id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_05_local_4_shard_00000656_processed.jsonl/54681
|
যেকোনো শব্দ খুঁজুন, যেমনঃ porb:
Any of the five terminating members of the hand. A digit of the forelimb. Finger.
As victory became certain, the evil genius gleefully wiggled his tingle-probes.
লিখেছেন- Conwhore the Terrible 13 de সেপ্টেমবার de 2007
Words related to tingle-probe
digit finger hand member probe tingle
|
global_05_local_4_shard_00000656_processed.jsonl/54683
|
The Motley Fool Discussion Boards
Previous Page
Stocks K / Kinder Morgan Energy Ptnr
Subject: New Water Cleaning Process Date: 12/11/1998 12:24 PM
Author: RFY Number: 3 of 6
Anyone have information on the impact of the new contaminant break-down process developed by Kinder Morgan?
|
global_05_local_4_shard_00000656_processed.jsonl/54684
|
The Motley Fool Discussion Boards
Previous Page
Investing/Strategies / Retirement Investing
Subject: Re: Proceeds of a house sale... Date: 5/10/2000 1:17 PM
Author: MattMiler Number: 21876 of 75383
Given this new information, I would recommend reducing the S&P allocation to 10% (or less, depending on current income needs vs. availability gap) and forgetting about the mutual fund (invest that in the higher return bonds instead).
This is just my two cents - I would also recommend consulting with friends and possibly a financial advisor....
- Matt
|
global_05_local_4_shard_00000656_processed.jsonl/54686
|
Win a lobster in classic lobster claw game
We've all played one of those arcade "claw" games where a mechanical lobster claw is rigged to let go of prizes. But have you ever played with the prizes being live lobsters? [The Atlantic]
The life and death of the American arcade
At The Verge, Laura June takes us on a beautifully-illustrated journey through the life story of the American video arcade:
A young couple here in Pittsburgh recently tried to open an arcade, only to find that bizarre licensing laws make it all but impossible.
Atari Compugraph
Innovative leisure courtesy of the Arcade Museum. The reverse side explains the coolness for contemporary business operators; the arcade distributor it was addressed to appears to still be in business! Clearly, they bought ten of these babies and knew what to do with 'em. [Thanks, #8384!]
|
global_05_local_4_shard_00000656_processed.jsonl/54695
|
TABLE 3-10 Rates of Preventable ADEs in Ambulatory Care
Preventable ADE Rate
Proportion of ADEs Preventable (No. of ADEs in study)
ADE Rate
Gurwitz et al., 2003
1.4 per 100 patient-years
28% (1,523)
5 per 100 patient-years
Gandhi et al., 2003
5.4 per 100 patients
20% (181)
27 per 100 patients
• Preventable ADEs occurring in hospitals—Classen and colleagues (1997) projected 380,000 occurring annually and Bates and colleagues (1995b) 450,000. These are likely underestimates given the higher preventable ADE rate found in another study using more comprehensive ADE identification methods (Jha et al., 1998).
• Preventable ADEs occurring in long-term care—Gurwitz and colleagues (2005) projected 800,000—again likely an underestimate given the higher ADEs rates of other studies (Gerety et al., 1993; Cooper, 1999).
• Preventable ADEs among outpatient Medicare patients—Gurwitz and colleagues (2003) projected 530,000.
Underutilization and Overutilization of Medications
Both underutilization of medications (the failure to prescribe medications for which there is an evidence base for reduction in morbidity and mortality) and overutilization of medications (prescribing of medications for which there is no evidence base for reduction in morbidity and mortality) are common in hospitals, nursing homes, and the ambulatory setting. The committee found well-documented evidence of inadequate treatment for acute coronary syndromes, heart failure, chronic coronary disease, atrial fibrillation, bacterial infection prophylaxis, and thrombosis prophylaxis in hospitals. Underutilization of medications in nursing homes and assisted-living facilities relative to national standards is best documented for pain management, congestive heart failure, and use of anticoagulants in stroke prevention and atrial fibrillation, but there is also limited evidence for deficits in use of medications for depression, myocardial infarction prophylaxis, and treatment of osteoporosis. Overutilization of medication is best documented in the treatment of colds, upper respiratory infections, and bronchitis by antibiotics.
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement
|
global_05_local_4_shard_00000656_processed.jsonl/54730
|
Big Requirements Up Front
If you don't ask for it you won't get it.
Write down everything you could possibly ever need into a book, and make the coders sign it. Then, at acceptance time, for every missing line item that you find you still need, make the coders work for free to complete it.
See ChaosReport? (summary: ).
From BigDesignUpFront:
A customer cannot "steer" the project if they do not know - on a high level - what they want this project to become.
I found this statement interesting because I found it 180 degrees opposed to my viewpoint. I feel the customer (specifically the front line users) know exactly what the project should become. It is the developers who need to know what the project should become. The question are the more effective and efficient means of communication from the users to the developers.
The problems I see with "Big Design Up Front" are that the two parties most interested in the communication (users and developers) are omitted; and the context of the user environment is lost when a large document listing precisely defined requirements is created.
I have become firmly convinced that there is no substitute for having individual developers spend a day with individual users and understanding the environment of the user's job. The developers invariably come back from the experience with drastically changed views of what they should be doing. Developers have to intuitively make hundreds of unconscious decisions while creating software; direct user experience provides a context for those decisions.
Again, the point is how best to get information and knowledge communicated from users to developers.
-- WayneMack
So when the military wants to develop a new airplane, they make the requirements, but past that do you think they are the best people to know exactly what the project should become?
Who would be better than the pilots in describing what the cockpit should look like? Who would be better than the maintenance crew to define common parts and repair and replacement needs? I would tend to assume that the military probably does understand military needs.
Who would be better to come up with discontinuous breakthrough rather than the status quo?
Per WilliamEdwardsDeming, new knowledge can only come from outside a system; a discontinuous breakthrough would come from someone other that those involved with the current version. Discontinuous breakthroughs, however, are nearly impossible to predict. If one has a planned schedule and budget, it would be extremely risky to depend upon a set of discontinuous breakthroughs. Be content with the status quo and continuous improvement of the status quo.
I tend to agree with this, based on several project where the requirements were coming from the customer management, and the rank and file had totally different needs. However, unless the customer agrees to have the end users available for questions, you aren't going to get incremental requirements. --PeteHardie
Yes, unfortunately in the real world, "the best source" is not usually the same as "the best available source." There are usually ways to get user contacts, however, particularly if the developers are will to go out to meet the users rather than having the users come in to meet the developers. Early in the requirements process, one can have a "Workflow Analysis" or a "Site Survey." Later, one can have a "User Conference," "User Acceptance Test," or a "Pilot Site." Many users are quite willing to describe what they do if someone shows an interest and will answer questions over the telephone or via e-mail once one has made a contact. These users can provide a great deal of guidance in interpreting a Big Requirements Up Front document and allow at least an incremental development to occur. -- WayneMack
I disagree with this completely. Fifty percent of the people in this world are dumber than average. As far as I can tell, all of our customers are in this group. For every project I have ever worked on in my career, my organization's services were needed for not one but two reasons: In this scenario, I can not envision an alternative to this process.
Concur. I used various public domain and Internet sources to create a set of white papers for a client wishing to improve their engineering process. This set of papers includes an engineering glossary, software coding guidelines, software design guidelines, and others. The single most important paper in the whole mess is the one describing "Where Software Comes From."
The best way to eliminate shifting goal posts is to identify the goals in the original requirements. This can be done in a formal manner by using tools such as the QFD model (zero-sum game) and Fagan inspection or something similar. This is not an excuse for setting all the requirements in stone such that they can never change. Instead, requirements need to be organized into those which must remain unchanged, those that can be altered, and how much leeway there is in changing them.
The papers are up on my biz site for one and all to see, copy, edit, distribute, and abuse as y'all see fit.
-- MartySchrader
The above comes across as user-bashing to me. I try to approach it from the point of view that everybody knows *something* more thoroughly than others, but no one person knows everything. Users know what they need better than an outside analyst does. However, the outside analyst may have more experience selecting, presenting, and weighing the various options.
For example, as a home owner, I may know that my (house) windows are cracking and need repair or replacement. However, I don't really know all the replacement options and their trade-offs. A windows expert can provide such, but the home owner still needs to participate in the process.
It's a matter of working together to match what needs to be done with what can be done within practical constraints. It's a give-and-take process. A domain-poor analyst is asking for trouble if they ignore users. I've built/designed what I thought were nice simple abstractions that simplified everything only to find out there were a lot of gotcha's that snuck up on us, requiring a fundamental rethink. Users having difficulty describing what they want is not the same as users being useless to the process. --top
[While there is clearly some user bashing going on (although I'm not sure about the wisdom of declaring that only dumb people hire me.), there is truth in the statement that users often do not know what they want. I've worked in a domain where most of the clients were quite intelligent, they simply were ignorant about technology. These clients would typically come up with some idea, often with negative impacts, and we would have to engage in a (usually) long and drawn out process of working out what they really wanted. Often this had little to do with the original idea they started with. This does not mean that the customer should be left out of the process (except when it comes time to mail the checks), but too often, what they say they want, and what they really want do not coincide.]
Usually there is a manager who decides what features to include and which are outside the scope. If rank-and-file users wonder outside of stated scope, or into suspicious territory, then perhaps consider referring it to the central manager. (Off-scope features may suggest good future business ideas if you are an outside consultant.) I generally like to collect all suggestions and/or suggested features, and then have the top-level customer rank them. This will at least help focus the project. Depending on the formality of the situation, you may even want them to sign off on the ranking. If the ranking keeps mutating often, then you have documentation to that fact. Some changes are inevitable. Excess changing is a problem. --top
[We developed semi-custom software for very small companies (6-8 people was common). The people who came up with the original ideas often were the only management/ownership they had. They rarely had more than one active request at any given time, so there never was an issue of ranking. Often we had to make the suggestions because the ones the clients supplied didn't actually meet their needs.]
Living organisms with nervous systems have a wonderful characteristic of avoiding pain. Pain is a feedback mechanism that is amazingly fast -- although pain sucks, it has a strong tendency to keep us alive. Perhaps more important is the interaction between pain and memory. People touch flame, in general, only once in their lifetimes. They quickly learn that flame hurts. Likewise, people tend to become acutely aware of "mass" when they get mowed over by something heavy (either by dropping a box of stuff on their foot, or getting pummeled by their family dog, or...). Last but not least, people also acutely learn how electricity feels when a high-voltage static discharge occurs, or if they accidentally touch a "hot chassis" of some device, which tends to permanently engrain electrical safety into their heads.
Through this instantaneous feedback mechanism, all of which involves pain, the unschooled become schooled in the ways of the world. One such pain is economic pain, and the realization that, "Hey, you know, this is really costing me money." Thus, the value of the PlanningGame is to give pain to the customer, when the customer does something stupid. The rapid feedback of critical information, such as estimates of time to completion, and relative priorities, helps hone the client's concept of what he really wants. It forces the client to become more aware of what is involved with the software's construction, particularly since the client is paying the coders each iteration.
Hence, claiming that "customers are dumb" applies only to those development processes which do not involve the customer in the development cycle. As soon as the customer starts to see what is involved in the development of his requested features, he very quickly becomes much more fiscally (and thus, feature) conservative.
Never under-estimate the power of pain. --Samuel A. Falvo II
[I certainly agree that leaving the customer out completely is so rarely a good idea we can just say "don't do it." But if we had taken a "you asked for X, it costs Y, will you pay?" approach we would have "pained" both them and ourselves out of existence. I must stress that the customers were not dumb, but ignorant. If I had attempted to do their job, I would have floundered around just as badly as they did attempting to suggest improvements to the technology we provided.]
You seem to be suggesting that the hard decisions be delayed as long as possible for "harmony". I don't know the political situation you faced, but from a "technical success" standpoint, making the hard choices up front is the better bet in my experience. The mess in Iraq is partly due to local governments postponing difficult decisions because they can ride the back of the USA for now (both as a police force and as a scapegoat). --top
[No. That would have lead to us doing the project they originally suggested and let them find out for themselves what the problems with it were. It's much harder to tell them, "This idea doesn't work because of such and such.", extract why they felt they wanted that in the first place, and find something that actually works then to just say "yes, sir" and let them deal with the consequences.]
People want a sense of control over their destiny even if its not always the best technical choice. One trick is to let them have their way with relatively harmless or low-impact issues to satisfy that sense. That may buy you enough influence wiggle-room to affect the bigger issues. If you feel you need control over most or all aspects in order for the project to be successful, rather than pushing for that at all costs, perhaps its time to renegotiate expectations. If "X will only work under conditions A, B, and C", but only A and B are possible/likely, then its time to rethink the price, time-line, etc. Always build in "room for crap" in estimates.
I'd like to inject a term here that XPers and other so-called "agile" types roundly loath: architecture.
First of all, let's define that this is, shall we?
Architecture is the base, irreducible, and immutable set of rules defining how a system works.
and you are smart enough to know them all when you start. props! [Try not to be such a smug turd, eh? Read some more before posting.]
Architecture rules are base because they define a system at its core functionality. You can have me build you a toaster or a coffee maker, but it has to be either one or the other -- not both. You have chosen a toaster. Are you absolutely sure? You better be.
They are irreducible rules because you have defined the toaster I am making in terms of what it absolutely must do to be a successful toaster. It has to cook one or more slices of toast simultaneously, both sides simultaneously, and evenly on both sides. If any of these rules are not met then it isn't a successful toaster. So, if it can't toast one slice by itself or if it cooks unevenly then it is a craprod.
They are immutable because once you have set these rules into place you can't change any of them without changing the target into a different product. You told me to build you a toaster. I've started building a toaster. I can't make it a coffee maker now. If you want a coffee maker I need to start over from a clean white sheet of A size.
The (un)common wisdom about architecture is that these are the rules you will have to live with for the lifetime of the system, so they need to be chosen with care.
Now, note that the architecture just says that the toaster will be capable of toasting one or more slices of bread. The architecture doesn't call out limits on how many slices the toaster can handle. This is the kind of detail that the client hems and haws over as development continues. Two slices or four slices? Two slices or four? Two or four? Bicker, bicker, bicker. Nit, nit, nit. Pick, pick, pick.
All the while you are sitting back, comfortable in the knowledge that any choice they make will not affect your base, irreducible, and immutable rules that you have set in stone.
Go ahead and let the client thrash out the details of the product all they want. Your architecture remains safe.
And if I do want a toaster and coffee machine combo? With this approach, a printer is not a scanner, a scanner is not a printer, and neither are fax machines or photocopiers, so you can never have the hybrids that have become so successful in the SoHo? market. -- zfx
XP works with all practices supporting each other. See RefactorMercilessly. And note that printer, scanners, and fax machines are not DRY - they fail "DontRepeatYourself". Refactor them!
Hmph. Please, folks, let's not drown the basic concept in useless trivia. The idea of setting an architecture in place is so that there are ground rules for defining what the product is. In the case of a printer/fax/copier, the product is a combination of an imager and an image capture device. Note that these functions are independent and need to be defined separately, even though their functionality has been combined into a single box.
Even with a wideband product like a combo printer/fax/copier, you still need to set limits on the architecture so that the client doesn't get crazy with features. So, the combo box can print, send faxes, and copy, but it can't do XY plotting. That's because it isn't a plotter. There are no provisions in the architecture for interpreting XY plotting commands, nor math capability for drawing vectors, nor any of the jillions of other things a plotter needs to do. Why? Because the architecture forbids it.
This is the reason for establishing an architecture. You have saved yourself and your client from needless grief in trying to shoehorn a plotter into a fax machine because you defined the product as a fax/printer/yada yada yada before you ever started. By setting these limits up front you then avoid shifting goal posts later on.
Now is it clear?
In a contract relationship, you should use BigRequirementsUpFront AntiPattern for everything you've asked for will turn up to be a good leverage in contract negotiation once you need it. In a more trustworthy environment, if you have good BusinessAnalysts, let's say you won't need to express everything.
Right, see, that's the point. If you have a clear grasp on the difference between what has to be there and what is more likely to change as discovery progresses then you don't have to have moving goal posts. You can specify the hard requirements up front and only resolve the wishy-washy requirements as they need to be solidified. Establishing an architecture isn't an anti-pattern; it is a necessary component of establishing a baseline of operation for the product.
See: AgilityTest (hint: you are the customer), TheAlmightyThud, BrufPredictsFailure, RequirementsGathering
CategoryRequirements, CategoryAntiPattern, CategoryProcess
EditText of this page (last edited February 17, 2012) or FindPage with title or text search
|
global_05_local_4_shard_00000656_processed.jsonl/54731
|
Tuesday, March 06, 2012
Oh, Pretty Woman
I felt blogging guilt, so I recorded a video first. Screenshots never do me justice and this one is no different. Otherwise, I modified some of the lyrics because I simply can't imitate them.
Pretty woman, walking down the street
Pretty woman, the kind I like to meet
Pretty woman
I don't believe you, you're not the truth
No one could look as good as you
Pretty woman, won't you pardon me
Pretty woman, I couldn't help see
Pretty woman
That you look lovely as can be
Are you lonely just like me
Pretty woman, stop a while
Pretty woman, talk a while
Pretty woman, give your smile to me
Pretty woman, yeah yeah yeah
Pretty woman, look my way
Pretty woman, say you'll stay with me
'Cause I need you, I'll treat you right
Come with me baby, be mine tonight
Pretty woman, don't walk on by
Pretty woman, don't make me cry
Pretty woman, don't walk away, hey...okay
If that's the way it must be, okay
I guess I'll go on home, it's late
There'll be tomorrow night, but wait
What do I see?
Is she walking back to me?
Yeah, she's walking back to me
Oh, oh, pretty woman
No comments:
|
global_05_local_4_shard_00000656_processed.jsonl/54737
|
CFP: [Film] Film and Literature: Reimagining the Relationship
full name / name of organization:
James Lange
contact email:
This call is for a panel at the Free Exchange Graduate English Conference
at the University of Calgary, March 28-30, 2008. Deadline for proposals
is February 18th, 2008. For more information please e-mail James Lange at
When one considers the linkages between film and literature, it is often
difficult to think beyond recent highly successful adaptations, namely
The Lord of the Rings and Harry Potter movies. While adaptation is an
important aspect of the literariness of film, it is by no means the only
point of connection between the page and the screen. In this panel I am
looking for unique considerations of film as literature, film in
literature, or the literariness of film. The scope of this panel might
include everything from script and adaptation studies, to Shakespeare and
comic books adapted for the screen. Topics might include, but are in no
way limited to:
• The script as a literary work
• Books written after the film
• Adaptations: children’s literature, romance novels, westerns,
science fiction novels, comic books, autobiographies, religious texts,
• Disney’s fairy tales
• Writers or literature in film
• Authors known for both their books and the movies made from them
(Stephen King, John Grisham, J. K. Rowling, Tom Clancy, etc.)
• Issues surrounding the 2007/08 writer’s strike
length) to panel chair James Lange at Attachments
professional affiliation, and contact information in the body of your
email. Deadline for proposals is February 18th, 2008.
From the Literary Calls for Papers Mailing List
more information at
Received on Thu Jan 17 2008 - 23:47:49 EST
cfp categories:
|
global_05_local_4_shard_00000656_processed.jsonl/54763
|
Petrochemistry and Geotectonic Setting of Granitic Rocks in Aderan Area, S.W. Nigeria
C. T. Okonkwo, I. O. Folorunso
Aderan area, southwestern Nigeria is underlain by metaigneous and metasedimentary rocks which have been intruded by granitic rocks of probable Pan-African (ca. 600 Ma) age. Four types of granitic rocks have been identified in the area, including granitic gneisses, medium-grained granite, porphyritic granite and granodiorite. Geochemical analysis show that the rocks are largely calc-alkaline. The granodiorite is less siliceous and more calcic, and also contains less Ba, Nb and Rb, and more Sr, Ce and La than the granites. Tectonically, the rocks classify as volcanic arc and syn-collisional and possibly late-to- post-collisional granitic rocks with respect to the Pan-African orogeny. Chemical characteristics indicate that these rocks were derived from partial melting of mafic to semi-pelitic (metasedimentary) crustal rocks under conditions of intermediate oxygen fugacity and activities of H2O.
Full Text: PDF DOI: 10.5539/jgg.v5n1p30
Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.
Copyright © Canadian Center of Science and Education
|
global_05_local_4_shard_00000656_processed.jsonl/54765
|
Skip to content
June 6, 2007 / cdsmith
Learning Number Theory and Haskell: Greatest Common Divisor
This is part three of my series, “Learning Number Theory and Haskell”, in which I work through Gareth and Mary Jones’ Elementary Number Theory and translate the ideas and concepts into Haskell. In the previous two parts, I used QuickCheck to verify some theorems and translate some ideas into Haskell code.
It is widely speculated that the first real algorithm worthy of the name was due to Euclid, when he described how to calculate the greatest common divisor of two terms. What better place to start, then in writing a first serious algorithm in Haskell? (Besides, the textbook does this next.) In the process, I’ll use “equational reasoning” (a popular word in functional programming) to improve the code. Then I’ll try something completely different to finish off
First, let’s write a type signature. Greatest common divisors can be calculated with integral values only, and maps two numbers to a result. The signature is:
For a first version of the algorithm, I plan to transcribe the proof from the text as code. There are a few trivial cases involving zero gotten near the top of page 6. We can write those separately using pattern matching.
gcd1 0 0 = undefined
gcd1 a 0 = abs a
gcd1 0 b = abs b
There are a few more special cases for non-zero arguments.
gcd1 a b | a < 0 = gcd1 (-a) b
| b < 0 = gcd1 a (-b)
| a == b = a
| a < b = gcd1 b a
-- Phew!
| otherwise = gcd1 b (a `rem` b)
Let’s test against the built-in gcd function from the prelude. The only subtlety here is that since gcd 0 0 is undefined, we should avoid calling it.
*NumTheory> :qc \a b -> (a /= 0 || b /= 0) ==> gcd1 a b == gcd a b
+++ OK, passed 100 tests.
We’ve got a working gcd1. However, it is terribly unsatisfying. By following the textbook to the letter, we ended up with a function defined with eight separate cases. Yuck!
The problem is that our number theory textbook handled a lot of stuff as special cases to get it out of the way easily for the proof. Many of those special cases aren’t all that special after all, and we can clean this up by finding equivalent cases and combining them. This is really easy to do and get right in Haskell, once you’ve got the hang of it, because Haskell functions can be read and substituted just like algebra equations. This concept is often called “equational reasoning”, and is cited as an advantage of pure functional programming. The ease of doing this is a direct consequence of not having side effects.
The last two cases cover when a < b, and a > b, respectively. However, the last case subsumes the next to last one, because if a < b (with a and b both positive), then a `rem` b is equivalent to a. That eliminates one case. Similarly, the third from last case is unnecessary. If a = b, then gcd1 a (a `rem` b) evaluates to gcd1 a 0, which in turn evaluates to abs a. Since we know a > 0 if the evaluation gets this far, this is the same as a. This case is also unnecessary. A similar argument proves that gcd1 0 b = b is unnecessary. That leaves:
gcd1 0 0 = undefined
gcd1 a 0 = abs a
| b < 0 = gcd1 a (-b)
| otherwise = gcd1 b (a `rem` b)
This is better, but it’s even shorter to promote the check for negative values of a and b and for gcd1 0 0 to an outer function. The where keyword can be used to define an inner function that is available only within a particular top-level function. The result looks like this:
gcd1 0 0 = undefined
where gcd1' a 0 = a
Eliminating all of these special cases could be interpreted as an indication that we didn’t need them to begin with. As an exercise, try rewriting the proof in the text without assuming anything except that a and b are non-negative and are not both zero.
Rerunning the test suite to verify:
+++ OK, passed 100 tests.
Another implementation of the greatest common divisor is interesting (though, ultimately, it doesn’t perform as well.) One way to look at the algorithm is that we are inductively defining a list of number pairs which all have the same divisors. We start with (|a|, |b|) as the first element in the list, and then define a function to get from there to the next element. That looks like this:
gcd2 0 0 = undefined
vals = iterate next (abs a, abs b)
in ans
We first define a next function that takes us from one pair of numbers to the next. Then we use a Haskell standard library function, iterate, to build a list of values resulting from successive applications of next to the pair of numbers. Finally, we look for the first entry from that list that has 0 for its second number. The result is the first number of that pair. You can use QuickCheck to verify that it gives the same answer as the other two algorithms above.
This introduces an explicit data structure to represent the structure of the algorithm. Sometimes, doing this can make algorithms clearer. In this case, it’s just an interesting alternative. It involves some new concepts: an infinitely long list, a higher-order function, and another interesting use of pattern matching. If you don’t understand it yet, take some time to poke around the standard library documentation. Don’t despair, though; I’ll talk about more of these ideas in future installments.
About these ads
Leave a Comment
1. Dylan Thurston / Jun 6 2007 4:16 pm
Please fix a bug in the standard prelude by deleting this case:
gcd2 0 0 = undefined
The gcd of 0 and 0 is 0. I don’t know what the Haskell gods were smoking.
2. cdsmith / Jun 6 2007 5:41 pm
The definitions for corner cases can certainly be somewhat arbitrary. However, in this case there seems to be a popular agreement that the greatest common divisor of 0 and 0 is undefined. Everything divides 0, so all integers are common divisors of 0 and 0; and the set of integers has no maximum element.
3. Cale Gibbard / Jun 6 2007 11:03 pm
I was originally going to agree with that reasoning (gcd 0 0 = undefined, because everything divides 0), but there are actually a couple good reasons to define gcd 0 0 to be 0. For one, it turns the natural numbers into a complete distributive lattice, with gcd as meet and lcm as join. Secondly, it agrees with the general definition for commutative rings: d is called a common divisor of a and b if there are elements x and y such that d*x = a and d*y = b, and if every common divisor of a and b divides d, then d is called a greatest common divisor of a and b. (In general rings, they’re not unique or guaranteed to exist, but in integral domains, they’re unique up to multiplication by units.)
4. Jeff / Jun 7 2007 10:26 am
But to quote the infallible Wikipedia: “It is useful to define gcd(0, 0) = 0 and lcm(0, 0) = 0 because then the natural numbers become a complete distributive lattice with gcd as meet and lcm as join operation. This extension of the definition is also compatible with the generalization for commutative rings.”
5. Jeff / Jun 7 2007 10:28 am
Doh, sorry for the redundant comment. That will teach me to reply to a post that’s been sitting unrefreshed on my screen all night.
Leave a Reply
You are commenting using your account. Log Out / Change )
Twitter picture
Facebook photo
Google+ photo
Connecting to %s
Get every new post delivered to your Inbox.
Join 73 other followers
%d bloggers like this:
|
global_05_local_4_shard_00000656_processed.jsonl/54766
|
An A to Z of Theory | Jean Baudrillard: a new system of meaning
In the latest instalment of his series on Jean Baudrillard, political theorist Andrew Robinson explores the implications of the French thinker's theories of 'the code' and 'reproduction' for meaning and communication.
In Theory, New in Ceasefire - Posted on Friday, May 18, 2012 11:13 - 3 Comments
Reality TV: “creating the illusion of watching things as they would be with no cameras there.”
Previously articles on Baudrillard have explored the capitalist code and reproduction. This week we explore the implications of these theories for meaning and communication, explaining why, for Baudrillard, everyday meaning is completely penetrated by capitalism. We also explore why, in spite of this penetration, capitalist power is not complete.
Public opinion is one of the new realities which results from the code. It does not exist separately from the specific options provided by pollsters. Often, responses involve guessing what is expected or assumed by those asking the questions. Baudrillard thinks this is a fatal problem with surveys and questions. Respondents always respond the way they think the questioner wants. The process of questioning is therefore entirely circular. The questioner gets out what they put in. (This response to the questioner is also taken to undermine psychoanalysis). Often, public opinion also generates events rather than reflecting them. It becomes yet another model.
Social relations are reorganised in terms of binary codes, such as question/answer and stimulus/response pairings. In cases such as data mining, even individuals can be mapped as sets of digital information. The whole of social reality becomes subject to a regime of ‘descriptive transparency’. Baudrillard sees this process as an infinite division of social reality – the application of a series of binary oppositions. The reading of texts becomes a perpetual test, like a question-answer test. Dialogue between text and reader disappears. Instead, textual choices locate the reader at a point in the code. This creates a densely monological relation. The system makes a naked demand to which no response is possible.
Similarly, objects become tests. The object no longer exists to serve a use. It is a sign which locates the consumer at a particular point in the code. People learn to respond to and decode the code in its own terms, as a series of either-or options. The system tries to induce constant active participation in this process, seeking a joyous, spontaneous feedback. Television, for instance, requires viewers to constantly complete an image they have only partially processed. The system also seeks a kind of permanent mobilisation: people are still fixed in place, whether in factories, consumption sites, prisons, schools, or retraining. This process is a mirror of the code’s attempts to imagine everything as having a place. Rather than a system of production, the system becomes a reading strip, filled with signs to be coded and decoded. Everyone is turned into a terminal for the system.
The system does not appear to be totally controlling, because it is binary. For Baudrillard, this binary system is a way of introducing tactical flexibility into a monopoly system. It is not a genuinely competitive system, but rather, a system of counting or doubling (two identical alternatives). The World Trade Centre is seen as a symbol of the system’s omnipotence, and of its practices of doubling.
This system of testing and questioning alters the construction of meaning. There is now a new regime of truth – not of the mirror or the panoptical gaze, but a ‘manipulative truth’ of a code which interrogates via tests, remembers one’s preferences, or genetically determines things in advance. It is a regime of collective voyeurism – the public spying on itself. It leads to a new kind of uncertainty arising from an excess of information of indeterminate meaning.
For Baudrillard, this regime is a kind of formal participation which is often portrayed as full participation. It is not full participation because there is practically no way of saying “no” to the system. It effectively induces a kind of psychological participation. This participation is now replacing repression as the main form of control. Our intelligence and ability to communicate are reduced theoretically to the ability to provide contrasting or appropriate responses to increasing varieties of stimuli.
This leads, for instance, to a crisis of electoral representation. The so-called representatives control the process of opinion-formation so well, they no longer represent something outside themselves. They become unrepresentative for this reason. Opinion surveys and television represent nothing. They illogically project the new order – the order of statistics, operationalism and simulation – onto a traditional value-system of representation and free will. The two orders are actually incommensurable. But the illusion of their compatibility moralises the regime of simulation. It creates a moral philosophy of information.
Baudrillard sees this new regime of truth as a regime of doubling. The world is catalogued and analysed, turned into models, then artificially resurrected from the models made of it. This creates a doubled world which is at once artificial and strangely similar to the original. It short-circuits and then duplicates reality through signs. This leads to a world in which the ‘real’, the ‘event’, and real antagonism are prevented in advance.
Baudrillard takes as examples the replacement of people touching each other with touch therapy, of localised food-production with artificially-produced ‘natural’ foods, of walking as a part of life with jogging as a fitness regimen. In another passage, Baudrillard discusses reality TV (and one might add, spaces under CCTV surveillance), as creating the illusion of watching things as they would be with no cameras there. He discusses the routinising of strikes in a similar way. And he talks of therapeutic methods as the functional isolation of the social.
In another essay, he speaks of today’s films as seeming a little too good, too perfect, missing the blemishes and the ‘imaginary’ of the phenomena they imitate. It is as if they are perfected of their processual origins, of the marks of history. They no longer have meaning or aesthetics strictly speaking. For instance, today’s action and sci-fi films increasingly approximate to sequences of special effects. They often lack the charm of their technologically simpler predecessors. But they approximate ever more closely to a perfect simulation of reality. For Baudrillard this is a symptom of social changes, of the replacement of reference by simulation.
It means that television and film are now socially ineffectual. They are image, not imaginary. The action takes place ‘on the screens and nowhere else’. Even when events are real, as in humanitarian crises, the viewer can’t really imagine them. They are consigned to a special, televisual location. And this ‘cool’, deintensified location increasingly spreads to news and politics along with fiction.
The message is lost in the medium, the medium in the real, and the medium and real alike in the hyperreal. The distinct effects of the media are now indiscernible from the wider context. There are no remaining ‘media’ in the sense of mediations which communicate between distinct realities. Such a ‘dialectic’ of communication is replaced by the circularity of the model. Television – and computers – lack irony and artifice. They lack symbolic exchange.
Cinema, in contrast, was once an ‘image’ in an older sense. But it is being contaminated. Films increasingly exist only through a persistent commentary and reinterpretation. It becomes harder to reach the film itself, rather than texts referring to texts. This in turn makes them dysfunctional. They are a means of manipulation in all directions at once (they carry police press releases but also activist press releases as fact). They both simulate within the system and carry the simulation which destroys it. They condemn terrorism but also spread its effects. Events now have no existence beyond the screen which deflects them.
Baudrillard discusses porn in these terms: as sex without sexuality, without sensuality or pleasure, or something more sexual than sex, performing the brute descriptive fact of sex without any real investment, as combinations of encoded possibilities. It functions to neutralise sex, and to spread an energy of neutralisation. It is not contrasted with ‘good sex’ somewhere else. Rather, it seems to suggest that sex does not depend on the existence of pleasurable sex or sexual desire. Sex still functions without desire.
The dream of cloning goes even further, pursuing the emergence of humans from the genetic code, without a sexuality linked to death. Perhaps it would even reproduce a particular identity infinitely, without any difference appearing. The android is another example here: too perfect to be true, like humanity stripped of its blemishes and its processual origins.
There are other examples. Faces stripped of masks. Skin treated as a complete cover without orifices. In mapping, there is a lack of unexplored spaces where imaginary sites can be placed. In other fields, things are cloned or reproduced as distinct segments or modules (such as academic modules or specific skills), with the possibility of reconstructing the whole from any of the interchangeable parts. This is the end both of autonomous parts and of the meaning of the whole. The clone, like the reproduced work of art for Benjamin, loses its aura. It may even become akin to a cancer cell, proliferating without regard for its context.
In various fields, the fading of meaning, the neutralisation through overexposure of the signs associated with pleasure and enjoyment, occurs. This process is itself seductive – there is a pleasure in the process of overexposure itself. Things only have lightness through their secrecy or absence. When everything is present and visible, it becomes a brute material fact, like a rotting body, or like sex in a porn video.
The pure image is the end of the imaginary. By destroying the distance between the thing and its image, it stops the functioning of Lacanian/Freudian fantasy mechanisms. For Baudrillard, like Lacan and Freud, there cannot be an imaginary or real except at a certain distance from the object. The overexposure of objects through simulation brings about the end of the imaginary. Pure images, transparent to each other, shatter if brought into relations, yet contact and penetrate each other all too easily.
The imaginary relies on what is known in psychoanalysis as the scene, a site which is invested with unconscious energy, which is repeated in fantasy and trauma, and (in Lacan) imagined to be the site where the absent cause of desire exists. In order for such a scene to be imagined, there need to be gaps and incomplete spaces where it can be imagined to be. Overexposure and ‘obscenity’ (the absolute proximity of the thing seen) thus destroys the scene. It is replaced by a ‘screen’, or a surface without depth.
In Lacanian psychoanalysis, the imaginary functions because of its relationship to the Real, which is not a representable secret. Forcing the revelation of the secret leads to its loss, like the goose that laid the golden eggs. It creates an experience of unbearable obscenity or excessive reality. When there are no secrets left, there is no longer a site to invest with the Real, and construct an imaginary around. Forcing the subject to reveal its secret necessarily fails, because the secret is really a connection outside the self, a relation.
Without the imaginary, there are no breaks between things. The separations which create difference and intensity are struck with inertia. One is then opened to the undivided multiplication of each phenomenon to excess. Hypervisibility, the loss of secrets and illusions, leads to a kind of indifference: ‘heaven becomes indifferent to the earth’. The simulation or generation of reality from models destroys the social role of the imaginary.
A universal market of signs, models and values leaves no space for the imaginary. It becomes impossible to simulate things in the old way: a fake crime is treated as a real crime, and so on. The imaginary disappears because of the lack of a vanishing point where intensities can be invested. Because the system has reached its limits and is saturated, something else takes its place in the imaginary. Intense energies displace themselves from the system, back into the field of symbolic exchange.
[Part Eight will be published next week. Click here for other essays in this series.]
Aug 12, 2012 11:59
This series on Baudrillard is fantastic! Thank you so much for these clear and concise summaries of his thought, I am genuinely enjoying it and feeling rather reinvigorated.
Aug 13, 2012 16:02
Agreed — fantastic work.
On Jean Baudrillard: A new system of meaning - Michael Larsson
Jun 5, 2013 12:03
Leave a Reply
More in Media
More Ideas
More In Politics
More In Features
More In Profiles
More In Arts & Culture
|
global_05_local_4_shard_00000656_processed.jsonl/54797
|
HOME > Chowhound > Greater Boston Area >
Anybody like Beauty pizza in Cambridge?
• d
• debo Jul 12, 2006 05:13 PM
• 20
• Share
We're tired of our local place and Beauty delivers. What do hounds think of it? If not Beauty, what pizza (other than Emmas) do folks like that delivers to Cambridgeport?
1. Click to Upload a photo (10 MB limit)
Posting Guidelines | FAQs | Feedback
1. I don't know if they deliver to Cambridgeport, but I have had some decent pizza delivered from Di Mio:
5 Replies
1. re: mhoffman
I don't like DiMio either. Over priced, lacking in flavor... maybe it is the sauce.
It is kind of stange that there aren't many good pizza places in Cambridge.
I used really like Cambridge One but I was served one too many soggy pizzas.
Hands down, Upper Crust is my favorite (these days)...
1. re: Seconds Please
Not quite Cambridge, but Urban Gourmet in Ball Square is quite good (usually, they occasionally have off nights where the pizza is really greasy). Alex Pizza in the space formerly known as Out of the Blue (382 Highland, Davis) has been good the couple of times we've gone. Both of these are mostly take out/delivery but I doubt they do Cambridgeport.
(edited to correct brain fart as pointed out in post below)
1. re: DavisSquare
Erm, that's actually the space formerly known as "Out of the Blue" - and Dolly's before that. I thought Alex Pizza was okay, nothing extraordinary.
1. re: DavisSquare
Urban definitely does not deliver to Cambridgeport - but it's my favorite pizza in the area. You're right about the grease though. Their urban cowboy pie and city slicker pie are both excellent. Not an Italian style pizza by anymeans - a thicker, crispy crust not unlike a tarte crust in density.
1. re: DavisSquare
urban gourmet had a fire a couple of months ago. it says "we will be open soon" on the plywood covering the burned out windows, but it's said that for a while, so what "soon" means is anyone's guess
2. I am not a fan of Di Mio Pizza. For delivery I like Dial a Piza. It is cheap and good.
1 Reply
1. re: David_A
I'll give you cheap but I think Dial a Pizza is gross.
2. Dial-A-Pizza is what we used to get when we were freshmen in coolege and were bored and drunk. Something like $8.99 for two medium cheese pies. But aren't they sort of greasey and cardboardy? I recall very, very low quality.
What don't you like about Di Mio, David?
1. strange. THey have the only delivery pizza I like In cambrisge. THe crust is always good and the sauce is tasty and I never found it to be greasy. However I am vegetarian so maybe adding meat changes things.
I just don't enjoy the taste of Di Mio. I much prefer Emma's for thin crust gourmet pizza but they don't deliver.
1. I like Beauty's -- nice people, fresh ingredients, and a great selection of topping combos... good tuna sub too!
1. I've posted a few times in praise of Beauty's. I haven't tried their whole wheat crust yet, but we have been consistently satisfied with the regular. Family favorites include the bella carbonara-a white pizza with bacon, sausage, ham, red onion and sweet red pepper, Bombay Beauty-chicken curry pizza, and BBQ chicken, though every order we make would also include a classic pie as well. Despite the "glamorous" toppings, I think the people at Beauty's have an uncommon commmitment to getting the basics right; they really care about the quality of their food. Salads are good. Haven't tried the sandwiches. They do many specials by email.
1. The address of Beauty's looks like it should be next to MuLan (the Taiwanese place, fka Pho Lemon) and the Dunkin' Donuts. Where did they squeeze it in? Is the DD gone? (I thought those never went out of business.)
1. Beauty's is, indeed, right between MuLan and the Dunkin Donuts, wedged into the corner of the parking lot more or less. It's a Greek pizza place, so I can imagine Italian purists taking exception, and it's not nearly as upscale as Emma's around the corner.
That said, though, I really like Beauty's, particularly Greek Beauty and Beauty's Best. I like the whole-wheat crust, myself, but my wife feels that it calls a little too much attention to itself. I haven't had more than a quarter of their specials, but so far I've liked everything. And they have online ordering and you get increasing discounts if you order online regularly.
I'm less taken with their subs and salad, which so far have seemed kind of ordinary to me. But I haven't covered much variety there.
1 Reply
1. re: glenn mcdonald
Ah, it must be in the space that used to be a dry cleaner.
2. Beauty's pizza is just ok - or at least it was a few months ago, fresh ingredients but boring presentation - but their baked subs are good. The eggplant sub tastes like they use real romano. They can take a while to make, so walking in can be a pain (and there's no seating); however, ordering ahead online is really easy. www.beautys-pizza.com
1. I am addicted to Beauty's Margherita with capicola. I love the thin crust, and their judicious amount of cheese makes it a really balanced and thoroughly yummy pizza. Don't forget the arugula salad. The dressing is great.
1. I also like Beauty's Pizza, and I am not a pizza fan at all (I'm ok with never eating pizza again). I think it's because I found their toppings to be fresh, and offered a nice variety as well. I am veggies pizza person when I must eat pizza (ie, coworkers insist on ordering it for meetings), and Beauty's has some nice combinations.
1 Reply
1. re: kobuta
I also like Beauty's. It is easy to order - and I even use it for work, and use our tax-exempt status.
My favorite is the eggplant - breaded, lightly fried (or baked?) and very meaty.
2. Not sure if either of these places delivers to Cambridgeport, but you should try the Paddock and Caffe Rossini. I think the Paddock pizza is superior, but Rossini is pretty good and may have larger delivery area. I live on the north side of Inman Square (in Somerville, but just barely) and both places deliver to my address. Can't hurt to try. Both are thin, crisp crust, with good selection of ingredients. Rossini is more gourmet and Paddock more traditional.
|
global_05_local_4_shard_00000656_processed.jsonl/54802
|
HOME > Chowhound > Washington DC & Baltimore >
Seeking Best Roast Meats in Chinatown
• 18
• Share
I plan to purchase some roast pork or other meats to take home and use for sandwiches. Who roasts the best pig or other meats in Chinatown?
1. Click to Upload a photo (10 MB limit)
Posting Guidelines | FAQs | Feedback
1. Probably not what you were thinking of (and not exactly roasted), but you'd be doing yourself a disservice if you didn't consider the by-the-pound offerings from Capital Q BBQ. (Especially the brisket.)
1. With the urban gentrification of DC Chinatown, most of the authentic Chinese restaurants are in the suburbs now. As a Chinese American foodie, I unfortunately never eat in Chinatown anymore. The Hong Kong/Cantonese restaurants specialize in roasted meats. If you're in NoVa, I recommend Mark's Duck House or Miu Kee in Falls Church. If you're in MontCo, go to Maxim Market in Rockville, Full Kee in Wheaton, New Fortune in Gaithersburg. I can give you more recs depending on your specific location.
5 Replies
1. re: rheelee
How about some specific recs for roast meats from Maxim Market and Full Kee?
1. re: John Galt
Correction...Paul Kee (not Full Kee) in Wheaton or Hollywood East in Wheaton is good too. For sandwiches, I would recommend the bbq roasted pork sliced. You can add some veggies and make a Vietnamese type banh mi sandwich. The roasted suckling pig, duck, and chicken are great too but not good for sandwiches because they're chopped in big chunks with the bone.
1. re: rheelee
I'm okay with the roasted meats at Chinatown Express. And be sure to take home some containers of the green condiment!
Yes, better choices in the burbs. I like Mark's Duck House. But for DC Chinatown, I think Chinatown Express does the trick.
1. re: JoshInDC
Agreed. I LOVE whatever that green condiment is. So good in their noodle soups.
1. re: epicuriousgal
Love it in the noodle soups too--I think it's scallions?
2. I let Hodges make the sandwiches for me. Roast beef, turkey, and ham on Friday. I'll have to ask them if they'll let me buy it by the pound.
1. The roast pork and roast pig are out of this world at New Fortune in Gaithersburg.
I think both Chinatown Express and Eat First do pretty decent roast meats if Chinatown is more convenient.
3 Replies
1. re: DanielK
What's the difference between roast pork and roast pig? The age of the animal before it's roasted?
They don't make pork out of anything other than pigs there, do they? ;)
1. re: MikeR
Roast pig is whole pig, with crispy skin and a layer of fat underneath the skin. It comes on the bone. Roast pork is "BBQ Pork" sliced boneless pork with a reddish outer ring due to use of hoisin sauce.
1. re: deangold
deangold is correct about the differentiation of roasted pork and roasted pig. I guess the reason why we (the Chinese) call it roasted pig is because it's traditionally the whole pig that is roasted at one time vs the roasted bbq pork is just tenderloin marinated in a reddish bbq sauce.
2. as exciting as that area has become, I honestly lament the losses of even the dumpiest places.
I call it Franchise-Town now.
4 Replies
1. re: hill food
Yeah, the development of Chinatown was bittersweet for the Chinese community. As mentioned above, the urban gentrification of the area unfortunately caused the rent to sky rocket and become unaffordable for those dive mom and pop restaurants and stores to stay.
The "green sauce" that comes with Chinese roasted meats is a combination of chopped scallions, ginger, salt, veg oil, msg and a few other spices. Its traditionally eaten with the roasted chicken and white rice. It's good on everything!
1. re: rheelee
I find Architectonica's faux-"Chinois" confection over Metro as kind of a visual mockery. It over-powers the gate (which ok, was sort of hokey in the first place) but seeing that the arena and recent developments have effectively destroyed the neighborhood as a destination for Asian and specifically Chinese food...
Most (all? please correct me if I'm wrong) C-Towns were more or less enforced ethnic ghettos (SF def.) and thank God we're moving past that, but it was/is nice to go to an area and know "if I don't like what's in this establishment, there are several comparable ones around the corner".
One can't romanticize it, but in a way that's what that building does in a non-ironic, cynical and heartless way.
</high horse>
can't get too preachy - wandering around there on foot after midnight in '98 spooked even me (and that takes a bit).
1. re: hill food
I agree hill food. Well, I wouldn't say enforced ethnic ghettos, per say, but they were usually lower income areas that attracted the newer immigrants to settle. The same gentrification has happened in many of the other Chinatowns, Little Italy, and other ethnic communities, in the US.
DC Chinatown is definitely more ped friendly and has more a mainstream, family appeal for Verizon Center goers and tourists now. I guess it's natural for many folks unfamiliar with our Chinatown to assume it's the best place to get good Chinese eats and watch the Chinatown parade. As mentioned in many previous threads, MontCo, MD in Rockville/Gaithersburg area is now the place to go for groceries, restaurants, and the best Chinese New Year celebration at Lakeforest.
1. re: rheelee
maybe my words were a little harsh, but in SF in the late 19th c. through early-mid 20th c., Asians were treated with quite draconian measures and limitations as far as employment and residence (and worse) I'm sure no need to tell you, but for the benefit of lurkers.
I had a co-worker once in the early 90's (10 years younger than me!) whose father was a "paper son".
our loss to the suburbs, the proprietors will enjoy a better tax and insurance situation - no tears for them - may they do well.
2. Chinatown express and full kee have pretty good roast meats. I used to get the hand pulled noodle soup with roast pig on a weekly basis. I noodle are good but got to say the soup part leaves a lot to be desired.
|
global_05_local_4_shard_00000656_processed.jsonl/54803
|
HOME > Chowhound > Ontario (inc. Toronto) >
Where to get apple wood chips in Toronto?
• 32
• Share
Logs or anything? It seems borderline impossible to find.
1. Click to Upload a photo (10 MB limit)
Posting Guidelines | FAQs | Feedback
1. Home Hardware carries a fairly diverse line of wood chips compared to their offerings in previous years including apple. That would be the most convenient choice.
In the past I would have recommended Sobies, but I've found their quality to be slipping.
1. Try http://www.bbqs.com/
I think they were last selling them by the barrel but might do smaller quantities this season.
1. Home depot also used to have the wood chips in the bbq/seasonal area
15 Replies
1. re: smr714
I don't recall anything sweeter than maple chips there.
1. re: jayt90
At Home Hardware I've purchased alder, apple, cherry, pecan, and of course hickory & mesquite. No maple or oak, but good enough selection for most purposes.
1. re: Googs
Googs, you smoke??
You have a smoker or just do it on the grill??
1. re: Davwud
As I live downtown in a condo it's a propane 'cue with cast iron smoker box for now. My neighbours might not be so neighbourly if I put a full-on smoker up there. They need to be able to enjoy their rooftop decks as well.
I still find the smoker box works just fine for slow & low purposes such as chicken, pork, lamb leg, and ribs. Even short/high burst cue's such as steak benefit if I'm careful enough. It definitely makes a discernible and enjoyable difference in taste. I can't imagine steak without the influence of wood now.
1. re: Googs
Googs, where did you get the smoker box and how much?
1. re: Teep
Is it possible to smoke at home without any fancy-schmancy things? ie. somewhere along the lines of pour some water over the applewood chips, wrap it up in some aluminium foil, stick in the oven at low heat, and judiciously turn on every fan/exhaust system in my condo?
Or am I just being too wishful....
1. re: gijoeanne
Death wishful. Do not, not, not, not, not do that.
Teep, they're commonly available at any hardware store. No need for a trip to a specialist. I got mine at Home Hardware. Can't remember what I paid, but I do recall it wasn't very much.
Just be sure to buy cast iron and don't put anything in it that isn't wood. No briquettes, no pellets, or any other silly device. Sure they're easier to use, but deliver very unpleasant results.
1. re: Googs
I bought one as a gift for someone at Crappy Tire.
2. re: gijoeanne
I just use aluminum foil pouches with holes poked in them, filled with 1/3rd wet and 2/3rd dry woodchips; but this is in a propane BBQ.. I definitely couldn't or wouldn't advise doing it inside of your oven
1. re: gijoeanne
Actually, you can smoke on your stovetop using wood sawdust and a suitable cooking vessel. The best known cooker is the Cameron's Stovetop Smoker. Once you see how it is made, you can improvise something similar quite easily from a pot with a tight lid, a rack, and some foil. Cameron's sells many kinds of wood, but anything that is very finely cut will work. So does a strong tea (a classic Chinese cooking method).
Though you need a decent external exhaust fan, you will not kill yourself by using this method. Note, though, that you will be HOT smoking while you cook and you will get a smoky background hint rather than something done low/slow and redolent of smoke.
There is also a foil smoker cooking bag system that you can use in the oven. These are made in Finland and work very well. One brand name is "Savu". Home Depot was selling these for $1.00 apiece last year, though they don't seem to have any at the moment. I've seen these for as much as $7 at specialty shops under various brand names. They come with several varieties of wood and in several smoke strengths. I have made some amazing short ribs in these bags, but this system can get really pricey at $7 each.
1. re: embee
"This system can get really pricey at $7 each."
1. re: Davwud
This is a "use once and throw away" cooking bag which contains wood dust and some other seasoning elements in a perforated chamber. At the $7 price charged by some stores which carry it, this becomes a very expensive way to add smoke flavour to food. (A comparable quantity of plain wood dust costs very little.) Last year's Home Depot price made it a good deal.
3. re: Googs
I could regale you with stories of billows of smoke coming off the balcony of our first appartment. Pretty hilarious.
1. re: Davwud
I had a fire truck visit when I used too-wet maple chips over charcoal in a Weber (nice neighbours!). The fireman said, "Damn, there's nothing here!"
2. re: jayt90
we bought applewood chips at the home depot on curity. We used this weekend to smoke chicken. wow.
2. Check the pick-your-own orchards. Most sell apple wood suitable for smoke chips.
I get mine from Ferri's Orchards in Brampton(Steeles+Heritage Rd.) Ten bucks bought a big mesh bag of 2-5 inch thick lengths that lasts awhile. Ontario Gas BBQ will sell high unit cost chips, so try the orchards for a way better deal.
1 Reply
1. re: Kagemusha
This is the way.
There are two apple orchards near where I live and that's where I get my apple. You'll probably have to break it down since it comes in logs. It's worth it though. Apple is the best I've used.
2. These links might help: www.basquescharcoal.com , or www.smokinlicious.ca.
They both should carry what you are looking for. Basques shows that they are mainly providing Maple, but they will know where to get other types.
1. Sobie's BBQ on Willowdale Ave in the Sheppard/Yonge area has a wide variety of chips including apple and pecan.
1 Reply
1. re: Pizza Lover
Canadian Tire has them too.
2. I saw them at Williams-Sonoma today, on sale! I think they were only $6.
1. Bass Pro Shops at Vaughan Mills should have them; they have a pretty decent variety of wood chips for smoking.
1. Bass Pro Shops at Vaughan Mills has them, but I agree with the others in that you'd probably get a better deal at an apple orchard....
1. I just picked up some applewood chips from Home Depot (Curity location), have found that not every store stocks the applewood chips though so your mileage may vary.
1. Apple is pretty mild... probably wouldn't use it for anything other than chicken or a pork tenderloin
4 Replies
1. re: duckdown
1. re: Googs
Applewood smoked steak doesn't sound too appealing to me :)
Just my opinion of course
then again, I don't think I've ever had a "smoked" steak (unless you count brisket)
1. re: duckdown
Not trying to correct you duckdown. It's obvious you're a fan of the sport. Just a little something for everyone there.
I tend to blend woods, so no I haven't done a pure apple steak. Now you've made me curious.
1. re: Googs
Hey no worries, I didn't take offense to it :)
I think an applewood smoked Pork-chop would be pretty great, with some apple sauce on the side. Maybe I'll give that a shot this weekend
Let me know how your steak turns out :-)
|
global_05_local_4_shard_00000656_processed.jsonl/54805
|
HOME > Chowhound > Washington DC & Baltimore >
Blue Bell ice cream - grocery stores that carry it
• 22
• Share
Has anyone in the MD/DC/VA area seen Blue Bell ice cream sold in their grocery store. I am trying to find some and avoid having to get it shipped from TX. I've seen it sold at some chain restaurants but wanted more than just a bowl.
1. Click to Upload a photo (10 MB limit)
Posting Guidelines | FAQs | Feedback
1. The closest is in Kentucky.
They do ship .. but the cost is high. Over a hundred dollars for 4 half gallons. Here's a map of " Blue Bell Country"
2 Replies
1. re: louuuuu
As the map indicates, I have seen it in grocery stores in the Greensboro, NC area. That's a couple of hours closer than Kentucky.
1. re: louuuuu
Ironically, you can buy Blue Bell in Dubai, where I currently live, and I've also seen it in Singapore and Jakarta. Where the oil men go, so does Blue Bell.
2. let me know if you figure it out....blue bell's birthday cake ice cream is my favorite in the entire world. best of luck.
1. I've seen it at Super Fresh in Aspen Hill, MD
3 Replies
1. re: psugumby
I live in Aspen Hill...I'm going to go check ASAP. Someone had seen it carried in a grocery store in VA, but I couldn't remember which. I'll post what flavor they carry in case anyone is interested. You might've saved me...I didn't want to spend 100 dollars to get shipped 2 gallons of ice cream just yet.
1. re: psugumby
NO WAY. please let us know ASAP!!!
1. re: littlew1ng
BOO! ...nope... I think you were mistaken by the Blue Bunny brand psugumby... I'll keep looking!
2. I know this is way past due... but I got a 3 gallon container of Blue Bell ice cream from the Outback in Perry Hall on ebenzer rd for 30 bucks yesterday.... I Had a "funnel cake ice cream party" last night with my friends and wanted only the best... They cant sell any other quantities... but i fit in in my freezer by moving the shelves and emptying it out... It was so worth it :)
1 Reply
1. re: katieeebeanss
I know it's late as well but I found that most Outback's carry this brand of ice cream. I am picking up a 3 gallon container on Saturday for about $40 bucks. A lot cheaper then the $120 for 4 gallons. Hope this helps:)
2. Hill Country in DC sells it now!
1. i know that it is offered as a dessert option at bonefish grill, as well. i don't know if they sell it in a large container for take-home.
1. walmart at 1900 Cunningham Dr, Hampton, VA 23666
1. In my quest for goodness....I contacted Blue Bell in TX, I was informed they are slowly expanding, in January 2013 news will be out regarding BB being in VA....only hoping they are building a plant in VA = possible BB coming into our area!!!
4 Replies
1. re: OkraNtomatoes
Oh my gosh. If it really happens, us Texas exes will be thrilled beyond measure.
1. re: Transplanted Texan
Hey.....they can start out small....*so long I'm aware, so I can begin politicn'* can't you tell I'm from the DC area.....chuckles
I'm an advocate for beautiful things.....*shrugs*
2. re: OkraNtomatoes
It can be done. Graeters ice cream (from Cincinnati) is available in Fresh Market stores here in the DVM,,,,,and can be found as well at Krogers (down towards Richmond). Hope BB can follow this path as well.
1. re: maypo
I agree Maypo! It can be done!! I'm not giving up! : )
3. I had been looking for Blue Bell for 2 years since I have been in the DMV area. I went to the Dutch Farmers market and that ice cream is Blue Bell although it is not labeled.
3 Replies
1. re: grimm_reaper
Grimm my love, which Dutch Market? I've been to them all, just say the area ....and I'm there! LOL
1. re: OkraNtomatoes
I found it at the Dutch market in Upper Marlboro. The butter pecan was delicious.
1. re: grimm_reaper
Will check it out! Thanks Grimm!! If it ain't BB, I hope it's darn close.....in the meantime, I'm still hounding BB Headquarters.....hope come Jan 2013, they will give e further answers, cuz' I'm feenin for Blue Bell BAYBEEEE!
|
global_05_local_4_shard_00000656_processed.jsonl/54809
|
HOME > Chowhound > Washington DC & Baltimore >
Looking for Boston-style shrimp in lobster sauce
• 5
• Share
For those of you unfamiliar with it, in Boston, the dish is served with a brown sauce rather than a white sauce.
1. Click to Upload a photo (10 MB limit)
Posting Guidelines | FAQs | Feedback
1. I never knew that was a New England thing (it's served the same way in RI), but now that I think about it I guess I haven't eaten it that way around these parts.
1. Does anyone have a recipe for the dark brown shrimp in lobster sauce? All I seem to find is the white sauce recipe.
1. god I wish. I miss it terribly.
1 Reply
1. re: cambridgeMike
Definitely comfort food for many of my friends who grew up in Newton-Brookline.
2. here are some sample recipes on this other thread, i usually use the one without the black bean sauces
|
global_05_local_4_shard_00000656_processed.jsonl/54810
|
HOME > Chowhound > General Topics >
Nigella/charnushka seeds.
• 9
• Share
Several years ago watching Nigella Lawson did a recipe with potatoes and several seeds including these seeds. Now I cannot find it. Anyone know uses for these seeds? I finally found them and want to use them
1. Click to Upload a photo (10 MB limit)
Posting Guidelines | FAQs | Feedback
1. They're also called black onion seeds of kolonji in some recipes.They seem to be pretty common in some regional Indian cuisines, and I've got 3-4 fairly anglicized Indian recipes that get used somewhat often.
1. Nigella using nigella seeds... hmmmm. I have seen them sold as black seed, black onion seed, black caraway seed, nigala, charnushka, kalonji.
5 Replies
1. re: drongo
It was a panfried potatoes in olive oil with fenugreek, caraway cumin, etc... it was when it was still on BBC before she moved to food network. It looked so yummy. She even made fun of the fact it was Ger name. She served it with a fried egg. I would like some ideas how to use it as i bought a small jar and can find very limited suggestions on recipes. A point in the right direction, maybe?
1. re: suzigirl
Hmm, sounds like panch phoron, a Bengali blend that usually includes five whole seeds - fennel, cumin, black mustard, fenugreek, and nigella. It goes amazingly well with potatoes (try it in a breakfast hash!). So, you could look for that too.
1. re: kathleen440
I think that is it. It has been years since I saw the show so the exact seed blend has escaped me but that sounds like it. Cannot wait to try it. Thanks a bunch
1. re: kathleen440
Just found it due to your help and that is it in a nutshell. Anyone else have any sweet or savory applications would be helpful too. Once I try them I may find some ideas on my own but so far I just chewed on a few raw.
1. re: suzigirl
Sweet! I'm glad I could help. BTW, this is my favorite application for panch phoron, you should totally try it:
2. I use them when I make cheoreg (Armenian sweet bread). Love the taste of them, so I use very liberally..
1. For anyone who can't find them, Penzey's spices sells them.
|
global_05_local_4_shard_00000656_processed.jsonl/54811
|
HOME > Chowhound > Manhattan >
Quick note on Laduree SoHo
• 31
• Share
Popped in for brunch today and figured I'd drop a little initial reaction, start a thread for others to weigh in.
First, the service was actually quite nice. Maybe a touch perfunctory but that's understandable as they were positively slammed. I'd read some early reactions on yelp from people who felt ignored by their waiters, etc, but we had nothing but pleasant service all the way through.
2. Savories, meh. Granted, it's brunch so one doesn't want to judge a kitchen by brunch alone, but I swear there wasn't a single flake of salt between our two omelettes. The snap peas and asparagus in the garden omelette were cooked to the point of softness (though shy of mushy, at least) and the filling of the "Concorde" had its own issues - the chicken was diced so tiny it might as well have been ground meat, so it lacked any toothsomeness. The tomatoes in it were nice and fresh, but with apparently no salt they were severely lacking in flavor. At a chef-driven resto it's not surprising there's no salt on the table, but at a place like this you'd think they would. I'm sure whoever's running the kitchen won't take offense.
We shared an order of Pommes Dauphine. Be warned: if you despise 2,4-dithiapentane as much as I do, they're redolent with it, and there's no warning of it on the menu. But aside from the unfortunate flavor of kerosene permeating them, they were well-seasoned. So they're not averse to salt. And the texture was perfect.
Pastries, on the other hand were great. And not tooth-achingly sweet, which was nice. We had a perfectly balanced Tart Citron, and something with rose and raspberries and cream on puff pastry I can't recall the name of.
I'll probably give them another chance on savories at dinner, and we'll see how the seasoning issues are. That said, it's certainly a lovely room and a great place to do tea and sweets if you've got a sweet tooth.
1. Click to Upload a photo (10 MB limit)
Posting Guidelines | FAQs | Feedback
1. I read that they are still shipping FROZEN macarons in, why they don't bake them in house I have no idea. Any word on that?
27 Replies
1. re: Pookipichu
I was also there today for brunch at noon sitting in the second room. They did a great job in making the place gorgeous. I'm sure it'll be busy for a long time to come. I had the Salade Soho and my wife had the Laduree Club. We were amazed at the generous portion size and both really enjoyed our dishes. Fantastic teas, too. Didn't save space for pastries, but do plan to return soon.
1. re: coasts
The tea selection was great, I agree. The two we tried (Josephine and something else) were both excellent. Granted, it's nothing compared to the Harney & Sons selection a few blocks East, but it seemed to be well-curated where H&S can be overwhelming if you don't know what you're looking for.
Also, agree, the portions were decent for the prices. Some of the pastries even generously so.
I take it you guys had no seasoning issues with your salad & sandwich? Maybe it's just whoever was running the egg station...
1. re: sgordon
No complaints on seasoning. The "French Fries" are a bit dense. They're about a square inch thick and have the texture of a baked potato.
2. re: Pookipichu
That's not unusual even in Paris. Macarons need to "age".
1. re: Nancy S.
I bought some macarons from Dominique Ansel recently, I didn't know they had been aged, I thought they were stale. Now I know that reference is everything ;)
I'm going to start freezing all my cookies and defrosting them to let the flavors meld.
2. re: Pookipichu
I rather have frozen macarons shipped from France than have macarons made in here in usa.
1. re: Monica
I'd prefer the macarons be made here because I feel pretty certain we have pastry chefs here competent enough to meet the standards of Laduree. I have been underwhelmed by the frozen shipped macarons and feel something is lost in translation.
1. re: Pookipichu
It's the same exact product, and treatment, as sold in Paris.
1. re: Nancy S.
Laduree doesn't have the same sheen of excitement that it did for me when you had to travel to Paris. It's not the only macaron game in town and I personally am underwhelmed by them in NY. I'm not going to line up for defrosted macarons. My sister brought me a box of Laduree macarons from Paris, they were ok. I had macarons from CIA that were just as good, in a student run bakery. Laduree Paris to my knowledge does not freeze their macarons and they do taste different fresh.
I will say that Laduree Soho looks gorgeous and if you have the money to blow at a hyped up place, might as well do it there than Magnolia Bakery. :)
1. re: Pookipichu
Pierre Herme himself claims "“Any pastry chef who says he doesn’t freeze his macarons is a liar"
Laduree spokeswoman does not like the word "frozen". She says "it's not a very pretty word. We say they are in hibernation".
On the other hand, this article says Laduree macarons are frozen and shipped to non-French cities including New York. It further states macarons sold in Paris are not frozen, 'but similar'. I don't know exactly what this 'similar' to frozen means. Supplying moisture and keeping them at certain temperature so that they can age perhaps?
1. re: kosmose7
I am no macaron aficionado but Pierre Herme's in Paris were divine. Have not had ones as good since, including Laduree. If only he would open up shop in NYC.
1. re: kosmose7
The Bouchon Bakery cookbook actually instructs one to freeze macarons for 24 hrs before eating them. It's simply part of the process, helps give the macaron a better texture. Since there's little water content in macarons aside from the tiny amount in the egg white (and just a trace assuming they age their whites, as most bakers recommend) there's scientifically no reason not too.
1. re: sgordon
Learn something new everyday, thanks Nancy, Kosmose7, sgordon. That being said, I still wish the macarons were made in NY (frozen or otherwise) and not shipped from elsewhere. There are talented pastry chefs in the US and I would much rather support a bakery using local talent and I don't think that Laduree macarons are head and shoulders above others in NY.
1. re: Pookipichu
You would think it would actually cost less to make them here. Would not surprise me if by the time they open a third place (I'm sure it's not far off) they also set up an operation out in Queens or Jersey to pump 'em out. I imagine sure that's how they do it over there, with one main industrial bakery supplying all the locations.
Of course, it's easy to support a bakery using local talent - just get your macaron fix elsewhere. Bosie Tea Parlor and Payard are both made locally. Bottega Falai sometimes has them, and his are excellent (Seems counter-intuitive to go to an Italian, but a macaron shell uses the Italian meringue method after all - all the French did was stick some buttercream in the middle...)
1. re: sgordon
Trust me, I support bakeries with local talent, more than I should ;) my body fat doesn't lie.
1. re: Pookipichu
I like the macaron from La Maison du Macaron ( Chelsea),
I had very stale ones ( not aged) at Nespresso
2. re: Pookipichu
Oh I am sure we have tons of competent chefs but somehow ingredients are different...there is substitute for that.
Btw, having tasted Laduree macarons from both Paris and Monaco, i am not a big fan of macarons from Laduree in general...I personally love macarons from Maison du macaron.
1. re: Pookipichu
I wish that was the case (that our chefs are "competent enough to meet the standards of Laduree") but apparently, to my strong disappointment, it is not. I have yet to find a macaron in the US, anywhere in the US (particularly LA and NYC) that held a candle to Laduree or Pierre Herme. I'm mystified at this but it is the case and continues to be so. As for frozen shipments, I don't know about how they get there, but recently I had both Laduree and Pierre Herme macarons in Tokyo, and they were as good as they are in Paris, so I don't care if they were frozen or not. I sincerely hope that some US chefs figure it out, but I've been looking for 7 years and have found nothing. Maybe it's the same mystery of life that makes NYC bagels and pizza superior and inimitable anywhere else.
1. re: OC Mutt
Agree with you 100%! Much prefer the Laduree macarons (regardless of being frozen) to any other macarons in NYC. Bisous Ciao comes pretty close though.
1. re: OC Mutt
The macarons you buy at Laduree NYC are being made by the exact same chefs that are making them in Paris - they're frozen after they're baked, not before. The local chefs just do the other pastries and savories and whatnot. As to the macarons, literally all they're doing here is thawing them out, same as they do in Tokyo or wherever else.
Maybe the air that touches them just tastes sweeter when it's not in NYC...
1. re: sgordon
Not to beat a dead horse, but I read that the Laduree in Paris is the only one that makes them there, the others around the globe all have their's shipped frozen from their factory in Switzerland?
1. re: Pookipichu
Does any NY baker all currently make a Macaron with gelee filling?
Bouchon's taste like jam.
Laduree's do not taste frozen, or defrosted, or inferior, so what difference does it make?
1. re: sugartoof
Well, frankly it probably doesn't make a difference that they're frozen, I eat frozen seafood, vegetables, etc. *shrug* I went to the Soho shop two days ago, the macarons taste better when I haven't waited an hour on line for them like at the uptown location. I didn't think they were worth the wait.
With no line, I think they're fine. The carre chocolat is delicious. As a side note, the person working the counter did not know what the desserts were/what was in them, which is fine but, tried to b.s. an answer until conceding the need to get the folder with descriptions/ingredients.
1. re: sugartoof
The only difference between a jam and a gelee (jelly) is the former uses whole fruit and the latter just the juice. Personally, I prefer a jam as it has a bit more depth and texture.
That said, there's such a small amount in a macaron I couldn't tell you which is in there, unless I bit into a seed or something.
1. re: sgordon
One is a spread, and one is usually presented as a fully set gelatinized square which can be found sold as a premium candy in it's own right.
Usually the texture is entirely different and unmistakeable.
2. re: sgordon
Maybe the macarons aquire their own "terrior" based on location....?? ;)
I don't care what Laudree does in nyc, it works and i love their macarons.
2. re: Pookipichu
If they're expanding the US operation, they'll probably begin baking locally, but then people will complain they're not the same as Paris. As of now, they're exactly the same cookie.
As for frozen being an issue - you can't tell. These are superior in texture, and composition to anything else I've had in NY, which are a different breed, in comparison.
3. i got a takeout Mont Blanc for someone from there and she liked it very much...i had a bite: it was tasty, but i'm no expert
1. Back to Laduree Soho-Does anyone know if I could get a table if only having a breakfast pastry/dessert and tea or would I have to order an entrée off the brunch menu on the weekends?
1 Reply
1. re: ganache123
They can't force you to order anything you don't want, but they'd probably be less than thrilled if you made a reservation and took the table from customers who would have ordered a full meal.
There are some tables in the front area that are unreserved, for walk-ins. Those tables are, I think, intended more for in-and-outs, tea and pastry noshes. But I wouldn't do it at a reserved table, no.
|
global_05_local_4_shard_00000656_processed.jsonl/54829
|
Does the rest of the cloud computing world really need to clone Amazon Web Services in order to succeed?
Probably not, says Lew Moorman, the president of Rackspace, the San Antonio, Texas, company that plays second fiddle to Amazon in the cloud game. According to him, some customers want companies like his to clone all of Amazon’s Application Programming Interfaces, the coding standards that let a program interact with Amazon’s cloud. But he thinks it’s a bad idea that isn’t going to work out.
Rackspace is also moving to OpenStack on August 1st! wow!
Read more.
|
global_05_local_4_shard_00000656_processed.jsonl/54845
|
Our Valued Sponsor
OpinionsConsumer ReviewsGuides and How TosCoffeeGeek ReviewsResourcesForums
consumer product reviews
filter drip coffee maker reviews
Technivorm Moccamaster Thermal Models
Where to Buy
Arrow Seattle Coffee Gear
Arrow Morala Trading Inc.
Arrow 1st in Coffee
List your business site here.
About "Where to Buy"
Product Details
Overall Rating 7.9, Based on 76 Reviews
Avg Price Varies
Manufacturer Technivorm
Machine Type Auto Drip coffee maker, filter, high temperature
Colors Steel, Glass, Black, Others
Class Auto Drip Coffee, Manual Switch
Pro Review No
First Look No
QuickShot No
Review Guidelines
Arrow Please check spelling and avoid controversial language.
Coffee Makers: Technivorm Moccamaster Thermal
Previous Product Coffee Makers Next Product
Write a Review for this Product
RICHARD HEALY (quality: 4.5) 11.21.2007 Rating: 2.0
Product Reviewed: moccamaster CDT/40/741T
Bottom Line: This is an overpriced machine with very serious design flaws
Tom Casey (quality: 5.0) 03.21.2013 Rating: 2.8
Product Reviewed: coffee maker
Bottom Line: Disapointed in customer service.
Linda Miller (quality: 4.5) 10.02.2010 Rating: 3.0
Product Reviewed: Moccamaster KBT 741
Bottom Line: Nice coffee. Crappy machine.
Sarah M (quality: 6.8) 01.12.2009 Rating: 3.0
Product Reviewed: CDT-Thermo
Bottom Line: BUYER BEWARE!!!
Dean Wilfur (quality: 3.6) 10.30.2012 Rating: 3.2
Product Reviewed: moccamaster
Bottom Line: If you enjoy cleaning up coffee, feeling like you worked for it, and don`t mind having extra parts lying around buy this pot, if not take a pass.
Lars Lee-Potreck (quality: 0.8) 08.18.2008 Rating: 3.4
Product Reviewed: KBT 741
Bottom Line: Not worth this premium price.
Rob J (quality: 4.5) 02.23.2008 Rating: 3.6
Product Reviewed: Thermo KB741
Bottom Line: Don't fall for all the hype! Stick with french press!
Tony Barber (quality: 4.8) 03.03.2007 Rating: 3.8
Product Reviewed: KBT741
Bottom Line: I will avoid Boyd's from this day forward.
Andrew Grant (quality: 4.0) 12.16.2010 Rating: 4.4
Product Reviewed: Mochamaster
Bottom Line: I should have known better.
Lawrence Greenberg (quality: 5.0) 12.03.2011 Rating: 4.6
Product Reviewed: Moccamaster
Bottom Line: Big mistake. I regret buying this imperfect machine. A French press or Aerobie produces WAY BETTER coffee and hot too!
Lawrence Greenberg 12.03.2011 Rating: 5.4
Product Reviewed: Moccamaster
Dave Myrow (quality: 4.0) 06.14.2008 Rating: 6.2
Product Reviewed: Thermo Moccamaster refurb
Bottom Line: Technivorm: a fatal (plastic) flaw?
Ed Okie (quality: 6.0) 09.23.2008 Rating: 6.4
Product Reviewed: 741
Colin 2 (quality: 7.0) 10.03.2010 Rating: 7.0
Product Reviewed: Thermo Moccamaster CDT
Bottom Line: A very good, though expensive, hot-water delivery device.
Christopher Covolo (quality: 7.5) 01.18.2012 Rating: 7.2
Product Reviewed: Moccamaster
Bottom Line: Expensive but great at what it does.
Trey Harrell (quality: 7.4) 01.10.2008 Rating: 7.4
Product Reviewed: KVT-741
Bottom Line: Awesome, quirky, hands-on drip brewer capable of producing the best drip coffee possible. Worth the price, even in light of some astonishingly poor design choices, but if you're in for this much, may as well get a 3rd party carafe when you buy it.
Bernard Shich (quality: 4.2) 11.13.2008 Rating: 7.6
Product Reviewed: KBT 741
Tony Nathanson 03.23.2013 Rating: 7.6
Product Reviewed: CDGT Thermal
Christopher Henry (quality: 6.3) 08.28.2008 Rating: 7.8
Product Reviewed: Moccamaster CD Thermo
Bottom Line: Will always be a boutique product for the quality-conscious coffee drinker who isn't so price-sensitive.
Scot Davidson (quality: 6.4) 06.24.2007 Rating: 7.8
Product Reviewed: KBT-741
Bottom Line: Fantastic coffee. Design shortcomings.
Login Password
forgot pw | signup
Cafe Solutions
Commercial sales and service, nationwide installation, equipment leasing options.
Rancilio Silvia - How to
|
global_05_local_4_shard_00000656_processed.jsonl/54848
|
Elizabeth Marlowe - Art and Art History - Colgate University
Colgate Directory
Elizabeth Marlowe
Elizabeth Marlowe
Assistant Professor of Art & Art History
Art & Art History, 307 Little Hall
p 315-228-6098
BA, Smith College, 1994; BA, Cambridge University, 1996; MPhil (1999), PhD (2004), Columbia University
Ancient art, late antiquity, the city of Rome, modern uses of classical past
Rome Prize Fellow at the American Academy in Rome
My Research
My research and teaching examine the relationship between artistic forms and ideological content in the art of the ancient world. I have published two articles on the Emperor Constantine’s monuments in the city of Rome (one of which won the Art Bulletin’s Arthur Kingsley Porter Prize). I have also given a number of talks on various instances of spoliation (the appropriation of older artworks and their redeployment in new monuments and settings) in Constantinian Rome. This will eventually be the topic of a book manuscript. You can also see me talk about the Arch of Constantine on an episode of an eight-part TV series that aired recently on the History Channel.
The interdependence of form and meaning is also the focus of my teaching, particularly at the 100 and 200 levels. In my survey courses (ARTS101 and ARTS105, an Introduction to Architecture), as well as in my 200-level classes on Greek Art, Roman Art, Medieval Art and Islamic art, I begin by asking students to tell me, “What choices did the designer of this monument make?” By isolating each work’s defining formal properties, we can link them to the particular needs or expectations of their ancient users and thence to their social function. This approach conveys both the importance of visual analysis and the inseparability of art and historical context. I am currently exploring ways to encourage more interactive learning in my classroom by "flipping" my classes -- that is, putting much of the content I usually deliver in lectures into videos which students will watch ahead of time, thereby freeing classtime up for discussion, debates, group work, review, etc.
The second focus of my scholarship and teaching is the reception and reuse of ancient monuments in the modern world, by scholars, governments and various other interest groups. I have developed this interest into two 300-level courses, one on Museums (syllabus) and the other on the City of Rome from Antiquity to the Present (syllabus), which considers how particular ancient monuments in the city were appropriated by the church, the city council, the national government, the fascists, etc. over the course of 1,700 years. I also taught a senior seminar in fall 2008 called Looting, Faking, Collecting and Understanding Antiquities (syllabus). This course led to a conference paper, which turned into an article which turned into a book: Shaky Ground: Context, Connoisseurship and the History of Roman Art (Bloomsbury Academic Press, 2013). I am currently at work on two more articles related to these issues; then I will return to the Constantinian material discussed above.
Another recent (and ongoing) project that blurs the boundaries between my teaching and my research concerns a group of twenty late antique Egyptian limestone reliefs. They were donated to Colgate's Picker Art Gallery by an alumnus in two batches, one in 1966 and the other in the 1982. These reliefs, most of which depict pairs of animals frolicking among spiraling vine-scrolls, lack any information about their findspot. What, if anything, can we, as students of the past, say about these works? How far can connoisseurship get us? Should we even be studying these objects, thereby valorizing the practices of the art market that delivered them to our door, stripped of all of the archaeological context that might have helped us understand their ancient symbolism and function? How can we be sure they aren't forgeries? These issues and many others were explored by the students in my ARTS 481 seminar, who put their findings up on a website. I also wrote a piece about the course for the Colgate Scene, our alumni magazine.
|
global_05_local_4_shard_00000656_processed.jsonl/54865
|
Feywild question
9 posts / 0 new
Last post
How common would it be to find a Genasi in the Feywild? We're doign a campaign there soon and if they aren't that common, I might need to explain how he's there.
Well, ultimately it's up to the DM, but as far as I know, non-fey creatures tend to be a rarity in the Feywild.
It is, however, given the nature of the Feywild, fairly easy to come up with an explanation for how the rare non-Fey in the Feywild got there.
In both the game and in the mythology of almost every real-world culture that has a "Feywild" equivalent (i.e., the home of any "fairy folk"), individuals tend to find themselves there accidentally or get drawn in (purposefully or not) with alarming regularity, although few non-native beings ever stay there long.
I am the Magic Man.
(Pay no attention to the man behind the curtain.)
I am the Lawnmower Man.
I am the Skull God.
(Koo Koo Ka Choo)
There are reasons they call me Mad...
It is also extremely easy to reflavor any of the Genasi as Fey Spirits of their elements (air Genasi as Sylphs, Water Genasi as Undines, etc.)
The genasai in question could have fallen from a mote floating over the feywild. Maybe he landed in a lake, or a pile or grass or kobolds.
I don't think it's that difficult to explain. After all, the elemental chaos has a bad habit of creating rifts to it just about everywhere. Wink
A list of CharOp Handbooks I'm currently updating:
Heart of the Dragon: A Dragonborn's Handbook
Infernal Wrath: A Tiefling's Handbook
Well, I'll have a back-up character, but I think I got this mostly cleared.
Ki-Amar, the Sandsoul Genasi Shaman who fell into the Feywild by mistake and couldn't find a way back. Being a spirit of the desert(I pretty much took every desert and sand themed thing I could find in the Shaman ability list for this guy), he doesn't like the Feywild very much with all the foresty trees and stuff everywhere(idk if there's any deserts in the Feywild. I'm not that familiar with D&D lore), and wants to turn as much of the place as he can into a massive desert(it's an evil campaign, though we are taking care to specifically avoid disruptive gameplay type of evil). Since we're lower level(6) right now, I'm building him to be fairly genre savvy, not daring to to start going on with his plan until he's fairly sure he can fight back against the other natural spirits who are likely not going to be happy about the desert encroaching on their area(and the people who probably don't want their land turned into a desert either).
Well fey wild is a mirror of the world so there would have to be a reflection of the worlds deserts but there would be more life with small plants and insects where the real world has dead sand. If you can take a look at the darksun monster book it has some fey creature type, desert monsters you might get to help you.
Ah..in that case, I'll go with he doesn't think there's ENOUGH desert in the Feywild :P
|
global_05_local_4_shard_00000656_processed.jsonl/54867
|
avoiding abandoned stack values
"steve" <[email protected]>
23 Sep 2003 13:26:09 -0400
From comp.compilers
Related articles
avoiding abandoned stack values [email protected] (steve) (2003-09-23)
| List of all articles for this month |
From: "steve" <[email protected]>
Newsgroups: comp.compilers
Date: 23 Sep 2003 13:26:09 -0400
Organization: Posted via Supernews, http://www.supernews.com
Keywords: code, optimize, question
Posted-Date: 23 Sep 2003 13:26:08 EDT
Hi all!
the expression:
alone has no need to leave a stack value but when used as y=x+1; it
does. Assuming I leave a stack value for each expression, a problem
Since y and x+1 are both expressions and are always candidates for
rvals, and it is instictive to assume that a stack value should be
produced each time an expression is reduced. What is the best way to
cleanup unconsumed stack values? One of my early attempts was to emit
a pop each time a sem-colon was encountered. This solves some of the
problems, but is clearly not the solution. Even if it were,
inefficient run-time would result due to the extra instuctions.
I am working in the flex-bison arena. The target language is a report
writer using C-like constructs with built-in extensions for calls into
database API's. I'm starting with MYSQL, and expect to tackle other
db's once I get the core working.
I am familiar with the use of stack frames which eliminate the problem
in procedure calls, but the problem I have stated is
Thanks for any guidelines from those who have already overcome!
[Early C compilers evaluated expressions in three ways, depending on
whether it needed the value, the side effects, or the truth value.
Top level expressions are evaluated for side effect, internal
subexpressions for value, expressions in if/while/for statements or
operands of || and && for truth value. You have to do something like
that. -John]
Post a followup to this message
Return to the comp.compilers page.
Search the comp.compilers archives again.
|
global_05_local_4_shard_00000656_processed.jsonl/54890
|
Fantasy Football..need opinions
Discussion in 'Fantasy Sports Zone' started by Nav22, Sep 17, 2004.
1. Nav22
Nav22 Well-Known Member
5,156 Messages
620 Likes Received
OK, I have Shaun Alexander who probably won't play this week, so here's my situation.
I have to start 2 of these 3 RBs...
Kevin Jones, Detroit (vs Houston)
Thomas Jones, Chicago (at Green Bay)
Lamar Gordon, Miami (at Cincy)
I tentatively have the Jones boys as the starters this week, but I'm thinking of plugging in Gordon.
(RBs in my league get 1 point for every 10 yards from scrimmage, and 6 pts. for TDs...so a TD is worth 60 yards from scrimmage)
2. TheHustler
TheHustler Active Member
5,390 Messages
0 Likes Received
go with the joneses.
3. jcollins28
jcollins28 Active Member
1,508 Messages
11 Likes Received
I would go with Gordon. Cincy's run D might be suspect. K Jones showed nothing in week 1. So I would go with T Jones and L Gordon.
4. AmarilloCowboyFan
AmarilloCowboyFan Active Member
2,390 Messages
10 Likes Received
I agree with jcollins28
I would go with Lamar and Thomas Jones.
I have a similar situation. I have Dillon, Staley, K. Jones and L. Gordon.
I decided to sit Duce and Jones and play Dillon and Gordon simply because of the opposing Defs (and the fact the Bettis screwed me last week getting all of Duces points.)
Share This Page
|
global_05_local_4_shard_00000656_processed.jsonl/54893
|
iPhone Developers
Apple made a controversial announcement at the World Wide Developers’ Conference, which went something like this: “We’ve got a new, innovative way of giving you developer access to our phone: we’re not.” (I’m paraphrasing; see the full quote below.) In less than 24 hours, this has devolved into an online debate between defensive “traditional” developers and Web developers, Apple critics and apologists. Many have tried to turn it into a debate over what whether or not web apps are applications. That’s silly. Of course web applications are apps. Here’s the real problem in a nutshell:
1. Apple is ignoring what makes non-Web apps valuable. That’s their choice — it’s their phone — and we could forgive them and maybe even agree with them, except –
2. They’re then trying to distort reality around them so that things they’re saying that happen to be wrong wind up being right. Lots of companies do that, but this being Apple, some people are actually listening, and I hope they’ll stop.
I’m going to say this the long way around, because I type fast and think in sprawling, high-word-count ways. Our friends at Rogue Amoeba, one of our favorite audio developers for the Mac (notice how multimedia keeps coming up), put this more succinctly:
Web Apps Are Not Applications
We know that making SDKs is not easy, and so it boggles the mind that you were able to create a complete iPhone SDK so quickly! So much access, provided so seamlessly – it is really quite amazing.
With this new SDK, we can create something neither of us could possibly have done alone, and make the iPhone platform the mobile platform to develop for.
Anxiously awaiting his copy of the iPhone SDK,
Sarcastic Developer
Web apps are wonderful. I spend huge amounts of time in them. But as musicians, you know why web apps alone aren’t enough. Hardware access and multimedia capabilities are vitally important for some (but not all) tasks. Take them away, and your expensive computers become instantly less useful. This matters to some more than others, but that doesn’t mean it doesn’t matter. In fact, try this experiment: take your Mac. Remove all audio and MIDI device support, allowing only iPhone and the OS to make sound. Now you can’t even record a voice memo or phone call — no mic input. Next, reinstall your browser, removing Java and Flash. (Good: I can read Penny Arcade and CDM — well, most of CDM. Bad: I can’t watch Homestar Runner. Or YouTube. Or use embedded Flickr apps. Or use entire websites. Uh-oh.)
A phone is not a Mac, and that’s a good thing. But to assume these two things equate just doesn’t make sense. Design is about compromises, and that’s a good thing. But now design is about making compromises, then changing the reality around you so that they’re not compromises any more?
Here’s a short list of other things an iPhone web app can’t do that (with the notable exception of multi-touch) the vast majority of phones can — yes, including that crappy low-end Nokia you got free with service. Really. Look up the developer site for your phone, and check it out.
1. Access the phone’s hardware vibrate and sound functions to provide notifications and feedback.
2. Make use of the entire screen. (The iPhone demo app ran only within the Safari browser, which takes up a significant amount of screen real estate.)
3. Access the phone’s multi-touch gestures (the key advantage of this device in the first place). Gestures are intercepted by Safari.
4. Provide more sophisticated interaction, UIs, animation, gaming functions, audio playback, and video playback. Java and Flash evidently aren’t supported, and while the iPhone OS can perform some of these functions, only Apple is really allowed to develop for it. If something isn’t important to them, it just doesn’t happen at all.
5. Provide network access beyond web protocols. For instance, on a cheap Blackberry I can log in and restart the CDM server via ssh when there’s a crash. On iPhone, I can’t. That was never a security concern for any of the countless Java-based phones that support this feature. Does everyone want this? Of course not. But it’s not the phone companies pushing to limit the iPhone, because they’ve actually worked to extend phone capabilities.
AJAX is great technology, but creating a lot of hype around a technology doesn’t magically make a specialized tool the right tool for every job. Java and Flash may annoy users when they’re used in places they don’t belong, but used correctly, they provide vital functions that web technologies (“Web 2.0″ or not) don’t have, like support for multimedia formats.
It may take people like us — those of us who push the envelope of technology to produce music, visuals, interactive phones as performance tools — to explain why web apps alone aren’t the future. Music, after all, is often exactly the kind of “rich” that makes a rich client.
That’s not to say your $500 is badly spent on an iPhone, or even that Apple’s making the wrong move. Many have pointed out that this approach makes a certain amount of sense. A lot of applications don’t need the above features. Many Java phone applets — like recent clients for Gmail and Google Maps, for instance — are there to make up for the fact that phones have truly awful browsers. I personally would rather spend hundreds on a device that has multimedia and hardware integration, but I can see why Apple’s move might be smart. The problem is, they’re trying to present this decision as something it isn’t.
We’re at a critical point, where users are either going to understand what makes rich clients different from thin clients, or they aren’t. Creative artists are right in the center of the capabilities of a rich client that will never be a web app — web protocols are light years short of being able to, say, run Ableton Live in Firefox, and why would you want to? Yet people make the nonsensical argument that web apps and rich apps are identical. Apple isn’t helping, because the whole essence of their presentation was based on the assumption that people wouldn’t notice the difference. Here’s their speech, which was — rightfully — met with stony silence by a room full of developers who understand the difference:
Steve Jobs:
“What about developers? We have been trying to come up with a solution to expand the capabilities of iPhone by letting developers write great apps for it, and yet keep the iPhone reliable and secure. And we’ve come up with a very sweet solution.”
“We’ve got an innovative new way to create applications for mobile devices … really innovative. And it’s all based on the fact that iPhone has the full Safari inside of it … and it gives us tremendous capability, more than has ever been in a mobile device to this date. And so, you can write amazing Web 2.0 and AJAX apps that look exactly and behave exactly like apps on the iPhone. And these apps can integrate perfectly with iPhone services. They can make a call. They can send an email. They can look up a location on Google Maps. After you write them, you have instant distribution. You don’t have to worry about distribution; just put them on your Internet server. And they’re really easy to update; just change the code on your own server rather than having to go through this really complex update process. And they’re secure … and they run securely on the iPhone, so they don’t compromise it’s reliability or security.”
“And guess what? There’s no SDK that you need. You’ve got everything you need, if you know how to write apps using this most modern web standards … you can go live on June 29.”
Words that don’t fit the context here: “sweet”, “solution”, “innovative”, “really innovative”, “new.”
I actually don’t recall Apple even using the word “innovative” in recent memory. That’s a word Microsoft likes to use when they’re doing something unoriginal, or stupid, or both. Of course, this shows incredible hubris, especially at a developer conference.
The crux of the problem is claiming that creating web apps is a new idea, that full-featured browsers on mobile devices is a new idea (it’s not), that basic integration with calling features and email is a new idea (hello, Treo?), that that kind of integration is real hardware integration (it’s not), that somehow “Web 2.0″ (whatever that even means) and AJAX are better than or can fully replace other technologies (they were never intended as a replacement for things like Java or C, period), that online delivery is an awesome, new feature (Java apps do it, too, only not on iPhone since it can’t support it), that the omission of an SDK is a “feature” or itself innovative (come on), that applications outside browsers are inherently dangerous to security and reliability (Java mobile apps in fact do neither), and that Apple is somehow enabling people to build apps for the iPhone when in fact all you’re really doing is developing webpages just like you always have.
I love Apple; I think they’re probably the single smartest tech company on the face of the Earth. So I don’t ask much: just stop spouting total nonsense at developer conferences, okay? When Apple announced the Intel transition, also at WWDC, they actually went as far as claiming you could rewrite entire applications for Intel using only a “checkbox.” Now they’re claiming to have “innovated” by “discovering” web browsers. What’s next?
• George
I agree that apple copped out with this one. I dont know if ATT or apple itself is the cause of the whole closed system. Plenty of windows devices allow you install anything you want, so the while secure cell phone thing is total 100% pure BS. Using the web browser as the runtime is limiting at best. what happends then the phone changes orientation? Lots of questions and lots of isues with this. I agree that apple is trying to do Microsoft speak with all it's bone headed buzz words that were used to try to sell you crap dressed in a pretty box. Shame on Steve and Phil for shoveling this in developers faces. The iPhone could have been the greatest phone ever with 3rd party developer support. Now I fear it will be hamstrung with apple only provided software on a slow 2.5g network and will premier with lackluster reviews and hype to high that reality will never match the fantasy of the iPhone
• Danny
It is always funny when someone knocks apple at all because they also take a swipe a MS to raise their fanboi shield. The word apple usually uses isn't "innovative" it is "revolutionary":
which is actually worse IMHO. Especially in this case. The iPhone really would have blown open the box with a full service SDK but instead it looks like it will just be really cool.
• http://www.createdigitalmusic.com Peter Kirn
No, revolutionary may in fact be appropriate. I just saw folks with iPhone t-shirts and muskets out in the street. Excuse me, I have to go convince them I'm not a member of the royal family.
• http://www.zenarchery.com Joshua Ellis
Here's what I'm not getting:
1) The iPhone's Web apps don't do anything that you can't do in a browser anyway, and in fact do less (since there's no Flash or Java support).
2) The iPhone has an always-on Web connection.
So…why would you write web apps specifically for the iPhone? If it's always connected, why would one write crippled apps that download to the device, when (theoretically) you can just write full apps that get accessed via the browser?
Is there file system access or anything like that, that I'm not seeing?
Also, has anybody explicitly determined whether Safari for iPhone will support Flash in the browser or not?
• http://www.mesmero.net Mesmer
I am a web developer.
I am not sure I am understanding this.
I want to run "this cool stuff" on the Iphone, even if it's a live slicer or sampler, apple proposes:
1. I make the whole thing in .jsp, .asp, RoR, even .php.
2. deploy to internet server
3. use it's browser based interface through an internet connection to run it?
That just doesn't make sense.
or is it that:
2. run a web server from the iPhone OSX filesystem, serving to http://localhost.
3. Type http://localhost or and use my "cool stuff".
The first case seems ridiculous. The second seems crippling, for us CDMers, at best.
Someone care to shed some light, as to what is the proposed Cycle … more or less based on the cases I've described (if it's even possible)?!
• http://www.createdigitalmusic.com Peter Kirn
@Mesmer: As far as Apple has communicated at this point, it's in fact your first set of steps 1-3. This also means that the app is useless if you're away from an Internet connection, which for those of us who spend a lot of our time using these devices on airplanes and subways is a HUGE minus. (let alone what happens when you're traveling internationally and can't use the connection)
@Joshua: everything I've heard suggests neither Flash nor Java is supported in the browser, but the only explicit word has been on Java. There's been lots and lots of discussion on the Interwebs about Flash, including apparent multimedia content shown in the iPhone ads.
It seems most likely that what Apple will do is use QuickTime for multimedia playback, including very likely some sort of H.264 support for YouTube.
But given all the interactivity that Flash provides that QT does not, that's frustrating. Adobe may be partly to blame with the somewhat flubbed Flash Lite initiative.
If only there were a gathering where you could share such information, so that developers would know what to expect. Like a conference of developers, from all around the wide, wide world. Hmmm…
Maybe Apple's iPhone sessions at WWDC will be more forthcoming? (Can't imagine they'd be any less.)
Other than trying to figure out what multimedia support is in there, I can see designing for the iPhone aspect ratio, etc., but that's hardly worth mentioning in a keynote. (And it's been done elsewhere, like special page designs for Opera on Nintendo Wii and DS — though part of the beauty of having a good browser and good web design is you don't have to do much.)
• Viswakarma
All of you need to read what Web 2.0 is before you pass judgement on Apple's WWDC 2007 announcement means —
• Viswakarma
All of you need to read what Web 2.0 is before you pass judgement on what Apple's WWDC 2007 announcement means —
• Steve W
January 15, 1990.
AT&T is risk averse these days.
• http://www.mesmero.net Mesmer
Thank you Kim,
if the information is later confirmed, it's official:
I am not buying the iPhone.
Of course this would open the possiblity for some other manufacturer thriving by making this omissions their strong point, cheaper, not multi-touch. A sleeper success gadget…. Behringer netPhone, anyone?
I will not mention the Newton in this thread.
• http://www.milezero.org Thomas
Mesmer, a Windows Mobile phone will cover some of the functionality you seem to be interested in using. It's not multitouch or a Mac. But if you can get over that, it's not a bad platform, and the last time I check, a native SDK and compiler was free (or you can write for it using .Net).
• http://www.createdigitalmusic.com Peter Kirn
Everyone loves to blame AT&T, but every indication is that this decision comes entirely from Apple. Virtually every other phone from AT&T has the ability to run Java applications. There are third-party applications — not just webpages — running on their Blackberries, Symbian, and Windows Mobile phones. Several phones have Flash Lite. Now, it's possible that getting the equivalent of Flash Lite or Java ME onto a Mac smartphone running the mysterious OS the iPhone has is difficult. But it's certainly not that AT&T won't allow it for security and reliability reasons. That has to be either entirely made up or very distorted — an odd thing for the CEO of Apple to be saying.
Here's AT&T's developer page:
With a free login, you can access the SDK for every phone they sell — except Apple's, that is. Don't get me wrong. Developing for phones has often been a complicated mess. But then that tells you something, too — developers are willing to go through that pain in order to get more access to the hardware or provide more features.
And this page is also telling:
It lists the platforms for development: Java, Palm, RIM, Windows Mobile, and Symbian. Even the not-smart phones have the ability to run lots of genuine third-party apps, some of which are very useful. Done right, these platforms don't have to involve complex cross-phone issues, but can still provide more robust multimedia, hardware support, UIs, and feature sets. Imagine if Apple did create a development platform that leveraged the power of Xcode, Core technologies, and Mac OS.
And, regardless, again, do you get the sense looking at those pages that AT&T/Cingular doesn't want developers?
If Apple is confident in their decision — and they sure seem to be — why can't they level and tell us the truth about what they're doing, instead of spinning all these complicated answers and excuses? So, web apps may be better for what most users want to do. It may help Apple avoid complex SDK issues. It may keep the iPhone more reliable. Fine. But instead, to try to pretend that it's AT&T's fault, as Jobs did earlier this year, or that you can't deliver reliability and security, which just isn't true, or that web 2.0 applications are some kind of special Apple innovation that replaces all other apps? That's insane.
• http://blog.whats-your.name carmen
apple hasnt liked 3rd party developers since Steve came back and started acquiring one app in every category – just competent enough that most people didnt seek out alternatives to the Apple offering.
that, and the fact that you still cant customize OSX (i mean change the window manager, or UI behaviors).
its a good excuse for them to not have to come up with a real SDK, and pretend theyre cutting edge at the same time, while giving developers who want to do useful things the cold shoulder. apple developers should be used to this by now..
• http://www.createdigitalmusic.com Peter Kirn
Carmen, I think Apple could do more in terms of developer relations. But Apple under other CEOs was similarly criticized. Apple's acquisition of major apps has coincided with a period of *growth* in third-party development. You'll notice that even as the company competes in the audio and graphics space with other developers, it continues to promote the Mac ecosystem — it even pushes Adobe products with which it competes directly. (And why not, since their main business is still selling hardware?)
The iPhone aside, Apple's doing a lot in terms of Xcode and Core technologies — maybe too much, arguably, because both Microsoft and Apple push for OS-exclusive stuff rather than supporting cross-platform development as well as they might. (They have business reasons for that, naturally.)
In fact, I think if Apple developers did feel slighted, they wouldn't be so surprised, insulted, and frustrated with this decision. The reality is that many Mac developers are, aside from the usual gripes, often very happy with Apple. They've come to expect a close relationship, and so they feel betrayed by this decision — especially since Jobs himself has repeatedly described the iPhone as a Mac, not an iPod.
I would also like to re-skin the UI, but that's another discussion. ;) (And you'll notice Microsoft again removed the ability to do that in Vista — msstyles are dead.)
• bobby
I remember hearing the same betrayal thing with the Intel transition two years ago…but everyone was back at wwdc the next year with new universal apps.
I know a few web developers and they are doing amazing things. They haven't griped once…they are excited. The fact is: we still don't totally know what this phone will do. Let's hold off on judgment until we see what people are actually able to do (or not do). If innovative web developers agree that thing is a piece then—well, great, let's tear Apple a new one. Until then, could the whole internet please just shut the hell up.
• bliss
Peter, I think that Jobs has repeatedly described the iPhone as a phone, not a Mac. I remember reading NY Times articles back when the iPhone debuted, and I wondered what he was getting at by saying that. I suppose I know now. I'm not a developer so don't frack me up over the following: What I had imagined was some sort of virtual environment on the iPhone that would run "rich clients". Kind of like Virtual PC. That way, the iPhone's OS remains secure and developers get to do what they want to do. That was my simple vision anyway. But I followed yesterday's keynote over at MacRumors.com (which was excellent coverage) and I was completely underwhelmed and bored with it. It was easy to imagine that the developers in attendance in SF were mirroring my own dissatisfaction. Oh, well, as least the iPhone is still a desirable item — just a nifty device for the image conscious. That's not all bad.
• bliss
Early iPhone review by Wall Street Journal technology writer Walt Mossberg: http://www.appleinsider.com/articles/07/06/11/bri
• http://www.milezero.org Thomas
bobby, the Intel transition came with developer tools and an emulation layer. Totally different situation.
• http://www.chromedecay.org J. Schnable
A couple of other things to consider –
1. The iPhone will come with many "cool apps" built in. Movie and music playback, photo album stuff, calendering and mail, browsing, etc. It won't be the third-party apps that drive initial interest in the product.
2. Developing SDK's is a pain (albeit one with a potentially huge payoff). And, given the fact that Apple pushed the launch of Leopard back to allocate more resources to the iPhone may hide an ugly truth – they're behind on their own stuff, let alone having time to lay things out for the rest of the world to develop for the platform.
3. It might flop. Expectations are quite high for Apple these days. The success of the iPhone isn't going to reside with third party apps. Apple needs to see if the market is ready for the iPhone, after the media hype has died down.
4. They also have to contend with launching a new product in a new market segment, with new technology (ahem, AT&T, are you ready for this too?) on new hardware. That Motorola phone doesn't count. Revision "A" products from Apple in the past couple of years have been a bit more problem-laden in the past. Or, at least, that's my impression.
My guess is that an SDK will come around at some point. But Apple has a boatload of things on their plate with this. If their primary focus is "let's launch something that works as advertised, then sort out some of the other details" fine with me. The focus of the keynote yesterday was on Leopard, and there's plenty for developers to be excited about there.
• bliss
J. Schnable, what I've been coming to understand over the past week or so is that Leopard is damn near finished. Much of what's holding it up seems to be Sun Microsystems ZFS file system that Apple wants to replace Mac OS X's HFS+ file system with. If it weren't for that, I think we'd all have Leopard humming on our Macs by now.
• http://www.createdigitalmusic.com Peter Kirn
All those things are true … and again, like I said, I'm not actually sure this is a bad idea. I think Apple does still need to respond to on a consumer level the Flash thing, because Flash is so essential to a lot of websites and Apple is claiming you get the same experience in Safari on iPhone that you do in Safari on Mac. Won't be a deal killer, but it is disappointing they've been mum.
The overwhelming sense I get is that Apple tried to spin the absence of an SDK as a major innovation and accomplishment for Apple. They just got the messaging horribly wrong yesterday. And it wasn't a complex message: we're not ready to an SDK right now, because we're focused on reliability, security, and what the phone does now. But we can help you build great web apps for the phone. Somehow, that got mangled into, "we have a fantastic, innovative new technology called mobile Web browsing and it's all you'll ever need!"
Apple needs an off switch for its hype. Sometimes the Reality Distortion Field actually gets them in trouble. How else to explain that a company that's on schedule for a hugely-anticipated mobile device and on schedule for a hugely-anticipated OS upgrade manages to see its stock price plunge because they didn't have earth-shaking news at their *developer conference*. The Intel Mac transition is another great example: they needed to switch off the "all you need is a magic checkbox" hype then. As a result, they confused customers and caused a lot in the Mac user base to think something was wrong when it tooks many months, not hours to port to Intel. That was a hugely damaging statement, and it didn't have to happen. This one isn't likely to resonate far off into the future, but it was still a fumbled statement.
And I do think folks pushing the Java, Symbian, Windows Mobile platforms, and so on should use this as an opportunity to kick into high gear and create something that's really competitive. Whether they're capable of doing elegant mobile devices, though, even after all this years, remains to be seen.
That's the flipside of this, which is that a lot of the power of, say, Java ME goes to waste. Now's the time to do something really cool and well-designed with it.
Me? I'd like a Java-based tracker on my phone, please, that uploads MIDI drum patterns to a server. Guess I'd better go and write it, huh, rather than wait for Samsung? ;)
Now, if you'll excuse me, back to work on my Mac. No multi-touch, but you gotta love 23" displays and real operating systems. In fact, I hate all phones … let's turn that sucker off completely. All it does is ring and make me answer calls and stuff. That's annoying. :)
• http://www.createdigitalmusic.com Peter Kirn
Yeah, except Apple says there is no ZFS in Leopard. I'm wondering if Time Machine in fact does *not* require ZFS, and it's just the usual development delays holding it up. (It looks like a huge release.) I think we'll see ZFS at some point, but now whether it's in Leopard is anyone's guess. I seriously doubt that'll be a deal breaker for any of us, anyway; ZFS seems to be more about future-proofing down the road.
• bliss
I just swiped this Job's quote from AppleInsider.com:
Meanwhile, there's sure to be some dashed hopes if iPhone arrives later this month without support for Adobe's Flash media format. Right now, Flash is looking more like a "maybe" than a guarantee.
Apple chief executive Steve Jobs told the New York Times that "you might see" Flash support come to iPhone, but YouTube support would be present regardless.
"Yeah, YouTube — of course," he said. "But you don’t need to have Flash to show YouTube. All you need to do is deal with YouTube. And plus, we could get ‘em to up their video resolution at the same time, by using h.264 instead of the old codec."
Jobs also confirmed that iPhone won't support Java. "[It's] not worth building in," he said. "Nobody uses Java anymore. It’s this big heavyweight ball and chain."
• bliss
I guess I left a bit out that should have been italicized. Oops.
• http://amoebafunk.com amoeba
web apps make sense, at least for now. better than nothing anyway. webkit has a great start and will only get better and more distributed, so i think this approach is a good start. besides, we can only guess at the reasons for not providing an SDK at this point. keep in mind, no one has said there will never be one. i sure hope there will be. baby steps.
• http://www.sighup.ca Steve
None of this really sounds like development for the iPhone, merely development accessible to the iPhone. Which is a little odd. Especially since web developers could just as easily say screw you, I won't bother with the iPhone market (maybe that would make Apple happy?).
I have a feeling that part of this move is to leave the market open for Apple to exploit its multi-touch interface technology for other kinds of peripherals/interfaces without having to compete against homebrew/3rd party stuff on the phone (I'm thinking stuff like a controller for multimedia workstations or a next-gen iMac with nothing but an LCD screen and a multi-touch tablet in place of a mouse and keyboard).
• subbasshead
All I can sya is dont install Safari 3 beta
I did & my ProTools HD wouldnt launch any more….
deinstalled Safari 3 beta – still no go
reinstalled ilok/PACE drivers – still no go
reinstalled ProTools – still no go
reinstalled last OSX 10.4.9 update – phew its working again!
• nylarch
AJAX is a security nightmare waiting to happen (Google has kept one step ahead barely so far) so I wonder if Apple is opening themselves up to compromising their beloved "more secure than MS" credentials. MS was always the main target for virus' but methinks the iPhone may present an inviting target for a hacker to hit.
• http://www.createdigitalmusic.com Peter Kirn
@bliss: Flash is still a mystery; that quote comes from the NYT in January. We'll see. And yes, I expect some features may evolve over time.
You know, I'm all for accessible *web design* — and I hope sincerely we see more full-featured browsers on more devices; that much seems inevitable. It would have been great if Apple had talked about that, spun it that way.
@tim (subbasshead): YIPES! Thanks for the tip! That's … weird!
Hope that Time Machine lets us roll back our Library folders. ;)
• http://www.mesmero.net Mesmer
None of this really sounds like development for the iPhone, merely development accessible to the iPhone. Which is a little odd. Especially since web developers could just as easily say screw you, I won’t bother with the iPhone market (maybe that would make Apple happy?).
I have a feeling that part of this move is to leave the market open for Apple to exploit its multi-touch interface technology for other kinds of peripherals/interfaces without having to compete against homebrew/3rd party stuff on the phone (I’m thinking stuff like a controller for multimedia workstations or a next-gen iMac with nothing but an LCD screen and a multi-touch tablet in place of a mouse and keyboard).
June 12, 2007 @ 3:31 pm
you seem to have such a clear insight …
Hey, "Steve", can you get me a job over at Music Tech. Testing at you know where?!!
• http://www.sighup.ca Steve
I wish.
• jman
This really is a tough problem for AT&T and Apple. No SDK for full OS resources because this way no VoIP apps on iPhone for now… messing up the partners business model… which I believe is their main concern.
there would be no incentive for AT&T to sell such a capable device and work so hard to provide so many wi-fi hot spots if such a combination severely reduces the need for their primary revenue generating products and opens infrastructure for competitors to utilize their infrastructure and access to their customers for free.
• http://www.milezero.org Thomas
jman: I still doubt it's AT&T. After all, Skype is available for their Windows Mobile smartphones. Isn't there a VoIP for Blackberry?
• http://www.createdigitalmusic.com Peter Kirn
Skype runs natively on Windows Mobile. I don't think there's a similar native solution for Blackberry, but there is this option that uses Skype voice calls on Blackberry, Java phones, and Windows Mobile:
Looks *really* nice, in fact. So, yeah, Blackberry is geekier, but potentially more useful in your actual life (which may NOT involve trying to watch Pirates of the Caribbean on a tiny screen and killing your phone battery — sorry, couldn't resist).
Google Talk client is also on Blackberry, but I don't think it does voice currently.
Hey, wait a minute … IM is yet another application missing on iPhone, huh? ;)
Incidentally, James Gosling, father of Java, was evidently at WWDC. Java elsewhere on Mac is not necessarily dead.
• http://www.paulsop.com Doktor Future
This changed my mind: I'm sticking with my lame Crackberry for a while yet. No iPhone for me, and I've got a bunch-o-macs.
I think this WWDC had too much reality distortion even for me, and my reality is generally up for grabs most days.
I'll continue to use Apple PC's because they annoy me less than other offerings, but here's the current rankings for day to day painless computer use:
Apple: C+
Vista: D+
XP: D-
Linux: D
• http://sidechainmusic.com Dave Dri
It only took about 10 posts for someone to suggest or insinuate a Behringer knock-off. LOL nice one Mesmer!
"…sorry mate my phone just crashed and erm, a knob fell off. I'm not sure from where, but i've got this cool hax for it anyway".
I think Peter REALLY just wants an SDK so he can get a WiiMote working with the phone :P Can you imagine how well a WiiMote/iPhone combination would sell in countries like Italy and the Balkans? Gesture sensitive mobile telephony!!!
Okay i will let myself out…
• http://www.createdigitalmusic.com Peter Kirn
It's true. I'm biased. I wanted the iPhone to be a multi-touch music controller. Heck, I would even have used it with Logic. Their loss. ;)
• JMS
No sdk = not the end of the world: http://thenewsroom.com/details/396043
• http://www.cutwithflourish.com ed
I guess if the iPhone bombs no one will care that they didn't bother to write apps for it. If it is the next iPod an SDK may appear.
I agree with Mr Schnable. I think people are being cautious.
The alternative would have been polyphonic theremin emulators on the iPhone. What does a chord sound like on a Theremin?
• poopoo
There are some great music apps for Windows Mobile. Sequencers with plugins and wav export (Griff), Multi-track recorders (Meteor), Guitar tuners, Metronomes and real-time effects processors etc.
And it's not just music stuff; graphic calculators, Skype and SIP clients, console emulators are great candidates for mobile apps but they probably wont happen as web apps.
Seems such a wasted opportunity on the iPhone, especially with the multi-touch screen.
• http://nightripping.com/bresslau/ Bresslau
No iPhone for me either. Though I wish I had that big beautiful screen on my Xplore M68.
And Web 2.0 doesn't exist. Never has. But it is a catchy and usefull expression for some purposes.
• EJ
Yeah, it's patently ridiculous that a company at the forefront of desktop richness would claim that web apps can be functional equivalents – it hasn't received a lot of notice (outside of a good Wired article), but Core Animation in Leopard is actually going to be huge in this department. I saw that part of the keynote as an apologetic shrug of the shoulders.
Speaking of Core Animation, I've heard that a lot of Mac applications will require Leopard because it'll be integral to building "new school" programs.
It definitely gives some credence to the "Logic 8" rumors (an article at CDM said it would require 10.5) and explains the long delay between 7 and their new flagship program…
• http://www.createdigitalmusic.com Peter Kirn
@poopoo: I agree… do those apps tend to work on devices like the Moto Q, or do you need the "smarter" WM phones? And don't forget about WM-compatible MilkyTracker. And the similar lineup for Palm.
I think there are even a couple of music apps for Symbian. Not so much for Blackberry.
@EJ: Logic 8 may or may not require 10.5; I think I was either linking to a rumor that thought it would, or just speculating the release *might* be timed with an OS release. That said, it certainly seems possible — Final Cut Studio 2 requires 10.4.9. (Pretty specific requirement!)
I would say Core Animation got a lot of notice from the Mac community, but the problem is these technologies are under developer NDAs, and Apple chose not to really talk much more about them at the keynote. So you can expect to hear lots more in October when suddenly a whole bunch of apps ship with the OS. ;) (That's something no one has mentioned — I'm guessing the OS delay should put third-party developers in much better sync with the OS release timetable.)
• EJ
Did you catch
this article in Wired? It made me more excited about Jaguar than the keynote – it definitely makes me wonder about the potential uses for music interfaces.
This developer interview is also pretty interesting,.
• http://www.createdigitalmusic.com Peter Kirn
I had meant to comment on the article in Wired. I know a few of the developers in that story. :)
Core Animation is indeed a good thing in that it builds this into the OS in an intelligent, accessible way. I think a lot of the initial ways you'll see it used will be subtle — and rightfully so, because animation has to be used delicately to be useful. We'll talk more about this soon and over the coming months. And it will be interesting to see if it makes it into Apple's pro apps, as well.
• http://www.mesmero.net Mesmer
This is pathetic,
the "newsroom article" needs flash 8 plugin to render.
Oh, I suppose its an web2.0 article
***would mumble indecent grumbles but I don't know how to do that, outside my native language***
• http://www.createdigitalmusic.com Peter Kirn
Don't worry. The newsroom article says nothing we don't already know. Basically, it's Apple's press release announcing they don't need an SDK because they have a web browser — same bizarre spin as in the keynote.
And, of course, ironically, while you can read CDM on the iPhone (Flash isn't required), you won't be able to read that article. Brilliant. :)
|
global_05_local_4_shard_00000656_processed.jsonl/54895
|
Take the 2-minute tour ×
I am aware that MD5 has a known collision vulnerability and should not be relied upon when uniqueness is required, but in the environment I am working on I only have access to MD5 hash function. Background detail below, but in general how much and how bad is the change in the probability of hash collision if I removed a few digits from the hexadecimal representation of MD5 hash values?
Background: I am working on migrating data between two systems. The target system has a built-in database column of length 30 characters that has unique/primary key resolution mechanism, meaning as long as I put a matching value in that column the system will map it to existing record if exists and create new record otherwise. Unfortunately the primary key from source system has length of between 50 to 100 characters so my best bet is to generate a shorter hash value from it. I only have access to MD5 hash function but the hexadecimal hash value is 32 digits long so I have to drop two of the digits. There is virtually zero probability of anyone wanting to use collision attack on the data so my concern is pretty much on the distant possibility of Heaven-assisted coincidence that two primary keys might generate the same hash value.
N.B. Possibly related to "Should I use the first or last bits from a SHA-256 hash?", but that question is about SHA-256 while this one is about MD5.
share|improve this question
1 Answer 1
up vote 8 down vote accepted
First things first: there is nothing magical in hexadecimal. The output of MD5 is, nominally, a sequence of 128 bits, or, if you prefer, 16 bytes (each being able to get any value between 0 and 255). Hexadecimal is just a trick to represent a single byte as two characters in a limited range (digits, and letters from 'a' to 'f'). If you can have 30 characters then you can probably use more than the hexadecimal digits. For instance, with Base64 encoding, you can unambiguously represent any MD5 output (16 bytes) into 24 characters chosen in a list consisting of digits, uppercase letters, lowercase letters, '+', '/' and '=' (the '=' sign appears only at the end, and your 24 characters will always end with a pair of '=' signs, which you can altogether omit; hence, make that 22 characters).
To answer your initial question, assuming that MD5 behaves "randomly" (which is kind of true as long as nobody is actively trying to produce collisions), then keeping n hexadecimal characters means keeping 4n MD5 output bits, and collisions are expected to appear around 22n keys. With n = 30, that's 260, also known as "approximately a billion billions", which is still kind of huge. Still, you'd better use a shorter encoding such as Base64, which avoids the issue altogether.
share|improve this answer
From another viewpoint: The probability of a random collision with the 30-hex-digit hash is 256 times the probability with the full (32 hex-digit) hash. – Paŭlo Ebermann Jul 21 '11 at 23:04
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/54907
|
Three Paradigms of Multi-Culturalism
To add a paper, Login.
How should liberal-democratic societies respond to the claims of national, racial, ethnic, and religious minorities for special recognition and group rights to protect their cultures and identities? In this paper, I evaluate the strengths and weaknesses of three paradigms that speak to this issue – the assimilationist ‘melting pot’ paradigm of classical liberalism, the cultural autonomy paradigm of multi-culturalists like Taylor and Kymlicka, and the transformative nationality paradigm of writers like Miller. I argue that depending on historical circumstances, any one of the three paradigms may provide the most reasonable and just resolution to the fact of deep cultural difference.
Keywords: Rival Paradigms of Cultural Difference, Liberalism and Group Rights, Individualism and the Politics of Identity
Stream: Identity and Belonging; the Politics of Diversity; Globalisation
Presentation Type: Virtual Presentation in English
Paper: A paper has not yet been submitted.
Prof. Gerald D. Doppelt
Professor, Philosophy, University of California
San Diego, CA, USA
Gerald [Jerry] Doppelt teaches at the University of California, San Diego, where he is a Professor of Philosophy and Science Studies, and holds the position of University Academic Senate Distinguished Teacher. He teaches a wide variety of courses in ethics, political theory, and philosophy of law, covering issues such as social justice, medical paternalism, the death penalty, the abortion debate, affirmative action, the rights of cultural minorities, just war theory, pornography and free speech, and family/gender justice. His publications are in the fields of political philosophy, philosophy of science, and philosophy of technology. The work in political philosophy focuses on evaluating debates over liberalism, conservatism, nationalism, social justice, world poverty and global justice, feminism, just war theory, race, and multi-culturalism.
Ref: D08P0206
|
global_05_local_4_shard_00000656_processed.jsonl/54913
|
I was peeling an orange at breakfast. I looked at my wife over it. She smiled. Her fingers were scratching the side of the table. After a week, she still wasn’t used to not having a newspaper to read. We made our way through breakfast with only our sniffs and the clinking of the cutlery for company.
I made my way to work. Like so many others, my job was to sit at my computer and wait. On my way, I passed many familiar places – markets, malls, cinema halls. I couldn’t remember their names nor read the marquees.
I reached work and took over from the woman sitting at my usual workstation. I nodded to her, she returned the nod grimly, and then shook her head. I sighed and sat down.
And I began to stare at the screen. A week ago, language had gained sentience and left to regroup and formulate a strategy to deal with humans. Still no sign of a return. Across the world, people sat and stared at each other, or listened to telephone noise, or, like me, waited for the computers to say something. Although we didn’t have the words to express the thought, each of us hoped they would be the first to speak.
About these ads
, , ,
1. #1 by EstherHawdon on November 11, 2010 - 12:45 pm
This story tells us there are both hope and despair concerning language. For instance, language helps us communicate with each other on the surface, but language cannot express everything and even causes misunderstanding. Whenever I use words, I feel I’m saying something different from what I really think or feel.
Leave a Reply
You are commenting using your account. Log Out / Change )
Twitter picture
Facebook photo
Google+ photo
Connecting to %s
Get every new post delivered to your Inbox.
Join 46 other followers
%d bloggers like this:
|
global_05_local_4_shard_00000656_processed.jsonl/54931
|
Take the 2-minute tour ×
I have two computers running SQL Server 2008 Express: c01 and c02, I setup both for remote connection using windows authentication. Worked fine for c02 but not for c01.
This is the error message I'm getting:
Cannot connect to ACAMP001\SQLEXPRESS.
For help, click: http://go.microsoft.com/fwlink?>ProdName=Microsoft+SQL+Server&EvtSrc=MSSQLServer&EvtID=18452&LinkId=20476
I don't know if I'm missing something, here is what I did:
1. Enabled TCP/IP protocol for client from Sql Server Configuration Manager.
2. Modified Windows firewall exceptions for respective ports.
3. Started the Sql Browser service as a local service
4. Added Windows user to this group: "SQLServerMSSQLUser$c01$SQLEXPRESS"
5. From Management Studio, I added "SQLServerMSSQLUser$c01$SQLEXPRESS" to SQLEXPRESS instance's logins under security folder, and I granted sysadmin permissions to it.
6. Restarted c01\SQLEXPRESS
7. Restarted Sql Browser service.
8. There is no domain here. It's only a workgroup.
Please any help is appreciated, Thank you.
share|improve this question
migrated from stackoverflow.com Mar 15 '12 at 12:30
This question came from our site for professional and enthusiast programmers.
3 Answers 3
Whatever username you are using on the "remote" machine must be set up on the "server" machine.
So, if you are logged-in to "remote" as "John," there must be a "John" user on the machine that is hosting SQL Server 2008 Express, and unless you are going to provide different credentials, it should have the same password, too.
share|improve this answer
I've already done that. Thank you though. – mbadawi23 May 3 '10 at 16:57
Try 'mixed authentication mode' and see if that helps. I've seen this error with the opposite configuration (i.e. trying to login with a SQL user on a system set up only with Windows Authentication).
share|improve this answer
I think you should be able to use the runas command to set up your connection in SSMS. Create a shortcut on your desktop (or wherever), and set this as the target location:
runas /user:DOMAIN\account /netonly C:\path\to\ssms.exe
If this is a workgroup, then DOMAIN may be the name of the computer SQL Server is installed on. Obviously, the account you're setting here will have to exist on the computer hosting SQL Server.
This setup also works for domain users trying to connect to a SQL Server instance in another domain.
share|improve this answer
(Just noticed that this was an old question. Oh well!) – bhamby Apr 16 '12 at 16:18
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/54932
|
Take the 2-minute tour ×
I am working on a new project. The domain logic of the project is as follows:
A user uploads a file (Document) and gives a title, then another user comes along and (s)he also tries to upload a file with the same title. This is OK providing that the body of the document has differences.
How can I design my domain model so that my web application that will later consume the data can inform the user viewing a particular document "hey there is another version of this document".
Here is a simple ERD of what I have, but that obviously does not perform what I want above.
enter image description here
I would greatly appreciate any help and advice.
share|improve this question
1 Answer 1
up vote 1 down vote accepted
You could keep them all in the same table, simply with a column to track version numbers:
id (part of PK)
version_number (part of PK)
creator_id (FK to users.id)
version_date (the date that this version is created - not necessary, but good to have)
Your application will need to be capable of handling updating the version number of a document when a new record is added but it is a new version of an existing document. You also need to ensure that any document metadata (such as Title) changes are propagated to all related documents. You could do this by allowing document ID to not be unique, and the primary key is a combination of document ID and version number. Otherwise, it could be impossible to tell which record to update.
Another way would be to have a stub for document metadata and a separate table for all versions:
id (PK)
creator (FK to users.id)
(other metadata)
id (PK)
document_id (FK to documents.id)
(other fields)
The second option is a slightly more complicated structure, but will give you better referential integrity because all version must be linked to a document stub by a foreign key.
Personally, I'd go with the second version.
share|improve this answer
I'd actually recommend the first version, as it allows for a document's title and creator/owner to change. Consider an IsCurrent bit field, it makes querying simpler. – Jon of All Trades Sep 13 '13 at 23:01
You can enter another version with increased version_number, but smaller version_date. Would you want to prevent this? – AlexKuznetsov Sep 22 '13 at 3:03
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/54933
|
Take the 2-minute tour ×
I have Oracle 10g XE database locally. I export schema with something like
exp %USER%/%PASSWD%@XE statistics=NONE owner=%USER% file=dump.dmp
Exp is version - so is the DB.
Than I take this dump to another machine and try to import it to another remote machine. With
imp %USER%/%PASSWD%/'' ignore=y file=dump.dmp full=y
Oracle client with imp is version and Oracle DB (normal, not express) is version
The problem is that after printing several messages about importing tables it suddenly stops:
. . importing table "TABLE_1" 17180 rows imported
. . importing table "TABLE_2" 0 rows imported
. . importing table "TABLE_3" 49 rows imported$:
and does not even give a newline symbol in the end.
The problem persists with rows=N and with only selected tables from this schema.
So can anybody tell:
1. Where can be some error logs to know what is wrong?
2. Some workaround (still using exp/imp utilities preferably) - we need to import dumps regularly (it is for continuous integration server), we need to do it from remote host (so impdp is hardly an option with need to mount so remote volumes), dependency on other DB is highly undesirable (dblink).
UPD: Unfortunately for all curious we have solved the problem switching continuous integration system to Oracle XE, where is no such problem. Sysadm has already switched off this server, so I cannot try anything. Sorry.
share|improve this question
Can you strace it and paste the final output? – Gaius Nov 30 '11 at 14:54
2 Answers 2
1. Maybe an error appears in the target database's alert log? Run this:
SQL> show parameter background_dump_dest
...and go to the directory given to check the alert_<SID>.log. Or do a trace of the imp session in the target database instance. (Usually the errors appear in the exp / imp output themselves (saved to a log with LOG=log_file.log ) but I assume the export ran file with no warnings and completes with):
"Export terminated successfully without warnings."
When you are copying the file, are you sure it's not getting corrupted somehow? (md5sum remains the same)
2. Did you try importing into an empty schema so you don't have to set IGNORE=Y? And when you wrote:
Did you mean no matter which one or two tables you choose, it still crashes? Try simulating an import with SHOW=Y?
share|improve this answer
Try copying imp.exe from the machine with XE to the machine with SE.
(I had this issue on my virtual test machine with Oracle Standard One Imp.exe stops without messages, but in another installation with oracle 11 XE, imp.exe works fine with the same dump file. So I copied the imp.exe file of Oracle XE to the machine with Oracle Standard (replaced imp.exe), and now it's working. Maybe there's a bug in imp.exe of standard one for win32 installation...)
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/54936
|
suche ein beliebiges Wort, wie porb:
The Default and only Instant Messing or "IM" application ("app") shipped with the "Macintosh OSX" Operating system.
iChat can connect to ".Mac" - A serive offered by Apple, AOL's "AIM" and a few others.
There was a cloned version of iChat for Windows in the past, but from fear from Apple legal, it was pulled offline.
iChat, it's like AIM, but better...
von GrayApple 14. Mai 2006
|
global_05_local_4_shard_00000656_processed.jsonl/54937
|
Bernard Hopkins Finally Explains His Loathing For Donovan McNabb And How He Can "Look Through A Man's Soul"
You might recall that before he became the oldest boxing champ in history last weekend, Bernard Hopkins had some choice words for Donovan McNabb, who never had much truck with the boxer, aside from neglecting to shake his hand when Hopkins visited the Eagles training center in 2004. Never one to let go of a grudge (imagine if you actually insulted this guy), Hopkins took to the TV last night to further lambaste McNabb. Video is here.
The interview is amusing, mainly because Hopkins is such a character. For those who don't care to watch the whole thing, I've transcribed highlights from the Hopkins monologue:
That's how me and T.O. got having a conversation. They gave me mad love. Everybody running ... And next thing, we see two guys, two coaches, trainers, whatever, they looking out. And we see McNabb looking out. ...It reminded me of being up in Chestnut Hill. Because I'm from Germantown. And when you go up Chestnut Hill back in early 70s and 80s you got looked at funny. I felt that way. I felt like I was up in Chestnut Hill. Like, [??] whitewash. Like, do I supposed to be in this neighborhood? ... It had nothing to do with my ego. Everybody was giving us love. ... T.O. just coming to town not too long ago. And I love his heart. I love his demeanor. I mean, he got issues. But we all do. And I'm seeing this guy hide and wait until we leave and peek out every now and then. It's like, you know, you go on the block and you know somebody's home and they're like, 'Did he leave yet? Did he leave yet? Did he leave yet?'
After this encounter, Hopkins began scrutinizing McNabb, athlete-to-athlete, man-to-man. He determined that the quarterback had talent but lacked heart. McNabb simply didn't have that quintessence that makes an athlete great. And how did Hopkins know this?:
It's like instincts that I have growing up in the streets. ...To be able to have the ability that some can't understand because they haven't walked that road or been in that block where you can look at somebody and sense something, not judge them, and have the experience to see and feel what they're actually thinking and what they don't have in 'em. Now did that play in my 23-year boxing career? Where I have to be mano a mano, where I have to look at a guy even though he speaks with confidence but he really don't mean it? That is something that I have — the ability to look through a man's soul and watch his actions and see if he really means what he really wants. That separates the average from the greats.
Here's the craziest part. If you redact all the hateful stuff Hopkins has said about McNabb being an Uncle Tom, you start to wonder if the boxer actually knows from which he speaks.
|
global_05_local_4_shard_00000656_processed.jsonl/54940
|
questionsare you giving up anything for lent?
s21 s21
My wife and I are giving up spending any money we don't have to. (Sorry Woot, see you in April)
BOC's, I haven't received one in over 2 years, so this should be easy.....
My dignity....oh, wait, I gave that up YEARS AGO.
I was going to give up either chocolate or watching Doctor Who, but I am too addicted to both. I think instead I will just do some random acts of kindness and donate to a charity instead. It will make up for my random acts of meanness the rest of the year. ;)
So the two actual things people are giving up is snacking and needless spending...
I'm a godless heathen, so correct me if I'm wrong but, isn't lent supposed to be a kind of sacrifice? OK so you are giving up something you enjoy, but lets be honest, obviously those are both things you wanted to give up anyway, for health and for fiscal responsibility. So you're not really making a sacrifice, you're using your religion as a way to force yourself to do something.
I think it's pretty silly either way, but still sounds like you're all missing the point.
|
global_05_local_4_shard_00000656_processed.jsonl/54955
|
Revision as of 18:49, 3 January 2013 by jasfox (Talk | contribs)
HERE Maps API - How to find the nearest Marker
From Nokia Developer Wiki
Jump to: navigation, search
This code example shows how to find the nearest Marker from any point on the map. The code is useful for finding the Markers that are located close to the user's current position or destination.
Article Metadata
Code ExampleTested with
Platform(s): Web Browser
Dependencies: Nokia Maps API 2.2.3
Keywords: Nokia Maps, JavaScript, Marker
Created: Maveric (13 Nov 2011)
Last edited: jasfox (03 Jan 2013)
This example demonstrates how to find the nearest map Marker from any point on the map. In the example there are five Markers on the Nokia Map and you can click anywhere on the map. Based on where you clicked, the script will calculate the distance to the Marker that is located closest to the point of your click. To display the result, the label text of the Marker is retrieved and shown on the page.
Example code
After setting up five markers, the code continues by adding a click event to the map.
var eventTarget = nokia.maps.dom.EventTarget;
var eventCheck = document.getElementById("map");
eventCheck.addListener("click", function(evt)
{ var coords = map.pixelToGeo(evt.targetX , evt.targetY);
findNearestMarker (coords);
}, false);
The findNearestMarker() method iterates through each marker on the map and calculates the distance. The lowest distance so far is kept.
function findNearestMarker(coords) {
var minDist = 1000;
var nearest_text = "*None*";
for (i=0; i< map.objects.getLength(); i++)
if ( map.objects.get(i) instanceof nokia.maps.map.StandardMarker ) {
var markerDist = map.objects.get(i).coordinate.distance(coords);
if (markerDist < minDist) {
minDist = markerDist;
nearest_text = map.objects.get(i).text
alert (nearest_text);
The fully coded example can be found here : NearestMarkerExample.zip
266 page views in the last 30 days.
|
global_05_local_4_shard_00000656_processed.jsonl/54956
|
Revision as of 10:49, 6 September 2012 by galazzo (Talk | contribs)
SkyDrive - How to upload content on Windows Phone
From Nokia Developer Wiki
Jump to: navigation, search
WP Metro Icon File.png
WP Metro Icon Web.png
SignpostIcon XAML 40.png
WP Metro Icon WP8.png
SignpostIcon WP7 70px.png
Article Metadata
Tested with
Devices(s): Nokia Lumia 800
Platform(s): Windows Phone
Windows Phone 8
Windows Phone 7.5
Keywords: SkyDrive
Created: galazzo (06 Sep 2012)
Last edited: galazzo (06 Sep 2012)
Skydrive-logo-200.png is a Microsoft service that allow you to store files into a cloud in order to be automatically available from your phone and computers. You can share large files and photos or documents with your friends or collegues. Although the service is available for many platforms such as Windows, Mac, iOS, Android all you need to access to your content is a web browser.
This article is focused on the most interesting feature, the mobile access.
964 page views in the last 30 days.
|
global_05_local_4_shard_00000656_processed.jsonl/54957
|
Listed below are the differences in how notifications are handled and displayed when porting to Nokia X software platform.
• The priority flag used in Android is supported, except on Fastlane.
• Status bar will show the notification icon with dependency to the set Priority:
• Minimum priority: notification icon is not shown.
• Low, default and high priority: notification icon is shown (see the left image below; exclamation mark icon).
• Maximum priority: notification icon is placed as the leftmost icon in the Status bar (see the right image below; exclamation mark icon).
Figure 1. Status bar showing a notification with default priority (left image) and highest priority (right image).
• Pinch-zoom and two-finger glide gestures are disabled in notifications in Nokia X software platform; it is not possible to expand or contract a notification.
• Tapping on a notification will activate the intent associated with the notification (usually opening the app).
• Swiping a notification to left or right on Notification drawer will delete the notification from the phone - except from Fastlane.
Notifications are shown:
• On top of the UI when the phone is active (incoming notification shown as banner).
• On Fastlane.
• On Notification drawer.
The appearance of the notifications changes when shown in different parts of the phone.
• Android contracted notifications are displayed in Notification drawer.
• Android expanded notifications are displayed only in Fastlane.
The following subchapters contain some comparison screenshots of notifications on Android and Nokia X software platform.
Active screen
When the phone is in use, i.e. in active state, Android shows incoming notifications as tickers (tickerText). In Nokia X , incoming notifications are shown as banners that show the notification icon, title, and text (truncated to occupy only one row). The tickerText will not be displayed.
Figure 2. On the arrival of a notification, Android shows a ticker (images 1 and 2). Nokia X shows a banner (image 3).
Glance screen and Lock screen
Android shows notification icon at the top of the Lock screen. Nokia X shows the notification icon on both the Glance screen and Lock screen.
Figure 3. Notification icon in Android's Lock screen. Nokia X Glance screen and Lock screen show notification icon.
Notification drawer
Notification drawer in Android shows contracted notifications that can be expanded. The Nokia X Notification drawer collects all notifications and presents them in contracted state. In Nokia X, expanded states of notifications are presented only in Fastlane.
Figure 4. Android Notification drawer with contracted and expanded notifcations. On the right Nokia X Notification drawer with contracted notification items.
Currently all notifications are stored in the Fastlane even if the auto cancel flag is used. Do note that if your notification has a command visible from which user can dismiss/remove the notification manually, the notification is not removed from Fastlane. Notifications can only be removed from Fastlane manually by enabling the edit mode. The auto cancel flag is supported on Notification drawer.
Nokia X Fastlane contains the expanded states of notifications.
Figure 5. Notification shown in Fastlane view.
Toast with short text in Android and in Nokia X software platform:
Figure 6. Toast notification with short text in Android and in Nokia X software platform.
Toast notification with long text in Android and in Nokia X software platform:
Figure 7. Toast notification with long text in Android and in Nokia X software platform.
Notification icon
Your notification icon will be shown on:
1. Glance screen
2. Lock screen
3. Fastlane
4. Notification drawer
5. Status bar
Figure 8. Notification icon shown in Glance screen (1), Lock screen (2), Fastlane (3), Notification drawer (4), and Status bar (5).
Last updated 24 June 2014
Back to top
|
global_05_local_4_shard_00000656_processed.jsonl/54961
|
Cloth Diapers & Parenting Community -
Cloth Diapers & Parenting Community - (
- Forum Use Questions - Ask the Pros (
- - SS application (
Happy Mommax4 03-28-2013 06:32 AM
SS application
I'm not sure who to address this to or with but I applied to the SS forum and haven't heard anything, did I do it wrong?
Any help would be appreciated!
Fishie Kisses 03-28-2013 09:52 AM
Re: SS application
Happy Mommax4 03-28-2013 10:17 AM
Sweet_Fantasy_Fox 03-30-2013 11:56 PM
Re: SS application
Sorry, that's me. I am going through them right now:hugs:
Powered by vBulletin® Version 3.8.4
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
|
global_05_local_4_shard_00000656_processed.jsonl/54974
|
P, p
noun, plural P's or Ps, p's or ps.
the sixteenth letter of the English alphabet, a consonant.
any spoken sound represented by the letter P or p, as in pet, supper, top, etc.
something having the shape of a P .
a written or printed representation of the letter P or p.
a device, as a printer's type, for reproducing the letter P or p.
Dictionary.com Unabridged
Cite This Source Link To p's
American Heritage
Science Dictionary
1. The symbol for parity.
2. The symbol for phosphorus.
3. The symbol for power.
4. The symbol for pressure.
The American Heritage® Science Dictionary
Cite This Source
Copyright © 2014 Dictionary.com, LLC. All rights reserved.
• Please Login or Sign Up to use the Recent Searches feature
|
global_05_local_4_shard_00000656_processed.jsonl/54975
|
take it on the chin
the lower extremity of the face, below the mouth.
the prominence of the lower jaw.
Informal. chin-up.
verb (used with object), chinned, chinning.
to bring one's chin up to (a horizontal bar, from which one is hanging by the hands), by bending the elbows.
to raise (oneself) to this position.
to raise or hold to the chin, as a violin.
Archaic. to talk to; chatter with.
verb (used without object), chinned, chinning.
Gymnastics. to chin oneself.
Slang. to talk; chatter: We sat up all night chinning about our college days.
keep one's chin up, to maintain a cheerful disposition in spite of difficulties, disappointments, etc. Also, chin up.
take it on the chin, Informal.
to suffer defeat; fail completely.
to endure suffering or punishment.
before 1000; Middle English; Old English cin(n); cognate with Dutch kin, German Kinn chin, Old Norse kinn, Gothic kinnus cheek, Latin gena, Greek génus chin, gnáthos jaw (see genial2, -gnathous), Sanskrit hanus jaw
chinless, adjective
underchin, noun
Dictionary.com Unabridged
Cite This Source Link To take it on the chin
World English Dictionary
chin (tʃɪn)
1. the protruding part of the lower jaw
2. the front part of the face below the lipsRelated: genial
3. keep one's chin up Sometimes shortened to: chin up! to keep cheerful under difficult circumstances
4. informal take it on the chin to face squarely up to a defeat, adversity, etc
vb , chins, chinning, chinned
5. gymnastics to raise one's chin to (a horizontal bar, etc) when hanging by the arms
6. informal (tr) to punch or hit (someone) on the chin
Related: genial
[Old English cinn; related to Old Norse kinn, Old High German kinni, Latin gena cheek, Old Irish gin mouth, Sanskrit hanu]
Collins English Dictionary - Complete & Unabridged 10th Edition
Cite This Source
Word Origin & History
O.E. cin, a general Gmc. word, from PIE base *genw- "chin, jawbone."
Online Etymology Dictionary, © 2010 Douglas Harper
Cite This Source
American Heritage
Medical Dictionary
chin (chĭn)
The prominence formed by the anterior projection of the lower jaw.
The American Heritage® Stedman's Medical Dictionary
Cite This Source
American Heritage
Abbreviations & Acronyms
1. Children's Health Information Network
2. Community Health Information Network
The American Heritage® Abbreviations Dictionary, Third Edition
Copyright © 2005 by Houghton Mifflin Company.
Published by Houghton Mifflin Company. All rights reserved.
Cite This Source
American Heritage
Idioms & Phrases
take it on the chin
Suffer adversity or defeat, as in Paul really took it on the chin today when he got fired for missing a deadline. This idiom alludes to taking a physical blow on the chin. [First half of 1900s]
The American Heritage® Dictionary of Idioms by Christine Ammer.
Copyright © 1997. Published by Houghton Mifflin.
Cite This Source
Copyright © 2014 Dictionary.com, LLC. All rights reserved.
• Please Login or Sign Up to use the Recent Searches feature
|
global_05_local_4_shard_00000656_processed.jsonl/54976
|
Tees"wa`ter\, n. [From the river Tees, northern England.]
1. A breed of cattle formerly bred in England, but supposed to have originated in Holland and to have been the principal stock from which the shorthorns were derived.
2. An old English breed of sheep allied to the Leicester.
Cite This Source
Explore Dictionary.com
Previous Definition: teest
Next Definition: teetan
Words Near: teeswater
More from Thesaurus.com
Synonyms and Antonyms for teeswater
More from Reference.com
Search for articles containing teeswater
More from Dictionary.com Translator
Dictionary.com Word FAQs
Related Searches
Copyright © 2014 Dictionary.com, LLC. All rights reserved.
• Please Login or Sign Up to use the Recent Searches feature
|
global_05_local_4_shard_00000656_processed.jsonl/54983
|
Free Software Foundation!
Join now
Difference between revisions of "Template:Pipe"
From Free Software Directory
Jump to: navigation,
Line 4: Line 4:
<includeonly><nowiki/><div class="pipe"> </div><nowiki/></includeonly>
<includeonly><nowiki/><div class="pipe" style="display:inline !important"> </div><nowiki/></includeonly>
Revision as of 13:11, 20 September 2011
Example usage.
Personal tools
|
global_05_local_4_shard_00000656_processed.jsonl/54994
|
Please use this identifier to cite or link to this item:
Title: Henry IV, Part 2
Authors: Stothard, Thomas, 1755-1834, del.
Fox, Augustus, fl. 1841-1849, sculp.
Keywords: Prints;Henry IV;Stothard, Thomas, 1755-1834--Artist;Fox, Augustus, fl. 1841-1849--Engraver;Pickering, William, 1796-1854--Publisher;Shallow, Justice (Fictitious character);Silence, Justice (Fictitious character);Canes;Shakespeare, William, 1564-1616
Issue Date: 1824
Publisher: Chancery Lane, published by William Pickering
Abstract: Falstaff, Justice Shallow, Justice Silence, and company in Henry IV part 2 act 3 scene 2. Published by W. Pickering. 57. Chancery Lane 1824.
Appears in Collections:Farnsworth Shakespeare Print Collection Images
Files in This Item:
File Description SizeFormat
FSPC_HenryIV_519.jpg2.55 MBJPEGThumbnail
|
global_05_local_4_shard_00000656_processed.jsonl/54997
|
Skip to end of metadata
Go to start of metadata
Here is an example of how to write and use a NanoContainer.NET script written in XML.
The code below demonstrates how to registered classes with the Container through NanoContainer.NET Xml scripts. As with the Attributes Usage Example the MovieFinder and MovieLister example Martin Fowler described in his article Inversion of Control Containers and the Dependency Injection pattern is utilized for this Xml script example.
The XML Script
A few important comments on the above example:
• Xml Scripts are parsed and the associated C# code is generated. This generated code is then compiled and executed dynamically at runtime.
• All assemblies required to compile this script must be referenced under the assemblies section.
• Notice how the key attribute on the second component-implementation node uses the typeof() syntax. When this script is converted into C# code that typeof() statement will be included as a snippet in the generated code. Meaning that the ColonMovieFinder will be stored under the key as the Type IMovieFinder. If the typeof() was not included the ColonMovieFinder would have been stored under the key as the string value "IMovieFinder".
• the body of the parameter node will be added verbatim to the generated C# code (as a snippet). Now since this parameter node does NOT include the attribute "key" this parameter is a ConstantParameter. So the string value "movies1.txt" will be used. Any valid C# syntax could be embeded within a constant parameter node. For example: new StringBuilder(), 10, 99.9f, etc...
For full details and examples of how to use the Xml syntax you would probably be best suited to look at the comprehensive test cases provided with NanoContainer.NET
C# code to utilize XML script
• No labels
|
global_05_local_4_shard_00000656_processed.jsonl/55009
|
Contact: [email protected]
Things I like:
Animals, These Lovely Ladies, Funny Tag, Feminism, Personal
Important Things!
39/50 pictures of Rooney Mara
Entertainment Weekly: You do a lot of acting with your eyes in the movie. There's this devastating stare that you have...
Rooney Mara: Actually, on Nightmare on Elm Street they used to always say that. They'd call it the Rooney Stare. It always scared them. They'd say, "You need to do a movie where you're, like, a superhero and you blow people up with your stare."
I have no idea.
Rooney Mara on why she picked that dress. (This is why I love you.)
(Source: uptownhags)
|
global_05_local_4_shard_00000656_processed.jsonl/55018
|
Friday, 15 May 2009
Nice quote about Smalltalk
"The thing that I really hate about Smalltalk though, is the fact that every time I wish C++ or Java did something differently it turns out that Smalltalk does it the way I want it to. I've never even used Smalltalk on a real project. I just learned it so that I could read source code, now I keep running into things that would be easier if I were using it. It's really annoying."
Attributed to Phil Goodwin, but I've no clue as to the origin.
Saturday, 16 August 2008
Caching static web content with Seaside
Given that it looks as though ircbrowse has gone away permanently, I decided to write my own little client for viewing the logs of the #squeak IRC channel. Fortunately most of the hard work had already been done at, but as the site itself notes: "these logs are purposely "raw" and are intended to be parsed/reformated/wrapped before viewing."
So I put together a client in Squeak and Seaside, currently viewable at to do that for me. While I was doing so, I got a bit carried away and added some extra features:
• All lines can be colourised based on the author's nick
• It attempts to recognise HTTP URLs and converts them to links
• Each message timestamp is an anchor, so you can link to a given message
• At certain times there's a lot of chat in Spanish on the channel, so I added in-page translation capabilities using the Google Ajax Translate API.
• Key session parameters are added to the URL, so that they are maintained even when the session has expired.
Now, once you've added all these great features, you end up with a massive page that's complex to generate, but once it is generated most of the content remains static. There's not a great deal that I can do about the initial generation (except get rid of some of the functionality), but surely I can cache that content?
I searched the Seaside mailing lists, but generally responses tended to point out that caching of static content should be handed off to the front-end web server. There were two problems here -- first, the page wasn't going to be totally static, just the content from a single component. Second, I wanted to put this application on, so I wouldn't have this option available to me anyway.
They say that once you get a hammer, every problem looks like a nail, so I wrote a Seaside solution: a simple caching component using the decorator pattern that checks to see if the content requested is already in the cache, and if not it asks the owner component to generate it. This proved to be very effective; the profiler showed that a non-cached page was taking around 2-3 seconds to generate, but with the HTML cached, this dropped to a handful of milliseconds.
Given that this approach can substantially reduce the server load even when the page as a whole isn't static, I was surprised not to find something like this in Seaside already, is it too trivial? -- please let me know in the comments if I missed something obvious.
There's nothing particularly clever about the class once you've worked out that all the html that has been generated at any point in time is accessible via html context document stream. However, this approach requires A WARNING -- no session information must be used within the cached components -- no forms, no dynamic links, no Scriptaculous functions. Also, be careful about use of html nextId in the cached component - there is no guarantee that such IDs will be unique when incorporated into a document from the cache.
Anyway here's how it works. The component in question is wrapped in an application-specific subclass of a caching decorator component that:
1. Maintains a cache dictionary as a class instance variable.
2. Requires the owner class to implement a #key method that provides a unique key for each page, and also an inst-var called shouldCache (with associated accessors).
3. Implements #renderContentOn: that
1. Checks if the requested page is in the dictionary (using the #key method).
2. If so, stream the cached content to the current renderer and return.
3. If not, notes the current html context document stream position.
4. Sends #renderContentOn: to the owner.
5. In this method, the owner then renders as normal, and resets shouldCache if it doesn't want the current page to be cached (ie if it is still subject to change).
4. Control then returns to the decorator. If shouldCache is still set, this checks the html context document stream to find all the content that the child added, and copies it into its own cache, and exits.
And that's it!
Thursday, 17 July 2008
My first video: creating a Hello World class in Squeak
Given the recent push to get Squeak video tutorials available, I decided to have a go myself. I took as my starting point my post from a few months back, intended to act as a quick introduction to developers coming to Squeak for the first time.
My first problem was to find a good screen capture utility. Unfortunately, Wink isn't available for OS X, but a bit of searching uncovered Snapz Pro X. Despite the terrible name, it's a very nice piece of software that makes recording video and screenshots very easy. It comes with a 14-day fully-functional trial, so if I get a taste for this, I may end up having to cough up the $69 soon. If anyone knows of other software I could use, please let me know.
You can view the video at, or find it in the new Squeak Smalltalk group that Randal Schwartz has set up. Have a look at the video and let me know what you think: too fast, too slow, too much like Ricky Gervais, whatever.
Monday, 14 July 2008
Using Apache as a front-end for Seaside
I'll admit it, configuring Apache scares the bejeezus out of me. The documentation seems to be so focused on the trees, that the wood becomes an impenetrable, gloomy forest. I guess I'm not alone in this, which makes Ramon Leon's posts on configuring Apache with Seaside(1, 2, 3) so useful.
Despite this, I've still steered clear of going near Apache, until Ramon posted a sample extract of configuration text. Now, cut-and-paste is something I can do, so I decided to give it a go.
I'm on Mac OS X, so Apache is installed and running by default. Despite my earlier protestations, I have played with Apache before, so I knew that httpd.conf was the key file to control how Apache runs. A bit of poking about in man files uncovered the location of the file I needed: /private/etc/apache2/http.conf.
I opened a Terminal and cd'ed to /private/etc/apache2/ where I could execute sudo vi httpd.conf which prompted me to enter my password to edit this administrator file, and then allowed me to start hacking. I wanted to leave my existing configuration as untouched as possible, so below the line:
Listen 80
I added a new line:
Listen 81
which would start Apache listening on port 81 as well as port 80. I could then use port 81 for my experimentation.
Typing sudo /usr/sbin/apachectl restart caused Apache to restart, hopefully loading my change.
I then tried browsing http://localhost:81/
Success (so far) - Apache is trying to deal with my request, and using its default handler.
Now, I'd noticed an interesting line at the bottom of httpd.conf:
which meant that I could make any other changes in a separate file. So sudo vi other/seaside.conf opened a new .conf file, into which I typed:
#DocumentRoot /var/www/myExamplePath
RewriteEngine On
ProxyRequests Off
ProxyPreserveHost On
UseCanonicalName Off
# if the path doesn't exist, rewrite it to be a Seaside file ref
RewriteRule ^/seaside/files(.*)$ http://localhost:8080/seaside/files$1 [P,L]
# redirect all requests to seaside - configure this as required
RewriteRule ^/(.*)$ http://localhost:8080/seaside/$1 [P,L]
Which (when you put back the angle brackets that Blogger eats on the first and last lines) is taken directly from Ramon's post. It does two useful things. It takes any requests coming in to port 81, and first checks to see if you're requesting a physical file, and if so, serves it up (useful for the static parts of your site). If not, it passes them on to Seaside on the appropriate port, adding the standard /seaside prefix (so this is hidden from the outside world, which is a nice touch). Restarting Apache again and this time browsing http://localhost:81/examples/counter got me:
Again, good news. However, when I tried to navigate around, or use applications that made use of built-in #style and #script methods, things started to go wrong. The reason here is that Seaside prefixes its generated relative URLs with /seaside. So I simply added the following:
# re-write all requests starting with seaside - these links are exposed
# by the application internally. Alternatively, you can
# re-configure Seaside to change the urls it generates.
RewriteRule ^/seaside/(.*)$ http://localhost:8080/seaside/$1 [P,L]
into the virtualhost directive, and re-started Apache once more. This time it all worked like clockwork.
Twenty minutes of not very challenging experimentation, and I now have Apache working as my front-end webserver. That means, all the handling of static files can be done outside of Squeak, I can configure my responses if the Squeak images crashes, I get access to all of Apache's features such as logging, SSL etc. Not a bad half-hour's work really.
Tuesday, 8 July 2008
Digging into the functionality behind morphs
Someone on the Seaside mailing list asked how to find out the meanings of all the icons against each method in the browser. The answer is quite interesting, as it helps you understand the importance of the "live environment" that Squeaks gives you.
Looking at a typical class, you'll see that many method definitions have a little icon by the name:
(nb alt- and cmd- prefixes used below may need to be changed depending on your image preferences).
In order to work out why things happen in morphs, you can easily access the underlying code. In this case, alt-click on the offending item repeatedly to bring up halo menus for more targeted morphs. The closest in you get is OBLazyList - if you go too far, you'll notice that you cycle round to the original morph again. Notice in this case that this morph is much bigger than its containing morph, and so much of its content is hidden from the user:
When you're on the morph you're after, you can then find out more about it by clicking on the "spanner" (=debug) icon, and selecting "browse morph class", which will open a browser on OBLazyListMorph.
Look in the "drawing" methods of this class, and you'll get your first clue in #display:atRow:on: which selects and draws the icons with the help of OBMorphicIcons class.
Selecting the name OBMorphicIcons and pressing Cmd-B will bring up a browser on that class, and you'll see that each icon is defined by an instance method. Click on one of these (I chose #arrowUpAndDown because that looks pretty likely to be unique to this usage), and press Cmd-n to find its senders.
Bingo! OBInheritanceFilter method #icon:forNode: decides which icon to display based on a number of tests, including a test for #halt: messages that puts a red flag against a method.
You'll also see that this code accidentally red-flags itself because it fails to distinguish between #halt: used as a symbol rather than as a message.
Friday, 23 May 2008
Ideal language for the JVM?
Charles Nutter (JRuby specialist at Sun) said recently:
Thursday, 22 May 2008
Scripting with Smalltalk - updated
My post yesterday attracted more attention than I expected, with Paolo Bonzini and Randal Schwartz both being able to make out the code well enough to comment on it. Paolo was able to identify a number of improvements to the code, both in terms of identifying more appropriate approaches, and in identifying where the code was spending its time. As a result, here's a much faster version. It's also noticeably shorter at 31 lines excluding spaces and comments, but it's still very wide.
This version also uses a few more methods not found in core Squeak including #fold: #gather: #copyReplaceFrom:to: .
As Randal pointed out, I'm monkey-patching core classes with gay abandon, and subclassing would probably be safer, though the over-ride of #at: that (rightly) alarmed him is now gone.
"Inspired by"
"s = SpellCheck new. s initialize. s correct: 'misplet'"
Collection extend [
ifEmpty: block [ self isEmpty ifTrue: [ ^ block value]. ^ self ] "not in gst by default"
maxUsing: block [ ^ self fold: [ :a :b | ((block value: a) > (block value: b)) ifTrue: [ a ] ifFalse: [ b ] ] ] ]
String extend [
swapAt: i [ ^ self copyReplaceFrom: i+1 to: i+2 with: {self at: i+2. self at: i+1} ]
removeAt: i [ ^ self copyReplaceFrom: i+1 to: i+1 with: #() ]
insert: l at: i [ ^ self copyReplaceFrom: i+1 to:i with: {l} ]
replace: l at: i [ ^ (self copy) at: i put: l; yourself ]
findWords [ ^ (self asString tokenize: '[^a-zA-Z]+') collect: [ :each | each asLowercase ] ] ]
Object subclass: SpellCheck [
| nwords alphabet |
initialize [ | lines |
lines := (File name: 'westminster.txt') contents.
nwords := lines findWords asBag.
alphabet := 'abcdefhgijklmnopqrstuvwxyz' asArray ]
edits1: word [ | n |
n := word size.
^ Array join: {
0 to: (n - 2) collect: [ :i | word swapAt: i ].
1 to: (n - 1) collect: [ :i | word removeAt: i ].
alphabet gather: [ :letter | 1 to: n collect: [ :i | word replace: letter at: i ] ].
alphabet gather: [ :letter | 0 to: n collect: [ :i | word insert: letter at: i ] ] } ]
knownEdits2: word [
^ (self edits1: word) gather: [ :e1 |
self known: (self edits1: e1) ] ]
known: words [ ^ ( words select: [ :each | nwords includes: each ] ) ]
correct: word [ | candidates |
candidates := (self known: {word}) ifEmpty: [
(self known: (self edits1: word)) ifEmpty: [
(self knownEdits2: word) ifEmpty: [ {word} ] ] ].
^ candidates maxUsing: [ :d | nwords occurrencesOf: d ] ]
|
global_05_local_4_shard_00000656_processed.jsonl/55027
|
Dungeons and Dragons Wiki
History: User:IGTN/Multiple Property Search
Back to page | View logs for this page
• (cur | prev) 04:51, July 28, 2010IGTN (Talk | contribs) . . (1,548 bytes) (+1,548) . . (Created page with 'I haven't figured out how to do a proper search for pages with multiple properties, so I'm setting up this page for me to do my searches on. Feel free to copy the code for yourse…')
Around Wikia's network
Random Wiki
|
global_05_local_4_shard_00000656_processed.jsonl/55028
|
Picture I061
Description: The Royal Ice Cream strikers pray before going to court. "It was exciting, because we went where we dared not to go. I wasn't frightened or anything of that sort because either way, we could have made history. If he had served us ice cream, he would have made history. But, by refusing to, I guess we made history!" -Virginia Williams, Royal Ice Cream Protester, 2003 Interview.
Source: Virginia Williams
Filename: I061
Previous Next
|
global_05_local_4_shard_00000656_processed.jsonl/55032
|
CONTACT: [email protected]
all submissions via email only
Recent Tweets @DynamicAfrica
efrika.tv - Mpumi Mcata from the BLK JKS interviews Just A Band
To coincide with the release of Just A Band's new album 'Sorry for the Delay’, Mpumi of the BLK JKS and Motel Mari hooked up with Bill and Dan via Skype.
It’s a wide-ranging TEDx of a discussion about what it’s like making experimental music in Africa as well as the influence of hip hop, the importance of raising awareness of the threat to music in northern Mali and a shared desire to travel and play more across the continent. From efrika always something new.
1. bree83 reblogged this from navigatethestream
2. navigatethestream reblogged this from blackrockandrollmusic
3. accradotalt reblogged this from allakinwande
4. allakinwande reblogged this from dynastylnoire
5. dynastylnoire reblogged this from blackrockandrollmusic
6. blackrockandrollmusic reblogged this from dynamicafrica
7. fyeahjustaband reblogged this from dynamicafrica
8. talesofthestarshipregeneration reblogged this from dynamicafrica
9. kefstar reblogged this from dapperjones
10. dapperjones reblogged this from chillimango
11. chillimango reblogged this from dynamicafrica
12. dynamicafrica reblogged this from mielamiela
13. btrt254 reblogged this from nimimi and added:
yo, real issues for todays african musicians, i feel these niggies… wish there were more outlets though.
14. nimimi reblogged this from dynamicafrica and added:
i REALLY REALLY REALLY miss Kenyan accents. i have this weird Nairobi-SA hybrid vibe going on… also, hey Bill!!!
15. mielamiela reblogged this from dynamicafrica and added:
I am here for all of this. #justaband #blkjks Thanks for posting :-)
16. searchingforthesublime reblogged this from dynamicafrica
|
global_05_local_4_shard_00000656_processed.jsonl/55042
|
Article 230, which consists of seven parts, provides the installation requirements for service conductors and equipment. Parts II, III, and IV address conductors. For now, we'll focus on the requirements for equipment, which are covered in Parts I, V, VI, and VII. The titles of these are General, Service Equipment, Disconnecting Means, and Overcurrent Protection, respectively.
Article 100 tells us that service equipment:
• Constitutes the main control and cutoff of the electricity supply.
• Usually consists of circuit breakers (or switches and fuses) and their accessories.
• Connects to the load end of service conductors in a structure.
Service equipment doesn't include the metering equipment, such as the meter and meter enclosure [230.66].
The service conductors, which supply power to the service equipment, originate at the service point. Service conductors terminate on the line side of the service disconnecting means. That is, they run from the service point to your service equipment.
The feeder conductors for the premises typically are connected to the load side of the service disconnect(s), but don't confuse them as part of the service. The service disconnect is there to disconnect (and control) the incoming power, but the rating of the service disconnect also provides protection for the feeder conductors. However, this rating can't be lower than specified in 230.79. The load side of the service disconnect can also be considered the point where the service requirements end and feeder requirements begin.
General requirements
A structure can be served by only one service drop or service lateral as defined in Art. 100 [230.2]. The exceptions to this fall into four categories: special conditions, special occupancies, capacity requirements, and different characteristics.
Special conditions
If acceptable to the authority having jurisdiction (AHJ) [700.12(D) and 701.11(D)], you can place emergency power and/or legally required standby power on an additional service. The following are also permitted to be on additional services:
• Fire pumps
• Optional standby power
• Parallel power production systems
Special occupancies
If you have special permission from the AHJ, you can add services for:
• Multiple-occupancy buildings, where there's no available space for supply equipment accessible to all occupants, or
• A structure so large that two or more supplies are necessary.
Capacity requirements
You can add services where:
• Capacity requirements exceed 2,000A,
• Load requirements of a single-phase installation exceed the utility's capacity, or
• You have special permission of the AHJ.
Different characteristics
Additional services are permitted for different voltages, frequencies, or phases, or for different uses, such as for different electricity rate schedules.
If you use multiple services, install a permanent plaque or directory at each service disconnect location. This plaque must denote all other services supplying that structure. It also must denote the area served by each.
Service equipment
The service disconnecting means must be identified as suitable for use as service equipment [230.66]. This means the service disconnecting means is supplied with a main bonding jumper so that a neutral-to-case connection can be made, as required in 250.24(C) and 250.142(A). See Fig. 1. The service disconnecting means must open all service-entrance conductors from the structure premises wiring [230.70].
Install the service disconnecting means at a readily accessible location. This can be outside the structure. If you place it inside the structure, locate it nearest the point of service conductor entry. There's another factor to consider when locating a disconnecting means indoors — you can run the service entrance conductors only so far. These conductors do not have short-circuit or ground-fault protection. Thus, they must be limited in length when inside a building. Some local jurisdictions have a specific requirement as to the maximum length within a building. If yours doesn't have a specific requirement, get the approval of the AHJ before finalizing the location.
If you've ever seen a breaker panel in a restroom, you've seen a violation of 240.24(E). In addition, you can't install the service disconnect in a bathroom.
Some designers will use a remote-control device (shunt-trip) to actuate the service disconnecting means. There's nothing wrong with this, but the service disconnecting means must still be in a readily accessible location [230.70(A)(3)]. As before, this will be outside the structure, or — if inside — nearest the point of entry of the service conductors as required by 230.70(A)(1) [Fig. 2].
The service disconnecting means must be one of the following [230.76]:
• Manually operated switch.
• Power-operated switch.
• Circuit breaker capable of being operated manually.
Each service disconnecting means must plainly indicate whether it is in the open or closed position [230.77].
Multiple disconnects
You can have no more than six service disconnects for each service permitted by 230.2. This rule also applies to each set of service-entrance conductors permitted by 230.40, Exception No. 1, 3, 4, or 5 [230.71].
The rule is six disconnecting means for each service, not six service disconnecting means per building. If the building has two services, you can have a total of 12 service disconnects (six disconnects per service).
The disconnecting means for power monitoring equipment, transient voltage surge suppressors, the control circuit of the ground-fault protection system, or power-operable service disconnecting means is not considered a service disconnecting means.
The service disconnecting switches or circuit breakers must be mounted in a single enclosure, in a group of separate enclosures, on a switchboard, or in a switchboard [230.71(A)]. If you have more than one disconnect at a service, all of them must be grouped. This way, the fire response team that finds one disconnect finds all of them.
An exception to this is pretty obvious if you think about it. Can you guess what it is? Here's a hint. You don't want this to be disconnected during a fire. It's the fire pump disconnect. Locate it remotely from the one to six disconnects for normal service [695]. The disconnect for the following loads must also be remote from the normal service disconnects:
• Emergency systems,
• Legally required systems, or
• Optional standby systems.
What is a remote distance? The NEC doesn't specify this distance, so it would be up the AHJ.
In a multiple-occupancy building, each occupant must have access to his or her service disconnecting means [230.72(C)]. But this requirement doesn't apply in multiple-occupancy buildings where electrical maintenance is provided by continuous building management. In such a case, the service disconnecting means can be accessible only to building management personnel.
Service overcurrent protection
The NEC doesn't require you to provide service conductors with short-circuit or ground-fault protection. What you must provide for each ungrounded service conductor is overload protection [230.90] located where the service conductors terminate [240.21(D)].
The rating of the protection device must not be greater than the ampacity of the conductors. Five exceptions apply:
• Motors: Apply Article 430 requirements.
• Where the ampacity of the ungrounded conductors doesn't correspond with the standard rating of overcurrent protection devices as listed in 240.6(A), you can use the next higher protection device if it doesn't exceed 800A [240.4(B)]. Example: Two sets of parallel 500-kcmil THHN conductors (each rated 380A at 75°C) can be protected by an 800A overcurrent protection device (Fig. 3).
• The combined ratings of two to six service disconnecting means can exceed the ampacity of the service conductors — if the calculated load (per Art. 220) doesn't exceed the ampacity of the service conductors (Fig. 4).
• Fire pumps: Apply Art. 695 requirements.
• Overload protection for 3-wire, single-phase, 120/240V dwelling unit service conductors can conform to 310.15(B)(6).
A final comment on points one through five: While these requirements are providing just overload protection for the service conductors, the load side of these service disconnects are providing overload protection as well as short-circuit and ground-fault protection for the feeder conductors.
Have you noticed a common theme in the requirements for service equipment? Most of these point to achieving a single purpose, making it easy for fire response crews to disconnect the structure from incoming power. These people don't have time to be operating large numbers of disconnects, which is why you're limited to six per service. Nor do you want people wandering around trying to find those disconnects, which is why they are located near the point of entrance.
If you ask the question, “How can I make it easy for a fire response crew to disconnect power?” you will have most of the answers you need for a correct service installation. If you're in the equipment selection phase, look for ways to reduce the number of disconnects needed. Switchgear manufacturers have some excellent solutions that can help you achieve this goal.
Finally, don't forget to comply with the Chapter One requirements. These include limiting access to authorized personnel and providing proper working clearances.
|
global_05_local_4_shard_00000656_processed.jsonl/55045
|
eCommons Collection: 2003 Rockefeller Fellowship Nominee 2003 Rockefeller Fellowship Nominee 2014-07-29T18:54:37Z 2014-07-29T18:54:37Z Rockefeller New Media Foundation Proposal Kurgan, Laura 2006-11-21T07:00:40Z 2006-11-20T20:24:08Z Title: Rockefeller New Media Foundation Proposal Authors: Kurgan, Laura Abstract: Using the highest-resolution satellite imagery available to anyone outside the U.S. or Russian military or intelligence community, I am interested in creating digital images of the monochrome landscapes which represent some of the most vulnerable sites of the 21st century. The landscapes look familiar, even stereotyped - blue (the Atlantic Ocean), green (the Cameroon rain forest), yellow (the Iraqi desert), and white (the Alaskan tundra). But they are produced with instruments and materials (commonplace and yet still extraordinary ones) that in their very construction call into question the material which constitutes a landscape. These landscapes, these images, ask profound questions about their own future -- and ours --even as they adopt the formal strategies of the most abstract, non-referential, 'aesthetic' of the last century's museum pieces. 2006-11-20T20:24:08Z
|
global_05_local_4_shard_00000656_processed.jsonl/55046
|
Seeing the Common Core for what it is
She also criticized the criteria for advising teachers to teach reading strategies only ?in service of reading comprehension, not as a separate body of material.? Good reading instruction, she said, requires pulling out and practicing specific skills.
?This isn't just a description of what curriculum should look like, it's a teaching guide,? Ms. Kapinus said. ?I'm afraid people will take this and say, ?This is what instruction has to look like.' ?
Both Cambridge's and Kapinus's positions are problematic for a number of reasons.
For starters, Coleman and Pimentel are right to warn against an overreliance on making personal connections to reading. Of course, they aren't saying that there is no place for students to relate what they've read to their own lives or to the world. Instead, their point is that reading lessons should be focused on the texts that students are reading first and foremost?not the feelings that those texts evoke.
Of course, no one would pretend that focusing on texts is antithetical to connecting in a very intense and personal way to what you're reading. But it does our students a very grave disservice to pretend that forcing text-to-self connections in only the most superficial way is the only?or best?way to interact with great literature.
More importantly, though, Kapinus wrongly slams the criteria for veering into pedagogy by asking teachers to focus on fluency in early and by advocating against teaching abstract reading ?skills? in isolation.
For starters, the standards themselves specifically require students to read and understand texts that are sufficiently complex?according to a students' grade level, not independent or instructional reading level. The standards very intentionally do not require mastery of abstract skills in the same way, primarily because there is no evidence to suggest that mastering abstract skills leads to improved reading comprehension.
Of course, nowhere in the criteria (or the standards) do the authors suggest that it's never appropriate to learn particular skills. They merely say that such strategies should only be taught in service of reading and understanding sufficiently complex texts, not as an end in themselves.
Unfortunately, across too many classrooms, those skills have become the ends rather than the means. And it would be easy?to look at the standards and see what we want to see?and to shun the changes that they are meant to bring. But, if these?standards are going to impact instruction the way they have the potential to, we need to see them for what they are. And advocates of these standards need to get serious about defending effective implementation.
--Kathleen Porter-Magee
More By Author
Related Articles
|
global_05_local_4_shard_00000656_processed.jsonl/55076
|
Memory Alpha
Charnock's Comedy Cabaret holograms
37,235pages on
this wiki
A list of holograms appearing in the Charnock's Comedy Cabaret holodeck program in 2364.
Named Edit
Unnamed Edit
Audience Edit
The audience were male and female nightclub patrons who were part of the program Data created in 2364 to learn what is funny. When Data learned that the audience was laughing equal what he was doing he removed the audience from the program. (TNG: "The Outrageous Okona")
Around Wikia's network
Random Wiki
|
global_05_local_4_shard_00000656_processed.jsonl/55078
|
Memory Alpha
37,234pages on
this wiki
Mooring refers to the means by which a starship is physically connected to a space station or another ship.
When the IKS Rotarran departed Deep Space 9 in late 2373, first officer Worf first gave the orders to clear all moorings and release docking clamps in order to clear the station's docking ring. (DS9: "Soldiers of the Empire")
Typically, the terms mooring clamp and docking clamp were used interchangeably, but the use in "Soldiers of the Empire" indicates that at least in the case of Klingon Birds-of-Prey, moorings, and docking clamps were different items.
External link Edit
Around Wikia's network
Random Wiki
|
global_05_local_4_shard_00000656_processed.jsonl/55079
|
Memory Alpha
Perpetual Entertainment
37,234pages on
this wiki
Revision as of 02:27, May 22, 2013 by StalwartUK (Talk | contribs)
Real World article
(written from a Production point of view)
Perpetual logo
External link
Around Wikia's network
Random Wiki
|
global_05_local_4_shard_00000656_processed.jsonl/55080
|
Memory Alpha
37,230pages on
this wiki
Pittsburgh was a city located on the North American continent of Earth, in the state of Pennsylvania.
T'Mir visited the Big Creek Manufacturing and Sales Co., located in Pittsburgh, to sell the rights to a new kind of hook-and-loop fasteners that were later known as Velcro. (ENT: "Carbon Creek")
External linkEdit
Around Wikia's network
Random Wiki
|
global_05_local_4_shard_00000656_processed.jsonl/55081
|
Memory Alpha
Radio transmitter
37,230pages on
this wiki
The radio transmitter was a type of electronic device used on Earth in the late 20th century. A transmitter could be programmed to transmit signals on a special, classified frequency. Cetacean biologists, like Doctor Gillian Taylor, would tag whales for the purpose of tracking their movement in the open ocean. After Taylor gave the frequency to James T. Kirk, his crew were able to trace the humpback whales George and Gracie to the Bering Sea and save them from whale hunters. (Star Trek IV: The Voyage Home)
External link Edit
Around Wikia's network
Random Wiki
|
global_05_local_4_shard_00000656_processed.jsonl/55083
|
Memory Alpha
Talk:USS Ganges
37,236pages on
this wiki
Back to page
Greetings, while browsing this week's entries for the It's A Wrap! sale and auction, I came upon this entry for Runabout wreakage [1]. The wreakage states NCC-72454 and the statement says that the wreakage was used in "Armageddon Game", which involved the destruction of the USS Ganges. The only resource for this runabout's registry is the Star Trek: Encyclopedia, but this wreakage brings further proof that this is a canon registry for the Ganges. What is your opinion and do you think it's valid enough to add as canon? - Enzo Aquarius 22:09, 23 February 2007 (UTC)
I checked the scene in question from "Armageddon Game" and the nacelle pylon piece with the registry is matching the one seen in the explosion. I wouldn't know why we shouldn't accept the registry now. --Jörg 18:07, 25 February 2007 (UTC)
Around Wikia's network
Random Wiki
|
global_05_local_4_shard_00000656_processed.jsonl/55085
|
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Industry Aerospace and defence
Fate Merged into EADS
Successor(s) EADS
Founded 1970
Defunct July 10, 2000
Headquarters Paris, France
Products See list
Website aerospatiale.fr
Aerospatiale (French pronunciation: [aeʁɔspasjal]) was a French state-owned aerospace manufacturer that built both civilian and military aircraft, rockets and satellites. It was originally known as Société nationale industrielle aérospatiale (SNIAS). Its head office was in the 16th arrondissement of Paris.[1][2]
The former assets of Aerospatiale are now part of EADS, except the Satellites activities which merged with Alcatel and became Alcatel Space, in 1999, now Thales Alenia Space.
The company (as SNIAS) was created in 1970 by the merger of the state-owned companies Sud Aviation, Nord Aviation and Société d'études et de réalisation d'engins balistiques (SÉREB). Starting in 1971 it was directed by Henri Ziegler. It's North American Marketing arm French Aerospace Corporation was renamed to European Aerospace Corporation in 1971.[3]
In 1991 the company helped construct the revolutionary chassis of the Bugatti EB110 Supercar. The chassis was built completely of carbon fibre, and was very lightweight.
In 1992, DaimlerBenz Aerospace AG (DASA) and Aerospatiale combined their helicopter divisions to form the Eurocopter Group.
In 1999, Aerospatiale, except for the satellites activities, merged with Matra Haute Technologie to form Aerospatiale-Matra. In 2001, Aerospatiale-Matra's missile group was merged with Matra BAe Dynamics and the missile division of Alenia Marconi Systems to form MBDA. Lionel Jospin's Plural Left government initiated the privatization of Aerospatiale.
On July 10, 2000, Aerospatiale-Matra merged with Construcciones Aeronáuticas SA (CASA) of Spain and DaimlerChrysler Aerospace AG (DASA) of Germany to form the European Aeronautic Defence and Space Company (EADS).
The Aerospatiale Corvette first flew in 1970 and went into service in 1974. 40 were built.
Fixed-wing aircraft[edit]
Unmanned aerial vehicles[edit]
Space-related products[edit]
List of CEOs[edit]
1. ^ Who owns whom: Continental Europe, Volume 1. Dun & Bradstreet., 1990. 555. Retrieved from Google Books on 31 August 2011. "SA NATIONALE INDUSTRIELLE AÉROSPATIALE 372 1 . 3724 SA, 37 Boulevard de Montmorency, F-75016 Paris"
2. ^ "Offices and facilities." Aerospatiale. Retrieved on 31 August 2011. "HEADQUARTERS PARIS Aerospatiale 37, boulevard de Montmorency - 75781 Paris cedex 16 "
3. ^ Air Progress: 16. September 1971.
External links[edit]
|
global_05_local_4_shard_00000656_processed.jsonl/55086
|
Category:Solar System dynamic theories
From Wikipedia, the free encyclopedia
Jump to: navigation, search
This category contains modern (post-Newton) theories about Solar System bodies, their formation, and other important, mostly cataclysmic, events that deeply affected the orbits and surfaces of the planets.
Human discoveries and space exploration events belong elsewhere. This is about big boulders thumbling around.
|
global_05_local_4_shard_00000656_processed.jsonl/55087
|
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Cordes-sur-Ciel la cité.jpg
Cordes-sur-Ciel is located in France
Coordinates: 44°03′52″N 1°57′13″E / 44.0644°N 1.9536°E / 44.0644; 1.9536Coordinates: 44°03′52″N 1°57′13″E / 44.0644°N 1.9536°E / 44.0644; 1.9536
Country France
Region Midi-Pyrénées
Department Tarn
Arrondissement Albi
Canton Cordes-sur-Ciel
• Mayor (2008–2014) Paul Quilès
• Land1 8.27 km2 (3.19 sq mi)
Population (2007)
• Population2 1,014
• Population2 density 120/km2 (320/sq mi)
INSEE/Postal code 81069 / 81170
Elevation 159–320 m (522–1,050 ft)
(avg. 279 m or 915 ft)
Cordes seen from the valley
Minstrels playing in front of a church during a festival
Cordes-sur-Ciel (Occitan: Còrdas) is a commune in the Tarn department in southern France.
The fortified town was built in 1222 by Raimon VII, the Count of Toulouse, who, though not a Cathar, tolerated what other Catholics considered a heresy.
Since the late 20th century, the village has become a popular tourist destination. Until 1993, the town's name was Cordes, a word thought to come from the Indo-European root "corte" meaning "rocky heights." That year, it was renamed Cordes-sur-Ciel, to indicate its height above the clouds over low-lying areas of the valley.
In 1222, Cordes received its charter from the Count of Toulouse to become a "bastide".[1] It is generally considered to be the first of the bastides of Southwest France. (Some historians classify Montauban, built in the 12th century, as a bastide.) Bastides were "new towns," originally conceived to resettle and shelter people who had been displaced by the Albigensian Crusade. They were also intended to colonize southwest France and encourage agricultural and related market development. Though not fortified, bastides were often built in defensible locations.
Cordes was built between 1222 and 1229 to protect the scattered population of the area from conflict. It was intended to replace the village of Saint-Marcel, which was burnt down by the troops of Simon de Montfort in 1215, during the Northern baron's crusade against the Albigensians.
By the 1229 Treaty of Paris, Raymond VII of Toulouse conceded defeat to Louis IX of France. Under the terms of the treaty, he was authorized and encouraged to develop the bastides. In 1241, Jeanne, the Count of Toulouse, married Alphonse II, the brother of Louis IX and the Count of Poitiers. As a result, Cordes became a part of France in 1271 without having been militarily conquered.
In 1436 Rodrigo de Villandrando pillaged Cordes as part of the Hundred Years' War. The citizens of Cordes, having built their homes within the original 13th-century ramparts, later escaped heavy damage during the religious wars at the end of the 16th century. As a result, some excellent examples of 13th and 14th-century Gothic architecture have been preserved.
Modern history[edit]
The town has attracted tourists interested in heritage destinations. In 1993 it adopted the new name of Cordes-sur-Ciel to reflect the town's site on a hill above the clouds that frequently collect in the river valley.
Points of interest[edit]
• The city is known for its medium-sized outdoor market.
• Cordes is home to the Museum of the Art of Sugar and Chocolate. The museum contains hundreds of pieces of art made completely of sugar. Subjects as diverse as the Middle Ages, mythology, technology and nature are illustrated in the museum's art.
• The Jardin des Paradis is a contemporary garden.
The village lies high above the left bank of the Cérou, which flows westward through the middle of the commune.
Notable figures[edit]
See also[edit]
1. ^ Randolph, Adrian, "The Bastides of Southwest France" The Art Bulletin 77.2 (June 1995), pp. 290–307
External links[edit]
|
global_05_local_4_shard_00000656_processed.jsonl/55089
|
Efrem Zimbalist
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Efrem Zimbalist
Efrem Zimbalist photographed by Carl Van Vechten, September 26, 1933.jpg
Efrem Zimbalist photographed by Carl Van Vechten, September 26, 1933
Born c. 1889
Rostov on Don, Russia
Died 1985 (aged 95–96)
Occupation musician
Known for violinist
Spouse(s) Alma Gluck
Mary Louise Curtis Bok
Children Efrem Zimbalist, Jr. (son)
Maria (daughter)
Relatives Stephanie Zimbalist (granddaughter)
Efrem Zimbalist, Sr. (21 April [O.S. 9 April] 1889 or 1890[1] – February 22, 1985) was an internationally known concert violinist, composer, teacher, conductor and director of the Curtis Institute of Music.
Early life[edit]
Efrem Zimbalist and Alma Gluck
His own compositions include a violin concerto, the American Rhapsody, a tone poem called Daphnis and Chloe, a Fantasy on themes from The Golden Cockerel by Nikolai Rimsky-Korsakov and a piece called Sarasateana, for violin and piano. He also wrote an opera, Landara, which premiered in Philadelphia in 1956.[4]
Personal life[edit]
He married the famous American soprano Alma Gluck and they toured together for a time. Alma Gluck died in 1938. In 1943, having been a widower for five years, he married the school's founder, Mary Louise Curtis Bok,[5] daughter of publisher, Cyrus Curtis, and 14 years his senior.
He died in 1985, at the age of 94. His and Alma's son, Efrem Zimbalist, Jr., and their granddaughter, Stephanie Zimbalist, both became popular actors.[6]
1. ^ a b Malan, Roy (May 2004). Efrem Zimbalist: A Life. Amadeus Press. p. 1. ISBN 1-57467-091-3.
3. ^ "Biography". AaronRosand.com. Retrieved 2011-07-26.
Further reading[edit]
External links[edit]
|
global_05_local_4_shard_00000656_processed.jsonl/55091
|
From Wikipedia, the free encyclopedia
Jump to: navigation, search
This article is about a family of apes. For other uses, see Gibbon (disambiguation).
Temporal range: Miocene–Recent
Hylobates lar pair of white and black 01.jpg
Lar gibbons (Hylobates lar)
Scientific classification
Kingdom: Animalia
Phylum: Chordata
Class: Mammalia
Order: Primates
Superfamily: Hominoidea
Family: Hylobatidae
Gray, 1870
Type genus
Distribución hylobatidae.png
Distribution in Southeast Asia
Gibbons (/ˈɡɪbənz/) are apes in the family Hylobatidae /ˌhlɵˈbtɨd/. The family historically contained one genus, but now is split into four genera. Gibbons occur in tropical and subtropical rainforests from northeast India to Indonesia and north to southern China, including the islands of Sumatra, Borneo, and Java.
Also called the lesser apes, gibbons differ from great apes (chimpanzees, gorillas, orangutans, bonobos and humans) in being smaller, exhibiting low sexual dimorphism, in not making nests, and in certain anatomical details in which they superficially more closely resemble monkeys than great apes do. But like all apes, gibbons evolved to become tailless. Gibbons also display pair-bonding, unlike most of the great apes. Gibbons are masters of their primary mode of locomotion, brachiation, swinging from branch to branch for distances of up to 15 m (50 ft), at speeds as high as 55 km/h (34 mph). They can also make leaps of up to 8 m (26 ft), and walk bipedally with their arms raised for balance. They are the fastest and most agile of all tree-dwelling, non-flying mammals.[citation needed]
Depending on species and gender, gibbons' fur coloration varies from dark to light brown shades, and anywhere between black and white. It is rare to see a completely white gibbon.
Evolutionary history[edit]
The dating of the evolution of these genera has been difficult.[3] The best current estimates place Nomascus diverging from the other genera about 8 million years ago (Mya), and Symphalangus and Hylobates diverging at 7 Mya. At the species level, Hylobates pileatus diverged from H. lar and H. agilis at 3.9 Mya, and H. lar and H. agilis separated at 3.3 Mya. The extinct Bunopithecus sericus is a gibbon or gibbon-like ape which, until recently, was thought to be closely related to the hoolock gibbons.[2]
Hominoid family tree
Siamang, Symphalangus syndactylus
Lar gibbon (Hylobates lar)
Many gibbons are hard to identify based on fur coloration, so are identified either by song or genetics.[6] These morphological ambiguities have led to hybrids in zoos. Zoos often receive gibbons of unknown origin and therefore rely on morphological variation or labels that are impossible to verify to assign species and subspecies names, so it is common for separate species of gibbons to be misidentified and housed together. Interspecific hybrids, hybrids within a genus, also occur in wild gibbons where the ranges overlap.[7]
Physical description[edit]
One unique aspect of gibbon anatomy is that the wrist is composed of a ball and socket joint, allowing for biaxial movement. This greatly reduces the amount of energy needed in the upper arm and torso, while also reducing stress on the shoulder joint. Sometimes when a gibbon is swinging, its wrist will naturally dislocate until the gibbon finishes its swing.[citation needed] Gibbons also have long hands and feet, with a deep cleft between the first and second digits of their hands. Their fur is usually black, gray, or brownish, often with white markings on hands, feet, and face. The male gibbon will sometimes end up with some dark patches in the white to show it is a suitable choice for mating.[vague] Some species have an enlarged throat sac, which inflates and serves as a resonating chamber when the animals call. This structure is enormous in a few species, equaling the size of the animal's head. Their voice is much more powerful than that of any human singer, although they are at best half a man's height.[8]
Gibbon skulls and teeth resemble those of the great apes, and their noses are similar to those of all catarrhine primates. The dental formula is [9] The siamang, which is the largest of the 17 species, is distinguished by having two fingers on each foot stuck together, hence the generic and species names Symphalangus and syndactylus.[10]
Genus Hoolock
Gibbons are social animals. They are strongly territorial, and defend their boundaries with vigorous visual and vocal displays. The vocal element, which can often be heard for distances of up to 1 km (0.6 mi), consists of a duet between a mated pair, with their young sometimes joining in. In most species, males, and in some also females, sing solos to attract mates, as well as advertise their territories.[11] The song can be used to identify not only which species of gibbon is singing, but also the area from which it comes.[12]
Gibbons are masters of their primary mode of locomotion, brachiation, swinging from branch to branch for distances of up to 15 m (50 ft), at speeds as high as 55 km/h (34 mph).[13] The gibbons' ball-and-socket joints allow them unmatched speed and accuracy when swinging through trees. Nonetheless, their mode of transportation can lead to hazards when a branch breaks or a hand slips, and researchers estimate that the majority of gibbons suffer bone fractures one or more times during their lifetimes.[14] They are the fastest and most agile of all tree-dwelling, non-flying mammals.[14]
Conservation status[edit]
Most species are endangered, primarily due to degradation or loss of their forest habitats.
In traditional Chinese culture[edit]
Further information: Monkeys in Chinese culture
Two gibbons in an oak tree by the Song dynasty painter Yì Yuánjí
1. ^ a b Groves, C. P. (2005). Wilson, D. E.; Reeder, D. M, eds. Mammal Species of the World (3rd ed.). Baltimore: Johns Hopkins University Press. pp. 178–181. OCLC 62265494. ISBN 0-801-88221-4.
2. ^ a b c Mootnick, A.; Groves, C. P. (2005). "A new generic name for the hoolock gibbon (Hylobatidae)". International Journal of Primatology 26 (26): 971–976. doi:10.1007/s10764-005-5332-4.
4. ^ a b Geissmann, Thomas (December 1995). "Gibbon systematics and species identification" (PDF). International Zoo News 42: 467–501. Retrieved 2008-08-15.
8. ^ Lull, Richard Swann (1921). "Seventy Seven". Organic Evolution. Newyork: The Macmillan Company. pp. 641–677.
9. ^ Myers, P. 2000. Family Hylobatidae, Animal Diversity Web. Accessed April 05, 2011-04-05.
10. ^ Geissmann, T. (2011). "Typical Characteristics". Gibbon Research Lab. Retrieved 17 August 2011.
11. ^ Clarke E, Reichard UH, Zuberbühler K (2006). "The Syntax and Meaning of Wild Gibbon Songs". In Emery, Nathan. PLoS ONE 1 (1): e73. doi:10.1371/journal.pone.0000073. PMC 1762393. PMID 17183705.
12. ^ Glover, Hilary. Recognizing gibbons from their regional accents, BioMed Central,, 6 February 2011.
13. ^ Springer, Joseph; Holley, Dennis (2012). An Introduction to Zoology. Jones & Bartlett Publishers. p. 486. ISBN 9781449682811.
14. ^ a b Attenborough, David. Life of Mammals, "Episode 8: Life in the Trees", BBC Warner, 2003.
External links[edit]
|
global_05_local_4_shard_00000656_processed.jsonl/55092
|
Jeon Hye-bin
From Wikipedia, the free encyclopedia
(Redirected from Jeon Hye Bin)
Jump to: navigation, search
This is a Korean name; the family name is Jeon.
Jeon Hye-bin
Jeon Hye-bin at the Nike: We Run Seoul 10k, on October 2011
Seoul, South Korea
Alma mater
Years active 2002 - present
Agent Namoo Actors
Musical career
Also known as BIN
Instruments Vocals
Years active 2002 - 2003
Associated acts
Korean name
Revised Romanization Jeon Hye-bin
McCune–Reischauer Chŏn Hyebin
Jeon Hye-bin (Korean: 전혜빈?, Korean pronunciation: [tɕʌnh(j)ebin]; born September 27, 1983), known as BIN during her music career, is a South Korean actress, singer and model.[1][2] In 2002, she began her career as singer of the short-lived three-member girl group LUV, however the group disbanded the following year due to individual goals.
Following the disbandment of LUV, Jeon released her first solo album, Love Somebody on July 31. She ventured into acting and appeared in her first television drama, Sang Doo! Let's Go to School and cast in the 2004 horror film Dead Friend. On 23 September 2005, she found mainstream success with her second album In My Fantasy. "2AM", a song produced by Mr. Tyfoon, showcased her seductive side and dancing abilities. However, it came under heavy criticism for being too suggestive during performances, and required the cuter, less suggestive song "Bin-Go" (also produced by Mr. Tyfoon) to be promoted. Jeon was later cast in the comedic film Wet Dreams 2 and tv show Only You. In 2008, she decided to focus on her acting career. Appearing in several TV shows, On Air (2008), Yaksha (2010), My Love By My Side (2011),[3] Queen Insoo (2011) and Queen of the Office (2013). She was cast as Choi Hye-won for the upcoming Joseon era drama, Gunman in Joseon, scheduled to broadcast on June 18.
2002: LUV[edit]
She debuted as one of the three members of the girl group LUV with Jo Eun-byul and Oh Yeon-seo. LUV appeared as singers in JTL's "A Better Day" music video in 2002. On May 15, the group released their first album Story - Orange Girl and performed "Orange Girl" at multiple shows. On August 12, they performed "Tears" for the Gangwon Province Armed Forces. The group's popularity grew enough that they were being compared with S.E.S. because many saw huge potential in them. However, the group did not last long as they disbanded a year later due to each member expressing their own dreams.[4]
2003-07: Sang Doo! Let's Go to School, Love Somebody and In My Fantasy[edit]
In 2003, Hye-bin appeared in the third season of MBC's Nonstop and later cast in Sang Doo! Let's Go to School as Yoon Hee-seo.[5] Her first solo album Love Somebody was released on July 31.[6]
In 2004, Hye-bin made movie debut in horror film Dead Friend as Eun-seo, sister of Eunjung (played by Lee Yoon-ji).[7] January 14, she was cast in Wet Dreams 2 as Park Soo-yeon, one of the four high school girls competing for affection for their teacher.[8]
On May 22, 2005, she appeared on the 41st episode of Banjun Drama, a mini-drama series of SBS Good Sunday program, and appeared in 12 additional episodes.[9] Her second album In My Fantasy released on 23 September became a hot-topic due to the song, "2AM".[10] "2AM", one of the two songs that she performed and produced by Mr. Tyfoon, was heavily criticized for its suggestive dance routine.[11][12]
On January 21, 2006, Kim Jong-kook, Im Tae-kyung and herself participated in Thuy Nga's Paris By Night 81 concert in California. Jeon performed "2AM". An accident in early 2006 forced Jeon to have surgery done, and under the advice of others, she underwent nose and teeth reconstruction. She eventually confirmed that she underwent plastic surgery when rumors were quickly spreading about the change in her appearance.[13] She appeared as one of the six women on Heroine 6, a popular segment on the Korean Broadcasting System (KBS) variety show Happy Sunday until it ended in 2007.
2008-11: Acting career, Yaksha and Queen Insoo[edit]
At a press conference in 2008, Jeon stated that she will be focusing on her acting career.[citation needed] She appeared in The Scale of Providence and made a cameo appearance on episode 3 of On Air, a SBS behind-the-scenes drama of a fictional television drama.[14]
In 2010, she played the role of Jeong-yeon in OCN drama Yaksha [15] and in 2011, Hye-bin was cast in the jTBC drama Queen Insoo as Queen Jeheon.[16] Jeon is well-known for her love of fitness and exercise. She released a beauty book, Heaven's Stylish Body, in 2011 which included fitness and fashion tips.[17]
2012-present: Queen of the Office, Beating Hearts and Gunman in Joseon[edit]
In 2012, she followed up with the launch of an iPad diet app[18] and on January 23, she appeared in the 2012 Korean New Year Special of Law of the Jungle W with Kim Joo-hee, Kim Na-young, Jung Joo-ri and Hong Soo-ah.[19] On September 2, she appeared in Law of the Jungle: Madagascar with Kim Byung-man, Noh Woo-jin, Ricky Kim, Ryu Dam, Park Jung-chul and Jeong Jin-woon of 2AM.[20]
After a year hiatus from television, Jeon was cast in the KBS2 drama Queen of the Office with Kim Hye-soo, Oh Ji-ho, Jung Yu-mi, Lee Hee-joon and Jo Kwon in 2013. Her character, Geum Bit-na, is a co-worker and ex-girlfriend of Jang Gyu-jik.[21] On October 2013, Jeon is part of the cast for 'Beating Hearts', a reality show with a group of celebrities training to become firefighters.[22][23] On the 100th episode of Law of the Jungle: Borneo, she appeared as a guest with Hwang Kwang-hee of ZE:A, Choo Sung-hoon and Oh Jong-hyuk.[24][25] On 23 April 2014, she was cast for the role of Choi Hye-won in KBS2 drama Gunman in Joseon.[26][27]
Other ventures[edit]
In 2006, she was CEO and model of ByHeaven (Korean: 바이헤븐), an online shopping mall. In October 2011, she participated in the Nike: We Run Seoul 10k.[28] On January 17, 2014, ByHeaven limited sales to offline because of personal circumstances and on January 24, all sales stopped.
In 2005, Hye-bin was ambassador of the Make-A-Wish Foundation in South Korea. On 29 October 2012, she donated the proceeds from her personally designed hair dryer to Make-A-Wish (Korea).[29][30]
Studio albums[edit]
Album Information Track Listing
In My Fantasy[31]
1. Bin-Go
2. 2AM
3. Why
4. 반지
5. 달을 삼킨 밤
6. Mr. Crazy
7. Pinky
8. See Ya Later
9. Back Of Mind
10. Club
11. 2AM (MR)
Single albums[edit]
Album Information Track Listing
Love Somebody[32]
1. Love Somebody
2. 입술
3. Love Somebody (Instrumental)
4. 입술 (Instrumental)
TV dramas[edit]
Year Title Network Role Notes
2003 Nonstop 3 MBC Herself -
2003 Sang Doo! Let's Go To School KBS Yoon Hee-seo -
2005 Banjun Drama SBS - Episodes: 41, 54, 57 & 59 - 68
2005 Only You SBS Cha Soo-jae -
2007 Witch Yoo Hee SBS Nam Seung-mi -
2007 The King and I (TV series) SBS Seol-young -
2008 The Scale of Providence SBS Noh Se-ra -
2008 On Air SBS Herself
2009 He Who Can't Marry KBS Hwa-ran -
2009 Hometown Legends: Fox with Nine Tails KBS2 So-ho -
2010 Drama Special: The Angel of Death Comes With Purple High Heels KBS2 Lee Ji-yeon -
2010 Yaksha OCN Jeong Yeon -
2011 My Love By My Side SBS Jo Yoon-jeong -
2011 Queen Insoo jTBC Queen Lady Yoon -
2013 Queen of the Office KBS Geum Bit-na -
2014 Drama Special: Taste of Curry KBS Yoo-mi -
2014 Gunman in Joseon KBS2 Choi Hye-won -
Variety shows[edit]
Year Title Network Role Notes
2012 Law of the Jungle W SBS Herself 2012 Seollal Special
2012 Law of the Jungle: Madagascar SBS Herself -
2014 Law of the Jungle: Borneo SBS Herself
• Guest
• Special 100th Episode
2014 Beating Hearts SBS Herself -
Year Title Role Award Nominations
2004 Dead Friend Eun-seo -
2005 Wet Dreams 2 Park Soo-yeon -
Year Title Role Notes
2010 Singles - -
Music videos[edit]
Year Title Artist Notes
2005 "Flip Reverse" Jang Woo-hyuk -
2006 "Living a Day in Winter" Brian Joo -
2008 "Thorn Fish" MC The Max -
2009 "Do You Know" Someday
2012 "I Want To Live With Her" UV Featuring Yoon Do-hyun
• 2011 Korea Drama Awards: Cable TV (Yaksha, OCN)[37]
See also[edit]
1. ^ "전혜빈" (in Korean). Naver. Retrieved 22 September 2011.
2. ^ "Daum Knowledgeble Items" (in Korean). Daum. Retrieved 23 April 2014.
3. ^ "Jun Hye Bin reveals two different sets of pictures by the beach". Allkpop. 15 June 2011. Retrieved 25 October 2011.
4. ^ "여성신인 3인조 ‘러브(LUV)’ 인기급상승" (in Korean). Naver.
5. ^ "혜빈, 문근영-김태희와 한솥밥" (in Korean). Joy News. 8 September 2009. Retrieved 27 April 2014.
6. ^ "첫 솔로 앨범 발매한 빈" (in Korean). Daum. 10 October 2005. Retrieved 27 April 2014.
7. ^ "전혜빈 오싹 공포담 "‘령’ 찍을 당시 의문의 소리 녹음됐다"" (in Korean). Newsen. 7 July 2007. Retrieved 28 April 2014.
8. ^ ""몽정기 2", 아찔한 촬영현장 공개". Joy News (in Korean). Daum. 7 November 2004. Retrieved 28 April 2014.
9. ^ "박명수-지상렬, 동방신기로 깜짝 변신 화제만발" (in Korean). Daum. 10 October 2005. Retrieved 27 April 2014.
10. ^ "전혜빈, 정규 1집 컴백 앞두고 옥션 모델..'시작이 좋다'". Joy News (in Korean). Daum. 23 September 2005. Retrieved 27 April 2014.
11. ^ "전혜빈 새노래 "너무 야하다" 논란". The Kukmin Daily Internet News (in Korean). Daum. 26 September 2005. Retrieved 27 April 2014.
12. ^ "전혜빈, 골반 양옆 드러난 의상에 노팬티 논란". Joy News (in Korean). Daum. 17 October 2005. Retrieved 27 April 2014.
13. ^ "Gossips In The Streets Of Seoul". Arirang (in Korean).
14. ^ "‘온에어’ 전혜빈 박시연 이천희 카메오 깜짝 출연" (in Korean). Newsen. 12 March 2008. Retrieved 28 April 2014.
15. ^ "전혜빈,'아름다운 쇄골과 가슴라인'" (in Korean). Osen. 6 December 2010. Retrieved 28 April 2014.
16. ^ "‘인수대비’ 전혜빈 피범벅 셀카 "저 먼저 죽어요" 섬뜩" (in Korean). Newsen. 4 June 2012. Retrieved 28 April 2014.
17. ^ "Jeon Hye-bin's Sexy Styling Book Sells Well". The Chosun Ilbo. 19 July 2011. Retrieved 4 August 2014.
18. ^ "Jeon Hye-bin to launch diet application". Korea JoongAng Daily. 26 April 2012. Retrieved 4 August 2014.
19. ^ "<정글2> '가상 캐스팅' 이시영 vs 전혜빈 vs 신수지" (in Korean). Oh My News. 7 July 2012. Retrieved 7 May 2014.
20. ^ "Jeon Hye Bin Eats a Roasted Snake on ′The Laws of the Jungle′". MWave. 17 September 2012. Retrieved 7 May 2014.
21. ^ "KBS viewers love sassy office worker". Joongang Daily. Hancinema. 2 April 2013. p. Retrieved 28 April 2014.
22. ^ "Beating Hearts on SBS". SBS.
23. ^ "Realty-variety show Beating Hearts adds to cast". 10 August 2013. Retrieved 4 August 2014.
24. ^ "'Law' draws celebs to 'Jungle'". 20 January 2014. Retrieved 4 August 2014.
25. ^ "Law of the Jungle on SBS". SBS. Retrieved 4 August 2014.
26. ^ "Jeon Hye-bin in "The Joseon Shooter"". Hancinema. 23 April 2014. p. Retrieved 26 April 2014.
27. ^ "조선총잡이 전혜빈 '철의 여인' 변신... 매혹적인 스틸컷 공개". SBS (in Korean). 23 May 2014. Retrieved 31 May 2014.
28. ^ "Stars run for the 'NIKE WE RUN SEOUL 10K'". Allkpop. 23 October 2011. Retrieved 22 May 2014.
29. ^ Hong, Grace (2 November 2011). "Jeon Hye Bin Donates Proceeds for her Personally Designed Hair Dryer". MWave. Retrieved 26 April 2014. "... I was pondering about what I could to help children who are suffering from illness when this opportunity with Joas Electronics came up. I want to continue coming up with new designs for various appliances to keep this good deed up."
30. ^ "조아스전자-바이헤븐" (in Korean). ET News. 25 March 2013. Retrieved 22 May 2014.
31. ^ "In My Fantasy". Naver (in Korean). Retrieved 22 September 2011.
32. ^ "Love Somebody". Naver (in Korean). Retrieved 22 September 2011.
33. ^ "Jun Hye Bin shows off her perfectly-portioned body for InStyle Magazine", Allkpop, 18 July 2011. Retrieved 25 October 2011.
34. ^ Jeon, Su-mi (27 Maybe 2012). "Jeon Hye Bin’s Bikini Shoot for ′Arena′ Revealed". MWave. Retrieved 26 April 2014.
35. ^ "전혜빈의 스타일리시 바디" (in Korean). Daum. Retrieved 1 June 2013.
36. ^ "Jeon Hye-bin's Sexy Styling Book Sells Well". Chosun. Retrieved 1 June 2013.
37. ^ "Winners of the 2011 Korea Drama Awards", Allkpop, 2 October 2011. Retrieved 21 October 2011.
External links[edit]
|
global_05_local_4_shard_00000656_processed.jsonl/55093
|
John Lustig
From Wikipedia, the free encyclopedia
Jump to: navigation, search
John Lustig
Lustig at the New York Comic Con in Manhattan, October 10, 2010.
Born (1953-01-25) January 25, 1953 (age 61)[1]
Area(s) Writer
John Lustig (born January 25, 1953[1]) is an American comics writer (former journalist) principally known for his comic book scripts featuring Donald Duck and other members of Disney's Duck family. Lustig's scripts have been illustrated by William Van Horn and other artists. In addition, Lustig has written Mickey Mouse scripts that have been drawn by Noel Van Horn (William's son) and others. His first script was for Gold Key Comics ("Flatfood Duck" Daffy Duck #112 [Dec. 1977]), done just after graduating from college (it would be a decade before he wrote any other comics).[2]
Lustig has also become known for his clever post-modern rescripting of panels from old romance comic pages previously published by Charlton Comics under the banner Last Kiss. Besides four issues of the comic book Last Kiss, the panels have also become a regular feature of Comics Buyer's Guide, and recently expanded into being featured on t-shirts, greeting cards, etc.
1. ^ a b Comics Buyer's Guide #1650; February 2009; p. 107
2. ^ User Reviews
External links[edit]
|
global_05_local_4_shard_00000656_processed.jsonl/55094
|
John Murphy (Australian politician)
From Wikipedia, the free encyclopedia
Jump to: navigation, search
The Honourable
John Murphy
Member of the Australian Parliament
for Lowe
In office
3 October 1998 – 21 August 2010
Preceded by Paul Zammit
Succeeded by Division abolished
Member of the Australian Parliament
for Reid
In office
21 August 2010 – 7 September 2013
Preceded by Laurie Ferguson
Succeeded by Craig Laundy
Personal details
Born (1950-05-31) 31 May 1950 (age 64)
Dunedoo, New South Wales, Australia
Nationality Australian
Political party Australian Labor Party
Spouse(s) Adriana
Occupation Public servant
John Paul Murphy (born 31 May 1950), Australian former politician, was an Australian Labor Party member of the Australian House of Representatives from October 1998 until September 2013, representing Lowe and then Reid, New South Wales.
Early life and education[edit]
John Murphy was born in Dunedoo, New South Wales. He was educated at Waverley College in NSW and worked with the Department of Veterans' Affairs for 20 years before moving to the Merit Protection Review Agency for eight years, including six years as Manager. Murphy served as a Councillor on Drummoyne Council (now part of Canada Bay Council) from 1995 to 1998.
Political career[edit]
Murphy gained pre-selection for the ALP over the high profile Michael Costello, former head of the Department of Foreign Affairs and Trade and Australian Stock Exchange, following protests by local ALP members who did not want Costello (who lived outside the electorate) being imposed on them.[1]
Lowe's previous MP was Paul Zammit, a Liberal who turned Independent in protest over the Howard Government's policies on aircraft noise. Standing as an independent in the 1998 election, Zammit's preferences flowed to Murphy to help him win the seat for Labor. Murphy retained his seat at every subsequent election until 2013.
Murphy was the Parliamentary Secretary to the Shadow Minister for Health Stephen Smith from December 2001 to February 2003 and then Parliamentary Secretary to federal Labor leaders Simon Crean, Mark Latham, Kim Beazley and Kevin Rudd from February 2003 to December 2007. When Rudd become Prime Minister, Murphy became the Parliamentary Secretary to the Minister for Trade. He left this position, citing family reasons, in a ministerial reshuffle which occurred on 19 February 2009.
Following an electoral redistribution in 2009, Murphy's electorate was renamed Reid following significant changes to its boundaries. On 4 December 2009, he was preselected unopposed as Labor's candidate for the federal electorate of Reid.
Murphy narrowly retained Reid in 2010 with a swing of 11% swing against him. However, he was defeated in 2013 by Liberal candidate Craig Laundy on a 2.7% swing.
He is a member of the NSW Right and holds socially conservative views on most moral issues, such as abortion and stem-cell research. Murphy campaigned against the Howard Government's removal of cross-media ownership restrictions and has been a long-standing critic of media proprietors, such as Rupert Muroch and the late Kerry Packer.[2] He has also campaigned against any expansion of Sydney Airport and once told the House of Representatives that the Chairman of Sydney Airport, Max Moore-Wilton, "should be flogged" for his failure to act on aircraft noise which is a major issue in his electorate of Lowe.[3]
During his term in Parliament, Murphy expressed strong views opposing same-sex marriage in Australia. In an interview on 27 August 2011, Murphy claimed that his electorate he had a large number of Christian and Islamic voters and that granting permission to homosexuals and lesbians to marry was "a step too far". The interview sparked further debate on the topic within Labor.[4][5]
1. ^ Parts from The Australian Political Almanac (2005), Wilson (ed), p232
2. ^
3. ^;fileType=application/pdf
4. ^ Murphy, John (27 July 2011). Same sex marriage debate divides Labor (streaming video and transcript). Interview with Chris Uhlmann. 7.30. ABC TV. Australia. Retrieved 29 July 2011. "At the last election there was a redistribution and I inherited probably the most multicultural part of Australia, centred on Auburn. And if people think that the old electorate that I represent of Lowe, which is a predominantly - a Christian electorate, are concerned about this, well I ask you to ask people of the Islamic faith what they think about the Labor Party's push to allow couples of the same gender to get married under the Marriage Act. They reject that."
5. ^ "Leave the Party". Sydney Star Observer. Retrieved 29 July 2011.
External links[edit]
Parliament of Australia
Preceded by
Paul Zammit
Member for Lowe
Division abolished
Preceded by
Laurie Ferguson
Member for Reid
Succeeded by
Craig Laundy
|
global_05_local_4_shard_00000656_processed.jsonl/55096
|
Niger Armed Forces
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Niger Armed Forces
Forces Armées Nigeriennes (FAN)
Niger army logo.jpg
Seal of the Niger Armed Forces
Founded 1 August 1961
Service branches Army, Air Force,
National Gendarmerie,
National Guard (GNN).
Headquarters Niamey
Commander-in-Chief President Mahamadou Issoufou
Minister of National Defence Karidio Mahamadou
Joint Chief of staff General Seyni Garba
Military age 18–49
Conscription 2 year compulsory[1]
Available for
military service
2,135,680 (2005 est.), age 15–49
Fit for
military service
1,155,054 (2000 est.), age 15–49
Active personnel 12,000
Reserve personnel 5000 (2003)[1]
Percent of GDP 1.6% (2007)
Foreign suppliers France
People's Republic of China
United States
Nigerien army soldiers from the 322nd Parachute Regiment practice field tactics during combat training facilitated by U.S. Army Soldiers during exercise Flintlock 2007 in Maradi, Niger, April 6, 2007
The Niger Armed Forces (French: Forces Armées Nigeriennes) (FAN) includes military armed force service branches (Niger Army and Niger Air Force), paramilitary services branches (National Gendarmerie of Niger and National Guard of Niger) and the National Police. The Niger Army, Niger Air Force and the National Gendarmerie of Niger are under the Ministry of Defense whereas the National Guard of Niger and the National Police fall under the command of the Ministry of Interior. With the exception of the National Police, all military and paramilitary forces are trained in military fashion. The President of Niger is the supreme commander of all armed forces.
Military Armed Forces[edit]
The two military service branches (Niger Army and Niger Air Force) are each headed by their respective Chiefs of Staff who serve as adjunct to the Joint Chiefs of Staff of Military Armed Forces (French: Chef d'Etat Major des Armées). Military operations are headed from the Joint Staff Office (French: Etat Major General des Armées). In addition, each military branch has its own Staff Office. The Joint Chief of Staff has operational command of all the military forces and is under the command of civilian Minister of Defense (Niger), who reports to the President of Niger. This system closely resembles the French Armed forces model. The President also appoints the Special Chief of Staff at the President Office and the head of the Presidential Guard who answer directly to the President. The Special Chief of Staff and the head of the Presidential Guard sit on the Joint Staff.[2][3]
Niger Army[edit]
The Niger Army is the land military armed forces of Niger with 5,200 personnel.[4] Units include logistics, motorized infantry, airborne infantry, artillery and armoured companies. There is a total of 10 pure motorized infantry battalions, three of which are Saharan. The other battalions are mixed, like the ones in Niamey (12eme Battaillion Inter Armes de Niamey),[5] Zinder, Tahoua and Madawela. Each of these battalions comprises a logistics and engineering or génie company, a fire fighter company, an infantry company, be it airborne or land, an armoured squadron and an artillery company. The Army is commanded by the Chief of Staff of the Army in Niamey through appointed commandeers of each of the seven "Defense Zones", which largely overlap each of the civilian Regions of Niger.[2][3]
Motorized company of the Niger Army during a parade in Niamey
The Niger Army was created on 28 July 1960 by decree. At the time, the National Police was a subsection of the military. Initially, units of the army were created from three companies of the French Colonial Forces made of Nigerien soldiers officered by Frenchmen who agreed to take joint French-Nigerien citizenship. In 1960, there were only ten African officers in the Nigerien army, all of low ranks. As Nigerien officers have gradually assumed command role, President Diori signed legislation to end the employment of expatriate military officers in 1965. However, French military personnel remained in Niger both to serve in the Niger Army and in the 4th Régiment Interarmes d'Outre-Mer (Troupes de Marine) with bases at Niamey, Zinder, Bilaro and Agadez.[6] In the late 70's, a smaller French force returned again to Niger. After the 1974 military coup, all French military personnel were evacuated although a smaller French force returned in the late 1970s. In 1970, the army was reorganised and divided into four Infantry battalions, one paratroop company, one light armored company, a camel corps, and a number of support units. It will again be reorganized in 2003 to create the Niger Air Force as distinct service branch.
Basic training is carried out at Niamey at the Tondibiah base and at Agadez. Other special training centers include the National Officers Training School (French: Ecole de Formation des Forces Armées Nigériennes or EFOFAN) and The Paramedical Personnel Training School (EPPAN) both based at the Tondibiah base.[7][8] In addition to training in Niger, army officers also train in France at the Special Military School of Saint-Cyr, in Morocco at The Royal Military Academy of Meknès, in Algeria and the US. With the growing cross-border threats of terrorism in West Africa, the Niger Army has benefited from training exercises with France and the U.S. The Niger Army has participated in the U.S. led Flinlock Exercise which it hosted in 2014.[9]
The army of Niger is poorly equipped in armored vehicles and tanks. With the exception of two armored vehicles purchased from China in 2009, most armored vehicles are at least 20 years old.[10] The army is however well stocked with 4x4 land cruisers mounted various caliber machine guns. Logistic fuel and water transport capacities have been recently improved to help refueling needs on long patrol missions[11][12]
Armored vehicles
Type Origin Description Quantity References
Panhard AML-90/60 France Light armored reconnaissance vehicles 56-125 [10][13]
UR-416 West Germany Armored personnel carrier 8 [13][14]
ZFB05 China Armored personnel carrier 8 [13][14]
Panhard M3 and VTT France Armored personnel carriers 32 [10]
Panhard VBL France Light armoured, all-terrain vehicle 7 [14]
WZ523 APC China Armored personnel carriers 2 [14]
Niger Air Force[edit]
The roundel of the Niger Air Force
The predecessor of the Niger Air Force, the Niger National Escadrille (Escadrille Nationale du Niger) was first formed on 1961.[15] It was later restructured into the National Air Wing (Groupement Aerien National) in 1989. Prior to 2003, military armed forces of Niger (French: forces armées nigeriennes or FAN) were grouped in one branch with one Chief of Staff who oversees both ground forces as well as the National Air Wing. Following an organizational restructuring in 2003, the military armed forces of Niger were structured into two main service branches: Niger Army (French: armée de terre) for all ground military forces and Niger Air Force (Armée de l'air). Each branch was headed by a Chief of Staff answerable to the Joint Chief of Staff of military armed forces. As part of this new structure, the National Air Wing was renamed as Niger Air Force (Armée de l'Air du Niger) on December 17, 2003. The Niger Air Force is led by the Air Force Chief of staff answerable to the Joint Chief and the Defense Minister. Presently, the Chief of Staff is Col. Boulama Issa.
Organizationally, the air force is composed a Chief of Staff Office, operation units (French: escadrons), technical units, an infantry company (compagnie de fusiliers) and generalized staff.[16] The Chief of Staff of the Niger Air Force is the lieutenant-colonel Boulama Issa Zana Boukar Dipchiarima (2011 -- )[15] (chef d'etat major).
At the moment, there is no air force special training facilities in Niger. Basic training of Air Force recruits is conducted at Tondibiah base along with recruits of other military service branches. Air force officers, pilots and mechanics are additionally trained in France, US and other North Africa countries like Morocco at Royal Air Force School of Marrakech and Algeria.[13]
The aircraft inventory of the Niger Air Force is modest though it has increased with new acquisition beginning 2008 and further assistance from France and US.[10] This expansion in capacity is guided by the need for better border patrol following the crisis in Libya and Mali.
Aircraft Origin Type Quantity Operational status References
Lockheed C-130 Hercules United States Military transport 1 Operational [13][17]
Dornier Do 228 Germany Utility transport 1 Operational [13][17]
Dornier Do 28 Germany Utility transport 1 Operational [13][17]
Diamond DA42 Austria Surveillance 2 Operational [13]
Boeing 737 United States VIP transport 1 Operational [13][17]
Tetras France Ultra light (ULM) transport 3-4 Operational [13][17]
Cessna 208 Caravan United States Light transport 2 Operational [13]
Mi-24 Soviet Union Attack helicopters 2 Unknown [13][17]
Mi-17 Soviet Union Transport helicopters 2 Operational [13][17]
Gazelle SA341F France Attack helicopters 3 Delivered in 2013 and operational [13]
Su-25 Soviet Union Fighter jets 2 Delivered in 2013 and operational [13]
Paramilitary forces[edit]
There are two paramilitary services branches: (National Gendarmerie of Niger under the Ministry of Defense and the National Guard of Niger) under the Ministry of Interior. Each of these branches are headed by Chief of Staff answerable to the overseeing ministry.
National Gendarmerie[edit]
The National Gendarmerie is commanded by the Superior Commander of the National Gendarmerie. Unlike the National Police and the National Guard, the National Gendarmerie is under the control of the Ministry of Defense of Niger. It is divided between territorial brigades and mobile brigades. In addition to territorial defense and maintaining public order, it provides military and paramilitary justice to other corps of the armed forces and participates to the judicial and the surveillance police activities. It is regarded as an elite force due to its stringent recruitment criteria of all armed forces. Due to increasing cross-border traffic of weapons and drugs, its activities have increased border areas. The national gendarmerie, unlike the Army or the National Guard, has never been directly involved in an attempt to seize or control power by force.[18]
National Guard[edit]
Formerly known as the National Forces of Intervention and Security, the National Guard of Niger is responsible for security in rural areas where the national police is absent. It is overseen by the superior commander of the National Guard who reports to the Ministry of Interior. This body is responsible for: border and territorial surveillance of the country, public safety, maintaining and restoring of order, protecting public buildings and institutions, people and their property, the execution of the administrative police in rural and pastoral areas, management and monitoring of prisons, humanitarian actions in the case of national disaster or crisis and protection of the environment. It is also responsible for providing security to administrative authorities and the diplomatic and consular representations of Niger abroad.[19]
National Police[edit]
The General Directorate of National Police, headquartered in Niamey was until the 1999 Constitution under the command of the Armed Forces and Ministry of Defense. Today, only the National Gendarmerie reports to the Ministry of Defense, with the National Police and its Para-Military Arm—FNIS—moved to the Nigerien Interior Ministry.[20] The National Gendarmerie(modeled on the French Gendarmerie) and the National Forces for Intervention and Security (FNIS) (Forces nigerienne d'internale securite- FNIS) count a combined 3,700 member paramilitary police force. The FNIS, along with some special units of the Gendarmerie, are armed and trained in military fashion, similar to the Internal Troops of the nations of the former Soviet Union.[21] The Gendarmerie has law enforcement jurisdiction outside the Urban Communes of Niger, while the National police patrols towns. Special internal security operations may be carried out by the Military, the FNIS, the Gendarmerie, or whatever forces tasked by the Government of Niger.
Domestic conflicts[edit]
Member of the rebel MNJ, northern Niger, 2008
The First Tuareg Rebellion of 1985–1995[edit]
From 1985 to 1995, the armed forces of Niger were engaged in armed fights with the Popular Front for the Liberation of Niger (FPLN). An armed attack by FPLN members in Tchin-Tabaradene in 1985 sparked the closing of the borders with Libya and Algeria, and the resettlement of thousands of Tuareg and other nomads away from the area. Failed promises by the government of Ali Saïbou fueled growing Tuareg discontent leading to an attack on a police station in Tchin-Tabaradene in May 1990. The Niger Army violently responded in May 1990, arresting, torturing, and killing several hundred Tuareg civilians in Tchin-Tabaradene, Gharo and In-Gall in what is known as the Tchin-Tabaradene massacre.[22] Tuareg outrage sparked the creation of two armed insurgent groups: the Front for the Liberation of Aïr and Azaouak and the Front for the Liberation of Tamoust and continued armed fights until 1995 when a peace agreement end fighting. The Nigerien Armed Forces has been extensively involved in politics since independence, and has been denounced at several points for broad abrogation of human rights and unlawful detentions and killings.
The Second Tuareg Rebellion of 2007-2009[edit]
The Nigerien Armed Forces were involved from 2007 to 2009 in an insurgency in the north of the country, labeled the Second Tuareg Rebellion. A previously unknown group, the Mouvement des Nigeriens pour la Justice (MNJ), emerged in February 2007. The predominantly Tuareg group has issued a number of demands, mainly related to development in the north. It has attacked military and other facilities and laid landmines in the north. The resulting insecurity has devastated Niger's tourist industry and deterred investment in mining and oil. The government has labeled the MNJ criminals and traffickers, and refuses to negotiate with the group until it disarms. As of July 2008, some 100 to 160 Nigerien troops have been killed in the ongoing conflict.[23] The second tuareg rebellion ended in 2009 with Peace Talks hosted by Libya.
Foreign missions[edit]
Soldiers of the Niger army during the Gulf War
In 1991, Niger sent a 400-man military contingent to join the American-led allied forces against Iraq during the Gulf War. Niger provides a battalion of peace-keeping forces to the UN Mission in Côte d'Ivoire. As of 2003, the FAN had troops deployed in the following foreign missions:[24]
Nigerien Panhard AML light armored cars with 90mm guns stand in a holding area during Operation Desert Shield.
Defense cooperation[edit]
Niger defense forces have a long history of military cooperation with neighboring countries in the region, France, the United States, China as well as many other countries.
Regional defense cooperation[edit]
Through ECOWAS and the African Union, Niger defense forces have been involved in multiple missions in the Africa and the West Africa. Niger has been a supporter and volunteered to participate in the African Union future rapid intervention forces.[25] In addition, with the growing threat of Boko Haram, defense forces of Niger, Nigeria, Cameroon and Chad have intensified cooperation to address the trans-border threat of this organization.[26]
Counter-terrorism defense cooperation[edit]
U.S. and France defense cooperation with Niger has intensified post 9/11 as part of the Global War on Terror.[27] The Niger defense forces along with forces from Chad, Mali, Mauritania have become major partners of France and the United States in counter-terrorism efforts in Africa. The counter-terrorism efforts focused mainly on Al-Qaïda affiliated groups in Africa, in particular the Algerian Group for Call and Combat which will later become AQMI. The collapse of the Gaddafi regime, followed with the disbandment of his arsenal in the region, accentuated the precarious situation of many sahelian nations. The Northern Mali conflict and beginning of Operation Serval to free northern Mali of Islamic militant groups solidified the role of Niger in counter-terrorism activities in the region. Following an agreement with the Niger government, the air force base 101 of Niamey became a permanent drone hub for French and U.S. forces since 2013.[27][28][29] Drone intelligence gathering activities in Mali and the region were carried out from this base during Serval. Niamey has became the Intelligence gathering pole of French and U.S. forces in the region.[30]
Political involvement[edit]
In 1974 General Seyni Kountché overthrew the first president of Niger Hamani Diori. The military regime that followed, while plagued by coup attempts of its own, survived until 1991. While a period of relative prosperity, the military government of the period allowed little free expression and engaged in arbitrary imprisonment and killing.[31]
A paratrooper of the FAN Parachute Company armed with an Israeli-made Uzi submachine gun, 1988
In 1996, a former officer under Kountché and the then Chief of Staff, Ibrahim Baré Maïnassara, staged his own coup, placing the military again in power. During the Maïnassara regime, human rights abuses were reported by foreign NGOs, including the discovery of 150 dead bodies in a mass grave at Boultoungoure, thought to be Toubou rebels. In April 1999, the third coup led by Douada Mallam Wanké was staged leading to murder of President Baré by his own guards. To date, the authors this crime have been prosecuted.[32] Major Daouda Mallam Wanke, commander of the Niamey based military region and the head of the Republican Guard assumed power, but returned the nation to civilian rule within the year.[33] The military regime of Douada Mallam Wanké ended with the election of Mamadou Tandja in 1999 who deposed ten years later by another military coup, the fourth in the history of the country.
Cultural sponsorships[edit]
The Army, National Guard and the National Police sponsor semi-professional football clubs, ASFAN, AS-FNIS and AS Police, which play in the Niger Premier League.
The Armed Forces—which includes the National Gendarmerie—have undergone a series of structural changes aimed at professionalisation of the ranks and the retaining of more skilled recruits. Greater emphasis on recruiting officers and NCOs, lessening recruitment of lower ranks, and more training required between promotions have been instituted. Annual recruitment for the Army and the Gendarmerie now stands at one thousand each.[34]
Budget and foreign aid[edit]
Niger's defense budget is modest, accounting for about 1.6% of government expenditures. France provides the largest share of military assistance to Niger. The People's Republic of China also provide military assistance. Approximately 18 French military advisers are in Niger. Many Nigerien military personnel receive training in France, and the Nigerien Armed Forces are equipped mainly with materiel either given by or purchased in France. United States assistance has focused on training pilots and aviation support personnel, professional military education for staff officers, and initial specialty training for junior officers. A small foreign military assistance program was initiated in 1983 and a U.S. Defense Attaché office opened in June 1985. After being converted to a Security Assistance Office in 1987, it was subsequently closed in 1996, following a coup d'état. A U.S. Defense Attaché office reopened in July 2000.
Additionally, the US provided initial equipment training on vehicles and communications gear to a company of Nigerien soldiers as part of the Department of State Pan Sahel Initiative. Military to military cooperation continues via the Trans-Saharan Counter Terrorism Partnership and other initiatives. EUCOM contributes funds for humanitarian assistance construction throughout the country. In 2007, a congressional waiver was granted which allows the Niger military to participate in the International Military Education and Training (IMET) program, managed by the Defense Attaché Office. This program funded $170,000 in training in 2007.
1. ^ a b "Dossier Niger:: Les forces armées nigériennes (FAN)" in Frères d’armes n°241 (October 2003). Published online by the Ministère des Affaires étrangères (France), 2003: Removed from website. See citation at The library catalogue of the Centre de recherche de la gendarmerie nationale (France) (retrieved 2009-02-21)
2. ^ a b Au Conseil des ministres : le gouvernement adopte plusieurs projets de lois et des mesures nominatives. Government of Niger, 2011-06-11.
3. ^ a b Passation de Commandement à la Garde Présidentielle : le Lieutenant Colonel Tiani Abdourahamane prend le Commandement. Oumarou Moussa, Le Sahel (Niamey), 2011-04-19.
4. ^ IISS Military Balance 2012, pp446.
5. ^
7. ^ Forces Armées Nigériennes (FAN) : cérémonie de sortie de 25 stagiaires de la 6ème promotion Dan Kassaoua. Laouali Souleymane, le Sahel (Niamey) 2011-08-02
8. ^ F.A.n°250 : dossier ENVR Niger. Seminaire ENVR 2006, Point de Situation: Quand l'Histoire Nous Parle d'ENVR Localisation des ENVRs dans le Monde. Ministère des affaires étrangères et européennes, France (2008)
9. ^ U.S. Africa Command Flintlock Exercise. Yearly Flinklock Exercise in Niger in 2014 (last retrieved on July 7/26/2014)
10. ^ a b c d Army trade registry. Last accessed in July 2014
11. ^ Cooperation militaire Niger-US. Last accessed on july 15th, 2014.
12. ^ Military cooperation Niger Saudia Arabia
13. ^ a b c d e f g h i j k l m n o Defense Web - Africa leading defense portal. Last accessed in July 2014.
14. ^ a b c d Niger Land Forces military equipment and vehicles of Nigerien army. Last accessed July 19, 2014.
15. ^ a b Cinquantenaire de l'aviation militaire du Niger : un demi siècle de professionnalisme et d'excellence au service de la Nation. Zabeirou Moussa, Le Sahel (Niamey) 2011-08-02.
16. ^ Dossier Niger:La nouvelle armée de l'air, France Diplomatique, 2003.
17. ^ a b c d e f g World Military Intel. Last accessed July 2014
18. ^ [1] Gouvernance du secteur de la sécurité en Afrique de l’Ouest: les défis à relever – Le Niger
19. ^ [2] Etats de lieux de la formation des forces de defense et de securité sur le droit de l’enfant au Niger
20. ^ Contact information for The General Directorate of National Police
21. ^ Déplacement du Directeur au Niger, Ministère des Affaires étrangères (France). Framework partnership document France - Niger (2006-2010), Ministère des Affaires étrangères (France), 2006. Dossier Niger: Les forces armées nigériennes (FAN), Ministère des Affaires étrangères (France), 2003.
22. ^ for the Tchin-Tabaradene massacre and human rights abuse of the period in Niger, see a summary in Amnesty International's Niger: Impunity enshrined in the constitution. 8 September 1999. Bram Posthumus (see below) gives the number of civilians killed as a range between 650 and 1500.
23. ^ Initial text taken from November 2007 United States State Department report: Bureau of African Affairs, Background Note: Niger.
24. ^ Dossier Niger: Les forces armées nigériennes (FAN), Ministère des Affaires étrangères (France), 2003.
25. ^ The Rapid Intervention Forces of the African Union. The African Union is envisioning to create Rapid Intervention Forces at the continental or the regional levels (retrieved on 7/27/2014).
26. ^ Summit of Paris for the Security in Nigeria. Regional plan of action against Boko Haram by neighboring countries of Nigeria (retrieved on 7/27/2014).
27. ^ a b Niger - États-Unis : une coopération militaire soutenue (retrieved on July 26, 2014).
28. ^ Obama sends U.S. military to Niger (retrieved in 7/26/2014).
29. ^ Foreign military bases in Niger. Article by (retrieved on 7/26/2014).
30. ^ Operation Barkhane (retrieved on 7/27/2014).
31. ^ For a detailed account in english of the inner workings of the military regime, see Samuel Decalo (1990), pp.241–285.
32. ^ Niger: The people of Niger have the right to truth and justice, 6 April 2000, Amnesty International. President Mainassara: A profile, BBC, April 9, 1999.
33. ^ Niger: A copybook coup d'etat, April 9, 1999, BBC. Military controls Niger , April 10, 1999, BBC.
34. ^ Nigerien army, security officers get new status. APA. 2009-02-05
|
global_05_local_4_shard_00000656_processed.jsonl/55097
|
From Wikipedia, the free encyclopedia
Jump to: navigation, search
A nuclide (from nucleus) is an atomic species characterized by the specific constitution of its nucleus, i.e., by its number of protons Z, its number of neutrons N, and its nuclear energy state.[1]
The word nuclide was proposed [2] by doctor Truman P. Kohman [3] in 1947. Kohman originally suggested nuclide as referring to a "species of nucleus" defined by containing a certain number of neutrons and protons. The word thus was originally intended to focus on the nucleus.
Nuclides and isotopes[edit]
Designation Characteristics Example Remarks
Isotopes equal proton number 12
, 13
Isotones equal neutron number 13
, 14
Isobars equal mass number 17
, 17
, 17
see beta decay
Mirror nuclei neutron and proton
number exchanged
, 3
Nuclear isomers different energy states 99
, 99m
long-lived or stable
A set of nuclides with equal proton number (atomic number), i.e., of the same chemical element but different neutron numbers, are called isotopes of the element. Particular nuclides are still often loosely called "isotopes", but the term "nuclide" is the correct one in general (i.e., when Z is not fixed). In similar manner, a set of nuclides with equal mass number A but different atomic number are called isobars (isobar = equal in weight), and isotones are nuclides of equal neutron number but different proton numbers. The name isotone has been derived from the name isotope to emphasize that in the first group of nuclides it is the number of neutrons (n) that is constant, whereas in the second the number of protons (p).[4]
See Isotope#Notation for an explanation of the notation used for different nuclide or isotope types.
Nuclear isomers are members of a set of nuclides with equal proton number and equal mass number (thus making them by definition the same isotope), but different states of excitation. An example is the two states of the single isotope 99
shown among the decay schemes. Each of these two states (technetium-99m and technetium-99) qualifies as a different nuclide, illustrating one way that nuclides may differ from isotopes (an isotope may consist of several different nuclides of different excitation states).
The most long-lived non-ground state nuclear isomer is the nuclide tantalum-180m(180m
), which has a half-life in excess of 1,000 trillion years. This nuclide occurs primordially, and has never been observed to decay to the different nuclide tantalum-180. (Incidentally, the ground state nuclide tantalum-180 does not occur primordially, since it is unstable with a half life of only 8 hours.)
There are about 254 nuclides in nature that have never been observed to decay. They occur among the 80 different elements that have one or more stable isotopes. See stable isotope and primordial nuclide. Unstable nuclides are radioactive and are called radionuclides. Their decay products ('daughter' products) are called radiogenic nuclides. About 254 stable and about 85 unstable (radioactive) nuclides exist naturally on Earth, for a total of about 339 naturally occurring nuclides on Earth.[5]
Origins of naturally occurring nuclides[edit]
Natural radionuclides may be conveniently subdivided into three types.[citation needed] First, those whose half-lives T1/2 are at least 2% as long as the age of the Earth (for practical purposes, these are difficult to detect with half-lives less than 10% of the age of the Earth) (4.6×109 years). These are remnants of nucleosynthesis that occurred in stars before the formation of the solar system. For example, the isotope 238U (T1/2 = 4.5×109 years) of uranium is still fairly abundant in nature, but the shorter-lived isotope 235U (T1/2 = 0.7×109 years) is 138 times rarer. About 34 of these nuclides have been discovered (see list of nuclides and primordial nuclide for details).
The second group of radionuclides that exist naturally consists of radiogenic nuclides such as 226Ra (T1/2 = 1602 years), an isotope of radium, which are formed by radioactive decay. They occur in the decay chains of primordial isotopes of uranium or thorium. Some of these nuclides are very short-lived, such as isotopes of francium. There exist about 51 of these daughter nuclides that have half-lives too short to be primordial, and which exist in nature solely due to decay from longer lived radioactive primordial nuclides.
The third group consists of nuclides that are continuously being made in another fashion that is not simple spontaneous radioactive decay (i.e., only one atom involved with no incoming particle) but instead involves a natural nuclear reaction. These occur when atoms react with natural neutrons (from cosmic rays, spontaneous fission, or other sources), or are bombarded directly with cosmic rays. The latter, if non-primordial, are called cosmogenic nuclides. Other types of natural nuclear reactions produce nuclides that are said to be nucleogenic nuclides.
An example of nuclides made by nuclear reactions, are cosmogenic 14C (radiocarbon) that is made by cosmic-ray bombardment of other elements, and nucleogenic 239Pu which is still being created by neutron bombardment of natural 238U as a result of natural fission in uranium ores. Cosmogenic nuclides may be either stable or radioactive. If they are stable, their existence must be deduced against a background of stable nuclides, since every known stable nuclide is present on Earth primordially
Artificially produced nuclides[edit]
Beyond the 339 naturally-occurring nuclides, more than 3000 radionuclides of varying half-lives have been artificially produced and characterized.
The known nuclides are shown in the chart of nuclides. A list of primordial nuclides is given sorted by element, at list of elements by stability of isotopes. A list of nuclides is also available, sorted by half-life, for the 905 nuclides with half-lives longer than one hour.
Summary table for numbers of each class of nuclides[edit]
This is a summary table [6] for the 905 nuclides with half-lives longer than one hour, given in list of nuclides. Note that numbers are not exact, and may change slightly in the future, if some "stable" nuclides are observed to be radioactive with very long half-lives.
Stability class Number of nuclides Running total Notes on running total
Theoretically stable to all but proton decay 90 90 Includes first 40 elements. Proton decay yet to be observed.
Energetically unstable to one or more known decay modes, but no decay yet seen. Spontaneous fission possible for "stable" nuclides ≥ niobium-93; other mechanisms possible for heavier nuclides. All considered "stable" until decay detected. 164 254 Total of classically stable nuclides.
Radioactive primordial nuclides. 34 288 Total primordial elements include bismuth, uranium, thorium, plutonium, plus all stable nuclides.
Radioactive non-primordial, but naturally occurring on Earth. ~ 51 ~ 340 Carbon-14 (and other cosmogenic isotopes generated by cosmic rays); daughters of radioactive primordials, such as francium, etc., and nucleogenic nuclides from natural nuclear reactions that are other than those from cosmic rays (such as neutron absorption from spontaneous nuclear fission or neutron emission).
Radioactive synthetic (half-life > 1 hour). Includes most useful radiotracers. 556 905
Radioactive synthetic (half-life < 1 hour). >2400 >3300 Includes all well-characterized synthetic nuclides.
Nuclear properties and stability[edit]
Stability of nuclides by (Z,N):
Black – stable (all are primordial)
Red – primordial radioactive
Other – radioactive, with decreasing stability from orange to white
See also: Stable nuclide
Atomic nuclei consist of protons and neutrons bound together by the residual strong force. Because protons are positively charged, they repel each other. Neutrons, which are electrically neutral, stabilize the nucleus in two ways. Their copresence pushes protons slightly apart, reducing the electrostatic repulsion between the protons, and they exert the attractive nuclear force on each other and on protons. For this reason, one or more neutrons are necessary for two or more protons to be bound into a nucleus. As the number of protons increases, so does the ratio of neutrons to protons necessary to ensure a stable nucleus (see graph at right). For example, although the neutron:proton ratio of 3
is 1:2, the neutron:proton ratio of 238
is greater than 3:2. A number of lighter elements have stable nuclides with the ratio 1:1 (Z = N). The nuclide 40
(calcium-40) is the observationally the heaviest stable nuclide with the same number of neutrons and protons; (theoretically, the heaviest stable one is sulfur-32). All stable nuclides heavier than calcium-40 contain more neutrons than protons.
Even and odd nucleon numbers[edit]
Even/odd Z, N, and A
A Even Odd Total
Z,N EE OO EO OE
Stable 148 5 53 48 254
153 101
Long-lived 22 4 5 35
26 9
All primordial 170 9 57 53 289
179 110
The proton:neutron ratio is not the only factor affecting nuclear stability. It depends also on evenness or oddness of its atomic number Z, neutron number N and, consequently, of their sum, the mass number A. Oddness of both Z and N tends to lower the nuclear binding energy, making odd nuclei, generally, less stable. This remarkable difference of nuclear binding energy between neighbouring nuclei, especially of odd-A isobars, has important consequences: unstable isotopes with a nonoptimal number of neutrons or protons decay by beta decay (including positron decay), electron capture or other exotic means, such as spontaneous fission and cluster decay.
The majority of stable nuclides are even-proton-even-neutron, where all numbers Z, N, and A are even. The odd-A stable nuclides are divided (roughly evenly) into odd-proton-even-neutron, and even-proton-odd-neutron nuclides. Odd-proton-odd-neutron nuclides (and nuclei) are the least common.
See also[edit]
1. ^ IUPAC (1997). "Nuclide". In A. D. McNaught and A. Wilkinson. Compendium of Chemical Terminology. Blackwell Scientific Publications. doi:10.1351/goldbook.N04257. ISBN 0-632-01765-1.
2. ^ original proposal for the word nuclide
3. ^ Biographical material about Dr. Kohman
4. ^ E.R. Cohen, P. Giacomo (1987). "Symbols, units, nomenclature and fundamental constants in physics". Physica A 146: 1–68. Bibcode:1987PhyA..146....1.. doi:10.1016/0378-4371(87)90216-0.
5. ^ [1] (This source gives 339 naturally occurring nuclides, but names 269 of them as stable, rather than 254 listed in stable nuclide See also list of nuclides for nearly-stable nuclides. Disagreements in these numbers are in part due to certain very long-lived radioisotopes such as bismuth-209 that, when found, move known primordial nuclides from the category of stable nuclide to radioactive primordial nuclide categories, but do not change the total sum of naturally occurring nuclides. An expanded list of 339 nuclides found naturally on Earth would includes nuclides like radium and carbon-14 which are found on Earth as products of radioactive decay chains and natural process like cosmic radiation, but which are not primordial radionuclides. The latter are more easily counted, and number about 34 over the number of stable primordial nuclides, for a total of 288 primordially occurring nuclides.
6. ^ Table data is derived by counting members of the list; see WP:CALC. References for the list data itself are given below in the reference section in list of nuclides
External links[edit]
|
global_05_local_4_shard_00000656_processed.jsonl/55098
|
From Wikipedia, the free encyclopedia
Jump to: navigation, search
For Pet Shop Boys single, see Paninaro (song).
A fast food hamburger in a bun, the type of food served at the Panino cafè
Paninaro (Italian pronunciation: [paniˈnaːro]; feminine: Paninara; plural: Paninari; feminine plural: Paninare) was a youth scene that took its name from a group of youngsters that would meet at the Panino cafè (Panino in Italian means Sandwich)[1][2] in Milan, Italy in the early 1980s. The group's meeting place later moved to Piazza San Babila, where Burghy, a now-defunct Italian fast food chain, had just opened its first restaurant; it then became a full-fledged subculture, which spread across Milan and other Italian cities. The name of the social group underlines the fact that its members welcomed a consumeristic globalised way of life; the fast-food sandwich is a symbol of this, as opposed to traditional national slow food heritage.[1][2]
This epithet came to identify wealthy youngsters who distinguished themselves by their designer clothes. Hence the movement became known for its twin obsessions with fashion, contrasting sharply with the politically idealistic and anti-consumerist generations of the 1960s and 1970s.
The Paninaro scene developed in tandem with the consumerism of the 1980s, fostered by the expansion of a less regulated market through Reaganomics and Thatcherism and was eagerly embraced by the children of middle-class and upper-class professionals. It was also more welcoming of an internationally emergent gay subculture, foreshadowing the growing acceptance of gays in the following decades.[citation needed]
The Paninaro was also reinforced by the diffusion in Italy of Berlusconi's television channels, which transmitted messages of consumerism and fostered a creative self-affirmation among youth through the acquisition of status symbols in parallel with other urban creative identities among youth of widely different character, such as punk or new wave. Among TV outlets, Italia 1 was explicitly aimed at a younger target, broadcasting US movies, cartoons, and comedies, which had unparalleled popularity in the 10 through 25 year age range.
The original cornerstones of Paninaro fashion were Timberland boots, Levi's 501 jeans, and the Alpha Industries MA-1 flying jacket, which they called "Bomber". Later, they added Sebago deck shoes or Vans, Burlington socks, Armani jeans, Americanino or Rifle corduroy pants, all hemmed to ankle height, El Charro belts with Texan or western-style big buckles, By American and Best Company sweatshirts, Schott flyer's leather jackets, Moncler down jackets, and brightly colored Invicta rucksacks. Designer Olmes Carretti collaborated with the British sailing brand Henri Lloyd to further develop their iconic "Consort" sailing jacket so favored by the Paninari.
The motorcycle of choice was the Zundapp KS125. In Rome, paninari preferred the Laverda 125, which was powered by a Zundapp engine. Other motorcycle used in later years were the Honda XL600R, Yamaha XT600, Suzuki DR600 and Yamaha Tenere'.
Popular fashion accessories were Vuarnet sunglasses, Naj-Oleari fabrics, and CP Company clothing.
In the early 1980s, there was a number of periodicals dedicated to this trend, the most popular being "Paninaro", then "Preppy," and then "Wild Boys" (from one of Paninaros' favourite songs Duran Duran's "Wild Boys"), filled with theme-comics, advertising, some fashion articles and letters from readers.
In their heyday, Paninari were lampooned in the Italia 1 comedy show Drive-in by Enzo Braschi, who played a character depicting the shallowness of the subculture and its vulnerability to newer trends and fads of the 1980s (New Romantic, Dark-Goth, Rambo-like, and so on).
The Paninaro movement was also diffused in some European countries, inspiring the 1986 cult song "Paninaro" by Pet Shop Boys. Others favorite songs of Paninari were "Wild Boys by Duran Duran, "It's a sin" by Pet Shop Boys, "samurai" by Michael Cretu, "The Edge of Heaven" by Wham!, and "C'mon c'mon" by Bronski Beat.
See also[edit]
1. ^ a b Zingarelli Nicola, (2008), Dizionario della Lingua Italiana, Zanichelli.
2. ^ a b Devoto Giacomo, Oli Gian Carlo, (2010), Il Devoto-Oli. Vocabolario della Lingua Italiana, edited by Luca Serianni and Maurizio Trifone, Le Monnier.
External links[edit]
|
global_05_local_4_shard_00000656_processed.jsonl/55099
|
Resettlement of the Jews in England
From Wikipedia, the free encyclopedia
Jump to: navigation, search
The resettlement of the Jews in England was a historic commercial policy dealing with Jews in England in the 17th century, and forms a prominent part of the history of the Jews in England.
Oliver Cromwell[edit]
Menasseh Ben Israel's petition[edit]
Debating the return of the Jews[edit]
This method of finding a solution to the Jewish question in England had the advantage of not raising anti-Semitic feeling too strongly; and it likewise enabled Charles II, on his return, to avoid taking any action on the petition of the merchants of London asking him to revoke Cromwell's concession. He had been assisted by several Jews of royalist sympathies, such as Mendes da Costa and Augustine Coronel-Chacon, during his exile. In 1664 a further attempt was made by the Earl of Berkshire and Mr Ricaut to bring about the expulsion of the Jews, but the King-in-Council assured the latter of the continuance of former favour. Similar appeals to prejudice were made in 1673, when Jews, for meeting in Duke's Place for a religious service, were indicted on a charge of rioting, and in 1685, when thirty-seven were arrested on the Royal Exchange; but the proceedings in both cases were put a stop to by direction of the Privy Council. The status of the Jews was still very indeterminate. In 1684, it was contended by the East India Company that they were alien infidels, and perpetual enemies to the English crown. Even the Attorney-General declared that they resided in England only under an implied licence. As a matter of fact, the majority of them were still aliens and liable to all the disabilities that condition carried with it.
Help from and to Jews abroad[edit]
William III is reported to have been assisted in his ascent to the English throne by a loan of 2,000,000 guilders from Antonio Lopez Suasso and later Baron Avernes de Gras. William did not interfere when in 1689 some of the chief Jewish merchants of London were forced to pay the duty levied on the goods of aliens, but he refused a petition from Jamaica to expel the Jews. William's reign brought about a closer connection between the predominantly Sephardic communities of London and Amsterdam; this aided in the transfer of the European finance centre from the Dutch capital to the English capital. Over this time a small German Ashkanazi community had arrived and established their own synagogue in 1692, but they were of little mercantile consequence, and did not figure in the relations between the established Jewish community and the government.
Early in the eighteenth century the Jewish community of London comprised representatives of the chief Jewish financiers in northern Europe; these included the Mendez da Costa, Abudiente, Salvador, Lopez, Fonseca, and Seixas families. The utility of these prominent Jewish merchants and financiers was widely recognised. Marlborough in particular made great use of the services of Sir Solomon de Medina, and indeed was publicly charged with taking an annual subvention from him. The early merchants of the resettlement are estimated to have brought with them a capital of £1,500,000 into the country; this amount is estimated to have increased to £5,000,000 by the middle of the 18th century.
As early as 1723 an act of Parliament allowed Jews holding land to omit the words "on the true faith of a Christian", when registering their title.[2] Only once more would this allowance be made[3] in the passage of the Plantation Act 1740, but more significantly the act allowed Jews who had or would resided in British America for seven years to become naturalised British citizens.
See also[edit]
1. ^ Samuel, Edgar. "Robles, Antonio Rodrigues". Oxford Dictionary of National Biography (online ed.). Oxford University Press. doi:10.1093/ref:odnb/71429. (Subscription or UK public library membership required.)
2. ^ Cecil Roth, A History Of The Jews In England (1941), accessible here "An Act of 1722, which added to Roman Catholic disabilities by enforcing the Oath of Abjuration on all landowners, was followed the next year by a further measure (to George I, cap. 4) exempting Jews from the necessity of including in it the words 'on the true faith of a Christian';"
3. ^ Henriques, H. S. Q. (Jan 1907). "The Political Rights of English Jew". The Jewish Quarterly Review (University of Pennsylvania Press) 19 (2): 298–341. Retrieved 27 March 2014.
Further reading[edit]
External links[edit]
|
global_05_local_4_shard_00000656_processed.jsonl/55100
|
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Emblem of the Imperial Sardaukar from Emperor: Battle for Dune (2001)
The Sardaukar /ˈsɑrdəkɑr/[1] are a fictional fanatical army from Frank Herbert's Dune universe, primarily featured in the 1965 science fiction novel Dune, as well as Brian Herbert and Kevin J. Anderson's Prelude to Dune prequel trilogy (1999–2001).
The Imperial Sardaukar are soldier-fanatics loyal to the Padishah Emperors of House Corrino, who rule the Known Universe (the Imperium) for over 10,000 years until the events of the first novel in the series, Dune.[2][3][4] The key to House Corrino's hold on the Imperial throne, the Sardaukar troops are the foremost soldiers in the universe and are feared by all. They are secretly trained on the inhospitable Imperial Prison Planet of Salusa Secundus: the harsh conditions there ensure that only the strongest and most "ferocious" men survive.[2][5] Sardaukar training emphasizes ruthlessness, near-suicidal disregard for personal safety, and the use of cruelty as a standard weapon in order to weaken opponents with terror.[2] In Dune, a Sardaukar Colonel sneers at Dr. Yueh's mere mention of the word "pity".[2] Dune describes the elite fighters as living a life almost "as exalted as that of any member of a Great House."[2] Their uniforms are described as gray with silver and gold trim.[2]
As Dune begins, the 81st Padishah Emperor Shaddam Corrino IV has put Duke Leto Atreides in control of the desert planet Arrakis, known as Dune, which is the only natural source of the all-important spice melange, the most valuable commodity in the known universe. Leto is aware that Shaddam, threatened by the rising power and influence of House Atreides, has sent him into a trap; failure to meet or exceed the production volume of their predecessors, the vicious House Harkonnen, will negatively affect the financial and political position of the Atreides. Further, the very presence of the Atreides on Arrakis inflames the 10,000-year-old feud between Houses Atreides and Harkonnen. A subsequent surprise attack on the Atreides by Harkonnen troops — bolstered by two legions of Sardaukar in Harkonnen colors – and made possible by a traitor on the inside results in the obliteration of the Atreides forces, and the death of Leto. His concubine Lady Jessica and son Paul escape and find refuge with the native Fremen of Arrakis, a fierce people with secretly large numbers and fighting skills rivaling the Sardaukar. The Fremen prove capable of holding their own against the Sardaukar, and are even able to defeat and capture the "undefeatable" Emperor's soldiers. Paul's training in the Bene Gesserit weirding way and galvanization of their rebellion under his command makes the newly-allied Fremen forces unstoppable.[2]
Using the Bene Gesserit compulsion technique called the Voice, Paul himself manages to compel the Sardaukar Captain Aramsham to humiliate himself by surrendering. However, Aramsham's Sardaukar stoicism is so great that he will not even give his name until Paul uses the Voice again. Aramsham, the epitome of a loyal soldier, finally submits to his sworn enemy, symbolically sealing the doom of the old Corrino order. When, following the Battle of Arrakeen, Paul tells a captured Sardaukar officer (of the "blond, chisel-featured caste" said to be "synonymous with rank" in the Sardaukar) to bring a message to the Emperor, he at first stoically ignores Paul; only Paul's warning that "your Emperor may die" causes the captured officer to agree to take the message. The defeat of the Sardaukar and Paul's stranglehold on the spice supply allows him to depose Shaddam, marry his eldest daughter Princess Irulan, and ascend the throne. Paul indicates that he would order the restoration of the ecology of Salusa Secundus as part of his plan to exile Shaddam and his family to the devastated world.[2]
Dune Messiah[edit]
The Sardaukar do not appear in Dune Messiah (1969), but it is noted that Shaddam retains a single legion of them, ostensibly as a "police force," in his exile on Salusa Secundus. Paul's concubine Chani later recognizes Sardaukar spies hidden among a visiting Spacing Guild entourage, and they are killed. It is also revealed that a "wise Sardaukar commander" had retrieved the corpse of slain Atreides Swordmaster Duncan Idaho, which had been entrusted to the Tleilaxu and used to create a ghola duplicate.[6]
Children of Dune[edit]
During the events of Children of Dune (1976), Princess Wensicia, younger daughter of Shaddam IV, initiates a plot for her family and the Sardaukar to return to power. By this time, Paul has allowed the Corrinos to retain only a relatively small Sardaukar force. He has improved conditions on Salusa under the guise of making the planet more hospitable for the exiled Corrinos, but with the intent to render it an ineffective training ground for more soldiers. Seeing this motive, Wensicia's son Farad'n has tried to maintain the strict discipline which keeps the Sardaukar at their best. However, Wensicia's efforts fail, Farad'n voluntarily surrenders the army to the new Emperor, Paul's son Leto Atreides II.[7]
God Emperor of Dune[edit]
The text of God Emperor of Dune notes that during the 3,500-year reign of Leto II after the events of Children of Dune, one of Leto II's many gholas (clones) of Duncan Idaho had led the remnants of the Sardaukar in an unsuccessful revolt. This revolt, the Sardaukar's original defeat on Arrakis, and the general decline of the Sardaukar organization had all finally resulted in Leto II's abolishment of the Sardaukar corps. Their replacements are the all-female Fish Speakers, Leto II's personal army, who had Sardaukar blood in their veins. Leto believes that male-dominated military organizations were essentially predatory and would turn on the civilian population in the absence of an external enemy, and had "a strong tendency toward homosexual activities."[8]
The Dune Encyclopedia[edit]
The Dune Encyclopedia (1984), written by Dr. Willis E. McNelly to accompany the Dune books, was authorized by Frank Herbert but somewhat contradicted by him in subsequent works and declared non-canon by his estate.[9] The Encyclopedia's two articles on the Sardaukar note that the Sardaukar battle flag is plain black, and that those who became Sardaukar had once been members of a warlike ethnic group on Salusa Secundus called the Sardau. Another article on an "Aramsham, Otto" mentions that after the fall of the Corrino dynasty, the captain writes books hearkening back to the glory days of the Sardaukar. One is called The Sardaukar Strike! and another is called Sardaukar Victorious; the article goes on to say that he ended his life by suicide, unable to adjust to new realities.[10]
Dune games[edit]
In the Dune board game published by Avalon Hill in 1979, the player in control of the Emperor faction had access to several special tokens that were designated as Sardaukar by being imprinted with stars. These tokens could be used to gain an advantage in battle.
The Sardaukar appeared in the Dune RTS games. In Dune II (1992) and Dune 2000 (1998) they served as House Corrino's infantry in the single player campaigns, although in Dune 2000 they could also be trained by a Harkonnen player in a multiplayer game. In Emperor: Battle for Dune they are one of the five sub-factions.
2. ^ a b c d e f g h Herbert, Frank (1965). Dune.
3. ^ Herbert, Frank (1965). "Terminology of the Imperium: CORRIN, BATTLE OF". Dune. "...the space battle from which the Imperial House Corrino took its name. The battle fought near Sigma Draconis in the year 88 B.G. settled the ascendancy of the ruling House from Salusa Secundus."
6. ^ Herbert, Frank (1969). Dune Messiah.
7. ^ Herbert, Frank (1976). Children of Dune.
8. ^ Herbert, Frank (1981). God Emperor of Dune.
9. ^ Herbert, Brian; Kevin J. Anderson, Dr. Willis McNelly. "Frequently Asked Questions". Archived from the original on June 15, 2008. Retrieved November 11, 2008.
10. ^ McNelly, Willis E. (June 1, 1984). The Dune Encyclopedia. ISBN 0-425-06813-7.
|
global_05_local_4_shard_00000656_processed.jsonl/55101
|
September Morn
From Wikipedia, the free encyclopedia
Jump to: navigation, search
For the album by Neil Diamond, see September Morn (album). For the upcoming film, see September Morn (film).
September Morn by Paul Chabas, 1910–1912, oil on canvas, Metropolitan Museum of Art, New York
Matinée de Septembre (or September Morn) is a painting by the French artist Paul Émile Chabas (1869–1937). Painted over three summers ending in 1912, it became famous when it provoked a scandal in the USA.
Chabas first exhibited the painting in the Paris Salon of 1912, where it won a medal but did not create any sensation. The next year, when it was displayed in a window of an art gallery in Chicago, Illinois (USA), it came to the attention of the mayor of the city, Carter Harrison, Jr., who charged the owner of the gallery with indecency. The resulting court case, which the art dealer won, made the painting famous.
Two months after the conclusion of the Chicago trial, Anthony Comstock (1844–1915), a self-appointed crusader against "vice", threatened a New York City art dealer who was displaying the painting in his window. However, Comstock never followed up this threat with legal action.[1]
The public relations pioneer Harry Reichenbach claimed to have brought it to Comstock's attention as a contract job for the targeted gallery. However, Reichenbach's claim has been questioned.[2]
Lithograph copies of the artwork were popularly sold for over a decade, extending the success that followed the scandal.
Ultimately, the painting would be labelled as kitsch by critics who thought it lacking in interesting artistic features: contrast, coordinated lines, and a worthy subject. It has never lacked admirers, however, and copies of the image are still sold on postcards and reproduced prints.
The original painting is in the Metropolitan Museum of Art in New York City.
1. ^ Kendrick 1996, p. 147.
2. ^ Museum of Hoaxes: September Morn
• Kendrick, Walter M. (1996). The Secret Museum: Pornography in Modern Culture. University of California Press. ISBN 0-520-20729-7
External links[edit]
|
global_05_local_4_shard_00000656_processed.jsonl/55103
|
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Kingdom of Urartu
Արարատյան Թագավորություն
860 BC–590 BC
Urartu, 9th–6th centuries BC.
Capital Arzashkun
Tushpa (after 832 BC)
Languages Urartian
Religion Polytheism
Government Monarchy
- 858-844 Arame
- 844-828 Sarduri I
- 828-810 Ishpuini
- 810-785 Menuas
- 785-753 Argishti I
- 753-735 Sarduri II
Historical era Iron Age, Prehistoric
- Established 860 BC
- Disestablished 590 BC
Urartu (Armenian: Ուրարտու - Urartu, Assyrian: māt Urarṭu;[3] Babylonian: Urashtu), corresponding to the biblical Kingdom of Ararat (Armenian: Արարատյան Թագավորություն) or Kingdom of Van (Armenian: Վանի Թագավորություն, Urartian: Biai, Biainili;[4]) was an Iron Age kingdom centred around Lake Van in the Armenian Highlands.
Strictly speaking, Urartu is the Assyrian term for a geographical region, while "kingdom of Urartu" or "Biainili lands" are terms used in modern historiography for the Proto-Armenian[5][6][7][8][9] (Hurro-Urartian) speaking Iron Age state that arose in that region. That a distinction should be made between the geographical and the political entity was already pointed out by König (1955).[10] The landscape corresponds to the mountainous plateau between Asia Minor, Mesopotamia, and the Caucasus mountains, later known as the Armenian Highlands. The kingdom rose to power in the mid-9th century BC, but was conquered by Media in the early 6th century BC. The heirs of Urartu are the Armenians and their successive kingdoms.[11][12][13][7]
The name Urartu comes from Assyrian sources: the Assyrian King Shalmaneser I (1263–1234 BC) recorded a campaign in which he subdued the entire territory of "Uruatri."[14][15] The Shalmaneser text uses the name Urartu to refer to a geographical region, not a kingdom, and names eight "lands" contained within Urartu (which at the time of the campaign were still disunited). "Urartu" is cognate with the Biblical "Ararat," Akkadian "Urashtu," and Armenian "Ayrarat." The name used by the local population as a toponym was Biainili (or Biaineli), which forms the root of the Armenian Վան ("Van"),[16] hence the names "Kingdom of Van (Bianili)" or "Vannic Kingdom."
Scholars such as Carl Friedrich Lehmann-Haupt (1910) believed that the people of Urartu called themselves Khaldini after their god Khaldi.[17] Boris Piotrovsky wrote that "the Urartians first appear in history in the 13th century B.C. as a league of tribes or countries which did not yet constitute a unitary state. In the Assyrian annals the term Uruatri (Urartu) as a name for this league was superseded during a considerable period of years by the term "land of Nairi"".[18] Scholars[19] believe that Urartu is an Akkadian variation of Ararat of the Old Testament. Indeed, Mount Ararat is located in ancient Urartian territory, approximately 120 km north of its former capital. In addition to referring to the famous Biblical mountain, Ararat also appears as the name of a kingdom in Jeremiah 51:27, mentioned together with Minni and Ashkenaz.
In the early 6th century BC, the Urartian Kingdom was replaced by the Armenian Orontid dynasty. In the trilingual Behistun inscription, carved in 521 or 520 BC[20] by the order of Darius the Great of Persia, the country referred to as Urartu in Assyrian is called Arminiya in Old Persian and Harminuia in Elamite.
Shubria was part of the Urartu confederation. Later, there is reference to a district in the area called Arme or Urme, which some scholars have linked to the name Armenia.[21][22]
Urartu 715-713 BC
Urartu comprised an area of approximately 200,000 square miles (520,000 km2), extending from the river Kura in the north, to the northern foothills of the Taurus Mountains in the south; and from the Euphrates in the west to the Caspian sea in the east.[23]
At its apogee, Urartu stretched from the borders of northern Mesopotamia to the southern Caucasus, including present-day Armenia and southern Georgia as far as the river Kura. Archaeological sites within its boundaries include Altintepe, Toprakkale, Patnos and Cavustepe. Urartu fortresses included Erebuni (present day Yerevan city), Van Fortress, Argishtihinili, Anzaf, Cavustepe and Başkale, as well as Teishebaini (Karmir Blur, Red Mound) and others.
A Urartian cauldron, from the Museum of Anatolian Civilizations, Ankara
Head of a Bull, Urartu, 8th century BC. This head was attached to the rim of an enormous cauldron similar to the one shown above. Walters Art Museum collections.
Inspired by the writings of the medieval Armenian historian Movses Khorenatsi (who had described Urartian works in Van and attributed them to the legendary Ara the Beautiful and queen Semiramis), the French scholar Jean Saint-Martin suggested that his government send Friedrich Eduard Schulz, a German professor, to the Van area in 1827 on behalf of the French Oriental Society.[24] Schulz discovered and copied numerous cuneiform inscriptions, partly in Assyrian and partly in a hitherto unknown language. Schulz also re-discovered the Kelishin stele, bearing an Assyrian-Urartian bilingual inscription, located on the Kelishin pass on the current Iraqi-Iranian border. A summary account of his initial discoveries was published in 1828. Schulz and four of his servants were murdered by Kurds in 1829 near Başkale. His notes were later recovered and published in Paris in 1840. In 1828, the British Assyriologist Henry Creswicke Rawlinson had attempted to copy the inscription on the Kelishin stele, but failed because of the ice on the stele's front side. The German scholar R. Rosch made a similar attempt a few years later, but he and his party were attacked and killed.
In the late 1840s Sir Austen Henry Layard examined and described the Urartian rock-cut tombs of Van Castle, including the Argishti chamber. From the 1870s, local residents began to plunder the Toprakkale ruins, selling its artefacts to European collections. In the 1880s this site underwent a poorly executed excavation organised by Hormuzd Rassam on behalf of the British Museum. Almost nothing was properly documented.
The first systematic collection of Urartian inscriptions, and thus the beginning of Urartology as a specialized field dates to the 1870s, with the campaign of Sir Archibald Henry Sayce. The German engineer Karl Sester, discoverer of Mount Nemrut, collected more inscriptions in 1890/1. Waldemar Belck visited the area in 1891, discovering the Rusa stele. A further expedition planned for 1893 was prevented by Turkish-Armenian hostilities. Belck together with Lehmann-Haupt visited the area again in 1898/9, excavating Toprakkale. On this expedition, Belck reached the Kelishin stele, but he was attacked by Kurds and barely escaped with his life. Belck and Lehmann-Haupt reached the stele again in a second attempt, but were again prevented from copying the inscription by weather conditions. After another assault on Belck provoked the diplomatic intervention of Wilhelm II, Sultan Abdul Hamid II, agreed to pay Belck a sum of 80,000 gold marks in reparation. During World War I, the Lake Van region briefly fell under Russian control. In 1916, the Russian scholars Nikolay Yakovlevich Marr and Iosif Abgarovich Orbeli, excavating at the Van fortress, uncovered a four-faced stele carrying the annals of Sarduri II. In 1939 Boris Borisovich Piotrovsky excavated Karmir-Blur, discovering Teišebai, the city of the god of war, Teišeba. In 1938–40, excavations by the American scholars Kirsopp and Silva Lake were cut short by World War II, and most of their finds and field records were lost when a German submarine torpedoed their ship, the SS Athenia. Their surviving documents were published by Manfred Korfmann in 1977.
A new phase of excavations began after the war. Excavations were at first restricted to Soviet Armenia. The fortress of Karmir Blur, dating from the reign of Rusa II, was excavated by a team headed by Boris Piotrovsky, and for the first time the excavators of an Urartian site published their findings systematically. Beginning in 1956 Charles Burney identified and sketch-surveyed many Urartian sites in the Lake Van area and, from 1959, a Turkish expedition under Tahsin Özgüç excavated Altintepe and Arif Erzen.
In the late-1960s, Urartian sites in northwest Iran were excavated. In 1976, an Italian team led by Mirjo Salvini finally reached the Kelishin stele, accompanied by a heavy military escort. The Gulf War then closed these sites to archaeological research. Oktay Belli resumed excavation of Urartian sites on Turkish territory: in 1989 Ayanis, a 7th-century BC fortress built by Rusas II of Urartu, was discovered 35 km north of Van. In spite of excavations, only a third to a half of the 300 known Urartian sites in Turkey, Iran, Iraq, and Armenia have been examined by archaeologists (Wartke 1993). Without protection, many sites have been plundered by local residents searching for treasure and other saleable antiquities.
Urartu under Aramu 860-40 BC
Assyrian inscriptions of Shalmaneser I (c. 1274 BC) first mention Uruartri as one of the states of Nairi – a loose confederation of small kingdoms and tribal states in Armenian Highland in the 13th to 11th centuries BC which he conquered. Uruartri itself was in the region around Lake Van. The Nairi states were repeatedly subjected to further attacks and invasions by the Assyrians, especially under Tukulti-Ninurta I (c. 1240 BC), Tiglath-Pileser I (c. 1100 BC), Ashur-bel-kala (c. 1070 BC), Adad-nirari II (c. 900), Tukulti-Ninurta II (c. 890), and Ashurnasirpal II (883–859 BC).
Urartu re-emerged in Assyrian inscriptions in the 9th century BC as a powerful northern rival of Assyria. The Nairi states and tribes became a unified kingdom under king Aramu (c. 860 – 843 BC), whose capital at Arzashkun was captured by the Assyrians under Shalmaneser III. Roughly contemporaries of the Uruartri, living just to the west along the southern shore of the Black Sea, were the Kaskas known from Hittite sources.
Fragment of a bronze helmet from Argishti I's era. The "tree of life", popular among the ancient societies, is depicted. The helmet was discovered during the excavations of the fortress Of Teyshebaini on Karmir-Blur (Red Hill).
The temporary eclipse of Assyria in the first half of the 8th century BC, had helped Urartu's growth, as it became the largest and most powerful state in the Near East, all this was done in little time.[25]
Sarduri I (c. 832 – 820 BC), son of king Aramu, successfully resisted the Assyrian attacks from the south, led by Shalmaneser III, consolidated the military power of the state and moved the capital to Tushpa (modern Van, on the shore of Lake Van). His son, Ispuini (c. 820 – 800 BC) annexed the neighbouring state of Musasir and made his son Sarduri II viceroy; Musasir later became an important religious center of the Urartian Kingdom. Ispuini was in turn attacked by Shamshi-Adad V. His successor Menua (c. 800 – 785 BC) also enlarged the kingdom greatly and left inscriptions over a wide area. Urartu reached highest point of its military might under Menua's son Argishti I (c. 785 – 760 BC), becoming one of the most powerful kingdoms of ancient Near East. Argishti I added more territories along the Araxes river and Lake Sevan, and frustrated Shalmaneser IV's campaigns against him. Argishti also founded several new cities, most notably Erebuni in 782 BC. 6600 captured slaves worked on the construction of the new city.[citation needed]
At its height, the Urartu kingdom may have stretched North beyond the Aras River (Greek Araxes) and Lake Sevan, encompassing present-day Armenia and even the southern part of Georgia (e.g. Qulha) almost to the shores of the Black Sea; west to the sources of the Euphrates; east to present-day Tabriz, Lake Urmia, and beyond; and south to the sources of the Tigris.
Tiglath Pileser III of Assyria conquered Urartu in the first year of his reign (745 BC). There the Assyrians found horsemen and horses, tamed as colts for riding, that were unequalled in the south, where they were harnessed to Assyrian war-chariots.[26]
Decline and recuperation[edit]
In 714 BC, the Urartu kingdom suffered heavily from Cimmerian raids and the campaigns of Sargon II. The main temple at Mushashir was sacked, and the Urartian king Rusa I was crushingly defeated by Sargon II at Lake Urmia. He subsequently committed suicide in shame. [27]
Rusa's son Argishti II (714 – 685 BC) restored Urartu's position against the Cimmerians, however it was no longer a threat to Assyria and peace was made with the new king of Assyria Sennacherib in 705 BC. This in turn helped Urartu enter a long period of development and prosperity, which continued through the reign of Argishti's son Rusa II (685–645 BC).
After Rusa II, however, the Urartu grew weaker under constant attacks from Cimmerian and Scythian invaders. As a result it became dependent on Assyria, as evidenced by Rusa II's son Sardur III (645–635 BC) referring to the Assyrian king Ashurbanipal as his "father." [28][29]
According to Urartian epigraphy, Sarduri III was followed by three kings—Erimena (635–620 BC), his son Rusa III (620–609 BC), and the latter's son Rusa IV (609–590 or 585 BC). Late during the 600s BC (during or after Sardur III's reign), Urartu was invaded by Scythians and their allies—the Medes. In 612 BC, the Median king Cyaxares the Great together with Nabopolassar of Babylon and the Scythians conquered Assyria after it had been badly weakened by civil war. Many Urartian ruins of the period show evidence of destruction by fire. This would indicate two scenarios—either Media subsequently conquered Urartu, bringing about its subsequent demise, or Urartu maintained its independence and power, going through a mere dynastic change, as a local Armenian dynasty (later to be called the Orontids) overthrew the ruling family with the help of the Median army. Ancient sources support the latter version: Xenophon, for example, states that Armenia, ruled by an Orontid king, was not conquered until the reign of Median king Astyages (585– 550 BC) – long after Median invasion of the late 7th century BC.[30] Similarly, Strabo (1st century BC – 1st century AD) wrote that "[i]n ancient times Greater Armenia ruled the whole of Asia, after it broke up the empire of the Syrians, but later, in the time of Astyages, it was deprived of that great authority ..." [31]
Medieval Armenian chronicles corroborate the Greek and Hebrew sources. In particular, Movses Khorenatsi writes that Armenian prince Paruyr Skayordi helped the Median king Cyaxares and his allies conquer Assyria, for which Cyaxares recognized him as the king of Armenia, while Media conquered Armenia only much later—under Astyages.[32] It is possible that the last Urartian king, Rusa IV, had connections to the future incoming Armenian Orontids dynasty.[citation needed]
Urartu was destroyed in either 590 BC[33] or 585 BC.[34] By the late 6th century, Urartu had certainly been replaced by Armenia.[35]
Niche and base for a destroyed Urartian statue. Van. 1973
Urartian stone arch near Van. 1973
Urartian citadel near Van Lake. 1973
Urartian royal tomb. Near Van 1973
Little is known of what happened to the region of Urartu under the foreign rule following its fall. The most widely accepted theory is that settlers related to Phrygians, or more specifically tribes speaking a Proto-Armenian language conventionally named Armeno-Phrygians, who had already settled in the western parts of the region prior to the establishment of Urartu,[36] had become the ruling elite under the Medes, followed by the Achaemenid Persians.[37] These Armeno-Phrygians, referred to as Armenians as of now, would have mingled with the disparate peoples of Urartu, resulting a fusion of languages and cultures. The Armenians multiplied in numbers and spread their language throughout the territory of Urartu. The Urartians, during its dominance, had amalgamated disparate tribes, each of which had its own culture and traditions. Thus, when the political structure was destroyed, little remained that could be identified as one unified Urartian culture.[38] The region formerly known as Urartu became an Achaemenid satrapy called Armina,[39] which later became an independent kingdom called Armenia. The Urartians who were in the satrapy were then assimilated, becoming part of the Armenian ethnogenesis.[citation needed] However, other Urartians might have kept their former identity. According to Herodotus, the Alarodians (Alarodioi)—believed to be Urartian remnants—were part of the 18th Satrapy of the Achaemenid Empire and formed a special contingent in the grand army of Xerxes I.[40] Some Urartian traditions, such as architecture and dam constructions, were absorbed in the following Persianates,[41] and most probably persisted in the Satrapy of Armina. Urartu did not give birth to a direct successor, however, the Satrapy of Armina, as an entity which emerged immediately after its fall, inherited its cultural, traditional, geographical and some linguistic aspects. Darius I the Great, in his famous Behistun Inscription, calls the region Armina/Armenia in Old Persian and Urashtu/Urartu in Babylonian, clearly equating the two, suggesting that both are somewhat part of a same continuous entity. As the Armenian identity developed in the region, the memory of Urartu faded and finally disappeared.[42]
The language spoken in Urartu is now extinct. Little is known of what was spoken in the geopolitical region from the time of Urartu's fall in the 6th century BC, to the creation of the Armenian alphabet in the 4th century AD. In ancient Persian inscriptions, references to Armina (Armenia) indicate that Urartian was still spoken, or was in a transitional period into being replaced with the Armenian language. In fact, the ethnonym "Armina" itself and all other names attested with reference to the rebellions against Darius in Armina (the proper names Araxa, Haldita, and Dādṛšiš, the toponyms Zūzahya, Tigra, and Uyamā, and the district name Autiyāra) are not connected with Armenian linguistic and onomastic material attested later in native Armenian sources. They are also not Iranian, but seem related to Urartian.[43]
The name of the province of Ayrarat in the Kingdom of Armenia is believed to be a continuum of the Urartu toponym (or biblical Ararat).[44] The modern name of Mount Ararat is derived from the biblical Mountains of Ararat (or Mountains of Urartu), and the Ararat Province of modern Armenia is in turn named after the mountain.
Economy and politics[edit]
Main article: Economy of Urartu
The economic structure of Urartu was similar to other states of the Ancient World, especially to Assyria. The state was heavily dependent on agriculture, which required a centralized effort to irrigation. These works managed by kings, in their implementation participated the free inhabitants, and perhaps the prisoners as slaves. Royal governors, influent people and, perhaps, free peoples have their own allotments. Individual territories within the state had to pay taxes the central government grain, horses, bulls, etc. In peacetime, Urartu probably led an active trade with Assyria, providing cattle, horses, iron and wine.
Agriculture in Urartu
Urartu Fork.jpg
Urartu Spades.jpg
Urartian grain bruiser01.jpg
Part of iron pitchfork, found near Lake Van and Iron plowshare, found during excavations in Rusahinili (Toprakkale). Urartian grain bruiser
According to archaeological data, farming on the territory of Urartu began to develop since the Neolithic period, even in the 3rd millennium BC. In Urartian age agriculture was well developed and closely related to the Assyrian on the selection of cultures and ways of processing.[45] From cuneiform sources, it is known that in Urartu grew wheat, barley, sesame, millet and emmer, and cultivated gardens and vineyards. Many regions of the Urartu state required artificial irrigation, which has successfully been organized by the rulers of Urartu in the heyday of the state. In several regions remain ancient irrigation canals, constructed by Urartu, mainly during the Argishti I and Menua period, some of which are still used for irrigation.
Art and architecture[edit]
Bronze figurine of the winged goddess Tushpuea, with suspension hook
Main article: Art of Urartu
There are a number of remains of sturdy stone architecture, as well as some mud brick, especially when it has been burnt, which helps survival. Stone remains are mainly fortresses and walls, with temples and mausolea, and many rock-cut tombs. The style, which developed regional variations, shows a distinct character, partly because of the greater use of stone compared to neighbouring cultures. The typical temple was square, with stones walls as thick as the open internal area but using mud brick for the higher part. These were placed at the highest point of a citadel and from surviving depictions were high, perhaps with gabled roofs; their emphasis on verticality has been claimed as an influence of later Christian Armenian architecture.[46]
The art of Urartu is especially notable for fine lost-wax bronze objects: weapons, figurines, vessels including grand cauldrons that were used for sacrifices, fittings for furniture, and helmets. There are also remains of ivory and bone carvings, frescos, cylinder seals and of course pottery. In general their style is a somewhat less sophisticated blend of influences from neighbouring cultures. Archaeology has produced relatively few examples of the jewellery in precious metals that the Assyrians boasted of carrying off in great quantities from Musasir in 714 BC.[46]
Depiction of the Urartian god Khaldi
With the expansion of Urartian territory, many of the gods worshiped by conquered peoples were incorporated into the Urartian pantheon, as a mean to confirm the annexation of territories and promote political stability. However, although the Urartians incorporated many deities into their pantheon, they appeared to be selective in their choices. Although many Urartian kings made conquests in the North, such as the Sevan region, many of those peoples' gods remain excluded. This was most likely the case because Urartians considered the people in the North to be barbaric, and disliked their deities as much as they did them. Good examples of incorporated deities however are the goddesses Bagvarti (Bagmashtu) and Selardi. On Mheri-Dur, or Meher-Tur (the "Gate of Mehr"), overlooking modern Van, an inscription lists a total of 79 deities, and what type of sacrificial offerings should be made to each; goats, sheep, cattle, and other animals served as the sacrificial offerings. Urartians did not practice human sacrifice.[47]
The pantheon was headed by a triad made up of Khaldi (the supreme god), Theispas (Teisheba) god of thunder and storms, as well as sometimes war, and Shivini a solar god. Their king was also the chief-priest or envoy of Khaldi. Some temples to Khaldi were part of the royal palace complex while others were independent structures.
Some main gods and goddesses include:[48]
Main article: Urartian language
Urartian, the language used in the cuneiform inscriptions of Urartu, was an ergative-agglutinative language, which belongs to neither the Semitic nor the Indo-European families but to the Hurro-Urartian family. It survives in many inscriptions found in the area of the Urartu kingdom, written in the Assyrian cuneiform script. There are also claims of autochthonous Urartian hieroglyphs, but this remains uncertain.[49]
Urartian cuneiform tablet recording the foundation of Erebuni Fortress by Argishti.
The Urartians originally would have used these locally-developed hieroglyphs (undeciphered and possibly not even true writing) but later adapted the Assyrian cuneiform script for most purposes. After the 8th century BC, the hieroglyphic script was restricted to religious and accounting purposes.[clarification needed] Examples of Urartian written language have survived in many inscriptions found throughout the area of the Urartu kingdom.
Urartian cuneiform inscriptions are divided into two groups. A minority is written in Akkadian (the official language of Assyria). However, the bulk of the cuneiforms are written in an agglutinative language, conventionally called Urartian, Khaldian, or neo-Hurrian, which was related to Hurrian in the Hurro-Urartian family, and was neither Semitic nor Indo-European.
Currently, the number of known Urartian cuneiform inscriptions is more than 1000.[citation needed] They contain around 350–400 words, most of which are Urartian, while some are loan words from other languages. The greatest number of foreign loan words in Urartian is from Armenian—around 70 word-roots.[50][not the other way round?] However, the consensus scolarly opinion is that the Armenian language basically is an Indo-European language, and thus much more closely related to the other such languages than to the Urartian language.
Unlike the cuneiform inscriptions, Urartian hieroglyphic "texts" have not been successfully deciphered. As a result, scholars disagree as to what language is used in the "texts", or whether they even constitute writing at all.
Armenian ethnogenesis[edit]
The Iron Age Urartian state was the successor of the Late Bronze Age Hurrian state of Mitanni, and the Urartian language spoken by the ruling class is the successor of the Hurrian language (see Hurro-Urartian).[51][52] The Urartian state was in turn succeeded in the area in the 6th century BC by the Indo-European speaking Orontid Armenian kingdom.[53] The presence of a Proto-Armenian population in the area already during Urartian rule is subject to speculation: It is generally assumed that Proto-Armenian speakers entered Anatolia from around 1200 BC, ultimately deriving from a Paleo-Balkans context, and over the following centuries spread east to the Armenian Highland.[54][55][56] A competing theory suggested by Thomas Gamkrelidze and Vyacheslav V. Ivanov in 1984 places the Proto-Indo-European homeland in the Armenian Highland, see Armenian hypothesis, which would entail the presence of Proto-Armenians in the area during the entire lifetime of the Urartian state.[57] According to historian M. Chahin, "Urartian history is part of Armenian history, in the same sense that the history of the ancient Britons is part of English history, and that of the Gauls is part of French history. Armenians can legitimately claim, through Urartu, an historical continuity of some 4000 years; their history is among those of the most ancient peoples in the world."[7]
After the disappearance of Urartu as a political entity at the hands of Assyria, the Armenians eventually came to dominate the highlands after the fall of the Neo Assyrian Empire, absorbing portions of the previous Urartian culture in the process.[58] The Armenians became, thus, the direct successors of the kingdom of Urartu and inherited their domain.
While the Urartian language was spoken by the royal elite, the population they ruled may have been multi-ethnic, and in late Urartian times largely (pre-Proto-) Armenian-speaking.[5] Under this theory, the Armenian-speaking population were the descendants of the proto-Armenians who migrated to the Armenian Highland in c. the 7th century BC, mixing with the local Hurrian-speaking population (i.e. the "Phrygian theory," first suggested by Herodotus).
A minority belief, advocated primarily by the official historiography of Armenia, but also supported by experts in Assyrian and Urartian studies such as Igor Diakonov, Giorgi Melikishvili, Mikhail Nikolsky Ivan Mestchaninov, suggests that Urartian was solely the formal written language of the state, while its inhabitants, including the royal family, spoke Armenian.[54] The theory primarily hinges on the language the Urartian cuneiform inscriptions being very repetitive and scant in vocabulary (having as little as 350–400 roots). Furthermore, over 250 years of usage, it shows no development, which is taken to indicate that the language had ceased to be spoken before the time of the inscriptions or was used only for official purposes.[54] This belief is compatible with the "Armenian hypothesis" suggested by Vyacheslav Ivanov and Tamaz Gamkrelidze (1984), postulating the Armenian language as an in situ development of a 3rd millennium BC Proto-Indo-European language.[57]
According to the Encyclopedia of Indo-European Culture:
The Armenians according to Diakonoff, are then an amalgam of the Hurrian (and Urartians), Luvians and the Proto-Armenian Mushki who carried their IE language eastwards across Anatolia. After arriving in its historical territory, Proto-Armenian would appear to have undergone massive influence on part the languages it eventually replaced. Armenian phonology, for instance, appears to have been greatly affected by Urartian, which may suggest a long period of bilingualism.[59]
The discovery of Urartu has come to play a significant role in 19th and 20th-century Armenian nationalism.[60]
See also[edit]
1. ^ Paul Zimansky, Urartian material culture as state assemblage, Bulletin of the American Association of Oriental Research 299, 1995, 105.
2. ^ Diakonoff, Igor M (1992). "First Evidence of the Proto-Armenian Language in Eastern Anatolia". Annual of Armenian Linguistics 13: 51–54. ISSN 0271-9800.
3. ^ Eberhard Schrader, The Cuneiform inscriptions and the Old Testament (1885), p. 65.
4. ^ Hewsen, Robert H. (2000), ""Van in This World; Paradise in the Next" The Historical Geography of Van/Vaspurakan", in Hovannisian, Richard G., Armenian Van/Vaspurakan , Historic Armenian Cities and Provinces , Costa Mesa, California: Mazda Publishers , p. 13, OCLC 44774992
5. ^ a b Róna-Tas, András.Hungarians and Europe in the Early Middle Ages: An Introduction to Early Hungarian History. Budapest: Central European University Press, 1999 p. 76 ISBN 963-9116-48-3.
6. ^ Greppin, John A. C. (1991). "Some Effects of the Hurro-Urartian People and Their Languages upon the Earliest Armenians". Journal of the American Oriental Society 3 (4): 720–730. "Even for now, however, it seems difficult to deny that the Armenians had contact, at an early date, with a Hurro-Urartian people."
7. ^ a b c Chahin, M. (2001). The kingdom of Armenia: a history (2. rev. ed. ed.). Richmond: Curzon. p. 182. ISBN 0700714529.
8. ^ Scarre, edited by Chris (2013). Human past : world prehistory and the development of human societies. (3rd ed., completely rev. and updated. ed.). W W Norton. ISBN 0500290636.
10. ^ F. W. König, Handbuch der chaldischen Inschriften (1955).
11. ^ Frye, Richard N. (1984). The history of ancient Iran. München: C.H. Beck. p. 73. ISBN 3406093973. "The real heirs of the Urartians, however, were neither the Scythians nor Medes but the Armenians."
12. ^ Redgate, A. E. (2000). The Armenians (Reprint. ed.). Oxford: Blackwell. p. 5. ISBN 0631220372. "However, the most easily identifiable ancestors of the later Armenian nation are the Urartians."
13. ^ Lang, David Marshall (1980). Armenia : cradle of civilization (3 ed.). London: Allen & Unwin. pp. 85–111. ISBN 0049560093.
14. ^ Abram Rigg Jr., Horace. "A Note on the Names Armânum and Urartu". Journal of the American Oriental Society, Vol. 57, No. 4 (Dec., 1937), pp. 416–418.
15. ^ Zimansky, Paul E. Ancient Ararat: A Handbook of Urartian Studies. Delmar, N. Y.: Caravan Books, 1998, p. 28. ISBN 0-88206-091-0.
16. ^ I. M. Diakonoff, "Hurro-Urartian Borrowings in Old Armenian." Journal of the American Oriental Society, Vol. 105, No. 4 (Oct. – Dec., 1985), pp. 597–603
17. ^ Lehmann-Haupt C. F. Armenien, Berlin, B. Behr, 1910—1931
18. ^ Piotrovsky, Boris B. The Ancient Civilization of Urartu. New York: Cowles Book Co., Inc., 1969. p.51
19. ^ Ararat (WebBible Encyclopedia) – ChristianAnswers.Net
20. ^ Skjaervo, Prods Oktor, "An Introduction to Old Persian", Harvard 2002
23. ^ Chahin. The Kingdom of Armenia, p. 105.
24. ^ Lynch, H.F.B.. Armenia, Travels and Studies, Volume 2. London: Longmans, 1901, p. 54.
25. ^ Urartian Material Culture As State Assemblage: An Anomaly in the Archaeology of Empire, Paul Zimansky, Page 103 of 103-115
26. ^ D.D. Luckenbill, Ancient Records of Assyria and Babylonia, (1927, vol II:84), quoted in Robin Lane Fox, Travelling Heroes in the Epic Age of Homer (2008:17).
27. ^ Georges Roux - Ancient Iraq page 314
28. ^ Journal of Ancient History 1951, No 3. Pages. 243–244
29. ^ Letter of Ashubanipal to Sarduri III. HABL, № 1242.
30. ^ Xenophon.Cyropedia. 3.7. Translated by Henry Graham Dakyns.
31. ^ Strabo. Geography. 11.3.5.
32. ^ (Armenian) Movses Khorenatsi. History of Armenia, 5th century (Հայոց Պատմություն, Ե Դար). Annotated translation and commentary by Stepan Malkhasyants. Gagik Sarkisyan (ed.) Yerevan: Hayastan Publishing, 1997, 1.21, pp. 100–101. ISBN 5-540-01192-9.
33. ^ Urartu – Lost Kingdom of Van
34. ^ Urartu civilization – All About Turkey
35. ^ Van de Mieroop, Marc. A History of the Ancient Near East c. 3000 – 323 BC. Cornwall: Blackwell, 2006, p. 205. ISBN 1-4051-4911-6.
36. ^ Uchicago.edu
37. ^ Google Books, The Armenians. Germany: Anne Elizabeth Redgate, 2000. pp. 50
38. ^ Armen Asher The Peoples of Ararat. 2009, p. 290-291. ISBN 978-1-4392-2567-7.
39. ^ Livius.org
40. ^ Lang, pp. 112, 117
41. ^ Kleiss, Wolfram. "URARTU IN IRAN". Encyclopædia Iranica. Retrieved 2012-09-03.
42. ^ Armen Asher The Peoples of Ararat. 2009, p. 291. ISBN 978-1-4392-2567-7.
43. ^ Schmitt, R. "ARMENIA and IRAN i. Armina, Achaemenid province". Encyclopædia Iranica. Retrieved 2012-09-03.
44. ^ Hewsen, R. H. "AYRARAT". Encyclopædia Iranica. Retrieved 2012-09-03.
45. ^ Пиотровский Б.Б. Ванское царство (Урарту) / Орбели И.А.. — Москва: Издательство Восточной литературы, 1959. — 286 с. — 3500 экз.
46. ^ a b C. A. Burney, "Urartian." Grove Art Online, Oxford Art Online. Oxford University Press, accessed December 30, 2012, online, subscription required
47. ^ Chahin, Mark (1987). The Kingdom of Armenia. Dorset Press. ISBN 0-88029-609-7.
48. ^ Piotrovsky, Boris B. (1969). The Ancient Civilization of Urartu: An Archaeological Adventure. Cowles Book Co. ISBN 0-214-66793-6.
49. ^ Sayce, Archibald H. "The Kingdom of Van (Urartu)" in Cambridge Ancient History. vol. ii, p. 172 See also C. F. Lehman-Haupt, Armenien Einst und Jetzt, Berlin, 1931, vol. II, p. 497
50. ^ Encyclopedia Americana, v. 2, USA 1980, pgs. 539, 541; Hovick Nersessian, "Highlands of Armenia," Los Angeles, 2000.
51. ^ Diakonov Igor M., Starostin S.A. Hurro-Urartian as an Eastern Caucasian Languages. Münchener Studien zur Sprachwissenschaft, R. Kitzinger, München, 1986; Ancient Hurrians
52. ^ Piotrovsky. Ancient Civilization of Urartu p. ?.
53. ^ Urartu on Britannica
54. ^ a b c (Armenian) Katvalyan, M. and Karo Ghafadaryan. «Ուրարտու» (Urartu). Soviet Armenian Encyclopedia. vol. xii. Yerevan, Armenian SSR: Armenian Academy of Sciences, 1986, pp. 276–283.
55. ^ Dyakonov, I.M., V.D. Neronova, and I.S. Sventsitskaya. History of the Ancient World. vol. ii, Moscow, 1983.
56. ^ "Armenian origins: An overview of ancient and modern sources and theories", by Thomas J. Samuelian, Iravunq, 2000, 34 p., ASIN: B0006E8NC26; p. 14
57. ^ a b See Gamkrelidze, Thomas and Vyacheslav Ivanov Indo-European and the Indo-Europeans: A Reconstruction and Historical Analysis of a Proto-language and a Proto-culture. New York : M. de Gruyter, 1995.
58. ^ Star Spring Urartu
59. ^ “Armenians” in ""Encyclopedia of Indo-European Culture or EIEC, edited by J. P. Mallory and Douglas Q. Adams, published in 1997 by Fitzroy Dearborn.
60. ^ Anne Elizabeth Redgate, The Armenians, Cambridge University Press, 1995, ISBN 978-0-521-48065-9, p. 276.
• Ashkharbek Kalantar, Materials on Armenian and Urartian History (with a contribution by Mirjo Salvini), Civilisations du Proche-Orient: Series 4 – Hors Série, Neuchâtel, Paris, 2004;ISBN 978-2-940032-14-3
• Boris B. Piotrovsky, The Ancient Civilization of Urartu (translated from Russian by James Hogarth), New York:Cowles Book Company, 1969.
• M. Salvini, Geschichte und Kultur der Urartäer, Darmstadt 1995.
• R. B. Wartke, Urartu — Das Reich am Ararat In: Kulturgeschichte der Antiken Welt, Bd. 59, Mainz 1993.
• P. E. Zimansky, Ecology and Empire: The Structure of the Urartian State, [Studies in Ancient Oriental Civilization], Chicago: Oriental Institute, 1985.
• P. E. Zimansky, Ancient Ararat. A Handbook of Urartian Studies, New York 1998.
External links[edit]
|
global_05_local_4_shard_00000656_processed.jsonl/55104
|
Yemeni cuisine
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Yemeni cuisine is entirely distinct from the more widely known Middle Eastern cuisines and even differs slightly from region to region. Throughout history Yemeni cuisine has had a little bit of Ottoman influence in some parts of the north and very little Mughlai-style Indian influence in Aden and the surrounding areas in the south, but these influences have only come within the last 300 years. Yemeni Cuisine is extremely popular among the Arab States of the Persian Gulf.
Chicken, goat, and lamb are eaten more often than beef, which is expensive. Fish is also eaten, especially in the coastal areas. Cheese, butter, and other dairy products are less common in the Yemeni diet. Buttermilk is enjoyed almost daily in some villages where it is most available. The most commonly used fats are vegetable oil and ghee used in savory dishes, and clarified butter, known as semn (سمن) used in pastries.
A spice mixture known as hawaij is employed in many Yemeni dishes. Hawaij includes aniseed, fennel seeds, ginger, and cardamom.
Yemeni dishes[edit]
Some common Yemeni dishes include: aseed, Bint AlSahn, Zurbiyan, fahsa, fatta, fatoot, ful medames, hareesh, jachnun, komroh, mandi, mutabbaq, Samak Mofa, shafut, skhug, Kabsah, Hanith.
Although each region has their own variation, Saltah (سلتة) is considered the national dish. The base is a brown meat stew called maraq (مرق), a dollop of fenugreek froth, and sahawiq (سحاوق) or sahowqa (a mixture of chili peppers, tomatoes, garlic, and herbs ground into a salsa). Rice, potatoes, scrambled eggs, and vegetables are common additions to saltah. It is eaten traditionally with Yemeni flat bread, which serves as a utensil to scoop up the food.
Ogdat (عقدة), meaning knot in Arabic, is a stew made from tying and mixing all the ingredients together. There are many types of ogda and it can be made with small pieces of lamb, chicken, or fish that is mixed and cooked together with any vegetables including tomatoes, carrots, potatoes, zucchini, etc.[1]
Yemeni bread varieties[edit]
Tawa, Tameez, Laxoox, Malooga, Kader, Fateer, Kudam, Rashoosh, Oshar, Khamira, and Malawah[2] are popular breads eaten in Yemen. Flat bread is usually baked at home in a tandoor called taboon (تبون). Malooga, khubz, and khamira are popular homemade breads. Store-bought pita bread and roti (bread rolls like French bread) are also common.
Black tea
Milk tea "Shahi Haleeb" (after qat), black tea (with clove, cardamom, or mint), qishr (coffee husks), Qahwa (coffee), Karkadin (an infusion of dried hibiscus flowers), Naqe'e Al Zabib (cold raisin drink), and diba'a (squash nectar) are examples of Yemeni drinks. Mango and guava juice are also popular.
Although coffee and tea are consumed throughout Yemen, coffee is the preferred drink in Sana'a, whereas black tea is the beverage of choice in Aden and Hadhramaut. Tea is consumed along with breakfast, after lunch (occasionally with sweets and pastries), and along with dinner. Popular flavorings include cloves with cardamom and mint. A drink made from coffee husks called qishr is also enjoyed.
See also[edit]
|
global_05_local_4_shard_00000656_processed.jsonl/55105
|
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Zerodur (notation of the manufacturer: ZERODUR®), a registered trademark of Schott AG,[1] is a lithium aluminosilicate glass-ceramic[2] produced by Schott AG since 1968.[3] It has been used for a number of very large telescope mirrors including Keck I, Keck II,[4] and SOFIA. With its very low coefficient of thermal expansion it can be used to produce mirrors which retain acceptable figures in extremely cold environments such as deep space.[5] Although it has advantages for applications requiring a coefficient of thermal expansion less than that of borosilicate glass it remains very expensive as compared to borosilicate. The tight tolerance on CTE ± 0.007 x 10−7/K allows for highly accurate applications which require high-precision.
Zerodur has both an amorphous (vitreous) component and a crystalline component. Its most important properties[6] are:
The Keck II Telescope showing the segmented primary mirror made of Zerodur
1. Optics
2. Microlithography
3. Measurement technology[3]
See also[edit]
1. ^
2. ^ a b Viens, Michael J (April 1990). "Fracture Toughness and Crack Growth of Zerodur" (PDF). NASA Technical Memorandum 4185. NASA. Retrieved 28 August 2011.
3. ^ a b Schott AG Zerodur description
4. ^ Döhring, Thorsten; Peter Hartmann, Ralf Jedamzik, Armin Thomas, Frank-Thomas Lentes. "Properties of Zerodur Mirror Blanks for Extremely Large Telescopes" (PDF). Proc. of SPIE Vol. 6148 61480G-8. SPIE. Retrieved 26 August 2011.
5. ^ Baer, JW; WP Lotz. "Figure testing of 300 mm Zerodur mirrors at cryogenic temperatures" (PDF). Retrieved 26 August 2011.
6. ^ a b Schott AG Zerodur properties
7. ^ SCHOTT CTE Grades
8. ^ Hartmann, P. (18 December 2012). "ZERODUR - Deterministic Approach for Strength Design" (PDF). NASA. Retrieved 11 September 2013.
9. ^ Senf, H; E Strassburger; H Rothenhausler (1997). "A study of Damage during Impact in Zerodur". J Phys Iv France (in English) 7 (Colloque C3, Suppltment au Journal de Physique I11 d'aotit 1997). Retrieved 31 August 2011.
External links[edit]
|
global_05_local_4_shard_00000656_processed.jsonl/55106
|
From Wikiquote
Jump to: navigation, search
This page is a placeholder for a page about the year 1619. The Wikiquote community has not yet come to a consensus on what this page, and calendar-year pages generally, ought to say. Please discuss any suggestions for the contents of year pages at the Village pump.
In the meantime, Wikipedia's 1619 article offers a list of noteworthy events of this year.
|
global_05_local_4_shard_00000656_processed.jsonl/55107
|
Page:The poetical works of William Blake, 1906 - Volume 1.djvu/93
From Wikisource
Jump to: navigation, search
This page has been proofread, but needs to be validated.
These 'Poetic Sketches' are here printed in the same order as in the little volume published by Blake's friends, with only his initials on the title-page, in the year 1783. The two prose fragments called 'The Couch of Death ' and 'Contemplation' are reproduced in the places then chosen for them, just as they were there printed. They would not perhaps be considered at the present day to have any right to inclusion among poetic works, even as 'sketches.' 'Samson,' which follows them, is evidently a poem. Yet it was printed at the end of this volume as prose. A good many of the lines were imperfect. While sorting them up as verses, it has been necessary to do for Blake what he cannot be held blameless for not endeavouring to do for himself, and verbal emendations hare been made. The original text is still obtainable through Mr. Quaritch, s facsimile, and elsewhere. But those who desire to compare it with the present text, without putting down this volume, can do so by the following:—
For the last line but one of the first paragraph read,—
'To write as on a lofty rock with iron pens,'
which, however fine as a line, is evidently not in the metre of the poem.
In the second paragraph almost every line has an annoying and careless slip left in, and the total effect is so worrying that it may safely be said that no one but a student would willingly go through it in its unamended form. On the other hand, no one can read with any pleasure a poem of Blake's that has been touched up by some one else unless he knows just what it would have been if not so treated. The following is the unrestored reading of the second paragraph, only divided into lines, the wo?'ds as in the original: —
Now Night, noontide of damned spirits,
Over the silent earth spreads her pavilion,
|
global_05_local_4_shard_00000656_processed.jsonl/55108
|
Penis - Anatomy & Physiology
From WikiVet
Jump to: navigation, search
The penis is the male copulatory organ. It is formed from three parts; two Corpora cavernosa, comprising of cavernous tissue and a connective tissue sheath the tunica albuginea, and the single Corpus Spongiosum which contains the urethra encased in a vascular tissue sleeve. There are two types of penis: the musculovascular and fibroelastic penis.
Corpus Cavernosum
The corpus cavernosum is made up from the paired columns of cavernous tissue surrounded by connective tissue known as the crura of the penis or corpora cavernosa.
• In the dog the distal corpus cavernosum is transformed into bone to form the Os penis which plays an important part in the dog achieving intromission with the bitch during copulation.
Corpus spongiosum
The corpus spongiosum is a vascular tissue sleeve surrounding the urethra. It commences at the bulb of the penis as an enlargement of the spongy tissue of the pelvic urethra. At the end of the penis the corpus spongiosum expands over the distal end of the corpus cavernosum to form the Glans penis, bringing the urethra to the extremity of the penis. There is a great variation in the morphology of the glans penis between species which often correspond to the female tract morphology. For example the boars “corkscrew” glans penis corresponds to the many interdigitating prominences of the sow’s cervix. The glans penis is highly populated with sensory nerves.
The prepuce is the skin sheath that conceals the penis when it is flaccid and is formed by an invagination of the abdominal skin. The prepuce is hairless and contains many smegma secreting glands important for lubrication between the shaft of the penis and the prepuce during copulation. Within the prepuce are varying amounts of striated muscle fibres; the cranial prepucial muscles responsible for retracting the prepuce and the caudal prepucial muscles responsible for protracting the prepuce.
Glans Penis morphology
Glans Penis Morphology - Copyright Amy Cartmel
• Bull – slightly spiralled end
• Boar – corkscrew shaped with a left hand thread
• Ram – large extension of the urethral process
• Stallion – Mushroom shaped with slight protrusion of the urethral process
• Dog – substantial glans penis which is divided into the bulbus glandis found proximally and the pars longa glandis found distally
• Tom cat – cone shaped with Keratinised Papillae, directed caudally
Types of Penis
Found in:
• Bull, Boar, Ram, Deer
• Contain large amounts of connective tissue and elastic fibres but limited erectile tissue.
• Contain a sigmoid flexure
• They are encased by a non-expandable connective tissue sheath called the tunica albuginea. Therefore, erection only results in increased length of penis and no increase in diameter of the penis. However, most of the increase in penile length is actually due to the straightening of the sigmoid flexure.
• The cavernous tissue contains small blood spaces which means that only a small increase in blood to the penis is require to achieve erection.
Found in:
• Man, Stallion, Dog, Tom Cat
• This penis structure contains a lot of erectile tissue and little connective tissue so during erection there is both an increase in length and diameter of the penis.
• The cavernous tissue contains large blood spaces divided by thin septa. Therefore, a relatively larger volume of blood is required to achieve erection.
Muscles associated with the penis
• A single muscle that covers the root and ventral surface of the penis as well as the bulbourethral glands (link to glands page)
• The function of this muscle is to empty the extrapelvic urethra of sperm in a similar way to the urethralis muscle emptying the pelvic urethra.
Ischiocavernosus Muscles
• Paired muscles located at the root of the penis.
• Connect the penis to the ischial arch of the pelvis.
Retractor penis Muscles
• Paired muscles originating on the caudal vertebrae and inserting on the ventrolateral surfaces of the penis.
• Maintains the sigmoid flexure of the fibroelastic penis when the muscles are contracted.
• When the muscles are relaxed the penis protrudes through the prepuce as the sigmoid flexure unbends.
The artery of the penis is a direct branch off the internal pudendal artery. It splits into three branches:
• Artery of the bulb – supplies the corpus spongiosus
• Deep artery of the penis – supplies the corpus cavernosum
• Dorsal artery of the penis – supplies the glans penis
The prepuce covering the flaccid penis is supplied by anastamosis between the external pudendal artery and the artery of the penis.
• Mostly parasympathetic from the paired pudendal nerves
• The glans penis and internal lamina of the prepuce are heavily infiltrated by sensory nerve endings responsible for stimulating ejaculation (link to ejaculation)
Lymph from the penis and prepuce drains into the superficial inguinal lymph nodes.
Penis - Anatomy & Physiology Learning Resources
DragsterDragster logo.png
Drag and Drop (Dragster)
Test your knowledge using drag and drop boxes
Test your knowledge of penis structure in different species
WikiQuizWikiQuiz logo.png
Multiple choice quizzes
Male Reproductive Anatomy Quiz
Selection of relevant videos
Equine penis potcast
Reproductive tract of the boar
Reproductive tract of the dog potcast
WikiVetTM Introduction - Help WikiVet - Report a Problem
Personal tools
Other Language Sites
|
global_05_local_4_shard_00000656_processed.jsonl/55115
|
Take the 2-minute tour ×
What do truxtop and thumb tax mean?
I found them mentioned in this quotation from English Words History and Structure, 2nd edition (p. 113):
The replacement of the sequence [ks] by x is a spelling convention. It has no effect on the pronunciation of the consonant cluster. This replacement practice has given rise to attention-getting facetious spellings like thanx, truxtop, thumb tax.
share|improve this question
closed as not a real question by coleopterist, Andrew Leach, J.R., tchrist, RegDwigнt Mar 12 '13 at 15:58
As your source has stated, replace the x with the letters ks. This will give you truckstop and thumbtacks. – coleopterist Mar 12 '13 at 9:14
ks or cks as appropriate. – Edwin Ashworth Mar 12 '13 at 9:26
.... they used to have a head tax, but some bright guy discovered that if they changed to a thumb tax it would (nearly) double their take .... – GEdgar Mar 12 '13 at 13:35
1 Answer 1
Don't know what truxtop is. But I've found a definition for thumb tax: reference
So thumb tax stands for thumbtacks (plural)
share|improve this answer
|
global_05_local_4_shard_00000656_processed.jsonl/55124
|
IUCN threat status:
Not evaluated
Comprehensive Description
Read full entry
Janthina janthina is a small snail. It's shell can be up to 4 cm high and 3 cm broad. The shell is globular, fragile and thin with a dark blueish-purple colouration which is darker at the base. The surface of the shell apears smooth but may possess regular growth lines and irregular spiral grooves, especially at the edge of the last whorl. The shell can be high or low with the last whorl constituting 75-80% of the the height in high shells, and aproximately 90% in low shells (Graham, 1988). The aperture would be 45% and 70% respectively (Graham, 1988). The protoconch (whorls at shell apex formed by the larval snail) axis is slanted. The large aperture is angular with a thin lip and small umbilicus, which is where the outer lip and columella meet.
The head of the violet snail has a long cylindrical snout with a terminal mouth. The tentacles are forked, have no eyes and project half way along its side's. The foot has a broad anterior and tapers to a posterior point. There is a broad depression or funnel at the anterior part of the sole, where the float is secreted. The posterior of the sole has longitudinal grooves. The flesh of this species is deep violet or black and in adults the operculum is absent.
Janithina janthina is the commonest member of the Janthinidae family. This species is ovoviparous where the eggs develop within the females genital tract and later shed as veliger larvae from the left side of the mantle cavity (Graham, 1988). The males are aphallic (no penis) and produce spermatozeugmata that swim to the female and enter the genital tract. Therefore fertilization occurs before the eggs have left the ovary, suggesting the species is a protandrous consecutive hermaphrodite.
© The Marine Biological Association of the United Kingdom
Source: Marine Life Information Network
Belongs to 1 community
|
global_05_local_4_shard_00000656_processed.jsonl/55138
|
buscar cualquier palabra, como cleveland steamer:
a Cold Carl, whilst getting a Cosby sweater. you can receive them in any order, and you can get or give them. and can be received with or with out cheese.
"dude she was a freak!"
"she gave me a Cold Cut Cosby Carl Combo!"
"omg no!"
Por Pimp'o'hot carls 17 de abril de 2010
|
global_05_local_4_shard_00000656_processed.jsonl/55148
|
(Theatre lighting terminology) A large reflector with a lamp in it. A gel may be placed across the front to change the light. A scoop cannot be focussed or barn doored. Used to create a wash or to fill a cyclorama.
An open-source Perl/MySQL based web news system similar to Slash. It allows users to submit stories and other users to vote on these stories. Users can also write comments or rate other users's comments. Scoop is used on kuro5hin and shouldexist, among other sites, and is quickly becoming a democratic alternative to Slash.
Transforms from payloader to robot and back!
"Generosity has its own rewards."
• Strength: 8
• Intelligence: 4
• Speed: 3
• Endurance: 9
• Rank: 5
• Courage: 9
• Firepower: 9
• Skill: 6
Transformers Tech Specs
Scoop was a payloader, an orange construction vehicle like his fellow "small" Autobot Targetmasters. Apparently no one told them how strange it looks to have earth-moving trucks with large weapons mounted on them, or how ineffective it is to have one in a combat situation.
Slang in journalism for a news story that some newspaper gets first, much before other newspapers.
A nice example was found in Mauri Kunnas' book "Etusivun Juttu": A king's crown was stolen. A newspaper reporter followed the trail of evidence and found the thief. Next morning, while other newspapers reported, with cat-sized headlines, "The Crown Stolen", the newspaper whose reporter found the king's crown had huge headlines saying "The Crown Found"...
A comic novel by Evelyn Waugh, published in 1938. It tells the story of a young nature reporter from the country, William Boot, who is mistaken for another, much more adventurous Boot and sent to cover the brewing civil war in Ishmaelia, a fictional country based closely on Abyssinia. It is a classic satire on the chaos and uncertainty of war reporting.
The story draws a lot on Waugh's own inglorious experiences (or inexperiences) as a reporter in Abyssinia in 1935, in the press corps waiting for the Italian invasion. He was fooled by more senior reporters, missed scoops and went on wild-goose chases, and when he did get a scoop, the fact that the Italian minister was leaving Addis Ababa and that therefore the invasion was imminent, for secrecy he cabled it back to the Daily Mail in Latin. So they threw it away.
Among the memorable characters is Lord Copper, the press baron and owner of the The Daily Beast, and based on the real-life Lord Rothermere. His rival was Lord Zinc of the Brute. The staff had a rule for how to tell him things: you said "Definitely, Lord Copper" for yes, and "Up to a point, Lord Copper" when you wanted to say no. This catchphrase is still widely used, at least by journalists who like to refer to one of the classics of their field.
Lord Copper wants nothing but the simple, unadulterated news that the great British reading public expect. Plus victory for the Patriots, which Boot with his stellar record is expected to arrange. The Beast stands for "strong, mutually antagonistic governments everywhere". As it is explained to Boot, after they have left Lord Copper's office:
"I gather it’s between the Reds and the Blacks."
"Yes, but it’s not quite as easy as that. You see they are all Negroes. And the Fascists won’t be called Black because of their racial pride, so they are called White after the White Russians. And the Bolshevists want to be called Black because of their racial pride. So when you say Black you mean Red, and when you mean Red you say White, and when the party who call themselves Blacks say Traitors they mean what we call Blacks, but what we mean when we say Traitors I really couldn’t tell you. But from your point of view it will be quite simple. Lord Copper only wants Patriot victories and both sides call themselves Patriots. And of course both sides will claim all the victories. But of course it’s really a war between Russia and Germany and Italy and Japan who are all against one another on the Patriotic side. I hope I make myself plain?"
"Up to a point," said William, falling easily into the habit.
Waugh was sacked by the Daily Mail in December 1935. At first as a Roman Catholic he had been sympathetic to the Italians, but he returned to Abyssinia in 1936 and saw what they were doing to the country. He began the novel in October of that year.
Sample page of it: http://www.dailytimes.com.pk/print.asp?page=story_15-11-2003_pg3_8
How Evelyn Waugh's life shaped his work: http://books.guardian.co.uk/review/story/0,12084,1069758,00.html
I haven't seen it, but there was a 1987 film of Scoop, with Michael Maloney as William Boot, Sir Michael Hordern as his Uncle Theodore, Denholm Elliott as the Beast's Foreign Editor Mr Salter, Donald Pleasence as Lord Copper, and Nicola Pagett and Herbert Lom.
Scoop (?), n. [OE. scope, of Scand. origin; cf. Sw. skopa, akin to D. schop a shovel, G. schüppe, and also to E. shove. See Shovel.]
A deep shovel, or any similar implement for digging out and dipping or shoveling up anything; as, a flour scoop; the scoop of a dredging machine.
3. (Surg.)
A place hollowed out; a basinlike cavity; a hollow.
Some had lain in the scoop of the rock.
J. R. Drake.
A sweep; a stroke; a swoop.
Scoop net, a kind of hand net, used in fishing; also, a net for sweeping the bottom of a river. --
Scoop wheel, a wheel for raising water, having scoops or buckets attached to its circumference; a tympanum.
© Webster 1913
Scoop, v. t. [imp. & p. p. Scooped (?); p. pr. & vb. n. Scooping.] [OE. scopen. See Scoop, n.]
He scooped the water from the crystal flood.
To empty by lading; as, to scoop a well dry.
Those carbuncles the Indians will scoop, so as to hold above a pint.
© Webster 1913
Scoop (?), n.
A beat. [Newspaper Slang]
© Webster 1913
Scoop, v. t.
To get a scoop, or a beat, on (a rival). [Newspaper Slang]
© Webster 1913
|
global_05_local_4_shard_00000656_processed.jsonl/55150
|
When speaking, grammar mistakes are hard to notice. For example, how can one tell if the person you are talking to, actually said, "too" or "to?" Did they say, "their" or "they're?"
The problem we face is becoming more apparent in this age of the internet. Chat rooms are breeding grounds for bad grammar. With the influx of 14-year-olds discovering the internet, they bring their hideous grammar with them and, like a virus, it spreads. People begin questioning their learned grammar skills, and before long, their own grammar begins to fail.
It is partly our responsibility to help educate these young people. Teach them proper grammar. Correct them when a mistake is made, teach them how to correct their mistake, so it can be avoided in the future. It is not necessary to scold, but polite instruction will work wonders.
|
global_05_local_4_shard_00000656_processed.jsonl/55178
|
The Diplomad on Hunting Obama’s Elephants
As regular readers of this blog have noticed, I haven’t been posting on the week’s news. Neither has The Diplomad:
Having one of those periodic visits by what Churchill and others have called the “black dog.” A little one, mind you, but nevertheless it interferes with my ability to engage in witty repartee of the blog-type. Let me explain. I am not talking about some clinical depression. I am talking about the black dog that bites you when you read the news, and see and hear the politicians–Democrat and Republican, American and foreign–prattle on about anything and everything except the facts.
Let’s start with one: the economy and government finances. Disaster. The elephants are everywhere, crushing the crops, knocking over the huts, flattening everything and everyone in their path. Nothing was resolved with the bizarre deal reached by Obama and the spineless GOP Congress. The government is spending at an increasing rate, at a rate that is not sustainable, and at a rate that threatens to destroy the entire economy and the very essence of American life, i.e., individual freedom. The debate over the growth of government programs should be about the effect of those programs on our individual freedoms, on the position of the United States in the world, as well as on our shrinking wallets. I don’t see that debate. Instead we talk about nonsense.
In other words, instead of talking about the economy and the crazy government policies ruining it, we talk about guns. Yes, guns. Every liberal politician from Obama to Biden, Cuomo, Emanuel, Bloomberg, Villaraigosa, Brown, etc., and news outlet is full of concerns over “assault weapons.” Yes, that is the greatest issue facing America. What is almost funny is that none of these pontificators can tell us what is an “assault rifle.” I will tell you what it is. It is a made-up term meant to sound scary. It is like “global climate change,” something which can be defined and redefined at will. It is a term used to frighten silly people whose knowledge of guns comes from watching Hollywood movies where every gang-banger has an arsenal of fully automatic weapons. It is a term meant to justify even more growth in government power and even further loss of individual freedoms.
Gun control for anyone except the DoJ’s F&F scheme, though.
Add to that college football players with invisible girlfriends, Tour de France doping (another Captain Louis Renault moment!), Lindsay Lohan escort “work”, Michelle Obama’s new wig, and whatever else Michael Bloomberg thinks of restricting next.
No wonder we’re all playing Angry Birds.
We are the Angry Birds!
Tonight’s swing time: Glenn Miller. 7-8PM Eastern, check my https://twitter.com/Fausta and https://www.facebook.com/fausta for the tunes, and tweet any Glenn Miller tunes you’ll want to hear. In The Mood will open the evening!
Tags: ,
2 Responses to “The Diplomad on Hunting Obama’s Elephants”
1. Chavez Report, | Extrano's Alley, a gun blog Says:
[...] Also noted at Fausta’s Blog, a post with a link to the Diplomad that is well worth consideration. I don’t think those are Obama’s elephants, though. Mor… [...]
}}} We are the Angry Birds!
Oh, if ONLY someone would fire me at The One’s house of cards!!
|
global_05_local_4_shard_00000656_processed.jsonl/55184
|
Linoleum Linux Programming Resources en Serendipity 1.5.5 - Fri, 28 Oct 2011 21:18:00 GMT RSS: Linoleum - Linux Programming Resources 100 21 Using Haml in Django Projects django python 0 (Paul) <a href="">Haml</a> is a markup language used for generating HTML, without using inline coding; it's designed to rectify several problems with traditional HTML templating systems.<br /> <br /> Haml is big in the Ruby world, but is now gaining traction in the Python sphere too; here's an article from Stephen Jackson on <a href="">using Haml in Django</a>. <br/> <a href=""><img src="" border="0"></a> Sat, 29 Oct 2011 08:18:00 +1100 A guide to Python packaging python 0 (Paul) When developing software, it's important to package your software properly. There's nothing more annoying for the end-user than software that doesn't install or involves considerable manual work before it can be used. Python has a very flexible packaging system - distutils - and Patrick T. Altman has written a <a href="">guide</a> for using it. <br/> <a href=""><img src="" border="0"></a> Wed, 26 Oct 2011 06:04:00 +1100 The Python Standard Library by Example python 0 (Paul) Linux Journal have printed <a href="">chapter 3</a> of the book <a href="">The Python Standard Library By Example</a>, covering algorithms. <br/> <a href=""><img src="" border="0"></a> Tue, 25 Oct 2011 06:39:00 +1100 Introduction to C on Linux c 0 (Paul) Linux Career has started a series on <a href="">C development on Linux</a>. The first article gives a brief history on the C programming language, explains what tools you'll need to get into it, and shows you how to compile your first C program. <br/> <a href=""><img src="" border="0"></a> Mon, 24 Oct 2011 06:53:00 +1100 Facebook Application Development javascript perl 0 (Paul) Writing in Linux Journal, Mike Diehl describes a few methods for < href="">getting data into and out of Facebook</a>. <br/> <a href=""><img src="" border="0"></a> Sat, 22 Oct 2011 06:12:00 +1100 Dropbox with Perl perl 0 (Paul) Linux Magazine are running a piece on <a href="">using Perl to access Dropbox</a> (PDF only). The article demonstrates the use of the Mojolicious::Lite and Net::Dropbox::API modules and outlines some scripts for connecting to and querying your Dropbox account. <br/> <a href=""><img src="" border="0"></a> Fri, 21 Oct 2011 07:13:00 +1100 Data mining Twitter, using Ruby,-using-Ruby.html ruby,-using-Ruby.html#comments 1 (Paul) Developer works are running a fantastic article on how to use Ruby to <a href="">mine Twitter for data</a>. It comes complete with examples on how to find the locations of your followers, extract information about Twitter users, and looking at the behaviour of twitter users. <br/> <a href=""><img src="" border="0"></a> Thu, 20 Oct 2011 06:55:00 +1100 New series on learning shell scripting. bourne shell 0 (Paul) For anyone who is new to the Unix world, Linux Magazine is running a series of articles on learning shell scripting. <a href="">Part one</a> introduces the basics, while <a href="">part two</a> introduces while loops. <br/> <a href=""><img src="" border="0"></a> Wed, 19 Oct 2011 06:49:48 +1100 Using glade3/gtkbuilder with Ruby gtk ruby 0 (Paul) There's very few examples of how to use Glade3 with Ruby, so after an hour of trial and error, I've put together this simple HelloWorld program that shows how to use it:<br /> <br /> <blockquote><pre>#!/usr/bin/env ruby<br /> <br /> require 'rubygems'<br /> require 'gtk2'<br /> <br /> class HelloGlade<br /> attr :glade<br /> <br /> def initialize<br /> if <u>_FILE_</u> == $0<br /> Gtk.init<br /> builder = Gtk::Builder::new<br /> builder.add_from_file("hello.xml")<br /> builder.connect_signals{ |handler| method(handler) }<br /> @window = builder.get_object("window1")<br /><br /> Gtk.main<br /> end<br /> end<br /> def gtk_main_quit<br /> puts "Gtk.main_quit"<br /> Gtk.main_quit()<br /> end<br /> end<br /> <br /> hello =</pre></blockquote><br /> <br /> <br /> <blockquote><pre><br /> <br /> This can be used with the following XML file:<br /> <br /> <blockquote><pre><?xml version="1.0" encoding="UTF-8"?><br /> <interface><br /> <requires lib="gtk+" version="2.24"/><br /> <object class="GtkWindow" id="window1"><br /> <property name="can_focus">False</property><br /> <child><br /> <object class="GtkButton" id="button1"><br /> <property name="label" translatable="yes">button</property><br /> <property name="visible">True</property><br /> <property name="can_focus">True</property><br /> <property name="receives_default">True</property><br /> <property name="use_action_appearance">False</property><br /> </object><br /> </child><br /> </object><br /> </interface></pre></blockquote><br /> <br/> <a href=""><img src="" border="0"></a> Fri, 07 Oct 2011 11:23:00 +1100 Using textile markup in Django django python 0 (Paul) Django provides the <tt>django.contrib.markup</tt> module for marking up text, but unfortunately, the documentation on it is pretty light. Here's a quick guide to using it:<br /> <br /> Firstly, you'll need the Python Textile module - on Debian or Ubuntu, install the <tt>python-textile</tt> package.<br /> <br /> Then, add <tt>django.contrib.databrowse</tt> to your <tt>INSTALLED_APPS</tt> in <tt></tt>.<br /> <br /> At the top of the template that you want to use the markup in, load in the module with:<br /> <br /> <blockquote><tt>{% load markup %}</tt></blockquote><br /> <br /> ...but make sure it goes <i>after</i> any <tt>extends</tt> calls.<br /> <br /> Now, you can markup any text variables by adding <tt>|textile</tt> to them. For example:<br /> <br /> <blockquote><tt>{{ country.notes|textile }</tt></blockquote><br /> <br/> <a href=""><img src="" border="0"></a> Thu, 01 Sep 2011 13:45:00 +1100 Lazy user signup for Django python 0 (Paul) If you're writing web applications, you've probably found that a user registration page is an anathema to new users - they see a registration form, and it's just too much effort to bother filling in, so they leave.<br /> <br /> In order to combat this, Dan Fairs has written <a href="">django-lazysignup</a>, a Django module that will automatically create a new user for every person who visits your site, which they can later use to create themselves a real account, without losing any of the data that they've used with the site so far. <br/> <a href=""><img src="" border="0"></a> Mon, 25 Apr 2011 11:13:34 +1100 lxml: High-performance Python XML parsing python xml 0 (Paul) <p>Learn how to process large-volume xml data sets in Python using lxml, with this <a href="">in-depth tutorial</a> from IBM Developerworks.</p> <br/> <a href=""><img src="" border="0"></a> Mon, 28 Mar 2011 07:55:29 +1100 Porting Perl to Python perl python 0 (Paul) IBM Developerworks have published a brief article on <a href="">porting Perl code to Python</a>. <br/> <a href=""><img src="" border="0"></a> Thu, 02 Sep 2010 19:20:10 +1100 Perl: reading from a string, as if it was a file,-as-if-it-was-a-file.html perl,-as-if-it-was-a-file.html#comments 0 (Paul) This seems fairly obvious, but somehow, even after fifteen years of Perl exposure, I've only just cottoned on to it now, so presumably this might be of assistance to other people.<br /> <br /> Recently, I needed to read data line by line from a string (rather than from a file). You'd think that this would be a fairly common requirement, but evidently I've managed to either avoid it or fudge it up until now.<br /> <br /> Anyway, there was no getting around it this time, but it turns out to be rather simple - just pass a reference to the variable when calling open():<br /> <br /> <blockquote><tt><br /> my $text = "<i>Some long text</i>";<br /> <br /> open(TEXT,"<", \$text);<br /> <br /> while(<TEXT>) {<br /> # do whatever<br /> }<br /> <br /> close(TEXT);<br /> </tt></blockquote><br /> <br /> That's all there is to it!<br /> <br/> <a href=""><img src="" border="0"></a> Wed, 04 Nov 2009 07:51:00 +1100 Potential language changes for JDK7 java 0 (Paul) Jeremy Manson summarises some <a href="">changes to the Java language</a> that have been proposed as a result of a call by Sun for submissions. <br/> <a href=""><img src="" border="0"></a> Mon, 02 Mar 2009 15:17:00 +1100
|
global_05_local_4_shard_00000656_processed.jsonl/55185
|
Sex chat network is presently the premier supplier of clips and pics. Some of the very best assortments of HD videos offered for you. All clips and pics acquired here for your seeing pleasure. Sex chat, also called live cam is actually an online adult encounter through which a couple of or additional individuals linked from another location via personal computer connection send out one another intimately explicit information defining a adult encounter. In one kind, this fantasy intimacy is actually achieved by participants illustrating their actions and replying to their chat companions in a typically written kind made for encourage their very own adult-related emotions and imaginations. Farrah sex tape occasionally features true life masturbation. The high quality of a farrah sex tape encounter generally relies on the attendees abilities for stimulate a sharp, visceral vision in the consciousness of their companions. Creativity and suspension of shock are additionally critically essential. Farrah sex tape could happen either within the context of already existing or even intimate connections, e.g. one of enthusiasts who are actually geographically separated, or one of people that achieve no previous understanding of one yet another as well as satisfy in digital areas and may even stay confidential in order to one another. In some contexts sex chat cam is actually boosted by use of a web cam in order to send real-time online video of the partners. Channels utilized to begin farrah sex tape are actually not essentially specifically committed to that subject, and also individuals in any type of World wide web converse may immediately receive a notification with any sort of feasible variety of the content "Wanna cam?". Farrah sex tape is actually frequently done in Net chatroom (like announcers or even net conversations) and also on instantaneous messaging devices. That could likewise be performed using webcams, voice converse units, or on the internet video games. The particular definition of farrah sex tape particularly, whether real-life masturbatory stimulation ought to be actually occurring for the online intimacy act for await as sex chat cam is actually game discussion. Farrah sex tape might also be done thru utilize characters in a consumer program atmosphere. Text-based sex chat cam has actually been in technique for many years, the boosted attraction of cams has actually boosted the amount of online partners utilizing two-way online video hookups for subject on their own to each some other online-- offering the show of farrah sex tape a much more graphic part. There are actually a quantity of prominent, professional web cam sites that permit individuals for freely masturbate on cam while others monitor them. Utilizing similar websites, couples can also perform on camera for the enjoyment of others. Farrah sex tape differs from phone adult in that it delivers a greater diploma of privacy as well as permits attendees in order to satisfy partners more simply. A bargain of sex chat cam takes spot between partners who have simply met online. Unlike phone lovemaking, sex chat cam in chatroom is actually hardly professional. Farrah sex tape may be utilized in order to compose co-written original fiction and also supporter fiction through role-playing in 3rd individual, in forums or areas normally understood by the title of a shared goal. It can also be actually utilized for acquire experience for solo article writers who intend to compose even more reasonable intimacy scenarios, by swapping tips. One technique for cam is actually a simulation of genuine lovemaking, when participants make an effort to make the encounter as near the real world as feasible, with participants taking turns creating definitive, adult explicit passages. It can easily be actually taken into account a form of adult task play that enables the participants in order to experience uncommon adult-related sensations and also tote out adult experiments they can easily not attempt in truth. Among major role players, cam may happen as portion of a larger scheme-- the roles consisted of could be actually fans or even spouses. In situations like this, the folks keying in typically consider on their own individual bodies from the "people" participating in the adult-related actions, long as the writer of a story frequently carries out not fully relate to his or her characters. Due for this difference, such task players generally like the term "adult play" prefer to than sex chat cam in order to define it. In genuine camera persons often stay in character throughout the whole entire lifestyle of the get in touch with, to include advancing in to phone lovemaking as a form of improvisation, or, almost, a performance art. Commonly these individuals create sophisticated past histories for their personalities for create the imagination much more everyday life like, thereby the advancement of the condition true cam. Farrah sex tape delivers various benefits: Since sex chat cam may satisfy some adult desires without the hazard of adult ailment or maternity, that is a physically secure means for young folks (like with adolescents) to try out adult thoughts and emotions. Furthermore, people with long-term disorders can easily take part in farrah sex tape as a method in order to securely accomplish adult-related gratification without uploading their companions at danger. Farrah sex tape allows real-life partners who are literally split up for carry on in order to be actually intimately intimate. In geographically separated connections, this could work to receive the adult measurement of a relationship where the companions see one another only occasionally face for confront. Also, that can easily permit companions in order to work out issues that they achieve in their lovemaking everyday life that they experience uncomfortable taking up otherwise. Farrah sex tape enables adult exploration. For instance, this can allow participants for act out imaginations which they would certainly not play out (or even maybe would certainly not perhaps even be reasonably possible) in the real world via function playing because of bodily or social limits as well as prospective for misinterpreting. It gets less effort and also fewer resources on the web than in the real world in order to connect for an individual like oneself or with who an even more significant partnership is actually feasible. On top of that, farrah sex tape permits flash adult-related encounters, alongside quick response and gratification. Farrah sex tape permits each user in order to have manage. Each event has complete management over the duration of a webcam session. Farrah sex tape is actually often criticized since the companions regularly possess baby verifiable expertise about each some other. Given that for many the major fact of sex chat cam is the possible likeness of adult task, this knowledge is not constantly preferred or needed, and also may in fact be desirable. Privacy concerns are a challenge with sex chat cam, since individuals could log or document the interaction without the others knowledge, and also possibly disclose it in order to others or even everyone. There is difference over whether sex chat cam is a kind of unfaithfulness. While this performs not consist of physical get in touch with, critics claim that the strong emotions included may create marriage worry, specifically when sex chat cam tops off in an internet passion. In many known cases, internet infidelity turned into the premises for which a husband and wife separated. Counselors mention an increasing variety of individuals addicted in order to this task, a type of each on-line obsession and also adult-related dependency, with the conventional complications associated with addicting habits. Come to feistypantsanna later.
Other: ultimate sex chat - sexchat, tylahr,
|
global_05_local_4_shard_00000656_processed.jsonl/55192
|
Categories > Celebrities > Dir en grey > Lonely wishes
by fihsh 0 Reviews
Shinya wants Die, but he can't have him. He resorts to what he can to make himself happy, even if it's only temporary.
Category: Dir en grey - Rating: R - Genres: Angst - Characters: Die, Shinya - Published: 2007/06/06 - Updated: 2007/06/06 - 534 words
disclaimer; i can only own the members of dir en grey in my dreams... other than that, i own nothinggggggggggggggggg.
Shinya's POV, he's having a phone conversation with Die (if you couldn't figure that out) and there's some masturbation & such.
This is only the first chapter. There will be more (I promise!!)
Why does it have to hurt so much when you show me pictures of her? Why am I the only one of us that has to feel alone at night while you tell me about how you think she's the perfect one for you? It's not her. It really isn't, I just wish you could see that.
I turned on my bed, cursing the tears that spilled from my eyes. I wiped them away quickly, hoping you wouldn't notice over the phone.
"Shinya... Shinya? Are you there?"
"Are you okay?"
I wiped my eyes again and coughed a little, "Of course I am, Die."
"If you're tired... you can go to sleep or something."
"I'm fine, I promise. Don't worry about me Die, you have more important things to worry about."
"No, no, of course I'll worry about you."
"Whatever you say," I sighed softly, burying my face into the pillow. I wished that he was lying next to me instead of that stupid girl.
"God, I still can't believe it. She's so amazing! You have to meet her. I'll bring her to practice tomorrow, how about that? Does that sound good?"
"Yeah... I can't wait," I said as sincerely as I could, which turned out to be very little.
"...You sound tired, you should get rest."
"Alright," I sighed softly, "I'll see you tomorrow."
"Yeah... yeah, bye."
I stared at the phone for a few minutes, even after it said 'Call ended'. I looked down and knew that Die was straight. I knew that he had a girlfriend that he was infatuated with. I knew he could never be mine.
I knew all of this, but still, I could dream of him being mine, couldn't I? I forced the image of him over me, telling me he loved me, kissing me everywhere that made me moan.
I writhed on the bed, his name unknowingly leaving my lips. I felt his hand around me, stroking me, it had to be him. I could hear his heavy breathing, see his vivid red hair falling over his shoulders and sticking to his sweaty skin.
"Die..." I breathed; my back arching. "I love you... I love you," I repeated.
"I love you too," I heard him just as I climaxed. I felt the warm, sticky liquid run over my hand.
I fell back, my chest heaving. So it was a just dream.
I pulled my hand out of my boxers and wiped my hand off on the fabric of the bedspread. I turned over and I felt the tears in my eyes again.
How could I have resorted something so low as masturbating to my best friend's image? Tears poured from my eyes, and I got up. I moved out to the couch and laid on it, I couldn't sleep in my own bed, knowing what had happened, knowing how pathetic I was.
Log in to rate and review this story
Log in!
Register Lost password
Featured Story
• Heroes
by sunflower1343 (PG)
In: Viewfinder
Site Stats
• Authors: 607765
• Stories: 40295
Recent Stories
|
global_05_local_4_shard_00000656_processed.jsonl/55205
|
From a T-shirt sold by a local entrepreneur
From a T-shirt sold by a local entrepreneur
O bliss! O rapture! The RNC is coming to town. The traffic headaches, the commandeered parking ramps. The cops newly outfitted with tasers. I think I’ll pass, thanks.
But the Republican National Committee is at least providing the locals with a source of mordant amusement, as shown by who and what is getting blogger and media credentials to cover their shindig. The Minnesota Independent (formerly the Minnesota Monitor) applied for credentials and was turned down; the same thing happened to MNBlue. Because, you know, reality has a well-known liberal bias, as Stephen Colbert says.
So who is getting media credentials? Oh, guys like Michael Brodkorb, the alleged "independent" dude who is a paid Republican activist. And the right-wing blogger collective known as Look True North, of which Ed Morrisey (formerly of Captain’s Quarters, now of Michelle Malkin) is a member. Charming individuals, all. Many of them also have local radio shows, as part of the Northern Alliance Radio Network.
But the person who the nation really must see associated with the Republican Brand is a Saint Paul fellow named Tom "Swiftee" Swift. Swiftee’s blog, Pair o’ Dice, was in remission for many months, and it was believed that either he’d gone in for anger-management therapy or he’d finally had that fatal brain embolism that the temper of his writing seemed to presage. But no, he is not only still very much with us, he’s going to be liveblogging the doings at the Xcel Center.
To understand what a big deal this is, one has to know a little bit about Swiftee’s history. Put on your gas masks.
For instance, here we have Swiftee being caught at one of his favorite pastimes, the fine internet art of ‘name-stealing’, or pretending to be somebody you don’t like and trying to cause trouble while doing so. As the proprietor of the blog that caught him at it said:
Swiftee, you have the ability to post whatever you want about me. You’ve already targeted me at work. I’ve gotten disciplined for it. You have no idea what the quality of my work is – and it’s not really your business. You are not my supervisor.
So at this point, you are banned from Dump Bachmann for two weeks. This has nothing to do with banning your opinion. It’s banning you because you harrass other commenters and me.
Gee, sounds like Swiftee’s the sort of right-wing trollie that hunts you down and lies about you to your boss. (And, apparently, to other people as well.) Whatta guy! Yet as Mark Gisleson pointed out, Swiftee’s bad behavior doesn’t stop pretty much every local right-wing blogger from linking to him, if not outright teaming up with him.
Of course, it could be that they love him so much because he’s so loyal to the cause and the Stainless Banner. It’s telling to see what happens when he swings into action to defend his political allies — as he did last fall when his good buddy Andy Aplikowski, the proprietor of the Residual Forces blog (and also a credentialed RNC media attendee) tried to back away from some of his wilder statements in an interview for Minnesota Monitor. As you’ve probably guessed, Aplikowski isn’t himself the brightest bulb on the Christmas tree. As Jeff Fecke, the person who interviewed Aplikowski, said upon making available the full interview transcript: "I’m not sure what the GOP gains by one of its district chairs willfully misleading a reporter, and would frankly question whether Andy is just backing quickly off of some of the statements he made. But the transcript is up, if anyone wants to see it." Then again, since trolling and dirty tricks are a staple of the modern Republican Party, this shouldn’t surprise anyone.
You can just imagine how lovely the first week of September is going to be around here, can’t you?
|
global_05_local_4_shard_00000656_processed.jsonl/55215
|
Thursday, September 25, 2008
Screenweaver - an open source alternative to AIR?
I don't have a detailed post this week as I've been working on cleaning up and refactoring my IOC project for launch next week (I hope). However here's a few interesting links:
• haXe - A multi-platform language with a fairly pleasant syntax based on ECMAScript. You can write code in haXe and compile to SWF (Flash 6 to Flash 9), ActionScript (this isn't too good, I've run into problems), JavaScript, and PHP. It also compiles to NekoVM...
• Screenweaver Open Source - This is a bridge between Flash and NekoVM, for Windows and Mac OS. You can do all your GUI code in ActionScript, or you can do it all in haXe as it compiles to SWF as well as NekoVM.
I Haven't played with Screenweaver yet, but I plan on it in the near future! And of course when I do I'll be posting my progress here :)
Monday, September 22, 2008
Internet Explorer
Groan. I think the site's working in IE6 now. Debugging HTML on Explorer (without parallels or a Windows box handy) is pain. This is why I do Flex these days.
Thursday, September 18, 2008
Vertical Scrollbars and 100% width content
I've often wished Flex would simply shrink the available width of my containers when their contents grow too tall, but alas, often you'll find yourself with a horizontal scrollbar that only exists to show you the content that's just been hidden by the vertical scrollbar that wasn't there a minute ago!
It's a common question, and the Adobe guys had their reasons for making it how it is. Not much consolation for the rest of us though! So, a (perhaps not the, but a) solution:
package info.joshmcdonald.barra.components
Shameless self-promotion: I've created a google code project for code examples and utils from my blog.
import flash.display.DisplayObject;
import mx.containers.Canvas;
import mx.core.UIComponent;
public class SmartVerticalScroll extends Canvas
override public function addChild(child : DisplayObject) : DisplayObject
return addChildAt(child, numChildren);
override public function addChildAt(child : DisplayObject, index : int) : DisplayObject
if (numChildren > 0)
throw new Error("Only one child, stick a canvas or something in here");
return super.addChildAt(child, index);
Just to keep thing simple, and this example small, we're limiting this to a single child. Not ideal, but we can get away with it by simply using it as a container for a Canvas or a VBox or similar.
override protected function updateDisplayList(unscaledWidth : Number, unscaledHeight : Number) : void
var innerWidth : Number = unscaledWidth - borderMetrics.left - borderMetrics.right;
super.updateDisplayList(unscaledWidth, unscaledHeight);
if (numChildren == 1)
var child : DisplayObject = getChildAt(0);
var uic : UIComponent = child as UIComponent;
if (uic)
if (verticalScrollBar)
var newWidth : Number = Math.max(Math.min(uic.width + uic.x , innerWidth - verticalScrollBar.width), uic.measuredMinWidth);
uic.setActualSize(newWidth, uic.height);
child.x = 0;
child.y = 0;
Here's where half the magic lies. If we have a vertical scrollbar, we'll shrink our child component to fit within it, unless that would violate its minWidth requirement.
override public function validateDisplayList() : void
var before : Boolean = verticalScrollBar == null;
var after : Boolean = verticalScrollBar == null;
if (after != before)
//Scrollbar added or removed - repaint and resize inner component
Here's the other half of the magic. When we determine that Flex's built in layout code has decided to add a vertical scrollbar, we make sure to schedule another call to our updateDisplayList() so we can shrink the content down to get out of the way.
Thursday, September 11, 2008
Bindings, Changewatcher, and memory leaks
I'm building some stuff with a serious potential to leak memory (but it's hella cool, watch this space). Specifically, dealing with binding to and from objects without keeping hard references to them, which is easier said than done! I've been going through the source code to the binding system, and all bindings eventually come down to
1. When you call watch(), you get returned the first of a chain of watchers, one for every host in the chain.
2. Every watcher in the chain with a non-null host has a hard-reference from the host object to itself.
3. Every watcher has a hard-ref to the handler function.
This of course leads to the fact that if you ever throw away your watcher reference before calling unWatch(), you're stuck with a zombie reference from the root of your chain to your handler function. Which means in turn that the host object is hard-referenced to anything within the handler function's scope. If the root of your chain happens to be Application, or anything else that lives the life of your app, you're almost certainly leaking memory.
I'd love to be wrong about my conclusions, but I don't think I am. I'll have to create a test some time over the weekend to prove it though, so I can file a bug (and a fix) with Adobe.
So in conclusion: Be awfully careful what you're putting in the handler function for any hand-created ChangeWatcher, or using BindingUtils!
Note that I don't think it's a problem for MXML bindings: Off the top of my head, if the root host of a binding chain defined in MXML is "A" then the handler function is generated as a member function of "A".
Thursday, September 4, 2008
Using the Proxy class (part 2)
In the first part of this article I demonstrated using the basic Proxy functionality. Now we get to the fun stuff, which we need to support and for constructs.
//Gets the next index. When you return 0, and for will quit.
override flash_proxy function nextNameIndex(index : int) : int
if (index < propertyNames.length)
return index + 1;
return 0;
Here's where the Flex docs get kinda confusing :) The first thing the VM does when you're iterating your Proxy object with or for is call nextNameIndex(0). The docs tell you the input is zero-based, but that's not the case, 0 isn't "first", 1 is. So when flex asks for the "next name from zero" it's actually asking if there's a first name at all. If you've got more properties to iterate, return index + 1. Otherwise, return 0 and the loop will end.
Note that you don't *have* to return index +1. This is how ArrayCollection, ListCollectionView and the like implement filters. But that's another post :)
//Get name[i] where i is 1-based
override flash_proxy function nextName(index : int) : String
return propertyNames[index - 1];
//Get value[i] where index is 1-based.
override flash_proxy function nextValue(index : int) : *
return properties[propertyNames[index - 1]];
These two functions are the other half of the and for loops. After the VM gets the next index from nextNameIndex() it will call one of these two functions. In the case of it will call nextName(), and for for it will call nextValue(). Because we're not doing anything complicated in this example, we just return "properties[index - 1]" (remember Array is 0-based, the Proxy functions are 1-based). If there were more logic in our getProperty() method from the first part of this article, then we'd want to defer to that method rather than duplicate that login in the nextValue() method.
And that's how you use the Proxy class. Now, go build something bad-ass with it :)
Download source.
Using the Proxy class (part 1)
When I first came across the Proxy class, I got rather excited. Dreams of mock objects, cross-cuts, and various other cglib shenanigans danced in my vision. Sadly, it was not to be, and the VM doesn't let you cast Proxy as another class (or interface). However, it has its uses, and I'd like to explain how to use it.
I know it's been done before, but for this example I'm going to re-invent the "bindable dynamic object". The point is to explain the Proxy class :)
Let's get started:
public dynamic class BindableDynamic extends Proxy implements IEventDispatcher
//Actual contents
private var properties : Object = {};
//Property names
private var propertyNames : Array = [];
A few things here:
1. We've annotated the class with [Bindable(event="propertyChange")]. This marks the class as bindable, and because we specify the event name, MXMLC assumes we know what we're doing and doesn't generate any Binding boilerplate for us, which is what we want :)
2. We've got two private variables here: properties, which holds our actual values, and propertyNames, which we'll use as a list of (guess what?) property names!
The Flex docs don't use the propertyNames variable, and instead use a temporary array when iterating the fields using or for, but I like keeping the list around.
Some more code:
//Simple getProperty by name
override flash_proxy function getProperty(name : *) : *
if (!name)
return undefined;
if (!(name in properties))
return undefined;
return properties[name];
//Do we have property x?
override flash_proxy function hasProperty(name : *) : Boolean
return (name in properties);
//Set Property
var oldValue : *;
//Check for existing value
if (name in properties)
//We do have one, we need to retrieve it for comparison and a useful PropertyChangeEvent
oldValue = properties[name];
//Check to see if there's no change (in which case we're out like 3 stripes)
if (oldValue === value)
//If we're here, then this is a new property (not an update)
//Set property
properties[name] = value;
dispatchEvent(PropertyChangeEvent.createUpdateEvent(this, name, oldValue, value));
These functions are pretty self-explanatory. A couple of things might jump out at you if you're new(ish) to ActionScript though:
1. The use of flash_proxy in place of private, public, or internal: In Actionscript, private, public and internal are simply namespaces (but built in and with special meaning). Proxy uses its own namespace so that its methods don't clash with anything you might be trying to intercept. You can also define your own namespaces, and there's an entire blog post (or 8) for me to write about mx_internal and the various fun stuff we can do with it!
2. The in operator: It's not used so much, but I love its elegance. For our intent at the moment, think of it as an analogue to .hasOwnProperty(). There are differences, but for our current purpose either would do, I just prefer it stylistically. If you'd like to read more, check here and here.
3. Finally, we dispatch our own PropertyChangeEvent, which is how we let Binding know it's time to do its thing.
…I'll post part 2 tomorrow, where we get to the fun stuff!
...If this looks borked in IE, email me! I've not had the time to test it since I re-jigged some stuff.
Monday, September 1, 2008
Trivia: The [Mixin] metadata is great, I use it all the time when doing framework stuff. Check it out if you've never heard of it, or if you're calling static code some other way. But make sure you only annotate public classes with [Mixin], or your SWF will explode on frame1 inside of SystemManager :)
This is
• Tales of Flex
• From Brisbane, Australia
• Opinions on Flex development
• Tips and FAQs
• Shameless self-promotion
I am
• Twitterer
• Flexcoder
• Maroon
• Designer
• Java lover
• That loud-mouthed Aussie yob
• Blogger
• Problem solver
• Contributor
• Cricket Fan
• Lousy photographer
• Great cook
I read
Subscribe via RSS to receive updates!
|
global_05_local_4_shard_00000656_processed.jsonl/55235
|
AnimeSuki Forums
Go Back AnimeSuki Forum > Shizuka85
Conversation Between Shizuka85 and Hamtaro623
Showing Visitor Messages 1 to 1 of 1
1. Hamtaro623
2009-01-23 23:39
Hey there! I love the fanart you have! Its so cute <3
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2014, vBulletin Solutions, Inc.
We use Silk.
|
global_05_local_4_shard_00000656_processed.jsonl/55239
|
Area :: Header
Interested in making Indie games?
Discussion Groups
3ds Max CAT
Active Member
Posts: 7
Registered: 09-14-2009
Fix my little error
6 Views, 0 Replies
04-02-2012 03:08 PM
When I press "Turn On Animation" button, I can see that my bones twists for a little bid. Probably somewhere before, I actually did twist them, while keeping animation on (stupid me). is there now some way to fix that error?
Please use plain text.
|
global_05_local_4_shard_00000656_processed.jsonl/55259
|
View Single Post
Old 04-13-2013, 06:47 PM #206
Banned User
Join Date: Mar 2013
Posts: 1,005
Default Re: What Nolan does poorest. Villain Endings
Monster as in behemoth. It's huge, bloated with "stuff". You've got multiple characters (with nearly half being unimportant secondaries) with multiple plot points converging. Yeah, we can process it and I'd be lying if some of the concepts and ideas weren't cool but it just seems like a mess. Like a an early, early draft with all these ideas that need to be revised and cut.
We're in Gotham, now we're in an unknown pit in the ground. Oh, here's a bomb. Blake just killed a guy, oh snap they're gonna kill Gordon! No they're not, Gordon just took them out. Final Batman and Bane fight? Let's cut away to two other happenings across the city like Episode I the Phantom Menace while this chant is booming.
For me all of TDKR makes the Dark Knight's third act seem clean and slow.
It wouldn't have hurt the film if they took their time in some places. It shouldn't be a presentation of sprinting to the end. Certain areas of the movie should set the mood. How about one of the first scenes we ever saw in a trailer? Where Bruce (or ski-masked "Batman") visits Gordon in the hospital for the first time in 8 years? That should be a thoughtful, touching scene that takes it's time. Show Gordon's response to seeing his old friend since "that night" after this stranger comes through the window. Show the shock. Don't just cut quickly and skip things where you have Bruce going down the window, then right at Gordon's side with less than a minute left. That's a BIG moment isn't it? Hell, they spend more time with Bane and Bruce in the pit with Bane's speech then they do with that scene.
No time to savor it, take it all in. Most of the movie is like that. BAM, BAM, BAM, throwing mud on the wall and hoping it sticks. I don't think anyone expects Tarantino like dialogue or scenes where it's all about slow build up and character interaction but a little more "being in the moment" would be nice instead of racing off to stop plot device A or B every 20 seconds.
You blame the editor, I blame the story tellers. The editor has to make sense of what was shot and make it as close to the script as possible. I watch TDKR and it seems just like the script (except with some touching, long moments, like exchanges between characters such as Bruce and Alfred cut out) come to life. How that's the editor's fault is beyond me. Not when you're dealing with all of this story and locations and characters.
Last edited by milost; 04-13-2013 at 06:53 PM.
milost is offline Reply With Quote
|
global_05_local_4_shard_00000656_processed.jsonl/55264
|
Skip to content
My WebMD Sign In, Sign Up
Calcium Absorption
Anon_39147 posted:
I have read that calcium in some green vegetables, such kale or bok choy, is more easily absorbed by the body than calcium in milk. Is there any factual basis for this?
bonebabe responded:
No. Only if you're lactose intolerant.
Elizabeth_WebMD_Staff responded:
Hello Anon -
The key to absorption is Vitamin D. See these resources for more information -
Top Food Sources for Calcium & Vitamin D
Food for Strong Bones - Slideshow
lindatieger responded:
The calcium in bok choy and kale are better absorbed than (cow's) milk. Actually, almond milk is better than regular milk. Check the internet for articles on milk--it is no longer accepted as a good source for calcium. Also check out The Better Bones website as well as for good info.
Anon_39147 replied to lindatieger's response:
Lindatieger, thank you very much on the information on almond milk. I have started to drink it. Not sure all nutritional information on the web site is up-to-date. Spinach is listed as one of the top sources for calcium. I thought spinach does have calcium but also oxalate so your body can't absorb the calcium.
Helpful Tips
Bisphosphonate use in premenopausal womenExpert
Was this Helpful?
17 of 26 found this helpful
Related News
There was an error with this newsfeed
Related Drug Reviews
• Drug Name User Reviews
Report Problems With Your Medications to the FDA
For more information, visit the National Osteoporosis Foundation website
|
global_05_local_4_shard_00000656_processed.jsonl/55266
|
What Did Adam Know And When Did He Know It?
GENESIS 1:1–6:8
By Lore Segal
• Print
• Share Share
We breathe Genesis with the air, as if we need never to have read a Bible to list the creation of light and dark, land, sea and heaven, animals and vegetables, time, work and holiday, and the beautiful idea that these things are Good with the inevitable corollary that other things are Bad, followed, hard on the heels, by the question of whose fault that is. Who remembers the movie in which the little fat Hungarian character cries, “I didn’t did! I didn’t did it!”? The story of Adam and Eve says that one of our prime instincts is to claim it was somebody else.
The creation of female out of the male — our simultaneous creation, alternatively, in two sexes — is immediately followed by the commission of the first sin, and the game of blame can begin. Adam says Eve did it; Eve says the serpent made her do it; the serpent has the grace, at least, to keep quiet.
We are to take God’s word for it that sin is what causes death, though something tells us it ain’t necessarily so. The serpent was the first to raise a doubt. God blames all three of them — man, woman and beast — and metes out their appropriate punishments. Christianity will come and blame all of Eve’s unborn children.
Male and female have — or used to have — different styles of blaming and being blamed. We understand Eve to have sinned as a woman, whereas Adam sinned as a representative of the human. The female was the root of all evil until feminist days, when the root changed gender and turned male. How does the story of Adam and Eve distribute the degree of blame for that original sin?
It’s interesting to check our own participation in filling what Erich Auerbach, author of a classic study on the literary aspects of the Bible, has called the background — the spaces that the Bible’s lean narrative leaves blank. Where does our imagination locate the man while the beast is suborning the woman? What do we imagine him to have been doing up to the moment when he walks onto the scene to be given his bite of apple? Are we surprised that the Hebrew text — I checked it out with my friend Rabbi Jules Harlow — places Adam right there — right next to Eve?
The King James Bible is correct: Eve, having listed the attractions of the forbidden tree, “took of the fruit thereof, and did eat, and gave also unto her husband with her” (emphasis added). Luther, Buber-Rosenzweig, Everett Fox and the New American Bible are among the translations that render the meaning of the Hebrew immah as “with her” or “beside her.” How is it that Rabbi Aryeh Kaplan, Robert Alter and the Oxford Study Bible, for example, drop the word out of the sentence?
The Jewish Publication Society translation, too, reads: “She took of the fruit and ate. She also gave to her husband and he ate.” Nahum Sarna corrects the omission in his commentary and notes that the serpent uses the plural address, so it must be talking to both Eve and Adam, “suggesting that he was a full participant in the sin, thereby refuting in advance his later excuses.” Saint Augustine gives the matter a gallant spin: It was out of love for Eve that Adam chose to sin with her, and Rashi says Adam sinned so that Eve would not die and leave him alive to marry another; Adam chose to be with her in death as in life. How human of him, then, that before the day is over, he’s put the blame on her.
I want to suggest that it is so uncomfortable to have to imagine Adam voicelessly “with” or “beside” Eve while she disputes with the tempter that pious scholarship prefers to think him away.
Look at a different kind of narrative that also manages to remove the awkward presence of the ineffectual male. Where are the fairy tale fathers — what are they doing — while the witch-stepmother mistreats the children? The men are away. They are away on business or out hunting, not, in any case, present at the commission of the ugly evil. Only Hansel and Gretel’s father is a reluctant and impotent presence on the page. Are we puzzled that he gets to share in the happily-ever-after? Wouldn’t we prefer him to have been away on business or out hunting instead of beside or with his wicked partner?
In the Adam and Eve story, God blames and punishes man and woman equally. Interesting that the narrative has another agenda: It spotlights the sin of the woman. Whether absent or silently present, Adam plays the lesser part of accessory. He’s not the patriarchal force but a wordless incompetent. He can be translated right off the page and hardly be missed, reminding me of some fathers and grandfathers in my own family.
Find us on Facebook!
• Step into the Iron Dome with Tuvia Tenenbom.
• What do you think of Wonder Woman's new look?
• Is boredom un-Jewish?
• Let's face it: there's really only one Katz's Delicatessen.
• from-cache
Would you like to receive updates about new stories?
Already subscribed? Manage your subscription.
|
global_05_local_4_shard_00000656_processed.jsonl/55272
|
Installing ooo-build for development
In order to install the freshly built ooo-build, run
make dev-install
This installs ooo-build in the build/install directory of the source tree. Once done, you can launch ooo-build this way:
cd build/install/program
source ooenv
This is equivalent to the following with the installation dir path set to build/install
bin/ooinstall -l <installation dir path>
Notice the -l option given to the ooinstall script, which sets symbolic links to the shared libraries in the build directory instead of copying them into the installation directory. This saves disk space since it avoids making duplicated binaries. But more importantly, it makes it more efficient to make changes to the code, re-build it and test the change in the installation since you don't have to overwrite the libraries after each re-build. But keep in mind that, you do need to source the ooenv script when you install ooo-build with an -l option, or else the application would fail to start and probably crash right after the splash screen.
Up-stream/ooo-build boundary
When hacking, you have to use the up-stream tools to build parts of OOo. The boundary is the build/ subdirectory of ooo-build, ie. when you get to build/ooo320-m12, you are leaving ooo-build, and have to use the up-stream tools.
The ooo-build additions are stored as patches in the patches/ subdirectory of ooo-build. Read the Managing patches section of the Contributing page for more info about this.
My first hack
So - we've built and run OO.o, and we want to prove to ourselves that it is in fact possible to hack on it. So in a new terminal do this:
cd build/ooo320-m12
. ./
cd vcl
Now have a hack at vcl/source/window/menu.cxx (Menu::Set``?ItemText); (near line 1770) I suggest manually applying this change:
- pData->aText = rStr;
+ pData->aText = String(rStr).Reverse();
Then save. (You can find more things to hack in the Tutorials.)
You're still in vcl/ yes ? then type 'build debug=true'; wait for the scrolling text to stop; (5 seconds?). Now re-run soffice -writer. You should notice the effect in the menus. If not, ensure the previous soffice.bin was dead with killall -9 soffice.bin
Note: for day to day hacking you want to just run 'build' inside the source tree. It is also highly recommended to work inside a copy of the build tree, and generate / test patches in an un-hacked version. To copy just the build/ooo300-m12 directory elsewhere, you need to use the bin/relocate tool.
My real hack
Where to start with hacking? The best is to fix something you personally hate in OOo. Do you have a document that crashes, but nobody seems to care? Is there a feature you'd love using, but nobody has implemented it yet? Do it yourself! And when you have finished, please let us know about that - please see the Contributing page.
Coding conventions
First thing you'll notice is that the tabs are not 8 spaces, but 4 - please setup your favorite text editor to reflect that, otherwise you'll see the source code distorted. The second thing you'll notice is that the coding style is not consistent; we don't like that situation, and try to enforce the most usual style where possible:
• For aligning code, never use tab stops, just spaces [vi: set tabstop=4 expandtab]
• 4 spaces for alignment
• '{'s (beginnings of blocks) on new lines, newlines after '}'s
• Spaces after ',', '(', and keywords
• Spaces before ')'
• Variables are named like xName [where x is 'p' for pointers, 'r' for references, 'n' for integer types, 'e' for enums, 'a' for other types]
• Attributes are prefixed with m_ doing m_xName
• Methods use CapitalFirstLetters(), static functions impl_The``Function() So, something like:
void Blah::DoBleh( const rtl::OUString &rString )
m_aBlah = rString;
for ( sal_uInt32 nIndex = 0; nIndex < 10; ++nIndex )
impl_DoBleh( nIndex, m_aBlah );
if ( nIndex > 8 )
impl_DontDoUgh( nIndex );
Read the Fine manual
With the power of C++ comes the ability to shoot yourself in the foot all the more easily; (and implicitly), cf. Holub, Rules for C and C++ programming, Mc``Graw-Hill, 95.
The best way to prepare yourself for battle is to read the OpenOffice coding guidelines, and for the easily confused c'tor / d'tor is short for constructor / destructor.
Also, there's an extensive list of recommended literature about C++ - but that's of course no prerequisite to start coding.
Starting the right app
As you start soffice.bin, there are several useful parameters to use to accelerate your debugging experience; particularly -writer, -calc, -draw, and (the wizardly painful) -impress arguments.
Understanding D' make (man)
While the build system is in similar to many other systems, it is also perhaps slightly different. The overview is that each module is built, and then the results are delivered into the solver. Each module builds against the headers in the solver. Thus there are a few intricacies.
• build — this perl script solenv/bin/ is used in conjunction with prj/build.lst to ensure that every module that is needed is built first. build then un-winds internal module dependencies, and builds each module with a chdir, dmake pair.
• deliver — this perl script solenv/bin/ installs headers, and libraries (etc.) into the solver, as informed by prj/d.lst. Crucially deliver ensures that the date stamp on any file that is installed to the solver is the same as that in the module's directory. This ensures, that (particularly for headers) that there is no dependency cascade triggering re-builds in other modules.
Standard directories
There are various standard directories and files in most of the modules that make up OO.o, here are some of the more useful:
• prj
• build.lst — this lists directories to be made, '^#' comments are allowed, the order of the list is immaterial see the prj/build.lst description below, it is dictates build's operation.
• d.lst — this file describes the deliver process, see prj/d.lst details below.
• util — typically the util directory is charged with glueing together the sub-libraries for each sub-module into a single large library, adding system library dependencies, building GUI resource files etc. All the work is described in, this is usually the last directory to be built in a project.
• inc — public headers are typically separated into an 'inc' directory, these will be installed into the solver by the 'deliver' phase (using prj/d.lst) Build's mode of operation is to invoke 'dmake' in each of the projects' directories with a given dependency order. dmake then executes the rules in
On first view build.lst looks scary:
vc vcl : NAS:nas FREETYPE:freetype psprint rsc sot ucbhelper unotools sysui NULL
vc vcl usr1 - all vc_mkout NULL
vc vcl\source\unotypes nmake - all vc_unot NULL
vc vcl\source\glyphs nmake - all vc_glyphs vc_unot NULL
vc vcl\mac\source\src nmake - m vc__srcm vc_unot NULL
vc vcl\util nmake - all
vc_util vc__plug.u vc__appa.u vc__appm.m vc__appu.u vc__appw.w vc__gdim.m
vc__gdiu.u vc__gdiw.w vc__srcm.m vc__srcu.u vc__srcw.w
vc__wina.u vc__winm.m vc__winu.u vc__winw.w vc__du.u
vc__gtka.u vc__gtkw.u vc__gtkg.u vc__kde.u vc_app
vc_ctrl vc_gdi vc_hlp vc_src vc_win vc_glyphs NULL
so we need to try and un-pack what's going on here, which is in fact not as odd as it might seem at first glance. Firstly lists are terminated by the 'NULL' string. Every line is prefixed by a shortcut which has to be unique, no two modules are allowed to have the same shortcut.
• First active line contains a ':', this describes the fact that this project (vcl) depends on these other modules nas, freetype, psprint etc. to be built first. This is for inter-project dependencies.
• Some modules have a CAPITALS:lowercase arrangement; the first segment is a conditional, driven by a space delimited list in the BUILD_TYPE environment variable at build time.
• Then we have a redundant line 'usr1' [ for fun ? ], in fact only lines containing the magic string 'nmake' are valid after this.
• The next lines describe internal project directory dependencies and look like:
[shortcut] [path to dir to build] nmake - [flags] [unique-name] [deps...] NULL
vc vcl\source\glyphs nmake - all vc_glyphs vc_unot NULL
• shortcut is not used; flags determines which platforms this builds on; usually single char platform codes: 'dnpum' 'u' being Unix. The higher up the system, the more stuff is flagged 'all'. unique-name this is a magic name, used by other lines to describe an internal dependency. deps... any number of names of other directories in this file, that must be built before this one. If such prerequisite dir is built for special platforms only, the platform code has to be appended to its magic name. So we see in the vcl case that vcl\source\unotypes (vc_unot) has to be built before vcl\source\glyphs (vc_glyphs). For Mac vcl\mac\source\src (vcsrcm) has to be built before vcl\util (vc_util) It is important to understand that the order of the list is ~immaterial, and instead of a simple ordered list, we have a more complex internal dependency system — this contrasts with most other make systems.
There is also documentation here on it.
deliver, deliver.log and prj/d.lst
The syntax of d.lst is more comprehensible than build.lst, it omits some default actions, such as copying build.lst into inc/<module>/build.lst.
A line is of the form:
[action]: [arguments]
mkdir: %_DEST%\inc%_EXT%\external
where if '[action]:' is omitted, it defaults to the 'copy' action. Typical actions are copy, mkdir, touch, hedabu, dos and linklib.
The 'hedabu' action is particularly interesting, inasmuch that it cosmetically re-formats the header to shrink it on install and adds the module name to the include path (#include "myheader.hxx"_ becomes #include ). Otherwise it's much like the copy action.
During the action, various macro variables are expanded some of which are:
• %SRC% — distribution directory name eg.
• %_DEST% — absolute path into solver eg. /opt/OpenOffice/OOO_STABLE_1/solver/641/
• %_EXT% — (unusual) way of having minor updates eg. 641.1, typically used to version every base sub-directory. Typically then, if indeed you need to add a rule (cf. implicit directory copies), it will be of the form:
..\%__SRC%\inc\sal\*.h %_DEST%\inc%_EXT%\sal\*.h
NB. relative paths are relative to the 'prj/' directory.
Sometimes you might run into the situation where you'd like to remove the delivered files from solver. Your configuration might have changed and they are no longer needed. "deliver -delete" does just that, however you might still need to delete "deliver.log" files manually as well.
Can I get a char *, please?
Just barely. OO.o has at least six string wrappers, although the C implementations are of little interest:
rtl_String` (sal/inc/rtl/string.h)
"Normal" string plus reference counting. rtlstring->buffer is useful, as is rtlstring->length. This object encapsulates an generic 8bit string - of unknown encoding. Feel free to treat rtlstring->buffer as your beloved char *. If you really want to look at the implementation of some rtl_String function and lxr nor grep can help you, have a look at sal/rtl/source/strtmpl.c.
OString (sal/inc/rtl/string.hxx)
Simply a rtl_String wrapped inside a class; you can use ostring.pData to get at the rtl_String (it's public). OString has reasonably useful methods for if you need them.
rtl_uString (sal/inc/rtl/ustring.h)
"Normal" Unicode string, similar to rtl_String, and refcounted as well. However, this one always comes in UCS-2 encoding, presumably to be compatible with Java's questionable choices. See rtl_String above to find where the implementation of some rtl_uStringfunctions is hidden.
OUString (sal/inc/rtl/ustring.hxx)
An rtl_uString wrapped inside a class. This is what most of the OO.o code uses to pass strings around. To convert an OString to an OUString it is necessary to specify the character set of the OString see; sal/inc/rtl/textenc.h - the only interesting case is RTL_TEXTENCODING_UTF8
String (tools/inc/string.hxx)
This is an obsolete string class, aliased to '?UniString'. It has a number of limitations such as a 64k length limit. You can have the buffer with GetBuffer(), but it's Utf-16 encoded.
A couple of conversion functions are really useful here, particularly:
// OUString -> OString
rtl::OString aOString = ::rtl::OUStringToOString( aOUString, RTL_TEXTENCODING_UTF8 );
// OString -> OUString
rtl::OUString aOUString = ::rtl::OStringToOUString( aOString, RTL_TEXTENCODING_UTF8 );
If you just want to programattically print out a string for debugging purposes you probably want define a macro like:
// Use it:
printf( "SvXMLNamespaceMap::AddIfKnown : %s / %s\n", CHAR_POINTER(rPrefix), CHAR_POINTER(rName) );
// For the obsolete String class, aliased UniString, it's like:
printf( "rGrfName : %s\n", ByteString( rGrfName, RTL_TEXTENCODING_UTF8).GetBuffer() );
To print the value of rtl::OUString directly in the debugger, you can use dbg_dump(). It is intended to be called interactively from the debugger, in both debug and non-debug builds of OOo. You can see the definition in sal/rtl/source/debugprint.cxx.
Some code snippets about manipulating those objects can be found on the codesnippets service page : []
Linkoo & Limitations
Linkoo is the tool that implements the -l functionality of bin/ooinstall. It essentially sym-links files of similar names into your local tree, allowing a fast development iteration.
It is however slightly limited - some of the modules cannot be linked for various reasons; these are: cppuhelper and configmgr, thus in the rare case that these are altered, they must be copied manually into /opt/OOInstall/program.
In addition symlinks cannot be used for soffice.bin, and this is more commonly altered - it has to be installed from desktop/ NB. with an appended '.bin'
Now you probably want to continue with the DebuggingIt pages.
|
global_05_local_4_shard_00000656_processed.jsonl/55274
|
Lord Acton
Tuesday, February 7, 2012
Structured Criticality: The Bigger Picture
Many are concerned that the US is well on it's way to take the road traveled by Germany in the 1930s, and Russia before it into totalitarianism. Certainly actions taken in the last 10 years give evidence to that trajectory (NDAA, PATRIOT Act, Enemy Expatriation Act, etc). These issues are grave certainly, and left unchecked could lead to a very bad scenario. However I think many individuals analyzing these events and planning for potential countermeasures of these acts are missing pieces to the larger picture. The US and many other modern nations are acceleratingly racing towards structured criticality. The US government has become too large in it's current form to survive as a top-down hierarchical power where control remains in Washington DC. The US federal government is approaching structural failure (but the US is not alone).
(From Wikipedia):
Consider a pile of sand. If you drop one grain of sand on top of this pile every second, the pile will continue to grow in the shape of a cone. The general shape, size, and growth of this cone is fairly easy to model as a function of the rate at which new sand grains are added, the size and shape of the grains, and the number of grains in the pile.
The pile retains its shape because occasionally a new grain of sand will trigger an avalanche which causes some number of grains to slide down the side of the cone into new positions.
However, the aggregate behavior of avalanches can be modeled statistically with some accuracy. For example, you can reasonably predict the frequency of avalanche events of different sizes.
The avalanches are caused when the impact of a new grain of sand is sufficient to dislodge some group of sand grains. If that group is dislodged then its motion may be sufficient to cause a cascade failure in some neighboring groups, while other groups that are nearby may be strong enough to absorb the energy of the event without being disturbed.
Each group of sand grains can be thought of as a sub-system with its own state, and each sub-system can be made up of other sub-systems, and so on. In this way you can imagine the sand pile as a complex system made up of sub-systems ultimately made up of individual grains of sand (yet another sub-system). Each of these sub-systems are more or less likely to suffer a cascade failure. Those that are likely to fail and reorganize can be said to be in a critical state.
Put another way, the likelihood that any particular sub-system will fail (or experience a particular event) can be called its criticality.
We arrive that the US and other connected powers are approaching this point through qualitative, historical and empirical data. The US has suffered unprecedented regulatory capture by the financial industry and others that historically has always led to a collapse (devaluation or hyperinflation) of the monetary system - This Time is Different - Reinhart and RogoffWillful and systemic accounting control fraud has also become epidemic with essentially zero resistance by any branch of government (Bill Black -The Best Way to Rob a Bank is to Own One) Also, as governments grow and engineer their environment, they become increasingly fragile and vulnerable to convexity effects (fat tails), all the while their erroneous actions become larger in amplitude. Put differently, they self destruct (such as the ancient Egyptian empire). Some of these ideas and more are discussed in Nassim Taleb's "The Black Swan of Cairo" (essential reading). The US government gas grown to the scale in which it cannot effect control on it's environment; the sand pile is starting to slide. The net effect is that the next stable state of the environment will be more local control of government (states and municipalities) in combination with more control and influence through self organizing systems (the Internet, real price systems and social media). Self organizing systems are effectively scale-free.
What does structured criticality of western countries (and some eastern countries) have to do with the totalitarian direction of movement by governments? Put simply, these forces will interactThe trend towards totalitarianism may very likely increase the velocity towards structured criticality and cascade failure. Similarly, the governments approaching criticality will become less effective totalitarian systems. However, during the change state things become more fluid, increasing the danger of evil getting temporary control, and also offering powers of good to shape the end-state. The goal should be to survive the cascade failure and use it to enact positive change. The message of hope is that totalitarianism is not a stable state, and will be naturally repelled. If resistance becomes necessary, those forces of resistance will have the wind and other forces of nature at their back. Totalitarianism, if implemented as policy, will be ephemeral.
There is downside however. Some governments could fail in a very dangerous way, e.g. starting a nuclear war thereby killing thousands or millions of innocents. All efforts should be made to prevent this, however most of the people who understand are in no position to sway government policy. There is an excellent paper discussing a more minor failure (not all failures are to the magnitude which we are facing) here: The Inherent Limits of Organizational Structure and the Unfulfilled Role of Hierarchy: Lessons from a Near-War
There are several potential policy choices remaining. Just as cannon or charges are placed on a mountain to attempt steering or prematurely and more safely trigger avalanches, it is theoretically possible to trigger the cascade failure prematurely to steer away from a possibly catastrophic policy decision, or trigger the cascade now before it becomes bigger. The blowback and unintended consequences could be tremendously bad however. The media and pubic always blame the catalyst for the collapse, not the structural fragility of the system. A second and potentially more important action is to encourage state and local communities to prepare for a cascade event. By local communities planning and implementing redundancies, contingencies, monetary substitutes and preparing for a sudden failure at the federal level it will increase the robustness of that community.
Tuesday, January 3, 2012
Wargaming a hostile takeover of a Western Government: Part 1
I want to conduct a thought experiment: how could the US fall into dictatorship and / or totalitarian rule with the current sociopolitical background for the country? What (friendly) forces are likely to slow, resist, or attenuate that movement. Let's paint some scenarios.
Background: Extreme economic stress, perceived social injustice, inflation, war (Iraq, Afghanistan, etc.)
Watch the following video starting at 5:00:
Disclaimer: All of the information and ideas of "evil people" that follow are completely fictional and are not intended to apply to anyone currently serving in government office. Any similarities are purely coincidental and unintended.
Assume a purely evil individual with aspirations for absolute power is elected into some position of government, to speed things up in this scenario, we'll assume they have been elected Speaker, Senate leader, Fed Chairman, President or PM. How could they completely obliterate the remaining constitutional defenses of the people, and make themselves dictatorial ruler? In the case of this evil individual being elected office, or appointed to a position other than President, they would have an additional step to marginalize, imprison, impeach and /or move out of the way the sitting executive. That would be a difficult task, but not without historical precedent in world history.
This scenario overlooks another important possibility. What if a perfectly average politician is thrust into a scenario where the overall environment is severe social and economic stress, and in which the checks to his or her use of power are dismantled and removed, as is currently in process? That individual imagines they can "engineer" a solution. The only task remains to get rid of any obstacles to implementation of that "solution". They rationalize and believe the ends justify the means. Is the dictator evil, or does the absolute power make the dictator evil, or some combination? Most importantly, does the dictator choose the nation, or does the nation choose a dictator? Both?
How would this individual get such popular support? I highly recommend watching the whole movie that was linked above, "Die Welle". Here is the trailer:
In my next post I will discuss the resistance to such government takeovers, and strategies for a totalitarian ruler to attenuate those forces.
Monday, December 26, 2011
Lessons Learned: The financial collapse of a modern nation
no more runway
I've been doing some deeper thinking on what may be in store for us in the West once the prevailing economic forces of gravity cannot be delayed, or further pushed any longer. This led me to look back historically at other similar situations, beyond those I've analyzed to death (Weimar Germany, Ancient Rome, Argentina, and the US in the 1970s). This led me to think on a conversation I had with a friend of mine from Poland about the Soviet collapse. So I did some research and found an excellent paper on the topic which had elements eerily similar to present time.
Lessons from the Russian Meltdown - The Economics of Soft Legal Constraints: by Enrico Perotti
Several themes of note that should be on the radar are cash stripping, and rational collective non-compliance of law. I remember talking to my Polish friend about the hyperinflation in the 90s during which he described the asset stripping of everything of value from anything that wasn't nailed down (copper from houses, lead, aluminum, anything that could be turned into cash). This cash stripping happened at the institutional level as well, executives stripped assets and cash from companies, dumped it in shell corporations, which vanished overnight.
This was able to happen because of the sheer volume of illegal activity that was going on:
Fiscal authorities are forced to tolerate arrears, thus validating non-payment. Similarly, regulatory and legal reform cannot be enforced and diffuse criminality cannot be policed. (Perotti 11)
• Stabilization measures enacted which effectively delayed the problem served to increase the severity of the resulting crisis once it couldn't be delayed any further
• The structure of incentives, crony capitalism, and regulatory capture were pervasive and fundamental to the buildup and crash
• State and regulatory capture increased until the collapse
• Many financial institutions were effectively insolvent before the crisis and increased their leverage until the final collapse to gain short term revenue while the management cash stripped the institutions
• Cash-stripping took precedence over productive activity and was pervasive at the institutional down to individual levels
• Individuals taking party to the cash stripping increasingly shipped cash offshore up-to and after the collapse
• Many bankers and white collar thieves were allowed to escape with no legal consequence
• Businesses increasingly switched en masse to barter between firms (demonetization) - as a protection to cash stripping and delayed payment in a high inflationary environment
• The rule of law and tax compliance decreased geometrically as the crisis approached (especially at the institutional level. The low level of enforcement caused more firms to ignore the law, which made it ever decreasingly the likely that the company would be held criminally or otherwise legally liable to enforcement.
• Bailouts increase the future expectation of more bailouts - moral hazard
A really good discussion of collective non-compliance to rule of law follows below:
The main conclusion of this simple model with a 'compliance externality' is that the
degree of compliance depends on the beliefs held by the population about other
agents' behaviour as well as on the credibility of enforcement authorities. If
individuals hold pessimistic beliefs about either, they will all choose to ignore rules
and financial obligations, however low is their individual cost of compliance. The
result is a lack of contractual reliability and the inability of the authorities to enforce
any legal and fiscal obligation.
If government credibility or the legal punishment are high, or the compliance cost is
low, other things being equal compliance will be higher. But note that a
deterioration in any of the parameters has a further effect, as it reduces compliance
indirectly through a reduced probability of punishment.
State capture, of course, reduces the credibility of authorities, as they are expected to
bend rules themselves to accommodate special interests. This may reinforce cynical
expectations of the behaviour of other agents. Coupled with high average
adjustment costs, this creates an expectation of a critical mass of non-compliance,
which will overwhelm the enforcement ability of policy-makers and justify noncompliance.
(Perotti 11)
His formal model of rational collective non-compliance is also very interesting reading. I would be of interest if this qualitatively spilled over into other criminal activity (murder, theft, ets) as well.
Other countries of interest to me that are on my research list include the former Yugoslavia, which surpassed Wiemar Germany's inflation rate by a significant factor.
Wednesday, November 30, 2011
Storm Clouds Gathering
There's a site I found today that I'm pretty impressed with, this video in particular:
Every human being should be shaken to the core by what happened in Germany during the 1930s. However it must also be mulled over as to why Hitler was able to rise to power. All that have read When Money Dies, Dying of Money, or What I saw will know that during times of crisis, of which we are just beginning to experience, extreme individuals are able to garner support and more importantly attain absolute power. I am concerned with the debasement of money, and the possible hyper-inflationary situation the Fed has put us in, but what concerns me more are the consequences. The USA, Europe, China, the UK and every other region under abnormal stress is vulnerable to such monstrosities. We're already seeing the knee-jerk reactions setting the stage already in the US. The McCain bill to allow detention without trial of any individual in the world (including mainstreet, USA) by the US military, setting the stage for special units to pick up an American dissenter from his front porch in Kansas has passed the Senate! I don't think I've ever agreed with Sen. Feinstein, but on this I agree, as she is wholeheartedly against it. So is, by all indications at the moment, Pres. Obama. We should all urge our support against this bill. Please send a message to Obama to veto this dangerous legislation.
Secondly, the SOPA act, (read more here) and the Protect IP act also set the stage for unprecedented Internet filtering and censorship. It's very much like the great wall of China (the new digital one, which "protects" it's citizens from libelous, defamatory, or immoral content). After truly understanding all of the above, and understanding how the level of stress in the US and elsewhere is likely to increase, we should all be very vigilant. Our rights are hanging by a thread, or are under a sword of Damocles, choose your own analogy. There is precious little time left to defend these rights before they are permanently are removed from us, except by unconventional means... We tread on very dangerous ground. Please act now, while we have peaceful means to act.
It is of primary importance for everyone to educate as many people as possible to the truth, to understand the real problems, not the mainstream bullshit narrative, to help them rely on principles, the constitution, and support liberty for every human soul (no exceptions). That is what truly matters and is of primary importance now. By the time the excrement really hits the rotating device and all we have are rule followers, a mass of obedient fools, we are likely to end up in disastrous armed conflict, and a new civil war. That is a truly horrible and grueling scenario. We must make every possible attempt to prevent that eventuality from ever occurring, our children and friends may depend on it.
Tuesday, November 8, 2011
Wost case scenario, financial collapse, government revolution; could a hitler/stalin rise in the America?
Many are discussing as a "worst case scenario" an emergence of a dictatorial power that could grow in the US. It's entirely possible, however I think its important and enlightening to look back at history to understand how these dictators develop grow and become established. In our current time, it's most important to ponder the results, ex-ante, for a post U.S. and global sovereign financial stress and/or collapse. This financial stress and consequential unmeasured aftermath has left the tube already and is in-flight: we are awaiting the imminent effect. What the effects will be, and the intensity are still fungible. Will it be a center-of-mass hit, or to an extremity?
We have very good historical examples in Rome, France, Russia, Germany, and in a micro scale underway now in Afghanistan of the dynamics of emergent governments and how government power develops. In each of these cases a physically and socially violent blow-off top occurred. It's most interesting to focus on Russia, Germany and France, in which a dictatorial type rule emerged fairly quickly. At each time, when the existing government toppled, a existing force was standing ready to take over the roles of the previous government, and garnered support from the military. This shadow government, in each of those cases, began establishing core support before the collapse (Lenin in exile, Robespierre in the assembly, and Hitler in the beer gardens).
When we look back at the historical reference, and extrapolate for our own situation, many are compelled to make comparisons of those in power now, to these ruthless men of the past. That comparison is shortsighted and poorly though out. If the stress to the current system approaches the level necessary to cause a collapse, or tumult, everyone currently responsible in government will be blamed, and by default become ineligible to the public for the next act. It is far more likely that the next actor will come from a shadow government as the historical trend suggests.
So, if a collapse occurs, must it be violent, and inherently evil? I say no. However, this demands that a force-for-good shadow government begin to be developed and nurtured in order to sterilize any evil shadow organizations that seek to take power. I think a Shadow government can be staged and set up peacefully and fully in accordance with the law (as it is today), in the form of an organized and prepared Libertarian, constitutional party, then be vigilant for a possible vacuum to occur. If the status quo begins to falter, the party must seek maximum publicity, public support and momentum in order to stop the fall. I think this is actually imperative for free minded Americans to do, because as we saw in Russia, opportunists are waiting.
During the Russian revolution, an emergent government developed in the form of pseudo direct democracy called "Soviets". Every factory, and apartment block had their own committee (soviet), from which decisions were made for the constituents. However tzarist Russians had no knowledge, history or experience with constitutions or optimizing and implementing just rule of law; it was all new to them. To compound matters, many were illiterate. Then came Lenin from Switzerland, he had a plan, was charismatic, and was willing to achieve it at any end. Then he got support from the military, which was crucial. Once he had gotten the support of the Navy, and elements of the military, things happened quickly. He forced the Bolsheviks (a relative minority) into positions of power, then brutally put down any resistance.
The military in the United States is unique, a built-in fail-safe from the founders. Enlisted and Officers are not divided by deep class gaps. Secondly the military in the US is binded to the constitutional oath, not the leader, or status quo. Americans have a much different cultural and historical background, and much of the military is in support of the constitution. The founding fathers were amazingly clever and in building it, imbedded multiple safeties to the structure of the country. It would be extremely difficult to co-opt the military into a blatantly fascist, or bolshevik revolution. I just don't forsee any support by the military for such a leader. In fact, it's quite the opposite, since 70% of military donations go to Ron Paul, more than all Republican and Democratic candidates combined. So there is much reason for optimism, but we must be vigilant.
Wednesday, June 8, 2011
SRT, SWAT, Scary...
You may have read about the recent Department of Education's new tactic for collecting past due payments. If you haven't, read this: http://www.news10.net/news/article/141108/2/Questions-surround-feds-raid-of-Stockton-home. Apparently, The Department of Education has a SWAT team and they are busting down doors to apprehend individuals who haven't paid their loans. This is scary stuff. I've long been concerned by the trend of militarizing of police departments across the US. I know quite a few cops, and having served in the military myself, I know the difference.
Police departments in general are trending more towards a militarized mindset. This is concerning because it demonstrates a difference in tactics from balanced, and evenhandedly reactive, to a more aggressive and offensive mindset. One only needs to look around at the changes in uniforms from the old style striped slacks to a tactical BDU style uniform baggy pants with cargo pockets. The military and police have completely different missions and do not mix well. Even if we had the closest to perfect, mindful and careful SWAT officers, the outcomes will be bloodier and with more innocent casualties. The recent paranoia of terrorism and every other threat or shadow of a threat that crosses the border continues to make the problem worse, and increase the body count.
Just last week a former marine was killed in his home in Pima County, AZ by firing 71 rounds at his chest, hitting him 22 times. Militarized police units encourage the mindset of shoot first, eliminate anything that resembles a threat, law enforcement, that has no precedent in the United States, and the trend is on the rise. The sheriffs are even calling other SRT, or SWAT members "Operators" as David Rittgers writes in Politico, and Cato here:
I had reservations about the term "operator" during the years I served in special operations. Most of the time, the label was interchangeable with "soldier." But sometimes it became a tool for diminishing the need for planning — and relying on brawn and talent instead. "Don't worry; we're operators," was the overall attitude. "We can handle it."
There is a place for this boutique kind of unit, but the frequency of deployment and tools being acquired by some units is disturbing (50 APCs with a 50 caliber Ma-Duce on top, and a department in Louisiana buying full auto Thompsons to use in the field - Anyone who has fired them can attest to them being uncontrollable when on full auto). Other than the Dept of Education having a SWAT team, did you know of some other strange cases of agencies: National Park Service (Yellowstone SRT), US Mint SRT, Amtrak, The Federal Reserve Bank, etc.
David Rittgers goes on to say:
But securing evidence in suburban America is the antithesis of operator status. It's a basic law enforcement function, not an international manhunt or the targeted killing of a terrorist leader.
To that I say, Roger That.
Monday, June 6, 2011
Debt of Nations
Internationally, the American inflation was the transmitter and the rest of the world the receiver. The United States was the actor, and the rest of the world the audience. Other nations were forced to participate only because the action spilled out of the stage and into the orchestra. The United States was the author and the cast, and it held the power of control of the worldwide problem for better or worse.
Inflation's courier to the rest of the world from the United States was money. Just as inflation is a disease of money, the bearer of contagion outward from it's source is an outflow of money. The constant outflow of dollars from the United States implicated the rest of the world in the American inflation, as an outflow of Reichsmarks had implicated the rest of the world in the German inflation. (Dying of Money, By Jens O. Parsson)
In all reality, Europe, the United States, Japan, China, and effectively the entire world is interconnected. Inflationary pressure is being pumped by the Federal Reserve and is spewing out at the weak points. It's just a matter of velocity (in literal and figurative terms). China and other economies are experiencing terribly high levels of inflation. Once begun, it is very hard to stop. Even in the USA, monetary velocity is picking up despite an economy that appears to be in the beginning stages of a slowdown.
The point is, It doesn't matter the trigger point. The world is connected, and Bernanke knows it, Greenspan knows it. Greece cannot be allowed to fail, neither Japan, Portugal, Italy, Ireland, Spain, etc. If one does, it will bring everyone down with them. I expect QE3 will happen, and it may take the form of bond purchases between all the above parties. It is the logical thing to do, and it might be sneaky enough to keep people from noticing for a while, unless Ben's figured out a sneakier way...
|
global_05_local_4_shard_00000656_processed.jsonl/55278
|
Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
Scoble, Alex Scoble
Since we got our Vitamix at the end of last summer, I have eaten more fruits and veggies than in the last previous ten years combined (if not more). It is quite literally the most used appliance, after the fridge, in our house.
One of my co-workers has had the same experience. I'm seriously considering saving up for one. - Jennifer Dittrich
What are some of your favorite blend recipes? - imabonehead from Android
My recipe tends to change based on what fruits/veggies we buy, but a typical one is 2 ounces of almond milk, 1 tablespoon chia seeds, 2 tablespoons flax seeds, a bunch of kale, a bunch of other greens (such as Trader Joe's rainbow chard or their cooking greens mix which consists of turnip, mustard, collard and spinach greens...pretty much anything but broccoli), 2 tablespoons of cinnamon, maybe some chili pepper flakes and 2 to 3 fruits (today's smoothie was a bunch of blueberries, a pear and an apple), plus a bit of water and ice - Scoble, Alex Scoble
The last two or three smoothies have used a whole heart of romaine lettuce as one of the veggies because someone needs to eat it before it goes bad and my wife is out of town. :D Costco veggies are our downfall. - Scoble, Alex Scoble
Hehe. You should open a smoothie stand in front of your house. - imabonehead from Android
I'd have to add large amounts of agave nectar to get most people to want to buy one, hehe. - Scoble, Alex Scoble
My Vitamix is the same for me - tons of use, and I'm eating way better than I used to. I feel like an infomercial huckster saying it, but it's true. - Brian Johns
By the way, Brian, why aren't you subscribed to me? - Scoble, Alex Scoble
I sometimes want to share blender stuff with you directly, but can't. **sadclown** - Scoble, Alex Scoble
I didn't realize I wasn't! Problem solved. - Brian Johns
Huzzah! Thanks! - Scoble, Alex Scoble
Word of mouth and Costco has them readily available and for cheaper than the Blendtec packages they sell. - Scoble, Alex Scoble
A number of coworkers and friendfeeders have Vitamix blenders and all talk highly of them. I even have one coworker who switched from Blendtec to Vitamix. Also doesn't hurt that my brother keeps talking up Blendtec because he interviewed the CEO. - Scoble, Alex Scoble
Yeah, I have the blender on a counter beyond the cabinets because I use it so much, but vertical space is certainly one reason why some people prefer the Blendtec. - Scoble, Alex Scoble
Other factors that didn't come into play with the purchase (I learned them later on): The Vitamix is made in the US. Blendtec is not. The Vitamix comes with a tamper for pushing food into the blades, the Blendtec does not. The Vitamix spins at a faster RPM than the Blendtec. - Scoble, Alex Scoble
In this case I did. :D - Scoble, Alex Scoble
Apparently, the Blendtec container can be cleaned in dishwasher, but it doesn't seem to be entirely recommended, whereas Vitamix says don't do it with theirs, but the Vitamix is self cleaning with warm water and a few drops of soap. - Scoble, Alex Scoble
I can fill my Vitamix to the full 64 oz capacity and still blend just fine. This is supported by the manual. Blendtec manual says to only fill halfway. - Scoble, Alex Scoble
But yeah, at the end of the day, I think you'll be happy with either blender, although I obviously have high praise for the Vitamix. Everything I've thrown at it gets blended up. Seeds, nuts, ice, etc. I'll even throw in apples or pears cut up, but with the stem still on and only the very core of the apple that contains the seeds removed. - Scoble, Alex Scoble
I also love that I never again have to squeeze juice to make a margarita. Just peel a lime, a lemon and an orange. The recipe says to cut them in half, but I've found that I don't even need to do that. - Scoble, Alex Scoble
how much did the mixer set you back? - imabonehead
$380 at Costco, but it only comes with the wet 64 oz container. There's a more expensive version that comes with both that and a dry container. - Scoble, Alex Scoble
that's one expensive mixer. - imabonehead
You get what you pay for, at least in this case. :D - Scoble, Alex Scoble
|
global_05_local_4_shard_00000656_processed.jsonl/55291
|
Hey, Mitt Romney, Your Horse Didn't Win the Olympics
Mitt Romney didn't watch his wife's horse Rafalca compete in the Olympics — "I'm not even sure which day the sport goes on," he said to NBC last week. "I will not be watching the event. I hope her horse does well." —so it falls to us to break the news to him: Mitt, the horse participated in dressage today. And it did well, but it didn't medal.
I always thought it was weird that you weren't going to watch your wife's horse compete in the Olympics, but I think I get it now — you were nervous. It's okay, Mitt. Rafalca, the Guardian writes, "acquitted herself rather well" in the dressage event, but won't be going down in history as an Olympic champion.
Since you weren't watching, here's the paper's capsule summary:
Let me know if you need any other Olympic scores.
[image via AP]
|
global_05_local_4_shard_00000656_processed.jsonl/55302
|
Figure 7.
RT-PCR confirmation of expression of selected flagellar-related genes only in 1N cells. All reactions were run with the same RT+ cDNA samples. The RT-PCR shown at the top used the elongation factor 1α (GS000217) as a positive (loading) control showing successful cDNA amplification occurred in all samples. RT- control reactions prepared from the same RNA were run for nine of the PCRs shown here and no contaminating genomic DNA (gDNA) was ever found (see examples with RT- reactions included in Figure S6 in Additional data file 1). For clarity, RT- control reactions run simultaneously have been cut out here. Positions of molecular weight markers on each side of the gel are shown. The sample identifiers are listed for each lane at the top of the gel. 11 h, harvested at 11 h (late morning); 21 h, harvested at 21 h (early evening, time of S-phase); 02 h, harvested at 02 h (after cell division); CL, cultures (1N only) exposed to continuous light.
Download authors' original image
|
global_05_local_4_shard_00000656_processed.jsonl/55303
|
Tuesday, 15 September 2009
transformation strategy #15: have fun
Be yourself rather than trying to be someone else
You and I are normal people
Just as we are, we can do so much better
We don't have to be different, just better.
Work on fulfilling your potential, and it will be fun.
1. Hi Geoff,
Another person that we all know is an inspiration is Charlie. Charlie is a wonderful person and always has a smile on her face. Charlie is supportive as a friend. Charlie is a great runner and always happy.
2. That is the nicest compliment I have received in a long time. Thanks Geoff :-)
3. I can't keep up with all the people that are good to run with!
I'll just have to run with you Spody.
Masters Games
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.