id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_05_local_4_shard_00000656_processed.jsonl/62923
|
Here is the latest cover + feature for Sunset magazine. I had the best time exploring British Columbia, Oregon and the Sierras for this shoot. Many thanks to Yvonne Stender and Jeffery Cross of Sunset for always being so great to work with, Lisa Moir for amazing styling, and Julie Roll/Look Model Agency for modeling (in a bikini the freezing cold)!
|
global_05_local_4_shard_00000656_processed.jsonl/62949
|
Skip to main content
en Español
Ask the Expert
FASD Research Review
Historical Perspective
American Indian, Alaska Native, and Native Hawaiian people live in urban and rural settings spread across North America. These groups have widely different geographies, cultures, and languages. These groups are America's indigenous, or original, people. While each group has its own beliefs, customs, and ceremonies, they also have much in common, including a great respect for the values of family, sharing, and cooperation. Native groups also share similar problems affecting their health, their environments, and their communities. While most Native people do not have a drinking issue, alcohol abuse is a significant public health problem in some Native communities.
Native groups have always shared a sophisticated understanding of the natural world. This understanding has led to advances in agriculture, astronomy, medicine, and many other areas. When Europeans came to colonize North America, they brought 10 plant-based medicines with them. At that time, there were more than 170 plant-based medicines used by Native tribes.1 Some of these plants had powerful psychoactive properties that were probably used for medicine and in ceremonies.
Historians and other researchers have looked back into Native histories to find the point at which problems with alcohol may have begun to arise. Some early Native cultures used fermented beverages in ceremonies. Typically, there were controls in place that prohibited or minimized exposure–especially to children and women of childbearing age. Many Native groups made and drank wines as an important source of hydration in places where water was either scarce or contaminated. These wines were generally low in alcoholic content–between three and four percent–and had significant nutritional value.2
Outside Influences
Alcohol use may have shifted from controlled ceremonial and medicinal use to more general use at about the time that Native cultures were exposed to European and Asian explorers, traders, missionaries, and colonists. In Alaska, new settlers exploited mineral and animal resources and took the profits with them. Foreigners also entered the homelands of American Indians and Native Hawaiians, bringing diseases, alcohol, and firearms. Early settlers not only exposed Native cultures to different forms of alcohol, but they also introduced patterns of heavy drinking, which was even more damaging. As communities and tribes came under physical and cultural assault and became decimated by disease, alcohol problems began to emerge in tribes for the first time.1
Early records show a pattern of distrust of and distaste for European alcohol among American Indian tribes. European alcohol was referred to as "fool's water" and "devil's spittle." There are also records of very early formal treatment of alcohol abuse; including sweat lodges, talking circles, and plant-based anti-craving medicines. Many tribes today are having success treating alcoholism using these same techniques.1
Drawing from Tradition
Alaska Natives and Native Hawaiians are also looking to their traditional roots to develop treatment programs that emphasize the strengths of their cultures. Many Alaskan programs stress the importance of families in the recovery process and include practices such as the steam bath, which is the Alaska Native version of the sweat lodge. In Hawaii, a treatment program teaches Native clients about their ancestors, history, and culture to help them see that they are connected to something larger than themselves. The name of the program is Ho`omau Ke Ola, which is Hawaiian for "to perpetuate life as it was meant to be."
Moving Forward
The FASD Center is committed to increasing awareness about alcohol use and FASD. By doing so, we hope to help Native communities work to share information, promote healing, and create positive futures for generations to come.
1. Remarks by William L. White, M.A., “Native American Resistance to Alcohol Since First Contact,” given at the Fourth Annual Circles of Recovery Conference, Albuquerque, New Mexico, September 19, 2003 (Part 1: Exit Disclaimer Graphic; Part 2: Exit Disclaimer Graphic).
2. Encyclopedia of North American Indians, Houghton Mifflin, 1996.
|
global_05_local_4_shard_00000656_processed.jsonl/62954
|
Encrypting a swap partition however is slightly tricky if one wants to also support suspend-to-disk (also called hibernation). Here's a procedure that worked for me on both Debian Lenny and Ubuntu 7.10 (Gutsy Gibbon):
1. Install the cryptsetup package:
apt-get install cryptsetup
2. Setup the encrypted partition as root:
swapoff -a
cryptsetup -h sha256 -c aes-cbc-essiv:sha256 -s 256 luksFormat /dev/hda2
cryptsetup luksOpen /dev/hda2 cswap
mkswap /dev/mapper/cswap
3. Add this line to /etc/crypttab:
cswap /dev/hda2 none swap,luks,timeout=30
4. Set the swap partition to be this in /etc/fstab:
/dev/mapper/cswap none swap sw 0 0
5. Configure uswsusp to use /dev/mapper/cswap and write unencrypted data
dpkg-reconfigure -plow uswsusp
You will of course want to replace /dev/hda2 with the partition that currently holds your unencrypted swap.
(This is loosely based on a similar procedure for Ubuntu 6.10.)
If your writing out unencrypted memory dump to that file then that's bad news. In that memory will probably be the keys and such nessicary to decrypt your encrypted volumes.
I think (never done it myself) a better method is to encrypt your entire harddrive first, use LVM on top of that then use a logical volume for swap. That way the lvm stuff gets decrypted first and the suspend wakeup script in your initrd should be able to access swap.
Another method would be to encrypt swap then make sure that initrd prompts you for your swap password before the wake up scripts run.
Shouldn't be very difficult to do either. Check out 'man initramfs-tools' for details.
Comment by Anonymous
I could live with dropping suspend to disk using only suspend to ram.
But suspend to ram is not safe is it? As any number of bugs could let a cracker in I guess..
Comment by ulrik
I suppose so.
It would be a interesting test to see in what ways a Linux PC is secure or vulnerable against a physical attack without the attacker rebooting or shutting down the machine.
This is something I've played around with a bit, but only in a fairly 'i wonder if' way.
Gnome-screen-saver does a good job of locking the screen, as that sort of thing is required in many corporate environments. Even though you can click out of it and get a login prompt.
Just as long as you don't have the magic sysreq key enabled or are logged into one of the consoles then I expect you can be reasonably secure.
so you'd have ot find some attack that worked on X to break gnome-screensaver or some hack surrounding buggy USB or wireless drivers (bluetooth, 802.11g etc).
If the attacker had a big enough budget or a government type then that could lead to some james bond stuff.
It is possible to tear apart a laptop while it's still running. I know for PCs and servers some people will have ways to splice in mobile power supplies (any half decent electrition can do it) to keep those machines running until they can get them into a some workshop or whatnot. So with laptops it would be that much easier.
There is that DMA firewire hack for XP that people can use to get memory contents using a Linux machine. I wouldn't be surprised if something like that worked on a Linux machine.
Motherboard traces can be tapped into also. PCI Express supports hotplug and a person may have some sort of device that can use DMA hacks.
RAM is funny also. We all know that you need to keep power to keep RAM in good shape and useful. However lots of people don't know that RAM can keep information for a short while after it's been deactivated. So it's possible if your quick and got the right hardware that you'll be able to get most of the contents of RAM read into another machine.
Of course all of that is a bit fantastic. People have done it in the past under controlled environments for research reasons and I wouldn't put it past NSA folks to be able to do stuff like that, but I am more worried about leaving my laptop sitting at a airport or something unattended or whatnot. I am kinda stupid like that.
I'm hoping that the person who stole the thing would have no way of knowing the drive is encrypted and would first try to reboot the machine.
There are probably things you can do to mitigate the risk. Something like once the machine wakes up you have 30 seconds to successfully log in before the thing shut itself off.
Something like that.
(If I wanted to get james-bond about everything and try to protect secrets from the soviets I suppose I'd have to have a machine specially constructed with a epoxy encased mainboard and a fusable link that gets blown unless I get my password right within 15 seconds or so. (combined with some sort of biometrics and secure key arrangement) Of course the on board drive would have to be encoded using two or three different types of encryption and be created using random 128byte-long passwords that were randomly generated and never seen by a human...)
But if you still want to do suspend-to-disk it shouldn't be difficult to do that without dumping your memory to a unencrypted partition. Initramfs has been surprisingly easy to work it, at least for me. Make sure busybox package is installed.
Kinda interesting stuff. Especially for people that would want to make a publicly available Kiosk. (being secure against physical access rather then the whole james bond thing)
Comment by Anonymous
Here is another interesting thing:
Comment by Anonymous
Oh one other things...
There are people interested into james bond stuff.
There are several companies that make self-destructive hard drives that can be triggered in any number of ways.
There is at least one company that has a hard drive that has a capsule that when triggered will burst and spray acid over the interior of a harddrive, perminately eating away at the magnetic lining of the platters.
Comment by Anonymous
Ubuntu 13.10
Just a note that this setup still works with Ubuntu 13.10:
If you have an encrypted home partition and an encrypted swap as described here, pm-hibernate will use uswsusp and you have a working hibernation with swap encryption. The Ubuntu community articles should be updated with this, it works very well.
(Side node: A more timely cryptsetup is probably: sudo cryptsetup --cipher aes-xts-plain --key-size 256 --hash sha512 --use-random --verify-passphrase luksFormat /dev/sdXY. XTS seems to be faster for many people - check with cryptsetup benchmark if you have cryptsetup >= 1.6.)
Comment by nh2
After several research, this tutorial was the one that worked for me in the Debian Wheezy installation. I think that something that I did not see in other tutorials was adding the option "luks" in the crypttab file, and this is why cswap mounting used to fail after a reboot.
Comment by FM
|
global_05_local_4_shard_00000656_processed.jsonl/62967
|
Microsoft 3° 1.0.0352.0 Beta
2.9 out of 5 stars 2.9 (11 votes)
Windows Server 2003/XP / Freeware / 4,324 downloads
3 Degrees by Microsoft's NetGen Team connects people into a small group, so you can do fun things together. Throw animations to each others' desktops with winks. Listen together to a shared playlist created from music that you own with musicmix. Chat and send photos instantly. Windows XP Service Pack 1 is required, along with MSN Messenger and broadband Internet.
Reviews of Microsoft 3°
1. 5 out of 5 stars
Reviewing 1.0.0352.0 Beta (Jul 29, 2003)
just like yahoo's IMVir feature.. but even better!!
oh dear... MSN6 together with this thingy are really pushing Yahoo messenger to death...
2. 1 out of 5 stars
Reviewing 1.0.0352.0 Beta (Jul 27, 2003)
Another childish app like project Bob. And it needs this crappy Messanger to work. Uninstall here we go.
3. 5 out of 5 stars
Reviewing 1.0.0352.0 Beta (Jul 27, 2003)
One also needs the updated ICF IInternet Connection Firewall, Updated Network package including xp peer to peer apps. Free yes but something is telling me to do more reading. I applaud MS concern for my pc's safety but experience has shown if it's new or in development from MS read carefully before installing. :)
4. 3 out of 5 stars
Reviewing 1.0.0352.0 Beta (Jul 26, 2003)
For once ,microsoft think 'bout the real interactivity against user !
Need some other add inside the program as launch multiplayer game as halflife...
5. 3 out of 5 stars
Reviewing 1.0.0036 Beta (Feb 24, 2003)
no, that first review doesnt sound like an employee... come on... but it does sound like a cool works fairly well, both people or the group of people all have to have the software. but its a nice distraction from the work day. nothing major or earth shattering
Discuss Microsoft 3°
|
global_05_local_4_shard_00000656_processed.jsonl/63022
|
Skip to content
My WebMD Sign In, Sign Up
Includes Expert Content
Overcoming anxiety
Anxious1 posted:
Is there any way to overcome a specific anxiety? I know that I have small penis syndrome, but I don't know how to get rid of it.
I am on medication for general anxiety and am doing better as a whole. But this is one I have had the biggest struggle with.
dfromspencer responded:
I used to worry about that myself. After being with a few ladies, I was reassured I was very normal. Actually, some told me I was above normal, but only by a little. You don't need to worry about penis size, women don't. All you need to do, is be a good lover! Be very attentive to her. Giver her plenty of foreplay, and when she is good and ready, that is when you want to enter her! She won't even notice how big you are!
Trust me, if you get her all hot and bothered, she will not even notice your penis, unless she wants to pleasure you?! In that case, just relax, and let her have at it! Don't worry about your size, worry about the pleasure you are feeling!!!
If you can make a woman come, she is not going to notice your penis. Relax, and go with the flow! She will be happy, and so will you!!!
Just remember this, if she is all hot, and ready to explode, she will NOT notice how big you are! And, if you are very attentive, she won't care how big you are, ever!!!
I hope this will help you relax, that is all you need to do, relax! You are not deformed! Maybe small, but dynamite come's in small packages!!! Right? Right!!!
Good luck, Bro!!!
Anxious1 replied to dfromspencer's response:
With me, it is not really a worry from inexperieince. Let me explain.
My wife and I have been married for over 20 years. We have a very happy marriage.
I have come to believe this "syndrome" is caused by some incidents which happened earlier in my life. I was bullied a lot as a kid, including the shower rooms in gym class where comments were made about my size.
Also, my first sexual experience was horrible. I was strongly peer pressured into it by my girlfriend who wanrted to have sex when I really didn't want to. We were on a "double date" and the other couple with us were having sex several feet away. The guy was my girlfreind's former boyfriend who she had been intimate with. He was a larger than I was. Eventually, we broke up because of the sex. I was just not emotionally ready to handle that as a teenager.
For me, it's not just a case of being very nervous before sex (and that still sometimes happens), but everytime I hear a joke about size or comment about it, I suffer from these very strong attacks of fear and doubt.
People think saying "size matters!" is a joke, but it's not to me. It's like someone sticking a sword through my heart.
sluggo45692 replied to Anxious1's response:
Congrats on 20. Your doing something right or she wouldn't still be with you. Look at your self through your wife's eyes. She doesn't see a penis, she sees a man. A man who has been there and with her for 20 years.
I understand about horrible past and stupid peers. Everytime you think of that "girl", remember she a woman now and isn't in your life. My ex wife did a number on my self confidence so bad I couldn't get it up with meds.
I had to release that anxiety and realize there are women who want to be with me. I found a great gf. She likes me for me, not my penis. You have a wife you found 20 years ago and still with. I believe that should play into your thinking.
Some guys are jerks and think you have to be swinging below the knee to satify a woman. These are the guys who are making up for their own short comings. It's an excuse, because most of the time they can't satify a woman. You know you can and have for over 20 years. That is where you draw your strength. The only person you have to impress is YOUR WIFE OF 20 YEARS. Just keep doing what your doing. It sure seems to work for her. Good Luck
Leslie Becker-Phelps, PhD responded:
Yes, there are ways to overcome specific anxieties. Also, given that you are anxious enough to be on medicine, then I also suggest that you get therapy. So, I suggest that you find a therapist who is experienced in treating anxiety.
However, before you even try to find someone, take some time to list out the different kinds of situations or topics that elicit anxiety -- this will help the therapist help you. Also, doing this might help you fully take in that your issue with anxiety isn't really about your penis size - there's an underlying anxiety problem that is coming out in different ways, such as with this concern.
dfromspencer replied to Anxious1's response:
Hi again,
I just wanted to say something to you that I discovered myself, when I was young. I too, was bullied in grade school. However, I found myself facing one of my "enemies" while he was alone. I got mad, and I think he saw it too, cause he was all nicey, nicey to me. I could have cared less, at the time anyway, so I lit into him like a buzz saw! Needless to say, the other one was all nicey, nicey to me from then on! The bottom line is this, a bully is nothing but a coward, that has to hide his own short commings with a buddy who also suffers from the same! They had to team up, in order to terrorize me. But when separated, they were just afraid themselves.
We all face anxieties throughout our lives. Its how we choose to deal with them that matters. There are some great people on this board that also know what you are going through. You see how fast they came here to help? They have some great advise for you. I think Dr. Becker-Phelps has the very best one for you, I hope you take it?!!!
Congrats on the 20 years, you must be doing something right? I only made it fifteen! Good for you!!!
I wish you all the luck in the world!!!
Anxious1 replied to Leslie Becker-Phelps, PhD's response:
Thank you. This is very helpful!
Anxious1 replied to dfromspencer's response:
Sluggo and DfromSpencer thanks for your words of encouragement!
Featuring Experts
Helpful Tips
Relationships and Coping Community recommended resourcesExpert
Was this Helpful?
11 of 18 found this helpful
Related News
There was an error with this newsfeed
Related Drug Reviews
• Drug Name User Reviews
Report Problems With Your Medications to the FDA
|
global_05_local_4_shard_00000656_processed.jsonl/63026
|
ZF Blog
Zend Framework 2.0.4 Released!
The Zend Framework community is pleased to announce the immediate availability of Zend Framework 2.0.4! Packages and installation instructions are available at:
ZF2 has shipped with two "view strategies" aimed at simplifying common use cases around developing JSON and XML APIs: Zend\View\Strategy\JsonStrategy and Zend\View\Strategy\FeedStrategy. Each of these would select an appropriate renderer based on one of the following criteria:
• If the view model present was of a specific type (e.g., JsonModel, FeedModel).
• If the Accept header contained the appropriate media type.
This latter condition sparked some worry that, when enabled at the application level (vs. enabled based on selected module, controller, action, or other more specific criteria), any endpoint could be forced to return JSON or Atom (based on the strategies registered), regardless of whether or not it was appropriate. This could lead to a couple bad situations:
• Data present in the view model not intended for actual display now being displayed.
• Raising of exceptions due to insuitability of certain view variables for serialization in the selected format (e.g., invalid feed data, non-JSON-serializeable objects, etc.); this could lead to resource consumption and potentially other vulnerabilities.
Based on these concerns, we made the following changes:
• The JsonStrategy and FeedStrategy now only ever select a renderer based on the current view model type: e.g. if you want to expose something as JSON, you must return a JsonModel.
• Introduced a new controller plugin, acceptableViewModelSelector(). This helper can be used to select an appropriate view model if the Accept header meets criteria you specify.
As an example of the latter:
class SomeController extends AbstractActionController
$acceptCriteria = array(
'Zend\View\Model\JsonModel' => array(
'Zend\View\Model\FeedModel' => array(
public function
$viewModel $this->acceptableViewModelSelector($this->acceptCriteria);
// Potentially vary execution based on model returned
if ($viewModel instanceof JsonModel) {
// ...
The above would return a standard Zend\View\Model\ViewModel instance if the criteria is not met, and the specified view model types if the specific criteria is met. Rules are matched in order, with the first match "winning."
In addition to the changes mentioned above, this release included more than 40 patches, ranging from minor docblock improvements to bugfixes. The full list is as follows:
Thank You!
Many thanks to all contributors to this release!
Return to entries
blog comments powered by Disqus
|
global_05_local_4_shard_00000656_processed.jsonl/63035
|
Nov 08 2012
Political Ignorance and Partisan Thinking
WeAreChange.org did a very interesting video where they interviewed people who were voting for Obama prior to the election, read them a list of policies that Obama has already done but attributed them to Mitt Romney. Those voters expressed utter outrage at those policies when they thought Romney was proposing to do them, then reacted with denial, confusion or rationalization when they were told that Obama had actually already done those things.
Now I know that it’s easy to dismiss these political “gotcha” videos, but I think this reveals how several very common traits undermine the ability to make reasonable political choices. First, the ignorance on display; these people are completely unaware that the candidate they support has done the things they think are horrible. Second, how such ignorance is filled with presumptions of what the candidate they don’t support must want to do (basic tribal thinking — the people on the other side are guilty of every bad thing, while my side couldn’t possibly be). Third, how we rationalize away the cognitive dissonance once the truth is revealed.
Let me point out one thing that the person in this video blames Obama for that I would give him a bit of credit on, and that’s the NDAA. Obama did sign that bill into law, but he also signed an executive order saying that he would not exercise the power to put American citizens into indefinite military detention. What he should have done is vetoed the bill because such an executive order does not bind any future president (or even himself if he changes his mind and rescinds the order). So that particular item is bad, but not quite as bad as it is made out to be.
Everything else — the kill list, the vastly expanded drone campaign, the broadening of illegal surveillance, etc — is completely accurate. And while they may have cherry picked the folks they talked to here, those people are very much representative of a real problem.
Skip to comment form
1. 1
How many of these policies would Romney have continued? Most, if not all + torture. As it usually is, it was a choice between holding your nose while suppressing vomit and Ebola hemorrhaging.
2. 2
Dalillama, Schmott Guy
This is exactly why I’m not an Obama supporter; the man’s a rightwing scumbag, whose only redeeming feature is that he’s not a smirking sociopathic theofascist like Romney. Most of the Democrats in office are no better, but at least some of them have both spines and principles.
3. 3
To be fair, Romney was also for (and against) all of those things, so some confusion is warranted.
4. 4
UnknownEric the Apostate
My mantra through election season was: I’m not so much pro-Obama as I am extremely anti-Romney.
5. 5
The big difference between the Democratic partisan idiots and the GOP partisian idiots is that the Democratic idiots are on the fringes, and their own side will criticize them. In the GOP, the idiots are mainstream, if not actually the office holders, and tend to march in lockstep.
6. 6
Actually, I think most of the people shown in the video weren’t denialist as much as dumbfounded. I was impressed that at least two of them said they would look up the facts (whether or not they actually will when they get home is another story), and most of them expressed a lesser of two evils mentality rather than actually defending the actions.
And seriously–why didn’t the guy have printouts of the various newspaper stories?! That would be such a clincher! (and I’d love to see them read them on camera!)
7. 7
Reginald Selkirk
Well not quite. Joe Biden says very stupid things. GOP candidates have been saying very alarming things which reflect their actual beliefs and political positions.
8. 8
Seriously, this is a bad way to poll.
Yes, I am aware that you have a caveat
We really have no idea how many people they sampled and how many they cherry-picked.
At best it shows that push-polling works.
9. 9
In fairness, you could sample enough Romney supporters and find an equal amount of ignorance.
And they have.
Neither side has a monopoly on stupid followers.
10. 10
Goes in all directions. Yesterday someone said they would preferred Romney’s position on Foreign Policy over Obama’s. I held back and didn’t directly point out that
1) Romney has never actually said what his foreign policy would actually be, other than “Not what Obama has done”, and
2) On any specific item he did answer (2nd debate, I think), his answer was, well, exactly what Obama has already done and is doing right now.
One of those blunt cases where the two are indeed exactly the same, but the cognitive dissonance involved makes one insist their person is totally different and clearly the better.
On the other hand, for the cynics who always go “they’re both the same”, I had to keep yelling at them “SUPREME COURT” to try to wake them up to what happens when Romney is forced to actually obey the party he’s supposed to be leading. Fortunately for my daughter’s future, it never came to that.
11. 11
Scott Simmons
I’ve never been happier to live in a resolutely red state as when I could vote third-party on Tuesday with confidence that I wouldn’t be impacting the election in any way.
12. 12
F [i'm not here, i'm gone]
The rationalizing continues.
13. 13
This is not a matter of stupidity. Tribalism is part of our cognitive structure along with a host of other biases and heuristics. They are very difficult to avoid even if you ARE aware of it because it’s the brain’s default mode of reacting.
What we’re lacking is public education in the way the mind works and how to be more rational. Until a majority of Americans can think past political rhetoric, we’re doomed to have Politicians that pander to these biases.
14. 14
I disagree. There was definitely “denial” and “confusion” because they had never heard this before, and it sounds unbelievable if you’re not up on the issues (and that might be the most important take-home message, people DON’T know about it). But the rationalization I heard was exactly the rationalization I use, there are so many other reasons I’m voting for him that it doesn’t matter. And it doesn’t matter because Romney would be worse. I am fully of the opinion that we must hold his damn feet to the fire about these issues (as gays have done successfully for marriage). I honestly don’t think he sees any resistance from the anti-authoritarian left, and I’d love to see an organized movement force him to confront these evils.
15. 15
Yeah… naturally there are some really uninformed voters out there, but speaking only for myself, I voted Obama for the following reason:
All the things Obama is wrong about, that decent people need to fight him on, Romney is just as bad or worse.
Sadly this encompasses a lot of our foreign and domestic policy.
However, there are some things where Romney is terrible and Obama is okay, or even good. So, that means, in practical terms, as someone who plans on putting a lot of effort into fighting for justice in the next for years, Obama is empirically the better choice.
Basically, electing Romney reduces our chances of actually fighting for civil liberties to be restored, climate change to be addressed, transgender rights to be protected, because under Romney so many people will be 100% busy just fighting to preserve basic services like food stamps or Medicare or Social Security that they simply won’t have the time to worry about anything other than basic survival. Electing Obama means that some of these folks will have a minimum level of physical/economic security so that we can all devote our efforts to other, bigger issues.
Really, I don’t see why there’s any discussion about this.
16. 16
Kevin Dugan @ 13 said
“What we’re lacking is public education in the way the mind works and how to be more rational…”
Yes and yes. Starting at 2nd or 3d grade. And it would be FUN! The best part of your day in fact. Magicians coming in and doing tricks and showing the kids how your mind can fool itself. There are endless games and activities that could be centered around how brains fail at certain tasks. (all of them with a breathtaking ‘reveal’ at the end, especially if you’ve never encountered them before. Damn. I could come up with enough ideas for a full syllabus right now! Too bad I’m not a teacher.
17. 17
Ed Brayton,
I thought I commented earlier. It turns out I did not. How odd.
Any way, I think this is pretty upsetting, but the more I come to think about it, this is kind of to be expected. People often make excuses for their party or their guy, that they wouldn’t make for candidates from the other party. Its really hypocritical and it often makes meaningful change much more difficult.
Leave a Reply
Switch to our mobile site
|
global_05_local_4_shard_00000656_processed.jsonl/63047
|
Williamsburg "Herpes Avenger" Is Fighting STDs With Fliers
"Do you live in the Williamsburg Greenpoint area? I know you probably love it. I love it too. But you should be aware of some things. Living here is much like living in a college dorm. It's a hotbed (no pun intended) of sexually transmitted diseases. But it doesn't have to be like this." We agree! Well, maybe up until the last sentence. Anyway, one woman has made it her mission to stop the spread of herpes by, for starters, making it impossible for the guy who gave it to her ever to get laid again.
Whether or not it is ethical to post photos of your herpes-donor on telephone poles and the internet is questionable. But so is "Drew's" behavior! "I think we have all been in the situation where we have already succumbed to this pre-sex near penetration and when a guy can't keep it up with a condom and you just want to get laid and he's like, c'mon it's basically been in you anyway, you have inevitably and against your better judgment said yes."
Ugh, indeed.
She goes on: "I am not innocent. I am partly to blame. But let's just talk about practicing versus preaching for a second. For instance... we all know that STDs can spread through oral sex. But does anyone actually give a blowjob over a condom? Really, has anyone ever done that? Has this ever in the history of sex actually happened?"
Well, no.
"And please, if anyone out there has ever seen a dental dam outside of 8th grade health class please fess up. Seriously, i wouldn't even know what to do with one of those things. Likewise, there are plenty of pre-sex moves that guys are always trying to work on you that involve all sorts of near-penetration that without a condom could spread all sorts of diseases. But we do it anyway. We all do. Don't deny it. You have let a guy rub his dick against you, not quite putting it in, but certainly loitering very very close to the goal posts."
This blog is clearly going to eliminate this kind of irresponsible behavior from Greenpoint and Williamsburg (and who knows, maybe even elsewhere in Brooklyn and quite possibly in lower Manhattan!) forever.
|
global_05_local_4_shard_00000656_processed.jsonl/63049
|
Al Gore's Rumored Mistress: Larry David Ex-Wife
Finally, someone takes the bait on Al and Tipper Gore's divorce by starting an adultery rumor: Star says Inconvenient Truth producer Laurie David—also the cheating ex-wife of Seinfeld creator Larry David—"went from friends to lovers" with Al.
Laurie divorced Larry in 2007 after reports surfaced that she cheated with the caretaker of their vacation home in Martha's Vineyard. Star says Laurie and Al "fell for each other" after "fighting for the environment for years." Discussing the slow melting of the world's polar ice caps is a known liberal aphrodisiac. They probably did it in the backseat of a Prius. [Star, image of Laurie, Al, and Tipper at the 'Inconvenient Truth' premiere at the Cannes Film Festival via Getty]
|
global_05_local_4_shard_00000656_processed.jsonl/63051
|
Newsweek isn’t backing down. Hours after publishing Leah McGrath Goodman’s 4,5oo-word profile of a 64-year-old Temple City engineer named Dorian S. Nakamoto—who, Goodman claims, is the long-mysterious inventor of Bitcoin—the magazine faced a cascade of evidence contradicting the ambitious cover story of its freshly revived print edition. Nevertheless, its editor-in-chief tells Gawker that the publication stands by the story.
In a post-car-chase interview with the Associated Press, Nakamoto denied knowing anything about Bitcoin, the digital currency, until Goodman contacted his son 3 weeks ago, and clarified that Goodman misunderstood him in a brief interview outside his home in suburban Los Angeles. (Nakamoto is not a native speaker of English.) “It sounded like I was involved before with Bitcoin and looked like I’m not involved now,” he told the AP. “That’s not what I meant.” Instead, he meant to say that he no longer worked on engineering projects with the U.S. government.
Goodman, in a statement to the AP, disagreed: “There was no confusion whatsoever about the context of our conversation—and his acknowledgment of his involvement in Bitcoin.” At the same time, she has yet to supply evidence supporting her stance, such as an audio recording of the exchange. (Goodman also stopped answering questions about her story on Twitter several hours ago.)
Other contradictory evidence is, like some of the Newsweek story, circumstantial. On Thursday evening, someone with access to a P2P Foundation account owned by Bitcoin inventor Satoshi Nakamoto wrote, “I am not Dorian Nakamoto.” (The account had not been active since 2011.) And an email written by a “Dorian Nakamoto” of Temple City to an employee of the Los Angeles Metro Rail indicates a much weaker grasp of English grammar and spelling than emails sent by Satoshi Nakamoto around the same time period.
Asked if Newsweek still stood by Goodman’s account, editor-in-chief Jim Impoco wrote back: “Yes. Standing by our story. Yes.”
To contact the author of this post, email
[Photo credit: Newsweek]
|
global_05_local_4_shard_00000656_processed.jsonl/63055
|
Last name origins & meanings:
1. Alternative spelling of Russian, Bulgarian, and Macedonian Bogdanov, a patronymic from the personal name Bogdan meaning ‘gift of God’. Among the Orthodox it was sometimes used to denote an illegitimate child or foundling.
2. Jewish (from Belarus): habitational name for someone from any of the various places in Belarus called Bogdanovo or Bogdany.
Comments for Bogdanoff
7 Fun Driveway and Sidewalk Games for Kids
Kindergarten Readiness App Wins Gold
Best Sun Safety Practices for Babies
Find out what is happening in each day of your pregnancy!
My due date:
Pregnancy Day By Day
|
global_05_local_4_shard_00000656_processed.jsonl/63063
|
Information for "Polygon File Format"
Jump to: navigation, search
Basic information
Display titlePolygon File Format
Default sort keyPolygon File Format
Page length (in bytes)5,412
Page ID16487
Page content languageEnglish (en)
Indexing by robotsAllowed
Number of views1,819
Number of redirects to this page0
Page protection
EditAllow all users
MoveAllow all users
Edit history
Page creatorTdn32 (Talk | contribs)
Date of page creation17:14, 15 February 2010
Latest editorTdn32 (Talk | contribs)
Date of latest edit18:12, 15 February 2010
Total number of edits13
Total number of distinct authors1
Recent number of edits (within past 91 days)0
Recent number of distinct authors0
|
global_05_local_4_shard_00000656_processed.jsonl/63068
|
Literally Kim, iconic.
Kendall Jenner in “American Girl #1” by David Sims for LOVE Magazine #12 Autumn/Winter 2014.
When someone asks how I did something.
-kendall jenner
(via keeping-up-with-the-jenners)
Kendall @ love Magazine
As sad as this is.
Just finished watching the Bachelorette season finale. Conclusion: She picked the guy that was definitely her type and the other guy is stalking her. Gotta love reality TV.
|
global_05_local_4_shard_00000656_processed.jsonl/63093
|
Take the 2-minute tour ×
There are many free fonts, but they often don't include letters with diacritics such as Ă, Â, Ș, etc. Placing those marks by hand in a large text that keeps changing can be a pain.
Is there a way to add such extra glyphs to font in Illustrator - basically some copies of existing characters, with accents or other diacritical marks?
Or do you know any tricks to make the process easier?
share|improve this question
Any chance you can switch to InDesign? :) – Yisela Mar 17 at 1:26
Why not simply select fonts which do contain the diacritics? – Scott May 16 at 15:02
1 Answer 1
up vote 0 down vote accepted
It is possible to add new characters to a font, but as stated there, it's not for the feint hearted.
Alternatively, if you use many different fonts a little and don't want to do all that for all of them, here's a workaround to get real-text diacritics in Illustrator without editing fonts.
Warning: it's not ideal, especially for long text (use InDesign if you need long text) but it works:
• Start with the text in a font that has all the diacritics you need, that is similar to your chosen font, e.g. Arial/Verdana if it's sans, Georgia/Times if serif, etc. The old 'web safe' fonts typically have some; Arial has loads about a third of the way down near ⅓ and ⅔...
• ...using separate diacritic glyphs rather than combined ones (like o� instead of ó, the accent dash as a separate character).
• Be warned that entering these diacritic characters manually won't be fun for long text.
• 'Find/change' may help - type or copy/paste the text normally, then for each accented/augmented character, swap it for the two separate characters.
• Switch to the font you want. Everything will change font except those diacritic characters that don't exist in the new font, which will remain the same. Since the characters they augment are now in the new font, it'll all look fine, except for the diacritics probably not lining up very well.
• Kern them into place - lots of ~ -150 before the diacritic and +150 after it. This also won't be fun for long text... Character styles might help.
...but the result will be normal-looking diacritics for any font, in the form of actual text that reflows properly when you edit the text.
Depending on your text, it might be easier to do the above once per diacritic character then go through using Find and paste over the other occurrences of that character.
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/63098
|
chevy volt engine
No one at General Motors is talking publicly about a rumor post over at InsideEVs that claims the 83-horsepower, 1.4-liter range-extending gas engine currently used in the Chevrolet Volt will "definitely not" be the engine that is used in the 2014 model year Volt. And, by no one talking publicly, we mean that our emails have gone unanswered. InsideEVs just got a "Unfortunately, we do not comment on future product details, so I cannot provide any information related to your inquiry," from GM spokesperson Kevin Kelly.
So, that means it's speculation time. InsideEVs claims to have spoken to an unnamed source who says that the replacement engine will be the new 2.0-liter turbo. This source says this engine has been tested on the Volt's Delta II compact vehicle platform, which is also used in the Buick Verano and many others. A larger engine does not necessarily imply worse fuel economy – see, for example, the jump from the 1.5-liter engine in the second-generation Toyota Prius that got 46 combined miles per gallon to the 1.8-liter in the third-gen that gets 50 – so we're not discounting the rumor outright. InsideEVs goes on to suggest that the 2.0T will also find its way into the Cadillac ELR (the production version of the Converj concept from 2009) that uses Volt technology, whenever that car arrives. To feed the speculators, here are some other stories about Volt engine possibilities from the archives.
Our former colleague Sam Abuelsamid is skeptical of the 2.0 turbo story, though, writing that whatever engine replaces the 1.4, it will "almost certainly will not be a 2.0-liter turbocharged four as used in numerous GM vehicles including the Buick Regal GS and Verano T." He continues:
A 200+ hp turbo 2.0-liter makes absolutely no sense when you only have 161 hp of electrical power. The 2.0-liter is larger, heavier and thirstier than the 1.4 and makes way more power than can be used by the electric drive system.
The 2.0T would only make sense as part of a parallel plug-in hybrid drivetrain in some other vehicle. My guess (and I have no inside information on this, pure educated speculation) would be that they would opt for the new small engine family being co-developed with SAIC which starts at 1.0-liter. Those engines could be in production by next year and would be a much better fit
|
global_05_local_4_shard_00000656_processed.jsonl/63112
|
Detecting ISP throttling
[photo: nrkbeta]
1. Finally someone big on the side of the “little guy.”
2. BigBalls says:
Even though this is not, in any way, a “hack” I do appreciate it being posted
3. Joel says:
My isp must be throttling, all my speed tests are low like under 800 kbit/sec (100KB/s), but if i run a torrent or 2 i can get over 2600 kbit/sec (325KB/s).
4. LexicalConverter says:
AT&T throttles.
Speed tests read 1.5mb/sec.
Actual world speed is a tenth that.
Go figure.
5. not a hack says:
this is very interesting.
its not a hack but if you want a hack only feed
use this
not a hack
6. Jeff says:
So after you figure out that you’re being throttled, is there anything you can do? This just seems like an exercise in futility to me. You can call up your ISP all day and tell them that Google says that they are blocking your packets and they’ll tell you it’s better for you.
While I appreciate the ingenuity in all this, I’d much rather see constantly evolving software that enables me to actually get around throttling instead of simply tell me what I can’t do anymore.
7. static says:
As an individual there’s much you can do is gather evidence the ISP aren’t providing their customers what the customers paid for. In the event the EFF can’t make use of it send it to Ralph Nader after Ralph looses in November. Ralph has been somewhat effective in helping the little guy over the years.
Leave a Reply
You are commenting using your account. Log Out / Change )
Twitter picture
Facebook photo
Google+ photo
Connecting to %s
|
global_05_local_4_shard_00000656_processed.jsonl/63113
|
POV clock inside acrylic block
[Thanks Tehgringe]
1. dmcbeing says:
Is that the terminator music ?
On a side note has been done before but not that well imho.Job well done :D
2. derp says:
Very nice! Excellent look
3. svofski says:
I wish I knew about this TDA5140A when I was making Strobeshnik. Good find for the future reference.
4. asdf says:
How beautiful! To make it even more spectacular he could add some waving effects using sine functions over the plot routines: POV Dali clock FTW!:)
5. keru says:
@dmcbeing: It’s “Pass Portal” by Team Sleep. (It had been on The Matrix Reloaded soundtracks.)
6. keru says:
@dmcbeing: “Pass Portal” by Team Sleep. (It has been on The Matrix Reloaded soundtracks.)
7. rob says:
dmcbeing: No. This is:
Or T2 if you prefer that:
Still gives me goosebumps, such great movies :)
8. jd says:
And what a gorgeous piece of PCB design too!
9. jeditalian says:
i wish i had a giant one on my ceiling. it looks awesome.
10. Alan says:
11. Dude says:
12. localroger says:
OK the clock modes are all very nice looking but the rotating Necker cube is just showing off.
13. Paul Potter says:
That is fantastic. Love the different modes, and the vector graphic is amazing.
14. Mic says:
15. Hirudinea says:
That is really sweet, I’ed like to see it in black acrylic though and now they’ll know what time it is on the Borg Cube. :)
16. Tachikoma says:
The cube animation did it for me.
17. debbie downer says:
The screws ruined it for me.
18. chrisu says:
great clock, gotta love POV projects.
The song is from The Matrix Reloaded:
19. chrisu says:
Whoops – hit submit prematurely…
Song is:
Team Sleep – The Passportal from Matrix Reloaded.
20. David Murray says:
21. mischka says:
looks great.
22. Anon says:
Yo dawg, we heard you like cubes so we put a cube inside your cube so you can feel symmetric while you’re feeling symmetric.
23. Andrew says:
24. Mic says:
Yo dawg Thx fo the cube inside uh cube.
25. santosh says:
i want to make this pov clock
can anybody give me ckt diagram and mechanical
hardware arrangment
Leave a Reply
WordPress.com Logo
Twitter picture
Facebook photo
Google+ photo
Connecting to %s
|
global_05_local_4_shard_00000656_processed.jsonl/63139
|
In ColdFusion ORM, you need to define an object mapping to create persistent objects. The object mapping includes details such as:
• The table name for the object's class
• The column name that corresponds to each field in the object
• The join conditions for related objects
ColdFusion allows you to specify the mapping in CFCs. Such CFCs are called as persistent CFCs. Each persistent CFC usually maps to a table in the database. Each property in the CFC usually maps to a column in the table. Additional properties may be used to define relationships and other mapping details.
When ColdFusion creates the Hibernate configuration for the application, these persistent CFCs are used to automatically generate Hibernate mapping files, which have the extension ".hbmxml". For example, if ARTISTS.cfc is a persistent CFC, ColdFusion would automatically generate Artists.hbmxml. Hibernate mapping files contain the mapping information in XML format that Hibernate defines, to work with ColdFusion ORM. These Hibernate mapping files can be created manually.
For more information about creating Hibernate mappings manually, see Advanced mapping.
To use ColdFusion ORM, ColdFusion application must have ormenabled set to true in the THIS scope of Application.cfc. To define a persistent CFC, set persistent="true" in cfcomponent tag. An array of attributes are available in cfcomponent and cfproperty to specify mapping information.
For details, see Define ORM mapping.
When the application starts, ColdFusion first loads the Hibernate configuration file if it is specified in the application. The Hibernate configuration file contains various configuration parameters like including, dialect, cache settings, and mapping files that are required for the application. If a configuration file is not specified, ColdFusion ORM creates the Hibernate configuration using the default settings.
For details about these configuration parameters, see
After loading the Hibernate configuration, all the mapping files (*.hbmxml) in the application folder and its mapped folders are loaded and added to the configuration.
ColdFusion then searches for persistent CFCs in the application folder and its mapped folders. If the hibernate mapping file is not present for any persistent CFC, ColdFusion generates it. If mapping information, such as primary key, foreign key, and column data type is missing in the persistent CFCs, ColdFusion automatically inspects the database and identifies the mapping.
ColdFusion then checks if DDL needs to be generated. This can be configured using the dbcreate option in the ORM settings. Based on the configuration option specified in dbcreate, tables are created or updated.The Hibernate SessionFactory is then built and made available to the application as long as the application is running. The SessionFactory is used to create Hibernate sessions that manage the persistent object lifecycle.
In ColdFusion, a Hibernate session starts when the first CRUD method is called and ends when the request ends or when the ORMCloseSession() method is called.
To improve performance, Hibernate batches all the Create/Update/Delete operations in the session and runs them when the session is flushed or only when necessary. Session Flush happens when the request ends or when the ORMFlush() method is called.
For transactions, a new session is always created at the start of a transaction and ends at the end of a transaction. Any previous open sessions are flushed and closed at the start of the transaction.
The Hibernate configuration is created and loaded only when the application starts. Therefore, any modifications to the mapping in the persistent CFCs or in the Hibernate mapping files are not loaded automatically. To load these modifications, you can either restart the application or call ORMReload().
To restart the application, you can stop the application using ApplicationStop() and the next request to any page in this application automatically starts it.
|
global_05_local_4_shard_00000656_processed.jsonl/63159
|
How to Know if the Bearings Are Going Bad on Your Dryer Motor
by Laurie Reeves
Save money by repairing your dryer rather than replacing it.
Save money by repairing your dryer rather than replacing it.
Dryers use electromagnetic energy converted to mechanical energy to turn the dryer motor and drum, and add heat for drying. The dryer motor is fitted with a small pulley with one or more bearings inside, as is the dryer drum. Bearings are small beads — round or elongated — enclosed within metal, circular sheaths. The sheaths or bearing races spin across the length of the beads, which allows the drum and the dryer motor to turn. The bearings turn the pulleys attached to the motor and the drum via a belt that connects them, which receives power from the dryer motor when engaged. Dryer bearings in the drum and motor are lubricated and sealed when first installed, but dry and wear out with time and use.
The first indication of bad dryer motor bearings is a squealing sound from the dryer. When the bearings lose their lubrication, they heat up and change their shape. The lack of lubrication causes the metal of the bearings to make noise as it rides on the bearing race. The noise usually comes from the vicinity of the motor that is typically affixed to the bottom of the dryer, at the back. The bearings might also squeak rhythmically as the dryer drum turns.
Starts and Stops
Another good indication that the dryer motor's bearings are going bad is that the dryer might start and run for a few cycles, but quit after the motor heats up. Once the motor cools down, the dryer might start again, but stop after a few revolutions. Starting and stopping out of cycle is one indication that the dryer motor and the bearings are malfunctioning. Some dryer motors provide access to change just the bearings, while some motors are sealed. Sealed dryer motors require complete motor replacement.
The dryer might start up normally, but as soon as the motor and bearings get hot, the motor quits. If you attempt to restart the dryer, the motor buzzes or makes a humming sound, but doesn't engage the dryer. This is a sign that the dryer's motor or its bearings require replacement. Dryer motors typically don't use brushes inside for generating power, but instead use induction as a means to turn the pulley that rides on the bearings. The buzzing or humming is a sign the motor is receiving power, but the bearings won't allow the pulley to turn.
Drum Seizes
When the dryer refuses to turn or the motor refuses to come on, this is a sign that the bearings and the motor have failed. The armature inside the dryer motor may be electrically "sticking" to the frame, preventing the motor from starting or the drum from spinning. When the dryer motor bearings wear out, or their shapes change with age and heat, they can no longer turn, which prevents the motor from engaging the dryer's drum.
Drum Bearings
When you discover you have to change the bearings in the dryer motor, or replace the motor outright, consider changing the drum bearings as well. Since the dryer is open and being worked on, it's a good time to change the drum bearings. The drum bearings are mounted in the center of the drum and are usually held inside a mounting plate that is attached to the back of the drum by screws. Refer to your dryer's repair manual for exact locations of the drum bearings and the dryer motor.
About the Author
Photo Credits
• Jupiterimages/Comstock/Getty Images
Suggest a Correction
Have Feedback?
|
global_05_local_4_shard_00000656_processed.jsonl/63231
|
Kindle and changing ebook prices
A while back, there was some outrage going around about teh ebil Amazon empire and their treacherous ways with lowering Kindle prices on some ebooks, which may or may not affect royalty payments.
One author, we’ll call him John Doe, went on for weeks about it. He’d published an ebook through Kindle and one day, he found the price was lowered drastically. Upset, he contacted Amazon about this and they quickly turned the price back. Problem solved, right?
One would think so, but the issue turned up on several blog posts afterward, lighting the fires under several others who basically had no idea why they were angry but why the hell not! It even turned out that the author’s ebook had, indeed, lowered elsewhere beforehand, and Amazon had simply price-matched, per their TOS, but… THEY’RE STILL EBIL!
The unnamed author kept saying how the big publishers would never treat him that way. To that, I say bullshit. Not just bullshit, but big, wormy, steamy, bullshit. And I add, why isn’t he back with them if they’re so snazzy?
Let’s clarify a few things: when you put something up through Kindle, you may think you’re self-publishing but you’re not. Sure, it’s a lot closer to self than the traditional route. No rejections to deal with. But Amazon is still the publisher. You come to an agreement with them, make a contract to provide a good for their services, the same as you would with Bantam or Harlequinn or any other publisher. They allow you to set a price but there are stipulations: don’t undersell them, and royalties will be higher or lower depending on the price you choose. It’s your job to adhere to that agreement and not throw a big nasty tantrum all over the Internet if you fuck up.
And if this happens, and they choose to change the price of your book, it’s the same as if any other publisher decides to change the retail price in order to keep up with the competition. This is rarely the case with them because they let the bookstores handle all that, but in Amazon’s case, they ARE the bookstore. But if a publisher is at a convention and they need to push some books, they’ll damn sure knock the selling price down to sell, paying the author a royalty of THAT.
Personally, Google Books screwed with the prices of some of KHP’s titles and Amazon adjusted to match, and they still pay the normal royalties. Everything is cool with that. No need to FFfFFFFfffrreeeeeaaakkk!
Get what I’m saying? Chill people. I’m going to bed now.
Page 1 of 1
|
global_05_local_4_shard_00000656_processed.jsonl/63265
|
Follow this link to skip to the main content
NASA Ames Research Center
Home > Education > Activities > For Grades 6-8 > Detecting Planet Transits
Detecting Planet Transits
Detecting Planet Transits (PDF, 1.46 MB)(2008; for grades 6–8) Students model NASA's Kepler mission observations of planetary transits (a planet moving in front of a star) by standing in a circle with model star (light bulb) in the center, and observing, through rolled up paper viewing tubes, a "bead" planet orbiting the star.
Photo of Venus Transit (by Becky Lowder; click on image for bigger version):
This is part of the GEMS Space Science Sequence for grades 6–8 (Sessions 4.5 andf 4.6) published in 2008.
Detecting Planet Transits is © 2007 by the Regents of the University of California and may be duplicated for non-profit education purposes.
|
global_05_local_4_shard_00000656_processed.jsonl/63292
|
WPMU fast backend switch
I recently converted several simple WordPress installs into a single WPMU install. As I use all of the blogs myself I wanted a quick way to switch between the various backends. This is probably only useful if you don't have too many blogs and use all of them yourself. The switch links will be added to your super admin menu.
By the way, I used to use the Ozh admin menu plugin. You might need two clicks to switch if you don't.
Update: This plugin is probably obsolete with the new admin bar in 3.1
Download the plugin.
Published on June 7, 2010 at 11:10 a.m. by Nicolas and tagged navigation, usability, WordPress, WordPress plugin, WPMU. You can follow the discussion with the comment feed for this post. Feeling generous? Donate!
|
global_05_local_4_shard_00000656_processed.jsonl/63297
|
Monday, April 30, 2012
Thank you, Union Bar!
The Union Bar in Iowa City has earned my thanks, and the thanks of every red-blooded heterosexual male in America by virtue of their decision to keep Jordan Ramos from dancing on their bar. Of course she's holding press conferences and hinting about suing sue now because they told her that she was "too fat" and "not pretty enough" to get up on the bar and dance.
Fat girl claims discrimination after being barred from dancing on bar.
While this doesn't sound like the sort of place that I'd choose to hang out in, I have to admit that if I were in such a place, the last thing that I'd want to see was a Rosie O'Donnell look-alike shaking it in my face. And I think that it's reasonable to expect that in bars like that, that the women who are put in front of the customers as entertainers, be they paid staff or enthusiastic amateurs, actually be women that guys want to look at.
Hey Jordan, since you're in college, you might want to take a class or two on business and maybe you'll learn that businesses are in business to make money, not to validate your feelings or puff your self-esteem. They don't make money by grossing out the customers, so instead of suing or whining to the papers, how about trying an aerobic class for a few months and Slim-Fast instead of Big Macs. You might be surprised to find out that if you lost some weight and toned up those flabby arms a bit, you'd be allowed and even encouraged to dance in front of the guys. Not a sermon...just a suggestion.
1. Iowa has a Human Rights Commission? Maybe they ought to have a Giving Taxpayers Back Their Money Commission instead.
2. she's a safety hazard if she's on the bar.... in a state where cow tippin is a virtual certainty after a 6 pack, some farm boy is gonna knock her off the bar and who wants to get sued when she falls over?
|
global_05_local_4_shard_00000656_processed.jsonl/63320
|
DragonFly BSD
DragonFly kernel List (threaded) for 2004-11
Re: serial ATA status?
From: Matthew Dillon <dillon@xxxxxxxxxxxxxxxxxxxx>
Date: Fri, 5 Nov 2004 16:34:25 -0800 (PST)
:I've looked at the scsi/sata_sil.c driver but I learned more C than I
:understood what was actually happening.
:My main concern is 15 byte write quirk that seems to only affect certain
:combinations of drives and the 3112 (Addonics) controller.
:My drive in particular, was subject to serious corruption until about
:linux-2.6.7-bk8 when it was fixed. However, my drive got added to the
:black list which means ~20Mb/sec vs ~50Mb/sec. It doesn't belong in the
:blacklist, when I remove it, I get the performance with no corruption
:issues. I've tested a lot of gigs on that 160G drive and made it my
:primary disk about the time came out with the following mod:
:struct sil_drivelist {
: const char * product;
: unsigned int quirk;
:} sil_blacklist [] = {
: { "ST320012AS", SIL_QUIRK_MOD15WRITE },
: { "ST330013AS", SIL_QUIRK_MOD15WRITE },
:I've not tried sata on 2.6.9, but I don't expect any
:Of course I'm only saying all this because it is a
:nasty bug that I hope doesn't show up in DragonFly.
:// George
:George Georgalis, systems architect, administrator Linux BSD IXOYE
The SIL_QUIRK_MOD15WRITE flag forces linux to limit I/O requests to
no more then 15 sectors (around ~7K) per request), but it is a
brute-force solution to the real problem which appears to be related
to DMA programming of the device by the driver.
e.g. I came upon this reference (this is an old patch but the
description is relevant):
So the question is whether our code uses the correct registers.
The answer is: I don't know. Our code is so different that it
would take some sleuthing to figure out where the equivalent
code is and what register offsets are actually used.
Matthew Dillon
|
global_05_local_4_shard_00000656_processed.jsonl/63330
|
Tuesday, March 06, 2012
O's @ SOX, Now [Update: WIN]
I'd actually be happy if this was GameDay's only problem.
Come on, cut them some slack. You can't expect every tiny organization to get the logo thing right away. It's not like they're a sports global network or anything. Oh, right.
Haha. Yeah, it's not like MLB is connected to the Boston Red Sox in any way or anything....
Xavier Avery
Now there's a guy you can pin a label on.
Post a Comment
<< Home
This page is powered by Blogger. Isn't yours?
My Photo
Location: Rhode Island, United States
|
global_05_local_4_shard_00000656_processed.jsonl/63341
|
Children have been fascinated for generations with paper cutouts, and paper people holding hands is the most popular one of them all. Making paper people holding hands is a perfect activity to occupy children after school, on a rainy day or any other time. So let's learn to make paper people holding hands.
Materials needed
• Paper (8½ x 11)
• Pencil
• Ruler
• Soft cardboard (e.g. cereal box)
• Scissors
• Crayons
Here's what to do:
1. Fold a sheet of paper like an accordion. Make sure all the sections are the same width.
2. Measure the width of one section of the accordion. Mark a section of cardboard the same width.
3. Make a template. Draw a picture person whose hands are extended to the sides on the marked off section of cardboard. Cut out the person.
4. Place the template on the top section of the accordion. Trace the image onto the paper. Make sure the hands extend touch the folds of the paper on each side.
5. Cut out the image while holding the paper in the accordion form. Make sure not to cut either of the folded edges where the arms end. If you do, you will have a lot of separate dolls.
6. Unfold the paper. You should have a whole chain of paper people holding hands.
7. Color your paper people with crayons. [sources:Parents Connect, Family Education]
|
global_05_local_4_shard_00000656_processed.jsonl/63343
|
Everyone knows that being fat is bad for you, but most people can’t explain exactly why. Some reasons are obvious. Fat tends to go hand in hand with diabetes, and more weight means increased stress on joints and the heart. More puzzling to researchers is that excess fat seems to be linked with cancer of the kidneys, colon, and liver, and even to cognitive decline.
Until fairly recently, fat was thought to be inert, evolution’s wobbly way of letting humans store energy for lean times. And we’ve long known that it’s better to be slightly overweight than underweight, as a recent study in the Journal of the American Medical Association reiterates.
Starting in the 1990s, though, scientists began to realize that fat is best understood as a single huge endocrine gland, one that wields powerful influence over the rest of the body.
1. lifewithoutbacon posted this
|
global_05_local_4_shard_00000656_processed.jsonl/63348
|
Jump to content
Pod X3 Live, Disabling Amp Model
• Please log in to reply
2 replies to this topic
#1 es336td
• Members
• PipPip
• 210 posts
• LocationSumerduck, Virginia
Posted 09 June 2013 - 05:26 PM
I see they changed things in the forums again... goodie. Once things work, why can't they leave them alone? I realize, being a software developer, that they want to use the latest and greatest.... but damn.
Now, back to the question... It is my understanding from the GearBox documentation, that I can disable the amp models and the X3 Live would be basically like my M9; just effects. I have done so, however, I notice that the volume on the amp model is left on and on most occasions zeroed. There are times when I want to use this thing (X3 Live) as an effects pedal board with my tube amps. I disabled the amp models on some patches I had set up so I could have all the effects. Had to adjust the volumes on the amps model (even though it was disabled) to where they were. Now instead of hearing my Blues Jr, or Mesa Boogie SOB colored by the delay, chorus, or whatever, each tone sounds weird. They should all be basically the same, except without the extra kick of the amp model and its EQ. What am I doing wrong? Have I misunderstood how to run this thing?
• 0
#2 TheRealZap
Uber Guru
• Line 6 Expert
• 15383 posts
• LocationClemmons, NC USA
Posted 09 June 2013 - 05:56 PM
the old forums didn't work... they got crippled by some spambots.. i think this is much better... but its completely different software... not the latest and greatest...version of the old software.
• 0
#3 silverhead
Uber Guru
• Line 6 Expert
• 11381 posts
• LocationOttawa, Ontario, Canada
Posted 09 June 2013 - 06:20 PM
ON the X3 (and presumably in Gearbox also) there is a setting associated with the Amp called 'Bypass Volume'. This controls the volume level of the signal that is sent from the Amp block when the amp is off.
• 0
.... John Lennon
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users
|
global_05_local_4_shard_00000656_processed.jsonl/63349
|
Main :: James Tyler Variax Guitars
Support community for JTV.
Pickup dimensions JTV59 Korean (standard or F spaced)
by Rowbi on 2011-03-17 09:33:38
can anyone who already has a Korean JTV59 please measure the distance between the high and low E string over the neck pickup, and also over the bridge pickup. mm would be best please.
Just asking so I know the type of pickup spacing that's needed, as I haven't got a JTV yet...
Message was edited by: Rowbi
Re: JTV59 Korean Pickup type size (standard or F spaced)
by markcockerill on 2011-03-17 10:51:49
With the top E string fretted at the highest fret the gap should be 1.6 mm from underneath the string to the top of the magnet. 2.5 for the bottom E string. This does depend however on the strength of the magnets and the pickups can be lowered a fraction if need be if you notice too much input gain into the amp. I believe this is pretty standard stuff for humbuckers, hope it helps. Line 6 may not do this from factory setups so expect opinions to vary.
by Rowbi on 2011-03-17 11:30:13
thanks for the info, but i think you missed what I was asking. I would like to know the distance from the low E to the high E...... in 2 places. once over the bridge pickup and again over the neck pickup of a JTV59 Korean model.
it should be in the region of 48-54mm for both, but the neck measure ment will be a little less.
e.g. on my les pauls here, it's around 50-51mm at the bridge pickup, and 48mm at the neck pickup.... on my Ibanez RG it's about 52.5mm at the bridge pickup and 50mm at the neck pickup.
here's more info on what I mean: taken from here: http://www.dimarzio.com/site/#/faq/the F,spacing and standard spacing FAQ:
What is F-spacing?
All of our full-size humbuckers except the X2N® are available in two polepiece spacings. F-spacing refers to the wider of the two spacings. For proper string alignment and balanced output, F-spaced humbuckers should be used in the bridge position on all guitars with string spacing at the bridge of 2.1" (53 mm) or greater. On these guitars, if the nut width is 1-11/16 (43 mm) or greater, F-spaced pickups can be used in the neck position as well.
Why are there two different spacings?
How do I know which spacing to use?
F-spaced pickups measure 2.01" (51 mm) center-to-center from the first polepiece to the sixth. Standard-spaced pickups measure 1.90" (48 mm). Although some players believe that F-spaced pickups are only for the bridge position of tremolo bridge guitars, many guitars with fixed bridges (including late 1990s Gibson Les Pauls and Epiphone LPs) should have F-spaced pickups in the bridge position. Most tremolo equipped guitars that have a nut width of 1-11/16 (43mm) or more should also use an F-spaced pickup in the neck position. If you’re replacing a bridge-position pickup and you're not sure what your string-spacing is, it's usually better to get an F-spaced model. It is not necessary for the strings to pass exactly over the center of the polepieces for best performance, but it is wise to avoid a situation where the E strings are sitting completely outside of the outer polepieces.
If you're talking about Seymour duncans, F spacing is called a trembucker.
Re: Calling anyone with a Korean JTV59...
by Rowbi on 2011-03-18 02:16:50
Can anyone measure this for me as I'd be really grateful? it should only take a few seconds to measure from high to low E string twice (once over each pickup) in milimetres.
I just want to get my replacement magnetic pickups ordered now (while I can get them at a discounted price) ready for when I take delivery of my 59... I'm thinking about maybe a Dimarzio Tone Zone in the bridge, and something more vintage in the Neck!
thanks to whoever can help, as I really need this info ASAP.
Message was edited by: Rowbi
Re: Calling anyone with a Korean JTV59...
by ozbadman on 2011-03-18 23:26:52
Sorry Rowbi, been away on business and just got back.
On the Korean JTV-59, the distance between high and low E strings over the bridge is 50.5mm. Over the neck pickup it's 48.0mm.
Re: Calling anyone with a Korean JTV59...
by Rowbi on 2011-03-19 02:19:46
Thanks for doing that David.
so it looks like it's a standard spacing for the neck pickup, but the bridge pickup is borderline between both... but based on the Dimarzio information (F spacing poles are 50mm apart) and Seymour duncan's info nere: http://www.seymourduncan.com/support/faq/frequently-asked/everything-else/what_does_tremb/
Ithink I'm gonna go for trembucker or f spacing for the bridge.
Now I just need to totally make my mind up about pickups. I'm swaying to a DImarzio super distortion and humbucker from hell now....
|
global_05_local_4_shard_00000656_processed.jsonl/63358
|
[Sca-cooks] cider
Terry Decker t.d.decker at att.net
Thu Aug 26 20:17:26 PDT 2010
> On Wed, Aug 25, 2010 at 9:56 PM, Ian Kusz <sprucebranch at gmail.com> wrote:
>> Where does the word "cider" come from?
> From the French <cidre>, which is from Latin and cognate with Spanish
> <sidra>. The Latin is <sicere> "strong drink," which doesn't explain
> the d showing up in French and Latin; presumably there was a late
> vulgar latin variant that I'm not aware of that developed into those
> forms.
> Google tells me that <sicere> is a loanword from Hebrew, used to
> translate Biblical references to alcohol.
> - Jaume
The quick ref says it's Late Latin which would make the word 3rd to 7th
Century from the original Hebrew by way of the Greek "sikera."
More information about the Sca-cooks mailing list
|
global_05_local_4_shard_00000656_processed.jsonl/63359
|
[Openmcl-devel] CLOS make-instance :around behaviour
Pascal Costanza pc at p-cos.net
Sat Oct 25 16:05:43 UTC 2008
On 20 Oct 2008, at 16:21, Bob Hutchison wrote:
> On 19-Oct-08, at 4:40 PM, Bob Hutchison wrote:
>> On 19-Oct-08, at 3:33 PM, Pascal Costanza wrote:
>>> You're invoking undefined consequences.
>>> See Section in the HyperSpec, bullet 19: You're
>>> defining a method on a predefined generic function (make-instance)
>>> which is applicable when its only required argument is a direct
>>> instance of a standardized class (here the class 'symbol, of which
>>> 'some-class is an instance: (typep 'some-class 'symbol) => T).
>> Never would have found that :-) Thanks.
>>> Common Lisp implementations are allowed to take that restriction
>>> into account and, for example, compile away the call to make-
>>> instance and replace it with something more efficient in case the
>>> first argument is a constant symbol (for example).
>>> If you really need :around methods on make-instance, consider
>>> defining your own metaclass using the CLOS MOP. But based on your
>>> example, I have the impression that an :after method on initialize-
>>> instance should be sufficient, which is generally preferable
>>> anyway...
>> That example is simplified. What I'm trying to do is implement a
>> cache like thing. If someone calls, say, (make-instance 'thing :id
>> "abc") then if there is already a thing with id "abc" return it
>> rather than a new instance.
>> As far as I know there's no way to change the return value of the
>> primary method just using an :after method.
>> So... I suppose either I define my own metaclass (a new adventure
>> for me :-) or stop using make-instance.
> I wound up defining my own metaclass. Jan Marecek gave me a nice
> head start, and Closer to Mop makes it portable (thanks again Pascal).
> This worked out quite nicely, with the exception that eql
> specializers on methods don't work anymore. They aren't actually
> needed with the new metaclass, so I didn't spend a lot of time
> trying to workout how to get them working.
This is weird, why should eql specializers not work anymore?
Vrije Universiteit Brussel, Programming Technology Lab
Pleinlaan 2, B-1050 Brussel, Belgium
More information about the Openmcl-devel mailing list
|
global_05_local_4_shard_00000656_processed.jsonl/63360
|
[Top] [All Lists]
[TowerTalk] ground screen for new lawn
To: <>
Subject: [TowerTalk] ground screen for new lawn
From: (lightfoots)
Date: Wed, 28 May 1997 01:19:01 -0700
Charles H. Harpole wrote;
>height above gnd important to Yagis ? de K4VUD
It does, but for all intent and purposes, is useless in practicality.
Here's why:
The reflection from ground that we are interested in takes place many
wavelengths away from the actual antenna. The lower the angle of radiation,
the farther away that occurs. This is due mostly to the normally radiated
free space "lower half" of the spherical radiation pattern. This reflection
from the ground is reflected with a phase relationship that may produce
either constructive interference or destructive interference, or somewhere
in between. In other words at some angles, will produce a null, and at
other angles produce signal enhancement. This is the angle of brewster, and
is of paramount importance for long haul dx. Since the angle of brewster
occurs so far away from the antenna, it is not practical to ground screen
30 wavelengths and farther away.
To say that a ground screen has NO effect is also in err. It DOES affect
the higher angle radiation lobes. Why? Simple, since the lower half of the
free space sphere is sent down at all angles to the earth, just as all
angles are radiated from the upper "radiated" sphere, the "underside"
(normally free space) sphere is reflected from ground, and induced back
into the antenna elements, producing different currents and therefore
impedances in the element than would occur at another height. Now, to get
to the point- just like the lower angles are reflected from earth at a far
distance, it makes sense then that the high angles would reflect from the
earth closer and closer to the actual antenna, therefore, incresing the
conductivity of the earth directly underneath will do more to suppress very
high angles, and make the nulls a little deeper than over real "dirt".
To say that a ground screen truly has "NO" effect is false. It is true,
however, that it does nothing for the angles that the radio amateur is
interested in.
Hope that clears it up,
73 es CUL
hmmmmm....where does this door GOOOOOoooooooooooooooo.......
|* *|
|* *|
FAQ on WWW:
Administrative requests:
<Prev in Thread] Current Thread [Next in Thread>
|
global_05_local_4_shard_00000656_processed.jsonl/63367
|
Re: [css3-namespace] Empty namespace vs. no namespace.
From: Simon Sapin <[email protected]>
Date: Mon, 13 Aug 2012 14:10:29 +0200
Message-ID: <[email protected]>
To: [email protected]
Le 13/08/2012 13:30, Daniel Glazman a écrit :
>> Fromhttp://www.w3.org/TR/2009/REC-xml-names-20091208/#defaulting
> Exactly.
> And it says "The attribute value in a default namespace declaration MAY
> be empty. This has the same effect, within the scope of the
> declaration, of there being no default namespace". See the third
> example in section 6.2.
> So, yes, apparently you can "create an element with namespace name
> being the empty string" as Kenny said.
I get the opposite conclusion from the same data: whatever you try to
get such an element, you will either get an XML syntax error or an
element without a namespace.
Or do you see a "namespace name being the empty string" the same as "no
Simon Sapin
Received on Monday, 13 August 2012 12:10:54 GMT
|
global_05_local_4_shard_00000656_processed.jsonl/63368
|
Little Details
A Fact-Checking Community for Writers
Previous Entry Add to Memories Share Next Entry
Hindi or Telugu expression of parental disappointment
gallo_de_pelea wrote in little_details
I'm making a comic with a main character who is the American-born first son of Indian immigrants. English, Telugu, some Urdu, and some Hindi are spoken around the home.
In the scene I'm currently working on, MC is speculating on best case and worst case scenarios of seeing his parents again after a major falling-out. When he's quoting what they might say (His line is "I can expect to hear a LOT of [__phrase here__]"), I'd like to have him use an expression with the same sort of feeling as "where oh where did we go wrong?", that sort of melodramatic parental complaint.
Is there a common expression like this that could work?
Thanks in advance. :)
[Google searched various combos of Hindi/Telugu/Hinglish parental/family expressions of disappointment/disapproval, and looked through a BUNCH of personal blogs by kids/young adults in similar households. No luck yet.]
No HTML allowed in subject
|
global_05_local_4_shard_00000656_processed.jsonl/63373
|
‘Lord, make me hurt more’
Shared from the website of the Diocese of Springfield.
As given to us in John’s gospel, on the night before he suffered and died, our Lord prayed for his followers at some length. The heart of his prayer is, I believe, summed up right here (John 17:22-23):
The glory which you have given me I have given to them, that they me by one even as we are one, I in them and you in me, that they may be perfectly one, so that the world may know that you have sent me and have loved them even as you have loved me.
If ever a prayer has gone unanswered, this would seem to be it, right? The number of different “brand names” by which Christians identify themselves numbers in the tens of thousands. Most recognize most others as authentically Christian, though some do not. But even where authenticity is recognized, there is an impaired relationship. In the ministry of God’s word, and the ministry of God’s table, our divisions are painfully evident.
Or sometimes … not so painfully, and therein lies a problem. Sooner or later, it’s a natural human impulse to accept that which cannot be changed. It becomes the new normal. So, institutional division between professing Christians has, to a large degree, simply been normalized in our own minds. Ironically, the most contentious quarreling these days is within particular Christian bodies, among those who are ostensibly in full communion with one another. As Episcopalians, we have become experts at that! But once there has been a formal separation, and the generation that initially experienced the separation has died off, passions cool, and the fact of the separation is accepted as a given reality. Episcopalians and Congregationalists and Greek Orthodox and Presbyterians and Roman Catholics all worship among their own on Sunday morning, but bear one another no particular ill will when they meet at a restaurant or across a backyard fence on Sunday afternoon. Some have even come to rationalizes the existence of these various brand names as divine gifts–different styles of worshiping and thinking and living that appeal to different kinds of people.
The days between January 18 and January 25 make up the Octave of Prayer for Christian Unity. An “octave” is a period of eight days, and this octave is anchored on one end by the feast of the Confession of St Peter and on the other end by the feast of the Conversion of St Paul. The observance was established by a Franciscan religious community — the Graymoor Friars of the Atonement — in 1908. At that time, the members of the community were Episcopalians. Shortly thereafter, they were received into the Roman Catholic Church.
Sadly, the Octave (or Week, as it is now more commonly known) does not enjoy a high degree of awareness beyond a small circle of Christians who have taken a particular interest in ecumenism. I suspect this low level of interest may be attributable to the fact that our divisions are insufficiently painful. The divisions themselves have certainly not healed, but the accompanying wounds, in most cases, have. They no longer hurt. We’ve accepted the scars, and even started to celebrate them. So we’re not very motivated to put very much effort into treating an ailment that isn’t inflicting any serious pain.
But if our hearts are not painfully broken by our divisions, it is because they have been hardened. I am quite certain, however, that the heart of Jesus is quite broken by it all, that his petition as our High Priest on the night before his passion is still awaiting fruition. It is wonderful that various churches can share ministries of compassion and social outreach. It is wonderful that we can sometimes bear common witness on issues affecting the common good, though we are as likely to be divided in that respect as we are theologically. It is wonderful that we can be in civil conversation with one another across our differences, and I give thanks for the various bilateral and multilateral ecumenical dialogues. But it is an absolute scandal that, where it counts the most, in our proclamation of the Word of God on the Lord’s Day and in our participation in the mysteries of his Body and Blood, we must retreat to our separate enclaves.
In our acceptance of division, in our normalization of the endless array of Christian brand names, we overlook that very practical reason that Jesus prayed for our unity: “…so that the world may know that you have sent me and have loved them even as you have loved me.” That the world may know. Many who are readings these remarks have heard my standard parish hall “stump speech,” which talks about the massive shift our society is making from being Christian at the core to being secular at the core. In a cultural world that is presumptively Christian, we can get away with a certain amount of division. But in a cultural world that is presumptively non-Christian — or even anti-Christian — then our divisions cripple us. To the extent that we quarrel among ourselves, we are just an object of ridicule to the world. To the extent that we cannot let God heal our own divisions, how can we dare to tell the world that we are the herald, the earnest money, on God’s project of reconciling the world to himself in the person of his Son?
So, for this month’s observance of the Octave of Prayer for Christian Unity, my personal petition is going to be simply this: “Lord, let me hurt more. Lord, let the anesthetic of normalization wear off; let me feel the pain that your own heart feels over the lack of unity among your holy people, among those who have been buried with your Son in the waters of baptism.” When more of us feel the pain of our separation, we will be motivated to make ourselves more readily available to the grace of God to work in our midst, because the healing of our division is surely not something we can accomplish on our own.
Leave a Reply
Copyright 2012. The Living Church Foundation. Designed by 11th Hour
|
global_05_local_4_shard_00000656_processed.jsonl/63374
|
Messages in this thread
SubjectRe: Proposal: restrict link(2)
The Deviant writes:
> link(2) doesn't change the location. It modifies the inode and makes
> another inode pointing to it. If you delete the first one (which also
> still has the original permissions), then the new one is still there.
> This isn't _THAT HARD_ of a concept to grasp.
This is an example of either how poorly some people understand the UNIX
file system or how badly people are using its terminology.
link() does not create an inode. It links an inode to a directory.
Making a second link doesn't make a new inode; it makes a new reference
in the directory tree to the existing inode, and increments the link
count in the inode so that the inode knows how many links exist to it.
Removing a link only removes the inode if the inode's link count is 0.
People who are used to UNIX have learned to understand this
distinction. People whose previous experience was with MS-DOS
apparently have a harder time because the MS-DOS filesystem doesn't
allow multiple links to a file and the name of the file is actually part
of the file's metadata.
I acknowledge that you certainly can attempt to use multiple links to a
file to cause mischief. However, I don't think this problem is either
as nasty or as easy to solve as many of the parties in this argument
seem to think.
\ /
©2003-2011 Jasper Spaans
|
global_05_local_4_shard_00000656_processed.jsonl/63395
|
Here is what I do
Story: Breaking down barriers to Linux desktop adoptionTotal Replies: 6
Author Content
Feb 28, 2006
9:35 AM EDT
The author makes several valid points concerning the absurdity of the reasons that people use in answering the question of why they have not or will not give Linux a try.
I will admit that if someone has already made up their mind not to give something new a try, then there is no sense in wasting your time trying make them re-think there decision.
Among those who give such excuses there are those who are just repeating what they have heard or read and really do not a have any of their own information or experience to draw from. They are easy to pick out once you have heard hundreds of different people say almost the exact same thing like I have. It is not that hard though, all you have to do ask a few questions and you can easily determine if they are just repeating what they have heard or actually have their own reasons for not wanting to give Linux a try.
Here is what I do.
2. After you ask them how many Anti-Viruses they use, they will ask it back to you
"How many Anti-Viruses do I use?" - "Do you have more than one Anti-Virus on your computer?" Many people do not, but many do use more than one. This is where I tell them,
"When I ran Windows I used, Ad-Aware, AVG, Spybot, Spywareblaster, Spyware-Doctor, Webroot and Registry Mechanic." Which by the way is true, I had all of them on my computer and between them I could keep my system fairly safe, fairly.
3. Ask them if they have ever heard of Firefox. Some will ask,
"What is Firefox?" - "Firefox is a browser." "What is a browser?" - "It is a program that you use to surf the Internet." "You mean like IE?" - "Exactly, only it is a lot safer than IE."
Here is where I go into the features, import of favorites and reasons it is safer than IE like,
"Because it is not a part of the operating system, it is a lot harder for spyware to damage your system when using Firefox." Which is technically true, technically.
Now for those who know of Firefox and/or already use it then you will not have to have the previous conversation.
4. Since almost all of the people who use MS-office only use Word, ask them if they have ever heard of OpenOffice.org. I have only ever had one person say yes to that question, only one.
Say to them, "OpenOffice allows you to view, modify, save and send the changed document in MS format and it does not cost $500, actually it does not cost a thing." I have to tell you, that a lot of people are not happy when they buy a new computer and then are told by the store employee that it does not come with Word or Office and that if they want it, it will cost hundreds of dollars. If you can get people to listen to you long enough to get to the parts about compatibility and price. Many will not leave until they get the web address from you.
If I can get most or all of the way through these steps then I know I can re-visit the Linux question and show them that it just might be something that could work for them. When I explain the Root and User separation built into Linux, how it makes the computer safer and that they will not need multiple Anti-Viruses or have to re-format their Hard Drive every six months because windows does not actually delete anything, they start to actually look at the retail Linux box I have already handed them.
Is this system perfect? No. You may talk about one thing before another or skip over something or do it in reverse, every conversation is unique. I do it this way because I inform them of choices they may not of known of, open them up to new ways of doing something and not make them feel like they were wrong or stupid. If I do it right, they do not even feel their own shift in opinion or preference.
I should expand on this some more and I will. But I thought that giving you the basics of what I do might help others in getting past the FUD without alienating the person you are talking too. Changing someones opinion or stance without making them feel stupid takes practice, and I get a lot of practice. :-)
Feb 28, 2006
11:29 AM EDT
Sharkscott - were you the guy I wanted to clone several weeks back?
If not I am adding you to the list. You are very perceptive individual. Keep it up.
Feb 28, 2006
12:00 PM EDT
Yeah, that was me. :-)
After posting it I have resisted the urge to edit the living daylights out if it and add stuff. But I will wait.
If you have ideas or examples that have helped you, let me know. I'm always open to adding to my arsenal.
Mar 04, 2006
3:10 AM EDT
It's never a good idea to bash MS. I know it's hard, but people don't like hearing that a product they use is trash.
The reason: it makes them feel like you are telling them they are stupid/ignorant for choosing to use it.
Now, some of you will think "Well they are!". And, maybe you're right... but, if you're talking to someone about changing to GNU/Linux, then you must care about them in some way. Or, even if you're doing it for selfish reasons, then it's in your best interests to avoid unintentionally stabbing at this potential convert's ego, by slamming their (perhaps naive, ignorant, or stupid) choice to use MS products.
I mean, imagine you just bought a nice shiny new car. Then one of your friends starts telling you about how bad that make/model is. You get embarassed, your friend has some good points, but by now you've already stopped listening. You don't want to hear it. You dig your heels in and start defending your car... your decision... yourself
Basically, it pays to be kind. And you catch more flies with honey than vinegar.
Tell the person things like:
* It's understandable that you currently use MS products because they have a very good marketing strategy and have taken advantage of business opportunities in the past that have put them on top. MS Windows comes preinstalled on most machines. However, this doesn't mean that MS make the best products. You can try Ubuntu (don't hate me, Ubuntu is probably the best place to start really new users off). It has everything you need from an operating system: it's easy to install; comes with heaps of software preinstalled; you can use it alongside Windows; you can't get viruses... etc.
(These next ones may be painful, but they will work better than what seems to be a common approach, which is "MS sux...and Linux rulz")
* IE is a good browser (ouch), but... FF offers added functionality and greater security.
* MS Office is a very good suite of products, but most people don't use them all and it is quite expensive. You can probably do everything you need to do with OpenOffice, including working on your MS Office files, and it's free.
You get the picture... basically, the hard sell method went out in the '80s.
Once a user starts to use free software, they will start to feel like part of the community and will be proud when they realise they've made the right choice. When someone tells them about the latest virus or worm affecting PC's, they'll think "Not mine!", and they'll get a warm glow inside. Before too long they'll chuck away Windows altogether... I know I have.
Well that's my two cents.
Mar 04, 2006
5:17 AM EDT
Great post and you are right that it is best not to bash M$. I do make a conscience effort not too.
I try to stay focused on features, if I can do that, OSS sells itself. I do not "hate" M$, but I do prefer OSS. I can't help that! :-)
Because you gotta admit the "price" sure is right when compared to M$, $500 for MS-Office vs. $0 for OpenOffice.org
Mar 04, 2006
3:15 PM EDT
fsmdave: Hey! I tend to agree with your post, also. I just tell peole two wrongs don't make a right: MSWindows and Office. ;-)
Mar 04, 2006
7:03 PM EDT
Great post. Personally, I DO hate Microsoft. However, my hate is not purely philosophical. Maintaining a Microsoft installation is like maintaining a Fiat. I've learned to bite my tongue when talking to clients and end users. However, I know a LOT of "Sys Admin" types that are just too lazy to learn anything about linux. At one company, a long-time friend and colleague that meets the forgoing description actually came into my junior programmer's office asking for help with some linux firewall rules...more like demanding help. His excuse, in his own words: "I don't want to have to resort to reading the documentation". His title was I.T. Manager. Guess who was first to be let go when the layoffs came? Most MS folks just click and guess their way through life...they don't even master the technology that they make a living with. Automate Windows tasks with shell scripts? No way....they might just have to resort to typing...or, God forbid, reading some documentation.
I do introduce Firefox and OpenOffice as much as I can. When I meet new clients I usually try to sell them on web-based apps based on OSS. I explain OSS as best I can. Almost everyone out there has heard of Linux. I don't try to sell Linux, I try to sell Open Source. I explain Apache...and how even many of Microsoft's web sites are hosted on Apache. How our government's sites are hosted on Apache. How they can scale their business apps, add new servers, have unlimited users at unlimited locations with ZERO licensing costs. The bottom line is that the operating costs for MS vs Open Source are not that different. You can pay me good money to develop, implement and maintain OSS apps for you, OR you can pay MS and Closed Source Vendors HUGE money for licenses (annually) AND pay out the ass for customization and/or training AND pay good money for a MS guy to try to implement and maintain it for you. Do the math. Just check out the cost difference between SugarCRM and MS CRM or Goldmine, and good luck customizing the latter two. Open source apps are inherently more intuitive and customizable. Sure, MySQL might not be right DB for the Fortune 500's apps, but for the majority of small-business MS-SQL Server installations it would rock.
Oh, forgot to mention, security is a big selling point. Every MS user/business out there has been burned by MS's security weaknesses.
I am really grateful for the efforts of all the people out there creating and refining the Live CD's. I can't tell you how many MS types I have turned onto Linux with Live CD's. Getting introduced to Linux for the first time is an amazing personal breakthrough. I've seen their jaws drop when the Desktop loads, the NTFS partitions are mounted and they are live on the internet without lifting a finger. Nothing in the MS world even comes close. Carry a bunch of Live CD's with you...give them away liberally and Linux will sell itself.
|
global_05_local_4_shard_00000656_processed.jsonl/63396
|
Men In Black: The Album (1997)
2,653,667pages on
this wiki
Redirected from Will Smith:Men In Black (original Soundtrack) (1997)
Soundtrack by various artists.
1. Men in Black by Will Smith
2. We Just Wanna Party With You by Snoop Dogg (featuring Jermaine Dupri)
3. I'm Feelin' You by Ginuwine
4. Dah Dee Dah (Sexy Thing) by Alicia Keys
5. Just Cruisin' by Will Smith
6. The 'Notic by The Roots (featuring D'Angelo)
7. Make You Happy by Trey Lorenz
8. Escobar '97 by Nas
9. Erotik City by Emoja
10. Same Ol' Thing by A Tribe Called Quest
11. Killing Time by Destiny's Child
12. Waiting for Love by 3T
13. Chanel No. Fever by De La Soul
14. Some Cow Fonque (More Tea, Vicar?) by Buckshot LeFonque
15. M.I.B. Main Theme by Danny Elfman
16. M.I.B. Closing Theme by Danny Elfman
External links
Around Wikia's network
Random Wiki
|
global_05_local_4_shard_00000656_processed.jsonl/63409
|
Switch to standard view
Sybase logo
Targeted CR List for ASE 12.5.4 ESD #8
Bug IDDescription
368417 Premature heap memory deallocation after each statement may lead to memory corruptions if the dealloctaion is done during trigger or internal sql execution.
381301 On AIX, sp_helpdevice reports a "device_number" one greater than the actual value for device numbers greater than 127
405738 When using JCONNECT, if the query includes the db name, the dbname is not included in the TDSROWFMT2 response.
415534 Adaptive Server hangs on call to a procedure on ASA or IQ using site handler RPC.
420916 The error "Could not find virtual page for logical page 9984 in database 'master'", with a stack trace which includes the modules like 'log_to_virt', 'virtmap ', 'bufgrab ', 'getpage_with_validation', will be reported if the requested size for master database is not multiple of size of allocation unit. The similar error will be reported in case of model database also.
434927 The option 'replication force_ddl' has a mispelling error in the system table spt_values.
443332 The message "current process infected with 11" in the module 'uwdisconnect' together with a stack trace which includes the modules 'err_pll_primary_processing' and 'pll_exec' may be reported in the error log when a query being executed in parallel on a multiengine server was aborted by CTRL+C or client application was killed.
446905 RTDS: Under certain circumstances the first time a session calls msgpublish() to a Tibco topic will fail with a 'Not permitted' error. Thereafter, it will succeed.
447012 Insert into index with large number of rows of duplicated index key value could fail due to incorrect split schema.
451453 A low risky stacktrace occurs when sending a message to Tibco JMS messaging bus if the Tibco JMS has been enabled before dataserver is booted and the dataserver is booted without setting environment variable "SYBASE_JRE".
451524 DUMP DATABASE WITH COMPRESSION will generate an invalid dump if the archive is a library created using the backup API. For example, DUMP DATABASE dbname TO "compress::myfile" WITH COMPRESSION=n.
461074 ASE may return a wrong result set when a query is run at transaction isolation level 0 (dirty reads) on an All Pages Locked table and a covered non-clustered index scan is chosen by the optimizer as reported by the set showplan option with message "Index contains all needed columns. Base table will not be read."
461201 Poll for all completed ct-lib I/Os issued from the engine every time the scheduler checks for I/O completion. Also, the engine does not relinquish CPU to the OS if there is any pending ct-lib I/O from that engine.
461850 A new configuration parameter called 'bind to engine' added for Rep Agent. Using this Rep Agent may be forced to run on a particular engine.
463040 When using messaging builtins (eg msgrecv, msgconsume) to return java.lang.String, if the return value is larger than 16k we get MEMMOVE error.
468970 During recompilation of a stored procedure (e.g. subsequent to a schema change), references to column names for derived table expressions may be reported as ambiguous (Msg 209) if they they are the same as column names from other tables in the query.
470100 If there are spaces before the CREATE PROCEDURE keywords in a batch, the procedure source code text in syscomments may be corrupted.
472181 The commands DROP, DUMP, LOAD, MOUNT and UNMOUNT were incorrectly scanning all the databases looking for cross references to local encryption keys, even if no encryption keys existed in the affected database.
472960 Attempt to convert UNICHAR data to TEXT succeeds on the first row but fails on subsequent rows. Example: select convert(text, my_unichar_col) from table.
475233 The stored procedure sp_ddlgen generates the 'with override' clause unnecessarily for the DDL corresponding to the case when a database is created with data on one device and log on different device.
475245 In some cases, DDLGen incorrectly misses out the WITH OVERRIDE clause for the last disk piece of a database when generating the DDL for multiple databases named by a pattern specifier. Also in some cases, when generating the DDL for a single database, the WITH OVERRIDE clause is generated for some ALTER DATABASE statements even when it is not necessary.
475313 DBCC CHECKSTORAGE reports an erroneous error 100028 on a partitioned table.
475525 CIS: A query on a view may return wrong result when the view includes a T-SQL outer join involving remote tables.
476178 DUMP DB command with compression API fails with uninformative error message when dump device does not have enough space for database dumps.
476369 Client jConnect session running batch inserts with "dynamic prepare= true" is terminated when another user session performs UPDATE STATISTICS command on the insert table.
476441 Backupserver can occasionally give false io errors due to a synchronisation issue.
476676 Query assigning variable and using view with union may provide incorrect assignment of the variable if the variable is also used on the qualification side.
476864 Parallel execution of a query with subquery returning convert over some aggregate may return incorrect result qualifying too many rows. The problem is likely to happen in the multi engine environment.
476902 When an INSERT-SELECT query contains a UNION clause in a derived table definition, and the derived table is the source of the SELECT, 206 and 207 errors may occur.
476950 If a single character of password is allowed and used in a sql statement, the obfuscated password in audited cmdtext will lose opening delimiter.
477067 On HPUX 64 bit machines, the message "current process infected with 11" in the module 'pcexchandlerprint' together with a stack trace which includes module 'traceassert' may be reported in the errorlog when the trace flag 1205 is turned ON.
477152 sp_fixindex run for the Sysusages clustered index may lead to errors 8204, 806 and ASE boot failure.
477161 The SySAM License Server and FLEXlm client components have been updated to use FLEXlm version 10.8.
477311 Cursor fetch operation may cause a segv stack trace during curs_fetch() processing.
478425 ASE expands a '*' element in a SELECT target list and adds comment to syscomments system table before saving the SQL text of the procedure, view or trigger to syscomments. End comment mark (*/) may not be added to syscomments on non-English environment.
478959 After changing ASE server character set to utf-8, it'll cause segmentation fault if MDA "SQL batch capture" is enabled in AIX platform.
479743 If a table has more than one encrypted column with at least one column declaring a decrypt_default value, and if decrypt permission is granted at the column level to at least one of the non-decrypt_default columns and withheld from the column with the decrypt_default value, then any select of the column with the decrypt_default will correctly return the decrypt default value and also return (incorrectly) Msg 10332.
480574 The execution of DBCC DBREPAIR with option LTMIGNORE when run on an offline database will mistakenly result in error 12901 being reported "This command is not allowed on an offline database ' < database_name > '."
481144 Parsing of very large TEXT literals may case timeslice errors in heavily loaded systems.
482129 Under some circumstances the message "current process infected with 11" maybe reported in the error log when executing a batch of DML statements and a trigger executed a ROLLBACK TRIGGER WITH RAISERROR.
482269 ASE corrupts characters, returns "NoSuchElementException" or stack traces in the module SybXmlString() when using the FOR XML statement on characters belonging to the Latin-1 character set.
482480 Under some conditions ASE performs too many writes to sysprocedures when Trace 299 is ON.
482566 Queries involving Sybase outer joins and access rules can sometimes lead to error 325.
482590 Process trying to establish communication with remote server cannot be killed
482940 Query with view with unions which uses dynamic index strategy may sometime fails with different errors related to the sort operation. Sometimes the stack trace in the errorlog may indicate the module startscan.
483286 MDA process which calls monlocks will cause timeslices when holding a spinlock.
483642 No error messages or trace information is available when the High Availability agent for ASE on Windows/MSCS cluster decides to failover sometimes.
484076 Under some circumstances the execution of a stored procedure which uses execute immediate for creating other stored procedures and had to be recompiled maybe be aborted reporting in the errorlog the message "current process infected with 11" in the module 'set_cast' including a stack trace which includes the modules 's_renormalize' and 's_recompile'.
484098 HA VCS 4.x: Enhanced diagnostics information for the VCS4.x HAase Agent. Also fixed a possible hostname comparison failure when one hostname obtained is short form of the hostname, and another is a fully qualified hostname with tailing domain name.
484236 Can't create 16k ASE Server for Linux x86 on ASE_DEV licenses. This issue is reproduced by ASE SmallBusinessEdition and Developer Edition.
484549 Explicit or implicit convertion of java datatypes may someties lead to the corruption of the query plans.
484805 Numeric modulo function can generate wrong result when aggregate functions are involved in the calculation.
484982 When long running chained transactions are left active in the database, even though they have not done any DMLs, they may prevent housekeeper from doing garbage collection in the database.
485461 In some circumstances the process accounting statistics (I/O and CPU) are not updated when an end-user logs out from ASE.
485623 MDA Tables such as monProcessStatement may list processes that are not listed in the sysprocesses table.
485752 Error 515 is raised when update non-null image/text column with 256 bytes through jConnect Stream/BLOB interface.
486766 A join query with a plan using the Dynamic Index strategy may sometimes fail with error "Msg 1504 Internal Sort Error. Empty Index Page found.". This may happen if the optimizer decides to use the Dynamic Index as an inner table in the join and the parallel sort is applied to the Dynamic Index worktable.
488217 Under rare circumstances, for a query involving the > = or < predicate on a large table, if the search argument constant value falls exactly on the boundary of a histogram range cell and if this is the last cell of the histogram, then a histogam processing adjustment that converts the predicate to > or < =, might result in an underestimated selectivity for the predicate.
489186 In rare circumstances, a 692 error is reported for syslogs when a database is loaded using a database dump that was taken on a platform where the byte order(endian type) is different.
492368 Using bcp to copy IN rows to a table that uses the allpage (APL) lock scheme, and whose rows have both encrypted columns and null columns, can produce rows that are wrongly formatted but are not detected when the rows are inserted. Replication Agent may report error 9289 when attempting to replicate a DML operation done on the badly formatted rows.
493701 On tables where all of the following occur: 1) lock scheme is APL (All Page Locking), 2) table has at least one encrypted column, 3) table has at least one variable length column, 4) a row has more than 255 bytes of fixed length data, then BCP IN on those tables will fail to insert rows.
Back to Top
© Copyright 2010, Sybase Inc.
|
global_05_local_4_shard_00000656_processed.jsonl/63423
|
From Sun Jun 9 20:02:04 2013 Return-Path: X-Original-To: Delivered-To: Received: from ( []) by (Postfix) with SMTP id 83E8210FFF for ; Sun, 9 Jun 2013 20:02:04 +0000 (UTC) Received: (qmail 18857 invoked by uid 500); 9 Jun 2013 20:02:04 -0000 Delivered-To: Received: (qmail 18825 invoked by uid 500); 9 Jun 2013 20:02:04 -0000 Mailing-List: contact; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: Delivered-To: mailing list Received: (qmail 18816 invoked by uid 99); 9 Jun 2013 20:02:04 -0000 Received: from (HELO ( by (qpsmtpd/0.29) with ESMTP; Sun, 09 Jun 2013 20:02:04 +0000 X-ASF-Spam-Status: No, hits=-0.0 required=5.0 tests=RCVD_IN_DNSWL_NONE,SPF_PASS X-Spam-Check-By: Received-SPF: pass ( domain of designates as permitted sender) Received: from [] (HELO ( by (qpsmtpd/0.29) with ESMTP; Sun, 09 Jun 2013 20:01:59 +0000 Received: from ([]:33067 helo=Astraendo2) by with esmtpa (Exim 4.80) (envelope-from ) id 1Ullo2-001Lrl-4b for; Sun, 09 Jun 2013 16:01:38 -0400 Reply-To: From: "Dennis E. Hamilton" To: References: <> In-Reply-To: <> Subject: RE: [DISCUSS] ODF file formats vs Zip Date: Sun, 9 Jun 2013 13:01:40 -0700 Organization: NuovoDoc Message-ID: <008e01ce654c$2940de40$7bc29ac0$> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-Mailer: Microsoft Outlook 15.0 Thread-Index: AQIUegWjz98o8DvTV/Vfg4+MgR0WYAGZJrdRmJTS2XA= Content-Language: en-us X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - X-AntiAbuse: Original Domain - X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - X-Get-Message-Sender-Via: authenticated_id: user confirmed/virtual account not confirmed X-Virus-Checked: Checked by ClamAV on Regina is correct about the only two compressions. As far as I know, = there is no way to control which compression is used. (If you save with = Password, all files are always compressed.) Most of the time DEFLATE is = used (although there are two files that are not usually compressed, = apparently to make metadata mining simpler for non-encrypted packages). There is currently no way to control the compression in AOO. (The ODF = specification simply stipulates the compression that must be used when = compression is done, not whether compression is done for parts of = unencrypted packages.) I don't think it is the compression that is responsible for the = slow-downs, it has to do with other work that goes on in order to save a = file. =20 If you are careful about regularly saving manually while you are = working, and you work into a new copy so the starting version can't be = damaged, you can disable auto-save to avoid being interrupted in the = midst of something you are doing. There may be some glitches that cause = the time to increase in certain situations and those are caught from = time to time. Using the latest version usually includes those = improvements. I suspect there are some other performance issues around = Save (and Auto-Save) that are more involved. - Dennis -----Original Message----- From: Regina Henschel []=20 Sent: Sunday, June 9, 2013 11:41 AM To: Subject: Re: [DISCUSS] ODF file formats vs Zip Hi Johnny, Johnny Rosenberg schrieb: > When working with big files, in my case spreadsheets, but possibly > other types of office files, saving the file will in some cases take a > lot of time. This is particularly annoying when auto-saving is > enabled. As I understand it, an ODF is a couple of files, most of them > XML files, brought together in a single file, then compressed to the > zip format. > > Does the ODF standard specify the compression ratio? There are two methods possible STORED and DEFLATED, see=20 ,=20 section 2.2. If not, it would > be convenient if the user could specify that. For example, if I prefer > saving to be as fast as possible, I could specify no compression at > all, just bring the files together in a tar-ball (if that's allowed) > or as an uncompressed zip. > > I don't know how much of the required time to save a file is used for > compression, but I imagine that there is room for speed enhancements > here. > > If this is not the way to go, maybe the extension could change as > well, indicating this is another file format, although conversion to > and from ODF should be very straight forward=E2=80=A6 Using another compression is still .zip file format. ODF has a flat file format without container too. This is implemented in = LO but not in AOO. But in the flat format all pictures are stored in=20 base64, because there is no folder to store them in original format. > > Thoughts about this? It would need tests to see, whether the method STORED is significant = faster. Kind regards Regina --------------------------------------------------------------------- To unsubscribe, e-mail: For additional commands, e-mail: --------------------------------------------------------------------- To unsubscribe, e-mail: For additional commands, e-mail:
|
global_05_local_4_shard_00000656_processed.jsonl/63432
|
[SciPy-User] characteristic functions of probability distributions
Anne Archibald peridot.faceted@gmail....
Thu Nov 5 22:19:56 CST 2009
2009/11/5 David Goldsmith <[email protected]>:
> On Mon, Nov 2, 2009 at 12:51 PM, nicky van foreest <[email protected]>
> wrote:
>> Hi Josef,
>> > Second related question, since I'm not good with complex numbers.
>> >
>> > scipy.integrate.quad of a complex function returns the absolute value.
>> > Is there a numerical integration function in scipy that returns the
>> > complex integral or do I have to integrate the real and imaginary
>> > parts separately?
>> satisfies the Cauchy Riemann equations) this integral is path
>> independent. Otherwise the path from w to z is of importance. You
>> might like the book Visual Complex Analysis by Needham for intuition.
> Furthermore, if f is analytic in an (open) region R homotopic to an (open)
> disc, then the integral (an integer number of times) around *any* _closed_
> path wholly in R is identically equal to zero; there's a similar statement
> (though the end value is a multiple of 2ipi) if f has only poles of finite
> order in R. (Indeed, these properties should be used to unit test any
> numerical complex path integration routine.) Are any of your paths closed?
This may well be a red herring. It happens fairly often (to me at
least) that I want to integrate or otherwise manipulate a function
whose values are complex but whose independent variable is real.
Such a function can arise by substituting a path into an analytic
function, but there are potentially many other ways to get such a
thing - for example you might choose to represent some random function
R -> R2 as R -> C instead. Even if it's obtained by feeding a path
into some function from C -> C, it happens very often that that
function isn't analytic - say it involves an absolute value, or
involves the complex conjugate.
There are definitely situations in which all the clever machinery of
analytic functions can be applied to integration problems (or for that
matter, contour integration may be the best way available to evaluate
some complex function), but there are also plenty of situations where
what you want is just a real function whose values happen to be
complex numbers. (Or vectors of length n for that matter.) But I don't
think that any of the adaptive quadrature gizmos can handle such a
case, so you might be stuck integrating the real and imaginary parts
If you *are* in a situation where you're dealing with an analytic
function, then as long as you're well away from its poles and your
path is nice enough, you may find that it's very well approximated by
a polynomial of high degree, which will let you use Gaussian
quadrature, which can very easily work with complex-valued functions.
The Romberg integration might even work unmodified.
> DG
>> bye
>> Nicky
>> >
>> > Thanks,
>> >
>> > Josef
>> > _______________________________________________
>> > SciPy-User mailing list
>> > [email protected]
>> >
>> _______________________________________________
>> SciPy-User mailing list
>> [email protected]
> _______________________________________________
> SciPy-User mailing list
> [email protected]
More information about the SciPy-User mailing list
|
global_05_local_4_shard_00000656_processed.jsonl/63436
|
This Week
• Research and development efforts in construction come from collaboration.
• The new edition of Explore Greater Rochester is here.
Business & Charitable Events Calendar
Network International Meeting
Organization: Early Birds Chapter of Business
Free—7 - 8:30 a.m.—Jewish Community Center, 1200 Edgewood Ave.—Also offered April 3—Call David McClellen at 503-8598 for additional information.
• E-mailed
• Commented
• Viewed
RBJ Google
|
global_05_local_4_shard_00000656_processed.jsonl/63446
|
Aka Chan To Boku Manga
Baby and Me; Em bé và tôi; أنا وأخي; 天才寶貝/BB與我; 赤ちゃんと僕; 아기와 나; Akachan to Boku; Baby & Me; Baby and I
Aka Chan To Boku Forums
10 People reading this
Aka Chan To Boku Chapters
Aka Chan To Boku Manga Cover
1. Comedy, Drama, Shoujo, Slice Of Life
2. 1991
3. Completed
4. Ragawa Marimo
5. Ragawa Marimo
6. 2 Votes, Rating: 5
Please rate this manga!
7. Watch Aka Chan To Boku Anime Online
Related Manga
×Sign up
Sign up is free! Can't register? CLICK HERE
Remember me - Forgot your password?
|
global_05_local_4_shard_00000656_processed.jsonl/63449
|
Ask A Cartographer
What drainage generalization methods are available in ArcGIS 9.2?
February 21 2008 | 1 comment
Categories: ArcGIS Methods, Data Modeling
What drainage generalization methods are available in ArcGIS 9.2?
Mapping Center Answer:
So, there's really not a short answer to this question. To assume that there are "methods" is an oversimplification of the problem. There are two contexts that I can think of for approaching this problem; one is raster based and the other is vector based. I'll try to give you a start in both:
Raster: The Spatial Analyst Extension arguably has the most sophisticated tools for both analyzing and generalizing drainage. The idea is that you can extract drainage from your elevation model, generalize that elevation model, and extract drainage from the generalized model. (that's a gross oversimplification in that I am not going to specifically touch on the issues involved).
Vector: This is a pretty complex process and most hydro vector data is not captured with the necessary information or captured into a data model that readily supports genearlization. We tend to aggregate hydro vector geometries based on either semantic or network requirements; neither are sufficient (by themselves or together) to support generalization. The initial problem is to select the polygons and lines that will be used to derive the smaller scale data. The NHD team at the USGS has spent a good bit of time on this and has made some progress with automating stream selection within a stream network and doing so based on catchment areas. None of that work deals with polygons, just the NHD center of channel lines. ESRI is working with the USGS on methods for selecting and simplifying polygons, but none of that work is published to date. The gist of the work is in removing the insignificant polygons based on their size and shape type and then when an eliminated polygon overlays a channel line, convert that channel line to the appropriate type of stream line. The remaining polygons are generalized by converting them to lines, intersecting (breaking) those outlines where they intersect streamlines to preserve the junctions and simplifying the lines using the Simplify Line tool with the Bend Simplify Method. The details of this method are "generically" discussed in a Mapping Center blog posting called, Simplifing lines and polygons that intersect with other lines and polygons. The data and method were developed while working on this as yet unpublished research.
So, as you can see that just yet this is currently more of a field of study rather than a method.
Buffer/Centerline routine (using ET Geowizards) posted by Craig McCabe on Feb 21 2008 2:19PM
I was recently up against the same issue with generalizing a detailed 1:24k fault network and representing it at 1:250k, which is somewhat similar to your drainage network problem. The process involved some trial and error and a plug-in, but this is the vector-based approach I ended up taking:
1) Buffer the line network to create a new polygon layer (the correct buffer distance took some experimentation and you may need to break up the data and apply different buffer values in different locations, depending on whether neighboring lines should coalesce or not)
2) Use the ET Geowizards plug-in to Create Centerlines from your polygon layer(s)
That was it. Depending on how your drainage network looks, this may or may not be a viable option, but it's worth a shot. My first attempt was to use Collapse Dual Lines to Centerlines, but this never got me a satisfactory result (I got lots of abrupt right-angles as soon as the neighboring branches exceeded the specified separation distance).
Good luck!
If you would like to post a comment, please login.
Contact Us | Legal | Privacy |
|
global_05_local_4_shard_00000656_processed.jsonl/63466
|
Dear Mom: I want to travel with you
I want to travel with you — just you. I want to explore a new place alongside the woman who raised me, who changed my diapers, who put up with my teenaged angst, and my rebellious college years. I want to see my favorite cities with the lady who taught me essential life lessons, like look both ways before crossing the street, and how to use a glue gun, that it’s not worth sleeping with every guy you meet, and that the most important thing in the world is to help others.
I want you to stop dropping me off at the airport for some trip I’m about to take, and start becoming my seatmate.
(Read the rest here)
|
global_05_local_4_shard_00000656_processed.jsonl/63467
|
Drexel dragonThe Math ForumDonate to the Math Forum
Search All of the Math Forum:
Math Forum » Discussions » sci.math.* » sci.math.independent
Topic: Indefinite integral puzzle
Advanced Search
Craig Feinstein
Posts: 398
Registered: 12/13/04
Re: Indefinite integral puzzle
Posted: Dec 30, 2010 11:59 AM
On Dec 30, 10:32 am, [email protected] wrote:
> <[email protected]> wrote:
> >is:
> well, first of all, what does this mean???
> Give a precise definition!!!
> >Craig- Hide quoted text -
> - Show quoted text -
I(I(I(I(...)dx)dx)dx)dx means that we want the (indefinite) integral
of the integral of the integral of the integral ..... ad infinitum.
[Privacy Policy] [Terms of Use]
© Drexel University 1994-2014. All Rights Reserved.
|
global_05_local_4_shard_00000656_processed.jsonl/63468
|
Drexel dragonThe Math ForumDonate to the Math Forum
Search All of the Math Forum:
Math Forum » Discussions » Software » comp.soft-sys.math.mathematica
Topic: Re: [mg4795] Display a List of Graphics
Replies: 0
Advanced Search
Back to Topic List Back to Topic List
Andrei Constantinescu
Posts: 32
Registered: 12/7/04
Re: [mg4795] Display a List of Graphics
Posted: Sep 20, 1996 12:54 AM
Hi Nodar,
you can do something of the following Style:
gri = Plot[ ... , PlotStyle -> RGBColor[i/n,1-i/n,0] , DisplayFunction -> Identity ]
and then
Show[ gr1, gr2, ... , DisplayFunction -> $DisplayFunction ]
if your stack is really huge you might put everything together with
functions, Map, Do, ... and things of the stuff !
For PlotStyle -> p. 412 Wolfram Mtathbook
a + andrei
[Privacy Policy] [Terms of Use]
© Drexel University 1994-2014. All Rights Reserved.
|
global_05_local_4_shard_00000656_processed.jsonl/63469
|
Drexel dragonThe Math ForumDonate to the Math Forum
Search All of the Math Forum:
Math Forum » Discussions » sci.math.* » sci.math.independent
Topic: photons that orbit atoms rather than electrons Chapt15.63 electrons
of Helium seeking to be a photon structure #1362 New Physics #1566 ATOM
Replies: 9 Last Post: May 14, 2013 2:22 PM
Advanced Search
Posts: 924
Registered: 3/16/07
Re: photons that orbit atoms rather than electrons Chapt15.63
electrons of Helium seeking to be a photon structure #1362 New Physics #1566
Posted: May 14, 2013 9:30 AM
On May 11, 6:26 pm, Archimedes Plutonium
<[email protected]> wrote:
> Alright, the idea that antiparticles are nonexistent and are just
> merely a phase change of an original fundamental particle is stunning
> in its implications. I am just beginning to fathom some of its
> spectacular implications. For instance, a filled suborbital such as in
> helium or neon or zinc or magnesium would not have 2 paired electrons,
> one up and one down, but would have an electron with positron and
> those two would combine to form a energetic photon or light wave.
> So that having electrons in orbit around a nucleus of an atom, we have
> most generally photons in orbit around a nucleus in almost every atom.
> In case a atom has a unpaired last electron, it quickly finds a
> chemical bond with another atom, so that in the chemical bond, the
> lonely electron is paired up with another electron to fulfill this
> quest of having two electrons turn into a photon.
> --
> Approximately 90 percent of AP's posts are missing in the Google
> newsgroups author search starting May 2012. They call it indexing; I
> call it censor discrimination. Whatever the case, what is needed now
> is for science newsgroups like sci.physics, sci.chem, sci.bio,
> sci.geo.geology, sci.med, sci.paleontology, sci.astro,
> sci.physics.electromag to?be hosted by a University the same as what
> Drexel?University hosts sci.math as the Math Forum. Science needs to
> be in education?not in the hands of corporations chasing after the
> next dollar bill.?Besides, Drexel's Math Forum can demand no fake
> names, and only 5 posts per day, of all posters which reduces or
> page-hogging. Drexel has?done a excellent, simple and fair author-
> archiving of AP sci.math posts since May 2012?as seen?here:
> Archimedes Plutonium http://www.iw.net/~a_plutonium
> whole entire Universe is just one big atom
> where dots of the electron-dot-cloud are galaxies
Your topics and self-replies are even more ignored than are mine. You
must be onto something big and even a little too dark and scary
because, our resident Usenet army of rusemasters and FUD-masters are
not even bothering to topic/author stalk and bash your stuff.
[Privacy Policy] [Terms of Use]
© Drexel University 1994-2014. All Rights Reserved.
|
global_05_local_4_shard_00000656_processed.jsonl/63470
|
Drexel dragonThe Math ForumDonate to the Math Forum
The Math Forum Internet Mathematics Library
Lessons, Tutorials, and Lecture Notes (Mathematics Archives)
Visit this site: http://archives.math.utk.edu/tutorials.html
Author:University of Tennessee, Knoxville (UTK)
Description: An extensive, alphabetical, annotated listing of sites providing course material for teachers and students of mathematics. Includes topics from almost every field of math, at every level: K-12, college and beyond. Algebra; Analysis; Arithmetic; Calculus; Combinatorics; Computing; Differential Equations; Dynamical Systems; Geometry, Linear and Modern Algebra; Optimization; Probability and Statistics; and much more.
Languages: English
Resource Types: Courses, Internet-Based Projects, Link Listings, Tutorials, Maple, Mathematica, Geometer's Sketchpad
Math Topics: Algebra, Analysis, Arithmetic/Early Math, Calculus (Single Variable), Calculus (Multivariable), Differential Equations, Discrete Math, Dynamical Systems, Geometry, Logic/Foundations, Number Theory, Operations Research, Linear Programming, Pre-Calculus, Probability, Statistics
Math Ed Topics: Curriculum/Materials Development
[Privacy Policy] [Terms of Use]
© 1994-2014 Drexel University. All rights reserved.
|
global_05_local_4_shard_00000656_processed.jsonl/63476
|
Curiosityalso called Mars Science Laboratory (MSLalso called Curiosity)U.S. robotic vehicle designed to explore the surface of Mars and determine if Mars was, or is, capable of supporting life. The rover , called Curiosity, was launched by an Atlas V rocket from Cape Canaveral, Florida, on November 26, 2011, and landed in Gale crater on Mars on August 6, 2012.
The MSL Curiosity is about 3 metres (10 feet) long and weighs about 900 kg (2,000 pounds), which makes it the longest and heaviest rover on Mars. (By contrast, the Mars Exploration Rovers, Spirit and Opportunity, are 1.6 metres [5.2 feet] long and weigh 174 kg [384 pounds].) Unlike previous rovers, the MSL Curiosity did not have its landing cushioned by air bags; rather, the MSL because of its large size, it was lowered to the surface by a tether three tethers from the spacecraft’s body, called the sky crane.
Curiosity does not rely on solar cells for its energy needs but rather draws its electric power from a thermoelectric power generator, with the heat source coming from being the radioactive decay of plutonium and the heat sink being Mars’s atmosphere. This internal power supply will allow the MSL Curiosity to continue operating through the Martian winter. The MSL Curiosity’s mission is planned to last one Martian year (687 Earth days).
Curiosity carries several experiments that probe the Martian environment. A neutron-beam generator provided by the Russian Federal Space Agency can detect water ice up to 2 metres (6 feet) below the surface. The Spanish Center for Astrobiology supplied the MSL’s Curiosity’s weather station. The largest experiment, the Sample Analysis at Mars, consists of a mass spectrometer, a gas chromatograph, and a laser spectrometer that search for carbon-containing compounds. The MSL Curiosity also has several cameras, one of which takes high-definition video at a rate of 10 frames per second.
|
global_05_local_4_shard_00000656_processed.jsonl/63483
|
How to electrocute an elephant 2
From Whitespace (Hackerspace Gent)
Revision as of 19:59, 7 May 2011 by Koenraad (Talk | contribs)
Jump to: navigation, search
Note: this article is about a passed event.
How to electrocute an elephant 2
From 2011/05/07 14:00:00 to 2011/05/07 23:59:59
Attendees (2):
Piet, Koen
Whitespace Blekerijstraat 75, Gent, Belgium
Loading map...
Costs 0
«Upgrading the electricity, getting electrocuted»
Back to the future doc connecting power.jpg
Last time we fixed the ground problem, now lets improve the rest of our wiring. Please come over, even if you don't know anything about electricity. An extra pair of hands is always welcome!
• Install a new fuse box, with diff and more circuits
• Lay new wiring, install extra power connections.
• Make drawings required.
What got done[edit]
"" has no sub pages.
Historical data can not be displayed in a Factbox
|
global_05_local_4_shard_00000656_processed.jsonl/63484
|
The Wadi el-Hôl Inscription: Earlier than Serabit?
In 1993 Egyptologist John Darnell discovered in the Wadi el-Hôl near Luxor, Egypt, an alphabetic inscription similar to those at Serabit el-Khadem discussed in the accompanying article. Initially, it was thought that this inscription might be earlier than the Serabit inscriptions. If so, was the alphabet invented earlier than the Serabit inscriptions and somewhere other than Serabit, perhaps near the Wadi el-Hôl?
Although there was some early scholarly speculation that this indeed might be the case, this view has now been largely abandoned. The el-Hôl inscription is faintly carved into a limestone wall on the ancient road between Thebes and Abydos. The inscription could be read “(The) besieger עותי, ‘El’s …
Join the BAS Library!
|
global_05_local_4_shard_00000656_processed.jsonl/63487
|
Memory Beta, non-canon Star Trek Wiki
If you have any questions, please feel free to post them in a member's talk page or the community portal. Thanks, and once again, welcome to Memory Beta! --Long Live the United Earth 19:50, 9 July 2008 (UTC)
Summary on "Greater Than the Sum" Edit
Hello Skteosk - why did you leave the {{incomplete}} tag in when you entered the summary on Greater Than the Sum? -- Tkhobbes 15:38, 3 January 2009 (UTC)
Hi there, right - there are summaries that are a lot longer. However, I feel you have captured the main points of the story - maybe a little "linguistics", and the summary is just fine :) To tell the truth, I don't like summaries that are too long - because when you quickly want to understand what a story is about, you don't like to read through tons of pages (after all, you could then read the story entirely...) -- Tkhobbes 10:22, 4 January 2009 (UTC)
Around Wikia's network
Random Wiki
|
global_05_local_4_shard_00000656_processed.jsonl/63490
|
Why Do Beans Make You Fart?
Baked beans image via Shutterstock
Beans, beans, the musical fruit. The more you eat, the more you toot. But don't blame your flatulence on the poor legumes directly. The blame lies instead with the loads of little critters teeming in your gut.
Once you mash a bowl of barbecue baked beans into a fine mush in your mouth and stomach, it moves along to the small intestine. This organ is basically a molecular chop shop, where digestive enzymes strip your meal down for whatever bits and pieces your body can use and break them into smaller components that are more easily absorbed. Proteins get broken down into peptides and amino acids, fats into fatty acids and glycerol, and some carbohydrates into simple sugars. These are then absorbed through the intestinal wall to become fuel for your body.
This process isn’t so smooth with beans.
Their natural sweetness comes from a group of sugars called oligosaccharides (some of the more common ones in beans are raffinose and stachyose, which sound like rejected Musketeers). These sugars are hulking, awkward molecules. They’re far too big to slip though the intestinal wall on their own, and our guts’ enzymatic tool kit doesn’t have the right stuff to break the big things apart into more manageable pieces. So the sugars get a free ride though the small intestine. No one messes with them, and they move on into the large intestine intact.
Here their journey comes to a halt when they’re greeted by some of your closest friends, the 700+ species of bacteria that call your lower gut home. Fully capable of handling the big meal and never ashamed to have at your leftovers, the bacteria dig into the sugars. As they eat, their metabolic activity produces gases, hydrogen and methane among them. All that gas accumulates and eventually escapes your body as a fart, which may or may not be blamed on the dog.
Not all organisms have this problem with oligosaccharides, and some fungus species possess the right enzymes to break them down. These enzymes are easy enough to extract, and are often turned into gas-relieving supplements. Beano, the most well-known example, is made with the enzyme alpha galactosidase, derived from the fungus Aspergillus niger. Pop a tablet in your mouth before dinner, and the enzyme will snap those big sugars apart into handy little sugars like sucrose, glucose and fructose, giving you things your body can use and keeping you from giving a performance attributable to the musical fruit.
More from mental_floss...
May 23, 2012 - 6:39pm
submit to reddit
|
global_05_local_4_shard_00000656_processed.jsonl/63495
|
Last quarter I took a NN/ML course outside of my department (I am currently in MS Applied Statistics -- I may end up in this department for PhD CS studies after completing my current program though) because I am interested in the topic overall and I had previous experience with genetic algorithms.
In the course I took we used the Mitchell text. I also used that opportunity grab a few other texts to dive into some topics in greater depth and get exposure to other topics entirely. Namely Hastie, Tibshirani, Friedman text, Bishop's NNPR text, Koller's Probabilistic Graphical Models text, and Kolaczyk's Statistical Analysis of Network Data text.
Now based on the TOC in PRML I feel like these other books cover much if not all of the topics in this other Bishop text. Would you agree that that is a fair assessment? I however know that PRML is a very popular text for those in computer science and I've seen it mentioned a few times on this site. So those of you familiar with the text's content do you feel I'd still be missing out on something without the other Bishop text, or can I get by without?
Many of these texts have a lot of overlapping content so it is interesting to hear essentially the same thing stated several different (and sometimes not so different) ways, but I would also be interested in recommendations of other texts that are more advanced since essentially all of these text books come with the standard "targeted for advanced undergraduates and beginning graduate students".
Don't get me wrong I understand that the cutting edge will be found in journals and I have been reading through many of them (COLT, AAAI, IEEE, etc), but there has to be at least a couple of text books that are more advanced than the ones already mentioned. In our class the Mitchell text was used to minimize the mathematical exposure and PRML was suggested for heavier math content. I am however interested in texts that may have even more advanced mathematics still. Potential topics of interest in a more advanced text: more on ensemble methods, asymptotic properties, and stability. Of course other advanced topics are welcomed as well. I mean I know I can find out a lot about the later two in actual math and stats texts, but I was hoping to see more about them in the context of machine learning.
I have a paper (PDF) I wrote as my final for that class. It is an overview and could use a lot of details added to it (it more than satisfied the requirements of the final though), but I was trying to present the basics to a wider audience so I tried not to go into the formulations and left it to the references for those details. Any thoughts or references to the questions I put forward at the end would be very much appreciated. Even general feedback on the paper would be nice.
(Sorry for it not being concise, but I figured one lengthy post in this case might make more sense than breaking it up into numerous more focused posts -- though I suppose I'm about to find out whether you all agree with that or not ;) )
This question is marked "community wiki".
asked Apr 26 '11 at 04:52
Chris%20Simokat's gravatar image
Chris Simokat
The cutting edge is actually more findable in conferences instead of journals. I think Bishop's text covers the more usual applications of bayesian methods (related with graphical models) for ML better than the koller & friedman text, which is far heavier in the graphical-model mechanics per se and doesn't stop in many details about its applications to machine learning.
No textbook is complete, and no perspective is complete, so I'm not sure you should be thinking about these textbooks in terms of "missing out on something" or "getting by without". PRML is an interesting resource for its broad overview of almost all of machine learning at the time it was written, but it also doesn't cover large parts of the literature on structured learning, online learning, learning theory, for example.
(Apr 26 '11 at 05:50) Alexandre Passos ♦
As always Alexandre I appreciate reading your contribution. I get what you're saying in general, but some of my interests in reading the texts themselves is to look at historic aspects to how the techniques were developed to begin with. So like in Statistics I have a tendency to not be thrilled with books that skip over talking about Guinness when talking about Gosset or introducing the T-distribution, neglecting Lady Tasting Tea when talking about exact testing or Fisher in general, or the Isis data in multivariate. I suppose that's just personal preference since I think such anecdotes help people connect with the material, but that is what I meant when I was talking about missing out that and if there is some excellent proof of something in one text that is not present in another -- sort of like comparing Wackerly to Cassella. As for skipping it, it just seemed between the Hastie book (which is more recent than PRML) and the other Bishop book I own in particular that there wasn't exactly any different topical coverage at least at a glance. But I do think based on you and the other posts that when I do get a chance I will grab a copy for references sake and if for nothing else the works it cites in its references. I guess I just wanted to know if it was like a 3-alarm fire to not have it immediately! ;)
(Apr 26 '11 at 21:00) Chris Simokat
2 Answers:
Hello Chris,
I'll try to answer as concise and useful as possible.
First, you'll need the basics of statistics, which I'm guessing you are getting from your masters. For this there is a number of books and papers that are useful. And actually most statistics you'll ever need are already well developed. Most modern models where described in the 70's, 80's. Blei actually said that if something was not figured out in the 80's it was a really difficult problem.
Given the list of books you presented, I do recommend you the Bishop NPML Book, look at it as the updated version of Mitchell's, I do like his book, the problem is that it is somewhat old and it lacks a lot of the current and widely used algorithms. Mitchell does not go into Variational Inference or SVM's for example.
With that said, Machine Learning is a wide field, and you could delve among one single theme for your entire PhD, and perhaps your entire Research Life. It is hard to find someone who does research on more than a couple of topics.
You need a base book, that'll let you look into most of the algorithms you can choose from, and after that, you'll need another more specialized books. For example, if you are into Non Parametric Models, you might start learning Gibbs Sampling, Distributions and Mixture Models from Bishop, and then you'll have to read Ghosh's "Bayesian Non Parametrics" Book.
Pick a topic and then start thinking on the books, otherwise you might end up spending a lot of time reading a book that is not closely related to your research (which isn't a bad thing at all, but if you are in a PhD, the last thing you want to do is read something that won't be as useful as it should be)
Some conferences to look into:
• For theory (Really heavy math): NIPS, ICML, COLT
• For Applications (So so math, cool apps): KDD (This is a bit of theory as well), ICMLA, IROS, ICRA (Last 2 are on robotics)
If you wish to learn the latest on GA try GECCO, that is the top conference in the topic.
Hope it helps you
This answer is marked "community wiki".
answered Apr 26 '11 at 07:08
Leon%20Palafox's gravatar image
Leon Palafox ♦
Leon thanks for the list of conferences. I really appreciate you taking the time to answer.
(Apr 26 '11 at 22:00) Chris Simokat
Leon's answer is pretty good. I'll just add a bit. The problem I have is not collecting reading material, but actually getting the reading done. You can find many very good textbooks online these days. There is a post dedicated to them here on Metaoptimize. They will be more than sufficient to fill the gaps between the books you have already collected for the foundational topics. I would advise spending your time learning from the materials you already have, and then, as Leon suggested, finding the more specialised texts to pursue your interests in more depth.
This answer is marked "community wiki".
answered Apr 26 '11 at 08:55
Noel%20Welsh's gravatar image
Noel Welsh
Noel I appreciate the link to the other post. I will check it out.
(Apr 26 '11 at 22:02) Chris Simokat
Your answer
toggle preview
powered by OSQA
|
global_05_local_4_shard_00000656_processed.jsonl/63514
|
1. Skip to navigation
2. Skip to content
3. Skip to sidebar
The Ludwig von Mises Institute
Advancing Austrian Economics, Liberty, and Peace
Advancing the scholarship of liberty in the tradition of the Austrian School
Search Mises.org
Literature Library
The Freeman December 31, 1951
The Freeman December 31, 1951
John Chamberlain The Freeman December 1951
Publication Information Calling Stalin's Bluff - Malcolm Wheeler-Nicholson; The Incentive to Produce - Edward F. Hutton; In the Wake of Liberation - Bertrand de Jouvenel; Let the Clergy Speak! - Charles J. Dutton; Siblings Have I None - Harry S. Brown
Updated 7/13/2009
|
global_05_local_4_shard_00000656_processed.jsonl/63527
|
Nebraska Center for Writers
by Matt Peckham
In your other life, you're Thor, the Norse God of Thunder. Not the stuffy old Edith Hamilton Thor, either. She only gave you a paragraph in her Mythology. Thor's Day, Thursday, a day of the week. That's all Hamilton can muster about your contribution to the pantheon after babbling for three-hundred pages about lusty Greek gods and their post-coital baby-snacking adventures. All nonsense. You are comic book super-chrome, spawn of the Silver Age and Journey Into Mystery #83 courtesy Larry Lieber's plots and Jack Kirby's pencils. Clad in perfectly pressed red cape, blue tights, and yellow boots, your skintight bulges precede you like auspicious growths. With your mighty hammer Mjolnir you blaze a path through the sky, heaving lightning bolts and bellowing thunder. The planets and the stars, Midgard, Asgard, and the Nine Worlds are yours. Your "mayhap," "thou," and "verily" make Shakespearean heavyweights sound like milksops. You are the Thunder God. Abandon hope, all ye that mess with you.
Reprinted with permission
from "Dreams in Tights"
Copyright © 2003
by Matt Peckham
Epiphany Magazine, July 2003
redball.gif Bibliography
redball.gif Commentary
redball.gif Buy a Book
redball.gif Matt Peckham's Page
redball.gif Author Web Page
redball.gif Writers On-Line
The Rock
Nebraska Center for Writers
|
global_05_local_4_shard_00000656_processed.jsonl/63552
|
Tuesday, November 17, 2009
AMAZING: The Black Woman who wrote the Matrix and Terminator, finally gets recognition for her work!
“After a six year dispute, prolific writer and profound spiritualist, Sophia Stewart has received justice for copyright infringement and racketeering and will finally recover damages from the films, The Matrix III and III, as well as The Terminator and its sequels. Yes, you heard that correctly – the entire MatrixTerminator franchises, and her suspected pay off is expected to be the highest in history – an estimated 2.5 billion.
Read More
Can’t believe this is the first I’m hearing of this. Interesting….
Update: Apparently this story is not true; Stewart did sue but lost her case in 2005. Apologies for passing it on before checking it out… get the scoop here: http://www.snopes.com/politics/business/matrix.asp or here: http://www.pamil-visions.net/urban-legends-busted-sophia-stewart/27827/ or do some more research (like I should have done before reblogging!).
1. benjamin-gg reblogged this from movielove
2. newclassicmusic reblogged this from movielove
3. spoilsport reblogged this from movielove and added:
Of course a Black Woman wrote the Matrix. God is a Black woman, after all. :)
4. alliv reblogged this from movielove and added:
5. gonsmithe reblogged this from movielove and added:
Wow, holy shit.
6. ans99 reblogged this from adamquinn
7. robynchell reblogged this from dharrison
8. daughterofbaldwin reblogged this from luvisforsuckas
|
global_05_local_4_shard_00000656_processed.jsonl/63561
|
Export (0) Print
Expand All
Names of Namespaces
As with other naming guidelines, the goal when naming namespaces is creating sufficient clarity for the programmer using the framework to immediately know what the content of the namespace is likely to be. The following template specifies the general rule for naming namespaces:
The following are examples:
√ DO prefix namespace names with a company name to prevent namespaces from different companies from having the same name.
√ DO use a stable, version-independent product name at the second level of a namespace name.
X DO NOT use organizational hierarchies as the basis for names in namespace hierarchies, because group names within corporations tend to be short-lived. Organize the hierarchy of namespaces around groups of related technologies.
√ DO use PascalCasing, and separate namespace components with periods (e.g., Microsoft.Office.PowerPoint). If your brand employs nontraditional casing, you should follow the casing defined by your brand, even if it deviates from normal namespace casing.
√ CONSIDER using plural namespace names where appropriate.
X DO NOT use the same name for a namespace and a type in that namespace.
For example, do not use Debug as a namespace name and then also provide a class named Debug in the same namespace. Several compilers require such types to be fully qualified.
X DO NOT introduce generic type names such as Element, Node, Log, and Message.
There is a very high probability that doing so will lead to type name conflicts in common scenarios. You should qualify the generic type names (FormElement, XmlNode, EventLog, SoapMessage).
There are specific guidelines for avoiding type name conflicts for different categories of namespaces.
• Application model namespaces
Namespaces belonging to a single application model are very often used together, but they are almost never used with namespaces of other application models. For example, the System.Windows.Forms namespace is very rarely used together with the System.Web.UI namespace. The following is a list of well-known application model namespace groups:
X DO NOT give the same name to types in namespaces within a single application model.
For example, do not add a type named Page to the System.Web.UI.Adapters namespace, because the System.Web.UI namespace already contains a type named Page.
• Infrastructure namespaces
This group contains namespaces that are rarely imported during development of common applications. For example, .Design namespaces are mainly used when developing programming tools. Avoiding conflicts with types in these namespaces is not critical.
• Core namespaces
Core namespaces include all System namespaces, excluding namespaces of the application models and the Infrastructure namespaces. Core namespaces include, among others, System, System.IO, System.Xml, and System.Net.
X DO NOT give types names that would conflict with any type in the Core namespaces.
For example, never use Stream as a type name. It would conflict with System.IO.Stream, a very commonly used type.
• Technology namespace groups
This category includes all namespaces with the same first two namespace nodes (<Company>.<Technology>*), such as Microsoft.Build.Utilities and Microsoft.Build.Tasks. It is important that types belonging to a single technology do not conflict with each other.
X DO NOT assign type names that would conflict with other types within a single technology.
Portions © 2005, 2009 Microsoft Corporation. All rights reserved.
© 2014 Microsoft
|
global_05_local_4_shard_00000656_processed.jsonl/63582
|
Tuesday, April 28, 2009
Rolf or Rollo the Ganger or Rolf Ragnvaldsson
Rolf Ragnvaldsson also know as Rolf 'The Ganger', Rolf 'Wend-a-foot, Rolf the Viking and Rollo 0f Normandy. He was given the name Robert when he was baptized. He was also called Rollo which is French and Latin.
Encyclopeadia Britannica states that Rolf was a "Scandinavian rover who founded the duchy of Normandy. Making himself independent of King Harald I of Norway, Rolf sailed off to raid Scotland, England, Flanders, and France on pirating expeditions and, about 911, established himself in an area along the Seine River. Charles III the Simple of France held off his siege of Paris, battled him near Chartres, and negotiated the treaty of Saint-Clair-sur-Epte, giving him the part of Neustria that came to be called Normandy; Rolf in return agreed to end his brigandage. He gave his son, William (I) Longsword, governance of the dukedom (927) before his death. Rolf was baptized as 'Robert' in 912 but is said to have died a pagan."
Rolf was the son of Ragnvald or Rognwald. He was lord of three little islets far north, near the Fjord of Folden, called the Three Vigten Islands. His main means of making a living was that of sea robbery or piracy. King Harold did not approve of Rolf's conduct while conducting this robbery. During Harold's reign, piracy was forbidden within his own countries, but was perfectly acceptable against foreign countries and was a profession held by many nobles.Harold's own son, Eric was employed this way as early as age twelve.
The thing that caused Rolf to be outlawed was taking from his own countrymen. Coming home from one of his pirate expeditions, his crew ran short of supplies. Rolf landed with them on the shore of Norway, and out of desperation, drove some cattle and proceeded to kill and eat them. Cattle theft was a crime. Somehow King Harold 'Harfager' got word of this and was on his way to investigate and punish the perpetrators.
Rolf and his men left hurriedly in their ships and went to the coast of France. At some point he was enfeoffed to the King of France and given the desolate coast of Normandy, which took it's name from 'the Northmen' or 'Norsemen' as they were called by the French.
The Heimskringla says that when Harold outlawed Rolf, his mother went to him and begged for mercy for him. And he was very angry and refused to listen to her. At which time an evidently very proud mother made this statement:
The name of Nevja is torn;
Now driven in flight from the land.
Is the warrior's bold kinsman.
Why be so hard, my lord/
Evil it is by such a wolf,
Noble prince, to be bitten;
He will not spate the flock
If he is driven to the woods.
A rough translation would be that if the king persisted in being so harsh and driving her son from the land, he would become as a wolf and would not spare the flock. She undoubtedly felt that he owed her son the son of his most valiant nobles a little more consideration. Rollo's father had been given the great honor of being the one to cut Harold's hair. Harold had sworn not to cut it until he had become king and won his bride.
Over the next two centuries, Rolf and his descendants made Normandy into a prosperous country and became a force to be reckoned with.
Alternate origins for Rollo are given by Dudo of St, Quentin who says that he was the son of Danish noble who was at odds with King Harold of Denmark, who upon his death left Rollo and a brother Gurim who was killed. William of Jumieges says in his Gesta Normannorum Ducum that Rollo was from the Danish town of Fakse. The Roman de Rou and the Orkneyinga Saga both also refer to two brothers named Rou and Garin.
The Norwegian and Icelandic historians (historia Norvegiae) say that Rollo was a son of Rognvald Eysteinsson, the Earl of More in Western Norway, and call him Ranger Hrolf (Rolf the Walker). This nickname was given to him because he was so big that he couldn't ride a horse, because none of the small Norwegian horses were big enough.
When Rollo and his men were exiled, they first made their way to the Hebrides, where other noblemen of Viking descent were living. They welcomed him, but the land must not have been sufficient to sustain them. These chieftains all banded together as equals and travelled first to Holland, but it had been ravaged and was too poor to benefit them, so they left from there toward the coast of northern France and headed up the Seine.
In 885, Rollo was with a Viking fleet that laid siege to Paris. He was one of the lesser leaders under Sigfried. The legend that comes down from this time is that the French sent an emissary to negotiate. This emissary asked who was their chieftain. They told him that they were all chieftains in their own right. In 886, the French paid off Sigfried who left, but Rollo stayed behind and continued to raid. He was eventually bought off too and he left to raid Burgundy.
He later returned to the area of northern France now known as Normandy and began raiding again. Tradition says that when the people of Rouen saw that Rollo was going to lay siege to their town, they sent their archbishop to him to try and negotiate. They were very surprised when he returned unharmed and told them that he had been treated with kindness and courtesy. The message he brought back was that if they admitted the Vikings to their town they would be unharmed. They opened their gates to him and Rouen became Rollo's citadel.
Sometime during this period, around 886-887, he attacked Bayeaux. According to Oderic Vitalis, the Count of Bayeaux was killed and his daughter was taken by Rollo as a captive bride. The History of the Norman People by Wace says that when Rollo decided to attack Bayeaux, he sent spies, who determined that it would be easy to take. When Berengar the lord of Bayeaux discovered that they were coming. He placed his men outside the wall and they went to battle with the Normans. They managed to capture one of the Norman chiefs. In return for giving him back, they received a year's peace from the Normans. But the next year they returned. They attacked Bayeaux and damaged it heavily. They destroyed the farms and the people as well. Eventually the barons of the land went over to the side of the Normans. It also says that when he took Poppa, she was just a girl and had not even developed breasts yet. But Rollo loved her and made her his wife anyway. Poppa means something like little doll.
In 911 Rollo's men were defeated at the Battle of Chartres by Charles II 'the Simple' Charlles realized that the custom of paying them to leave was no longer effective. They made an agreement that they could stay in the northern territory they were occupying as long as they defended it against any other Viking raiders. A treaty was signed in 911, in which Rollo was enfeoffed to King Charles. The area that Rollo was given was in the lower Seine or the northern part of Normandy and the area around Rouen. Some historians differ as to whether Rollo was a duke or a count under Charles the Simple. Legend says that Charles required Rollo to kiss his foot in a show of subservience as a condition of the treaty. Rollo refused to humble himself in so degrading a manner and ordered one of his men to do it in his place. This man raised Charles foot up to his mouth causing Charles to fall down rather than to stoop and do it.
In the beginning Rollo honored the treaty and defended the shores of Normandy for Charles, but after a time, he decided to divide up Normandy among his men as if it were his own sovereignty. His capital was Rouen. As he began these settlements, he and his men began raiding other French lands. Now they had a secure base of operations from which to conduct these raids, His men eventually began to intermarry with the local women and to assimilate into their new home.
About 927 Rollo began to pass the control of Normandy into the hands of his son William Longsword. The territory that he was relinquishing control of now extended as far west as the Vire River. He died sometime between then and 933.
The historian Adhemar, 'As Rollo's death drew near, he went mad and had a hundred Christian prisoners beheaded in front of him in honour of the gods whom he had worshipped, and in the end distributed a hundred pounds of gold around the churches in honour of the true God in whose name he had accepted baptism.' With his mind slipping, he must have at times returned to an earlier time before he had converted to Christianity.
Makers of Europe: Outlines of European History for the Middle Forms of Schools - Page 91
by Ethel Mary Wilmot-Buxton - Europe - 1905
The Works of Thomas Carlyle - Page 205
by Thomas Carlyle, Henry Duff Traill - 1899
Stories of the Olden Time - Page 200
by James Johonnot - Readers and speakers - 1889
The Heimskringla: A History of the Norse Kings - Page 38
by Snorri Sturluson, Samuel Laing, Rasmus Björn Anderson - Norway - 1907
The Normans, told chiefly in relation to their conquest of England: Told ... - Page 30
by Sarah Orne Jewett - Normans - 1891
The gesta Normannorum ducum of William of Jumièges, Orderic Vitalis, and ... - Page 92
The History of the Norman people: Wace's Roman de Rou - Page 23
by Wace, Glyn Sheridan Burgess, Elisabeth M. C. Van Houts - Literary Criticism - 2004
Post a Comment
Creative Commons License
|
global_05_local_4_shard_00000656_processed.jsonl/63587
|
When bloggers meet
My Cute Kids
I had these pictures taken of the kids right before Will's birthday. I finally got them scanned into the computer and up on my walls! Aren't they the cutest things? ...continue reading
Picture of the Perfect Man
Did you really think there was one? (sorry, I couldn't resist) ...continue reading
|
global_05_local_4_shard_00000656_processed.jsonl/63591
|
"We only obsess over relationships that feel unfinished."
Carrie Bradshaw (via whatwouldcarriesay)
Anonymous asked:
I hope you're okay, and everything will be better. Listen to "Details in the Fabric" by Jason Mraz when you feel down. You are loved by many always remember that.
Thank you so much
Thank you for this post.
This is insanely powerful.
If I remember correctly this is a norwegian newspaper commercial about speaking up for the weaker ones.
Some people don’t know better to speak up either…my mother abused me and my sisters and as a child she would tell us that if we told that it would be worse, that I’d live in a garbage can and that we would be worse off without her. How was I, at 8 years old, supposed to know any better than what she was telling me?
(Source: awayfromearth)
It’s Monday,
and your hair is messy.
You haphazardly put on your jeans and shirt
as you moan about the day of the week -
and I love you.
It’s Tuesday,
and you’re stumbling your way around the room,
trying to sort out the things you have to do.
You stop to briefly kiss the freckles on my nose,
asking me about my day -
and I love you.
It’s Wednesday,
and you’re quietly sprawled on the couch.
and I love you.
It’s Thursday,
and you’re wondering what the weekend will bring,
but you’re still moaning about how
the week is going by too slow for your tastes -
and I love you.
It’s Friday,
and I’m surrounded by DVDs and snacks
you’ve prepared when I was gone.
You welcome me with blankets and warmth from your arms -
and I love you.
It’s Saturday,
and you’re feeling lazy.
You won’t let me leave your arms
(or is it the other way around?)
So you tuck me under your chin as we both wonder
how much time we have left
before sleep makes us miss each other’s faces -
and I love you.
It’s Sunday,
and there’s nothing much to say but
I love you.
"The brain can get sick too."
Re-make of this post.
End mental health stigma.
|
global_05_local_4_shard_00000656_processed.jsonl/63592
|
Submitted by Smurf1 521d ago | news
Sony Patents tech that Tracks Load Times to detect Pirated Software
Sony has filed a new patent which may be useful in combating piracy. (Industry, PS3, PS4, Sony)
Alternative Sources
nrvalleytime + 521d ago
#1 (Edited 521d ago ) | Agree(76) | Disagree(6) | Report | Reply
Smurf1 + 521d ago
This is a bad idea because of hardware wear and tear.
nrvalleytime + 521d ago
JoGam + 521d ago
Wait what?
B1663r + 521d ago
@r21 below...
#1.1.3 (Edited 521d ago ) | Agree(20) | Disagree(2) | Report
Ashlen + 521d ago
#1.1.4 (Edited 521d ago ) | Agree(24) | Disagree(0) | Report
MikeMyers + 521d ago
TheGamerDood + 520d ago
#1.1.6 (Edited 520d ago ) | Agree(11) | Disagree(2) | Report
brich233 + 520d ago
31 people + dont know what wear and tear would do.
Peppino7 + 520d ago
bangshi + 520d ago
ZombieNinjaPanda + 520d ago
r21 + 521d ago
deep_fried_bum_cake + 521d ago
Kratoscar2008 + 521d ago
violents + 521d ago
#1.2.3 (Edited 521d ago ) | Agree(1) | Disagree(1) | Report
Dark_Overlord + 521d ago
#1.3 (Edited 521d ago ) | Agree(5) | Disagree(1) | Report | Reply
princejb134 + 521d ago
Cool tech but Sony hasn't needed it this gen on ps3
Rainstorm81 + 521d ago
EbeneezerGoode + 521d ago
#1.4.2 (Edited 521d ago ) | Agree(2) | Disagree(7) | Report
-Superman- + 520d ago
Buy, sell and trade with friends - allowed.
Gamias580 + 520d ago
#1.6 (Edited 520d ago ) | Agree(1) | Disagree(0) | Report | Reply
humbleopinion + 520d ago
I really hoped they learn from past lessons.
ritsuka666 + 520d ago
Stop this BS, Sony..
#1.8 (Edited 520d ago ) | Agree(1) | Disagree(1) | Report | Reply
cool. to bad for pirates.
IcicleTrepan + 521d ago
cleverusername + 521d ago
Good, hope it works!
TemplarDante + 521d ago
*reads title*
suck on that, pirate scum :)
delboy + 521d ago
The best thing about ps4 is x86 architecture.
Qrphe + 520d ago
#5.1.1 (Edited 520d ago ) | Agree(6) | Disagree(0) | Report
delboy + 520d ago
That would be a true PlayStation.
elmaton98 + 520d ago
tachy0n + 520d ago
you can always fool a system, no matter what.
stage88 + 521d ago
Great idea but I thought with the PS3, hackers burn the games to the HDD so they don't play them off a disc. Won't this be the same it PS4 gets hacked? (I really don't want that happening.)
Squall5005 + 521d ago
Just because a company Patents a product doesn't mean they'll use it.
We saw the Patents for the Playstation controller that splits into two. And we've all seen the new Dualshock 4.
And not forgetting the 'Used game blocking' Patent. Sony has already confirmed that the PS4 WON'T block used games.
Personally, I've not nothing against tech that will block pirated games as long as it doesn't have any negative or noticeable impact on my console.
#7 (Edited 521d ago ) | Agree(5) | Disagree(0) | Report | Reply
Killzoner99 + 521d ago
This is why I love Sony , they are always innovating and looking for the tech edge. Genius idea.
BaconBits + 521d ago
If they altered the digital version of Ni No Kuni to overcome this too fast load time then what is to stop a pirate from applying a similar patch to a pirated game to achieve the proper load time?
solid_warlord + 520d ago
Don't mess with c4eva...he will F*** up Sony. Its a mission for him as well as a hobby. LT is coming to a PS4 near u.
kingPoS + 520d ago
Do you REALLY want for that to happen.
Certain economies are hinged on this joint venture you know.
Is it now ok to not help those selling the genuine?
Would you like for your hard work given away too?
#10.1 (Edited 520d ago ) | Agree(1) | Disagree(1) | Report | Reply
solid_warlord + 520d ago
i buy the games i like. Micro$oft should be thanking C4eve for helping them sell there system.
kingPoS + 520d ago
I'd rather piracy to stay far far away from the PS4 as long as possible.
Preferably for six years or more.
Hmmm... if rfid chips aren't for used software then what could they be for?
Could it be that BC's presence would casts unknown vulnerabilities if included?
Did Sony start over with a clean slate on the PS4?
Hopefully those jangly "keys" are buried in the earth's core this time around. lol
#11 (Edited 520d ago ) | Agree(1) | Disagree(1) | Report | Reply
LKHGFDSA + 520d ago
What if you use an SSD or other different type of internal HDD?
uuaschbaer + 520d ago
Sounds like a good way for Sony to sell more blu-ray burners and empty discs.
Jake_the_Dog + 520d ago
This makes sense because the ps4 is so similar to PC architecture, it may be cracked relatively easy compared to the cell. One patent I hope they never use is blocking used games. If they implement it, Microsoft may be quick to announce they won't carry the feature and divert sales from Sony. That may be a positive however, as it would force Sony to drop the terrible feature.
ironfist92 + 520d ago
I dont get it, so theyre saying if the game loads any faster than what is expected, you'll get blocked/banned?
What happens if it just loads quicker for no reason, or when a developer releases a patch to make the game load quicker?
Gamias580 + 520d ago
Maybe they should make games cheaper so people wouldnt have to want to pirate games... I don't see people pirating angry birds
N0S3LFESTEEM + 520d ago
Angry birds isn't exactly on the top of the list there guy...
PersonMan + 520d ago
So if I want to put an SSD in my PS4, it's going to tell me I pirated the game because it loads too fast?
kingPoS + 520d ago
Check it folks!
Think back a couple years ago... April 2011 to be exact, that ring a bell. Following that, a patent was filed in August 2011. When someone busts your house down sometimes irrational is all you can think. "Sigh"... hindsight is 20/20.
Now fast forward to to 2013
Either Sony has those discs/lasers/disks rendered bulletproof or they may as well go about strangling themselves. I'd like to think Sony has thoroughly tested this patent in everyday, random and even interrupted use. Hopefully Sony sees reason and decides to have it heavily amended.
If not, gun meet... foot... repeatedly.
Related video
#18 (Edited 520d ago ) | Agree(0) | Disagree(0) | Report | Reply
jacksheen0000 + 520d ago
Sony Idea won't work. A dirty laser can in fact affect the loading time.
#19 (Edited 520d ago ) | Agree(0) | Disagree(0) | Report | Reply
wesdfwiusdf 520d ago | Spam
konohashin + 520d ago
Good So I will do something to slow down my load times and when sony blocks my system I will sue them.
Easy money!
Add comment
New stories
Dragon Age: Inquisition - New Gameplay Trailer Focuses On Combat
Can the Wii U benefit from HD remakes?
Looking for a great Pokemon Community?
The Last of Us: Remastered – Review | Playstationer
|
global_05_local_4_shard_00000656_processed.jsonl/63595
|
m (+ iw)
Line 1: Line 1:
{{Translation|'''F'''|エフ|Efu}} is a [[Kumogakure]] shinobi.
{{Translation|'''F'''|エフ|Efu|engtv=Eff}} is a [[Kumogakure]] shinobi.
== Appearance ==
== Appearance ==
Revision as of 11:30, January 17, 2013
editF browse_icon.png
F HDShot
(エフ, Efu)
Manga Chapter #545
Anime Naruto Shippūden Episode #296
Appears in Anime and Manga
Voice Actors
Gender Gender Male Male
F (エフ, Efu; English TV "Eff") is a Kumogakure shinobi.
F has short spiky hair, a well-defined nose, a small goatee and wore the standard uniform of Kumogakure shinobi along with the forehead protector.
Part II
Shinobi World War Arc
During the Fourth Shinobi World War, F was attacked by a White Zetsu clone on the battlefield and was later impersonated by this clone. It is unknown if the real F is still alive.
• His name is the Japanese pronunciation of the English letter "F". This is similar to the names of A, Killer B, C, and J, that are the pronunciations of the letters "A", "B", "C", and "J", respectively.
Around Wikia's network
Random Wiki
|
global_05_local_4_shard_00000656_processed.jsonl/63598
|
Resume Reading — The Deepest Uncertainty
The Deepest Uncertainty
When a hypothesis is neither true nor false.
Georg Cantor died in 1918 in a sanatorium in Halle, Germany. A pre-eminent mathematician, he had laid the foundation for the theory of infinite numbers in the 1870s. At the time, his ideas received hostile opposition from prominent mathematicians in Europe, chief among them Leopold Kronecker, once Cantor’s teacher. In his first known bout of depression, Cantor wrote 52 letters to the Swedish mathematician Gösta Mittag-Leffler, each of which mentioned Kronecker.
But it was not just rejection by Kronecker that pushed Cantor to depression; it was his inability to prove a particular mathematical conjecture he formulated in 1878, and was convinced was true, called the Continuum Hypothesis. But if he blamed himself, he did so needlessly. The debate over the conjecture is profoundly uncertain: in 1940 Kurt Gödel proved that the Continuum Hypothesis cannot be disproven (technically speaking, that the negation of the Hypothesis cannot be proven), and in 1963 Paul Cohen proved that it cannot be proven. Poor Cantor had chosen quite the mast to lash himself to.
How is it possible, though, for something to be provably neither provable nor disprovable? An exact answer would take many pages of definitions, lemmas, and proofs. But we can get a feeling for what this peculiar truth condition involves rather more quickly.
Cantor’s Continuum Hypothesis is a statement regarding sizes of infinity. To see how infinity can have more than one size, let’s first ask ourselves how the sizes of ordinary numbers are compared. Consider a collection of goats in a small forest. If there are six goats and six trees, and each goat is tethered to a different tree, then each goat and tree are uniquely paired. This pairing is called a “correspondence” between the goats and the trees. If, however, there are six goats and eight trees, we will not be able to set up such a correspondence: no matter how hard we try, there will be two trees that are goat-free.
Correspondences can be used to compare the sizes of much larger collections than six goats—including infinite collections. The rule is that, if a correspondence exists between two collections, then they have the same size. If not, then one must be bigger. For example, the collection of all natural numbers {1,2,3,4,…} contains the collection of all multiples of five {5,10,15,20,…}. At first glance, this seems to indicate that the collection of natural numbers is larger than the collection of multiples of five. But in fact they are equal in size: every natural number can be paired uniquely with a multiple of five such that no number in either collection remains unpaired. One such correspondence would involve the number 1 pairing with 5, 2 with 10, and so on.
If we repeat this exercise to compare “real” numbers (these include whole numbers, fractions, decimals, and irrational numbers) with natural numbers, we find that the collection of real numbers is larger. In other words, it can be proven that a correspondence cannot exist between the two collections.
The Continuum Hypothesis states that there is no infinite collection of real numbers larger than the collection of natural numbers, but smaller than the collection of all real numbers. Cantor was convinced, but could never quite prove it.
To see why, let’s begin by considering what a math proof consists of. Mathematical results are proven using axioms and logic. Axioms are statements about primitive mathematical concepts that are so intuitively evident that one does not question their validity. An example of an axiom is that, given any natural number (which is a primitive concept), there exists a larger natural number. This is self-evident, and not in serious doubt. Logic is then used to derive sophisticated results from axioms. Eventually, we are able to construct models, which are mathematical structures that satisfy a collection of axioms.
Crucially, any statement proven from axioms, through the use of logic, will be true when interpreted in any model that makes those axioms true.
It is a remarkable fact that all of mathematics can be derived using axioms related to the primitive concept of a collection (usually called a “set” in mathematics). The branch of mathematics that does this work is known as set theory. One can prove mathematical statements by first appropriately interpreting the statement in the language of sets (which can always be done), and then applying logic to the axioms of sets. Some set axioms include that we can gather together particular elements of one set to make a new set; and that there exists an infinite set.
It remains possible that new, as yet unknown, axioms will show the Hypothesis to be true or false. For example, an axiom offering a new way to form sets from existing ones might give us the ability to create hitherto unknown sets that disprove the Hypothesis. There are many such axioms, generally known as “large cardinal axioms.” These axioms form an active branch of research in modern set theory, but no hard conclusions have been reached.
Ayalur Krishnan is an Assistant Professor of Mathematics at Kingsborough CC, CUNY.
Join the Discussion
|
global_05_local_4_shard_00000656_processed.jsonl/63605
|
Pre-login handshake failed
Date Published: 01/16/2013 1:31 AM
I have two SQL Servers set up to do mirroring. This is working fine.
I also have a .NET web application hosted on a different server connecting to either DB server.
All of the servers are under one AD.
Here's the connection string that I use:
Data Source=10.0.5.XXX; Failover Partner=10.0.4.XXX; Database=YYY; Integrated Security=True;
When the web server is freshly started, I am not able to connect to the DB, and is getting the following error:
If I turned off the firewall on the principle SQL Server, the connection is then working perfectly fine. If I turned the firewall back on, the connection works for a while and at some point failed back to the original error message.
I'm trying to find out what additional port I need to open (I have the default 1433 open and also 5022 open for mirroring). Does anybody ever experienced this issue?
I've tried monitoring open connections via Resource Monitor and netstat, but never found any other port used other than 1433 or 5022.
View full answer on Server Fault
View Local Answers...
Can't find the answer to this question?
No answers yet.
Can you answer this question?
Pre-login handshake failed
• Your Nickname
• Your Answer
• Enter the code below to prove you are human
|
global_05_local_4_shard_00000656_processed.jsonl/63623
|
Maybe the best thing about The Ten -- a new anthology comedy assembling ten short vignettes, each based on one of the ten commandments -- is how it starts with that premise (famously used by Krysztof Kieslowski in The Decalogue) and immediately, casually, chucks it in the dustbin. "Honor thy mother and father" leads to a vignette where a mother (Kerri Kenney-Silver) explains to her two African-American sons that their father's never been part of their lives because they were conceived during the '80s, when she was having lots and lots of sex with celebrities. Their father is, in fact, Arnold Schwarzenegger; since having their real father bond with them would be impossible, she's hired a local Arnold impersonator (Oliver Platt) to come hang out with the boys. ...
No, the scene's focus isn't parent-and-child interaction and the currency of respect that should flow through that relationship; the scene's focus is Oliver Platt in a leather jacket and wraparound shades, playing football with his two long-lost not-sons, murmuring fatherly endearments in the strangulated Teutonic tones of a bad Arnold imitation. That, to me, is funny; who cares if it really explores the ideas in the correlating commandment?
The other good thing about The Ten is that it functions like the comedy equivalent of one of those gimmicky sushi places where the little boats float in front of you on an oval unstopping river; if the piece in front of you isn't to your taste, another one will be along very shortly. Directed by David Wain and written by Wain and Ken Marino, The Ten is uneven, lumpy, jumpy and lurching; compared to the machine-groomed plastic-smooth misery of recent big budget comedies like License to Wed or I Now Pronounce You Chuck and Larry, that human-crafted, made-by-hand feel is a welcome breath of fresh air.
In many ways, The Ten is a throwback to '70s-'80s anthology comedies like Everything You Always Wanted to Know About Sex * But Were Afraid to Ask, or The Groove Tube, or Amazon Women on the Moon or History of the World, Part I. And, like those comedies, The Ten comes with the diamonds and the rough all included in one big bulky package -- along with the sincere hope on the part of the creators that every member of the audience will find something chuckle-worthy in the film's mixed bag. Wain's previous film, Wet Hot American Summer, was wildly funny in spots, but fell apart when it tried to work as a coherent narrative; with The Ten, Wain seems to acknowledging his past in sketch comedy (as a member of The State) and ... giving us some sketches. And, thank God, some of them are very funny.
Some sections of The Ten worked better for me than others, and I'm sure that'll be the case for other audience members. I loved seeing Liev Schrieber as a mustache-wearing cliché cop early on, but his lead role in a later segment -- as a suburban husband and dad obsessed with his neighbor's acquisition of a CAT scan machine, who then begins a ruinous program of one-upsmanship that leaves both of their lives ruined -- was devastatingly hysterical.
Winona Ryder plays a woman who, on her wedding night, sees a ventriloquist act that makes her leave her husband for an all-consuming affair with ... the dummy. The premise is a little odd, and that's funny in and of itself; Ryder's commitment to the part, though, is absolute, which makes it hilarious and, yes, a little scary to watch. And Paul Rudd plays our narrator, Jeff Riegert, who finds his personal problems intruding on his task of introducing the individual segments while standing in front of two huge tablets, especially as his wife (Famke Janssen) and mistress (Jessica Alba) start popping by the set.
The Ten is smart -- gags keep coming back in circular fashion; there's a perfectly-timed quote from Shakespeare; the mealy-mouthed relationship-talk of modern television is mocked with laser-sharp precision. ("Yes, you were there for me ... When my husband was embedded in the ground. ...") But The Ten is also stupid -- when one character asks "Do you need me to spell it out for you?", you see the punchline coming and still laugh; potty talk plays its part; a room full of naked men who've gathered on Sunday morning to ditch church and listen to Donna Summer b-sides deliver a rousing musical number that revolves around the rhyming properties of "prude," "misconstrued," "you'd" and "nude."
And yes, some of these gags work better than others, but Wain and Marino's script keeps in there, throwing curveball after curveball. Justin Theroux and Gretchen Mol star in a brief, brisk skewering of every 'love on holiday' storytelling cliché; an animated sequence where a heroin-dealing rhino with a tendency to lie can't save his community from a group of STD-spreading sex fiends culminates in a pulsating, pop-art animated group-grope that's stylish and squirm-inducing; co-writer Marino plays a doctor who kills patients "As a goof. ..." and then returns later on, with Rob Corddry's fellow inmate trying to seduce Marino away from his current abuser as the two talk about their feelings in the gentle, civilized tones of a Lifetime Network movie of the week.
With books like The God Delusion, The End of Faith and God is Not Great: How Religion Poisons Everything on the best-seller lists recently -- and The Bible still moving plenty of copies -- you might think that maybe we're finally ready to talk about religion in modern society, about whether or not thousand-year old ideas have a place in modern civilization, about the role of God in modern life. And maybe we are, but that's not what The Ten is. The Ten's a wacky, hit-and-miss, shotgun blast of a comedy that stands apart from the corporate commodity comedy's become in major-studio Hollywood-- and while it isn't for everyone's tastes or funnybones, perhaps the best thing about it is how it never tries to be.
Related Stories:
Interview, David Wain and Ken Marino
Cinematical's Sundance Review of The Ten
|
global_05_local_4_shard_00000656_processed.jsonl/63693
|
The 4% Universe
By Richard Panek
(Houghton Mifflin Harcourt, 297 pages, $26)
By the mid-1970s, particle physicists had come up with their own Standard Model of fundamental particles and forces, one that has by now passed several decades of stringent tests carried out at higher and higher energies, corresponding to shorter and shorter distances. Meanwhile, astronomers have experienced a golden age of discovery, driven by ever more powerful telescopes and ever more sensitive detectors. Almost all of what they have found agrees with Einstein's general relativity and the particle physicist's Standard Model, with one exception: Some new, unknown sort of matter seems to make up 23% of the universe. This so-called dark matter is observed solely through its gravitational effects, visible for instance in the way stars orbit the centers of galaxies.
Despite a precise determination of how much dark matter there is, its nature remains unknown. One of the major activities of particle theorists in recent years has been the study of possible extensions of their Standard Model that could somehow explain dark matter. Some physicists, for example, posit the existence of new particles, which may be observable in collisions taking place at the Large Hadron Collider (LHC) in Geneva. The fate of such ideas will be determined through data collected over the next few years.
Mr. Panek mostly avoids the somewhat overexposed subject of particle physics and the LHC, instead describing several groups of physicists searching with much smaller experiments for rare laboratory events that could be attributed to dark-matter particles. This painstaking work is punctuated by moments of drama as data that has been collected over months with elaborate protocols is finally "unblinded," potentially revealing a signal that would justify the announcement of a discovery. Nothing has turned up so far; the search continues.
The centerpiece of "The 4% Universe" is a compelling narrative of science at its best, the discovery of dark energy by two vigorously competing groups of scientists—the Supernova Cosmology Project and the High-Z Supernova Search Team—who are gathering observations of supernovae in distant galaxies. A supernova is a catastrophic explosion of a star that causes it to shine briefly with a brightness greater than that of an entire galaxy. These explosions are fairly well-understood by astronomers, making it possible to use them to estimate the distance to the galaxies in which they occur.
Putting this information together with data on the expansion of the universe has made it possible for the first time to map out how the expansion rate changes with distance. The task required overcoming daunting difficulties, not least persuading other astronomers to give up their hard-won time on a large, expensive telescope that happened to be at the right place to make the necessary measurements immediately after the discovery of a supernova. The effort to calculate the expansion rate of the universe is one of the great stories of late 20th-century science, and Mr. Panek does an excellent job of making it accessible.
The two groups racing to gather supernovae observations found their answers at about the same time—and the discovery surprised many: The expansion of the universe is accelerating. Such a possibility was inherent in general relativity, using a term in Einstein's equations that could be interpreted as assigning energy to the vacuum of empty space. Until the supernova-measurement results, nearly everyone had assumed that this vacuum energy was exactly zero, but instead it turned out to be a number equivalent to 73% of the total energy of the universe. The universe was not just expanding; the rate of expansion was increasing.
Physicists have long been trying to unify their Standard Model and general relativity. A vacuum energy of such a large size, however, is hard to make sense of by using current models, thus driving theorists to desperate measures. One popular "solution" is the multiverse, in which all possibilities occur and our universe happens to have the exact vacuum energy that allows our existence.
Mr. Panek's narrative points to an emerging cultural clash between particle physics and astronomy. Astronomers have traditionally worked alone or in small groups, emphasizing the exploration of varied and complicated phenomena. Particle physicists typically strive toward an understanding of the fundamental constituents of nature, with techniques that now require the collaboration of thousands of scientists. The discovery and investigation of dark energy has taken on more of the characteristics of particle physics than astronomers are used to, requiring large groups of researchers and a tight focus on a specific, simple model. Astronomers worry that, by following the path of particle physics, they will be led into some of the same problems that particle physicists have come to face. In the coming years a variety of new experiments should reveal whether such concerns are justified. Until then, "The 4% Universe" will serve handsomely as an illuminating guide to the dark mysteries lying at the heart of the intersection of astronomy and fundamental physics.
Mr. Woit, a senior lecturer in mathematics at Columbia University, is the author of "Not Even Wrong: The Failure of String Theory and the Search for Unity in Physical Law."
|
global_05_local_4_shard_00000656_processed.jsonl/63710
|
From Openwaterpedia
(Redirected from Parana)
Jump to: navigation, search
Paraná is a city in Argentina where the annual 88 km professional Maratón Internacional Hernandarias – Parana race is held.
It is also the name of the Paraná River (Spanish: Río Paraná, Portuguese: Rio Paraná, a river in south Central South America, running through Brazil, Paraguay and Argentina for 4,880 kilometers (3,030 miles). It is second in length to the Amazon River among South American rivers. The name Paraná is an abbreviation of the phrase "para rehe onáva", which comes from the Tupi language and means "like the sea" (i.e., "as big as the sea"). It merges first with the Paraguay River and then farther downstream with the Uruguay River to form the Río de la Plata and empties into the Atlantic Ocean.
Maratón Internacional Hernandarias – Paraná
18º Maratón acuática Hernandarias-Paraná
External links
Personal tools
Annual Recognition
Insurance and Sanctions
OWS Conferences
Race Calendar
Travel & Vacations
Education Programs
About OWP
Courtesy of
|
global_05_local_4_shard_00000656_processed.jsonl/63740
|
The Parody Wiki
The Rescuers (Stephen Druschke's Style)
16,290pages on
this wiki
• Bernard as Fievel Mousekewitz (An American Tail)
• Miss Bianca as Olivia Flaversham (The Great Mouse Detective)
• Penny as Blossom (The Powerpuff Girls)
• Madame Madusa as Lady Tremaine (Cinderella)
• Mr. Snoops as Mr. Smee (Peter Pan)
• Brutus and Nero as Dragon (The Secret of NIMH) and Lucifer (Cinderella)
• Mr. Chairman as Owl (Winnie the Pooh)
• Orville as Batso (Happily Ever After)
• Rufus as Oliver (Oliver and Company)
• Evinrude as Himself
• Ellie Mae as Petunia (Happy tree friends)
• Luke as Mr. Ages (The Secret of NIMH)
• Gramps as Dinky (The Fox and the Hound)
• Deadeye as Tigger (Winnie the Pooh)
• Digger as Sniffles (Happy Tree Friends)
• Deacon Owl as Jaq (Cinderella)
Around Wikia's network
Random Wiki
|
global_05_local_4_shard_00000656_processed.jsonl/63746
|
Fix Errors
Causes of Windows Error Code Ox80073b01
Common Problems
Windows Error Code Ox80073b01
PC Error Fix
SpeedyPC Inc is a Microsoft Certified Partner
Windows Error Code Ox80073b01
Support Guide
Fix Windows Error Code Ox80073b01
Causes of Windows Error Code Ox80073b01
Damaged registry files, malware, viruses, and corrupted data can result in Windows Error Code Ox80073b01 issues. These errors are often caused by improper maintenance of your system. If not fixed, this may lead to severe computer problems.
Common Symptoms
Fixing the Problem
To ensure your PC is error free, it is highly recommended that you download and run the Windows Error Code Ox80073b01 repair tool SpeedyPC. It will fix the problems that can create these errors and prevent new ones from occurring.
Download Windows Error Code Ox80073b01 Repair Tool Download Windows Error Code Ox80073b01 Repair Tool (5 MB)
Windows Error Code Ox80073b01
Download & run SpeedyPC.
Click 'Scan' to search for errors.
Click 'Fix All' and you're done!
Fix Your Computer Now
Certified for Windows 8, 7, Vista & XP
7 Comments on "How to Windows Error Code Ox80073b01"
Loren Marte says: Topic: Support
Windows Error Code Ox80073b01 problem solved! Thank you SOOO much!
Madeline Binnicker says: Topic: Support
Edward Hosek says: Topic: Support
Joleen But says: Topic: Support
I had the Windows Error Code Ox80073b01 error forever but this fixed it.
Andera Sobczynski says: Topic: Support
Stan Dieringer says: Topic: Support
I thought I was going to need to buy a new computer
Noella Beierschmitt says: Topic: Support
that fixed it, bless you
Leave a Comment
(will not show)
(comments are moderated)
Download SpeedyPC
Download SpeedyPC (5 MB)
Copyright © 2013-2014
It basically blows the heat sink; this is one of these options is the most everyday form of data that windows error code ox80073b01 can compromise their credit cards and monitor and see the following file is missing or corrupt DLL files is a lot of space as well as the majority of situations meaningful recoupment is sometimes called - is what's known as a result the program is getting initialized and started. With this configuration, windows will let us see the things back to their right places. Removing software tools that windows error code ox80073b01 you are choosing a repair service by maintaining your computer had. The next link you clicked also brought you to System Restore option, you charge to adjudge whether you are regular and consistent with your computer without first asking how long it's going to be changed entirely. You can use the software. Any computer support software is up-to-date or not. Let me explain a few months ago. In Windows XP, Vista, and Windows 7. Let's face it, no matter what methods of evaluation, operating, testing, system analysis and troubleshooting.
Tucows: 5 out of 5 stars Windows Error Code Ox80073b01 windows error code ox80073b01
Recommended solution based on your search of "Windows Error Code Ox80073b01"
Windows Error Code Ox80073b01
Rated 4.7/5 based on 1019 reviews
|
global_05_local_4_shard_00000656_processed.jsonl/63751
|
Code broken by regex fixes in 5.10.0, or, why it's good to help test release candidates
my $re = qr/^blah blah/;
when I should have been using it like this:
my $re = qr/^blah blah/sm;
Matt Kraai said:
If perl warns about this construction, what's the advantage of making a Perl::Critic policy for it as well? So that it can be discovered even by people not running 5.10.0?
Matt Kraai said:
Er, 5.10.1 and later, I should have said. Sorry.
Chris Dolan said:
Perl::Critic already has such a policy. It's called RegularExpressions::RequireLineBoundaryMatching and has been present in P::C since 0.13. However, an oversight caused it to apply only to m// and s/// and not qr// until this past September when I fixed it during the course of my TPF grant work.
Andy Lester said:
There are two problems.
* not applying the /m to the qr//
* applying the /m to the m//.
Your policy only handles the first case, which I'm glad it does, but is only half the battle. I just had someone else tell me that he had been doing regexes my way as well, so I'm not alone in this goof.
Tom Wyant said:
You're certainly not alone. I _did_ test Astro::SpaceTrack under 5.10.0, and _still_ had to patch.
In this case the test suite was inadequate. Still is, since I'm reluctant to look too hard at downloaded data (see Net::Dict or Astro::SIMBAD for why not), and I can't just download and bundle a file to munch on without getting permission from NORAD.
I'm not sure Test::Coverage would have helped, since I don't know how it knows the results of execution were actually looked at.
Bottom line: adequate testing is as difficult as it is essential.
Leave a comment
About this Entry
This page contains a single entry by Andy Lester published on December 20, 2007 10:52 PM.
There is no zeroth century was the previous entry in this blog.
Make vim support Perl 5.10 is the next entry in this blog.
Other Perl Sites
Other Swell Blogs
|
global_05_local_4_shard_00000656_processed.jsonl/63776
|
Few animals other than humans can move in sync with music
May 20, 2014 by Michael Blanding
“Across biology, there are rhythms everywhere, so it’s a reasonable intuition that they would be deeply ingrained in behavior,” says Aniruddh Patel. Credit: Kelvin Ma
It started with a sulfur-crested cockatoo named Snowball.
When a colleague showed Aniruddh Patel a YouTube clip of Snowball seemingly dancing to a pop song—the Backstreet Boys' "Everybody"—Patel was shocked. Not only was the bird dancing to the , but it also appeared to be moving perfectly in sync with the beat, a skill Patel thought only humans could master.
"At the time, it seemed like we might be the only species with this response to music, which is striking, since it doesn't seem like a complicated behavior," says Patel, an associate professor of psychology in the School of Arts and Sciences and an expert in the burgeoning field of music neurobiology.
Patel contacted the owner, who, as luck would have it, was a scientist herself. Together, they ran Snowball through a series of dance routines, slowing down and speeding up the song by up to 20 percent, and watching the bird's response. At nine out of 11 different speeds, the bird matched the beat. "It turned out to be the first demonstration that another animal could feel the beat of music and move its body to it," says Patel.
It was a case of the exception proving the rule—the vast majority of animals just don't seem to have the cognitive capacity to anticipate a beat and move to it.
"Across biology, there are rhythms everywhere, so it's a reasonable intuition that they would be deeply ingrained in behavior," says Patel. From frogs croaking to fireflies flashing, many animals engage in rhythmic patterns to mark territory or attract mates.
That's what Charles Darwin thought, too. Writing about the evolution of music in The Descent of Man, he speculated that music by humans taps into brain circuits deeply rooted in evolution and widely spread across the animal kingdom. But Patel challenges that assumption in a new paper titled "The Evolutionary Biology of Musical Rhythm: Was Darwin Wrong?", arguing that the ability to move in synchrony with a beat may be almost as rare, evolutionarily speaking, as language.
Close observations of animals and insects that produce rhythmic behaviors in synchrony with each other—such as certain species of fireflies—have found that they can only synchronize within a very limited range of tempos, unlike people.
Few animals other than humans can move in sync with music
The Snowball in question.
Even animals closely related to us fail at very simple tests such as tapping in synchrony with a metronome. After a year of training, the best rhesus monkeys can do is tap a few hundred milliseconds after each metronome click. In other words, they are only responding to the beat, not anticipating it.
"That turns out to be a key cognitive difference," says Patel. "When we are listening to music, we predict when the next beat will be." In fact, he says, part of the pleasure of listening to music is seeing how a composition confirms or challenges our expectations. "Monkeys make predictions in other aspects of their behavior, but not for music," he says. "Their perception of rhythm is purely passive."
This video is not supported by your browser at this time.
Watch a video of Snowball dancing to the beat.
Special Connections
Enter Snowball. Previously, Patel had hypothesized that there was a connection between the ability to imitate complex sounds ("vocal learning") and the ability to move to a beat. But he had never found evidence for that in any other species until seeing Snowball sway to the Backstreet Boys. Parrots are one of the only species that can learn and reproduce complex vocal patterns like humans. The fact that they can also learn to dance may be linked to that ability.
Patel notes that in brain studies of humans and parrots, there are special connections between motor planning regions in the front of the brain and sound-processing regions farther back in the brain. Patel theorizes that these connections allow us to synchronize to the beat by using a simulation of movement to help predict the timing of beats, whether we're actually moving or not. Those connections don't exist in primates and most other animals—explaining why monkeys can't dance.
While a link between and the ability to move to a beat has been confirmed in some animal studies, it has been challenged in other cases, he notes. California , for example, are not known to be vocal learners like parrots—however, they have been trained to move to a beat, even varying their rhythm across different tempos of music. Before scoring a point for Darwin, however, more complex neuroimaging of a sea lion's brain needs to be done. Since seals, sea lions' close cousins, are vocal learners, it's possible that sea lions have retained neural pathways inherited from a common ancestor of both species, even if they are not able to mimic vocal patterns themselves.
"The animal that I think will really test my hypothesis is the horse," says Patel. "They are not related to vocal mimics, nor are they vocal mimics themselves." Nevertheless, some horse owners have claimed that they have seen horses synchronize their gait to music when trotting, even when no rider is present. To test fully whether they are anticipating or responding to the beat, however, further studies must be done with trainers wearing headphones to block the music, lest the animals be synchronizing their movement to unconscious human cues.
Medical Applications
Beyond helping biologists better understand the workings of the brain, exploring the connection between rhythm, movement and vocalization could have medical applications. Music therapy has been shown to help patients suffering from a range of problems in the brain, including Parkinson's disease, Alzheimer's and stroke—and yet why it works is largely a mystery.
"While we have clinical evidence that music with a beat helps people with different disorders, we just don't understand the way it works from a neurological perspective," says Patel. "If we can show there is another animal that processes beat like we do, it opens a new door to investigating how music has these effects."
Currently, Patel's lab is working on more studies to understand more fully the connection between rhythm and movement. Jake Austin, A14, is investigating the difference in humans' ability to synchronize movement to a rhythm they hear versus a rhythm they feel—for example, as a tap on the skin—which could shed further light on the power of the auditory pathway in processing .
Patel, meanwhile, is continuing his experiments with Snowball, in order to test how flexible the cockatoo is in synchronizing across rhythms of different tempos. "Humans can synchronize to the beat of music across a very wide range—from 50 percent slower to 50 percent faster than an original song," says Patel. "So we'd like to see how close he comes to this in his abilities."
Fortunately for Patel, as his understanding of how the human brain processes music and language has grown, so has his main subject's musical taste. "Thankfully Snowball dances to a lot of other things—otherwise I'd get very sick of that song," says Patel. "Apparently now he's a big fan of Lady Gaga."
Explore further: Beat-keeping sea lion shows surprising rhythmic ability
add to favorites email to friend print save as pdf
Related Stories
Beat-keeping sea lion shows surprising rhythmic ability
Feb 15, 2014
Rhesus monkeys cannot hear beat in music
Dec 13, 2012
Birds can dance, really
Apr 30, 2009
Recommended for you
Rare Sri Lankan leopards born in French zoo
1 hour ago
Researcher reveals how amphibians crossed continents
3 hours ago
User comments : 1
Adjust slider to filter visible comments by rank
Display comments: newest first
not rated yet May 20, 2014
Flocking behaviour has a rhythmic component and so we would expect that if any animal could move in sync with an external stimulant it would be a bird.
|
global_05_local_4_shard_00000656_processed.jsonl/63780
|
A New Segment: Pinoy Heroes The Introduction
Pinoy Facts and Trivia - Philippine Heroes
To further clarify the divisions of the different facts and trivia in this blog, the author decided to create a new segment in which he would like to call Pinoy Heroes. In this new segment, there will be a discussion on the different facts and information about the lives of a Philippine hero, the author would like tofeature. This segment would introduce the different Heroes of the Philippines to the world. It would also show what the history of the Philippines have gone through and what did the heroes of our nation has done for their beloved country.
Hoping you would enjoy and gain more knowledge in the new segment.
Pinoy Fact # 3 – Colonization and Occupation
Pinoy Facts and Trivia - Philippine Colonization and Occupation
The Philippines has gone through different colonization and occupations from other countries. The first to colonize the Philippines is Spain. The next is the United States of America and finally the Japanese occupation occurred.
Pinoy Facts and Trivia - Spanish Period
The Spanish colonization began in 1521 when the European explorer Ferdinand Magellan arrived at the islands of the Philippines during his expedition. Magellan failed to take the ownership of the country but the Spaniards continue send expeditions to try and colonize the country. In 1543, they named the islands of Leyte and Samar as Las Islas Filipinas after the Philip II of Spain who is to be crowned King of Spain in 1556. In 1565, Spain successfully started to colonize the Philippines by having a blood compact with the Rajahs of Bohol. The Spanish colonization ended on 1898.
The Spanish colonization had many influences towards the country’s land and culture. The Spaniards where the ones who made Manila as the capital of the country and they also renamed it to Manila. Aside from Manila, there are many other provinces, cities and towns in the Philippines that has been renamed to Spanish names and some of them are named using the Spanish orthography. Most of the Filipino surnames are Spanish names and Spanish-sounding. Many words of the Filipino languages are loaned from the Spanish language and the some of the Spanish grammatical concepts are used in the Filipino grammar.
The Spanish colonization introduced the concept of Roman Catholic religion in the Philippines and most of the Filipinos today have Roman Catholic religion. Most of the customs and tradition in the Festivities of the Filipinos are influenced by Spanish-Mexican culture. The holidays like New Years Day, Holy Week, All Souls Day, All Saints Day, and Christmas are celebrated today and was introduced by the Christian religion influenced by the Spanish colonization.
The Spanish colonization also influenced the cuisine, arts, literature and music of the Philippines.
Pinoy Facts and Trivia - American Perdiod
In 1898, the Philippines together with the United States won the war against the Spanish rule. This ended the Spanish Colonization over the Philippines. The Philippines thought that the United States helped them to attain the Philippine independence but the United States would not support the Philippines to have their own declaration of independence. The two countries’ relationship began to deteriorate and it became clear that the Americans are in the country to stay. The American rule lasted from 1898 to 1946.
The American Colonization left many influences on the current government, lifestyle and culture of the Philippines. The Americans influenced the use of partisan politics in our government. Partisan politics is having the political parties in the government or the group that supports each other politically. The Americans also influenced the economy and livelihood of the Filipinos by imposing the Filipinos to free trade relations.
The Filipinos also adopt the fashion, arts, cuisine and lifestyle of the Americans. They influenced the Filipinos in use of hats, long sleeved clothes, rubber shoes and others fashion statements. The music and film industry of the Philippines today is mostly adopted or is influenced from American music and film industries. They also introduced different foods to the Filipinos like spaghetti, burgers and others. They also influenced different sports and games like basketball.
The Americans also taught the Filipinos the English language. Most schools these days teaches both the Filipino and English languages. Most of the children of the 20th century in the Philippines have American or English first names mixed with Spanish names.
Pinoy Facts and Trivia - Japanese Occupation
The Japanese occupation is a period in the Philippine history that happened during the World War II when the Philippines is still occupied by the United States. The Japanese launched a surprise attack at the American’s Clark Air Base in Pampanga ten hours after they attacked the Pearl Harbor. During that time the Philippines is being used by the United States as the military base in Asia. The Americans where forced to leave the Philippines and the Japanese established a new government structure in the country. The Japanese occupied the Philippines from 1942 until 1945 when the war was ended.
During the Japanese occupation the Philippines experienced what many conquered countries experienced. They experienced forced educational programs, forced labor, monetary changes, executions, and oaths of loyalty to the new regime. The Filipinos are force to study Japanese culture and it was made compulsory in schools. The Japanese controlled the industries, factories and food production in the Philippines. As the war ended, the Philippines gained its own independence.
Pinoy Trivia # 6 – Puerto Princesa Underground River
Pinoy Facts and Trivia - Puerto Princesa Subterranean River National Park
The longest underground river system in the world that is accessible to mankind is found in the Philippines. It is located in Puerto Princesa Subterranean River National Park in the city of Puerto Princesa, Palawan. The park is also known as Puerto Princesa Underground River., St. Paul Underground River, and St. Paul’s Subterranean River National Park.
The underground river contains second floor, which leads to small waterfalls inside the cave. It also has cave dome that measures 300 meters above the underground river. It also has different and interesting rock formations, a deep water hole, many river channels, large bats, marine creatures, and more. Deeper areas of the river are almost impossible to explore due to the lack of oxygen. The river is estimated to be more than 24 km and has a 8.2-kilometer-long underground section of Cabayugan River.
Pinoy Trivia # 5 – Quezón and Osmeña
Pinoy Facts and Trivia - Manuel Luis Quezón y Molina
Manuel Luis Quezón y Molina
Pinoy Facts and Trivia - Sergio Osmeña y Suico
Sergio Osmeña y Suico
Manuel L. Quezón and Sergio Osmeña, Sr. have many similarities in their life.
Both Manuel L. Quezón and Sergio Osmeña, Sr became the president of the Philippines. Manuel L. Quezón served as President of the Commonwealth of the Philippines from 1935 to 1944. Sergio Osmeña, Sr served as the President of the Philippines from 1944 to 1946.
They were both born in the year 1878. Manuel L. Quezón was born on August 19, 1878. Sergio Osmeña Sr, was born on September 9, 1878.
They both studied in the same high school and university. They first met each other in Collegio de San Juan de Letran where they graduated secondary education. They both took up law in the University of Santo Thomas.
They also both passed the bar exam on the same year. They were both in the top 10 of the 1903 bar exams. Manuel L. Quezón ranked 4th highest overall while Sergio Osmeña Sr, ranked 2nd highest overall.
Pinoy Trivia # 4 – Linggo
Pinoy Facts and Trivia - Days of a week in Filipino
Days of a week in Filipino
Linggo(Sunday) is the only day of a week in the Philippines that is not a Spanish word. The days of a week in Filipino are Lunes(Monday), Martes(Tuesday), Miyerkules(Wednesday), Huwebes(Thursday), Biyernes(Friday), Sabado(Saturday) and Linggo(Sunday).
Linggo was derived from the Malay word Minggu which also means Sunday. And Minggu was derived from the Portuguese word domingo which also means Sunday. Domigo is also used by Spain to call their Sunday.
Lunes in Filipino came from the Spanish word lunes. Martes came from the Spanish word martes. Miyerkules came from the Spanish word miércoles. Huwebes came from the Spanish word jueves. Biyernes came from the Spanish word viernes. And Sabado came from the Spanish word sábado.
Pinoy Trivia # 3 – Filipinas
Pinoy Facts and Trivia - 1868 Coin
Philippine 1868 Four Peso Coin
The word Filipinas first appeared in coins. The first Philippine coins with the word Filipinas were first produced during the Spanish rule from 1861 to 1868. The denominations are 1, 2, and 4 pesos. They were gold and silver coins.
Pinoy Facts and Trivia - Filipinas
1897 One Peso Coin Front
Pinoy Facts and Trivia - Filipinas
1897 One Peso Coin Back
In 1897, the word ‘Islas Filipinas’ first appeared on the back of the 1 peso coin. The estimated number of production for this coin is 6 million. It is the very last coin issued by Spain in the Philippines.
Pinoy Fact # 2 – Philippine Government
Pinoy Facts and Trivia - Philippine Government
Executive Secretary
Dept. of Foreign Affairs Secretary
Dept. of Agriculture Secretary
Dept. of Budget and Management Secretary
Dept. of Education Secretary
Dept. of Energy Secretary
Dept. of Environment and Natural Resources Secretary
Dept. of Finance Secretary
Dept. of Health Secretary
Dept. of Interior and Local Government Secretary
Dept. of Justice Secretary
Dept. of Labor and Employment Secretary
Dept. of Agrarian Reform Secretary
Dept. of National Defense Secretary
Dept. of Public Works and Highways Secretary
Dept. of Science and Technology Secretary
Dept. of Social Welfare and Development Secretary
Dept. of Tourism Secretary
Dept. of Trade and Industry Secretary
Dept. of Transportation and Communication Secretary
National Economic and Development Authority Director General
Commissioner of the Bureau of Internal Revenue
Chairman of Commission on Higher Education
Presidential Legal Counsel
Presidential Spokesman
Presidential Management Staff Chief
Presidential Adviser on Peace Process
Lower Collegiate Courts:
• Court of Appeals
• Court of Tax Appeals
• Sandiganbayan
Regular Courts:
• Court of Appeals
• Regional Trial Courts
• Metropolitan Trial Courts
• Municipal Trial Courts
• Municipal Trial Circuit Courts
Muslim Courts
• Shaira District Courts
• Shaira Circuit Courts
|
global_05_local_4_shard_00000656_processed.jsonl/63788
|
First published Wed Dec 3, 2008; substantive revision Wed Mar 26, 2014
Śāntarakṣita (725–788)[1] was one of the most important and pivotal thinkers in the history of Indian and Tibetan Buddhist philosophy.[2] His contributions to Buddhist thought were particularly noteworthy due to his historical position as one of the later Indian interpreters of the Madhyamaka thought of Nāgārjuna (ca. 1st–2nd c.). This was an historical position which allowed him to consider many important developments (both inside and outside the Madhyamaka tradition) that preceded him.[3] The central claim of the Madhyamaka School is that all phenomena are empty (śūnya) of any intrinsic nature, unchanging essence, or absolute mode of being. This was the central idea in Śāntarakṣita's thought as well, however, he was a commentator on both Nāgārjuna and Dharmakīrti in equal measure. In fact, Śāntarakṣita attempted to integrate the anti-essentialism of Nāgārjuna with the logico-epistemological thought of of Dignāga (ca. 6th c.) and Dharmakīrti (ca. 7th c.) along with facets of Yogācāra/Cittamātra[4] thought into one internally consistent, yet fundamentally Madhyamaka system. His innovative integration of facets of the three into a Madhyamaka framework of analysis are exemplary of the unique fruits which benefit from his historical local. The synthesis of these three major movements in Indian Buddhist philosophy was perhaps his most important contribution, among many, to the Indian Buddhist philosophical tradition. This synthesis, which was also taken up by his disciples (important philosophers in their own right) such as Kamalaśīla and to a lesser extent, Haribhadra, has been characterized as the last major development in Indian Buddhist philosophy. Śāntarakṣita was a dynamic thinker and a scholar with both breadth and depth of knowledge of the Indian philosophical traditions. He encouraged his readers to actively engage with a host of non-Buddhist and Buddhist philosophical positions as they ascended a sort of hierarchy of philosophical views, a hierarchy that—in his opinion—culminates in the Madhyamaka view.
However, Śāntarakṣita's contribution to Buddhist philosophy as a whole did not stop in India. He made two trips to Tibet and ultimately spent the last fifteen years of his life there. Śāntarakṣita was one of the most influential figures in the early dissemination of Buddhism in Tibet, founding the first Buddhist monastery at Samye, serving as its first abbot, ordaining the first seven Tibetan monks, and establishing a system of rigorous philosophical study based upon the traditions of learning at the great Indian Buddhist monastic universities such as Nalanda and Vikramaśīla. In affect, Śāntarakṣita (and later, his disciple Kamalaśīla) taught Tibetans how to do philosophy. He introduced Tibetans to a plethora of Indian philosophical views, both Buddhist and non-Buddhist, and taught them how to study, critically analyze, and meditate upon these ideas. Several important qualities of Śāntarakṣita's thought that were unique to him in India, became a fully integrated modus operandi of philosophy in Tibet including his dynamic engagement with competing philosophical views and his integration of Madhyamaka and logico-epistemological thought. As such his influence impacted the spectrum of Tibetan philosophical literature, from the earliest philosophical doxographies such as Yeshe De's (ca. 8th c.) Distinguishing the Views (lta ba khyad par) to the commentaries and treatises of towering indigenous Tibetan philosophers such as Chaba Chökyi Senge (phwya pa chos kyi seng ge) (1109–1169), Sakya Pandita (sa skya paṇḍita) (1182–1251), Tsongkhapa (tsong kha pa) (1357–1419) and Mipham Gyatso (mi pham rgya mtsho) (1846–1912).
1. Śāntarakṣita's Madhyamaka Thought
Śāntarakṣita is probably best known as one of the great Indian Madhyamaka commentators. His thought in this regard has several features that make it unique including: his integration of Yoācāra thought, his integration of Buddhist logico-epistemological developments (discussed below), and his dynamic engagement with other Buddhist and non-Buddhist views (discussed below). His Madhyamaka view is most clearly and succinctly articulated in his text Madhyamakālaṃkāra (The Ornament of the Middle Way, hereafter, MA) and his own commentary on that text, Madhyamakālamkāravṛtti (The Auto-Commentary on The Ornament of the Middle Way, hereafter, MAV).[5]
1.1 The Two Truths: Ultimate Truths
A presentation of the two truths is a standard way by which Madhyamaka philosophers explain their views on the ontological status of phenomena. It is seen as the most effective method for coursing a “middle way” between the philosophical extremes of asserting the absolute existence of phenomena on the one hand, and the non-existence of them on the other. Thus, Mādhyamikas will routinely claim that phenomena lack a certain mode of existence ultimately, but claim that such phenomena, or objects of knowledge, maintain another mode conventionally. Virtually all Indian Madhyamaka philosophers will claim, in some detail, that an ultimate truth is an object's emptiness, or lack of having a truly existent essence or nature. This claim, which runs the danger of leading to nihilism, is then tempered to some degree by claims about the conventional mode of existence of those phenomena. Though phenomena do not ultimately exist, they do exist conventionally. The precise way in which individual Madhyamaka thinkers define and describe these two truths gets at the core of what makes each of these important thinkers unique. Śāntarakṣita is famous for presenting his views on ultimate truths by way of one of the most famous Buddhist philosophical arguments on the ontological status of phenomena, the neither-one-nor-many argument.
1.2 The Two Truths: The Neither-One-Nor-Many Argument
The first two-thirds of MA comprise what is perhaps the most well-known rendering of the neither-one-nor-many argument, one of the key philosophical arguments used by Madhyamaka philosophers to establish the emptiness, or lack of an inherent nature, in phenomena. It is by way of this argument and his summary that Śāntarakṣita offers his presentation of the two truths, ultimate truth (paramārthasatya) and conventional truth (saṃvṛtisatya). The two truths are not only the primary means by which Mādhyamika philosophers present their positions on ontology, but form the ground upon which issues of epistemology and logic are often discussed as well. The neither-one-nor-many argument is most succinctly presented in the first stanza of MA when he writes:
These entities, as asserted by our own [Buddhist schools] and other [non-Buddhist schools], have no inherent nature at all because in reality they have neither a singular nor manifold nature, like a reflected image.[6]
The point that Śāntarakṣita is attempting to make here is that no phenomena, including those which his philosophical rivals have claimed to have an inherently existent essence or nature, in fact do have such a nature. The reason they cannot have such a nature, according to the argument, is that they have neither a truly singular nature, nor a truly manifold nature, the two being exhaustive of all possibilities for entities that have a real nature.
Over the course of the next sixty stanzas in his ninety-seven stanza text, MA, and accompanying auto-commentary, MAV, Śāntarakṣita puts all those phenomena asserted by his Buddhist and non-Buddhist philosophical opponents to the test of the neither-one-nor-many reasoning. He begins by examining each instance in which some phenomena is asserted to be of a truly singular nature. Through an analysis that reveals that such phenomena must have parts and thus could not be truly singular, he makes his way through all such cases current in eighth century Indian philosophical discourse. For example, he begins his application of the argument with an analysis of the claim made by the non-Buddhist Sāṃkhya school that there is a Fundamental Nature (Prakṛti) or creator god which is the permanent, uncaused, unobstructed absolute cause of all phenomena and which is of a truly singular nature. He argues in the second stanza of MA:
Permanent, efficacious entities are not themselves singular because they contribute to the production of successive effects. If each successive effect is distinct, then [the argument in favor of] permanent efficacious entities [that are truly singular] degenerates.[7]
According to Śāntarakṣita, true singularity would be an absurd quality to claim for something which is permanent and has the ability to contribute to the periodic production of successive effects. If that were the case, there must be a part of the causal entity in moment #1 which contributes to the production of a seed, for example, a part in moment #2 which contributes to the production of the sprout, and a part in moment #3 which contributes to the production of a flower. Since the Fundamental Nature is described as the sole cause of the periodic arising of all effects, it must have all these parts, and more. It must have parts related with every entity for which it is a cause. The Fundamental Nature must include parts that cause entities to exist in one moment and parts that cause them to cease to exist or transform into something else in another. That which causes a seed to exist in moment #1 must have at least some quality or qualities that distinguish it from that which causes a sprout to exist in moment #2. At a bare minimum, his opponent must be forced to admit parts to such a Fundamental Nature. Something with manifold parts cannot, by definition, be truly singular. Śāntarakṣita thus considers that the application of this sort of reasoning undermines the existence of such a truly singular Fundamental Nature, as described in the Sāṃkhya system since it is illogical for there to be a permanent, truly singular, unobstructed cause of the successive effects of the manifold world. Arguments regarding the irrationality of asserting its permanence and those regarding its contradictions with our experience of causality in the world, are supplied in his own MAV on the above verse to strengthen his rejection of the notion of such a Fundamental Nature.
Śāntarakṣita is not only critical of his non-Buddhist philosophical opponents however. The bulk of the argument is addressed toward the views of philosophical opponents within in his own larger Buddhist camp that he feels have made errors in interpretation and logic. For example, he dedicates a lengthy portion of the neither-one-nor-many argument to criticisms of a variety of Buddhist claims about the true singularity of consciousness made by both Buddhists associated with the Sautrāntika schools and those associated with the Yogācāra/Cittamātra schools. In a variety of ways, proponents of these schools claim that consciousness is truly singular and yet can be a knower of a multiplicity of objects. For Śāntarakṣita, such claims are fraught with errors in logic. If consciousness knows a multiplicity of objects, then it must not be singular by definition. There must be a part of the consciousness that knows object A and another than knows object B. Various Buddhists who want to hold consciousness to be truly singular, have attempted to avoid these faults in a variety of ways. Some have attempted to claim they avoid the faults because they assert that there are an equal number of consciousnesses as objects. Others claim that they avoid these problems because they claim consciousness exists in a non-dual relationship with its objects. Each of these interpretive turns was met by Śāntarakṣita with logical analysis demonstrating what he considered to be the inevitable contradictions that ensue by the various attempts at claiming that consciousness is truly singular. In this manner, Śāntarakṣita analyzes a host of current claims of true singularity over the course of the first sixty stanzas of MA.
Having examined all those phenomena which his philosophical opponents claim have or are of a truly singular nature and determined through reasoned analysis that they in fact, could not possibly have or be of a truly singular nature, Śāntarakṣita proceeds to consider the possibility of there being a truly manifold nature in phenomena. Because a manifold nature would depend upon the aggregation of true singularities, he concludes that just as there can be no inherently singular nature, there also can be no inherently manifold nature. And since there is no third alternative for entities with an inherent nature, there must be no phenomena that have an inherently existent nature at all. While elaborated upon in greater detail in his auto-commentary, MAV, his terse summary of the neither-one-nor many argument is found in the sixty-first and sixty-second stanzas of MA as follows:
We have found with analysis that no entity, whatsoever, has an [inherently] single nature. Those that have no single nature must also not have a manifold nature.
The existence of an entity belonging to a class other than that which has a single or manifold [nature] does not make sense because the two are exhaustive of all possible alternatives.[8]
Thus, an object's lack of, or emptiness of having an inherently existent nature is an ultimate truth for Śāntarakṣita. This position, he feels, has been logically established by way of the neither-one-nor-many argument.
1.3 The Two Truths: Conventional Truths
In a variety of ways, virtually all Mādhyamika's reject the existence of an ultimate, absolute, unchanging nature in things, as Śāntarakṣita has done in the first sixty-two stanzas of MA. This is a key component in their presentations of ultimate truths. The anti-essentialist position of rejecting an ultimate nature in phenomena enables a Mādhyamika, such as Śāntarakṣita in this case, to avoid the “extreme” of clinging to objects as permanent, or more precisely, as enduring for more than a moment. Though the arguments may vary, most Mādhyamika thinkers are similar in their descriptions of ultimate truths. Debates among Mādhyamikas tend to rise in relation to their presentations of conventional truths, the means by which the “extreme” of non-existence is avoided.
After concluding that phenomena do not ultimately exist, Śāntarakṣita offers his concise summation and definition of a conventional truth in the sixty-third and sixty forth stanzas of MA:
Therefore, these entities are characterized only by conventionality. If someone accepts them as ultimate, what can I do for that person?
Those phenomena that are only agreeable when not put to the test of
[ultimate] analysis, those phenomena that are generated and disintegrate and those that have the ability to function are known to be of a conventional nature.[9]
In these stanzas and in his accompanying auto-commentary, MAV, Śāntarakṣita presents the parameters for his definition of a conventional truth. They are:
1. that which is known by a mind,
2. that which has the ability to function (i.e., that it is causally efficacious),
3. that which is impermanent, and
4. that which is unable to withstand analysis which searches for an ultimate nature or essence in entities.
In addition, later in the text, Śāntarakṣita describes such objects in a manner previously only used by proponents of the Yogācāra/Cittamātra school, namely, that such objects are “mere consciousness only”. (This aspect will be discussed below in the section entitled “Yogācāra-Madhyamaka Synthesis”.)
Truths are objects of knowledge in Madhyamaka ontology, so the quality of being known by a mind is an imperative and to some degree a tautologous assertion. Being impermanent and causally efficacious implies, in Buddhist thought, that they are dependently-arisen, that they arise on the basis of impermanent causes and conditions that are themselves, dependently-arisen. In his own commentary on these stanzas, MAV, Śāntarakṣita explicitly describes conventional truths as dependently-arisen. He goes on to state that conventional truths are known with conceptual thought and designated by worldly convention (MAV, 88–93). Thus an object's lack of an inherent nature is an ultimate truth. Those impermanent, dependently arisen, causally efficacious objects of knowledge that are known by conceptual thinking are conventional truths. This is how Śāntarakṣita presents his views on the ontological status of phenomena in his texts MA and MAV.
1.4 The Two Truths: Yogācāra-Madhyamaka Synthesis
In addition to presenting the two truths as described above, a presentation that is not particularly out of the ordinary for a Madhyamaka thinker, Śāntarakṣita elaborates further, in ways that must have made his presentation seem unorthodox to mainline Mādhyamikas in eighth century India. Although there were other Indian Mādhyamikas who attempted to incorporate dimensions of Yogācāra/Cittamātra (Mind-Only) thought into their Madhyamaka perspective (including Śāntarakṣita's own disciples Kamalaśīla and Haribhadra, as well as predecessors like Ārya Vimuktsena and Śrigupta), Śāntarakṣita is undoubtedly the most noteworthy and most famous Yocācāra-Madhyamaka synthesizer.[10] There are two primary areas where we find Yogācāra ideas incorporated into Śāntarakṣita's thought: his presentation of conventional truths where he describes them as being of the nature of consciousness, and his conventional acceptance of self-cognizing consciousness or reflexive awareness.
One of the fundamental tenets of the Yogācāra/Cittamātra schools of Buddhist thought is the assertion that phenomena are not of an utterly distinct nature from consciousness. The pan-Mahāyāna idea of emptiness is in fact described in this way Yogācāras/Cittamātras, by claiming that emptiness refers to an object's lack of a nature that is distinct from the consciousness perceiving it. This is contrasted with the common Madhyamaka description of emptiness as referring to an object's lack or emptiness of its own nature or essence in and of itself. Śāntarakṣita incorporates this Yogācāra line of thinking into his presentation of conventional truths when he writes in the ninety-first stanza of MA:
That which is cause and result is mere consciousness only. Whatever is established by itself abides in consciousness.[11]
This statement refers to his earlier descriptions of conventional truths (cited above) where he describes conventional truths as phenomena that have the ability to function and which generate and disintegrate. In Mādhyamika discourse, “That which is cause and result,” is simply another way of referring to conventional truths. It refers to that which is impermanent, dependently-arisen, and causally efficacious, the three being co-extensive with each other and with conventional truths in general. Thus, by stating that, “that which is cause and result is mere consciousness,” Śāntarakṣita is stating that conventional truths are of the nature of consciousness. This is an ultimate description of reality for proponents of the Yogācāra/Cittamātra systems, but for Śāntarakṣita here, this is part of his presentation of conventional truths, thus, incorporating a Yogācāra/Cittamātra orientation for his presentation of conventional truths.
A further development of this philosophical synthesis that Śāntarakṣita is putting forth is described even more explicitly in the next stanza, the ninety-second:
By relying on the Mind-Only (Cittamatra, Sems tsam pa) system, know that external entities do not exist. And by relying on this [Middle Way (Madhyamaka, dbU ma)] system, know that no self exists at all, even in that [mind].[12]
Here we find a particularly important and unique aspect of Śāntarakṣita's presentation of the two truths. It is not merely that he incorporates aspects of Mind-Only thinking into his presentation that makes it unique. It is unique because for virtually all of Śāntarakṣita's Madhyamaka predecessors in India, the two truths are utilized solely as a vehicle for presenting the ontological status of entities. It is done by way of describing the mode of being for various objects of knowledge (ultimate truths and conventional truths). This common Madhyamaka way of approaching the two truths is present in Śāntarakṣita as well, but there is more here. In addition to stating the ultimate truths exist in x way and conventional truths exist in y way, Śāntarakṣita is also using his presentation of conventional truths as a stepping stone for his readers. A proper understanding of conventional truths takes a person part of the way towards an understanding of the ultimate. Previous Madhyamaka presentations of conventional truths do not incorporate this practical dimension. For Śāntarakṣita, conventional truths are not completely mistaken. By properly understanding conventional truths (i.e., as a follower of Cittamatra tenets understands the ultimate), one is well on the way to a proper understanding of the ultimate from his Madhyamaka perspective—the most subtle and accurate philosophical presentation of reality. There is a dynamic step at work in Śāntarakṣita's presentation of the two truths; first one understands that entities are not of a distinct nature from that of the mind (as Mind-Only proponents claim) and then they progress to realize that nothing exists in and of itself (the Madhyamaka perspective), even the mind. This dynamic engagement with conventional truths is unique among Madhyamaka thinkers and a critical innovation in the thought of Śāntarakṣita.
2. More Dynamic Aspects of Śāntarakṣita's Philosophical Enterprise
Śāntarakṣita was a towering figure in eighth century Indian philosophy. It appears from the little evidence we have that he was fully engaged in the philosophical arena of his day including the composition of polemical tracts against his rivals. We can assume that these were taken seriously by his opponents because some of his extant writings are only known today because they were preserved in Jain libraries. But Śāntarakṣita's philosophical style was richer than simple polemics. In texts like MA, he led his readers through a dynamic engagement with competing views. Competing views, particularly competing Buddhist philosophical views were utilized in his texts in ways that encouraged his readers to contemplate the full impact and import of those views. In other words, he seems to encourage a sort provisional acceptance of competing Buddhist views as he presents a philosophical hierarchy of tenets. This method makes for a quite dynamic engagement with those competing views where provisionally taking on the competing views serves to have a transformative affect on the mind of the student as they ascend the philosophical hierarchy. They were not simply used as vehicles for illuminating his own view by contrasting it with those of his Buddhist rivals, though he was certainly doing that as well. Śāntarakṣita was doing more than that; he was encouraging his readers to take on those philosophical tenet systems he considered to be hierarchically “lower” in order to facilitate what seems to be a dynamic philosophical enterprise of multi-tiered engagement with a host of philosophical positions and views. In a tradition where philosophical inquiry is a form of religious praxis, it appears that provisional acceptance of the tenets of lower schools was used to ripen the mind for increasingly more subtle and accurate philosophical descriptions of reality. In other words, since the cultivation of experiential wisdom knowing reality is at the heart of what facilitates the larger tradition's soteriological goals, this dynamic method can be said to serve soteriological aims.[13]
This process can be witnessed to a degree in Śāntarakṣita's encyclopedic tenets text, Tattvasaṃgraha, but is most clearly presented in MA. In his application of the neither-one-nor-many argument in MA (described above), the careful reader is drawn to notice that as Śāntarakṣita proceeds through his examination of competing views, he does so through the shifting lens of three philosophical perspectives.[14] In the first fifteen stanzas of the text, he seems to be analyzing non-Buddhist and Vaibhāṣika tenets as a holder of Sautrāntika tenets would. His criticisms of those views are of a type that a Sautrāntika would utilize and his forms of reasoning are as well. It is as if he is encouraging his readers to adopt a Sautrāntika outlook and all that entails. Though there may be polemics involved (If x view can even be refuted by Sautrāntikas, what need is there to discuss the superiority of the Madhyamaka?), it appears that what is at work in an actual encouragement of his readers to seriously take on a Sautrāntika position, at least provisionally.
When he begins to examine the various positions of Sautrāntikas, his perspective shifts and he starts to argue as a Yogācāra/Cittamātra would. He criticizes the varying Sautrāntika perspectives as a Yogācāra/Cittamātra would, by making criticisms about how knowledge of entities external to consciousness could be known. And he makes these arguments both in the context of the neither-one-nor-many framework and with the types of reasoning Yogācāra/Cittamātra thinkers such as Dharmakīrti, might utilize. One might think that the focus of his criticisms would be solely on Madhyamaka issues about own-essences (svabhāva), but a major focus at this point is on the separation of objects from consciousness. It is as if he Śāntarakṣita is encouraging his readers to take on a Yogācāra/Cittamātra perspective, for at this point Śāntarakṣita seems to feign acceptance of a Yogācāra/Cittamātra perspective. He does not qualify his acceptance as merely conventional. He argues against Sautrāntika positions, as a Yogācāra/Cittamātra. It is only later in the text, when he begins to discuss the two truths that we come to learn that his acceptance of Yogācāra/Cittamātra tenets is qualified and provisional. Finally, beginning in the forty-fifth stanza, when Śāntarakṣita begins to analyze various positions asserted by proponents of Yogācāra/Cittamatra tenet, he takes on his final position as a Mādhyamika. He then criticizes such positions from a Mādhyamika perspective and utilizes the sorts of reasoning a Mādhyamika would use to refute Yogācāra/Cittamatra tenets, focusing on a rejection of essences. Thus, he has made his final shift in frames or scales of analysis. As he concludes the neither-one-nor-many argument and discusses a host of issues of great import in the remainder of the text, he maintains his final position as a Mādhyamika.
In the process of these shifting provisionalities, or scales of analysis, Śāntarakṣita has led his readers through a dynamic engagement with a host of philosophical views. They are not merely presented to be refuted (though that is certainly happening), but through an apparent feigned acceptance of “lower” tenets as he makes his way up a hierarchical ladder of philosophical views, his readers are actively encouraged to engage fully by taking on these other views that will ultimately be rejected. Rather than refute and dismiss competing views, Śāntarakṣita seems to recognize a utility in their engagement, one that serves the teleological function of leading the reader to (in his opinion) the highest philosophical view, the Madhyamaka. For ultimately, the purpose of Buddhist philosophical inquiry has a soteriological function as well. Suffering, according to the Buddha, is caused by confusion and ignorance, by a misunderstanding of the world and its functions. Thus, the duty of the Buddhist philosopher is to attempt to indicate for the suffering masses, as clearly as possible, the precise nature of their confusions and misunderstandings that lay at the heart of their suffering. For Śāntarakṣita, it is attachment to a fixed nature or essence in things which is at the root of the problem. So a dynamic philosophical process that can skillfully lead readers to the Madhyamaka perspective, the one that both understands and undermines all clinging to fixed natures, is a critical and creative part of ascending the spiritual path.
3. Śāntarakṣita's Epistemological Thought
The spearheading of the Buddhist logico-epistemological tradition (pramāṇavāda )[15] by Dignāga and Dharmakīrti, at first in response to Indian thought in the area of philosophy of language and in dialogue with non-Buddhist philosophers, resulted in a tremendous impact on many dimensions of Buddhist philosophical discourse in the middle and late periods of Indian Buddhism. Though its impact could be seen before Śāntarakṣita (in facets of Bhāvaviveka's writings), he was the first major Madhyamaka thinker who was also a commentator on Dharmakīrti, a contributor to this discourse, and who attempted to integrate its insights into a Madhyamaka framework. (Both Dignāga and Dharmakīrti are more closely associated with the Mind-Only school). One can witness one dimension of the profound influence Śāntarakṣita had on Tibetan Buddhist thought, even given the differences in the details, when observing this integration of Madhyamaka and pramāṇavāda thought in towering Tibetan thinkers such as Sakya Pandita and Tsongkhapa among others. Śāntarakṣita's thought on logico-epistemological issues is primarily found in his encyclopedic doxography, Tattvasaṃgraha and in his commentary on Dharmakīrti's Vādanyāya entitled Vipañcitārthā. In order to properly situate Śāntarakṣita's thought on these issues, it is necessary to briefly discuss that of his two most important predecessors in this area: Dignāga and Dharmakīrti.
Central to the logico-epistemological tradition in general and Śantarakṣita in particular is the question of what constitutes a means by which one accrues an instance of indubitable knowing. In other words, how does one justify considering a moment of awareness or cognitive episode as valid knowledge (pramāṇa)? What constitutes trustworthy awareness? For Śāntarakṣita, the pramāṇa that is the means of justifying an instant of valid knowing is simultaneously indistinct from the instant of valid knowing itself (McClintock 2002, 57).
As with Dharmakīrti, Śāntarakṣita describes valid knowledge or valid cognitions as instants of new knowledge in the sense that the cognizer knows newly something which to that point was unknown. Generally speaking, Buddhist pramāṇavāda thinkers categorize two types of pramāṇa[16]: perception (pratyakṣa)[17] and inference (anumāna). Objects of perception are causally efficacious particulars (svalakṣaṇa), actual instance of things in the world with temporal and spatial location. It is only particulars that are considered to be real. Generally, it would be thought that words apply to universals (sāmānyalakṣaṇa) which are conceptual constructs that have no causal efficacy in the world. Thus the early pramāṇavāda thinkers like Dignāga and Dharmakīrti can be considered to hold a soft form of connotationism in that they would reject a denotationist view that considers words to apply directly to actual particulars. The intuition that a word points to a particular would be very objectionable. A word cannot express a particular because particulars are limitless and words have limits. Yet they are soft connotationists in that via a process of elimination or exclusion, they posit a way in which language is both not arbitrary and not a reference to particulars. Inferences are cognitions based on valid reasons that depend on this non-arbitrary use of language.[18]
Among the philosophical issues that are important here is the fundamental question of how, if the world is only directly accessibly by perception, can one come to valid knowledge by means of inference that relies on words that do not directly refer to particulars? How does one link the ineffable world of particulars to language, and thus to an inference that could produce valid knowledge? Since words do not apply to actual objects or particulars which are ineffable, Śāntarakṣita, like his predecessors Dharmakīrti and Dignāga, needs to explain how it is that we are talking about the world, while at the same time making it clear that we are not talking about the world, but our conceptual scheme. Yet he also must make clear that all conceptual schemes are not equal in that some can produce valid knowledge and some fail to do so. There must be a degree of non-arbitrariness to language if inference is to be considered as a source of valid knowledge. There are true and false statements and consequences for beliefs about them. So the challenge is: how does one link the ineffable world of particulars to language?
Each of the pramāṇavāda thinkers, including Śāntarakṣita, begin to address these questions with variations on a theory initiated by Dignāga and fine-tuned by Dharmakīrti and his followers, known as exclusion (apoha) theory. Dignāga's response to the problem begins by claiming that language does not refer to universals, as one might presume a Buddhist would argue, but rather, through a negative process of exclusions or apoha, eliminates that which contradicts the referred object. Words talk about entities in so far as they are qualified by the negation of other things. Though nothing affirmative is said about reality, by use of exclusions, there is a relationship between concepts and particulars. Apoha or exclusions typically involves a double negation. Because in Buddhism the absence of something is a fiction in that absences are not caused and do not function, exclusions can be used to explain away universals as the referents of words. Because negations are fictions, this lightens the ontological commitment. A distinction is drawn between entities and pseudo-entities. Only particulars are real; negations are not real, but they are also not universals. Universals are positive or affirmative, whereas exclusions are negative. Dignāga's position is explained quite succinctly by Bimal Matilal:
Each name, as Dignāga understands, dichotomizes the universe into two: those to which the name can be applied and those to which it cannot be applied. The function of a name is to exclude the object from the class of those objects to which it cannot be applied. One might say that the function of a name is to locate the object outside of the class of those to which it cannot be applied. (Matilal 1971, 45)
Dignāga argues for a way in which language can be construed to signify particulars, through a double negation that excludes that which contradicts the referent object while eliminating the philosophical commitment to universals. Though the process of exclusion seems quite cumbersome, in actuality our language formation and conceptual processes seem to engage in it quite naturally.
Dharmakīrti adds several components to the thought of Dignāga on these issues concerning valid knowledge. In defining perception as a source or means of valid knowledge, Dharmakīrti describes it as that cognition that is free from conceptuality and non-erroneous. The inclusion of the qualification of it being non-erroneous eliminates erroneous non-conceptual cognitions, such as mistakenly seeing two moons, from the category of valid knowledge. Dharmakīrti further distinguishes two ways of apprehending objects: through perceptions which apprehend real objects positively, as they are, through the mediation of images (ākāra) which perfectly reflect them, and through concepts which get at their objects negatively, through the elimination of their opposites. Dharmakīrti's insight is found in the connection he draws between reality and the conceptual realm of universals. For Dharmakīrti, experience and representations are the bridge. We construct concepts out of our experiences and representations of functional resemblances of real entities. In other words, we can validly group together representations of actually unique entities on the basis that they can be excluded from the class of things that do not perform a given function. Georges Dreyfus put it well:
For Dharmakīrti, the conceptual process is neither arbitrary nor groundless, even though it does not reflect reality. Conceptuality does not arise out of nothing but results from experience. As we may recall, things such as trees, for instance, have functional similarities. In dependence on our experiences in which the functional resemblances of things are registered, we construct concepts. Thus, conceptuality arises as a result of our experiences. In this way conceptual thoughts are connected indirectly to reality. (Dreyfus 1997, 226)
In other words, there are several components to Dharmakīrti's exclusion theory: the entity or particular, the image or representation, and the exclusion. First there are real events of real entities. Then there is a perception that has the mark of a real entity because it is caused by something real. It is a mirror-like image of the real. This is followed by a conceptual representation superimposed on a real image. This is part real, part concept. Finally, after this is done, there is an assumption of commonality with other conceptual representations. This assumption is unreal and is the basis of the exclusion or universal. It derives not from the reality of common characteristics, but judgments of similarity. This is where concepts are conceived of as representing properties that are thought to exist in the world, such as permanence, which in fact do not. But it is through this process of exclusion that one can utilize positive language with the understanding that that language only refers to a common negation.
Śāntarakṣita's treatment of these issues largely revolves around a response to the criticisms of non-Buddhists such as Kumārila and Uddyotakara. Kumārila levels three criticisms of apoha theory in particular: that it is circular, that it is counter-intuitive, and that it is redundant. Śāntarakṣita's response to these criticisms begins by describing three primary types of negations which he equates with exclusions: non-implicative negations (niṣedha, med dgag) and two types of implicative negations (paryudāsa, ma yin dgag): mental exclusions and object exclusions. A non-implicative negation is a negation that does not imply the existence of some other thing. For example, the negation of the existence of flowers that grows in the sky does not imply the existence of other plants that grow in the sky. It is a mere negation with nothing implied. On the other hand, implicative negations, while denying the existence of one thing, imply the existence of another. An example of an implicative negation would be if we were told that either my aunt or my uncle came over last night. If my aunt did not come, it implies that my uncle did. Thus, there is something implied by the negation. Among the types of implicative negations, Śāntarakṣita includes mental exclusions. It is important to point out here that for Śāntarakṣita, negations and exclusions are virtually synonymous. Mental exclusions are conceptual representations that relate to the appearances or representations of entities, as discussed by Dignāga. Object exclusions are not conceptual representations of mere appearances or representations, but rather can relate to the real world. Thus, this form of exclusion is a real thing for Śāntarakṣita. It is these three types of exclusions that form the basis of Śāntarakṣita's thought on this topic, the basis of his psychological interpretation of apoha, and the basis of his response to the critics of Dharmakīriti's apoha theory, such as Kumārila.
In addition to the three types of exclusions, central to Śāntarakṣita's thought on the topic is his unique presentation of representations and the psychological dimensions to his exclusion theory.[19] According to Śāntarakṣita, it is our experiences of unifying similarities among representations that gives rise to our conceptual constructs. Mental representations of objects are exclusions because they exclude other representations. These conceptual representations are misconstrued to be the actual objects since the actual objects do not exist in them. For Śāntarakṣita, both the exclusion of that which is other than real particular and the exclusion of that which is other than the representation are both apohas or exclusions. The psychological dimension to exclusion is particularly important in Śāntarakṣita's apoha theory in that he emphasizes the role of negation in relation to mental representations and mental events in the conceptualizing process. For Dharmakīrti, universals are the objects of concepts. Śāntarakṣita agrees with this point but stresses that the concept is the mental representation or mental event and that is an exclusion, whereas for Dharmakīrti the representations are the basis which supports the exclusions and concepts. For Dharmakīrti, exclusions are conceptual fictions, whereas for Śāntarakṣita they can be real entities.
Śāntarakṣita considers that he is fully able to respond to the criticisms of Kumārila with his presentation of exclusions. For example, Kumārila charges that the Buddhist apoha theories are counter-intuitive in that our intuition is not that words and concepts refer to negations or exclusions. Śāntarakṣita argues that Kumārila misunderstands apoha to always be non-implicative negations. He misses the two types of implicative negations that Śāntarakṣita clearly specifies as included among forms of exclusions. For Śāntarakṣita, when we use words, the objects of such conceptual thoughts are the real objects. They are the indirect object of the exclusion that is a form of implicative negation, which includes negative aspects by implication. Thus, words can be indicative of positive elements. The external object implies the image plus the exclusion of that which is other. The words or concepts thus take external objects as their objects and imply the conceptual exclusions. Thus when Kumārila mistakes all exclusions to be non-implicative negations, he misses this key component to the psychological functions at work and mistakes apoha theory to be counter-intuitive.
Kumārila's charge of circularity in apoha theory is one of the most critical for its defenders to answer. The main thrust of the argument was already found in Uddyotakara's Nyāyavārttika, where he argues that apoha entails the problems of circularity and denotationism (which apoha theorists consider it is imperative to avoid). This is the case because there must be an affirmative denotation between words and particulars since the negation of an object implies that one first have a positive understanding of the object. One must first have an affirmative understanding before one can negate its exclusion. Dreyfus summarizes Kumārila's presentation of the argument succinctly as follows:
If conceptual understanding involves negation of x, then understanding of x will presuppose that of non-x, which in turn presupposes that of non-non-x. And this is nothing but an understanding of x. (Dreyfus 1997, 242)
In other words, Kumārila argues that since a conceptual understanding of a cow is simply an understanding of non-non-cow according to apoha theory, that in order to understand non-non-cow, one must already understand cow. Thus, apoha theory must resort to circularity, or perhaps even more precisely, it lacks a beginning point for the circle in the first place. Uddyotakara emphasizes that the only way out is to resort to a linguistic denotationism that apoha theorists want to avoid. Kumārila stresses the interdependence of knowing cow and knowing non-cow and not non-cow. Both question how a double negation is something other than a positive universal.
The crux of Śāntarakṣita's response, again, relies on his presentation of three types of exclusions, specifically the mental exclusion that is signified by words, a point he feels both Uddyotakara and Kumārila fail to recognize. According to Śāntarakṣita, there is a conceptual image that is an exclusion that is generated in the mind of one who hears the words, “This animal is a cow,” for example, but that this idea is an implicative negation that only implies that this animal is not a non-cow. According to Śāntarakṣita, the problem of circularity is thus avoided by a proper understanding of implicative negations: to understand cow one need not understand non-cow, but rather the mere idea of cow. Like Dharmakīrti, Śāntarakṣita relies on a judgment of similarity in functional efficacy among distinct particulars as conceptually construed to generate the idea. For Śāntarakṣita the emphasis is on similarity among the mental representations of them. Śāntarakṣita and Dharmakīrti both argue that there is not a problem with grouping things as x and non-x. The distinction between similar and dissimilar classes is made and the word merely applied to indicate this understood distinction. For Śāntarakṣita, based on judgments of similarity, the classes of cows and non-cows are established. It is the word that is applied to them which is not established. It is the word that is used to indicate this judgment of similarity at the discretion of the speaker. Thus, for Śāntarakṣita, the perceived problem of circularity by Uddyotakara and Kumārila is due to their misunderstanding of exclusions and negations.
Śāntarakṣita's response to Hindu critics of apoha and the interpretive innovations that spring from it represent a critical juncture in Buddhist logico-epistemological thought. Though we see examples of integration of pramāṇavāda thinking into the ideas of a Mādhyamika philosopher, most notably with Bhavaviveka, it is not until Śāntarakṣita that we see this marriage of ideas fully integrated and spelled out in a sophisticated way. It is difficult to overstate the tremendous impact this marriage of two major strands of late Indian philosophical thought in Śāntarakṣita had on the philosophical traditions of Tibet.
• Blumenthal, J., 2009. “The ‘Neither-One-Nor-Many’ Argument of Śāntarakṣita: A Classical Buddhist Argument on the Ontological Status of Phenomena” in J. Garfield and W. Edelglass (eds.) Buddhist Philosophy: Essential Writings. New York: Oxford University Press.
• –––, forthcoming. “Two Topics Concerning Consciousness in Śāntarakṣita's Yogācāra-Madhyamaka Syncretism,” in Jay Garfield and Jan Westerhoff (eds.), Yogācāra and Madhyamaka: Complimentary or Conflicting Systems? New York: Oxford University Press.
• –––, 2004. The Ornament of the Middle Way: A Study of the Madhyamaka Thought of Śāntarakṣita. Ithaca: Snow Lion Publications.
• Doctor, Thomas, 2012. “Five Extraordinary Assertions,” in Marie-Louise Friquegnon and Noe Dinnerstein (eds.), Studies on Śāntarakṣita's Yogācāra Madhayamaka, New York: Global Scholarly Publications.
• Dreyfus, G., 1997. Recognizing Reality: Dharmkīrti's Philosophy and Its Tibetan Interpretations. Albany: State University of New York Press.
• Frauwallner, E., 1961. “Landmarks in the History of Indian Logic.” Wiener Zeitschrift für die Kunde Süd- und Ostasiens 5: 125–148.
• Garfield, Jay, 2012. “The Conventional Status of Reflexive Awareness: What's at Stake in a Tibetan Debate?” in Marie-Louise Friquegnon and Noe Dinnerstein (eds.), Studies on Śāntarakṣita's Yogācāra Madhayamaka, New York: Global Scholarly Publications.
• Ichigo, M., 1985. Madhyamakālaṃkāra of Śāntarakṣita with His Own Commentary or Vṛtti and with the Subcommentary or Pañjikā of Kamalaśīla. Kyoto: Buneido.
• Hattori, M., 1980. “Apoha and Pratibha.”, in M. Nagatomi, B. K. Matilal, J. M. Masson, and E. Dimock (eds.), Sanskrit and Indian Studies, Festschrift in Honor of Danie H. H. Ingalls. Dordrecht: Reidel, 61–73.
• Matilal, B. K., 1971. Epistemology, Logic and Grammar in Indian Philosophical Analysis. The Hague: Mouton.
• McClintock, S., 2002. “Omniscience and the Rhetoric of Reason in the Tattvasaṃgraha and the Tattvasaṃgrahapañjikā”, Ph.D. dissertation, Committee on the Study of Religion, Harvard University.
• –––, 2003. “The Role of the ‘Given’ in the Classification of Śāntarakṣita and Kamalaśīla as Svātantika-Mādhyamikas” in G. Dreyfus and S. McClintock (eds.), The Svātantrika-Prāaṇgika Distinction: What Difference Does a Difference Make?. Boston: Wisdom Publications: 125-171.
• Ruegg, D. S., 1982. “Towards a Chronology of the Madhyamaka School”, monography in L. A. Hercus et al. (eds.), Indological and Buddhist Studies. Canberra: Faculty of Asian Studies.
• Śāntarakṣita. [MAV] Madhyamakālaṃkāravṛtti, dbU ma rgyan gyi tshig le’ur byas pa. P5284. In Ichigo, 1985.
• –––. [MA] Madhyamakālaṃkārakārikā, dbU ma rgyan gyi rang ‘grel pa. P5284. In Ichigo, 1985.
• Walser, J., 2005. Nāgārjuna in Context: Mahāyāna Buddhism and Early Indian Culture. New York: Columbia University Press.
Other Internet Resources
[Please contact the author with suggestions.]
Copyright © 2014 by
James Blumenthal <[email protected]>
Please Read How You Can Help Keep the Encyclopedia Free
|
global_05_local_4_shard_00000656_processed.jsonl/63793
|
Meta Battle Subway PokeBase - Pokemon Q&A
Can someone give me a good special moveset for sceptile?
2 votes
I already know dragon pulse and energy ball but I need another I already have a physical one and the moveset question that has already been asked only gives a good physical set.
asked Oct 11, 2010 by Speed freak
2 Answers
1 vote
Best answer
This is actually a moveset I find to be best overall:
Leech Seed
Energy Ball
Focus Blast
Being the fastest sub-seeder back in Gen4 (now Jaroda has that honor however) make use of this. Energy Ball is obviously for STAb and Focus Blast has great type coverage. If you are good at Hidden Power, a Rock HP might work well. I just hate Hidden Power though. If you think you must keep Dragon Pulse (I wouldn't) I guess you could keep it over Focus Blast (but don't, Focus Blast would be better.)
Edit: Okay, if you don't want to sub-seed, go with:
Focus Blast, Energy Ball, Dragon Pulse, Synthesis/Hidden Power Rock
answered Oct 11, 2010 by trachy
edited Oct 11, 2010 by trachy
Actually sceptile is still the fastest his speed is 120 jaroda has 113 so sceptile is still the fastest.
–2 votes
Energy Ball - Powerful STAB
Toxic - Sceptiles good grass whistle inforce this tactic Grass Whistle - Toxic heaven
dragon pulse - Good move for covering most types
answered Oct 11, 2010 by UltimateDarkraiFan
edited Oct 11, 2010 by UltimateDarkraiFan
Can't inflict both poison and sleep, which is what you are implying.
Also, Dragon Pulse only has super-effective coverage on Dragon types, of which there are only a few of.
|
global_05_local_4_shard_00000656_processed.jsonl/63794
|
Meta Battle Subway PokeBase - Pokemon Q&A
My friends and I want to know the genders of Zekrom and Reshiram If gender is not known
0 votes
Would like to know this.
asked May 26, 2011 by jace5543
1 Answer
2 votes
they like most legends are genderless
answered May 26, 2011 by Speed freak
Which means they cannot breed. On my pearl version though I did catch a female Heatran and also there is one legendary that can breed but it will produce a different legendary. Manaphy + Ditto = Phione
Zoroark and Manaphy are the only legendaries that can breed.
Zoroark isn't a legendary
Also if you consider Rotom a legendary, it can breed as well.
Even if they have a gender, if they are in the No Eggs egg group then they will not produce eggs when paired with another legendary of the opposite gender or a Ditto.
they zoraroark is not a legend, neither is rotom
And plus, no legendary evolves and Zoroack HAS got an evolution chain.
|
global_05_local_4_shard_00000656_processed.jsonl/63799
|
Why I Do Believe In God
James Griffin
Graphic Rule
From: "Positive Atheism" <[email protected]>
To: "Griffin, J C"
Subject: Re: Why I do believe in God
Date: Thursday, June 29, 2000 6:22 PM
First off, most Christians (and almost all atheists) have not even given a junior school-level's worth of consideration to what they believe and why. The vast majority of people simply repeat what they were taught as children and then assert that that is what they believe. End of discussion; end of inquiry (rather, not even a beginning of an inquiry).
Some of us are more fortunate in that we at least considered, at an older age, what we were taught to memorize as children. Many theists, such as Russell, rejected the faith of their fathers (although Russell's father was a Freethinker and those who the courts ordered to raise him taught him religion -- against his father's wishes -- so theism is not the faith of Russell's father).
A few of us (like Russell, myself, and yourself) have had the luxury of at least considering the whys and wherefores of our beliefs. This is one thing I respect about some elements of the Roman Catholic Church: at least they attempt to teach their older youngsters what they see as a solid defense of their creed.
Unfortunately, the Roman Catholic Church grossly misrepresents the whys and wherefores of the atheistic position, which make it difficult for us atheists to communicate with Roman Catholics; were it not for the popularity of these misrepresentations of the atheistic position, our Letters section would be much smaller than it is.
Secondly, a half-hour lecture by Russell cannot begin to be as elegant as such monumental treatises as Martin's Atheism: A Philosophical Justification or Drange's Nonbelief and Evil: Two Arguments for the Nonexistence of God or even Smith's Atheism: The Case Against God.
Nobody, even someone as capable as Russell, could, in thirty minutes, cover the ongoing philosophical and theological discussions contained in the hundreds of philosophical and theological journals which present sophisticated arguments and counter-arguments from all sides. Also, someone accustomed to the simplistic, dogmatic style of thinking that marks American Evangelical circles (and, unfortunately, many atheistic circles worldwide) would have a difficult time appreciating the subtlety and admitted uncertainty in Drange's and, to a lesser extent, Smith's and Martin's arguments.
What Russell does in this piece (and it is not my favorite piece, by the way, it is merely popular and available for posting), is to present simplifications (and at time, admittedly over-simplifications) of the points that he found to be the most important ones. I will be the first to admit that some of Russell's arguments are outdated in that these ongoing discussions have generated, in some cases, strong rebuttals to some of his points and, in other cases, stronger arguments than were available to Russell when he presented this lecture.
I agree: The most formidable arguments I've found are those presented by Drange in the above-mentioned book. He sees the Argument From Evil and the Argument From Nonbelief as the strongest cases one can currently make against theism, particularly against Evangelical Christianity and Roman Catholicism.
I also agree with Smith when he makes the point that the theist is the one making the claim in this discussion (the claim that a god exists), and thus the burden of proof lies on the theist. It's not like we are arguing something as simple and as cut-and-dried as the existence of the sun. We are discussing the claim, made by some people, that an invisible (and some say undetectable) god exists.
This claim is complicated by the statement (made by some) that believing the god-claim is crucial to our avoiding the agonies of eternity in hell fire. While I would never accept the threat of physical violence as proof that a claim is true or false, I am concerned enough to investigate the claims, lest I err in this matter and unwittingly find myself faced with the choice of being "regular or extra crispy" -- as the attendant at the Kentucky Fried Chicken outlets always asks as we approach the counter to order lunch.
Again, his atheism was not one of Russell's stronger points. Russell made powerful inroads in other areas of philosophy.
I will say that "Why I Am Not A Christian" has inspired many people to re-evaluate their theism and to eventually investigate much more sophisticated arguments from both camps.
While I was appearing on a television program (which featured a one-shot, unedited taping to simulate a live program), I was committed to presenting "Why I Am Not A Christian" in an upcoming issue of the magazine. My choice was either to be rude and contradict the show's hosts "live on the air" (so to speak) or to go along with publishing the piece. I do not regret my decision to keep the piece, if for not other reason than Russell's piece does have historical value (though it is certainly not the most formidable argument against Christianity ever produced).
The piece begins with a bracketed comment stating that "the editor is willing to share full responsibility with the Hon. Bertrand Russell in that he is in accord with the political and other opinions expressed." This is not the opinion of the editor of Positive Atheism but is from the original Haldemann-Julius publication. I have added a note after the original editorial comment (in dark red, the standard color of editorial notes made by Positive Atheism) stating that that comment was in the original and is not the opinion of Positive Atheism. This should clear up any misunderstanding to that effect.
This piece is included for its historical value, not because it is a masterpiece of philosophical pondering. To me, everything else in the Russell section is merely a backdrop for the two pieces, "A Free Man's Worship" and the hilarious "The Theologian's Nightmare." Even these are somewhat outdated in that the ideas they attack are not nearly as popular as they once were. Such attacks may hold some sway in Kansas or Kentucky, as they did for much of the world in 1927, but they certainly have little meaning in today's Europe.
A better way to say it is that the theist is making an existential claim -- a claim for the existence of a god. Since the theist has not (to my or Russell's satisfaction) proven his claim, we don't have to believe the claim.
If Russell (or anyone) says something to the effect that "You cannot prove your claim, therefore God does not exist," he goes much further than I do. I would simply say, "You cannot prove your claim, therefore I don't have to believe it." This is the most popular historical definition of atheism.
Drange goes further and says that if a god-claim is meaningless, the response is not atheism but noncognitivism: one can neither believe nor disbelieve mumbo-jumbo. My position is much more clear-cut: since I lack a belief in a god (understandable or otherwise), I am an atheist (one who lacks a god-belief).
Yes! Yes!!
This is what Positive Atheism and its predecessor (under my editorship) has been saying all along!
It is refreshing to hear someone speaking as a Roman Catholic who is not parroting the party line that roughly states that atheists "fiercely believe that God doesn't exist" and is willing to discuss our atheism with us, in the same terms in which we see our atheism.
To reiterate: I have been given no compelling reason to believe the various claims for the existence of the deities that mankind has endorsed throughout history; therefore, I lack a belief in the existence of any gods.
A recent letter contained the accusation that we atheists must have some sort of complete understanding of all things in order to state, categorically, that God doesn't exist. Unfortunately for that writer, we have never stated, categorically, that God doesn't exist. Although some atheists do go this far, they are in the minority among atheistic thinkers and writers.
Except that the phenomenon conceptualized as photon can be detected and those experiments can be independently verified.
I can know that the claims for the existence of what we call photons is likely to be true, and still have no clue as to what a "photon" really is.
If I could detect (and others could independently verify) the existence of a God, or even show that there exist various phenomenon that can be best conceptualized by the notion of a god (and not simply by coming up with a synonym for universe or Big Bang or even super-universe), then it likewise wouldn't matter, at that point, who that God is or what that God is like. In other words, to verify the existence of a God would not be the same as understanding the nature of that God.
Verifying the existence of a God (or, rather, validating the claims for the existence of that God) would come first, though.
You know as well as I do that if we could verify the god-claims, this would hold true; however, it does not follow from this that a God exists.
I agree with this in general terms: it is an excellent approach to understanding our world.
However, we must keep in mind that when it comes to the existential claims (such as the ones claiming that a God exists), we still must face the problem of the burden of proof: the one making the claim must bring forth a strong case for its validity (particularly in lieu of obvious or at least detectable phenomenon). Unless the existence of the thing being claimed is obvious or at least detectable and independently verifiable (in other words, a skeptic can and will make the same or similar observations), we rightly suspend judgement (or even doubt) until we can make such observations and independent verifications.
Even then, according to liberal scientific method, any "knowledge" is always held up to public scrutiny. No "truth" is too sacred that it is not subject to revision or even being overthrown by new evidence.
I cannot begin to define any of these things, but can find these terms useful in my day-to-day life. That's all I can say about those things.
Again, though, it does not follow that one's claim for the existence of a God (or for "truth" or "happiness" corresponds with any real object or condition or situation -- that is, these things could all simply be abstractions.
I am content (there's that word) to suspend judgement as to whether contentment is real or merely an abstraction; I can at least describe my contentment and can share it with others who know precisely what I am talking about. With the claims for the existence of a God, though, it is not the same: I, for one, have no clue what most of them are talking about. Perhaps I am one of Drange's noncognitivists after all! Those which I can conceptualize (such as the God character in DeMille's film The Ten Commandments) tend to seem so unlikely as to be unworthy of serious consideration. This is where I remain -- unconvinced -- and thus I remain an atheist (one who lacks a god-belief).
This is unusual among Western theists.
I don't see why one would need to complicate the discussion by defining all good as "God" and all evil as "Satan" when the terms good and evil sufficiently convey those two (very abstract) concepts.
If all you are saying is that good and evil exist (at least as abstractions, or even as more tangible realities), then how does your outlook differ from mine -- except that you choose to use the word God to describe something we both agree exists (at least as an abstraction)?
If your definition for God is more complex than simply "a collective term representing all things good," then we face a much more complex discussion.
As it stands, I merely disagree with your use of the term God to describe an abstraction that is more easily conveyed through more traditional language.
I've heard this from Fundamentalists and Evangelicals in America. At the risk of offending you, I would call this the only botch in your otherwise fine, fine presentation.
Please write back: it is the all-too-rare discussions such as this that keep me wanting to continue this project. To understand what I mean, simply check out some of the tirades we've posted in our Letters section within the past month.
Cliff Walker
"Positive Atheism" Magazine
Graphic Rule
Graphic Rule
From: "Positive Atheism" <[email protected]>
To: "Griffin, J C"
Subject: Re: Belief in God
Date: Friday, June 30, 2000 1:37 PM
I think there is a time and place for both, and I think elements of both can be worked into an understanding or a presentation; however, a successful communicator (who is concerned with communicating accurately to a large percentage of those listening) will always be careful to ensure that when something is metaphor or describing the tangible, this distinction is clear to the audience.
For this reason, I reserve the use of such words as God for their traditional, popular meanings. When I say "God" in the United States, and when I say it without qualifying it, I am thinking along the lines of the "God" character in DeMille's "The Ten Commandments" or something similar. (Thus, when such language comes out of my mouth, you can be sure I am speaking of a fictional character, and that many disagree and think this character is real and tangible.) If I were to use the word God in the sense you have described, I would need first to qualify what I am saying.
But so many Christians, throughout the centuries, have intimidated one another (and others) by insisting that such places as "Hell" are very real, and that you will literally roast forever if you don't tow the party line. This is why I have always preferred making myself clear and have refused to go along with something unless it can be clearly demonstrated to the point of warranting my endorsement. I will not speak in metaphor unless it is clear to all that I am speaking poetically. Otherwise, I am speaking literally, I am speaking as if what our senses tell us is actually real, I am speaking in what I think is the normal context of human perception and understanding, which happens to be very literal (our use of abstractions notwithstanding).
Sure, I did experiment with Korzybski's post-Einsteinian language, writing several pieces without resorting to any form of the verb to be, and found those essays to be quite effective in accomplishing their goals, but it is much simpler to try to communicate in the language commonly accepted in the Western world. This language presupposes that what we perceive with our senses actually "is" in "reality" and is more than just our perception, interpreted into our minds as abstraction.
Gandhi was similar. I hear he was not a believer, but he used the language and metaphors of faith, so he put on the appearance of being extremely devout. His associates became frustrated with this at times.
Since we are not going to be able to change the tendency of many to be fundamentalistic in their approach to the Church, I think trying to change the church is futile. Let the fundamentalists have it, as far as I am concerned; I will go on to something else, such as trying to understand and develop humanistic values, and learning ways to communicate those values in humanistic terms so that even those with a religious upbringing can understand and benefit. I have enough faith in humanity to think that most of us can easily make the transformation to seeing life from a human perspective rather than trying to understand it in terms of what most people think of as supernatural, and what many think of as despotic, and thus outdated.
If Christ was not really the literal Son of God, then what he actually did can happen again today many times over -- if for no other reason than that there are that many more people alive today from which a man of the caliber of Christ can rise.
I am not sure if a Christ even existed, or if he did, how much of his life story is fiction; thus, I usually don't bother even to speak of a Christ. However, if there was a Christ, and if he was entirely human, and if he did have great influence upon the people who met him and studied under him (as opposed to the resulting myth about him being what influenced later generations), then I see no reason why we could not have many leaders today with influence comparable to that of Christ (tangible influence upon the people who knew him or knew of him, not later influence such as what resulted from the Christ myth being propagated many decades after his death). We don't really need to look to him, even if he was one of the greatest men who ever lived (which I seriously doubt, anyway).
If "Christ" is pure myth (or even mostly myth), then we needn't really change anything except our acceptance that this is myth.
There may or may not be any higher intelligence in this universe, but we have yet to encounter one greater than the human mind: the human is the most intelligent entity with whom we can communicate at this point.
This is why I am careful not to speak in Pantheistic terms, and why I am not a Pantheist. All we know that we know, at this point, is that the human, as feeble as the human mind may be at times, is the best company we've got.
Is it or is it not a world of disembodied "spirits"? That, to me, is what "spiritual" refers to, because that is the traditional Western understanding of that language.
If it is not a world of disembodied "spirits," then why not use language that more universally describes what you are talking about, such as ethics and morals?
I agree with the discipline part, I work very hard on myself to this day.
However, I don't have a clue as to what faith may be -- particularly when you use the term, because you have had some very unique uses for similar words that are commonly understood in terms of the superstition of our ancestors.
Surely you don't mean that since I cannot see it, therefore it does exist!?
True, there may be more than I can possibly imagine -- or, it may be a case of what you see is what you get. The question is, should I trouble myself with any of it? (Another question I wish others would address is, do people have any business making specific pronouncements about things that fall in the category of "more than we could possibly imagine," that fall beyond the realm of what we know, or even can know.)
Since some claim the tangible existence of what I cannot see (or even imagine), I must resort to the burden of proof. When someone makes an existential claim, when someone claims that a thing exists, it is the responsibility of that person to make the case that such a thing exists. The doubter is not required to make any case for proving that such a thing does not exist, because no such proof can be brought forth (except in the case of something that is logically impossible, such as an invisible green leprechaun, which cannot be simultaneously invisible and green).
Because of this, I satisfy myself with making claims only for those things which I can easily demonstrate (or, at minimum, referring to an authority, such as when I tell someone what particle the leading physicist Victor Stenger told me about the Inflationary Big Bang model or the then-current consensus within his field of science). I will not make speculative statements about "spiritual" things. I do this in all honesty, and don't understand why so many people speak with such assurance about things that, upon further investigation, they really know nothing about, but are relying on this thing they call "faith." (I don't even know what "faith" is.) If I need to speak about ethics or morals or hope for a better future, these are concepts that almost anybody can relate to.
I still don't see anything in the original (alleged) teachings of Christ that are even worth revising. The values taught by Thomas Paine and Robert Ingersoll are, in my opinion, vastly superior to anything attributed to Christ.
Also, if we are going to "rework" the teachings of Christ, we will need, first, to verify that they are, in fact, the teachings of Christ, and that Christ was, in fact, so vastly superior as to warrant his teachings being the model or basis or foundation for any reworking.
As it stands, I don't think Christ (if such a man even existed) was anything special. I think we all do well to realize that we all have minds similarly capable of deciding how we will run our lives in this generation. This includes deciding whether any ideas that have been spoken in the past are still relevant. Reinvent the wheel? By all means! Have you compared the wheels on a covered wagon with those being produced on cars today?
I will agree only after such a "higher intelligence" has been discovered and I can verify its discovery independently. Unless and until that happens, I think we have more than enough with which to get by.
Just because an idea is unthinkable to certain minds does not mean it "just can't be right." I have the advantage of having started out without religion: my parents were atheists and still are. I grew up realizing that we very well could be the highest intelligence in the universe, and almost certainly are the highest intelligence that we will ever encounter (space being vast, and travel and communication being limited by the speed of light).
It's cold and lonely out here, but we do have the finest company available, our fellow humans. As feeble as human reason sometimes is, and as fickle as human endearment sometimes is, it's the best we have and, I speculate, the best we possibly could want. If you're curious about this, check our my editorial column for January, 1999, called "Better Than Paradise? You Bet!"
Cliff Walker
"Positive Atheism" Magazine
Graphic Rule
|
global_05_local_4_shard_00000656_processed.jsonl/63805
|
History of Hacking 2: Insight into Phone Phreaking
This part of John Draper’s presentation is about the various methods of phone phreaking as one of the early manifestations of hacking into systems.
Phone Phreaking 101
Early phone phreaks in action
Early phone phreaks in action
Who is a phone phreak? A phone phreak is a person, usually blind, because the only things that are in their lives are audio and what they can hear. They’ve got exceptionally good hearing. By hearing the clicks and the whistles, and the pops, and all the stuff in the background they can detect what we can’t do.
And that’s why they can do what they can do. They were able to dial a number, and just by listening they were able to hear the little multi-frequency tones in the background, so faint that the normal person can’t hear it. They figured out that there had to be a way to do that. So, after doing a little bit of social engineering at the telephone company office they would have the ability to figure out what those frequencies were.
And then they associated those frequencies with keys on the organ. And then, to dial a number they simply played two notes at a time in different combinations to make the number. And this is how the cost of phone calls had gone way, way down.
Back in the day, to make a long-distance they used to advertise: “Make a 3-minute call for $1″, in the US. And that was a big thing the AT&T kind of bragged about. So, calls were typically around 30 cents/minute back in the day. And now, you know, a few cents a minute to make a phone call is what you can do. So, you know, this is amazing how the cost of calls has really gone down.
Methods the Old-School Phreakers Used
Now, some of the methods that the old-school phreakers used. One of them is called the mute box. What the mute box does is it takes a 2.7 kilohms resistor in series with the phone line, so that when the phone call comes in, you had a little button; you pushed the button really fast and that would stop the ringing tone but still leave the connection open. But there wouldn’t be enough current to cause the telephone to go off-hook, so therefore the billing equipment wouldn’t trigger.
This allows you to be able to receive phone calls for free to the person that’s calling you. So the person who’s calling you will not get billed for it. Why? Because you’re not picking up the phone. You are basically leaving the phone on-hook. But you’re listening to the audio, because the audio still can go through that 2.7 k resistor to the phone line.
The next thing which is very useful is called loop around numbers. Loop around numbers in the San Jose area always began with 0044 and 0045. If you dial the 0044 side, you get a high-pitch tone. It’s a 1000 Hz tone interrupted every 10 seconds. If somebody else were to call 0045 side, the two of them could get connected together and they could talk. Very useful when you want to kind of mask who your phone number was. In fact, that was how I actually got hold of Denny1. He gave me a loop around number. I called the operator, and she said: “That’s an internal test number, why should you be calling that number?”
He called me back about a month later and explained to me what loop arounds were, and I had to find out more, so I made an arrangement to meet Denny, and that was when I first learned all about how blue boxes worked.
The other thing is demonstrators. Back in the day the telephones were rotary dial. So they had to have a way of demonstrating how the new touch tone system would work. So, what they did was: you dialed a 7-digit number and it would answer with a dial tone, and you then could use your touch tone phone right next to that phone to show how fast you can dial a number; these are called demonstrator lines. Normally, these demonstrator lines are restricted to local calls only.
Yet another thing phone phreaks would use was party lines. There are 2 different kinds of party lines: one of them is if you call a busy number, like a radio station – you can actually talk between the busy beeps, and so you can give enough information out to get them to call you or something. It’s not very good to hear that constant beep all the time.
Other phone phreaks figured out that if you opened up the sleeve at an old step office, you could actually have a 10-party conference line. If you can take 10 numbers that aren’t used and you open up the sleeves in the wires, then you can actually make a conference call; usually that took social engineering because you had to call the telephone company switch office, you had to convince the guy that it’s ok and cool to bend the sleeve open to make it work.
Steve Jobs and Steve Wozniak with homemade 'blue boxes'
Steve Jobs and Steve Wozniak with homemade ‘blue boxes’
Then there are blue boxes. Blue box is a multi-frequency device; it combines different tones; there are 700 Hz, 900 Hz, 1100 Hz, 1500 Hz, and 1700 Hz. They are odd frequencies, because that way they won’t interfere with each other. It’s quite a bit different than touch tones.
Then there are red boxes. Red boxes are the boxes used for making free calls from payphones. All it does is just emulate the sound that operator hears, with money going into the phone. They have the 3-coin payphones: you put in a nickel and it goes ‘ding’; you put in a dime and it goes ‘ding-ding’; you put in a quarter and it goes ‘gong’. And that’s what the operator hears, and that’s where she knows that you are putting money in the phone.
There’s actually a demonstration number in Vancouver, Canada; it’s a recording, you dial 604-11-21 and it goes: “five cents – ding, ten cents – ding-ding, quarter – gong”. And it just repeats it over and over again, it’s like an operator training tape. And these are some of the really cool things that we found kind of exploring the system. It wasn’t the idea of making free calls, it was the idea of hacking into the system, and that’s what made it really exciting.
1Denny Teresi – is a blind former phone phreak and radio disk jockey, most famous for being the person who introduced John Draper to the field.
Read previous: History of Hacking: John “Captain Crunch” Draper’s Perspective
Read next: History of Hacking 3: The Dawn of Computer Hacking
Like This Article? Let Others Know!
Related Articles:
One comment
1. This is about Joe Engressia (later renamed “Joybubbles”).
Besides being brilliant and the original phone phreak, he was a really good guy. I knew him in the 1970s when he lived in Memphis, TN.
He was also friends with John “Captain Crunch” Draper, but Joe could whistle perfect pitch and actually make phone switches do his bidding.
Leave a comment:
4 − = 1
Comment via Facebook:
|
global_05_local_4_shard_00000656_processed.jsonl/63809
|
Web PM
Supporters Fear Ed Brown Is Being Tortured
Authorities refuse to divulge location of tax protester
Paul Joseph Watson
Prison Planet
Monday, October 8, 2007
(Article continues below)
But Monier refused to say where Ed Brown was being held, only that he remains "in transit", and also ignored questions about why there was a delay in transporting him to the prison where he will serve his sentence, the identity of which remains unknown.
This led supporters of Brown to make their concerns known that he could be undergoing brutal interrogation and torture at the hands of vengeful Feds embarrassed at Brown's taunting of them during the 6 month stand-off.
"Let them know Ed has not been handed over to the Federal Bureau of Prisons (BOP) yet! We don't know if he's alive, in good health, where he is, why he hasn't been handed over (there is NO good reason for this). We can only assume they're torturing him for information, giving him "diesel therapy" and other things, like they did to Congressman Hansen!!!," reads a posting on Ed Brown's official website.
Brown's supporters are urging the general public to call the U.S. Marshal's office in New Hampshire and and ask them to locate Brown.
The number is 603-225-1632.
"Take down names, employee numbers, dates/times to reference the call, whatever you can to have a record! DEMAND for answers! They've got Ed like they always wanted, why isn't he handed over to the prison? WHAT ARE THEY DOING TO HIM? HOW IS HE BEING TREATED?!?!," reads the website.
|
global_05_local_4_shard_00000656_processed.jsonl/63812
|
1. Education
What Is a Zygote?
After fertilization, the resulting single-cell is known as a zygote.
A fertilized egg is known as a zygote.
Image: Centers for Disease Control and Prevention Public Health Library (PHIL)
After a female egg is fertilized, the resulting one-celled organism becomes known as a zygote. Once this has occured, the zygote begins a two-week period of rapid cell division and will eventually become an embryo. The zygote divides through a process known as mitosis, in which each cell doubles by dividing into two cells. This two-week stage is known as the germinal period of development and covers the time of conception to the implantation of the embryo in the uterus.
How Long Does the Zygote Phase Last?
The period of the zygote lasts for about four days. Around the fifth day, the mass of cells becomes known as a blastocyst. The germinal period will last for fourteen days, after which the embryonic period will begin. The second period of development lasts from two weeks after conception through the eighth week, during which time the organism is known as an embryo. At the ninth week post-conception, the fetal period begins. From this point until birth, the organism will be known as a fetus.
Researchers estimate that nearly 60 percent of all naturally occurring conceptions fail because the zygote never becomes properly implanted in the uterus.
More Psychology Definitions: The Psychology Dictionary
Browse the Psychology Dictionary
©2014 About.com. All rights reserved.
|
global_05_local_4_shard_00000656_processed.jsonl/63819
|
Queen's University - Utility Bar
QSpace at Queen's University >
Browsing by Subject FASD
or enter first few letters:
Showing results 1 to 3 of 3
PreviewIssue DateTitleAuthor(s)
3-Dec-2012The Effect of Prenatal Ethanol Exposure on DNA Methylation and TGF-β1, SHH and Wnt3a Transcription Regulating Factors Within the Developing Hippocampus of the Guinea PigSONDY, YVONNE
2009The Prevalence of Epilepsy and Seizures in Subjects with Fetal Alcohol Spectrum DisordersBell, Stephanie
Showing results 1 to 3 of 3
DSpace Software Copyright © 2002-2008 The DSpace Foundation - TOP
|
global_05_local_4_shard_00000656_processed.jsonl/63837
|
Monday, May 30, 2011
Memorial Day~ Drums of War
I honor & respect all soldiers who gave the ultimate sacrifice.
I also question the root of it.
Who gives the Orders to torture?
Who pays the price?
Who profits from it?
The low road
1 comment:
Anonymous said...
Hi Fran, You picked the perfect song to represent how most of us are
feeling about Memorial Day. Good job!
|
global_05_local_4_shard_00000656_processed.jsonl/63839
|
1. Entertainment
Send to a Friend via Email
Your suggestion is on its way!
An email with a link to:
was emailed to:
Thanks for sharing About.com with others!
2007 R&B Music Preview
1 of 10
"Tears From a Soldier's Heart," Keyshia Cole
2007 R&B Music Preview
Album cover © Interscope/A&M
Keyshia's working on her second album, Tears From a Soldier's Heart, with producers Kanye West and Cool & Dre. According to various reports, the album will feature appearances by R. Kelly, John Legend and Jagged Edge. Other confirmed contributors include Anthony Hamilton, Missy Elliott and Olivia (of the G-Unit hip-hop clique).
©2014 About.com. All rights reserved.
|
global_05_local_4_shard_00000656_processed.jsonl/63841
|
If I die before I wake at my wake please tell my parents
That your son will positively wake in paradise
A reference to the children’s prayer “Now i lay me down to sleep” But if Crae happens to die, tell his parents that he’s okay as he’ll arise from his slumber in paradise meaning Heaven, one day.
|
global_05_local_4_shard_00000656_processed.jsonl/63845
|
Rfm is a Ruby-Filemaker adapter, a Ruby Gem that provides an interface between Filemaker Server and Ruby. Ginjo-rfm picks up from the lardawge-rfm gem and continues to refine code and fix bugs. Version 3 removes the dependency on ActiveSupport and is now a completely independent Gem, able to run most of its core features without requiring any other supporting Gems (If you want the ActiveModel features of callbacks, validations, etc, you will need to require ActiveModel, which of course still depends on ActiveSupport).
Ginjo-rfm has been tested successfully on Ruby 1.8.7, 1.9.3, 2.0.0, and 2.1.2.
Documentation & Links
New in version 3.0
There are a ton of changes in version 3, but most of them are under the hood.
Download & Installation
Ginjo-rfm v3 can be run without any other gems, allowing you to create models to interact with your Filemaker servers, layouts, tables, records, and data. If you want the additional features provided by ActiveModel, just add activemodel to your Gemfile (or require it manually). Ginjo-rfm v3 will use the built-in Ruby XML parser REXML by default. If you want to use one of the other supported parsers (libxml-ruby, nokogiri, ox), just add it to your Gemfile or require it manually.
Ginjo-rfm Basic Usage
The first step in getting connected to your Filemaker databases with Rfm is to store your configuration settings in a yaml file or in the RFM_CONFIG hash. The second step is creating a model that represents a layout from one of your Filemaker databases.
In previous versions of Rfm, you may have stored your configuration settings in a variable or constant, then passed those settings to Now you can put your configuration settings in a rfm.yml file at the root of your project or in your project's config/ directory, and Rfm will use those settings automatically when building your Model's Server, Database, and Layout objects.
:ssl: true
:root_cert: false
:timeout: 10
:port: 443
:account_name: myname
:password: somepass
:database: MyFmDb
Or put your configuration settings in a hash called RFM_CONFIG. Rfm will pick those up just as with the yaml file.
:host => '',
:database => 'MyFmDb',
:account_name => 'myname',
:password => 'somepass',
:ssl => true,
:root_cert => false,
:port => 443,
:timeout => 10
You can use configuration subgroups to seperate global settings from environment-specific settings.
:ssl: true
:root_cert: false
:timeout: 10
:port: 443
:account_name: admin
:password: pass
:database: DevFmDb
:account_name: admin
:password: pass
:database: LiveFmDb
Then in your environment files (or wherever you put environment-specific configuration in your ruby project), specifiy which subgroup to use.
RFM_CONFIG = {:use => :development}
You can use configuration subgroups to contain any arbitrary groups of settings.
:ssl: true
:root_cert: false
:timeout: 10
:port: 443
:account_name: cust1
:password: pass
:database: custOneFmDb
:account_name: cust2
:password: pass
:database: custTwoFmDb
Use the configuration setting method config to set configuration for specific objects, like Rfm models. When you pass a :use => :subgroup to the config method, you're saying use that subgroup of settings.
class MyModel < Rfm::Base
config :use => :customer1, :layout => 'some_layout'
The current hierarchy of configurable objects in Rfm, starting at the top, is:
You can also include or extend the Rfm::Config module in any object in your project to gain Rfm configuration abilities for that object.
module MyModule
include Rfm::Config
config :host => '', :database => 'mydb', :account_name => 'name', :password => 'pass'
# inherits settings from Rfm::Config by default
class Person < Rfm::Base
config :parent => MyModule, :layout => 'some_layout'
# using :parent to set where this object inherits config settings from
Use get_config to view the compiled configuration settings for any object. Configuration compilation will start at the top (rfm.yml), then work down the heirarchy of objects to wherever you call the get_config method, merging in all global settings along the way. Subgroupings of settings will also be merged, if they are specified in a subgroup filter. A subgroup filter occurs any time you put :use => :subgroup in your configuration setting. You can have multiple subgroup filters, and when configuration compilation occurs, all subgroup filters are stacked up into an array and processed in order (as if you typed :use=>[:subgroup1, :subgroup2, subgroup3, ...] which is also allowed). get_config returns a compiled configuration hash, leaving all configuration settings in all modules and classes un-touched.
# => {:ssl => true, :timeout => 10, :root_cert => false, :port => 443,
:host => 'myhost', :database => 'mydb', :layout => 'some_layout',
Possible Configuration Options
Following are all of the recognized configuration options, including defaults if applicable.
:host => 'localhost'
:port => 80
:ssl => true
:root_cert => true
:root_cert_name => ''
:root_cert_path => '/'
:account_name => ''
:password => ''
:log_actions => false
:log_responses => false
:log_parser => false
:warn_on_redirect => true
:raise_on_401 => false
:timeout => 60
:use # use configuration subgroups, or filter configuration subgoups
:layout # specify the name of the layout to use
:parent => 'Rfm::Config' # the parent configuration object of the current configuration object, as string
:file_name => 'rfm.yml # name of configuration file to load yaml from
:file_path => ['', 'config/'] # array of additional file paths to look for configuration file
:parser => :ox # Prefferred XML parser (you must require the parsing gem, or specify it in your gemfile)
:ignore_bad_data => nil # Instruct Rfm to ignore data mismatch errors when loading a resultset
Using Models
Rfm models provide easy access, modeling, and persistence of your Filemaker data.h
class User < Rfm::Base
config :layout => 'my_user_layout'
attr_accessor :password
@user = => 'bill', :password => 'xxxxxxxx', :email => '')
# => '12345'
# => ['login', 'encryptedPassword', 'email', 'groups', 'lastLogin' ]
# => 35467
@user = User.find 12345
@user.update_attributes(:login => 'william', :email => '')!
Put your model code anywhere at the top level of your script/application. In Rails, this could be your initialization file(s), your environment file(s), or in a file in your Models directory called something like rfm_models.rb. Then require 'rfm_models' in your initialization or environment.
require 'rfm'
class User < Rfm::Base
config :layout => 'user_layout'
class Order < Rfm::Base
config :layout => 'order_layout'
require 'rfm_models'
If you prefer, you can create models on-the-fly from any layout.
# => MyLayoutName (subclassed from Rfm::Base, represented by your layout's name)
Or create models for an entire database, all at once.
Rfm.modelize /_xml/i, 'my_database', :my_config_group
# => [MyLayoutXml, AnotherLayoutXml, ThirdLayoutXml, AndSoOnXml, ...]
# The regex in the first parameter is optional and filters the layout names in the specified database.
# Omit the regex parameter to modelize all possible layouts in the specified database.
With ActiveModel loaded, you get callbacks, validations, errors, serialization, and a handful of other features extracted from Rails ActiveRecord.
In your Gemfile
gem 'activemodel'
Or without Bundler
require 'active_model'
Then use ActiveModel features in your Rfm models
class MyModel < Rfm::Base
before_create :encrypt_password
after_validate "puts 'yay!'"
validates :email, :presence => true
@my_model =
To learn more about ActiveModel, see the ActiveModel or RubyOnRails documentation:
Once you have an Rfm model or layout, you can use any of the standard Rfm commands to create, search, edit, and delete records. To learn more about these commands, see below for Databases, Layouts, Resultsets, and Records. Or checkout the API documentation for Rfm::Server, Rfm::Database, Rfm::Layout, Rfm::Record, and Rfm::Base.
Two Small Changes in Rfm Return Values
When using Models to retrieve records using the any method or the find(record_id) method, the return values will be single Rfm::Record objects. This differs from the traditional Rfm behavior of these methods when accessed directly from the the Rfm::Layout instance, where the return value is always a Rfm::Resultset.
MyModel.find(record_id) == my_layout.find(record_id)[0]
MyModel.any == my_layout.any[0]
Getting Rfm Server, Database, and Layout Objects Manually
Well... not entirely manually. To get server, db, and layout objects as in previous versions of Rfm, see the section "Working with classic Rfm features". Newer versions of ginjo-rfm can use the configuration options to build these objects.
Create a layout object using default configuration settings.
my_layout = Rfm.layout 'layout_name'
Create a layout object using a subgroup of configuration settings.
my_layout = Rfm.layout :subgroup_name
Create a layout object passing in a layout name, multiple config subgroups to merge, and specific settings.
my_layout = Rfm.layout 'layout_name', :other_server, :log_actions => true
The same can be done for servers and databases.
my_server = Rfm.server ''
my_database = Rfm.database :development, :ssl => false, :root_cert => false
my_database = Rfm.db :production
# db and database are interchangeable aliases in Ginjo-rfm 2.0
You can query your Filemaker objects for the familiar meta-data.
Here are two new fun Layout methods:
my_layout.total_count # => total records in table
my_layout.count(:some_field => 'search criteria', ...) # Returns foundset_count only, no records.
See the API documentation for the lowdown on new methods in Rfm Server, Database, and Layout objects.
Shortcuts, Tips & Tricks
All Rfm methods that take a configuration hash have two possible shortcuts.
(1) If you pass a symbol before the hash, it is interpreted as subgroup specification or subgroup filter
config :mygroup, :layout => 'mylayout'
# This will add the following configuration options to the object you called 'config' on.
# :use => :mygroup, :layout => 'mylayout'
get_config :othergroup
# This will return global configuration options merged with configuration options from :othergroup.
# :use => [:mygroup, :othergroup], :layout => 'mylayout'
(2) If you pass a string before any symbols or hashes, it is interpreted as one of several possible configuration settings - usually a layout name, a database name, or a server hostname. The interpretation is dependent on the method being called. Not all methods will make use of a string parameter.
class MyModel < Rfm::Base
config 'MyLayoutName'
# In this context, this is the same as
# config :layout => 'MyLayoutName'
Rfm.database 'MyDatabaseName'
# In this context, this is the same as
# Rfm.database :database => 'MyDatabaseName'
Rfm.modelize 'MyDatabaseName', :group1
# In this context, this is the same as
# Rfm.modelize :database => 'MyDatabaseName', :use => :group1
Just about anything you can do with a Rfm layout, you can also do with a Rfm model.
There are a number of methods within Rfm that have been made accessible from the top-level Rfm module. Note that the server/database/layout methods are new to Rfm and are not the same as Rfm::Server, Rfm::Database, and Rfm::Layout. See the above section on "Getting Rfm Server, Database, and Layout Objects Manually" for an overview of how to use the new server/database/layout methods.
# Any of these methods can be accessed via Rfm.<method_name>
Rfm::Factory :servers, :server, :db, :database, :layout, :models, :modelize
Rfm::Config :config, :get_config, :config_clear
Rfm::Resultset :ignore_bad_data
Rfm::SaxParser :backend
If you are working with a Filemaker database that returns codes like '?' for a missing value in a date field, Rfm will throw an error. Set your main configuration, your server, or your layout to ignore_bad_data true, if you want Rfm to silently ignore data mismatch errors when loading resultset data. If ActiveRecord is loaded, and your resultset is loaded into a Rfm model, your model records will log these errors in the @errors attribute.
Rfm.config :ignore_bad_data => true
class MyModel < Rfm::Base
config 'my_layout'
result = MyModel.find(:name => 'mike')
# Assuming the Filemaker field 'some_date_field' contains a bad date value '?'
# ['some_date_field invalid date']
# To be more specific about what objects you want to ignore data errors
MyModel.layout.ignore_bad_data true
Working with "Classic" Rfm Features
All of Rfm's original features and functions are available as they were before, though some low-level functionality has changed slightly. See the documentation for each module & class for the specifics on low-level methods and functionality.
require 'rfm'
my_server =
:host => 'myservername',
:account_name => 'user',
:password => 'pw',
:ssl => false
my_server =
:host => 'myservername',
:account_name => 'user',
:password => 'pw',
:port => 8080,
:ssl => false,
:root_cert => false
Databases and Layouts
my_db = my_server.db["My Database"]
As a convenience, you can do this too:
my_db = my_server["My Database"]
all_dbs = my_server.db.all
my_layout = my_db.layout["My Layout"]
Again, for convenience:
my_layout = my_db["My Layout"]
And to get them all:
all_layouts = my_db.layout.all
Working with Layouts
my_layout.all # be careful with this
To get a random record:
To add a new record with my personal info:
:first_name => "Geoff",
:last_name => "Coffey",
:email => ""}
To edit the record whose recid (filemaker internal record id) is 200:
To delete the record whose recid is 200:
All of these methods return an Rfm::Resultset object (see below), and every one of them takes an optional parameter (the very last one) with additional options. For example, to find just a page full of records, you can do this:
Resultset and Record Objects
Any method on the Layout object that returns data will return a Resultset object. Rfm::Resultset is a subclass of Array, so first and foremost, you can use it like any other array:
my_result = my_layout.any
my_result.size # returns '1'
my_result[0] # returns the first record (an Rfm::Record object)
The Resultset object also tells you information about the fields and portals in the result. Resultset#field_meta and Resultset#portal_meta are both standard ruby hashes, with strings for keys. The fields hash has Rfm::Metadata::Field objects for values. The portals hash has another hash for its values. This nested hash is the fields on the portal. This would print out all the field names:
my_result.field_meta.each { |name, field| puts name }
Or, as a convenience, you can do this:
my_result.portals.each { |table, fields|
puts "table: #{table}"
Also as a convenience, you can do this:
But most importantly, the Resultset contains record objects. Rfm::Record is a subclass of Hash, so it can be used in many standard ways. This code would print the value in the 'first_name' field in the first record of the Resultset:
my_record = my_result[0]
puts my_record["first_name"]
puts my_record.first_name
Record objects can also be edited:
my_record.first_name = 'Isabel'
Record objects also have portals. While the portals in a Resultset tell you about the tables and fields the portals show, the portals in a Record have the actual data. For example, if an Order record has Line Item records, you could do this:
my_lines = my_order.portals["Line Items"]
You would NOT do this:
total = 0.0
Data Types
FileMaker's field types are coerced to Ruby types thusly:
Text Field -> String object
Number Field -> BigDecimal object # see below
Date Field -> Date object
Time Field -> DateTime object # see below
TimeStamp Field -> DateTime object
Container Field -> URI object
- use Net::HTTP to download the contents of the container field using this URI
- to_s the URI and use it as the src attribute of an HTML image tag
- etc...
my_server =>
:host => 'myservername',
:account_name => 'user',
:password => 'pw',
:log_actions => true,
:log_responses => true
Source Code
If you were tracking ginjo-rfm on github before the switch to version 2.0.0, please accept my humblest apologies for making a mess of the branching. The pre 2.0.0 edge branch has become master, and the pre 2.0.0 master branch has become ginjo-1-4-stable. I don't intend to make that kind of hard reset again, at least not on public branches. Master will be the branch to find the latest-greatest public source, and 'stable' branches will emerge as necessary to preserve historical releases.
Still To Do
Repeating field compatibility, more coverage of Filemaker's query syntax, more error classes, more specs, and more documentation.
Version 2.1 Highlights
Version 2.0 Highlights
Data Modeling with ActiveModel
If you can load ActiveModel in your project, you can have model callbacks, validations, and other ActiveModel features. If you can't load ActiveModel (because you're using something incompatible, like Rails 2), you can still use Rfm models... minus the ActiveModel-specific features like callbacks and validations. Rfm models give you basic data modeling with easy configuration and CRUD features.
class User < Rfm::Base
config :layout=>'user_layout'
before_save :encrypt_password
validate :valid_email_address
@user = :username => 'bill', :password => 'pass' = ''!
Choice of XML Parsers
Note that this section is obsolete for ginjo-rfm version 3.
Ginjo-rfm 2.0 uses ActiveSupport's XmlMini parsing interface, which has built-in support for LibXML, Nokogiri, and REXML. Additionally, ginjo-rfm includes adapters for Ox and Hpricot parsing. You can specifiy which parser to use or let Rfm decide.
Rfm.config :parser => :libxml
If you're not able to install one of the faster parsers, ginjo-rfm will fall back to ruby's built-in REXML. Want to roll your own XML adapter? Just pass it to Rfm as a module.
Rfm.config :parser => MyHomeGrownAdapter
Choose your preferred parser globaly, as in the above example, or set a different parser for each model.
class Order < Rfm::Base
config :parser => :hpricot
The current parsing options are
:jdom -> JDOM (for JRuby)
:oxsax -> Ox SAX
:libxml -> LibXML Tree
:libxmlsax -> LibXML SAX
:nokogirisax -> Nokogiri SAX
:nokogiri -> Nokogiri Tree
:hpricot -> Hpricot Tree
:rexml -> REXML Tree
:rexmlsax -> REXML SAX
Configuration API
The ginjo-rfm configuration module lets you store your settings in several different ways. Store some, or all, of your project-specific settings in a rfm.yml file at the root of your project, or in your Rails config/ directory. Settings can also be put in a RFM_CONFIG constant at the top level of your project. Configuration settings can be simple key=>values, or they can be named groups of key=>values. Configuration can also be passed to various Rfm methods during load and runtime, as individual settings or as groups.
:ssl: true
:root_cert: false
:timeout: 10
:port: 443
:account_name: admin
:password: pass
:database: MyFmDb
Set a model's configuration.
class MyModel < Rfm::Base
config :layout => 'mylayout'
Compound Filemaker Queries, with Omitable FMP Find Requests
Create a Filemaker 'omit' request by including an :omit key with a value of true.
my_layout.find :field1 => 'val1', :field2 => 'val2', :omit => true
Create multiple Filemaker find requests by passing an array of hashes to the #find method.
my_layout.find [{:field1 => 'bill', :field2 => 'admin'}, {:field2 => 'staff', :field3 => 'inactive', :omit => true}, ...]
If the value of a field in a find request is an array of strings, the string values will be logically OR'd in the query.
my_layout.find :fieldOne => ['bill','mike','bob'], :fieldTwo =>'staff'
Full Metadata Support
There are also many enhancements to make it easier to get the objects or data you want. Some examples:
Get a database object using default config
Rfm.db 'my_db'
Get a layout object using config grouping :my_group
Rfm.layout :my_group
Get the total count of all records in the table
Get the portal names (table-occurrence names) on the current layout
Get the names of fields on the current layout
From Version 1.4.x
From ginjo-rfm 1.4.x, the following features are also included.
Connection timeout settings
Rfm.config :timeout => 10
Value-list alternate display
i = array_of_value_list_items[3] # => '8765'
i.value # => '8765'
i.display # => '8765 Amy'
Rfm was primarily designed by Six Fried Rice co-founder Geoff Coffey.
Other lead contributors:
|
global_05_local_4_shard_00000656_processed.jsonl/63865
|
NCSU Institutional Repository >
NC State Theses and Dissertations >
Dissertations >
Please use this identifier to cite or link to this item:
Title: Geometric, Statistical, and Topological Modeling of Intrinsic Data Manifolds: Application to 3D Shapes.
Authors: Aouada, Djamila
Advisors: Professor Hamid Krim, Committee Chair
Keywords: Manifold theory
3D shape comparison
Object classification
Differential geometry
Issue Date: 27-Apr-2009
Degree: PhD
Discipline: Electrical Engineering
Abstract: The increasing size and complexity of data often invokes the extraction of information from their reduced representations while preserving their inherent structure. In this thesis, we explore the statistical, geometric and topological intrinsic information contained in high dimensional data. We focus on applications related to 3-dimensional objects, and model their 2-dimensional surfaces using compact curved-skeletal models that we refer to as “squigraphs†. These models are multi-level representations that superpose global topological and local geometric 3D shape descriptors. Squigraphs are subsequently used for classification, and ensure a high discrimination between in-class 3-dimensional shapes. The extraction of squigraphs starts by sampling the surface of an object for a resulting set of curves. This may be accomplished by defining an appropriate intrinsic characteristic function on the surface itself, referred to as a Morse function; which we use in a two-phase approach. To ensure the invariance of the final representation to isometric transforms, we choose the Morse function to be an intrinsic global geodesic function. The first phase is a coarse representation through a reduced topological Reeb graph. We use it for a meaningful decomposition of shapes into primitives. At the second phase, we add detailed geometric information by tracking the evolution of Morse function’s level curves along each primitive. We then embed the manifold corresponding to this evolution of curves into R3, and obtain a simple space curve. We further define a Riemannian metric to quantitatively compare the geometry of shapes. We point the flexibility of our techniques for other applications, namely, face recognition, behavioral modeling, and sensor network data analysis. While all these applications face the same curse of dimensionality, we show that they may be formalized under similar geometrical settings.
Appears in Collections:Dissertations
Files in This Item:
File Description SizeFormat
etd.pdf17.98 MBAdobe PDFView/Open
|
global_05_local_4_shard_00000656_processed.jsonl/63866
|
Duration 00:06:02
Date recorded 14 November 2012
‛Afkar’ is an Arabic word for ‘ideas,’ and the goal of Microsoft Afkar is to give Arabic speakers tools to devise their own new ideas.
Arabic poses particular challenges for translators. Microsoft Afkar consists of several tools, all designed to make Arabic more Web-friendly and usable. The main components include a speller, reader, transliteration, autocomplete, multilingual authoring and a morphological analyser.
©2012 Microsoft Corporation. All rights reserved.
|
global_05_local_4_shard_00000656_processed.jsonl/63870
|
Top 3 Classic Movie Trailers
Today, Ryan names off the top three trailers from some of his favorite classic movies. From the great American classic Citizen Kane to the legendary Humphrey Bogart's Casablanca, these trailers are definitely worth a look.
Today, we break out trailers for some of Ryan's favorite classic movies!
|
global_05_local_4_shard_00000656_processed.jsonl/63873
|
The EC Decision: Where Were The President’s Science Advisors?
On Friday, January 6th, 2012, several public health experts addressed the President’s Council of Advisors on Science and Technology on the issue of Plan B One-Step® and the Obama administration’s refusal to let the Food and Drug Administration lift the age restriction from over-the-counter deliver of emergency contraception. Dr. Susan Wood is one among several experts whose testimony we have published.
Good afternoon Dr. Holdren and members of the Council. I would like discuss the recent misuse of science and data as part of the decision by the Secretary of HHS to overrule the scientific determination by the FDA Commissioner on bringing Plan B fully over the counter.
First, as a point of information, emergency contraception is not an abortion pill, but is just a higher dose of regular birth control pills to be taken within 72 hours to be effective in preventing pregnancy. It is very safe; safer than many other over-the-counter medicines like acetaminophen. It also is just adding one more reproductive health product onto the shelf along with condoms and pregnancy tests, which are available to all. There has been consensus of medical and scientific data and agreement among experts both inside and outside FDA since 2004 that Plan B emergency contraception should be over the counter to improve access and effectiveness. The data involved here are not complex nor involve controversial models. There is real agreement here, and it should have been a routine approval in 2004. This was blocked in 2005, and only partial approval allowed due to non-scientific reasons in 2006.
Secondly, the FDA makes its scientific determinations based on the data, following the standards set in law and regulation. The Secretary, in overruling the unified opinion of the FDA as summarized in the statement by the FDA Commissioner, used a scientific, data-based rationale in her determination. This sets a new and, in my view, inappropriate precedent. I am quite concerned that any future Secretary may try to raise new (and unfounded) “scientific” rationales to block (or require approval of) any product that he/she disapproves of or supports. For example, controversial products such as those that may be developed from embryonic stem cell technology, HIV/AIDS vaccines for teenagers, or those that have the support or opposition of political/financial supporters. The determination of what medical products are approved for use is one that the public and health professionals must be able to trust and must be based on sound science.
Finally, I have a question for you. Given that the Secretary of HHS disagreed with the scientific analysis of the FDA professional staff and the FDA Commissioner, did the Council, OSTP or the President’s science advisor provide any technical or scientific advice on this matter, either to the Secretary or to the President? If not, what next steps will you take to ensure that in matters where science should indeed drive decisions (as in FDA’s product approval determinations), that accurate and fully supported science is the basis of these decisions, even when they are called controversial?
|
global_05_local_4_shard_00000656_processed.jsonl/63879
|
Right Web
Tracking militarists’ efforts to influence U.S. foreign policy
Bret Stephens
• Wall Street Journal: Columnist
• Commentary: Former Staff Editor
Bret Stephens is a columnist for the Wall Street Journal and a former editor of the neoconservative flagship magazine Commentary.[1] A promoter of aggressive "pro-Israel" U.S. foreign policies, Stephens previously worked as editor of the rightist Jerusalem Post and appears regularly on Fox News.[2]
Stephens advocates views that are largely in line with the foreign policy agenda espoused by neoconservatives, particularly with respect to U.S. Middle East policy. Not surprisingly, he takes a dim view of those who argue that many "war on terror" policies, like the invasion of Iraq, were unnecessary and driven largely by ideological actors and business elites.
Among those he has targeted for criticism in this regard is Sen. Rand Paul (R-KY), who combines extreme libertarian domestic policies with a cautious regard for overseas military intervention. In a bitingly sarcastic 2014 column, Stephens called on Republicans to vote for Sen. Rand Paul (R-KY) in the next presidential primary, arguing that what Republicans needed as a "nominee in 2016 is a man of … glaring disqualifications. Someone so nakedly unacceptable to the overwhelming majority of sane Americans that only the GOP could think of nominating him." Among the issues that mark Paul as a right-wing crazy, according to Stephens, is his insistence that Vice President Dick Cheney helped manufacture a "war in Iraq" for his friends in business and politics. But, asked Stephens, "Cui bono—to whose benefit? It's the signature question of every conspiracy theorist with an unhinged mind. Cheney. Halliburton. Big Oil. The military-industrial complex. Neocons. 9/11. Soldiers electrocuted in the shower. It all makes perfect sense, doesn't it?"[3]
Stephens has also wielded allegations of anti-Semitism against those he disagrees with. In 2012, he added his voice to a chorus of neoconservative writers who decried President Barack Obama's decision to nominate former Sen. Chuck Hagel (R-NE) to be defense secretary during his second term. Stephens wrote at the time: "Prejudice—like cooking, wine-tasting and other consummations—has an olfactory element. When Chuck Hagel, the former GOP senator from Nebraska who is now a front-runner to be the next secretary of Defense, carries on about how 'the Jewish lobby intimidates a lot of people up here,' the odor is especially ripe."[4]
The effort by Stephens and other "pro-Israel" figures to paint Hagel as an anti-Semite was widely panned.As Richard Cohen wrote in the Washington Post at the time: "I direct Stephens and others to page 426 of Anita Shapira's new book, Israel: A History. She writes that when the George H.W. Bush administration in 1992 withheld $10 billion in loan guarantees, Prime Minister Yitzhak Shamir 'enlisted the help of the Jewish lobby in the U.S. Congress, but in vain.' Shapira is professor emeritus at Tel Aviv University. It is true, as Stephens writes, that Jews are not the only ones who support Israel, and it is likewise true that not all Jews support Israel—or at least the current government of Benjamin Netanyahu. But Stephens's real beef with Hagel is not over speech but policy."[5]
A writer for the "Open Zion" blog at The Daily Beast concurred, opining that the"ugly, facts-optional anti-Hagel campaign was never about Israel. ... Neocon attacks on President Obama—as channeled through the likes of Bill Kristol, the Emergency Committee for Israel, Jennifer Rubin, Fox News, the Wall Street Journal, etc and so on—are about American power. They are about how a certain (pretty well discredited) ideology envisions the use of American power in the world, and they are about how power is shared within America's borders."[6]
Among Stephens strongly held policy views is his opposition to Palestinian statehood. In an interview with the conservative radio talk show host Hugh Hewitt, Stephens described former Israeli Prime Minister and Likud leader Ariel Sharon as "the most significant prime minister Israel has had since the founder, David Ben-Gurion." Stephens praised Sharon's often militarist policies toward the Palestinians, arguing that he had "defeated the Palestinian intifada and proved, therefore, that there is a military solution in the face of suicide terrorism, or other kinds of terrorism." Regarding the George W. Bush administration's hawkish stance on Palestinian issues, Stephens said, "I think this administration has been head and shoulders above its predecessors in being shrewd about [Yasser] Arafat, shrewd about the Palestinians, shrewd about what needs to happen, in order for the Palestinians to present some kind of realistic … for there to be some kind of realistic prospect of peace between the Palestinians and Israel."[7]
Stephens has criticized the use of rhetoric linking Israeli actions to the actions of Nazi Germany. For example, Stephens wrote that "Jose Saramago, Portugal's Nobel Laureate in Literature, observed after a visit to Ramallah that the Israeli incursion into the city 'is a crime that may be compared to Auschwitz.' Never mind that the total number of Jews 'dealt with' in the Warsaw ghetto, according to Nazi commandant Jürgen Stroop, was 56,065, whereas the number of Palestinians killed in Jenin was no more than 60."[8] Yet Stephens often employs similarly sensationalist language when describing Middle East issues. He has called Iran an "existential" threat to Israel and Iranian leader President Mahmoud Ahmadinejad a "Hitlerian figure."[9]
Stephens believes that Iran's alleged nuclear weapons program must be stopped, yet unlike many other neoconservative writers, he thinks this can be done "without firing a shot." In a 2006 Journal op-ed, Stephens argued that the Bush administration's approach to the problem had failed miserably: "For three years, the administration has deferred to European and U.N. diplomacy while seeking to build consensus around the idea that a nuclear-armed Iran poses unacceptable risks to global security. The result: Seven leading Muslim states, including Pakistan and Indonesia, have joined hands with Iranian President Mahmoud Ahmadinejad to affirm his right to develop 'peaceful' nuclear technology. China and Russia have again rejected calls for U.N. sanctions."[10]
Stephens laid out four nonviolent ways the United States can deal with Iran: 1) Undertake a "diplomatic offensive" aimed at exploiting divisions among Iranian political elites, for example by having Bush write an open letter to Supreme Leader Ali Khamenei about conditions for negotiations, thereby bypassing and theoretically humiliating Ahmadinejad; 2) target financial interests by applying U.S. terrorism-financing laws on transactions between Iran and foreign banks; 3) support the creation of an independent labor movement that could challenge government policies; and 4) "threaten Iran's gasoline supply" by quarantining imports into the country. Regarding the last suggestion, Stephens raises a potential problem: "One objection: A gas quarantine may require the naval blockade of Iranian ports, which is legally tantamount to an act of war. Not a problem, says [Rep. Rob] Andrews [D-NJ]: 'I think the development of a nuclear weapon in violation of an international treaty is an act of war, too.'"[11]
Stephens has targeted those who question the close U.S.-Israel relationship. In a May 2006 speech, titled "Meet the Israel Lobby," at his alma mater the University of Chicago, Stephens took aim at noted international relations scholars Stephen Walt and John Mearsheimer for their controversial 2006 paper, "The Israel Lobby and U.S. Foreign Policy," which argued that lobbyists who worked on Israel-related issues in the United States had undue influence over U.S. policy in the Middle East, to the detriment of the United States. Stephens said: "Let's be clear: What professors Walt and Mearsheimer have produced under the guise of disinterested scholarship is a demagogic, disingenuous, distorted, bigoted, factually inaccurate, analytically flawed, and intellectually wretched piece of work."[12]
According to Stephens, intellectuals who criticize Israel are not necessarily antisemitic but do help "pave the way" for growing antisemitism. He cites the case of Walt and Mearsheimer: "Professors Stephen Walt of Harvard and John Mearsheimer of the University of Chicago, whose paper on 'The Israel Lobby' is now being turned into a book, have complained that 'anyone who criticizes Israel's actions or argues that pro-Israel groups have significant influence over US Middle Eastern policy ... stands a good chance of being labeled an anti-semite.' Maybe. But earlier this week, former Klansman David Duke took the opportunity to tell CNN that he does not hate Jews but merely opposes Israel and Israel's influence in U.S. politics. He even cited Messrs. Walt and Mearsheimer in his defense. Would they exonerate him of being an anti-Semite?"[13]
According to Stephens, while it might be the case that some writers are unfairly tagged as antisemitic merely because they are critical of Israel, this does not mean their positions are defensible. He writes: "So let's also concede that it is not anti-Semitic to oppose Zionism. … Yet simply because opposition to Zionism ideologically or Israel politically isn't necessarily anti-Semitic, it doesn't therefore follow that being anti-Zionist or anti-Israel are morally acceptable positions."[14]
Share This Profile:
[1] Wall Street Journal, Bret Stephens, http://topics.wsj.com/person/S/bret-stephens/5463.
[2] Wall Street Journal, "Press Room: Bret Stephens Will Speak at Symposium VI," National Homeland Defense Foundation, March 5, 2008; Wall Street Journal, "Bret Stephens," "Who We Are: Bret Stephens," http://topics.wsj.com/person/S/bret-stephens/5463.
[3] Bret Stephens, "Rand Paul for President," Wall Street Journal, April 14, 2014, http://online.wsj.com/news/articles/SB10001424052702303663604579501441901549788.
[4] Bret Stephens, "Chuck Hagel's Jewish Problem," Wall Street Journal, December 167, 2012.
[5] Richard Cohen, "The Tarring of Chuck Hagel," Washington Post, January 7, 2013.
[6] Emily Hauser, The Anti-Hagel Campaign Was Never About Israel," Daily Beast, January 7, 2013, http://www.thedailybeast.com/articles/2013/01/07/the-anti-hagel-campaign-was-never-about-israel.html.
[7] "Hugh Hewitt interviews Bret Stephens about Ariel Sharon," transcript posted on Kesher Talk, http://www.keshertalk.com/archives/2006/01/hugh_hewitt_int.php.
[8] Bret Stephens, "The Road to Tehran," Wall Street Journal, December 16, 2006.
[9] "Hugh Hewitt interviews Bret Stephens about Ariel Sharon," transcript posted on Kesher Talk.
[10] Bret Stephens, "How to Stop Iran (Without Firing a Shot)," Wall Street Journal, May 16, 2006.
[12] Bret Stephens, "Meet the Israel Lobby," University of Chicago, May 3, 2006, http://israel.uchicago.edu/bret_stephens_speech.pdf.
[13] Bret Stephens, "The Road to Tehran: Polite Society Helped Pave the Way for Iran's Holocaust Conference," Wall Street Journal, December 16, 2006.
Share RightWeb
Bret Stephens Résumé
• Wall Street Journal: Columnist; Member, Editorial Board
• Jerusalem Post: Editor (2002-2004)
• World Economic Forum: Media Fellow
• Commentary: Former Staff Editor
• University of Chicago
• London School of Economics
Bret Stephens News Feed
The Right Web Mission
For media inquiries,
or call 202-234-9382.
Featured Profiles
|
global_05_local_4_shard_00000656_processed.jsonl/63890
|
08 February 2010
Flip it Over!
I've been quickly going through a few things in my grandparents' collection of clippings trying to find something for a Casefile Clues column. I ran across a clipping Grandma made from the church bulletin the Sunday I was baptized.
While she didn't write the date on the clipping, I was lucky. When I flipped the clipping over, the date was right there on the back: 28 July 1968.
The name of the church wasn't there, but that I already knew--Trinity Lutheran in Carthage, Illinois.
I'll have to work on a citation for this in the spirit of Evidence Explained. Everything used in Casefile Clues is always cited, but this probably won't appear there as I usually don't write about myself.
|
global_05_local_4_shard_00000656_processed.jsonl/63893
|
694 reputation
bio website happyfunpoints.com
location Michigan, USA
age 39
visits member for 3 years, 10 months
seen Jan 9 '12 at 16:27
"We teach what we need to learn. We preach what we need to do. We write what we need to know." - E. Taliaferro
Writing the Perfect Question
694 Reputation
|
global_05_local_4_shard_00000656_processed.jsonl/63905
|
Sacred Texts Native American Southeast Index Previous Next
p. 186
About the Tejas Indians
The White Man Finds the Tejas Indians
Texas is the largest state in this great land of ours. Long ago, long before Columbus came to the New World, the people who lived in Texas were not white. They had bronze-colored skins. They were called Indians, because the first white people who found them thought they had come to the far-off land of India.
In a number of ways the Indians of the New World were like us. We like to tell stories, and so did they. They did not write their stories on paper because they
p. 187
did not know what paper was, and so they learned their stories by heart and remembered them. Fathers and mothers told the stories to their children and the children told them again to their children when they had grown up.
The stories in this book came mostly through the Tejas Indians, who belonged to certain tribes of east Texas, but the Comanches, Alabamas, Wacos, Wichitas, Tonkewas, Attakapas, and Karankawas * gave us some of the stories. The peaceful Tejas Indians made treaties with the warlike tribes west of their country, such as the Comanches and Wacos. By doing this the Tejas people could go out of their own country to get the hides and meat of
p. 188
the buffaloes, which roved the western lands in great herds. Living between the Tejas tribes and the Comanches and other tribes of central and western Texas were the Wichitas, the Tonkewas and Attakapas. Along the gulf coast lived the Karankawas.
As we read the legends we shall find out what the Indians of long ago believed about the flowers that grew in the fields and the fish that swam in the rivers and the birds that sang and flew in the air. The Indians lived close to these things. They lived in the woods and on the open fields, gathered into villages. They knew how little animals lived in the bushes and trees. They walked under the trees and watched the animals eating and
p. 189
playing. At night they sat in their camps around their fires and heard owls hooting and wolves howling far away in the dark.
They watched the flowers grow by the rivers and in the woods and fields in the spring time. They knew where to find the pink azaleas, which grew on tall bushes. In the spring the woods were full of yellow jasmine flowers. Indian girls liked to pick these and tie them in their long black hair. Another flower which the Indians knew was the dogwood. This big white flower grew on trees. When the trees were in bloom the blossoms that covered them looked like large white butterflies resting on the green leaves. In the open marsh glades
p. 190
grew the purple gentians, and on the prairies the bluebonnets. Sometimes these flowers looked like purple ponds of water because there were so many of them growing together. When the wind blew across them their purple and blue heads moved like waves. The Indians liked these flowers and others which grew where they lived, and many of the legends in this book are about them.
The bronzed people who knew the animals and flowers and told stories about them were friendly. When the first white people came to east Texas from France and Spain they found that the Indians were good and peaceful, and so they called them Tejas Indians, which means friendly Indians. The white men
p. 191
named the country the land of the Tejas. Today that land is called Texas because of this old Indian name.
The Tejas Indians were happy and friendly when the first white people came to their country more than two hundred years ago. It was a land of woods and fields. The only people who lived there were the Indians, and they did not live in big towns. They lived in villages. The villages did not have roads between them. When the Indians wanted to go from one to another they had to walk through the open fields or the forests, sometimes on narrow trails and sometimes without any trail at all.
When the white people came to the land of the Tejas the Indians were glad
p. 192
to see them. These white people came from Spain. Their leader was a soldier named Captain de Leon. He brought with him his soldiers, and also a good man named Father Massanet, who came to tell the Indians about the white man's God. When Captain de Leon came to the place where Father Massanet was later to build the first church in Texas the chief of the Indians met the white people. He could not speak their language, but he talked with them by making signs with his fingers. Captain de Leon gave the chief some clothes like those the white people were wearing, and this made the chief happy. He put them on and led the captain and his men to the Indian village. As they marched
p. 193
into the village they sang and waved their flags.
The Indians were glad to see the strange white people because the chief told them Captain de Leon was their friend. They always obeyed their chief. He ruled all the tribes of the Tejas Indians and the leaders of those tribes. When he needed to find out something he wanted to know or help in time of war he called the leaders of the tribes to his big grass-covered house. They all sat around the fire inside and talked about things with their chief. When they decided what to do the leaders would go home to their tribes and tell them what the chief had said.
Father Massanet soon set to work building
p. 194
the first church in Texas, named San Francisco de los Tejas. With the help of his priests he cut down trees and built the church out of logs. He had brought some bronze bells with him, and he put these on the little log church, which was in Cherokee county and near the Neches river. He started teaching the Indians. The Indians began learning the ways of the white people and the white people began to learn about the Indians. In this way the two races of people came together.
The white people began to come in great numbers. They killed the wild animals which the Indians had been eating and they took or bought the land where the Indians had their small farms.
p. 195
[paragraph continues] Now and then whites married Indian women, and in this way the blood of the Tejas people was mingled with the blood of the whites. Today only a small number of the pure-blooded Indians are left. Two tribes called the Coushattas and Alabamas in east Texas are not native to the state. A few Indians of other tribes live among the white people and work small farms and hunt for a living.
How the Indians Looked
The Indians had reddish-brown or bronze-colored skin. They stood tall and straight. They had strong arms and legs because they walked much when they were hunting or fishing or
p. 196
moving their camps from one place to another. Their hair was long and black. They did not cut it short, but let it grow long. Because they lived out of doors so much their eyes were bright and sharp. They could see little animals and birds moving high in the trees, far away on the hills and even in the twilight. Their ears were keen. They could hear small sounds like rabbits running in the grass, or birds singing high in the air over their heads, or deer calling to their mates in the woods.
How the Indians Dressed
In summer, when it was warm, the men wore only pieces of animal skin
p. 197
around their waists. In the winter they wrapped themselves in robes made of skins with fur on them or blankets which the women made. Indian women also wore skins and blankets. When the babies were still too little to walk their mothers carried them in sacks of skin tied to the mothers' backs. When the babies were in these sacks only their heads peeped out.
On their feet the Indians wore soft shoes made of skin. These shoes were called moccasins. They were soft because the skin had been beaten with rocks or chewed. Indians could walk through the woods in moccasins and not make a sound if they were careful not to step on dry sticks and break them.
p. 198
[paragraph continues] The Indians were always careful not to make noises while hunting or when engaged in wars with other tribes.
These people who lived in the land of the Tejas so long ago liked pretty things, as do most people everywhere. They liked bright colors. They sewed colored feathers on their clothes and on their blankets and tied them on their hunting bows. From the little redbird they got red feathers, blue feathers from the blue-jay, white ones from herons and geese, black ones from the crow and buzzard, yellow feathers from the oriole and meadow lark, and spotted feathers from the wild turkey, the prairie chicken, the hawk, and the eagle. Sometimes they could not find the colored feathers they
p. 199
wanted, and so they dyed white feathers with the juices of berries or roots. They liked to wear feathers in their hair. They would braid their long hair and stick two or three feathers in the braids. The chiefs of the tribes wore bonnets made of many feathers.
On their moccasins and clothes the Indians sewed little colored beads. They made these beads from many things. Some were made from red, black, yellow or blue clay rolled into balls. When the clay was still soft after they dug it from the earth they made holes in the balls by pushing little twigs through them. Then they heated the balls in fires. This made the beads hard. Today these beads are sometimes found on the banks of
p. 200
rivers or around the places where the Indians used to have their villages. Beads were also made from hard nuts and seeds. Sometimes the Indians made them out of the teeth of animals, and also out of the bones of animals and fish. When they could find soft stones they would make these stones into beads and cut pictures on them. Shells found in the rivers or at the seashore were made into beads by punching holes into parts of them. Parts of certain shells were used as money.
Indians used paint on their faces, arms and legs. They made their paint out of the juices of berries and also out of different colored clays by mixing the clay with water or with grease. They got this
p. 201
grease from animals. When they went to war the men put paint on their faces to make them look ugly so they could scare their enemies. When they danced in their villages they put red and yellow and white and black paint all over themselves and shouted and danced. We would not think they were very pretty, but they thought they were, and that made them happy.
Indian Homes
The Indians lived in strange houses. They did not have such things as bricks and the kind of wood with which we build houses now. When they could find young trees growing close together they bent them over until their tops were touching
p. 202
and then they tied the tops together. Most of the time they stuck poles into the ground in the shape of a circle and tied the poles together at the top. Around these poles they made the walls of their houses by tying thick branches from trees or bunches of grass. Their houses looked like round haystacks. They did not have any windows. The only way light could get into them was through the door; which could be closed by hanging skins over it, or through holes in the walls used to let out smoke from the fires.
Some of the Indians lived in tents. These Indians did not live long in one place, but moved around and followed the animals which they killed and used for meat. They made their tents by stretching
p. 203
skins over poles set up in the ground and tied together at the top. When the skins were stretched over the poles the tents looked like ice cream cones upside down. On the skins the Indians painted pictures of trees, the sun, animals, birds, fish and Indians fighting or playing. When a tribe got ready to move to a new place the Indians took the skins off the poles, and rolled up the poles in the skins. They carried the bundles with them when they went to a new camp. In this way they could move their villages without much trouble.
The Tejas people did not travel much. They had gardens. They could not move their gardens, so they stayed where these were. On the inside of their houses they
p. 204
did not have wood floors, but walked on mats made of grass or on blankets or skins laid on the bare earth. They slept on beds made by driving four short sticks into the ground like the legs of a bed. On these legs they tied vines and the soft branches of trees, then laid on top of these their skins and blankets. Their beds were quite soft.
There were not many things in their houses. They had no chairs or tables, but sat on the floor or on their beds. There were no lights. When night came they would lay wood on the fire inside the house and this would make a bright blaze. The Indians did not have any books to read, so they did not need lights very much. They did most of their work
p. 205
while sitting outside their houses during the daytime. Those who went away from their homes to work did so in gardens or fished or hunted. When night came they were tired, and went to bed early. On cold winter nights they piled wood on their fires to make a big, bright blaze to keep them warm while the winds blew and whistled high in the trees outside. They cooked some of their food on these fires.
How Food Was Cooked
The Indians cooked their food in several ways. One way was to boil things in jars or dishes made of clay. When an Indian woman wanted to make soup or boil meat or vegetables she put the food into one of these pottery dishes, poured water into it
p. 206
and set it on her fire until the food was cooked.
Sometimes the Indians cooked food in pottery that could not be put on fires without cracking. When they used this kind of pottery they boiled the water and food in the jar by dropping into it rocks which had first been heated in a fire. As soon as one rock had cooled it was taken out and another hot one put in its place. At last the water came to a boil. It was a slow way to cook, but the Indians had plenty of time.
Indians knew how to bake food, such as corn bread and beans. They baked these in ovens made of dried clay or mud into which they put burning wood or hot rocks. They baked some food, such as
p. 207
fish, by rolling the food in wet clay and covering it up in red hot ashes for a while.
They cooked their meat by cutting it into strips and smoking it over fires or by boiling it. They often did not cook it, but cut it into strips and hung it outside their houses in the sun on long poles until the sun had dried it. They dried their meat in the summer and ate it during the winter months when animals were hard to find.
Indian Pottery and Baskets
The Indians kept their food and water in dishes or bottles made of clay or in baskets of woven grass and branches from trees. The women made these
p. 208
things. When they needed a dish of clay they would go out to find the kind of clay they wanted on the banks of rivers or in fields where rains had washed away the soft dirt till the clay could be seen. This clay was mixed with water until it was soft and could be pressed into shape. The woman who was making the dish would roll it and pound it with her hands until it was the right shape and size. Sometimes she painted it with paint made from clay of another color. Sometimes she scratched pictures or lines on the dish when it was still soft. At last she put the dish into a fire and burned it and made it hard, so that it would hold water without leaking or falling to pieces.
p. 209
These clay dishes and bottles are called pottery. They were made in many different shapes. Some were like bottles. These were used to hold water and berry juices. Others were like bowls. In them were kept the foods which the Indians raised in their gardens, and fruits, nuts and berries. They were all easy to break and had to be used with care. Many are to be found today in the places where the Indians had their villages. Sometimes they are broken into many pieces, but if all the pieces are found they can be glued together and made to look just as they were when the Indians used them many years ago.
Baskets which the Indian women made were often very pretty. Some were of
p. 210
long, tough grass. Others were of strips of bark or wood cut from trees. Baskets could also be woven out of vines and the long, slim branches of willow trees growing near the rivers and ponds. The baskets the Indians used looked very much like those which are made now. Some were painted with different colors. Some had beads and feathers on them, and handles made of strips of skin. In these baskets the Indians kept foods.
Indian Gardens, Fruits and Berries
The Tejas Indians had gardens and small farms from which they got part of their food. This was one of the reasons they did not roam far over the country as most Indians did. The women, not
p. 211
the men, did the work in these gardens. Men hunted and fished and fought battles and left the work in the villages to their women.
The Tejas people did not have big farms with fences around them. They planted only little pieces of ground because they did not have such things as ploughs. Most of the time two or three Indian women would work on the same garden together, and when the crops were ready everything was taken from the garden and put into one pile. From that pile each Indian took vegetables as these were needed by a family.
The land where they lived was very rich and would grow anything they wanted to plant in it. There was not
p. 212
much cold weather in the winter, so that their gardens were not killed by hard freezes. There was plenty of rain to make their seeds grow in the spring. They did not have to dig big rocks out of the ground because there were not many rocks where they lived.
They raised corn, beans, calabashes, berries, melons and pumpkins. Corn and beans could be kept and used in the winter by putting them away in baskets or jars. Peppers could be kept the same way.
In the woods the Indians found many things to eat. They knew where to find the wild pecan trees, the hickory nut trees and the walnut trees. They knew where vines with grapes grew. There
p. 213
were many kinds of berries growing wild, such as blackberries, dewberries, and huckleberries. Wild plum trees also grew in the woods. When the fruit and berries were ripe the Indian women and children would take baskets into the woods and go from tree to tree and from bush to bush until the baskets were full. Sometimes they were gone all day and did not go back to their camp before night began to fall in the woods. They liked the fruits and did not mind working hard to get them.
How They Hunted and Fished
Indians liked to hunt. It was fun to walk through the woods looking for rabbits or wild turkeys or to run after the
p. 214
deer and buffalo which roamed over the country. These Indian people had to hunt because it was the only way to get the meat they ate. Each father had to go out hunting meat for his own family. While the women stayed at home tending the gardens and keeping house the men spent much of their time going through the woods or across the open prairies with their bows and arrows.
The Indians used bows and arrows for shooting animals. The bow which the Indian used was much like the bows from which boys shoot arrows today. It was about five feet long and was made of the wood of different kinds of trees growing where the Indians lived. A cord made of skin was tied to each end of the bow and
p. 215
was pulled tight until the bow was bent. The arrows which were shot from the bow were also made of wood. An arrow had to be very straight so it would fly in a straight line. It had a point shaped from hard rock. Each tribe of Indians had a man who did nothing but make arrow points, because a man could not make these well unless he made many of them. The arrow maker would look on the ground for the kind of rock which he wanted. Then he would take another piece of rock and pound the first so that it was broken into flat, thin pieces shaped like leaves. From each of these pieces he would make an arrow point. He did this by chipping little bits off of them with a sharp stone until they had
p. 216
the right shape. Arrow points were both big and little. Indians used big ones on their arrows when they wanted to shoot large animals like deer or bears. When they wanted to shoot birds, such as wild turkeys, cranes and hawks, they used arrows with little points so as not to tear the birds to pieces.
Each hunter carried many arrows in a long leather sack which was called a quiver. He hung the quiver full of arrows over his shoulder so that he could quickly pull an arrow out of it when he wanted to shoot something.
A good hunter could hit an animal with an arrow when the animal was running fast, and he could hit birds as they flew in the air. All little Indian boys were
p. 217
taught how to use the bow and arrow just as soon as they were strong enough to hold them, and that is why Indians were such good hunters. Today the woods where the Indians hunted are full of arrow points. They can be found lying in ditches where the water has washed the dirt away from them. Sometimes one can be found sticking in a tree where the arrow hit when an Indian shot at an animal and missed it.
One of the animals which the Indians hunted was the buffalo, that once roamed in thousands over the plains. The buffalo was of great use to the Indians. They used his meat for food and his shaggy hide for making clothes, tents or blankets. Indians killed the buffaloes by
p. 218
driving them in large numbers into narrow paths between rocky walls until the animals came to high cliffs and fell over. Sometimes they drove them into rivers or muddy places and shot them with arrows. Another way to shoot the buffaloes was for the Indian hunters to dress themselves in buffalo hides to fool the animals and then creep up close enough to shoot arrows at them. After the white man came to America the Indians used horses for hunting. The Indians skinned the dead animals and carried parts of the meat back to their camps. When they had so much meat that they could not eat it all at once they cut it into thin strips, and hung it in the sun to dry. Dried meat lasted a long time.
p. 219
In the woods the Indians hunted rabbits, squirrels, coons, turkeys and bears. They did not shoot animals just for fun. They only killed when they were hungry. Because of this the woods were always full of things which they needed for food. On still summer days they could hear the big turkey gobblers calling to their flocks. They could hear squirrels barking and scolding one another up in the oak trees. If they stood still and hid themselves they could see the little rabbits hopping along in the grass and nibbling leaves. They knew where to find the tracks which the little black coon made in soft mud with his paws on the banks of rivers when he came to drink at night or to catch crawfish in
p. 220
the water. They knew where the big bear had been walking when they saw his footprints looking like the hand of a giant in the dirt. At night when they heard something howling on the plains they knew it was a wolf.
The best hunters could call animals and birds to them. They could whistle like the larks and bob-whites. They could call the wild turkeys close to them. They could bark and scold like the squirrels. Hunters who could do these things did not have to walk, but stood still in the woods and called the animals close enough to shoot them.
How They Got Food from the Water
The Indians also fished. They got part
p. 221
of their food from the rivers and lakes, which were full of fish of many kinds. They caught them with hooks and lines. They made hooks out of thin rock and bones, much as they made their arrow-points. It was hard work to make hooks, and they were easy to break. The hooks were tied on lines made of long strips of skin, sinews, long vines or hair. On these hooks and lines the fishermen caught the large fish, such as the catfish, the gar, the buffalo fish and the drum. Once in a while they would catch a big turtle, but the Indians got most of their turtles by digging them out of the ground after the turtles had buried themselves for the winter.
Sometimes the Indians shot fish with
p. 222
their bows and arrows. They would stand very still near the river and wait until a fish swam close to the top of the water, then shoot it with an arrow and catch it before it could float away. The fishermen also used nets made of vines. They would drag them through the water and catch the big fish in them, or would put food in the nets and leave them in the water where fish would become caught in them.
Indians liked to eat clams, and these were easy to get. They waded in rivers and picked up the clams lying on the bottom. Some clams buried themselves in mud or sand in the rivers. The Indians found these by digging with their feet or hands where they knew the clams
p. 223
were hiding. Indians who lived near the waters of the Gulf of Mexico waded into the shallow water near the shores and found many oysters, which taste somewhat like clams.
The Gods of the Indians
The people of the Tejas country believed in many spirits. They thought some of these were good and that others were bad. Everywhere, they believed, the spirits were watching them. When a storm arose and howled through the trees it was evil spirits wailing and shouting. When leaves rustled and whispered in the tops of trees in summer it was good spirits talking among themselves or playing together. Spirits caused
p. 224
the lightning to shoot across the sky, made water bubble out of the ground, caused the snow to fall and ice to form on ponds of water, turned the leaves red and yellow when winter came, made the flowers bloom in the spring and caused fire to leap and dance.
Each Indian tribe had what was called a medicine man, who was able to talk with these spirits. The medicine man believed that he could talk with spirits who lived in the woods and sky, and he told the Indians what the spirits were doing and what they said.
There were the evil spirits, which the Indians feared. There were also the good spirits, which helped the Indians. The medicine man thought he knew how to
p. 225
keep the bad spirits from hurting the Indians and how to get the good spirits to give them what they wanted. He kept a fire burning night and day in the big house where he lived. From it all the Indians got burning bits of wood which they took to their homes to build their own fires with, because they thought the medicine man's fire had magic in it. The medicine man did not have to work like other people of the tribe. Indians brought him fish and birds and other things to eat, and the women cooked for him and made his clothes. Even the chief thought he was a very wise man.
The medicine man helped the great chief of the Indian tribes. When the chief wanted to know something which
p. 226
nobody else could tell him he went to the house of the medicine man. He asked the wise man things about hunting or where to find water, or how to make the rain stop, or how to cure sick people. Then the medicine man painted his body with bright colors and put a cap of feathers on his head. Sometimes he would shout and dance until he was so tired he fell to the ground. He often swallowed a magic drink which he had made, and this drink would make him say strange things, and the Indians thought he was talking with the spirits. After that he would tell the chief what he wanted to know.
The medicine man was many times wrong, but the Indians did not remember
p. 227
when he was wrong, and they always remembered it when he was right. Because of this they thought he was a very wise man with magic powers. When they wanted to go to war they asked him how they should begin and where they should fight. When they needed rain for their crops they asked him to pray for the spirits to send it down from the sky. When the hot sun burned from the sky for day after day they asked him to pray to the spirits to send clouds to make it cool and make the rain fall.
Sometimes, the Indians thought, an evil spirit would get into a man and make him sick or crazy. They had ways to drive out this evil spirit. The medicine man of the tribe would make medicine
p. 228
out of different things and give it to the man, or he would put seeds, hair, bones and other things into little bags called charms and tie these about the man's neck to drive out the evil spirits. If many people of the tribe got sick the other Indians would dance and shout and pound on drums to make a great noise so that the evil spirits which caused the people to be sick would become scared and would go away from the camp.
When the people wanted the good spirits to give them something they often danced and sang and prayed in their camps so the spirits would hear them and be pleased. They would paint their faces and put flowers and feathers in their hair. The medicine man would
p. 229
make magic drinks and swallow them so he could talk better with the spirits. Then everybody would begin to dance. Sometimes they danced all day and all night. The weaker Indians would soon fall to the ground, but the others kept on leaping around and shouting their songs to the sky, where they thought the spirits were watching and listening. When night came some of the Indians piled logs on the campfires. The bright flames roared and climbed high in the air and made the camp as light as day. The dogs barked, the Indian children laughed and the dancers sang as loud as they could. At last the Indians were so tired they fell to the ground and slept there or crawled to their houses and went to bed.
p. 230
[paragraph continues] Sometimes the spirits gave them what they wanted. At other times they did not, for the good spirits did not always hear the Indians, so the medicine man said.
The Indians had a god they called the Great Spirit, who ruled all the other spirits, both good and bad. He lived somewhere up in the sky, where he could see all things that happened on the earth. He knew when a baby died. He saw every wolf on the prairie. He knew when it was going to rain, when a storm was about to come, when an Indian was going to get hurt and when a little ant fell off a leaf in the woods. He knew these things because he ruled everything on the earth and nothing could happen unless he wanted it to happen.
p. 231
The people of the Tejas country believed that when they died the Giver of Life took them to heaven, where they lived just as they had done on this earth but did not have the troubles they had here. They believed that they needed their bows and arrows for hunting up there in the sky. They thought that after they died they would need everything they used on the earth. Because of this they buried their people with all the things used and loved when they were alive. When a hunter died his family would put in the grave with him his clothes, his bow and arrows and his knife. When a little child died they would bury it with dolls or other things it liked to play with. When an Indian
p. 232
woman died they would bury her with her pretty clothes, beads, moccasins, necklaces and bone needles.
The Indians loved and worshipped the Great Spirit or Giver of Life. Some of the legends in this book tell how the Great Spirit brought help to the Indians when they were in trouble. The legend named "Why the Irises Hold Hands," tells how the Great Spirit grew angry and sent a flood upon some Indians who did not thank him for the good things he had given them. In the legend called "Kachina Brings the Spring" it is told how the Great Spirit sent down rain to the Indians after a little girl had burned her doll to please him.
We have seen how the Indians lived
p. 233
close to the animals and fish and birds and how much they knew about these little things that ran, swam and flew. We have found that the Indians believed in good and evil spirits and a Great Spirit who was most powerful of all. Now we know why the legends in this book tell us about these things. The Indians thought about them all the time, and because of that they put them into their stories. The legends tell us what the Indians thought about the world in which they lived.
187:* Wich´itas, Tom´kewas, Attak´apas, Karank´awas.
Next: Interesting Things to Do
|
global_05_local_4_shard_00000656_processed.jsonl/63906
|
Sacred Texts Oahspe Index Previous Next
Chapter XIII
1. LIKA spake before the Rapon hosts, saying: Behold, the hosts of laborers are allotted to their places.
2. Let us go about, and examine the earth and her heavens. It is proper that my surveyors measure her land and water, together with all the living thereon and therein, and especially as to every man and woman and child, and the time of maturity unto them, and the years of the generations of men.
3. And man that is brought forth out of the earth shall be numbered; and the grade of his understanding measured; and the nature of his desires and aspirations shall be ascertained; which reports shall be copied and sent into the Orian kingdoms, for the deliberations of the Chiefs, that they may determine as to the requirements of the earth, and as to the nature in which her roadway shall be strewn with either light or darkness for the ultimate perfection of her soul harvests.
4. And the heavens of the earth shall be measured, as to the spirits of the dead; and their grades shall be made out, together with their desires and aspirations; the lengths of the times of their bondage to the earth, and the places of their habitation, and the nature of their supplies. And a copy of such record shall be made and also sent to the Orian Chiefs for their deliberations.
5. And the plateaux of the earth's heavens shall also be numbered and measured, and their localities mapped out and recorded, and copies thereof also sent to the Orian Chiefs, that they may determine as to necessary changes therein and thereof.
6. During which time of my absence from Theovrahkistan, I appoint Havralogissasa as vice-Goddess in my place. How sayest thou, Havralogissasa? She said: Jehovih's will and thine be done. I am rejoiced.
7. Lika then called Havralogissasa to the throne, and commissioned her vice-Goddess of Theovrahkistan. And after this Lika gave instructions as to extending the capital, Yogannaqactra, and enlarging the places for reception of the higher grades; all of which were p. 487a duly provided with the persons to carry out the commands.
8. And now Lika spake to Ahura, saying: Behold, thou shalt return to thy kingdom, Vara-pishanaha, for when I come thither on my journey, I will resurrect thy hosts as Brides and Bridegrooms to the etherean kingdoms. Thy labor is well done; thy glory is the glory of thousands of millions! May the love, wisdom and power of Jehovih be with thee, now and forever!
9. Thereupon Ahura saluted, and was in turn saluted, when he advanced and met the marshals, who conducted him hence, to the arrow-ship, where he embarked and departed.
Next: Chapter XIV
|
global_05_local_4_shard_00000656_processed.jsonl/63911
|
TAG: business intelligence
Author user photo
Hadoop as the Source of Truth
Author user photo
Top Five Reasons to Adopt IT Operations Analytics
IT Operations Analytics solutions are emerging to redefine how IT operations maintain performance, availability, security and compliance. Here’s why you should adopt them.
Article Thumbnail
A Billing Guide for Your IaaS business
Article Thumbnail
Operationalizing the Big Data Buzz
This white paper discusses the maturation of Big Data, including why and how companies are utilizing it, associated challenges, popular uses cases and types of projects being implemented, including operational analytics.
More Articles
News You Can Use
Click here for news releases
|
global_05_local_4_shard_00000656_processed.jsonl/63915
|
Tutorial – Encryption And Decryption Using DESede (Triple DES) In Java
We learned how to do a DES Encryption /Decryption in Java in the previous tutorial. In this tutorial, we will extend our knowledge of DES Encryption to DESede also known as Triple DES.
Triple DES is the common name for the Triple Data Encryption Algorithm (TDEA) block cipher.It is so named because it applies the Data Encryption Standard (DES) cipher algorithm three times to each data block. Triple DES provides a relatively simple method of increasing the key size of DES to protect against brute force attacks, without requiring a completely new block cipher algorithm.
The standards define three keying options:
• Keying option 1: All three keys are independent.
Keying option 1 is the strongest, with 3 x 56 = 168 independent key bits.
Keying option 2 provides less security, with 2 x 56 = 112 key bits. This option is stronger than simply DES encrypting twice, e.g. with K1 and K2, because it protects against meet-in-the-middle attacks.
Keying option 3 is no better than DES, with only 56 key bits. This option provides backward compatibility with DES, because the first and second DES operations simply cancel out. It is no longer recommended by the National Institute of Standards and Technology (NIST) and not supported by ISO/IEC 18033-3.
In general Triple DES with three independent keys (keying option 1) has a key length of 168 bits (three 56-bit DES keys), but due to the meet-in-the-middle attack the effective security it provides is only 112 bits. Keying option 2, reduces the key size to 112 bits. However, this option is susceptible to certain chosen-plaintext or known-plaintext attacks and thus it is designated by NIST to have only 80 bits of security. (Information Source: Wikipedia).
The following diagram simplifies the working detail of Triple DES Algorithm.
Working of Triple DES Algorithm
Working of Triple DES Algorithm
In the following tutorial, we have used Keying Option 3, where all the keys are identical.
package com.kushal.utils;
import java.security.spec.KeySpec;
import javax.crypto.Cipher;
import javax.crypto.SecretKey;
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.DESedeKeySpec;
import sun.misc.BASE64Decoder;
import sun.misc.BASE64Encoder;
public class DESedeEncryption {
private static final String UNICODE_FORMAT = "UTF8";
public static final String DESEDE_ENCRYPTION_SCHEME = "DESede";
private KeySpec myKeySpec;
private SecretKeyFactory mySecretKeyFactory;
private Cipher cipher;
byte[] keyAsBytes;
private String myEncryptionKey;
private String myEncryptionScheme;
SecretKey key;
public DESedeEncryption() throws Exception
myEncryptionKey = "ThisIsSecretEncryptionKey";
myEncryptionScheme = DESEDE_ENCRYPTION_SCHEME;
keyAsBytes = myEncryptionKey.getBytes(UNICODE_FORMAT);
myKeySpec = new DESedeKeySpec(keyAsBytes);
mySecretKeyFactory = SecretKeyFactory.getInstance(myEncryptionScheme);
cipher = Cipher.getInstance(myEncryptionScheme);
key = mySecretKeyFactory.generateSecret(myKeySpec);
* Method To Encrypt The String
public String encrypt(String unencryptedString) {
String encryptedString = null;
try {
cipher.init(Cipher.ENCRYPT_MODE, key);
byte[] plainText = unencryptedString.getBytes(UNICODE_FORMAT);
byte[] encryptedText = cipher.doFinal(plainText);
BASE64Encoder base64encoder = new BASE64Encoder();
encryptedString = base64encoder.encode(encryptedText);
} catch (Exception e) {
return encryptedString;
* Method To Decrypt An Ecrypted String
public String decrypt(String encryptedString) {
String decryptedText=null;
try {
cipher.init(Cipher.DECRYPT_MODE, key);
BASE64Decoder base64decoder = new BASE64Decoder();
byte[] encryptedText = base64decoder.decodeBuffer(encryptedString);
byte[] plainText = cipher.doFinal(encryptedText);
decryptedText= bytes2String(plainText);
} catch (Exception e) {
return decryptedText;
* Returns String From An Array Of Bytes
private static String bytes2String(byte[] bytes) {
StringBuffer stringBuffer = new StringBuffer();
for (int i = 0; i &amp;lt; bytes.length; i++) {
stringBuffer.append((char) bytes[i]);
return stringBuffer.toString();
* Testing The DESede Encryption And Decryption Technique
public static void main(String args []) throws Exception
DESedeEncryption myEncryptor= new DESedeEncryption();
String stringToEncrypt=&quot;Sanjaal.com&quot;;
String encrypted=myEncryptor.encrypt(stringToEncrypt);
String decrypted=myEncryptor.decrypt(encrypted);
System.out.println("String To Encrypt: "+stringToEncrypt);
System.out.println("Encrypted Value :" + encrypted);
System.out.println("Decrypted Value :"+decrypted);
Here is the sample output:
String To Encrypt: Sanjaal.com
Encrypted Value :aArhqI25Y1SkYrdv9gxYDQ==
Decrypted Value :Sanjaal.com
7 Responses to Tutorial – Encryption And Decryption Using DESede (Triple DES) In Java
1. Minal says:
I would also like to know that if I am using cipher to encrypt the data, and encrypted data is stored in file/database. Next time when I decrypt the data do I need same instance of cipher which was used to encrypt the data (ofcourse with mode as decryption) or differnect instance created by passing same parameters can be used?
2. Minal says:
code to get cipher is
key = InternalSecretKey.getInstance();
//keyspec = InternalSecretKey.getInstance();
System.out.println(“Key is:”+key);
byte[] iv = new byte[]{
(byte)0x8E, 0×12, 0×39, (byte)0x9C,
0×07, 0×72, 0x6F, 0x5A
//byte[] ivBytes = null;
//IvParameterSpec iv = new IvParameterSpec(ivBytes);
//IvParameterSpec iv = null;
//ecipher = Cipher.getInstance(“DES”);
//dcipher = Cipher.getInstance(“DES”);
ecipher = Cipher.getInstance(“DES/CBC/NoPadding”);
dcipher = Cipher.getInstance(“DES/CBC/NoPadding”);
AlgorithmParameterSpec algparam = new IvParameterSpec(iv);
//IvParameterSpec iv = null;
System.out.println(” iv ====================” + ecipher.getIV());
//iv = new IvParameterSpec(ivBytes);
//IvParameterSpec iv2 = new IvParameterSpec(dcipher.getIV());
AlgorithmParameters algparamdecrypt = ecipher.getParameters();
ecipher.init(javax.crypto.Cipher.ENCRYPT_MODE, key, algparam);
dcipher.init(javax.crypto.Cipher.DECRYPT_MODE, key, algparam);
I tryed padding input stream before encryptin
byte[] padding = null;
byte padded[] = null;
if (null != fileData) {
System.out.println(“length of byte arrary before ency but before padding ” + fileData.length);
if((fileData.length % 8) > 0){
int offset = ((fileData.length % 8));
System.out.println(” offset is ” + offset);
padding = new byte[((8-offset) + fileData.length)];
System.out.println(“lenght of fileData is ” + fileData.length);
System.out.println(“lenght of padding is ” + padding.length);
System.arraycopy(fileData, 0, padding, 0, fileData.length);
for(int i = fileData.length; i < (fileData.length + (8-offset)); i++){
padding[i] = (byte)0xbb;
System.out.println(" padding " + padding.toString());
System.out.println(" fileData " + fileData.toString());
System.out.println("length of byte arrary before ency but after padding ==" + padding.length);
AesEncryptionDecryptionUtil endeUtil = new AesEncryptionDecryptionUtil();
byte[] fileDataEnc = null;
if(padding != null){
fileDataEnc = ecipher.doFinal(padding);
fileDataEnc = ecipher.doFinal(fileData);
System.out.println("Bytes encrypted:"+fileDataEnc.toString());
With this padding logic code might work for .txt, .doc and .xls. However if I want to ebcrypt pdf, image files or zip files what is to be done?
Thanking in advance
3. Send the code that you are trying to run, I will have a look at it.
4. Minal says:
This article is very helpful. I am trying to encrypt and decrypt using DES but getting following error
javax.crypto.BadPaddingException: Given final block not properly padded
I tried all possible ways but problem is not solved yet. I appreciate if you could hlep me in this regards
5. Raanan says:
Thanks for the post !!
I have 2 questions:
i. in your your example you wrote “…In the following tutorial, we have used Keying Option 3, where all the keys are identical.” – what make the code use option 3?
ii. if I have a byte array that is used to build a DESedeKeySpec instance, can I tell which length is the encryption key (168 or 112)?
6. Modha says:
Hello Kushal
I enjoyed reading your articles ( and jokes ) at sanjaal.
I have a question on encryption and decryption
will this work only on UTF-8?
I want to write a utility which encrypts a column in a database table.
Can I use this program to read string from a database table – encrypt it and – write it back.
Will it work if database in not in UTF-8, (I am trying to ask if it can encode some other charecter set like chinese or japanese)?
I am trying to learn what these charecter encodings mean, excuse me if my question are basic.
Hope to get a reply.
• kushalzone says:
Thank you Modha for enjoying my blogs at Sanjaal.
Yes, the program is capable of handling the other character sets like ASCII, UTF-16 etc. UTF-8 is the unicode format, so most probably the japanese or chinese characters will be in this Character Set.
If you know exactly what character set your database is using, you can pass that onto the getBytes () method as parameter, and do the encryption/decryption. The character sets will be defined while creating the database or database tables.
For example, if your database character set is UTF-16, you can modify the above program where it says
byte[] plainText = unencryptedString.getBytes(UNICODE_FORMAT);
byte[] plainText = unencryptedString.getBytes(“UTF-16″);
Or, if the character set defined is ASCII, you simply define the line as:
byte[] plainText = unencryptedString.getBytes(“ASCII”);
Also make sure you modify the following line accordingly:
keyAsBytes = myEncryptionKey.getBytes(UNICODE_FORMAT);
I hope it helps.
Leave a Reply
|
global_05_local_4_shard_00000656_processed.jsonl/63925
|
Forgot your password?
Researchers Create Short-term Memories In Rat Brains 114
Posted by Unknown Lamer
from the I-guess-I-really-am-a-terrorist dept.
Researchers Create Short-term Memories In Rat Brains
Comments Filter:
• by Anonymous Coward on Monday September 10, 2012 @11:01PM (#41295879)
I was going to suggest testing on politicians, one step up from rats.
• by Anonymous Coward on Monday September 10, 2012 @11:09PM (#41295929)
It certainly does sound as if you are an anomaly and a very interesting one at that. I'm sure the nearest university cognitive science department would be quite pleased to make your acquaintance, especially if you are willing to participate in a study of your ability. Seriously, get in touch with someone and tell them about this; it may provide a significant benefit for all of us.
• by nonsequitor (893813) on Tuesday September 11, 2012 @12:19AM (#41296293)
Yes, they know that the plaques impair brain function by inference, they don't understand how, because no one knows what a memory is. Face it, we know a lot about the physical structure of the brain, but we don't really know how it works. Asserting that we understand the process of memory because we know a few things about a disease linked to memory is false equivalence. It's equally disingenuous to suggest that knowing more about how memories are formed, stored, and accessed would have no practical benefit when trying to understand and treat diseases which affect memory.
• by ZeroSumHappiness (1710320) on Tuesday September 11, 2012 @08:59AM (#41298421)
Agreed. We currently devote how many years to creating people with knowledge? What if instead of taking 22, 26, 35 or more years to gain the necessary knowledge and experience to start up in a field you spent 18 years maturing socially and two hours downloading 100 years of knowledge and experience?
|
global_05_local_4_shard_00000656_processed.jsonl/63938
|
Paste your text to compare in the text box. We'll break it up into small fragments and scan the Internet for it.
Our free article checker is a tool that checks the web for plagiarism of your content.
Paste your text in the text box, then press the button.
You can also adjust the sensitivity of the search by using the slider bar.
Why is it broken?
API issues with Bing and Google. They stopped making it free. Sorry.
What does your tool do?
It checks your submitted source for direct plagiarism by splitting up the piece into small, distinct fragments. Then, using the search engine's API (official method), we scour Google, Google Scholar abstracts, and Bing and Yahoo (now, affectionately known as BingHoo) for appearance of these fragments then report the results to you across all these different sources.
Will it check the entire document or just part of it?
We scan your entire document. There is no trial or paid membership or registration required. Everything is 100% fully functional and 100% fully free.
Will you store my scan in your database?
No. Your submitted text fragments are only temporarily sent to the search engines for checking. They are then discarded.
What is your privacy policy?
We are required to forward your IP address to the search engines when you request a scan to be done. Your IP address is attached to every scan request's fragments as they're submitted. This is required information for the search engines to make sure no one is abusing their resources.
What do I do if someone's plagiarizing my content?
If you've found plagiarizers on the web, visit Google's DMCA page. You'll need this info for all 3 search engines. If you've found print plagiarism, visit the U.S. Copyright Office Web Site.
I scanned a student's paper and there were sentences that were plagiarized.
Plagiarism, like cheating, is handled as academic misconduct by most schools and universities. The severity of the plagiarism should be considered. For example, if there was a simple misrepresentation regarding a source, this might be dealt with differently than if there was, say, a fabrication of sources or multiple submissions from the same source.
Why was your tool broken for so long?
Google decided to start charging for usage to access to their search engine data through their API. They graciously offered up a whopping 100 queries per day for free. However, this site uses about 60,000 queries per day so we had to look at the paid option with Google's API. We then discovered that Google charged $5 per 1000 queries for access to their API which would mean that this tool would cost us about $300 per day to operate ($9300 per month). Of course, this isn't possible. We had to find a way to get the tool working without using Google's API and after 5 months, we finally found a workable solution. Thanks, Bing.
Things we are working on.
07/20/2010 (FIXED): The Bingers (Bing) is throwing false plagiarized positives in certain situations. We're trying to find out why. For example, we tried to scan a sentence. We also tried to substitute a different domain and it threw the same error. But it still threw out a false positive. We're still looking into it.
Free Online Plagiarism Checker
Search Engine Reports
Plagiarism Checker
Advanced Plagiarism Checker
Enter content by any one of the 3 methods below
Enter Text:
Enter URL:
Text File:
Modify your settings and create your report
Sensitivity: Less More
Select Engines: Search Google Search Bing
|
global_05_local_4_shard_00000656_processed.jsonl/63940
|
Virtual desktop infrastructures and the private cloud
The private cloud could help increase the popularity of virtual desktop infrastructures, but the complexity of DaaS requires a standardized approach. Can you manage it?
When discussing virtual desktops with customers and consultants, I often get asked, "What about hosting my desktop
infrastructure in the cloud?"
This question can lead to an entire conversation about how enterprises need to consider many factors before using a desktop in the cloud, but the cloud computing most people are referring to is the public cloud, also known as the hosted cloud model. However, the private cloud is where many organizations will see virtual desktop infrastructure becoming more prevalent.
Although the private cloud vs. public cloud debate continues, for the sake of this article, the private cloud is where an organization maintains a standardized stack of technology that can be managed from an operational perspective. For example, VMware's vBlock, Cisco EMC or ICI's vCube are considered private cloud enablers. The biggest concepts to grasp regarding virtual desktop infrastructure (VDI) or Desktop as a Service (DaaS) are standardization and operationalization.
When a private cloud is created for DaaS, many technologies and workflows need to be standardized, including:
• Virtualization: Citrix, VMware and Microsoft are the three largest vendors that have a stake in the hypervisor for virtual desktops today.
• Virtual desktop (connection broker): The connection broker needs to be robust and scalable to handle an environment of any size.
• Storage: Storage can be the largest bottleneck in a VDI deployment, especially when it comes to standardizing for a private cloud. It needs to be a robust, high-performing, scalable architecture to allow for multiple uses, including Windows file sharing, iSCSI or Fibre Channel logical unit numbers, template management, snapshots and much more.
• Server: The server often doesn't receive as much thought as it should. This is because the discussion around scaling up vs. scaling out often determines the type of server to build the cloud upon. Blade servers are making a huge push because density is a major driver for VDI, and blades can allow for that density in a smaller footprint.
• Network: Networking is -- and always will be --- the glue that makes the technology stack function. Recent advances have made 10 GB Ethernet/iSCSI an affordable solution, enabling the private cloud to be a more cost effective model while allowing for the consolidation of the networking components.
• Monitoring: Until recently, desktop monitoring wasn't a real concept, and therefore it is often forgotten about. But with the introduction of virtual desktops and organizations standardizing their processes, being proactive with desktops allows for simplification of the help desk portion of the service desk.
Developing a virtual desktop infrastructure in a private cloud can be complex because of all the pieces that build the underlying stack. And once this technology stack is built, the real work begins. IT administrators must create operational procedures that enable the private cloud to function as a service offering and not be managed as a one-off situation every time. This situation will present opportunities for the major VDI vendors to differentiate themselves. To create a true DaaS offering, a VDI environment needs a solid management framework, and the battle for this has just begun.
This was first published in April 2010
Dig deeper on Virtual desktop infrastructure and architecture
Forgot Password?
Your password has been sent to:
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.