don’t think I need to justify this.
Klone’s Top 5
It would be incredibly simple to just fill this list with Lady Gaga and Ke$ha, but at the same time that just seems too easy. Songs with odd or awkward lyrics are nothing new, even though it seems to be the “hip” new thing to do. I think for some of the more current acts, it’s a bit of a cop-out to quickly go to the gibberish lyrics. Whatever happened to establishing song writer/lyricist as poet? Guess that’s what happens when more artists than not are having their songs written for them…
5. “Plush” by Stone Temple Pilots – So, I along with everyone else who was alive and into the newly growing ‘Alternative’ rock genre in the early 90s thought that the singer of this new band was actually Eddie Vedder sporting a new hair color and style. Imagine our surprise to find out it was a new player on the scene, speaking in equally puzzling, riddle-like lyrics. This isn’t a negative criticism, as I think STP has always been poetic with their lyrics, but these really don’t make much sense without some explanation by the song writers: “Where ya going for tomorrow? Where ya going with the mask I found? And I feel, and I feel…When the dogs begin to smell her…Will she smell alone?”
4. “Hey Soul Sister” by Train – Besides being poppy and fun, the song kinda sounds like a drunken, desperate guy trying to find romantic metaphors in a high school biology textbook. “Your lipstick stains / on the front-lobe of my left-side brains / I knew I wouldn’t forget you / and so I went and let you blow my mind” then “Hey, Soul Sister / ain’t that Mister Mister / on the radio, stereo / the way you move ain’t fair you know”…so, I get that the left side of the brain is associated with memory, and suddenly the Soul Sister is the person to consult if you think you’re hearing Mister Mister on the radio and/or stereo, but I’m still somewhat lost as to whether these are real lyrics or mostly filler around the longing for the girl he’s watching dance? Unless your band is called Tool, the song shouldn’t be this much work to comprehend.
3. “Alejandro” by Lady GaGa – So, from this one all I’m getting is that Lady GaGa is a huge ho-bag and her boyfriend’s like a dad (just like a dad). The song begins with some spoken lyrics about knowing that “we are young and that he loves me” but that “I just can’t be with you like this anymore…Alejandro” all spoken with a faux-European accent that serves more as mockery than homage. What follows is a mix between an Ace of Bass rip-off and Madonna’s “Papa Don’t Preach”, all directed at these supposed Latin lovers whose names all end in “o”. So I guess Pablo, Angelo and Constantino are all next…yet the song will still be called “Alejandro”.
2. “Tik Tok” by Ke$ha – So, tell me, what the fuck does it mean to wake up in the morning feeling like P. Diddy? Is there a Sean P. Diddy Combs manual for waking up and starting your day by brushing your teeth with Jack Daniels? Didn’t see it on Barnes & Noble’s “New Release” shelf. There’s more to clever lyrics than name dropping, both celebs and booze, like some semblance of an actual thought maybe? A metaphor or two in order to demonstrate the depth of you as an artist? We know she’s busy “occasionally” coking it up, just like our #3 artist, so I’m sure none of this makes any sense to her, the way her lyrics make no sense to us.
1. “Smells Like Teen Spirit” by Nirvana – I know we all know the words, but I still defy anyone to tell us what the words have to do with what the song is supposed to be about. I think this is the first song that I would say the video is a required part of the experience. I feel like the video captured visually the type of feeling the song was meant to convey: the rebelliousness of youth clashing with the establishment. It’s an old message, but done here in such a new way, that the lyrics almost become unimportant. This is why “Smells Like Teen Spirit” was such a break-out hit.
Angela’s Top 5
5. “Black Hole Sun” by Soundgarden – “Call my name/through the cream/And I’ll Hear you scream again.” Listen, when this came out in 1994, I was 10. Between the song and the video, I was very confused and a little bit traumatized (I still refuse to watch the video for it.) No clue what the man is talking about…still don’t.
4. “Louie Louie” by Richard Berry – Because everyone still sort of mutters along under their breath and gives it their all on the one part we CAN understand.
3. “A Milli” by Lil Wayne – Hey hi…umm…what? Since Lil Wayne doesn’t pre-write any of his material, I’ve noticed it often lacks cohesion and direction. This one just stuck out for me.
2. “Song 2″ by Blur - Remember when all we knew was “Woohoo!!” and the rest was kind of unintelligible? Yeah, well even when you get around to deciphering the lyrics they still don’t make sense. Allow me to illustrate, “I got my head checked/by a jumbo jet” only to be followed by, “when I feel heavy metal/woohoo!/And I’m pins and I’m needles”. No clue, but once I learned them I sang them faithfully…not having the slightest idea wtf I was singing along to.
1. “Informer” by Snow – Come the fuck on, how did no one else make this their number 1? To this day it remains one of those songs that its like ‘WHAT THE FUCK IS HE SAYING?!’ Maybe it makes sense when ya slow it down…but I couldn’t tell you. I still don’t know. It’s something about a snitch or something in the hood. Fuck if I know. Either way, this kid wins for most difficult song to understand.
6 Responses to “Top 5 Songs with Lyrics That Make No Sense”
1. MUSIC Says:
In the chorus of Psycho Killer when he says “Qu’est Que C’es” he is saying “what is it?” which makes complete sense in the song, if you read the whole thing through.
2. Someguy Says:
I think your first list misses the idea that “Money For Nothing” is sung from the perspective of a working person (who installs microwave ovens, etc. as a blue-collar job) looking at rock stars who, in his view, ‘Get their money for nothing and their chicks for free.’
The ‘I want my MTV’ was just a reference to the music channel which, at the time, actually played music videos and was seen as essential to becoming a successful rock band.
• T'aintRock Says:
Yes and the band got the lyrics from comments made by the guys who were working in the appliance center…you remember…the stores that had several TVs going so you could check out the color and the sound?
3. hooverbee you suck. end of story. Natasha made that song because of her times of severe suicidal depression. she has filled it with metaphors. and what she means by “feel the rain on your skin, no one else can feel it for you” is that if u want to get somewhere in life you cant have someone else do it. but you have your own opinions that your entitled to. so… yeah i’m done ranting :/
4. Liam Howlett Says:
Ahh, Snow and his “leaky boom-boom down”
Smells like teen spirit; someone told me it was about HIV and the fear of it, together with drinking/promiscuity, which fits pretty well with the chorus parts, but the verses, maybe, but not so much…
Verse 1 went to a party to get over losing someone, pretend its OK/to be someone you’re not, met a girl (overboard, self assured) and they do a dirty word together. (A classier version (+grungy rather than frat-party) of: and then I saw her standing there with green eyes and pond blond hair, she wasn’t wearing underwear… )
With the lights out it’s less dangerous (we feel safer in denial, a denial, a denial etc.)
Here we are now, entertain us (would fit the story part if your friends and their guns were in on the dirty word action, or it’s just a commentary on youth culture; were here, sod it, let’s have some fun)
I feel stupid and contagious ( ignorant, had unprotected sex and might have caught something)
A mulatto, an albino. (Doesn’t care about race, heritage or colour)
a mosquito, my libido, (contracted innocently or the curse/blessing of the libido)
Verse 2. Not having fun any more, but that’s probably for the best (safer), but we’re still here, and will keep doing this shit.
Verse 3. I forget why I drink, I guess it make me smile, I found it hard … Speech tails off drunk, who cares, nevermind!
Side note: I keep forgetting that Nirvana were pretty damned good – when’s the 90’s grunge revival comming? Surely it’s overdue?
Leave a Reply
WordPress.com Logo
Twitter picture
Facebook photo
Google+ photo
Connecting to %s
Get every new post delivered to your Inbox.
Join 168 other followers
|
global_05_local_4_shard_00000656_processed.jsonl/47119
|
Exercise Can Be Like Heroin, "Gym Rats" Show
Matt Kaplan
for National Geographic News
August 20, 2009
Hardcore runners who can't bear to skip a workout may be hooked in a way that's similar to heroin addiction, according to a new study of rats.
The well-known "runner's high" may be the culprit: Human runners need to increase the distances they run to feel that euphoria, experts say.
And if these runners are forced to stop, they can show signs of depression.
Such "withdrawal symptoms" have led researchers to theorize that addictive chemicals are naturally released by the body during exercise.
(Take a brain quiz.)
Anorexia Athletica
To explore this idea, a team led by Robin Kanarek at Tufts University in Massachusetts divided lab rats into two types of cages, ones with running wheels and ones without.
Over seven days, both male and female rats with exposure to wheels naturally increased how much they ran on the wheels.
This was not surprising: Rats offered wheels are known to steadily increase their use of them over time, said Kanarek, whose study appeared in the August issue of the journal Behavioral Neuroscience.
On day nine, both the active and nonactive rats were divided into groups. After having had food available at all times, about half of the running rats began to be issued just a single portion of food a day, and only an hour to eat.
This brought on "anorexia athletica" in the food-restricted running rats: They dramatically increased their running and started losing weight.
In humans, anorexia athletica can be a fatal mental disorder that makes its sufferers compulsively exercise to lose weight.
(Related: "Modified Mice Stay Super-Fit -- Without Exercise.")
Kanarek wondered whether the anorexia condition is caused by activation of the same chemical pathways that create narcotic addiction.
To find out, she and her team injected all of their rats with the drug naloxone, a chemical compound that is often used to help drug abusers recover from addiction.
When injected into human addicts, the drug induces withdrawal symptoms that include writhing, chattering teeth, and swallowing movements.
Kanarek had observers unfamiliar with the experiment note down the rats' behaviors.
They found that the most hardcore rat runners showed the greatest degree of withdrawal symptoms, while rats that did not have access to wheels displayed fewer withdrawal symptoms.
Running Rehab?
Kanarek is not worried about mass exercise addiction in people.
"While we saw naloxone-withdrawal symptoms in active rats, these symptoms were not as severe as those typically seen during morphine withdrawal—suggesting that exercise is not as addictive," she said.
What's more, the addictive effects of exercise could be used in a positive way.
"We think a bright side to our findings is that exercise may be one way to actually help [drug] addicts recover," she added.
© 1996-2008 National Geographic Society. All rights reserved.
|
global_05_local_4_shard_00000656_processed.jsonl/47121
|
Forgot your password?
United States Privacy
NYT: NSA Put 100,000 Radio Pathway "Backdoors" In PCs 324
Posted by Unknown Lamer
from the do-you-trust-your-data-center? dept.
retroworks writes "The New York Times has an interesting story on how NSA put transmitters into the USB input devices of PCs, allowing computers unplugged from the Internet to still be monitored, via radio, from up to 8 miles away. The article mainly reports NSA's use of the technology to monitor Chinese military, and minor headline reads 'No Domestic Use Seen.' The source of the data was evidently the leak from Edward J. Snowden."
NYT: NSA Put 100,000 Radio Pathway "Backdoors" In PCs
Comments Filter:
• Where are they? (Score:5, Interesting)
by RMH101 (636144) on Wednesday January 15, 2014 @09:51AM (#45964289)
Genuine question - where are these devices? Has any physical evidence of them been detected? Has anyone found one? I'm not sceptical that they did it, I think it's entirely possible. I'm just curious if there's any physical evidence that's been found yet...?
• by langelgjm (860756) on Wednesday January 15, 2014 @10:07AM (#45964481) Journal
The NSA claims that it doesn't steal trade secrets from foreign companies in order to give US businesses a competitive edge. I suspect they are lying, given that it seems like they lie about everything, and that we already have reason to suspect they are lying about this in particular. [bbc.co.uk]
However, the implication is that it would be wrong or immoral for them to do so (unlike the French or Chinese who have no such qualms). E.g., in the article, we read:
It goes on to quote Peter Singer saying that for the Chinese, economic advantage is part of national security.
Maybe the Chinese are right. And here's the thing - the U.S. already behaves as if securing economic advantages for our domestic industry is a critical interest. In trade negotiations, we ram our IP laws down the throats of every other country while dangling our domestic market in front of them, all the while never actually liberalizing agriculture at home. I don't understand why it's acceptable for us to promote our domestic businesses through trade diplomacy, but somehow it becomes unacceptable to do so through spying.
In my mind, we are trying to accomplish the same thing as the Chinese, just via a different means (or probably, via both means). Yet we criticize them as if we are somehow morally superior in the way we do it.
• Re:Where are they? (Score:5, Interesting)
by SuricouRaven (1897204) on Wednesday January 15, 2014 @10:17AM (#45964585)
" mainly because a simple frequency scanner would allow one to detect the presence of transmissions by the device"
Burst transmission. Buffer data for days, then send it all in a burst of under a minute. Nothing to detect unless the counterintelligence people are monitoring continually or get very lucky. It's old tech, dating back to the pre-IC days. Bugs back then did it by recording onto a magnetic tape. When the tape reached the end it turned on the transmitter and re-wound at high speed. The listeners then just had to play it back slowed-down and backwards to recover the original audio.
• Americans (Score:4, Interesting)
by Anonymous Coward on Wednesday January 15, 2014 @10:35AM (#45964797)
Ok, so I get the whole whistle blower thing but isn't this what the NSA is supposed to be doing? Spying on Americans is ok to get fussy about
As an European, I don't care if US authorities spy on US citizens, that would be their own internal business. But I find it quite offensive that US spies on Europeans, in order to protect US interests. EU should really stand up and announce that such spying is totally unacceptable, any person caught to be part of such will serve serious jail time, diplomatic immunity or not. And any country caught doing so shall loose all diplomatic privileges inside EU, and have their embassies searched for more evidence (with a proper search warrant, of course).
I wouldn't mind if EU would also ground all flights and money transfers to/from the US for a few days. It would underline how seriously we view the matter, and make it clear for all Americans that we can no longer trust their government.
|
global_05_local_4_shard_00000656_processed.jsonl/47122
|
Listen, and I'll tell you the story of the bookstore chain that stormed into the hottest category in consumer electronics and conquered.
It's a nice underdog story, right? A bit like the tale of plucky rebels who attacked Lord Vader's Death Star.
But that was fiction. Barnes & Noble Inc.'s new Nook Tablet ($249) is a solid product, worthy of duking it out with Inc.'s Kindle Fire. Considering that the Nook comes from a desert planet where the only entertainment was shooting womp rats (Sorry, I mean "from a bookstore chain."), it's really impressive.
But the Nook doesn't quite muster enough force to blow up a Death Star. Barnes & Noble's earlier Nooks were dedicated book-reading devices, and the Tablet is at most a half-way step into the world of general-purpose tablet computing.
Like the new Kindle Fire, the Tablet has a 7-inch, touch-sensitive color screen, about half the size of the iPad's. It's the same screen as on the Nook Color, the e-reader Barnes & Noble launched a year ago. I thought it was the best e-reader yet when it launched.
The Tablet improves on the Nook Color mainly by beefing up the processor and the memory and extending the battery life to 11.5 hours of reading, or 9 hours of video.
The Tablet also has improved software, but the Color will be getting the same software through a downloadable update.
The Tablet is debuting with Netflix and Hulu applications. Coupled with the nice, sharp screen, that makes for a good device for that TV and movie fix _as long as you're connected to Wi-Fi. The apps actually highlight one of the shortcomings of the Tablet: there's no way (short of hacking the software) to use it for offline viewing of movies you buy or rent.
Barnes & Noble promises to provide access to some sort of movie store next year. Amazon, meanwhile, launched the Kindle Fire with access not just to Netflix and Hulu, but to its own store with downloadable video, plus free streaming content for Amazon Prime subscribers.
Barnes & Noble is also well behind when it comes to the selection of third-party applications: it has about 1,000 available today. That compares to just under 10,000 at Amazon, and 500,000 on the iPad.
However, the Nook has these features over the Fire:
_ Faster processor and more memory for software operations, which means faster Web browsing and magazine page-flipping.
_ Longer battery life.
_ Twice as much storage space: 16 gigabytes compared to eight. Don't get too excited about this, though. What Barnes & Noble has left out of its marketing material is that only 1 gigabyte is available for content that isn't bought from Barnes & Noble. Since books don't take up much space and Barnes & Noble doesn't sell movies, much of the 16 gigabytes is likely to be wasted.
_ A slot for memory cards. This is the cure for the lack of memory for non-Barnes & Noble content. You can add another 16 gigabytes of memory by buying a $20 card.
_ The ability to load books from third-party stores like Google Books. On the Kindle, you can only read books from Amazon.
_ Netflix streams are sharper. Barnes & Noble initially claimed they were in high definition, but that X-wing doesn't fly: the Tablet's screen isn't high-definition.
_ Children's books with built-in narration (some Kindle apps have this).
_ A microphone. This doesn't have a lot of uses at the moment, but it does allow you to record your own narration.
Apart from the ones mentioned above, the Kindle Fire has these features over the Nook:
_ A lower price: $199.
_ The Comixology app, the most popular one for comic books. On the Nook, you're pretty much limited to buying electronic comics from Barnes & Noble.
For the most part, the Nook Tablet justifies the higher price tag compared to the Kindle. Of course, anyone with money to spend should also be looking at the iPad 2, which starts at $499 and does all of what these smaller tablets do _ plus a whole lot more. That's one Death Star that won't be exploding in a hurry.
Peter Svensson can be reached at
|
global_05_local_4_shard_00000656_processed.jsonl/47124
|
Tax Cuts
9:56 pm
Tue June 17, 2014
Commentary: Policies Will Widen The Wealth Gap
Credit buzzybee | sxc.hu
It probably says something about our times that the book that’s sold out on Amazon is not the latest Twilight thriller but a dense, 700-pager by a French economics professor: Capital in the Twenty-First Century by Thomas Piketty. He’s also making the rounds of TV talk shows like an A-list actor promoting a new movie.
Read more
12:45 pm
Mon March 25, 2013
St. Louis Answers: 'You Know You're Wealthy When...'
Lead in text:
Our Adam Allington asked a selection of St. Louisans to finish the sentence 'You know you're wealthy when..." for Marketplace. Check out the answers via the link.
In this installment of Marketplace's "You Know You're Wealthy When" series, we traveled to St. Louis to ask residents of the Midwestern city what being wealthy means to them.
|
global_05_local_4_shard_00000656_processed.jsonl/47133
|
Image: Courtesy of Alexander Slocum et al.
Full Screen
• Small-scale laboratory setup was used by the team to test the ability of a container of molten salt to absorb and store heat from concentrated sunlight, simulated using powerful spotlights.
Image: Courtesy of Alexander Slocum et al.
Full Screen
How to make solar power 24/7
The biggest hurdle to widespread implementation of solar power is the fact that the sun doesn't shine constantly in any given place, so backup power systems are needed for nights and cloudy days. But a novel system designed by researchers at MIT could finally overcome that problem, delivering steady power 24/7.
The basic concept is one that has been the subject of much research: using a large array of mirrors to focus sunlight on a central tower. This approach delivers high temperatures to heat a substance such as molten salt, which could then heat water and turn a generating turbine. But such tower-based concentrated solar power (CSP) systems require expensive pumps and plumbing to transport molten salt and transfer heat, making them difficult to successfully commercialize — and they generally only work when the sun is shining.
The plan, detailed in a paper published in the journal Solar Energy, would use an array of mirrors spread across a hillside, aimed to focus sunlight on the top of the tank of salt below. The system could be "cheap, with a minimum number of parts," says Slocum, the Pappalardo Professor of Mechanical Engineering at MIT and lead author of the paper. Reflecting the system's 24/7 power capability, it is called CSPonD (for Concentrated Solar Power on Demand).
The new system could also be more durable than existing CSP systems whose heat-absorbing receivers cool down at night or on cloudy days. "It's the swings in temperature that cause [metal] fatigue and failure," Slocum says. The traditional way to address temperature swings, he says: "You have to way oversize" the system's components. "That adds cost and reduces efficiency."
The biggest challenge, Slocum says, is that "it's going to take a company with long-term vision to say, 'Let's try something really different and fundamentally simple that really could make a difference.'"
Most of the individual elements of the proposed system — with the exception of mirror arrays positioned on hillsides — have been suggested or tested before, Slocum says. What this team has done is essentially an "assemblage and simplification of known elements," Slocum says. "We did not have to invent any new physics, and we're not using anything that's not already proven" in other applications.
Gershon Grossman, who holds the Sherman-Gilbert Chair in Energy at the Technion-Israel Institute of Technology, says this approach "includes several innovative CSP concepts." But, he adds, "the main advantage of this system is its ability to deliver power continuously, unlike other CSP systems, which are affected by clouds. This work is innovative and is expected to make a significant contribution" to the industry, he says.
Slocum emphasizes that this approach is not intended to replace other ways of harvesting solar energy, but rather to provide another alternative that may be best in certain situations and locations. Playing on the familiar saying about rising tides, he adds, "A rising sun can illuminate all energy harvesters."
Topics: Energy, Mechanical engineering, Nuclear science and engineering, Solar
Back to the top
|
global_05_local_4_shard_00000656_processed.jsonl/47149
|
Jeff Woodburn en Executive Councilor Ray Burton Easily Wins Re-election (No Big Surprise) <p>In the North Country, a longtime Executive Councilor held on to his seat and a Democrat snagged an open senate seat. NHPR’s Chris Jensen has more.</p><p></p><p>Executive Councilor Ray Burton, a Republican from Bath, faced a challenge from Beth Funicella, a Democrat from Jackson.</p><p>Probably to nobody’s surprise the veteran Burton easily beat Funicella.</p><p>With 90 percent of the precincts reporting Burton had almost 68,000 votes.</p><p>That was roughly 22,000 more than Funicella.</p><p>The other big race was for the senate seat vacated by Republican John Gallus.</p> Wed, 07 Nov 2012 06:21:40 +0000 Chris Jensen 16381 at
|
global_05_local_4_shard_00000656_processed.jsonl/47155
|
You are here
Name Description Use At Home?
Magazine Articles
Ebsco's MasterFILE Premiere provides full-text articles from over 1,900 magazines, from 1975 through the present. Also includes reference books, biographies, primary source documents, and an image collection of photos, maps and flags.
Mango Languages
Morningstar Investment Research Center
Search by individual mutual fund or stock or create your own real or imaginary portfolio and find out how the individual securities work together as a portfolio. Identify individual stocks or mutual funds that meet particular investment criteria by using the Morningstar screeners.
|
global_05_local_4_shard_00000656_processed.jsonl/47157
|
Tuesday, November 14, 2006
1. Just a doggie aside, in case the Klonopin doesn't always work well - our German Shepherd takes Xanax for her thunderstorms. We are also well-versed in medications, only ours veer more toward pain & anti-anxiety. :)
Good luck to you guys, all of you.
2. Are all us bloggers bipolar AND on the down swing right now? That can't be healthy to have all our moods heading south at the same time. We're likely to tear the fabric of time.
Don't you just love it when you find your parents words coming out of your mouth? My 22 year old is already there herself she says.
It goes back to the old saying that there really is nothing new under the sun.
3. (HUGS)
I bet she'd love a self service checkout!
4. Bella is the best helper ever!
Tell Alex to hang in there. We are sending good wishes from here.
BTW~~ The year my daughter was 4, she started on the "I want everything" kick before Christmas, including boys Underoos! It came to a screching halt when I advised her that Santa ( or whoever is responsible for gift-giving)allowed all children to ask for only 3 things they REALLY wanted so that all children could have enough toys to go around. She thought long and hard about those 3 things and quit asking for junk. It worked until she was 10! the only problem was, I sometimes had to move heaven and earth to get the three things she asked for!
5. My thoughts are with you and Alex and Bella! -hugs-
6. I like that "ask for three things" tactic, I'll have to try it this year.
7. Wow, I guess I feel better knowing that I am not the only mixed state bipolar person. We don't all drink the same water so it must be a cosmic really bad joke. Or maybe it's caused by the volcano that erupted this week? That's it, it's in the air. Or not.
Praying for all of us and a cocktail that works w/o hospitalization.
8. Or you could scare your 4 yo to death and tell her what would really happen if she drove that shiny new Escalade into downtown Little Rock! (I am certain it wouldn't be too different from Memphis.)
9. That Bella's a clever one!
You and Alex always have my prayers.
10. FlippyO: Good to know! How much does your GSD weigh? Delta the SP is about 45 pounds, and takes a 1mg. Klonopin.
allen: Believe me, judging from the anecdotal evidence gathered from my support groups, it really is "universal timing." Not as far as which way the moods swing, but at least as far as when the most people are in crisis or cycling. It's a BIG swing in spring, and a lesser one in fall, generally, though some people buck the trend, and in the lower hemisphere, it's opposite to our seasons, of course.
leslie: We're not telling her they exist. She would insist on "doing it herself."
avalon: I like that gift theory of yours. Just one question: What if the kid does like *I* always did, and asks for NOTHING except something they can't possibly have? When I was little, it was "a pony," year after year after year. With Bella, it could easily be things we can't afford, because she sees EVERYTHING.
dana: Thank you.
cece: So are you!
M. Kennedy: "I know, right?"
anon: You are SO not the only one. Joining a group made up of other "significant others" (spouses, GFs, BFs, parents, siblings, children, etc.) of Bipolar people helped me immensely, mostly in the simple realization that I was NOT ALONE. Hearing, oh, a dozen stories that sound EXACTLY LIKE YOUR OWN in just a couple days' time will do that for you, and it's a weight off. And THANK YOU for the prayer. It's exactly what we're going for. Hospitalization's not the end of the world, but it does (for us) represent starting over again at ground zero, and it'd be nice not to have to do that.
m'liss: The hilarious thing about the electric Escalade is that it HAS NO TOP. You know, because the kids have to sit in it. It can carry multiple kids, though. I mean, the "topless" thing worked for the electric Jeeps, because, well...JEEPS. But an Escalade? A BARBIE Escalade, no less? Not even if they were free.
Dixie: Thanks, ma'am. And yeah, she's a "ring-tailed tooter," as my dad would say.
11. Cutest thing I've seen all day! She's adorable and in her glory.
Praying for you and Alex!
12. November must be Bipolar Disease Sucks month because man are we having issues here. Up and down, up and down, crying and mania. I'm about to jump out of my skin. Give Alex a huge hug for me and tell him that I understand. I honestly do.
Oh, Bella's package is wrapped and sitting on the sideboard waiting for me to feel well enough to get to the post office without peeing my pants. I'm a bit waterlogged this week and can't seem to get it all out.
13. I LOVE those pictures of Bella! So adorable. :)
Hang in there, girl!
14. You must take Bella to the Children's Museum in Memphis if you haven't already. They have a Kroger store scaled down to miniature...it's like a midget supermarket. She'd love it.
15. Belinda~~ You see, you ALWAYS have to add the provision that the gift-giver, in our case Santa, has to approve the 3 choices. We would send the letter to him with her 3 picks, he would send a personalized letter back telling her what a good girl she was and all was well with the world. Also, i would have quickly told her that elves cannot make horses....their workshops are not equipped to handle mucking!
16. Whoops, just remembered to come back. Eli is 100lbs and her prescription is for four 2mg tablets, every four hours. Of course, we can't dose her more than once a day anyway, because she ends up sort of zombie-ish. She's also taken Valium. None of it is perfect, but it's usually better than unmedicated. Although, now that her hearing is going, she can often get through the 4th of July (and the 3rd, and the 5th, and whatever weekend is close to those days) without medication. But she can feel the thunderstorms, so medication it is.
|
global_05_local_4_shard_00000656_processed.jsonl/47159
|
Volume VI - 2001
On the Educational Uses of Fantasy
by Geoffrey Madoc-Jones and Kieran Egan
Geoff Madoc-Jones was brought up in Wales, where he completed his initial degree at the University of Wales. He went to Canada in 1970, lived in a remote area, taught Language Arts, first in schools and then at Simon Fraser University and the University of British Columbia. He recently completed his Ph.D. in hermeneutics and literary education.
Kieran Egan was born in Ireland, educated in England, and did his Ph.D. in education at Cornell University. A recent book that gives the best introduction to his work is The Educated Mind: How Cognitive Tools Shape our Understanding (University of Chicago Press, 1997).
For more than a century, teachers of young children have been told that they should begin instruction in any area with content that is already familiar to the child. From Herbert Spencer (1820-1903) in particular, and repeated by so many other influential educators and psychologists, such as John Dewey and Jean Piaget, we have been told that children's understanding begins with the concrete, the local, the empirical, the simple and moves over the years in the direction of the abstract, the distant, the rational, and the complex. If this is true, how do we account for the prominence of fantasy in young children's minds? It is neither concrete, local, empirical, nor simple-and it certainly isn't made up of material familiar in the child's everyday environment.
If we tell a story that involves characters moving from one place to another, what difference does it make to have them travel by bus or by magic carpet? Is the latter mode of transport a lie that at best creates false hopes and feeds an illusory longing for an unattainable world, or is it a liberation of the mind, a stimulus to the imagination, that enables us to think about our real world more effectively? Is the concrete, local, empirical bus more accessible than the magic carpet? We would like, in the following pages, to reflect a little on the source of fantasy, and then explore briefly some classroom implications of what we find. So we need first to have some sense of what fantasy is. Where does it come from, and why is it so prominently a part of young children's mental lives?
The Source of Fantasy
Some people believe that children's belief in fantasy is a result of the kinds of stories they are told when they don't understand the limits of reality. Certainly adults very commonly encourage belief in odd creatures like Santa Clause or the tooth fairy, and even discourage children's developing skepticism about these shadowy figures. (How DOES a single fat man manage to get down the chimneys of ALL the houses in the world in the one night?) And what tortures must the budding skeptical child face dealing with the adult assertion that children who don't believe in Santa Clause won't get any presents?
Surveys suggest that as many as 60% of children have quite complexly realized "imaginary friends," and nearly all children engage in pretend play of one kind or another. Adults have tended to look on this as evidence that children confuse reality and fantasy in ways that adults don't. The child's wish for some magical occurrence, like a magic carpet or the disappearance of that horrible new baby, is seen as different in kind from the adult who kneels in prayer for similar interruptions of the course of nature. The percentage of children who believe in tooth fairies is fairly close to that of adults who believe that aliens have visited the earth. Around 60% of the adult population of the U.S.A. believes strongly or somewhat in the influence of astrology; around 50% believe that walking under a ladder will lead to something bad happening later; about 50% believe in demonic possession. And large numbers accept the claims of a few magicians who seem able to use their powers over nature only to bend perfectly harmless forks, and, less magically, to increase their bank balances. As Carl Johnson has put it: "The problem...is that whereas adults are readily aware of myths they have outgrown, they are blind to ones that they currently hold to be real" (1997, p. 1024.) Also, it is now clear, as it wasn't even a few decades ago, that children by age three do not confuse their imaginary worlds with reality; they recognize differences between the rules of their magical worlds and the everyday routines they have to slog through (cf. Woolley, 1997).
Now this is not to say that children's fantasy is nothing other than typical adult thinking, with just a different set of delusions prominent. We would worry about the C.E.O. of a large corporation we had invested in who routinely turned running the company over to his imaginary bear-friend (unless the bear improved profits). But we don't worry about children's imaginary play. We know that by age 8 or 10 nearly all children will have given up their belief in magic, will have passed through a wall behind which the imaginary friends of childhood will languish, ignored and forgotten. We might wisely reconsider this large-scale desertion of childhood fantasy; Peter Pan's shock at finding that his earlier companions had forgotten how to fly is so evocative because it captures not simply regret for carefree childhood time. It also captures an insight that most people are sacrificing some cognitive powers that are strong in childhood, are evident in fantasy, and which need not be given up in entering the "real world" of adulthood. J. M. Barrie's fable of Peter Pan delivers a powerful message. He tells us that an adult life that has failed to preserve the imaginative vitality of childhood is a kind of living death, as is an endless childhood that never reaches maturity. Both are disasters and wastes of life, but the unnecessary giving up of a fluent imagination is perhaps our greater shame today.
Self-Generating Fantasy
That fantasy is not merely a result of adult's telling such stories to children is suggested clearly by the fact that fantasy is a cultural universal: it is energetically active in all cultures, and it seems irrepressible. Consider one attempt to dispense with fantasy described by K. Chukovsky in his fascinating book From Two to Five (1963). Chukovsky describes how the dogma of social realism was applied to the instruction of some children during the early decades of the Soviet Union. He illustrates one effect through a diary kept by E. I. Stanchinskaia, a scientist and mother, of the development of her son to age seven. She wrote,that it was her purpose "to replace the unrealistic folk tales and fantasies with simple realistic stories taken from the world of reality and from nature." She strictly ensured that her son learned about nothing except what could be empirically verified. And the result? Well, as she reports faithfully in her diary, her son generated his own fantasies from morning to night-he declared that a red elephant came to live in his room, that he had an imaginary friend, that his mother must be careful not to sit on that chair because she ought to be able to see the bear sitting there, that the rug he sat on was a ship, that he was a reindeer when it snowed, that he had just bought his mother a baby tiger, and so on and on. He behaved as one might expect any imaginative child to behave, generating a fantasy world even though no hint of fantasy had been allowed to infect him.
Children themselves support the claim that fantasy has a special attraction for them. When asked what kinds of stories they like best, typical groups of first-graders name a wide variety of stories. But the top preferences, recorded in a wide survey of some years ago, were for "an animal who could talk," "a prince and a princess," and "a magic ring." Least favorite were real-life stories about "what an astronaut does," "a person on T.V.," and "building a bridge" (Favat, 1977).
A Product of the Languaged Mind
This way of learning to grasp the world in language and concepts is clearly very common. Young children first learn opposites based on their bodies-"hot" is hotter than the body, "cold" is colder; "big" is bigger than their body, "small" is smaller; "hard" is harder than the body, "soft" is softer; and so on. Young children learn a great deal about the world using this procedure-wet/dry, rough/smooth, fast/slow, and so on. Once they have formed an opposition, they can learn other terms along the continuum between such opposites.
The Generating of Fantasy
While they are very young, most children learn that some things are alive, like us and the cat and birds, and other things are dead. Perhaps it might be the death of a pet, or a dead bird brought into the house by a cat, or perhaps the idea of death might be learned through a story or by the experience of their own or a friends' grandparent or great-grandparent dying. Most of us learned the opposition life/death long before we can remember. What do you get when you apply to those opposites the same procedure that has been so successful in gaining a conceptual grasp over the physical world? What fits between "life" and "death," as "warm" fits between "hot" and "cold"? Well, ghosts, for example. Ghosts are to life and death as warm is to hot and cold. A ghost is a mediation between life and death; ghosts are in some sense alive and in some sense dead.
Nature and Culture
A two-year-old may stub a toe against a chair and, in pain, hit the chair, only to be in more pain. It becomes clear very early that chairs don't have intentions or feelings like the child's. If we take a toddler for a stroll in the woods, the child comes to recognize that a tree that has fallen over and has saplings growing out of it is a natural object. But the tree that has had a bench carved into it so that weary toddlers and their grandparents can sit and rest for a few minutes has been culturally transformed. Before we can remember, we distinguish at a profound level between nature and culture. Typical three-year-olds will not use terms like "nature" and "culture," of course, but "made" or "real" or some other terms will reflect their recognition of the distinction. So what do you get when you mediate between this further discrete opposition, nature/culture? Well, for one thing, you get Peter Rabbit. That is, you get all those talking, dressed, middle-class animals of children's fantasy stories-natural animals mixed with the archetypal cultural capacity of language-use. Peter Rabbit is to nature and culture as a ghost is to life and death or warm is to hot and cold.
If we listen to toddlers' stunningly rapid language development-from eighteen months to adolescence, the average child learns a new word every few waking hours-we may notice a common, powerful, and very successful procedure in use for elaborating a conceptual grasp over the world around them. Oppositions are created from continua of size, speed, temperature, texture, and also, of course, of morality-so we get good/bad, love/hate, fear/security, and so on. The world is inconvenient in facing us with such discrete categories as life/death, human/animal, nature/culture, and, in the modern world, human/machine. What one finds in the invented mediations between these categories are the stuff of all the fantasy stories and myths of the world, from zombies to werewolves to talking ravens, and from Frankenstein's monster to Mr. Data of Star Trek.
One implication of this explanation is that fantasy is inevitable, given the way language grapples with the complexity of the world. This explanation also supports those who claim that fantasy is not simply idle confusion. Fantasy may represent a kind of confusion, but it involves also a meditation on some of the basic questions that face us: Why and how are we unlike other animals? Why do we die, and what is death? Why and how does our culture separate us from the natural world? Fantasy, if our account is at all accurate, works by a complex use of metaphoric thinking, generating objects by seeing them as invented mediations between known categories. If we see fantasy in this way, what are the implications for teaching young children, and what role should fantasy play?
Fantasy in Early Childhood Education
One important value for children in dreaming up fantasies, as in reading literature, lies in what fantasy can do in helping their development. Thus we might encourage fantasies which involve playful re-descriptions of the world and lead to asking questions about the child's self-understanding. Such questions typically project a world of new possibilities for the child to play with, to consider, to try out. It allows the child to play with as if worlds. In this sense, fantasies are fundamentally metaphoric and playful, for they allow the child to see something as if it were something else: my father as if he were a giant, the garden gate as if it were a faithful steed, or the box which the new fridge came in as if it were a space-ship. However, they also allow a more important form of imaginative fantasy, which entails the child not seeing something as if it were something else, but imagining herself as something or somebody else. It allows the being-as in addition to the seeing-as: I am not just seeing an image in my mind of the prince or the pauper or the flying carpet, I become them, all of them if the story requires it. I can inhabit their world and see through their eyes.
These modes of seeing-as and being-as are of course intertwined. The metaphoric nature of language allows for the fantasy of being-as, which then becomes an image through the seeing-as. But the fantasy does not need to be merely visual, as the child can move, can act, and can speak as if she were the beings which she has imagined herself to have become. Furthermore, the fantasy can be part of play with others in which the fantasy is extended to include a whole world in which the participants can carry on a fantasy life.
Being Played by the Game
The play aspect of fantasy is important because of its capacity for projected realness. It enables the child to step out of her subjectivity and to be governed by the rules of the game. In fact all games are part of such structured fantasies in which the rules of the game make the child act as a goalkeeper or a chess player and not as Bill or Mary. The important part about play is, therefore, not so much the pre-game subjectivity that the player brings into the game, but being played by the game. The child willingly submits to the rules and conventions of the game. Not to do so breaks the spell and makes one a "spoil sport". Children develop all sorts of fantasy play situations with highly complex structures to which they surrender their everyday selves in order to take on the possibilities of a world that they normally would not be able to experience.
The Child's Self-Understanding
All of these aspects of fantasy, seeing-as, being-as and play are important for the child's emerging sense of self-understanding. They will happen without the intervention of the teacher, but they also provide a most important way in which the teacher can encourage the development of understanding in general. In terms of language arts teaching, they provide the necessary pre-conditions for the capacity to read, understand, and enjoy literature. Child-developed fantasies should be encouraged and gradually twinned with the reading of fantasy stories which have been written specially for children. They will easily recognize the element of "make-believe" in the fairy tales or in C.S. Lewis' stories, for example, and will be able to take part in them in a fuller manner. Later on in their school lives when they come to read more "serious" literature, this early experience with imaginative fantasy will enable them to "walk in the shoes" of the characters.
Narrative Identity and the Sense of the Self
The second important element in imaginative fantasies is that they can enable children to see themselves as having a "narrative identity". This is important to educators who see that part of their task in the teaching of narratives, both fictional and historical, is to assist students' quests for personal identity, by assuring the continuity between their seemingly inchoate stories and an actual story for which they can assume responsibility. We tell stories because human lives make sense to us only in narrative terms (Maclntyre, 1990, p. 39). Humans are entangled in their untold stories to which narrative gives form and meaning. The pre-narrative capacity of human imagination exists and acts always and already in the world in a symbolically significant manner, because we are time-bound beings and the world and our lives become meaningful through a process of temporalization, our recollected pasts merge with our dreams of the future.
Fantasy can thus play a number of important roles in the language arts classroom. First, it allows the child to posit possible worlds in which she can try out all sorts of modes of being-human, animal, or inanimate-as part of the journey of self discovery. Second, these fantasy worlds can be acted out through play in a social setting, so as to build common understanding with others. Third, the narrative element in fantasy enables the child to see her life as a story, one that began before her birth and which will go on as long as time lasts. Finally, the fantasy experience, when gradually melded with the reading of adult-authored fantasy tales, forms the foundation for the child to be able to play a full part in any future literary education. Conclusion
Children's attraction to fantasy may be because they have not yet been taught to ignore its importance. The claim by many educators that children's understanding begins with the "here and now" implies that the "here and now" is a transparent world that can be easily understood just by looking at the objects in the world, a red wheel barrow glazed with rain, for example. But if reality is as simple as that, what is a poet such as William Carlos Williams going on about in his poem The Red Wheelbarrow or Vincent van Gogh in his painting Old Boots with Laces? The world is a lot more complex than the practical people would have us believe, and they are in danger of denying the ineffable by turning the mysterious into just another problem to be solved. The reality is that all-important understandings about self and the world can be glimpsed and grasped only tenuously.
In getting students to work with fantasy, we are not merely providing an opportunity for them to have a release from cognitive cramming, but we may in fact be bringing them nearer to a valuable way in which humans have made sense of themselves and the world since antiquity. The word "fantasy" is derived from the Classical Greek word, "phantasia", which means "making visible". This was translated into Latin as "imaginatio", from which our modern word "imagination" is descended. Over the centuries, the two words have continued to be used, but for some reason, words derived from the original Greek term, phantasia, such as "fantasy", "fancy", or "phantasm", seem to have come to connote unreality and became less educationally respectable than the Latin- based "imagination" and its cognates.
Giambattista Vico, an eighteenth century philosopher, gives us another hint when he notes that while in Latin the word "imaginatio" represented the faculty of the soul that is capable of forming images, the act of imagining itself was called "memorare" -to remember (Vico, 1982. p. 69). It seems that what we have are states of mind and activities-fantasy, imagination, and memory-which seem to be all connected. They are all part of the way in which we as humans interpret and make sense of the world in an active, creative manner through the mediation of language and other symbolic forms. The educational justification for using fantasy is becoming clearer; we neglect its promise at our students' peril.
Macintyre, A. (1984). After Virtue (Second Edition); Notre Dame, Indiana. University of Notre Dame Press. - (1990).
First Principles. Final Ends And Contemporary Philosophical Issues. The Aquinas Lecture 1990. Milwaaukee: Marquette University Press.
Vico, G. (1982) Vico: Selected Writings Edited And Transalated By L. Pompa. Cambridge: Cambridge University Press.
back to content page
|
global_05_local_4_shard_00000656_processed.jsonl/47163
|
Monday, August 13, 2007
Harmonic mean
This "post" is mainly an attempt to see if one can manage to use formulas in the blog and discuss some real stuff somehow. The formulas should be really visible, a bit like with transparencies. So as a pretext, I'll start by discussing an issue related to the basic Ansatz:
which gives the operator theoretic line element in terms of the Dirac operator in the general framework of "metric" noncommutative geometry. The kernel of the operator D is finite dimensional and one takes ds to vanish on that kernel. As was already discussed here, the knowledge of D gives back the metric. Moreover the noncommutative integral, in the form of the Dixmier trace, gives back the volume form. Thus the integral of a function f in dimension n is simply given by
where the "cut" integral is the Dixmier trace ie the functional that assigns to an infinitesimal of order one the coefficient of the logarithmic divergency in the series that gives the sum of its eigenvalues.
I will not try to justify the heuristic definition of the line element any further. It is more interesting to put it to the test, to question it, and I will discuss an example of an issue which left me perplex for quite sometime but has a pretty resolution.
The point is to understand what happens when one takes the product of two noncommutative geometries. One gets the following relation for the squares of the corresponding Dirac operators:
where we abuse notations by removing the tensor product by the identity operator that normally goes with each of the operators D_j. Now this relation is quite different from the simple Pythagorean relation of the classical line elements whose square simply add up and it thus raises the question of reconciling the above Ansatz with the simple formula of addition of the squares of the Dirac operators. More generally, one can consider a bunch of NC spaces with Dirac operators D_mu and combine them as follows: One starts with a positive matrix of operators in Hilbert space:
and one extends the above formula giving D^2 for a product of two spaces and forms the following sum:
We make no commutativity hypothesis and even drop the self-adjointness of D_mu which is not needed. We want a formula for the inverse of the square of D ie for:
in terms of the inverse matrix:
which plays a role similar to the g\mu\nu of Riemannian geometry, and of the operators
where the notation with z stresses the fact that we do not even assume self-adjointness of the various D_\mu.
It sounds totally hopeless since one needs a formula for the inverse of a sum of noncommuting operators. Fortunately it turns out that there is a beautiful simple formula that does the job in full generality. It is reminiscent of the definition of distances as an infimum. It is given by:
The infimum is taken over all decompositions of the given vector as a sum:
Note that this formula suffices to determine the operator ds^2 completely, since it gives the value of the corresponding positive quadratic form on any vector in Hilbert space. The proof of the formula is not difficult and can be done by applying the technique of Lagrange multipliers to take care of the above constraint on the free vectors \xi^\mu.
Christophe de Dinechin said...
I am curious how you generated the equations. They look good. Did you use MathML or anything like that? Or did you embed images generated using some other tool?
AC said...
Dear Christophe
What I did was to embed small images inside the text, first I wrote a pdf file and then I extracted small portions of the pdf using adobe professional and saving them as jpeg.
Anonymous said...
there are easier ways to insert TeX into web pages; for example
just typing the web-link
[img alt="\int_{x=1}^{10} f(x) dx" src="\LARGE\!\int_{x=1}^{10} f(x) dx.gif" align=center border=0/]
will generate the corresponding formula
(you may skip alt= and align= border= tags)
Christophe de Dinechin said...
Dear ac,
I see you did it the hard way. I was hoping there was some simpler way.
Dear Anonymous,
Thanks a lot for the tip about TeXify. I tried it (see, it "works", but it does not look as good as on this blog, in particular because there is no anti-aliasing.
I could go for MathML, but so many browsers don't support it, so it's almost useless as a communication medium.
The folks at Wikipedia have found a good way to do it, but you can't reuse a Wikipedia formula anywhere, as all you get is a cached picture with a cryptic name encoding.
Oh well, thanks for the tips.
Pierre said...
Dear ac,
in some
products of geometries one is able to recover Pythagorean relation for the line elements. This is the case for instance in the 2-sheet model obtained as the product of a manifold M (with Dirac DE) by an internal geometry consisting in two copies of the complex numbers. The distance extracted from the total Dirac operator D corresponds to a line element ds whose square is the sum of the square of the line element dsE of the manifold with the square dsI of the line element of the internal geometry
Pythagorean relation
It seems that the explanations lies in the internal Dirac operator DI that has a square proportional to the identity
square of DI
Indeed under this condition the square of D can be seen in two ways:
-the sum of the squares of DE and DI
D^2 as a sum of squares
-the square of the Dirac operator of a manifold Mx[0,1], with the chirality as the extra Dirac matrix
D^2 as the square of an extended D_E
We assume the operator "derivative in the extra dimension" has a square equals to the identity, which reflects that we are not dealing with an extradimension, but with a discrete set of 2 points. The line element associated to D is thus the one associated to the extended D_E, hence the Pythagorean relation between the lines elements.
These observations are certainly very naive. However they question quite nicely (at least I hope...) the heuristic definition of the line element. It is also quite pleasant to have an example in which both the square of the Dirac operators and the square of the line elements add. However I do not know to what extend the condition square of DI = 1 could be relevant in a more general context. It looks very restrictive.
|
global_05_local_4_shard_00000656_processed.jsonl/47170
|
Weekly Roundup - June 4, 2014
Are you a fan of Oyez's case summaries and accessibility? Thanks to a grant from The Knight Foundation, their efforts can now begin expanding to state courts. First up: Texas!
Why was last week's Supreme Court decision about Bush protesters decided in favor of the Secret Service? Professor Heyman unpacks the decision in this video
Professor Nahmod goes in depth on the Court's decision in the case of officers who used deadly force during a dangerous car chase
The Supreme Court's decision may be the final word in a precedent-setting case - but the Justices keep editing when every word counts
Bond v. US opinion
An unusual 5-4 split in the Court ruled in favor of Native American law last week
SCOTUSblog's updated Supreme Court stat pack
High court will hear a new voting rights case
On Monday, the Supreme Court decided that the revenge of a woman on her husband's lover is too small a crime to be considered an act of chemical warfare
Do SCOTUSblog's press credentials depend on the impulses of the Senate? Adam Liptak investigates
|
global_05_local_4_shard_00000656_processed.jsonl/47196
|
Deputy Editor Fired From Portfolio
This morning, Portfolio editor Joanne Lipman fired deputy editor Jim Impoco, according to a staffer.
Mr. Impoco, former editor of the New York Times Sunday business section, was responsible for bringing in top talent to the Conde Nast business magazine (or is it a women's magazine?)—which just closed issue number two—and it’s a big loss for the Conde Nast start-up.
A Portfolio spokesperson said: “Jim Impoco left the magazine and we wish him well.” The spokesperson would not confirm that he was fired.
|
global_05_local_4_shard_00000656_processed.jsonl/47204
|
The Beacon
Blog Tags: Maersk
The Scanner
Happy February Friday!
This week in ocean news,
...Slow and steady wins the carbon footprint race. Danish shipping giant Maersk cut its cruising speed in half the last two years, which cut greenhouse gas emissions and fuel consumption as much as 30 percent. If global shipping were a country, it would be the sixth largest producer of greenhouse gas emissions.
...After being removed from the endangered list in November, the brown pelican’s recovery has hit a speed bump. Hundreds of pelicans have been found dead from a mysterious ailment that could be caused by ocean pollution or runoff.
...Miriam presented this month’s Carnival of the Blue in singable couplets. 'Nuff said.
...New research shows that heat-resistant algae may buy some time for coral reefs threatened by climate change.
...New research on diseases found in dolphins could have implications for research on human diseases, including diabetes, epilepsy and certain viruses.
Continue reading...
Browse by Date
|
global_05_local_4_shard_00000656_processed.jsonl/47207
|
[ODE] jointFeedback again... please help
Davide Faconti facontidavide at hotmail.com
Thu Nov 4 09:59:11 MST 2004
Dear all,
I have sent many e-mail asking about jointFeedback behaviour, but no one
answered me.
I invite Russ to enter in the discussion, since there is something defenetly
odd in that function.
The force applied to the joints looks fine, instead the torque doesn't:
1) I suppose that t1 should be equal to -t2, according to newton-euler laws,
but it isn't.
2) I calculated by and the torque that the joint is supposed to generate,
and ODE gives different values, that I am pretty sure are wrong.
If you are not sure, check try the following code please and read the output
#include <ode/ode.h>
#include <drawstuff/drawstuff.h>
static dWorldID world;
static dBodyID body;
static dJointID joint;
static dJointFeedback feedback;
static void simLoop (int pause)
dReal sides[3] = {0.20,0.01,0.01};
dsDrawBoxD (dBodyGetPosition(body),dBodyGetRotation(body),sides);
dWorldStep (world,0.01);
printf("t1 %f %f %f\n", feedback.t1[0],feedback.t1[1],feedback.t1[2]);
printf("t2 %f %f %f\n", feedback.t2[0],feedback.t2[1],feedback.t2[2]);
static void start()
static float xyz[3] = {0.1f,0.5f,0.4f};
static float hpr[3] = {-90.0000f,-10.5000f,0.0000f};
dsSetViewpoint (xyz,hpr);
int main (int argc, char **argv)
dsFunctions fn;
fn.version = DS_VERSION;
fn.start = &start;
fn.step = &simLoop;
fn.stop = 0;
fn.path_to_textures = "textures";
world = dWorldCreate();
dWorldSetGravity (world, 0, 0, -10);
dMass m;
dMassSetBox (&m,1,0.20,0.01,0.01);
dMassAdjust (&m,1);
body = dBodyCreate (world);
dBodySetMass (body,&m);
dBodySetPosition (body, 0 ,0 , 0.5);
joint = dJointCreateHinge (world,0);
dJointAttach (joint,body,0);
dJointSetHingeAnchor (joint,0.1,0,0.5);
dJointSetHingeAxis (joint,0,1,0);
dJointSetHingeParam(joint, dParamFMax,0.4);
dJointSetFeedback(joint, &feedback);
dsSimulationLoop (argc,argv,500,500,&fn);
dWorldDestroy (world);
return 0;
More information about the ODE mailing list
|
global_05_local_4_shard_00000656_processed.jsonl/47212
|
Monday, March 19, 2012
Twin Brothers
Today's picture shows twin brothers who sell newspapers. The picture is from 1909, and was taken in Hartford, Connecticut.
1. Looks like they all have the same nose.
2. I wonder what the headlins were.
3. Grandpa, You got me thinking of what the headlines might be. The way they are dressed I'd say it's maybe Jan or Feb 1909, (maybe March). I looked up some headlines from around that time... "Columbia recognizes the independance of Panama", "The last US troops leave Cuba after being there since the Spanish-American war", "Einar Dessau uses a short wave radio transmitter, becoming the first radio broadcaster". Born in Jan and Feb 1909... Barry Goldwater, Victor Borge, Carmen Miranda, Dean Rusk, Max Baer, Hugh Beaumont. ( I jut picked out the names I recognized).
|
global_05_local_4_shard_00000656_processed.jsonl/47214
|
Sunday, October 21, 2012
Nanopores: Fission or Fusion?
It's fall, and the foliage in New England is putting on its usual spectacular show. What isn't showing is any of the progress in nanopore sequencing that I got caught up in last February. Oxford Nanopore made quite a splash, and I wrote a quite breathless account based on a phone conversation with them. Since then, other than raising some serious cash, Oxford has been quite quiet, and has neither released any data the community (or at least this blogger!) is clamoring for nor is there any sign that alpha units have been placed. Genia was another nanopore company making noises about unveiling this year, but now they have licensed a new nanopore-based sequencing chemistry and promised boxes in 2014. When will nanopores actually hit the market?
In the LinkedIn NGS board, someone posted an item about a review that either examines the remaining difficulties of nanopore approaches or makes them sound insurmountable; I'm not sure as I haven't broken through the paywall (a cardinal rule of this blog is it must not consume personal funds!). Did the publisher tart up a teaser to get more business? Is the author a creditable expert on the field (disputed in another thread)? Both really outside my scope. But, I do have to mildly object to a comment made in the LI board that "it just may be that nanopore sequencers are the perpetual motion machines or our age". We know perpetual motions machines just cannot ever work, but I think I know what the commenter (Tim Hunkapillar, who clearly knows a thing or two about DNA sequencing technology) was trying to get at: the risk that nanopores are a technology that can never quite deliver.
To me, a more apt comparison would be to the world of nuclear power, and the question is whether nanopores are more akin to nuclear fission or nuclear fusion. With the Manhattan Project, the United States pushed from the cutting edge of laboratory research to demonstrating the ability to execute either controlled or uncontrolled nuclear fission chain reactions. Less than a decade was required to go from the first controlled fission reaction to a prototype nuclear reactor (according to Wikipedia). Since then, nuclear fission has been an important, if troublesome, contributor to the electric power requirements of many nations.
On the other hand, despite a significant investment over more than half a century by multiple nations, no working fusion reactor prototype yet exists. Since I was a young lad watching Nova (and before!), the promise of energetic break-even has always been just around the corner. But that has never quite happened.
So nuclear fission and fusion represent two very different technological stories. Both looked like primarily engineering projects, with the science mostly solved. Fission (and Project Apollo) largely played out in the manner, though not without a lot of nasty (and sometimes fatal) surprises en route. Fusion's story is not over, but is in danger of never being realized. There is always a risk that a fusion facility would become so expensive to build that it would never make economic sense.
Will nanopores ever deliver fast, cheap sequencing? Are the seemingly constant shifts in direction, chemistries and such really necessary tacks required on the course for victory, or are they random wanderings that will never reach home? Or, perhaps nanopores will succeed, but only after becoming economically obsolete due to the advent of another sequencing technology? As is attributed to either Yogi Berra or Niels Bohr (or Nielsi Bohra?) , prediction is hard, especially about the future.
Jacob Rosenstein said...
It seems worth pointing out that contrary to the impressions of some of threads linked above, this review doesn’t have any particularly radical opinions that need to be disputed. Prof. Wanunu is a very well-regarded researcher and most of this paper highlights interesting biophysical experiments that have been done with nanopores, despite the fact that nanopore DNA sequencing has been slower to arrive than everyone might have hoped.
Anonymous said...
Keith -
I asked them to lecture to a class on their basic technology, and received polite refusals, as they were working "on the final development of GridION and MinION in preparation for commercialization, which has us all fully committed."
Nanoporous said...
Few comments on this:
1. The Wanunu paper is a few months old (I read it back in June I think). I wonder why the publisher chose to highlight it now?
As it is, the review is nowhere close to being as dismissive of nanopore sequencing as suggested in the press release. As pointed out in the first comment, the review mostly deals with the biophysical aspects of nanopores. The paper also describes some of the drawbacks that could be associated with the enzymatic slowing of DNA - ie similar to the approach taken by ONT (though ONT is supposedly using a motor protein). These drawbacks have been pointed out by a number of people over the years at conferences and forums.
2. While ONT has not released any data, but has received all the hype, very few people paid attention to the work of the Gundlach lab. They are using polymerase to slow down the DNA -which indeed has some disadvantages - but have been very successful in demonstrating single base discrimination for long DNA molecules. This is not actual sequencing, but the closest published result out there validating the nanopore approach.
(I can send you pdfs of both the papers if you are interested. please email at nanoporous at omespeak dot com).
Overall I agree with your post about wrongly dismissing the technology as 'perpetual motion machines of our age'.
[Full disclosure: I work for a company developing nanopore sequencing that is not named Genia, ONT, or Nabsys; nor am I associated with the Gundlach group in nay manner.]
sciengr said...
There's a company in Seattle called Stratos Genomics. I saw they announced a financing based on achieving some level of sequencing on WT alpha hemolysin pores and claim to have a solution for homopolymers. If the animation on their site is accurate this could be the path to commercial nanopore sequencing. I hadn't heard anything about these guys until their press release, anyone have more on them?
Brian Krueger said...
If you read the paper based on the new Genia licensed tech, it's a lot of proof of concept hand waving. They use PEG-bases with varying pegylation. They show that the polymerase can incorporate the base and spit off the PEG, but then say that the leftover triphosphate is too charged. So they replace it with an NH2 using alkaline phosphatase and pass THAT through the pore. But instead of linking all of these steps together, they chemically synthesize the PEG by-products and pass those through the pore. Of course, they say in the future they can link all of these steps together, but the technical hurdles seem much greater than a 2 year solution even for this technology.
The Wanunu review is pretty good, although, of the 30 pages, only about a paragraph is spent on nanopore DNA sequencing. The review wasn't dismissive at all, but said that even after decades of research the tech is still in its infancy and needs to overcome many hurdles.
Anonymous said...
Wanunu paper is available from his web site:
|
global_05_local_4_shard_00000656_processed.jsonl/47229
|
Mustache by Funkey Monkeys (from Mustache, cdbaby, 2007)
Sinkhole by The Successful Failures (from Three Nights, cdbaby, 2010)
Pancake Attack by KiD’n together (from Singin’ At The Swingset, KiD’n Together, 1997)
Rumble by Link Wray (from Rumble! the best of Link Wray, Rhino, 1993)
Rambler’s Blues by Lonnie Johnson (from Rambler’s Blues, Werner Last’s Favourites Jazz, 2010)
|
global_05_local_4_shard_00000656_processed.jsonl/47243
|
You are on the
Your country
FacebookTwitterYoutubepinterestGoogle PlusRss
Add this page to your virtual brochurePrintEmail
The Maison Antoine has a reputation for attracting a string of celebrities who wish to taste the "best chips in Belgium".
The legend is perhaps overstated, but let's give Antoine his due: his chips really are delicious.
The Maison Antoine is a veritable potato war machine...
Three employees work every day and the complete staff consists of 13 people, all with cap, uniform, jumper and overall: the small army wears the chip shop's colours: black, white and red.
And Maison Antoine has great influence on the place Jourdan. All the cafés on the square next to maison Antoine bear a sticker saying they accept clients with chips.
© Original text by Julien Thomas
information, texts, photos, location of chip shops, technical files, a dictionary on chips can be found in detail on the app Top49 Fritkots of Brussels created by Blablapps.
The appplication tells you where there is an open chip shops at any time, a great help if you're feeling peckish!
|
global_05_local_4_shard_00000656_processed.jsonl/47244
|
Abstraction in reasoning about higraph-based systems
Power, J. and Tourlas, K., 2003. Abstraction in reasoning about higraph-based systems. In: Foundations of Software Science and Computation Structures 6th International Conference, FOSSACS 2003 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003 Warsaw, Poland, April 7–11, 2003 Proceedings. Vol. 2620. Berlin: Springer, pp. 392-408. (Lecture Notes in Comput. Sci.)
Related documents:
Official URL:
Higraphs, a kind of hierarchical graph, underlie a number of sophisticated diagrammatic formalisms, including Statecharts. Naturally arising from hierarchy in higraphs is an abstraction operation known as zooming out, which is of profound importance to reasoning about higraph-based systems. We motivate how, in general, the use of zooming in reasoning requires sophisticated extensions to the basic notion of higraph and a careful definition of higraph dynamics (i.e. semantics), which we contribute. Our main results characterise zooming by means of a universal property and establish a precise relationship between the dynamics of a higraph and that of its zoom-out.
Item Type Book Sections
CreatorsPower, J.and Tourlas, K.
DepartmentsFaculty of Science > Computer Science
ID Code5519
Actions (login required)
View Item
|
global_05_local_4_shard_00000656_processed.jsonl/47247
|
Linux Command Directory
Linux in a Nutshell
Buy it now, or read it online on Safari Bookshelf.
cfdisk [options] [device]
System administration command. Partition a hard disk using a full-screen display. Normally, device will be /dev/hda, /dev/hdb, /dev/sda, /dev/sdb, /dev/hdc, /dev/hdd, and so on; the default is the first device on the system. See also fdisk.
Use an arrow on the left side to highlight the currently selected partition, instead of reverse video.
-c cylinders
Specify the number of cylinders to use to format the specified device.
Ignore driver-provided geometry; guess one instead.
-h heads
Specify the number of heads to use to format the specified device.
-s sectors
Specify the number of sectors per track to use to format the specified device.
Print version number and exit.
Do not read the partition table; partition from scratch.
-P format
Display the partition table in format, which must be r (raw data), s (sector order), or t (table format). See the manpage for the meaning of the fields in the raw format, which shows what will be written by cfdisk for each partition. The sector format shows information about the sectors used by each partition. The table format shows the starting and ending head, sector, and cylinder for each partition.
up arrow, down arrow
Move among partitions.
left arrow, right arrow
Move among commands at the bottom of the screen.
Enter key
Select currently highlighted command or value.
Toggle flag indicating whether selected partition is bootable.
Delete partition (allow other partitions to use its space).
Alter the disk's geometry. Prompt for what to change: cylinders, heads, or sectors (c, h, or s, respectively).
Attempt to ensure maximum usage of disk space in the partition.
Create a new partition. Prompt for more information.
Print the partition table to a file. Possible formats are the same as for the -P option.
Quit without saving information.
Prompt for a new filesystem type, and change to that type.
Change the partition-size units. The choice of units rotates from megabytes to sectors to cylinders and back.
Save information. Must be uppercase, to prevent accidental writing.
More Linux resources from O'Reilly >>
Popular Topics
Browse Books & Videos
International Sites
O'Reilly China O'Reilly Germany O'Reilly Japan
|
global_05_local_4_shard_00000656_processed.jsonl/47249
|
Mystery in Moscow
by , August 29, 2008
Crisis in the Caucasus took an unexpected twist this week. As Russian troops pulled out of Georgia, their demolition of American-built military bases nearly complete, the government in Moscow recognized Abkhazia and South Ossetia as independent states. Until now, Moscow’s official policy of support to the breakaway regions stopped short of recognition – even in the wake of the U.S.-EU severing of Kosovo from Serbia earlier this year.
Strongly worded condemnations of Russia’s action came on Tuesday from the very same countries that just a few months earlier recognized the "independence" of Kosovo. Few in Washington, Paris or London seemed to notice the hypocrisy; to them, Kosovo was a "unique case" that "set no precedent" whatsoever – because they said so.
All the belligerent posturing is making it difficult to understand why exactly Dimitri Medvedev decided to recognize the two breakaway provinces, already virtually independent since 1992.
A Mistake… Maybe
There was no pressure on Moscow to act. Both Ossetia and Abkhazia have been de facto independent since 1992. Sure, the legislature passed a resolution endorsing their independence, but it was non-binding. The Georgian threat, embodied in the belligerent Saakashvili regime and its NATO-trained and equipped military, was largely neutralized by August 15. Moscow could have sat back and waited for the angry Georgians to depose their tie-chewing American president, then negotiated a peace granting independence to the disputed regions in exchange for some kind of incentive for Tbilisi.
By recognizing the two provinces, the argument goes, Moscow completely antagonized the Georgians, irritated the West, and undermined its own principled foreign policy of insisting on international law (specifically when it comes to the illegal secession of Kosovo).
Of course, given that Georgia was already a 100% client state of Washington, and that no matter what Russia did or did not do it would still be demonized in the West, those two points hardly seem relevant. What about the principle of sovereignty, then? This is the truly puzzling part.
By claiming that Ossetia and Abkhazia simply followed the Kosovo precedent, Russia effectively abandoned the moral high ground from which it criticized NATO’s aggression in the Balkans, and admitted that the world order is now based on the pernicious doctrine of "might makes right" and "whatever we can get away with." Washington and Brussels have operated from those premises for years, but their results have been less than stellar. It was precisely the insistence of rising powers like Russia, China and India on existing international law – while its self-proclaimed guardians violated it left and right – that made their challenge to Atlantic hegemony that much stronger.
The Serbian Angle
What does Moscow gain from abandoning the defense of sovereignty? There does not seem to be a satisfactory answer at the present time. However, looking at Serbia could help explain why Moscow may have felt it had nothing to gain from staying the course.
Legendary Soviet dissident Aleksandr Solzhenitsyn, who passed away recently, argued that the 1999 Kosovo war shattered the illusions of Russians about the West. It cannot be a coincidence that very soon after Yeltsin had turned Belgrade over to NATO’s tender mercies, he was out – and Putin was in. While one ought to be cautious not to overestimate the influence of Serbian affairs on Russian policy, ignoring it altogether – as Western media and politicians tend to do – is downright stupid.
For all the talk of a "historical alliance," relations between Serbia and Russia were actually pretty cold for most of the 20th century, mostly because of Communism. In 1991, the Milosevic government supported the August coup; the coup failed, and so did the Soviet Union, which Boris Yeltsin dissolved precisely the way Yugoslavia was soon to disintegrate (over Serbian objections).
Moscow’s protests over the NATO air war in 1999 were dismissed in the West as sentimental – but they had less to do with Serbia and more to do with NATO spreading and assuming an offensive role.
Given that the coalition that overthrew Milosevic in 2000 was organized by the U.S. – this was later replicated as "color revolutions" in Ukraine and Georgia – Moscow did not have much of a relationship with DOS. Only in 2005, after Washington launched the crusade for Kosovo’s separation, did the desperate Prime Minister Vojislav Kostunica find a sympathetic ear in Moscow. Last year, Serbia even signed a deal to sell its national oil conglomerate NIS to the Russian giant Gazprom, and become a conduit for the "South Stream" pipeline.
However, in February this year the political situation in Serbia changed drastically, with the re-election of the slavishly pro-American and pro-EU president Boris Tadic. Following the general elections in May, his Democratic Party succeeded in capturing the legislature as well. Belgrade stopped fighting the seizure of Kosovo – except rhetorically – and the "South Stream" deal got bogged down in red tape. Russians suddenly found themselves being more Serb than the Serbs.
It is entirely plausible that Medvedev and Putin may have decided that ongoing support for Serbia made no sense if the authorities in Belgrade insisted on becoming American clients. Why should Russia care about Kosovo, if Serbia does not?
Failure to Communicate
Furthermore, the pragmatic Russians must have realized that their arguments concerning Kosovo weren’t going to change the situation there, mostly because the Empire showed no intention of listening. It "created reality" by force, claimed everything was legal because it said so, and simply brushed Russian objections aside – for what could they do, invade? Moscow’s response was to engage in its own reality-shaping by force, in a region where Russia had the guns and NATO was the one with nothing but words.
If Medvedev and Putin thought this would teach the Empire a lesson, however, they were mistaken; firmly in the grip of solipsistic pseudo-logic, Washington is utterly incapable of seeing itself through the eyes of others. Even the misguided comparison of Ossetia with Kosovo fell on deaf ears, because indignant voices quickly cried out that Kosovo (being an American intervention) was right, while Ossetia (being Russian) was wrong!
Bizarro World
Medvedev and Putin are not angels – but they never claimed to be. That claim is the sole purview of American Emperors, a sign of madness that Bush/Cheney, Obama/Biden and McCain/Whoever all have in common. To them, it doesn’t actually matter what Russia does – whatever anyone but America (and its "allies") does is by definition evil.
Read more by Nebojsa Malic
|
global_05_local_4_shard_00000656_processed.jsonl/47283
|
Trailing-Edge - PDP-10 Archives - decuslib10-04 - 43,50322/break.doc
Click 43,50322/break.doc to see without markup as text/plain
There are no other files named break.doc in the archive.
DEBUGGING FACILITIES
Debugging a collection of LISP functions involves
isolating problems within particular functions and/or
determining when and where incorrect data are being
generated and transmitted. In the UCI LISP system, there
are five facilities which aid the user in monitoring his
program. One of these is the Error Package which takes
control whenever an error occurs in a program and which
allows the user to examine the state of the world (see
section on 'ERROR PACKAGE'). Another facility allows the
user to temporarily interrupt his computation and examine
its progress. The other three facilities (BREAK, TRACE and
BREAKIN) allow the user to (temporarily) modify selected
function definitions so that he can follow the flow of
control in his programs. All of these facilities use the
same system function, BREAK1, as the user interface.
BREAK, BREAKIN and TRACE together are called the Break
Package. BREAK and TRACE can be used on compiled and system
functions as well as EXPR's, FEXPR's and MACRO's. BREAKIN
can be used only with interpreted functions.
BREAK modifies the definition of a function FN, so that
if a break condition (defined by the user) is satisified,
the process is halted temporarily on a call to FN. The user
can then interrogate the state of the machine, perform any
computations, and continue or return from the call.
TRACE modifies a definition of a function FN so that
whenever FN is called, its arguments (or some other values
specified by the user) are printed. When the value of FN is
computed it is printed also.
BREAKIN allows the user to insert a breakpoint inside
an expression defining a function. When the breakpoint is
reached and if a break condition (defined by the user) is
satisfied, a temporary halt occurs and the user can again
investigate the state of the computation.
The two examples on pages 1.3 and 1.4 illustrate these
facilities. In the first example, the user traces the
function FACTORIAL. TRACE redefines FACTORIAL so that it
calls BREAK1 in such a way that it prints some information,
in this case the arguments and value of FACTORIAL, and then
1 . 1
goes on with the computation. When an error occurs on the
fifth recursion, BREAK1 reverts to interactive mode, and a
full break occurs. The situation is then the same as though
the user had originally performed (BREAK FACTORIAL) instead
of (TRACE FACTORIAL), and the user can evaluate various LISP
forms and direct the course of the computation. In this
case, the user examines the variable N, instructs BREAK1 to
change L to 1 and continue. The > command, following an
UNBOUND ATOM or UNDEFINED FUNCTION error, tells BREAK1 to
use the next expression instead of the atom which caused the
error. The > command does a destructive replacement of, in
this case, 1 for L, and saves an edit step by correcting the
typo in the function definition. The rest of the tracing
proceeds without incident. The function UNTRACE restores
FACTORIAL to its original definition.
In the second example, the user has written Ackermann's
function. He then uses BREAK to place a call to BREAK1
around the body of the function. He indicates that ACK is
to be broken when M equals N and that before the break
occurs, the arguments to ACK are to be printed. While
calculating (ACK 2 1), ACK is called twice when M = N.
During the first of these breaks, the user prints out a
backtrace of the function names and variable bindings. He
continues the computation with a GO which causes the value
of (ACK 1 1), 3, to be printed before the break is released.
The second break is released with an OK which does not print
the result of (ACK 1 1). The function UNBREAK with an
argument T restores the latest broken or traced function to
its original definition.
For further information on how to use BREAK, TRACE and
BREAKIN, see the section on The Break Package.
1 . 2
*(DE FACTORIAL (N)
(COND ((ZEROP N) L)
(T (TIMES N (FACTORIAL (SUB1 N))))))
*(TRACE FACTORIAL)
*(FACTORIAL 4)
! N = 4
! ENTER FACTORIAL:
! ! N = 3
! ! ENTER FACTORIAL:
! ! ! N = 2
! ! ! ENTER FACTORIAL:
! ! ! ! N = 1
! ! ! ! ENTER FACTORIAL:
! ! ! ! ! N = 0
(L BROKEN)
1:> 1
! ! ! ! FACTORIAL = 1
! ! ! FACTORIAL = 1
! ! FACTORIAL = 2
! FACTORIAL = 6
FACTORIAL = 30
*(FACTORIAL 4)
1 . 3
*(DE ACK (M N)
(COND ((ZEROP M) (ADD1 N))
((ZEROP N) (ACK (SUB1 M) 1))
(T (ACK (SUB1 M) (ACK M (SUB1 N))))))
*(BREAK (ACK (EQ N M) (ARGS)))
*(ACK 2 1)
M = 1
N = 1
(ACK BROKEN)
M = 1
N = 1
M = 2
N = 0
M = 2
N = 1
M = 1
N = 1
(ACK BROKEN)
*(UNBREAK T)
1 . 4
Interrupting a computation-REE and DDT
A useful feature for debugging is a way to temporarily
suspend computation. If the user wishes to know how his
computation is proceeding (i.e. is he in an infinite loop
or is system response poor). Then type Control-C twice
(which will cause a return to the monitor) followed by
either REE or DDT. After typing REE the user must respond
with one of the following control characters; Control-H,
Control-B, Control-G, Control-E or Control-Z. Typing DDT is
equivalent to typing REE followed by Control-H.
1. Control-H: This will cause the computation to continue,
but a break will occur the next time a function is called
(except for a compiled function called by a compiled
function). A message of the form (-- BROKEN) is typed and
the user is in BREAK1 (see the next section). He can
examine the state of the world and continue or stop his
computation using any of the BREAK1 commands. WARNING It is
possible to get into an infinite loop that does not include
calls to functions other than compiled functions called by
compiled functions. These will continue to run. (In such
cases, type Control-C twice, followed by REE, followed by
one of the other control characters).
2. Control-B: This will cause the system to back up to the
last expression to be evaluated and cause a break (putting
the user in BREAK1 with all the power of BREAK1 at the
user's command. This does not include calls to compiled
functions by other compiled functions.
3. Control-G: This causes an (ERR ERRORX) which returns to
the last (ERRSET ERRORX). This enables the user to
Control-C out of the Break package or the Editor, reenter
and return to the appropriate command level. (i.e. if the
user were several levels deep in the Editor for example,
Control-G will return him to the correct command level of
the Editor).
1 . 5
4. Control-E: This does an (ERR NIL), which return NIL to
the last ERRSET. (See section on changes to ERR and
5. Control-Z: This returns the user to the top-level of
LISP, (i.e. either the READ-EVAL-PRINT loop or the current
6. Control-R: This restores the normal system OBLIST.
Another of the above control characters must be typed after
this character is typed. This will often recover after a
GARBAGED OBLIST message.
1 . 5 . 1
The heart of the debugging package is a function called
BREAK1. BREAK and TRACE redefine your functions in terms of
BREAK1. When an error occurs control is passed to BREAK1.
The DDT break feature is also implemented using BREAK1.
Whenever LISP types a message of the form (-- BROKEN)
followed by 'n:' the user is then 'talking to' BREAK1, and
he is 'in a break.' BREAK1 allows the user to interrogate
the state of the world and affect the course of the
computation. It uses the prompt character ':' to indicate
it is ready to accept input(s) for evaluation, in the same
way as the top level of LISP uses '*'. The n before the ':'
is the level number which indicates how many levels of
BREAK1 are currently open. The user may type in an
expression for evaluation and the value will be printed out,
followed by another ':'. Or the user can type in one of the
commands described below which are specifically recognized
by BREAK1 (for summary of commands see Table I, page 1.25).
Since BREAK1 puts all of the power of LISP at the
user's command, he can do anything he can do at the top
level of LISP. For example, he can define new functions or
edit existing ones, set breaks, or trace functions. The
user may evaluate an expression, see that the value was
incorrect, call the editor, change a function, and evaluate
the expression again, all without leaving the break.
It is important to emphasize that once a break occurs,
the user is in complete control of the flow of the
computation, and the computation will not proceed without
specific instruction from him. Only if the user gives one
of the commands that exits from the break (GO, OK, RETURN,
FROM?=, EX) will the computation continue. If the user
wants to abort the computation, this also can be done (using
^ or ^^).
Note that BREAK1 is just another LISP function, not a
special system feature like the interpreter or the garbage
collector. It has arguments and returns a value, the same
as any other function. A call to BREAK1 has the form
The arguments to BREAK1 are: BRKWHEN is a LISP function
which is evaluated to determine if a break will occur. If
1 . 6
BRKWHEN returns NIL, BRKEXP is evaluated and returned as the
value of the BREAK1. Otherwise a break occurs. BRKFN is
the name of the function being broken and is used to print
an identifying message. BRKCOMS is a list of command lines
(as returned by READLINE) which are executed as if they had
been typed in from the teletype. The command lines on
BRKCOMS are executed before commands are accepted from the
teletype, so that if one of the commands on BRKCOMS causes a
return, a break occurs without the need for teletype
interaction. BRKTYPE identifies the type of the break. It
is used primarily by the error package and in all cases the
user can use NIL for this argument.
The value returned by BREAK1 is called 'the value of
the break.' The user can specify this value explicitly by
using the RETURN command described below. In most cases,
however, the value of the break is given implicitly, via a
GO or OK command, and is the result of evaluating 'the break
expression,' BRKEXP.
BRKEXP is, in general, an expression
equivalent to the computation that would have
taken place had no break occurred. In other
words, one can think of BREAK1 as a fancy EVAL,
which permits interaction before and after
evaluation. The break expression then corresponds
to the argument to EVAL. For BREAK and TRACE,
BRKEXP is a form equivalent to that of the
function being traced or broken. For errors,
BRKEXP is the form which caused the error. For
DDT breaks, BRKEXP is the next form to be
1 . 7
Break Commands
Once in a break, in addition to evaluating expressions,
the user can ask BREAK1 to perform certain useful actions by
giving it atomic items as "break commands". The following
commands can be typed in by the user or may be put on the
list BRKCOMS. TABLE I (page 1.25) is a summary of these
All printing in BREAK1 is done by calling (%PRINFN
expr). %PRINFN is an atom (not a function) which should
evaluate to the name of a printing function of one argument.
%PRINFN is initialized to use PRINTLEV because it can print
circular lists, which quite often result from errors.
PRINTLEV only prints lists to a depth of 6. This depth
parameter may be changed by setting the value of %LOOKDPTH.
PRINTLEV is necessarily slow and if you are not printing
circular structures, traces can be speeded up greatly by
changing the value of %PRINFN to PRIN1.
Releases the break and allows the computation
to proceed. BREAK1 evaluates BRKEXP, its first
argument, prints the value, and returns it as the
value of the break. BRKEXP is the expression set up
by the function that called BREAK1. For BREAK or
TRACE, BRKEXP is equivalent to the body of the
definition of the broken function. For the error
package, BRKEXP is the expression in which the error
occurred. For DDT breaks, it is the next form to be
Same as GO except that the value of BRKEXP is
not printed.
Causes BRKEXP to be evaluated. The break is
maintained and the value of the evaluation is
printed and bound on the variable !VALUE. Typing GO
or OK will not cause reevaluation of BRKEXP
following EVAL but another EVAL will. EVAL is a
useful command when the user is not sure whether or
not the break will produce the correct value and
1 . 8
wishes to be able to do something about it if it is
RETURN form
The form is evaluated and its value is returned
as the value of the break. For example, one might
use the EVAL command and follow this with
RETURN (REVERSE !VALUE).
FROM?= form
This permits the user to release the break and
return to a previous context with form to be
evaluated. For details see context commands.
> [or ->] expr
For use either with UNBOUND ATOM error or
UNDEFINED FUNCTION error. Replaces the expression
containing the error with expr (not the value of
expr) e.g.,
UNDEFINED FUNCTION
(FOO1 BROKEN)
1:> FOO
changes FOO1 to FOO and continues the computation.
Expr need not be atomic, e.g.,
UNBOUND ATOM
(FOO BROKEN)
1:> (QUOTE FOO)
For UNDEFINED FUNCTION breaks, the user can specify
a function and its first argument, e.g.,
UNDEFINED FUNCTION
(MEMBERX BROKEN)
1:> MEMBER X
Note that in the some cases the form containing the
offending atom will not be on the stack (notably,
after calls to APPLY) and in these cases the
function definition will not be changed. In most
cases, however, > will correct the function
1 . 9
USE x FOR y
Causes all occurrences of y in the form on the
stack at LASTPOS (for Error breaks, unless a F
command has been used, this form is the one in which
the error occurred.) to be replaced (RPLACA'ed) by
x. Note: This is a destructive change to the
s-expression involved and will, for example,
permanently change the definition of a function and
make a edit step unnecessary.
Calls ERR and aborts the break. This is a
useful way to unwind to a higher level break. All
other errors, including those encountered while
executing the GO, OK, EVAL, and RETURN commands,
maintain the break.
This returns control directly to the top level
of LISP.
Prints the names and the current values of the
arguments of BRKFN. In most cases, these are the
arguments of the broken function.
1 . 10
Context Commands
All information pertaining to the evaluation of forms
in LISP is kept on the special push down stack. Whenever a
form is evaluated, that form is placed on the special push
down stack. Whenever a variable is bound, the old binding
is saved on the special push down stack. The context (the
bindings of free variables) of a function is determined by
its position in the stack. When a break occurs, it is often
useful to explore the contexts of other functions on the
stack. BREAK1 allows this by means of a context pointer,
LASTPOS, which is a pointer into the special push down
stack. BREAK1 contains commands to move the context pointer
and to evaluate atoms or expressions as of its position in
the stack. For the purposes of this document, when moving
through the stack, "backward" is considered to be toward the
top level or, equivalently, towards the older function calls
on the stack.
F [or &] arg1 arg2 ... argN
Resets the variable LASTPOS, which establishes
a context for the commands ?=, USE, EX and FROM?=,
and the backtrace commands described below. LASTPOS
is the position of a function call on the special
push down list. It is initialized to the function
just before the call to BREAK1.
F takes the rest of the teletype line as its
list of arguments. F first resets LASTPOS to the
function call just before the call to BREAK1, and
then for each atomic argument, F searches backward
for a call to that atom. The following atoms are
treated specially:
When used as the first argument
caused LASTPOS not to be reset to
above BREAK1 but continues searching
from the previous position of LASTPOS.
If negative, move LASTPOS back
(i.e. towards the top level) that
number of calls, if positive, forward.
1 . 11
Search forward instead of
backward for the next atom
If the special push-down stack looks like
BREAK1 (13)
FOO (12)
SETQ (11)
COND (10)
PROG (9)
FIE (8)
COND (7)
FIE (6)
COND (5)
FIE (4)
COND (3)
PROG (2)
FUM (1)
F FIE COND will set LASTPOS to to (7)
F & COND will then set LASTPOS to (5)
F FUM _ FIE will stop at (4)
F & 2 will then move LASTPOS to (6)
F will reset LASTPOS to (12)
If F cannot successfully complete a search,
for argN or if argN is a number and F cannot move
the number of functions asked, "argN?" is typed.
In either case, LASTPOS is restored to its value
before the F command was entered. Note: It is
possible to move past BRKEXP (i.e. into the break
package functions) when searching or moving
When F finishes, it types the name of the
function at LASTPOS.
F can be used on BRKCOMS. In which case, the
remainder of the list is treated as the list of
arguments. (i.e. (F FOO FIE FOO)
1 . 12
EDIT arg1 arg2 ... argN
EDIT uses its arguments to reset LASTPOS in
the same manner as the F command. The form at
LASTPOS is then given to the LISP Editor. This
commands can often times save the user from the
trouble of calling EDITF and the finding the
expression that he needs to edit.
?= arg1 arg2 ... argN
This is a multi-purpose command. Its most
common use is to interrogate the value(s) of the
arguments of the broken function, (ARGS is also
useful for this purpose.) e.g. if FOO has three
arguments (X Y Z), then typing ?= to a break of
FOO, will produce:
X = value of X
Y = value of Y
Z = value of Z
?= takes the rest of the teletype line as its
arguments. If the argument list to ?= is NIL, as
in the above case, it prints all of the arguments
of the function at LASTPOS. If the user types
?= X (CAR Y)
he will see the value of X, and the value of (CAR
Y). The difference between using ?= and typing X
and (CAR Y) directly into BREAK1 is that ?=
evaluates its inputs as of LASTPOS. This provides
a way of examining variables or forms as of a
particular point on the stack. For example,
F (FOO FOO)
?= X
will allow the user to examine the value of X in an
earlier call to FOO.
?= also recognizes numbers as referring to the
correspondingly numbered argument. Thus
:F FIE
:?= 2
1 . 13
will print the name and value of the second
argument of FIE (providing FIE is not compiled).
?= can also be used on BRKCOMS, in which case
the remainder of the list on BRKCOMS is treated as
the list of arguments. For example, if BRKCOMS is
((EVAL) (?= X (CAR Y)) GO)), BRKEXP will be
evaluated, the values of X and (CAR Y) printed, and
then the function exited with its value being
FROM?= [form]
FROM?= exits from the break by undoing the
special push down stack back to LASTPOS. If FORM
is NIL or missing, re-evaluation continues with the
form on the push down stack at LASTPOS. If FORM is
not NIL, the function call on the push down stack
at LASTPOS is replaced by FORM and evaluation
continues with FORM. FORM is evaluated in the
context of LASTPOS. There is no way of recovering
the break because the push down stack has been
undone. FROM?= allows the user to, among other
things, return a particular value as the value of
any function call on the stack. To return 1 as the
value of the previous call to FOO:
:F FOO
:FROM?= 1
Since form is evaluated after it is placed on the
stack, a value of NIL can be returned by using
(QUOTE NIL).
EX exits from the break and re-evaluates the
form at LASTPOS. EX is equivalent to FROM?= NIL.
1 . 14
Backtrace Commands
The backtrace commands print information about
function calls on the special push down list. The
information is printed in the reverse order that the calls
were made. All backtraces start at LASTPOS.
BKF gives a backtrace of the names of
functions that are still pending.
BKE gives a backtrace of the expressions which
called functions still pending (i.e. It prints the
function calls themselves instead of only the names
as in BKF).
BK gives a full backtrace of all expressions
still pending.
All of the backtrace commands may be suffixed by a 'V'
and/or followed by an integer. If the integer is included,
it specifies how many blocks are to be printed. The
limiting point of a block is a function call. This form is
useful when working on a Data Point. Using the integer
feature in conjunction with the F command, which moves
LASTPOS, the user can display any contiguous part of the
backtrace. If a 'V' is included, variable bindings are
printed along with the expressions in the backtrace.
BKFV would print the names and variable
bindings of the functions called before
BKV 5 would print everything (expressions and
variables) for 5 blocks before LASTPOS.
1 . 15
The output of the backtrace commands deserves some
explanation. Right circular lists are only printed up to
the point where they start repeating and are closed with
'...]' instead of a right parenthesis. Lists are only
printed to a depth of 2. /#/ Is a notation which
represents "the previous expression". For example, (SETQ
FIE (FOO)) would appear in a BK backtrace as
(SETQ FIE /#/)
1 . 16
Whenever an atomic command is encountered by BREAK1
that it does not recognize, either via BRKCOMS or the
teletype, it searches (using ASSOC) the list BREAKMACROS to
see if the atom has been defined as a break macro. The
form of BREAKMACROS definitions is ( ... (atom ttyline1
ttyline2 ... ttylineN) ... ). ATOM is the command name.
ARGS is the argument(s) for the macro. The arguments of a
breakmacro are assigned values from the remainder of the
command line in which the macro is called. If ARGS is
atomic, it is assigned the remainder of the command line as
its value. If ARGS is a list, the elements of the rest of
the command line are assigned to the variables, in order.
If there are more variables in ARGS then items in the rest
of the command line, a value of NIL is filled in. Extra
items on the command line are ignored. The TTYLINEs are
the body of the breakmacro definition and are lists of
break commands or forms to be evaluated. If the atom is
defined as a macro, (i.e. is found on BREAKMACROS) BREAK1
assigns values to the variables in ARGS, substitutes these
values for all occurrences of the variables in TTYLINEs and
appends the TTYLINEs to the front of BRKCOMS. When BREAK1
is ready to accept another command, if BRKCOMS is non-NIL
it takes the first element of BRKCOMS and processes it
exactly as if it had been a line input from the teletype.
This means that a macro name can be defined to expand to
any arbitrary collection of expressions that the user could
type in. If the command is not contained in BREAKMACROS,
it is treated as a function or variable as before.
Example: a command PARGS to print the arguments of the
function at LASTPOS could be defined by evaluating:
A command FP which finds a place on the SPD stack and
prints the form there can be defined by:
1 . 17
BREAK PACKAGE
How To Set A Break
The following functions are useful for setting and
unsetting breaks and traces.
Both BREAK and TRACE use a function BREAK0 to do the
actual modification of function definitions. When BREAK0
breaks a SUBR or an FSUBR, it prints a message of the form
(--- . ARGUMENT LIST?). The user should respond with a
list of arguments for the function being broken. (FSUBR's
take only one argument and BREAK0 checks for this.) The
arguments on this list are actually bound during the calls
to the broken function and care should be taken to insure
that they do not conflict with free variables. For
LSUBR's, the atom N? Is used as the argument. It is
possible to GRINDEF and edit functions that are traced or
broken. BROKENFNS is a list of the functions currently
broken. TRACEDFNS is a list of the functions currently
BREAK is an FEXPR. For each atomic argument, it
breaks the function named each time it is called. For each
list in the form (fn1 IN fn2), it breaks only those
occurrences of FN1 which appear in FN2. This feature is
very useful for breaking a function that is called from
many places, but where one is only interested in the call
from a specific function, e.g. (RPLACA IN FOO), (PRINT IN
FIE), etc. For each list not in this form, it assumes that
the CAR is a function to be broken; the CADR is the break
condition; (When the fuction is called, the break condition
is evaluated. If it returns a non-NIL value, the break
occurs. Otherwise, the computation continues without a
break.) and the CDDR is a list of command lines to be
performed before an interactive break is made (see BRWHEN
and BRKCOMS of BREAK1). For example,
(BREAK FOO1 (FOO2 (GREATERP N 5) (ARGS)))
will break all calls to FOO1 and all calls on FOO2 when N
is greater than 2 after first printing the arguments of
1 . 18
(BREAK ((FOO4 IN FOO5) (MINUSP X)))
will break all calls to FOO4 made from FOO5 when X is
(BREAK FOO)
(BREAK ((GET IN FOO) T (GO)))
(BREAK (SETQ (EQ N 1) ((PRINT (QUOTE N=1)))(?= M)))
TRACE is an FEXPR. For each atomic argument, it
traces the function named (see form on page 1.3) each time
it is called. For each list in the form (fn1 IN fn2), it
traces only those calls to FN1 that occur within FN2. For
each list argument not in this form, the CAR is the
function to be traced, and the CDR is a list of variables
(or forms) the user wishes to see in the trace.
For example, (TRACE (FOO1 Y) (SETQ IN FOO3)) will
cause both FOO1 and SETQ IN FOO3 to be traced. SETQ's
argument will be printed and the value of Y will be printed
for FOO1.
TRACE uses the global variable #%INDENT to keep its
position on the line. The printing of output by TRACE is
printed using %PRINFN (see page 1.9). TRACE can therefore
be pretty printed by:
(SETQ %PRINFN (QUOTE PRETPRIN))
(DE PRETPRIN (FORM)
(SPRINT FORM (*PLUS 10 #%INDENT)))
(TRACE FOO)
(TRACE *TIMES (SELECTQ IN DOIT))
(TRACE (EVAL IN FOO))
(TRACE (TRY M N X (*PLUS N M)))
Note: The user can always call BREAK0 himself to
obtain combinations of options of BREAK1 not directly
available with BREAK and TRACE (see section on BREAK0
below). These functions merely provide convenient ways of
calling BREAK0, and will serve for most uses.
1 . 19
BREAKIN enables the user to insert a break, i.e., a
call to BREAK1, at a specified location in an interpreted
function. For example, if FOO calls FIE, inserting a break
in FOO before the call to FIE is similar to breaking FIE.
However, BREAKIN can be used to insert breaks before or
after prog labels, particular SETQ expressions, or even the
evaluation of a variable. This is because BREAKIN operates
by calling the editor and actually inserting a call to
BREAK1 at a specified point inside of the function.
The user specifies where the break is to be inserted
by a sequence of editor commands. These commands are
preceded by BEFORE, AFTER, or AROUND, which BREAKIN uses to
determine what to do once the editor has found the
specified point, i.e., put the call to BREAK1 BEFORE that
point, AFTER that point, or AROUND that point. For
example, (BEFORE COND) will insert a break before the first
occurrence of COND, (AFTER COND 2 1) will insert a break
after the predicate in the first COND clause, (AFTER BF
(SETQ X F)) after the last place X is set. Note that
(BEFORE TTY:), (AROUND TTY:) or (AFTER TTY:) permit the
user to type in commands to the editor, locate the correct
point, and verify it for himself using the P command, if he
desires. Upon exit from the editor with OK, the break is
inserted. (A STOP command typed to TTY: produces the same
effect as an unsuccessful edit command in the original
specification, e.g., (BEFORE CONDD). In both cases, the
editor aborts, and BREAKIN types (NOT FOUND).)
for BREAKIN BEFORE or AFTER, the break expression is
NIL, since the value of the break is usually not of
interest. For BREAKIN AROUND, the break expression will be
the indicated form. When in the break, the user can use
the EVAL command to evaluate that form, and see its value,
before allowing the computation to proceed. For example,
if the user inserted a break after a COND predicate, e.g.,
(AFTER (EQUAL X Y)), he would be powerless to alter the
flow fo computation if the predicate were not true, since
the break would not be reached. However, by breaking
(AROUND (EQUAL X Y)), he can evaluate the break expression,
i.e., (EQUAL X Y), see its value and evaluate something
else if he wished.
The message typed for a BREAKIN break identifies the
location of the break as well as the function, e.g.,
1 . 20
((FOO (AFTER COND 2 1)) BROKEN).
BREAKIN is an FEXPR which has a maximum of four
arguments. The first argument is the function to be broken
in. The second argument is a list of editor commands,
preceded by BEFORE, AFTER, or AROUND, which specifies the
location inside the function at which to break. If there
is no second argument, a value of (BEFORE TTY:) is assumed.
(See earlier discussion.) The third and fourth arguments
are the break condition and the list of commands to be
performed before the interactive break occurs, (BRKWHEN and
BRKCOMS for BREAK1) respectively. If there is no third
argument, a value of T is assumed for BRKWHEN which causes
a break each time the BREAKIN break is executed. If the
fourth argument is missing, a value of NIL is assumed. For
inserts a break around the first call to COND in FOO.
It is possible to insert multiple break points, with a
single call to BREAKIN by using a list of the form ((BEFORE
...) ... (AROUND ...)) as the second argument. It is also
possible to BREAK or TRACE a function which has been
modified by BREAKIN, and conversely to BREAKIN a function
which is broken or traced. UNBREAK restores functions
which have been broken in. GRINDEF makes no attempt to
correct the modification of BREAKIN so functions should be
unbroken before they are stored on disk.
(BREAKIN FOO (AROUND TTY:) T (?= M N) ((*PLUS X Y)))
(BREAKIN FOO2 (BEFORE SETQ) (EQ X Y))
UNBREAK is an FEXPR. It takes a list of functions
modified by BREAK or BREAKIN and restores them to their
original state. It's value is the list of functions that
were "unbroken".
(UNBREAK T) will unbreak the function most recently
(UNBREAK) will unbreak all of the functions currently
1 . 21
broken (i.e. all those on BROKENFNS).
If one of the functions is not broken, UNBREAK has a
value of (fn NOT BROKEN) for that function and no changes
are made to fn.
Note: If a function is both traced and broken in,
either UNTRACE or UNBREAK will restore the original
function definition.
UNTRACE is an FEXPR. It takes a list of functions
modified by TRACE and restores them to their original
state. It's value is the list of functions that were
(UNTRACE T) will unbreak the function most recently
(UNTRACE) will untrace all of the functions currently
traced (i.e. all those on TRACEDFNS).
If one of the functions is not traced, UNTRACE has a
are made to fn.
1 . 22
BREAK0 [FN WHEN COMS]
BREAK0 is an EXPR. It sets up a break on the function
FN by redefining FN as a call to BREAK1 with BRKEXP a form
equivalent to the definition of FN, and WHEN, FN and COMS
as BRKWHEN, BRKFN, and BRKCOMS, respectively (see BREAK1).
BREAK0 also adds FN to the front of the list BROKENFNS.
It's value is FN.
If FN is non-atomic and of the form (fn1 IN fn2),
BREAK0 first calls a function which changes the name of fn1
wherever it appears inside of fn2 to that of a new
function, fn1-IN-fn2, which is initially defined as fn1.
Then BREAK0 proceeds to break on fn1-IN-fn2 exactly as
described above. This procedure is useful for breaking on
a function that is called from many places, but where one
is only interested in the call from a specific function,
e.g. (RPLACA IN FOO), (PRINT IN FIE), etc. This only works
in interpreted functions. If fn1 is not found in fn2,
BREAK0 returns the value (fn1 NOT FOUND IN fn2).
If FN is non-atomic and not of the above form, BREAK0
is called for each member of FN using the same values for
WHEN and COMS specified in this call to BREAK0. This
distributivity permits the user to specify complicated
break conditions without excessive retyping, e.g.,
(BREAK0 (QUOTE (FOO1 ((PRINT PRIN1)IN (FOO2 FOO3))))
(QUOTE (EQ X T))
(QUOTE ((EVAL) (?= Y Z) OK)))
will break on FOO1, PRINT-IN-FOO2, PRINT-IN-FOO3,
PRIN1-IN-FOO2, and PRIN1-IN-FOO3.
If FN is non-atomic, the value of BREAK0 is a list of
the individual values.
For example, BREAK0 can be used to trace the changing
of particular values by SETQ in the following manner:
*(SETQ VARLIST (QUOTE (X Y FOO)))
*(BREAK0 (QUOTE SETQ) (QUOTE (MEMQ (CAR XXXX) VARLIST))
* (QUOTE ((TRACE) (?=)(UNTRACE))))
(SETQ ARGMENTS?)*(XXXX)
SETQ will be traced whenever CAR of its argument (SETQ is
an FSUBR) is a member of VARLIST.
1 . 23
ERROR PACKAGE
When an error occurs during the evaluation of a LISP
expression, control is turned over to the Error Package.
The I/O is forced to the TTY (channel NIL) but will be
restored to its previous channels if the user continues the
evaluation. The idea behind the error package is that it
may be possible to 'patch up' the form in which the error
occurred and continue. Or, at least, that you can find the
cause of the error more easily if you can examine the state
of the world at the time of the error. Basically, what the
Error Package does is call BREAK1 with BRKEXP set to the
form in which the error occurred. This puts the user 'in a
break' around the form in which the error occurred. BREAK1
acts just like the top level of the interpreter with some
added commands (see section on BREAK1). The main
difference when you are in the Error Package is that the
variable bindings that were in effect when the error
occurred are still in effect. Furthermore, the expressions
that were in the process of evaluation are still pending.
While in the Error Package, variables may be examined or
changed, and functions may be defined or edited just as if
you were at the top level. In addition, there are several
ways in which you can abort or continue from the point of
error. In particular, if you can patch up the error, you
can continue by typing OK. If you can't patch the error, ^
will get you out of the break. When you are in the error
package, the prompt character is ':' and is preceded by a
level number. Note: if you don't want the error package
invoked for some reason, it can be turned off by evaluating
(*RSET NIL). Similarly, (*RSET T) will turn the error
package back on.
There are several atoms which will cause special
actions when typed into BREAK1 (the error package). These
actions are useful for examining the push down stack (e.g.
backtraces), changing forms and exiting from the break in
various ways. Table I (on the next page) gives a summary
of the actions. For a complete description, see the
section on 'What You Can Do In A Break'.
1 . 24
Table I
Break Package Command Summary
(for complete description see pp. 1.8-1.16)
Command Action
GO Evaluates BRKEXP, prints its value,
and continues with this value
OK Same as GO but no print of value
EVAL Reevaluate BRKEXP and print its value.
Its value is bound to !VALUE
RETURN xx Evaluate xx and continue with its value
^ Escape one level of BREAK1
^^ Escape to the top level
> [->] expr After an error, use expr for the erring atom
FROM?= form Continues by re-evaluating form at LASTPOS
EX Same as FROM?= NIL
USE x FOR y Substitutes x for y in form at LASTPOS
F [&] a1..aN Resets LASTPOS (stack context)
EDIT A1..An Resets LASTPOS and gives the form at LASTPOS
to the LISP Editor
?= f1 ... fN Evaluates forms fI as of LASTPOS
ARGS Prints arguments of the broken function
BKF Backtrace Function Names
BKE Backtrace Function Calls
BK Backtrace Expressions
Note: All of the backtrace commands can be combined with a
'V' or followed by an integer. The 'V' will cause the
values of variables to be printed. The integer will limit
1 . 25
the trace to that number of blocks. For example, BK 3,
BKEV, BKFV 5 and BKEV are all legitimate commands.
1 . 26
|
global_05_local_4_shard_00000656_processed.jsonl/47296
|
Scandinavian Perl Workshop 2003
Call for papers
Call for participation
Social events
Practical Information
Getting there
16/6 - Mailinglist available (from jonasbn)
Ask has set up a mailing list for discussing The Nordic Perl Workshop (formerly known as Scandinavian Perl Workshop).
The task is to have the workshop take place in Stockholm next year. The list is in english.
Subscribe at
3/6 - Video snippets online
We're still here.
Jesse Vincents RT3 presentation has been made available in the videos section. More to follow eventually.
30/4 - Additional Presentations online
Presentations by Henrik Sandell and Thomas Ammitzbøll-Bach added
28/4 - Additional Presentations online
Presentations by Anton Berezin, Nicholas Clark, Sören M. L. Sörries and jonasbn added
28/4 - Gallery Opened
The Gallery of the Copenhagen Perl Mongers contain a lot of pictures from the SPW, if you have any picture you want to share with us please contact us
28/4 - First Presentations online
The RT presentation by Jesse Vincent and the presentations by Claes Jacobsson have been put online, more material will follow shortly
27/4 - Call for materials
The workshop is over and we would like to ask people for their pictures, slides, thoughts and more - for publication on this website. Please write with your material. If you would like to submit any big files, please contact us for submission details. Thank you.
26/4 - The official part of the workshop is over
Thank you very much for your attendance - and talks! We hope to be able to welcome you in Stockholm next year for: The Scandinavian Perl Workshop 2004 hosted by the Stockholm Perl Mongers. Interesting stuff.
Also some pictures are available. A big thanks to our sponsors and especially DKUUG.
26/4 - Day two of the workshop
Outside it's raining, but inside - the focus is on Perl, as we start on day two.
25/4 - Day one is over
A very successful day with threads, Mason, test, RT, interlanguage communication and imaging (with Prima).
Right now we are busy doing BoFs, codesessions and networking. Check out our webcam (might be closed for the night). And - oh - the tshirts are here!
On a rather unofficial notice - we intend to go to The Globe at 20:00 tonight for a pint and a chat.
24/4 - Registration is closed
We look forward to seeing all you that have registered tomorrow!
23/4 - Sifira official sponsor of SPW
We are VERY happy to announce that Sifira are sponsoring the last of our speakers, this is really a boost to the workshop, thanks again to Sifira - your sponsorship is much appreciated.
23/4 - Bar Night details are up
The event page have been updated
21/4 - Even more facts and details have been added
Please look here if you need more details.
20/4 - Updates
As we are getting closer to the workshop itself, we are working hard to make everything happen smoothly. Unfortunately it's looking like the t-shirts are not going to happen - but we'll keep you posted. The 'Getting There' section has been updated a bit.
15/4 - Page Added
We have a page listing people and organisations which have been helpful to us organizing the workshop
10/4 - Registration is open
Sign up today - it's only DKK 500.
9/4 - Website updated with yet a new speaker and an abstract
One more speaker added to our extensive list, together with an abstract and the programme is coming close to being complete
8/4 - Website updated with a new speaker and an abstract
One more speaker added to our extensive list, together with an abstract and the programme have had a few rearrangements
5/4 - Website updated with Accommodation links
We have updated with some links to two recommandable hotels in Copenhagen, the social event page has also been updated with its first info.
1/4 - Website being updated
More speakers. More abstracts. More information. Feel free to join on to talk and/or complain to us.
12/3 - Website updated
The very first speakers and their abstracts have been put online - together with a preliminary programme. More to follow.
1/3 - LinuxForum over
The Copenhagen Perl Mongers attended the danish LinuxForum one day conference. We hope that we have attracted some attendees and at least spread the word of the Scandinavian Perl Workshop.
23/2 - Website available
Finally we got some content onto the website. Call for papers and participation has been added.
20/2 - Date and location in place
The final dates are 25/4-2003 and 26/4-2003 at the Symbion Science Park, Copenhagen DK.
Website statistics available
Colocation facilities and bandwidth provided by Orange A/S. Thank you.
Valid HTML 4.01!
|
global_05_local_4_shard_00000656_processed.jsonl/47329
|
Foto: Geraldo Silva, 2000
• Autodenominação
• Where they are How many
MT348 (Unifesp, 2010)
• Linguistic family
Cosmology e shamanism
Part of the Yudjá's cosmological knowledge and ritual life rests on the crucial role of shamans; however, since the 1980s, they have had no more shamans. A few people have tried to revive the practice by taking certain medicines, but they lost courage and gave up. As one leader related in 1989, “I came face to face with a jaguar, so I refused to prepare [the medicine] arïpa any more. I was afraid that would happen again. I think it's dangerous—the jaguar was baiting me! I drank only a little bit and bathed only one time [in the medicine]. After a few days, I went fishing, and the jaguar came toward me when I shot an arrow into a tucunaré [a kind of fish]. It came closer to me and bared its teeth; I grabbed my bow and tried to hit it, but it ran away. I didn't have any hunting arrows, only fishing arrows, just two, and I hadn't even pulled them out of the fish yet. It was dangerous! I though it was going to attack me. That's why I grabbed my bow and brandished it, and the jaguar withdrew a bit and kept on staring at me. I pulled out the arrows from the fish, killed them, and said to the jaguar, 'Come on back!' I wanted to shoot it, but it went away. It's very dangerous! If this had been a dream, fine; if the jaguar had appeared and told me it was baiting me, fine. But it was not a dream.”
Among the probable reasons for this loss of courage, we cannot underestimate either the demographic and sociological tragedy provoked by the rubber boom, or the incorporation of the indigenous societies of the Upper Xingu in the mid-twentieth century by the federal agency responsible for assisting native peoples, or the political context and particular culture of the Xingu Indigenous Reservation. The Yudjá seek out the therapeutic services of Kayabi shamans and, occasionally, of Kamayurá ones (when they need to remove sorcery spells).
Starting in 1987, a few people, male and female, received curing powers from some Kayabi shamans and have been practicing a simplified kind of shamanic therapy. Without having gone through any sort of more formal apprenticeship with Kayabi shamans, their practices combine the notion of power obtained from foreign cosmic forces and their own theories of diseases, of which the most important is that illness is derived, in the final analysis, from human activities. They believe that the energies expended by people on things are replicated by the (souls of) things inside the bodies of those people or their relatives. The shaman is the one who can extract these diseases. In addition to relying on healers who acquired Kayabi powers, the most important shaman in Tubatuba nowadays is an Ikpeng man.
The Yudjá cosmology has three fundamental coordinates:
a) In the first place is the opposition between life and death. This is far from being the drastic dichotomy seen in our cosmology, since there are some crucial transitions engendered by the dynamic functioning of the cosmological machinery, from small temporary deaths, triggered by sleep and typically taking the form of dreams, all the way up to anticipatory deaths. The relation between life and death involves not so much a reciprocal exclusion (such as our notion that if someone is dead, he or she cannot be alive) but, rather, inclusion: someone can be dead here, but alive in another place; he or she may be still alive here but already dead somewhere else. In other words, the relation is one of a relative disjunction, capable of making room for important conjunctions. Yudjá shamans used to be masters of such transitions.
b) In the second place, the axes of the world are established by the oppositions between river and forest, and between sky and earth, each one articulated with the opposition between the presence and absence of cannibalism. The river and the sky have a positive link with cannibalism. One may say that all things that exist can be divided through these oppositions: human beings (river peoples and forest peoples); spirits of the dead (those living in the cliffs on the banks of the Xingu, who do not like human flesh, and those living in the sky); mammals (forest species and those called isãmï living on the river bed); the Yudjá and the ãwã living on the river bed; the Abi living in the forest and the ãwã who live in dark, dirty places in faraway woods. In addition, the Yudjá believe that everything that exists on earth also exists in the sky, which is a kind of earth resembling ours. Even though the Yudjá do not consider the river to be a copy of the forest, they say it can be viewed as a copy of the earth by some river inhabitants, except that the forest in their earth resembles our gallery forests, and their gardens are portions of land broken off from the river banks.
c) In third place is the last fundamental cosmological operation, which rests on the opposition between the point of view of living, conscious human subjects and the point of view of foreign beings, such as animals, isãmï animals, ãwã, and the 'i'ãnay (the dead). The dynamism and complexity of Yudjá cosmology depends strictly upon the confrontation, nearly dangerous, between these discordant points of view.
Yudjá shamanism used to be composed of two systems, each related to one society of the dead. Rarely was it possible for a shaman to practice both types of shamanism: the spirits of the dead inhabiting the river rocks are too afraid of those living in the sky, whose society is composed of the souls of warriors and their leader, the shaman Kumahari. Indeed, the Yudjá may be the ones who nowadays fear these spirits of the sky the most, and this form of shamanism is considerably more powerful, dangerous, and difficult to obtain.
Each system of shamanism used to be associated with a great festival in honor of its particular category of the dead. The festival for the dead of the river cliffs ('i'ãnay karia) was accompanied by the sound of flute music and songs performed by the dead through the mouth of the shaman. The other festival, called duru karia or 'eãmï karia, was accompanied by the music of a set of trumpets (duru). When the Yudjá offered food to Kumahari and his associates during their festival, they said they would rather eat the flesh of roasted Indians brought from the other-world; they also refused to drink manioc beer, saying they were already drunk enough. By contrast, the spirits from the river cliffs would drink plenty after eating the meal from their hosts, spicing up the manioc beer made by Yudjá women with a dose of beer brought from the other-world. Both types of festivals used to last about a month, and their closing ceremonies would draw in participants from different villages. The last of these celebrations were held in the 1970s.
Despite these changes, the ritual life of the Yudjá certainly continues to be intense. Besides breaking up their normal routine with beer parties held at interludes that may be as short as four or five days, the Yudjá celebrate two festivals every year, each held for approximately one month.
According to their mythology, the songs for the festival of cultivated plants (koataha de abï), controlled by the women, originated from a celestial, immortal human race. The Yudjá owe two clarinet (pïri) festivals to the ãwã, manioc beer makers who live in villages at the bottom of the river and lakes. These beings also gave them body adornments that served as distinctive ethnic emblems: downy duck feathers pasted on the hair, and circular red ornaments made of resin and a fringe of red threads, which are pasted to the forehead.
Certainly none of these festivals have the same cosmological significance as the shamanic rituals, but they do bear great social value.
|
global_05_local_4_shard_00000656_processed.jsonl/47347
|
Wyszukaj dowolne słowo, na przykład b4nny:
That's when you stash you're gear, trees, Del Taco, whatever inside of a newspaper vending machine.
1. Place 50 cents into your local newspaper machine.
2. Remove those newspapers, that's your hustle grab those papers and network your self work on your HEMS.
3. Place your stash in the street locker and add a SOLD OUT sign to the window.
4. Come back at the end of the day retrieve your gear.
I can't be carry this steamin' bag of del taco up in hurr the boys gunna me fiendin' let me stash it in my street locker at the corner store.
dodane przez Xtrem3 lipiec 28, 2008
Words related to Street Locker
gear hems hustle stash street the game trees
|
global_05_local_4_shard_00000656_processed.jsonl/47352
|
Additional Support Options
• Commercial support
• Local User Groups
• Training
• Reporting bugs
Looking for the behind-the-scenes information on what the Plone project is up to? You can use Nabble to read it in a forum format, or subscribe to the mailing lists directly.
Also make sure you check out the blogs from the Plone developers & community, and follow Plone on Twitter, Facebook, via RSS or email.
|
global_05_local_4_shard_00000656_processed.jsonl/47383
|
Present Remotely
Send the link below via email or IM
Present to your audience
Start remote presentation
• Invited audience members will follow you as you navigate and present
• People invited to a presentation do not need a Prezi account
• This link expires 10 minutes after you close the presentation
• A maximum of 30 users can follow your presentation
• Learn more about this feature in the manual
Do you really want to delete this prezi?
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
No, thanks
The Story of Sisyphus and Tantalus
No description
by Amanda Helms on 11 December 2012
Comments (0)
Please log in to add your comment.
Report abuse
Transcript of The Story of Sisyphus and Tantalus
By: Amanda Helms The Story of Sisyphus and Tantalus The Beginning... Odysseus enters the land of Hades (The Underworld) to meet with Tiresias, the blind propet. Tiresias tells him that he will not be able to return home because Poseidon had punished all Achaeans for blinding his son, Polythemus Sisyphus Tantalus Who Is Tantalus? He's the son of Zues and Pluto. He married Dione, who is also, just like Sisyphus, one of the 7 Pleiedes sisters. He then had three children, who all had a violent death. Niobe died of sadness after her children were murdered, Broteas was believed that he was invisible by Artemis and then he jumped into a pit of fire, Lastly, Pelops was served in a dish as a sacrifice to the Gods and Goddesses by his father (the main reason why Tantalus was punished). He was favored by all the Gods, especially Zues. In the Odyssey, Odysseus come across Circe. Odysseus was told by Circe, the goddess of magic, to travel to the Underworld to meet Tiresias in order to know how to get home to Ithica. Who Is Sisyphus? Sisyphus is the son of Aeolos, who is the God of the Sea in Greek Mythology. He married Merope, one of the 7 Pleiedes sisters of Atlas and Pleione. He then had three sons, Ornytion, Sinon, and Glaucus. His name comes from the word "sisyphean" which means: endless or unavailing, as labor or task. The Land of Hades Odysseus meets two sinners while in the land of Hades. First, Odysseus comes across the sinner, Sisyphus The Two Sinners The First Sinner: Sisyphus Sisyphus was punished for rape, betrayal of Gods, murder, and cheating death. Sisyphus was punished eternally: he had to push a boulder over a hill, when it reached the peek, it would roll down again The Second Sinner: Tantalus Was punished for being a "not so heavenly host" as he hosted a feast with the Gods and Goddesses, serving chopped up human stew (human: Pelops, his son). Tantalus was affected with extreme hunger and thirst: Every time he reached for the grapes, they moved away, and every time he reached for water, it moved away. End of The Underworld During Odysseus' journey, he
met sinners that had been punished brutally for their crimes. However, when he moved on, he encountered several more hardships. After the Underworld, he passed the Island of the Sirens. Odysseus eventually returns home to kill all his suitors and reunite with his wife, Penelope and his son, Telemachus. Tartarus - The Underworld Works Cited Bad Dad Gaming. © 2012 BadDadGaming, n.d. Web. 20 Nov. 2012. <>."Classical Mythology: Sisyphus." Info Please. N.p., n.d. Web. 3 Dec. 2012. <>."Classical Mythology: Tantalus." Info Please. N.p., n.d. Web. 3 Dec. 2012. <>."The Odyssey: Sisyphus and Tantalus." Damnation of Greek Mythology. N.p., n.d. Web. 3 Dec. 2012. <>."Sisyphis." Sisyphus. N.p.: n.p., n.d. N. pag. Print."Tantalus." Tantalus. N.p.: Wikipedia, n.d. N. pag. Print."Tantalus." Thanasis. N.p., n.d. Web. 6 Dec. 2012. <>.Tender Love and a Seedy Wink. N.p., n.d. Web. 20 Nov. 2012. <>."The Underworld." White Rose Garden. Heather Changeri, 1997. Web. 9 Dec. 2012. <>.Witch of Forest Grove. N.p., n.d. Web. 30 Nov. 2012. <>.Yermolaeva, Tatyana. "Odysseus and Circe." Elfwood. Thomas Abrahamsson, n.d. Web. 9 Dec. 2012. <http://y Thomas Abrahamsson and>.
See the full transcript
|
global_05_local_4_shard_00000656_processed.jsonl/47394
|
We Cannot Avoid God’s Questions
Since it’s almost entirely poetry and “true myth,” and since we live in one of the most literal-minded cultures of all time, it’s not surprising that the Bible largely remains a closed book. Those who make the loudest claims for its veracity often see its meaning less clearly than many they judge to be total outsiders. If you treat biblical myths as history, you end up with either distortion or absurdity. Even worse. As Voltaire once said: “Those who believe absurdities end up committing atrocities”
When read for what it genuinely is, the story-told in myths, parables, metaphors and allegory-of the evolution of the human soul and its relationship to the mystery called God, the wider human community and the cosmos itself, its power for inspiration and transformation is immeasurable.
For example, everybody recognizes that the two accounts in the opening chapters of Genesis which tell of the creation and of the beginnings of the human saga are mythical in nature. They have to be. There is simply no other way of expressing such sublime truths as they contain. The packaging is fictional, but the inner, abiding truth being told is eternal.
Properly understood, they put a finger on the very core of our being. They touch our life today, now, in this moment. Here is a simple example. After Adam and Eve had tasted the forbidden fruit (nothing whatever to do with either apples or sex, by the way), they tried to hide from God: “And they heard the voice of the Lord God walking in the garden in the cool of the day: and Adam and his wife hid themselves from the presence of the Lord God amidst the trees of the garden.”
Then rings out a question that has come echoing down the centuries with a never-ceasing urgency to each of us: “And the Lord God called unto Adam [the word means, simply, man in the generic sense] and said unto him, ‘Where art thou?’”
We try to hide from God-from the true depths of ourselves and of our beingness-and the haunting, searching question keeps on coming in so many varied, sometimes subtle, sometimes shrieking, ways: “Where are you?”
We are challenged to pause and consider, to ask ourselves where we really are in our lives, where we are in our intentions, in our relationships, in our spiritual journey, in our own personal evolution, in our connection with our Higher Self and with others.
Anyone who equates myth with fairy tales or assumes that because no Adam and Eve ever existed as objective, historical entities, the entire creation account can be dismissed or ignored is self-deceived. The eternal truth is there and cannot be denied. The Ground of All Being hurls this question at us: “Where are you right now?” And the universe awaits the answer.
Different Bible myths confront the soul within us with other profound questions that strike equally at the meaning and fabric of our daily existence, if only we pay attention. I’m thinking in particular of a passage from the stories in the First Book of Kings (chapter 19) about the great prophet Elijah. It’s dealt with in detail in Finding the Still Point but sounds within as a frequent check on my own spiritual growth-or lack of it-and so comes to mind powerfully here.
Because many people feel at times depressed, frustrated, weary or burned out, they can identify with Elijah’s plight. Even though he had accomplished great things and had seen God acting in his life, he found himself at one point quite down-even to the point of longing for death itself. He tries to wiggle and twist and, like Adam, to escape somehow rather than boldly face his situation. He takes refuge in a cave. Then comes the divine Questioner with this probing query: “What are you doing here, Elijah?”
In other words, he has reached a point in his life where he has to stop and take a very long, hard look at what on earth he is really doing with it. Where is he headed? Why is he at this particular spot in it? What is really going on? Confrontation with this crisis brings him a fresh vision of God in that “still, small voice” that speaks to him and commissions him for fresh directions, new challenges. He is changed, transformed, turned from defeat to a person throbbing with energies for greater achievements still.
Life today seduces us into thinking that these and the other life-changing questions posed by the Bible can be avoided by sheer busyness, the never-ending quest for pleasure or other forms of running away to hide. But, like Francis Thompson’s Hound of Heaven, in his poem by that name, they ever pursue us, silently. Waking or sleeping, they follow us “down the labyrinthine ways” of our own hearts and minds, and call for an answer.
Review & Commentary
Leave a Reply
* Copy This Password *
* Type Or Paste Password Here *
|
global_05_local_4_shard_00000656_processed.jsonl/47399
|
docholliday03's Star Trek: D-A-C PlayStation Trophies
Viewing docholliday03's Star Trek: D-A-C trophies. Remove Sort by XMB/Type/Alphabetical
Starfleet Medal of Honor
Earn 250,000 points as the Flagship class in one Team Deathmatch game
Nero’s Rage
Destroy 3 enemies while using a single invulnerability powerup
No Mercy
Earn 50 cumulative Escape Pod kills
Vulcan Wisdom
Academy Graduate
Born Leader
Bridge Commander
Earn 250 cumulative kills in Team Deathmatch
Imperial Instincts
Earn 25 cumulative point captures in Conquest
Kobayashi Maru
Some trophies are unattainable... unless you cheat
Mirror, Mirror
Capture a point with the aid of your own wingman
Red Shirt
Be the first to die in a Versus multiplayer match
|
global_05_local_4_shard_00000656_processed.jsonl/47401
|
Diablo 3 And The Attack On Offline Play
Behold, the future! (image: justd3.com)
I think Diablo 3 has set a worrying precedent.
Regardless of whether you want to play by yourself or with friends, you need to log in to Battle.net first. Content is streamed into your game session from the servers, turning single-player mode into a very, very lonely online environment.
The only problem is that servers are fallible. The launch was plagued with connectivity issues as Blizzard infrastructure struggled to keep up with demand. (Server capacity has since doubled.) Players from places such as Australia were experiencing latency to the point where it was nigh impossible to progress on harder difficulties. Server maintenance affects players worldwide, and it seems to affect players on the other side of the pond – why should it matter that some poor schmuck has to clock in at 2A.M. in California to tweak servers when players on the other side of the world face 8 hours worth of peak hour downtime? That’s the whole game offline, mind you – single player and all. That’s the service you paid for when you agreed to that EULA.
This “always online” DRM would have most gamers at any developer’s throats, let alone Blizzard’s. That hasn’t stopped Blizzard from selling 3.5 million units in the first 24 hours of release – a new all-time record for the fastest-selling PC game.
“So what’s the problem?” commentators say, rolling their eyes and sighing dramatically. They utter phrases like “gamer entitlement” and “vote with your wallet”. They dismiss complaints as hasty whining from mouth-breathing self-diagnosing sociopaths. Like a terrible parental figure, they clap gamers on the back and tell them to “suck it up”, because after all, it’s “only a game”.
For a while, I was also one of these commentators, believing that most mainstream gamers were simply overgrown children complaining that this colour palette is completely different to the colour palettes of yore.
But this is different. This isn’t aesthetics. This isn’t about game mechanics. This is a model. A service model. A business model.
Blizzard have shifted the gaming model from being a product to being a service. You are indeed running code locally on your machine, but you are tapping into Blizzard infrastructure to network with players, trade items and equipment, track statistics, and now (in Diablo 3) you are streaming in-game content. Diablo 3 Senior Producer Alex Mayberry says that the paradigm is indeed shifting to an always-online environment:
“Obviously StarCraft 2 did it, World of Warcraft authenticates also. It’s kind of the way things are, these days. The world of gaming is not the same as it was when Diablo 2 came out.”
A company like Blizzard has a great influence – loyal fans, enormous war chests from previous title successes, and assured sales from highly anticipated games. With that influence they have managed to amputate the offline single-player component in Diablo 3, and they turned a profit doing so. What will they do now that they require you to log in before playing? I’m sure the marketing and sales department has some great ideas.
In the end, Diablo 3 has become a purely online RPG. The game cannot function without an Internet connection. Diablo 3 owners are at the mercy of the makers. But so be it, for “the world of gaming is not the same as it was”.
Blizzard have established a milestone in gaming. All it cost us was the ability to play the game without Blizzard saying “when”.
Leave a Reply
WordPress.com Logo
Twitter picture
Facebook photo
Google+ photo
Connecting to %s
|
global_05_local_4_shard_00000656_processed.jsonl/47402
|
Psychology Wiki
34,135pages on
this wiki
Revision as of 21:36, May 8, 2007 by Dr Joe Kiff (Talk | contribs)
Psychology Wiki does not yet have a page about Fahrenheit, even though this subject is highly linked to (This is due to the initial use of content from Wikipedia).
If not, you may wish to see Wikipedia's article on Fahrenheit.
Around Wikia's network
Random Wiki
|
global_05_local_4_shard_00000656_processed.jsonl/47414
|
Using your phone's internet browser
go to:
Click and drag this link to
the Home icon in your browser.
Whare&what adress i cotact you to know my singnature details?
Tags: cotact, whare &what adress, singnature details
Asked by Rajashankar, 22 Feb '08 03:53 pm
Invite a friend |
Save |
Earn 10 points for answering
Answer this question Earn 10 points for answering
4000 characters remaining
Keep me signed inNew User? Sign up
Answers (1)
rediff should have given the adress or contact number .!!!
It hink the best you can do now is to contact's Shifra Menezes who wrote this article OR Cafe Coffee Day personells if it is there in your city
Answered by manish, 24 Feb '08 08:49 am
Report abuse
Not Useful
Your vote on this answer has already been received
Ask a Question
Get answers from the community
600 characters remaining
Related Answer
Answered by Rakesh Anand
|
global_05_local_4_shard_00000656_processed.jsonl/47421
|
tag:blogger.com,1999:blog-3451574857665049482.post3413666801054157228..comments2014-07-29T05:41:06.258-04:00Comments on Queers United: MTV's 'True Life' Upcoming Queer OpportunitiesQueers Unitedhttp://www.blogger.com/profile/[email protected]:blogger.com,1999:blog-3451574857665049482.post-14062582098996628362009-11-07T13:11:25.380-05:002009-11-07T13:11:25.380-05:00I'm happy MTV continues to feature LGBT people...I'm happy MTV continues to feature LGBT people and stories but I don't like the way the "passing" segment is worded. For similar reasons to an earlier post I made where people explain that "passing" as a term is often offensive to trans people and they aren't being someone they are not, they are being who they are. To suggest a trans person is "passing" is to suggest they are masking or lying about their true identity, they are being truthful.Queers Unitedhttp://www.blogger.com/profile/[email protected]
|
global_05_local_4_shard_00000656_processed.jsonl/47426
|
Great Depression in Brazil
8 terms by Bailey_Cook
Ready to study?
Start with Flashcards
Create a new folder
Advertisement Upgrade to remove ads
Import Substitution Industrialization
introduced by Vargas. Brazil should reduce its dependency on foreign investment via local production of industrialized products. Encourage industrialization to substitute imports, "produce in Brazil for Brazil". Results= industrial production doubles, Brazilian national income increases, Economy no longer relies on external factors, diversification of agriculture
Article 119 (Constitution of 1934)
stressed the govt's responsibility for economic development. Nationalization of mines, mineral deposits, and waterfall and other sources of energy, as well as of industries considered as basis or essential to economic defense of the country
Estado Novo
changes in Industry and Labor, Constitution of 1934, the brazilian regime created by Getulio Vargas, 1937-1945. Its industrialization program and general expansion of government activities were typical of mid-1900s nationalist movements.
Patronage Based Politics
granted requests and extended favors to people selectively in return for their political support. State-appointed union leaders, military leaders. Sponsored Carnival activities and even funded samba schools. Held political rallies at soccer stadiums
govt price support; when commodity (coffee) is overproduced, govt intervenes to maintain prices by withholding stocks from market or restricts planting. Causes increase in coffee prices (less supply, price increases) = increase in loans needed to finance output. coffee planters dangerously dependent on valorization...especially with new emphasis on industrialization in Brazil
govt coordinates all economic activity within the nation (the distribution of working licenses to employees, management of the workers' unions, regulation of the economy, power removed from hands of working class). strengthened the power of the govt both legally and politically
Five Year Plan
expand heavy industry, create new sources of hyrdopower, expand rail networks
Labor Tribunal System (Constitution of 1934)
gave govt power to fix minimum wages and guaranteed the right to strike
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Reload the page to try again!
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together
NEW! Voice Recording
Create Set
|
global_05_local_4_shard_00000656_processed.jsonl/47427
|
US History, Semester 2 (5)
45 terms by brianna7banana
Ready to study?
Start with Flashcards
Create a new folder
Advertisement Upgrade to remove ads
US companies stopped investing in Germany
European economies were hurt during the Depression when
The dust bowl
A major environment crisis of the 1930s was known as
In 1933, the twenty-first amendment brought and end to
the responsibilities of the federal government
The 1932 presidential election served as a turning point in the way Americans viewed
More goods were being produced than consumers could buy
What was a sign of an unsound economy during the 1920s?
the federal government should try to fix people's problems
A fundamental disagreement between the candidates in the 1932 presidential election concerned whether or not
could not return depositors' money
After the Crash, thousands of American banks closed, because they
all levels of society
During the depression, wage cuts and unemployment eventually affected
could not pay their mortgages
Many farms were auctioned off when farmers
Keep bids low
What did some people agree to do when a foreclosed farm was auctioned?
the empire state building
What was one dramatic symbol of hope during the Depression?
provide government credit to banks
The reconstruction finance corporation aimed to
used force
To get the bonus army marchers to leave the capital, General MacArthur
a New Deal for Americans
Roosevelt easily won the 1932 presidential election by promising
to inspect the financial health of banks
Why did FDR declare a 'bank holiday' early in his administration?
National Recovery Administration (NRA)
What New Deal agency was created to help businesses?
a wave of legislation including more social welfare benefits
What was the Second New Deal?
They manipulated people with half-truths and scare tactics
Why are Huey Long and Father Charles E Coughlin referred to as demagogues?
FDR's attempt to 'pack' the supremes court
What aroused the greatest opposition?
a restored sense of hope among the people
What was part of the New Deal legacy?
pushed Congress to pass legislation to improve the economy
In his first few months in office, President Roosevelt
actively and aggressively promoting the New Deal
First Lady Eleanor Roosevelt defied tradition by
going too far in its attempts to reform the economy
Many republicans criticized the New Deal for
increased federal borrowing
The recession of 1937 was caused in part by
He pushed Congress to pass legislation to improve the economy
What best characterizes Roosevelt's first hundred days in office?
By giving financial assistance to farmers
How did Roosevelt's programs help farmers?
He won by a landslide
What best describes Roosevelt's bid for re-election in 1936?
some short-term economic improvement
The massive government spending of the New Deal led to
Civilian Conservation Corps.
All of the following New Deal agencies still endure today except the
shanty towns built by the homeless during the Great Depression
Black Tuesday
October 29, 1929
Hawley-Smoot Tariff
1930 import tax, the highest in history
Twenty first amendment
The _____ , ratified in 1933, repealed the ban on alcoholic beverages
John Maynard Keynes
Economist who believed that massive government spending programs could revive a failing economy
New Deal
Roosevelt's program of relief, recovery, and reform
Wagner Act
Legislation that allowed collective bargaining and set up a National Labor Relations Board
Hundred days
Early in his administration, FDR pushed many programs through Congress in the period known as the ______ _______
Tennessee Valley Authority
The ______ provided new jobs, cheap electric power, flood control, and recreation for its region
Social Security System
Funded through contributions from employers and worker, the ______ established several types of social insurance
New Deal
Roosevelt's program of relief, recovery, and reform
Public works program
government-funded projects to build public facilities
Tennessee Valley authority
project that helped farmers and created jobs by re-activating hydroelectric power facility
an alliance of groups with similar goals
national debt
the total amount of borrowed money the federal government has yet to pay back
American Liberty League
group that spearheaded much of the opposition to the New deal
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Reload the page to try again!
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together
NEW! Voice Recording
Create Set
|
global_05_local_4_shard_00000656_processed.jsonl/47429
|
Quotes by Robert Coover
Share Your Quotes Join Us Inspire & Move Your Friends
How do you feel today? I feel ...
Robert Coover (born February 4, 1932) is an American author and professor in the Literary Arts program at Brown University. He is generally considered a writer of fabulation and metafiction.
Add to my favourites Get these quotes on a PDF
|
global_05_local_4_shard_00000656_processed.jsonl/47437
|
contraceptive rates
Answer: National contraceptive rates
The United Nations Department of Economic and Social Affairs, Population Division issued a report on World Contraceptive Use in 2009 (report number POP/DB/CP/Rev2009). You can download the data in excel format: The most recent figures for Kenya are from 2003, but there is 2007-2008 data for Rwanda. The rates are broken down by conception method.
You can also find other data from the United Nations' unified database that allows you to search statistics collected by its various agencies:
If you search for the word "contraceptive," you'll get a few indicators of contraception use, including by age, marital status, etc.
QUESTION: National contraceptive rates
question / pregunta:
I'd like to include the modern contraceptive rates for two countries in an article I'm writing--Kenya and Rwanda. Do you know where I can find the most current figure for that statistic?
Syndicate content
|
global_05_local_4_shard_00000656_processed.jsonl/47446
|
Maybe I will give you a pat on the back if it is worth it "thanks" Stick this sword inside your mouth like it was a circus
from Hopsin – Slurpin Lyrics on Genius
He might give the girl attention after she’s done and then tell her to deep throat his dick like a sword swallower.
To help improve the quality of the lyrics, visit “Slurpin” by Hopsin Lyrics and leave a suggestion at the bottom of the page
|
global_05_local_4_shard_00000656_processed.jsonl/47476
|
You are here
G'MIC : GREYC's Magic for Image Computing
• 1
• 2
• 3
• 4
• 5
Total votes: 0
Rate this item!
This plug-in is able to :
• Propose an image preview window for each available filter.
Latest version of G'MIC is numbered :
Flattr this
gmic4gimp_win32.zip1.42 MB
gmic4gimp_linux32.zip853.62 KB
gmic4gimp_linux64.zip797.15 KB
GIMP Version:
Code License:
I put curl.exe in users/plug-ins ( I have edit/preferences/plug-ins pointing at g'mic in a separate folder), and that didn't work. So I moved curl.exe to the same folder as G'Mic, still doesn't work.
Needless to say, the .gmic_def.1333 in my appdata folder isn't prompting the filters to show, either. The interesting thing is, I set parameters on some filters and its the primary reason I am making a little fuss over it now. I want my pre-set filters working again, much like Photocomix's smoothing filter, to give an example.
You need to have a folder '_gmic' (containing curl.exe) in your G'MIC sub-directory (in your GIMP plug-in directory). Is that something you tried ?
Basically, you have to copy/paste all files *and* folders from the archive '' to your G'MIC sub-directory in your GIMP plug-in directory.
Having 'curl.exe' at the same level than 'gmic_gimp.exe' is useless (it was how it should be before, but it has changed).
Now you must have 'gmic_gimp.exe' and '_gmic/' at the same directory level.
(and curl.exe is in '_gmic/')
Well that solved the filters update problem, (307 filters beats 151) but my .gmic preset files (loaded in Appdata in Windows) are not showing on my definitions list in G'Mic as they did before. They are still where they were before I upgraded to and, so just by default they should still be showing now as they were before, correct?
Btw, I really appreciate you taking the time out to help me resolve this. I used G'Mic for almost all my smoothing work and for hours and hours of fun. Great plug-in! Thank you for all the hard work you put into it. :)
Actually, nothing has changed concerning the .gmic file, so it should be located at the same place as before.
Did your own filters appear with the but not with the new ?
All the problems started with
What I did do is, I created the new definition file (.gmic_def.1333), made all my parameter changes on the filters I use most, saved the file to the same place as the old one (in Appdata). Prior to the upgrade, I had to scroll through the filters and select it in order for it to work. Since the upgrade, I can't get it to show up in my filters list to select it.
Does GIMP need to be rebooted when making changes to the .gmic file?
Addendum: Scratch that, I rebooted GIMP and now my preset filters are showing. Thank goodness. Thanks again for your help and your time, David!
Be careful !
In fact, there are two different files :
- The '.gmic_def.1333' file corresponds to the 'official' G'MIC filter updates and are retrieved from the G'MIC server, when pressing the 'Refresh' button. Basically, you never had to write something on this file, since it will be replaced the next time you hit the 'Refresh' button.
- The '.gmic' file, corresponds to all *your* definitions. This file is never written by the G'MIC plug-in, only read. So, if you want to set your own filter parameters, you *have* to copy first the file '.gmic_def.1333' as your '.gmic' file, and make change in it. Anyway, be careful that the filter updates will then appear only in the 'Initial G'MIC filters/' section.
Sorry David. I meant my .gmic file (the original file that was there before this all started). I've only added the .gmic_def.1333 this time around. They are finally both working and displaying. That is what I get for staying up too late.
Thanks again. :)
I love this plug-in. Thank you for sharing it.
Actually, I've been hoping that someone (else than me) can find it useful.
I'm happy to announce the release of the binary update of the G'MIC plug-in for GIMP. There is actually only minor 'visible' improvements compared to previous versions, mainly bug corrections and improvements of the internal engine.
This is probably the latest release of the year, so I hope you'll enjoy it.
|
global_05_local_4_shard_00000656_processed.jsonl/47477
|
Category: Food
Example: Xe’vana’ta ‘semek ,xe’ludu al, lija. Han’xen M talka.
(1S-like-NEG (INF)cook ,1S-be.tired very, because. M golden.)
I don’t want to cook because I am tired. Let’s go to the golden arches.
I never really though about what Rejistanis would eat.. at least not well enough to write anything down. But this example is definitely from the real world. In the conworld, the golden arches do not exist.
‘semek can mean to cook, or to prepare food in general, even if it is not made in a pot on an oven. Salad is ‘semek-ed as well. As is aa steak or a soup. More specialized words do exist though. Semek’tan means cuisine and semek’het. is a cooker to prepare food on. Someone who prepares food is, very regularly, a semek’he. semek means either ‘cooked’ or ‘prepared’ or ‘related to cooking’.
Completely unrelatedly, there exists a site called URLAi, which attempts to guess the gender and the age of the poster. In my case, I supposedly am 18-25 years old, male and in an upset mood. On each and every one of these counts, URLAi was wrong. I mean, sure, occasionally, I am upset (I tend to joke that I do not have a temper issue but an idiot issue), but here on the blog, I normally do not vent when I am upset. If I did, my posts would be far longer and the words “idiot”, “Vollpfosten”, “Windows-User”, “Arschgeige” and “f*cktardation” would be used much more often! Definitely! As would be many rejistanian terms like “slani”, “itva” and “selme”. :)
BTW: does anyone know a good replacement for audacity? It fails because it cannot create its temporary files in my home directory (for space issues) and when I attempt to tell it a diferent path for them, it fails to recognize anything related to audio at all.
Rejistanian is an odd language occasionally. At certain times, verbs can mean different things depending on whether they are used transitively or intransitively. I know that there are different languages which do the same thing, but when I had the first idea for such a word (which was ‘viki: to win/to defeat) it was something incredibly weird to me. It was one of these moments when I wanted to seriously disturb all the others who took the bus to te suburb of Cologne I lived in by screaming “Xe’la’hax mi!” (I found it) or “eureka!” because this meant I could use far fewer roots. Rejistanian is an auxlang at heart, a fictional auxlang, sure, but it is an auxlang. Well, of a fictional place. As I stated, I never plan world domination with Rejistanian*. It is however constructed like an auxlang with very regular derivations**, and often rather broad terms.
Ninis’het means salt and nins means either ‘related to salt’, ‘salty’ or ‘salted’. Ninis’tan means, as can be expected the state of being salty and the equivalent to jumek’het would be ovik’het ninis (salty food).
Example: Il’lanja’dori ninis’het xe’han su? (2S-SUBJ1-give salt 1S-ALL QUEST?: Can you give me the salt?/Can you pass the salt?) listen
* when I reach world domination, I will make Kenshuite He Mo Gie or maybe Quuxlang official language to prevent my ‘little playthings’ from thoughtcrimes. ;)
** I insist that it was the words who changed from their originally intended meanings by their own evilness occasionally and am going to defend this delusion vigorously since the alternative (ie: What was I high on when I did this‽) is unthinkable (and might lead to legal repercussions in case someone else finds out what I was high on before I do and destroy all evidence) ;)
Hot is a wonderfully ambiguous term which cannot be translated into rejistanian. Hot like an indian meal is jumek*, hot like a stove is kelhu and there is a number of terms referring to people who are hot like my [statistically] significant other. This is one of the times when Rejistanian is rather specific, just because these meanings are rather different to me. Language is wonderfully bizarre in grouping terms in specific ways. This term however is rather regular.
Example: Kihunu’het’ny lexad jilih min’jumek al (noodle-PL cold this 3PL-be-spicy very: these cold noodles are hot). listen
*It can be kelhu as well and thus burn your tongue in 2 ways.
Such a tasty food! And a word, which my handsome, smart, [500 word description removed] and just simply incredible significant other requested (including the example sentence). So, yeah, blame Boris for this one :)
Since Rejistanis only learned of cheese rather recently, their term for cheese is actually a loanword from English.
BTW: When photos are shot, rejistanis are not asked to say `cheese’ but isin (happy).
Derived words:
xisu: related to cheese
‘xisu: To throw cheese at someone as a sign of protest. (See NationStates Issue #189)
Example: Mi’la’riva xisu’het etum’het’sy. (3S-PST-cut cheese shovel-INSTR: He cut cheese with a shovel) Click here to listen
Get every new post delivered to your Inbox.
|
global_05_local_4_shard_00000656_processed.jsonl/47480
|
Caramel Pecan Candies
• Yield 30 pieces
The romance of a box of enticing chocolates made easily and affordable.
1 (14-ounce) package caramels, unwrapped
2 tablespoons skim milk
2 cups chopped pecans
1/2 cup dark chocolate chips or semi-sweet chocolate chips
1. Combine caramels and milk and microwave for 1 minute, stir, and microwave another minute until mixture melts. Stir in pecans. Drop spoonfuls of mixture onto a parchment paper lined cookie sheet. Let spoonfuls stand until firm
2. Melt chocolate in the microwave for 1 minute and stir.
3. Dip the top of candies into melted chocolate and lightly shake off any excess. Place candies on wax paper and let rest until firm.
|
global_05_local_4_shard_00000656_processed.jsonl/47482
|
Nikki Glaser Likens A-Lister Jessica Alba To A Hobo [Video]
Jessica Alba is a Hollywood staple, but if you take a little look into her past, you’ll see things haven’t always been so glamorous for the A-lister. The actress has included some childhood photos in her new book, “The Honest Life,” and when she pulled up a shot that included a toothless smile on last night’s “Nikki & Sara LIVE,” Nikki Glaser didn’t waste a breath taking the mom of two down a few pegs.
“You looked like an old panhandler when you were eight,” she says in the interview below. Hey: We were all thinking it…
Also in the video, Nik and partner-in-crime Sara Schaefer talk about Jessica’s favorite DIY projects, and while Jess has some family-friendly ideas for craft projects, Nikki’s and Sara’s takes on real-life Home Ec are a little bit less traditional. For example, Jessica loves to use baking soda to mix into an all-natural cleaner. As for Sara:
“You put it in small baggies and you hide it in your grandma’s dresser, and then you call the cops and tell them that your grandma’s dealing drugs.”
That’s one way to spice up Thanksgiving!
|
global_05_local_4_shard_00000656_processed.jsonl/47499
|
Art in Your Pocket 2
Sampling #1 (2009) - Eva Paulitsch and Uta Weyrich
Image of Sampling #1 from flickr user 7pc
Since 2006, the two artists have been collecting films from mobile phones in the public sphere. It is the mixture of amateurish documentation of your own life, of a direct, unhampered view on your own reality, of unmotivated, unguided camera movements as the expression of boredom but also of directed little scenarios that aroused our collector's instincts. Paulitsch and Weyrich are accepting all films into their archive uncensored. This is increasingly developing into a fascinating document of our times, to a sort of evidence-gathering on and siting of the present. Above all, however, it resembles a bizarre album of weltering digital imagery.
For the exhibition YOU_ser 2.0 in the ZKM | Media Museum, the two artists make their mobile film archive accessible for visitors via mobile tagging. The mobile films are concealed behind the colourful QR codes, which visitors can decipher with their own WLAN-mobiles or with the mobiles provided by the museum. In this way, the content of the films Paulitsch and Weyrich are collecting on the street and publishing on the Net returns to the private sphere and into the medium where they originate. The video blog serves to show new extracts from this archive and offers a platform to films currently being collected.
Google Portrait Series (2007-2009) - Aram Bartholl
Each code represents a visual enryption of a search on 'Aram Bartholl' in a specific language on Google.
A Google Portrait is a drawing which contains the Google URL search string of the portrayed person in encoded form. Any camera smart phone is capable to decode the matrix-code with the help of barcode reader like software. The result points the mobile phone browser to a search on the portrayed person's name at Google.
A large number of people can be found by name on Google today. Everyone who is working on a computer and uses the internet regularly can be found on Google. Even people who don't use computers can be found sometimes because their names appear in 'old' media (i.e. books) on the net.
'Egosurfing' is a popular way for a user to find out what websites and information Google returns on his/her name search.
How many hits does Google show on my name? Am I popular? Do I want to be found at all? Who writes about me? What do people find out about me when they google my name? Am I in concurrence to other persons with the same name? Do I rely on the results Google shows me on a person's name? In which way do I relate to someone which I only known by Google results?
You Are What You Buy (2007) - Michele Pred
Picture 1.png
Michele Pred Explains You Are What You Buy
I chose to create an embroidered version of a barcode to represent how technology has become interwoven, fused with our lives and our identity- to represent how we have become one and the same with technology.
Through new technology cell phones are now capable of scanning and decoding barcodes. However, these barcodes are a little different than the ones you see scanned at the grocery store: they are called 2D barcodes and are composed of black and white squares that encode the URLs to any website of creator's choice. In other words, these Data Matrix format barcodes are a physical hyperlink. Through my research I have learned how to create and program 2D barcodes with embedded text messages. I have also discovered that these barcodes can be reproduced in a variety of materials and are still capable of being scanned/read with a mobile phone.
N Building (2009) - Teradadesign and Qosmo
Picture 2.png
N Building from Alexander Reeder on Vimeo.
N Building is a commercial structure located near Tachikawa station amidst a shopping district. Being a commercial building signs or billboards are typically attached to its facade which we feel undermines the structures' identity. As a solution we thought to use a QR Code as the facade itself. By reading the QR Code with your mobile device you will be taken to a site which includes up to date shop information. In this manner we envision a cityscape unhindered by ubiquitous signage and also an improvement to the quality and accuracy of the information itself.
Originally via Networked Research
TXTual Healing (2006 - Ongoing) - Paul Notzold
Graffiti Markup Language Gets An Upgrade
F.A.T. Labs have declared this week "Graffiti Markup Language Week" on their blog - and each day they've posted GML-related updates. What exactly is Graffiti Markup Language? It's an XML file type developed by F.A.T. Labs that stores the motion data created by tagging -- allowing graffiti writers to share, study, and catalog their tags. Check the below for a brief overview:
GML = Graffiti Markup Language from Evan Roth on Vimeo.
What has GML week brought us so far? Over the past few days, F.A.T. Labs introduced:
► An iPhone version of Graffiti Analysis DustTag v1.0 - this handy App allows users to trace their tags and add them to the GML database using an iPhone.
► Graffiti Analysis 2.0 - the new and improved Graffiti Analysis includes the aforementioned iPhone App DustTag v1.0, along with updates to the tracking, playback, controls and graphics, as well as previously unreleased source code and downloads to Windows, Mac and Linux versions of the playback and capture applications.
► FatTag Deluxe - the Katsu Edition - an updated version of the Fat Tag App made in collaboration with graffiti legend Katsu.
OMG (2009) - Valentin Ruhry
Call for Applications
Brighton-based interactive media artists' group Blast Theory posted a call for both their residency and internship program. Interns will have an opportunity to work in Blast Theory's studios on specific projects while residents will be given space to research and develop new work in a supportive and collaborative environment. For the residency program, Blast Theory are looking for individuals working in:
- Pervasive & location based gaming & interactive media
- Mobile & portable devices in cultural & artistic practice
- Games design and theory
- Interdisciplinary and live art practice
The deadline for applications is January 31, 2010. More information can be found on Blast Theory's site.
Required Reading
Link »
|
global_05_local_4_shard_00000656_processed.jsonl/47507
|
Caută orice cuvânt, cum ar fi fluffer:
1 definition by JoncBEE
Acronym: Not Suitable For Work.
Used when posting a link to a site of dubious merit which could cause embarrassment/P45 if linked to while using the Internet at work
Check this out! (note: NSFW)
Link: Ass-fucking pigs
de JoncBEE 06 Februarie 2003
|
global_05_local_4_shard_00000656_processed.jsonl/47508
|
Caută orice cuvânt, cum ar fi blumpkin:
6 definitions by Ned Ryerson
Feeling fantastic after the successful completion of a particularly macho feat.
de Ned Ryerson 10 Mai 2006
1. about to 2.ready to 3. desiring to
de Ned Ryerson 23 Iulie 2003
A person of Asian descent whose perfect comprehension of and participation in major urban trends, current and old-school, makes him da bomb.
A: Check out Sanjeet doing a Pop-Shove-it Backside Nose Slide on his board!
B: That dude is such a Turban Legend!
de Ned Ryerson 20 Octombrie 2006
A dedicated follower of urban fashions and trends. The phrase carries a condescending connotation.
Turning on some Tupac on his I-Pod, Keith speeded away on his Segway. God go with you, you Urban Warrior, you, said his life-partner.
de Ned Ryerson 10 Mai 2006
intoxicated to the point of non-existence
"Why does Kevin have Kleenex boxes on his feet?"
"Dude, he's poofsapped."
de Ned Ryerson 23 Iulie 2003
surprising or startling by nature
de Ned Ryerson 23 Iulie 2003
|
global_05_local_4_shard_00000656_processed.jsonl/47509
|
Caută orice cuvânt, cum ar fi thot:
The way a US citizen from the South distinguishes between sizes of trees.
Earl: "That tree shure is a biggin'."
Bubba: "Rat, but that one ova there is an even bigotry!"
de CherryKisses 23 Februarie 2006
To show intolerance towards others that are different from oneself, such as those of different ethnicities, including niggers, beaners, spics, wetbacks, chinks, japs, coons, crackers, gringos, dagos, wops, ockers, pakis, guidos, gypsies, jews, kikes, and ragheads.
Rednecks tend to demonstrate bigotry towards ragheads, while niggers show bigotry towards crackers.
de BAHaas 19 Ianuarie 2012
bigotry = intolerance
his bigotry is latent.
de NLU 07 Septembrie 2005
Noun: Thinking all of your ideas are correct and superior to everyone elses ideas.
HAHA I am a bigot so i think he's wrong christianity is right and should be the only religion!
I like girls so that means every guy has to (thats bigotry)
de Alex 18 Iunie 2006
unwarranted, seething hatred for some demographic, as in race, sex, sexual preference, geographic origin, ideology, etc.
Bigotry examples:
Whites: Wow, we'll just bow down, you clearly own & invented everything.
Jews: Why did you let Scientology take over Hollywood?
Blacks: The only people who don't like you are black people.
Mexicans: You have those jobs because nobody's telling the rest of us they exist.
Asians: Stop being fucking insane. You're worrying everyone.
Vikings: All you do is murder, you barbaric, bearded Nordic pigs. And your death metal sucks.
Furries: You're a bunch of whiny, meme-loving trolls, you pot-smoking, whoric douches.
Brits: Maybe tone down the pretension a couple metric tons, eh wot?
Americans: You're fat & break everything you touch. Way to fail at health care, enjoy the infant mortality rate.
Australia: You've absolutely no right to be offended by "Australia's Naughtiest Home Videos".
Lesbians: You're not lesbians, you're misandrist whores. Stop sleeping with people's boyfriends & maybe people won't treat you like currency.
Lions: You have to be the laziest, bloodthirstiest pussies ever to walk the savannah.
Gays: You used to be funny & cool. Now you're self-absorbed, mainstream fucks like the rest of us. Enjoy your marriage & military draft, fools.
Middle-East: You keep killing yourselves in ways emo kids only dream of.
Children: You are a disease on the face of this planet.
Women: Oh, it's okay, we'll just overlook the fact you can exploit anyone & anything simply because it offends you so much.
de RequiredName 13 Mai 2013
Bullshit in general. Basically anything that makes you angry. Similar to the term "Bob Sagetry."
It sure is bigotry when I miss my god damn program because I am obligated to do something else, and when ch. 8 decides to show some kind of bigotry I have previously viewed.
de BIGGER FROM THE MIDWEST! 15 Aprilie 2011
|
global_05_local_4_shard_00000656_processed.jsonl/47513
|
Written by thoughtbot
Redis For A Flat URL Hierarchy
In the URL structure of a new app, I want the routes to have a flat hierarchy similar to Quora’s:
• A user:
• A topic:
• A question:
I’ve heard this might be good for SEO and a few objects in this new app should share the top-level namespace.
Keys and values
URLs are to resources as keys are to values. Maybe this is a job for a key-value store like Redis.
Set up
Getting Redis on OS X:
brew install redis
In Gemfile:
gem 'redis'
In config/initializers/redis.rb:
REDIS = Redis.connect(url: ENV['REDISTOGO_URL'])
In config/environments/development.rb:
ENV['REDISTOGO_URL'] ||= 'redis://localhost:6379'
That works with the “Redis To Go” Heroku add-on in staging/production:
heroku addons:add redistogo
Set the data
Each time any object I want to share this namespace is saved, I’ll notify Redis. For example, users:
class User < ActiveRecord::Base
validates :handle, presence: true, uniqueness: true
before_save do
REDIS.set handle, 'User'
I’m going to set their handle as the key and the value as the object type.
Rack middleware for the request
When a new request comes in, let’s have Redis find the key and if a record is found, mutate the route for my Rack endpoint.
use RedisRouter
run MyRails::Application
In app/middleware/redis_router.rb:
class RedisRouter
def initialize(app)
@app = app
def call(env)
intended_resource = env['REQUEST_PATH'].gsub('/', '')
if type = REDIS.get(intended_resource)
new_route = "/#{type.underscore.pluralize}/#{intended_resource}"
env["REQUEST_PATH"] = env["PATH_INFO"] = env["REQUEST_URI"] = new_route
If a record isn’t found, Rack will pass through normally.
Let Rails finish the request
In config/routes.rb:
MyRails::Application.routes.draw do
get '/users/:handle', to: 'users#show'
get '/places/:handle', to: 'places#show'
get '/lists/:handle', to: 'lists#show'
In app/controllers/users_controller.rb:
class UsersController < ApplicationController
def show
@user = User.find_by_handle!(params[:handle])
Would you do it this way?
This approach introduces a dependency on Redis and makes two requests to two separate databases. We could have had one SQL query that queried multiple tables.
I like the idea of separating the concern of determining which type of object we want. That query should be fast and we can avoid messing with database indexes on our SQL database for this one case. We can separate this concern and if necessary, scale this component of the application independently.
|
global_05_local_4_shard_00000656_processed.jsonl/47524
|
Take the 2-minute tour ×
The rules packet does not provide any specific rules about flanking. However the rule do say that the DM has lots of leeway in deciding when to give advantage or disadvantage in combat. Should it be understood that flanking always give advantage, or is the DM supposed to only give advantage when there is "clever flanking"? What is the best way to handle "flanking" in Dnd next?
share|improve this question
3 Answers 3
up vote 7 down vote accepted
Being a playtester DM I've spent some time to make a list of all the things that grant advantage and disadvantage within the current ruleset.
The following things grant advantage to an attack roll:
• Hidden attacker
• Attacker being helped†
• Paralyzed target
• Prone target (melee attacks only)
• Restrained target
• Stunned target
• Unconscious target
Unless you apply DM fiat, flanking does not give advantage.
† Flanking doesn't count as "helping" in D&D Next. Helping is a specific action. It used to exist in previous editions (3.x) and it gave +2 to the attack roll, provided the aiding character was adjacent to both the aided one and its target. The distinction here is that helping is an action and therefore it uses up your turn. Flanking in 3.x is a passive thing that requires no action itself, just good positioning, so both flanking characters get to attack (if they have any action left, that is) and both get the flanking bonus.
share|improve this answer
In the current 5E playtest, there is no flanking. In fact, there are few rules for combat at all, and definitely no rules for grid-based combat and positioning. As stated elsewhere, the playtest doesn't represent the final ruleset, so positioning rules may be added later on, but for now, granting advantage is merely a judgement call.
Personally, I would say that it depends a lot on the situation. A normal humanoid creature being ganged up on by two assailants might be at a disadvantage, whereas as large creature, or exceptionally skilled opponent, might not have that same problem. Grant advantage on a case by case basis, and come up with a set of criteria that suit you and your gaming group.
share|improve this answer
There actually are rules for grid based combat and positioning. For example, a medium sized creature can only be surrounded by 8 other medium sized creature, and a gargantuan creature takes up "3 slots" etc. I believe it's in the DM section rather than the general rules though. Other than that small point, I think you have a good answer. – GMNoob May 28 '12 at 10:35
Right, I had missed those. Still, the point stands. The "surrounding" rules are just a way to account for that sort of thing when not using a grid. That being said: I would definitely grant (dis)advantage if someone was mostly surrounded. – Mike Riverso May 28 '12 at 15:13
@GMNoob Surrounding rules date back to 2e and 1e and are unrelated to the WotC-era concept of "flanking". I would not grant disadvantage to someone surrounded unless an enemy's pack tactics needed to be represented via advantage. Being attacked 8 times a round is plenty deadly all itself. – SevenSidedDie May 29 '12 at 19:37
I don't believe the intent is that flanking always grants advantage, but of course all the rules aren't out yet. It seems like it's hearkening back to 1e-2e where backstab required actual stealth or other sneakniess and the rogue wasn't a DPS machine. There's nothing to indicate you can get advantage simply by flanking (it would be way too powerful for random positioning to get you 2d20 take highest IMO). It says nothing anywhere about flanking conveying Advantage so assuming it does is quite unsupported by the rules.
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/47525
|
Take the 2-minute tour ×
After reading How much experience should a PC be worth? I was wondering if and how party betrayal can be done successfully, especially since it's a real possibility in my campaign.
Criteria for success
• The campaign does not end immediately because of the betrayal.
• No players leave over the incident (a player leaving as impetus for the incident is different)
• No tears are shed.
If it can be done, what influences success?
• Setting
• Party Dynamic
• GM Handling
• Other?
share|improve this question
Not a full answer, but from my personal experience I worked with my DM for this. We had talked about it jokingly beforehand and decided to give it a try. Throughout the campaign he dropped very subtle hints that noone caught on to and then, at the end of the campaign my PC helped the BBEG in the last combat. The party members were shocked, ended up still winning, and loved it. Especially when we went back and talked about all of the clues that were dropped and where I had worked against them during the campaign. It can be done, but has to be done intelligently and with DM support/approval. – GPierce Jun 27 '11 at 20:59
Related: How do you kidnap a PC? – dpatchery Jun 27 '11 at 21:01
8 Answers 8
up vote 22 down vote accepted
In short: Yes.
But, there has to be clear communication between the player wanting to betray the other party members and the DM. If the player springs it on both the party and the DM then the answer changes abruptly to a resounding "No."
In addition to that, and probably the most important aspect to my answer of yes is this: It must make sense in relation to party dynamics and/or the story, preferably both. If it makes sense that the BBEG would have corrupted the PC or that it has been foreshadowed by the DM through plot clues, then it will make the betrayal all that much more fun. Players will feel cheated if the betrayal comes out of nowhere and doesn't make sense in the scope of things.
As okeefe stated, the maturity level of the players plays heavily into this. Are your players going to take this personally? Will they walk out or overreact? From personal experience, if the betrayal is done correctly and meets the aforementioned two requirements, then it shouldn't be an issue and should in turn be quite enjoyable for everyone involved.
Not only does a planned betrayal spice up a campaign but it is by nature unexpected. Sometimes a setting or adventure can feel stale or rehashed and this is a great way to break up potentially perceived monotony or repetition.
For examples of successful party betrayals see Cthos' comment on C. Ross's question, and my experience below:
share|improve this answer
I have personally experienced this as a player being betrayed, and as a GM running a game where the PCs turned on each other in my game. Both games were Vampire the Masquerade games and both were very positive gaming experiences for everyone involved, and really were great examples of why I play RPGs. Below are the details of both games, presented as sort of case studies in PC betrayal:
Case 1: The Mole
One of the PCs was a Sabbat spy, sent to infiltrate our group from the beginning. While there was no above board agreement that a PC might be a betrayer, the GM did set a tone from the very beginning that Vampires were not heroes, and unlike a stereotypical D&D party, all PCs had a certain amount of in-game distrust the entire time. Personal agendas and minor power grabs were common.
As a result, when enough clues were dropped the party turned on the spy. He was able to escape and eventually hunted down and killed afterwards. It was a great climax to a series of adventures involving the Sabbat. That player then made a new character and the campaign continued. Using the criteria of the question, this was definitely a success.
Case 2: Sudden Betrayal
Unlike the above, I was running this game rather than playing. Without going into too much detail, the PCs had all managed to get arrested and charged with some very serious crimes. All of the PCs were somewhat guilty, but the evidence was much stronger against one in particular. As in Case 1, there was a very mercenary tone to the way the PCs interacted, and while they worked together out of need, none of the characters would have been willing to die to save another.
As the GM, I did not have a particular outcome in mind as this unfolded, but the players collectively decided to turn on the most heavily implicated PC and sell him out to the authorities. This culminated in one of the best scenes of political intrigue I've seen play out in an RPG, and the summary execution of one of the PCs. In this case, it did spell the end of the campaign- not because of hurt feelings but because this was the end of the story we were telling. As a result, it probably counts as a failure by the question's guidelines.
So, above are two examples that worked out well. Why? Here are the key elements:
1. We were all friends. Like the maturity comment above, if you get along with the other players no one fights about this kind of thing.
2. There was a high trust level. Similar to #1, I trusted the GM to handle any player conflicts fairly when I was a player, and when I ran a betrayal scenario, I was trusted by my players. This trust was earned by being consistent and fair.
3. Overall tone of betrayal. In a game where everyone is supposed to be allied, this wouldn't have worked, but in a dark political game everyone knew, without being told, that anything was fair game.
4. Secrets allowed and common. This is less about preventing fights and more about making the betrayal a surprise, but if everyone gets in the habit of passing notes and having conversations outside the room, conspiracies can happen without everyone having to separate their in-game and out-of-game knowledge.
In closing, PC betrayal can be extremely interesting and rewarding as long as you aren't breaking any implied social contracts. Give it a go! I think some games, like Vampire, really encourage it.
share|improve this answer
My experiences are very similar to Rain's answer.
I'm part of a very tight group, we've been roleplaying continuously for over 16 years now and we know each other very well. We've had two very memorable party betrayals. Both were "series finales", so the campaign did not continue afterward. One was completely spontaneous, the other meticulously planned. I was one of the betrayed parties on both the occasions.
The first was a CP2020 session where the group was charged with kidnapping a mob boss's twenty-something daughter. After some careful planning we sent in our most charming operative in a classic "honey trap" scenario. The aim was to get her to ditch her security detail and meet him secretly on her father's yacht. We would then overpower her, steal the yacht and sail it to a safe location. However, the operative decided that he really liked the girl better, and the group arrived at the marina to find the yacht speeding away toward the Caribbean. The GM handled it very well, dropping just enough hints. A very memorable evening.
The second was the end to our latest Warhammer Fantasy Roleplay campaign, where one of the PC's revealed himself as the villain behind one of the major plot-lines. We knew this character dabbled in forbidden lore, but we all massively underestimated his capacity for evil. What made this plot work particularly well is that he had actually been playing a double game for a few sessions, and when it all came together it seemed so logical, so simple, and so unavoidable. Equally unavoidable was his eventual demise, but that's what you get int he Warhammer universe if you play with corruption.
In the second scenario play could in theory have continued with a replacement character, but it was designed specifically as a finale. The first scenario is a bit more tricky: the PCs managed to majorly piss off both a major crime family and the corp that ordered the kidnapping. Even with a replacement characters, some way would be needed to smooth over the in-universe ripples. But hey, that's just another plot hook right?
The factors that made this work are largely the same as Rain's:
1. These are all people that I trust are not out to just ruin my evening.
2. They are coherent in-character
3. They end the campaign on a memorable note.
share|improve this answer
I find it interesting that all the answers here refer to betrayal that is secret to the players as well as the characters. While there's certainly advantages to that, I think so long as your group is mature enough not to meta the situation there's plenty of advantage to doing things out in the open as far as the players are concerned.
I'm currently in a Werewolf game where one of the players is trying to find a cure for her condition by actively working for people who are out to destroy the werewolf population. While none of the other characters are aware of this, we've had plenty of scenes of her meeting with her superiors and otherwise working against us. It's actually been really interesting, because it's still very up-in-the air as to whether the player will fully go through with the betrayal. At the moment she's probably on track to do so, but there's some definite conflicting feelings going on there as she gets to know the rest of the party better, and I've been really enjoying seeing that play out, despite my character having no knowledge of what's going on.
So yeah, don't feel that just because things are secret from the characters that they necessarily have to be secret to the players. Maybe that is what works out best for your game, but it's definitely worth considering all your options.
share|improve this answer
+1 That's a fantastic point, but sadly this is a minority case (at least in my experience.) While this would be more rewarding to a more mature group, it is also a lot harder to not color your opinions/reactions as a player. Clandestine conspiracy between DM and player is the easier route and is more surprising. That said, I'd love to encounter a group that would be mature enough to handle your example as I think it would be very rewarding (and not just for the betrayal aspect.) – GPierce Jul 3 '11 at 0:51
+1 I would very much prefer PvP to play out this way, but yes, probably not the best approach for betraying a hack-en-slash 4e group for purposes of swapping DMs. Also, welcome to the site, mate. – Brian Ballsun-Stanton Jul 3 '11 at 3:17
As I stated in my comment to the original question, I am about to betray my party. I will share the preparation that's been done and the plan for the actual betrayal now, and once the actual session has come and gone I will edit to share my group's experiences.
First off, let me say that by the criteria defined in the question, this betrayal will definitely be considered a success. There's no doubt in my mind.
And now, the plan...
The Reason
My group has been together for 14 years. Every so often we change GM's--the old GM will bring in a new (or old) character, and the new GM's previous character either is killed or takes off for story-based purposes. This is one of those times.
This is also our first stint with D&D 4e, so as we graduated from the Heroic Tier I started to get bored with my character, not realizing how dull a pacifist cleric would end up being.
I had brought up to the group that I wanted to bring in a new character, and everyone agreed that we could make it work. The next day, the next GM in line pulled me aside. He told me that as an adventure hook for his campaign, I should bring in a "fake" character and earn the party's trust. Then at the right moment, betray them and give them a reason to travel to the Underdark where the next adventure is set.
This also sets the framework for my "real" character's introduction to the party. He is a Drow, and would obviously not be immediately accepted by the group, as they are all good characters. So we decided together than my "real" character would disrupt the betrayal by my "fake" character, and save the party, giving him at least a moment to explain himself before being cut down once he comes face to face with the PC's.
The two characters are brothers. My "real" one has escaped the Drow society and turned good, though he still has a hunger to exact vengeance on his House, who put him through torture and killed people he loved. My "fake" PC is on a mission to track this renegade down and bring him back to be sacrificed to Lloth the Spider Queen, as well as any other notable people he encounters.
The Setup
My pacifist cleric was killed during a battle with a dragon. When the party attempted to raise him, he came back, but only for a brief moment. He sat up, looked the party's leader in the eyes, and said "I am at the Raven Queen's side to assist her in the defense of her citadel (foreshadowing the Death's Reach epic level campaign). Beware the Dark Elf." He then fell back to death.
My "fake" character then approached the party. He is a Drow Psion, but uses magic to disguise himself as an elf. He claims to have been sent by his High Cleric to assist the party in their current mission, in expectation that they will help him hunt down a renegade Drow assassin (my "real" character) as repayment.
This happened about 5 months ago. The party was wary of me at first. I continually changed my appearance from elf, to human, to eladrin, etc, to keep them on their toes. (Oddly enough, nobody ever asked me what race I really was, but oh well) The party started to get a little more nervous about me as I seemed to know an awful lot about the few Drow we encountered during the current adventure. I even volunteered to "disguise" myself as a Drow to try to negotiate our way out of a combat.
As the days went on, during each rest we took I would gradually mess with the player's heads. My character has the ability to alter memories, and combined with his expert disguises, he started imparting false visions on the PC's. After each session that we ended with a rest, I would send an email to a single player. I gave them a vision of my Pacifist Cleric, telling them something big was coming, something important, something they needed to watch out for. This continued for a while. During each vision I would somehow hint that the information was for them alone, that they couldn't trust the others.
Last session, we just rested before our last battle with the BBEG. I sent individual emails to each player, warning them not to trust each other, that their friends would betray them. This was mostly just to get them nervous.
The Betrayal
There are a few things that should happen soon. When we switch GM's, and the old one brings in his new character, the party will immediately not trust him (some of the visions hinted at new faces being dangerous). While this could be discouraging to that player for a little while, the betrayal takes place shortly thereafter and they will realize the true source of the visions.
On the first night is when the plan kicks into action. My "fake" character will sit down with the PC's over the evening meal, explaining to them more about this Drow he is supposedly hunting down. Beforehand, the meal was poisoned with a tincture that causes deep sleep for one hour. They can only be woken by being attacked or shaken violently.
Well, friends. I have assisted you in summary_of_mission_we_just_completed. Now it is time for me to ask a favor of you. As I've mentioned before, I am hunting a powerful Drow assassin. He is famous for crimes committed against my people. He has killed members of my own family in cold blood, and escaped without a trace.
(pass note to a player saying that he sees another PC's amulet of poison resistance turn from black to white)
The task I request of you is simple. All you need to do to help me destroy my brother... (My character turns into a Drow as he says those words) ...is lie back and sleep. Sleep so that you may be dragged into the pit and sacrificed for the Glory of the Spider Queen!
The GM then rolls the poison attacks to knock everyone unconscious. My allies--3 Driders and 6 Drow--arrive. During the first few minutes, the PC's weapons are taken and placed in a wagon. The strength-based PC's have their hands and feet shackled. The others are bound by rope. Spellcasters and those who have teleportation abilities are blindfolded and gagged. The plan is for the Driders to carry the sleeping PC's to a nearby entrance to the Underdark.
However, as the first Drider leaves the camp, my "real" character attacks. He strikes out at the Drider, causing it to drop one of the PC's it was carrying. That PC is handed a note describing what he sees:
You are violently awakened as your shoulders slam into the dirt after being dropped from some height. You are on your back. Your hands are clasped behind you in iron shackles, and you feel them digging into your ankles as well.
Above, you can see you are still outside, but night has fallen. Small glints of pale moonlight reflect off of eight huge insect legs standing over you. A truly terrifying Drow body rises from the spider's center, staring in shock at you with hatred in it's eyes. Slung over one deformed shoulder is an unconscious humanoid.
Roll Initiative. You are restrained by the iron bands around your hands and feet. You are still wearing armor. You are prone in the square of the creature standing over you. Your weapon is nowhere to be seen.
Play continues from this point with an instant message session open with me and the GM so I can tell him which character my "real" PC wakes up each round. The level of the encounter is actually pretty low, since the real dangers are waking up without your weapon, in the dark, with your hands and feet tied together.
The GM will declare what my "real" character does on each round, so that he is perceived as an NPC. Only once the combat is resolved will I reveal that it is my new character.
So per the criteria above, this really has no choice than to be a success. The adventure continues, and nobody is going to cry or leave. Hopefully everyone has an engaging encounter of panic, confusion, and satisfied rage as they eventually drop my "fake" PC to the dirt.
share|improve this answer
What. I... well, you've played with your group for 14 years, so you'd know them best. But I'd have an awfully hard time with this plot. – Brian Ballsun-Stanton Jun 28 '11 at 13:05
@Brian I don't claim to be the best writer or anything, but what's wrong with it? This was mostly the GM's idea, I'm just going along with it. – dpatchery Jun 28 '11 at 13:10
Hop onto chat, mate? Mainly, it would trigger pretty bad feelings of powerlessness. There's no real element of choice in the matter. Also, I'm awful confused by your fake and real PC references. – Brian Ballsun-Stanton Jun 28 '11 at 13:17
@Brian, any chance to drop a comment of your concerns? I didn't see anything that would have made me cry foul (but my gaming group has been together for nearly as long). – Pulsehead Jun 28 '11 at 17:05
@Pulsehead mainly this plan takes away agency from the other players and, if they express agency at any point, ruin the plan. Here's the chat I had chat.stackexchange.com/rooms/11/conversation/… – Brian Ballsun-Stanton Jun 29 '11 at 0:39
We ran a Dragonlance 2nd Generation campaign about 2 years before the books of the genre were anounced. The lead hero was the son of Tanis and Kitara raised by lord Soth in hopes he could redeem his honor. This went along well but my friend role played the character too well. He tore the party apart because half wanted to follow him to power and glory while the other half saw where the path would take them. A battle ensued and only one player on the good survived to spread the tale.
The players whose good characters died had created new characters that fit better with the new campaign. I cant say that no tears were shed but there were no real hard feelings... Though every once in a while the fact that the knight had killed the cleric in cold blood did come up over and over when we needed to lighten the mood. The campaign continued for about 6 months until it was inevitable that Krynn would be conquered. We even had a minitures battle where they destroyed the High Clerists tower.
Then we flipped all the pc's became NPC's and we ran a new campaign with more hero's to fight the war of the Hourglass. When the books came out we decided our story was far superior... Rastilin didnt become a reformed drunk in ours.
What it did require - We stopped the game play and explained what was about to happen. If anyone was attached to their character I promised them an out. No one took it. They fought the battle knowing they would lose. The warrior that escaped did so not to survive as a character but to get the word out. The player who eventually killed that character was the original characters owner.
share|improve this answer
I was (almost) the target of a betrayal. We were playing an OWoD Vampire Chronicle. I played a Brujah (tough, short-tempered, but not too smart) with a very strong generation. The Betrayer was a Ravnos (all the negative stereotypes of gypsies) with a very weak generation. The actual target ended up being a Tremere (vampire magician) with a similar generation to my Brujah's.
It all started when our chronicle was investigating a security leak behind why the Sabbat kept knowing what we were doing in our (mostly) Camarilla city. The Ravnos told my character that a friend (and fellow Brujah) of my character's was Sabbat. My character expressed disbelief that his friend was one of the "bad guys", since the Sabbat NPC had been a very strong proponent of Camarilla virtue and fought the Sabbat viciously on numerous occasions. The Ravnos' weakness/vice was "seduction" (both sexual and more metaphorical). My character saying, "Wow. I can't believe that." was interpreted as an affront and the worst insult that could have been said to that Ravnos. This set the Ravnos off on a quest of vengeance against my character. He first was the picture of everything that my character stood for. Looking back, he was seducing my character into believing that he was harmless.
This guy was patient. It took somewhere around 2 years of setting up a fake attack that would have targeted only his "ally". Other things happened in game, and my character made some sort of alliance with the Malkavians (who are all insane). They found out about this plot and handed my character a piece of paper with crayon scribbles on it. They INSISTED that my character sign the "contract". My character figured "what can it hurt, they haven't done me ill for a long time", so signed it. For some crazy reason, my character was booked for a job 100 miles away from the attack. The Ravnos was investigating a suspected werewolf incursion into the city, so needed backup since my character cancelled at the last minute, so he called the Tremere to act as backup. They get to the ambush site, Ravnos stakes the Tremere, and diablerizes him. Tremere (who didn't trust the Ravnos) had told a few allies to come along and those allies reached the Tremere just a minute too late. They fell on and killed the Ravnos.
The combat wrapped up very quickly after that, and the rest of the session was spent laughing about how long this betrayal had been planned, all the things in that betrayal, and why. It was there in the BS session that we found out that the crayon-scribbled page was insurance from the Malkavians against a Diableristic attack for a term of a year (I think). That this whole thing was a result of a dialog that I (the player) didn't even remember occurred.
So, yes a betrayal can be done without killing a campaign, but everyone involved needs to be grown-up about it and know that it's a game and should be fun.
share|improve this answer
Nothing personal, but this narration is a little confused... – Lohoris Jul 1 '11 at 9:07
A lot of the factors that determine whether party betrayal can be done successfully are those that are out of the GM's hands, and firmly in the types of people that play the game. And a lot of those characteristics won't be known until the betrayal happens, even if there is clear communication between the GM and the players, simply because of the fact that the actual play of the scene will determine how the players' final reaction is framed. With that in mind, drawing on my experiences I can give these indicators that might help.
1. Are the players' competitive by nature? I find that if the players are all competitive, that the betrayal is better accepted as the betrayer counted coup on the other players. Conversely, if they are largely cooperative, then it could be taken more personally.
2. What form does the final confrontation take? If it's non-permanent to the characters, then that helps with the resolution of the situation.
3. How long have the players been playing the characters? The time invested is a negative indicator towards acceptance of negative consequences that come from an unexpected direction will be taken.
4. What ultimate resolution is available? This is the most important point, especially if the campaign is to continue. In each campaign that I've been in that have had elements of betrayal, the resolution ended with two parties, because of a lack of a clear path towards the recombination of the groups.
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/47537
|
Sacred Texts Hinduism Mahabharata Index Previous Next
"Sanjaya said, 'Then those two vast armies, teeming with rejoicing men and steeds and elephants, resembling in splendour the celestial and the Asura hosts, meeting together, began to strike each other. Men, cars, steeds, elephants, and foot-soldiers of fierce prowess, made sturdy strokes destructive of bodies and sin. Lion-like men strewed the Earth with the heads of lion-like men, each resembling the full moon or the sun in splendour and the lotus in fragrance. Combatants cut off the heads of combatants, with crescent-shaped and broad-headed shafts and razor-faced arrows and axes, and battle-axes. The arms of men of long and massive arms, cut off by men of long and massive arms, falling upon the Earth, shone, decked with weapons and bracelets. With those writhing arms adorned with red fingers and palms, the Earth looked resplendent as if strewn with fierce five-headed snakes slain by Garuda. From elephants and cars and steeds, brave warriors fell down, struck by foes, like the denizens of heaven from their celestial cars on the exhaustion of their merits. Other brave warriors fell down by hundreds, crushed in that battle by brave combatants with heavy maces spiked clubs and short bludgeons. Cars also, in that tumultuous fight, were crushed by cars, and infuriate elephants by infuriate compeers, and horsemen by horsemen. Men destroyed by cars, and cars by elephants, and horsemen by foot-soldiers, and foot-soldiers by horsemen, dropped down on the field, as also cars and steeds and foot-soldiers destroyed by elephants and cars and steeds and elephants by foot-soldiers, and cars and foot-soldiers and elephants by steeds and men and elephants by cars. Great was the carnage made of car-warriors and steeds and elephants and men by men and steeds and elephants and car-warriors, using their hands and feet and weapons and cars. When that host was being thus struck and slain by heroic warriors the Parthas, headed by Vrikodara, advanced against us. They consisted of Dhrishtadyumna and Shikhandi and the five sons of Draupadi and the Prabhadrakas, and Satyaki and Chekitana with the Dravida forces, and the Pandyas, the Cholas, and the Keralas, surrounded by a mighty array, all possessed of broad chests, long arms, tall statures, and large eyes. Decked with ornaments, possessed of red teeth, endued with the prowess of infuriate elephants, attired in robes of diverse colours, smeared with powdered scents, armed with swords and nooses, capable of restraining mighty elephants, companions in death, and never deserting one another, equipped with quivers, bearing bows adorned with long locks, and agreeable in speech were the combatants of the infantry files led by Satyaki, belonging to the Andhra tribe, endued with fierce forms and great energy. Other brave warriors such as the Cedis, the Pancalas, the Kaikayas, the Karushas, the Kosalas, the Kanchis, and the Maghadhas, also rushed forward. Their cars and steeds and elephants, all of the foremost kind, and their fierce foot-soldiers, gladdened by the notes of diverse instruments, seemed to dance and laugh. In the midst of that vast force, came Vrikodara, riding on the neck of an elephant, and surrounded by many foremost of elephant-soldiers, advancing against thy army. That fierce and foremost of elephants, duly equipped, looked resplendent, like the stone-built mansion on the top of the Udaya mountain, crowned with the risen Sun. Its armour of iron, the foremost of its kind, studded with costly gems, was as resplendent as the autumnal firmament bespangled with stars. With a lance in his outstretched arm, his head decked with a beautiful diadem, and possessed of the splendour of the meridian Sun at autumn, Bhima began to burn his foes. Beholding that elephant from a distance, Kshemadhurti, himself on an elephant, challenging, rushed cheerfully towards Bhima who was more cheerful still. An encounter then took place between those two elephants of fierce forms resembling two huge hills topped with trees, each, fighting with the other as it liked. Those two heroes, then, whose elephants thus encountered each other, forcibly struck each other with lances endued with the splendour of solar rays, and uttered loud roars. Separating, they then careered in circles with their elephants, and each taking up a bow began to strike the other. Gladdening the people around with their loud roars and the slaps on their armpits and the whizz of this arrows, they continued to utter leonine shouts. Endued with great strength, both of them, accomplished in weapons, fought, using their elephants with upturned trunks and decked with banners floating on the wind. Then each cutting off the other's bow, they roared at each other, and rained on each other showers of darts and lances like two masses of clouds in the rainy season pouring torrents of rain. Then Kshemadhurti pierced Bhimasena in the centre of the chest with a lance endued with great impetuosity, and then with six others, and uttered a loud shout. With those lances sticking to his body, Bhimasena, whose form then blazed with wrath, looked resplendent like the cloud-covered Sun with his rays issuing through the interstices of that canopy. Then Bhima carefully hurled at his antagonist a lance bright as the rays of the Sun, coursing perfectly straight, and made entirely of iron. The ruler of the Kulutas then, drawing his bow, cut off that lance with ten shafts and then pierced the son of Pandu with sixty shafts. Then Bhima the son of Pandu, taking up a bow whose twang resembled the roar of the clouds, uttered a loud shout and deeply afflicted with his shafts the elephants of his antagonist. Thus afflicted in that battle by Bhimasena with his arrows, that elephant, though sought to be restrained, stayed not on the field like a wind-blown cloud. The fierce prince of elephants owned by Bhima then pursued his (flying) compeer, like a wind-blown mass of clouds pursuing another mass driven by the tempest. Restraining his own elephant valiant Kshemadhurti pierced with his shafts the pursuing elephant of Bhimasena. Then with a well-shot razor-headed arrow that was perfectly straight, Kshemadhurti cut off his antagonist's bow and then afflicted that hostile elephant. Filled with wrath, Kshemadhurti then, in that battle, pierced Bhima and struck his elephant with many long shafts in every vital part. That huge elephant of Bhima then fell down, O Bharata! Bhima, however, who had jumped down from his elephant and stood on the Earth before the fall of the beast, then crushed the elephant of his antagonist with his mace. And Vrikodara then struck Kshemadhurti also, who, jumped down from his crushed elephant, was advancing against him with uplifted weapon. Kshemadhurti, thus struck, fell down lifeless, with the sword in his arm, by the side of his elephant, like a lion struck down by thunder beside a thunder-riven hill. Beholding the celebrated king of the Kulutas slain, thy troops, O bull of Bharata's race exceedingly distressed, fled away.'"
Next: Section 13
|
global_05_local_4_shard_00000656_processed.jsonl/47558
|
Background of the NAS Kernels The "NAS Kernel Benchmark Program" contains 7 tests assembled in 1984 by NASA-Ames to represent their CFD computational requirements. The tests are Fortran subroutines dominated by 64-bit floating point arithmetic, and contain nested loops operating on multidimensional arrays. Each of the tests performs an error check and a MFLOPS calculation based on execution time and operation count. A total MFLOPS calculation is also computed, based on the aggregate time and operation count of all 7 tests. These NAS Kernels are not to be confused with the "NAS Parallel Kernels", a different set of tests released more recently for testing massively parallel systems. Although developed on Crays and suitable for vector and parallel compiler optimizations, the kernels contain several undesirable characteristics for supercomputer architectures, such as non-stride-1 inner loops, power-of-2 array dimensions and strides, and loops with small iteration counts. This makes them an interesting set of tests for investigating the performance characteristics of processors, cache/memory systems, parallel architectures, and optimizing compilers. Because they are compact and well-structured, they make good examples for illustrating the tuning techniques suitable for a given system. In addition, since they run in a short amount of time and test themselves for correctness, they are also ideal examples for experimentation and learning. The names and descriptions of the kernels are: Name Description MXM Matrix Multiply CFFT2D Complex 2D FFT CHOLSKY Cholesky Decomposition/Solution of Banded Systems BTRIX Block Tridiagonal Solver GMTRY Generate Solid-Related Matrix, Gaussian Eliminate EMIT Emit Vortices, Pressure, Forces VPENTA Vectorized Inversion of 3 Pentadiagonals
|
global_05_local_4_shard_00000656_processed.jsonl/47559
|
Tuesday, 11 August 2009
About what is funny. Or not?
David: You know how I know you're gay?
Cal: How? Cause you're gay? And you can tell who other gay people are?
David: You know how I know you're gay?
Cal: How?
David: You like Coldplay.
(The 40 Year Old Virgin)
Tonight, we were watching a movie with William Defoe . After 9 years of being married to a guy, you often know what he might say next. So, husband said:
-I saw him naked on stage! He has an enormous…
- I know- I said- You know how I know? Because you tell me every single time his name appears on the screen. (Somewhat worrying, to be honest..)
So,of course! I wind husband up about being gay. And husband thinks it is funny.
So why the hell are other people so sensitive?
Say, this friend. He was over at our place, we were waiting for dinner, and I offered him a beer. He said he was not ready for one yet, as he wanted to go for a walk (quote) to admire the sunset. That is just a little bit gay, don’t you find? Which is what I said.
Of course, I don’t really think he is gay. I was jo-ki-ng. He is a friend, he knows me. So he should get me, right?
But no, not always.
When it comes to humor, I never know what reaction to expect. A lot of it is about personalities, but in my case, I also blame this cocktail of the two very different cultures in my head.
I can not simply blame Azeri background, because I would sooo not get away with 'you are so gay' joke back home. Or would I? I would not know anymore. I can also, comforted by the ease with which I have assimilated, tell a Russian joke to someone here-just to get a blank stare back: Russian jokes are famously funny only for ex-Soviets. Nobody else gets them.
And of course, I annoy Azeries, too. In fact, I probably annoy them a lot more than I annoy the Brits.
The other day a guy I knew back home posted some very abstract stuff on his Facebook profile. (He is a writer these days)
Something about him walking in a desert, seeing a word and dropping on his knees in a worshiping ecstasy.
Too much drugs!- I commented. Was not even a particularly original joke.
But he told me it was not funny. He rapidly deleted my comment.
So...I joke and no longer know where that joke fits: is it the UK or back in Azerbaijan? Is it going to insult, annoy or get a polite but confused smile back?
Oh, well. I believe I successfully manage to upset both sides.
1. I have somewhat the same problem like you. Really like you hit my nerve. It's very hard to convey irony or sarcasm online... But I love it and sometimes can't just not write a silly remarks. I think you have a similar sense of humour like me :)
2. I guess the reactions are much more related to the sensitivity of the person you are joking with. And some cultural background as well.
3. He does ALWAYS mention Willen Dafoe's you=know-what, right? I'm with you!
4. I think it is more down to sensitivity than culture, as most forms of irony or sarcasm can bridge the culture gap but not the sensitivity of individuals.
5. All humor needs a common frame of reference. Some things are universally funny across most cultures: kids, parents, siblings, husbands/wives, mothers in law (a timeless classic). More specialized topics that are language/geography/religion/culture bound are harder to cross. I personally love comedians who successfully cross the cultural boundaries and find enough common ground to be seriously funny: Adam Ferrara, George Lopez & Omid Djalili (to name a few) do it really well.
6. Ahmad:
I hope your "Coldplay" rule doesn't relate to azeri :)
|
global_05_local_4_shard_00000656_processed.jsonl/47564
|
Forgot your password?
Government Science
India Ditches UN Climate Change Group 403
Posted by ScuttleMonkey
from the shoddy-work-breeds-contempt dept.
Several readers have told us that the Indian Government is moving to establish its own group to address the science of climate change since it "cannot rely" on the official United Nations panel. "The move is a severe blow to the UN's Intergovernmental Panel on Climate Change (IPCC) following the revelation parts of its 3000 page 2007 report on climate science was not subjected to peer review. A primary claim of the report was the Himalayan glaciers could disappear by 2035, but the claim was not repeated in any peer-reviewed studies and rebuffed by scientists. India's environment minister Jairam Ramesh announced that the Indian government will established a separate National Institute of Himalayan Glaciology to monitor climate change in the region. 'There is a fine line between climate science and climate evangelism,' Ramesh said. 'I am for climate science.'"
India Ditches UN Climate Change Group
Comments Filter:
• by DavidR1991 (1047748) on Friday February 05, 2010 @06:24PM (#31040412) Homepage
The WHO hyped up a potential pandemic to stop it becoming a pandemic. If you're informed about something (i.e. a disease) you can deal with it, inform others, get help etc. If you're in the dark, have zero information and have no idea what's afoot, the chances are you'll ignore any problems, unintentionally assist the spread of the disease and... bang. You have a catalyst. Keeping it hyped kept people vigilant
• Re:cold and ironic (Score:3, Interesting)
by Volante3192 (953645) on Friday February 05, 2010 @06:24PM (#31040416)
And speaking of global warming, isn't this this coldest winter on record?
Hmm...any unusual weather patterns? So. Cal was having an unusually cold winter. But conversely Alaska was unusually warm. Were, say, Iceland or Greenland having unusual highs?
Yeah, sadly that part requires research instead of ZOMG ITS COLD!!
• by adosch (1397357) on Friday February 05, 2010 @06:31PM (#31040498)
Who would blame India for not having faith and carrying out their out climate study with an in-house panel? Did the IPCC not botch the initial rreport [sistertoldjah.com] because someone did the School of Office Space decimal point shift in the math dealing with the melting factor of the Himalayan glaciers? I guess some counties feel that if they want something done right, they'll do it themselves. Cant' fault India for that.
• by shutdown -p now (807394) on Friday February 05, 2010 @06:41PM (#31040582) Journal
Take Russia. It also regularly disputes AGW claims.
At the same time, it coincidentally happens to be a major oil exporter, and world largest natural gas exporter. Its economy to a large extent depends on worldwide demand for those resources - oil alone accounts for 40% of all exports.
Internally, most (~65%) power is generated by coal and gas plants. The USSR had a long-term program for replacing those with hydro and nuclear, for resource conservation and environmental reasons, but that only got 1/3 way through - and Russia cannot afford to proceed with that anymore, and is actually struggling [wikipedia.org] to maintain the Soviet legacy.
Oh yes, also, if AGW models are actually correct, then Russia will benefit in many ways. One is that warming up Siberia will create large new swaths of habitable lands. Another is that same changes, as well as melting of ice in the Arctic, will provide for much easier access to extremely rich natural resource deposits which are currently very hard (and in many cases economically unfeasible) to develop.
That's quite enough dots to connect them.
Now, I wrote about Russia, because I actually wrote about it - but are China and India any different? At the very least, they all still heavily rely on fossil fuels to power their industrialization, and cannot afford to stop there no matter the consequences. And - surprise! - China historically had been dismissive of AGW. I don't know much about past India stance on this, but it would seem that them joining the club would be expected, purely for political reasons.
• by Rei (128717) on Friday February 05, 2010 @07:35PM (#31041124) Homepage
Let's look at "fluff.info", shall we?
Here, apophenia kicks in, and after you've seen that BPM and GDP are correlated, you'll have no problem inventing a model for it.
The first problem with that argument is that the hypothesis of CO2 causing warming came from *before* worldwide datasets were even availabl3e. It was first proposed in the late 1800s based on laboratory experiments showing that some gasses absorb heavily in the infrared range but minimally in the visible range. Secondly, "you'll have no problem inventing a model" for how beats per minute of a Billboard 100 song affects GDP? Really? Um, no.
There's also the problem that it is very difficult to write down a model for which there isn't another model with the causation the other way `round
Which is ludicrous in the context of CO2, since we can measure isotopic ratio changes (indicating the change in old carbon versus fresh carbon) and have good accounting for human inputs to the system versus sources and sinks. Is warming supposed to make us want to dig up more coal?
Without a model to say anything about the extra variables
Too bad we have nothing more than first principles itself to rely on...
(Actually, we do have other things beyond first principles as well! But that's another story)
For example, for many types of game, if you have two players repeating the game a thousand times, the distribution of actions that player one took will have nothing at all to do with the distribution of actions that player two took
If you're using that as an analogy for global warming, it corresponds to claiming that the laws of physics have changed. Fat luck with that.
And seriously -- do you honestly think that statisticians aren't involved in these papers? Really?
• by Rei (128717) on Friday February 05, 2010 @07:42PM (#31041182) Homepage
One major volcanic eruption would affect global climate more than any variance in solar activity, and much more than any supposed "man-made climate change" with drastic amounts of particulate matter being expelled into the atmosphere that utterly dwarf the impact of all of us.
If by that you mean supervolcanic eruption, yes.
If by that you mean major but ordinary volcanic eruption, no. Not even close. Even the worst conventional eruptions cause a couple year blip. And it's only temporary masking of the greenhouse effect, not actual reduction of the greenhouse effect.
Oh, and for the record: volcanoes primarily cool by ejecting SOx into the upper atmosphere, not PM.
• by Daniel Dvorkin (106857) * on Friday February 05, 2010 @08:44PM (#31041726) Homepage Journal
Questioning global warming / climate change is a near sure way to get modded down.
He says, in a comment modded to +5.
Taking the pose of the Bold Rebel Speaking Truth To Power is in fact a sure way to get modded up, on just about any topic. Of course it doesn't matter if it has any relation to reality. Just start your comment out with "I'll get modded down for this, but ..." or "This may not be politically correct of me, but ..." and a bunch of Rugged Individualists Exactly Like You will be there to reward you.
• by falconwolf (725481) <[email protected]> on Friday February 05, 2010 @10:08PM (#31042370)
to suppose we should spend billions of dollars on fixing a potential non-problem, trusting in what we know to be bad science, that's just fucking bullshit.
And not to do anything about a potential catastrophe is fucking bullshit as well. No, to do something without having understanding isn't good but sitting on your ass isn't good either.
• by Antique Geekmeister (740220) on Friday February 05, 2010 @10:08PM (#31042374)
No. They're not. Oceanic effects of solar radiation alone, and their effects on climate, are filled with some very complex models that are _not_ complete. It's like the difference between E=MC2 and designing a fusion power plant: a lot of theory and modeling and testing lie in between, and the systems are very difficult to run full-scale tests or gather long records of extremely accurate data for.
Reasonably well understood? Sure. But complete understanding. Be honest about it.
• by falconwolf (725481) <[email protected]> on Friday February 05, 2010 @10:19PM (#31042452)
try reading the linked and even copied article above... and possibly weep into the beverage of your choice..........
Why don't you do the same? You link to a newspaper that denies Climate change while I link to a science magazine. Gee, I'll believe in science first. Oh, and I did read the "Telegraph" article.
• by hairyfeet (841228) <bassbeast1968@@@gmail...com> on Friday February 05, 2010 @11:55PM (#31043060) Journal
Mark me troll ALL you want, but don't be surprised when those in favor of AGW get run out of congress on a rail in 2010. Mark my words, after AIG and TARP folks are sick of "enlightened self interests" making policies that take money out of their pockets, and with Goldman Sachs [earth2tech.com] setting themselves up to make so much money off the "carbon credits" scam that robber barons would blush,
And with Al Gore [wnd.com] paying himself carbon offsets from the company he is profiting from so he can blow whatever he wants? Well you might as well hand the republicans the keys to congress and the White House now. Don't forget to turn off the lights on your way out, wouldn't want to waste energy now.
• by falconwolf (725481) <[email protected]> on Saturday February 06, 2010 @12:17AM (#31043194)
lol... it doesn't deny climate change, what it does do it show where source material came from
And my science link didn't sat where it came from? If you want me to believe that then you didn't read it.
also i think you'll find that little things such as the CRU data leak which showed them to be a bunch of number fiddling and lying turds also throw doubt on the human cause of any climate change.
Where did I say anything about CRU? Without googling it I don't even know what the CRU is.
now where you have people fiddling numbers and using dubious sources i think it's not unreasonable to have reasonable doubt.
Oh, I agree. Let's take for instance where deniers are saying we're in a cooling trend. If fact the 2000s were the hottest decade [climateprogress.org] on record. The only way to make it look like there's been some cooling is by using 1998 as the starting date. Because of El Nino that was a hot year and temperatures spiked as shown by this graph [wikipedia.org]. There is no cooling, in fact the 2000s was the hottest decade [climateprogress.org].
however i think it you google a little you will find the net awash with 3660 hits for "IPCC student dissertation climbing magazine"
And if you google Syed Hasnain new scientist magazine ipcc [google.co.uk] you'll find about 200,000. The first one is the link I provided with the two following also from "New Scientist". I don't know, maybe they were both used, so I'm willing to let that go for now.
there also happens to be an ASSLOAD of people making truckloads of money out of ittwinned with a mass of rank hypocrisy
And just as above, about "people fiddling numbers", there are lots of people who could make tankers full of money out of disproving Global Warming. Coal, petroleum, and other fossil fuel industries stand to lose a lot of money if their products are regulated and or taxed. Now which has the deeper pockets, Exxon-Mobile or Greenpeace?
Now I'm not saying we have to do whatever it takes to stop Global Warming. I don't even like that term and prefer Climate Change. What I would like to see is alternative energy sources developed and for the US to work on them before we become has-beens. While China is busy building new coal fired power plants they are also busy building massive wind farms and installing solar energy systems. Mexico and the Philippines are using geothermal energy and so can the US. By one estimate, SciAm's A Solar Grand Plan [scientificamerican.com], solar energy can provide 69% of the US's electricity and 35% of it's total energy by 2050 using just a part of the Southwest. And the NREL's Wind Energy Resource Atlas of the Unites States [nrel.gov] lays out the wind potential of different areas of the US. The Rockies from Canada to northern Texas for instance contain enough potential energy to supply all 48 continuous states with electricity. However they aren't the only places. On the West Coast from British Columbia to Southern CA then east through AZ and NM to west Texas there's good wind sites. To the east from the Appalachians in the south up through the Northeast there is good wind potential both on-shore and off-shore. NIMBYs, notably the deceased Ted Kennedy, did whatever they could to stop offshore wind farms. In 2007 California, already mentioned for solar and wind power, got 4.5% of it energy from geothermal sources [ca.gov].
Also don't
• by Anonymous Coward on Saturday February 06, 2010 @05:12AM (#31044198)
Let me fix that for you:
1) Cherry-pick the coldest year they can as the starting point (1850 -- the end of the Little Ice Age) and use that as a starting point.
2) Pick a higher subsequent year and use that as an end point (1998 -- one of the most intense El Nino events on record). See the huge one-year spike in 1998? That's what they're picking as their ending point
|
global_05_local_4_shard_00000656_processed.jsonl/47565
|
Respectful Insolence
What does an anti-Semite look like…
…who needs a lot of practice still?
I would say he might look like this.
I still have to figure out what Zionist juice is, though.
1. #1 Danio
December 31, 2008
While the sentiment is abhorrent, the pedant in me wonders whether there’s some kind of remedial bigot language course this guy and his fellow spelling-challenged hatemongers can sign up for. Sheesh!
2. #2 Bob O'H
December 31, 2008
Ah. Must be the sort squeezed from Jaffa oranges.
3. #3 kraut
December 31, 2008
Damn islamists, now they want to take my OJ away too. Hate those religious buggers.
4. #4 Paul Murray
December 31, 2008
Context is everything. If this guy’s family just got wasted as “colateral damage” from Israel’s bombing of the Gaza Strip, perhaps it’s understandable. Wartime sentiment, you know. Heck, they probably voted for Hamas anyway – most palestinians did – and that makes them all terrorists.
As for anti-semitism, the man himself is semitic. Far more so that the white europeans (with a trace of semitic ancestry) who decided to kill the inhabitants of palestine and take their land for themselves, back in the 20th century. The most egregious anti-semetism in the world today is hatred of semitic arabs by %90 white Israelis and the laws of the aparthied Israeli state.
Maybe he spells better in arabic. Pity that, to get the message out, he has to use a language not his own.
But, context is everything. Maybe you’re right, and the guy really is just an anti-semitic dick.
5. #5 DLC
December 31, 2008
What did The Juice do to deserve death ?
Was it Pasteurized ?
6. #6 Orac
December 31, 2008
How could I have forgotten the obligatory lame O.J. jokes?
7. #7 sophia8
December 31, 2008
Can you say “Photoshopped”? Well I can.
How come, out of the dozens of people carrying cameras and mobile phones there would have been at that demonstration, only one managed to spot that particular photo-op? And only got the one shot at it?
8. #8 Rev. BigDumbChimp
December 31, 2008
If it is photoshopped, they did a pretty good job. Look at the bend in the foamcore.
9. #9 Rebecca
December 31, 2008
I just took a look at all of the photos from that album (from a protest in New York on December 28). I don’t think this particular photo is Photoshopped, because it’s quite in keeping with a number of the other signs from the same protest, which say things like “God will send the Mushroom Cloud from the Sky on Israel.” It appear that this demonstration attracted people from quite a wide political spectrum – Al-Awda, the Islamic Thinkers Society (they’re the ones wishing genocide on Israel), Neturei Karta, someone calling for India to leave Kashmir, a sign from something called – showing a torso with a suicide belt on it, and the slogan, “May Allah Give Victory to the Islamic Resistance in Palestine,” and a drawing of an AK-47.
10. #10 Pat Patterson
December 31, 2008
Hey, the guy’s got three hands. Spelling and fruits are the least of his problems.
11. #11 sophia8
December 31, 2008
Ah, I didn’t realise that was an album of photos; OK, it’s genuine.
But it was truly depressing to read the hundreds of comments on other blogs that feature this picture. If the “Fakestanians” in that demonstration are spewing hatred, then they are fully matched by the “We must defend poor weak little Israel from millions of bloodthirsty Muslims” crowd.
12. #12 Interrobang
December 31, 2008
Are you a British Israelist or something?
Or are you rewriting history and conveniently leaving out the Balfour Declaration and the British Mandate this time? Also, I note you’re conveniently forgetting the existence of Middle Eastern Jews, the ones who were living there (albeit in small numbers) all along, and conveniently ignoring the existence of non-European-derived Israelis. (The shade of Ofra Haza wants a word with you when you have a moment.) Talk about “anti-semites,” complete with the canard about “anti-semitism” pertaining to non-Jews as well, when the term was specifically coined to be a euphemism for “Jew-hatred.”
13. #13 CW
December 31, 2008
While, as Danio noted, the sentiment is abhorrent I have to say that my own efforts to write “Jews” in Arabic would no doubt be equally comical. Naturally I assume that everyone making fun of spelling here is fluent in both languages in question, right?
14. #14 Rebecca
December 31, 2008
Or maybe he was just making some convoluted political joke?
15. #15 Prometheus
December 31, 2008
I’m not sure that it is necessary to be fluent in both English and Arabic (if that’s the native languge of the fellow holding the sign) in order to laugh at the spelling. After all, it was his choice to write the sign in a language he (apparently) doesn’t write well.
He could have written it in his native language OR he could have asked someone who was fluent in English to help him. The other pictures in the “album” make it clear the setting is New York City, so he had to know one or two people who could have proofread his sign.
The fact that he was using the US freedom to assemble and freedom of speech to promote his message of hatred is more than a bit ironic. I wonder how long someone would last holding a “Death to Hamas” sign in Gaza?
I’ll just add this image to the others I recall to mind whenever someone talks about “Peace in the Middle East”.
16. #16 Joseph Hertzlinger
January 1, 2009
As for anti-semitism, the man himself is semitic.
Are antiquarians opposed to quarians?
17. #17 DuWayne
January 2, 2009
Umm, CW, I tend to make light fun of my Japanese friends, when they make glaring errors in English. I happen to like them, so it’s light hearted fun, but it happens none the less. And trust me, they get far more fodder for mocking when I attempt forays into Japanese.
So you know what? Not having the least knowledge of his language, I am still content to mock his attempt to write a hateful message in mine. And likewise, I would accept and even laugh along, if I attempted Arabic and people for whom it’s their primary language mocked my attempts. Because more often than not, the results of vain attempts at using a language with which one is unfamiliar has hilarious results.
18. #18 Lucario
January 2, 2009
What this guy needs is more juice. He’s already drunk too much Haterade….
19. #19 blf
January 3, 2009
The sign might be trying to say Drink All The Juice, which is perhaps sensible, but not went you’ve drunk as much as the sign-maker.
|
global_05_local_4_shard_00000656_processed.jsonl/47585
|
Establishing a direct Microsoft Outlook connection using RPC over HTTP
SearchExchange.com expert Brad Dinerman explains alternate ways for remote users to access Microsoft Outlook from outside of their network, including Remote Procedure Call (RCP) over HTTP.
I have laptop users that are attached to our LAN and have mailboxes on our Exchange server. When they are out of the office, they want to use Microsoft Outlook to access email, so I have configured POP3 accounts for them. This works to a degree, but when they connect from outside the network, all their existing email on the Exchange server is downloaded for a second time, creating two copies of each message. How do I stop this from happening, and is there a better way of doing this?
There are a number of different (and perhaps less problematic) ways to use Microsoft Outlook to access email from the Internet. For example, you could use IMAP4 instead of POP3. Or, assuming that you have Outlook 2003 and Exchange Server 2003, you can also use Remote Procedure Call (RPC) over HTTP for a direct Outlook connection to your server. In this configuration, Outlook will use a direct Exchange Server connection rather than POP3 or IMAP4. Read Microsoft article " Exchange Server 2003 RPC over HTTP deployment scenarios" for more information.
Related information from SearchExchange.com:
• Expert Advice: Accessing Exchange over the Internet without using a VPN
• Tip: Setting up RPC over HTTP
• FAQ: Exchange Server and POP3
• Webcast: Locking down Exchange Server and securing the client
• Reference Center: Exchange Server mail protocols
• Reference Center: Microsoft Outlook tips and resources
• This was first published in September 2006
Dig deeper on Microsoft Outlook
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.
You will be able to add details on the next page.
Forgot Password?
Your password has been sent to:
|
global_05_local_4_shard_00000656_processed.jsonl/47597
|
Biology 202
1998 Third Web Reports
On Serendip
The Role of Estrogen in Sexual Differentiation
Elaine Bonleon de Castro
Most, if not all, species with two sexes exhibit sexually dimorphic behavior and physical characteristics. These dimorphisms can be attributed to differences in the brain, such as size or function of structure, and these brain structures can be affected by the hormones circulated throughout the organism. It has been held that the sexual dimorphisms rely only on the presence or absence of androgen, namely, testosterone, during the critical period of development for an organism; however, new research suggests that the presence of estrogen, specifically estradiol, has an active role in sexual differentiation.
Several sexual dimorphic structures in the brain have been observed in laboratory experiments. The corpus callosum in male rats is much larger than that in female rats, and this size difference is uncorrelated with total brain weight. These findings led many to investigate the relationship between human male and female corpus callosa. A paper published by de Lacoste-Utamsing and Holloway stated that the splenium of the callosum is larger in women than in men, but their finding has since been challenged by several reports stating that there exists no sexual dimorphism. Analysis done from 1982-1994 reveals a small difference of corpus callosum size in favor of males, but it is hypothesized that age, handedness, overall brain size and weight, and incorrect statistics were not taken into account. (3)
There has also been controversy in the research involving the brain region INAH-3 in humans. The heterosexual male INAH-3 is larger than that of heterosexual females; the INAH-3 in homosexual males is on the average smaller than that of heterosexual males and approximately the same size of heterosexual females. The general population has attempted to use this fact as an explanation of the biological basis of homosexuality, though the differences in structure may not be causally related to the sexual orientation of the man. Because we can only observe behaviors when doing experiments with lab animals, the data cannot firmly establish a basis for sexual orientation.
The traditional view on sexual differentiation is that organizational effects from hormones which occur during neonatal development are the master plan for the organisms sex and corresponding behaviors and characteristics. Exposure to androgen, namely, testosterone, would result in a male organism, while exposure to neither androgen nor estrogen would result in the default sex: female.
Characteristics resulting from organizational effects include formation of genitalia and traits such as aggression. Some studies have correlated aggression in preschool boys to organizational effects of androgen. Activational effects are defined as effects which occur in the adult organism, and include reproductive and social behaviors. In the rat, such behaviors include mounting (male) and lordosis (female).
In the rat, it has been held that adult sexual behavior depends solely on organizational effects. A female treated with testosterone shortly after birth or an intact male will exhibit male behaviors no matter what activational effects may be manipulated later in life. An intact female or a neonatally castrated male will exhibit female behaviors.
The most recent research on rat brain sexual dimorphisms suggests that estrogen, namely, estradiol, has an active effect on differentiation. This contradicts previous research which states that lack of hormones causes feminization, and the female sex is developed by default in a passive mechanism. (3) It has also been shown that the sensitive period for estrogen related processes occurs at a later time than that of testosterone related processes. The definitions of organizational and activational effects have also been questioned, as some permanent changes are instilled late in life, and some temporary effects are enacted very early in development. (3, 4)
In rats, a region known as the sexually dimorphic nucleus of the preoptic area (SDN-POA) is larger in males, and administering testosterone to a female rat can increase the size of her SDN-POA. (2) The SDN-POA was said to develop in a female fashion without hormones. More recent experiments concur that a female rat pup treated with androgen will develop a larger SDN-POA, similar in size to that of a male. However, the absence of estrogen (caused by the administration of an estrogen antagonist) caused the size of the SDN-POA to decrease. This is some evidence that estrogen does not play a passive role in the critical period. This is also an example of defeminization without masculinization. (3)
It has also been noted that in male rat pups, testosterone is secreted by the testes, but it is converted to estrogen within neurons before causing developmental effects in males. Although female rat pups are also exposed to estrogen during this period, they are not masculinized; instead, they are protected by alpha-fetoprotein (AFP), which binds to estrogen and prevents it from entering the cells. Levels of AFP reach a maximum during the same period that testosterone and other androgens cause maximum masculinization. When administering synthetic estrogen (diethylstilbestrol), the SDN-POA still increases in size because this hormone does not bind to AFP. The ovaries in female rat pups do not take an active role until the AFP levels have already declined. Thus, both sexes of rat pups are exposed to estrogen which causes masculine development, except females are protected by AFP. Also, estrogen biosynthesis holds a crucial role in sexual differentiation. This data contradicts the hypotheses that claim female development is a default mechanism (since an extra process is required to keep a pup from masculinization) and that testosterone is the critical factor in sexual differentiation.
The presence or absence of ovaries during development makes a significant difference in behaviors as well. A greater lordosis response is seen in intact females who have received testosterone versus females who had neonatal ovariectomies, received testosterone, and were primed with estrogen and progesterone.
Greater proceptive behavior (such as ear-wiggling and hopping to attract the attention of the male) was seen in females who had post-pubertal ovariectomies compared to those who had neonatal ovariectomies. Males who had testes removed and ovaries transplanted into them also had stronger female proceptive behaviors than those who only had testes removed.
Non-reproductive behavior, such as behavior in open fields and plus mazes, was also affected by neonatal ovariectomies. Females who had ovariectomies behaved as males in open fields, which would not be expected under the hypothesis that absence of hormone would lead to a female development. Meanwhile, androgen blockage in males did not feminize their behavior in plus mazes. These show that particular female behaviors are under the control of ovarian hormones. Estrogen biosynthesis was also seen when castrated male rats attempted to learn behaviors associated with going through mazes. When estradiol was deposited in the hippocampus or cortex, maze learning behavior was reacquired in a male fashion.
Other brain structures are also sexually dimorphic in rats, and are currently being investigated in humans. An asymmetry of the cerebral cortex is seen -- it is thicker in the right hemisphere than in the left in male rats, with an opposite thickness ratio for female rats. Neonatal ovariectomy results in an overall thicker cortex compared to intact females. The development of cortical neurotransmitter systems ends earlier in female rats than in male rats. The direction of hippocampal dendritic anatomy varies depending on the sex of the rat, and the density of the dendritic spine varies in females according to the estrus cycle, which suggests a correspondence between estrogen levels and neuronal structure. Male rats have a larger absolute cross-sectional callosal area than females in absolute and relative measurements, and the neonatal removal of ovarian hormones leads to callosal enlargement; these effects can be countered by the administration of estrogen.
These experimental data strongly suggest that ovarian hormones, especially estrogen, contribute to the sexual differentiation process in ways comparable to testosterones masculinization effects. Other factors to consider in the sexual dimorphisms of a species, particularly humans, include age, handedness, and environment. A normal male requires exposure to androgens during his critical period in development; a normal female must be exposed to ovarian hormones, including estrogen and any accompanying factors such as alpha-fetoprotein. Lack of hormone exposure does not lead to feminization as a default process. Experimental data on the sexually dimorphic nucleus of the preoptic area (SDN-POA) and the corpus callosum in rats consistently show these developments as reliant on both androgens and estrogens. Whether or not these data correspond to human sexual differentiation has yet to be determined.
(1) Measuring and Understanding Sex Differences in the Brain Timothy J. DeVoogd
A course page in which DeVoogd describes the sexual dimorphisms in the brains of songbirds and the attempts to determine the hormonal effects on these structures.
(2) Biological Bases of Behavior: Psychosexual Differentiation, University of Plymouth- Department of Psychology
Lecture support material on the traditional view of sexual differentiation in rats. Includes graphs and illustrations of sexual behaviors associated with rats, preschool children, and CAH patients.
(3) A Role for Ovarian Hormones in Sexual Differentiation of the Brain R. H. Fitch & V. H. Denenberg
Extensive research data and conclusions on the effects of estrogen on developing and mature rats, with analysis on past research done on other animals including humans.
A collection of abstracts including An Overview on the Role of Estrogen in Development and Sexual Differentiation of the Brain: Re-Examining the Neutral Female Phenotype (R. H. Fitch), Estrogen-Related Changes in Spatial Learning, Hippocampal Size, and Cell Proliferation in the Adult Female Meadow Vole (Galea, McEwen), and Estrogen and the Female Brain Across the Lifespan (Cowell).
(5) Sex Differences in the Functional Organization of the Brain for Language
1995 Nature, 373, 607-609- by Shaywitz, Shaywitz, Pugh, Constable, Skudlarski, Bronen, Fulbright, Fletcher, Shankweiler, Katz , and Gore
An abstract which addresses the question of sex differences in the language centers of the human brain. These differences manifest themselves in lateralization between males and females.
(6) Neural development and the influence of sex, hormones, and the environment
A faculty page in which Juraska describes her research in the cerebral cortex and hippocampus of rats, and the differences of these structures between the sexes.
Send us your comments at Serendip
© by Serendip 1994- - Last Modified: Monday, 07-Jan-2002 14:36:37 EST
Contribute Thoughts | Search Serendip for Other Papers | Serendip Home Page
|
global_05_local_4_shard_00000656_processed.jsonl/47605
|
Intern Architect/3d Visualizer •
Tarlac, Philippines
Follow me @,
My areas of Expertise:
-Architectural planning and designing
-3d modelling
-3d visualization
-Vray for sketchup
-Scale model
some people dream of building others build their dreams,discover yourself . . .
“A Work of Art
… is not a living thing …
that walks or runs.
But the making of a life.
That which gives you a reaction.
To some it is the wonder of Man’s Fingers.
To some it is the wonder of the Mind.
To some it is the wonder of Technique.
And to some it is how Real it is.
To some, how Transcendent it is.
|
global_05_local_4_shard_00000656_processed.jsonl/47628
|
Tuesday, June 26, 2007
No change
I guess after the U.S. posted an 8-0-1 mark over Mexico in the US since 2000 and a 2-1 Gold Cup final victory, some Mexican fans aren't convinced. Just got this in my SI mailbag.
"The only thing convincing about that win was that 2 is more than 1."
I think I called it a convincing victory for the U.S., which I think it was. And if you want to argue that the win wasn't convincing, perhaps you could also argue how the 8-0-1 isn't convincing either.
But not all fans think like that. I got an excellent response from a Mexican supporter who summed it up eloquently that I'll save for my SI mailbag for tomorrow night's column.
Anonymous said...
I think the crowd of Mexicans saying that the US isn't the better team is shrinking from years past. I've seen some Mexican articles stating that Mexican is no longer the Giant of CONCACAF, and I even read that Carlos Hermosillo stated the same thing. Admitting this isn't a bad thing in my eyes as I think Mexico will only improve if they realize their shortcomings.
I think it has more do than just head to head records this time around too. While the US didn't look good in a few games in this tournament. Mexico by far looked worse until the final. The fact that the US can handle CONCACAF teams easier than Mexico right now shows who the better team is. Mexico might have the better individual players, but as a unit the US is better right now hands down.
Anonymous said...
I really do agree with the above poster.
The 8-0-1 number is not as important to me as it is for others. That's just an arbitrary sportscenter factoid.
However, the quality in the last couple of US victories is important to me due in fact because Mexico played with their A squad and both teams went all out for wins.
Mexico is lacking quality finishers and you can't trot out 34 year olds like Borgetti and Blanco against the US and win. This much we know. Until they develop some quality finishers and a tighter, better back line the results will always be the same.
You can't give up two goals to the US every time you play them and at the same time you can't only score 1 goal against the US and expect that to hold up, given how the US attack has improved under Bradley.
Anonymous said...
Agreed that Mexico is slowly beginning to realize that maybe the yanquis can play. However, (I say this as an ardent US fan), Mexico had a far more difficult group stage to contend with in this edition of the Gold Cup than the US. So while it is clear we have Mexico's number when matches are played out of the Azteca, I'm not sure this tournament gave us sufficient evidence to conclude that Mexico has more difficulty with other CONCACAF foes. Switch groups and we might be commenting on how much difficulty the US had with Honduras and Panama.
ryan said...
Here's a look at the US's record v. Mexico from a statistical standpoint. If we assume the outcomes are independent (a reasonable enough assumption, given that no games were played on the same day or anything like that) then we can statistically test whether or not the two teams are equal.
If we throw out the tied matches (because they're uninformative about who's better), then the probability that one team beats another team 8 out of 8 times (this only includes the games in the US, but since games in the US outside of Columbus are essentially home games for Mexico it's rather reasonable), assuming the two teams are equally good, is 2*(.5^8) = .008. In other words, the same team winning eight out of eight games against an equally good opponent would only happen 8 out of 1000 times. From a statistical standpoint we can reject the hypothesis that the two teams are equal.
And of course, the idea that "the better team lost" eight out of eight games to an inferior team would happen even less than .008 of the time.
Nick said...
That is an excellent analysis. Is there any way to factor in the US's losses in Mexico during that time period? I believe we played there twice, once during each eliminatorias. So, obviously the sample size is not good, but i wonder if there would be a way to analyze the results objectively to factor in the games in Mexico...
ryan said...
One way to get at this is to use a binomial distribution. Basically, it can tell you what the probability is of getting something like 8 heads in a row, or, in this case, 8 heads out of 10 coin flips.
So, the probability that two teams are equal, and that one of them wins 8 or more out of 10 games is .0547 (and this can be multiplied by 2 as I did before to test both tails of the hypothesis that the teams are equal, but this is not really necessary, it would be reasonable to just test one direction - that the US is better than Mexico - since we already know the US has won more games). This means that if two equal teams played each other ten times, one team would win 8 or more of those games 55 out of 1000 times.
Of course what would be most fair is if all the games were held on neutral territory, or half were home games for one team the other half were away games. Games in the US at best are neutral, if not home games for Mexico. So, I believe it is fair to only consider games played in the US (but of course I am biased). There are more complicated analyses we could do to account for these things, but this should suffice.
Anonymous said...
Is this a soccer blog or third period stats?
Anonymous said...
You don't need to develop an algorithm or bust out with regression analysis to show that the US has been better than Mexico head to head since 2000.
|
global_05_local_4_shard_00000656_processed.jsonl/47634
|
The SILK Project: Semantic Inferencing on Large Knowledge
This is the project home page for the Semantic Inferencing on Large Knowledge (SILK) knowledge representation system.
SILK is sponsored by Vulcan Inc.
SILK is the newest part of Vulcan Inc.'s Project Halo, which includes also:
See also the Allen Institute for Artificial Intelligence.
SILK presentations:
SILK papers:
SILK demo videos:
SILK and the W3C Rule Interchange Format (RIF):
To receive occasional announcements about SILK, subscribe to the very low volume email list (archives).
We're supporting a limited number of users external to the project team in trying out the SILK software and/or reviewing the SILK language specification. Contact Benjamin Grosof if you're interested.
Mike Dean, 1 June 2013
|
global_05_local_4_shard_00000656_processed.jsonl/47653
|
Forgot your password?
The Internet
BellSouth Wants to Rig the Internet 559
Posted by CmdrTaco
from the you-gotta-hope-this-is-fake dept.
PlayfullyClever writes "A senior telecommunications executive at BellSouth, said yesterday that Internet service providers should be allowed to strike deals to give certain Web sites or services priority in reaching computer users, a controversial system that would significantly change how the Internet operates. Some say Small Firms Could Be Shut Out of Market Championed by BellSouth Officer. William L. Smith, chief technology officer for Atlanta-based BellSouth Corp., told reporters and analysts that an Internet service provider such as his firm should be able, for example, to charge Yahoo Inc. for the opportunity to have its search site load faster than that of Google Inc." Next up, well dressed men go door to door collecting their monthly "protection money". 'It sure would be tragic if your users started getting 1500ms ping times, wouldn't it mister dot com?'
BellSouth Wants to Rig the Internet
Comments Filter:
• They just never quit (Score:5, Interesting)
by SilverspurG (844751) * on Thursday December 01, 2005 @05:33PM (#14160956) Homepage Journal
"If I go to the airport, I can buy a coach standby ticket or a first-class ticket," Smith said. "In the shipping business, I can get two-day air or six-day ground."
Or when I go to the library the librarian can charge me an additional fee to use the encyclopedias. Or when he goes to Washington he have his lobbying group slip a few extra G-notes to the proper politicians to have his pet legislation prioritized. Or when enough websites have been scammed in then the next thing will be to start charging users,"Is your 3 megabit connection too slow when loading Slashdot? For an extra fee of $15/mo. we will allow you to prioritize any 5 domains!" It'll be just like returning to the good old days of minute by minute access charges. Always watching the clock wondering if the extra access charge might be worth it and counting the pennies left in the piggy bank to see if there's enough for your son to be able to afford class textbooks, lunch money, and decent network access. Maybe he'll just have to suffer with 20 minute load times for a 3 mb document.
Of all the low-down dirty extortionist ideas ever hatched. No one's stopping him from using QoS routing right now but what he's proposing is pure opportunistic greed. I suppose it doesn't matter to him--he makes enough money that he can afford to throw away an extra $200/mo. should policies like this ever become commonplace. As for the masses: Let them eat cake!
• This is merely proof of the Pointy Haired Syndrome: Suits by their nature are not technically competent to make decisions yet they are the ones in charge. This principle applies in every human endeavor. Don't worry, be happy and file a memo...
• by MightyMartian (840721) on Thursday December 01, 2005 @05:41PM (#14161060) Journal
It isn't an issue of competence, it's an issue of morals and ethics. If I were SEC, I'd be looking into investigating Bell South right about now.
• But the SEC.... (Score:4, Insightful)
by EmbeddedJanitor (597831) on Thursday December 01, 2005 @06:35PM (#14161633)
won't go sift through their country club buddy's garbage. What's the point of lobbying?
• by ClickOnThis (137803) on Thursday December 01, 2005 @07:18PM (#14161926) Journal
I'll resist the temptation to point out the difference between morals and ethics. (See the movie "Election" starring Matthew Broderick and Reese Witherspoon for an example.)
Anyway, the real point here is that the SEC really has nothing to do with policing the morals and ethics of a company. It is reponsible for protecting stock-market investors from unscrupulous companies who try to deceive the stockholders, or who try to manipulate the marketplace for the benefit of insider traders.
As far as the morality, ethics or (most relevant) the legality of the tarrifs that a communication company charges and their reasons for doing so, I think that falls within the bailiwick of the FCC.
• by Belseth (835595) on Thursday December 01, 2005 @07:35PM (#14162040)
I totally agree and I'd go a step further, I wonder if it breaches parts of the Richo Act. It definately reeks of mob extortion. It's sad that most big businesses reactions to something new is how can we corrupt it to make a buck. Another one got quietly passed that crippled organic food standards so big business can make money off this lucritive market. I remember when it first got big the top suppliers asked exactly how much pesticide can they use and still call it organic. Well the government finally gave them an answer. They didn't totally cut the heart out but they have left the term organic basically meaningless. Little things like antibiotics and artificial feed can be used on calves so long as they are fed organic before they are butchered. Why it's crime is people are paying a premium for organic foods. The true organic farmers won't be able to compete head to head with the ones cheating. A similar thing will happen here in that people won't realize that the smaller suppliers are being squeezed out. It's yet another sign the wild west days of the internet are coming to a close and it'll wind up eventually another corrupt tool of big business. Enough of the good will remain so most people won't complain but in 20 years the net as it's known today won't exist. It's already more about advertising and sales than content. Spam blew past regular e-mail a while ago and that doesn't include all the advertising. I always say if you want to kill spam and flashing pop up ads never buy what they are selling. If everyone does that the ads will fail and they will disappear. It's the 1% dumb enough to buy from them that keeps the rest of us in misery.
• by The Angry Mick (632931) on Thursday December 01, 2005 @07:43PM (#14162103) Homepage
It isn't an issue of competence
Perhaps, but then again I wish Bellsouth were more competent with their basic telephone service before they start mucking about with something as complex as this.
Let's not forget that the telcos haven't exactly been leading the charge on the technology fronts for quite some time. In fact, about the only time I hear of any "innovative" ideas from a telco, it usually involves a) discovering creative new ways to over-inflate a basic service bill, or b) screwing over customers that are early adopters of a technology the telcos happen to hate.
• by Pope (17780) on Thursday December 01, 2005 @05:40PM (#14161037)
That first class ticket doesn't reduce his time in the air though. He arrives the same time as the coach standby folks do.
Typical thought process for high-end executives who are used to bullying and paying through the nose to get what they want NOW.
• by einhverfr (238914) <chris.travers@gmai[ ]om ['l.c' in gap]> on Thursday December 01, 2005 @05:45PM (#14161100) Homepage Journal
No, but for an extra $500 we won't make you wait an extra half hour to deplane....
• by Taladar (717494) on Thursday December 01, 2005 @05:58PM (#14161281)
Yeah, we will take your money and throw you out of the plane half an hour before the landing.
• by timster (32400) on Thursday December 01, 2005 @06:11PM (#14161419)
That would be awesome.
"Attention please, this is your captain speaking. We're going to be delayed as there is heavy traffic at our destination airport and it will take another half hour for us to get permission to land. First class customers, please proceed to the skydiving hatch; you will be landing by parachute in 5 minutes. Please remember that you are allowed to use cell phones during the descent, but be careful not to drop them when your chute deploys. Thank you."
• by Chuckstar (799005) on Thursday December 01, 2005 @07:32PM (#14162015)
The difference is that I am BellSouth's customer, not Yahoo. This is the equivalent of HBO paying a cable company not to carry all of the Showtime channels, and then telling me its good for me because of all the HBO channels I get.
• by Burz (138833)
Or this is similar to giving large media corps an advantage over P2P (and other independant) traffic. Hollywood will probably love BellSouth for this.
Someone should spell it out:
If a server has paid for a certain upstream bandwidth, then end-user ISPs need to ferry that data as qu
• by ergo98 (9391) on Thursday December 01, 2005 @05:40PM (#14161047) Homepage Journal
The telcos have a long and storied history of making money hand over fist, with no competition, in the telephone subscriber realm, so this is just another desperate attempt at doing something before that money trough is removed (it's rapidly disappearing). In a free market it should be the case that subscribers can say "FU!" this this man, going with competitors, but unfortunately there isn't enough competition in most areas yet (so you get the casual collusion where they all mirror the same restrictive policies). Maybe WiMax will change the landscape a bit.
• by halltk1983 (855209) <[email protected]> on Thursday December 01, 2005 @05:42PM (#14161074) Homepage Journal
hmm... as a side thought... this would make Skype and VoIP useless... maybe that's how they're going to maintain their regional monopolies?
Hey, don't blame the whole industry for the actions of one dumbass PHB. I happen to have a lot of friends working for various telcos that are doubtless rolling their eyes at this bullshit.
Maybe WiMax will change the landscape a bit.
That's a nice thought -- but I'm afraid that at one point your WiMax is going to need an uplink to the internet :(
• by JaredOfEuropa (526365) on Thursday December 01, 2005 @06:33PM (#14161614) Journal
That's the real problem.
This story reminds me of a funny dispute between CNN and the Amsterdam cable TV company:
Cable co. "We will start charging you for providing access to your viewers"
- CNN: "Well, actually you should really pay us, for providing content for your cable network"
Cable co: "Pay or we will remove CNN from our lineup"
- CNN: "Fine, we'll take our content elsewhere"
The cable TV model worked quite well: customers pay the cable company for physical access to various stations. These stations provide content for free, supported by ads, or at an extra charge to the customers. In this case, some idiot exec got greedy and tried to charge both sides of the network. Fortunately, neither side wasn't having any of that. CNN didn't play ball, and customers didn't exactly relish the idea of paying twice for content, and threatened to buy satellite dishes and ditch cable. After a few weeks, CNN was put back onto the network, for free.
This case is much the same. Over here, we have a choice of backbone networks and ISPs re-selling access to those backbones. Any ISP trying to pull a stunt like this will see their customers melt away. After all, people have gotten used to the idea of flat rate Internet access, in facr that's what ISPs used to lure people over to ADSL.
However, in cases were there is a monopoly of one or a few companies working together, they can and will get away with it.
• Of all the low-down dirty extortionist ideas ever hatched.
I bet he'd stop thinking it was such a great idea the minute he realizes that it would also allow Verizon/Quest/other LECs to "prioritize" his marketing calls to Google and Yahoo into oblivion. Hey, it's not their fault that BellSouth didn't ante up for the "prioritized" voice package.
Hell, I'm the biggest defender of the traditional POTS/Baby Bells companies around these parts -- and I think this is complete bullshit!
• Couldn't agree more.
And this is the problem with using analogies. You can chose which comparisons to make that make your point look good. I don't like it when people start using analogies, I don't see how one situation or circumstance can be used to explain a completely different situation or circumstance. Does anyone else feel me?
It's like when....
Just kidding
• by cayenne8 (626475) on Thursday December 01, 2005 @05:36PM (#14160984) Homepage Journal
Would this not take away their status and the protections of common carrier status if they start playing with what/who goes through their system?
• by Anonymous Coward
Oh no! Didn't you read, he made sure to try and sidestep that, he doesn't believe in blocking freedom of speech on the internet (read he doesn't want to be liable when your system gets fucked), he only believes in having control over exactly what he wants you to see first.
I alwasy thought the people who believed that "upper class, secret society" shit were crazy, but this about seals the deal. Basically they want to eliminate freedom of speech with just a different label. That favorite blog of yours? Oh,
• They'll just buy a new law that says whatever they want (e.g. we can block, prioritize, de-prioritize, spindle, fold, or mutilate your traffic, but we aren't liable for anything).
• They should be sued if they ever mention being an "ISP" after pulling this one. TCP/IP doesn't mention different quality of service options based on sponsorship, after all...
Quick, someone patent the "lovely bit". Just like the evil bit but reserved for sponsored traffic. :)
• by everphilski (877346) on Thursday December 01, 2005 @05:36PM (#14160989) Journal
At least you could have removed all the caps in the sentance "Some say Small Firms Could Be Shut Out of Market Championed by BellSouth Officer" and fooled me... sheesh...
• by Anonymous Coward
the European Court of Justice would not allow such an arrangement, article 81 is very harsh on vertical arrangements like this.
• by Poromenos1 (830658) on Thursday December 01, 2005 @05:37PM (#14160994) Homepage
While we're at it, why don't we just sell the internet to Microsoft or some other big corporation and be done with it?
• by hazmat2k (911198) on Thursday December 01, 2005 @05:37PM (#14160999)
I can imagine the new generation of Spam now. "M4K3 YUR S1T3 L04D F4S73R TH4N T3H C0MP371710N"
• by Profane MuthaFucka (574406) <[email protected]> on Thursday December 01, 2005 @05:38PM (#14161010) Homepage Journal
Bell South is damaged. Adjust your routing tables accordingly.
• Sure, no problem (Score:3, Interesting)
by Billosaur (927319) * <wgrother@HORSEop ... minus herbivore> on Thursday December 01, 2005 @05:39PM (#14161023) Journal
As long as ISPs get penalized for every piece of SPAM they allow to float around, for every SPAMmer they allow to operate unhindered using their services, for every shady business or phishing site they allow to run unabated, and when Satan can skate on his swimming pool.
• Ip traffic control (Score:5, Informative)
by coastwalker (307620) <[email protected]> on Thursday December 01, 2005 @05:57PM (#14161271) Homepage
On the other hand I recently heard an argument here in the UK that said that one of the arguments against forcing ISPs to cache all email traffic for later inspection by law enforcement in the "war on terror" is that the volume of spam makes it uneconomic (and the bad guys are using untraceable untappable voip anyway).
It appears that the Internet remains a magnicifently untameable beast still, despite pointy headed attempts like this to control it.
• Except.. (Score:5, Insightful)
by LWATCDR (28044) on Thursday December 01, 2005 @05:39PM (#14161026) Homepage Journal
I pay the isp to access the net. I should get to pick and choose what I access without the ISP boasting some at the expense of others.
Dear Bell south you are looking a lot like Sony and SCO. Not a good thing.
• I quickly become a non Bellsouth Customer. Granted right now, I'm using a BS reseller, as are most here in Mobile... but there ARE alternatives, especially when you're not using DSL.
• by Red Flayer (890720) on Thursday December 01, 2005 @05:39PM (#14161033) Journal
FTS: "Internet service providers should be allowed to strike deals to give certain Web sites or services priority in reaching computer users, "
As soon as they do this, then they should become legally responsible for all content that crosses their network.
Either ISPs are passive conduits, or they are not. If they can easily differentiate between packets from different sources, and filter those packets for different handling procedures, then they can take responsibility for not allowing 'illegal' packets on their network.
• how great would that be for hosting companies like rackspace. I doubt this would go through... I mean seriously, that proposal would cripple what 80% of the sites out there. This is a perfect example when non-technical people get in positions that require a strong understanding of technology. I'm sure the guy is a good businessman, but hasn't got a clue about technology.
On another note, historically, every time one of the bell's gets too big for their britches they get broken up... If any of you hold th
• If an ISP or backbone wants to give up all of its common-carrier rights, including immunity when some l33t haxxor plants death threats to the President or worse on Yahoo, then maybe.
Otherwise, no.
• by rocjoe71 (545053) on Thursday December 01, 2005 @05:40PM (#14161038) Homepage
...BellSouth could try, but then Google lights up all their dark fiber and take themselves OUT of BellSouth's market altogether, leaving BellSouth to explain to their customers why they should keep paying for a service that doesn't give them easy access to the most popular search engine on the net.
This would give Yahoo the leverage to say to BellSouth: if you want to have ANY major search engine/portal in your network, better provide unrestricted access to our domain.
Net result: Google owns their own 'Net, Yahoo pwns BellSouth.
• by Sycraft-fu (314770) on Thursday December 01, 2005 @05:49PM (#14161153)
Won't even have to be Google, just their competitors. If some companies start deliberatly breaking their Internet service, you'll see others that will advertise that they don't. The cable company that competes in Bell South's territory will start up with ads like "Our cable modem service is fully optimized so that all sites load at blazing speed. With DSL, non-priority sites can load very slowly, or not at all, but with our service ALL sites are a priority!"
I mean all the time our cable company and phone company take shots at each other in their TV ads. If a provider is dumb enough to do this, the rest will just eat them alive.
• Actually, it's like this:
Bellsouth does this, and Cox Communications and Time Warner Cable, and all the other cable providers use their bully pulpit control of the tv to rake BellSouth over the coals, while at the same time promoting their cable/internet/voip bundles.
This is one of those places where Bellsouth CANNOT afford to be seen as inferior to the cable providers. I use Bellsouth myself (cheap static IP), but I've got zero customer loyalty, and if Bellsouth does anything APPROACHING this I'll drop the
• by Jotii (932365) on Thursday December 01, 2005 @05:40PM (#14161042) Homepage
This Internet will never work. I'm going to start my own.
• BS already charges for different levels of ISP service. So now they want to charge a fee for the other end. They will use this to finger point the problem to the other end every time. :-)
• And charging for different levels of ISP service is fine. The CEO makes a good analogy about the shipping and the plane rides, except he doesn't get it quite right. What they are currently doing is analagous to the shipping and first class seats. What he is proposing is not. If I as the consumer want a faster connection to the web, then I will pay for it. But companies should not be allowed to pay more to keep their competitors from providing something to me just as quickly. I.E. Fedex should not be a
• It could work out for the ISP if there is no other ISP choice for the customers to get equivelent internet access from. Sadly, in many areas of the US, only one high speed provider exists and you are stuck with them no matter what. Given a choice? I don't think people would use an ISP that offered that type of "service".
• by ArcRiley (737114) <[email protected]> on Thursday December 01, 2005 @05:41PM (#14161064)
ISPs who do this sort of thing will, undoubtedly, be replaced by ISPs which don't. Consumers simply won't tolerate it, nor will web services.
The only real danger is the growing monopolization of Internet access, through cable and DSL, but yet we watch as wifi-based Internet access spreads and their market crumbles beneith their feet.
More fuel on the fire, BellSouth, it'll only help speed your own destruction.
• The one problem is that if I start my own DSL ISP, I have to use the BellSouth backbone. I may not be choosing to give priority to packets, but how do I know that BellSouth hasn't already done it across their entire system?
• I'd be ok with this, as long as I had the choice not to use an ISP that pulled this kind of baloney. The problem is that often consumers don't have any choice in who can provide their broadband.
For a long time I completely loathed cable companies, because the only choice consumers had was to have cable or not to have TV at all. This enabled cable companies to treat their customers like trash and laugh at the consumers. The advent of satellite TV dramatically changed how cable companies treat their cust
• Out of curiosity, if these asshats were to actually have their wet dream come true...what sort of recourse would us regular users have? How far would these changes reach? Would it just screw over whoever was stuck with that particular ISP, or would it affect the entire net?
More importantly, are there any laws or government bodies that we can bring into effect on our side to make sure this kind of crap never happens?
• Too many factors (Score:3, Interesting)
by ziggyboy (232080) on Thursday December 01, 2005 @05:45PM (#14161097)
I assume they would want to use some form of QoS to control traffic. However there would be a few problems that would arise from this. Let's say for instance Yahoo uses a seperate backbone from Google. Would this ISP then force Google traffic to slowdown? Or how about if Yahoo has more hops than Google? There are so many factors that affect Internet traffic that for an ISP to fully control them would be quite difficult. On most high-bandwidth ISPs where links hardly get clogged, one would certainly have to force low priority sites to slowdown.
• We can't get the powers that be to adopt IPv6 and this guy thinks he's going to be able to change routing protocols and charge for priority routes?
• This is not a troll or flame, I just want to be educated here. Okay, I'll be upfront about it, its a crappy decision to do. It will piss off a lot of people. Fundamentally though whats the problem with letting these ISP's do this? You are paying for their service, they got the right to do whatever they want. If they want to piss off their customers, thats their right. Just let me know upfront that is whats going on, and I'll pick someone who isn't doing this. Its no different than ISP's disconnecting
• Okay, my gut reaction was, OMGWTFITMT?!?!?
Then I put a bit more thought in on it. I would be okay with this if it was constantly monitored and I could be absolutely sure that none of the "non-accelerated" site's performance was degraded. Hypothetical: if we get ~100ms pings from both Google and Yahoo now, then Yahoo buys the 'optimization' and Yahoo's ping drops to ~80ms and Google's stays at ~100ms, then I'm fine with this. But if Google's pings start suffering, to say ~110ms, then they are degrading their
• by jmorris42 (1458) * <jmorris@[ ]u.org ['bea' in gap]> on Thursday December 01, 2005 @05:48PM (#14161134)
Listen up BellSouth, I AM YOUR CUSTOMER, not Yahoo! or Google. If you can't give me good access to the sites I am interested in visiting then I switch to Cox's cable modem. And if they can't show me the speed I crave then I look for other options.
This is exactly what happens when governments grant monopolies. BellSouth has been taking their customers for granted since they spun away from the AT&T motnership, which also took us for granted. After all, where can we really go? Like most regions of the US with broadband, we have government monopoly A (BellSouth) or government monopoly B (Cox) and while they can be played off one another just a little, they co-own the Louisiana Public Service Commission that makes the rules and aren't above conspiring together to keep their cost down and the users downtrodden.
The baby bells must be broken again. They can keep the monpoly on the copper or fiber but must NOT be permitted to own or operate any of the higher level protocols or have any business entanglements with anyone who does. I'm serious, we need a seperate company that JUST owns and maintains the physical plant and leases space on a totally non-discrimnatory basis in the CO to as many companies that want to install voice switches, DSLAMS, etc. as can fit into the building.... and have rules so a carrier can even pay to make the building bigger.
• Monopolosaurus Rex (Score:5, Insightful)
by Doc Ruby (173196) on Thursday December 01, 2005 @05:48PM (#14161138) Homepage Journal
Everyone said for decades that phone companies "don't understand the Internet". They understand it all right - they just don't like it. So now we've got SBC saying they want to charge companies like Google to route their traffic, even if Google is already paying another company to which Google is directly connected. And BellSouth is saying they want to charge companies like Google more to carry their traffic according to the specifications. Verizon (rhymes with "NYNEX"), typically the most evil of the RBOCs, has yet to announce their vicious attack on Google's profits, but it surely will be greedy and based on some kind of preferential treatment - or threat of witholding it.
It's obvious that these telcos are jealous of Google and the big bucks connected with it. They want their cut, not by competing to provide better products, but by threatening to make their products worse unless their extortion money is paid. Back in the 1990s, they tried to force extra fees on dialup customers, on ISPs, based on lies about phone switch capacity. They tried selling ISDN from clueless salespeople for ripoff prices after unpredictable and interminable installation delays. Then they screwed up DSL deployment on a bigger scale. All along they succeeded in buying up and regulating out the competition, while everyone said they didn't understand the Internet. Which diverted investment to companies like Google, as well as the smart entrepreneurs. Now that they've consolidated American bandwidth into the bottlenecks that they monopolize, these old dinosaurs are moving in for the kill. If there's not enough competition to let Google and mom/pop choose an equitable Internet like the one we've built these last 10-20 years, we need to snap the neck of their new monopolies with legislation. There's no reason we have to let their loophole victories over past monopoly remedies and market corrections choke off the developments that have happened despite their vile presence in the landscape.
• ...to charge Yahoo Inc. for the opportunity to have its search site load faster than that of Google Inc."
So you if you want to know where the first google wireless [slashdot.org] service areas will be, you just have to find high concentrations of Bell-South customers.
• This guy seems to have his notion of the customer backwards. Google isn't a BellSouth customer. BellSouth's customers are the users who buy their DSL lines. Duh. Anyway, the really big picture is this: Google could take over BellSouth with the spare change in their couch. Does anyone who pays attention to the stock market think that Google would have a hard time raising 50 billion dollars if they wanted it? I don't.
• Fifty-fifty (Score:5, Funny)
by trollable (928694) on Thursday December 01, 2005 @05:51PM (#14161174) Homepage
I think they should do it. Cut the bandwidth. 50% for the web, 50% for gopher.
• by DaveJay (133437)
So they can charge the users, or charge the corps.
Say they charge the users...you have to tell them at some point in order to charge them (probably after they sign a contract) and you'll have angry users and lawsuits and nonsense -- or people will just sign up with other ISPs who advertise unlimited full speed access to all sites.
So that's a non-starter.
Say they charge the corporations...the users don't have to know, so the corporations with the big bucks may very well pony up the cash, because they'll suff
• And Americans don't understand why the rest of the world doesn't want the USA to be running Internet.
• by netrangerrr (455862) on Thursday December 01, 2005 @05:57PM (#14161263) Homepage
Vint Cerf (Father of the Internet) sent a deposition to the US Congress on this legislation. See:
http://www.circleid.com/posts/vint_cerf_speaking_o ut_on_internet_neutrality/ [circleid.com]
Vint couldn't attend in person since he was recieving the Presidential Medal of Freedom that day for his DARPANET/Internet pioneering efforts.
This link was widely disseminated in the North American IPv6 Task Force and IPv6 Forum where I believe most members strongly support Vint's views.
• by mgpeter (132079) on Thursday December 01, 2005 @06:06PM (#14161371) Homepage
In the real world, if you create a good product or provide good information, you have the opportunity to make lots of money.
If the Internet was similar to the real world, all Internet Providers would be paying content producers money for the information the Internet Provider's customers use.
Unfortuately, with the Internet - it is opposite. Say you have a really good site and you gather quite a bit of traffic, unfortunately you pay your Internet provider by the megabytes of traffic your visitors use. A good slashdotting could bankrupt you - all because your providing good information.
If you want to listen to an excellent interview of how the Internet came to be how it is today, Nerd TV's interview with Brester Kahle (Internet Archive Founder) is definately worth a listen.
http://www.pbs.org/cringely/nerdtv/player/?show=00 4&ext=mp3 [pbs.org]
• by Logic Bomb (122875) on Thursday December 01, 2005 @06:15PM (#14161446)
If a major ISP ever did this, I don't think it would take long for popular sites to start filtering for their IP space and redirecting to an informative page about the lousy ISP.
Thanks for attempting to visit our site! BellSouth, your internet service provider, is attempting to extort money from web sites like this one in exchange for not slowing down your access to it. Consequently, we have blocked access to our site from BellSouth's network. If you want BellSouth to play fair, call...
Picturing the bedlam in the call center is making me smile.
• Naturally (Score:4, Interesting)
by max born (739948) on Thursday December 01, 2005 @06:20PM (#14161505)
Docs Searls of Linux Journal wrote an interesting piece a few weeks called Flushing the Net Down the Tube [slashdot.org] where he talks about this happening.
The providers don't want to be just the guys that rent the pipes because there's not enough money in it. They'd like to be able to control content and charge for extra services. Sprint's music downloads [technologynews.info] is an example where this is already happening. (You can get highspeed music downlads but only through their vendor lock-in service.)
According to Searls' article the providers have watched companies like ebay and google make fortunes on the Internet using their pipes. They feel left out and want to get in on the action. Expect more of this.
• by Dr_Ish (639005) on Thursday December 01, 2005 @06:24PM (#14161533) Homepage
Bellsouth already have some rather 'dubious' business practices. For instance, the City in which I live has proposed that our local (City owned) utility company will provide fiber in the home to all our residents. Bellsouth have been raising every type of spurious legal claim possible to try and block this measure, even though it was widely supported in a referendum (forced by Bellsouth!). Currently, Bellsouth provides DSL service in this area and Cox provides cable. It is a basic duopoly. Needless to say, the rates are much higher than elsewhere. Earthlink does provide cheaper service. However, one can only use Earthlink if one has local telephone service from...you guessed it,...Bellsouth. My phone service is provided by AT and T. They cannot provide DSL service, because it is blocked by...you guessed it, Bellsouth. I complained about this situation to the FCC. However, the day after I lodged my complaint, the FCC made a ruling saying it was just fine for Bellsouth to behave this way. So, these new 'ideas' from Bellsouth appear to be part of their on-going plans to hold on to their near monopoly situation. I think that it stinks. I cannot wait for the city fiber to arrive at my house.
• by Spazmania (174582) on Thursday December 01, 2005 @06:27PM (#14161569) Homepage
A traffic prioitization service already exists. It's Akamai's whole business model: They buy pipes to strategic locations with many service providers, cache servers near the customer and route requests to the best-choice server. You buy space on their servers and your data gets to the customer faster.
What Mr Smith wants to do is, well, asinine. He wants to allow the data pipes on his network to fill to 100% and then prioritize the traffic based on who pays. This suggests such a flawed understanding of the technology that as the chief technology officer, he should be fired.
See, here's the problem: For a router to make a priority-based switching decision between packets, it has to have more than one packet cached in memory waiting for free space in the outgoing pipe. But, if you havn't started transmitting the first packet by the time the second packet finishes arriving then you've already lost the speed game. Fast service means that you don't hold on to the packets. You send them out the next link as soon as you get them. Any other architecture would result in transmission speeds that are two to three times slower, even for the highest priority packets! Duh!
So if you don't want your network to suck rocks, you still have to keep the utilization below 80%, and if you keep the utilization down then except for rare bursts of traffic the prioritization function will never be used.
As a search engine, why on earth would I buy priority on your network knowing that either A) it almost never gets used or B) your network is piss slow either way? Answer: I wouldn't.
Fire Mr. Smith. He doesn't understand the technology he's charged with overseeing.
• I'm all for it. (Score:5, Insightful)
by AK Marc (707885) on Thursday December 01, 2005 @06:30PM (#14161594)
This sounds like a great idea. The moment they start looking at every packet that crosses their network, they will be responsible for every illegal activity. Every person that is on their network that gets a virus should sue them. Every piece of kiddie porn should warrant a case against them. If they are stupid enough to give up their Common Carrier status for a few bucks, they should be sued out of existance so that someone can come in that actually serves the customers, rather than screws them.
• by Somegeek (624100) on Thursday December 01, 2005 @06:34PM (#14161628)
I'm sure the Bells have been paid back many times over for their investments in building out the infrastructure, and for which they were given monopolies. Lets organize a law to create state agencies that get to take over and maintain the phone and cable lines and poles and conduits for a monthly utility fee, just like happens with highways or other city run utilities. If companies want to run their own fibre after that, great, let them.
It would need to be clear that this is a critical national infrastructure and was critical that it be maintained and upgraded. There would be grants from an appropriate Federal agency to assist with this, much like they assist with highway and other projects today.
This would even the playing field between providers of all types and remove all of the conflicts of interest. Heck, while we are at it, lets take back the power lines too, let the government be responsible for distribution of power and let power companies actually compete on supply and service.
• by jayhawk88 (160512) <[email protected]> on Thursday December 01, 2005 @06:44PM (#14161709)
...I wonder why he doesn't try it on his phone systems first?
"Hello, Coca-Cola? Yeah, listen, I just wanted you to know that we just cut a new deal with Pepsi, that gives their phone calls priority on our systems. Yeah, it's an exclusive deal and all. Basically my engineers tell me that any call of yours routed through our systems will receive a 10% degredation in signal quality and experience approximately a 3 second delay in connection. I'm sure you understand, just the cost of doing business and all. If you're interested, perhaps I can tell you about our new Super Platinum plan, which would give your calls Level 2 High Priority, ensuring that....hello?"
• Let 'em (Score:3, Insightful)
by scronline (829910) on Thursday December 01, 2005 @07:06PM (#14161851) Homepage
Then all the Small ISPs that don't do that crap will start taking their customers away because they're tired of paying the same price for slower and unreliable service....oh wait, they're doing that now. Guess that's why I've gown 15% in the past 6 months.
• by TallMatthew (919136) on Thursday December 01, 2005 @08:00PM (#14162203)
Introducing latency is easy to do with an OpenBSD box but core routers don't have sufficient buffers to hold traffic for more than a few dozen milliseconds, if that. Unless they plan to drop packets which is entirely evil. If they do plan to deploy a latency-introducing device across their network, I assume they'll have to do it at the edge, which for a network that size won't be cheap.
Jerks. Pure corporate jealousy.
• by swschrad (312009) on Thursday December 01, 2005 @09:20PM (#14162588) Homepage Journal
and mr. Bell South Bigwig should have a little visit from one of Washington's finest.
particularly if his little plan interferes with DHS/FBI/m-o-u-s-e plans to get in line first and look over everything else that moves by. that little project never seems to go away, and always seems to have priority over what the moneygrubbers want to do....
Uncompensated overtime? Just Say No.
|
global_05_local_4_shard_00000656_processed.jsonl/47658
|
GNU Smalltalk - tutorial en GTK Tutorial <p>Hi,</p> <p>Thanks to Nicolas Petton ;)<br /> The GTK Tutorial is now hosted : <a href="" title="" rel="nofollow"></a></p> <p>Gwen</p> gst gtk tutorial Wed, 10 Mar 2010 06:56:52 -0700 Gwenael Casaccio 485 at All you should really know about Autoconf and Automake <p>So, here is the shortest possible tutorial on the autotools.</p> <p>The problem with autotools is that it is used for complicated things, and people cut-and-paste complicated things even when they ought to be simple. 99% of people just need a way to access .pc files and generate juicy Makefiles; the portability part is taken care by glib, sdl and so on.</p> <p>You can use then the following basic autotools setup, which is just 9 lines. You can start from here and add more stuff (including libtool).</p> <ul> <li></li> </ul> <p><pre>AC_INIT([package], [version]) AM_INIT_AUTOMAKE([foreign subdir-objects]) AC_CONFIG_SRCDIR([]) AC_CONFIG_HEADERS([config.h]) # not even really needed AC_PROG_CC # or AC_PROG_CXX AC_CONFIG_FILES([Makefile]) AC_OUTPUT</pre></p> <ul> <li></li> </ul> <p><pre>bin_PROGRAMS = hello hello_SOURCES = hello.c</pre></p> <p>That's enough for:</p> <p><pre>$ autoreconf -fvi $ ./configure $ make</pre></p> <p>On top of this, for each package you need, you add:</p> <p><pre>PKG_CHECK_MODULES([cairo], [cairo]) PKG_CHECK_MODULES([fontconfig], [fontconfig])</pre></p> <p>and</p> <p><pre>AM_CFLAGS = $(cairo_CFLAGS) $(fontconfig_CFLAGS) LIBS += $(cairo_LIBS) $(fontconfig_LIBS)</pre></p> <p>respectively in (after AC_PROG_CC) and</p> <p>Is that complicated?</p> autoconf automake tutorial Mon, 02 Nov 2009 10:33:56 -0700 Paolo Bonzini 426 at A walk at the shore <p>After playing around with seaside a bit, I want you to point you to another short seaside tutorial <strong>"HOWTO: Build a simple Seaside website in 30 minutes"</strong> under <a href="" rel="nofollow"></a>.</p> <p>I find it an interesting short tutorial for seaside besides the one on: <a href="" rel="nofollow"></a> which is also available as a book.</p> <p>About the first one, I don't want to explain here something, because the explanations on the mentioned WEB-Site are enough (I think).</p> <p>One thing I could do, to provide the source-code in a form, that you can use directly with gst.</p> <p>So again:</p> <p>Happy coding!<br /> <em>Joachim</em></p> <p><pre> Seaside.WAComponent subclass: WhateverHey [ renderContentOn: html [ html paragraph: 'Hi, this is my website. It only tokk....' ] ] Seaside.WAComponent subclass: WhateverWhat [ renderContentOn: html [ html paragraph: 'This website has no useful content...'. html paragraph: 'I just neede to type some nonsense to see it working' ] ] Seaside.WAComponent subclass: WhateverSeaside [ renderContentOn: html [ html paragraph: 'Thsi framwork is very nice because: '. html orderedList with: [html listItem: 'It is fast'; listItem: 'It is easy'; listItem: 'It is Smalltalk'] ] ] Seaside.WAComponent subclass: WhateverRoot [ | aCoupleOfTabs selectedTab | WhateverRoot class >> canBeRoot [ ^true ] WhateverRoot class >> description [ ^'A website about whatever' ] title [ ^'Whatever Website' ] updateRoot: aHtmlRoot [ super updateRoot: aHtmlRoot. aHtmlRoot title: self title ] states [ ^Array with: self ] initialize [ super initialize. aCoupleOfTabs := OrderedCollection new add: 'Welcome' -> (Array with: 'Hey this is my website' -> WhateverHey new with: 'What is still all about' -> WhateverWhat new); add: 'Nice Frameworks' -> (Array with: 'Seaside' -> WhateverSeaside new); yourself. selectedTab := aCoupleOfTabs first value ] renderContentOn: html [ self renderHeaderOn: html. html div id: 'tabs'; with: [self renderTabsOn: html]. self renderChildrenOn: html ] renderHeaderOn: html [ html div id: 'header'; with: [html heading: self title] ] renderTabsOn: html [ html unorderedList id: 'tabs'; with: [ aCoupleOfTabs do: [ :each | html listItem: [ html anchor class: (selectedTab = each value ifTrue: ['active']); callback: [selectedTab := each value]; with: each key ]]] ] renderChildrenOn: html [ html div id: 'content'; with: [ selectedTab do: [ :each | html heading: each key. html paragraph; render: each value. html paragraph ]] ] style [ ^ ' body{ background-color: #aeeeee; } #header{ width: 100%; height: 40px; padding-left: 5px; background-color: #d7eeee; } #content{ font-family: arial; text-align: justify; margin-left: 5px; margin-right: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px; padding-bottom: 5px; background-color: #f7eeee; } #tabs{ display: inline; } #tabs li a{ text-align: center; width: 100%; height: 25px; color: #000; background-color: #d7eeee; margin: 0.5em; padding: 0.5em; font-size: 12px; text-decoration: none; } #tabs li a:hover{ font-weight: bold; } ' ] ] WhateverRoot registerAsApplication: 'Whatever' </pre></p> gnu seaside smalltalk tutorial Sun, 14 Jun 2009 14:22:58 -0700 Joachim Jaeckel 318 at Seaside development with GNU Smalltalk <p>The next release of GNU Smalltalk will include support for Seaside. This blog post is a short tutorial, which will show how to make your first Seaside component.</p> <p>To follow this tutorial you need GNU Smalltalk 3.0a (which will be available from <a href="" title="" rel="nofollow"></a> later today) or a later version.</p> <p>One of the new features in 3.0a and later is the ability to run an image in the background and control it from the shell. For example, you can try these commands:</p> <p><pre>$ gst-remote --daemon $ gst-remote --eval '100 factorial' $ gst-remote --kill</pre></p> <p>where you can even run the first command in one machine and the other two commands in another terminal of the same machine. <code>gst-remote</code> can even control a VM on a separate machine, though for security reasons you should make sure that it is not accessible from outside (either block it or at least put the machine in your DMZ!).</p> <p>In order to run your web apps, you can first load the Seaside packages and build a <a href="/faq/37" rel="nofollow">new image</a> with them:</p> <p><pre>$ gst st> PackageLoader fileInPackage: 'Seaside' st> PackageLoader fileInPackage: 'Seaside-Development' st> PackageLoader fileInPackage: 'Seaside-Examples' st> ObjectMemory snapshot: ''</pre></p> <p>Then, this command will start Seaside on port 8080:</p> <p><pre>$ gst-remote -I --server --start=Seaside</pre></p> <p>You can then point your browser to <a href="http://localhost:8080/seaside/" title="http://localhost:8080/seaside/" rel="nofollow">http://localhost:8080/seaside/</a> and play with the configuration editor and with the Seaside examples and tests.</p> <p>In order to create your first component, place this in a <em></em> file:</p> <p><pre>Seaside.WAComponent subclass: MyCounter [ | count | MyCounter class >> canBeRoot [ ^true ] initialize [ super initialize. count := 0. ] states [ ^{ self } ] renderContentOn: html [ html heading: count. html anchor callback: [ count := count + 1 ]; with: '++'. html space. html anchor callback: [ count := count - 1 ]; with: '--'. ] ] MyCounter registerAsApplication: 'mycounter'</pre></p> <p>Then, file it in:</p> <p><pre>$ gst-remote --file</pre></p> <p>and start your browser again. You will see a new Application at <a href="http://localhost:8080/seaside/mycounter" rel="nofollow">http://localhost:8080/seaside/mycounter</a>—congratulations, this is your firrst Seaside component for GNU Smalltalk!</p> <p>(Please put your favorite Seaside tutorial in comments)</p> example rails remote seaside tutorial web Fri, 07 Mar 2008 03:43:50 -0700 Paolo Bonzini 182 at Using git without feeling stupid (part 2) <p>In the <a href="" rel="nofollow">first installment</a>, I showed how basic usage of git does <em>not</em> need any concept that is unique to a particular version control system. In this installment, I'll introduce more usage of git that requires learning a concept or two.</p> <p>First, I mentioned in the first installment that, even in the simplest single-developer usage of git, the <em>diff</em> subcommand can be useful to examine differences between revisions. To do this, however, you need to know git names revisions. They are named with a long string of 40 hexadecimal digits; there is no autoincrementing number as you have in arch or subversion. The hexadecimal string is a unique number that describes the content of a particular revision and all the history that led to that particular revision. You can get the name from <em>git log</em></p> <p><pre>commit 10390f9021e7bee3845e7f69a3f378cd3d319b0f Author: Paolo Bonzini Date: Tue Jan 29 11:31:23 2008 +0100 minor changes</pre></p> <p>git allows you to use any unique prefix of the string to identify a particular revision; usually one uses six to eight hex digits. So, <em>git diff 10390f</em> will give you the difference between the tree <em>right after</em> that commit and the current working tree.</p> <p>There are several other ways to name commits. I'll mention three. <em>HEAD</em> is the commit to which you are making modifications in the working tree. <em>10390f^</em> is the commit before 10390f, so that you can say <em>git diff 10390f{^,}</em> to examine the differences introduced by one particular commit. Finally, <em>master</em> is the top of the trunk (it is actually a branch name).</p> <p>With this in hand, I can introduce a new command before going on to the biggest topic of the day. The command is <em>git checkout</em> and, like <em>cvs update -r</em>, it allows you to go back in time and put a stored revision in the working tree. For example, <em>git checkout 10390f^</em> will extract the revision just before <em>10390f</em>, and <em>git checkout master</em> will go back to the top of the trunk.</p> <hr /> <p>The topic of the day is a particular concept in git, the <em>index</em>. However, I'll try to introduce it concretely, based on actual use cases. One, as I mentioned, is conflicts. The other is a clarification of two things I told you in the first installment I told you two things, asking you to believe me for a while:<br /> <ul> <li> <em>git add</em> won't fail if the file is already under version control</li> <li> <em>git commit</em> will only add and remove files that you marked with <em>git add</em> or <em>git rm</em></li> </ul> </p> <p>These were both imprecise, and both imprecisions have to do with the index. Frankly, the name is really badly chosen; it would be better to call it a <em>staging area</em>, for example.</p> <p>What <em>git add</em> does is to move the <em>current</em> version of the named file to a special staging area, holding files that are ready to be committed. And what <em>git commit</em> (without other arguments) will do is to take the index and make a new revision out of what the index contains. <em>git commit -a</em> is just a convenience which adds all modified files to the index, and then commits the result.</p> <p>How does this affect you? The first thing to remember is this one: <em>only run </em>git add<em> on new files just before committing</em>. Otherwise, you'll commit the wrong contents of the file. Case in point:</p> <p><pre>$ git init ... create hello.c ... $ cat hello.c int main () { printf ("hello world\n"); } $ git add hello.c $ gcc –o hello hello.c hello.c: In function ’main’: hello.c:3: warning: incompatible implicit declaration of built-in function ’printf’</pre></p> <p>Grrr. Warnings.</p> <p><pre> ... fix warning ... $ git commit</pre></p> <p>Surprise: the committed version will still have the warning! That's because <em>git add</em> did something more than preparing to add <em>hello.c</em> to version control. It also snapshotted its contents and placed them into the index.</p> <p>No. As naughty as this might seem to be, there's no way around it. The only way around it is to start using the index more. For example, when you have to commit only some of the changes in the working tree, or when you are adding new files to the tree, you could <em>not</em> use the command line tools. Instead, fire <em>git citool</em> which is a graphical user interface to examine changes, stage them, and finally commit them. It is powerful, easy to use, and will provide a gentle introduction to the concept of a staging area. It also will catch mistakes such as the above one.</p> <p>Now, what does the index have to do with conflicts? The answer is simple. <em>If a merge has conflicts, git takes care of adding unconflicted files in the index, and leaves conflicted files out of the index.</em> Read it again. Slowly. Once more. Then, go ahead.</p> <p>Also, <em>git diff</em>, without any arguments, <em>does not show changes that are staged in the index. In fact it diffs the working tree against the index, not against the repository</em>. Read it again. Slowly. Once more. Then, go ahead.</p> <p>Yes, now you can scream. What? Why do I have to go through all these mental contortions? But, think more about it. In most cases, you don't care about unconflicted files. Let's say you merge a huge patch and you have a couple of stupid conflicts in the makefile. Why should <em>git diff</em> spew the huge patch at you? You just want to see the problematic changes, i.e. the makefile. I hope the two above statements are now connected and (almost) make sense to you.</p> <p>So, you just have to learn a couple of tricks of the trade. Here is how you go solving conflicts after <em>git pull --rebase</em> has failed:<br /> <ul> <li> <em>git diff</em> will show you changes in the conflicted files;</li> <li> since <em>git add</em> will stop showing a file in <em>git diff</em> (until you change it again), you can use it to mark a file as resolved;</li> <li> at the end, your <em>git diff</em> should be empty, since you should have resolved the conflicts;</li> <li> now, use <em>git commit</em> (without <em>-a</em>) to commit the result of the merge. Why no <em>-a</em>? Because the result of the merge <em>is already in the index</em>; and without any parameters, <em>git commit</em> transforms the index into a commit.</li> </ul> </p> <p>You may need to read again the last one, but otherwise it shouldn't be too hard. Still, I can hear you complaining: sometimes you <em>do</em> want to look at the overall result of a merge.</p> <p>And indeed, there are two ways to fix this. The first is to use <em>git citool</em>, which allows you to review changes. The second is to invoke <em>git diff</em> with arguments in order to tweak its operation mode; in particular:<br /> <ul> <li> <em>git diff</em> shows you the differences from index to working tree</li> <li> <em>git diff HEAD</em> shows you the differences from trunk to working tree</li> <li> <em>git diff --cached</em> shows you the differences from trunk to index</li> </ul> </p> <p>With this, you should be able to tackle conflicts pretty well.</p> <hr /> <p>Before concluding this installment, I'll point out a little hidden gem. <em>git status</em> has output that is very different from <em>svn status</em>, but the latter can be very useful. Luckily, you can obtain subversion-like output with the invocation <em>git diff --name-status -r</em>; since this is quite a mouthful, you can add this to your <em>~/.gitconfig</em> file:</p> <p><pre>[alias] changes=diff --name-status -r</pre></p> <p>You have now created a <em>git changes</em> command that knows about all of <em>git diff</em>'s option. In particular the three invocations <em>git changes</em>, <em>git changes HEAD</em>, or <em>git changes --cached</em>, will have the same meaning as the <em>git diff</em> commands above.</p> <p>Since you are at it, add this to <em>~/.gitconfig</em> too:</p> <p><pre>[diff] renames = true</pre></p> <p>and also tell git about your identity like this:</p> <p><pre>[user] name = Paolo Bonzini email =</pre></p> <p>The name and e-mail address will be used to identify you in commits.</p> <p>The next installment should cover branches and merges. However, I have said enough for GNU Smalltalk users, so I don't really know when I'll write it. :-)</p> git tutorial vcs Wed, 30 Jan 2008 04:19:17 -0700 Paolo Bonzini 165 at Using git without feeling stupid (part 1) <p>More and more projects are switching over to git or other distributed VCS. Even projects using centralized servers are doing so, because even if your project doesn't have a network of developers each with their own repository, distributed VCS have a very nice set of additional features. For example, the set of available offline operations is very complete; and as a consequence, not relying on network connection makes the system much faster even when you are not offline. Also, the possibility to quickly create and throw away branches makes it easier to do experiments. Of course, some distributed VCS may not enjoy all these advantages. The best and most widespread distributed VCS nowadays are git and mercurial (hg); this is a great step from a couple of years ago, where most systems had serious scalability problems and a much smaller feature set.</p> <p>I switched to a distributed VCS for GNU Smalltalk three years ago, and chose arch at the time. Since I work on GNU Smalltalk mostly on my commutes, having the possibility to commit offline was enough of a boon to bear the huge time to do a single commit (1 minute) and the huge time to synchronize upstream (10 seconds per commit, at least). But since better tools are now available, after finishing the 3.0 release I took the opportunity to switch to git.</p> <p>I had already switched all my "local" projects to git a while before, and had not regretted it, so I was already pretty comfortable with how the system worked. I didn't find git <em>that</em> hard to use, especially after they rewrote the way you manage remote repositories in recent versions (1.5.3 or newer). However, I had big problems finding a tutorial that teaches you git with a relatively gentle learning curve.</p> <p>It’s not hard to get started with git if you start from a single principle: a git working tree also hosts a full fledged repository. Copy the working tree, and you have actually cloned the repository. The source of the copy can be local (à la <em>cp -R</em>) or remote (à la <em>rsync</em>). You can try this now; if you already have Git installed, you can get the latest development version via Git itself:</p> <p><pre>git clone git:// cd git git log</pre></p> <p>The latter command will show all the history of git development without any need to access the network.</p> <p>Actually, git is not the first version control system to store metadata side-by-side with the working tree. Ancient systems like SCCS or RCS did the same! So, basic usage of git (without branches and with a single developer) is probably more similar to RCS than to anything else!</p> <p>Of course you don't have locks, you have atomic commits as in subversion, and so on, so the similarity does not last long. But a major point is that using git in this scenario is probably even easier than using CVS or Subversion, and it gives you a way to learn the following basic ideas:</p> <ul> <li> <em>git init</em> does not mean <em>I want to store versioning data here</em>, but rather <em>I want to store versioning informations for the files that are '</em>already<em>' here</em>.</li> <li> you can use <em>git add</em> and <em>git rm</em> as you do in CVS, but <em>git add</em> won't fail if the file is already under version control; for now, refrain from doing so</li> <li> <em>git commit</em> will only add and remove files that you marked with <em>git add</em> or <em>git rm</em>. Instead, you have to specify the files you commit with <em>git commit FILE1 FILE2...</em>, or invoke <em>git commit -a</em> to commit all modified files as in CVS.</li> <li> as in CVS, you can also inspect the version history and review changes with <em>git diff</em> and <em>git log</em>.</li> </ul> <p>Now, let's add a server to the picture. <em>Concurrent</em> development was the biggest innovation of CVS, and we can think of git as a different offspring of RCS which took a radically different approach to concurrent development. CVS (and subversion) completely centralized the server: they keep all the revisions there, so that all the operations require a connection to this server. Committing something (<em>cvs ci</em>) writes a new revision to the server, and there is a command to fetch a batch of updates from the server (<em>cvs up</em>). In git, committing something writes it locally (as in RCS's <em>ci</em>), and you have <em>two</em> commands to <em>send</em> as well as fetch a batch of updates to the server.</p> <p>From this small difference, entirely different workflows arise. This is however premature to explain now. Let's look at a typical CVS workflow:</p> <p><pre>cvs -d PATH co DIR cvs update ... work work work ... cvs update ... fix conflicts ... cvs ci</pre></p> <p>A 1:1 mapping in <em>git</em> looks like this (this uses new features from version 1.5.4; I suggest you fetch bleeding-edge sources with the <em>git clone</em> command above, and then compile with <em>make && make install</em>):</p> <p><pre>git clone PATH DIR git pull --rebase ... work work work ... git pull --rebase ... fix conflicts ... git push</pre></p> <p>There's an interesting point that is not clear from the simple scheme above. Committing (with <em>git commit -a</em> as in the single user case) happens <em>during the work</em>, not <em>after</em>. This is true in any distributed VCS, but cleaner designs (as in git and hg) make it extremely natural for the developer. It is a boon, because it makes it easier to revert mistakes, to review changes, to establish milestones. Overall, it makes your job easier.</p> <p>Like <em>cvs up</em>, <em>git pull</em> will bring in changes from the remote repository and put them in the current repository. That single command, <em>git pull --rebase</em>, hides quite a lot of things that git does. It fetches from the remote server, and it reapplies the user's commits one by one (letting the user fix conflicts) on top of the remote server's trunk. At the end, the user sees that his history has changed from this:</p> <p><pre> A---B---C (user branch) / D---E---F---G (server branch)</pre></p> <p>to this:</p> <p><pre> A'--B'--C' (user branch) / D---E---F---G (server branch)</pre></p> <p>This change makes sure that the user's changes are up-to-date with the latest changes on the server. A', B' and C' represent the same changes as A, B, C; however, git considers them different because the former are based off G, while the latter are based off E. Commits A, B and C have disappeared; this is not a problem because they were not made public i.e., <em>pushed</em> to the server. (Note that while locally you can be cavalier and "rewrite past history", the history on a centralized server should move rigorously forward, as CVS and subversion force you to do).</p> <p>In this installment, I showed how basic usage of git does <em>not</em> need any concept that is unique to a particular version control system. To some extent, this is true until you have to deal with conflicts. In the next installment, I'll talk about conflicts.</p> git tutorial vcs Tue, 29 Jan 2008 15:29:43 -0700 Paolo Bonzini 164 at
|
global_05_local_4_shard_00000656_processed.jsonl/47671
|
Saturday Night Live Transcripts
Season 25: Episode 14
99n: Joshua Jackson / *NSYNC
Let's Talk Books
Moderator.....Will Ferrell
Karen Holsbrook.....Ana Gasteyer
Kevin Henchey.....Joshua Jackson
Professor Carl Lenz.....Tim Meadows
Moderator: Welcome to "Let's Talk Books". Homer, Dante, Shakespeare. The great canon of world literature. Is it still worth teaching on college campuses in this age of multiculturalism? Or is it time we open the curriculum to other kinds of literature? With me, here to discuss the changing politics behiund curriculum in our colleges - from Temple University, Karen Holsbrook; Kevin Henchey, a frequent contributor to The Nation; and joining us from Yale University, Professor Carl Lenz. Welcome, all of you. Um.. Professor Holsbrook, I want to start with you. Let's say I have a child entering college next Fall. Will he be reading Shakespeare?
Karen Holsbrook: [ light laugh ] I certainly hope so. No one's arguing that we throw out the great writers. But, clearly, it's time that we open the door to other writers who are not often associated with the "great" works.
Moderator: Like, Zora Neil Herston, or Toni Morrison?
Karen Holsbrook: Mmm hmm. Also, Ida Paxton Freely..
Moderator: I'm sorry? I'm not familiar with her work..
Karen Holsbrook: The Yellow River? By I.P. Freely?
Moderator: Oh. Of course. I.P. Freely. Didn't she also write Lights Out at the Boys School?
Kevin Henchey: [ interrupting ] No, no.. Lights Out at the Boys School was written by a husband-and-wife team - Holden & Sharon Dix.
Moderator: Ah. Holden and Sharon Dix. I always confuse them with the East German writer - Lotta Cox. But are these the kind of writers we're talking about? Dix? Cox?
Karen Holsbrook: I'm glad you mentioned Lotta Cox. The Diary of a Hooker would make any new list of great nooks.
Kevin Henchey: Oh, I agree. But you might also include Through a Brown, Darkly, by Ilene Dover on that list. But something we really haven't hit upon is the relunctance to include Asian literature in this argument. I don't know how you could overlook one of the greats of the West - Stain on the Great Wall, by Hoo Flung Poo. Or, of course, there's always How to Make $30, by Chu Sum Wang.
Moderator: Okay. Well, that really is the meat of the matter. Do we include Chu Sum Wang? Professor Lenz, I see you're shaking your head.
Professor Carl Lenz: No, I mean, that's just it. You can't include everything. I mean, do we need Homosexuality in Irish Culture, by Michael Fitzpatrick and Patrick Fitzmichael? I don't think so. Last week I asked my students what they wanted to read, and it was Shakespeare. Not The Tiger's Revenge, by some obscure French author.
Kevin Henchey: [ helping ] Claude Balls.
Professor Carl Lenz: What?
Kevin Henchey: You're referring to The Tiger's Revenge, by Claude Balls. An excellent writer on par with Dick Gosinia, or the Greek writer, Harry Paratesties.
Karen Holsbrook: Paratesties is certainly on par with Balls or Cox. Absolutely. Now, I read a scathing indictment of drugs and professional sports, called Under the Bleachers, by Seymour Butz.
Kevin Henchey: Exactly. I think it's really non-fiction like this that we need to be looking at. I taught a seminar at Duke University, where we read Richard Sawyer and Alan Bush's fascinating study of voyeurism..
Karen Holsbrook: Mmm hmm. The Sawyer-Bush Report.
Kevin Henchey: Yes. Yes. And, from there, we segue-wayed into an interesting report on the Stonewall Riots, authored by Harrison Butz and Randall Dixon.
Moderator: Oh, I love Dixon-Butz.
Professor Carl Lenz: We all love Dixon-Butz. But does that mean we should grant them immediate status in the pantheon of great literature? I mean, what happens to Charles Dickins or Andre de Balsac?
Kevin Henchey: Oh, who cares? Really, truly? I prefer Dixon-Butz to Balsac. I mean, who wants Balsac shoved in your face?
Moderator: Actually, if truth be told, I can't think of nothing I'd rather do on a cold, wintry night, than curl up with a leathery, musky old Balsac. And I think we can all agree on that. [ everyone agrees ] Well, that's about all the time we have here on "Let's Talk Books". Join us next week, when we'll be discussing Venereal Disease & its Effects", by Maya P. Burns and Dick Hertz.
SNL Transcripts
|
global_05_local_4_shard_00000656_processed.jsonl/47673
|
List of Shows
recommended for you
Tell your friends
Guiding Light CAST - Edmund Winslow - Daily Updates Archive
David Andrew Macdonald
Birthday: June 1 1961
Birthplace: Washington, DC
Marital Status: Divorced (Nicolette Nicola - 2 children)
Real Name: David Andrew MacDonald
Height: 6' 3"
Good Night, Sweet Prince
Wednesday, December 05 2007
Back in the chapel, once the applause dies down, Will rushes down to search for his uncle. Josh admits that he is gone; he did some bad things and had to go back to San Cristobel. Will is furious and Josh tries to clam him. Reverend Ruthledge takes Will away for photos and Cassie starts to freak out about Edmund vanishing like this. She goes to her sister for help, but Reva just tells her to let it go: 'Edmund is gone.' They all know what this means. Josh starts to panic; now he's complicit in sending an innocent man to his death and that was never what he wanted. As he is about to run off and stop this, Reverend Ruthledge stops him to remind him that the ceremony is about to start. Josh starts to feel terrible and tells Cassie that this was never what he wanted. Jeffrey walks through the door and says that it's done. Josh tries to call it off, but it's too late. Jeffrey shrugs it off and says that Edmund isn't redeemable anyway. Josh can't let it go: He has to get up in front of God and if he doesn't solve this problem, then he is just as unredeemable as Edmund is. As Will becomes more upset about his missing uncle, Josh tells Cassie to cover for him while he runs off to try and save the former prince.
At the ceremony, Ruthledge comes up to the front of the church to introduce Josh to the congregation. As he is sworn in and Cassie testifies to his goodness, Edmund watches from above, as does a drunken Billy. We see Reva and Jeffrey both rush up a flight of stairs. Will finds his uncle alone. He tells the boy that they are all after him. Cassie is the worst, however, and he will have his revenge on her, Edmund vows. 'No! You can't hurt my mother!' Will cries, outraged. Edmund tells the boy that his mother is a selfish liar, but this only makes him angrier. Edmund insists that he is just trying to protect him. Will's heard that before; that's what Alonzo told him, but he showed him, 'showed him good.' Down below, Josh is confirmed into the church. After some applause, he tells everyone that he is honored to accept his charge and will do his best to ---- but he's interrupted when Edmund's body suddenly falls right in front of him!
I Thought I'd Be a Better Angel
Tuesday, December 04 2007
Reva's getting fed up dealing with having Edmund in her living room. She decides that they should have a drink. He suggests that she makes a better couple with Jeffrey than she ever did with Josh. Josh is boring but Jeffrey has the morals of...well, someone like her. She tells him that she knows that he knows about Beth's baby. He's not surprised that she's involved in all of this and trying to sneak her way into Josh's life. She insists that she is only trying to protect her sister. He finds that hard to believe. He also finds it hard to get enthusiastic about what Jeffrey has planned for him....he really just wants to help Cassie, he promises again.
At home, Cassie is sewing the wings onto Will's angel costume. He tries rehearsing his lines and asks her if they can have uncle Edmund over to help out. The boy becomes upset again when Edmund's imminent departure comes up. Cassie calls Beth to ask about James and discovers that the boy dropped out of the play because he fell off the stage. Turning to Will, Cassie wonders why he never told her this. None of this is news to Will, he just didn't mention it. Cassie suggests that they go and visit James. Will isn't interested and goes up to his room to rehearse. When the door opens, he excitedly runs to see if it's Edmund, but it's only Josh. Disappointed, the boy goes upstairs. Cassie tells Josh what Beth told her. Josh tries to reassure her and calm her fears about how Will will react to losing his uncle. He calls the boy down and tells him how sad James must be about not being in the play. Maybe they should visit him...Suddenly, Edmund arrives. The boy runs to him and they sit down to rehearse. Reva reminds him that her guard is outside and then talks to Cassie and Josh about Edmund's 'departure'. Cassie gives Reva a drink and thanks her for all of her help. Nervously, she tries to smooth over what will actually happen to Edmund so that Cassie won't figure it out. She's sure her sister must be happy to be rid of Edmund. Josh walks Reva out and she wishes him good luck on his ordination. He's just looking forward to being rid of Edmund, he admits.
Inside, Edmund asks Will if he actually pushed James off the stage. Will confirms that he did because he 'thought I'd be a better angel.' Edmund is impressed— they're so much alike. But he can't just go around doing things like that, he advises: You have to at least act like you care or people get very nervous. The only way people will ever trust you is if you can make them believe that you have feelings like theirs. He helps his nephew put on his wings and reminds him of their little lesson. After Josh has Will go off to write a 'get well' card for James, Cassie sits down with her ex-husband. He tells her how grateful he is to have had a chance to come back and make amends. She thanks him for his help and he tells her that the last thing he wants is to hurt her.
When Reva returns home, Billy arrives and they start talking about the ordination. The topic shifts to Edmund and the end that Jeffrey has planned for him. She tells Billy that Jeffrey has set Edmund up to be tried and executed for Alonzo's murder, even though he didn't do it. Billy tries to calm her fears and assures her that they can keep all of this from Edmund until it's too late. Meanwhile, Will is asking Josh if his uncle can stay. Josh tells him again that Edmund has to go. In the kitchen, Edmund tells Cassie that while he's in the compound, he'll be comforted to think about how she doesn't hate him anymore. When Josh comes in, Edmund goes back to the parlor to talk to his nephew. Will is angry that he seems to be giving up so easily. 'You always say to never give up,' Will reminds him. 'That's a very good point,' Edmund agrees, looking over at Josh and Cassie.
Last Chance Time
Monday, December 03 2007
In one of the hospital examination rooms, Edmund confronts Rick about the fact that Beth's baby is really Alan's. Rick grabs the former prince by the collar, but he isn't bothered. Edmund tells Rick that he likes it in Springfield and wants to stick around. Maybe Rick can find a way to help make that happen? Rick tells him that he's sick and points out all of the lives he would destroy by staying around. 'Perhaps you've forgotten that you can't appeal to my better nature,' Edmund reminds him. As he drifts off, Rick stares down at a syringe. Later, Jeffrey walks in and finds Edmund unconscious on the floor. Rick stands over the body and explains why he knocked him out. 'He's going to be out for awhile,' Rick explains. 'Not long enough,' Jeffrey says. Rick isn't going to let Edmund ruin things for he and Beth. He readily agrees to help Jeffrey go ahead with settling this permanently.
In her room, Beth unwraps a package. It's full of baby stuff. Rick comes through the door and hugs her. He tells her that he has a great idea: They should 'just go'; travel to Europe and stay there for awhile. Beth reminds him that she's a little too far along in her pregnancy to go flying around the world. He tells her they can take a cruise. She isn't going anywhere, she tells him. She reassures him that Phillip isn't coming back and they aren't the kind of people who run away from their problems: They solve them. 'You're right,' he says. Meanwhile, Reva returns home and finds Jeffrey with an unconscious Edmund. He tells her that he is going to see this through. She agrees to let him stay... but only if he reminds her never to get on his bad side. He laughs and she hugs him, but stares over his shoulder at Edmund with a worried look on her face. Edmund wakes up and Jeffrey goes into the kitchen to make coffee. Reva gets in Edmund's face, telling him that this is 'last chance time'. He needs to behave himself before someone finds an excuse to...
When Did You Become My Conscience?
Friday, November 30 2007
Jeffrey arrives at Cross Creek with flowers for Reva. She wonders what the catch could be. He tells her that they are going to be having company. She teases him about it being one of his old flames, but he brings Edmund in instead. Reva tells Jeffrey that even bushels full of roses wouldn't be enough to get her to agree to letting Edmund staying there. Jeffrey explains that Josh asked him to help 'the problem' (Edmund) go away and tells her that Eddie knows all about Cassie and Beth's baby. They are going to send the devilish prince to the 'Peaceful Valley' compound where he can live out his days in comfort. 'That's more than he deserves,' she says. Sitting down, she agrees to let him stay. Edmund reveals the wound he's received on his wrist from Jeffrey's less-than-delicate care. He offers again to help her end the Josh-Cassie story but she refuses. As soon as Jeffrey and Edmund leave together for the hospital, Reva rushes over to Josh. She's not happy with what he and Jeffrey are up to. Does Cassie know what he's doing? Josh tells her that this is all his fault. He wasn't cautious enough and Edmund found out about Beth's secret. Now he has to make up for his slip. 'When did you become my conscience?' he asks. Isn't she the one always accusing him of being sanctimonious? She warns him that if he does this, the guilt will haunt him forever. She knows: She's gone over the edge herself. Later, Cassie and Will arrive. She tells them that Will went in a shepherd and came out an angel; James had to drop out for some reason... looking at Josh and Reva, she asks: 'So what's going on here?' Reva isn't happy with her new house guest, she says. Cassie promises that he'll be gone soon. Reva hurries away. Cassie worries about her sister, but she's glad that Edmund is staying at Cross Creek and not with them. They sit on the couch and he tells her that soon Edmund will be out of their lives for good. Will just happens to be listening in only a few feet away.
Edmund is at Cedars being examined by Rick. They taunt each other. In the hall, Beth arrives with James. He was pushed off the stage during rehearsal and won't be the angel in the play anymore. Rick notices them and takes the boy off to get x-rays. Edmund strolls out and starts chatting to Beth. She reminds him that he's finished helping Cassie get Will back— it's time for him to go. Later, Beth sits with her son and he tells her that he thinks one of the shepherds tripped him. Meanwhile, Edmund reveals to Rick that he knows the baby is really Alan's. He won't make him lose his new daughter and used wife, he offers, not unless Rick pushes him too far. Outside, Reva arrives for an update from Jeffrey. He promises her that everything is covered. He also tells her the truth: There really is no Pleasant Valley compound; Edmund will be going back to San Cristobel to face charges. They're going to make sure that he's dead soon.
« Back to Edmund Winslow profile
« Back to Cast List
|
global_05_local_4_shard_00000656_processed.jsonl/47678
|
The Common Good
May-June 1996
Your Kingdom Come
by Stanley M. Hauerwas, William H. Willimon | May-June 1996
Our Father in heaven, hallowed be your name.
Seeing the kingdom at hand necessitates a response, a decision. We call this repentance. Will we be part of this kingdom or not? In saying "Your kingdom come," we are acknowledging that faith in Jesus is not simply an idea or an emotion. It is a concrete reality of which we are to become part or else be out of step with the way things are now that God has come into the world in Jesus. When the kingdom comes, we are "to repent" (i.e. change, let go of our citizenship in the old kingdoms) and "believe the good news" (i.e. join up, become part of the revolution).
Christianity is forever mixing religion and politics. To the credit of the rulers of this world, they at least had the good sense to look at Jesus and see that, in him, they were in big trouble. Matthew says that the moment King Herod heard about the birth of Jesus, he called together his political advisers and "was frightened, and all Jerusalem with him" (Matthew 2:3). Herod had been in office long enough to know a threat to his rule when he saw one.
Herod knew that, in this baby at Bethlehem, everything his kingdom was built upon was in mortal peril. So Herod responded in the way rulers usually respond: violence. Herod called out the army and they massacred all the Jewish boy babies (Matthew 2:13-18)-alas, only one of many violent attempts by governments to rid themselves of challenges to their power. In praying "Your kingdom come," we are in a power struggle that can become violent because the kingdoms of the world rarely give up power without a fight.
Early in his earthly ministry, even before he preached his first sermon, Jesus was confronted by Satan, who offered him complete political control-"all the kingdoms of the world"-if Jesus would only worship him. (Note: Satan is able to offer "all the kingdoms of this world" since they belong to Satan!)
Jesus refused to worship Satan even if the reward was complete power, as the kingdoms of the world define power. Rather than running the kingdoms of the world, Jesus went about establishing a new kingdom, a kingdom in this world yet not of it-what he called the kingdom of God.
As Martin Luther once said, whatever you would offer your son or daughter for, that is your god. Most of us would not think of offering up our children to be killed, yet few of us question having our children register for military service. We justify this sacrifice of our children on the basis of our support for American democracy and freedom, but it may be more a matter of worship and prayer.
The story of Jesus' temptation by Satan suggests that kingdom is a question about whom we worship. To be part of this kingdom is to acknowledge who is in charge, whose will ultimately counts in this world. There may be some faiths that detach the individual believer from concern about earthly matters, who strive to rise above outward, visible concerns such as swords and shields, wine and bread, politics and power. Christianity is not one of those religions. We want you, body and soul. Indeed, we believe that your body is your soul. So we've got opinions about the way you spend your money, invest your time, cast your ballot.
KINGDOMS HAVE BOUNDARIES. There are those who are citizens, and there are those who are not. Whereas the prayer addressed to "Our Father" implies a kind of inclusivity, when we pray "Your kingdom come" we are asserting an exclusivity as well. As
Christians, we are not opposed to boundaries. The gap between the world and the kingdom of God ought to be made clear. Those who first met Jesus had the good sense to know that they had encountered one they had not met before. Jesus repulsed more people than he attracted.
What Jesus said and made clear was that he was from somewhere other than our kingdoms. As C.S. Lewis once noted, Jesus spoke and acted in such a way that one either had to follow him or else decide that he was crazy. There was no middle ground in his kingdom. You either had to move toward it, risk letting go and being caught up in his project, or else - like the rich ruler - you had to move on, realizing that you wanted to retain citizenship in the kingdoms of the world.
While we are not opposed to boundaries, God's kingdom enables us to be opposed to the way the world sets up boundaries - on the basis of gender, class, race, economics, or accent. Nothing is more provincial and parochial than the modern nation which sets up national boundaries and then defends them with murderous intensity. The boundaries of God's kingdom obliterate all of the world's false means of demarcation between human beings. Here is a kingdom open to all, with no consideration given for the world's boundaries. Our boundary is baptism.
BAPTISM IS A CALL to become citizens of Israel, to become part of God's weird way of saving the world. That weirdness is signified, exemplified, specified in the act of baptism itself.
When you join Rotary they give you a handshake and a membership card. When you join the church, we throw you into water, bathe you, half drown you, clean you up, and tell you that you have been born again. We thus signify that being a Christian is not natural, not a by-product of being an American. To be Christian is to be adopted by a new nation, the kingdom of God. For the first time in our lives, those old labels and divisions which cause such grief - male/female, slave/free, rich/poor - are washed away, overcome, not by saying that such divisions don't mean anything, but rather by showing how they have been relativized, subordinated, washed by our new citizenship. Now the only division that makes much difference to us is church/world.
To say "Your kingdom come" is to be willing to become part of the rather weird gathering of strange people, often people the world regards as outsiders, who are now on the inside with Jesus. One of the most persistent criticisms of Jesus was the charge that he hung out with disreputable people.
Every time the church gathers, prays the Lord's Prayer, and eats and drinks the Lord's Supper with Jesus, we show that Jesus continues to be known by the company he keeps at the table. God's kingdom is a bunch of tax collectors, sinners, and sick people eating and drinking with Jesus.
Little about the kingdom of God is self-evident, so don't think that you know all about the kingdom of God just because you are reasonably intelligent. We have people who have been in the church for 50 years who still confess to being shocked by the appearance of God's kingdom when it happens, still get miffed by the people who show up insisting that Jesus has invited them to dinner, are even yet surprised that the light shines in the darkness and the darkness has not overcome it.
Perhaps the elusiveness of the kingdom is why most of Jesus' teaching was teaching about the kingdom. Imagine a sermon that begins, "Blessed are the poor in spirit, for theirs is the kingdom of heaven. Blessed are those who mourn, for they will be comforted. Blessed are the meek, for they shall inherit the Earth" (Matthew 5:3-5).
Blessed are those who are unemployed, blessed are those suffering terminal illness, blessed are those who are going through marital distress....
The congregation does a double take. Blessed? Fortunate? Lucky? What kind of world is this? In America if you are unemployed, people treat you as if you have some sort of disease. They don't want to catch what you have. If your marriage is a failure, you are a failure. That doesn't sound very blessed.
The preacher says, "Wait. I should have been more clear. I wasn't talking about your kingdoms, the kingdoms built upon success and achievement and earnest striving. I am talking about the kingdom of God." In this topsy-turvy place, our values are stood on their head. Little in this kingdom comes naturally. It comes because God is in charge and because we are invited to be part of God's rule.
WHAT IS THAT KINGDOM like? It appears mostly to be known through hints, analogies, parables, and images rather than by definitions and explanations. In the New Testament, the kingdom is usually discussed in stories, parables. Jesus said the kingdom is like a little seed that silently grows, eventually yielding great harvest (Mark 4:26-29). The kingdom of God involves a great deal of wasted seed; for many times the seed that is sown fails to take root (Mark 4:1-9).
Many times, the kingdom of God appears to the world as something small and insignificant, as small as a mustard seed (Mark 4:30-32), as troublesome a weed as the mustard plant, breaking out all over. The kingdom of God is like a rich man who placed his property in his servants' charge and then left town (Mark 13:34-36). In speaking about the kingdom of God mostly in parables, Jesus thereby showed us that the kingdom of God is sometimes difficult for us to see, tough for him to explain. The kingdom is here, not yet here, surprising, unexpected, threatening, playful, real.
Note that we pray "Your kingdom come." The kingdom isn't here, not yet in its fullness. God's kingdom is coming. It is here incipiently, in glimpses, but not in its fullness. This future, now-and-not-yet quality of the Christian faith is known by the word eschatology ("talk about last things"). The Christian faith is not satisfied with things as they are, now, today. The Christian faith is not preoccupied with an archeological exhumation of some distant past by which it attempts to give meaning to an otherwise meaningless present.
The Christian faith is eschatological, always leaning into the future, standing on tiptoes, eager to see what God is bringing to birth among us. We are created for no better purpose than the praise of God. This is our true destiny. Yet any fool can see that the world is not like that, at least not yet. So Christians, in the Lord's Prayer, are busy leaning forward toward that day when all creation shall be fulfilled in one mighty prayer of praise.
Yet we are not merely standing around gazing up into heaven awaiting that future day (see Acts 1:11). In praying the Lord's Prayer, we are already participating in that end time. Politics has become prayer. When we pray this prayer, we are thereby signifying our citizenship in this new kingdom offered to all through baptism. We are pledging our allegiance to a new sovereign, relinquishing our allegiance to the kingdoms of this world. As the church gathers to pray this prayer, we are already forming a visible new community, formed on the basis of God's rule rather than on the basis of the way the world holds people together.
The kingdom of God which is coming - here, not here, present, not fully present - is a banquet, a great party thrown for outsiders who, before Jesus, had no place in the promises of God to Israel. By an amazing act of divine generosity, Jesus has made possible a party to which even gentiles like us have been invited. The kingdom of God is a party to which all of the good people refused the invitation so the host went out and invited all of the bad people to come. The kingdom of God is a party with a bunch of people with whom we wouldn't be caught dead spending a Saturday night had not we also been invited.
This is one of the reasons why being in the church can be a real pain, considering the sort of reprobates Jesus has invited to the party, the party which is called kingdom of God.
We are able to live hopefully in a fallen-yet-being-redeemed world because of the One who has taught us to pray "this way." We have been given the grace as Christians to know that we live between the times, having seen the fullness of God in Jesus Christ, yet also knowing that all the world is not yet fulfilled as God's world. That tension - stretched as we are between what is ours now in Christ and that which is yet promised - is our role as God's people.
We, you and I, are living, breathing evidence that God has not abandoned the world. We are able continually and fervently to pray that God's kingdom come because we know that God's will has been done. We are able to be honest about all the ways in which this world is not the kingdom of God in its fullness and to hope for more because we know that God's will has yet to be done, God's kingdom has yet to come. We are able to live without despair in the world's present situation because, even in us, God has claimed a bit of enemy territory, has wrestled something from the forces of evil and death. That reclaimed, renovated territory is us.
STANLEY M. HAUERWAS and WILLIAM H. WILLIMON are professors at Duke University. Willimon is dean of the chapel at Duke. They are the authors of a new book on the Lord's Prayer and Christian discipleship, Lord, Teach Us: The Lord's Prayer and the Christian Life (Abingdon Press), from which this article is excerpted.
Like what you're reading? Get Sojourners E-Mail updates!
Sojourners Comment Community Covenant
|
global_05_local_4_shard_00000656_processed.jsonl/47694
|
Now Playing Tracks
Fearlessness does not mean the lack of fear. I does not mean a lack of sleepless nights because anxiety torments your dreams.
Fearlessness is not being free from exaggerated thoughts of the worst scenarios, nor the absence of anguishing pain at the very thought of Rejection’s embrace.
Fearlessness is acknowledging Anxiety’s presence and proceeding into action despite its taunts; realizing that it is the sole barrier between the person you reveal to the world and the authentic you that was meant to thrive.
Reka Sanders
To Tumblr, Love Pixel Union
|
global_05_local_4_shard_00000656_processed.jsonl/47696
|
House of Lords
Kings in the Middle Ages would often consult their tenants-in-chief before making important decisions. These men were usually called to appear before the king during religious festivals (Christmas, Easter, Whitsun). Some of the men who attended these meetings were given specific jobs to perform for the king, for example, to act as treasurer. Some kings tended to ignore the advice of the barons. When this led to bad decisions the barons became angry. This is one of the reasons why the barons rebelled against King John and made him sign the Magna Carta.
Henry II was another king who tended to ignore the advice of his barons. Under the leadership of Simon de Montfort, the barons rebelled. After the Battle of Lewes in 1264, Simon de Montfort took control of the council which had now become known as Parliament (parler was Norman French for talk). The following year Simon de Montfort expanded Parliament by inviting representatives from the shires and towns to attend the meetings.
In 1275 Edward I called a meeting of Parliament. As well as his tenants-in-chief, Edward, like Simon de Montfort before him, invited representatives from every shire and town in England. As well as his tenants-in-chief, Edward invited representatives from every shire and town in England. These men were elected as representatives by the people living in the locality. When the representatives arrived they met in five different groups: (1) the prelates (bishops and abbots); (2) the magnates (earls and barons); (3) the inferior clergy; (4) the knights from the shires; (5) the citizens from the towns.
Rudolf Ackermann, House of Lords (1808)
Rudolf Ackermann, House of Lords (1808)
After this date, whenever the king needed money, he called another Parliament. Henry VIII enhanced the importance of Parliament by his use of it during the English Reformation. In 1547 the king gave permission for members of the commons to meet at St. Stephen's Chapel, in the Palace of Westminster. In the 15th century the House of Lords was the Upper House and the House of Commons the Lower House. Membership of the House of Lords was made up of the Lords Spiritual (two Archbishops, 24 Diocesan Bishops) and the Lords Temporal which were divided into three groups: hereditary peers, peers granted peerages by the sovereign on the advice of the Prime Minister, and the Law Lords, who are recruited from the ranks of Britain's High Court Judges.
In 1834 the chapel and most of the Old Palace of Westminster was destroyed by fire. The new Palace of Westminster was designed by Sir Charles Barry and Augustus Welby Pugin. The House of Lords is slightly smaller than the House of Commons and only seats 250 members. However, Barry and Pugin made the interior more impressive than the commons with the seats upholstered in red leather. The chamber is dominated by an ornate royal throne where the sovereign sits during the opening of Parliament.
Labour Party poster (1910)
Labour Party poster (1910)
The Labour Party, when elected to power in 1997, promised to introduce legislation that would make the House of Lords an elected second chamber. However, Tony Blair, the prime minister changed his mind and instead called for a fully appointed House of Lords. On 4th February, 2003, the House of Lords voted for this measure (335 votes to 110) but it was defeated in the House of Commons (323 votes to 245) . Twenty-five members of the government, including four Cabinet ministers, voted against the proposal for a fully appointed House of Lords.
Primary Sources
The House of Lords is a venerable old place, indeed; but how mean, how incoherent, and how strained are the several avenues to it, and rooms about it? The matted gallery, the lobby, the back ways the king goes to it, how short are they all of the dignity of the place, and the glory of a King of Great Britain with the Lords and Commons, that so often meet there?
The tapestry of the old House of Lords is used to decorate the present, and is set off with large frames of brown stained wood. The old canopy of state is placed at the upper end of the room, with the addition of the arms of the United Kingdom, painted upon silk.
We have heard The Rights of Man called a levelling system; but the only system to which the word levelling is truly applicable is the hereditary monarchical system. It is a system of mental levelling. It indiscriminately admits every species of character to the same authority. Vice and virtue, ignorance and wisdom, in short, every quality, good or bad, is put on the same level. Kings succeed each other, not as rationals, but as animals. In reverses the wholesome order of nature. It occasionally puts children over men, and the conceits of nonage over wisdom and experience. In short we cannot conceive a more ridiculous figure of government, than hereditary succession.
(4) Robin Cook, speech, House of Commons (4th February, 2003)
I am very much committed that the House should seize what is a unique and historic opportunity to make clear its preference. If we are serious about reform, then we should have a largely or wholly elected second chamber. In the modern world, legitimacy is conferred by democracy. If we want the public to trust politicians, then we must trust the people who elect politicians.
(5) Douglas Hogg, speech, House of Commons (4th February, 2003)
Those who argue the case for an appointed second chamber normally concede that it will lack the legitimacy of an elected one. I find it extraordinary that at the start of the 21st century we should be contemplating the creation of a political structure which, by its very act of creation, will lack the political legitimacy required to give it either authority or indeed survival.
(6) Peter Wishart, speech, House of Commons (4th February, 2003)
Surely there is something wrong when the Prime Minister won't even support his own manifesto.
(7) Polly Toynbee, The Guardian (5th February, 2003)
There is much to be said for the Blair plan for an entirely appointed House of Lords. Unfortunately all of it is bad. Oligarchy has its charms - but since the days of Cromwell those charms have eluded all but the oligarchs, where in the Lords gerontocracy masquerades as experience, bishops with empty pews represent an empty shell of faith and yesteryear's politicians are pensioned into a golden dotage. No surprise then that the old turkeys on the red benches did not vote for winter festival but for their own perpetuity without the inconvenience of a trip to the hustings where most could be guaranteed a roasting.
Hybridity, they clucked, would be a very bad thing and they are right about that: there would be a strange divide between the legitimate and the illegitimate peers in any future House, part-elected and part-appointed. One hundred per cent democracy was the only possible outcome. How extraordinary it seems in the 21st century that, as we are about to go to war, yet again we are trumpeting for the democratic rights of far-away people, and still find it necessary to quote Winston Churchill: "Democracy is the worst form of government, except all those other forms that have been tried from time to time". How can Labour have let itself be out-reformed by Iain Duncan Smith - even if he commanded as little obedience as Blair.
This progressive reform has waited a century: now the House of Lords will remain the laughing stock of the western world. Now the chance of reform has collapsed, all due to a moment of madness in which a prime minister already accused of anti-democratic instincts has done himself needless harm. Was it the insouciance of a mind floating somewhere between Washington and Baghdad?
|
global_05_local_4_shard_00000656_processed.jsonl/47701
|
Imagining Google as a real person is still so embarrassingly hilarious
Not only that but it has to be ready to burn all our embarrassing evidence and deal with inferior competitors like Siri who don't understand what the hell we're saying half the time. It's thankless! It's also funny as hell to imagine. College Humor continues their series of imagining a real guy as Google and it's a riot because it's so damn true.
|
global_05_local_4_shard_00000656_processed.jsonl/47703
|
SpongeBob SquarePants
Bubble Bowl
on ESB
Bubble bowl
The Bubble Bowl
Squidward conducting his band.
The Bubble Bowl is where Squidward had to perform in front of a live human audience, in the episode "Band Geeks". He has been challenged by his nemesis, Squilliam, and is nervous because his band has not shown to be very good in practice. One night before the big concert, a riot starts up among the band members and Squidward storms off disappointed. SpongeBob comes to the rescue with an inspirational speech and they practice throughout the night. The next day the band is ready and Squidward is nervous. They end up Doing amazing and Squilliam has to even be taken to the hospital, because he fainted.
• The Bubble Bowl is a parody of "The Super Bowl", since they perform in the middle of an American football field.
Wikia Spotlight
Random Wiki
|
global_05_local_4_shard_00000656_processed.jsonl/47712
|
potraži bilo koju reč, kao na primer porb:
Lauren Kelly is one of the single most amazing people anyone will ever hear about. Let alone have the luck to set your eyes on. Try and find someone more perfect than her, but you won't. Who ever has the luck to hold her in his arms is the luckiest person in the world. She is loving, caring, beautiful, sexy, clever, helpful, intelligent, and this list could go on forever. She is the closest you can get to an angel and she very well might be in fact. She is the sweetest girl and if you are lucky enough to meet a 'Lauren Kelly'. Just try not to fall too deeply in love with her, because I know I did
po h7jack Октобар 20, 2013
|
global_05_local_4_shard_00000656_processed.jsonl/47715
|
Stack Exchange Q&A communities are different. Here's how:
Speech bubbles
Expert communities.
Each of our 125 communities is built by people passionate about a focused topic.
Voting arrows
The right answer. Right on top.
Share knowledge. Earn trust.
Earn reputation and additional privileges for posts others find helpful.
TeX - LaTeX
Fill and draw option
3 answers | asked 2 hours ago by JennyC on tex
15 30 50 per page
1 2 3 4
|
global_05_local_4_shard_00000656_processed.jsonl/47717
|
Take the 2-minute tour ×
Let's say that I have a List (or the values in a Map), and i want to perform an operation on each item. But unfortunately, for whatever reason, this list of values can contain nulls.
scala> val players = List("Messi", null, "Xavi", "Iniesta", null)
players: List[java.lang.String] = List(Messi, null, Xavi, Iniesta, null)
In order to avoid blowing up with a NPE, i need to do the following:
scala> players.filterNot(_ == null ).map(_.toUpperCase)
res84: List[java.lang.String] = List(MESSI, XAVI, INIESTA)
Is there any better way of doing this?
Ideally something like:
On the scala-language mailing list, Simon proposed this:
players.filter ( null !=).map(_.toUpperCase )
which is shorter version of my original take, and as short as you can get without a dedicated method.
Even better, Stefan and Kevin proposed the method withFilter which will return a lazy proxy, so both operations can be merged.
players.withFilter ( null !=).map(_.toUpperCase )
share|improve this question
If Tuesday is any indication, the players list is not-at-all-type-safe, not to mention that null is to be avoided in Scala ;-) – virtualeyes Apr 26 '12 at 21:34
This may or may not apply to your use case, however: If you are never going to use the fact that there have been null values in that list, I’d suggest you’d remove them once and for all before you assign it to val players. You’ll never need to think about them afterwards; no collect, no implicits, no NPE. – Debilski Apr 26 '12 at 21:34
@Debilski sometimes your calling code might not be well formed. This is particularly true in mixed Java + Scala applications. – fracca Apr 27 '12 at 6:50
@virtualeyes, the identities of the nulls has been disguised to protect their image :P – fracca Apr 27 '12 at 6:51
3 Answers 3
up vote 3 down vote accepted
If you can’t avoid nulls (e.g. if you get your list from Java code), another alternative is to use collect instead of map:
scala> players.collect { case player if player != null => player.toUpperCase }
res0: List[java.lang.String] = List(MESSI, XAVI, INIESTA)
share|improve this answer
It has the advantage of doing one pass, so at the moment it seems like a good solution. However, it's slightly longer. Is there anything that would look closer to the safeMap(f) that I propose? – fracca Apr 26 '12 at 21:14
@fracca - You can { case player: String => player.toUpperCase } if the type annotation is shorter than the null test. For something to match a type, it can't be null. – Rex Kerr Apr 26 '12 at 22:20
@fracca you can avoid two passes using withFilter, as in players.withFilter(null!=).map(_.toUpperCase) – Luigi Plinge Apr 26 '12 at 23:18
You could convert to a list of Option[String]:
scala> val optionPlayers = players.map(Option(_))
optionPlayers: List[Option[java.lang.String]] = List(Some(Messi), None, Some(Xavi), Some(Iniesta), None)
Option is universally preferred to null and it gives you a lot of flexibility in how you can safely handle the data. Here's are thee easy ways to get the result you were looking for:
scala> optionPlayers.collect { case Some(s) => s.toUpperCase }
scala> optionPlayers.flatMap(_.map(_.toUpperCase))
res1: List[java.lang.String] = List(MESSI, XAVI, INIESTA)
scala> optionPlayers.flatten.map(_.toUpperCase)
res2: List[java.lang.String] = List(MESSI, XAVI, INIESTA)
You can find a lot more information about Option in other StackOverflow questions or by searching the web.
Or, you can always just define that safeMap method you wanted as an implicit on List:
implicit def enhanceList[T](list: List[T]) = new {
def safeMap[R](f: T => R) = list.filterNot(_ == null).map(f)
so you can do:
scala> players.safeMap(_.toUpperCase)
res4: List[java.lang.String] = List(MESSI, XAVI, INIESTA)
Though if you define an implicit, you might want to use a CanBuildFrom style like the basic collections do to make it work on more than just List. You can find more information about that elsewhere.
share|improve this answer
I would then something all this for the same output: val optionPlayers = players.map(Option(_)) optionPlayers.map(_.map(_.toUpperCase)) optionPlayers.map(_.map(_.toUpperCase)).flatten – fracca Apr 26 '12 at 21:04
@fracca, see my suggestions for getting the same output from your question. – dhg Apr 26 '12 at 21:08
Options are indeed preferrable, however, there are cases where you already have nulls (say, interacting with poorly written Java code). Transforming to Options and then applying the operations is too verbose. I want something really concise that hides all that noise. – fracca Apr 26 '12 at 21:17
@fracca, See my suggestion about just defining an implicit safeMap method. This will definitely be the cleanest-looking thing in your code. – dhg Apr 26 '12 at 21:18
i think you are right, the implicit approach is probably the cleanest solution. However, I'm hoping that a solution like this is already defined in the library. A good candidate operation to add to the library perhaps? – fracca Apr 26 '12 at 21:23
I'd do this:
players flatMap Option map (_.toUpperCase)
But that's worse than collect. filter + map is always better done with collect.
share|improve this answer
hmmm, this doesn't compile with 2.9.1 – Luigi Plinge Apr 27 '12 at 0:43
@LuigiPlinge Yeah, some problem with type parameters. players flatMap (Option(_)) map (_.toUpperCase) works. – Daniel C. Sobral Apr 27 '12 at 12:57
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/47718
|
Take the 2-minute tour ×
I wanted to do field validation on a django model without using ModelForms. Is there a way I can get the clean_fieldname method to be called when save() is invoked?
share|improve this question
You could declare any custom form and write a clean method yourself. Then you can overwrite the Form save() method and make it save, delete, or do whatever you want to do. – PepperoniPizza Nov 14 '12 at 20:06
1 Answer 1
up vote 0 down vote accepted
The clean_fieldname method belongs on a form or a model form. There's no code in the model to do the same thing, you'd have to implement it yourself.
I recommend you write a validator for your field, then call full_clean() before saving to validate your instance.
share|improve this answer
Thanks calling full_clean() will do the work. Is there a cleaner way like validators to write data manipulator get it automatically called on save() as well apart from full_clean()? – user504879 Nov 14 '12 at 20:27
I've answered similar questions on stack overflow before, hopefully they'll help explain further. – Alasdair Nov 14 '12 at 21:37
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/47719
|
Take the 2-minute tour ×
I am considering moving from FogBugz to TFS 2012 for our bug/defect tracking. In FogBugz it's easy to create areas such as Database, Reports, etc. I went to the work items area and it had one that matched the project name. I created children of that to match our different teams. I later decided to add teams in TFS (I'm new to TFS, a lot to figure out!) so it created work areas to match the teams. So now I have:
--Blah Team
--Foo Team
Now I want to go back and delete Blah and Foo because it is foolish and confusing the way it is now.
How can I delete these work item areas I no longer want?
Thank you.
share|improve this question
I just found it right after posting! You can right-click on the items and there is the delete option. Duh! – Neal Apr 6 '13 at 19:34
1 Answer 1
up vote 0 down vote accepted
Go to team web access then right-click the items you no longer want and a context menu will appear with options such as delete.
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/47720
|
Take the 2-minute tour ×
I'm working through some homework and a question on a previous exam paper asks to name all of the abstract classes in a given UML diagram. Fairly straightforward, I suppose. There is one abstract class and three interfaces. Do these interfaces qualify as abstract classes, in general?
share|improve this question
Just added an explanation about the difference between interface and class – VonC Nov 3 '08 at 11:23
8 Answers 8
up vote 25 down vote accepted
Thing is, while technically interfaces may be represented as classes in languages like Java, I wouldn't consider them classes.
Abstract? Hell yes. Class? No.
Interfaces cannot have constructors, neither properties, fields, function bodies, etc. Interfaces cannot be inherited, they are implemented (again, technically it might be true that implementing an interface is actually inheriting it in specific languages, but that's not my point.) Interfaces are more like 'contracts' as they do not define any behaviour whatsoever like classes.
Now if this is a homework then you shouldn't really argue about these sort of stuff with the teacher. Just check your lecture notes and see if the word "class" is mentioned anywhere in the your teacher's definition of interface.
share|improve this answer
Interfaces can be inherited: An interface can extend another interface – Bohemian Dec 19 '12 at 3:59
All interface are indeed abstract
Actually, you can declare an method as abstract within an interface... except any 'checkstyle' tool will tell you the abstract keyword is redundant. And all methods are public.
To echo other answers, an interface is not a class.
Interfaces are not part of the class hierarchy, although they work in combination with classes.
When you define a new interface, you are defining a new reference data type. You can use interface names anywhere you can use any other data type name. If you define a reference variable whose type is an interface, any object you assign to it must be an instance of a class that implements the interface
To better explain why an interface is not a class, consider the following:
1/ an interface is a type used by values
2/ a class is for Objects
Object a = new Date();
String s = a.toString();
• The type of the variable 'a' is Object (which is actually a type notation in Java source code meaning a reference to an Object),
• but the class of the object it points to is Date.
The type (Object) only affects what code is valid according to the compiler's type-checking, but not what the code actually does.
The class of the object affects what the code does, so that the a.toString() call in the second line returns a String that looks like a Date, not one that looks like "java.lang.Object@XXXXXXXX".
Since an Interface is a type, it is used for values only, and will not represent what objects will actually do in term of runtime.
share|improve this answer
In Java though, theres a twist to the tale - all Interfaces in Java extend java.lang.Object! Try adding a method:
public void notify();
in an interface and see what happens..
An Interface extending a Class - Does that make the Interface a Class? Or the Class an Interface?? Uhh-huh.. Guess it was a hack that had to be done to prevent interfaces overriding the definitions in java.lang.Object that implementations of the interface had to extend anyway.
share|improve this answer
You've only asked about the abstract side, but don't forget the class side - I wouldn't call an interface a class, so even though interfaces are abstract (as per the specification), I still don't think they count as abstract classes. It may be worth explicitly explaining that though :)
share|improve this answer
Yes, an Interface is implicitly Abstract. Look behind the scenes as to the way it is encoded to a .class file.
Semantics are a funny thing though; under exam conditions "abstract class" would have to literally be compiled from a .java source file using abstract class in the Class' declaration.
share|improve this answer
An interface contains prototype of methods (i.e Declaration ) not defination but Abstract class can contain defination of method & atleast one Abstract method (method with only prototype)
share|improve this answer
Interfaces are used to break the Object Inheritance. They could hold two or more objects of several classes and classes hierarchies. Look at an interface as an outlet plug. All classes implementing an Interface need to have one, the same way a computer, a coffee machine, a ventilator and a refrigerator need to have the same device to get power.
share|improve this answer
Abstract class looks like interface. Abstract classes can have implementations where as interface can't have any implementations.
Then, there is a question. Can we call abstract class as interface if they only have method signatures?
I think, abstract classes, unlike interfaces, are classes. They are expensive to use because there is a lookup to do when you inherit a class from abstract class.
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/47721
|
Take the 2-minute tour ×
I am doing an enhancement on our system and there is this other application that is already doing the hashing / ecryption but nobody knows what algorithm was used and we do not have access to the code. I have to do the same hashing using java or javascript for our system because I need to perform a search so I need to pass the correct hashed/encrypted value. I only have the sample data saved in the database of the other system which is already hashed/encrypted.
Sample text data to be hashed : 4539780225622033
I need to convert it to this value: gjfFIfHf1JsVMHbD7lwPaT43rsA=
I found this site which you have to enter the text and it will generate all possible hashed values using different hashing algorithm. http://www.insidepro.com/hashes.php?lang=eng
I found 4 results under SHA-1. I know how to get RESULTS 1 and 2 but I don;t know how to arrive with RESULTS 3 and 4.
SHA1 Results:
RESULT 1: 99a37385d70a8f383f51f70e148d9a115f1beed5
RESULT 2: maNzhdcKjzg/UfcOFI2aEV8b7tU=
RESULT 3: 8237c521f1dfd49b153076c3ee5c0f693e37aec0
RESULT 4: gjfFIfHf1JsVMHbD7lwPaT43rsA=
I hope you can help me with this.
Thanks you very very much in advance.
share|improve this question
gjfFIfHf1JsVMHbD7lwPaT43rsA= seems to be a Base64 string. – BoltClock Jul 5 '10 at 4:08
If you look at the bottom of the page, (4) is base-64, password in unicode, and (3) is hash in base-64. – James Black Jul 5 '10 at 4:09
4 Answers 4
Look at the notes listed at the bottom of the page:
[1] – Hash in Base64
[2] – Password in Unicode
The third hash is obtained by hashing the Unicode version of the password, the fourth is the Base64 encoded version of that.
share|improve this answer
Hi again, sorry i'm quite new to this hashing/encryption and encoding... isn't it this java code already converts to Unicode using the UTF-8? md = MessageDigest.getInstance("SHA-1"); byte[] sha1hash = new byte[40]; md.update(text.getBytes("UTF-8"), 0, text.length()); sha1hash = md.digest(); String sHex = convertToHex(sha1hash); – Bing Jul 5 '10 at 6:00
The first one is SHA1 of raw encoding. The second one uses UTF-16 (Little Endian) encoding
You can get second result by doing this,
MessageDigest md = MessageDigest.getInstance("SHA1");
byte digest[] = md.digest();
// Convert to hex or Base64
share|improve this answer
1) I hope that credit card number you've posted isn't real.
2) Is there any chance of decompiling the original encryption app?
3) If not, there is no way to guarantee you'll get the same results as it's unlikely if this is a serious encryption application that they would use a standard algorithm without a salt or application-specific key. If they have used just a standard hash algorithm and this is a serious security app then you don't want to be replicating the same behaviour.
share|improve this answer
Hi, Nope it's not a real card number it's just a test data. There's no way of decompiling because we don't have access to it. The problem is we need to arrive at the same hashed value that they have because we need to pass the same hashed value for SEARCH purposes. The problem is no one can tell me what are the rules/algo they used in hashing the card number. I'm quite new to this hashing and encrypting data. I already downloaded a java and javascript code for sha1 and base64 but I couldn't get the RESULT 4 I mentioned above. – Bing Jul 5 '10 at 6:06
Not sure why I get a -1 for this, but there is no way to guess the method they used to encrypt the data if they used a salt etc. as they should have. I mean if you could guess the method surely an attacker who got your data could too and at that point it's only a matter of generating a rainbow table until your data is compromised. – Matt Mitchell Jul 5 '10 at 6:31
I finally found the solution to my problem from the sha1 javascript implementation that I downloaded. As i've said I'm new to this encoding stuff so I'm not quite sure how to explain the difference.
Instead of using UTF-8 I used the UTF-16le encoding:
function str2rstr_utf16le(input) {
var output = "";
output += String.fromCharCode( input.charCodeAt(i) & 0xFF,
(input.charCodeAt(i) >>> 8) & 0xFF);
return output;
Thanks again for the quick response. I'll have to read/study more on this topic.
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/47722
|
Take the 2-minute tour ×
How can I subtract time in MySQL? For example, today is 16 March; I want to subtract 15 days to reach 1 March. Are there any methods that can be used to subtract 15 days from the current date?
share|improve this question
1 Answer 1
up vote 21 down vote accepted
For a list of units see http://dev.mysql.com/doc/refman/5.1/en/date-and-time-functions.html#function_date-add
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/47723
|
Take the 2-minute tour ×
in my pom.xml I've configured maven-jaxb-plugin but I'm getting a "A required plugin was not found: Plugin could not be found - check that the goal name is correct: Unable to download the artifact from any repository" because of it. My config is like this:
In dependencies, I have added the following.
What am I missing? Why can't it find the correct artifacts?
share|improve this question
2 Answers 2
up vote 0 down vote accepted
I suggest you use, when facing such a problem, one of the available maven search engines :
• mvnbrowser
• jarvana
• mvnrepository
the two first having my preference. Here is what they say about your artifacts :
• maven-jaxb-plugin is available at Apache
• maven-jaxb2-plugin 0.7.5 is not known. The most up-to-date version, is 0.7.3 on mvnbrowser and 0.7.4 on jarvana. which may be the reason why your maven build is broken
• jaxb-api 2.2 is available at both JavaNet and JBoss repositories
Well, wion't do all the job for you, as I guess you get the picture now.
share|improve this answer
mvnbrowser is my usual as well. You're right about the version, but it turned out that the pom I got contained a "301 Moved Permanently" HTMl error page, not the correct contents at all. So I've manually downloaded it and put it in its right place. That's not really a resolution, though, so I suspect I'm using the wrong repository, but I cannot find out what repository I should be using – niklassaers Dec 15 '10 at 8:41
@niklassaers It may be because you use a team proxy. First remove existing entries in your .m2/repository, then go check if your settings (both project and user ones ... at .m2/settings.xml) if a proxy is defined. If so, you'll havve to find a login on that site (Nexus, Archiva, Artifactory), and go check if proxied repositories are corrects. – Riduidel Dec 15 '10 at 9:00
You can find version 0.7.3 on the Java.net maven repository:
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/47724
|
Take the 2-minute tour ×
My air app has no chrome and no main window, it's like a widget. In some case I'd like to show specific message like alert. But nothing appear, do you know, how I can't solve that?
var initialBounds:Rectangle = new Rectangle((Screen.mainScreen.bounds.width / 2 - (this.width/2)), (Screen.mainScreen.bounds.height / 2 - (this.height/2)), this.width, this.height);
Alert.show("Souhaitez-vous quitter MonAppli?", "Quitter l'application", Alert.OK | Alert.
CANCEL, initialBounds as Sprite);
Thanks for you help
share|improve this question
We can't help you if you show us no code. – RIAstar Aug 25 '11 at 15:47
Find below one example – Flex60460 Aug 29 '11 at 14:08
Still don't understand what it is that you want to do. I can tell you one thing though: initialBounds as Sprite will always be null since Rectangle is not a Sprite. BTW: you should edit your original question, rather than posting an example as an answer. – RIAstar Aug 29 '11 at 14:54
Your Answer
Browse other questions tagged or ask your own question.
|
global_05_local_4_shard_00000656_processed.jsonl/47725
|
Take the 2-minute tour ×
Given a QGraphicsScene, or QGraphicsView, is it possible to create an image file (preferably PNG or JPG)? If yes, how?
share|improve this question
2 Answers 2
up vote 12 down vote accepted
I have not tried this, but this is the idea of how to do it.
You can do this in several ways One form is as follows:
QGraphicsView* view = new QGraphicsView(scene,this);
QString fileName = "file_name.png";
QPixmap pixMap = QPixmap::grabWidget(view);
//Uses Qpixmap::grabWidget function to create a pixmap and paints the QGraphicsView inside it.
The other is to use the render function QGraphicsScene::render():
QImage image(fn);
QPainter painter(&image);
share|improve this answer
awesome! thanks. i tried the second approach. the only thing required is that the QImage needs to be initialized. – Donotalo Sep 17 '11 at 13:42
After just dealing with this problem, there's enough improvement here to warrant a new answer:
scene->clearSelection(); // Selections would also render to the file
scene->setSceneRect(scene->itemsBoundingRect()); // Re-shrink the scene to it's bounding contents
QImage image(scene->sceneRect().size().toSize(), QImage::Format_ARGB32); // Create the image with the exact size of the shrunk scene
image.fill(Qt::transparent); // Start all pixels transparent
QPainter painter(&image);
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/47726
|
Take the 2-minute tour ×
How can we use the Distinct QueryParam in finding distinct records from a DB Table. ?
share|improve this question
1 Answer 1
Something like this
MyMapper.find(By(someField, "someValue", Distinct())
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/47727
|
Take the 2-minute tour ×
I'm using tc with kernel for traffic shaping. Limit bandwidth works, adding delay works, but when shaping both bandwidth with delay, the achieved bandwidth is always much lower than the limit if the limit is >1.5 Mbps or so.
tc qdisc del dev usb0 root
tc qdisc add dev usb0 root handle 1: tbf rate 2Mbit burst 100kb latency 300ms
tc qdisc add dev usb0 parent 1:1 handle 10: netem limit 2000 delay 200ms
Yields a delay (from ping) of 201 ms, but a capacity of just 1.66 Mbps (from iperf). If I eliminate the delay, the bandwidth is precisely 2 Mbps. If I specify a bandwidth of 1 Mbps and 200 ms RTT, everything works. I've also tried ipfw + dummynet, which yields similar results.
I've tried using rebuilding the kernel with HZ=1000 in Kconfig -- that didn't fix the problem. Other ideas?
share|improve this question
1 Answer 1
It's actually not a problem, it behaves just as it should. Because you've added a 200ms latency, the full 2Mbps pipe isn't used at it's full potential. I would suggest you study the TCP/IP protocol in more detail, but here is a short summary of what is happening with iperf: your default window size is maybe 3 packets (likely 1500 bytes each). You fill your pipe with 3 packets, but now have to wait until you get an acknowledgement back (this is part of the congestion control mechanism). Since you delay the sending for 200ms, this will take a while. Now your window size will double in size and you can next send 6 packets, but will again have to wait 200ms. Then the window size doubles again, but by the time your window is completely open, the default 10 second iperf test is close to over and your average bandwidth will obviously be smaller.
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/47730
|
Responding to Pete Bard's attempt to deflect and deceive as only a liberal can - illuminate the obvious, ignore all facts.
Fact: Sept. 11 terrorist attack in U.S. during Bush administration.
Fact: 1993 was the first terrorist attack on the World Trade Center.
Fact: In January 1995, Ramzi Yousef, Khalid Sheik Mohammed plan the Bojinka plot.
Fact: Killing or capturing Osama bin Laden passed on by Bill Clinton. Sudan's minister Erwa offered bin Laden to the U.S. in 1996. In defense, bin Laden had not been charged with any crimes against America or its citizens, but it is a fact that he had been listed as a financier of terrorism. In 1998, the Justice Department secured an indictment against bin Laden when he declared war on the U.S.
Fact: In January 2000, terrorists arrived in the U.S., with more coming around June.
Fact: In October 2000, the USS Cole is attacked by al-Qaida in Sudan, and 17 American sailors are killed. Clinton takes no action as he prepares to begin transition phase.
On Jan. 20, 2001, George W. Bush is inaugurated. Intelligence handed over to the Bush transition team from Clinton's administration can and will be debated forever. Much would be classified.
After 9/11, Mansoor Ijaz, a major Democrat donor, had falling out with Clintons, saying "Clinton's failure ... represents one of the most serious foreign policy failures in American history."
I can agree on your premise about Iraq, but not your analysis. Public Law 107-243 passed the 107th Congress, and in fact, Sens. Biden, Clinton and Rockefeller voted for the "Authorization for use of Military Force Against Iraq, Resolution of 2002." The decision and vote was based on intel, UN sanctions violated and the fact that Saddam Hussein used chemical weapons on his own people.
You attempt to compare attacks on American assets during the Bush years on foreign soil to Benghazi. Are you aware of the extent and duration of the Benghazi attack? Benghazi, as was 9/11, was an orchestrated and planned event, just not of the same magnitude.
It was not a single RPG fired from a distance, as in Greece in January 2007, which resulted in no injuries or deaths. It was not a couple of mortar rounds fired from a distance at a U.S. embassy, as in Yemen in March 2008, when two Yemeni civilians died.
If you are not aware, Benghazi was a pre-planned close fight on a U.S. diplomatic mission. It was hand-to-hand, fight or die. It wasn't about a video and it wasn't a "couple of guys out for a walk one night."
When every intelligence agency in this country wanted Boko Haram listed as a terrorist organization, Secretary of State Hillary Clinton opposed and kept them of the terrorist list.
Fact: Terrorists don't care if you're Democrat or Republican, black or white, male or female, adult or child, as long as you are American.
George Miller,
Hazle Township
|
global_05_local_4_shard_00000656_processed.jsonl/47757
|
1. Health
Everyday Mindfulness Exercises For Stress Relief
Pick Your Favorite Mindfulness Exercises
Updated May 23, 2014
A community relaxation group.
Dougal Water/Digital Vision
The practice of mindfulness can bring many benefits to your emotional and physical health, as well as to the relationships in your life. Mindfulness is an amazing tool for stress management and overall wellness because it can be used at virtually any time and can quickly bring lasting results. The following mindfulness exercises are simple and convenient, and can lead you to a deeper experience of mindfulness in your daily life.
Mindfulness Exercise #1: Meditation
Meditation brings many benefits in its own right, and has been one of the most popular and traditional ways to achieve mindfulness for centuries, so it tops the list of mindfulness exercises. Meditation becomes easier with practice, but it need not be difficult for beginners. Simply find a comfortable place, free of distractions, and quiet your mind. (See this article for more meditation techniques, or this one for a basic meditation for beginners.)
Mindfulness Exercise #2: Deep Breathing
That’s right: mindfulness can be as simple as breathing! Seriously, though, one of the most simple ways to experience mindfulness, which can be done as you go about your daily activities (convenient for those who feel they don’t have time to meditate), is to focus on your breathing. Breathe from your belly rather than from your chest, and try to breathe in through your nose and out through your mouth. Focusing on the sound and rhythm of your breath, especially when you’re upset, can have a calming effect and help you stay grounded in the present moment. (See this article for more on breathing exercises.)
Mindfulness Exercise #3: Listening to Music
Listening to music has many benefits — so many, in fact, that music is being used therapeutically in a new branch of complimentary medicine known as music therapy. That’s part of why listening to music makes a great mindfulness exercise. You can play soothing new-age music, classical music, or another type of slow-tempo music to feel calming effects, and make it an exercise in mindfulness by really focusing on the sound and vibration of each note, the feelings that the music brings up within you, and other sensations that are happening "right now" as you listen. If other thoughts creep into your head, congratulate yourself for noticing, and gently bring your attention back to the current moment and the music you are hearing.
Mindfulness Exercise #4: Cleaning House
The term "cleaning house" has a literal meaning (cleaning up your actual house) as well as a figurative one (getting rid of "emotional baggage," letting go of things that non longer serve you), and both can be great stress relievers! Because clutter has several hidden costs and can be a subtle but significant stressor, cleaning house and de-cluttering as a mindfulness exercise can bring lasting benefits. To bring mindfulness to cleaning, you first need to view it as a positive event, an exercise in self-understanding and stress relief, rather than simply as a chore. Then, as you clean, focus on what you are doing as you are doing it — and nothing else. Feel the warm, soapy water on your hands as you wash dishes; experience the vibrations of the vacuum cleaner as you cover the area of the floor; enjoy the warmth of the laundry as you fold it; feel the freedom of letting go of unneeded objects as you put them in the donations bag. It may sound a little silly as you read it here, but if you approach cleaning as an exercise in mindfulness, it can become one. (I also recommend adding music to the equation.)
Mindfulness Exercise #5: Observing Your Thoughts
Many stressed and busy people find it difficult to stop focusing on the rapid stream of thoughts running through their mind, and the idea of sitting in meditation and holding off the onslaught of thought can actually cause more stress! If this sounds like you, the mindfulness exercise of observing your thoughts might be for you. Rather than working against the voice in your head, you sit back and "observe" your thoughts, rather than becoming involved in them. As you observe them, you might find your mind quieting, and the thoughts becoming less stressful. (If not, you may benefit from journaling as a way of processing all those thoughts so you can decrease their intensity and try again.)
Mindfulness Exercise #6: Create Your Own!
You are probably now getting the idea that virtually any activity can be a mindfulness exercise, and in a way, you’re right. It helps to practice meditation or another exercise that really focuses on mindfulness, but you can bring mindfulness to anything you do, and find yourself less stressed and more grounded in the process.
©2014 About.com. All rights reserved.
We comply with the HONcode standard
for trustworthy health
information: verify here.
|
global_05_local_4_shard_00000656_processed.jsonl/47758
|
Tag Archives: power-o
Basics of the Shotgun Power Read Concept
We see a lot of teams running Power Read concept. Some people call this Power Option, or Inverted Veer, or something else. Whatever you call the play, it’s the old school Power or “Power-O” concept.
What exactly is the Power Read concept? The offensive line is basically blocking Power, except the offense is reading the defensive end instead of kicking him out. If you do this from a 2 back set, the fullback or H-back player can now leak into the alley.
Power Read vs 4-2
Notice The Double Rather than a Combo Block on the 3 Technique
Let’s take a deeper dive into the play, including differences with the traditional power scheme and some clips from Baylor in 2013.
Continue reading
FishDuck.com: Power-O in the Spread Offense
I do have some new posts coming soon, they just need some images, so make sure you keep coming back to Strong Football!
|
global_05_local_4_shard_00000656_processed.jsonl/47768
|
Back to FAQs
Q: What is Amorphous Solar technology?
Amorphous solar panels are created through a deposition process which forms the silicon material directly on the glass. More simply explained the silicon is sprayed on to the glass in very thin layers, commonly known as thin film solar panels. This process allows amorphous solar panels to be better at generating electricity in all lighting conditions.
|
global_05_local_4_shard_00000656_processed.jsonl/47775
|
Take the 2-minute tour ×
Some sub-folders from my iTunes music folder have been deleted from my hard drive, but are still present into my iTunes library (with a "!" sign next to it, showing me that there is a problem with that song). I have a lot of those unplayable songs on my library... Is there a way to rid of all those songs ?
share|improve this question
possible duplicate of superuser.com/questions/130633/… – Shevek May 9 '10 at 20:32
@Shevek: it sounds like exactly the opposite problem. will the solution to that also work for this? – quack quixote May 9 '10 at 20:43
oops, yes, it is the opposite problem... sorry! didn't read it fully. My bad. – Shevek May 9 '10 at 20:49
MacOS or Windows? – Shevek May 9 '10 at 21:31
@Shevek: I made the exact same mistake after reading your comment voted you up, then read @quack quixote's comments and realized he's right. LOL. – Josh May 9 '10 at 23:05
5 Answers 5
Scott Hanselman blogged a C# solution about this last week.
If you are handy with C# then its another good solution.
Source code is provided so if you have C# Express or Visual Studio then you should be good to go.
share|improve this answer
No need to compile or program, since the binaries are provided with the download. – Daniel Beck Jan 26 '11 at 14:31
@Daniel - Ah! I didn't look in the bin directory. Good spot – Shevek Jan 26 '11 at 15:09
That's why I commented on the question. Let's see if it gets you an accept. – Daniel Beck Jan 26 '11 at 15:10
Found this but it is dated 2004 so it may not work if the iTunes API has changed in between
You will need to have Windows Scripting Host installed.
Save this file as RemoveDeadTracks.js
Launch iTunes
Double click on RemoveDeadTracks.js
It will display a message box when done.
share|improve this answer
I did this about 6 months ago, so the APIs are likely still good. – BillN Jul 7 '10 at 21:16
Pardon my ignorance, but can you not just delete them from the library by right-clicking on them and choosing "Delete"?
share|improve this answer
not when there are hundreds or even thousands of them! – Shevek Jul 8 '10 at 7:32
What if you just deleted the entire library from iTunes and then re-imported the folder that contains all your music? That's a sure-fire way to make sure you only have the right stuff in there. – jrc03c Jul 8 '10 at 13:09
I won't go into how absolutely ridiculous it is that there are people actually writing scripts and apps and selling them to fix this problem which should be a BASIC function of iTunes... but i suppose iTunes is getting a cut, so why should they fix it?...
So here is my sledgehammer approach (recommended if you have done major moving/conversion of files in library):
1. Make sure iTunes (application) is not open
2. Go to your iTunes directory (usually ...\My Music\iTunes)
3. Select: "iTunes Library Extras.itdb" + "iTunes Library Genius.itdb" + "iTunes Library.itl" + "iTunes Music Library.xml"
4. Move these to a temporary location (i.e. a folder on your desktop)
5. Go back to the iTunes folder and open up the 'Previous iTunes Libraries' folder and delete everything inside.
6. Open the iTunes application - you will have nothing in there because you've moved the index.
7. Go to File>Add Folder to Library... then select the root directory of your music library.
iTunes will now rebuild your library (might take a while), and therefore not have any dead paths mixed in.
You will need to get all your album artwork again (File>Library>Get Album Artwork) and it may take multiple attempts to get it all back again as it is a little temperamental...
If you're happy with your new library, you can go and delete the original library index files you moved at step 3. If you wanted to restore your old index, just move them back again.
share|improve this answer
If you can sort the column (where the "!" symbol is displayed), then that'd be great, since you can just highlight from the very first track, down to the last (use SHIFT key to do this), and hit DELETE.
share|improve this answer
Sadly, that column is not sortable, which is obnoxious. – Nathan Oct 4 '11 at 1:52
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/47777
|
Take the 2-minute tour ×
I have a script in VBScript. I'm not sure if it contains any syntax errors or other non-runtime errors. Normally I would just run the script, but I don't want the script to actually run because the changes it makes are hard to reverse correctly.
Is it possible to make W/CScript check for syntax errors but not run the script if none were found?
I didn't know if this was better suited for SO but I thought it was more WScript specific, as my question lies with WSCript and not the script itself.
share|improve this question
1 Answer 1
up vote 1 down vote accepted
For those that like to know how I worked around this:
The majority of the script were subs and functions, with only a few lines of code that were executed on startup. I moved those lines into a Sub Main, and places a line to call Main on the first line.
If I needed to check for syntax errors, I could comment the line that calls Sub Main so no code would be executed.
share|improve this answer
protected by Community Oct 11 '13 at 3:49
Would you like to answer one of these unanswered questions instead?
|
global_05_local_4_shard_00000656_processed.jsonl/47778
|
Take the 2-minute tour ×
As far I know, every program consists of a pack of processor instructions with some specific data variables(float, int, char...) to work on the processor registers.
So, the first thing that I thought about it(a long time ago) is that if you know that the ASCII value of %¨#$¨#(just a random example) could be interpreted as the address of the stack pointer register (just exemplifying) of a x86 processor. If this is true, every time that you find this "unreadable" value when reading the content of a binary file, you could interpret that the stack pointer register is being used to manage some data variable.
Unfortunately this doesn't happen. Below, there is a example of the content of the ping.exe program from Windows opened with notepad.exe:
Ping.exe as viewed in MS Notepad
It is a binary file and its data is incomprehensible for us humans (it is comprehensible for machines.) It doesn't make any sense to anyone even if they know Assembly code(the lowest level of machine language.)
So, if I have understood everything correctly, could someone explain
1. Why a binary code can't return to the Assembly code as far they are, down deep, the same thing?
2. If one can understand assembly code, why isn't the compiled binary resulting from this code "readable" anymore?
share|improve this question
You can, you just need a disassembler. – David Schwartz Mar 15 '12 at 18:25
So I can disasembly any .exe file??? I just knew that it works with managed code... – Diogo Mar 15 '12 at 18:28
You can disassemble any executable. Whether you can make sense of the disassembled output is another story. – David Schwartz Mar 15 '12 at 18:30
Compilation or assembly removes lots of human-significant information like variable names, branch labels, etc. Dissasembly get the instruction stream, but you still have a lot to figure out. – mpez0 Mar 15 '12 at 20:01
Also code obfuscation may hinder disassembly. – math Mar 20 '12 at 19:55
3 Answers 3
up vote 12 down vote accepted
First, registers don't have addresses. Each instruction in any assembly language translates to an opcode. Opcodes in x86 can be one, two, three, or even more bytes (in some other processors they are "fixed-width"). Usually the opcode indentifies the instruction, addressing mode, and registers involved. The "addressing mode" determines if more than the opcode is needed by the CPU, i.e. "immediate" addressing mode means there's additional data right after (or "immediately after") the instruction for that instruction - "absolute" addressing modes means that a memory address follows the instruction and is used by that instruction.
You can find out the opcode of something like MOV AL,SP or similar and then search for it. x86 has a lot of instructions that operate on the stack pointer.
But please, please quit using Notepad and use a hex editor instead. I would recommend HxD, although there are many others.
And @David Schwartz is correct. A disassembler will iterate through a file, and translate opcodes back into readable text. What you want to do is totally possible.
However, you need to know where in the file the instructions start because if you start at the wrong address, some data that should be the "operands" to opcodes (such as instructions that take an address for an operand or "argument") might get misinterpreted as opcodes. Knowing this requires knowledge of the format the executable is in, which is for Windows the "Portable Executable" or PE format (and is often ELF for Linux systems). I'm sure there are disassemblers that understand PE, etc. but I don't know of any offhand.
share|improve this answer
Thanks for technical explanations. – Diogo Mar 15 '12 at 18:49
IDA is one of the more common PE dissemblers. Works with Linux and Mac files too. Version 5.0 is still available as freeware – Scott Chamberlain Mar 22 '12 at 4:15
> if you start at the wrong address, … might get misinterpreted. Which is why all occurances of %¨#$¨# won’t necessarily be a reference to the stack-pointer; it might just be the middle of two different commands: _3p%¨# and $¨#b5F (_3p %¨#$¨# b5F). – Synetech Jul 27 '12 at 3:27
You can't see the proper, intended encoding of a binary file through Notepad. Please review this for future reference. Most text editing programs do not parse binary encoding formats, and are expected to parse ASCII character code formatting.
So opening a binary file in a text editor will yield equivalent ASCII characters that do not make any sense of the original format of the binary data as parsed by the text editor. As mentioned, hex editors, and some have binary features, to view the contents in pure binary format.
You are incorrect that the contents of a binary file are unable to be understood. While they will be hard, and in modern computer architectures extremely hard to hand-disassemble from binary alone in to proper instructions recognized by the CPU for execution (or emulated/virtual CPU), etc., it can be done.
How do you think emulators are programmed? The developer would need to know opcodes to be able to program the fictive system to recognize and behave as the real hardware would in some manner. Documentations explain many architectures of CPUs, and even GPUs have them(though more secretive).
Another thing to note is that in the lowest-level, although correlative, the "binary data" is not really a bunch of zeroes and ones, but high-and-low voltages amplified/switched through an electrical circuit as current.
Binary usually is 1:1 with this, so it makes much sense to use the number system for it.
share|improve this answer
So, if I have understood everything correctly
Not quite.
Typically a binary file is incomprehensible to human and machine, especially when the purpose of the file is unknown. Note that not all binary files are executable files. A lot of binary files are data files that do not contain any machine instructions. That is why file extensions are used when naming files (in some OSes). The .com extension was used by CP/M to denote an executable file. The .exe extension was added by MS-DOS to denote another executable file format. *nixes use the execute attribute to denote which files can be executed, although it could be script as well as code.
As already mentioned by others, binary files, which contain numbers, should be viewed by a hex dump program or hex editor and not by a text viewer.
there is a example of the content of the ping.exe program
That file is actually a relocatable program, and not all of the data in that file represents machine code. There is information about the program such as which dynamic libraries it needs, which routines have to be linked, requirements for stack and program & data memory, and the program's entry point. Address operands in the file could be relative values that need to be calculated to absolute values, or references that need to be resolved.
The "program file" that you're probably thinking of is called a binary image file or a dump of program memory. Such a file would contain only machine code and data, with all address references properly set for execution.
Assembly language is not the same as machine language. The typical (as to exclude high-level language computers) CPU accepts machine code as input, one instruction at a time. The operands are either registers or numeric memory addresses. Assembly language is a higher-level language that can use symbolic labels for instruction locations and variables, as well as replacing numeric op-codes with mnemonics. An assembly language program has to converted to machine language/code before it can actually be executed (typically by utilities called assembler, linker and loader).
The reverse operation, disassemby, can be performed on program files with some success and loss of symbolic information. Disassembly of a memory dump or program image file is more trial & error, as code and data locations need to be identified manually.
BTW there are persons that can read and code the (numeric) machine code. Of course this is a lot easier on an 8-bit CPU or microcontroller than a 32-bit CISC processor with a dozen memory address modes.
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/47788
|
Kolla upp vilket ord som helst, t.ex. swag:
Referring to an item composed of gelatin or gelatin-like material. See StrongBad email 84.
Some people are being devoured by a gelatinous monster. Hilary's legs are being digested.
av Steve 12 januari 2005
An insult to describe someone as jelly-like and fat.
Person 1: Can I have some crisps?
Person 2: Get your own!
Person 1: It's only because you're so gelatinous!!
av gelationous 4 maj 2011
an adjective that can be used to describe anything.
look at his gelatinous nips!
that test was so gelatinous!
av jaimchelrohrbenson 16 oktober 2008
An amorphous-describing adjective, used to describe various structures.
Tenille Pegg's disproportionate body is made up of gaping gelatinous hips and zero tits.
av Peter from Popoya 4 oktober 2010
Meaning of a gelatin form commonly known as Jello...ya know the one with the catchy ass theme song....also its just a fuckin awesome word to describe anything of awesomeness
So damn gelatinous!!! How much did she pay you?
av Marine123456 31 oktober 2010
it is a different word for gay David Wade
everyone thinks gelatinous sucks.
av Dallas Longmuir 25 september 2003
|
global_05_local_4_shard_00000656_processed.jsonl/47794
|
Saturday, March 6, 2010
If the Academy asked me: my favorite movie of 2009
Well, it's Oscar weekend and everyone is talking about who's up for what award, and which movie will win Best Picture. For some reason, this year they've decided to put 10 movies in the top category, rather than the usual five; here's a theory as to why the Academy made that decision. And, here are the contenders:
The Blind Side*
District 9
An Education
The Hurt Locker
Inglourious Basterds
A Serious Man
Up in the Air*
The three asterisks are movies I saw this year. Actually not bad (for me), considering some years I haven't seen any, or maybe just one or two--it really depends on the films and the year... I swear I go to the movies, but apparently not to the Oscar-contending ones! How very low-brow of me. I would like to see A Serious Man and An Education (not even sure they've made it to Walla Walla!); the rest? Maybe, but not really compelled. I know, I know. Avatar will change my life. Whatever.
Word on the street is that Avatar will indeed win best picture, but The Hurt Locker will win Kathryn Bigelow a Best Director award. That should be interesting to see! And there are all kinds of great actors and actresses up for awards too; I am hopeful for Meryl Streep in her Julie & Julie role! Regardless, I'll find my way through the event with my happy dvr remote; I don't need to listen to droning acceptance speeches and can focus on what really matters: who is wearing what and does it work on them? This is what the Oscars are REALLY about! (That and who wins, of course.)
But this whole Oscar lead-in is only a tease for me to share MY favorite movie of 2009: (500) Days of Summer. I am a fan, start to finish; it was one of those rare movies that lived up to my expectations, and then some. I have a mad crush on Zooey Deschannel (of the "we'd be buds" variety of crushes, really) and love her singing (check out She&Him for a wonderful album she made with M. Ward in 2008--this is some of my favorite lawn-mowing music! Volume 2 of their music is due out very soon. Excitement!).
Here's the trailer for (500) Days of Summer:
And a great dance sequence from the movie:
Here are the two stars in their own music video, featuring She&Him's song, "Why Do You Let Me Stay Here?"
I was happily gratified to see that (500) Days of Summer won for best screenplay at the Spirit Awards today! Maybe not as "mainstream" as the Oscars, but still...
The fan base for (500) Days of Summer is quite large--can we say cult following?--and there are many fan pages on Facebook devoted to talking about how wonderful the movie is and how sad that it was shut out from the Oscars. And, here's a wedding proposal tribute in the style of Tom's dance routine above. If you have to propose in a mall setting, I suppose this is a clever way to do it.
I hope my ardent love for this movie at least prompts you to see it, if you haven't already. No huge blue aliens or IEDs exploding, no Colin Firth or George Clooney... but some great storytelling. Maybe not a love story, but definitely a story about love.
1 comment:
1. I haven't seen (500). I need to, especially since this year's Oscar nominees interest me so little.
|
global_05_local_4_shard_00000656_processed.jsonl/47798
|
Oops, an error
Loading. Please wait.
Autumn Leaves Lesfeuilles Mortes Guitar Pro
22,493 views 24 this week
no commentswrite comment
1 2 3 4 5
x 2
set tempo
12 Kb
WARNING: You are trying to view
content from Ultimate-Guitar.com
in an unauthorized application,
which is prohibited.
Please use an official Ultimate
Guitar Tabs application for iPhone,
iPad or Android to access legitimate
chords, guitar, bass, and drum tabs
from Ultimate-Guitar.com database.
Type "ultimate guitar tabs" in Apple
App Store's or Android Market's
search to find the application.
"Autumn Leaves Lesfeuilles Mortes" by Chet Atkins
or get full version
To get full version
of this and 200,000 more tabs
start free trial
or play demo again
Click here to download the latest Flash player.
You can get instant access to “Autumn Leaves Lesfeuilles Mortes” right now.
Get unlimited online access to 200,000+ tabs with HQ playback
and tempo control by starting your free 3-day trial!
Get FREE Trial
To download “Autumn Leaves Lesfeuilles Mortes” Guitar Pro tab click button below
Please note that you must have Guitar Pro software installed on your
report bad tab
1 2 3 4 5
I want to post or [tab]
You may want to rate the tab now too:
select rating
|
global_05_local_4_shard_00000656_processed.jsonl/47799
|
Oops, an error
Loading. Please wait.
Rockin With My Friends Guitar Pro
by Sia
407 views 1 this week
no commentswrite comment
1 2 3 4 5
please rate
set tempo
11 Kb
rhythm guitar, bass, percussion, other
WARNING: You are trying to view
content from Ultimate-Guitar.com
in an unauthorized application,
which is prohibited.
Please use an official Ultimate
Guitar Tabs application for iPhone,
iPad or Android to access legitimate
chords, guitar, bass, and drum tabs
from Ultimate-Guitar.com database.
Type "ultimate guitar tabs" in Apple
App Store's or Android Market's
search to find the application.
"Rockin With My Friends" by Sia
or get full version
To get full version
of this and 200,000 more tabs
start free trial
or play demo again
Click here to download the latest Flash player.
You can get instant access to “Rockin With My Friends” right now.
Get unlimited online access to 200,000+ tabs with HQ playback
and tempo control by starting your free 3-day trial!
Get FREE Trial
To download “Rockin With My Friends” Guitar Pro tab click button below
Please note that you must have Guitar Pro software installed on your
report bad tab
1 2 3 4 5
I want to post or [tab]
You may want to rate the tab now too:
select rating
|
global_05_local_4_shard_00000656_processed.jsonl/47813
|
Forgot your password?
+ - UK 'Snooper's Charter' Is Losing Political Support->
Submitted by
judgecorp writes "The Communications Data Bill, the so-called Snooper's Charter is losing political support. The Liberal Democrats, junior parters in the Coalition, are reportedly about to abandon the Bill, which proposes to allow police to access communications data without a warrant. Labour party opposition could also appear, making it a dead duck."
Link to Original Source
UK 'Snooper's Charter' Is Losing Political Support
Comments Filter:
|
global_05_local_4_shard_00000656_processed.jsonl/47822
|
Export (0) Print
Expand All
SQL Server Service Broker
SQL Server Service Broker provides native support for messaging and queuing applications in the SQL Server Database Engine. This makes it easier for developers to create sophisticated applications that use the Database Engine components to communicate between disparate databases. Developers can use Service Broker to easily build distributed and reliable applications.
Application developers who use Service Broker can distribute data workloads across several databases without programming complex communication and messaging internals. This reduces development and test work because Service Broker handles the communication paths in the context of a conversation. It also improves performance. For example, front-end databases supporting Web sites can record information and send process intensive tasks to queue in back-end databases. Service Broker ensures that all tasks are managed in the context of transactions to assure reliability and technical consistency.
The reference documentation for Service Broker is included in the SQL Server 2012 documentation. This reference documentation includes the following sections:
See the previously published documentation for Service Broker concepts and for development and management tasks. This documentation is not reproduced in the SQL Server 2012 documentation due to the small number of changes in Service Broker in SQL Server 2012.
Messages can be sent to multiple target services (multicast)
The syntax of the SEND (Transact-SQL) statement has been extended to enable multicast by supporting multiple conversation handles.
Queues expose the message enqueued time
Queues have a new column, message_enqueue_time, that shows how long a message has been in the queue.
Poison message handling can be disabled
The CREATE QUEUE (Transact-SQL) and ALTER QUEUE (Transact-SQL) statements now have the ability to enable or disable poison message handling by adding the clause, POISON_MESSAGE_HANDLING (STATUS = ON | OFF). The catalog view sys.service_queues now has the column is_poison_message_handling_enabled to indicate whether poison message is enabled or disabled.
AlwaysOn support in Service Broker
Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
Community Additions
© 2014 Microsoft
|
global_05_local_4_shard_00000656_processed.jsonl/47823
|
Export (0) Print
Expand All
Kerberos authentication and delegation for Monitoring Server
PerformancePoint Server 2007
Updated: 2009-04-09
The articles in this section outline the changes that are required to get PerformancePoint Monitoring Server working using delegation.
Delegation enables a Web application or service to use the caller’s identity to access remote network resources. Delegation operates based on Integrated Windows authentication and the Kerberos protocol. Scenarios that require the use of delegation are commonly referred to as double-hop scenarios. In the case of PerformancePoint Monitoring Server, this would include scenarios where Internet Information Services is located on a different computer from the target data source.
Configuring delegation for PerformancePoint Monitoring Server may require changes to the application pool identity user accounts, the service principal names (SPNs) registered in the Active Directory directory service, and the client and middle-tier servers. Based on the environment, different configuration options are explained, including constrained delegation.
Before you deploy Monitoring Server, you must ensure that your environment meets the following prerequisites:
• All users must be part of the same Active Directory domain.
• Active Directory must be configured in at a Windows 2000 Native functional level or higher. For more information about domain functional levels, see Active Directory Functional Levels (http://go.microsoft.com/fwlink/?LinkId=99679).
If you choose to deploy constrained delegation, Active Directory must be configured at a Windows Server 2003 functional level.
Download this book
See the full list of available books at Downloadable content for PerformancePoint Monitoring Server.
See Also
Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
© 2014 Microsoft
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.