id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_05_local_4_shard_00000656_processed.jsonl/84436
|
Re: Semantics of HTTPS
From: Adrien de Croy <[email protected]>
Date: Tue, 07 Aug 2012 07:33:35 +0000
To: "Yoav Nir" <[email protected]>, "Willy Tarreau" <[email protected]>
Cc: "Mark Nottingham" <[email protected]>, "[email protected] Group" <[email protected]>
Message-Id: <eme2c78b8b-488c-4f99-ae07-beacba174e38@reboist>
From: "Yoav Nir" <[email protected]>
>I don't think this is actually getting rid of them. It really depends on how you define "MitM". If a user connects to facebook, they naturally expect their traffic to go straight to facebook, and if notice the little padlock icon, they expect this connection to be confidential. They don't expect third parties to be reading this, so any third party that does is a MitM.
We don't really expect that it will get rid of MitMs, since if someone
has a working MitM, they will likely keep it, at least for as long as
it is still useful (which will be the case until GET https:// is
The proposal does change a couple of things though.
1. It makes it easier to implement. It's much easier to implement
support for GET https:// than it is to implement interception of TCP
connections to a SSL endpoint that has to spoof certificates.
-> fewer nasty side-effects, probably better user experience, lower
customer (operator) support burden.
2. It provides a viable alternative to development of another MitM
solution, presuming client support is adopted quickly enough.
With the current MitM situation, as you say the error condition is one
of failure to validate a certificate.
There's no way for the browser to recognise that the certificate issue
is relating to a MitM. Therefore it can only display a generic error,
of the kind that is more likely to be lumped in with others, and trains
users to ignore it.
With our proposal however, the client can know what's going on.
I think there could be some refinements to provide even better
information, such as
* the proxy passing back cert of server as Base64 encoded Server-Cert
header or something, so that the client has an opportunity to do its
own cert validation. This of course presupposes trusting the proxy.
* Some way to fail a CONNECT request in a way that tells the client it
must use proxied https for that site.
We could even ameliorate MitM with a few things. Like a BCP for it,
doing things like
* mandate spoofed certificates to include an attribute marking
themselves explicitly as spoofed for the purpose of content inspection.
But we can't keep our heads in the sand. The more sites move to SSL,
the more pressure comes on intermediary vendors to provide solutions.
>Whether you configure a sniffing CA, or a "trusted proxy" makes no difference. Making it part of the protocol makes no difference, because the user's privacy is not affected by whether the proxy behavior is "standardized" or a "hack". The implications are the same.
>The proposal that Stephen mentioned was rejected by TLS was not intended to make privacy better or worse than the current situation, not does it change the implications of having a MitM. This proposal also does not change things.
Received on Tuesday, 7 August 2012 07:34:22 GMT
This archive was generated by hypermail 2.2.0+W3C-0.50 : Tuesday, 7 August 2012 07:34:28 GMT
|
global_05_local_4_shard_00000656_processed.jsonl/84440
|
Re: Referring to resources in RDF attributes
From: Brian McBride <[email protected]>
Date: Wed, 18 Apr 2001 18:17:38 +0100
Message-ID: <[email protected]>
To: Graham Klyne <[email protected]>
CC: RDF comments <[email protected]>, RDF core WG <[email protected]>
Thank you for raising this issue. I have added it to the issues list
Graham Klyne wrote:
> A possible RDF issue?
> I recognize RDF core WG is not strictly chartered to make changes to the
> RDF syntax, but there is a small change that I think could greatly enhance
> usability of RDF, if it doesn't break any other rules.
> Currently, resource identifier values specified in attributes such as
> "about", "resource", "aboutEach" and "type" are specified as
> URI-references. The same resources used in element or attribute names are
> specified as Qnames.
> I have for some time assumed that there is a good reason for Qname syntax
> to be unavailable in attribute values but I recently noticed another
> specification that allows interpretation Qnames in attribute values, which
> leads me to question my assumption.
> In the CC/PP specification [1] examples, DTD entity definitions are used to
> make such attributes more readable, but this has been criticized as being
> incompatible with future directions for XML. It would be so much easier if
> Qnames could be used here. I have noticed similar complications in other
> examples of RDF.
> So, what would be the possible problems of allowing Qnames in the RDF/XML
> syntax for the attributes mentioned?
> (a) does it break any assumed processing models? I don't think so, but I'm
> not certain about this.
> (b) how does one distinguish between a Qname and a 'bare' URI-reference
> (the bare URI form MUST be allowed for backward compatibility)?
> Here's a simple example of the kind of thing I am thinking of:
> Current RDF syntax:
> xmlns:rdfs="http://www.w3.org/1999/PR-rdf-schema-19990303#">
> <rdf:Description about="http://www.example.org/Set">
> <rdf:type
> resource="http://www.w3.org/1999/PR-rdf-schema-19990303#Class"/>
> <rdfs:subClassOf
> rdf:resource="http://www.w3.org/1999/PR-rdf-schema-19990303#Container"/>
> </rdf:Description>
> </rdf:RDF>
> Using Qnames:
> xmlns:eg="http://www.example.org/Set">
> <rdf:Description about="eg:Set">
> <rdf:type resource="rdfs:Class"/>
> <rdfs:subclassOf rdf:resource="rdfs:Container"/>
> </rdf:Description>
> </rdf:RDF>
> #g
> --
> [1] CC/PP draft <http://www.w3.org/TR/CCPP-struct-vocab/>
> Graham Klyne
Received on Wednesday, 18 April 2001 13:17:44 EDT
This archive was generated by hypermail pre-2.1.9 : Wednesday, 3 September 2003 09:35:03 EDT
|
global_05_local_4_shard_00000656_processed.jsonl/84441
|
PERef to empty Entity in AttDef
Date: Wed, 07 May 1997 18:42:43 +0200
Message-ID: <[email protected]>
To: [email protected]
So I have managed to fold and strech NXP so that it can
handle (multiple) PERefs of the form "" in AttDef's.
Looks like I can now parse both the old as well as the
new DuckBook DTD.
Fact is however, I believe, that there is still no agreement on
whether we (want to) allow that, or not.
Any clearification is appreciated. I am somewhat
reluctant to release a version of NXP which contains
a "feature" that I have to take away later on.
FYI: Michael McQueen posted a Lex/Yacc solution.
I could not really use it in my case because
my general approach is a different one. However,
it made me step back and look at it again, and ..
it was fruitful. Sometimes the obvious is *too*
obvious .... Thanx for the wakeup call ;-) !
Best regards,
Norbert H. Mikula
= mailto:[email protected]
= http://www.edu.uni-klu.ac.at/~nmikula
Received on Wednesday, 7 May 1997 12:41:39 EDT
This archive was generated by hypermail pre-2.1.9 : Wednesday, 24 September 2003 10:04:31 EDT
|
global_05_local_4_shard_00000656_processed.jsonl/84442
|
Webbib Online Library
From: Craig Wills ([email protected])
Date: Thu, Jul 15 1999
From: Craig Wills <[email protected]>
Message-Id: <[email protected]>
To: [email protected]
Date: Thu, 15 Jul 99 15:03:39 -0400
Subject: Webbib Online Library
Web Characterization Group -
While this is not specific to web characterization, it includes a
number of papers from the area. I hope it is a useful resource to the
- Craig
The Webbib digital library (http://www.cs.wpi.edu/~webbib/) is an extensive
online bibliography of literature relevant to distributed systems topics as
they relate to the World Wide Web. The core bibliography currently
contains over 350 Web-related papers (over 1600 total papers) from Systems,
Networking, Internet/Web and Performance journals/conferences. Particular
topics of interest are network protocols, caching architecture, cache
replacement, cache coherency, characterization of the Web and Web
In addition to typical bibliographic information, most bib entries contain
an online link to the contents of a paper, its list of references, and a
list of papers that reference it. Bibliographic information is used to
create author lists and determine reference counts for individual papers
and authors. This analysis allows influential work to be identified.
The library is maintained in a semi-automated manner by tracking sources of
information (conferences/journals) for new articles. This approach results
in a library that is relatively complete in its contents and timely in its
We make Webbib available as a resource to researchers and practitioners
in the field. Any comments or suggestions concerning the library,
particularly cases of missing information (online links to paper contents)
or relevant references. The focus of Webbib is on journal and conference
papers with technical reports generally appearing only if they are
frequently cited by other papers.
- Craig Wills
Associate Professor
Computer Science Department
Worcester Polytechnic Institute
100 Institute Road
Worcester, MA 01609
|
global_05_local_4_shard_00000656_processed.jsonl/84443
|
Re: question
From: Henry S. Thompson <[email protected]>
Date: 07 Jul 2001 15:05:32 +0100
To: Eddie Robertsson <[email protected]>
Cc: jane cho <[email protected]>, [email protected]
Message-ID: <[email protected]>
Eddie Robertsson <[email protected]> writes:
> "When an XML processor recognizes a reference to a parsed entity, in
> order to validate the document, the processor must include its
> replacement text. If the entity is external, and the processor is
> not attempting to validate the XML document, the processor may, but
> need not, include the entity's replacement text. If a
> non-validating processor does not include the replacement text, it
> must inform the application that it recognized, but did not read,
> the entity."
> Since both XSV and XML Spy validate this without any errors I guess
> the XML processor they're using resolves the external entity without
> actually doing any validation. Correct?
Correct for XSV.
> On the other hand if I run this with MSXML4 I will get an error
> because the external entity is only resolved if DTD validation is
> used and if DTD validation is used I will get errors because the DTD
> dosn't contain any element declarations. So, in conslusion, if I
> want to be able to use external entities in this way together with
> XML Schema that should work on all processors then the DTD must
> contain all the element/attribute declarations.
> In my example this would be:
> physicaladdress.xml
> <!DOCTYPE PhysicalAddress [
> <!ENTITY street SYSTEM "street.xml">
> <!ELEMENT PhysicalAddress (Street, State, Country)>
> <!ATTLIST PhysicalAddress xmlns:xsi CDATA #IMPLIED
> xsi:noNamespaceSchemaLocation CDATA
> <!ELEMENT Street (#PCDATA)>
> <!ELEMENT State (#PCDATA)>
> <!ELEMENT Country (#PCDATA)>
> ]>
> <PhysicalAddress xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
> xsi:noNamespaceSchemaLocation="PhysicalAddress.xsd">
> &street;
> <State>NSW</State>
> <Country>Australia</Country>
> </PhysicalAddress>
> Is this a correct understanding on my part or have I missed something?
I think so. It was certainly intentional on my and Richard's part
that XSV does _not_ validate the instance, since the REC does _not_
require validated infosets. An invalid document does _have_ an
infoset, whereas an ill-formed one does not.
I note you could just use the so-called 'Waterloo' DTD -- one which
uses ANY for the model for all the elements.
> [1] http://www.w3.org/TR/2000/REC-xml-20001006#include-if-valid
URL: http://www.ltg.ed.ac.uk/~ht/
Received on Saturday, 7 July 2001 10:05:32 GMT
|
global_05_local_4_shard_00000656_processed.jsonl/84476
|
Stereo & Electronics - Radar or the "Cloak Unit" (that screws up radar gun)?
07-17-2002, 07:41 PM
What is the best detector on the market? Are those radar detectors that disperse the cops signal guns worth the money? Do they really work?Do they really make your car undetectable to the radar guns?
07-17-2002, 11:23 PM
One of my good friends is an officer for a local department and ive asked him about this. I'm not sure about your state but here in cali they are illegal. Even if it does succeed in scrambling the signal the officer will have an insentive to pull you over because his radar gun will return an error and that in itself will make the officer suspicious. Radar/Lidar detectors however are legal.
07-18-2002, 04:37 AM
I have a K40 undetectable with the single antenna. It ROCKS!! Always saves my ass and all that "shows" is one red LED.
07-18-2002, 10:03 AM
here in florida those scramblers are legal...but does your officer friend say that they really work?
07-20-2002, 11:30 PM
I remember back in 84 I was using a kustom signal kr-10 x band traffic radar from a stationary position. I had a car come around a curve about 1.5 miles from me and I had a fuzzy doppler tone and some big numbers then all of the sudden it cleared up and became strong with a speed reading of 55 which was the posted limit on that stretch of road. That car immediately pulled over and turned around and left my jurisdiction. I'm positive that whoever they were they had a jammer and it worked quite effectively. I'm also sure that they figured out that whoever was running that radar had figured that out as well which is why they hauled butt the other way. It's hard to say how effective a jammer would be against k or ka band radar without doing some tests.
07-21-2002, 12:28 AM
I had a black widow unit.... never tested it with a cop but i never got a ticket in the 4 months it worked.... then winter came and it broke... much like my bel 915R radar detector...
07-25-2002, 08:41 PM
where might i get a cloaking device for a reasonable price?
07-27-2002, 12:00 AM
Not sure about other states, but here in Georgia most police agencies have "instant-on" radars. That means the officer has a button he pushes that temporarily stops the radar antenna from sending anything.When a car comes into range, he simply pushes the button and up pops your speed.Many officers,(including ones I know) <img border="0" title="" alt="[Wink]" src="gr_images/icons/wink.gif" /> can almost have your speed locked in before your radar detector goes off.Lidar (lasers) are also another hard to beat detection device used around here.As for the jammers, most of the newer radar units have an RFI (radio frequency interference) light that will come up when the radar is picking up a funky signal.That lets the officer know something is messing with the radar beam.FYI!!! <img border="0" title="" alt="[Cool]" src="gr_images/icons/cool.gif" />
08-02-2002, 10:14 PM
Don't waste money on trying to jam radar, just go ahead and buy a Valentine 1 and be done with it. Won't die in winters and is UNBELIEVABLE on the highway. I have seen up to a 2 mile range in the past!
08-02-2002, 11:54 PM
Yeah, I get similar range with my K40. Look into a K40 if you don't want something in your window or on your visor.
As far as the instant on, it still emits a signal that is picked up by good radar detectors. It is emitting the signal before he "clocks" you and you should have slowed down by then.
|
global_05_local_4_shard_00000656_processed.jsonl/84478
|
View Single Post
Old 09-29-2000, 02:14 AM #12
Join Date: Jul 2001
Location: Corpus Christi
Posts: 2
If you really want to come up with a super weapon to use against the Vong, think logically. If they use biological equipment, what are they most vulnerable to? A Virus. Come up with some horrible thing that kills them off. (Return of the Krytos virus maybe? They could take Coruscant and when they're reducing the planet's cities to rubble they expose some hidden water reserve that hadn't been purified of the virus...) Just an idea...
The thing about the Ion cannons is that it's too easy. Think of all the battles the New Republic and even the Empire have fought against the Vong. Surely SOMEONE must've fired they're Ion cannons before. At Ithor maybe? When ALL those ships were there?
Just my two cents...
Rogue 9's words of wisdom
roguenine is offline you may: quote & reply,
|
global_05_local_4_shard_00000656_processed.jsonl/84519
|
Subject: Re: pkg/36863: mk/emulator/ syntax problem on NetBSD 3 ?
To: None <,,>
From: Johnny C. Lam <>
List: pkgsrc-bugs
Date: 08/30/2007 16:30:03
The following reply was made to PR pkg/36863; it has been noted by GNATS.
From: "Johnny C. Lam" <>
Date: Thu, 30 Aug 2007 16:29:55 +0000
On Thu, Aug 30, 2007 at 09:50:00AM +0000, [email protected] wrote:
> >Description:
> Recent changes to the netbsd-compat stuff (and EMUL_DIST maybe)
> have resulted in lintpkgsrc (on a NetBSD 3.0 system)
> generating messages like ...
> /usr/pkgsrc/emulators/compat12/Makefile: Cannot locate /usr/pkgsrc/emulators/${DISTNAME:C/-.*//}/ in . /usr/pkgsrc/emulators/compat12 /usr/pkgsrc/emulators/compat_netbsd
> Each of the emulators/compat* packages is doing that.
> >How-To-Repeat:
> Try lintpkgsrc -p on a NetBSD 3.0 sysyem (I'm using pkg_comp
> with libkver and the original 3.0 sets installed to simulate that)
> and just watch.
> >Fix:
> ?
> Random guess is that perhaps something is relying upon some
> make behaviour that didn't exist (or work) in NetBSD 3.0
No, the bug is actually in lintpkgsrc, which has its own makefile
parser. I'm loath to change compat_netbsd/Makefile.common just to
satisfy lintpkgsrc or pkglint (actually, I'm not even sure how to
rewrite that line so that lintpkgsrc or pkglint can understand it).
I did it once for the suse32_* packages already, but I wasn't happy
about doing it then, either.
I think this PR should be assigned to the pkglint maintainers.
-- Johnny Lam <>
|
global_05_local_4_shard_00000656_processed.jsonl/84521
|
To: Greg A. Woods <>
From: Ken Hornstein <>
List: tech-net
Date: 10/28/1997 01:01:33
>> With all due respect ... I've tried it both ways, and it _does_ make
>> a difference for me. But as always, YMMV.
>Ken I'd be interested in knowing if you've monitored for overruns and
>other errors during your tests.
Ummm ... I think that perhaps I made the impression that I did a thorough
scientific analysis. That's not the case :-)
Here's exactly what happened:
- I remember reading (I _thought_ it was in Steven's TCP/IP) that a lower
MTU would improve interactive response time. So I set it down, and
things _seemed_ better, but I didn't have any hard data.
- At a later date, I thought about it, decided that it really didn't make
sense, and I set the MTU back up in my PPP startup script, but I didn't
restart PPP.
- The next time I rebooted, I said, "why are my sessions so terrible in
response time?". I poked around, realized that I set the MTU higher
and forgot about it. I set it back down, and things started behaving
the way I remembered that they did.
That's it. Note that a couple of months passed between #1 and #2. However,
the fact that I noticed a difference when I had forgotten that I changed
it convinced me.
|
global_05_local_4_shard_00000656_processed.jsonl/84524
|
[Numpy-discussion] numpy all unexpected result (generator)
Dag Sverre Seljebotn [email protected]...
Tue Jan 31 08:14:24 CST 2012
On 01/31/2012 03:07 PM, Robert Kern wrote:
> On Tue, Jan 31, 2012 at 13:26, Neal Becker<[email protected]> wrote:
>> I was just bitten by this unexpected behavior:
>> In [24]: all ([i> 0 for i in xrange (10)])
>> Out[24]: False
>> In [25]: all (i> 0 for i in xrange (10))
>> Out[25]: True
>> Turns out:
>> In [31]: all is numpy.all
>> Out[31]: True
>> So numpy.all doesn't seem to do what I would expect when given a generator.
>> Bug?
> Expected behavior. numpy.all(), like nearly all numpy functions,
> converts the input to an array using numpy.asarray(). numpy.asarray()
> knows nothing special about generators and other iterables that are
> not sequences, so it thinks it's a single scalar object. This scalar
> object happens to have a __nonzero__() method that returns True like
> most Python objects that don't override this.
> In order to use generic iterators that are not sequences, you need to
> explicitly use numpy.fromiter() to convert them to ndarrays. asarray()
> and array() can't do it in general because they need to autodiscover
> the shape and dtype all at the same time.
Perhaps np.asarray could specifically check for a generator argument and
raise an exception? I imagine that would save people some time when
running into this...
If you really want
In [7]: x = np.asarray(None)
In [8]: x[()] = (i for i in range(10))
In [9]: x
Out[9]: array(<generator object <genexpr> at 0x4553fa0>, dtype=object)
...then one can type it out?
More information about the NumPy-Discussion mailing list
|
global_05_local_4_shard_00000656_processed.jsonl/84527
|
Benjamin Root ben.root@ou....
Sat Jun 19 12:38:07 CDT 2010
On Sat, Jun 19, 2010 at 8:18 AM, Matthew Brett <[email protected]>wrote:
> Hi,
> > I've pressed our lawyers to look for established cases and precedents
> > for use of undecorated trademarks in commentary and review, but for
> > the docs, which are part of our "product", I think the safe route is
> > to use MATLAB(R) as the Mathworks recommends. Quite frankly, I think
> > doing so also makes us look more competent and serious to our own
> > users.
> As far as I can see, it doesn't make any legal difference to the use
> of the term, whether you attach (R) to MATLAB or not.
> It's difficult to see how a phrase such as 'MATLAB file format' could
> be anything but nominative use:
> http://en.wikipedia.org/wiki/Fair_use_%28U.S._trademark_law%29
> http://www.publaw.com/fairusetrade.html
> and therefore fair use.
> I guess that you mean that putting (R) next to MATLAB in every use
> will make the Mathworks feel better and therefore less likely to sue,
> but it seems vanishingly unlikely to me that they would attempt this.
> For example, on the Sage home page:
> http://www.sagemath.org/
> we see an undecorated 'Mission: Creating a viable free open source
> alternative to Magma, Maple, Mathematica and Matlab.' - and this is a
> much more directly comparative use than we have.
> I think the best way is the way I suggested a while back; that is
> something on the lines of:
> These are readers for the MATLAB [1] file format. Blah Blah. The
> MATLAB file format specifies that...
> [1] MATLAB is a registered trademark belonging to the Mathworks inc.
> We use this trademark without permission from the Mathworks.. Our use
> of the trademark is not authorized by, associated with or sponsored by
> the trademark owner.
> (see http://www.publaw.com/fairusetrade.html).
> Putting (R) for the many mentions of MATLAB seems like overkill to me
> and conveys the impression that we are a bit scared of lawyers for no
> good reason, and thus makes us seem less competent than not doing so.
> On the other hand, sticking to MATLAB rather than Matlab is probably
> safer (http://www.publaw.com/fairusetrade.html again).
> Our only possible problem is that we also use 'matlab' as a module
> name. I can't imagine that this will exercise the Mathworks much, but
> it does mean we sometimes don't use 'matlab' in a nominative sense.
> If we want to avoid that, we'll have to rename the module to something
> like 'matfile'.
> I would also like to point out another possible source of issues. There
are times when we might compare a function's behavior against another
system, like MATLAB. While I don't recall an example in SciPy, I have seen
it in matplotlib's pcolor() functions. I wouldn't be surprised to see it
elsewhere, considering how we do try to cater for those moving from MATLAB.
> But - 'I am not a lawyer' (TM).
> "But I play one on the internet!" :-P
Ben Root
See you,
> Matthew
> _______________________________________________
> SciPy-User mailing list
> [email protected]
An HTML attachment was scrubbed...
URL: http://mail.scipy.org/pipermail/scipy-user/attachments/20100619/318d3d7d/attachment.html
More information about the SciPy-User mailing list
|
global_05_local_4_shard_00000656_processed.jsonl/84552
|
Drexel dragonThe Math ForumDonate to the Math Forum
The Math Forum Internet Mathematics Library
Welcome to PERTH: PEerless on EaRTH
Visit this site: http://www.iinet.net.au/~watson/
Author:Dave Watson
Description: Dave Watson's main interest is computational geometry, and he specializes in spatial interpolation. Books/software on Contouring (a survey of published bivariate contouring and interpolation methods), Tessellations, Spherical Tessellations, Isolines, Bivariate Approximation, Trivariate Isosurfaces, Embedded Time-Series, Natural Tree Structures. Links to Voronoi, hydrology, geology, and environmental science resources, and a bibliography of Watson's publications.
Levels: Research
Languages: English
Resource Types: Articles, Books, Bibliographies, Topic Tools Miscellaneous
Math Topics: Computational Geometry, Symmetry/Tessellations, Ecology, Geology
[Privacy Policy] [Terms of Use]
© 1994-2014 Drexel University. All rights reserved.
|
global_05_local_4_shard_00000656_processed.jsonl/84567
|
Tags ››› Matthew Dowd
• Media have excuses for Sestak obsession, not reasons
BLOG ››› June 3, 2010 3:05 PM EDT ››› JAMISON FOSER
Long after many reporters insisted that if only the White House revealed whether Joe Sestak was offered a job the story would go away, reporters are getting ever-more-creative in their attempts to justify covering what is quite clearly not a scandalous act. Two excuses dominate: The Obama camp's promise to be more ethical than predecessors, and its promises of transparency.
Marc Ambinder (who, I should note, has been good about making clear that there's no legal issue here) explains the first:
First of all, every incoming administration promises to be more ethical than its predecessors. Remember George W. Bush's pledge to "restore honor and integrity to the Oval Office"? Despite that pledge, reporters could barely pretend to care when Bush's administration outer a covert CIA operative, or when they tried to turn U.S. attorneys into opposition researchers with the power to issue indictments. Despite that pledge, reporters had to be dragged kicking and screaming to (briefly) cover evidence that the Bush administration had lied its way into war. And despite that pledge, reporters certainly didn't care when Karl Rove reportedly offered someone a job to get him to drop out of a campaign.
But things are different now: The Obama administration may have offered someone a job to get him to drop out of a campaign! Oh. Wait…
Second: It's one thing to say the White House promised a higher level of ethical excellence and should be held to that promise, and another to invent, after the fact, ethical transgressions that have never before in the history of the republic been considered ethical transgressions. Yes, the Obama team said they'd be ethically excellent (as does every incoming administration) and yes, they should be held to that promise (as should every administration.)
But that has nothing to do with offering Joe Sestak a job, because offering Joe Sestak a job is not ethically suspect. (It may be politically suspect, but that's a different kettle of fish.) Nobody considered it ethically suspect when previous presidents did it, and nobody has explained why it should be considered ethically suspect now. It's like criticizing Obama for failing to live up to his promises of ethical behavior because he wears a blue shirt. It doesn't make any sense, because you haven't established that there's anything wrong with wearing a blue shirt.
The fact that nobody considered such job offers when previous administrations made them brings us to Matthew Dowd on ABC's This Week:
I think this issue is - it is - it is a political issue. And it does hurt his brand because he came to Washington and said I'm going to change things. I'm going to do things differently. I'm not going to be like Bush and Cheney. We're going to do a whole new politics. We're going to bring people together. We're not going to do all - we're not going to politicize things. And then all of the sudden their excuse now in this thing, everybody does it, so we do it. That's a problem for his brand.
That would be a very good point, if the Obama White House was currently saying "It's cool that we outted a covert CIA agent and lied our way into war, because the Bush administration did it, too." But that isn't what the Obama White House, or anyone else, is saying. What they're saying is that nobody complained when previous administrations of both parties did the same thing, because there's nothing wrong with it. That's quite different. It's the difference between "one person previously did it, and there was widespread outrage" and "everyone does it and nobody complains, because there's nothing wrong with it." The difference between "Yeah, I have brown hair; so does half the country" and "Yeah, I killed him and put his head in the freezer; so did Jeffrey Dahmer." Not the same. Different. Curiously, the implication of Dowd's criticism is that any time the Obama White House does something the Bush White House did, that's inappropriate. Curious, that is, coming from one of Bush's chief strategists.
Finally, there's the "they promised transparency" excuse. Yes, the Obama campaign promised transparency. No, that was not a promise to reveal every word of every conversation everyone ever has in the White House. No, nobody thought that's what it meant at the time. The tendency of some reporters to invoke the transparency pledge, and to suggest that it has been broken, every time they want to know something is dishonest and in bad faith.*
These two justifications have something in common: they're all invoked to get around the sticky little problem created by the fact that there's nothing wrong with offering Joe Sestak a job. Rather than explain why it would be unethical to do so, reporters say "well, they said they'd be more ethical, so they should be." OK, fine: How haven't they been? What is unethical about offering Joe Sestak a job? Nothing. What's wrong with refusing to discuss details of a totally legal job offer? "Well … they said they'd be transparent!" OK, fine: Did anyone ever interpret that to mean they'd disclose all details of all job offers? Of course not.
These are not substantive criticisms of the White House. They are excuses to prolong the story. Those are the kinds of things you expect from the political opposition. Why are they coming from journalists?
* I'll happily retract that statement just as soon as anyone can point me to any comment made by Dan Balz or any other reporter in 2008 indicating that Barack Obama had pledged to make public every word of every conversation anyone acting on his behalf has with anyone about any job.
• Matthew Dowd blasts DADT: "Republican officeholders are so far out of step with this"
VIDEO ››› May 30, 2010 11:25 AM EDT ››› MEDIA MATTERS STAFF
From the May 30 edition of ABC's This Week:
Loading the player reg...
1 - 3 / 3
© 2014 Media Matters for America. All rights reserved.
|
global_05_local_4_shard_00000656_processed.jsonl/84578
|
Ritual Bath or Swimming Pool?
Jesus spit on the ground, creating some mud with his saliva; he then applied the mud to the eyelids of a beggar who had been blind since birth and told him to bathe in the Pool of Siloam. When the blind man did so, he could see (John 9:1–11). A few years ago, the Pool of Siloam where this miracle occurred was discovered in a Jerusalem excavation.a
Located at the southern end of the City of David (the oldest part of Jerusalem), near the outlet of Hezekiah’s Tunnel, the Pool of Siloam is now a must-see on any trip to the Holy City.
Ronny Reich and Eli Shukron, who are excavating the site on behalf of the Israel Antiquities Authority, have suggested that the Siloam Pool may have been a large public mikveh, or Jewish ritual bath. Not so, says Yoel Elitzur of The Hebrew University in a forthcoming article1: The Pool of Siloam, he says, was probably a public swimming pool!
Join the BAS Library!
|
global_05_local_4_shard_00000656_processed.jsonl/84581
|
Memory Beta, non-canon Star Trek Wiki
44,475pages on
this wiki
Talnot was a Bajoran who wrote several prophecies, including The Prophecy of the Final Days, which is one of the ancient texts.
In 2375, Winn Adami, when told by the disguised Skrain Dukat of the Rogath blight that had struck Relliketh, believed it had been foretold in a passage from Talnot's prophecy, "the land shall be poisoned by a great evil." (DS9 episode: "'Til Death Do Us Part")
In 2376, Lenaris Holem tried to think if the destruction of Sidau had been foretold in Talnot's prophecies. (DS9 novel: Bajor: Fragments and Omens)
Around Wikia's network
Random Wiki
|
global_05_local_4_shard_00000656_processed.jsonl/84583
|
Making a Chair That Does More
Image credit:
Niels Diffrient is an old-school industrial designer, best known for his Freedom Chair -- an ergonomic office chair that auto-adjusts to the user. Diffrient designed his chair after observing that most people never adjusted their chairs; he figured he might as well design one that did the task for them. In this TED Talk, Diffrient talks about how he got into chair design and discusses some of the technical challenges facing chair designers.
Discussed: dashing airplane pilots of the 1930s, drawing fantasy airplanes, where the girls are (apparently the Art Department), rediscovering romance by quitting your job, designing office chairs, how to use a chair, the romance of aesthetics, and your tailbone.
So sit back in your office chair (and I know you're sitting in one right now) and take a look:
In closing, aren't you glad I didn't title this post Sit Different or even Sit Diffrient? I was tempted. Sorely tempted.
More from mental_floss...
April 24, 2009 - 10:09am
submit to reddit
|
global_05_local_4_shard_00000656_processed.jsonl/84584
|
Template:Cub Scout Physical Fitness/req
From MeritBadgeDotOrg
Jump to: navigation, search
Mobile Menus: Cub Scouts - Boy Scouts - Varsity - Venturing
Belt Loop Requirements
Complete these three requirements:
3. Practice five physical fitness skills regularly. Improve performance in each skill over a month. Skills could include pull-ups, sit-ups, the standing long jump, the 50-yard dash, and the softball throw.
Sports Pin Requirements
1. Choose a form of exercise, bring your heart rate up to target, and keep it there for 15 minutes. Remember to warm up and cool down slowly.
7. Swim for a total of an hour over several practice periods, charting your time as you go.
Please report any issues with this page.
Mobile/PDA Main Menu - FAQ
Full size MeritBadge.Org
Personal tools
|
global_05_local_4_shard_00000656_processed.jsonl/84592
|
Many of the users of smart phones have a great concern with their phone’s battery….i.e because of continuous usage of data connections ( i.e GPRS, WAP etc.,) and WI-FI most of the charging in the battery gets completely drained off….
Everyone wants to owe a smart phone especially to play games, many want to log on to their fb account and get the updates regularly….
Especially for android users we have many apps which save most of our charging helping us to use our phones for a little more time..
I myself use an Android Phone ( Galaxy Fit ) and i have observed two apps to be working great for saving battery to a great extent.
1. Juice Defender
More than 7 million downloads so far….
Click here for download
2.Advanced Task killer
This app actually kills the background running apps on your smart phones….which use some part of the RAM even if the apps are not active….we can even set a timer to kill selected apps at regular intervals.
click here to download
Note* : Both the apps can be used simultaneously
Posted by
Mahesh ( MGIT ECE 4th yr )
About these ads
|
global_05_local_4_shard_00000656_processed.jsonl/84593
|
Java Programming
You are currently responding to the WTGOOG promotion.
Great deals and more!
January 20, 2012
Paperback, 672 pages
Other Formats
007163360X / 9780071633604
Your Price
List Price
Main description
Develop, Compile, and Debug High-Performance Java Applications
• Create custom classes, methods, arrays, and operators
• Control program flow using conditional statements
• Handle multithreaded, network, and I/O programming
• Learn new constructs in multithreading
• Incorporate enums, annotations, and autoboxing
• Recover from errors, input failures, and exceptions
• Use Java Swing to build lightweight GUIs and applets
• Cut development time using the collections framework
• Work with the latest Java libraries and utility classes
Table of contents
Chapter 1. Introduction to Java
Chapter 2. Arrays
Chapter 3. Classes
Chapter 4. Inheritance
Chapter 5. Object Creation and Member Visibility
Chapter 6. Static Modifier and Interfaces
Chapter 7. Nested Classes
Chapter 8. Exception Handling
Chapter 9. Java I/O
Chapter 10. Advanced I/O
Chapter 11. Enums, Autoboxing, and Annotations
Chapter 12. Generics
Chapter 13. Event Processing and GUI Building
Chapter 14. Creating Layouts
Chapter 15. Graphics and User Gestures Processing
Chapter 16. Collections
Chapter 17. Threads
Chapter 18. Blocking Queues and Synchronizers
Chapter 19. Callables, Futures, Executors, and Fork/Join
Chapter 20. Network Programming
Chapter 21. Utility Classes
Author comments
Poornachandra Sarang is a veteran Java programmer since Java’s 1996 inception. During the last 15 years, Dr. Sarang conducted many train-the-trainer programs, instructor authorization tests, and corporate trainings based on Sun Microsystems’ official curriculum. He has authored several books and journal articles on Java and various other allied topics. Dr. Sarang has been a regular speaker at many international conferences, including the recent JavaOne 2011. He is also associated with the University of Mumbai and a few other universities of repute as a visiting/adjunct faculty and Ph.D. advisor in Computer Science. Dr. Sarang is invited to deliver keynotes and technical talks in many international research and technology conferences. Besides Java coding, Dr. Sarang does some architecture work and is also well recognized in Enterprise Architecture space.
Copyright 2013 McGraw-Hill Global Education Holdings, LLC
Yes, I want to receive other special offer.
|
global_05_local_4_shard_00000656_processed.jsonl/84604
|
4:26 pm
Mon April 25, 2011
"Like a massive oil tanker listing into jagged rock": Bass saxophonist Colin Stetson
They're not calling it Honk Core... yet.
Saxophonist Colin Stetson, originally from Ann Arbor, has worked with Tom Waits, David Byrne, Sinead O'Connor, Arcade Fire, and TV on the Radio.
And sometimes he plays on a really, really, really big saxophone.
Stetson's bass saxophone, pictured above (and featured in the video below) is an impressive instrument.
And the sound, which NPR describes as "a massive oil tanker listing into jagged rock," is remarkable.
From the NPR story:
The sound that begins Colin Stetson's newest album is like a massive oil tanker listing into jagged rock, tearing away at the hull. In fact, it's merely Stetson's chosen instrument, the bass saxophone — and from those earliest notes, you realize the sheer power of the horn in the hands of a master.
"It's a beautiful, strangely fragile instrument — and capable of much, much power," Stetson tells Weekend All Things Considered guest host Noah Adams. Stetson acquired his saxophone about six years ago, but it's more than a century old.
"Back then, especially, they were made of soft metal," he says. "The mechanics of it are stretched out over a huge body, so any little ding, push, pull can set everything awry. It really relies on having perfect equilibrium."
Stetson co-founded Transmission (later, Transmission Trio) while still in college at the University of Michigan, where he earned a music degree.
His most recent album is New History Warfare, Volume Two: Judges.
|
global_05_local_4_shard_00000656_processed.jsonl/84609
|
Tuesday, 12 March 2013
Crock Pot Beef Tacos
I don't like to bang on about the weather. (That's your cue to stop reading now if you don't want to hear me bang on about the weather... just so you know.) But seriously, it's HOT! Record-breakingly HOT! I-wanna-cry-now HOT! Put-me-in-the-pool-and-make-me-a-mojito HOT! It's HOT!
We are experiencing a record-breaking (as I mentioned), 9th consecutive day of temperatures over 30 degrees C/86 degrees F. And I'm not talking just a teeeeny fraction over 30 degrees. No! Most of the time it's over 30 degrees by mid-morning and then climbs up to around 36 to 37 degrees C./ 96.8 to 98.6 degrees F. by early afternoon, only cooling down in the evening to around 24 degrees C./75.2 degrees F. when the sting of the sun is gone. I'm HOT! (And probably qualified to get a job as Chief Meteorologist at the B.O.M. after all that.)
Any Hooooo, over the past week or so I have barbecued and made salads out of anything that wasn't nailed down, trying to avoid turning on the stove or oven... my air-con is already panting. But, a week or so in to the heatwave, I was ready for a change. There are only a few things that make me lose my appetite and HOT! weather isn't one of them. So, spurred on by my stomach and my need for a Mexican food fix, I took my crock pot outside, plugged it in next to the well-used barbecue and at the end of the day had a delicious, slow cooked meal in the middle of a heatwave. Mexico is HOT!, right? They eat tacos in Mexico, right? So I'm not crazy, I'm just hungry... and HOT!
BTW: Did I mention it was HOT! ?
Crock Pot Beef Tacos
slightly adapted from Picky Palate
Serves 4-6
For the Beef:
2 Tablespoons extra virgin olive oil
2 medium onions, finely chopped
2 red capsicums, finely chopped
4 cloves garlic, minced
500g lean ground beef
1 teaspoon salt
1/2 teaspoon fresh cracked black pepper
1/4 teaspoon garlic salt
1 x 400g canned diced tomatoes
1/2 cup mild salsa
2 tablespoons lime juice
1 teaspoon ground cumin
1/4 cup chopped coriander, plus extra for garnish
spring onions, finely sliced for garnish
To Serve:
12 wholegrain flour tortillas
1 cup grated Colby cheese
avocado slices
pickled jalapenos
chopped coriander
Greek yoghurt
lime wedges
Heat a slow cooker on the low setting.
Place oil into a large frying pan over medium heat. Saute onion, peppers and garlic for about 5 minutes, stirring constantly. Add in beef, salt, pepper and garlic salt. Cook until browned. Transfer the mixture to the crock pot and stir in salsa and tomatoes, lime juice, cumin and coriander and stir to combine. Let cook on low for 2-3 hours or until ready to serve. Ladle into a serving bowl and garnish with chopped coriander and spring onions.
Serve in heated tortillas and top with grated cheese, avocado slices, chopped coriander, pickled jalapenos, a dollop of Greek yoghurt and a squeeze of lime juice.
1. Oh Jen. I understand you, the weather here at summer, is sometimes near 40C and it is hot, hot, hoooottt. You can survive, I know you can :P By the way, your tacos looks soooooooo yummy. It's been a long time since I made some!
2. I hear ya on the hot weather... it gets INSANELY hot here in the summers! But I'm actually ready for it, it's been cold too long! Send some of that heat to Texas! (Don't remind me I asked for that in July.)
These. tacos. Look amazing!!! I never, ever tire of a good taco.
3. Okay so how hot is it? The taco filling looks so flipping good. Sometimes when it's hot outside you actually benefit from something hot going in your body - so I heard. (Food I mean). wink, wink
4. I hear you! I'm Melbourne and I'm DYING. My new best friend is the squirty bottle and I just squirt it into the fan so I get misted with water :P
This looks so yummy though. I congratulate you on being able to cook in the weather.
5. Hey Gabrielle. You're right! I can DO this. Especially with some Crock Pot Beef Tacos in my tummy.
6. Ha ha Little Kitchie. Don't worry, by July I'll be whining about the cold!
Fortunately for us, tacos are good ANY time of the year.
7. Hehe Patty. Did I say it was HOT!? Are you sick of me whining about the weather yet? Good thing I had something hot going into my body to shut me up (now I'm blushing). *wink*
8. Thanks Sarah and fellow wilting flower. How good was that cool change today? I think I can actually breathe again. Your squirty bottle trick sounds like a plan - ingenious... Better get a patent on that. In this weather, I only cook so I can eat. It's amazing what lengths I'll go to for a taco.
9. I love tacos and love hot and spicy so this is a win-win for me! Thanks for sharing!
10. You're welcome Jessica. You can even had more chilli or other spices to your taste - it's a pretty flexible recipe. Enjoy!
11. Love the crock pot approach to the Tacos. Your photos are fantastic!
12. Thanks for stopping by Christoph. Crock pot tacos, my new obsession.
|
global_05_local_4_shard_00000656_processed.jsonl/84630
|
Tuesday, March 25, 2008
On The Edge Of My Seat...
.:Did I Pass? Did I Fail?:.
Dammit, I don't know!
I felt like I went through the wringer during my orals with Dr. Angeles, but the relief came that I got an A- from my last quiz. Even then, everything's up in the air.
I pray I got a B. I really do, because I can't afford to fail her class and take the subject again.
.:The Radio Bug. It Burns!:.
With each passing day, the allure of going back to radio just dominates me...
.:Finally, Something Happens!:.
Apparently, the Sumilao farmers and SMC are brokering a deal. Even though the specifics of this deal are still unknown at the moment, I have to say that it's about time a deal is being brokered.
Say what you want about the Catholic church, but I think it's good that Cardinal Rosales took it upon himself to really help make this possible. The farmers have suffered for far too long already. It's time they got what they deserved.
In the middle of the ZTE brouhaha, it's good the Sumilao farmers don't get neglected to the wayside.
No comments:
|
global_05_local_4_shard_00000656_processed.jsonl/84646
|
Tuesday, April 21, 2009
the case against marrying a scientist:
This conversation took place yesterday:
Keith: Hmmm?
(small voice)
It ages the skin.
Keith - It what?
It ages the skin.
Keith - Asian what?
Keith gives me a look.
But I have been looking sort of old lately.
Logic is a cruel bedfellow.
1. But you're still going to marry him, right? I mean, you made such a pretty picture and all.
2. Yes, I'll marry him but if he refuses to agree about the water I'm not going to look nearly as nice.
|
global_05_local_4_shard_00000656_processed.jsonl/84669
|
Export (0) Print
Expand All
Kinds of DLLs
This topic provides information to help you determine the kind of DLL to build.
Using Visual C++, you can build Win32 DLLs in C or C++ that do not use the Microsoft Foundation Class (MFC) library. You can create a non-MFC DLL project with the Win32 Application Wizard.
The MFC library itself is available, in either static link libraries or in a number of DLLs, with the MFC DLL Wizard. If your DLL is using MFC, Visual C++ supports three different DLL development scenarios:
• Building a regular DLL that statically links MFC
• Building a regular DLL that dynamically links MFC
• Building an MFC extension DLL, which always dynamically link MFC
If your DLL does not use MFC, use Visual C++ to build a non-MFC Win32 DLL. Linking your DLL to MFC (either statically or dynamically) takes up significant disk space and memory. You should not link to MFC unless your DLL actually uses MFC.
If your DLL will be using MFC, and will be used by either MFC or non-MFC applications, you must build either a regular DLL that dynamically links to MFC or a regular DLL that statically links to MFC. In most cases, you probably want to use a regular DLL that dynamically links to MFC because the file size of the DLL will be much smaller and the savings in memory from using the shared version of MFC can be significant. If you statically link to MFC, the file size of your DLL will be larger and potentially take up extra memory because it loads its own private copy of the MFC library code.
Building a DLL that dynamically links to MFC is faster than building a DLL that statically links to MFC because it is not necessary to link MFC itself. This is especially true in debug builds where the linker must compact the debug information. By linking with a DLL that already contains the debug information, there is less debug information to compact within your DLL.
One disadvantage to dynamically linking to MFC is that you must distribute the shared DLLs Mfcx0.dll and Msvcrxx.dll (or similar files) with your DLL. The MFC DLLs are freely redistributable, but you still must install the DLLs in your setup program. In addition, you must ship the Msvcrxx.dll, which contains the C run-time library that is used both by your program and the MFC DLLs themselves.
If your DLL will only be used by MFC executables, you have a choice between building a regular DLL or an extension DLL. If your DLL implements reusable classes derived from the existing MFC classes or you need to pass MFC-derived objects between the application and the DLL, you must build an extension DLL.
If your DLL dynamically links to MFC, the MFC DLLs might be redistributed with your DLL. This architecture is particularly useful for sharing the class library between multiple executable files to save disk space and minimize memory usage.
Prior to version 4.0, Visual C++ only supported two kinds of DLLs that used MFC: USRDLLs and AFXDLLs. Regular DLLs statically linked to MFC have the same characteristics as the former USRDLL. MFC extension DLLs have the same characteristics as the former AFXDLLs.
Community Additions
© 2014 Microsoft
|
global_05_local_4_shard_00000656_processed.jsonl/84680
|
Sunday, April 29, 2007
Israel's Judicial Despots
The Muqata blog doesn't shy away from lambasting the judicial activists of Israel's Supreme Court. Time after time, it never ceases to amaze me that the judicial oligarchy of Israel continues to rule over our citizens with an iron fist.
Just last week, we learned (officially) that Margalit Har-Shefi, the one-time girlfriend of Yigal Amir was in fact, not guilty, and was framed by Israel's prosecution and judicial establishment.
Public Security Minister Ami Ayalon, a former chief of the Shabak (General Security Service) who is currently running for head of the Labor Party, told a group of supporters this month that Margalit Har-Shefi did not know of Yigal Amir's plans [to murder PM Rabin]. "I know of this from intelligence [sources]; I was head of the Shabak," Ayalon told the audience in Ashkelon. "I know that she did not imagine that he would kill the Prime Minister. She was just a part of an insane situation."
Supreme Court Justice Mishael Heshin was heard saying he would "sock it to her" even before he had heard any evidence, and Parole Board Chief retired judge Eli Sharon refused to grant parole because Margalit did not express sufficient remorse. (INN and other Israeli news sources)
So Justice Cheshin wants to "sock it to you" if you happen to be on the right side of the political spectrum.
Don't worry, we received equal time from the Supreme Court's Chief Justice Aharon Barak as well.
Don't take The Muqata's word for it, here's what US Federal Judge Richard A. Posner has to say about Aharon Barak:
Many people find it hard to believe that Israel's judges can be so awful, just as many Israelis think that the elite black-shirted Israeli police YASAM shock troops are only used against "evil" settlers.
Israel's students received a taste of the YASAM last week when protesting about rising university tuition rates.
Remember: If you don't challenge the evil when it hits someone else, don't be surprised when they come after you, and there's no one left to stand by your side.
Wherever I am, my blog turns towards Eretz Yisrael
JoeSettler said...
Good thing you read JoeSettler last week to learn about Har-Shefi.
Anonymous said...
This comment is in response to your post of April 26.
I am a frequent reader of the Muqata and log onto it a few times a week. I am an American, slightly left of center, but not politically active. I am from a similar background to you, Jameel, though perhaps we view the world somewhat differently. I have always respected your point of view, though not always agreed with it.
When I read your posting and your reference to Rachel Corrie as you glibly posed in front of a bulldozer, quite honestly I didn't remember who she was. I had to google her name to remember the story.
I cannot begin to express my embarassment at your joke. RC may not have been a friend to your political outlook, but her death is not funny. She killed no one, stood up for what she believed in, though I don't personally agree with her, and died an innocent death. She was not a terrorist, though perhaps you might disagree. Making a joke of her death offends me as a liberal thinking person and as a Jew who believes in the sanctity of human life.
Joe Settler, whoever he is, went so far as to make a joke about pictures of RC after the bulldozer crushed her, and you seemed to go along with the joke.
I strongly suggest you stop and take stock of what you and your blog represent. Torah values do not dictate dancing on your opponents' graves, though once again I would point out this girl was an unarmed protester.
You should be ashamed of what you wrote, and this Joe Settler should stop and seriously think about who he is and what he represents.
I'm sure that with all your computer skills, you could figure out who wrote this, but if it's all the same, I would prefer to remain anonymous.
Jameel @ The Muqata said...
anonymous 5:58
I think you need to research a bit more on Rachel Corrie, her friends, and what plans they have for Israel. They are far from simple "opponents", and it's naive to believe that she was "just a simple unarmed protester."
I'll reply more to your comment a bit later. Feel free to drop me an email.
tnspr569 said...
It just gets scarier, Jameel...
JoeSettler said...
I have no problem with my joke.
Rachel Corrie got herself killed because she was trying to block bulldozers working to find and seal weapons smuggling tunnels.
Tunnels used to bring in weapons to attack and murder Jews.
She (along with her ISM sponsors) knowingly made herself an accomplice to terrorism. I have no sympathy for her choice to commit suicide as a human shield for terrorists.
I also recommend you google "ISM Mike's Place"
JoeSettler said...
Joe Settler, whoever he is
You have got to be kidding!
Ari Kinsberg said...
joe settler:
"Joe Settler, whoever he is
You have got to be kidding!"
actually, when i click on your name in the comments here, it does not work. so he may really have no way to know who you are.
JoeSettler said...
No Leftists Admitted (except Purple Parrot).
Lurker said...
This is a response to Anonymous (5:58 AM, April 30, 2007):
Rachel Corrie was an active member of the International Solidarity Movement/Palestine Solidarity Movement (ISM/PSM). The ISM/PSM is a viciously antisemitic network of anarchist and communist organizations that provide logistical and financial support for Palestinian terrorist organizations, including Hamas, Islamic Jihad, and the PFLP, as well as international terrorist organizations, including Al Qaeda. Many of their members are actual terrorist combatants. Among other things, ISM activists were involved in planning and executing the suicide bombing of the Mike's Place bar in Tel Aviv on April 30, 2003, which killed three people. They use their offices to hide wanted terrorist leaders. They have also been linked to Al Qaeda's mega-attacks in London on July 7, 2005, which killed 52 people. The ISM leadership has openly called for and declared their support for suicide bombings and other acts of terrorism against Israeli civilians and soldiers. If this is not enough information for you, you can find plenty more, all documented, at the Stop the ISM website.
Rachel Corrie was a savage hater of both Israel and America. (Here are some photos of her burning an American flag, while Palestinian children look on.) She was killed when she deliberately placed herself in front of an Israeli D9 bulldozer, out of the driver's line of sight. That bulldozer was removing wild brush from an area near the Gaza Strip's Philadelphia Corridor, in order to expose and provide access to one of the many underground tunnels in the area -- tunnels built by Hamas, Fatah, and other terror groups, and used for smuggling in weapons from Egypt to be used in terrorist attacks. Corrie, who actively supported these attacks, was attempting to prevent the destruction of the terrorist tunnels.
You are mistaken at best, and disingenuous at worst, when you proclaim that Rachel Corrie "killed no one": Corrie was an active member of a barbaric organization that facilitated, funded, and physically supported terrorist murder. I suppose you're correct when you say that she "stood up for what she believed in", inasmuch as she believed in murdering innocent Jews. But how dare you declare that she "was not a terrorist" and "died an innocent death"?! It is you, not Jameel or JoeSettler, who "should be ashamed of what you wrote"! With your words, you callously disparage the memory of countless innocent victims of terror -- the same terror that Rachel Corrie lived and died supporting.
Shame on you.
Jerry said...
I'm sorry to change the topic, but I DO have something to say about what you actually wrote in this post...
I have lived in Israel for only a number of months, but I have already heard more than enough bashing of Ahron Barak and his "judicial activism".
Let's get a couple things straight:
1) Israel does not have a constitution. For better or for worse, whatever you want to say about it, a constitution is not a tool that the judiciary in Israel has to work with (and that's probably more the fault of the religious and the RW than anyone else- but that's a separate issue...).
Therefore, any time there is a violation of human rights, it will take an "activist judge" to protect them. There is simply no legislation preventing the government from infringing on basic rights that every American takes for granted through the power of the Bill of Rights.
In the famous Kol Ha'Am case that came to the Israeli supreme court in 1965 (?) the Minister of the Interior shut down a newspaper, simply because he didn't like what it said! Such a thing is unacceptable [and I have a feeling that if you disagree, you'll end up on the wrong side of public opinion].
But what could the court do, there is no constitution that can protect the right to freedom of speech. So Chief Justice Agranat (a graduate of University of Chicago, for all those reading from overseas) wrote an opinion on which he relied on basic, universal rights of man. A person has the right to say what he'd like (obviously with specific limitations) and the government cannot prevent him from doing so.
Was Justice Agranat "activist"? Absolutely- but only in the literal sense of the word, that he was creating law because the Israeli Knesset refused to give it to him.
Barak has constantly said that if the Knesset is unhappy with any of his decisions, all it has to do is pass a law that goes against it, and the Knesset rules.
And this has happened on numerous occasions. However, what is even more prevelant is that the Knesset will then pass legislation that will conform with Barak's opinion (i.e. after Barak's famous decision called Epropim regarding interperatation of a contract).
Even more so, while the Knesset has recently (1992) passed two laws that do protect human rights, [1) Freedom of Occupation (as in what you work as- not the other kind discussed on this blog) and 2) The Dignity of Man] the Dignity of Man Law is purposely generic! It is a law that is passed to give a citizen rights, but it barely contains any rights (The right to privacy is an exception, maybe one or two more).
It is MEANT for Judicial interperatation, and that is what Barak has done. He's recognized many basic rights that people have, and has helped them make their way into this law.
If you disagree with the specific rights, or with their application, that is your right. And you're more than welcome to complain about how he's upheld the Tal law (which provides for an exemption from the army for those studying Torah) because it is unfair to those who don't study. You can also complain about how he upheld the legality of the West Bank fence (against the decision of the International Court of Justice).
However, if you disagree with his application of Judicial Activism, please don't delude yourself to think that there is no place for it at all in our wonderful country of Israel.
p.s. I really like your blog. I just think you're under-informed about this one issue...
Jerry said...
Sorry- I forgot about your Har-Shefi thing:
To think that there was a conspiracy to convict her is rediculous. The fact that the district court judge regrets convicting her makes no difference, as she is currently speaking based on emotion, when her original decision (which, had she not convicted her would have been overturned by the supreme court anyways) was based on the law.
The fact that Arutz Sheva can besmirch a respected Supreme Court Justice with an impeccable record by simply saying "was overheard saying" is a disgusting example of journalism, and of Lashon Hara. If they have a source for such a fact, it must be quoted. The fact that it isn't shows me that this is a fabrication of someone who has been writing about Har-shefi and her supposed innocence since the beginning.
Ironically, Har Shefi was convicted based on a law passed by Israeli Knesset that doesn't exist in other legal systems, and would not have be made up through Judicial Activism had it not been on the books.
The law is very clear that if someone knows that another is about to commit a felony, they must try to stop it.
The court determined that there was enough evidence that Har Shefi knew what Amir was going to try to do, and she didn't call the police, or even try to talk him out of it.
Jameel @ The Muqata said...
Jerry: Thanks for your comments! I'll respond later about Judicial Activism; how about about your point on Har Shefi.
I heard the exact same report on Reshet Bet and Galei Zahal -- not only Arutz7...and Ami Ayalon's report is rather daming, wouldnt you say? I'll post more after the news...
Anonymous said...
I guess you guys just don't get it.
Making jokes about your enemies crushed body under a bulldozer is just inappropriate. You didn't have to like her. But you do have to treat everyone with a modicum of respect-- some might even say kavod haberiot.
Don't like her, that's your privilege. But to make jokes about her death is beneath anyone who claims to be a religious Jew.
Trep wrote an intelligent post today about how a site such as his only attracts like minded readers because the more leftward leaning stopped reading a long time ago.
Posts that make fun of your enemies' dead bodies will have that effect.
Thank you to Lurker for writing an intelligent synopsis of the evils of ISM. I'm not a supporter of theirs.
I'm also not a supporter of jokes about the body of one of their members that was crushed by a bulldozer.If you don't understand that, then you've lost some of your humanity.
Go back and read what you initially wrote. Then ask how that looks to someone who might think differently than you.
By all means, support your cause. But don't forget who you are.
Joe, I know you'll have a snappy response, attacking me for what I just said. But Jameel, think about who you are. Aren't you above making fun of your "enemy's" crushed bodies?
JoeSettler said...
Abdul, a suicide bomber, blows himself up and goes up to Islamic Heaven.
At the gates he meets none other than Muhamad himself. Muhamad says to Adbul "I have good news for you and bad news. Which would you like first?"
Abdul says, "The good news of course".
Muhamad says (opening up the door slightly so he can peek), "There are 72 virgins in the next room waiting for you (and Rachel Corie too).
Abdul responds, "Alla Hu Achbar! But what is the bad news?"
Muhamad looks halfway down and responds, "Unfortunately we couldn't find all your body parts."
Jameel @ The Muqata said...
Anonymous: What was David give King Shaul to receive Michal's hand in marriage?
What do we do to Haman, his sons, his wife, and enemies of Israel on Purim?
Keep in mind what the picture was. It wasn't a mutilated body. It wasn't a body of anyone run over by a bulldozer. It was a pose to remind you of a (rather stupid) enemy of ours who was run over by a bulldozer.
Tell me, have you ever heard of the Darwin awards? Are they also against the "Torah way"
JoeSettler said...
Shmuely Boteach has a rather timely piece on evil people.
Anonymous said...
So sad.
"Joe-- I'll send you one by email (a post bulldozer RC shot). Not for this blog. :)"
"Klovs---Rachel Corrie--hahahahaha"
Of course, that evil wouldn't be the death of Rc. That evil would be your lack of sympathy for the loss of human life. I would have to say your point of view on your callous commentors' comments and your own lack of sensitivity reflects badly on all of you.
Don't be surprised when your opponents have no sympathy for you. I'm sure there's enough meaness to go around on both sides.
Joe Settler, I guess now I'm supposed to tell a cruel joke about someone from Yehuda and Shomron in response to your odd choice of humor, but alas I just don't have it in me.
Jameel, what did King David do to the messenger who came to gloat about Saul being dead?
I bid you all adieu, as this will be my last time on this blog.
Ari Kinsberg said...
"Don't be surprised when your opponents have no sympathy for you."
yes, israel's enemies are paradigms of the honorable foe.
JoeSettler said...
Don't be surprised when your opponents have no sympathy for you.
What a completely stupid remark to make on your part.
You obviously have no clue who our enemy is and what they do.
Why would I assume that my enemy who blows himself up in order to massacre little children would have sympathy for me?
Why would I assume that my enemy who targets, shoots and murders babies in their prams in a park would have sympathy for me?
Why would I assume that my enemy who kidnapped, tortured, mutilated and only then killed a friend of mine would have sympathy for me?
Why would I assume that my enemy who publicized that he ate from the dismembered body parts of killed soldiers have sympathy for me?
The only thing that you show is your complete ignorance as to the complete barbarianism of our enemy and their supporters who would have no qualms about murdering you and then making jokes about it.
That you might want, to get even, to even consider making cruel jokes on upright Torah Jews says more about you, than my making fun of brutal terrorists and their accomplices.
Perhaps I shouldn't make Hitler jokes too, because of the loss of his human life.
Lurker said...
Anonymous: What did King David do to the messenger who came to gloat about Saul being dead?
Are you comparing Rachel Corrie to King Saul??!
Anonymous said...
or to hitler?
Lurker said...
To answer your question more precisely, the messenger didn't come "to gloat about Saul being dead". He came to announce that he himself had killed Saul. David responded by asking, "How were you not afraid to put forth your hand to destroy God's annointed?", and then ordering the man's execution. He then proceeded to lament, "How are the mighty fallen!... Saul and Jonathan, who were beloved and pleasant in their lives, and were not separated [even] in death; they were swifter than eagles, they were stronger than lions..." (II Samuel 1).
I am at a loss to comprehend your analogy. Are suggesting that Jameel murdered Rachel Corrie? Do you think that she was "God's annointed"? Did you find her to be "beloved and pleasant in her life"?
Please, give it a rest.
tafka PP said...
Anonymous- just so you know, you are not alone on this blog in thinking that Jameel crossed the line with his tasteless joke. There was a time I might have responded in the same way as you did, but I've less energy to argue these days...
Apropos to that- Joe, I'm speechless!
JoeSettler said...
The you wouldn't appreciate this or here (and don't forget to read the comments).
Lurker said...
FYI: In order to fully understand why all the commenters on the LGF post were rolling on the floor so hysterically, it helps if you know that LGF had been referring to Ms. Corrie as "St. Pancake" for about three years, prior Indymedia's (quite serious) announcement of the Rachel Corrie Pancake Breakfast...
Anonymous said...
All week I've been puzzling over why none of you seem to find it inappropriate to make jokes about the crushing of a human being by a bulldozer, even if she was your enemy.
Of course, some people are just boors, and are insensitive. But you are religious , educated people, so let's assume you're not.
I think that the point is that most of you were educated in the Jewish religious system, where humanism and general (not religiously based) ethics were simply not taught, or were deemphasized (for example, western philosophy is not learned by most YU graduates).
Another possibility is that living in the territories, you have developed a them against us complex that causes you to demonize everything that you view as the opposition (and this girl obviously was an enemy).
Whatever the reason, I think you should know that your attitude toward this crushed girl is extremely alienating to anyone who doesn't hold your political point of view and are just reading this blog, or even for some who do hold your point of view. I'm not saying you need to like her. But your inability to understand why someone might find your joking offensive is definitely troubling.
Search the Muqata
Related Posts with Thumbnails
|
global_05_local_4_shard_00000656_processed.jsonl/84704
|
Names Searched Right Now:
Get email updates on Zuly
Gender: F Meaning of Zuly: "healthy, vigorous" Origin of Zuly: Short form of ZULMA, Arabic
Popularity: this week.
Zuly is the spunky short form of Zulma, and is commonly used on its own, often in the Latino community.
Famous People Named Zuly
Pop Culture References for the Name Zuly
|
global_05_local_4_shard_00000656_processed.jsonl/84711
|
My Year of Making.... #yearofmaking
Have you ever checked out Instagram? I've been really really enjoying it lately as a way to see what others are up to! I follow mostly makers and friends, and their photos of food, life, crafting, art, and nature never fail to inspire.... or make me hungry!
Last year my friend Miriam Felton participated in a Year of Making, where she captured an image of her daily works in progress.... she stated that her challenge wasn't to make, but to document and do it with intent.
1/365- For my next Craftsy class!
So, I thought, I can do that! I already make at least one thing a day! But I agree with Miriam, the documenting is the challenging part, for one thing, half of what I make is secret and I can't share it.... so expect a fair number of photos that don't show you much (like above and below)!
4/365- Unraveling to make a design BETTER!
I've decided that I get have my #yearofmaking be guilt free... I really don't need my making to be stressful, it's a release. So I'll be posting photos most days, but if I miss it because I'm at a family wedding, or sick in bed, or just forget that is ok! Cause it's my challenge! The last thing I need is more stress, right?
6/365- Starting an Artichoke French for my Girl!
So, follow along on Instagram or Twitter.... and should you decide to join in let me know, I'd love to see what you are making everyday too!
Aaaaand, you can see that by following along you get some pretty good sneak peeks of what is to come, right?
7/365- An idea!!!!
1. Ooh, I love 7/365! Whatever your idea is, keep going with it!
1. Promise! I am in the middle of some HUGE deadlines right now, and then it's next on my list!
2. Another Craftsy class? Yes please!
3. Happy 2104. I love following the Year of Making, and I like the secret process ones the best (like the unravel , above).
1. Happy Happy to you too Gale! I promise to document my frogging more for you : )!
4. I want to do 7/365!!!!!!
5. ok, you have inspired me. i've made Skywalker and Clarus twice ( one for a gift and one for me )
and now i am doing the Magpie KAL with you. This will be a great way to document my progress!
i may even start blogging again.
|
global_05_local_4_shard_00000656_processed.jsonl/84725
|
Antiwar Groups Fear Hawkish Cabinet
by Jason Ditz, November 20, 2008
As President-elect Barack Obama’s national security team begins to take shape, there is increasing disquiet among antiwar activists that his appointees and rumored appointees have thus-far, without exception, favored the Iraq invasion and held hawkish foreign policy positions.
The persistent reports that Obama is in talks with Secretary of Defense Robert Gates about keeping his position in the new administration had already prompted loud complaints that keeping him on was not in keeping with his campaign’s mantra of change. His apparent preference to make Sen. Hillary Clinton his Secretary of State, despite all the times he publicly trashed her position on the Iraq War during the primaries, has only added to those concerns.
But nowhere in Obama’s “Team of Rivals” cabinet is any suggestion of an appointee less-hawkish than himself, meaning his increasingly tenuous claim to being an antiwar politician will serve as the base-line for his administration’s foreign policy, with his cabinet pulling it in ever more bellicose directions.
Editorial director of Justin Raimondo says that “the likely appointment of Hillary Clinton as secretary of state should disabuse even the most brain-dead of Obama’s supporters that we won’t be seeing much change in American foreign policy. If I were an Iranian, I’d start digging a bomb shelter.”
Raimondo rather sees antiwar Republican Sen. Chuck Hagel as a much better fit for a key role, saying “that would be an unmistakable sign from the Obama camp that they really are nonpartisan.”
Kelly Dougherty, executive director of Iraq Veterans Against the War complains that “Obama ran his campaign around the idea the war was not legitimate, but it sends a very different message when you bring in people who supported the war from the beginning.
Last 5 posts by Jason Ditz
|
global_05_local_4_shard_00000656_processed.jsonl/84737
|
One of the best films I saw this year was (500) Days of Summer -- the indie unromantic comedy that followed Joseph Gordon-Levitt and Zooey Deschanel's 500 fun, terrible, and dysfunctional days together. It was one of those rare and perfect examples of how diverging from the well-worn cinematic path can be a true breath of fresh air. And now director Marc Webb is gearing up for his next feature, which still looks into the world of love, but this time with an entirely different tone.
The Hollywood Reporter posts that Webb is currently in negotiations to helm a remake of the Danish thriller Just Another Love Story. The original Ole Bornedal film only hit Sundance last year, but as we all know, time often means nothing in Hollywood. The film follows a crime photographer and family man who ends up in a traffic accident with a woman named Julia. When he goes to the hospital to see how she is, her now amnesiac self (and her family) assume that he is her new boyfriend. Eager for a new life, the guy decides to pretend she's right, which works until the real boyfriend finally flies in from overseas.
The description might have a mirth-filled bend to it, but this is a full-on crime drama/thriller. From Fantastic Fest 2008, Peter wrote that Bornedal's film "pushes quickly into dark dramatics and the fantasy of a mid-life crisis before circling back around to the territory inhabited by Jonathan Demme's Something Wild." Considering Summer how do you think Webb will do with Bornedal's film?
|
global_05_local_4_shard_00000656_processed.jsonl/84774
|
Tag Archives | categorization
Integration Matters
Wallace Stevens once said, “Perhaps the truth depends upon a walk around the lake”. Well, my own walk has been along a creek. But it did lead me to find my truth. And, my truth is this: Integration matters. Let me explain how that matters in this context. You might remember, I shut down my More
|
global_05_local_4_shard_00000656_processed.jsonl/84777
|
zoek een woord op, zoals dirty sanchez:
1 definition by Green Eggs and Stan
The abdominal burns you get from bacon grease because you frequently cook breakfast topless. It's the price you pay for being such a fucking man.
Some guys do it voluntarily like a cigarette burn. Others are just too fucking lazy to put on a shirt in the morning before cooking bacon.
Friend: Yo, what happened to your chest man?
You: You know how it is. I woke up and made grub and got some pork burns. #YOLO
door Green Eggs and Stan 29 augustus 2012
|
global_05_local_4_shard_00000656_processed.jsonl/84778
|
zoek een woord op, zoals guncle:
To be said with a deep southern accent, a phrase of agreement.
A pinch of dip in the bottom lip helps to get an authentic pronunciation.
Along the lines of hell yeah, fuck yeah, let's roll, etc.
Earl: Ey Will you comin to the party tonight?
Will: Yeahbo, I got me some catfish, lookin like its a fish fry kinda night
door xCMx 11 juli 2011
a phrase used instead of yeah bro
boy1- "ayy you wanna go to latenight tonight?"
boy2- "yeah bo! for sure"
boy1- "dayyuum! shes hot ayy!"
boy2- "yeah bo!!"
yeah bo
door fob_taktikz 9 maart 2010
|
global_05_local_4_shard_00000656_processed.jsonl/84820
|
Southern Chivalry: A Serious Topic for Today
Recently I spoke with a former Yankee gentleman who told me he did not believe there was a Code of Southern Chivalry. His reasoning was that until 1865 every Southerner was a slave owning racist 'ala Simon Legree, a fictional character in a propaganda novel commissioned for the singular purpose of creating antipathy, anger and hatred toward the South. It was, at the time of publication, advertised and promoted in the North and in Europe more than – FAR more than – than any other book written.
My friend's "vision" of Southern Chivalry bore a curious resemblance to Colonel Sanders or Burl Ives in "Cat on a Hot Tin Roof" for the "multitude" of rich plantation owners, and the "average" Southerners as in-bred toothless hillbillies playing the banjo (when not whipping or lynching slaves) and raised on a diet of white lightenin' and grits. [ed. note: I had my teeth capped, and I do like grits. I have them about once a decade. Never drank white lightenin'!]
Being a Southern gentleman (Lower case g for me - I have not yet achieved the Honor of the capital G. No, I'm not kidding), I respectfully agreed that we would disagree on that subject and move forward in the conversation. We did agree, however that slavery, anywhere, anytime and for any reason is an evil abomination. I wonder why it is still tolerated today in some countries? Or why it was tolerated in THE NORTH during 1861-1865?
One cannot discuss the South without dealing with the war that Lincoln claimed was started by Harriott Beecher Stowe. But if the only "version" of the war you've heard is "to free the slaves," then prepare for what they left out of the textbooks.
History was written by the winners and "inaccuracies" are voluminous! In the video section below, you will find information pertinent to "The Civil War" (a perfect misnomer) history that you probably have never heard or seen, esp. not from Ken Burns'. (This is merely the tip of the tip of the iceberg.)
If you disagree, please go argue with the experts. These are the facts as I've learned them, through a great deal of study and research and having the "qualifications" (below) taught to me by parents and grandparents. ( I have no skill for debate, so I will just delete any message re: this topic.)
Let me offer in contrast to Col. Sanders and "Big Daddy" Burl Ives, two, no, three contrasting and "real" people who are the epitome of Southern Chivalry:
George Washington. Yes, he was a Southern Gentleman. (No explanation needed.)
And Robert E. Lee (Click):
Contrary to the character that Martin Sheen "mis-played" in "Gettysburg:"
“Never had mother a nobler son. In him the military genius of America was developed to a greater extent than ever before. In him all that was pure and lofty in mind and purpose found lodgment. Dignified without presumption, affable without familiarity, he united all those charms of manners which made him the idol of his friends and of his soldiers and won for him the respect and admiration of the world. Even as in the days of triumph, glory did not intoxicate, so, when the dark clouds swept over him, adversity did not depress."
As to Jefferson Davis, the man MOST vilified and abused by the North, due specifically to the fact that he was an embarrassment to the North, for he would not relent nor apologize for his belief that freedom, liberty and self-determination, as stated in the Declaration of Independence, were true and just. Slavery was NOT the issue. Davis actually adopted a young black orphaned child and raised him as his own child with his other children. The slept in the same rooms, wore the same clothes, played, prayed and ate together. They were quite happy until after the war, when the Northerners took the child away from the family that loved him.
Davis also believed in bringing slavery to an end, but not by slaughtering 600,000 men, women and children. Davis believed that slaves should be educated and trained to live a this foreign land and be freed when they were ready and willing to become free. Had Davis' humane concepts been accepted by the North, then no one would have died, slavery would have ended and and Free Black Americans would've been socially and financially equal to whites. The same can be said of American Indians, who were treated as poorly by the U.S. govt. as Blacks.
"The invidious comparisons made between Davis and Lincoln during and after the war by certain foreigners further embittered Northerners. For example, William Howard Russell's published diary contained this unflattering contrast: "[ Davis] is certainly a very different looking man from Mr. Lincoln. He is like a gentleman." Or consider the remarks of Percy Greg whose "Tribute to Confederate Heroes" appeared in 1882. He praised Davis as having more "moral and intellectual powers" than any twenty Federal statesmen, and a man vastly superior in every way to "the 'rail-splitter'. . . whose term, had he died in his bed four or five years later, would have been remembered only as marking the nadir of American political decline; the culmination of vulgarity. Lincoln's uncleanness of language and thought," insisted Greg, "would hardly have been tolerated in a Southern 'bar.'"
Perhaps even the contrast between the "gentlemanly" warfare advocated by Davis and the comprehensive destruction practiced by such terrorizers of civilians as Sherman and Sheridan embarrassed some Yankees. Davis believed that war should consist solely of combat between organized armies. He abhorred the killing of civilians and the destruction of private property during hostilities. Years after the war, when General Grant was dying of cancer, Davis wrote: "I have felt a human sympathy with him in his suffering, the more so because I think him so much better than the pillaging, house-burning, women persecuting Sherman and Sheridan." Judah P. Benjamin recalled that "when it was urged upon Jefferson Davis, not only by friends but by members of his Cabinet, that it was his duty to the people and to the army to repress outrages by retaliation, he was immovable in his resistance to such counsels, insisting that it was repugnant to every sentiment of justice and humanity that the innocent should be made victims for the crimes of such monsters." Davis proudly proclaimed after the war: "I am happy to remember that when our army invaded the enemy's country, their property was safe."
Chivalry: The Defining Element of Southern Culture
by D. Randolph Stoman
Tuscaloosa, Alabama
December 1996
The roots of chivalry are easily traced to the middle ages wherein the qualifications of the ideal knight were defined. Those qualifications included
• bravery
• honour
• courtesy
• respect for women
• protection for the weak
• generosity
• magnanimity to enemies.
These same virtuous qualities were passed from generation to generation in the interest of conferring dignity upon one's posterity. Southern patriots are well aware of the fact that these qualities of chivalry are the foundation upon which the 'Southern culture' rests.
An objective examination of the rationale behind the War for Southern Independence will reveal that a chivalrous Southern people reluctantly entered the war in defence of their individual and corporate honour. The Southern army was driven by the unyielding desire to bring honour to one's God, family, and land. In contrast, the Union Army had no such motivation at the core.
One could make the argument that the chivalrous values and characteristics of the Southern forces, from Davis and Lee to the shoeless 'butternut', explained the stunning and persistent victories of an undermanned, underarmed, and undersupplied Southern army. A culture of chivalry, or the lack thereof, was the most distinguishing difference between the two peoples (armies). In essence, the Southern army was sustained not by material resources, but by its individual and collective honour.
The chivalrous characteristic of 'magnanimity to enemies' is intuitively obvious in the leadership exemplified by Robert E. Lee. When word reached the General that Union forces were destroying and ransacking nonmilitary property in the Southland, he issued a directive to all Southern forces that 'we will not stoop to the malignancy of the enemy.'
Indeed, according to Shelby Foote, we see in the consummate Southern general his unusual disdain for John Pope, 'the miscreant'. Lee knew John Pope to be a man devoid of any element of chivalrous character. Pope was described by Montgomery Blair as 'a liar, a deceiver, a flatterer, and a trickster'. Of note is Lincoln's defence of Pope, by protesting that 'a liar might be brave and have skill as an officer'.
Our Southern culture has been diluted to a great extent simply because we compromise our chivalrous heritage and blame it on the Yankees. We, as Southerners, are in control of our individual honour regardless of how many 'foreigners' have relocated in our land. If we are to remain 'unreconstructed' and preserve our Southern culture, we can do no better than to exemplify the individual lements of chivalrous character. We must bring honour to God first, then to our families, and finally to our land. Let us uphold a keen sense of ethical conduct with respect and esteem shown to others. Though our ancestors were defeated, let us not be conquered.
Mr. Stroman is a Reformed Presbyterian, husband, homeschooling father, and personnel manager.
TRUTH–to speak the truth, to seek the truth in every situation before making judgments, to value the truth over personal agendas or the immediate benefits which falsehoods may offer.
HONOR–to keep your word, to know yourself, to uphold your beliefs, to act with keen moral judgment, to maintain high standards of conduct.
JUSTICE–to defend the helpless, to challenge evil whereever you encounter it, and to come to the aid of those who are so doing.
VALOR–to have not the lack of fear but the ability to set aside self-interest when faced with evil, to be willing to fight for what is right, regardless of what other people may say or do to you.
PROWESS–to have the discipline to train body, mind and spirit for the work of a knight and to aschew the self-destructive behaviors which tear down physical and spiritual health.
LOYALTY--to choose for yourself the Worthy One or Ones, whether they be your God, your loved ones, your country, your leader or your cause and to dedicate yourself to the protection and fulfilment of those Ones.
LARGESSE–to give freely of what you have without impoverishing yourself, to show generosity to friend and stranger alike, to be merciful and fair in all your dealings.
COURTESY–to be polite and mannerly in dress, speech and carriage, to treat all people as equals, to be kind to animals, and in war or competition to follow the rules, lose with grace and win with humbleness.
NOBLESSE–to be diligent in study, enhance your knowledge of the world, practice your skills, use your natural gifts to generate goodness, thereby enriching your life and the lives of those around you.
HUMILITY--to have all the above qualities without ever proclaiming them, to bear the heavy burden of Chivalry without so much as a breath of exertion, to be a silent strength which supports and sustains us all. Humility is the most difficult principle to master. Only the very best knights do.
Virginia Military Institute
Southerners have long looked to the old Cavalier state, Virginia, to set the standard for what might be done and what might not be done in terms of gentlemanly conduct. Mr. Jefferson’s school in Charlottesville has long been accustomed to refining the young males of the South. The same applies to Washington and Lee.
Virginia Military Institute still requires the male cadets to live by the “Code of the Gentleman.” “Without a strict observance of the fundamental Code of Honor, no man, no matter how polished,’ can be considered a gentleman. The honor of a gentleman demands the inviolability of his word, and the incorruptibility of his principles. He is the descendant of the knight, the crusader; he is the defender of the defenseless and the champion of justice . . . or he is not a Gentleman. A gentleman . . . Does not display his wealth, money or possessions. Does not put his manners on and off, whether in the club or in a ballroom. He treats people with courtesy, no matter what their social position may be. Does not slap strangers on the back nor so much as lay a finger on a lady.”
Hampden-Sidney College in Farmville, Virginia, continues to instruct its young men in the age-old art of gentlemanly deportment. One can easily spot a Hampden-Sidney man; he’s usually the one in charge.
The Citadel has been a name synonymous with the ideal of gentlemanly demeanor for over a 160 years, recent unfortunate events notwithstanding. A generation ago cadets went through hours of training in the social graces with Mrs. Dufour, the school’s hostess. Passing the Blue Book’s test of do’s and don’t’s was part of the plebe year rigors.
Let’s not allow our beloved South to lose its reputation for requiring its males to live up to the old-fashioned Code of the Gentleman.
As the VMI Code states, “A gentleman can become what he wills to be.”
Reconstruction – Another Name for Cultural Genocide
The 'reconstruction' of the South [actually deconstruction] after the War of Northern Aggression is, perhaps, one of the most depressing and shameful periods of this country's history. Many revisionist 'historians' have sought to portray it as a glorious period of enlightenment, but in light of all that happened during that time you really have to 'strain at a gnat and swallow a camel' to do that.
We might wonder where the term 'reconstruction' came from. It is worth noting that, in 1865, when Karl Marx issued his praise of Abraham Lincoln, part of that praise was for Lincoln's "…reconstruction of a social world." Obviously Marx had no problem with the term when used in this fashion.
Professional South-hater Thaddeus Stevens made a speech in September, 1865 in which he said of the South: "But reformation must be effected; the foundation of their institutions – political, municipal and social – must be broken up and relaid or all our blood and treasure have been in vain. This can only be done by treating and holding them as a conquered people." Note that both Marx and Stevens [kindred spirits] talk openly about changing the social institutions and foundations of the South. Since the South's social institutions and culture have been based upon orthodox Reformation Christianity since around 1830, what these men are really talking about is the destruction of orthodox Christianity in the South.
Frank Conner, author of the excellent book The South Under Siege 1830-2000 has noted 'reconstruction' policies in the South that concur with what Marx and Stevens envisioned. Mr. Conner has written: "In 1865, Congressman Thaddeus Stevens and Senator Charles Sumner created the Joint Committee on Reconstruction. Under its aegis they developed a long-range master plan for impoverishing, subjugating, dominating, and humiliating the Southerners, while destroying their culture and brainwashing them into third-rate copies of the Northerners."
Mr. Conner has noted that a culture war, of which the War of Northern Aggression and the subsequent 'reconstruction' were a major part, has gone on against the South since the 1830s. He says: "Actually, this cultural war has raged unabated since the 1830s, when Northern liberals decided to supplant Christianity with secular humanism as the official religion, and they selected the religious South as their battleground…the present-day villification of the Confederacy is part of a long-term ideological war being waged against the conservative white South for the purpose of destroying the Southerners as a people and rendering them socially, politically, and economically impotent."
Conner notes the main objectives of this ideological war. They are: "[1] to discredit white Southerners; [2] and thereby discredit Southern Christianity; [3] which would clear the way for them to discredit Christianity throughout the United States; and [4] replace it with their own religion of secular humanism as the official religion of the U.S."
'Reconstruction' in the South after the war was intended to tax what little was left in the South, to put the South under Northern military rule and fill all the political offices with Northern carpetbaggers and their friends, to make sure the blacks got the vote and to make sure they all continued to vote Republican so the pillage could continue as long as possible, and to destroy the white Southern value system [based upon Christianity] and to enforce this destruction with a powerful central government in Washington.
Mr. Conner has noted some of the more degrading aspects of the 'reconstruction.' He writes: Although many ex-Confederates owned no clothes but the patched uniforms they had been wearing at the surrender, it was now unlawful for them to wear those clothes. They had to cut off all the buttons stamped 'CSA' and to fasten their clothes as best they could with pieces of string. Ex-Confederate parolees had to carry their paroles on their persons at all times, and display them to any U.S. soldier upon demand. Woe unto any Southerner who displayed – under any circumstances at all – a Confederate flag or any other symbol of the Confederacy; he would be arrested immediately.' Does that sound familiar in light of the continuing cultural genocide going on in the South today?
What we have today, and have had since the 1830s, is an ideological [religious] war against Southern Christianity by apostate Northern liberals, be they Unitarians or of some other persuasion, but all united in their efforts to stamp out the Christian faith, first in the South and, if that is finally successful, in the rest of the country.
You can howl all you want about slavery or about 'preserving the Union' and all the rest of it, but ultimately, it comes down to the fact that the war and the ensuing 'reconstruction' were, in the final analysis, theological issues first and economic issues second.
This truth is something we need to begin to grapple with, otherwise we will never have a true understanding of what the war or 'reconstruction' were really all about.
Copyright ©, 2003 Al Benson Jr.
P.O. Box 55
Sterlington, LA 71280
Al Benson, Jr. is also the Editor of the Copperhead Chronicle, and may be reached at
If you want to discover – NOT conspiracy theories - FACTS that have been well-hidden until recently, thanks to numerous contingents of truth seeking scholars armed with The Freedom of Information Act, Internet access and many,many hours in the Library of Congress and elsewhere studying ORIGINAL SOURCE documents, then follow these videos onto
As I said above, I will not engage in debate, as I have merely collected information from the works of scholars. Feel free to argue with them.
And, again. this has nothing to do with the red herring of "slavery." Less than 5% of Southerners owned slaves, and a number of slave owners were FREE BLACK MEN. And the North still held slaves during the war.
Slavery, in any form, for any reason, is an abomination. But that was NOT what the war was about. It was merely a propaganda tool to dupe the masses.
|
global_05_local_4_shard_00000656_processed.jsonl/84829
|
← Science can't explain the big bang - there is still scope for a creator
kaiserkriss's Avatar Jump to comment 4 by kaiserkriss
What a retard!!I'm embarrassed to call myself a geoscientist now.
Still I should not be surprised since MANY geoscientists working in very specialized subjects in the oil patch are die hard "earth crated in 6 days" fundamentalists.. jcw
Wed, 07 Jan 2009 10:14:00 UTC | #299542
|
global_05_local_4_shard_00000656_processed.jsonl/84845
|
Wishing You a Fond Farewell —From the Stock Market
Updated April 1, 2013 10:51 p.m. ET
It is an industry that thrived in the days when the printed word was king and correspondence went through the mail. But like many other businesses, it was battered by the rise of lively, innovative and often free competitors online, where stamps and handwriting aren't needed.
Welcome to the greeting-card industry, where the biggest publicly traded U.S. company in the business has decided to bid adieu to the stock market, announcing...
Available to Subscribers
|
global_05_local_4_shard_00000656_processed.jsonl/84861
|
this is the single saddest post I have ever seen on tumblr.
I relate so much
i posted this as a joke why does it have 3,000 notes and hipster urls everywhere it was probably a homeless crack addict who got hold of a spray can
Well maybe because to some people it does mean something. I reblogged it and then read your comment and it means something to me because I dropped out of school freshmen year and would be graduating right now. Just because it’s a joke to you, doesn’t mean it is to everyone.
Like this post
Wassen, Switzerland | Jason Smith
Like this post
And yet another 😆
Like this post
not my pic or edit but this is so rad
|
global_05_local_4_shard_00000656_processed.jsonl/84863
|
My girlfriend texted me a link last night. She loves Tumblr and finds all sorts of random things so getting random urls is common...but this one was special.
I Was Texted A Gif
<< She sent that <<
She said that "it looked wicked cool and I figured you'd get it" which means she doesn't know what heel-toe is but she knew it was three pedals good.
I think it was on her mind cuz we tried another impromptu driving lesson the other night. I don't care the reason though CUZ IT MADE ME HAPPY!
I missed out yesterday so here's a belated '64.
I Was Texted A Gif
|
global_05_local_4_shard_00000656_processed.jsonl/84871
|
Comments on: Make a Song Play Louder in iTunes News, tips, software, reviews, and more for Mac OS X, iPhone, iPad Tue, 29 Jul 2014 11:25:22 +0000 hourly 1 By: Bryan Evans Tue, 15 Mar 2011 20:37:44 +0000 I’ve adjusted a few songs in the past this way, but with disastrous results. Using that Volume Adjustment doesn’t seem to make much difference to the volume of the song inside iTunes, but it seems that the changes are hypersensitive when the song is then played on an iPod. I’ve slid the adjuster all the way to 100% many times thinking it wasn’t making it loud enough…only to come close to blowing out my iPod headphones because the song is now too loud.
|
global_05_local_4_shard_00000656_processed.jsonl/84887
|
Take the 2-minute tour ×
My newborn girl has a funny smell in the top of her head: it's like milk or strawberry yogurt. Very soft, very light, I have to come really close to feel it. But it's something I notice...
She takes a bath everyday (we live in Brazil, and here it's considered ok, I know that in some countries people/child don't do that - example - and that's ok too). We wash her head using some baby shampoo like Johnson&Johnson, and just few minutes after breastfeeding, the smell appears again.
The smell doesn't come from the ears / neck / etc.
And I never paid attention to any other newborn smell, so I don't know if that is common... so, my question: is it normal that a newborn have this kind of smell ?
Update: now she is 2mo, and that funny smell is almost gone. It resambles my wife's smell. And I miss it... :(
share|improve this question
3 Answers 3
up vote 5 down vote accepted
The smell becomes more noticable as she gets warm from combined body heat when feeding. Your baby has the start of Cradle Cap. Gently rub a light unperfumed oil (almond, or vegetable oil) carefully into her scalp and leave for 30mins. Brush softly with baby hair brush to remove the sticky skin flakes, shampoo gently and carefully rinse thoroughly with tepid water. Once daily. If your baby is getting close to 6 weeks old, it is sometimes caused by hormone imbalance. When the smell has gone, so has the cradle cap. It can sometimes affect baby's eyebrows, and baby acne can be seen. All to do with her hormone imbalance.
share|improve this answer
When to the pediatrician and he explained that the child still have hormones from the mother, and is eliminating it, giving that baby smell – woliveirajr Apr 18 '13 at 19:09
Mary Jo mentions a common skin condition. That's probably a good guess and you can easily see the scales on the head.
If there are no scales, then perhaps it's just that famous baby smell. I never knew what "baby smell" smelled like before I had a child, but now I know it. It's a very nice smell. Savor it; it will be gone soon. If it's baby smell, then don't worry; it's harmless and you don't need to wash or clean it away.
share|improve this answer
:( now it's almost gone... – woliveirajr May 3 '13 at 19:09
Your baby may have cradle cap, which is a very common skin condition in infants. It's official name is seborrheic dermatitis. According to MedlinePlus (National Institute of Health):
It appears as thick, crusty, yellow or brown scales over the child's scalp. Similar scales may also be found on the eyelids, ear, around the nose, and in the groin. Cradle cap may be seen in newborns and small children up to age 3... Cradle cap is not contagious, nor is it caused by poor hygiene. It is not an allergy, and it is not dangerous.
I have also seen cradle cap that is more white. To treat cradle cap:
3. Be sure to rinse off all soap.
share|improve this answer
Massaging a thin paste of baking soda over the scales will help remove them as well, if you are concerned about shampooing a lot. – KitFox Apr 12 '13 at 13:06
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/84891
|
From patchwork Tue Mar 20 02:36:11 2012 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Subject: [V2,1/1] sysvinit-inittab: Fixed license warning. From: Lianhao Lu X-Patchwork-Id: 23843 Message-Id: <> To: Date: Tue, 20 Mar 2012 10:36:11 +0800 WARNING: .../sysvinit-inittab-2.88dsf-r6/sysvinit-2.88dsf/COPYING could not be copied for some reason. It may not exist. WARN for now. Signed-off-by: Lianhao Lu --- .../recipes-core/sysvinit/sysvinit-inittab/COPYING | 339 -------------------- .../sysvinit/ | 9 +- 2 files changed, 2 insertions(+), 346 deletions(-) delete mode 100644 meta/recipes-core/sysvinit/sysvinit-inittab/COPYING diff --git a/meta/recipes-core/sysvinit/sysvinit-inittab/COPYING b/meta/recipes-core/sysvinit/sysvinit-inittab/COPYING deleted file mode 100644 index d511905..0000000 --- a/meta/recipes-core/sysvinit/sysvinit-inittab/COPYING +++ /dev/null @@ -1,339 +0,0 @@ - GNU GENERAL PUBLIC LICENSE - Version 2, June 1991 - - Copyright (C) 1989, 1991 Free Software Foundation, Inc., - 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA - Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed. - - Preamble - - The licenses for most software are designed to take away your -freedom to share and change it. By contrast, the GNU General Public -License is intended to guarantee your freedom to share and change free -software--to make sure the software is free for all its users. This -General Public License applies to most of the Free Software -Foundation's software and to any other program whose authors commit to -using it. (Some other Free Software Foundation software is covered by -the GNU Lesser General Public License instead.) You can apply it to -your programs, too. - - When we speak of free software, we are referring to freedom, not -price. Our General Public Licenses are designed to make sure that you -have the freedom to distribute copies of free software (and charge for -this service if you wish), that you receive source code or can get it -if you want it, that you can change the software or use pieces of it -in new free programs; and that you know you can do these things. - - To protect your rights, we need to make restrictions that forbid -anyone to deny you these rights or to ask you to surrender the rights. -These restrictions translate to certain responsibilities for you if you -distribute copies of the software, or if you modify it. - - For example, if you distribute copies of such a program, whether -gratis or for a fee, you must give the recipients all the rights that -you have. You must make sure that they, too, receive or can get the -source code. And you must show them these terms so they know their -rights. - - We protect your rights with two steps: (1) copyright the software, and -(2) offer you this license which gives you legal permission to copy, -distribute and/or modify the software. - - Also, for each author's protection and ours, we want to make certain -that everyone understands that there is no warranty for this free -software. If the software is modified by someone else and passed on, we -want its recipients to know that what they have is not the original, so -that any problems introduced by others will not reflect on the original -authors' reputations. - - Finally, any free program is threatened constantly by software -patents. We wish to avoid the danger that redistributors of a free -program will individually obtain patent licenses, in effect making the -program proprietary. To prevent this, we have made it clear that any -patent must be licensed for everyone's free use or not licensed at all. - - The precise terms and conditions for copying, distribution and -modification follow. - - GNU GENERAL PUBLIC LICENSE - TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION - - 0. This License applies to any program or other work which contains -a notice placed by the copyright holder saying it may be distributed -under the terms of this General Public License. The "Program", below, -refers to any such program or work, and a "work based on the Program" -means either the Program or any derivative work under copyright law: -that is to say, a work containing the Program or a portion of it, -either verbatim or with modifications and/or translated into another -language. (Hereinafter, translation is included without limitation in -the term "modification".) Each licensee is addressed as "you". - -Activities other than copying, distribution and modification are not -covered by this License; they are outside its scope. The act of -running the Program is not restricted, and the output from the Program -is covered only if its contents constitute a work based on the -Program (independent of having been made by running the Program). -Whether that is true depends on what the Program does. - - 1. You may copy and distribute verbatim copies of the Program's -source code as you receive it, in any medium, provided that you -conspicuously and appropriately publish on each copy an appropriate -copyright notice and disclaimer of warranty; keep intact all the -notices that refer to this License and to the absence of any warranty; -and give any other recipients of the Program a copy of this License -along with the Program. - -You may charge a fee for the physical act of transferring a copy, and -you may at your option offer warranty protection in exchange for a fee. - - 2. You may modify your copy or copies of the Program or any portion -of it, thus forming a work based on the Program, and copy and -distribute such modifications or work under the terms of Section 1 -above, provided that you also meet all of these conditions: - - a) You must cause the modified files to carry prominent notices - stating that you changed the files and the date of any change. - - b) You must cause any work that you distribute or publish, that in - whole or in part contains or is derived from the Program or any - part thereof, to be licensed as a whole at no charge to all third - parties under the terms of this License. - - c) If the modified program normally reads commands interactively - when run, you must cause it, when started running for such - interactive use in the most ordinary way, to print or display an - announcement including an appropriate copyright notice and a - notice that there is no warranty (or else, saying that you provide - a warranty) and that users may redistribute the program under - these conditions, and telling the user how to view a copy of this - License. (Exception: if the Program itself is interactive but - does not normally print such an announcement, your work based on - the Program is not required to print an announcement.) - -These requirements apply to the modified work as a whole. If -identifiable sections of that work are not derived from the Program, -and can be reasonably considered independent and separate works in -themselves, then this License, and its terms, do not apply to those -sections when you distribute them as separate works. But when you -distribute the same sections as part of a whole which is a work based -on the Program, the distribution of the whole must be on the terms of -this License, whose permissions for other licensees extend to the -entire whole, and thus to each and every part regardless of who wrote it. - -Thus, it is not the intent of this section to claim rights or contest -your rights to work written entirely by you; rather, the intent is to -exercise the right to control the distribution of derivative or -collective works based on the Program. - -In addition, mere aggregation of another work not based on the Program -with the Program (or with a work based on the Program) on a volume of -a storage or distribution medium does not bring the other work under -the scope of this License. - - 3. You may copy and distribute the Program (or a work based on it, -under Section 2) in object code or executable form under the terms of -Sections 1 and 2 above provided that you also do one of the following: - - a) Accompany it with the complete corresponding machine-readable - source code, which must be distributed under the terms of Sections - 1 and 2 above on a medium customarily used for software interchange; or, - - b) Accompany it with a written offer, valid for at least three - years, to give any third party, for a charge no more than your - cost of physically performing source distribution, a complete - machine-readable copy of the corresponding source code, to be - distributed under the terms of Sections 1 and 2 above on a medium - customarily used for software interchange; or, - - c) Accompany it with the information you received as to the offer - to distribute corresponding source code. (This alternative is - allowed only for noncommercial distribution and only if you - received the program in object code or executable form with such - an offer, in accord with Subsection b above.) - -The source code for a work means the preferred form of the work for -making modifications to it. For an executable work, complete source -code means all the source code for all modules it contains, plus any -associated interface definition files, plus the scripts used to -control compilation and installation of the executable. However, as a -special exception, the source code distributed need not include -anything that is normally distributed (in either source or binary -form) with the major components (compiler, kernel, and so on) of the -operating system on which the executable runs, unless that component -itself accompanies the executable. - -If distribution of executable or object code is made by offering -access to copy from a designated place, then offering equivalent -access to copy the source code from the same place counts as -distribution of the source code, even though third parties are not -compelled to copy the source along with the object code. - - 4. You may not copy, modify, sublicense, or distribute the Program -except as expressly provided under this License. Any attempt -otherwise to copy, modify, sublicense or distribute the Program is -void, and will automatically terminate your rights under this License. -However, parties who have received copies, or rights, from you under -this License will not have their licenses terminated so long as such -parties remain in full compliance. - - 5. You are not required to accept this License, since you have not -signed it. However, nothing else grants you permission to modify or -distribute the Program or its derivative works. These actions are -prohibited by law if you do not accept this License. Therefore, by -modifying or distributing the Program (or any work based on the -Program), you indicate your acceptance of this License to do so, and -all its terms and conditions for copying, distributing or modifying -the Program or works based on it. - - 6. Each time you redistribute the Program (or any work based on the -Program), the recipient automatically receives a license from the -original licensor to copy, distribute or modify the Program subject to -these terms and conditions. You may not impose any further -restrictions on the recipients' exercise of the rights granted herein. -You are not responsible for enforcing compliance by third parties to -this License. - - 7. If, as a consequence of a court judgment or allegation of patent -infringement or for any other reason (not limited to patent issues), -conditions are imposed on you (whether by court order, agreement or -otherwise) that contradict the conditions of this License, they do not -excuse you from the conditions of this License. If you cannot -distribute so as to satisfy simultaneously your obligations under this -License and any other pertinent obligations, then as a consequence you -may not distribute the Program at all. For example, if a patent -license would not permit royalty-free redistribution of the Program by -all those who receive copies directly or indirectly through you, then -the only way you could satisfy both it and this License would be to -refrain entirely from distribution of the Program. - -If any portion of this section is held invalid or unenforceable under -any particular circumstance, the balance of the section is intended to -apply and the section as a whole is intended to apply in other -circumstances. - -It is not the purpose of this section to induce you to infringe any -patents or other property right claims or to contest validity of any -such claims; this section has the sole purpose of protecting the -integrity of the free software distribution system, which is -implemented by public license practices. Many people have made -generous contributions to the wide range of software distributed -through that system in reliance on consistent application of that -system; it is up to the author/donor to decide if he or she is willing -to distribute software through any other system and a licensee cannot -impose that choice. - -This section is intended to make thoroughly clear what is believed to -be a consequence of the rest of this License. - - 8. If the distribution and/or use of the Program is restricted in -certain countries either by patents or by copyrighted interfaces, the -original copyright holder who places the Program under this License -may add an explicit geographical distribution limitation excluding -those countries, so that distribution is permitted only in or among -countries not thus excluded. In such case, this License incorporates -the limitation as if written in the body of this License. - - 9. The Free Software Foundation may publish revised and/or new versions -of the General Public License from time to time. Such new versions will -be similar in spirit to the present version, but may differ in detail to -address new problems or concerns. - -Each version is given a distinguishing version number. If the Program -specifies a version number of this License which applies to it and "any -later version", you have the option of following the terms and conditions -either of that version or of any later version published by the Free -Software Foundation. If the Program does not specify a version number of -this License, you may choose any version ever published by the Free Software -Foundation. - - 10. If you wish to incorporate parts of the Program into other free -programs whose distribution conditions are different, write to the author -to ask for permission. For software which is copyrighted by the Free -Software Foundation, write to the Free Software Foundation; we sometimes -make exceptions for this. Our decision will be guided by the two goals -of preserving the free status of all derivatives of our free software and -of promoting the sharing and reuse of software generally. - - NO WARRANTY - - 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY -FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN -OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES -PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED -OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF -MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS -TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE -PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, -REPAIR OR CORRECTION. - - 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING -WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR -REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, -INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING -OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED -TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY -YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER -PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE -POSSIBILITY OF SUCH DAMAGES. - - END OF TERMS AND CONDITIONS - - How to Apply These Terms to Your New Programs - - If you develop a new program, and you want it to be of the greatest -possible use to the public, the best way to achieve this is to make it -free software which everyone can redistribute and change under these terms. - - To do so, attach the following notices to the program. It is safest -to attach them to the start of each source file to most effectively -convey the exclusion of warranty; and each file should have at least -the "copyright" line and a pointer to where the full notice is found. - - - Copyright (C) - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License along - with this program; if not, write to the Free Software Foundation, Inc., - 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. - -Also add information on how to contact you by electronic and paper mail. - -If the program is interactive, make it output a short notice like this -when it starts in an interactive mode: - - Gnomovision version 69, Copyright (C) year name of author - Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. - This is free software, and you are welcome to redistribute it - under certain conditions; type `show c' for details. - -The hypothetical commands `show w' and `show c' should show the appropriate -parts of the General Public License. Of course, the commands you use may -be called something other than `show w' and `show c'; they could even be -mouse-clicks or menu items--whatever suits your program. - -You should also get your employer (if you work as a programmer) or your -school, if any, to sign a "copyright disclaimer" for the program, if -necessary. Here is a sample; alter the names: - - Yoyodyne, Inc., hereby disclaims all copyright interest in the program - `Gnomovision' (which makes passes at compilers) written by James Hacker. - - , 1 April 1989 - Ty Coon, President of Vice - -This General Public License does not permit incorporating your program into -proprietary programs. If your program is a subroutine library, you may -consider it more useful to permit linking proprietary applications with the -library. If this is what you want to do, use the GNU Lesser General -Public License instead of this License. diff --git a/meta/recipes-core/sysvinit/ b/meta/recipes-core/sysvinit/ index 3a716d7..9bd087c 100644 --- a/meta/recipes-core/sysvinit/ +++ b/meta/recipes-core/sysvinit/ @@ -1,20 +1,15 @@ DESCRIPTION = "Inittab for sysvinit" LICENSE = "GPLv2" -LIC_FILES_CHKSUM = "file://COPYING;md5=751419260aa954499f7abaabaa882bbe" +LIC_FILES_CHKSUM = "file://${COREBASE}/meta/files/common-licenses/GPL-2.0;md5=801f80980d171dd6425610833a22dbe6" PR = "r6" -SRC_URI = "file://COPYING \ - file://inittab" +SRC_URI = "file://inittab" S = "${WORKDIR}/sysvinit-${PV}" INHIBIT_DEFAULT_DEPS = "1" -do_configure() { - cp ${WORKDIR}/COPYING ${S}/ -} - do_compile() { : }
|
global_05_local_4_shard_00000656_processed.jsonl/84892
|
Take the 2-minute tour ×
the author of this patent is my father. I am trying to locate other patents as his younger brother donated all of his technical papers to the University of Colorado. I would love to find out how his inventions have been used as a stepping stone to todays technology.
share|improve this question
Someone might be able to help but you didn't include the patent number in the question. Please edit the question to include this. – George White May 15 at 4:48
Your Answer
Browse other questions tagged or ask your own question.
|
global_05_local_4_shard_00000656_processed.jsonl/84907
|
Lecture Series presented by KPMG- Mathematical Art and Artistic Mathematicians
Meet a Scientist - Dr. Olivier Dore
The origin and evolution of the largest observable structures in the universe (much larger than entire galaxies); understanding why the expansion of the universe is accelerating. Observational techniques: cosmic microwave background, gravitational lensing and gravity waves.
Meet a Scientist - Chanda Prescod-Weinstein
Cosmology and cosmological implications of quantum gravity. Observable effects in cosmology help to identify the limits of general relativity, which could potentially be surpassed by modified theories of gravity and/or quantum gravity.
Meet a Scientist - Prof. Lucien Hardy
Applying the lessons learned in quantum information theory to gain a better understanding of quantum mechanics itself. Is quantum theory simply a new type of probability theory? Exploring new directions towards combining quantum theory with gravity.
Meet a Scientist - Dr. Jean-Luc Lehners
What, exactly, happened around the time of the Big Bang? Exploring new models inspired by superstring theory and supergravity, e.g. ones in which we live on “branes” that collide with a “big bang”. Satellite experiments to test such models.
Meet a Scientist - Christopher Fuchs
Applications of quantum theory to cryptography and computation; understanding in more concrete, physical terms what quantum theory is telling us about the nature of reality. Applications of information theory to better understand the quantum “wave function”.
|
global_05_local_4_shard_00000656_processed.jsonl/84915
|
National Geographic
You Have 46 Chromosomes. This Pond Creature Has 15,600
Remember when encyclopaedias were books, and not just websites? You’d have a shelf full of information, packaged into entries, and then into separate volumes. Your genome is organised in a similar way. Your DNA is packaged into large volumes called chromosomes. There are 23 pairs of them, each of which contains a long string of genes. And just as encyclopaedia books are bound in sturdy covers to prevent the pages within from fraying, so too are your chromosomes capped by protective structures called telomeres.
That’s basically how it works in any animal or plant or fungus. The number of chromosomes might vary a lot—fruit flies have 8 while dogs have 78—but the basic organisation is the same.
But there’s a pond-dwelling creature called Oxytricha trifallax whose DNA is organised in a very… different… way. A team of US scientists has sequenced its genome for the first time and discovered genetic chaos. It’s like someone has taken the encyclopaedias, ripped out all the individual pages, torn some of them, photocopied everything dozens of times, and stuffed the whole lot in a gigantic messy drawer.
Oxytricha trifallax is neither animal nor plant, but protist –part of the kingdoms of life that include amoebas and algae. Composed of just a single cell, it never gets bigger than a quarter of a millimetre in length. It swims around ponds and puddles in search of other microbes to consume, and moves by beating small hairs called cilia. These hairs give it and its relatives their group name—the ciliates.
Within its cell, Oxytricha contains two nuclei, which enclose its DNA. One of these—the micronucleus— contains the complete edition of Oxytricha’s genome, just like the single nucleus within our own cells. That’s the tidy encyclopaedia shelf. But while the material in our nucleus must be constantly decoded and transcribed so that we can live, Oxytricha’s micronucleus is largely inactive. The encyclopaedia’s are barely read.
Instead, it relies on a second structure called the macronucleus. That’s the messy drawer. All of the DNA in the micronucleus is copied thousands of times over, and shunted into the macronucleus. In the process, it is broken up at tens of thousands of places, rearranged, and pruned. What’s left is a collection of thousands of “nanochromosomes” that contain all the information Oxytricha needs to survive. This is the stuff that gets decoded and transcribed, used and reused while the originals gather dust.
Sequencing this almighty mess must have been a devilish task, but Etienne Swart from Princeton University rose to the challenge. Leading a team of US and Swiss scientists, he has sequenced Oxytricha’s complete macronuclear genome. Modern sequencing works by breaking genomes into small fragments, sequencing these, and assembling everything together. The DNA in Oxytricha’s macronucleus is already fragmented and extremely repetitive, make it hard to capture everything and assemble it into a coherent whole. Then again, almost three-quarters of the fragments were already complete chromosomes.
The team found around 15,600 of these nanochromosomes. On average, each is around 3,200 DNA ‘letters’ long, and around 80 percent of them contain just a single gene.
As if that wasn’t complicated enough, the genome is duplicated so extensively that there are around 2,000 copies of each nanochromosome. And around one in ten of them are broken up into even smaller fragments. So, different copies of the same nanochromosomes might just contain a small passage from the full page of information.
Our 46 chromosomes are capped by protective structures called telomeres that stop DNA from fraying, rather like the plastic tags on the end of shoelaces. All of Oxytricha’s nanochromosomes have their own telomeres, so each individual has tens of millions of these protective caps. It has, in Swart’s words, an “inordinate fondness for telomeres”. It’s like every page in its messy drawer is hard-bound.
As the contents of the micronucleus are copied into the macronucleus, anything that doesn’t contain instructions for making proteins—the so-called “non-coding DNA”—is ruthlessly pruned. Around 96 percent of the genome is jettisoned in this way. The remainder—the nanochromosomes—are a small fraction of the full genome, but they contain all the genes that Oxytricha needs for day-to-day existence. The only things missing are a smattering of genes that the creature needs to reproduce.
This isn’t just an academic exercise, targeted at an (admittedly cool) creature. Ciliates have a long history of teaching us about our own genomes. Another of them—Tetrahymena thermophila—taught us about the existence of telomeres in the first place, and these structures are now through to play critical roles in ageing, cancer and other aspects of our lives. Tetrahymena also helped to show that RNA—a genetic molecule that’s related to DNA—can act as an enzyme. That’s crucial to modern theories about the origin of life itself. (And its genome was fully sequenced back in 2006, by the inimitable Jon Eisen)
Meanwhile, Oxytricha, with its bonanza of telomeres, helped scientists to identify the proteins that stick to these caps and help to create, maintain and control them. Perhaps its bizarre genome will tell us even more about how DNA is rearranged and copied—something that happens in our genome to a less dramatic (but still important) extent.
There are 29 Comments. Add Yours.
1. Ralph Dratman
February 6, 2013
I wonder if Oxytricha trifallax might be left over from a stage on the way to eukaryotes as we know them. Maybe some creature related to it eventually became more organized and was eventually more successful in other niches.
2. Jim Johnson
February 6, 2013
Knowledge as a legacy of a decade-ago game of Balderdash: The plastic tags on the end of shoelaces are called aglets.
3. Torbjörn Larsson, OM
February 6, 2013
That’s how you would organize the genome if you don’t want to mess with sundry regulative structures. Not as simple to evolve (a 2nd nucleus), but useful if acquired.
4. Rosie Redfield
February 6, 2013
@Ralph: We know quite a lot about the evolutionary relationships of Oxytricha and other ciliates. Enough to be sure that their weird genomes aren’t relics of an ancestral eukaryote organization. But not enough to understand the true causes.
5. Ralph Dratman
February 6, 2013
@Rosie: Surely the organism described here is a dead end! Where does it go next? With all those copies of everything, I would not want to play the part of a hopefully mutated gene. At best I might be added onto the pile, but to supersede any other version? Not to be dreamt of.
Seriously… a great puzzle! This little creature is trying to carry around the entire biosphere in its backpack. What a hoarder!
6. Hal
February 6, 2013
The plastic tag on the end of shoelaces is an AGLET or Aiglet, a small a aside. Good article, thanks
7. SubZero
February 6, 2013
Maybe this little guy IS a genetic repository. Maybe he’s not the only one! When TWAWKI happens something stimulates them into differentiating into several phyla of critters that repopulate Earth!
8. particle_p
February 6, 2013
I was about to retweet this when it occurred to me that not everyone on my Twitter stream DOES have 46 chromosomes and the wording of this post might make those folks uncomfortable. You might want to tweak this post a little.
9. Ralph Dratman
February 6, 2013
particle_p, I imagine most of the people on your Twitter actually do have (at least) 46 chromosomes. If not, I hope the few with Turner Syndrome (which Wikipedia describes as “the only full monosomy that is seen in humans”) will fire off sharp comments rather than languishing in arithmetically-challenged dismay. Why not? They have nothing to be ashamed of.
10. ernest poltrock
February 7, 2013
i find it fascinating that such small organisims and tomatoes for example can rival humans or surpass them in their genetic complexity, all life, no matter how “simple” deserves our respect. we should all be humbled and realize we are but a peice in this wonderful puzzle of life!
11. Joris8pinter
February 7, 2013
@RalphD Down Syndrome was what I thought of first. Pretty sure that is more common than Turner Syndrome which I had to look up.
12. Ralph Dratman
February 7, 2013
@Joris8pinter, Down Syndrome is certainly more common, but it involves an extra chromosome, not a missing one, as Turner Syndrome does. People with Down Syndrome have all 46 chromosomes. Plus, they have one more. So, except for the rare individuals with Turner Syndrome, we all have (at least) 46.
13. Jack
February 7, 2013
“and these structures are now through to play critical roles in ageing”: through should be thought.
Nice article (and organism)!
14. sham dande
February 7, 2013
Truely amazing
15. Amphiox
February 7, 2013
One must point out that the unusual chromosome structure is only in the macronucleus, while the DNA in the micronucleus is “normal”. And if this critter reproduces like normal ciliates, like the paramecium, IIRC, then it is the micronucleus that is involved in reproduction/conjugation. The unusual DNA in the macronucleus is thus not involved in that process, with macronucleus actually degenerating and disappearing in the early steps (to be rebuilt later).
16. SubZero
February 7, 2013
What would be interesting is to find out what it eats and what eats it. What does it’s environment do for and to it?
Why would such a molecular machine be structured like this?
What does it like? What doesn’t it like?
How long has it been here?
The DNA in the macronucleus is preserved upon regeneration. What does it do when it’s out and about? What form does it take? Just a cloud of molecules? Is it timing DNA?
17. Ralph Dratman
February 7, 2013
Amphiox, are you saying the macronucleus is purely vestigial? If so, it should have disappeared long ago, given the energy and extra food input that must be necessary to create it.
There has to be something useful the macronucleus is doing. Could it be “merely” an energy repository, almost like a yolk for the adult stage?
18. Rathayibacter
February 8, 2013
Very interesting article. Additionally, as someone who already uses an awesome scientific name as a username, I have to appreciate how great “trifallax” sounds. Could be the name of a high fantasy character or something… hmmm…
19. Christopher
February 8, 2013
@Ralph – No, I don’t think Amphiox is not saying it’s vestigal, Amphiox is saying that the macronucleus probably isn’t involved in cell division. Only the (relatively normal) micronucleus would be involved in cell reproduction, and the macronucleus is created FROM the micronucleus separately by each daughter cell after a split. . . and the macronucleus would “disappear” before either daughter cell reproduced again.
• Ralph Dratman
February 8, 2013
@Christopher – If it is not vestigial, then it performs some necessary function, right? If it has a necessary function, then the organism would not survive (or at least not thrive) without it? So, can one remove the macronucleus and the ciliate will still survive? One other question: is paramecium a member of this ciliate class (or genus or whatever it is)?
20. Simon Rogers
February 9, 2013
Nice article. Please remove the rogue apostrophe from the last line of para 5.
21. Andrew Lohbihler
February 9, 2013
There must be an evolutionary reason for this “messy drawer” that contributes to this organism surviving and procreating in its current environment. Perhaps it is a stupid design and that explains why it has not evolved into something better than pond scum. Any comment on that?
22. amphiox
February 9, 2013
Ralph Dratman, as the article states, the micronucleus is in a dormant state for the majority of the time the cell is undergoing normal metabolism.
In a typical eukaryote (like us, for example), the nucleus performs two types of functions. One is reproduction and cell division (whether it is mitosis or meiosis), but the other is the day to day work of transcribing genes and producing gene products to keep regular cellular metabolism going. It would appear that in these ciliates, the micronucleus has become specialized for the first function, while the macronucleus is doing the second, and the changes in chromosome structure may be an adaption to do this more efficiently. Splitting the genome into so many chromosomes would potentially create havoc, or at least result in very onerous energy demands, when the time comes, in reproduction, for the chromosomes to line up with their complementary partners for cell division. This is particularly true in sexual reproduction (meiosis), when chromosomes must pair up properly for recombination. These ciliates may get around this problem because the macronucleus doesn’t have to participate in reproduction, which the micronucleus does instead.
23. Ralph Dratman
February 10, 2013
@AndrewLohbihler, I don’t think “it has not evolved into something better than pond scum” is a good way of thinking about this.
Earth’s biosphere needs pond scum. In fact, we need some organism(s) to clean up (eat up) every kind of biomolecule that still has any free energy left. Otherwise the planet would rapidly get congested with chemically unstable bits of dead organisms.
It is clear that Oxytricha trifallax is wonderfully suited to its niche, a niche that will probably never disappear as long as there is water-dwelling life on Earth.
• Andrew Lohbihler
February 10, 2013
Sorry, I did not mean to trivialize Oxytricha trifallax (OT) as mere pond-scum as less evolved life forms, especially when compared with higher evolutionary life forms like George Bush. So its nice to think that this organism is the “care-taker” of the earth and consumes dead organism chemicals to feed its life and continued existence. So does that explain this complex genetic structure from an evolutionary point of view? It would seem that this complex genetic structure is an advantage to its evolutionary long term survival, because even if we humans die out as a species, something has to remain to clean up the mess we or others make. I also seems to me that if we are looking for an alien then OT fits the example of an evolutionary organism that survives anything and likely took a ride to earth from asteriods many years ago. Comment?
24. Ralph Dratman
February 10, 2013
amphiox, thank you for the further explanation. O. trifallax is certainly an unusual organism.
25. Enrique Amaya
February 10, 2013
These little guys also undergo fascinating epigenetic modifications of their genome, which essentially tags their “junk DNA” for elimination. Pretty coo!
26. Gerhard
February 26, 2013
Thank you for this information. Really fascinating, that “beast”… it’s way to protect seems to be rather fail-safe – with even a complete “back-up”, in case of… This way to do funnily reminds me of Internet, doesn’t that work in a (farthely) similar way ? : Cutting information into small chunks, sending them by different ways, we not really can know how, and at the receiving end put those peaces together, to restore the original information ? If it were so, it might be interesting, to look into those “ends of shoelaces”, the aiglets, perhaps they’d contain some kind of URL ? Something which tells how to assemple them ? I not am biologolist nor informatician, just an old engeneer – Our buildings and machines do not work that way : When one part fails, the whole thing goes to pieces… In some way, it seems to me that this is quite okay so – ashes to ashes… We try to be aeternal, but most of what we humans do neither is of no good for nature around, nor for us ourselves. Trying to understand how life works, is nice. Pardon me.
27. The lead author
February 27, 2013
Just stumbled across this. Have been working hard to get the next weird ciliate story reviewed (in Paramecium)… Thanks for this great writeup! I’m a firm believer that much more interesting biology remains to be discovered, if we only but cast our eyes upon the unfamiliar.
Add Your Comments
All fields required.
Related Posts
|
global_05_local_4_shard_00000656_processed.jsonl/84924
|
Discuss as:
Uttar Pradesh goes to the polls in election of critical importance to India
Manish Swarup / AP
A woman adjusts the cap of her child as she waits in line to cast her vote in Ayodhya, India, on Feb. 8, 2012.
Adnan Abidi / Reuters
A Hindu holy man shows his ink-marked finger after casting his vote in Ayodhya on Feb. 8, 2012.
Residents in India's most populous state began voting Wednesday in a monthlong local election with repercussions for the whole nation, The Associated Press reports. Uttar Pradesh is so large, with 200 million people—enough to make it the world's fifth most populous nation if independent—that voting is spread over seven phases and will last until March 3. Results will be declared March 6.
More on the politics of Uttar Pradesh:
|
global_05_local_4_shard_00000656_processed.jsonl/84931
|
Clear link between solar activity and winter weather revealed
Oct 10, 2011 by Tamera Jones
Scientists have demonstrated a clear link between the 11-year sun cycle and winter weather over the northern hemisphere for the first time.
They found that low solar activity can contribute to cold winters in the UK, northern Europe and parts of America. But high activity from the sun has the opposite effect.
The study helps explain why the UK has been gripped by such cold winters over the last few years: the sun is just emerging from a so-called , when solar activity is at its lowest.
'Our research establishes the link between the and winter climate as more than just coincidence,' says Dr Adam Scaife from the UK's Met Office, one of the study's authors.
The findings, published in Nature Geoscience also raise the tantalising possibility that the regularity of the solar cycle might help weathermen predict cold winter weather over the northern hemisphere.
'We've been able to reproduce a consistent , confirm how it works, and quantify it using a . This isn't the sole driver of winter climate over our region, but it is a significant factor and understanding it is important for seasonal to decadal forecasting,' says Scaife.
Up until now, researchers have only managed to see a weak link between solar activity and winter weather: when the sun is less active, we're more likely to see weak westerly winds during the winter in the . This pattern suggests that easterly winds could bring from the continent to the UK.
But scientists have struggled to incorporate these ultraviolet (UV) signals into climate models.
Now, new from NASA's and (SORCE) have revealed that differences in UV light reaching the Earth during the 11-year solar cycle are larger than previously thought. The satellite, launched in 2003, is the first ever to measure solar radiation across the entire UV spectrum.
'The instrument on the SORCE satellite divides UV light up into small wavelength regions, providing good spectral resolution. Before this, used broad spectral bands, so couldn't reveal the solar signal,' explains Professor of atmospheric physics, Joanna Haigh from Imperial College London.
Using this new information in a Met Office climate model, Scaife, Haigh, and other researchers from the Met Office and the University of Oxford, demonstrate that it's possible to reproduce the effects of solar variability which show up in climate records.
It seems that in years of low UV activity, unusually cold air forms over the tropics in the stratosphere, about 50 kilometres up. This is balanced by a more easterly flow of air over the mid latitudes – a pattern which then makes its way down to the Earth's surface, bringing easterly winds and to northern Europe.
But when is higher than usual – around the peak of the 11-year solar cycle – the opposite happens: strong westerly winds bring warm air and so milder winters to Europe.
'What we're seeing is UV levels affecting the distribution of air masses around the Atlantic basin. This causes a redistribution of heat – so while Europe and the US may be cooler, Canada and the Mediterranean will be warmer, and there is little direct impact on global temperatures,' explains Sarah Ineson from the Met Office, lead author of the report.
'Even with the most sophisticated atmospheric models, it is very hard to predict weather patterns on seasonal timescales. This study, along with our ongoing research through the NERC Solar Variability and Climate (SOLCLI) consortium, is adding much detail to our current understanding,' says Haigh.
She is keen to point out that this finding is based on just one satellite: 'If there's something wrong with the instrument we used to get this new data, this might not be right.'
Haigh is however, confident of the mechanism. 'While statistical data pointed to links between UV from the sun and winter weather, this new paper explains how those links come about,' she says.
Explore further: New study confirms water vapor as global warming amplifier
More information: Sarah Ineson, Adam A. Scaife, Jeff R. Knight, James C. Manners, Nick J. Dunstone, Lesley J. Gray and Joanna D. Haigh, Solar forcing of winter climate variability in the northern hemisphere, Nature Geoscience, published 9 October 2011, doi:10.1038/ngeo1282
Related Stories
Are winters in Europe becoming colder?
Apr 20, 2010
Link between solar activity and the UK's cold winters
Apr 15, 2010
The Sun Loses its Spots
Jul 24, 2007
Recommended for you
Excavated ship traced to Colonial-era Philadelphia
21 minutes ago
Tropical tempests take encouragement from environment
1 hour ago
User comments : 15
Adjust slider to filter visible comments by rank
Display comments: newest first
Fu Rod
4 / 5 (5) Oct 10, 2011
How does Piers Corbyn's method compare with this finding?
5 / 5 (6) Oct 10, 2011
This was noticed by astronomers in the 17th century. At the time the Thames froze over in London, the winters were so cold, the astronomers could not find any sun-spots.
4.2 / 5 (25) Oct 10, 2011
This does not prove the sun is a pulsar surrounded by a shell of waste helium and hydrogen. This does not prove the sun is powered by neutron repulsion. This does not prove some sort of global conspiracy to hide data to prevent nuclear war by making up global warming.
3 / 5 (6) Oct 10, 2011
This is the Black Swan, the demarcation problem and failure of induction writ large.
Yes, we are emerging from a peculiarly deep ''so-called solar minimum'' and the projections are for a weak maximum. Will the climate trends follow the solar activity?
3.1 / 5 (7) Oct 10, 2011
What isdarkdestruction said
5 / 5 (4) Oct 10, 2011
amazing, not a single mention of the great sky dragon, hurrah!
3.7 / 5 (3) Oct 10, 2011
How does this compare to Henrik Svensmark's theory about solar magnetic fields and cloud-cover ?
Why is the UV radiation lower when solar activity is lower ?
2.2 / 5 (20) Oct 10, 2011
I hope my buy in Reynolds stock went through before Oliver got to the super market. He's definitely going to be afraid of the Bilderbergs now. lol
Aren't you one of the model deniers?
We've been able to reproduce a consistent climate pattern, confirm how it works, and quantify it using a computer model.
Seems like you're okay with models that confirm your bias.
3.3 / 5 (3) Oct 10, 2011
Aliensarethere: UV is lower during low activity because the "normal" solar temperature produces relatively little UV. While the most visible sign of activity is usually cool sunspots, they're more than balanced by hotter active areas. These hotter areas produce more UV per square kilometer than the "normal" Sun, increasing the total UV output. In fact, the Sun is also brighter in visible light during active periods, in spite of the sunspots.
2.2 / 5 (6) Oct 10, 2011
Apparently, motion of Jupiter planet affects the location of center of mass of solar system, which affects the convection of solar plasma. When the center of mass appears beneath the Sun surface, the solar plasma doesn't circulate well and it tends to formation of bubbles (sun spots), solar bursts and solar flares.
not rated yet Oct 10, 2011
Well, just in case the sunspots don't arrive in time for this Winter, we've bought urban crampons...
1 / 5 (1) Oct 10, 2011
No but maybe this does
1 / 5 (3) Oct 10, 2011
too bad most of the other climate related satellites failed to launch, i wonder what science could do with more data rather than echo-chamber modeling
1.7 / 5 (6) Oct 11, 2011
It's already been published that the main cause of climate change (in fact, the main weather promoter) is the Sun.
The difficulty is to get this in the minds and souls of those already hooked by the propaganda (sort of Goebbels' style) of the financially motivated weather alarmists.
not rated yet Oct 11, 2011
I've always felt that the solar cycle was related to weather variations, but as I was instructed many years ago, the curiously similar contours between the continents, like Africa and S. America, were just "coincidence". Tectonics was not even a theory back then. Always nice to see science in action.
|
global_05_local_4_shard_00000656_processed.jsonl/84937
|
Take the 2-minute tour ×
In a recent publication, Experimentally Faking the Violation of Bell’s Inequalities (Gerhardt 2011) (arXiv version), the statistics of quantum mechanics is faked using classical light sources. But if it is possible for physicists to fake an experiment to imitate QM, how can we be sure that nature doesn't do the same trick on us? Can it be that QM is a fake, and in the end QM turns out to be an artifact of our imperfect measurement devices?
share|improve this question
I am not going to post it as a full answer because I think that this question is a provocation to punish those who dare to consider quantum mechanics as a fact by those who have irrational reasons to dislike it. However, when one insists on locality (slower-than-light propagation of signals), and locality follows both from the field-theory nature of low-energy physics as well as special relativity, then the quantum EPR correlations simply can't be "faked". That was exactly why Einstein invented EPR to protest QM in the first place. One may only fake it by violating other rules of the game too. – Luboš Motl Nov 16 '11 at 6:49
So one may do many tricks just like David Copperfield but physics is not about tricks and "faking" things: physics is about the search for theories that agree with all the observations. There exists no non-quantum theory that would agree with the observations of elementary particles, including their wave-like properties and their respect for the Lorentz invariance. So "faking" papers are on par with various other papers trying to create "illusions" that something is moving faster than light, and so on, and so on. They're just illusions and we know how they differ from the real world. – Luboš Motl Nov 16 '11 at 6:52
youtube.com/watch?v=P6MOnehCOUw – Georg Nov 16 '11 at 10:26
I am fairly sure that in the recent neutrino experiment, Nature is indeed faking faster-than-light travel, but I also believe that it's not going to stand up to as many replications of the experiment as quantum mechanics has. – Peter Shor Nov 17 '11 at 17:10
2 Answers 2
up vote 3 down vote accepted
I'm not sure it makes sense to ask if Nature is "imitating" Quantum Mechanics.
Quantum mechanics is a mathematical model that gives predictions that are in excellent, well so far perfect, agreement with what we actually see.
I guess the question is whether QM is just a good approximation to the real world or whether it's an exact description of the real world. We'll never be able to prove it's an exact description, but someday someone may find an experiment where QM gives the wrong answers. If so this would prove it's just an excellent approximation.
share|improve this answer
We can't be 100% sure that quantum mechanics is exact until we are able to do a quantum computation in a real system that would be impossible to perform on a classical computer roughly of size the universe. This looks like it is possible, there is no indication that quantum mechanics is only approximate, and there is no known classical theory which limits to quantum mechanics for small systems, but becomes something else for large ones.
But our tests of quantum mechanics are limited to a certain extent by our ability to compute predictions of the theory. By definition, we cannot predict the behavior of a quantum mechanical system which takes exponential resources, because the computation is too big. We must resort to approximations which might disguise a failure of the theory. So while it is unlikely, it is possible that nature is not fundamentally quantum mechanical, and that we just have not seen the breakdown of QM yet.
This type of statement is predictive--- it requires that a quantum computer will have mysterious unaccounted for sources of decoherence which are not due to known interactions, but which are fundamentally due to the breakdown of quantum mechanics. If a quantum computer is built which can regularly factor 100,000 digit numbers, this is good enough to establish that our universe is not classical down below, because such a feat would require too big a classical computer to realistically implement inside our universe, were it classical.
share|improve this answer
I don't think your first sentence holds up logically. Even if we were able to do a quantum computation in a real system that is impossible to perform on a classical computer roughly the size of the universe, how do we know that there's not a part of the universe invisible to us that is contributing to the computation? Also, how could the entire universe be contributing to a computation that is taking place in a small room on Earth? – Peter Shor Nov 17 '11 at 14:44
@Peter Shor: I am not speaking as a philosopher, but as a physicist. I agree that it is logically possible that the universe is being simulated on an enormous computer, but this would not be physical. The reason for allowing the whole universe to contribute is the holographic principle--- the room is spread out over a cosmological horizon, and in principle some fraction of the whole horizon could be contributing to the process. Any more bits than what can fit on the cosmological horizon is physically impossible. BTW, this argument is due to t'Hooft, not me personally. – Ron Maimon Nov 17 '11 at 14:48
I would personally be convinced by factoring 1000 digit numbers, or even a few hundred. It is very implausible to get such an exponential speed up in any imaginable "beable" model even spread out nonlocally on the cosmological horizon. But Grover's algorithm, or any other square-root type speedup, could be imaginably fake for essentially any system size (although it likely isn't--- I tend to believe QM is exact--- it just would be nice to be sure). – Ron Maimon Nov 17 '11 at 15:05
Good point about the cosmological horizon. But if the universe is expending all its computing power on this little room on earth with a quantum computer that's factoring a large number, where is it getting the computing power to power the quantum computers being used by alien civilizations (let alone processing ordinary physics)? – Peter Shor Nov 17 '11 at 15:26
@Peter Shor: sure, this is implausible. This is why small numbers are already enough to convince me. But I imagine that if you can factor 1000 digit numbers, there is no harm in going to 100,000, just to convince the die-hard skeptics. – Ron Maimon Nov 17 '11 at 16:00
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/84938
|
Take the 2-minute tour ×
I am looking the simplest system that has both discontinous phase transition and a continous phase transition between the same phases (you can change one parameter).
discontinous transition: first order transition where (some) measurable has a discontinuity/non-analyticity as a function of (some) order parameter
continous transition: measurable is continous/analytical for all values of order parameter.
simplest: Requires the smallest number of mathematical symbols and is still defined exactly c.f. ising model.
EDIT: Removed water as an example. Above critical point, water has no phase transition as Alexei pointed out. So, all the transitions of water are first order...
share|improve this question
I don't know why you removed water --- it seems exactly the right example. Below the critical point, you obviously have discontinuous transitions, and if you move along that discontinuity, you get a continuous transition at the critical point. In fact, these two facts are really fundamentally linked. Furthermore, many magnetic models are in the same universality class, so behave the same. – genneth Sep 27 '12 at 10:13
@genneth, Can you distinguish the two phases above or at the critical point? I think this is the essence of my question (or at least what I want to know). To my knowledge, you should be able to distinguish the different phases regardless of the transition type. Also (now) it seems that in all the examples there exists only one critical point for transition of type a and rest is a transition of type b... – Juha Sep 27 '12 at 11:13
@Juha "in all the examples there exists only one critical point for transition of type a and rest is a transition of type b" This is not right. It is indeed the case for the so-called isolated Curie point. This is, however, very rarely met in nature, if any. But for the so-called, first order transition close to the second order (the alternative name is the tri-cricital point vicinity) the line of the second order transition becomes the line of the first order one. – Alexei Boulbitch Nov 5 '12 at 13:53
Why do not you look into some textbook. For example, in the book Toledano, J. C. & Toledano, P. The Landau Theory of Phase Transitions. (World Scientific, Singapore, 1987) you will find lots of examples on this subject. You may also look into another book as well. I only gave this reference, since it was right at hand. – Alexei Boulbitch Nov 5 '12 at 13:55
In fact your requirement to be able to always distinguish between phases is always achieved, if the phase transition is associated with the symmetry break. This is the case of 99% of phase transitions. If the transition is isostructural, no symmetry break takes place, and you may only distinguish the two phases by the volume of elementary cell in the transition point, if the transition is first order and the volume dependence upon, say, temperature exhibits a discontinuity. – Alexei Boulbitch Nov 5 '12 at 14:03
4 Answers 4
up vote 1 down vote accepted
Let me give a more mathematical perspective on that.
As far as I know, the classical example of a system you are looking for -- is the basic landau theory with a cubic term:
$$F=r\Psi^2+s\Psi^4+\alpha\Psi^3,\quad r=r_0(T-T_c)$$
• If $\alpha=0$ then you have just a standard theory for 2nd order phase transistion.
• While at $\alpha\ne0$ you'll have a discontinuity in the order parameter dependence on temperature.
Regarding your comment: if one restricts values of $\Psi$ to be positive -- then one gets exactly what you want. The restriction is quite natural if you, say, have two-component order parameter $\vec{\phi}=(\phi_1,\phi_2)$ and $\Psi=|\vec{\phi}|$.
share|improve this answer
Can you modify this so that there is more values for $\alpha$ by adding higher order terms? E.g. discontinuity when $\alpha' \lt 0$ and second order when $\alpha' \ge 0$. – Juha Sep 27 '12 at 11:17
@Juha: I think so. See my edits. – Kostya Sep 27 '12 at 11:41
I think you are wrong with water. Above the critical point there is no transition in water at all. This is also true for any other isostructural transition: as soon as there is no symmetry difference between the phases, in the continuous case you cannot say, if the transition has already taken place. A correct example should be probably, KHP (potassium dihydrogen phosphate, see here: http://en.wikipedia.org/wiki/Monopotassium_phosphate or KDP (Potassium deuterium phosphate). You may look into the books of Tonkov: 1. Tonkov, E. Y. High pressure phase transformations (Gordon and Breach, Philadelphia u.a., 1996). 2. Tonkov, E. Y. High Pressure Phase Transformations: A Handbook: (Gordon and Breach SA, 1992). and may be also in this one: Tonkov, E. Y. & Ponyatovsky, E. G. Phase Transformations of Elements Under High Pressure (Advances in Metallic Alloys) (Crc Press Inc, 2004). You will find there lots of examples of various transitions, and I have also seen there examples of transitions of the second order that come into the first order through a so-called, tri-critical point. It should be the example you are after. To my knowledge, there are, however, only few such examples in structural phase transitions. There should be some more examples among magnetics, but here I am not a specialist.
share|improve this answer
I would be interested in these magnetic systems. Can you perhaps point where to start looking? – Juha Sep 26 '12 at 11:55
I am not aware much about magnetics. You may go through Tonkov anyway, he did not consider any special type of transition, but just enumerated all phases and transitions that are there in a material under consideration. – Alexei Boulbitch Sep 27 '12 at 7:04
Just the comment to the answer of Kostya. The question seems to be concerning experimental examples. If one speaks about the theoretical description, then the example with the cubic term has only a so-called, isolated Curie point, which is indeed the second order. Experimentally such case takes place in some liquid crystals. The other theoretical example would be the so-called, first order close to the second with the potential possessing the second, fourth and sixth order terms. These are sometimes observed in solid phases, the KHP is the example. – Alexei Boulbitch Oct 4 '12 at 14:39
First, make sure to read up on definitions to clarify what you are looking for - classification of phase transitions isn't 100% science, and has a little bit of fussiness to it. Wikipedia's page isn't terrible.
Second, I can't tell you whether it is the simplest or not, but as I understand your question, the Ising model itself satisfies your conditions, as long as you include a magnetic field (and are in dimension d=2 or higher, so that there is a phase transition!).
At zero magnetic field, if we decrease the temperature of the Ising model from $T > T_c$ to $T < T_c$, the magnetization M(T) increases continuously, i.e. we can get an arbitrarily small M by taking T arbitrarily close to Tc. Now, suppose the model is below Tc and we have a nonzero magnetic field, $h > 0$; the magnetization will then be positive. As we decrease h to zero, the magnetization will discontinuously change from being positive for any $h>0$ to being negative for any $h < 0$. So for $T<T_c$, there is a first-order phase transition line. The phase diagram can be seen on this webpage and this is discussed more in most stat mech textbooks. My favorite for this is Nigel Goldenfeld's Lectures On Phase Transitions And The Renormalization Group.
share|improve this answer
Many order-disorder transitions are second order, for example the order-disorder transition in $\beta$-brass. So brass would be an example of a material showing both first and second order transitions.
However even simpler is, as Alexei pointed out, the magnetic transition in iron that happens at the Curie temperature is second order. So iron is probably the simplest system that fits your criteria.
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/84945
|
Wednesday, September 30, 2009
I Brake for Yard Sales
Listen carefully, I have some very important advice for you.
You must - MUST - stop at yard sales.
You never - NEVER - know what you'll find.
A beautiful antique floor lamp, a backpack, a decorative candle....
Two goofy costumes made out of cardboard and paint....
If you never stop, you'll never happen upon a find like these. And then you'll never be able to come home, make your 16 yr old and husband dress up in them and make fools of themselves in the yard.
And that'd just be a real shame.
Tuesday, September 29, 2009
Another Farm Fiasco Part II
Hey cows! readers! Remember part I of the Great Escape story? Here's part II. The part where I save the day. Seriously!
From my sister's blog I quote, "[She] saved the day, I tell you." In italics.
Nevermind it was after a thinly veiled criticism of my tendency to talk a lot. But hey, it was my ability to talk a lot that saved the day. In italics.
(I kinda like this whole 'someone else writes my blog posts' thing.)
Hey cow - Who you lookin' at, huh? After all that, I'm done taking any crap from you bovines, ya hear? Done.
I think we've been going too easy on them. Gotta show 'em who's boss. This oughta intimidate 'em: You think?
Monday, September 28, 2009
Ten Things Overheard at Grandma's Birthday Party
Mom: "That was a long time ago."
(Note: It WAS a dead chicken.)
(Yes way.)
Grandma: "A dead chicken for an old hen!"
Grandma: "Dead beets from a bunch of deadbeats."
and a bonus:
Monday, September 21, 2009
Google Likes Me! They Really Really Like Me!
Did you know that if you search for "Boots in the 80's," my blog comes up as the first option of 3,010,000? I thought you might want to know. And here's why.
I think it should somehow be my new tagline...
"Wistful Wanderlust.... Your Place for Useless Knowledge"
Friday, September 18, 2009
Another Farm Fiasco
"Now where'd did that d*mn steer go?!?"
We had another eventful weekend on the farm, but this time it wasn't my fault! I wasn't involved! I am completely innocent of any and all wrong-doing!
Ok, I did inadvertently allow that one rogue steer to crash through the fence (as opposed to jumping over, like a sane animal might do) and escape into a 100 acre cornfield, but that's only because after racing him up and down the fence line he finally decided to show me who's boss and put on the steam.
Sounds like a new tv game show - "Are You Faster than a 1000 lb. Steer?"
In a word, no. No, no I'm not.
I'd love to tell you the whole story, but I've got a busy weekend ahead. I'll let my sister regale you with the details. Besides, it's her farm, they're her steers, and it's about time one of the farm fiascos happened while she was in town rather than out,
leaving us dopes in charge. (Wishing now you'd've booked that exotic Caribbean cruise, aren't ya sis.)
And besides, she's funny. And she can lift haybales her own d*mn self, thank you very much.
Part I of the "Great Escape" is here. Enjoy!
|
global_05_local_4_shard_00000656_processed.jsonl/84961
|
Loss of Libido in Details, Hormonal Aspects of Loss of Libido
Loss of LibidoLoss of sexual desire is one of the most harmful symptoms of menopause, as it touches not only the physiological sphere, but has a great impact on relationship. Loss of libido is a common menopause ‘side effect’ that covers about 20 – 40 % or all women at the period of menopause. It is important to understand that such changes usually have complex reasons, like hormonal imbalance, psychological disorders and age-related changes.
If you want to manage with loss of libido, as well as other menopause symptoms, you should study the causes and potential remedies of this disorder. By understanding its origin you will be able to find appropriate solution to remove the source of the problem and return to a stable healthy lifestyle.
Loss of Libido in Details
Loss of libido is a complex disorder that relies on various psychological, physical and hormonal reasons. It has highly individual character, different for each woman.
Traditionally the term ‘libido’ is associated with sexual desire, describing the level of person’s sexual activity. In medical sense loss of libido is a disorder displaying in reduce of interest to sexual activity, lack of desire to have sex.
Women experiencing libido loss admit that they become less sensitive to sexual caress, they are not aroused or it takes too long to get aroused during sexual contact. Also they have no energy for sex, they lose the feeling of their own sexuality. When having sex, women with loss of libido experience vaginal dryness and painful feelings during intercourse.
Some women during menopause become unable to achieve orgasm or even arouse enough for sex. These symptoms are also associated with loss of libido, although such women didn’t lose the physiological ability to have sex. These symptoms mostly caused by hormonal imbalance and psychological problems.
Reasons of Loss of Libido
Loss of libido is one of menopause symptoms that occur mostly because of hormonal changes in female organism. Besides endocrine disorders, libido is very sensitive to various psychological problems, like stresses and conflicts, especially if they are caused by sexual partner.
Hormonal Aspects of Loss of Libido
As was said before, hormones are the root source of libido changes in female body. The imbalance of three main hormones levels can reduce the desire to have sex and ability to get sexual satisfaction.
Estrogen is a female hormone responsible for female sexual sensitivity and influencing on the process of vaginal lubrication output. It influences greatly on the normal state of vaginal tissue.
During menopause, female body produces less natural estrogen. As a result, it causes various unwanted symptoms like night sweats, vaginal dryness, irregular menstruation, and of course it has much impact on libido.
Progesterone hormone is acting in female organism in pair with estrogen. Any imbalance between these two hormones leads to various health problems, like irregular menstruation, lack of energy, constant tiredness. All these effects may cause loss of libido.
Androgens/ Testosterone
Androgens are naturally produced in less concentration within the age-related changes. The balance between estrogen and estrogen hormones (like testosterone) is very important to female organism, as only the normal levels of all hormones provide stable operation of reproductive, immune and circulatory systems. Less testosterone in female body can also mean the decreased sexual desires and discomfort during the sex.
Besides hormonal reasons, there are some other causes of loss of libido that also deserve attention if you want to get rid of this problem. There is a list of potential non-hormonal reasons of loss of libido.
What Else May Cause Loss of Libido?
For better convenience alternative causes are divided into three groups: physical, emotional and relational.
Physical causes include the following:
-Various pains during the sex
-Sexual dysfunction
-Using medicines with side-effect of decreased libido
-Surgery (hysterectomy)
-Vaginal dryness
-Diabetes and other chronic diseases
-Heart disorders
Emotional reasons usually include this:
-Stresses, depression
-Changes self-appraisal due to weight problems and other visual changes
-Age concerns
-Feel of anxiety and other psychological disorders
Relational reasons touch the following spheres:
-Conflicts with sexual partner
-The changes in intimate relationship
-Changes in social status
-Other life changes
-Lack of communication with partner
-Changing the sexual partner or divorcing
-As a rule a combination of these causes may lead to loss of libido and problems in sexual sphere.
Therapy for Fighting The Loss of Libido
There is variety of available approaches for loss of libido treatment. Usually the choice of remedies is made according to the cause of the problem. If it is a psychological problem, you should take care of your emotions and try to normalize your state by relaxation practice, psychologist consultations, changing the lifestyle.
Correct your diet to exclude possible food impact on your libido, orient your ration to soy products, protein-comprising foods, magnesium sources like leafy greens, buckwheat etc. Also it will be useful to include liver, oysters, red meat and other products that contain zync.
Physical activity is also helpful for both physical and emotional causes of loss of libido. It is recommended to use aerobics, yoga practices, Kegel exercises to maintain your vaginal tone. Stretching is also helpful for improving body shape and tone.
Most of menopausal problems of loss of libido is directly connected with hormone changes that should be removed by using natural herbs that will help to adjust endocrine system to a normal state. The hormone problems can be solved by other therapies like chemical drugs or surgery, if they become too severe and don’t react on homeopathic treatment.
Natural Period Pain Remedies
Find US hospital online - usa-hospitals.net
|
global_05_local_4_shard_00000656_processed.jsonl/84964
|
Pokémon Wiki
Generation I Pokémon
8,285pages on
this wiki
Category page
Revision as of 22:41, June 17, 2013 by Dean624 (Talk | contribs)
These are the Pokemon from Generation I of the series,
Around Wikia's network
Random Wiki
|
global_05_local_4_shard_00000656_processed.jsonl/84965
|
Meta Battle Subway PokeBase - Pokemon Q&A
Changing pokemon nicknames
1 vote
My friend traded me a Serperior but gave it a really dumb nickname, And i want to change it. How do i change nicknames??
asked Apr 14, 2012 by PerrysPower
2 Answers
1 vote
unfortunately, you cannot change the name of a pokemon you traded from someone else. If it's really that bad, you could trade it back, ask them to trade it, and get it again.
You could also breed to get another Pokemon of that kind (in this case, Snivy, then evolve it) to get Serperior, but of course, that takes time and I don't know if the Serperior you got was EV trained, had a specific moveset or ability, or whatever.
answered Apr 14, 2012 by DarkTyphlosion
Does the serperior have to be a girl to breed? Because i have a guy one.
In most cases, yes. You would get whatever female pokemon you have. Though there is an exception to the rule in that you could breed it with Ditto and automatically get a Snivy that way, even though Serperior is a male.
So i can put a male serperior and a ditto in the day care and it will get a egg with snivy in it? BTW thank you for the help
Yeah, that simple.
0 votes
You will have to trade it back to him and tell him to change it. Pokemon's names can not be changed if they aren't yours.
answered Apr 14, 2012 by Saz
|
global_05_local_4_shard_00000656_processed.jsonl/84966
|
Meta Battle Subway PokeBase - Pokemon Q&A
give meh a pokemon that fits this PART 4
0 votes
A wall. I <3 walls
•no egg move
•no DW ability
•good defenses
•has few weaknesses
asked May 7, 2012 by Gʟɪɢᴜʀʀ
2 Answers
1 vote
Best answer
Claydol @ leftovers
Ability: Levitite
Nature: Careful (+ def, -Sp.attack)
252 Def
252 HP
4 SP. defense
Toxic-badly poisons
Dig- attacks pokemon which is poison or steel, which doesn't get affected by toxic
Doesn't get affected by e-quake since it has levitite. Also damages the foe infected by poison while it is underground
Cosmic Power-raises def, spdef
Explosion-when it battles very strong pokemon... KABOOOOM!!
answered May 7, 2012 by MiniNinetales
i like this :)
thanks :)
1 vote
Scrafty (M) @ Big Root
Nature: Adamant (+Atk, -SpAtk)
Trait: Shed Skin
EV Spread:
252 Atk
128 Def
128 SpDef
-Bulk Up
-Drain Punch
-Rock Slide
Dusclops (M) @ Eviolite
Nature: Impish (+Def, -SpAtk)
Trait: Pressure
EV Spread:
255 Def
255 SpDef
-Pain Split
-Confuse Ray
answered May 7, 2012 by 5th of November
I wish i could dive you both BA Y-Y
Just to say: i have had much success with both of them.
|
global_05_local_4_shard_00000656_processed.jsonl/84967
|
Take the 2-minute tour ×
Lately there's been a significant growth in the number of tournaments that stay open for late registration.
It's a good thing in that it allows a far greater number of entrants, and you don't have to miss your favourite tournament because you're still playing the final table of one you started ages ago.
Now, with a tournament that has 2 hours of late registration, and standard 12-15 minute blinds, is it best to join at the start, when you'll have 150 BBs, or near the end of late reg, when you'll have around 30 BBs?
I know it sounds simple and you should just start with loads of BBs, but at the start you'll be battling far more players, giving you both a greater chance of building a large stack but a somewhat equal chance of going out early.
When you join 5 minutes before the end of late registration you usually have roughly half the average stack, but with that comes up to half the number of total entrants still running, so half the number of opponents as well as a more clear view of the table dynamics due to stack sizes etc.
What should I factor in, and if possible, how could I calculate my expected value for entering at various different stages of late registration?
share|improve this question
3 Answers 3
up vote 3 down vote accepted
You should enter the tournament as early as possible. Presumably, you're participating in the tournament because you have some sort of edge against the field. In other words, you should be playing the tournament because it is profitable for you to do so.
Playing the earlier stages of the tournament lets you play more hands against your opponents, which (particularly in the long run) reduces variance (see the law of large numbers).
Playing the earlier stages of the tournament also lets you play against the weakest players who are likely to make massive mistakes early on that get them eliminated quickly. Being able to capitalize on these mistakes and get a large stack early is a huge opportunity that you shouldn't pass up.
Finally, the earlier stages of the tournament have deeper stacks. Instead of getting into lots of marginal spots where you're coin-flipping preflop you'll have more room to navigate postflop. Your skill over your opponents is more easily realized with deeper stacks.
share|improve this answer
I like your reasoning, I'm inclined to accept :) – Mr E. Upvoter Oct 18 '13 at 17:07
+1 couldn't have said it better myself – Radu Murzea Oct 18 '13 at 20:09
As you said, it is easy. You want to start with the maximum BB's. Play tight in beginning to increase your stack. If you join as shortstack with around 30 bb's you can be an easy victim by someone who pushes you all in without any problems. That will not happen in the beginning phase, because everyone has the same amount of bb's.. as you said, easy. :))
now the factor:
if the entry for your tournament is LOW , the gambling increases, because many people don't care enough. For example 1 $ sit 'n' go. You can join the table, go afk and thake a bath. after 1,5 hours you will still have 50% of your stack and YOU SOMETIMES ARE ALREADY IN THE MONEY haha. That really works, so for low money tournaments starting late can be good. The bigger the prize the earlier you should go in, maybe you miss some good hands?
Disadvantage, if you start early you will probably stay in longer in tournament and your concentration will suffer from time. That's my opionen of course, some other might see it from another point of view...
share|improve this answer
I guess the best answer to this is that you should join whenever you will have a stack that you are comfortable playing with.
If you are comfortable playing with a short stack then join right at the end of the late reg. (This what i do quite often). As long as you have over 10bb then you have a little bit of play before you have to be in Shove Fold mode.
If you are not good as a short stack then, either join straight away, or wait 30 mins or so!
share|improve this answer
I find anything less than 15 BBs a shove/fold type stack. I won't just shove only, I'll commit my stack to a pot I choose to play (raise 30 - 60% of my stack preflop) making it clear to the other players that I'm not afraid to stack off with my hand, and discouraging bluffers. Personally I don't enjoy being at risk of going out as soon as I join though, but it really depends on the speed of the blinds and my buy-in. For micro buy-ins I'd probably wait, whereas for buy-ins that are a little higher, I want more value for my money and time to play. The higher the stakes, the harder the opponents. – Mr E. Upvoter Sep 14 '13 at 20:54
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/84990
|
Present Remotely
Send the link below via email or IM
Present to your audience
Start remote presentation
• Invited audience members will follow you as you navigate and present
• People invited to a presentation do not need a Prezi account
• This link expires 10 minutes after you close the presentation
• A maximum of 30 users can follow your presentation
• Learn more about this feature in the manual
Do you really want to delete this prezi?
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
No, thanks
How did greek mythology affect the lives of ancient Greeks?
No description
by Thailey Leak on 23 April 2013
Comments (0)
Please log in to add your comment.
Report abuse
Transcript of How did greek mythology affect the lives of ancient Greeks?
Ancient Greece Built temples for the gods
Sung choruses, gave food sacrifices and prayers at the altar
Not a private altar Worshiping the gods...... So, how did Greek mythology affect the lives of Ancient Greeks..... Almost everything they did had to do with Greek mythology.
They spent most of their days giving sacrifices and worshiping the gods.
They also built temples and buildings for the gods. In many ways..... How did Greek mythology affect the lives of ancient Greeks? Mythology-study of myths The main gods and goddesses were..... Zeus, was the king of all the gods and goddesses, ruler of the sky.
Poseidon, was the ruler of the sea.
Hades, was the ruler of the underworld.
Athena, was the goddesses of Athens and crafts, also called the goddesses of wisdom. Who were the main gods and goddesses and what did they do? What do Greeks do to worship the gods? Bibliography (2003). Ancient Greece (chapter 6). In The Ancient World (pp. 152-186). Upper Saddle River (NJ): Prentice Hall.
BBC:Ancient Greeks. (2013). Retrieved march 12, 2013, from
Greek Gods and Goddesses. (2001). Retrieved march 8, 2013, from Greek Mythology: Gods, Titans and More: What is mythology? What did the myths explain to people? The myths explained people's beliefs The End
See the full transcript
|
global_05_local_4_shard_00000656_processed.jsonl/85002
|
Take the 2-minute tour ×
For example, like this icon website: http://www.iconspedia.com/
There is a lot icon there, (I just can't draw myself, I am not good at it.....), I wonder if is OK to use them in my software project?
Will the type of project make difference?
i.e Open Source Application, Commercial Application, Free Download Application?
share|improve this question
2 Answers 2
up vote 4 down vote accepted
Free icons does imply they are free to use.
The FAQ says to check the license agreement in each individual pack, some may require crediting the artis or be under creative commons or similar.
Unfortunately most of the licenses use rather uncertain phrases - like free for "non-commercial use" or "free for personal use". It's very difficult to decide exactly what these mean - which is why licenses like the GPL contain a lot of text and some very carefully chosen words.
But if this is just for a project for yourself that you aren't selling it seems that mot of these sets would be fine.
share|improve this answer
I just want to write a random metro application and publish it with some of their icon, it seems more diffcult now..... – King Chan Nov 3 '12 at 20:25
If there is a particular set you like email the author and ask – Martin Beckett Nov 3 '12 at 20:50
The type of project makes a difference as does the terms of the site you got the image from. Some sites do not allow for usage of images without paid licensing, some without attribution, and some are entirely free, local country of origin's laws aside. It can also depend on the project. Some are available for use in applications made by students for educational, noncommercial purposes. Others are available only for commercial applications. It all depends on the photos or pictures in question.
In the case of Iconspedia, each icon has a listing for what license applies to it. It appears most are non-commercial usage only from a cursory perusal.
share|improve this answer
Ahh... it seems more complicate than I thought now... – King Chan Nov 3 '12 at 20:23
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/85013
|
Wednesday, October 10, 2012
The fifth graders of the PS22 Chorus of 2013 are exploding with talent, shown here singing "Dynamite" by Taio Cruz! Soloist Christopher asked for this one, and of course we are blown away by his and the chorus's amazing performance!
Andre said...
Another good one. And it's great to already see more confidence with the kids.
I'm missing the "and they learned it today", but seeing as we got Wonderwall on Monday there couldn't have been that much of a learning time. But this time I can't complain about not being able to listen to the radio as I haven't heard the song before (or if I did I can't remember).
Anonymous said...
We guys all did great <3<3<3<3 i love u all <3 :-D<3<3<3<3 we would not be this good if it was'nt from MR.B!!!!!!!!!!!! :-) <3<3:-D
Delaney-5@127 ;-)
Anonymous said...
EWRMAHGERD! I clap for Mr. B. I'm the soprano 2nd row 3rd seat. <3
Anonymous said...
I loved this. I was with the messy hair in row 2 seat 3. Not my best idea to have my hair like that. :3
- Le Nadia (LOL for "le" :3)
awsome said...
so awesome the one who was singing was soooooooooooooooo cute no lie besides that you guys did great
|
global_05_local_4_shard_00000656_processed.jsonl/85019
|
Psychology Wiki
LD:Clin issues: Physical health issues
34,135pages on
this wiki
Many people with learning difficulties are more vulnerable to a broad range of physical conditions. Some of these are related to the syndomes underlying their learning difficulties. Others are the result of the failure of services to take the necessary time to listen and understand the nature of their complaint. Some of the more notable difficulties they report are:
Around Wikia's network
Random Wiki
|
global_05_local_4_shard_00000656_processed.jsonl/85020
|
Procure por qualquer palavra, como swag:
Calicano 1. -A native born person from California who is bilingual speaking both English & Spanish.
Calicano 2. -Anything creole in origin of the Anglo-Spanish heritage of California.
1. The guy isn't Mexican, he's from California and speaks Spanish like a Calicano.
2. These Rancho Santa Barbara enchiladas are pure authentic Calicano cooking.
3. That fresh orange-habanero salsa at the BBQ was Fuc#kin Nuclear Calicano!
por Calicanorican 26 de Outubro de 2013
|
global_05_local_4_shard_00000656_processed.jsonl/85030
|
8 terms by djdharia
Ready to study?
Start with Flashcards
Create a new folder
Advertisement Upgrade to remove ads
What does Left Anterior Descending supply?
- Anterior wall of the heart
- Most of the interventricular septum
Which leads would you see changes in with left anterior descending occlusion or damage to anterior portion of the heart?
- Precordial leads - V1 - V 6
What does the Left circumflex artery supply?
- Lateral wall of the left ventricle
Which leads would you see changes in with damage to lateral portion of the heart or occlusion to the Left Circuflex artery?
- Lateral leads: Leads I, avL, V5, V6
What does the Right Coronary Artery Supply?
Posterior Portion of the heart
Which leads would you see changes in with RCA occlusion or posterior portion of the heart damage?
V1 or recipricoal changes
What does the Posterior Arterial Descending supply?
- Inferior Portion of the heart
Which leads would you see change in with damage to Inferior portion of heart or occlusion to posterior arterial descending?
- Inferior Leads: AVF, II and III
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Reload the page to try again!
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together
NEW! Voice Recording
Create Set
|
global_05_local_4_shard_00000656_processed.jsonl/85032
|
Consistency Quotes
Share Your Quotes Join Us Inspire & Move Your Friends
How do you feel today? I feel ...
These are quotes tagged with "consistency".
Add to my favourites Get these quotes on a PDF
Consistency is the last refuge of the unimaginative.
The only completely consistent people are the dead.
Constants aren't.
Inconsistency is the only thing in which men are consistent.
Without consistency there is no moral strength.
Who ever has no fixed opinions has no constant feelings.
Let your character be kept up the very end, just as it began, and so be consistent.
My goal in sailing isn't to be brilliant or flashy in individual races, just to be consistent over the long run.
No well-informed person ever imputed inconsistency to another for changing his mind.
Consistency, madam, is the first of Christian duties.
Look to make your course regular, that men may know beforehand what they may expect.
Consistency is the foundation of virtue.
|
global_05_local_4_shard_00000656_processed.jsonl/85035
|
Quotation by Ernst Mach
Physics is experience, arranged in economical order.
Ernst Mach (1838–1916), Austrian physicist, philosopher of science. The Economical Nature of Physical Inquiry (1882).
An expression of the author's positivism.
Surprise me with a
The Columbia World of Quotations © 1996, Columbia University Press.
Copyright © 2014 Dictionary.com, LLC. All rights reserved.
|
global_05_local_4_shard_00000656_processed.jsonl/85051
|
Ranma Wiki
Rumiko Takahashi
976pages on
this wiki
This article is a stub. You can help the Ranma Wiki by expanding it, or perhaps you could contribute to discussion on the topic.
Rumiko Takahashi in 2010
Takahashi in 2010.
Rumiko Takahashi (高橋 留美子 Takahashi Rumiko?, born October 10, 1957) is a mangaka who is one of the most affluent manga artists in Japan.[1][2] The manga she creates (and their anime adaptations) are popular worldwide, where they have been translated into a variety of languages. She has twice won the Shogakukan Manga Award: once in 1980 for Urusei Yatsura, and again in 2001 for InuYasha.[3]
Ranma ½ is Takahashi's third major manga series, which she began in 1987 after Urusei Yatsura and Maison Ikkoku. It is also her second-longest series after InuYasha. She purposefully aimed the series to be popular with women and children.[4] In a 2000 interview she was asked her if she intended Ranma ½ "as an effort to enlighten a male-dominated society." Takahashi said that she does not think in terms of societal agendas and that she created the Ranma ½ concept because she wanted one that may be "a simple, fun idea." She added that she, as a woman and while recalling what comics she liked to read as a child, felt that "humans turning into animals might also be fun and mä know, like a fairy tale."[5]
1. Japanese Top Tax Payers. Anime News Network. Retrieved on February 26, 2008.
2. 2005年高額納税者ランキング (Japanese). D-web Portal. Retrieved on February 26, 2008.
3. 小学館漫画賞: 歴代受賞者 (Japanese). Shogakukan. Retrieved on August 19, 2008.
4. "Rumiko Takahashi Interview". Viz Media. March 2, 2000. p. 3. Retrieved on October 5, 2009.
5. "Rumiko Takahashi Interview". Viz Media. March 2, 2000. p. 4. Retrieved on October 5, 2009.
External linksEdit
Around Wikia's network
Random Wiki
|
global_05_local_4_shard_00000656_processed.jsonl/85065
|
Monday, September 18, 2006
Whatever Happened To Righteous Indignation?
so i heard (again) on NPR today a debate about the morailty of torture. and this is what i have to say about these debates in general, which i am hearing all-too-frequently thse days: ARE YOU KIDDING ME? IS THIS REALLY AN ETHICALLY "GRAY" AREA? WHEN DID IT BECOME DIFFICULT FOR US TO SAY-- WITHOUT RESERVATION-- THAT "TORUTURE IS BAD/WRONG/MORALLY REPREHENSIBLE"?
for real, am i being a prude here? there is part of me that wants to attribute the fact that this even rises to the level of something seriously "debatable" to the genius of the Bush/Rove/Republican-media-machine... but, come on, have we drunk that much kool-aid already? i am really shocked by the fact that more people don't write their newspapers or call their local radio stations and say, "what the hell are you debating here?!!"
last semester, when i was teaching Mahmood Mamdani's Good Muslin, Bad Muslim: Amreican, the Cold War and the Roots of Terror I was surprised to discover that many of my students simply did not consider it within the realm of possibility that American military troops might practice torture (despite the almost ubiquitous news coverage of GitMo and Abu Graib at the time). So, i brought in the Newsweek article on American interrogation/torture practices approved by the Dept. of State and read the list to my class (without telling them the source) to see which of those practices the students would find morally permissable. Needless to say, they were shocked to find out that many of the more reprehensible practices were adopted by our own military forces. And I mean they were LITERALLY shocked...
i am completely baffled by any argument that begins "the Geneva Convention doesn't apply in situations of....(fill in the blank)". Am i alone here? Can i get a witness?
Thursday, September 14, 2006
argh.... blogging.
so here's the brief history of my attempts to keep any sort of diary. I start on some day in the first week of january, write for a max of four days atraight, revist the diary at some point in may and then discard the whole thing. basically, pathetic.
however, since i am sitting at my computer basically non-stop these days, trying to finish a dissertation, i'm going to try blogging.
here goes....
|
global_05_local_4_shard_00000656_processed.jsonl/85087
|
Car Problem Reports
Jeep Compass The Engine may Overheat Due to Debris in the Cylinder Head Coolant Port
Jeep Compass Problem
1 Report
Me Too
Model Year Affected: 2010
Engine Affected: 2.4L 4 Cylinder
An engine overheating condition may develop due to a coolant flow issue. Our technicians tell us that debris may block the cylinder head coolant port at the primary thermostat housing. Removing the debris should correct this concern.
Ask a Question
|
global_05_local_4_shard_00000656_processed.jsonl/85092
|
Focus Groups are Dead: An Interview with Mike Volpe, HubSpot CMO
Mike Volpe
Mike Volpe, Chief Marketing Officer of HubSpot
Editor’s Note: I recently attended the Social Media FTW (For the Win) conference where HubSpot‘s Chief Marketing Officer, Mike Volpe was a keynote speaker. During his talk, Mike contrasted the analytics HubSpot gives marketers with traditional feedback, using focus groups as an example. I caught up with Mike afterward to get his further perspectives on market research and marketing.
Dana Stanley: For those who don’t know, could you please give a quick overview of what HubSpot does for marketers? In particular, how does it help with marketing analytics?
Mike Volpe: HubSpot is an all-in-one marketing software platform. Rather than using one tool for blogging, another tool for social media marketing, a different tool for landing pages, yet another tool for email marketing, some other tool for marketing automation and yet an additional system for marketing analytics, HubSpot combines all of that into one.
This is powerful for marketers for two reasons: first, you have one hub to manage all of your marketing which is faster and easier, and second, you can easily measure and analyze things across all these different marketing tools. For instance, HubSpot gives you closed loop marketing analytics, so you can link it to your CRM system and know not only how many web visitors you got from social media, but also how many of them became a lead and how many of those leads converted into customers. Or, you could measure how many of your leads that became customers visited a specific web page on your website or used certain functionality in your mobile app, etc.
DS: In your recent keynote at Social Media FTW, you said, “Focus groups are dead.” Can you tell me what you meant by that?
MV: Of course “dead” is strong language meant to invite a response and dialog. Focus groups still have their place, however they are much less useful or attractive today for two reasons.
First, the low cost availability of other ways of gathering information about your market and customers. You can listen to what they say in social media, you can read the reviews they write. You can analyze how they actually use your website. You can see the videos and blogs they post about your products.
Second, I think the information you can get today is a more accurate view into your customers, because it is based on their actual behavior, not how they answer questions in an unfamiliar room with 5 strangers. I’ll take the status update that someone wrote from the couch in the comfort of their own home as more accurate than the comment they made in a focus group room when they are given a $100 gift card to show up.
DS: Your company has been on an impressive growth path. How does HubSpot take stock of and incorporate feedback from customers and prospects?
MV: We get feedback in a number of different ways. We conduct usability sessions where we have someone use the product online while we watch and they talk us through what they are doing, we have discussion forums for customers that we monitor, we get feedback from the sales team on what people say when they they demo the product, we have usage monitoring built into the product that gives us reports about what customers do and don’t do in the product, we have where customers can submit ideas to make the product better, we visit HUG (HubSpot User Group) meetings and we regularly survey the customers as well.
DS: What do you envision market research will be like in the future?
I think it will allow for faster and cheaper insights and more witnessing of actual real life activity, not simulated activity.
Related posts:
1. How to Use Crowd Sourcing Tools to Enhance or Replace Focus Groups
2. Sentiment Analysis Firm Metavana’s New CMO, Romi Mahajan: An Interview
3. 3 Ways to Use Facebook Groups as a Research Tool
4. A Social Media Marketer’s Take on Market Research
5. Are Market Research Tools an Alternative for Social Media Haters?
About Dana Stanley
Dana is the Editor-in-Chief of Research Access.
• ingles Leah McGrath
Interesting – we do Facebook Forums on our Ingles Mkts FB page…I tell brands that they are like ” a focus group w/ over 13k people in 40 minutes”. immediate feedback.
• Mike Volpe
I think that is a good analogy! The ease and speed with which you can get feedback is very different today. The other side of it is that it is easier to observe customers in their natural environment (the web) rather than an artificial environment (focus group room).
• Brian LoCicero
Although you clarify your “dead” comment as a way to invite response & dialog, I still think that sort of repeated language does damage to our industry and our relationships with end clients.
From all of the traditional focus group people that I know, none of them have avoided this conversation and are more than happy to engage in it so why use a pejorative term other than to call attention for your own offer? Fair game, it’s a free world and it’s your right, but if you truly wanted to help the Market Research industry move forward into new techniques and methods, there’s better language that doesn’t make it look like a typical sales ploy.
To clarify my own position, I’m a firm supporter of the NewMR movement and do everything I can to move it forward but a good 70-80% of clients budgets are firmly rooted in the “old ways”. Calling that significant of an investment (or part of it) as “dead” is like calling their babies ugly.
But I guess it works, you got me to respond & dialog :-)
• Pingback: ‘Focus Groups are Dead’: Dana Stanley ’91 Interviews Mike Volpe ’97 on Marketing Analytics (Research Access) « Bowdoin Daily Sun
• Pingback: Listening to Your Customers In the Digital Age « The Effective Marketer
|
global_05_local_4_shard_00000656_processed.jsonl/85101
|
Prosthetic Knowledge Picks: Slitscan
Below are some examples of creative coding with the slitscan technique:
Volumetric Slitscan Experiments by Memo Akten
Slitscan 3D Test by Ryan Suits
A slitscan experiment in anaglyph vision, worth digging out those red/blue 3D glasses!
Bookmarklet can turn HTML5 videos on Youtube and Vimeo into slitscan-like images:
Slitscanner is a little piece of Javascript you can run as a bookmarklet to start, well, slitscanning videos online. This only works in the HTML5 video players so for Vimeo you will need to select “Switch to HTML5 Player” in the lower right on the video pages. For YouTube it’s a little trickier, you can opt into the HTML5 test here, but they will still use the Flash Player for videos with ads.
… Just hit the bookmarklet on any YouTube or Vimeo video page with an HTML5 player, and it will start drawing onto a canvas in the browser. You can modify the speed with the slider (the default value draws the entire video to the width of the browser). You can also download the code and modify it as you wish.
You can find out more and get the bookmarklet here, plus here is a Tumblr blog with some more examples.
2001 A Space Odyssey: Unwrapping The Slitscan Sequence
A visual investigation using code to 'unroll' the famous psychedelic sequence from the film, itself a slitscan:
While watching Kubrick's "2001 A Space Odyssey", I thought it would be fun to write some software to unravel the slit scan artwork in the psychedelic sequences of 2001, to see what they were. The results of this experiment are below..
The technique used to unravel the sequences involved using an SGI's real time video hardware, with a hacked version of 'videoin.c' (from the SGI example programs) to accumulate scanlines from the DVD and concatenate them back into the original artwork. So as the film played, the program ran, unrolling the scanlines in realtime; it was really fun to see the first results..!
You can see more here.
Other links:
An Informal Catalogue of Slit-Scan Video Artworks and Research: An extensive collection of examples of slitscan works.
Vimeo 'slitscan 3d' search: Plenty of examples of contemporary experimentation.
|
global_05_local_4_shard_00000656_processed.jsonl/85112
|
James Robinson Archives - Page 2 of 4 - Robot 6 @ Comic Book Resources
What Are You Reading? with Mark Sable
Continue Reading »
Keith Giffen takes over DC’s He-Man with Issue 2
He-Man #2
DC Comics today announced a fairly last-minute shuffle on its He-Man and the Masters of the Universe comic. According to The Source blog, Keith Giffen will take over writing duties from James Robinson starting with the very next issue, September’s #2.
“He-Man and friends were a big part of my son’s young life,” Giffen said. “That meant that they became a big part of my life too. I can still rattle off the plotlines to more than a few of the cartoons and am still pretty good at reattaching the arms and legs of woefully abused action figures. I’m thinking that more than qualifies me to write the He-Man and the Masters of the Universe comic book. Well… that and the fact that I so want to. I mean, c’mon… it’s He-Man!”
Robinson was solicited as the writer for issues 2 and 3, and in fact is still listed on the DC Comics website as the writer for both (as I type this, anyway). The post doesn’t mention why they’ve made the abrupt change. Robinson is in San Diego this week, so no doubt the question will be asked.
Robinson is certainly busy enough right now, what with Earth 2 and apparently some sort of Image series that will be announced on Saturday.
What Are You Reading? with Aubrey Sitterson and Charles Soule
The Massive #1
Continue Reading »
Green Lantern and Alan Scott catch fire on Twitter
Had anyone suggested a year ago — heck, a month ago — that not only “Green Lantern” but also “Alan Scott” would be U.S. trending topics on Twitter, they’d likely have been soundly mocked. But on the day that DC Comics launched its full-on media assault officially announcing that the 72-year-old superhero will be reintroduced in Earth 2 #2 as the gay-billionaire leader of the Justice Society, “Green Lantern” and “Alan Scott” are on Twitter, sandwiched between “National Donut Day” and “CNBC.”
Granted, “Hal Jordan” is now trending worldwide, with many commenters trying to sort out just which Green Lantern everyone is talking about. One person tweeted, “I’m imagining Hal Jordan spending all day saying ‘No, not me, the other one. Not that there’s anything wrong with that.”
Although it’s clear to most fans of superhero comics that the character in question is the Golden Age Green Lantern — the only Green Lantern on Earth 2 — the finer points of continuity and parallel universes seem to be lost on the general public. (Right about now a DC publicity person is probably struggling to give an ABC News correspondent a crash course in DC Comics history, the New 52 and the Green Lantern Corps, frustrating both of them.)
Whether all of the publicity and social-media interest will result in rapid sellouts for Earth 2 #2 obviously won’t be known until next week, but it’s probably safe to presume DC will start the presses rolling on a second printing any moment now.
‘Alan Scott won’t be the only gay character in Earth 2
DC Comics rolled out the official announcement this morning that, yes, Golden Age Green Lantern Alan Scott is the “major iconic” character that will be reintroduced as gay, but Earth 2 writer James Robinson has already made clear that he won’t be alone.
“There is another character down the line, but that character won’t be appearing for some time, so it’s probably a bit too early to talk about that,” he told the gay and lesbian magazine The Advocate, “but this book will definitely have a diverse cast. Alan Scott won’t be the only gay character in Earth 2, I promise you that.”
“I feel if you’re going to have a team, you need to have realistic diversity,” Robinson said, explaining his rationale for including a gay member on the Justice Society. “After all, I have gay friends and straight friends and we’re all mixed together. It stands to reason, just based on the population of the world, at least one member of the team is going to be gay.”
Continue Reading »
What Are You Reading? with Mark Andrew Smith
Prophet #21
Continue Reading »
Chain Reactions | DC Comics New 52 Second Wave
Earth 2
Earth 2
Continue Reading »
Grumpy Old Fan | Three new comics, two new Earths
President Calvin Ellis, by Gene Ha
Now then …
Continue Reading »
Comics A.M. | A call for Disney to remember its roots
Oswald the Rabbit, by Walt Disney
Continue Reading »
What Are You Reading? with Chris Williams
America's Got Powers #1
Continue Reading »
DC Comics summons He-Man and the Masters of the Universe
He-Man and the Masters of the Universe #1
DC Comics will return to Eternia in July with a six-issue He-Man and the Masters of the Universe limited series by James Robinson, Phillip Tan and Ruy Jose, MTV Geek reports.
Although several companies, from Marvel to Image to CrossGen, have released comics based on the Mattel toyline, DC was the first, introducing Superman to He-Man, Battle Cat, Skeletor and other characters in July 1982′s DC Comics Presents #47, followed by Masters of the Universe inserts in more than a dozen titles and, later that year, a three-issue miniseries.
In the new series, Skeletor has discovered a way to reshape reality, making himself ruler of Castle Grayskull while leaving the heroes of Eternia as peasants with no memories of their former lives. As for Prince Adam, the alter-ego of He-Man? He’s a woodsman who thinks his visions of wielding a sword in battle are merely dreams.
“Adam is in a place where he really has to reconnect with what it means to be a Master of the Universe,” Robinson tells MTV Geek. “It’s his odyssey, much like the Greek myth in fact, that is the backbone of this series.”
Comics A.M. | Relaunching Justice Society, rebuilding Billy Batson
Earth 2 #2
Continue Reading »
What Are You Reading?
Saga #1
Continue Reading »
What Are You Reading? with Ivan Salazar
New York The Big City
Continue Reading »
Grumpy Old Fan | Growing the garden: DC’s May solicits
On this Earth-2, Wonder Woman has the metal headgear and the Flash (not shown) wears a skirt
The next phase of the New 52 begins in May, as six new titles debut and Rob Liefeld carves out his own niche with a handful of others. My first impressions of the Next Six remain largely positive, but we’ll get into that in a bit.
Basically, what we know about Earth-2 so far is that it has its own (multi-generational) version of the Trinity, it’s home to Alan Scott, Jay Garrick and probably Ted Grant, and at some point Darkseid invades. This does not mean that everyone who first appeared during the Golden Age still did. Indeed, we can suppose that, because the New-52 Huntress is apparently in her early 30s (at most, I’m guessing), that would make her parents at least 50-ish and probably closer to 60 or even 70. Thus, the Earth-2 Bruce Wayne and Selina Kyle could have become Batman and Catwoman anywhere from the mid-1960s to the early 1980s. It’s a significant change from the original Earth-Two, where Helena Wayne was born in the early 1950s and became the Huntress in the late ’70s.
Continue Reading »
Browse the Robot 6 Archives
|
global_05_local_4_shard_00000656_processed.jsonl/85134
|
RuneScape Wiki
Skull sceptre
on this wiki
2007 rune
Skull sceptre
Skull sceptre
Release date 4 July 2006 (Update)
Members? No
Quest item? No
Tradeable? No
Equipable? Yes
Stackable? No
Value 1 coin
High Alch 0 coins
Low Alch 0 coins
Destroy You can obtain another Sceptre by collecting all four pieces from the Stronghold of Security.
Store price Not sold
Examine A fragile magical Sceptre.
Weight 1.8 kg
[view] [talk]
Skull sceptre detail
The Skull sceptre is obtained through defeating monsters in the Stronghold of Security and picking up the pieces of the sceptre. The skull sceptre has five charges to teleport (choose 'Invoke') to Gunnarsgrunn, or ten, if made when wearing varrock armour 1 or above, which is for members only. The doubled charges remain on and can be used on a free world. It disappears after all charges are used and therefore it cannot be recharged, however, if you collect all four pieces again, then you can make a new one and regain charges. Check the charge level of the sceptre by right-clicking and choosing 'Divine'. Like almost all teleport items, the skull sceptre does not work beyond level 20 Wilderness.
It is one of the relatively few free-to-play teleport items, the others being the tele-orb from Fist of Guthix (available only during the activity), the explorer's ring 3 or 4 collected as a reward for completing the medium or hard Lumbridge and Draynor Tasks, the clan vexillum, the ring of Kinship, the Runecrafting teleport tablets, and the broomstick (which is able to be attained by F2Ps and has the potential to teleport, but only on a members' world). Using the skull sceptre's teleport is a requirement for the Varrock Tasks.
Players can only make and keep one skull sceptre at a time - a new skull sceptre can only be made once the old skull sceptre is either lost, destroyed, or has disappeared. There is no limit to how many strange skulls or runed sceptres a player can own. The skull sceptre and all its parts cannot be traded or be withdrawn as noted items from the bank. Having a sceptre in your bank or inventory will not prevent more parts from dropping.
Note that the skull sceptre does not appear in gravestone on death. The individual parts of it do, however.
Parts of the sceptre are rare drops from the monsters listed below, all located on various levels of the Stronghold of Security. Killing the highest level ones helps. In addition, wearing varrock armour 1 as well as a ring of wealth along with the above gives increased chance of receiving a sceptre part drop.
Combat Stats
Skill requirements
Class Slot
Magic Magic 2h slot
Weapons Main Off
Damage - -
Accuracy 150 -
Style - -
Defence-icon Armour rating0
Constitution-icon Life bonus0
Prayer-icon Prayer bonus0
Style bonuses
Attack-icon0 Ranged-icon0 Magic-icon0
Attack speed
AverageInterval: 3.6 secondsAttack speed average
Skull sceptre equipped
A player wielding the Skull sceptre
The pieces of the skull sceptre are left skull half, top of sceptre, bottom of sceptre, and right skull half. Ankou, catablepon, flesh crawlers, and minotaurs drop the pieces respectively.
If a skull sceptre has already been made, additional strange skulls and runed sceptres can be assembled individually, but cannot be made into another skull sceptre. It is entirely possible to obtain multiple separate pieces of the skull sceptre, even if you have never completed assembling a sceptre before, and even bank them together (for example, you can have two bottoms of sceptre in your bank).
Where to find the piecesEdit
Right-click optionsEdit
Option Result
Wield The sceptre is wielded in the Weapon Slot. See Worn Equipment.
Invoke Teleports the player to Barbarian Village.
Divine Shows the number of charges left.
Skull sceptre Tele
The skull sceptre's teleport animation.
• The stats of the sceptre are equivalent to an ordinary staff. Before the autocast update on 9 February 2009, it had no option to autocast spells.
• The same update also replaced the Varrock Tasks' "smaller" reward regarding shop prices, with increasing the chance of obtaining skull sceptre parts from creatures in the Stronghold of Security.
• If the skull sceptre is put together using Varrock armour, in a members world, the 10 charges remain when used in a non members world.
• The skull sceptre is one of the few staves ingame that slants to the left when in inventory/bank.
• The skull sceptre appears smaller on the back than when held in your hand.
• The 'Left skull half' which appears to be a bull-like half skull is dropped by the human-shaped Ankou, while the 'Right skull half' which is the human-like half skull is dropped by the bull-headed Minotaurs
Around Wikia's network
Random Wiki
|
global_05_local_4_shard_00000656_processed.jsonl/85137
|
Sunday, December 23, 2012
Mistlesnow Update, Sunday 5:00 PM
I just got home from visiting family in Nashville and I have NOT looked at a ton of data, so this blog post will be rather short. I'm off work today and tomorrow, but I still plan to dig into the data to help unfold this storm system with the team. The above image is the current Winter Storm Watch which has been issued for Region 8 for late Christmas Day into Wednesday morning.
Let's glance at a little bit of data. First, this is for those that don't want much snow. It's the BUFKIT profile from the NAM. The NAM has the low a little farther north and leaves us a little warmer. Many areas will still get 1-3" of snow, but many areas would miss out. Notice, for Jonesboro, we would likely switch back and forth from rain and snow through the afternoon on Christmas. Remember, the time-stamp goes from right to left on this program... Blue bars show snow, green bars show rain...
Now, for you snow lovers... This is the GFS. The GFS has the perfect setup for SNOW! And when I say snow... I mean snow! This keeps most of the heavy part of the storm as SNOW for us because the low tracks a little farther South than the NAM. In the graph below (which goes RIGHT to LEFT)... You see the showers from this morning... the snow on Christmas... and another system later in the week.
The above image/model, which is the GFS shows 7-10" of snow for Jonesboro. That's a model and NOT a forecast... yet. It seems a little aggressive for me, but we'll watch it.
The GFS is not alone. Several other models are showing big time snow for us. Here's a map of the RPM model. notice the swath of heavy snow! This would be quite a late day White Christmas!
That's all I have for now. I'm off work and I have some other things to take care of... BUT I hope to blog later tonight when more data comes in! I expect a new blog by 11PM.
1 comment:
Anonymous said...
Thank You!
|
global_05_local_4_shard_00000656_processed.jsonl/85139
|
Sacred Texts Judaism Index Previous Next
The judges who issued decrees at Jerusalem received for salary ninety-nine manahs from the contributions of the chamber.
Kethuboth, fol. 105, col. 1.
Ninety-nine die from an evil eye for one who dies in the usual manner.
Bava Metzia, fol. 107, col. 2.
Next: C.
|
global_05_local_4_shard_00000656_processed.jsonl/85140
|
Sacred Texts Oahspe Index Previous Next
Chapter VII
1. AS mortals sail corporeal ships across the corporeal ocean, so sailed the ship of God in the atmospherean ocean. As a man having five sons sendeth four away to far-off countries and keepeth one at home, so did God with the five Lords bequeathed him by Great Jehovih.
2. And now had God departed from the foundation of Hored, in a ship, in heaven to visit his four far-off sons, the Lords of the four great divisions of the earth, who had to do with both mortals and the spirits of the dead, for the glory of Jehovih.
3. First to Jud, Lord of Jud, he headed his ship, running close to the earth, bounding forth, and sapping up fuel from the tall forests to feed the phosphorescent flame, running easy till the wild coast on the west of Whaga was reached. Here halted he his ship, first God of the first Lords of earth, till his navigators told the distance of the wide sea before; then gathering fuel and substance from the rich growing lands, he stowed the ship to the full, he and his traveling host.
4. And God went in, commanding: Go forth, go forth! Forth into the sea of heaven! And on plunged the ship of God in the blue winds of the firmament, high soaring, above the black clouds sprung from the corporeal ocean. And the music of his thousand es'enaurs leaped forth in time and tune to the waves, plenteous and most defiant.
5. Jehovih looked down from the highest of all the heavens, His everlasting throne of thrones, saying: Onward! Onward! Tame the elements, O God! O man! The earth is thine, the air above is thine. Stretch forth thine arm and tame the elements I have made.
6. Onward sped the ship of God, by the force of wills matured; and from its hallowed light displaying its purpose before other traveling Gods and men, in other ships cruising, on adventurous paths in Jehovih's wide oceans of splendor.
7. Merrily sang the crew, and danced, and sighted the wide expanse, premising of the scattering ships coursing hither and yon, in strange colors and marvelous swiftness.
8. On one side the rising moon, the setting sun on the other; beneath lay the black clouds and great corporeal ocean; and yet high above twinkled the stars and the planets of the Great Serpent on his long journey.
9. God came forth and surveyed the scene; and the power of Jehovih moved upon him. Then gathered around him his seven thousand loves and traveling companions. God said:
10. All Thy places are new, Great Jehovih! For thousands of years have I gazed on Thy matchless splendors, seen and unseen; but Thy glory groweth richer day by day. When Thy voice came to me, more than a hundred years ago, saying: Go, My son, I have a new garden planted; take some workmen and till the soil; I foresaw the long labor of the generations that would spring up out of the earth. I feared and trembled. I said:
11. How shall it be, O Jehovih? Shall the new earth be peopled over, and mortals run their course as on other worlds before? First, in wholesome love and worship and due reverence to the Gods, and then for ages and ages bury themselves in bloody wars? O lead me forth, Father! Jehovih! I will take Thy garden for a season, and fence it round with Lords, and wise kingdoms. And with Thy potent spirit hedge mortals on every side, that the earth shall bloom as a paradise for angels and men.
12. And Thy sons and daughters came with me, and engrafted Thy immortal kingdom.
p. 26
13. How is it now? How compares my labor with that of other Gods on other worlds?
14. O ye archangels, Gods and Goddesses! Look down on the great earth! Jehovih hath filled my arms with a great load! I tremble on the immortal scales!
15. And God, transfixed, looked up into the swift-passing sky, for his voice reached to the thrones of etherean worlds whereon the Osirian regents reigned in all power. And down from amidst the stars shot a single ray of light engrossed with the adorable words: JEHOVIH'S SON! ALL HAIL! HAIL, GOD OF EARTH, JEHOVIH'S SON! GLORY! GLORY TO GREAT JEHOVIH, FOR ALL THAT THOU HAST DONE!
16. Then upward furled the shining light till it faded midst the far-off stars. Anew the trumpeters and singers sent forth a strain of sweet music, spirited and sounding full of soul. And as the music glided forth across the waters, lo, other music, strange and welcome, came from the west lands to the borders of the ocean.
17. The ship was across the sea, and the hosts of the Lord had come to meet the God of earth and heaven. And now, saluting loud and long, the two ships drew to close anchorage. Presently the messengers interchanged, and in Jehovih's name greeted God and His hosts, who were old-time friends to the Lord and His.
18. God said: By Thy will, O Jehovih, let us take course for the Lord's kingdom and place of labor. And presently the two ships sped forth, close to the earth, conjoined in the music of anthems of olden times.
19. Far up into the heart of the country, where fertile lands and mountains and waters were close companioned to the asuan race, the ships led on till one pillar of fire, standing on a mountain side, proclaimed the place of the Lord, and here they halted and made fast the vessels, unseen by mortals.
Next: Chapter VIII
|
global_05_local_4_shard_00000656_processed.jsonl/85166
|
Great Reviews!
Chronotron is getting some incredibily positive reviews from game sites!
Download Squad “Today’s Time Waster”
Rock Paper Shotgun “You had me at “time-travelling robots.”
Jay is Games “While it’s true that time travel or a “rewind” concept isn’t necessarily cutting-edge anymore when it comes to casual games, the concept is refined—and executed almost to perfection—in Chronotron.”
But I think my favorite comment so far was from dudster567
“I just kept rewinding, and whenever I come out, tons of me keep coming out, and DANCING!
Hundreds of me dancing EVERYWHERE!”
That’s the way to play Chronotron!
Posted in news Tagged with: ,
Latest Tweets
I finally fixed that bug where the targeting reticule in missile launcher mode would start to be sort of affected by gravity after you died.
Mechagami @Kickstarter succeeded! I get to continue being an Indie Game Developer!
15 minutes until the Mechagami Kickstarter is over!…
It's the last day of the Mechagami Kickstarter! Soooooo clooooooose!…
Man do I love FTL. It's a perfect game to just forget about everything stressful and fully commit to.
I would totally watch a web series that was just Captain @Jam_sponge on the comm.
"It's games like this that need our support because it pushes the envelope for AAA games." - Indie Game Magazine :D
Yay! A YouTube LPer played the Mechagami Demo I sent out!…
Thanks to some upped pledges were now 1/2 way funded!…
Mario only ever got those cool bouncy super balls in Mario Land. I'm adding them as a power tier for the fireball in Mechagami.
The sad thing is, I'll go to my grave without anyone ever knowing how clever my passwords are.
Kickstarter Update: I got my first "space whale" tier donation. It was from my Mom.…
|
global_05_local_4_shard_00000656_processed.jsonl/85175
|
Stranger Fruit
A question
How in the name of all that is rational can a NBC/WSJ poll (taken 1/20 to 1/22) give Bush a 31% approval rating? The economy is circling the drain and Bush has achieved absolutely nothing over the past year. Seriously, name one thing of any worth he has achieved over the past year. Just one …. I’m waiting.
I’m willing to predict that his one achievement for 2008 in the next year will be to leave office, and then only if someone helps him open the door.
1. #1 iRobot
January 26, 2008
That 30% is the same group that would approve a fascist state.
All the truly horrible regimes had a group of people backing them. Pol pot, etc, cant do it by themselves. They like W because he has shredded the constitution, invaded a defensless country and let (a specific) religion influence the government. They think he is doing great and should do it some more. They are scary folks!
2. #2 PhysioProf
January 26, 2008
30% of the people in this country are wackaloon crazy authoritarian followers who will believe *anything* their leaders tell them: “the economy is sound”, “the middle-class are doing better than ever”, “we’re about to win in Iraq”, “liberals are actually fascists”, etc.
3. #3 Frank D.
January 26, 2008
Major Achievements of the Bush Administrations in 2007
(A Comprehensive List)
1. The moon did not leave its orbit and crash into the earth.
4. #4 csrster
January 26, 2008
Thanks Frank, you made my wife smile. No easy task, let me tell you.
5. #5 Craig
January 26, 2008
Basically it could be announced that Bush is the anti-Christ, and that Armageddon will begin shortly, and these same 30% would be going, “well he’s our president, so we have to support him”.
6. #6 Caledonian
January 26, 2008
Politicians in office are rarely responsible for the economic conditions that apply at that time.
You could make an argument that Bush’s actions have led to this state – and I urge you to do so – but acting as though the President alone is responsible for the health of the economy is ridiculous.
You’ve asked before why our government is so shoddy, and part of that is that people vote for stupid reasons. One of those stupid reasons is blaming the people in charge for the economy.
7. #7 John Pieret
January 26, 2008
I’m willing to predict that his one achievement for 2008 will be to leave office …
[Cough] If he gets impeached and removed, I’d call that Congress’ achievement. Otherwise, he ain’t scheduled to leave until 2009.
359 days, but who’s counting?
8. #8 John Lynch
January 26, 2008
Doh! Well, you get my point.
9. #9 John Pieret
January 26, 2008
To paraphrase somebody or other, “nothing in his presidency becomes him better than his taking leave of it.”
10. #10 ebohlman
January 26, 2008
As much as political junkies refuse to acknowledge it, a large part of the American electorate bases their approval/disapproval of a politician on subjective personal impressions rather than objective analysis of the politician’s policies and performance. There are plenty of people, for example, who believe “Bush is a good Christian, so I approve of him.”
For Bush in particular, there’s something else going on. He has a bizarre ability, not generally seen in other politicians, to get people to project their own political beliefs onto him. The PIPA study released shortly before the 2004 election showed that Bush supporters, but not Kerry supporters, tended to believe that their candidate took positions that they supported, even when he didn’t. The most blatant example involved the inclusion of labor and environmental protections in free-trade agreements. Something like 85% of Bush supporters favored such protections (not terribly different from Kerry supporters) but over half of them also believed that Bush favored them too (he actually opposed them).
11. #11 Dave X
January 26, 2008
Of worth to who? $3 gas is worth a lot to oil companies.
I think he has bent us over and sold us to his cronies in many ways, and they think its worth it.
12. #12 Konrad Talmont-Kaminski
January 28, 2008
Well, a recent Gallup poll (2005) showed that 41% of US residents believe in ESP, 37% in haunted houses, 32% in ghosts and 31% in telepathy. This seems to me to point to Bush’s electorate and, indeed, makes me marvel at how low his numbers are. Think about it, less people think that Bush is a good president than that old Granny Jones is now dragging chains about in their attic!
|
global_05_local_4_shard_00000656_processed.jsonl/85187
|
Sawyer X > Dancer2 > Dancer2::Plugin
Annotate this POD
View/Report Bugs
Module Version: 0.143000 Source Latest Release: Dancer2-0.149000_01
Dancer2::Plugin - Extending Dancer2's DSL with plugins
version 0.143000
You can extend Dancer2 by writing your own plugin. A plugin is a module that exports a bunch of symbols to the current namespace (the caller will see all the symbols defined via register).
Note that you have to use the plugin wherever you want to use its symbols. For instance, if you have Webapp::App1 and Webapp::App2, both loaded from your main application, they both need to use FooPlugin if they want to use the symbols exported by FooPlugin.
For a more gentle introduction to Dancer2 plugins, see Dancer2::Plugins.
register 'my_keyword' => sub { ... } => \%options;
Allows the plugin to define a keyword that will be exported to the caller's namespace.
The first argument is the symbol name, the second one the coderef to execute when the symbol is called.
The coderef receives as its first argument the Dancer2::Core::DSL object.
Plugins must use the DSL object to access application components and work with them directly.
sub {
my $dsl = shift;
my @args = @_;
my $app = $dsl->app;
my $context = $app->context;
my $request = $context->request;
if ( $app->session( "logged_in" ) ) {
As an optional third argument, it's possible to give a hash ref to register in order to set some options.
The option is_global (boolean) is used to declare a global/non-global keyword (by default all keywords are global). A non-global keyword must be called from within a route handler (eg: session or param) whereas a global one can be called from everywhere (eg: dancer_version or setting).
register my_symbol_to_export => sub {
# ... some code
}, { is_global => 1} ;
Allows the plugin to take action each time it is imported. It is prototyped to take a single code block argument, which will be called with the DSL object of the package importing it.
For example, here is a way to install a hook in the importing app:
on_plugin_import {
my $dsl = shift;
name => 'before',
code => sub { ... },
A Dancer2 plugin must end with this statement. This lets the plugin register all the symbols defined with register as exported symbols:
Register_plugin returns 1 on success and undef if it fails.
Deprecation note
Earlier version of Dancer2 needed the keyword <for_version> to indicate for which version of Dancer the plugin was written, e.g.
register_plugin for_versions => [ 2 ];
Today, plugins for Dancer2 are only expected to work for Dancer2 and the for_versions keyword is ignored. If you try to load a plugin for Dancer2 that does not meet the requirements of a Dancer2 plugin, you will get an error message.
Simple method to retrieve the parameters or arguments passed to a plugin-defined keyword. Although not relevant for Dancer 1 only, or Dancer 2 only, plugins, it is useful for universal plugins.
register foo => sub {
my ($dsl, @args) = plugin_args(@_);
Note that Dancer 1 will return undef as the DSL object.
If plugin_setting is called inside a plugin, the appropriate configuration will be returned. The plugin_name should be the name of the package, or, if the plugin name is under the Dancer2::Plugin:: namespace (which is recommended), the remaining part of the plugin name.
Configuration for plugin should be structured like this in the config.yml of the application:
key: value
Enclose the remaining part in quotes if it contains ::, e.g. for Dancer2::Plugin::Foo::Bar, use:
key: value
Allows a plugin to declare a list of supported hooks. Any hook declared like so can be executed by the plugin with execute_hook.
register_hook 'foo';
register_hook 'foo', 'bar', 'baz';
Allows a plugin to execute the hooks attached at the given position
execute_hook 'some_hook';
Arguments can be passed which will be received by handlers attached to that hook:
execute_hook 'some_hook', $some_args, ... ;
The hook must have been registered by the plugin first, with register_hook.
The following code is a dummy plugin that provides a keyword 'logout' that destroys the current session and redirects to a new URL specified in the config file as after_logout.
package Dancer2::Plugin::Logout;
use Dancer2::Plugin;
register logout => sub {
my $dsl = shift;
my $context = $dsl->app->context;
my $conf = plugin_setting();
return $context->redirect( $conf->{after_logout} );
register_plugin for_versions => [ 2 ] ;
And in your application:
package My::Webapp;
use Dancer2;
use Dancer2::Plugin::Logout;
get '/logout' => sub { logout };
Dancer Core Developers
This software is copyright (c) 2014 by Alexis Sukrieh.
syntax highlighting:
|
global_05_local_4_shard_00000656_processed.jsonl/85197
|
Friday, January 4
In Which MaryBeth Realizes She is a Fake Woman
I am a fake woman according to society.
Seriously. Just look at your Pinterest. Actually, to save you time, I've compiled some of the memes that stereotype women and define them by their body type.
And then I'm sitting over here all awkward, being like, Dang it, I thought I was a woman, but since I don't have curves, I guess I'm not.
But seriously. Let's talk about it.
It sucks that so many women have experienced the pressure to be skinny because of the media. It sucks that Victoria's Secret models all have the same exact body type. It sucks that there isn't more diversity portrayed on TV shows.
And it also sucks to post snarky memes about how skinny, curveless women are sub-standard, inferior women. My thighs and chest are not what make me a "real woman." Which, by the way, what the hell does that even mean? Does the fact that I have a vagina not make me a real woman? I'm pretty sure that's the only requirement for being a woman.
Throughout highschool and college, people would constantly comment on my body. Boys, girls, women, men, teachers, friends, coworkers.
"You're so skinny!"
"Girl, you need to eat a sandwich!" (Told to me by a fellow teacher at my last job. Awesome.)
"Do you ever eat?"
"What do you do, like workout all the time?"
"Are you anorexic?"
"Go eat a sandwich!" (What is it about sandwiches?)
"Why do you even work out. Seriously. You weigh like two pounds, so just quit."
"You need to put some meat on those bones." (Approximately 27 times)
"Haha, do you ever make yourself throw up?"
Rather than saying, "shut the hell up," like I should have, I would politely laugh at their inane, asshole comment and move on. It really bothered me, though, because I would never, ever make a comment to somebody struggling with being overweight, so the fact that they thought they could make a comment to be because I struggled with being underweight seems very arbitrary and hateful.
I didn't choose my body type. I didn't choose my struggles. Being a normal weight is a struggle and a constant challenge. I feel like I have to think about food way more than other people, because gaining weight is incredibly difficult. And no matter how much weight I gain, I'm never going to have a big chest or a big bootie. I will probably always be able to fit into twelve year old boy jeans. I will probably always have the option of not wearing a bra with my clothes.
And that's okay.
Categorizing women based on their curves is embarrassing. It's embarrassing that we as women are allowing these false, indecent ads to be pinned to our Pinterest boards and shared on Facebook. It's embarrassing that so few people are standing up and calling people out on crap like this. And it's embarrassing when people judge women on their bra size. Let's not allow judgement on skinny girls or curvy girls.
Credit to Rachel for writing about this topic and making me think about it more.
1. I read the first meme on Facebook (ironically posted by a family member) and the first think I asked Duane was if he felt like a dog for liking the way I look. I'm not sure who decided it was a good idea to make some people feel better about their looks by insulting others, but it's stupid. However, the people who made the above rude comments to you were just really pissed off that incredible beauty comes naturally to you. The correct answer to those questions ought to be, "Why the hell would I want to change anything about myself when I'm this freaking hot."
1. Please say that to someone! I would love to see their reaction to that. lol.
95% percent of these jerks are jealous of you.
They're operating on the "piss-on-you-so-I-feel-better" mindset.
2. Haha, I saw that exact one on Facebook too! That's what made me start thinking about it. Chase, I love your "piss on you" phrase. I've never heard that before!
2. Well of course I'm going to love this post? And what is it with the sandwich thing, anyways? Cheeseburger is the other one I always hear.
And it just so happens that I can't stand either sandwiches or cheeseburgers, so maybe that explains the skinniness, since apparently those are the two solutions.
I don't know why people are able to understand that people are tall or short or have certain skin tones or even disorders or diseases based on our genes...but they can't accept that some people are also genetically predisposed to be small. If anyone looked at my family they wouldn't wonder that I'm skinny.
1. Yes! I definitely agree about the whole accepting-diversity-thing-except-when-it-involves-skinny-people. And I'm so with you on the sandwiches thing. Gross. I can sometimes eat peanut butter and jelly, but never ever ever meat and cheese. Maybe someday... Haha.
3. MaryBeth, a few months back my younger sister made a very similar statement to yours. She, like yourself, is a very thin person. And once she pointed it out to everyone on FB how disturbing it was I had to take a second look at these things. As you know, I am a curvy girl and most of the time it doesn't bother me in the least. I would be lying if I said never. Just FYI I think all women are beautiful no matter the size as long as they show their beauty in everything they do. I may not be someone's idea of beauty but my Husband makes me feel like I am the most beautiful person on the planet Just like I am sure Chase does for you. Not 100% sure of any of that makes and sense but there it is. Wish we could have seen you both over Christmas. It is terrible getting sick when there are people you want to see. Much Love to you both.
1. Hey Michelle! That's really interesting about your sister. I definitely understand where she's coming from. :) Also, that's SO sweet about your husband. I still can't believe I've known you guys for so long but have never met him. You guys's Christmas pictures were great! I wish we would have been able to meet up over Christmas also. Oh well... maybe next time. :) We'll definitely let you know next time we come into town.
Blue Eyed Beauty Blog
Exercise Encouragement Group Blog
P.S. you're hilarious!!
1. Helen! I would love to guest blog for you! I'll email you about it. :)
5. Ha! You are a trip girl! Thanks for your honest take on the often under-represented part of our population and what it's like from your perspective. Because you are right. I sorta covered this in my One Word post as well...about the "bikini butt"....yeah. well.
Bless you Sister...visiting here from the Unmasked linky.
6. Haha, well thanks. Now I'm curious to read your post! I'll check it out. :)
7. I just came across your blog via refashion co-op and I just wanted to say thank you for this post! It's something I've struggled with for a long time. Just as it's difficult for some to lose weight, it's rather difficult for others to put on that weight.
8. Hey! I followed you through the "I Love my Post" blog hop! So glad I found your blog, i'm a new follower :) Come follow back if you'd like!
9. I am short...and scrawny (well except right now since my belly is so round)...but I always been considered boy-ish..and I don't care..because I like to think I am proportional..haha
10. Only saw this today! Remember me? hehe As I've told you before, we're the same size, fitting 12 year old clothes. And I couldn't relate more to what you wrote! but all those nasty comments come from jealous minds, it can only be!
11. I will never forget in HS when this girl I didn't even know turned to me and said, "Nobody wants a bone but a dog." I wanted to cry.
I was probably 100 lbs and ATE everything (and no I did not throw it up)
My metabolism was so high that I just could not gain weight and everyone and their brother felt like it was completely okay to comment on my body.
It made me feel SO UGLY and there was nothing I could do about it.
After three kids I look "normal". People always think of me as lucky but I don't think they ever understood how hard it is to be asked if you are sick, or bulimic, or why don't you eat something, or to be called noassatall.
Why do people think it's okay to do this?
Anyways, thanks for the post. Hopefully people read it and realize they are actually hurting peoples self esteem with these kinds of comments.
12. I love that you posted this! People have always just looked at me sarcastically like "Poor pitiful you. It must be so hard to be skinny." anytime I ever said anything about this. People have always said to me (in an accusatory tone) "You don't look like you've had 3 kids." I never knew whether to say thank you or I'm sorry! If it's fair game for you to say how sickeningly skinny I am, is it ok for me to comment on how fat you are? It's never appropriate to use derogatory comments, no matter what the subject matter is. It is not ok to tear other people down just to build yourself up. I know I'm preaching to the choir here, but I always get going on this subject! Thank you for this post! Skinny girls unite! ;)
Pin It button on image hover
|
global_05_local_4_shard_00000656_processed.jsonl/85201
|
Take the 2-minute tour ×
My girlfriend is an admin on a German speaking site that for some time has been harassed by what we presume is a disgruntled user. At first it was merely an annoyance but a couple of days ago the person started sending child pornography in PMs and in eMails to the board.
The police have been alerted but yesterday they received messages stating that because of this person's skill they will be difficult to find and has promised to find ways to register (they have already begun blocking IPs & hosts, and require a minimum number of posts before you can send PMs) and will start sending the material to every user. There was also death threats against the owner of the forum, the harasser has already posted the owners name and address within the forum so he definitely knows who & where he lives.
I know it is a long back story but my question is is it possible to protect against this or even find him. He is most likely German as that is where the site is based but he is continually using IPs from around the world. They have already had to block lists of tor exit points but it seems futile.
share|improve this question
Wow. I can't imagine the police would do much with death threats on web site (that don't have a local component), but sending child pornography pretty much guarantees they'll try to do something. A strange move on the attackers part. – gowenfawr Mar 8 at 14:34
Dig though your logs. He most likely didn't use an anon proxy before starting the harrassment. A good forum software will let you find out the history of an account (and correlate IP addresses with an account) easily. Pass that information to the police. Being an asshole isn't against the law, but death threats and owning/distributing child pronography very clearly are, so you have a strong stance. Police can trivially get hard evidence from the ISP within a 90-day window once they have a concrete suspicion (for which you should be able to find evidence in your logs). – Damon Mar 8 at 18:19
Damon's tip is quite good. He probably is worried to hide only when he tries something. Also try to imagine who could it be. It probably is someone your girlfriend knows in real-life, and a man. Start profiling the stalker. – Quora Feans Mar 8 at 19:03
Users who became inactive the day or the day before the harrassment (or possibly 2 days) would be prime candidates. Unless you run a site like Facebook, that won't be more than a dozen to start with. If you aren't capable of doing an in-depth analysis, you could make a copy of your database for the BKA. That's a good idea anyway, since they sometimes get the awesome idea to seize your equipment for investigation and evidence, no matter whether that means you're out of business. If you've already given them a copy of the database, there's no reason to do that any more. – Damon Mar 8 at 20:34
3 Answers 3
up vote 6 down vote accepted
Increasing the time it takes to begin any sort of harrassment, and decreasing the time it takes to take any action of illicit content is going to be the best wat to mitigate the problem.
In this case, contacting the police is your best option as far as taking any direct action against the attacker. In the meantime your primary focus and concern is to mitigate the issue as much as problem. Remember that this is one person who has dedicated his time, he will eventually get bored and move on to something else.
Your primary goal here is to make it harder for him to make any illicit content in the first place, while still allowing your regular users in. Here are some of the steps I took when I had a similar issue on my popular vBulletin website:
• Blacklisting potential domains or hosts of illicit material
• Requiring a unique email address, with certain temporary email providers blacklisted
• Limiting new accounts:
• I required moderator approval for all posts made with an accout under 15 (approved) posts for anything that embedded a link or image.
• I required moderator approval for all PMs sent from any account less than 3 days old or with less than 15 (approved) posts.
• Find an anti-spam plugin or addon that can match possible patterns.
• Disabling email capability. In most cases, only admins really should have the power to email their users.
Another thing to try is to get a cheap SSL certificate and use HTTPS during registration, or even site-wide. Most standard proxies don't support HTTPS, and most that do are usually for a fee which he may be unwilling to pay after a while. Tor still may support HTTPS, so it's worth trying to block Tor entry points if possible (as you've indicated).
For example, gandi.net has a single-domain for $16/yr that would suffice just fine.
share|improve this answer
Thanks mate, she already does some of what you suggest but we she takes the rest of your advice gladly. – The_Cthulhu_Kid Mar 8 at 18:33
You have already done the correct thing by alerting the police.
Sadly though, if the person is being careful it will be next to impossible to locate or stop him. There really isn't much you can do besides increasing the effort required to start harassing your members and hope he gets bored and stop. It might be a good idea to implement a system like the one Stackexchange uses where a certain amount of helpful contributions is needed to unlock certain privileges.
share|improve this answer
Thank you, I was worried that that might be the case. The guy has promised not to stop (even gave a list of demands that would include the owner killing himself). I am not part of the forum myself but my girlfriend is and this guy has me worried. He knows her real name, although I don't think our address, but we have 2 small children. I am a developer but I don't have much knowledge about security. Thanks for your time. – The_Cthulhu_Kid Mar 8 at 12:22
Children get tired when you stop giving them attention. Do what you can to mitigate the problems on the back end, but don't give him any attention and hopefully he goes away. – David Houde Mar 8 at 13:12
@DavidHoude: that would perfectly work, in the case of an internet troll. But in this case, we certainly have a mad stalker. I don't believe he will stop easily. – Quora Feans Mar 8 at 19:01
The nice thing about persistent attackers is that their behavior is consistent and repeated, through which you can establish a pattern which then leads to an identity.
It's possible to be completely anonymous on the Internet, but the only way to do so is to avoid establishing a pattern, and avoid behavior that can be correlated, analyzed, and eventually distilled to find its common feature: you. This is how and why hackers get caught; they don't go silent.
So, if the common target is your forum, then you use the forum to find the common factors in the attack. You already have criminal behavior (child porn and death threats) which is enough to get the police actively involved. That helps with gathering data that would otherwise be inaccessible.
The next step is to start blocking off access routes that can't be traced. Assuming this doesn't adversely affect your other users, you can block TOR exit nodes, known anonymizing proxies and so on, until the only routes to your server left are ones that can be traced by the police.
Obviously this can affect your legitimate users, so you may want to only apply these restrictions for posting messages or new user registrations.
Next you start following up on leads; when you get relevant traffic, you check up on its origin. Did it come from a hacked webserver? If so, get in contact with the site's admin to report the intrusion and find out if they are keeping logs. Many admins will be more than willing to turn over logs of malicious actors, as they'll be just as mad as you are.
Sites like domaintools.com are surprisingly useful in determining who is involved with a given IP, what sites are hosted there, who the owner is or was, etc. A GeoIP lookup will help determine with more precision if IP addresses are physically located near each other.
Eventually you start to see patterns develop. You figure out that he only posts during a given 5 hour window (which probably corresponds to evening where he is), and while he relays his connection through other servers, the originating IP is typically coffee shops in a single city. He uses firefox on OSX. Little details which may come in handy.
The more information you have, the more information you can give to the police, the more likely they are to actually identify him.
Either that or he stops posting and the trail goes cold. Both ways, you win.
share|improve this answer
Reading this comment, I got an idea. Is it possible to use some methods like on panopticlick.eff.org and then basically match which users are the attacker, get his "unabusive" account, etc. Assuming same PC and browser are being used, which might not be the case. Also, running flash or Java to get user's real IP? – domen Mar 10 at 13:22
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/85235
|
List of chess openings
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Chess openings are listed and classified according to their first few moves. There are some interesting statistics on the frequency of chess openings, from chess data bases.
Statistics[change | change source]
1800–1900 1901–1935 modern
e4–e5 64% e4–e5 31% e4–e5 15%
e4 other 23% e4 other 20% e4 other 35%
d4–d5 10% d4–d5 28% d4–d5 15%
d4 other d4 other 16% d4 other 23%
other 5% other 12%
These statistics show a movement away from symmetrical defences to asymmetrical defences. In particlular, in reply to 1.e4, the Sicilian and French defences, and to 1.d4 the Indian defences. Also, particularly amongst strong players, an increased use of the English Opening for White.[1]
King's Pawn openings[change | change source]
KP opening: 1.e4 e5
Start of chess board.
a8 black rook b8 black knight c8 black bishop d8 black queen e8 black king f8 black bishop g8 black knight h8 black rook
a7 black pawn b7 black pawn c7 black pawn d7 black pawn e7 __ f7 black pawn g7 black pawn h7 black pawn
a5 __ b5 __ c5 __ d5 __ e5 black pawn f5 __ g5 __ h5 __
a2 white pawn b2 white pawn c2 white pawn d2 white pawn e2 __ f2 white pawn g2 white pawn h2 white pawn
End of chess board.
1...e5 replies[change | change source]
Asymmetric replies[change | change source]
Queen's Pawn openings[change | change source]
1...d5 replies[change | change source]
Asymmetric replies[change | change source]
Other opening moves[change | change source]
Sources[change | change source]
Sources for beginners[change | change source]
There is no opening book for real beginners. The reason is that some degree of understanding is needed before the details of an opening can be grasped. Books like the following show complete games with elementary explanations of the moves.
• Chernev, Irving 1998. Logical chess: move by move. London:Batsford. ISBN 0-7134-8464-0
• Chandler, Murray 2004. Chess for children. London:Gambit. ISBN 978-1904600060
• King, Daniel 2000. Chess: from first moves to checkmate. London:Kingfisher. Illustrated, 64 pages. ISBN 0-7534-0447-8
• Wolff, Patrick 2005. The complete idiot’s guide to chess. 3rd ed, New York:Alpha. ISBN 0-02-861736-3
Other sources[change | change source]
None of these are suitable for beginners, but might be used by chess teachers and players of intermediate strength. Tip for teachers: always check with book reviews.[2]
• Openings reference works:
• Nick deFirmian et al. 2008. Modern chess openings, 15th ed, Random House N.Y. ISBN 0-8129-3682-5 (these two versions are almost identical)
• John Nunn et al. 1999. Nunn's chess openings. Everyman, London. ISBN 1-85744-221-0
Related pages[change | change source]
References[change | change source]
1. Watson, John 1998. Secrets of modern chess strategy. Gambit, London. Part 2: New ideas and the modern revolution. p93
2. John Watson's review columns
|
global_05_local_4_shard_00000656_processed.jsonl/85237
|
Official Icon for Sims 3 Stuff Pack #5!
Back in August, BTGames had a listing (rumor), for the 5th Sims 3 Stuff Pack named “Sims 3 Master Suite”. Today, the official Icon for the 5th Stuff Pack is up on the Sims 3 Website. At least it’s creative compared to the last 3 icons! :P Hopefully we will be hearing some announcements soon on what this game is!
Special Thanks to Martys15 for the email! :)
15 Comments Were Written on This Topic!
1. jacqpinks says:
Looks good, I am intrigued now lol
2. duckeggpie says:
ooooo……pretty :) Looks like petals in the background of it :)
1. Sims VIP says:
I noticed this as well! :) When I clicked the facebook share buttom at the top of the post, it enlarged the icon and I think it’s rose petals :P
3. Annadenise says:
I was just checking out their game release page and the stuff pack is not listed now.. theres another game there…Kingdoms of Amalur: Reckoning. Looks like they pulled it off
1. Sims VIP says:
Within hours of all the fansites reporting it, the website took it down. It’s safe to say EA made them ;)
4. Martys15 says:
Thanks for using my information:) The icon is true:)
1. Annadenise says:
I love the color. Trust me not doubting the stuff pack, just they must have pulled it off their list for some reason.
5. karen says:
looks like some kind of mountain in the backgroud lol
6. Jeff says:
It looks like the Late Night one with designs. I wish they would reveal the title.
7. dang says:
I’ve not yey bought any stuff packs.. but i hope that they make like a really nice mansion set or something… for my wealthy sims!!
8. Zoey says:
and when i can buy this stuff pack?
i heard rumours that it will be sold on 10 february but i think its too late.
for example: generations was available at june and one month later there was this city stuff pack. can someone answer this quention?
sry for my english. im tired and im still learning it ;)
9. Trufan1 says:
So clearly we cannot make judgements just yet based on an icon…but based on that and the name…this stuff pack may be very elegant and pretty. I wouldn’t mind that if it was.
10. Russell says:
Can you show us some behind the scene about “Master Suite” maybe some art works or what is “Master Suite” is like maybe luxurious maybe modern maybe Country.
11. lizy says:
what does it mean what will the EP be abuot?
Leave a Reply
|
global_05_local_4_shard_00000656_processed.jsonl/85238
|
Ask me anything Submit
Reblogged from internetsabrina
Life is a balance of holding on and letting go. Rumi (via doll61)
(Source: internetsabrina, via supremacy-of-nature)
Reblogged from teenagerposts
Reblogged from officialprincesspiamia
Reblogged from blurredcocaine
Reblogged from paintdeath
(Source: paintdeath, via p-e-a-c-h-e-ss)
Reblogged from yeahponcho
(Source: yeahponcho, via p-e-a-c-h-e-ss)
Reblogged from watchthefirefliesdance
when I first tweeted these I had to try to hide them from my two psychologist parents but then they got so big that my neighbor told them about it and so they sat me down to ask if I needed help.
(Source: watchthefirefliesdance, via braindrips)
Reblogged from kingsleyyy
this hedgehog is cheering for u bc u can do anything image
(via hufflepuffrave)
Reblogged from hexeosis
(via morrpheus)
Reblogged from lanashiftdelrey
coming out of your room at 3 am and seeing your parents
(via sixpenceee)
Reblogged from kaatnisseverdeen
Reblogged from cad-y
Just a little reminder why I’m a vegetarian.
(Source: cad-y, via therealfutureprimitives)
Reblogged from theone8888
This is the funniest thing to ever happen to Canada
(Source: theone8888, via thelionsstampede)
Reblogged from pleatedjeans
Reblogged from teenagerposts
|
global_05_local_4_shard_00000656_processed.jsonl/85241
|
[back to Inside Google Sitemaps]
Inside Google Sitemaps: More about changing domain names
Your source for product news and developments
More about changing domain names
He also wondered how long it would take for the new site to show up in Google search results. He thought that a new site could take longer to index than new pages of an existing site. I told him that if he noticed that it took a while for a new site to be indexed, it was generally because it took Googlebot a while to learn about the new site. Googlebot learns about new pages to crawl by following links from other pages and from Sitemaps. If Googlebot already knows about a site, it generally finds out about new pages on that site quickly, since the site links to the new pages.
I told him that by using a 301 to redirect Googlebot from the old domain to the new one and by submitting a Sitemap for the new domain, Googlebot could much more quickly learn about the new domain than it might otherwise. He could also let other sites that link to him know about the domain change so they could update their links.
The crawling and indexing processes are completely automated, so I couldn't tell him exactly when the domain would start showing up in results. But letting Googlebot know about the site (using a 301 redirect and a Sitemap) is an important first step in that process.
You can find out more about submitting a Sitemap in our documentation and you can find out more about how to use a 301 redirect by doing a Google search for [301 redirect].
Previous Posts:
Copyright © 2005 Google Inc. All rights reserved.
Privacy Policy - Terms of Service
|
global_05_local_4_shard_00000656_processed.jsonl/85258
|
Forgot your password?
+ - More on the Disposable Tech Worker-> 1
Submitted by Jim_Austin
Jim_Austin (1073454) writes "At a press conference this week, in response to a question by a Science Careers reporter, Scott Corley, the Executive Director of immigration-reform group Compete America, argued that retraining workers doesn't make sense for IT companies. For the company, he argued, H-1B guest workers are a much better choice. "It's not easy to retrain people," Corley said. "The further you get away from your education the less knowledge you have of the new technologies, and technology is always moving forward.""
Link to Original Source
More on the Disposable Tech Worker
Comments Filter:
• One doesn't "retrain" white collar workers. Tuition is generally reimbursed for a course or two per semester and then they adapt or you hire someone with the needed skill set. Usually a combination of both.
H1B has nothing to do with it.
|
global_05_local_4_shard_00000656_processed.jsonl/85259
|
Forgot your password?
Comment: Re:Just goes to prove that is you have enough mone (Score 1) 97
You can do anything. As a builder and avid pilot of quad, hex, and octocopters I find this a little unfair. Myself, along with many others that I know have been strongly warned if not shut down for flying RC copters for commercial reasons. Yes, I too have a gyro stabilized gimbal to carry camera gear, but I am by no means an amateur or hobbyist. I have pre-flight checklists, first person video cameras to see where it is going at all times, backup batteries and flight gear, and have read and understand all of the rules and regulations. So what makes them so special? Permission from the landowner is one thing, I have done that many times, but still get C&D's. For the golf channel to be publicizing this is just a smack in the face to the rest of us who were early on the scene and tried to make a business out of it.
I think the question is this:
Can you get the FAA commissioner a tee time at Pebble Beach?
Comment: Re:Go to Cabela's or Bass Pro Shop... (Score 1) 629
by K8Fan (#40313571) Attached to: Ask Slashdot: Why Are Hearing Aids So Expensive?
Here's the type I'm talking about. They have smaller and slicker models, including some that are in-ear sized. The goal of a "hunter's aid" is to block overly loud noises and boost sounds in the range of human speech - which is exactly what 90% of age-related hearing loss needs. Here's one that fits in your ear and costs $75! You could visit a store and try half a dozen different models and very likely find one that will do the job she needs done. There is a small possibility that she really needs the customization that a licensed audiologist only can provide, and really needs a $4000 pair. But it's worth visiting the sporting goods store first and making sure.
Comment: Re:Go to Cabela's or Bass Pro Shop... (Score 2) 629
by K8Fan (#40313425) Attached to: Ask Slashdot: Why Are Hearing Aids So Expensive?
...and buy a pair of "Hunter's ears". If her loss is broadband, and doesn't require special tuning, the bog standard hunter's hearing assistance device will do what she needs for less than $200 an ear. Mead Killion, the audiologist who started Etymotic Research has written about this problem and has compared off-the-shelf "hunter's ears" with leading hearing aids and, in some circumstances, the hunter's ear was better. As well as a tenth the price. Here's an article from the Wall Street Journal about it.
Forgot to log in before I posted this. May as well use my karma for something.
Comment: Not the only Spaniard who helped (Score 5, Interesting) 67
by K8Fan (#39457895) Attached to: The Spanish Link In Cracking the Enigma Code
Actually, a different Spaniard may have had more to do with breaking the German codes.
Joan Pujol Garcia was a Catalan double agent known to the Germans as Arabel and to the British as Garbo. He became so trusted by the Germans that they gave him their current codes (though not an Enigma machine). He would encrypt his reports, transmit them by radio to Madrid, where they would be re-encrypted and sent on to Berlin. Thus he was able to supply Bletchley with both a current code and the plaintext.
For his services to the Allies, he was awarded an MBE by King George VI.
For his services to the Third Reich, he was awarded the Iron Cross by Hitler.
He was a vital part of Operation Fortitude and convinced the Nazis that the Normandy invasion was a dirversion. He may well have been the greatest bullshit artist who ever lived.
Comment: Re:Potential (Score 1) 77
by K8Fan (#35256950) Attached to: Scientists Aim To 'Print' Human Skin
Comment: Re:Pixel-peeping verus art (Score 1) 103
by K8Fan (#35085922) Attached to: <em>Google Art Project</em> Brings Galleries To Your PC
Not that I know of. Of course anyone on slashdot should be able to whip one up in a couple of minutes... :)
Not me, I can't program for shit.
Doing so might violate Google's terms of service, but there are no copyright issues involved, so the only recall Google would have is to block you from their services. Once you have the image it is yours to do what you please with, though IANAL.
I'd imagine someone will produce a Firefox plug-in. I'd also imagine the art galleries involved are asserting a copyright on the image - even though the works of art themselves are in the public domain.
Comment: Re:Pixel-peeping verus art (Score 1) 103
by K8Fan (#35083762) Attached to: <em>Google Art Project</em> Brings Galleries To Your PC
Is there a tool that will zoom into the image to a particular level, capture a segment, pan to the adjacent area, capture that, etc, panning and capturing until it has captured a mosaic of the whole very high resolution image and will stitch the image back together?
Not that I would ever even consider doing anything like that.
Comment: Re:C-Band programming (Score 1) 386
by K8Fan (#33397314) Attached to: Fun To Be Had With a 10-Foot Satellite Dish?
There are literally thousands of free to receive signals on C and Ku. You use a C/Ku receiver to move the dish and skew the LNBs. But you use splitters and DiSqe switches and take the signals from the C and Ku LNBs to a new DVB receiver.
Each transponder that used to be dedicated to a single analog standard definition channel now carries dozens of standard definition or high definition MPEG compressed channels. And while some may be encrypted, many more are not. And that includes most sports "back hauls".
One advantage is that these signals are the very best looking MPEG available. Because, in most cases, the HD MPEG signal is going to be decompressed to analog HD, have a logo stuck on it and be recompressed, it has to be very nigh quality to start with. An excellent OTA HD signal can be 19.2 Mb/sec, though usually limited to 12 Mb/sec so they can have a weather channel. On your local cable channel, it might be reduced to a 6 Mb/sec QAM signal. But the DVB signal may be as much as 35 Mb/sec!
|
global_05_local_4_shard_00000656_processed.jsonl/85260
|
Forgot your password?
Comment: Start with RSS (Score 1) 361
by fbumg (#46162217) Attached to: Ask Slashdot: What Online News Is Worth Paying For?
What I do if I find a site that might be interesting is subscribe to their RSS feed, that is free. All you get is a summary, but after hitting it for a few days/weeks/months I get a feel for if the subject matter will keep me interested. It's certainly not fool proof, but help weed out some places. For instance, I am doing this right now with Rivals.com. I am thinking about subscribing to get more in-depth news about my Iowa Hawkeyes. But I want to see how they spread the news across the different sports, as I am mainly interested in football and basketball. I have done this to help select some sites (pay sites and free sites), as well as weed out sites that sounded good or maybe had one interesting article, but then turned out to be mostly crap.
Comment: Re:Accenture? (Score 3, Insightful) 284
by fbumg (#45920421) Attached to: White House Reportedly Dismissing Key Healthcare.gov Contractor
I can only speak from personal experience, but to me the big difference is that IBM is at least technically competent. I guess as an opponent of Obamacare I should be happy, as this will undoubtedly allow the problems to continue. But I feel for the people that may be depending/hoping for this to come together. Accenture? Really?
Comment: Re:Interesting (Score 1) 70
by fbumg (#43048219) Attached to: NASA Discovers Third Radiation Belt Circling Earth
This was more funny when I read it as a reply to the "Old Man Earth..." comment above it. I thought you were carrying on the old-man funny-ness, with "coronal mass ejections" implying an old man spending too much time on the toilet. And the "solar wind" a reference to him farting. Now I realize you were serious, that's too bad. And no, I am not 10 years old, I merely think like one.
Comment: Re:The Taliban blames the victim (Score 1) 473
by fbumg (#42741531) Attached to: Hacker Faces 105 Years In Prison After Blackmailing 350+ Women
While I agree that the victim is not at fault here, they nonetheless hold a degree of responsibility. If I go to a crack house, and get robbed, while I am a victim, if I had never been in the crack house in the first place, I would never have been robbed. I don't blame the victims at all, and I do find that what Karen did to be a despicable act and deserves to do some time behind it. But, we as a society also need a good dose of "reality" when it comes to crime. If you don't want a dui, don't go to the bar and then drive home.
prescient http://news.yahoo.com/pipe-theft-report-leads-lincoln-police-pot-bust-185522957.html This was next on my tabs of news to read
Comment: Re:Brilliant idea (Score 2) 480
by fbumg (#42628337) Attached to: Google Declares War On the Password
I agree, this is extremely frustrating. Why wouldn't a site supposedly into security limit my passwords to not even be able to use special characters that are readily visible on a keyboard. I can understand if they don't allow all unicode characters, but if I can type it in with nothing but my qwerty keyboard, using at minimum the shift character, then it should be allowed.
|
global_05_local_4_shard_00000656_processed.jsonl/85261
|
Alternative Flours: All About White Whole Wheat, Spelt, Rye, and More
20101207 protips semolina, durum, whole wheat.JPG
Clockwise from top left: semolina, durum, and whole wheat flours. [Photographs: Donna Currie]
While you could certainly do plenty of baking and pizzamaking using only refined white flour, some people like to experiment with other types. Have you ever wondered what the difference is between whole wheat and white whole wheat flour? What about semolina, rye, and spelt? Here's a quick glossary of some of the more common varieties.
Semolina: Often used in pastas, semolina comes from durum wheat, a hard, high-protein wheat. While it has a lot of protein, it doesn't create the type of gluten that works well in bread, so it's usually combined with regular wheat flour when making bread. There are some exceptions, of course. In the US, when a durum flour is labeled "semolina", the flour is more coarsely ground. When it's labeled "durum" it more finely ground. I like adding semolina to my dough recipes for the depth of flavor it adds.
Whole wheat: The bran and germ of the wheat are included along with the endosperm, whereas normal white flour contains only the endosperm. Whole wheat flour tends to absorb more moisture than while flour, so you need to adjust for that if you're making a substitution in a recipe. Whole wheat flours have a shorter shelf life than white wheat, since the oil in the whole wheat can go rancid. If you don't use it quickly, it's best to store it in the refrigerator or freezer.
Stone-ground whole wheat: A coarser ground version of whole wheat. One thing to keep in mind with whole wheat flours is that the coarseness can vary from brand to brand.
White whole wheat: This flour comes from a lighter-colored wheat, not the red wheat that is more typically used for making flour. The major difference is the pigment in the outer layers of the grain. White whole wheat flour is usually ground more finely than standard whole wheat, as well, so the texture is more like refined white flour. Since the red pigment in wheat can be bitter, white whole wheat breads have less of that bitter flavor. White whole wheat needs less moisture adjustment when making substitutions than other types of whole wheat.
Spelt: An ancient species of wheat that is becoming more popular these days. When it first appeared on store shelves, it was often sold as a non-wheat alternative for people with gluten sensitivities. Spelt contains gluten, but some people with mild gluten issues can tolerate it better than regular wheat. As far as baking, the gluten in spelt develops quickly, but it's fragile, so it's possible to overknead a spelt dough. I've seen both white spelt flour and whole-grain spelt flour in stores.
Rye: While most pizzamakers aren't going to be making all-rye crusts for their pizzas, it's interesting to note that rye flour is acceptable as a bread improver for French breads up to a maximum of 2 percent of the flour. Some bakers like the way rye changes the texture and color of the finished bread, but others appreciate the fact that it can increase the shelf life of the product.
Like wheat flour, there are a number of different types of rye flours available, from white rye that is made from only the endosperm of the grain, all the way to pumpernickel flour which is the rye equivalent of stone ground whole wheat. Dark rye and pumpernickel aren't quite the same thing; or at least they aren't supposed to be. Pumpernickel is a whole grain flour, coarsely ground, whereas dark rye usually contains very little of the endosperm. Of course, depending on brand, definitions could change. Rye flour isn't particularly dark when it's dry—there's not that much difference in color between the white rye (left) and dark rye (right) in this photo:
white and dark rye.JPG
The endosperm of the rye contains a significant amount of fiber, so white rye bread is not the nutritional equivalent of white bread made from wheat flour. Rye contains gluten, but not as much as wheat does. It also has more soluble sugars than wheat flour, so it ferments faster. Sometimes that's a good thing, and sometimes it can ferment too fast and collapse.
Keep in Mind
One problem with using whole grain and alternative flours in baking is that there's a lot less consistency from brand to brand than with white flours. One brand of whole wheat might be milled a little coarser than another, or there might be more or less bran. What that means is that volume-to-weight conversions can be difficult if a recipe doesn't specify a weight for the alternative flours in the recipe.
But even if you know the correct weight, you're not home free. Whole grain flours can absorb a lot more water than white flours. If your chosen brand of whole grain flour isn't the same one the recipe writer was using, you still might end up with a dough that is too wet or too dry, even though your weights are completely accurate. If you use a lot of whole grain and alternative flours, be ready to adjust the hydration, if needed.
Of course, this is just a sampling of the possible grains that could go into a dough, but once you've mastered the varieties of wheat and you've added rye to your arsenal, you should be ready to experiment on your own.
Add a comment
Previewing your comment:
|
global_05_local_4_shard_00000656_processed.jsonl/85270
|
Russia: A Blogger's Account of the Rescue Effort in Perm
Global Voices Online
Sunday, December 6, 2009
At least 109 people died and more than 130 were injured Friday night in a fire caused by the ignition of a pyrotechnic display, and in the resulting stampede, at the Lame Horse nightclub in the city of Perm.
In an earlier GV analysis of the citizen and mainstream media coverage of the Perm tragedy, Gregory Asmolov has translated two of the nearly instant updates from one of the users of a popular local forum,, who happened to be outside the nightclub when the fire broke out - and who ended up helping out with the rescue effort:
[...] A user M.R. joined the discussion by publishing several pictures of the rescue efforts. He also wrote that he had helped in the evacuation of victims:
My role was to flip victims over on their sides and bend their knees. I don't know why but it is what the only doctor at that time told us to do.
There are only 50 percent of people alive. I determined that by their eye pupils… I used a flashlight. I did it so the police could help only those who are still alive.
A day later, the same forum user summed up his heartbreaking experiences and observations in a detailed post (RUS) on his LJ blog (, parts of which are translated below:
My wife and I were taking a walk outside our house...
First, some noise in the backyard and loud voices. People standing by the emergency exit of LH [the Lame Horse nightclub], some sitting and coughing, spitting. Talking calmly, though, without panic. Then some guy comes running to the fire station nearby, all black, and starts screaming that there are "thousands of people" in there and they are all burning, etc. At first, we thought he was drunk. But the firefighters must have known about the situation by then and were running around like crazy. As a result, everyone who was at the fire station at the time drove out or simply ran to the site of the fire in a minute. I walked to the compartments from which fire trucks were driving out and closed the gates after them. I'd never seen them leaving the gates open like this before.
We went down and walked around the building on 9 Kuybyshev St. to the side where the small park is. Right away, I saw a man in rags, with no hair or eyelashes. Only his eyes were burning, but his whole face was covered with soot. But he was moving normally, walking back and forth. I talked to him. He asked if he was burned badly. But I told him that he looked okay. Then another victim, similar to the first one, came up to me and addressed me by my first name and patronymic. Turned out he was a colleague of mine. He said he didn't remember how he got out. But he, too, asked me how his face was and, in general, how he looked from the outside. (Later, I learned from reports that he was taken to Moscow with 80 percent of his skin damaged.)
But at that point it somehow didn't appear that horrible. The victims were walking back and forth, some were sitting on the ground. Some ten people, all in all. Thick black smoke was coming out from the small windows of LH, but no one was running out from the building itself. And it seemed that it wasn't so horrible after all.
The horrible part started in five minutes or so. The firefighters got dressed, connected to the fire hydrants - which, by the way, were functional and the water was coming. And that's when they began to drag the people out...
This, of course, was impressive...
They carried out the first two women, lay them on the asphalt right by the entrance. Someone began to administer [CPR] to one of them [...]. But then more people were carried out. And were placed right there. The firefighters could no longer walk, had to jump over people...
Two ambulances arrived, and people started to drag the doctors apart, showing the victims to them and demanding that they help them. This was, perhaps, the hardest moment.
Then people began to self-organize. They stopped doing the [CPR]. First, we tore off the red vinyl banners, turned them around and lay them out on the opposite side of the road. Prepared a place to put as many people as possible. [...] A few guys - ten or so - turned up and started dragging people from the entrance (receiving them from the firefighters, obviously), and carrying them to me [...]. I determined a task for myself - to turn the victims over to their sides. This was a recommendation of a doctor, who was the only one there then, and who later left somewhere, too. This, perhaps, was the worst thing about the organization [of the rescue effort] - there was no one to do the initial examination of the victims... :( I had a flashlight, and I was doing it the way I could, relying on my army experience. I was lifting their eyelids and pointing the flashlight into their eyes. The alive/dead results were 50/50. We were trying to somehow separate the dead ones from those who were alive, but those who were carrying [the victims] didn't really obey, of course, and didn't pay attention - they were just dragging [the victims]. [...] Later, though, they started doing things more sensibly - for a person to lie on the side, it is necessary to bend one of [his/her] knees. At first, I was doing this, and then the guys who were carrying [the victims] began to do it properly themselves.
At some point, there was a quiet period, sort of. The firefighters were running back and forth with [firefighting equipment] and there were no new victims. This was when, I guess, ambulances started to arrive. I didn't see them. I just understood that the guys who were carrying [the victims] from the entrance were now yelling that [the victims] should be taken to the ambulances. This is when we needed the flashlight again. I remember that they kept trying to carry away the girl who was lying near me. But I stopped them from doing this because I already knew that she no longer needed to be carried anywhere. And then the police officers showed up and started carrying the people away, too - likely, to the ambulances. They obeyed me for a while even - I used my flashlight to pick out the people for them, who needed to be carried away.
Then they started carrying people from the nightclub again. And everything got mixed up again. Some were taken to the ambulances right away, [...], others were just placed on the road. Again, I guess there were not enough people with flashlights for the initial sorting out [of the victims]. This is very bad, of course.
This was when my part was over. Some people in uniforms showed up and the real rescue began.
And a few more remarks:
It was bad that many people were drunk, and this, along with the hysteria, did not contribute to the order and organization. This is how it was at the very beginning. These drunk, hysterical people were rushing among the injured and the dead, obviously looking for their relatives. They were turning [the victims] over to their backs. Had to [turn the victims back to their sides] after that. And, perhaps, it wasn't too good to be moving [the victims]. [...]
It also seemed strange that the firefighters didn't try dragging the people out through the emergency exit in the back of the building. Would have been not as messy this way, perhaps.
No comments:
|
global_05_local_4_shard_00000656_processed.jsonl/85281
|
Active Directory Domain Services (AD DS) Overview
Active Directory Domain Services (AD DS) Overview
In Windows Server 2008 and later, the directory service is called Active Directory Domain Services (AD DS). In earlier versions of Windows Server, the directory service is called Active Directory.
Active Directory Domain Services Overview
Applies To: Windows Server 2008, Windows Server 2008 R2
In the following sections, learn more about AD DS, features in AD DS, and software and hardware considerations. For more information about planning, deploying, and operating the AD DS server role, see Active Directory Domain Services (
What is a Directory?
A directory, in the most generic sense, is a comprehensive listing of objects. A phone book is a type of directory that stores information about people, businesses, and government organizations. Phone books typically record names, addresses, and phone numbers. AD DS is similar to a phone book in several ways, and it is far more flexible. AD DS will store information about organizations, sites, computers, users, shares, and just about any other network object that you can imagine. Not all objects are as similar to each other as those stored in the phone book, so AD DS includes the ability to record different types of information about different objects.
Lightweight Directory Access Protocol (LDAP)
AD DS reflects Microsoft's trend toward relying on standard protocols. The Lightweight Directory Access Protocol (LDAP) is a product of the IETF (Internet Engineering Task Force). It defines how clients and servers exchange information about a directory. LDAP version 2 and version 3 are used in AD DS .
Distinguished Names
It is very important to understand the structure of distinguished names, as you will be referring to them often in the course of your job. My distinguished name is /O=Internet/DC=COM/DC=Microsoft/ DC=MSPress/CN=Users/CN=Tony Northrup. Consider the following figure, which shows how I fit into a sample AD DS tree. The distinguished name I gave starts to make some sense—it identifies each container from the very top down to my specific object. Each container is separated by a slash and an identifier. For example, COM, Microsoft, and MSPress are each preceded by /DC=. The DC stands for Domain Component, which identifies a DNS domain.
Distinguished names describe the location of an object in a tree.
To simplify distinguished names, relative distinguished names can also be used. The relative distinguished name of the previous example is CN=Tony Northrup, identifying the user name but not the context in which it resides. The context must be known already for the relative distinguished name to be an effective identifier.
User Principal Name
Distinguished names are great for computers but too cumbersome for people to remember. People have grown accustomed to e-mail addresses, so AD DS provides these addresses as a shortcut to the full object name. In Figure 11-9, Tony Northrup is a user of the domain. An administrator could create a user principal name within the domain to allow simpler access to my user account and hold a place for my e-mail address, like
Users will rely on their user principal name to log onto their computers. In other words, user principal names will replace the user names used in older Windows networks. Obviously, this helps the users by saving them the trouble of typing their distinguished names. However, it also benefits users because the user principal name will stay the same even if administrators move or rename the underlying user account.
What is the AD DS server role?
Organizing network elements into a hierarchical containment structure provides the following benefits:
• The forest acts as a security boundary for an organization and defines the scope of authority for administrators. By default, a forest contains a single domain, which is known as the forest root domain.
• Additional domains can be created in the forest to provide partitioning of AD DS data, which enables organizations to replicate data only where it is needed. This makes it possible for AD DS to scale globally over a network that has limited available bandwidth. An AD DS domain also supports a number of other core functions that are related to administration, including network-wide user identity, authentication, and trust relationships.
• OUs simplify the delegation of authority to facilitate the management of large numbers of objects. Through delegation, owners can transfer full or limited authority over objects to other users or groups. Delegation is important because it helps to distribute the management of large numbers of objects to a number of people who are trusted to perform management tasks.
Features in AD DS
Security is integrated with AD DS through logon authentication and access control to resources in the directory. With a single network logon, administrators can manage directory data and organization throughout their network. Authorized network users can also use a single network logon to access resources anywhere in the network. Policy-based administration eases the management of even the most complex network.
Additional AD DS features include the following:
• A set of rules, the schema, that defines the classes of objects and attributes that are contained in the directory, the constraints and limits on instances of these objects, and the format of their names.
• A global catalog that contains information about every object in the directory. Users and administrators can use the global catalog to find directory information, regardless of which domain in the directory actually contains the data.
• A replication service that distributes directory data across a network. All writable domain controllers in a domain participate in replication and contain a complete copy of all directory information for their domain. Any change to directory data is replicated to all domain controllers in the domain.
• Operations master roles (also known as flexible single master operations or FSMO). Domain controllers that hold operations master roles are designated to perform specific tasks to ensure consistency and eliminate conflicting entries in the directory.
Identity Management for UNIX
Identity Management for UNIX is a role service of AD DS that can be installed only on domain controllers. Two Identity Management for UNIX technologies, Server for NIS and Password Synchronization, make it easier to integrate computers running Microsoft Windows® into your existing UNIX enterprise. AD DS administrators can use Server for NIS to manage Network Information Service (NIS) domains. Password Synchronization automatically synchronizes passwords between Windows and UNIX operating systems.
New AD DS features in Windows Server 2008 R2
Feature Description
Active Directory Administrative Center
Active Directory Administrative Center provides users and network administrators with an improved data management experience and a rich graphical user interface (GUI) to perform common Active Directory object management tasks. Built on Windows PowerShell™ technology, Active Directory Administrative Center makes it possible for users and network administrators to administer directory service objects through both data-driven navigation and task-oriented navigation.
Active Directory module for Windows PowerShell
The Active Directory module for Windows PowerShell is a command-line interface that administrators can use to configure and diagnose all instances of Active Directory Domain Services (AD DS) and Active Directory Lightweight Directory Services (AD LDS) in their environments.
This feature includes a set of Windows PowerShell cmdlets and a provider. The provider exposes the Active Directory database through a hierarchical navigation system, which is very similar to the file system. As with drives in a file system (C:, D:), you can connect Windows PowerShell drives to Active Directory domains and AD LDS instances, as well as Active Directory snapshots.
Active Directory Recycle Bin
Active Directory Recycle Bin minimizes directory service downtime by improving the ability to preserve and restore accidentally deleted Active Directory objects without having to restore Active Directory data from backups, restart AD DS, or restart domain controllers. When Active Directory Recycle Bin is enabled, all link-valued and non-link-valued attributes of the deleted objects are preserved and the objects are restored in their entirety to the same consistent logical state that they were in immediately before deletion. For example, restored user accounts automatically regain all group memberships and corresponding access rights that they had within and across domains immediately before deletion. Active Directory Recycle Bin is functional for both AD DS and AD LDS environments.
Active Directory Recycle Bin requires the Windows Server 2008 R2 forest functional level, and it is disabled by default. To enable it, you can use Ldp.exe or the Windows PowerShell Enable-ADOptionalFeature cmdlet.
Active Directory Web Services (ADWS)
ADWS is a Windows service that provides a Web service interface to AD DS and AD LDS directory service instances and to Active Directory snapshots that are running on the same Windows Server 2008 R2 server as ADWS. ADWS is installed automatically when you add the AD DS or AD LDS server roles to your Windows Server 2008 R2 server.
Authentication Mechanism Assurance
Authentication Mechanism Assurance packages information about the type of logon method (smart card or user name/password) that is used to authenticate domain users inside each user’s Kerberos token. When this feature is enabled in a network environment that has deployed a federated identity management infrastructure, such as Active Directory Federation Services (AD FS), the information in the token can then be extracted whenever a user attempts to access any claims-aware application that has been developed to determine authorization based on a user’s logon method.
Authentication Mechanism Assurance requires the Windows Server 2008 R2 domain functional level.
Offline domain join
An offline domain join is a new process that computers running Windows® 7 or Windows Server 2008 R2 can use to join a domain. The offline domain join process can complete the domain join operation without network connectivity.
Installing the AD DS server role
After you finish installing the operating system, you can use Initial Configuration Tasks or Server Manager to install server roles. To install the AD DS server role, click Add roles to start the Add Roles Wizard, and then click Active Directory Domain Services. Follow the steps in the Add Roles Wizard to install the files for the AD DS server role. After you complete the Add Roles Wizard, click the link to start the Active Directory Domain Services Installation Wizard.
Follow the steps in the Active Directory Domain Services Installation Wizard to complete the installation and configuration of your domain controller. Most wizard pages have a Help link for more information about the settings that you can configure.
To automate domain controller installations, you can use an answer file or you can specify unattended installation parameters at the command line. For more information about installing AD DS, see the AD DS Installation and Removal Step-by-Step Guide (
Managing the AD DS server role
You can manage server roles with Microsoft Management Console (MMC) snap-ins. To manage a domain controller (that is, a server that is running AD DS), click Start, click Control Panel, click Administrative Tools, and then double-click the appropriate snap-in:
• To manage Active Directory objects by using the newest GUI tool, with improved options for viewing and managing Active Directory data, click Active Directory Administrative Center.
• To manage Active Directory objects by using a predefined set of Windows PowerShell cmdlets and a provider, click Active Directory Module for Windows PowerShell.
• To manage user and computer accounts, click Active Directory Users and Computers (dsa.msc).
• To manage Active Directory trusts, functional levels, and forest-wide operations master roles, click Active Directory Domains and Trusts (domain.msc).
• To manage Active Directory sites and site links, click Active Directory Sites and Services (dssite.msc).
As an alternative, you can double-click the appropriate snap-in on the Active Directory Domain Services page in Server Manager.
AD DS plays an important role in the future of Windows networking. Administrators must be able to protect their directory from attackers and users, while delegating tasks to other administrators where necessary. This is all possible using the AD DS security model, which associates an access control list (ACL) with each container, object, and object attribute within the directory. The following figure shows a step from the Delegation Of Control wizard, a helpful utility for assigning permissions to AD DS objects.
The Delegation Of Control wizard makes it simple to assign permissions to objects.
This high level of control allows an administrator to grant individual users and groups varying levels of permissions for objects and their properties. Administrators can even add attributes to objects and hide those attributes from certain groups of users. For example, the administrator could set the ACLs such that only managers can view the home phone numbers of other users. Nonmanagers would not even know that the attribute existed.
A concept new to Windows Server is delegated administration. This allows administrators to assign administrative tasks to other users, while not granting those users more power than necessary. Delegated administration can be assigned over specific objects or contiguous subtrees of a directory. This is a much more effective method of giving authority over the networks; rather than granting someone the all powerful Domain Administrator permissions, he or she can be given permissions for just those computers and users within a specific subtree. AD DS supports inheritance, so any new objects inherit the ACL of their container.
Try to forget what you've learned about Windows NT domain trusts. The term trusts is still used, but trusts have very different functionality. There is no distinction between one-way and two-way trusts because all AD DS trusts are bidirectional. Further, all trusts are transitive. So, if Domain A trusts Domain B, and Domain B trusts Domain C, then there is an automatic implicit trust between Domain A and Domain C. This new functionality is shown in the following figure.
Figure 11-2: Windows 2000 Server trusts are bidirectional and transitive.
Windows Server trusts are bidirectional and transitive.
Another AD DS security feature is auditing. Just as you can audit NTFS partitions, objects and containers within AD DS can be audited. This is a useful way to determine who is attempting to access objects, and whether or not they succeed.
Use of DNS (Domain Name System)
Domain Name System, or DNS, is necessary to any Internet-connected organization. DNS provides name resolution between common names, such as, and the raw IP addresses that network layer components use to communicate. AD DS makes extensive use of DNS technology and relies on DNS to locate objects within AD DS. This is a substantial change from previous Windows operating systems that require NetBIOS names to be resolved to IP addresses, and to rely on WINS or another NetBIOS name resolution technique.
AD DS works best when used with Windows Server–based DNS servers. Microsoft has made it easy for administrators to transition to Windows Server–based DNS servers by providing migration wizards that walk the administrator through the process. Other DNS servers can be used, but administrators will need to spend more time managing the DNS databases. If you decide not to use Windows Server–based DNS servers, you should make sure your DNS servers comply with the new DNS dynamic update protocol. AD DS servers rely on dynamic update to update their pointer records, and clients rely on these records to locate domain controllers. If dynamic update is not supported, you will have to update the databases manually.
Note: DNS dynamic update protocol is defined in RFC 2136.
Windows domains and Internet domains are now completely compatible. A domain name such as will identify AD DS domain controllers responsible for the domain, so any client with DNS access can locate a domain controller. AD DS clients can use DNS resolution to locate any number of services because AD DS servers publish a list of addresses to DNS using the new features of dynamic update. These addresses identify both the domain and the service being provided and are published via Service Resource Records (SRV RRs). SRV RRs follow this format:
AD DS servers provide the LDAP service for object location, and LDAP relies on TCP as the underlying transport-layer protocol. Therefore, a client searching for an AD DS server within the domain would look up the DNS record for
Global Catalog
AD DS provides a global catalog (GC). No, this does not mean that you can find any piece of information on the planet—but it is still very significant. AD DS provides a single source to locate any object within an organization's network.
The global catalog is a service within Windows Server that allows users to find any objects to which they have been granted access. This functionality far surpasses that of the Find Computer application included in previous versions of Windows, because users can search for any object within AD DS: servers, printers, users, and applications. For example, the following figure shows how a user can search for all color printers in his or her building that have the capability to print double-sided documents.
The global catalog helps users find network resources.
This feature is especially important because of the complexity of LDAP names. Older versions of Windows relied on 15-character NetBIOS computer names, which users could often remember. Few people would be able to recall LDAP names, such as the following:
Because users can easily search for objects, remembering names is much less important.
The GC is an index stored on AD DS servers. It contains the names of all objects in the AD DS server, regardless of how the server has been partitioned. The GC also contains a handful of searchable attributes for each object. For example, the GC would store the distinguished names, first names, and last names of all users—allowing someone to search for anyone named Tony and find the distinguished name of the user. The global catalog is a subset of AD DS, and stores only those attributes that users tend to search on. Useful defaults are provided by Microsoft, and administrators can specify other attributes to be searchable by using the AD DS Schema, described later in this chapter.
Not All Indexes Are Created Equal!
If you have done any database administration, you already know that some types of information are more useful to index than other types. Naturally, you should index attributes that will be searched for often, but there are other factors involved. Indexes take up space, so it is not efficient to index everything. Indexes also slow down updates and inserts—if an indexed attribute is modified, the index must be modified as well. Indexing works better when the data being stored varies from user to user. Therefore, never index true or false attributes or any attribute with less than five possible values. Names are an excellent attribute to index since they are almost unique for each user. Finally, don't index attributes that aren't usually filled in. If few users enter a value for their middle name, the indexing of that attribute is a waste.
As new objects are created in AD DS , they are assigned a unique number called a GUID (globally unique identifier). The GUID is useful because it stays the same for any given object, regardless of where the object is moved. The GUID is a 128-bit identifier, which isn't particularly meaningful to users, but applications that reference objects inAD DS can record the GUIDs for objects and use the global catalog to find them even after they've moved.
Administrators who implement AD DS will quickly discover that their network relies heavily on its services. This reliance means that AD DS must be available on multiple servers—so that if a single server fails, clients can contact a server with duplicate services and information. Unlike the Windows NT domain databases used with previous versions of Windows NT, updates to the database can be sent to any of the AD DS servers. While this complicates the replication process, it eliminates the possibility that the failure of a single domain controller would stop updates to the databases. It also reduces the high load placed on Windows NT 4.0 primary domain controllers.
AD DS includes a replication component that makes this a simple task for administrators. Simply adding domain controllers to an AD DS is sufficient to begin the replication process.
One of the most complex parts of making redundant servers work properly is replicating the information and ensuring that all servers have the most up-to-date content. AD DS uses multimaster replication, which is another way of stating that updates can occur on any AD DS server. Each server keeps track of which updates it has received from which servers, and can intelligently request only necessary updates in case of a failure.
How AD DS Replication Works
Each update is assigned its own 64-bit unique sequence number (USN) from a counter that is incremented whenever a change is made. These updates are system-specific, so every AD DS server maintains a separate counter.
When a server replicates an update to other AD DS domain controllers, it sends the USN along with the change. Each server maintains an internal list of replication partners and the highest USN received from them. The server receiving the update requests only those changes with USNs higher than previously received. This method has the added benefit of stopping updates from propagating endlessly between multiple AD DS domain controllers.
One problem inherent in any multimaster replication scheme is that updates to a single object can occur in multiple places at the same time. For example, if an administrator in Boston changes a user's name from "Curt" to '"Kurt" and an administrator in Chicago simultaneously changes that same user's name from "Curt" to "Kirk," a replication collision will occur. There are two problems to deal with when a collision occurs: detecting the collision and resolving the collision.
AD DS stores property version numbers to allow replication collision detection. These numbers are specific to each property of every object within AD DS and are updated every time the property is modified. These numbers are propagated through AD DS along with the change, so a server that receives two different updates to the same property with the same property version number can conclude that a replication collision has occurred.
AD DS domain controllers resolve collisions by applying the update with the later timestamp. The timestamp is created by the server that initiated the change, so it is very important to keep system time synchronized between servers.
Note: Use the built-in distributed time synchronization service to keep all servers working together!
Large networks can contain hundreds of thousands of objects. Windows NT required multiple domains to allow that many objects to be manageable. Administrators often divided users and resources into separate domains and created a trust between the domains. The structure of the databases simply did not allow them to grow to hundreds of thousands of objects. These size limitations are less a factor in AD DS domains, thankfully. However, supporting a very large AD DS could be an incredible burden to any single domain controller.
Active Directories can be partitioned to lessen this load. Partitioning allows different domain controllers to manage different sections of the database, reducing the load on any individual server. The clients can use resources located within different AD DS partitions transparently. Therefore, administrators can manage massive AD DS domains without requiring domain controllers to handle the entire database.
Many people are initially confused by the relationship between object classes, attributes, and the objects themselves. Objects are created based on an object class. Attributes describe an object class. When an object is created, it inherits all the attributes of its object class. Here's where it gets tricky: object classes and attributes are also objects in AD DS. Fortunately, most user interfaces hide this fact.
An object can be either a reference to something concrete or the actual useful information itself. For example, every bit of information about a user account is stored within AD DS. However, only a reference to a disk volume is stored in AD CS. While the reference is not useful by itself, it is used to locate the volume on the file server. When creating new object classes, carefully consider whether the object will store a reference to something external or whether all necessary information will be contained in the object's attributes. While AD DS is extremely convenient, it should not be used to store large amounts of information, constantly changing information, or rarely used information.
Anytime you add a user or a computer to AD DS, you are creating an object. Creating an object is often referred to as publishing, because it kicks off a process of replicating the new information across all AD DS domain controllers in the domain.
Schema: Attributes and Object Classes
schema is a set of attributes used to describe a particular object class in AD DS. Different types of information need to be tracked for different object classes, and that's why the schema is so important. For example, the Users object class needs attributes for a first name, last name, phone number, e-mail address, and mailing address. The Printer object class must have many different attributes—users will want to know how fast a printer is and whether it can duplex or print in color. These attributes can be viewed and edited using the AD DS Schema MMC snap-in, as shown in the following figure.
Experienced programmers and system administrators can manage the AD DS schema, but the AD DS Schema snap-in is not installed by default. In addition, the Schmmgmt.dll file (regsvr32 schmmgmt.dll) must be registered from an elevated command prompt before the snap-in can be installed. The AD DS Schema does not have an icon within the Start menu; you must launch the MMC interface and add the snap-in named AD DS Schema.
The AD DS Schema allows classes and attributes to be modified.
By default, object classes come with a logical set of attributes that will fit most organization's needs. However, many organizations will need to track additional information about particular object classes. For example, if employees are assigned a badge number, it is useful to track that information in the object class. The first step is to create an attribute called BadgeID, as shown in the following figure. The second step is to make the new attribute optional for the Users class.
Figure 11-5: Attributes can be added with the Active Directory Schema snap-in.
Attributes can be added with the AD DS Schema snap-in.
The schema is stored within AD DS just like other objects. Therefore, the schema inherits the ability to be automatically replicated throughout a domain. It also benefits from the security features of AD DS, and allows administrators to delegate authority over the schema to different users and groups. By changing the ACLs on a schema object, an administrator can allow any user to add or modify attributes for an object class. The example in the following figure shows that the group East Coast Administrators has been granted full control over the schema.
Figure 11-6: Modifying the schema can be delegated to groups and users.
Modifying the schema can be delegated to groups and users.
New attributes have several properties that must be set. The user creating a new attribute must define a name for the attribute (such as Badge ID #), the type of data to be stored (such as a string or a number), and the range limits (such as string length). A unique Object Identifier (OID) must also be provided. New attributes can be indexed, which adds the attributes to the global catalog. Indexes should be created for attributes that users will search with. In this example, if security needs to look up user accounts by the Badge ID number, this attribute should be indexed. For a search to occur on a nonindexed attribute, a slow and processor-intensive walk of the directory tree must be done.
Where Do Object Identifiers Come From?
The only way to ensure Object Identifiers are globally unique is to have a central agency that assigns OIDs. This is already common practice on the Internet; the InterNIC assigns domain names and the Internet Assigned Numbers Authority (IANA) assigns IP subnets. Object Identifiers are assigned by a National Registration Authority, or NRA. NRAs vary from country to country. In the United States, the American National Standards Institute (ANSI) provides NRA services. For a modest fee, ANSI can supply your organization with a root OID. Any objects created by your organization will have this root OID as the prefix, ensuring that Object Identifiers are globally unique.
A list of NRAs can be found at the International Standards Organization's Web site, at
The schema is cached by AD DS domain controllers for performance reasons. It will take up to five minutes for the cache to be updated after you change the schema. So, wait a few minutes before you try to create objects based on your new object classes and attributes. If you must reload the cache immediately, add the attribute schemaUpdateNow to the root object (the object without a distinguished name), and set the value to 1.
Extending the schema of AD DS is a powerful capability. However, most administrators will never need to use anything but the classes and attributes Microsoft has provided by default.
ADSI (Active Directory Service Interface)
ADSI (Active Directory Service Interface) allows applications to interact with any directory service without being forced to know the internal details of the underlying protocols. Administrators can write programs and scripts that make use of ADSI to read or write to legacy Windows NT 4.0 directories, NetWare NDS directories, NetWare 3 binderies, and LDAP directories such as AD DS. Developers can even create applications that make use of directories at the customer's site, without previous knowledge of the type of directory being used.
For example, the following Microsoft Visual Basic code uses ADSI to display a list of users in the debug window:
Set ou = GetObject("ldap://dcserver/OU=Sales,DC=ArcadiaBay,DC=COM")
For Each obj In ou
Debug.Print obj.Name
As you can see, gathering a list of users is much simpler than in previous Windows operating systems. ADSI makes use of the Component Object Model (COM), so almost any Windows development environment can immediately make use of the interface. Developers will be interested to know that they can access Active Directory through the LDAP C API and through MAPI, though ADSI is the preferred interface.
Note: The LDAP C API is defined in RFC 1823.
Active Directory Wiki Pages
See Also
Sort by: Published Date | Most Recent | Most Useful
• Is there a good walkthrough of setting up an AD server behind a Verizon Fios connection. All of the walkthroughs that I have found so far never get to the point where the server is fully functional. Thanks for all of the help.
• Hi Marcus,
Thanks for posting. I have not used a Verizon Fios connection so I do not know what caveats might apply to that. But there is a walkthrough for setting up a domain controller (aka AD Server) at See the subtopics there for doing this via wizard, command-line, or script.
You can also post questions to Technet forums for AD at
I hope that helps,
Justin [MSFT]
Active Directory Documentation Team
• thank you for articles
• Could you please point me to some documentation for the recommended Hardware configuration (RAID mostly) for a Windows 2008 R2 DC? It will be a GC, DNS, and DHCP server for approximately 200 users with Exchange 2007 in the environment.
• this is informative
• h
• Great document !
Page 1 of 1 (7 items)
|
global_05_local_4_shard_00000656_processed.jsonl/85284
|
Kobo responded to Border’s bankruptcy announcement today with a reassurance for everyone who bought ebooks from Borders. A long FAQ is posted over on the Kobo blog, if you’re interested, but the key detail is that there is no reason to worry about your Borders ebooks.
Kobo is doing just fine, and it’s not going anywhere. Your Borders ebooks are safe; Kobo has been running the servers all along. Even after Borders shuts down, Kobo will still support your ebook library and your Kobo eReader.
Will I lose access to ebooks I have purchased at Borders.com?
What does this mean for the relationship between Kobo and Borders?
Kobo is just fine (and it’s sweet that you’re concerned.) Borders is an important book retailer in the US market, but its ebook sales represents a minority of Kobo’s worldwide sales. As a global ebook retailer delivering books to over 100 countries on any given week, Kobo realized long ago that diversification across retailers and markets was important as the book industry went into a period of radical transformation. We feel confident that we’ll be with you for years to come.
Note that there’s no mention of Borders gift cards, which suggests the payment systems were maintained separately.
via Kobo
|
global_05_local_4_shard_00000656_processed.jsonl/85286
|
You have (0 items) in your Wishlist
No Items in Wishlist
Additional Views
Marina Grechanik, "Chance"
by Urban Sketchers
Art Print
"Lottery booth an the street of Ra'anana.
Pen and watrercolor in Daler-Rowney 220g paper sketchbook"
Marina blogs at:
Her Flickr:
Her website:
Marina is an correspondent for the city of Tel-Aviv
and a contributor to USk Isreal
Thanks to Marina for the donation of her sketch “Chance”.
All profits from sales of prints go to support and the annual USK symposium. We appreciate your support, and hope you enjoy the art and stories on
• 7Promote
|
global_05_local_4_shard_00000656_processed.jsonl/85289
|
29 July 2014 - Mission Day: 6815 - DOY: 210
The Corona Approaching Solar Maximum
Click on the image below for a larger version
Also available: a postscript image (6 Megabytes) formatted for 8.5 by 11 inch paper.
UVCS, EIT and NSO/SP sunspot numbers image
Quantitative changes in the solar corona as seen by UVCS/SOHO from 1.5 to 3.5 solar radii and by EIT/SOHO at lower heights during the rising phase of solar cycle 23. The five solar images from left to right are composites of UVCS/SOHO O VI 1032 Å (outer) and EIT/SOHO 284 Å (inner) synoptic images. The center of each solar image is positioned above the date of observation. The blue histogram represents the National Solar Observatory/Sacramento Peak sunspot numbers (monthly averages). The hatched blue region corresponds to predictions of future sunspot numbers from the Marshall Space Flight Center Solar Physics Branch. Both the UVCS and EIT instruments are calibrated, so the color scales represent the measured brightnesses of their respective sections of the composite image. However, the brightest portion of the EIT images is about 10,000 times larger than the brightest portion of the UVCS images. In each case, brightnesses increase from the black region through the red or yellow regions to the white regions.
Caption: The corona is the Sun's outer atmosphere. The corona has bright emission at ultraviolet wavelengths. The O VI emission shown above comes from coronal oxygen atoms that have five missing electrons. Artificial eclipses produced by UVCS block out the disk of the Sun and filter out everything except the O VI 1032 Å emission. UVCS scans the entire corona in a ``synoptic'' sequence. For this standard observation, the UVCS instrument observes a narrow rectangle in the solar corona that is 40 arcminutes long and 84 arcseconds wide. The rectangle can be scanned in height at each of eight position angles around the Sun. The images are made by interpolating between positions to provide complete coverage between the inner and outer heights. The above composites have been generated from five UVCS/SOHO and EIT/SOHO synoptic images taken in December 1996, December 1997, December 1998, December 1999, and October 2000, covering over four years of SOHO's operation in the current solar cycle. The histogram (blue) shows the number of sunspots from mid-1995 through September 2000. For dates after October 2000, a prediction from the MSFC Solar Physics Branch is provided. The corona displays a variety of features including coronal holes and streamers. In the above images, those features and the overall shape and brightness of the corona can be seen changing with the sunspot activity cycle. From solar minimum in 1996 to mid-1998, the large scale configuration of the corona consists of dark coronal holes over the north and south heliographic poles and quiescent streamers at the equator. Toward solar maximum, there is a striking difference in the appearance of the corona. The streamers fill more of the coronal volume, and the extended corona and disk become considerably brighter.
One way of tracking the solar activity is by observing sunspots. Sunspots are relatively cool areas that appear on the face of the Sun. During solar minimum there are only a few sunspots, and during solar maximum there are about 20 times more spots. Every 11 years the Sun undergoes a period of activity called solar maximum followed by a quiet period called solar minimum. The sunspot number is calculated by first counting the number of sunspot groups and then the number of individual sunspots. The ``sunspot number'' is then given by the sum of the number of individual sunspots and ten times the number of groups. Although sunspots themselves produce only minor effects on solar emissions, the magnetic activity that accompanies the sunspots can produce dramatic changes in the ultraviolet and soft X-ray emission levels. These changes over the solar cycle have important consequences for the Earth's magnetosphere and upper atmosphere.
Picture Credit: Smithsonian Astrophysical Observatory; ESA & NASA
Image processing/comments: Mari Paz Miralles ([email protected]), Alexander Panasyuk, Raid Suleiman, Steven Cranmer and John Kohl.
Instrument/observatories: UVCS/SOHO (Ultraviolet Coronagraph Spectrometer); EIT/SOHO (Extreme ultraviolet Imaging Telescope); NSO/SP (National Solar Observatory/Sacramento Peak); MSFC (Marshall Space Flight Center) Solar Physics Branch.
• European Site • US Site
Feedback & Comments: SOHO Webmaster
Last modification:
SOHO is a project of international cooperation between
|
global_05_local_4_shard_00000656_processed.jsonl/85294
|
Take the 2-minute tour ×
I'm recording my own blues number this morning on someone elses album. They will be giving me credit but what's the easiest way for me to publish this and protect my copyright?
share|improve this question
migrated from avp.stackexchange.com Jan 24 at 12:01
great question. am curious about this myself – Travis Dtfsu Crum Oct 1 '12 at 19:49
What do you mean by 'publish'? Do you mean "have a physical copy"?, or "distribute physical copies", or "distribute electronic copies?" – JoshP Oct 5 '12 at 13:28
All of the above... – IrishChieftain Oct 5 '12 at 13:43
1 Answer 1
up vote 4 down vote accepted
The usual way, I suppose.
All you need to do to establish a legal copyright is affix a copyright notice on your recording or lyrics. The term "affix" simply means you write your name and the year the song was written next to the copyright symbol.
The format looks like this: © YOUR NAME 2011
That's all there is to it. In fact, it's not even necessary to include a copyright notice on subsequent recordings. The writer still has copyright protection.
Because copyright law provides clear protections at the time of creation, experienced songwriters often wait to file formal copyrights (with the U.S. Office of Copyrights) until their songs are polished, rewritten, completed and ready to be published or released commercially.
When a song is completed and ready to show, it's also ready to be registered with the U.S. Copyright Office.
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/85301
|
Spaces Learn
Covers Contests Office Pools Picks
Create or Join Covers Contests Office Pools and closely track your progress in all of your active pools on your Covers Space page. The Covers Contests Office Pools brick will display your pick records for all active Pool contests you are participating in.
The Office Pools brick will only display on your Covers Space page when you participating in active contests - otherwise it will not display. You can drag and drop the brick in various locations on your Space page, however you do not have the option of removing the brick when it is active.
|
global_05_local_4_shard_00000656_processed.jsonl/85303
|
Take the 2-minute tour ×
There are many times I run into conversations like this:
Waitress: Would you like some water?
Me: No thanks.
She walks away for a second, then comes back
Me: Actually, could I get a cup of water please?
Friend: Do you need a hand with all that heavy luggage?
Me: No. thinking for a few seconds... Well, actually, would you mind carrying this bag? It is pretty heavy.
It seems like "la verdad es que" is a mouthful. Is there a short phrase common for situations like these?
share|improve this question
In a conversational and not formal situation, you could just use "O mejor sí". – belisarius Nov 24 '11 at 17:27
3 Answers 3
up vote 9 down vote accepted
It is true what Xabier has said about Pensándolo mejor. But there is another alternative that is widely used as well.
As per comments and thanks to CesarGon, be aware that this form is not grammatically correct and that pensándolo mejor should be used instead. De hecho is used only colloquially.
For instance:
De hecho, ¿podría tomar un vaso de agua, por favor?
No, ... ... [...] de hecho ¿te importaría ayudarme a llevar esta maleta? Es muy pesada.
share|improve this answer
De hecho is also a translation of in fact and indeed – David Lay Nov 24 '11 at 13:06
@DavidLay Exactly, depending on context de hecho can act effectively as both or as the one needed. Powerful words! :-) – Joze Nov 24 '11 at 13:42
+1 this is what native spanish speaker would say. – isJustMe Nov 24 '11 at 14:30
I learned de hecho just four years ago and can't comprehend how I was able to make myself understood for so long without it! – hippietrail Nov 27 '11 at 8:31
-1 "De hecho" is often used in this context, but it is wrong. "De hecho" means "in fact" or "indeed", but not "actually" as in the OP. – CesarGon Jan 26 '12 at 20:14
"Pensándolo mejor" is the expression I would use on situations like these.
• "Pensándolo mejor, ¿podría tomar un vaso de agua, por favor?"
• "No... Bueno, pensándolo mejor, ¿te importaría llevarme esta maleta?"
Admitted, it is a mouthful as well.
share|improve this answer
Initially we were taught some cognates, like anything ending in '-lly' became '-mente' - so in this case, 'actualamente'. However it turns out this is a false cognate - it actually (excuse pun) means 'presently/currently'.
The preferred translation is 'en realidad' as in 'in reality'.
share|improve this answer
True, but I think that, given the situations of the original question, pensándolo mejor is the best choice. But in general, en realidad should work too. – Ignacio Contreras Pinilla Nov 24 '11 at 11:06
Actually English -ly and Spanish -mente are not cognates. Cognates means they have a common ancestor but the Spanish suffix comes from Latin and the English from Germanic - no relation. Spanish -idad and English -ity are an example of actual cognates. -ly and -mente on the other hand are false friends rather than false cognates. – hippietrail Nov 27 '11 at 8:38
The description from the false cognates page: "False cognates are pairs of words in the same or different languages that are similar in form and meaning but have different roots. That is, they appear to be, or are sometimes considered, cognates, when in fact they are not." Oddly this seems to be almost the same wording as false friends! – Mark Mayo Nov 27 '11 at 9:32
Another less as to why Wikipedia alone is not such a great reference - but for now it's all I have... unless somebody would like to ask a question on English Language & Usage (-; – hippietrail Dec 2 '11 at 11:19
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/85307
|
1. Parenting
Discuss in my forum
Book Review: Beyond Behavior Management
About.com Rating 2 Star Rating
Book Review: Beyond Behavior Management
Cover image courtesy of PriceGrabber
The Bottom Line
By Jenna Bilmes; 258 pages. Subtitle: The Six Life Skills Children Need to Thrive in Today's World
This is a book written for early childhood teachers, and not intended as anything but. While teacher books are often of interest and service to parents, too, this one is pretty well tied to the classroom. It's interesting, hopeful reading, but without a lot of practical application for parents. The rating's purely a parent's perspective on a non-parenting book.
About the Guide Rating
• Upbeat and positive approach toward all types of children
• Appropriate for teachers with special-needs kids in their classrooms
• Focuses on behavior skills as part of larger life skills
• Lots of concrete examples and dialogs
• Astonishing variety of children's names used in examples
• Teacher strategies not easily applied to parenting situations
• Kids with serious behavior problems may not respond to these strategies
• Not much help for kids beyond kindergarten
• Parents and teachers who've struggled may find text a little idealistic
• Some of the names are so unusual as to be distracting
• Chapter 1: The Six Life Skills
• Chapter 2: Effective Teaching Strategies
• Chapter 3: Attachment
• Chapter 4: Affiliation
• Chapter 5: Self-Regulation
• Chapter 6: Initiative
• Chapter 7: Problem Solving and Conflict Resolution
• Chapter 8: Respect
Guide Review - Book Review: Beyond Behavior Management
I got all excited when I saw this title at a bookstore while on vacation. I grabbed it in a hurry without looking at it too hard, convinced I would love it because I'm all about the behavior management. And indeed, you couldn't want a more upbeat and encouraging view of handling badly behaved kids in ways that improve their self-esteem and relatedness than this one. Unfortunately for parents, the book is intended for early childhood teachers and addresses classroom situations exclusively, making it a wishful read but not a really useful one for moms and dads. That's not the book's fault -- it was never intended to be judged by that criteria -- but it's still a bit of a disappointment for this harried reader.
Working from experience with young children, Bilmes presents strategies for addressing problem behaviors while strengthening six life skills: attachment; affiliation; self-regulation; initiative; problem solving and conflict resolution; and respect. There's a welcome lack of blame and shame, and very specific dialogs to demonstrate the way teachers can help kids improve their ways of reacting and relating. If some of it seems a little too good to be true, well, it's a nice dream.
Creative parents can pick up good ideas from anything, and there are some fun activities here that might be applicable to home use. In the end, though, this is best for passing on to your child's pre-K or K teacher, or combing for suggestions to write up and send in.
Discuss this book.
©2014 About.com. All rights reserved.
|
global_05_local_4_shard_00000656_processed.jsonl/85317
|
Take the 2-minute tour ×
I currently participate on the decision to pick a unit testing framework for a bigger long term project. NUnit, being an ubiquitous unit testing tool, would make it a natural choice for me, but not so long ago I did read some unit testing text shortly mentioning that "NUnit is a dead project". The wording was not exactly like this but this was the impression it gave me and now this is bugging me.
I can't remember where did I read this to check what it was saying exactly or if it had some credit. On NUnit web site I still see beta releases coming out, but I can't get rid of this unsure feeling now.
So, is NUnit a viable choice for a starting long term project these days?
share|improve this question
what language and development is going to be used ? Is it Java, Ruby , .Net ? if you were doing a Ruby on Rails project then no, NUnit would not be a good choice... – Phil Kirkham Jan 8 '12 at 19:53
@PhilK it's for a .NET project. I didn't mention it as I thought NUnit is for .NET only. – famousgarkin Jan 8 '12 at 20:11
2 Answers 2
up vote 3 down vote accepted
Is NUnit a viable choice for a starting long term project these days?
Yes because it is open source and even if there is no more further development for it you can use it and recomile it for a newer runtime.
You can compare the maintanace situation with the log4net project that had very few updates in the last 5 years but is still the state of the art.
share|improve this answer
I’ve also used to think that NUnit is an old tool and tried to find more “modern” tool for unit tests. But I have found out that NUnit is that modern tool. In compare to MSTest, NUnit is more extended with testing features. NUnit provides better assert error logging. For instance, when you are using CollectionAssert.Contains from MSTest it will throw error “CollectionAssert.Contains failed.” And that’s all. In case of this assert error, NUnit prints the entire collection contents and the element that was not found. Such good error messages save a lot of time during the failure investigation.
And you always can use TestDriven.NET or/and Resharper for better integration between Visual Studio and NUnit
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/85322
|
Take the 2-minute tour ×
Does urllib2 in Python 2.6.1 support proxy via https?
I've found the following at http://www.voidspace.org.uk/python/articles/urllib2.shtml:
Currently urllib2 does not support fetching of https locations through a proxy. This can be a problem.
I'm trying automate login in to web site and downloading document, I have valid username/password.
proxy_info = {
'host':"axxx", # commented out the real data
'port':"1234" # commented out the real data
proxy_handler = urllib2.ProxyHandler(
{"http" : "http://%(host)s:%(port)s" % proxy_info})
opener = urllib2.build_opener(proxy_handler,
fullurl = 'https://correct.url.to.login.page.com/user=a&pswd=b' # example
req1 = urllib2.Request(url=fullurl, headers=headers)
response = urllib2.urlopen(req1)
I've had it working for similar pages but not using HTTPS and I suspect it does not get through proxy - it just gets stuck in the same way as when I did not specify proxy. I need to go out through proxy.
I need to authenticate but not using basic authentication, will urllib2 figure out authentication when going via https site (I supply username/password to site via url)?
EDIT: Nope, I tested with
proxies = {
"https" : "https://%(host)s:%(port)s" % proxy_info
proxy_handler = urllib2.ProxyHandler(proxies)
And I get error:
urllib2.URLError: urlopen error [Errno 8] _ssl.c:480: EOF occurred in violation of protocol
share|improve this question
3 Answers 3
up vote 3 down vote accepted
I'm not sure Michael Foord's article, that you quote, is updated to Python 2.6.1 -- why not give it a try? Instead of telling ProxyHandler that the proxy is only good for http, as you're doing now, register it for https, too (of course you should format it into a variable just once before you call ProxyHandler and just repeatedly use that variable in the dict): that may or may not work, but, you're not even trying, and that's sure not to work!-)
share|improve this answer
Aaah, got it :) let me try (btw I've figured out what I needed with curl but still would be nice to have it running in python) – stefanB Jun 23 '09 at 3:04
Unfortunately adding the proxy as the 'https' key in the dict you pass to ProxyHandler won't fix the problem as AFAIK there's no support for the CONNECT HTTP method. Using PyCurl is the easiest workaround, but for distributing code the lack of Windows support in PyCurl (or at least ease of installation) can be a big hurdle. – Tom Sep 22 '10 at 2:38
Fixed in Python 2.6.3 and several other branches:
share|improve this answer
+1 thanks for the info – stefanB Oct 7 '10 at 5:02
Incase anyone else have this issue in the future I'd like to point out that it does support https proxying now, make sure the proxy supports it too or you risk running into a bug that puts the python library into an infinite loop (this happened to me).
See the unittest in the python source that is testing https proxying support for further information: http://svn.python.org/view/python/branches/release26-maint/Lib/test/test_urllib2.py?r1=74203&r2=74202&pathrev=74203
share|improve this answer
+1 thanks for the info – stefanB Dec 9 '09 at 3:48
+1 for linking to a unittest in the python source – Sam Oct 27 '13 at 19:34
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/85323
|
Take the 2-minute tour ×
I'm hoping someone can help me with what I thought would be a relatively straight forward problem.
I am setting a fadeout animation in code using a DoubleAnimation object. It fades out an image, and then fires off the Completed event when it's done.
I would like to get the name of the control that the fadeout animation was applied to from within the event handler, but I can't find a way.
Any help appreciated. Thanks.
DispatcherTimer timer = new DispatcherTimer();
public MainWindow()
image1.Visibility = System.Windows.Visibility.Visible;
image2.Visibility = System.Windows.Visibility.Collapsed;
timer.Interval = TimeSpan.FromSeconds(2);
timer.Tick += new EventHandler(timer_Tick);
void FadeOut(UIElement element)
DoubleAnimation FadeOut = new DoubleAnimation(1, 0, new Duration(TimeSpan.FromSeconds(0.5)));
FadeOut.Completed += new EventHandler(FadeOut_Completed);
element.BeginAnimation(OpacityProperty, FadeOut);
void FadeOut_Completed(object sender, EventArgs e)
// How to find out which control was targeted?
void timer_Tick(object sender, EventArgs e)
if (image1.Visibility == System.Windows.Visibility.Visible)
//image1.Visibility = System.Windows.Visibility.Collapsed;
//image2.Visibility = System.Windows.Visibility.Visible;
share|improve this question
sender? The target for this animation is not explicitly set, so if it works it's definitely sender – EvAlex Apr 30 '12 at 7:12
How do I explicitly set the target? PS. Updated the code to include the timer tick event. – Tas Apr 30 '12 at 11:25
I was somewhat wrong, but found a solution. See my answer – EvAlex Apr 30 '12 at 12:40
1 Answer 1
up vote 3 down vote accepted
The following code gives you the target of completed animation. Place it in FadeOut_Completed() handler:
DependencyObject target = Storyboard.GetTarget(((sender as AnimationClock).Timeline as AnimationTimeline))
However this will only work if animation target object is specified. To do it add the following to FadeOut() method:
Storyboard.SetTarget(FadeOut, element);
share|improve this answer
Thank you very much! – Tas May 1 '12 at 23:36
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/85324
|
Take the 2-minute tour ×
I'm using Zend_Gdata, as described in the YouTube developer API docs, to try and simply pull in the latest two videos, with thumbnails. Unfortunately, it is incredibly slow and delays loading of the rest of the page, so I have had to disable this code and put in static HTML. I'm thinking that perhaps it is querying too much data, but I don't see a limit option for getuserUploads. The only other solution I can think of is having it do an AJAX call after the page loads, but I still need it to be faster.
If it would be faster to use the XML, can someone point me to some working code to grab the title, url, and thumbnail? The code I found and tried first (using a Simple XML function) did not work at all.
Here is the code used that is slow:
require_once 'Zend/Loader.php';
function printVideoFeed($videoFeed, $limit)
$count = 1;
foreach ($videoFeed as $videoEntry) {
if ($count > $limit) { break; }
echo "<li>";
echo "</li>\n";
function getAndPrintUserUploads($userName)
//Zend_Gdata_YouTube($httpClient, $applicationId, $clientId, $developerKey);
printVideoFeed( $yt->getuserUploads($userName), 2 );
function printVideoEntry($videoEntry)
// get all thumbnails. Use the 2nd one (index of 1 in array) that is 180px wide
$videoThumbnails = $videoEntry->getVideoThumbnails(); ?>
<div class="theimg">
<a href="<?php echo $videoEntry->getVideoWatchPageUrl(); ?>" target="_blank">
<img src="<?php echo $videoThumbnails[1]['url']; ?>" alt="" width="160" />
<span class="date">Video</span>
<h4><a href="<?php echo $videoEntry->getVideoWatchPageUrl(); ?>" target="_blank"><?php echo $videoEntry->getVideoTitle(); ?></a></h4>
share|improve this question
If you don't have uploads every 2 seconds you could cache the data and fetch them only once a day. – prehfeldt May 24 '12 at 15:17
1 Answer 1
At first glance you're not using the full Zend MVC model, some things you could use to improve performance is to send methods that are handling HTML for the VIEW and use the RSS feeds from youtube to make this request.
share|improve this answer
The site is not in the Zend framework, if that is what you are referring to. It is using Zend_Gdata as described here: developers.google.com/youtube/2.0/developers_guide_php If you know of any working code that uses the XML/RSS for the latest vids, let me know. I was assuming that would be a lot faster. The code I found through Google and StackOverflow wasn't working. – jwinn May 25 '12 at 15:44
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/85325
|
Take the 2-minute tour ×
I have written test code as bellow:
Entities db = new Entities();
var place = new Place
Id = Guid.NewGuid(),
Name = "test",
Address = "address"
var cachedPlace = db.Places.Where(x => x.Id == place.Id).FirstOrDefault(); \\ null
I expected dbset will return the added entity. But it gives me object only after changes were saved to the real DB.
share|improve this question
1 Answer 1
up vote 3 down vote accepted
If you want to access the unsaved query, then you use the Local property of the DbSet.
The reason it doesn't work the way you want is that it must also support autonumbered identities, and that will mean the ID is 0. If you insert multiple records, you would have multiple objects with the same 0 ID. EF won't know what the real ID is until after it's been saved.
share|improve this answer
Thanks Mystere Man! – Jekas Nov 15 '12 at 9:42
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/85326
|
Take the 2-minute tour ×
I have to code a design for MailChimp email template, I want to code it in Dreamweaver and then import to MailChimp. I know the email template standards very well and easily code for cross email clients; the problem is that I don't find good resources or tutorials showing how to code email in template as per MailChimp API, and then import to MailChimp.
Please can you mention some handful resources or tutorial, links or books to code MailChimp templates from scratch in Dreamweaver?
share|improve this question
2 Answers 2
up vote 2 down vote accepted
MailChimp's own tutorial is pretty good - http://kb.mailchimp.com/article/how-do-i-create-my-own-custom-template
You also will need to keep in mind their template language - http://kb.mailchimp.com/article/getting-started-with-mailchimps-template-language
share|improve this answer
If you want to code on dreaweaver then this tutorials will helps you alot http://www.whatcreative.co.uk/blog/email-marketing/building-awesome-mailchimp-templates/
Otherwise mailchimp tutorials is better http://mailchimp.com/resources/guides/mailchimp-for-designers/html/
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/85327
|
Take the 2-minute tour ×
I have a text Box and a Value poplulated in it when page loads. Now If user chanegs any thing in text box, then I want to get the Changed Value(New Value) and Old Value but when I do ELEMENT.value then its giving only changed Value
any Suggestions to get old value?
below is my code
<script type="text/javascript">
function onChangeTest(changeVal) {
alert("Value is " + changeVal.value);
<input type="text" id="test" value ="ABS" onchange="onChangeTest(this)">
Thanks in Advance
share|improve this question
6 Answers 6
up vote 35 down vote accepted
element.defaultValue will give you the original value.
Please note that this only works on the initial value.
If you are needing this to persist the "old" value every time it changes, an expando property or similar method will meet your needs
share|improve this answer
This Worked Very well, Thanks George – CFUser Dec 15 '09 at 20:28
just a note. I discovered on firefox element.getAttribute("value") also seems to reveal the original... I don't know enough to tell if this is a cross-browser/standard thing. – cheshirekow Oct 15 '10 at 19:32
element.defaultValue returns the value set in the <input> tag. If this value has changed by editing or some other JavaScript, element,defaultValue will not return this (new) old value. – SabreWolfy Jan 23 '12 at 12:59
Thanks SabreWolfy, spotted your comment and solved my problem. Had to change the value multiple times so doing the above was no good. – Darren Jul 13 '12 at 15:11
You'll need to store the old value manually. You could store it a lot of different ways. You could use a javascript object to store values for each textbox, or you could use a hidden field (I wouldn't recommend it - too html heavy), or you could use an expando property on the textbox itself, like this:
<input type="text" onfocus="this.oldvalue = this.value;" onchange="onChangeTest(this);this.oldvalue = this.value;" />
Then your javascript function to handle the change looks like this:
<script type="text/javascript">
function onChangeTest(textbox) {
alert("Value is " + textbox.value + "\n" + "Old Value is " + textbox.oldvalue);
share|improve this answer
I can understand you voting an answer down if it doesn't work, or if its an inappropriate answer. I provided an answer that solved the user's need. This code was tested. It is complete. And it does something the accepted answer doesn't (you can always look at the defaultValue property, but what if the user changes the value more than once?). – Gabriel McAdams Dec 16 '09 at 18:23
The change that was suggested here is incorrect. First of all, once an alert occurs, the field has lost focus. Any change after that would occur after the onfocus event was fired. Second, the input field's onchange event doesn't fire until its lost focus. – Gabriel McAdams Mar 25 '11 at 17:39
This works better if you're manipulating the value multiple times. The answer above (element.defaultValue) only works once. Up this one :) – Darren Jul 13 '12 at 15:10
Simple and effective. Wish I could give you more than +1. – Ian Kemp Aug 13 '13 at 14:40
@GrijeshChauhan: No. We're setting the old value on focus. After that, after every change, we set it again. – Gabriel McAdams Jan 30 at 16:52
I would suggest:
function onChange(field){
//we have available old value here;
share|improve this answer
A dirty trick I somtimes use, is hiding variables in the 'name' attribute (that I normally don't use for other purposes):
select onFocus=(this.name=this.value) onChange=someFunction(this.name,this.value)><option...
Somewhat unexpectedly, both the old and the new value is then submitted to someFunction(oldValue,newValue)
share|improve this answer
Yes that is dirty! – Alan Macdonald Jul 18 '13 at 12:47
Maybe you can store the previous value of the textbox into a hidden textbox. Then you can get the first value from hidden and the last value from textbox itself. An alternative related to this, at onfocus event of your textbox set the value of your textbox to an hidden field and at onchange event read the previous value.
share|improve this answer
But, If we have some 100+ text boxes, in this case we need to have 100+ hidden variables, So is there any other way we can get old values? – CFUser Dec 15 '09 at 20:06
Maybe you can try to save the old value with the "onfocus" event to afterwards compare it with the new value with the "onchange" event.
share|improve this answer
Your Answer
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.