id
stringlengths
50
55
text
stringlengths
54
694k
global_05_local_4_shard_00000656_processed.jsonl/107150
Mathematical Proceedings of the Cambridge Philosophical Society Research Article The complement of a codimension-k immersion Michael D. Hirscha1 a1 University of California, Berkeley, CA 94720, U.S.A. In [1] Marc Feighn proves the following result: a proper, C2, codimension-1 immersion in a manifold with no first homology separates the ambient space. In [4] Michelangelo Vaccaro proves a related result: the C1-immersed image of a compact n-manifold with image a (curved) polyhedron has non-zero Hn with ℤ2 coefficients. (In Vaccaro's terminology f(M) is a curved polyhedron if f is smooth and f(M) is the (non-PL) embedded image of a simplicial complex.) Using ideas similar to Feighn's we prove here the following result. (Received April 05 1989) (Revised May 17 1989)
global_05_local_4_shard_00000656_processed.jsonl/107160
Take the 2-minute tour × Is there anything wrong with getting a haircut on Motzei Shabbos (Saturday night)? share|improve this question 2 Answers 2 I believe the reason it is said that its best not to get a haircut on Motzei Shabbos is because of the following: it is a nice thing to get a haircut on Friday to honor the approaching shabbos. If you wait till Motzei shabbos, it is embarrasing to shabbos because you didn't do it before and you are doing it right after. Therefore, it is probably better to wait until Sunday. This would probably apply to shaving as well. share|improve this answer This explanation is given here –  Michoel Oct 14 '12 at 0:31 Yes, you are allowed. Jewish people are meant to look religious and tznious, so it is okay to get haircuts night and day. share|improve this answer Even on Shabbos? –  Double AA Oct 14 '12 at 0:31 @double aa, maybe he means Sunday? –  Seth J Oct 14 '12 at 1:09 @SethJ Maybe he means on Tuesday too. –  Double AA Oct 14 '12 at 1:12 Rabbi Eliezer Hertz, welcome to Mi Yodeya! You could make your answer much more valuable by backing it up with a source and specifying exactly what you mean, per the above comments. –  Isaac Moses Oct 14 '12 at 1:30 Your Answer
global_05_local_4_shard_00000656_processed.jsonl/107177
winging it recipes These are two of my favorite winging it recipes (which is what I did tonight). I make a huge batch of brown rice and use it over 2 meals and a lunch. I love to throw in what ever looks good at the market. To cook everything other than the rice. I heat a little oil in a big skillet and cook on high (onions first for a minute and then add in the rest) until the edges are a little golden brown. Then I add some Braggs (a healthy version of soy sauce). Some of my favorite things to add are: onion, fresh ginger, tofu,yellow squash, zucchini and bean sprouts. My family loves smoothies (a lot more than my stir fry). Tonight we used peaches,banana, pineapple, watermelon, strawberries and lime. Kristi said... I know my kids wouldn't go for a stirfry like that- I make it with broccoli, cauliflower, carrots and celery, and some chicken. yum. but smoothies- yes please! Prudence said... I love doing this with brown rice too! I usually put in red onions, red peppers, broccoli and stir fry sauce, I've used braggs before too, must get that again.. Sally said... The smoothie sounds amazing - so tasty and healthy too. I'm already looking forward to one in the morning.
global_05_local_4_shard_00000656_processed.jsonl/107180
« Movies WEIRDO FLICKS: 'Overdrawn at the Memory Bank' by Eli Kroes 'Overdrawn at the Memory Bank' - 1985, Directed by Douglas Williams This movie is apparently part of the 'American Playhouse' series; a PBS program featuring made-for-TV movies that aired from the mid-80's to the early 90's. Although some of their releases are 'classics' of the TV movie genre (if there are such a thing), this is NOT one of them. That's not to say it wasn't enjoyable, it is just extremely silly. For one thing, it definitely has that 'TV movie' look...which I would define as being CLOSE to a 'real' movie, but not quite there. It was clearly filmed in some TV studio, and the acting is very hammy. But, being a sucker for anything vaguely cyberpunk, I gave it a shot anyways. So, it's your classic dystopian story...a guy decides to fight against a totalitarian system after being stuck in a useless job. It even borrows the idea of a person becoming a purely computerized personality, and wreaking havoc from within a computer system. What was interesting, however, is that the basic plot is that a computer technician gets in trouble for watching movies ('cinemas') while he's supposed to be working, which is an eerily current scenario considering the release date of the film. In this version of the future, though, movies have been banned for being counterproductive. And, instead of being fired, the man (Aram Fingal) is sentenced to 'mandatory rehabilitation' which involves having his personality transferred digitally into an animal's body(!). This struck me as quite an interesting concept for a low-rent TV movie, and led to a whole lot of stock footage of gorillas. Predictably, Novicorp (the all-seeing, all-everything company where Fingal 'works') loses his body, and he gets trapped in their computer system. He has to be recovered before the 'memory cube' deteriorates, losing his personality for good. The one qualm I have with the movie is that it definitely overdoes references to Casablanca. I guess it ties in with the Aram getting in trouble for watching movies, but nonetheless, one reference would've been fine. Regardless, this is inoffensive 80's sci fi fun with a few genuinely strange scenes. It's definitely silly, but without being a total waste of time. ...and you can watch it NOW: VHS photo by Toby Hudson.
global_05_local_4_shard_00000656_processed.jsonl/107198
Wednesday, June 1, 2011 Nuclear Power & National Identity: Irrational Germany? There is an international debate going on about Germany's nuclear phase out. Here is an article from Daniel Johnson in The Telegraph "Why Germany said no to nuclear power". In a nutshell, this commentary presents all stereotypes ever held about Germany. The commentator mixes them up, adds some (interesting) details about Germany's nuclear history, and presents the phase out as an indigestable, irrational German stew. That's how the Krauts are! It reminded me spontaneously of soccer matches between Germany and England; in the media, sport commentators start with presenting the teams and end in talking about national stereotypes, about war and peace, about life and death. This article is a great example for the difficulties we have in debating our energy futures. Like sports commentators, we switch effortlessly from the nuclear cooling pond to the pitch and back, insisting that it's all rational, scientific and economic. Here just one example: a paragraph that presents well the general tone of the comment. It could be from an article about soccer, about history, about economy - it fits everywhere: Germany is one of the most admirable countries in the world, but Germans, like other nationalities, are not immune to irrational attitudes. Decent Germans have reason to worry about the fact that, according to a recent poll, nearly half of their compatriots express anti-Semitic opinions, such as that Israel is conducting a war of extermination against Palestinians, or that "Jews try to take advantage of having been victims during the Nazi era". Just Krauts. And the link to the nuclear phase out? No problem, no bridge necessary, here we go: But Germans have no reason to fear nuclear power. Mrs Merkel's appeasement of nuclear hysteria is disturbing far beyond Germany's borders because it represents a capitulation to irrationalism by the leader of a nation that once led the world in science and technology. The land of Leibniz and Humboldt, of Goethe and Gauss, is now indulging the fantasies of cynical scaremongers. Well, I am sure this comes as no surprise to the British readers. They know who we are. Why care?  Because there is an embarrassing problem: So should it matter to us if Germany chooses to impose unnecessary costs on its own industrial and domestic energy consumption? Germany is the largest economy in Europe and the European Union has a habit of imposing German prejudices on the rest of its member states. Enemies of nuclear energy will be emboldened to pressurise other governments, including our own, to follow the German lead. A well known problem in England. Gary Lineker, the British advance player, once put it like this: It's just a small step from the nuclear cooling pond to the pitch... (Thanks, Silke, for sending me the link to this article!) Anonymous said... As a Brit, I'd advise against reading an article in the DT as an "international debate", especially if it's only in the online version. The Economist is a much better read. ;) Hannah said... The Economist is a much better read than most newspapers. ;o) Werner Krauss said... More people read the Daily Telegraph instead of the Economist :-) eduardo said... articles from the Daily Telegraph should always be taken with a big grain of salt, but not everything is wrong in this article. I think one of the big historical errors of the 'left', say the socialist or communist movements of the 19th century, was to assume that we could shoehorn all societies into the very same model. It seems now clear that there exists a substrate of national values or cultural values or historical values, however you may choose to denote them, that makes societies different. Germany is clearly different from Spain, although a single German in isolation may be not very different from a single Spaniard. Every society is in some sense special, and the German is no exception. Spain will never have an influential Green Party, and Germany will never attain the levels of the Spanish political corruption. Yet, Germans do not feel as happy as Spaniards, and the German Angst is a characteristic which, I think, becomes very soon clear to any foreign observer exposed to German society. In some situations it makes for a more stable society compared to other countries. But it can also be misused by shrewd elites to tow the people towards other hidden goals. Note that I have not used the word 'better' or 'worse' in this post, just the word 'different' and 'special' Werner Krauss said... to put this into context of our debate: each country has a cultural history of its own. Including technological history. My argument is that technology is cultural, too. Not only socialism and communism failed when disrespecting culture; the same is true for every technological fantasy which is not rooted in or compatible with a cultural tradition / everyday practices / political economy etc As much as I learned from the news about Fukushima: in a high technology country like Japan, the culture of organization is one of hierarchy and obedience. In the case of a nuclear emergency, this does not fit that well, obviously. Or would you feel safe as a citizen in such a situation when administration hides information? The best technological solution is not in every case the best practical solution. History is full of examples when the well-intended implementation of technologies failed. Science and technology are deeply ingrained in our cultures; they are not the opposite to culture. Fossil fuels, radioactivity, the sun and the wind fuel our cultures. There is something literally true about the saying that oil runs through our veins. Even in the veins of scientists and energy experts. It is only part of our official culture to make people believe that science is above or beyond culture and speaks innocently "truth" to power. In reality, it's much more complicated, as most people know, hopefully. It doesn't matter whether the Daily Telegraph or Die Zeit is right; what matters is that we discuss the acceptance of nuclear (and every other form of ) energy in cultural terms - even though we pretend to do so in purely technical or scientific terms. Just consider the role "angst" plays in the international discussion of the German nuclear phase out. Is "angst" an "objective" fact or is it just an invention from the Hollywood film industry? Are Spaniards happy because of the Mediterranean climate? Are they happy at all? Or does it only make sense in the context of mutual stereotyping? In the end, the interesting point is: when does a seemingly technological argument suddenly turn into a cultural one? When does somebody suddenly use "angst" in order to close a discussion about energy? eduardo said... it seems that we actually agree. To say no or yes to nuclear energy cannot be solely based on science because there are risks and unknowns that have to be weighted against another risks and unknowns, from instance from climate change. Each nation would answer differently to this question. It does not however mean that Merkel's decision is the optimal that could be taken now. For instance, I do not understand why nuclear energy has to be phased out. Sweden adopted another solution along the same lines, which was to freeze the number of reactors that can be active at any given time. Merkel could proposed to reduce the number of reactors depending on the progress in alternative energies. Why should a nation clip its options ? If Merkel considers that nuclear energy is so dangerous so as to phase it out in Germany , she should also commit Germany to never buy any nuclear energy from abroad, say France, Netherlands and the Tchek Republic. Anonymous said... 1) On the first comments, the Economist, nr 1 (Anon. (not my (aka namenlos) comment)) and 2 (Hannah): Out of curiosity/On the side: Does someone know if an editor from the "globocratic"(?) Economist will attend the "Bilderberg Meeting" this year again (June 9-12; St. Moritz, Swiss)? Almost like constant participants of that meetings of which some come out of the MSM, e.g. like from (the also f.i. at Klimazwiebel repeatedly adulated) Die Zeit? I'm asking since I wonder if there are more good reasons that "we" hear or read only *if any* seldom sth about this *org* (and if, then rather in vague statements (alike)): "The 'private meetings'[...] were credited for organizing and 'helping to lay the groundwork for creating'[...] (f.i. 'informal'[...] or ''trilaterale''[...] etc) 'networks_of'[...]/'networks_for'[...] the ('partly'[...]) 'so-called power elites'[...]." [If even priv. communication are suggested to be helpful (esp. WRT the 'Euro'[...] or/and even the 'EU'[...] etc) (or even if e.g. a 'malleable Chatham House Rule'[...] has been applied):] What *if any* can be "seen" more or less rationally as worth learning from that "chats" (esp. WRT 'trust', or WRT (private) press/media, or WRT 'successful'[...] 'participants of that meetings'[...], or WRT possible 'beneficiary parties'[...], or WRT 'tax monies'[...] ...)?" 2a) To the "nations" and on comments nr 4 (eduardo) and 5 (Werner Krauß). Also questions for all (and possible especially for Hans von Storch or Nico Stehr (who both/together have published earlier a paper that included some of Herder's views).): Interesting point: If you, esp. eduardo or/and Werner, did not know it yet or if you want to know: Your fairly ..err.. "relativistic"(!?) views on "nations" ("countries") or "cultures" are, among other things, remarkable similar to those famous and surely quite "painstaking" arguments that belong also to many if not to "all" "Herderians" (and, as a matter of fact, to "their" basic understanding) aren't they? Some wonder whether these so-called Herdrites are in some "groups" more often by majorities wrongly labeled: "Anti-Enlightenment" or/and even sometimes into the direction of: "For example Herderians are (precisely because of remarks like those Klimazwiebel comments from above on nations and cultures) nearly always or at least in the majority suitable examples of advocats of "'the' [..] 'Tea Party Movement'"". What do you think? 2b) One "opposite to culture" (see above) can be seen in nature, or not? Anonymous said... Minor "typo" in comment nr 7: Instead of "Herdrites" the "group" should be spelled "Herderites". Sam Schulman said... Generalizations about national character are of course rather dubious - and in any case, before repeating any such generalizations, we all ought to remember that Germans are very sensitive! Hannah said... Namenlos, I read and re-read your first question (point?) and I am afraid that I simply do not understand it. In all fairness this may very well be because I am currently a bit lacking in sleep :o) could you rephrase it please? Anonymous said... Hannah, I hope you slept well. Unsuccessfully, I get the indefinite feeling that obviously something of my ("on the side" (s.a.):) subtopic "1)" in comment #7 (above) couldn't have been well-placed (here?/enough?). But at the very least, I'm even quite confident you and I can agree on most "points" - also on our points above and that we can “understand“ each other, especially if we will try harder to become (even) more precise. To your question (#10): Yes, fortunately I “could [..] rephrase“ that (That you are “a bit lacking in sleep“ is to me actual, in all fairness, not only your most congenial but also your most comprehensible reason for your comment(s (above))/please.): What, if any, can be seen more or less rationally as worth learning from this [and our somewhat "pseudo-critic"] chattings that contain little, if any, compelling evidences? I could - or maybe should - have avoided at all costs your (in any way possible) imprecise question, or, for instance – theoretically - I could avoid it also/too, indirectly, by answering with "rhetorical questions" *[...]*, but I wouldn't've done a thing like that in this situation. Likewise I can furthermore oblige your please in an easy way: No (rephrasing of my) "question"! Coz I'm even quite sure most people will agree that most texts are a much better read when they (i.e. these texts) use "reasonable endeavours" to "rationalize" and stuff like that. As it is known in common parlance, "reasonable" texts are likely more convincing/fruitful... than assertions/questions without arguments/substance. Ordinarily, all texts - not only yours - are sooner or later improvable. This applies probably to all of my and - as far as I know - other people's "texts" (and thus it applies unanimously not solely or especially to written texts (such as those "newspaper 'criticisms'" or such as single and one-sided claims in blog-comments and -questions etc from above)).
global_05_local_4_shard_00000656_processed.jsonl/107204
Knitter's Review Forums   The online community for readers of Knitter's Review.   This week: A strong and discreet knot for knitting    > Have you subscribed yet? Knitter's Review Forums  All Forums  Felting Talk  Felting Books and Patterns  shibori wreath or pointsettia wreath To register, click here. Registration is FREE! Format Mode: * Forum Code is ON T O P I C    R E V I E W mmjryoung Posted - 10/08/2009 : 2:20:34 PM Anyone ever make the Shibori wreath or the pointsettia wreath designed by Maggie Pace. I bought directions for pointsettia wreath and just found them online free...annoying. I should have looked more closely! Shibori wreath is in Felt Forward book but my library doesn't have this.... This page was generated in 0.11 seconds. Snitz Forums 2000 line This week's bandwidth kindly brought to you by and by knitters like you. How can I sponsor? line subscribe to Knitter's Reviwe
global_05_local_4_shard_00000656_processed.jsonl/107214
Skyrim’s Success Hasn’t Changed Plans for the Next Dragon Age Dragons, they're so hot right now. And not just because they're fire-breathing lizards, either. Skyrim's winning Game of the Year awards, racking up impressive online numbers even though it's single-player and possibly even impacting the economy. It's also singed people's memories of that other dragon-centric fantasy RPG that came out earlier this year. In the months after Dragon Age II came out, BioWare's co-founders have been supervising the finishing touches on Star Wars: The Old Republic. Since that massive online game's finally launching today, I asked BioWare's founding doctors about what they thought of Skyrim and whether the latest Elder Scrolls hit will make them re-assess the blueprints for future Dragon Age games in any way. While the bearded Greg Zeschuk admits that he hasn't even started Skyrim, co-founder Ray Muzyka's played through the earliest parts of the game. "I definitely admire the scope of what Bethesda's built. It's a beautiful looking world you can lost in," says Muzyka. "And the lore is very rich so you feel like you're moving through a world with history and that your actions have consequences. That's been a big thing for us in our games, too." The doctors acknowledge that Dragon Age II was a very polarizing game and claim to have heard the complaints of some hardcore fans regarding the fantasy sequel. "We think that Dragon Age II succeeded in a lot of ways but we've thought a lot about how to recapture some of things that Dragon Age Origins did well, too." Neither co-founder would offer more on what to expect in future Dragon Age games, but Muzyka said fans of both Dragon Age Origins and Skyrim would be happy with upcoming announcements. Zeschuk does admit to sinking many hours into Dark Souls, calling From Software's hit "the most bat-shit crazy game there is." So, maybe, there's more scope, more craziness or more difficulty or more of all three coming to the evolution BioWare's fantasy action/RPG franchise. We'll need to wait for EA and Bioware to reveal more about their next game with dragons to find out.
global_05_local_4_shard_00000656_processed.jsonl/107223
RadioWest (M-F @ 11AM & 7PM) 12:28 pm Wed November 24, 2004 Thursday, November 25: Third Coast Audio Festival Thursday, November 25, 2004 – RadioWest features the Third Coast International Audio Festival from Public Radio International. The festival is is a celebration of the best feature and documentary work heard worldwide on the radio and the Internet. Learn more at Third Coast Festival.
global_05_local_4_shard_00000656_processed.jsonl/107236
Cases en Dragovich v. CalPERS <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>On May 24, 2012, a federal judge ruled in favor of a certified class of state workers and their spouses and registered domestic partners excluded from CalPERS-sponsored long-term care insurance, finding that the federal Defense of Marriage Act (DOMA) violates the equal protection guarantees of the U.S. Constitution. <a href="/news/dragovich-ruling" rel="external" title="Page will open in a new tab or window">Read the court’s ruling</a></p></div></div></div><div class="read-more"><a href="/cases/dragovich-v-calpers" title="" rel="nofollow">More</a></div> Tue, 05 Feb 2013 06:47:43 +0000 jordan 355 at
global_05_local_4_shard_00000656_processed.jsonl/107244
Thursday, February 16, 2006 I Am in Tomato BigHominid muses on the difference between paradise and heaven. After reading his post, I was flipping idly through Stephen Graham's The Gentle Art of Tramping (New York: Appleton, 1926) and happened on this passage (p. 197) in a chapter entitled Foreigners: An American lady wishing to ingratiate herself with some Germans said she felt as if in Paradise; but the word paradise in German means tomato, and her friends stared at her. The only German dictionaries on my bookshelf (paperback Harrap's and Langenscheidt's) translate English tomato as German Tomate, and German Paradies as English paradise. I wondered if this story was as apocryphal as I am a jelly doughnut. But an online English-German dictionary, s.v. tomato, includes the German equivalents Paradeiser {m} [österr.] (should be Paradieser) and Paradiesapfel {m} [veraltet]. So perhaps there is a germ of truth in Graham's story, especially if the American lady was speaking bad German to some Austrians. Anyone who has eaten only the mealy monstrosities masquerading as tomatoes at the supermarket might well wonder how they ever got the name apples of Paradise. Apples of hell, rather. But a juicy tomato fresh from the vine in your garden -- now that is heavenly. << Home Newer›  ‹Older This page is powered by Blogger. Isn't yours?
global_05_local_4_shard_00000656_processed.jsonl/107253
DragonFly BSD DragonFly users List (threaded) for 2006-02 Re: (u)ral driver From: Chuck Tuffli <ctuffli@xxxxxxxxx> Date: Wed, 15 Feb 2006 13:52:25 -0800 On 2/15/06, Chris Rawnsley <rawprawns@xxxxxxxxx> wrote: . . > I have a D-Link DWL-G122 with a Ralink rt2500 chipset. Under FreeBSD, > I got this working using the ral(4) driver. I have looked for > information on how I might get this working in DragonFly and I found > this: http://leaf.dragonflybsd.org/mailarchive/users/2005-10/msg00063.html > Unfortuantly, with my lack of experience, I wasn't quite sure what a > diff file does. I tried to find out a bit and I understand that you You might find the online man pages ( http://leaf.dragonflybsd.org/cgi/web-man ) useful to find out what commands like diff and patch do. In the end, there is nothing like experience. So load 1.4 on a box and start experimenting :) > use the "patch" command to apply it to sources. Next problem; what > sources? I've looked inside the diff file and seen a few references > but I am not sure exactly what I want. Take a look at the "Building Patches" article on the wiki ( http://wiki.dragonflybsd.org/index.php/Building_Patches ). This goes through the process of getting source code and how to create patches. Once you have the source, take a look at the README file to learn how to kick off a build.
global_05_local_4_shard_00000656_processed.jsonl/107265
CarlShulman comments on Assessing Kurzweil: the results - Less Wrong 42 Post author: Stuart_Armstrong 16 January 2013 04:51PM Comments (59) Comment author: CarlShulman 16 January 2013 08:04:20PM 6 points [-] Yes, if one has a source of abundant likely, obvious predictions one can arbitrarily 'juice' one's overall accuracy rate even if most of the surprising predictions go wrong. On the other hand, judging 'obviousness' in hindsight is very tricky. One also has to pay attention to the independence of predictions. E.g. one could predict the continuation of Moore's Law as one prediction or as many predictions with connected answers: a prediction about chips in laptops, a prediction about chips in supercomputers, a prediction about the performance of algorithms with well-understood hardware scaling, etc. In the extreme, one could make 1000 predictions about computer performance in consecutive minutes, which would almost certainly rise or fall together. Kurzweil's separate predictions aren't perfectly correlated (e.g. serial speed broke off from supercomputer performance in FLOPS) but many of them are far from independent. Comment author: TechnoToad 29 January 2013 10:13:35PM -1 points [-] Carl is basically pointing out that assessing predictions is tricky business, because it's hard to be objective. Here are a few points that need to be taken into account: 1. People have a lot to gain from being pessimistically defensive. It prevents them from being disappointed at some point in the future. The option for being pleasantly surprised, remains open. Being defensively pessimistic also prevents you from looking crazy to your peers. After all... who wants to be the only one in a group of 10 to think that by 2030 we'll have nanobots in our brains? 2. The poster assessed Kurzweil's predictions because he felt the need to do so. Why did he feel the need to do so? Is this about defensive pessimism? 3. It is safe to assume that a random selection of assessors would be biased towards judging 'False' for two obvious reasons. The first is the fact that they are uninformed about technology and simply aren't able to properly judge the lion's share of all predictions. The second is defensive pessimism. 4. Why is it judged that a 30% 'Strong True' is a weak score? In comparison to the predictions of futurologists before Kurzweil, 30% seems like an excellent score to me. It strikes me as a score that a man with a blurred vision of the future would have. But blurred vision of the future is all you can ever have. If the future were here, you'd be able to see it sharply in focus. Having blurred vision of the future is a real skill. Most people (SL0) have no vision of the future whatsoever. 5. How many years does a prediction have to be off in order for it to be wrong? How would you determine this number of years objectively? 6. Why did the assessors have to go with the 5-step-true-to-false system? Is that really the best way of assessing a futurologists predictions? I understand that we are a group of rational people here, but sometimes, you've gotta let go of the numbers, the measurements, the data and the whole binary thinking. Sometimes, you have to go back to just being a guy with common sense. Take Kurzweil's long standing predictions for solar power, for example. He's been predicting for years that the solar tipping point would be around 2010. Spain hit grid parity in 2012 and news outlets are saying that the USA and parts of Europe will hit grid parity in 2013. Calling Kurzweil's prediction on solar power wrong just because it's happening 2 to 3 years after 2010, is wrong in my opinion. Kurzweil deserves some slack here. In the 1980s he predicted a computer would beat a human chess player in 1998. And that ended up happening a year earlier in 1997. Kurzweil has blurry vision of the future. He might be a genius, but he is also just a human being that doesn't have anything better to go on than big data. Simple as that. Instead of bickering about his predictions, we would do better to just look at the big picture of things. Nanotech, wireless, robotics, biotech, AI... all of it is happening. And be honest about Google's self driving car, which came out 2 years ago already: that was just an unexpected leap into the future right there! I don't think Kurzweil himself saw self driving cars coming in 2011 already. And to really hammer the point home, the self driving car had thousands of registered miles when it was introduced at the start of 2011. So it was probably already finished in 2010. For all we know, the Singularity will occur in 2030. We just don't know. Kurzweil has brought awareness to the world. Rather than sit around and count all the right and the wrong ones as the years pass by, the world would do better if it tried turning those predictions into self fullfilling prophecies.
global_05_local_4_shard_00000656_processed.jsonl/107278
This is sickle cell anemia in sickle cell crisis. The abnormal hemoglobin SS is prone to crystallization when oxygen tension is low, and the RBC's change shape to long, thin sickle forms that sludge in capillaries, further decreasing blood flow and oxygen tension. Persons with sickle cell trait (Hemoglobin AS) are much less likely to have this happen.
global_05_local_4_shard_00000656_processed.jsonl/107280
Browse All Theses & Dissertations • Submissions (Articles, Chapters, and other finished products) A giant skull, ontogenetic variation and taxonomic validity of the Late Triassic phytosaur Parasuchus Appalachian State University (ASU ) Web Site: http://www.library.appstate.edu/ Abstract: Parasuchus (= Paleorhinus) is the most primitive known phytosaur, and its fossils define a Carnian biochron recognizable across much of Pangea. The largest known specimen of this primitive taxon, an incomplete skull from the Popo Agie Formation in northwestern Wyoming, demonstrates that the nares remain anterior to the antorbital fenestra throughout the ontogeny of Parasuchus, an observation confirmed by an analysis of a broad database. The fact that this character is not variable through the ontogeny of this phytosaur genus, as some previous authors have speculated, helps to cement the taxonomic validity of Parasuchus. For the past century, systematists have attempted to establish a classification of organisms rooted in some form of a biological species concept. Cladotaxonomy, on the other hand, is the recognition of cladotaxa, which are low-level taxa (genera and species) that correspond to clades in a cladistic analysis. Cladotaxonomic relegation of all primitive phytosaurs to a metataxon is based on a posteriori evaluation of character polarity that fails to acknowledge the existence of a biotaxon regardless of how a cladist evaluates character polarities millions of years later. We reject assignment of primitive phytosaurs to a metataxon as uninformative, and recognize Parasuchus as a diagnosable phytosaur genus. Additional Information Lucas, S. G., Heckert, A. B., and Rinehart, L. F., (2007) A giant skull, ontogenetic variation and taxonomic validity of the Late Triassic phytosaur Parasuchus: New Mexico Museum of Natural History and Science Bulletin, v. 41 (The Global Triassic), p. 219-221. Archived in NC DOCKS with permission of the editor. The version of record is available at: http://econtent.unm.edu/ Language: English Date: 2007
global_05_local_4_shard_00000656_processed.jsonl/107282
GitHub Resume Transforms Your GitHub Account into a One-Page Resume GitHub Resume is a webapp that takes your Github account and turns it into an attractive one-pager that highlights your popular projects, preferred programming languages, and a bio for others to see. If you're a developer, your GitHub account can be a valuable tool to get you hired. If you're a freelancer or indie developer, it may just as well be your resume: You pass it along with your cover letter, and when potential employers want to see your work, you send them there. To turn your GitHub account into an attractive landing page for visitors to learn more about your programming skills, just drop your username into GitHub Resume and let the webapp do the rest. When it's finished, you'll have a sharp-looking page you can add to your email signature file or send to potential clients who want to see your work. GitHub Resume | GitHub via The Next Web
global_05_local_4_shard_00000656_processed.jsonl/107290
Main :: James Tyler Variax Guitars Support community for JTV. JTV - Acoustic Models sounded Treble by archisc on 2013-01-17 10:30:54 I just received my jtv 59. Upgraded to 1.90. However, I found all of my acoustic models sounded with high treble. I plug it into my fender acoustic amp, I need to dial bass2, middle 2, treble 2.. but still the results sounds treble..... I have an ovation LX and a high end taylor and none of them require this kind of settings. When I use podhd, with eq, through headphones, I hear high treble too.. Is this normal? Anyone else have the same problem? The bass boom can be heavy with you strum hard too... Re: JTV - Acoustic Models sounded Treble by SliderJack on 2013-01-18 12:37:48 Have you tried various acoustic models? I don't have an acoustic amp but agree it can sound very bright through my Pod and DT50. I get best results running mine through my pod500 with a stereo acoustic patch and into my PA. Then I get a nice warm/full tone. Re: JTV - Acoustic Models sounded Treble by phil_m on 2013-01-18 13:04:40 One thing to remember is that the acoustic models on the Variax are modeling the sound of miced acoustic guitar, and that typically sounds quite different than what you hear coming from an undersaddle transducer and preamp system on an acoustic-electric guitar.
global_05_local_4_shard_00000656_processed.jsonl/107298
[Namron] list for care packages Maleah baroness_maleah at cox.net Tue Jul 8 17:21:29 PDT 2008 as requested, here is the list again beef jerky (all flavors) nuts and trail mixes (minus the chocolate ingredients) eye drops baby wipes hand sanitizer pop tarts (all flavors) granola bars cookies (no chocolate coatings but chips seem to make it fairly well) Oreos (all flavors) drink mixes (boxes of single servings, any flavor) DVDs (any extras you have or stuff you don't watch anymore) chex mix (any flavor) gardetto mix (any flavor) tuna lunch mix with crackers canned meats Cheeze its Ritz bits (all flavors) flavored crackers (individual packs) again all flavors hard candies (nothing meltable) books (no romance novels with graphic covers) board games (all kinds) cards and card games popcorn, pre-popped or bags for the microwave (all flavors) Pringles (all flavors) gum (all flavors)sunscreeninsect repellentindividual boxes of cereals An HTML attachment was scrubbed... URL: <http://lists.ansteorra.org/pipermail/namron-ansteorra.org/attachments/20080708/f015779c/attachment.htm> More information about the Namron mailing list
global_05_local_4_shard_00000656_processed.jsonl/107302
[wp-hackers] Why strings aren't translated here? Otto otto at ottodestruct.com Mon Nov 2 15:10:07 UTC 2009 On Fri, Oct 30, 2009 at 3:20 PM, Milan Dinić <liste at srpski.biz> wrote: > Now I tried what you suggested ( $gse_options['tip_text'] = sprintf(__("It > seems that ... ) but it still doesn't translate that string. Maybe is > problem because it is run in register_activation_hook. Yes, that is indeed your problem. Or, rather, the lack of the init is your problem. When the activation hook fires, your plugin has just been included. Init occurred before that happened. So your init doesn't get run, and thus your text domain never gets loaded before you try to start translating things. You need to load the text domain before you use translation functions. Sent from Memphis, TN, United States More information about the wp-hackers mailing list
global_05_local_4_shard_00000656_processed.jsonl/107312
Re: Minutes of F2F From: Brian McBride <[email protected]> Date: Fri, 08 Mar 2002 08:52:32 +0000 Message-Id: <> To: Graham Klyne <[email protected]> Thanks Graham. Fixed. At 15:47 07/03/2002 +0000, Graham Klyne wrote: >At 10:03 PM 3/6/02 +0000, Brian McBride wrote: >>Hi Folks, >>I've added the decisions made to the face to face page at: >>and notes from the i18n meeting. >>Notes from I18N/RDFCore Meeting >>I18N recommend that literals (strings) in the RDF graph be fully >>normalised UNICODE and should start with a combining character. >Shouldn't that be *NOT* start with a combining character? >>I18N suggests that comparison of URI's behaves as if they are UNICODE >>normalised, but not does require that such normalization is performed. >>I18N agree that RDFCore requires a transitive string comparison algorithm >>and requests that the specs do not mislead application developers into >>thinking they are not permitted to implement a more flexible string >>matching algorithm, e.g. on queries. >>I18N note that the strings defining languages occasionally change and >>suggests that RDFCore may choose to use URI's to name languages. RDFCore >>agree to consider. >>I18N found the proposed solution of literals being a pair of a string and >>a language tag acceptable. >>I18N agree that n-triples is an internal tool for the WG and developers >>and is not subject to the same internationization concerns of more public >>syntaxes. I18N request that the specs make this limited role for >>n-triples clear. >>There was some dicussion of RDFCore concerns of lack of implementation of >>charmod and other specs delaying completion of RDFCore. >I think there was also a concern that the relevant I18N specs would not be >at the appropriate recommendation status when the RDF specs are ready to >move forward. >Graham Klyne MIMEsweeper Group >Strategic Research <http://www.mimesweeper.com> Received on Friday, 8 March 2002 04:50:50 EST This archive was generated by hypermail pre-2.1.9 : Wednesday, 3 September 2003 09:46:15 EDT
global_05_local_4_shard_00000656_processed.jsonl/107313
Re: Fw: online obstacles discourage blind From: Phill Jenkins <[email protected]> Date: Mon, 21 Jun 2004 08:50:22 -0500 To: [email protected] Cc: [email protected] Message-ID: <OFE2ED3263.11C56CEA-ON86256EBA.00486E3A-86256EBA.004C067F@us.ibm.com> The article make several good points: 1. implement the standards: "... The answer, activists say, is to universally implement consistent Web standards that ensure accessibility and usability." 2. The standards consists of more than just the web content standards: "The [W3C] group's guidelines ... cover not only the content of Web pages, but also the tools used to write the content as well as the Internet browser or media player that interprets the content." 3. The experience is improving: "Despite her difficulties online, Rhodes stressed that her Internet experience has dramatically improved since she first began using computers in the 1980s. " My observation has been that when all the stake holders do their part, the experience improves. As my Dad would tell me while working on my first car: "we need all eight cylinders firing in the engine before it will really go!" Screen readers & magnifiers have improved significantly since the 1980's - heck they didn't even exist before then. The IBM Screen Reader for DOS wasn't announced until 1986, I believe. The browser support for UAAG standards has significantly improved. The standard wouldn't have been published if there wasn't an implementation of them. Authoring tool support for ATAG, although improving, perhaps is the furthest behind. And policy makers and users are making significant progress as well. Policy makers are making the need for standards compliance aware to more people in business, government, and education. Users are learning and taking advantage of the improvements in the assistive technology, browsers, and web content. Phill Jenkins Received on Monday, 21 June 2004 09:51:34 UTC
global_05_local_4_shard_00000656_processed.jsonl/107315
[css3-color] Don't deprecate CSS System Colors From: Krzysztof Maczyński <[email protected]> Date: Mon, 09 Mar 2009 23:28:01 +0000 Message-ID: <DC8E7A9C6BC94856AE1166605CD17827@kmPC> To: <[email protected]> Dear CSS WG, Please don't deprecate CSS System Colors. The LC states they're going to be deprecated in favour of appearance. But if appearance isn't in a Rec by then (and this is most likely), then deprecation based on this suggested replacement will be utterly premature (which will hurt accessibility among others). Furthermore, I think the full-fledged styling of a native UI control the appearance property is going to provide will often be too wholesale or even outright inadequate for some purposes where CSS Systems Colors should be used (e.g. when the styled element is not a UI control at all; would you want the very paragraph from the spec example to start looking and behaving entirely like a window?). Received on Tuesday, 10 March 2009 15:01:35 GMT
global_05_local_4_shard_00000656_processed.jsonl/107321
U.S. Futures Point Higher as Global Markets Drop John Shipman takes a look at the markets, including three stocks to watch today. Photo: Getty Images. Transcript + WSJ Podcasts WSJ Radio ... I ... the ... well it's time for a quick look of mock it's now in its evil so Futures doing for the U S we know the markets down across the globe but was a man and a shove them every city up a list of all the updates Markets now ... that maybe maybe not maybe in a month ... hit a helpless looking at what's gone on the go John Shipman of the markets that's ... a onesie a gloomy grey us as always as fewer U S Futures Ltd expects there will be how you are ... going up yes going on the other ... thing is we seen losses across the globe to bring much of a new ... tool will that earlier with the Turkish us Central banks of their ... emergency meeting later on tonight ... so that has helped to stabilize most of the set was admitted as now make it the Nikkei which is in Japan which is close to ready the ... two point five percent off that that that the reliance ... on Aberdeen's EST across the bow ... we believe European markets will open with those two because that may be why ... dental looking as bad as this image and see me ... there this of this thing and I'm pre much label was often the man who was basically catching up to the tothe Friday moved ... here and and and are up which was sharply lower so that ... it was his pass into history at this point ... so the mood to stabilize though that with the lira as it pops up a little bit and aam so we ... will see but the onus is on the onthe
global_05_local_4_shard_00000656_processed.jsonl/107325
Messages in this thread SubjectRe: [PATCH] x86: use enum instead of literals for trap values On Fri, 2012-03-09 at 20:08 +0100, Borislav Petkov wrote: > > Can use "VEC" instead "XCP", as Steven suggests. > Yeah, because those actually are fixed interrupt vectors, as they're > called in the AMD docs. Makes sense. I have to admit my bias may lean towards AMD's documentation as that's the only x86_64 documentation I have/use. I don't know what Intel's description is. -- Steve  \ /   Last update: 2012-03-09 20:17    [from the cache] ©2003-2011 Jasper Spaans
global_05_local_4_shard_00000656_processed.jsonl/107338
Puerto Rico - 11 days to statehood? Just 11 days from now, Puerto Rico will get its first presidential visit in 50 years—reigniting the question of whether the island should become the 51st state. Here's why this needs to be resolved: America shouldn't have any second-class citizens. If you're an American, you should have the same rights as everyone else. Puerto Ricans don't. That doesn't necessarily mean Puerto Rico should become a state. Rather it means they should be either in or out. That's always been the deal in America. Territories were never supposed to be a long-term arrangement. When the Philippines were in the same situation, statehood was considered, but independence was the will of the people. All good. Puerto Rico should do the same: Full statehood, or independence. (And can someone please explain to me why Puerto Rico gets to enter the Miss Universe pageant alongside Miss USA? Do the pageant people not understand that Puerto Rico is part of the United States? Wait, Donald Trump owns that pageant. Now I get it.) Check out the zoomable 1952 map of Puerto Rico above
global_05_local_4_shard_00000656_processed.jsonl/107351
Is Felicia Day the web's hottest dork? Monica Hesse -Apr 9, 2012 Felicia Day ... "Now I understand what exhaustion is." Photo: Emily Ibarra/ (via CC Flickr) This is a story about Felicia Day. Right now, 30 per cent-ish of you are squealing with besotted fan-girldom and fan-boydom. The other 70 per cent of you do not know what a Felicia Day is. "That's probably more like 90 per cent," she says. "Whenever I go to a meeting at a studio lot, it's always the IT guy or the assistant or the accountant who knows me. And then the executives look at me, like, 'I don't know why I'm meeting with you.' " Here is an explanation. Day, 32, is the creator and star of The Guild, an online series whose episodes have scored 150 million views since its 2007 inception. She's won two best actress "Streamys" for her twitchy, flustered performance as gamer Cyd Sherman. In January, the Hollywood Reporter named her one of the industry's top 50 digital power players, a list that included George Lucas and the chief executive of Twitter. Here is another explanation. If you are a geek - a proud, noble, reclaiming-the-word geek - then Felicia Day is your deity. A few months ago, YouTube announced that it would launch 100 new original-content channels. The selected producers would get a cash influx to help them ramp up quality; YouTube would amass artistic credibility. Deepak Chopra got a channel. Shaquille O'Neal, Amy Poehler and Madonna-affiliated outfits got channels. Day got a channel. She named it Geek & Sundry. Its slate of shows - six new, original programs, created by or developed by or starring her - debuts this week. "It's this sort of grand experiment, and I don't know what's going to happen," she says. A watershed moment What will happen with Day is intrinsically tied to what will happen on the internet, at a potential watershed moment in the future of online content. "Remember that movie Three Men and a Baby?" Joss Whedon writes in an email. The creator of Buffy the Vampire Slayer cast Day in that show as the slayer Vi, and in Dr Horrible's Sing-Along Blog, his web opus. "Felicia is the baby, the three guys raising her are Preston Sturges, Gordon Gekko and Rain Man. Her mind works faster than mine ever will and her mouth works faster than that. She's funny, savvy, focused and encyclopedic to the point of scary. And, sidebar, the baby grows up to be really hot." Professionally, "Felicia's career will go where she decides it will," he writes. "Plus, she'll probably rule Asia and invent a new colour. I fear her." She darts into the bakery just ahead of me - red hair; green sweater; skittish, quick steps. "You're early, too!" She wrinkles her nose, slightly thrown by being out-earlied. She lhas a Lord of the Rings elfin look. She has the sort of awkward/cool vulnerability that invites immediate intimacy. This is what made her famous online. Day's alter ego, Cyd, is the introverted emotional center of The Guild, anchoring every show with an entry in her video diary. "I play with real people," she insists in one episode, explaining that she doesn't need to meet them in person because she can hear their voices over her computer. "It's good enough for the blind." Insider legend The history of the show has become an insider legend. After studying violin performance in college, Day moved to Los Angeles, getting the Buffy arc and not much else you'd remember. What she was doing more than anything was bunkering in her apartment playing World of Warcraft. She tried writing a TV pilot about a group of gamers, but she couldn't sell it. Someone in her support group (women struggling in Hollywood) suggested that she produce the show herself and put it on the internet. She did, and it became a template for how web content could make money: Sponsorships were struck with Microsoft and Sprint. The Guild - five seasons so far - is weird, it is wonderful, it is unapologetically dorky and not in a stereotypically Big Bang Theory/Family Matters kind of way, but as an honest, complex portrayal of online existence. Her new channel, Geek & Sundry, builds on the brand. There's a show where Wil Wheaton (Wesley from Star Trek: The Next Generation) teaches people how to play strategy-based board games. There's a fantasy book club and a particularly inspired program in which professional filmmakers make movies based on rambling stories told by 5-year-olds. In The Flog, Felicia's personal video diary, she travels around Los Angeles, learning to sculpt ice, play country music and other offbeat, oddnik activities. After this breakfast interview, she has to run off and be fitted for a powdered wig. "Now I understand what exhaustion is," she says of her 24/7 working schedule. "It's not just a code word for heroin addiction. People don't teach you how to handle the workload that comes from a little bit of success, and it's something I'd never had to handle, because I'd been rejected for so long." Becoming an icon After years of being ignored by old-school Hollywood, Day's success with The Guild triggered an avalanche of possibilities. "Suddenly, these offers were flooding in from everywhere. Television. Huge opportunities. I wasn't ready for that. I hadn't defined what I loved enough to be able to handle that. "I had to ask myself, 'Where do I want my life to go?' " Did she want the chance to become a mainstream actor the traditional way, or did she want to try something experimental with the web? "With mainstream acting, I already knew how that path would end." "What Felicia's accomplished has been extraordinary," says Drew Baldwin, a co-founder of, a site dedicated to covering web series and online television. "Her fans are completely portable. They go wherever she goes. She's become an icon for this group." On television, Day might have been the nutty neighbour. "For online video?" Baldwin says, "She's Audrey Hepburn." At its core, what Geek & Sundry represents is the future of web series and the efforts of its producers to figure out just what we're looking for when we go searching online. In the early days of original content online, there was an assumption that the best of it would be good enough for television. That rule no longer holds up. The best web content is strong enough for your TV, but it's made for your laptop. "It's not just a 'phenomenon' when someone online is getting an audience every week that's bigger than a television show," Day says. "People don't understand that maybe [television] is not the goal anymore." The goal, she says, is to harness and exploit the natural strengths of the web: its communal nature, its fanatic/frenetic devotion, its exasperated baloney detector and its thirst for authenticity. "The internet is not best for passive consumption - it's not like sitting down and watching a movie. It's about sharing how you feel about the video and experiencing how other people experience it. It's a circular thing. . . . People assume that you're trapped in this web on the internet - that it's a place of isolation, when really you're connecting with your authentic self." A few weeks ago, Day decided to integrate several of her social-networking profiles to make them easier to manage. Followers on Twitter immediately got snarky and suspicious, assuming that she'd hired a publicist to coordinate her online identity. Day was horrified. "I would never let somebody say that they're me. That would be the ultimate betrayal of what I stand for. "I'm here on the web," she says, "because I don't want to be a cliche." The Washington Post Most Viewed
global_05_local_4_shard_00000656_processed.jsonl/107367
Gazpacho for maemo 3.x Please note that Gazpacho in maemo 3.x is not officially supported. This document may not be complete up-to-date nor accurate. Introduction to Gazpacho Gazpacho is an application for GUI design, written entirely in Python, and aimed at the GTK+ widget set. The target audience is the same as for Glade. Gazpacho output is a Glade XML file. In theory, this file can be loaded by libglade but this does not work as yet: Gazpacho makes use of the Glade XML in extended ways that libglade does not yet respond to. To cope with this, the Gazpacho project also supplies an XML loader that is employed in place of libglade. This is the only piece of code that the XML "consumer" needs to have installed. In the future, when libglade fully understands Gazpacho XML files, this loader is no longer necessary. The Gazpacho loader is implemented in Python, so, for now, only Python/GTK+ applications can make use of Gazpacho-designed GUIs. Unlike libglade, Gazpacho is intended to be extensible, so it is very easy to add support to new widgets (both at GUI designer and at loader side), like the Hildon widget set present in maemo platform. Gazpacho for maemo is still presently in active development. If you find any bugs, report to The official Gazpacho site is located at Gazpacho for maemo Gazpacho for maemo is a package that extends Gazpacho with the Hildon widget set, allowing for easy GUI development with Hildon components, as well as allowing Hildon GUIs to be encoded in XML. Before Gazpacho for maemo, Hildon components could not function in XML .glade files; the interface had to be hard-coded in the application (either in C or in Python). Gazpacho for maemo files go mainly into two folders: • /usr/share/gazpacho/resources/hildonwidgets supplies the widget set extension for the GUI builder. It does not have any Python code, and it is not necessary at runtime. • /usr/lib/python2.4/site-packages/gazpacho/widgets/hildonwidgets contains Python code, mostly adaptors for Hildon classes. These files are necessary both at design and runtime. Note the the folders contain very little code and data, since Python makes it so easy to create objects based on classes' names (in this case, building the GTK+ object tree based on a XML tree) that the Gazpacho loader offloads most of the hard work onto the Python-Hildon bindings. Installing Gazpacho To install Gazpacho go to garage and download the required Gazpacho components from there. The direct link to find the gazpacho modules is: Gazpacho modules 1. The following packages must be downloaded and installed for development: • Gazpacho-Maemo • Gazpacho-Plugins • Gazpacho-Hildon They must be installed inside Scratchbox since Gazpacho/Hildon extra widgets depend on Hildon library and Python-Hildon bindings, which lie inside the SDK sandbox. 2. Gazpacho for Hildon must be run inside Scratchbox and inside a Xephyr window, since it also depends on maemo graphic services. Run Gazpacho in a window bigger than the normal 800x480: /home/epx $ # outside Scratchbox /home/epx $ xhost + access control disabled, clients can connect from any host [scratchbox: ~] # inside Scratchbox, note the bigger Xephyr screen resolution 1024x768 [scratchbox: ~] > DISPLAY=:0 Xephyr :2 -host-cursor -screen 1024x768x16 -dpi 96 -ac & 3. You also need to start some maemo services to allow Gazpacho to run inside Scratchbox. The script (included in the gazpacho-hildon package) is analogous to the af-sb-init script, but starts only the required services. Run the script as follows: [scratchbox: ~] # inside Scratchbox [scratchbox: ~] > DISPLAY=:2 start 4. You need a window manager for this virtual screen. The maemo window manager is not sufficient because it expects a 800x480 screen. From outside Scratchbox, run the window manager of your preference , for example, metacity: /home/epx $ # outside Scratchbox /home/epx $ DISPLAY=:2 metacity & 5. Run Gazpacho: [scratchbox: ~] # inside Scratchbox [scratchbox: ~] > DISPLAY=:2 gazpacho & Gazpacho/Hildon splash screen inside the Xephyr window Figure 1. Gazpacho/Hildon splash screen inside the Xephyr window To run Gazpacho applications in the target device, you need to install Gazpacho-loader and Gazpacho-Hildon in the device. Installing the latest Gazpacho development packages The latest Gazpacho development branch is supported on the maemo platform. There are good reasons for using this branch. For example, it is actively developed and it contains features that are missing from the package version of Gazpacho. However, installation is more complicated. To run the development version of Gazpacho, you need the following packages • Gazpacho source code from Gazpacho's trunk • Source code for Kiwi widgets • Source code for Gazpacho-Hildon binding To install the development packages: 1. Obtain the source code for the Kiwi widgets from Download version 1.9.6 or later. Install Kiwi widget set by running the following commands: [scratchbox: ~] # inside Scratchbox [scratchbox: ~] > tar -xzf [KIWIPACKAGE] [scratchbox: ~] > cd kiwi-1.9.X [scratchbox: ~] > $PYTHON install 2. When Kiwi has been installed, the Gazpacho can be installed. To do this you have to obtain the latest source code and install it. [scratchbox: ~] # inside Scratchbox [scratchbox: ~] > svn co gazpacho [scratchbox: ~] > cd gazpacho [scratchbox: ~] > $PYTHON install 3. Gazpacho-hildon bindings are required to ensure that the hildon widgets can be used to construct UIs. This package is also obtained from the following repository: [scratchbox: ~] # inside Scratchbox [scratchbox: ~] > svn co [scratchbox: ~] > cd gazpacho-hildon [scratchbox: ~] > dpkg-buildpackage -rfakeroot [scratchbox: ~] > cd .. [scratchbox: ~] > fakeroot dpkg -i gazpaco-hildon_PACKAGE_VERSION_all.deb 4. After you have installed all packages, you must start Gazpacho. /home/epx $ # outside Scratchbox /home/epx $ cp .Xauthority /scratchbox/users/$USER/$HOME /home/epx $ scratchbox /usr/bin/ Example of a Gazpacho/Hildon application You can now make a basic "Hello World"-style application with Gazpacho to make sure that your installation is correct. Firstly, you must design the GUI inside Gazpacho. The top-level widget must be the Hildon Window (HildonWindow class). The Hildon Application (HildonApp class) is obsolete and would trigger an exception in Gazpacho. Gazpacho/Hildon with a top-level HildonWindow open Figure 2. Gazpacho/Hildon with a top-level HildonWindow open Once you have a Hildon Window, you can throw in more widgets, like horizontal boxes, vertical boxes, labels, entries and so on. Gazpacho/Hildon, HildonWindow with some widgets added Figure 3. Gazpacho/Hildon, HildonWindow with some widgets added The GUI shown in the figure above translates into the following Glade XML (saved as <?xml version="1.0" standalone="no"?> <!--*- mode: xml -*--> <!DOCTYPE glade-interface SYSTEM ""> <widget class="HildonWindow" id="window1"> <property name="height_request">396</property> <property name="title" context="yes" translatable="yes">Hello World</property> <property name="width_request">672</property> <property name="label" context="yes" translatable="yes">Hello world!</property> <widget class="GtkEntry" id="entry1"> <property name="text" context="yes" translatable="yes">Hello World</property> <property name="position">1</property> <widget class="GtkHBox" id="hbox1"> <widget class="HildonColorButton" id="colorbutton1"> <property name="color">&lt;GdkColor at 0x855bc10&gt;</property> <widget class="HildonVVolumebar" id="vvolumebar1"/> <widget class="HildonHVolumebar" id="hvolumebar1"/> <property name="position">2</property> As you can note, The XML grammar is almost the same as Glade, but the Hildon-specific widgets are in place. You should now run this interface. You need some code to load and display it: import pygtk import gtk import hildon from sys import argv from gazpacho.loader.loader import ObjectBuilder if __name__ == '__main__': app = hildon.Program() wt = ObjectBuilder('') # wt contains all windows inside file. # Let's get the first one You must now execute this program, since the regular maemo graphics environment (with started): [scratchbox: ~] > # In the case you did not stop Gazpacho services ... [scratchbox: ~] > stop [scratchbox: ~] > # now close the Xehpyr 1024x768 window [scratchbox: ~] > DISPLAY=:0 Xephyr :2 -host-cursor -screen 800x480x16 -dpi 96 -ac & [scratchbox: ~] > start [scratchbox: ~] > python2.4 loaded, splash screen Figure 4. loaded, splash screen, editing the Entry Figure 5., editing the Entry The small program has no event handling, so you do not quit when you close the window; you need to interrupt with the prompt by Ctrl-C. For more documentation about Gazpacho, go to the official Gazpacho site: For more documentation on Hildon widgets, as well as Python APIs for Hildon and Libosso, go to: Improve this page
global_05_local_4_shard_00000656_processed.jsonl/107372
Subject: NIS and security To: None <[email protected]> From: Guenther Grau <> List: current-users Date: 04/24/1998 17:43:48 I know this is not absolutely the right forum for this question, but I didn't know, where else to ask, so here I go: Is is possible to exclude a certain range of user ids from being imported through NIS? Let's say on my netbsd-host I want to be sure that the user ids 0 to 99 are only used from the local password file, not through NIS. But I also want to allow other user ids above 100 to log into my machine without adding all users to my local passwd file. Is that possible? If so, how? Thanx for any hints, P.S.: Just in case you want to know why: If someone on the NIS server adds a user named "power" with userid 0 he'll be able to log into my machine as "power" and thus gains super user access to my machine. I don't like that :-)
global_05_local_4_shard_00000656_processed.jsonl/107383
[SciPy-user] TimeSeries concatenate Matt Knox mattknox.ca@gmail.... Fri May 22 15:16:43 CDT 2009 > Question: What happens to duplicate dates? It seems that the data in > the first series is used. Is that the rule? One thing I would recommend (which is not obvious to new python users many times) is to check the function doc strings using the built in "help" function (see below). So to answer your question, yes that is the rule IF the `remove_duplicates` parameter is set to "True" (which is the default). - Matt >>> import scikits.timeseries as ts >>> help(ts.concatenate) Help on function concatenate in module scikits.timeseries.tseries: concatenate(series, axis=0, remove_duplicates=True, fill_missing=False) Joins series together. The series are joined in chronological order. Duplicated dates are handled with the `remove_duplicates` parameter. If `remove_duplicate` is False, duplicated dates are saved. Otherwise, only the first occurence of the date is conserved. series : {sequence} Sequence of time series to join axis : {0, None, int}, optional Axis along which to join remove_duplicates : {False, True}, optional Whether to remove duplicated dates. fill_missing : {False, True}, optional Whether to fill the missing dates with missing values. >>> a = time_series([1,2,3], start_date=now('D')) >>> b = time_series([10,20,30], start_date=now('D')+1) >>> c = concatenate((a,b)) >>> c._series masked_array(data = [ 1 2 3 30], mask = False, More information about the SciPy-user mailing list
global_05_local_4_shard_00000656_processed.jsonl/107402
Social Media VoteKast Gives Unlimited Votes and Tracks Changes VoteKast is a polls creation site that lets you make a poll on any topic you'd like. What sets VoteKast apart from most polls creation sites is the ability to vote one way or another as many times as you'd like. VoteKast will keep track of when a vote has been changed, and they'll soon be offering even more detailed tracking information. They've included image inclusion to their polls creation, which makes their product look less like a poll than what we're accustomed to. VoteKast also has a community for user interaction. As most sites are doing now, VoteKast is dedicating much of their efforts towards the 2008 presidential elections by pushing their service as a way to track a "crowd rules" approach to voting, and providing each candidate with a dedicated profile page. Polls can also be exported to your blog or your MySpace, Hi5 or Piczo profiles, even if you're not a member of the VoteKast community, which is smart, but there is no branding or opportunities to easily share the widget once it's been exported. Upcoming for VoteKast is their integration of candidates' profile pages with wikipedia, as well as sponsored contest and the ability to suggest a new choice if the one you want isn't present in the poll's offering. Other poll sites include Poll Daddy and CircleUp. Those with a dedicated candidate slant for next year's elections include PureVideo's Politics Up Close and Knover and YouTube. Load Comments The New Stuff The Next Big Thing What's Hot
global_05_local_4_shard_00000656_processed.jsonl/107408
Casemaker User Guide The Casemaker User Guide will help to answer your questions when using Casemaker for your legal research. • To download a printable, PDF version of the guide for Casemaker, click here. If an answer to your question is not addressed in the guide, contact CLE Senior Program Manager Marc A. D'Antonio at (617) 338-0646 or [e-mail mdantonio], for assistance. ©2014 Massachusetts Bar Association
global_05_local_4_shard_00000656_processed.jsonl/107411
Take the 2-minute tour × I am reading some papers from the 70s on operator theory. I come across the term 'vector state' of a $C^*$-algebra quite often. It is a little bit confusing. Wikipedia redirects to quantum state vector which I found irrelevant. So could someone give me a definition of a 'vector state'? In particular, I want to make sense of the following from one of arveson's papers: If $M_n$ is the algebra of n-n matrices, $\mathcal{A}$ is a $C^*$-algebra in $B(\mathcal{H})$, $\epsilon_j$'s are basis for $\mathbb{C}^n$, then every vector state $\omega$ of $M_n\otimes\mathcal{A}$ is of the form \begin{equation} \omega((A_{ij}))=\sum_{i,j}(V^*A_{ij}V\epsilon_j,\epsilon_i),\end{equation}where $V$ is an operator from $\mathbb{C}^n$ to $\mathcal{H}$. This somehow resembles the positive linear functionals or states on $C^*$-algebras, but I am not quite sure. Is that the formulae for states on tensors of algebras? share|improve this question 1 Answer 1 up vote 2 down vote accepted If $\xi$ is a unit vector on a Hilbert space then the linear functional $w_\xi: B(H)\to \mathbb C$ given by $w_\xi(a)=\langle a\xi,\xi\rangle$ is positive and $w_\xi(1)=1$ so it is a state and it is called a vector state. share|improve this answer So you mean states and vector states are the same thing? But in Glimm's paper: A Stone-Weierstrass theorem for $C^*$-algebras, he took great effort to show that any state that annihilates the compact operators is a limit of vector states, which does not make sense if vector states and states are the same thing. –  Hui Yu Jul 22 '12 at 15:41 @HuiYu No, they are not the same. A vector space is a state that is of the form $w_\xi$ for some unit vector $\xi$. Not all states are of this form. –  azarel Jul 22 '12 at 17:19 Your Answer
global_05_local_4_shard_00000656_processed.jsonl/107412
Take the 2-minute tour × 1. Let $A \subseteq P(\omega)$, where $\omega$ is the set of all natural numbers and $P(\omega)$ is the power set of $\omega$. If $\langle A,\subseteq\rangle$ is a well ordered set how can you prove that $A$ is a countable set. 2. Let $A$ be a set which elements are closed sets of real numbers. If $\langle A,\subseteq\rangle$ is a well ordered set how can you prove that $A$ is a countable set. 3. How can you prove that Zorn's lemma (so and the axiom of choice) is equivalent to that for every partially ordered set $\langle A,\le\rangle$ that satisfies Zorn's condition, for every $b\in A$ there exists a maximum element $a$ for which $b\le a$. share|improve this question I'll wager 3 has to be "maximal element $a$"; otherwise, the statement would assert that Zorn's condition implies the existence of a maximum. –  Arturo Magidin Feb 25 '11 at 16:37 And please say what you've tried or where you are stuck. –  Arturo Magidin Feb 25 '11 at 16:38 1 Answer 1 up vote 8 down vote accepted 1. Since $A$ is well-ordered, we can order-biject it with an ordinal $\beta$, $f\colon \beta\to A$. Now, you can use $f$ to define an injection from $\beta$ to $\omega$ by letting $g(\alpha)$ be the least element of $f(\alpha+1)-f(\alpha)$. Show that $g$ is an injection, and therefore $\beta$ is countable. 2. Consider the set of complements, which are open, and well ordered by $\supseteq$. Show that there is always a rational that is in one set but not in its $\supseteq$-successor, and that you can pick distinct rationals at each stage (that is, define an injection from $A$ to $\mathbb{Q}$). 3. Replacing "maximum element $a$" with "maximal element $a$", assuming Zorn's Lemma and given $\langle A,\leq\rangle$ and $b$, look at $\mathcal{C}=\{x\in A\mid x\geq b\}$ and apply Zorn's Lemma to it. For the converse, pick an arbitrary $b\in A$ and conclude the original set has maximal elements. share|improve this answer Your Answer
global_05_local_4_shard_00000656_processed.jsonl/107413
Take the 2-minute tour × I'm looking for a kind of error correction code or solution that can correct my codeword in this case: My message holds k bits, and 2*k bits codeword (rate is 1/2) is produced by the generator matrix, e.g. k=5, so it yields 10 bits codeword 1001100111. If the codeword is erased for some reason and it becomes 1xx1x00xx1 (similar to the codeword transmitted through Binary Erasure Channel, and x is unknown, either '0' or '1'), can I still correct all the "x bits" in such situation as bit error rate is 1/2? I have read about some error correction code, such as block code, convolutional code and LDPC and got the following questions: 1. All these ECC have pratical application in communication, so do they still work when BER is close to 1/2 (I think BER is impossible so high)? 2. Are there any feasible solution to my case? In fact, my message is 30 bits and I can introduce another 30 bits redundancy as parity bits. Can I still correct my codeword even if half bits are corrupted? Any guides or suggestions are appreciated! share|improve this question Are you considering erasure (where the recipient knows which bits he didn't receive properly) or corruption (where the recipient may misreceive some bits but doesn't know which they are)? –  Henning Makholm Mar 27 '13 at 14:13 You might want to ask this in theoretical CS as well. –  Jonathan Rich Mar 27 '13 at 14:28 @HenningMakholm I'm considering "erasure" as you mention, and the rest of bits will not flip if they are not erased. –  WangYudong Mar 27 '13 at 14:49 Have you considered a fountain code with a packet size of 1 bit? (Where the codewords are formed by gluing the packets together one after another.) I'm not sure how well it will actually work in practice, but it might be worth doing some simulations. Note that the resulting code will have rate slightly less than 1/2. Is that okay? –  Snowball Mar 27 '13 at 15:03 3 Answers 3 No, that is not possible. Assume, to the contrary, that we have such as code. Because we can erase the $k$ last bits in a code words, by the pigeonhole principle all of the $2^k$ possible combinations of the first $k$ bits must be used by exactly one codeword. Without loss of generality we can therefore assume that the first $k$ bits in each codeword are the unchanged message bits. We can also assume that message $0^k$ has codeword $0^{2k}$. (If not, we can make it so by uniformly negating certain bit positions in all codewords). What is the second half of the codeword for message $0^{k-1}\,1$? If we erase the 1 in the first half and all but a single bit in the last half of the codeword, there must be at least 1 left; otherwise we could not distinguish it from message $0^k$. But that can only be the bit we didn't erase in the second half, and this reasoning holds no matter what the position of the bit is, so $0^{k-1}\,1^{k+1}$ is a codeword. By quite similar reasoning, $1\,0^{k-1}\,1^k$ must be a codeword. But $0^{k-1}\,1^{k+1}$ and $1\,0^{k-1}\,1^k$ look alike when we erase the first $k$ bits. This is a contradiction. share|improve this answer As others have explained, you cannot do this with absolute certainty, because then you will bang your head against the wall of Hamming distance. However, `rateless' codes can do this with a very high probability with effective rate an epsilon over 1/2, and longer blocks of data. In other words, Snowball's comment is a good one. In some sense the philosophy (that to some extent was a paradigm shift for ECC designers) is that the approach based on optimizing the Hamming distance is that of playing the game against an intelligent, evil adversary, who erases (or toggles) precisely those bits that will give you trouble. In natural communication, the actual opponent is the more benign random noise occurring in nature. Look up fountain codes and (for an improvement) Raptor Codes for definitions and papers with probabilistic analysis (if you can stomach the gloating of a person, who insists calling bitwise XOR as a transform named after himself). share|improve this answer For the record: yours truly largely gave up coding theoretical research, when the focus shifted from algebraic/combinatorial/number theoretic methods to stochastics. I'm an algebraist at heart. –  Jyrki Lahtonen Mar 28 '13 at 12:58 Your block of 30 bits is probably too short for the rateless benefits to kick in. –  Jyrki Lahtonen Mar 28 '13 at 13:02 Does the Hamming bound apply to erasure codes? That would have been the easy answer, but I figured it would not be applicable. For example, as Zander suggests, $\{01,10\}$ can survice single-bit erasures, but it does't fit within the Hamming bound for correcting single-bit errors. –  Henning Makholm Mar 28 '13 at 13:42 @Henning: A code with minimum Hamming distance $d$ can correct $e$ erasures and $t$ errors, iff $d>2t+e$. A generic scheme is to make two errors-only decoding attempts, one with erasures filled in as 0s the other with 1s (and check afterwards that not too many corrections outside the error positions were made). Anyway, at one extreme we have errors only, and make the familiar requirement $d\ge 2t+1$. At the other we have erasures only, when we need $d>e$ to be guaranteed to succeed. –  Jyrki Lahtonen Mar 28 '13 at 15:13 x @Jyrki: Ah, of course, that makes sense. –  Henning Makholm Mar 28 '13 at 16:39 The way you describe it you are using a block code, seeking error free decoding and thus can check the Hamming bound. $$ A_2(n,d) = \frac{2^n}{\sum_{j=0}^{\lfloor(d-1)/2\rfloor}\binom{n}{j}} $$ Here you have $n=10$ and you want every pair of codewords to be distinguishable even if 5 bits are lost, so you need a minimum Hamming distance $d=6$, which bounds the number of distinct codewords at 18, so you won't be able to encode all 5-bit messages. With a longer message block it's even worse, $A_2(30,16)<2^{14}$. For $k<4$ the bound is not so tight, but as @HenningMakholm already showed you won't be able to construct such a code when $k>1$. For $k=1$ the code $\{01,10\}$ allows you to correct any one bit erasure, technically allowing you to successfully decode when the "bit error rate is 1/2" in the received message. share|improve this answer Your Answer
global_05_local_4_shard_00000656_processed.jsonl/107414
Take the 2-minute tour × May seem strange at first, but can you make mathematica change the value of 0 to 10 and 11 to 1 for all occurrences. Let me explain: I'm looping through a matrix and for each element, I want something to happen depending on the values in each element above, below, to the left and to the right. When you're at the first element however there is nothing to the left, or above, so instead I would like to use the values on either side of the matrix as if you'd curled the matrix back round onto itself, as shown below. X denotes what element you're looking at and then T,B,L & R, correspond to the cells at the Top, bottom, to the left & right respectively. Here's the code I wrote without thinking too much and it throws up an error because it asks for elements that do no exist. (e.g. "i-1" when i=1) {n, m} = RandomChoice[{image[[i + 1, j]], image[[i, j + 1]], image[[i - 1, j]], image[[i,j - 1]]} -> {{i + 1, j}, {i, j + 1}, {i - 1, j}, {i,j - 1}}]; newimage[[n, m]] = image[[i, j]]; , {j, columns}]; , {i, rows}]; So, without whacking loads of If statements in there, is there an elegant way to accomplish this? Hope I explained this half decently. share|improve this question Mod seems like a quick fix, but would be neat with some Periodic attribute to a SparseArray –  ssch Mar 31 '13 at 0:33 @ssch oh yeah Mod would be a quick and easy way around. thanks :) –  TomJS Mar 31 '13 at 1:12 @ssch hmm although not sure that helps me when i=1 as then i-1=0 and Mod doesn't help there –  TomJS Mar 31 '13 at 1:15 Check out the offset argument: Mod[0,10,1]==10 –  ssch Mar 31 '13 at 1:18 @ssch perfect!! –  TomJS Mar 31 '13 at 1:23 3 Answers 3 up vote 2 down vote accepted ImageFilter is also a good solution here, and you can create any filtering action you want. In outline, this would look something like: myFun[x_] := Module[{},(* Your code here*)]; ImageFilter[myFun, img, n] where myFun takes as input a (2n+1) by (2n+1) array of pixel/matrix values and calculates a single output. The ImageFilter command applies myFun to every (2n+1) by (2n+1) block in the image, and handles the edge conditions easily using the Padding option. share|improve this answer thanks, i'll try this out –  TomJS Mar 31 '13 at 13:05 Here's a Wolfram demo that uses this technique: demonstrations.wolfram.com/AdaptiveThresholdingOfImages The thing I remember when writing this demo is that it is very important to make sure that your function takes the proper inputs and gives back the proper outputs. Otherwise, all is lost... –  bill s Mar 31 '13 at 13:10 As a direct answer you could use replacement, e.g.: {-1, 0, 1, 10, 11, 12} /. {0 -> 10, 11 -> 1} {-1, 10, 1, 10, 1, 12} But more significantly this problem can likely be handled better by built-in functions that already make allowance for wrapping around, or by padding the array to start with. I am looking at this now. share|improve this answer I did think about padding, but then thought it could be fun (see the comment on other answer about turning an image into a many body gravitational problem) to wrap the matrix around on itself so there are no boundaries. –  TomJS Mar 31 '13 at 0:55 @Thomas I believe there is another question specifically about wrapping indicies and I believe that the answer there was to use Mod as ssch recommended in a comment. Is your code example actually representative of what you want to do? I'd be happy to explore other ways to approach this. –  Mr.Wizard Mar 31 '13 at 4:49 Yes, that is mu code so far, apart from a bit at the top to load an image and turn it into image data and a part at the bottom to display the new image. I'm happy with the Mod trick, seems to get the job done :) –  TomJS Mar 31 '13 at 13:03 Going by your choice of example (which is incomplete) and the variables used, I'm guessing you want to perform some operations on an image in which the output for each pixel depends on its immediate neighbours one city block apart. For this, you can use a CrossMatrix as a convolution kernel and ImageConvolve will handle the edges for you. (* {{0, 1, 0}, {1, 1, 1}, {0, 1, 0}} *) For example, here is what you get if you convolve Lena with a cross matrix: With[{lena = ExampleData[{"TestImage", "Lena"}]}, ImageConvolve[lena, CrossMatrix[1]]] This might be all that you need to proceed, but unless you provide more information, it's hard to say what exactly it is that you need. share|improve this answer What if the data isn't an image? –  Mr.Wizard Mar 31 '13 at 0:39 Apologies for the limited information, always a fine balance between under and over explaining. I've started toying with the idea of reading in black and white images into an array and then letting those images evolve under some kind of many-body problem, where the grayscale values of each pixel interact with each other and producing a video from it. For example pretend the grayscale value corresponds to mass and see how all the pixels of the original image form clusters etc. I dunno, experimenting with abstract mathematica art. But this looping problem is something that cropped up –  TomJS Mar 31 '13 at 0:52 @Mr.Wizard See the answer they chose to accept... –  rm -rf Mar 31 '13 at 13:55 Your Answer
global_05_local_4_shard_00000656_processed.jsonl/107415
Take the 2-minute tour × As one learns from a course on data structures, hash maps or dictionaries can be efficient when applied to appropriate tasks. I need a hash map in Mathematica and I've never found it. I'm scratching in one of my notebooks files, and I find myself still using the following code (Leonid Shifrin) to simulate this data structure. ClearAll[linkedList, toLinkedList, fromLinkedList, addToList, pop, emptyList]; SetAttributes[linkedList, HoldAllComplete]; toLinkedList[data_List] := Fold[linkedList, linkedList[], data]; fromLinkedList[ll_linkedList] := List @@ Flatten[ll, Infinity, linkedList]; addToList[ll_, value_] := linkedList[ll, value]; pop[ll_] := Last@ll; emptyList[] := linkedList[]; makeHash[] := Module[{hash}, hash[_] := emptyList[]; hash /: add[hash, key_, value_] := ash[key] = addToList[hash[key], value]; hash /: get[hash, key_] := fromLinkedList@hash[key]; I was wondering if any of you had needed a dictionary. If you have, I would like know how you implemented it. I'm interested to use a map<string, int>. share|improve this question Could you give us a formal or semiformal description of the semantics you require for you dictionary data structure? –  m_goldberg Sep 8 '13 at 23:56 There's also a prefix tree (trie) which was used to great effect in Boggle. –  rcollyer Sep 9 '13 at 13:19 You got it from Leonid Shifrin's answer here. I found it by searching for his name because it uses the same naming convention as his code over here. –  Pickett Sep 10 '13 at 19:38 3 Answers 3 Mathematica has no obvious hash-table structure but what most people forget is, that the DownValues of symbols, which means the simple, always-used function definitions, are implemented using hashing. Therefore, the most straightforward way to create a dictionary from string to integer is by making definitions: dict["hello"] = 1; dict["blub"] = 2; By setting a definition for dict[___] you can create a default rule, when the key is not in the dictionary. Another thing you should look into is Dispatch, which generates an optimized dispatch table representation of a list of rules. There hashing is used too and you can build your dictionary on a list of rules like {"hello" -> 1, "blub" -> 2, ... } Indeed, the documentation suggests, that's exactly this what is used to speed up function definitions: Lists of rules produced by assignments made with = and := are automatically optimized with dispatch tables when appropriate. As pointed out by Faysal in his comment, please review the following Q&A: Struct equivalent in Mathematica? share|improve this answer Ideas around such a dictionary structure here: mathematica.stackexchange.com/a/999/66 –  Faysal Aberkane Sep 9 '13 at 15:31 @FaysalAberkane Thanks, I was looking for exactly this because I was sure I have seen it around here but was unable to find it. I have included the reference in my answer. –  halirutan Sep 9 '13 at 19:40 Salvatore Mangano implements a dictionary data structure in his Mathematica Cookbook (ISBN: 978-0-596-52099-1, Copyright 2010 O'Reilly Media, Inc.). According to the copyright, I can share it with you ("answering a question by citing this book and quoting example code," as I am). For the same reasons as Halirutan mentions, more or less, he uses DownValues and relies on it, but as he says, you need more functionality to be able to work with the dictionary data structure efficiently. His functions are surely only meant to be a start, many other languages implement many more such functions. But his is a start to see how it can be done and to build on. I put them into a package. The usage messages are mine, but the code has only been touched to fix what I assume were type setting errors in the book: makeDictionary::usage = "makeDictionary[] initializes a new dictionary and returns an identifier."; destroyDictionary::usage = "destroyDictionary[dictionary] destroys a dictionary."; dictName::usage = "dictName[dictionary] returns the internal symbol used for storing data in a dictionary."; dictStore::usage = "dictStore[dictionary, key, value] stores a value in a dictionary using a key."; dictReplace::usage = "dictReplace[dictionary, key, value] works the same way as dictStore except that any duplicates in a dictionary will be removed."; dictRemove::usage = "dictRemove[dictionary, key, value] removes a value that is stored in a dictionary under a key."; dictLookup::usage = "dictLookup[dictionary, key] returns all values in a dictionary under a key."; dictHasKeyQ::usage = "dictHasKeyQ[dictionary, key] gives True if key in dictionary has not unset."; dictKeyEmptyQ::usage = "dictKeyEmptyQ[dictionary, key] gives True if the value of key in dictionary is an empty list."; dictKeys::usage = "dictKeys[dictionary] returns all keys in a dictionary."; dictKeyValuePairs::usage = "dictKeyValuePairs[dictionary] returns all key value pairs in a dictionary."; Dictionary[name_][prop_] := With[{d = dictLookup[Dictionary[name], prop]}, If[Length@d == 1, First@d, d]] End[ ] EndPackage[ ] A basic example: sweden = {"Gothenburg", "Stockholm", "Kalmar", "Halmstad"}; unitedstates = {"Clinton", "Terre Haute", "Springfield", "St. Louis"}; cities = makeDictionary[]; dictStore[cities, "Sweden", #] & /@ sweden; dictStore[cities, "United States", #] & /@ unitedstates; {"Sweden", "United States"} dictLookup[cities, "United States"] {"St. Louis", "Springfield", "Terre Haute", "Clinton"} I've added a shorthand for dictLookup, so that you can retrieve a property easily by just writing dictionary["prop"]. share|improve this answer As of Mathematica v10 the dictionary data structure is built-in. share|improve this answer Your Answer
global_05_local_4_shard_00000656_processed.jsonl/107418
Drexel dragonThe Math ForumDonate to the Math Forum Search All of the Math Forum: Math Forum » Discussions » sci.math.* » sci.math.num-analysis.independent Topic: derivative of discrete fourier transform interpolation Advanced Search Gareth Davies Posts: 2 Registered: 9/29/05 derivative of discrete fourier transform interpolation Posted: Sep 30, 2005 12:53 AM Hi everyone I'm trying to understand this problem which arises in a paper I've been reading. I'm quite new to fourier analyses, and I haven't been able to find anything in books/web which answers it. If x(s) is an (unknown) real function which is sampled at evenly spaced intervals denoted s0,s1,s2,s3...s(N-1), we get a known real sequence x0,x1,x2,...x(N-1). Now we make an interpolation of the original function. Define X0,X1,X2....X(N-1) as the discrete fourier transform of x0,x1...x(N-1). The Xj's are typically complex numbers. Now, I believe we can interpolate x(s) as x(s)= (1/N)*sum {n=0...(N-1)} Xn*exp(2i*pi*n*s/N) This is a real valued function thanks to the Xn's occurring in suitable conjugate pairs. My problem arises when trying to calculate dx/ds using this interpolation. Differentiating term by term, we find dx/ds(s)= (1/N^2)*2i*pi*sum {n=0...(N-1)} n*Xn*exp(2i*pi*n*s/N) Now, it seems to me that dx/ds is typically not real valued, even though x(s) is real valued. From this I have 2 questions 1. Is what I've said above correct?? 2. What is a better approach to calculating the derivatives. Gareth Davies [Privacy Policy] [Terms of Use] © Drexel University 1994-2014. All Rights Reserved.
global_05_local_4_shard_00000656_processed.jsonl/107419
Drexel dragonThe Math ForumDonate to the Math Forum The Math Forum Internet Mathematics Library Kreisimpressionen--nicht nur (!) mathematisch Visit this site: http://www.schulnetz-hamm.de/beisenkamp/projekte/uonline02/index.html Author:Monika Schwarze Description: A lesson plan in which students discover the equation of a circle, to describe an everyday object containing a circle or circles. The project also involves work with TI-89 calculators and Derive, as well as Power Point presentations. Work from the author's class is documented on the site as an example and invitation for others to send in their work as well. The showcase is available in English and French; the whole site is available in German. Levels: High School (9-12) Languages: English Resource Types: Graphics, Lesson Plans and Activities, General Software Miscellaneous Math Topics: Equations, Analytic Geometry Math Ed Topics: Computers [Privacy Policy] [Terms of Use] © 1994-2014 Drexel University. All rights reserved.
global_05_local_4_shard_00000656_processed.jsonl/107430
Take the 2-minute tour × I have several new-ish (2011+) Nissan cars that need key work (more keys/removing lost keys). All have the new proximity key (with the slide-out door key). From my searching it seems that the only way to do this is with special equipment, but it seems that the equipment is available to locksmiths. I don't want to go to the dealer or a locksmith and spend hundreds of dollars for each key. How might I go about finding this type of programming equipment? share|improve this question You need to post the exact make and model to get any help on programming. Some if not most cars don't need special equipment if you have at least one working key. Buying the programming equipment will be at least several hundred dollars. –  Larry Jul 27 '12 at 20:33 If you are in the US, Wal-mart can program some vehicle keys. You would have to check with them about which makes and models. –  Nick Jul 28 '12 at 15:17 Your Answer Browse other questions tagged or ask your own question.
global_05_local_4_shard_00000656_processed.jsonl/107441
Welcome! Log in or Register Farmscapes (PC) • image £22.25 Best Offer by: amazon.co.uk marketplace See more offers Genre: Puzzle / CD-ROM for Windows Vista / Windows 7 / Windows XP / Universal, suitable for all / ESRB Rating: Everyone / Release Date: 2011-06-10 / Published by Focus Multimedia Ltd • Sort by: * Prices may differ from that shown • Write a review > Write your reviews in your own words. 250 to 500 words Number of words: Number of words: Write your email adress here Write your email adress Your dooyooMiles Miles
global_05_local_4_shard_00000656_processed.jsonl/107451
The Late Movies: Orchestras Go Pop filed under: music Image credit:  I love when classical musicians play pop songs. It gives you a whole new perspective on the song itself minus the performing personality of the original artist. We Will Rock You By the Japanese orchestra Ooedo No Hikeshi. Smells Like Teen Spirit By the Ukulele Orchestra of Great Britain. The Final Countdown Performed by the Latvian cello trio Melo-M and the the Liepaja Symphony Orchestra. See more rock and roll cello performances in this post. Rude Boy Rihanna's hit song is performed by Aston. Whole Lotta Love The London Symphony Orchestra did a lot of Led Zeppelin covers. The Gnarls Barkley song is covered by violinist Jimmy Chaos. He did not use sheet music. Poker Face Dr. Bilderburger harmonizes with himself as a viola trio on split screens to perform Lady Gaga's hit. James Bond Theme With a little Mozart thrown in, performed by Igudesmen and Joo. More from mental_floss... July 16, 2010 - 6:00pm submit to reddit
global_05_local_4_shard_00000656_processed.jsonl/107481
It’s a different big cat type Power Ranger.  This one is yellow.  I think that’s the last one. Tiger?  This is the point where I stopped watching this with my siblings before school so I don’t really know.  If I remember correctly, they made some kind of movie about this guy.  I think they even played it in the theaters. Tyrannosaurus!  Take that, little sissy-girl pink ranger.  I’m not a neck-bearded-street-corner-white-van-driving creeper after all. Pterodactyl!  Why is it that I can only remember the corresponding dinosaur for the pink Power Ranger?  Now I feel like a creeper.  No, the other kind. It’s Morphin Time!  Many a Saturday wasted on this hybrid international silly show.  The green one was, as I recall, a villain in disguise at first.  I remember him being distinct because his robot was a dragon, which we all know is far superior to a T-rex. Rhinoceros!  Ocelot!  Manpanda! .. Blue Power Ranger? Mastadon!  Elephant!  Chupacabra! I don’t really remember what this guy was supposed to be.  It’s the black Power Ranger.
global_05_local_4_shard_00000656_processed.jsonl/107486
1. Skip to navigation 2. Skip to content 3. Skip to sidebar The Ludwig von Mises Institute Advancing Austrian Economics, Liberty, and Peace Advancing the scholarship of liberty in the tradition of the Austrian School Search Mises.org Literature Library The Freeman August 1954 The Freeman August 1954 Frank Chodorov The Freeman August 1954 Publication Information Alne World, Less One Hemisphere - Chesly Manly; The American Baby Bonus - Dean Russell; A Dilemma of Conservatives - William F. Buckley; From Amsterdam to Evanston - Edmund A Opitz; What College-If Any? - F. A. Harper; No Peace in Appeasement - William Henry Chamberlin; The "Liberals" of Smith - Aloise Heath; My Friend's Education - Frank Chodorov; Taxing the Goose that Lays Eggs - V. Orval Watts Updated 7/13/2009
global_05_local_4_shard_00000656_processed.jsonl/107487
Wanna date? I'm an educated person, but that date meant nothing to me. I had to google it to discover it was the dark day in history that both C.S Lewis Aldous Huxley died. (Oh - and some American politician too.) * May 10, 1838 MS: John Wilkes Booth is born * August 21, 1983 MS: Benigno Aquino is killed in Manila * June 1, 2001 MS: King Berenda is killed in Nepal * May 21, 2002 MS: Abdul Ghani Lone killed in Kashmir All of those were political assasinations which 'rocked the world' (at least as much as Kennedy's), but I suspect that without googling, most would be unrecognisable. Why should these dates be any less recognisable to an educated person than 22nd November 1963 ?Besides, if only educated people can enjoy the book, aren't you limiting sales a bit !? This is not home Jeopardy.. This isn't even a contest, pissing or otherwise. The CONTEXT of the comment was on a SYNOPSIS you don't have to explain 1066 or 11/22/63 in lurid detail. Overexplaining the obvious is a huge flaw in many starting out writers, and in synopses, it eats words. In case I do need to overexplain myself: some things are self explanatory. Rick said... Just to beat the obvious to death, it's a matter of the market. A US agent or editor will broadly know what educated Americans know, and is buying for the American market. If you write a book for the Philippines market, and send it to an agent/editor in Manila (however the industry works there), your synopsis can shorthand events that Filipino readers will know. If you were submitting a Philippines-themed book to the US market, I imagine you'd have to spell out at least briefly - "on the same day, President Begnino Aquino is assassinated, producing nationwide shock and uncertainty ..." Anonymous said... And to just be as snarky as possible, I'll point out that Benigno Aquina wasn't president of the Phillipines when he was killed. He was the leader of the opposition party, returning home after exile in the US. It was his wife, Corazon Aquino, who became the first democratically elected president in the Phillipines after Marcos was overthrown. The Gambino Crime Family said... Wow. For the first time in my entire life, I'm going to sound like a Republican, but gosh darn it, this an American blog! Do we really have to go once more into that fatal day in Dallas, the end of Camelot (blah blah blah etc etc) just to please those among us who hail from other shores? November 22, 1963 to Americans is akin to November 11, 1918 for the British. Or Easter 1916 for the Irish. It's historical shorthand which any editor over here should understand. :) Bernita said... Nov 11, 1918 wasn't only for the Brits. Jo Bourne said... I didn't know C.S. Lewis and Aldous Huxley died the same day as JFK. Tres weird. Simon Haynes said... Yup, CS Lewis got his from the grassy gnome. Remodeling Repartee said... As American editors become younger, the 11/22/63 date may well need some explaining. It may also give us a clue to Miss Snark's identity. It was a huge event for the youth of the time, now boomers. But I digress. The point about the lean and mean synopsis stands. An educated GenX'er, who will vouch that most folks my age and younger, schooled or not, will fail to recognize the date. Brady Westwater said... Seriously doubt that Miss Snark is a boomer. Waaaay too many clues in the other direction. But she is also likely not a 20 something; many of them would barely know who George Clooney is. David Isaak said... Huxley and Lewis indeed departed this mortal coil on the same day. And because of the Kennedy coverage, neither departure was much noted. Lewis, of course, was something of an invisible man at the time, but Huxley was at the height of controversy--and died with a decent dose of LSD in his bloodstream. Had it not been for JFK, I'm sure the press would have had features galore. Charity said... What’s interesting about all this historical context talk is recently I had an editor confuse the first Gulf War with the second in a manuscript I’d submitted, even with the date and historical context clearly stated in both the partial and the synopsis. Not only is the date there, but I mention the Berlin Wall crumbling, the invasion of Kuwait, and nary a word about weapons of mass destruction or George W. The editor wrote on the manuscript that a comment one character made to another (a father using a bit of humor re: Saddam to come to terms with the fact his daughter is going to war) would have to change because it was inaccurate. For today, it is. Back then, and in historical context, it isn’t. But she liked the story and writing well enough to recommend it to an editor at a different imprint and that was nice. Still, I wonder how those without a military background view the two wars. For me they’re very distinct and my personal iconic date is December 7, 1990, when I learned I’d be deploying to Saudi Arabia as part of 3rd Armor Division. Mac said... Sheesh you let that guy get off easily. How could you pass up the irony of someon who claims to be educated, while being clearly unable to spell 'assassinations' ? The overall gist, though, was simple - points that we regard as universal touchstones may not be as universal as we think. And yes, I did have to google those dates. They were equally obscure to me as November 22nd, 1963.
global_05_local_4_shard_00000656_processed.jsonl/107517
Bing Search Grateful Dead: So Far Grateful Dead: So Far Critics' Rating: User Rating: 1 rating Your Rating: Write a review Synopsis: This 55-minute "trip" into the music of the The Grateful Dead is unlike any other celluloid project the group has attempted. Most Dead movies involve an effort to capture the live experience of Dead culture and energy, but they fall considerably short for obvious reasons. Grateful Dead: So Far, is an attempt to make a more personal vision for the fan. Using advanced computer animation and other psychedelic tricks, you will hear and see interesting versions of Dead classics and some rare relics such ... Full Synopsis showtimes & tickets Search by location, title, or genre:
global_05_local_4_shard_00000656_processed.jsonl/107519
The YouMoz Blog Understanding the True Power of Language Using Google Analytics - Posted by to Analytics So true isn't it? Some of the finest marketing messages in the world are often made up of simple unimposing words. It's their simplicity that turns out to be their USP. Of course in the ever so intimidating online world it would take more than just a one liner to get "CONVERSIONS". Evolution is the key to success and exploring new business opportunities is an integral part of that process and one of the most crucial (and often neglected) aspects of this process is "Language". In fact the harsh reality is that there are very few internet marketing consultants who even think about language as part of their data analysis. In my earlier post I discussed how custom reports can assist one in identifying pitfalls in their website which resulted in loss of conversions and revenue. In this post I will discuss an advanced technique that can be used to find unexplored avenues to generate more revenue. Google analytics is one of the very few analytical tools that provide information related to language of a visitor, however before we get into the details of that report let us understand the kind of data that is presented in Google Analytics. According to Google Language report tell us - "Which languages do your visitors prefer to use and how do these groups of visitors differ with respect to site usage, conversions, and other metrics? This report captures the preferred language that visitors have configured on their computers. Understanding who your visitors are is crucial to developing the right content and optimizing your marketing spend. Many times, geo-location is not enough. Many countries have diverse populations speaking different languages which present important market targeting opportunities" Seems fine at the beginning but one really needs to read between the lines in order to understand a major short coming of this report. Note the line "This report captures the preferred language that visitors have configured on their computers." In plain vanilla words it means that the language data is dependent on the preferred language setting of the computer and not the visitor. So for instance if a visitor visits a website where the default language of his PC is French but he has no issues with English language the visit will still be recorded in Google Analytics Language report under "Fr". Does this mean that I cannot get the actual language data? Well the answer is Yes and No Yes because we can get the language data and No because that data will be incomplete. I am sure that after reading this line lot of questions must be running through your head but trust me, by the end of this post all your questions will be answered (or at least that's my hope ). Let's look at the Yes aspect of the answer – In order to understand the Yes aspect we need to first understand our objective. Our objective is to track the preferred language of the user and not the computer. How do we go about it? The answer lies in two of the most underrated concepts of Google Analytics – Hostnames & User Defined Variable Hostnames – According to Google "From which hosts are people visiting your site? Hostnames sometimes provide insight into organizations that are interested in what you offer" But how will host name help me in this case? Let's go back to our objective, if you read it carefully we are actually looking for visitors who translate a given page. Hostnames will tell me which online services were used in order to translate a page and to what language was the page translated to. User Defined – According to Google "This report allows you to compare visitors from custom segments that you have defined. You define these segments by calling the utm_setvar function in your website code. For example, if visitors fill out a form on your site in which they provide a professional title (such as "manager", "technical specialist", "marketer"), you can call utm_setvar to capture and store their selections in the user defined variable. This report allows you to compare the visitor segments you have captured." In simple words I will create my own variable and pull the language data into that variable. Now that our goals and objectives are well defined let's generate the report. Step 1 – Identify the Hostname One need not be an Einstein to realize that one of the most common translation services used is Google Translate.  Google Translate To reach the host name data navigate through to Visitors >> Network Properties >> Hostnames (Old Interface) PS – For the new interface navigate through to Visitors >> Technology >> Network >>Hostname Step 2 – Extract the data Now we create a user defined variable that will extract the translation services used to translate the pages. In order to do that one needs to be well acquainted with Advanced Filters and Regular Expressions We move ahead and create an advanced filter where we extract the required data from the request URI of the hostname and store that value in our user defined variable. Of course it's needless to say that we should first create a new profile and then apply the filters to that profile. Advanced Filters We will now wait for Google Analytics to work its magic and after a couple of days study the data that is obtained User Defined Report Log in to Google Analytics and navigate through to the user defined section (Visitors >> User Defined) and Voilà there it is. We have successfully extracted language data. Let's understand how to interpret this data, means that the visitors translated the page to Russian language using, tells me that the visitors translated the page to Greek language and so on. Using metrics like bounce rate, visits and average time on page I can analyze basic user behavior. If it's an E-commerce website I can also add metrics like revenue and analyze the data – Now we look at the No aspect of our answer – The data that we get from the user defined variable is incomplete, the reason being that we are collecting data only from the translation services offered by Google search engine. But there are other ways in which a user can translate a page. For example a user can translate a page using the browser plugin or add on as shown in the snapshot below – Plug In These Addons use their own APIs to translate the data of a particular page i.e. the host is and currently Google Analytics does not track these hosts. Thus we lose out on the language data of the visitors who use these addons. In such situations we go by the law of safe averages. I look into the default language report of Google Analytics and take 10% value of the visits for languages shown and add that data to the user defined report. For example if the default language report shows 2000 visits for es-es (Spain), I will take 10% of the visits i.e. 200 and add it to the number of visits shown by the user defined variable for Spain. The logic being that I am assuming at least 10% of the people whose preferred language is Spanish will translate a given page. This way I generate an Excel sheet with all the required metrics – Data Sheet Of course the numbers will not convey the right picture and we need to look at the scheme of things from a broader perspective. If I compare the revenue distribution between English and Non English users I can see that almost 18% of my revenue comes from people who do not prefer English as their language. Two important conclusions can be drawn from this analysis - • From usability point of view the website is performing well, despite the fact that the website is in English, people are translating the page and converting • Online translation services are not very reliable and hence I need to provide options to users where they can translate the page to their desired language which would eventually result into more conversions Of course the second point would result in a lot of investment but I would like to believe that the numbers are promising enough for me to go ahead and implement the changes. We should also keep in mind that it's going to be a onetime investment. Besides if I can change the URL as well and modify the content to avoid any duplicate content issues and specify the Geo Location using WMT it also provides me with an opportunity to expand my business to different Geo locations . Just one of the million ways in which Google Analytics can help make informed business decisions. Hope this post was helpful, feel free to leave comments or thoughts that you might have. Do you like this post? Get your social on • Ajay Yadav Inbound Marketer Lovely presentation!! I am agreed by your fact that by GA..we can get the data about the configured lanuguage on the visitors computers as well as the data about the visitor preferred language to view a website. By this we get to know that only English people are not our potential target visitor to consider about but there are other multilingual people as well. Would be waiting for more analytics tips from you.. thanks a Lot! Ajay Yadav Inbound Marketer edited 2011-10-12T23:02:05-07:00 • Hiren Vaghela Wonderful Article again Sajeet, GA is quite useful in many ways and you shared a real time example again which is plus point for sure. Through this example we can think how GA is impact to our business. We can identify the visitors by their language and we can utilize this report for our business plan. One thing i like the most about the article that you explain the example in both circumstance whether people have translate their page with Addon and without the plugins. Great use of GA and loved this article too. Thumbs up for you..! • SajeetNair Hey Hiren your feedback as usual is much appreciated. Thanks again. - Sajeet • Hanieh I read your post and it is realy intresting. I'm new with Google Analytics, and  I have a problem with my Language Report of Google Analytics. Because I have an important "Language not set" in my report and I'm wondering why this is happening. I think This report is base on user browser language setting, and I think every browser has a default language, so why Google Analytics is telling me "not set". Please help me and thanks in advance, • Safor web Design great post Sajeet... so interesting and awesome • Pro William Craig Very good analysis with the Google Translate. Thanks for sharing this Analytics Data! • Pro Keith Paulin I'm just researching for a presentation to our team on "How to get the best of of Google Analytics data analysis..." - sorry, but I'm going to grab most of the above and incorporate (with full attribution of course :)) - great presentation. Well done... • jasikamarshel Best Article Sajeet, Nice information about GA,Translation .I like your brife description about hostnames and userdefines.GA helps you in many way you get whole report about your site and you get the idea how you improve yor business .Once again i tell you sajeet best article. • Hiren Vaghela You most welcome Sajeet. GA is ethical tool and i love to see each and every post related to it. Looking for more GA articles from you..:) • John Rampton Thanks for the great post... Keep them up.  I really enjoy all of them that you've put together.  I really enjoyed your last one too.  Do you find that looking at "Hostnames"give you much value? • SajeetNair • Scott Bartell Very informative post. GA scares me sometimes because it contains so much information and it's unclear what it all means. Without looking fully into what GA truly measures (such as the preferred language that visitors have configured on their computers) the data might be misinterpreted. Thanks for the unique insight. • SajeetNair Thanks Scott, GA truly is an invaluable source and can really help one to expand their Business.
global_05_local_4_shard_00000656_processed.jsonl/107528
Export (0) Print Expand All CCmdTarget Class  The base class for the Microsoft Foundation Class Library message-map architecture. class CCmdTarget : public CObject A message map routes commands or messages to the member functions you write to handle them. (A command is a message from a menu item, command button, or accelerator key.) Key framework classes derived from CCmdTarget include CView, CWinApp, CDocument, CWnd, and CFrameWnd. If you intend for a new class to handle messages, derive the class from one of these CCmdTarget-derived classes. You will rarely derive a class from CCmdTarget directly. For an overview of command targets and OnCmdMsg routing, see Command Targets, Command Routing, and Mapping Messages. CCmdTarget includes member functions that handle the display of an hourglass cursor. Display the hourglass cursor when you expect a command to take a noticeable time interval to execute. Dispatch maps, similar to message maps, are used to expose OLE automation IDispatch functionality. By exposing this interface, other applications (such as Visual Basic) can call into your application. Header: afxwin.h Community Additions © 2014 Microsoft
global_05_local_4_shard_00000656_processed.jsonl/107529
MSpace - DSpace at UofM > Browsing by Author Brown, Nicholas, or enter first few letters:    Showing results 1 to 1 of 1 Issue DateTitleAuthor(s) 1977The role of outdoor recreation in regional development : a study of Hecla Provincial ParkBrown, Nicholas, Showing results 1 to 1 of 1
global_05_local_4_shard_00000656_processed.jsonl/107570
Wednesday, October 03, 2007 The winged migration of Nanothoughts 1.0 It's time to move on to a stable domain name and some more customizable blogging software. Please update your bookmarks and blogrolls to: The new home of Nanothoughts 1.0 This site will remain up and all of its contents have been migrated to as well. Thanks for reading our brain droppings. Team Nanothoughts Wednesday, September 26, 2007 Wretched Hives of Scum and Villainy, part VI For Part V of Wretched Hives of Scum and Villainy, click here. One of the casinos that I play at in the Reno area has a tropical rainforest theme. Now, I'm used to seeing all sorts of garish decor around casinos, but this one is pretty bad even by casino standards. They have a "Storm Bar" or something which is supposed to remind people of rainforest storms. Every half hour or so, thunder plays over the loudspeakers, the lights around the bar flash, and water comes pouring down into a large(maybe 10' by 20'), flat rectangular pool a few inches deep. Unfortunately, the water nozzles are all off of a single long pipe running the length of the pool, suspended seven feet above. This makes the entire array look like a giant stadium-style urinal, which I'm sure is the kind of image that encourage people to order expensive fruity drinks. Far more annoying, however, is the presence of a supposed "bird of paradise" that zooms around the casino regularly. This mechanical contraption(which looks more like a badly painted flying chicken) is suspended from a rail track on the ceiling and emits ear-piercing squawks. The bird also drops chips and cash every so often, giving the impression that the bird is shitting money. I put in play only because it has a pretty good comps and cashback deal, but after a couple hours of listening to that infernal machine, I wanted to ask the casino staff whether I could spend some comps for the use of a 12-gauge shotgun and a box of shells. Blowing that thing out of the sky would've been as good as hitting four of a kind. Thursday, September 20, 2007 Wretched Hives of Scum and Villainy, part 5. AKA, I drive them crazy(ooh! ooh!), like no one else. For Part 4 of Wretched Hives of Scum and Villainy, click here. My housing situation got all sorts of screwed up this summer, since the house I lived in was breaking up due to 5 out of the 7 occupants moving in with significant others. I found a place for this upcoming year, but the problem was that my old lease ended 8/31, but the new place wouldn't be ready for movein until 9/23. Out of the people who offered crash space, only three households didn't have furry pets- and I'm really allergic to furry animals. I didn't want to stay a week at each place- talk about an easy way to get every one of my friends annoyed with me. I figure for pretty much anybody, three days is enough to get one's hosts mildly annoyed. The obvious solution, then, was to fly to Reno(tickets essentially paid for by casinos) to stay for free at the resorts for 3 weeks. So I'm back in the Biggest Shitty Little City in the World for a bit, playing some video poker, hanging out with Kyle, and trying to put up with the kind of tourist who comes to Nevada to die. When taking advantage of a small casino, which has very few machines, I have to put up with whatever hoser sits down next to me when I'm at the advantage machine. However, when at a large casino playing video poker, I didn't want anyone next to me so I could surreptitiously refer to a strategy cheatsheet every so often on some of the more counterintuitive games(like Double Double Bonus, see previous WHOSAV installments). Plus some of the other people in the high-limit section were chain smokers. I hate smoke. It therefore became necessary for me to find some way to discourage people from sitting next to, or even near, the machine that I was playing- and spreading stuff around like a snack and a water bottle wouldn't do it. The solution, as it turns out, was for me to start singing. Now, I am at best an awful singer. At worst, I probably make William Hung sound professional. In fact, I often don't sing along to music because the sound of my own voice tends to disrupt my enjoyment of the music. And given that the casino playlists slant heavily towards the 80s, there is plenty to enjoy. After a few minutes of me singing The Logical Song, the two other people nearby found other video poker machines to play. By the time the next song- American Pie- started, someone else had come into high-limit slots...and promptly veered away from where I was playing. Even when a preannounced casino ad came over the intercom, breaking up the music, I continued singing. It is testament to how many Nerd Camp dances I've been to that when the ad ended, I was still perfectly chronologically synced. Even after I stopped singing, the fear of me starting up again seems to have kept people away. In Your Eyes came on about half an hour later. I couldn't stop cracking up though- I kept remembering some old cow orkers of mine, Logan and Christopher, singing "in your thighs" at the chorus. Speaking of cracking up, Roger needs to post the LOLcat he made of the Peppermill, the World's Gayest Casino. [Ed. - Ask and ye shall receive.] For Part 6 of Wretched Hives of Scum and Villainy, click here. Tuesday, September 11, 2007 Lyrics to "Show Respect to Michael Jackson" by James Kochalka Superstar "Show Respect to Michael Jackson" Show Respect to Michael Jackson He's been through a lot And What do you want? Show Respect to Michael Jackson He's been through a lot And What do you want? No one can dance like Michael can! No one can sing like Michael can! Lay off Michael, he's my man. Remember when the whole world loved him? Show Respect to Michael Jackson He's been through a lot And What do you want? Show Respect to Michael Jackson He's been through a lot And What do you want? No one can dance like Michael can! No one can sing like Michael can! Lay off Michael, he's my man. Remember when the whole world loved him? Remember when Michael Jackson.... mmmm hmmmm mmmmm Remember when Michael Jackson.... mmmm hmmmm mmmmm Sunday, September 09, 2007 Transcript of Osama Bin Laden's September 2007 tape Transcript of Osama Bin Laden's September 2007 tape. Now he just wants us to end deomcracy and taxes. At least he's goal oriented! To paraphrase Ben Franklin: "In this world nothing is certain but death and Zakaat." "I will come back to reply to this question after raising another question, which is:" "I tell you: its parable is the parable of a man who owns a shop and hires a worker and tells him, "Sell and give me the money," but he makes sales and give the money to someone other than the owner. So who of you would approve of that?" "And here I say: it would benefit you to listen to the poignant messages of your soldiers in Iraq, who are paying - with their blood, nerves and scattered limbs - the price for these sorts of irresponsible statements. Among them is the eloquent message of Joshua which he sent by way of the media, in which he wipes the tears from his eyes and describes American politicians in harsh terms and invites them to join him there for a few days. Perhaps his message will find in you an attentive ear so you can rescue him and more than 150,000 of your sons there who are tasting the two bitterest things: " "So do you feel the greatness of their sufferings?" Saturday, September 08, 2007 Google Earth Flight around The Great Pyramid of Khufu and the Sphinx A nice little flight around the Great Pyramid of Khufu/Cheops. I'm not sure that a flight like this would even be possible in real life. Music: "Mandarin" by Peramides I made this on Ubuntu Feisty Fawn using Google Earth, xvidcap, and avidemux. Monday, September 03, 2007 Thursday, August 30, 2007 Sitting US Senators visiting Iraq a few months before the invasion I was reading an old issue of GQ on the can the other day, and a passge in this article, JOE BIDEN CAN’T SHUT UP…, caught my eye. This is Joe Biden’s sixth trip to Iraq. The first time, three months before the war began, he and Chuck Hagel were smuggled across the Turkish border to take the pulse of Saddam Hussein’s greatest victims, the Kurds. Biden was already convinced that the dictator should be ousted. He had called Saddam “a certifiable maniac” in a speech the day before September 11. A month later, he called for a White House-led coalition to “tighten the noose around Saddam Hussein’s neck so that when he does genuinely step out of line next time, we will have the ability to move in with or without others, but with the support of the rest of the world, like we’re doing in Afghanistan.” But while feasting on kebabs and pomegranates with Kurdish leaders, Biden learned “that left to their own devices, they were doing pretty damn well. And they were worried that things might spin apart [after an invasion] and wanted to know, Are you guys gonna stay, or are you gonna do what the other Bush did to us?” Maybe others already knew about this, but the thought of sitting US Senators clandestinely visiting Iraq a few months before the war kinda blows my mind. I'm not naive and realize that we've had covert military ops there for the better part of two decades at least, but sitting US Congressmen? That surprised me. Wednesday, August 22, 2007 Donkey Kong loves bathroom stalls Somebody was telling me about this, a new documentary about Donkey Kong. Check it out if you get a chance. Also, be sure to check out I Love Bathroom Stalls. Tuesday, June 26, 2007 Die Hard by GuyzNite Feel good song of the year. Hands down. Yippee-ki-yay, motherfucker! UPDATE: J.p. said... For the love of god, if you're going to post music that awful you should put up some kind of warning. Hey, J.p., I believe my blockquote of "Yippee-ki-yay, motherfucker!" should've been sufficient warning. It's POPULAR culture, it's not Jenufa. You're probably the same J.p. that didn't appreciate Armageddon for all it's popcorny goodness. Yet another Bruce Willis saves the world film. Don't be hating on my boy Bruce. Seriously, Die Hard is in my all time top 10 alongside Last Year at Marienbad and Groundhog Day. And all three of those examples are in for very very different reasons. Next, I bet you'll tell me that Transformers sucks... Monday, June 18, 2007 Italo disco...was there a scarier music scene in the 80s? I may have posted about the hilarity of Silicon Dream's "Andromeda" earlier. Here's Wish Key's "Orient Express", one of the biggest Italo Disco hits of the 80s. I'm not quite sure what's with this video- it looks like they shot it in the guy's basement with the idea that adding a disco ball would automatically make things look cool. Catchy synth hooks though.
global_05_local_4_shard_00000656_processed.jsonl/107579
søk opp hvilket som helst ord, som bae: the act of having sex with the hole in ones neck caused from smoking too much and getting throat cancer I was throasting that old hag from the cancer center. av Tim Hernandez 12. februar 2008 Words related to Throasting hole penis sex throat thrusting
global_05_local_4_shard_00000656_processed.jsonl/107585
Copyright © 1994 by . All rights reserved Next Contents Previous 4.4. Population III Remnants Even if a large fraction of the baryons are processed through Population III stars, this does not necessarily guarantee dark matter production. However, most stars ultimately produce dark remnants and we now list the various possibilities. LOW MASS OBJECTS    We will see in Section 9.3 that stars in the range 0.08-0.8 Msun (which are still on the main-sequence) are probably excluded from explaining any of the dark matter problems. However, objects in the range 0.001-0.08 Msun would never burn hydrogen and would certainly be dim enough to escape detection. [Note that Salpeter (1993) argues that the critical mass for hydrogen burning could be higher for Population III stars because slow protostellar accretion could lead to degenerate cores with lower central temperatures than usual.] Such brown dwarfs (BDs) represent a balance between gravity and degeneracy pressure. Those above 0.01 Msun could still burn deuterium; Shu et al (1987) have argued that this may represent a lower limit to a BD's mass but this conclusion is not definite. The evidence for stars in the brown dwarf mass range (e.g. Simons & Becklin 1992, Steele et al 1993) is controversial, but this merely reflects the fact that they are hard to find (Stevenson 1991) and it would be very surprising if the IMF happened to cut off just above 0.08 Msun. Most searches have focused on BDs in binary systems with M-dwarfs; however, we already know that the BDs making up the dark matter could not be in such binaries else the M-dwarfs would have more than the dark density (cf McDonald & Clarke 1993). Objects below 0.001 Msun are held together by intermolecular rather than gravitational forces (i.e. they have atomic density) and may be described as snowballs. We will see in Section 10.1 that such objects are unlikely to constitute the dark matter. INTERMEDIATE MASS OBJECTS    Stars in the range 0.8-4 Msun would leave white dwarf remnants, while those between 8 Msun and some mass MBH would leave neutron stars remnants. In either case, the remnants would eventually cool and become dark. (Stars in the mass range 4-8 Msun could be disrupted entirely during their carbon-burning stage.) Stars more massive than MBH could evolve to black holes: the value of MBH is uncertain but it may be as high as 50 Msun (Schild & Maeder 1985) or as low as 25 Msun (Maeder 1992). Only intermediate mass remnants definitely form at the present epoch; this is why some theorists favor them as dark matter candidates (Silk 1991, 1992, 1993). However, we will see in Section 5.2 that their nucleosynthetic consequences may make them poor dark matter candidates. VERY MASSIVE OBJECTS    Stars in the mass range above 100 Msun, which are termed "Very Massive Objects" or VMOs, would experience the pair-instability during their oxygen-burning phase (Fowler & Hoyle 1964). This would lead to disruption below some mass Mc but complete collapse above it (Woosley & Weaver 1982, Ober et al 1983, Bond et al 1984). VMO black holes may therefore be more plausible dark matter candidates than ordinary stellar black holes. In the absence of rotation, Mc approx 200Msun; however, Mc could be as high as 2 × 104 Msun if rotation were maximal (Glatzel et al 1985). Note that stars with an initial mass above 100 Msun are radiation-dominated and therefore unstable to pulsations during hydrogen burning. These pulsations would lead to considerable mass loss but are unlikely to be completely disruptive. Nevertheless there is no evidence that VMOs form at the present epoch, so they are invoked specifically to explain dark matter. SUPERMASSIVE OBJECTS    Stars larger than 105 Msun are termed "Supermassive Objects" or SMOs. If they are metal-free, they would collapse directly to black holes on a timescale 104(M / 105 Msun)-1 y before any nuclear burning (Fowler 1966). They would therefore have no nucleosynthetic consequences, although they could explode in some mass range above 105 Msun if they had nonzero metallicity (Fricke 1973, Fuller et al 1986). SMOs would also generate very little radiation, emitting only 10-11 of their rest-mass energy in photons. The existence of SMOs is rather less speculative than that of VMOs since supermassive black holes are thought to reside in some galactic nuclei and to power quasars (Blandford & Rees 1991). However, these would only have a tiny cosmological density. Note that Population III stars are likely to span a range of masses, so the remnants need not be confined to one of the candidates listed above. From the point of view of the dark matter problem, one is mainly interested in where most of the mass resides. However, the other components could also have important observational consequences, as in the Salpeter & Wasserman (1993) scenario, where the small number of neutron stars is invoked to explain gamma-ray bursts. Next Contents Previous
global_05_local_4_shard_00000656_processed.jsonl/107591
I like to organize my queue all the time so it’s not all one wave of the same type of posts or one wave of reblogging the same tumblr and I just checked it right now and it was like, tons and tons of shoe reblogs So I mixed it up and tossed some other stuff in the mix. so bare with me, not girly people. it’ll basically be shoe post random post shoe post random post.
global_05_local_4_shard_00000656_processed.jsonl/107625
Heavy boozers live longer than abstainers - Gin Lane by Hogarth - WikiCommunists A report in a respected medical journal claims that abstaining from alcohol means you're likely to die sooner than really heavy boozers. The journal, Alcoholism: Clinical and Experimental Research - which we get for purely academic purposes, says that those who are completely off the wagon will shuffle off their mortal coil faster than heavy drinkers. The report suggests that people who don't drink are from less wealthy castes because booze is expensive and they suffer more stress because of that. The study, reporrted in Time magazine, followed 1,824 people over a period of 20 years, and concluded that during those two decades, death rates were highest for abstainers, second highest for heavy drinkers and lowest for so-called moderate drinkers. During the period, 69 percent of abstainers died, 60 percent of heavy drinkers died, while only 41 percent of moderate drinkers expired. Most of those in the study were men. Apparently abstainers don't have as much fun as drinkers and that makes them depressed.
global_05_local_4_shard_00000656_processed.jsonl/107632
Forum » Topic: Comedy Gigs The NewsBiscuit Community en-US Tue, 29 Jul 2014 11:10:41 +0000 <![CDATA[Search]]> q shitsu_tonka on "Comedy Gigs" Mon, 05 Jul 2010 22:44:19 +0000 shitsu_tonka 21347@ <p>Plymouth gig had its moments but there was too much clumsy 'Hey, so it's July 4th...' followed by some not at all amusing racism that I'm guessing was improvised. Yes, Bush was stupid he's also no longer President and just saying he's dumb isn't funny. Apparently some Americans are quite fat too, who knew?</p> <p>Good news about Ed Byrne - he's great. </p> Stan Laurel on "Comedy Gigs" Mon, 05 Jul 2010 21:02:45 +0000 Stan Laurel 21312@ <p>Shits, how was the Plymouth gig?</p> <p>Just got news that Ed Byrne is playing our mid Devon Comedy Hall at the beginning of August. He played here a couple of years ago - quite brilliant. </p> shitsu_tonka on "Comedy Gigs" Fri, 02 Jul 2010 20:52:18 +0000 shitsu_tonka 20839@ <p>Good link, Zadok. Enjoyed reading it,thanks. </p> Svendo on "Comedy Gigs" Fri, 02 Jul 2010 12:39:25 +0000 Svendo 20780@ <p>Not got any gigs planned to go to but I will be performing myself in a few local places (well local to me). I think I'll probably go to my local comedy club and check out some of the other guys that are just starting out.</p> <p>I seem to have been off the ball on booking tickets for stuff as I didnt book tickets for my yearly Ross Noble top-up in Newcastle. </p> Zadok the second on "Comedy Gigs" Fri, 02 Jul 2010 12:08:50 +0000 Zadok the second 20770@ <p>For anyone interested in how Lembit Opik's comedy career is panning out, Richard Herring's thoughts are <a href="">here</a>. </p> shitsu_tonka on "Comedy Gigs" Thu, 01 Jul 2010 18:49:55 +0000 shitsu_tonka 20628@ <p>Hell of a line-up, isn't it?<br /> <a href="">Here's the info.</a> </p> The All New Jeni B on "Comedy Gigs" Thu, 01 Jul 2010 18:49:44 +0000 The All New Jeni B 20627@ <p>This summer, the comic offerings I will most likely be sampling would be Mr B in shorts.</p> <p>Imagine a very tall stork in khaki shorts and you're getting there. </p> QorbeQ on "Comedy Gigs" Thu, 01 Jul 2010 18:32:23 +0000 QorbeQ 20626@ <p>Oh my word, there's an Izzard/Hunter/Moran gig?</p> <p>Why was I not informed!?! </p> shitsu_tonka on "Comedy Gigs" Thu, 01 Jul 2010 18:11:55 +0000 shitsu_tonka 20625@ <p>Am all of a joyous squirm as I've just got tickets for Doug Stanhope's London run in September and am currently raising a posse to attend the Eddie Izzard/Reginald D. Hunter/Dylan Moran uber-gig later in the same month.</p> <p>This Sunday night will be in Plymouth watching some new comedians and people I've never heard of and will do it again a couple of weeks later.</p> <p>Am also taking my mum to see Hairspray the musical which is billed as a comedy and yet has Brian Conley and Les Dennis in the cast so I can't see how that's going to work.</p> <p>What live summer comic delights are other Biscuits sampling? </p>
global_05_local_4_shard_00000656_processed.jsonl/107648
Soka Gakkai Spirit Archive "Shakubuku Song" Lyrics by Unknown Music by Unknown (To the tune of "I've been working on the Railroad") I've been doing Shakubuku, all the live long day. I've been chanting Daimoku, to get me on my way. The eyes of the world are upon us, and we shall never stray. Can't you hear the members calling? There's happiness on the way. [repeat 2X] Back to the Index These lyrics have been made available to facilitate the archival of Soka Gakkai spirit songs and materials for members.  Please realize that this is a work in progress, and as such, will have minor errors and omissions. Any assistance in adding sheet music or new song lyrics is greatly appreciated. This web site is neither affiliated with nor sanctioned by any organization affiliated with Soka Gakkai International.   Only Will Kallander is responsible for content found on this site, and any questions, comments, or suggestions should be sent directly to him.  Any reports of typos or other errors are greatly appreciated.  See the colophon for past contributors. BuddhismLotus SutraGosho IndexGohonzon IndexMobile Study AidsSite Search Designed by Will Kallander
global_05_local_4_shard_00000656_processed.jsonl/107653
Real and False Crusading Charters Thumbing through Crusades material, I found an interesting ancestral document concerning two figures, one of which at least has a large known modern descendancy (in my case, descending through Despenser, Wentworth, Waldegrave, Spring, Wright, and Derehaugh, to colonial Massachusetts). It is a contract, dated 20 July 1270, by which Sir Robert Tibetot and his brother-in-law Sir Payn de Chaworth agree to accompany the Lord Edward on crusade, "with five knights apiece, in return for shipping, water, and a fee of 100 marks for each knight." This Sir Robert Tibetot, with wife Ava de Chaworth (sister of Payn de Chaworth), was father of Payn de Tibetot, 1st Baron Tibetot. Anyhow, the deed (with seals) is photographed in the Oxford Illustrated History of the Crusades, ed. Jonathan Riley-Smith (Oxford, 1995), p. 63. The text of the charter is not given in this book, and unfortunately the text is not easily legible in the photograph. Nevertheless one can pick out the names and certainly the engrailed or lozengy saltire of the Tibetot arms on smaller seal at lower left (the larger, not legible in the photo, is presumably for Chaworth). The charter is in the British Library, MS Additamenta:Chartae 19829. I recommend this book, which is about $20 in paperback. It is not a blow-by-blow history, rather a series of excellent general essays on various aspects of the Crusades. [click to enlarge] This contrasts interestingly with a fake charter, of which I'm also fond: one of the (unfortunately not famous enough) several hundred forged charters made for families desiring to have their ancestors' name and arms inscribed as crusaders in the Salles des Croisades, a suite of rooms built into the palace of Versailles in the late 1830s, at the initiative of King Louis-Philippe, to commemorate the glories of the French on crusade. The rooms were filled not only with historical paintings of moments in that history (for which see my thumbnail gallery at Brown University) but also hung with coats of arms of Crusaders. In addition to the great historical figures of the Crusades, courtiers of the July Monarchy were eager to set themselves apart from the crowd by proving a personal connection to crusading (and consequently the antiquity and nobility of their particular family). A vibrant business grew up in forging (on authentic scraps of old parchment) charters to place some perhaps entirely fictitious family founder at, say, the siege of Acre (1191) or Damietta (1217), or the crusade of Saint Louis (1250). A particularly elaborate (and expensive) forgery—it cost 500 Francs when forged to order in 1843—was that for the Chasteney family, placing one otherwise unattested chef de famille, Jean de Chasteney, at the siege of Acre; it also attests his heraldry since a goblet featuring a cock is explicitly mentioned in the charter (perhaps the alleged descendant actually possessed such a cup and requested that its provenance be written into the charter as well). The charter, with a tiny quitclaim pinned to the front, is preserved as Bibliothèque Nationale, MS Lat. 17803A: Although at least one well-placed official who was also a paleographer suspected the hundreds of charters appearing at this time to be forgeries, no public accusations were made until long after the Salles des Croisades had become a dead issue, after the Franco-Prussian War. And not until the mid twentieth century did denunciations of these forgeries diffuse through crusading literature. The story of these ambitious forgeries (genealogical forgeries, of a kind) is most fully told by Robert-Henri Bautier, "La collection de chartes de croisade dite 'Collection Courtois'," Comptes-rendus des séances de l'Academie des Inscriptions et Belles Lettres (1956), 382-86; and "Forgeries et Falsifications de documents par une officine généalogique au milieu du XIXe siècle," Bibliothèque de l'Ecole des Chartes 142 (1974), 91-2; see also David Abulafia, "Invented Italians in the Courtois Forgeries," in Crusade and Settlement: papers read at the First Conference of the Society for the Study of the Crusades and the Latin East and presented to R.C. Smail, ed. P. W. Edbury (Cardiff, 1975), pp. 135-47. to medievalia to nlt home page rev 03/02/2007
global_05_local_4_shard_00000656_processed.jsonl/107662
Thursday, August 17, 2006 Thank god it's not just me! From Johnen Vasquez's Tickle Me Hellmo I used to love Sesame Street and even beyond I'm not as ashamed to admit as I should be but I admit since the introduction of Elmo I've watched the show very little. I was never really sure why but now Joel Stein has finally put my feelings into words. Check out one of his recent columns on the topic: Elmo is an Evildoer by Joel Stein No comments:
global_05_local_4_shard_00000656_processed.jsonl/107696
← Q and A - Adventures in Democracy ridelo's Avatar Jump to comment 16 by ridelo Oh, what was he strident again! Can't bear it any more. Have to plug my ears. Mon, 08 Mar 2010 17:14:00 UTC | #447441
global_05_local_4_shard_00000656_processed.jsonl/107697
← Double-checking Dawkins pzmyers's Avatar Jump to comment 27 by pzmyers This was on an Apple II, not a Mac, and it really isn't at all surprising. Back in those days (and I remember them well!), if you were doing any programming at all on 8-bit systems with memory mapped I/O, you got to know the locations of the various I/O sites fairly well. I couldn't do it any more, but once upon a time I also had them all memorized -- the places you could read to get the last keystroke, the routine to read the joystick port (which was tricky -- you had to strobe a write-only location, then read until it hit 0 again), and then there were all the fun and really dangerous addresses that managed the floppy disk controller... Anyway, this was just a factoid that tells you Dawkins was an informed computer user of his time. Sun, 02 Dec 2007 13:25:00 UTC | #88941
global_05_local_4_shard_00000656_processed.jsonl/107741
September 25, 2012 Photoshop Elements 11: The Missing Manual--New from O'Reilly Media: Answers Found Here! Title 303: The Missing Manual Request Review copy Sebastopol, CA—Whether you're a photographer, scrapbooker, or aspiring graphic artist, Photoshop Elements is an ideal image-editing tool—once you know your way around. Photoshop Elements 11: The Missing Manual by Barbara Brundage removes the guesswork. With candid, jargon-free advice and step-by-step guidance, you'll get the most out of Elements for everything from sharing and touching-up photos to fun print and online projects. The important stuff you need to know: "Photoshop Elements 11 brings the biggest changes to Elements since the addition of the Organizer back in version 3," writes expert author Brundage. "The Organizer component (for organizing and sharing your photos) got a complete revamp, and the Editor (for sprucing up your photos so they look their best) has also been redesigned in addition to getting several useful new features, like new artistic filters and a much easier way to add extra content." About the Author Barbara Brundage has been the author of Photoshop Elements: The Missing Manual since Elements 3, is an Adobe Community Expert, and has been a member of Adobe's prerelease groups since Elements 3. She's been teaching people how to use Photoshop Elements since it first came out in 2001. Barbara started using Elements to create graphics for use in her day job as a harpist, music publisher, and arranger. Along the way, she joined the large group of people finding a renewed interest in photography thanks to digital cameras. If she can learn to use Elements, you can, too! View Barbara Brundage's full profile page. Additional Resources About O'Reilly Customer Inquiries Sales/Customer Service Contact Sara Peyton O'Reilly Media (707) 827-7118 © 2008, O'Reilly Media, Inc.
global_05_local_4_shard_00000656_processed.jsonl/107754
id summary reporter owner description type status priority milestone component version resolution keywords cc 230 "Add ""Comment toggle"" for source editing" claudio claudio "In the ""Edit"" menu, as an addition (or replacement) to ""Comment Selected Lines"" and ""Uncomment Selected Lines"" I propose a ""Toggle Comment"" menu entry (shortcut shift-ctrl-c) similar to the one present in Netbeans and Eclipse IDE. This simpliflies the shortcuts to learn and type (one instead of two) as most people will rather comment uncommented text and uncomment commented text, than comment already commented text or uncomment not commented text." enhancement closed trivial editor 0.25 fixed """source comment"""
global_05_local_4_shard_00000656_processed.jsonl/107764
Take the 2-minute tour × My child is 3 years and 6 months and every child he seems to play with seems to pick up on his sensitivity and tease him extra. This could something really minor like touching him on the shoulder - which doesn't hurt him, it just annoys him and makes him cry like a baby. I don't know what the best solution is. I'm afraid that as he gets older it'll happen more and turn into bullying because my son is perceived as weak. I know that the children that tease him shouldn't be doing it, but I just want my son to toughen up and ignore it....It's really getting me down and feel like it's always my child that's crying a lot. share|improve this question 2 Answers 2 That's pretty common behavior at age three and a half. I would hesitate to call it "overly" sensitive at this point. At any rate, it's not disliking being touched on the shoulder that's the problem, it's the reaction, so teach the reaction you want him to have and make him repeat it. It also helps to ask if their natural reaction is having the desired effect. For our kids, we say, "Does screaming make him leave you alone, or does it make him bother you more?" "Okay, then instead say, 'Leave me alone!' and come and get us if he doesn't. Say it." The important thing is not just to tell him to stop crying. You need to teach him what to do instead. Our son who does the teasing has a hard time recognizing when the screaming is for fun or not, so we tell him, "Does it sound like your sister is having fun?" Our end goal is for them both to have the tools to prevent and defuse the situation without our intervention. share|improve this answer Without knowing anything else about your son - have a look in to "Sensory Integration". Some kids can be overloaded with sensory input, and have a hard time dealing with it. At the very least it could provide you with some insight in to his world. If it seems to fit together you might want to get help on it - here in Canada we have the Child Development Assoc. who give free OT etc for preschool children with Sensory Integration Disorder (it's a disorder when it's a problem, and it sounds like it might be for him). Generally I try with my 4yo to work on the underlying issue rather than prescribing a behaviour that he should follow. share|improve this answer Your Answer
global_05_local_4_shard_00000656_processed.jsonl/107780
Wednesday, November 28, 2007 T-2 Days and Counting... Our story up until now: Things I am looking forward to: Marianne said... Wow, I'm getting an adrenaline kick just reading that! Hope all the preps go well, I'm excited for you, Peter! If we can't talk before you leave (no worries, I know you're super busy) send me a number once you're in Korea and I'll call ya. And do my best to join you on the Asian continent soon :) Jewels said... Sounds very fun and exciting. but need to experience flying westjet get your own TV and the choice of paying for your movies...mind you the screen is as big as your fist. Hopefully you will be flying in luxery! Safe journey!
global_05_local_4_shard_00000656_processed.jsonl/107785
My First Crystal Radio As I was trying to organize things a bit in my “office”, I happened to unearth a bit of nostalgia. This is my first crystal radio. My First Crystal Radio My First Crystal Radio I built this thing after reading about it in some old book. It’s probably about 25 years old. It uses a germanium diode from an old TV set I had taken apart. I’m pretty sure the terminal strips are also from the TV.  It’s hard wired to the frequency of the local AM radio station. The capacitors were probably bought from Radio Shack. Based on the frequency and capacitance values, I had calculated the proper number of turns to wind on the high tech coil form, made from a half inch wooden dowel. The coil and some of the wiring are attached to the substrate material (piece of plywood I found in the back yard) using a combination of masking tape and staples. It turns out masking tape doesn’t stick to unfinished wood well enough for this application.  The black wire connected to the antenna, which was just more wire dropped from my bedroom window. It also had an earth ground connection which was attached to the face plate screw on a handy electrical outlet. That made a huge difference as I recall.  It worked the first time too. It probably helped that there was only one radio station easily available in the area and that these units don’t have much in the way of selectivity. Overall, it was a fantastic, simple project to introduce a kid to electronics. Posted in Electronics | 2 Comments Retro LED Displays I recently found some HP 5082-7433 LED bubble display modules on eBay. These are three digit, 7 segment displays with decimal points. The “bubble” is a magnifying lens molded into the epoxy package. 7 segment LED bubble display 7 segment LED bubble display I ended up finding a datasheet (warning, pdf link), but not one that specifically covers this module. The pinout doesn’t match anything in that datasheet unfortunately, so it took a few minutes of trial and error to come up with one myself. Pin 1 (labeled cathode 1 in the diagram) is indicated by a tiny notch cut out of the pin. It’s hard to see, so fortunately the HP logo on the bottom of the module is on the same end as pin 1. LED display pinout The module pinout rendered via an extremely precise manual CAD method Each digit is wired to share the segment anodes with the other digits but has a separate common cathode. This arrangement saves pins, but requires the digits to be multiplexed. Somewhere below is an arduino sketch I put together to display a simple three digit hexadecimal counter using one module. I used one pin per segment and one for each cathode because a)  I’m fresh out of common cathode BCD to 7 segment display drivers, and b) I want a hex display. The first few hexadecimal display chips I turned up were in the $10 range. Crazy. Here’s the circuit wired up on a breadboard: arduino with hexadecimal display The Arduino with hexadecmal counter display Each segment needs a separate current limiting resistor. I chose 2.2k here. This is a 5v Arduino, and the module datasheet indicates a typical forward voltage drop of 1.6v. That leaves 3.4v across the resistor resulting in about 1.5mA per segment. Now, there can be a maximum of 8 segments (including the decimal point) lit at one time, so that means a total of 12mA will be sunk by the cathode pins. The I/O pins on this Arduino can sink 40mA, so the smoke should remain inside. Here is the sketch I came up with. This code is also available here. // This is a test which will display a 3-digit hexadecimal counter // on an HP 5082-7433 LED display // define pin numbers for convenience // annodes for seven segments plus decimal point const int a = 13; const int b = 12; const int c = 11; const int d = 10; const int e = 9; const int f = 8; const int g = 7; const int dp = 3; //decimal point // each digit has a common cathode for its segments which must be pulled // to ground to enable that digit const int cathode[] = {4,5,6}; // this controls how long each digit is displayed. Adjust for flicker. const int delaytime = 5; // this is a table of what segments (left to right, a-g) should be lit for each digit to display const byte matrix[] = { unsigned long time; unsigned int counter = 0x0; void setup(){ // set all required pins to outputs pinMode(a, OUTPUT); pinMode(b, OUTPUT); pinMode(c, OUTPUT); pinMode(d, OUTPUT); pinMode(e, OUTPUT); pinMode(f, OUTPUT); pinMode(g, OUTPUT); pinMode(dp, OUTPUT); pinMode(cathode[0], OUTPUT); pinMode(cathode[1], OUTPUT); pinMode(cathode[2], OUTPUT); // start off with nothing displayed digitalWrite(a, LOW); digitalWrite(b, LOW); digitalWrite(c, LOW); digitalWrite(d, LOW); digitalWrite(e, LOW); digitalWrite(f, LOW); digitalWrite(g, LOW); digitalWrite(dp, LOW); time = millis(); void loop(){ // display each digit in turn, pausing by delaytime in between // get the digit to display byte digit = getNybble(counter, 2); // get the segment pattern from matrix[] accoring to the digit and display that displayNybble(matrix[digit], 2); // wait for it // then do the same for the other two digits digit = getNybble(counter, 1); displayNybble(matrix[digit], 1); digit = getNybble(counter, 0); displayNybble(matrix[digit], 0); // increment the counter if it's been at least 100ms if ((millis() - time) > 100){ time = millis(); byte getNybble(unsigned int source, char index){ // What we're doing here is extracting the nybble (4 bits) that corresponds // to the hex digit we want from the counter. // First, shift the counter to the right by the appropriate number of bits // so the bits we want are all the way to the right. // Then, cast the 16 bit integer counter to an 8 bit byte which drops the leftmost 8 bits. // Then do a bitwise AND operation with 00001111. This forces the leftmost 4 bits to zero, // leaving just the nybble we are interested in. return (byte)(counter >> (index * 4)) & B00001111; void displayNybble(byte x, int pos){ // x is the bit pattern from matrix[] for the digit we want to display // This gets the individual bits from x and sets each output pin accordingly. digitalWrite(a, bitRead(x,6)); digitalWrite(b, bitRead(x,5)); digitalWrite(c, bitRead(x,4)); digitalWrite(d, bitRead(x,3)); digitalWrite(e, bitRead(x,2)); digitalWrite(f, bitRead(x,1)); digitalWrite(g, bitRead(x,0)); void enableDigit(int pos){ // to enable a digit, pull its cathode down to ground digitalWrite(cathode[pos], LOW); void blankAllDigits(){ // to blank or disable a digit, pull its cathode high digitalWrite(cathode[0], HIGH); digitalWrite(cathode[1], HIGH); digitalWrite(cathode[2], HIGH); Posted in Arduino, Electronics | 3 Comments Frankenstein’s Lawnmower I have a battery powered lawnmower. It’s powered by a 17Ah 24V battery which lasted four seasons before it just wouldn’t finish the lawn. The replacement battery started giving me trouble by the end of the first season. It was barely adequate and had developed a strange quirk where it would spin the motor up slowly the first time it was powered up. The brushes seemed to have plenty of wear left, so as an experiment I tried touching the motor wire directly to the battery terminal. It spun up instantly, like it was new. This made me suspect the switch contacts, which turned out to be pretty chewed up. At this point, like any normal person would, I decided to have the machine serviced by an authorized service center. Just kidding. This mower literally consists of a motor, a switch, and a battery. I decided to replace the switch assembly with a MOSFET. A simple lawn mower control circuit Based on the observed battery life and the 40A circuit breaker in the original circuit, I estimated around 20A of current draw. The IRF1405 is an N-Channel MOSFET intended for automotive applications. It runs $2.45 from Jameco in single quantity. It claims a maximum continuous current of 169A, however the fine print in the datasheet indicates that the TO-220 package limits it to 75A. I’ll be well within that limit, so no problem there. It needs 10V on the gate to turn fully on, while the max allowed is 20V. In the schematic, when the switch is on, the zener diode provides a nice consistent 12V to the gate of Q1. With the switch off, the gate is discharged through R3. I’m not too concerned about the switching speed in this application. I added a small gate resistor, R2, though it’s probably not necessary here. R4 is a 50A, 75mV current shunt that I will use in a future project to add some instrumentation. Since the motor is an inductive load, flyback diode D4 is required to protect the FET. I used two MBR745 diodes in parallel here because I wasn’t sure how to size a motor flyback diode. This turned out to be overkill. I mounted the entire circuit to a piece of plywood, and the entire unit was temporarily mounted to the top of the battery with a piece of double sided tape: The finished project shown charging The board to the right of the battery is the mower’s original charger, balanced precariously and attached with tiny alligator clips. The small wire going out of the picture to the upper left goes to the on/off switch. The two flyback diodes are mounted to a heat sink (scavenged from an old video card) at the top of the main board. Below that is a terminal strip, then the MOSFET also on a heat sink. To the left of the FET is the current shunt. I’ll probably add a 40A breaker when I permanently mount the board. Yesterday was its inaugural mow. I’m happy to report that it worked perfectly. It mowed the whole yard no problem, and neither the diodes nor the FET even got warm to the touch. The voltage drop across the shunt read 16mV on a fresh battery and no load. This works out to 24A, pretty close to what I was expecting. The longevity of this circuit remains to be seen, but so far I would call it a success. Plus, I’m the only one in the neighborhood with wires and plywood attached to his lawnmower. Posted in Electronics | 7 Comments Constant Current Dummy Load This is a constant current dummy load I put together recently. It was inspired by the EEVblog version. Mine is simplified, using only one op-amp. It also requires a multimeter to monitor the current. Action Shot I used parts I had on hand, except the sense resistors which I had to order. The IRF520 is not a logic level MOSFET. It’s barely starting to turn on at a gate voltage of 5v, so I had to use a 12v power supply. Otherwise, it’s very straightforward. The op-amp will try to maintain its + and – inputs at the same voltage by adjusting the output and therefore the load on the power supply under test.  I used ten 10Ω 1% resistors in parallel for the current sense resistor, making the math easy. 1 amp = 1 volt across 1Ω. I tested it out using the same 12v power supply. (12.6v to be specific) Drawing 500mA results in a power dissipation of about 6W in the MOSFET. With the heatsink in the action shot, it stabilized at about 150F, or 80F above ambient. The sense resistors only showed a few degrees of heating. The circuit seems to be very stable in spite of the breadboard and all of those ridiculously long wires. Apparently, this particular op-amp is very forgiving. In the future, I’ll add on to this project with an lcd readout and microcontroller. At least, a fine adjustment would be nice. As it is, it’s difficult to control the current setting with a single potentiometer across the full 12v supply. Once it is set, however, it is nice and stable. Posted in Electronics | Leave a comment Resurrecting an Apple Disk II I had an Apple IIc growing up. I still have it, along with a big stack of floppy disks. It still works, even after enough years that you kids need to get off my lawn. I decided I wanted something a bit more hackable, so I got a IIe from Ebay along with two 5.25″ floppy drives and a Super Serial card. So, I powered it all up and tested it out and… one nonfunctional drive. Not too bad considering the drive is over 30 years old. (did I mention my lawn?) Inside the Disk II The symptom: On power up, the drive head hits the back stop making that characteristic floppy drive noise but refuses to seek the first track. The access light stays on, and the main motor spins the disk. It just sits there like that without moving the head again. According to the Disk ][ Technical Procedures (found here), the first thing to look for is burned components. Opening things up, we see this: Looks like capacitor C4 is toast. According to the docs, this means the 74LS125 is also likely dead. Those are both easy fixes, but… no such luck. The symptoms remain. I have a working drive, so I tried swapping the good board to the bad drive. That worked. Since nothing else looked damaged, I tried swapping the rest of the chips one by one into the damaged board. It turns out the MC3470, the floppy disk read amplifier, was the culprit. That’s the farthest chip to the right in the picture. This chip is a little harder to source than the other two. I ended up getting a couple from Newark, though it turns out I should have checked Ebay first. In any case, I now have two working floppy drives. Now the question is, what to do with them… Posted in Apple II | 1 Comment Interfacing the PS/2 Keyboard As an exercise, and to help me learn about the protocol, I’ve set up my trusty Arduino to read scancodes from a PS/2 keyboard. The protocol is fairly simple. The keyboard uses four pins in the connector whether it is the 5 pin AT style or the 6 pin PS/2 style. These are CLK, DAT, GND, and VCC. When a key is pressed, the keyboard begins generating a clock signal on the CLK pin. At each falling edge of this clock signal, a new data bit is presented on the DAT pin. This lends itself well to an interrupt driven approach. The Arduino supports an external interrupt (interrupt 0) on digital pin 2, so that’s where I connected the clock line. The DAT line was connected to digital pin 3. Pin 2 is then configured to fire an interrupt on the falling edge of the signal, and an interrupt service routine (ISR) is attached to that interrupt so that the Arduino will read the next incoming bit from pin 3, keeping track of where we are in the data sequence so it can store the complete scancode once all of the bits have been read. PS/2 Pin Connections Connecting the Keyboard To start listening for the interrupt, we need to put the following line in the setup() routine: attachInterrupt(0, kbdint, FALLING); In this case, kbdint is the name of the ISR which will be doing the work. It will be executed once each time the clock signal on pin 2 is pulled to ground by the keyboard, each time capturing one bit of incoming data. void kbdint() pin3 = digitalRead(3); if(pos == 0)//start bit datavalid = 0; scancode = 0; if(pos < 9) if(pin3 == HIGH) scancode |= (1<<(pos-1)); if(pos < 10){pos++; return;}//parity bit pos = 0; datavalid = 1; The variables used in the ISR are defined as volatile: volatile char pos = 0; volatile char scancode = 0; volatile char datavalid = 0; volatile int pin3 = 0; The keyboard will send data in 11 bit frames consisting of a start bit, eight data bits, a parity bit, and a stop bit. A more complete analysis is found here, among other places. This code keeps track of what bit was just received by incrementing pos. It ignores the start bit, inserts each of the next 8 (data) bits into the scancode variable, and ignores the parity and stop bits. The datavalid flag could be used to indicate to some other part of the program that a complete scancode has been captured. This is pretty basic, naive code, but I think it proves the concept sufficiently. The protocol also allows for sending data to the keyboard in order to change settings and control the various LED’s. Perhaps that will be fodder for a future post. Posted in Arduino | 2 Comments Hello world! This is the obligatory “Hello World!” post. Imagine a random microcontroller on a breadboard. One LED flashes slowly. That’s what this is. Posted in Uncategorized | Leave a comment
global_05_local_4_shard_00000656_processed.jsonl/107804
Take the 2-minute tour × More and more articles pop up on the shortage of helium, and on the importance of it. Its usage in MRI's spring to mind for example. I looked it up and found out that helium is used for its 'low boiling point' and 'electrical superconductivity'. So this gives me a couple of questions: • How can the amount of helium be depleting? When we use helium (for purposes other than balloons) it stays on earth right? Since it doesn't dissappear, can't we 'recycle' the helium previously used for certain purposes and just use it again? • We often hear that helium supplies are depleting at alarming rates. This makes me wonder; isn't every element we're using on earth depleting in supplies? Or are there elements which 'arrive' on earth at a faster rate than they're leaving earth? Beforehand I thought of carbon (in relation with the emission of carbondioxide), however, then I figured that the amount of carbon in the atmosphere is increasing while the amount beneath the ground is decreasing, thus making no difference to the amount of carbon on the earth as a whole. • Why is helium the only element suitable for usage in MRI's? In other words, why are its properties so unique or rare? And what properties are those, besides 'low boiling point' and 'electrical superconductivity' ? • Is there research being done towards replacing helium in its purposes by a more viable substitute? share|improve this question Man, thats a bulk of questions. Whom are you angry with? Hello user, please don't post a lot of questions within a single question :-) –  Waffle's Crazy Peanut Dec 11 '12 at 13:45 4 intertwined questions. Don't overreact –  user14445 Dec 11 '12 at 13:47 I'm surprised I can't find another question on Physics SE about the availability of Helium. That would be the easiest to answer just with Google. In short, our Helium comes from underground where it has accumulated for billions of years. It can escape Earth's gravity well when released, and even if it doesn't it is orders of magnitude more expensive to capture from air. You could split this into two questions if you want. I would suggest focusing this one on the use in MRIs specifically. –  AlanSE Dec 11 '12 at 14:38 Here's a discussion of why helium is depleting, that answers at least part of it. skeptics.stackexchange.com/questions/13757/… –  tpg2114 Dec 11 '12 at 14:38 As the others have mentioned, you really ought to split this into two or more questions, otherwise it may have to be closed as "too broad" –  Manishearth Dec 11 '12 at 14:56 4 Answers 4 Helium is relatively rare on Earth, 0.00052% of the atoms or molecules in the atmosphere (or the same fraction of the volume; much lower fraction of the mass). The concentration of helium in the atmosphere is low. Moreover, it's dropping because of atmospheric escape. About 4 tons of helium escape from the atmosphere every day because there's a significant probability that the helium atoms' speed exceeds the escape velocity, so there's no return anymore. Because the amount of helium in the atmosphere is so low, that's not where we are getting it from. We are getting it from natural gas at places where it's created from alpha-decay of uranium and other elements – alpha-particles are helium nuclei. And such natural gas has up to 7% concentrations of helium so it's convenient to get it from there via fractional distillation. The depletion of helium from the "realistic sources" therefore occurs at a similar relative rate as the depletion of the "conventional" natural gas. If the helium escapes to the atmosphere, it's effectively lost. No one is going to catch the rare molecules from the atmosphere: you would have to grab huge volumes of the air to find the required amount of helium. Different elements or compounds are being "depleted" or "accumulated" at very different rates. You must understand that for practical reasons, only the elements and/or compounds contained in materials where their relative concentration is high enough may be counted as accessible. So once they're lost, e.g. the helium in the atmosphere, they're lost and they can't be recycled. The Earth's soil and crust and water contains some elements and/or compounds whose amount is effectively infinite relatively to the human consumption, so it makes no sense to talk about their depletion. The Earth will almost certainly be burned when the Sun goes red giant in 7.5 billion years before we would be able to deplete nitrogen from the atmosphere or silicon oxides from the rocks etc. The whole upper layers of the Earth are largely composed of such things. We won't deplete carbon dioxide anytime soon; as long as we have any fossil fuels etc., the concentration of CO2 in the air will be kept elevated which is a good thing. However, it's true that a few centuries after we run of fossil fuels and similar things to be burned, CO2 in the atmosphere will converge back towards the equilibrium concentration dictated by the temperature (around 280 ppm for today's temperature). If this happened abruptly (it will take a century or more for the drop to occur), the plant growth rate would drop by about 20% and about 1 billion people in the world would have to starve to death rather quickly. Most plants stop growing below 150 ppm of CO2; during the coldest ice ages in the recent 1 million year, the concentration never went below 180 ppm or so and the plant species that wouldn't be able to survive this drop have gone extinct. Some other elements or compounds are rare, e.g. gold and platinum. If you don't want to search for them 30 km beneath the surface (or try to bring them from other celestial bodies which is still prohibitively expensive – the price to get X kilograms of matter to the orbit is comparable to the price of X kilograms of gold and you would need even higher expenses to launch spaceships from Mars etc. to get the gold here), the total amount of these precious metals that can be "mined" isn't too much larger than what we have already gotten. Concerning your "why helium question", let me just quote Wikipedia. So the helium is the best one but it doesn't quite have a monopoly. Clearly, if we ran out of helium, it wouldn't be the end of MRI. But the price of the helium is finite, a particular number dictated by the balance between supply and demand, and it's simply still better for many users to use helium even though we will probably deplete it well before others. As the reserves decrease, the price will increase and the proportion of other isotopes used in MRI will go up. share|improve this answer I don't see how the excerpt from Wikipedia relates to the use of helium in MRI. It is used for cooling the superconducting magnet, it is not observed. –  Mad Scientist Dec 11 '12 at 16:27 Helium-3 is a very rare helium isotope, and you can do MRI/NMR of it. But that is not what happens in typical MRI of humans, as they don't contain any measurable amount of helium-3 (though there seem to be more exotic experiments that use it). The helium used for MRI machines is not NMR-active, as the natural helium is almost all helium-4. The helium is used for cooling, your paragraph from Wikipedia is about nuclei that can be observed by magnetic resonance. –  Mad Scientist Dec 11 '12 at 16:34 The vast majority of helium used in MRI is for cooling, not as an imaging nuclei, to the point that I wasn't aware it was even used in that manner (but if Wikipedia says it, it must be true). The vast majority of helium on the planet is $He^4$, not $He^3$. –  Colin McFaul Dec 11 '12 at 16:35 If we ran out of helium, it would be the end of currently used MRI machines. Their magnets would need to be completely redesigned. Helium is a coolant - no one would actually try to get useful medical data from imaging the stuff. –  Chris White Dec 11 '12 at 18:11 @LubošMotl The helium usage of MRI machines is not caused by the rather exotice 3He experiments, but by the liquid helium used in cooling the superconducting magnets. Your section on NMR-active nuclei is irrelevant for the question at hand. –  Mad Scientist Dec 11 '12 at 20:16 MRI machines use liquid helium to cool down the superconducting magnets that are needed to create the high magnetic field necessary for magnetic resonance imaging. Every high-field magnetic resonance machine, MRI or NMR, has an inner dewar filled with helium and an outer one filled with liquid nitrogen. The insulation is of course not perfect, so a certain amount of helium will evaporate over time. You can catch the evaporating helium, cool it down and reuse it, but that isn't done everywhere. Until recently it just wasn't economical to do so, you always lose some amount of helium in the process and you don't get the whole machinery for free. I know of at least two NMR facilities that recycle their helium, so this is certainly feasible. But both are rather large, and I suspect that the financial aspects are worse for smaller sites. As for replacing helium, one way would be to invent high-temperature superconductors suitable for building MRI machines. If liquid nitrogen would be enough to cool them down, this would eliminate the need for liquid helium. share|improve this answer OK, sorry, I think it is misleading to mix the physical essence of MRI, which is NMR and has no dependence on helium-4, with the engineering problem of cooling a device which is an independent physics question. Moreover, this answer doesn't really try to quantify the reserves in any way, or explain the origin of industrial helium, -1. –  Luboš Motl Dec 12 '12 at 11:24 @LubošMotl But the question is about the cooling of MRIs, as that is what all the helium is used for and what the articles the author of the question mentioned are referring to. You're missing the point of the question with your part about 3He MRI, as that is a negligible use of helium in comparison to the use in cooling the MRI and NMR magnets. –  Mad Scientist Dec 12 '12 at 11:47 No, the question isn't about cooling. The question is about MRI - see the title - and the word "cooling" doesn't appear in the whole question. ... 3He is negligible but it's the more expensive isotope, produced at $2,000 a liter from tritium. Normal helium-4 at 100 trillion cubic meters of reserves is nowhere close to being "depleted", especially not to the extent that we couldn't afford MRIs. –  Luboš Motl Dec 13 '12 at 7:57 @LubošMotl, the question is about the use of helium in MRI. The use of helium in MRI is for cooling the magnet. This really isn't hard to understand. I don't know why you're having a problem with this. –  Colin McFaul Dec 13 '12 at 17:28 And despite Lubos's claim, there certainly can be a helium shortage, as anyone (even research labs!) who tried to buy some a few months ago found out. It may very well exist in large quantities somewhere in the Earth, but when it is only being extracted in a couple of places, politics plays a huge role. –  Chris White Dec 16 '12 at 23:55 I'll try to give a very short answer to most of the questions. Some parts are already explained in the other answers but a few important aspects are missing. 1. How can the amount of helium be depleting? The Helium ($^4$He) that is used in a number of applications is extracted from natural gas. All other sources are much more difficult and expensive. So less natural gas means less Helium. 2. Isn't every element we're using on earth depleting in supplies? Helium is special in that aspect, that once evaporated and escaped into the atmosphere you can hardly get it back. In normal air only 0.0005% are Helium so extraction by condensation is not efficient. 3. Why is helium the only element suitable for usage in MRI's? Helium is the material with the lowest boiling point, this makes it ideal to cool superconducting magnets. Hydrogen comes in second but the relatively high boiling point (20K) is above the critical temperature of Niobium-titanium (9K) so you cannot use Hydrogen to get the standard material superconducting. 4. Is there research being done towards replacing helium in its purposes by a more viable substitute? Oh yes. There is a lot of research going on. Previously MRI just blew of the Helium to the air, everything else was not considered economically sound. This has changed to some degree, you can collect the Helium in high pressure vessels and recondense it. Alternatively using a pulse tube cooler you can keep the whole system cool enough that no Helium evaporates but this is not widely used but already commercially available. In principle you could cool to very low temperatures completely without Helium using adiabatic demagnetization but this is much more involved than 'simply' using liquid Helium. share|improve this answer Helium is a valuable resource because of its relative availability, fantastic chemical stability, and exceptionally low boiling point. This means it can be used to efficiently cool things to 4K and below where other gases are prohibitively hard to work with. Helium is running out because the only viable stores of it we have are underground. When we use helium carelessly - in a lab or a balloon - it escapes into the atmosphere and therefore dilutes into the $\sim 10^{18}$ kilograms of oxygen and nitrogen that make it up. In principle it is possible to purify helium out of the atmosphere. In practice it is only present in trace amounts and no such scheme will ever be realistic. To make things even more difficult, only physical separation schemes are viable since helium is chemically inert, and those are very, very expensive in terms of money and energy. (Think how hard it is to extract nitrogen!) To be clear, then: the only supplies of helium we are depleting are usable, underground ones. I am unaware of any other viable alternative to helium for sub-4K cooling. share|improve this answer Would it somehow be possible to extract it from the sun? –  user14445 Dec 11 '12 at 15:57 No, not without technologies currently deep within the realm of science fiction. The sun is rather too hot and too far away, to put it mildly. –  Emilio Pisanty Dec 11 '12 at 16:06 @user14445 Extracting helium from Jupiter would be far easier (though that doesn't mean a lot). –  mmc Dec 12 '12 at 2:47 Your Answer
global_05_local_4_shard_00000656_processed.jsonl/107810
Like a lot of stories of scandal, ruin, and the opportunity for redemption, it started with a pretty face. In the spring of 1964, 17-year old Marianne Faithfull walked into a swinging, star-studded London party and landed a record deal without singing a note; Andrew Loog Oldham, the Rolling Stones manager and world-class sleazeball, famously summed up the matter with his usual showbiz aplomb: "I saw an angel with big tits and signed her." Within the year, the bookish baroness' daughter was climbing the charts and making the rounds at concert halls and the BBC, thrust into a pop career she didn't much want in the first place. ("For one brief, blissful moment I thought I saw a way out of my pop nightmare," she wrote three decades later in her autobiography, Faithfull, which is every bit as insightful, vivid, and deliciously bonkers as Keith Richards' Life.) Faithfull was a passable vocalist with a folksy, melancholy, relatively generic lilt, but there was a certain vacancy and listlessness about her that suggested she'd not yet become comfortable in her skin. If you watch some of her earliest performances on YouTube, she has a way of making Lana Del Rey look present. Faithfull started dating Mick Jagger in 1966, and her 60s output is generally only discussed in terms of how it relates to that of the Stones: "As Tears Go By" is more famous for being the first song Mick and Keith wrote together than for being Faithfull's debut single. On the personal front, though, the opposite was true: Notoriety had a way of sliding off the boys and sticking to Faithfull. After the infamous Redlands drug bust, the press dubbed her "Miss X" and, a bit more personably, "The Girl in the Fur Rug." ("SCANTILY CLAD WOMAN AT DRUG PARTY" screamed one representative headline.) To those closer to the Stones' circle, she was The Muse-- though by her account, her relationship with Jagger was a pretty mutual exchange of ideas, old records, and hallucinogens. Ever the avid reader, a little while prior to the Beggar's Banquet sessions, Faithfull handed him The Master and Margarita and suggested that this Lucifer guy might make for a good character in a song. She wrote the lyrics to "Sister Morphine", and cut a shudderingly melancholy version that makes the Stones' take almost seem like a romp. This was maybe the first big, public hint that Miss X knew more about pain and suffering than a lot of people wanted to assume. When she slipped into the coma that almost killed her-- the result of taking 150 Tuinals in a hotel room in Australia-- she had a vision that Brian Jones, just six days in the ground, was beckoning her over a cliff. He leapt; at the last minute she decided to stay. When she opened her eyes in a hospital room six days later, Mick said, "Marianne, we thought we'd lost you." In that milky voice that was already starting to curdle, the first thing she said to him was, "Wild horses couldn't drag me away." That's the thing about pretty faces. We'd much prefer to watch them wilt. We don't expect them to belong to the fighters-- the junkies and monks and cockroaches who'll survive every atomic bomb and suicide attempt and outlive us all. And we definitely don't expect them to make songs as gnarled and candid as the ones on Faithfull's finest record, Broken English, but there you go: the best records are all, in some way or another, the ones that blow a mouthful of smoke in the face of expectation. The world that thought it had tsk-tsked Miss X into submission was probably not ready for Broken English in 1979, and even today as it's released in a deluxe edition, it's still raw enough to make you squirm-- the cracked, undead voice of a woman back from exile to make a record about the simple audacity of staying alive. If you know one thing about Broken English, you probably know that Faithfull was living on the streets right before she made it. And unlike the Mars Bar myth (now thoroughly debunked by Faithfull, Keith Richards, and an honest-to-goodness policeman), this checks out. Broke, heroin-dependent, and (it seemed) professionally washed up, Faithfull spent the better part of two years living in a roofless pile of rubble in Soho, a bombed-out ruin of the Blitz. She was squatting with her then-husband Ben Brierley (of British punks the Vibrators) and riding the unexpected success of her forlorn ballad, "Dreamin' My Dreams" (a dud at home but a surprise hit in politically tumultuous Ireland, where, in 1976, "forlorn" was the mood of the hour) when somebody at her label rather improbably gave her the money to cut another record. The resulting album feels so intimate and personal that it's easy to overstate its singularity. But Broken English is more than just a portrait of the addict as a middle-aged woman; it captures an entire generation's disillusioned comedown. "The days of mind-opening drugs were over," Faithfull writes in her autobiography, reflecting on the spiritual climate of the mid-70s. "The world had tilted. A major change in key had taken place. It was a Mahler symphony whirling madly out of control." And that's the key in which these songs were written and recorded. Much in the way the Stones did in the late 60s, Broken English taps into a collective consciousness. The new-wave-tinged title track evokes the anxious, prickling paranoia of the Cold War, a chillingly grim cover of "Working Class Hero" longs for the counterculture's idealistic faith in individuality, and the excellent "Brain Drain" ("Got so much to offer/ But I can't pay the rent/ I can't buy you roses 'cause the money's all spent") captures the hopelessness of the junkie's lifestyle. A rapidly deteriorating Tim Hardin co-wrote the lyrics on that last one with Faithfull and Brierley on a debauched trip to Antigua. Both implicitly and explicitly, it's a ballad of wasted genius. It's one of the last songs to bear Hardin's name-- he was dead of an overdose a little over a year after the record came out. After dabbling in baroque pop and country, Faithfull drew fresh inspiration from the Sex Pistols and Brierley's clan in the late 70s, but Broken English is a punk record more in spirit than in sound. (It doesn't sound much like any of her subsequent records either; afterwards, she moved towards the Weill-meets-Tom-Waits-in-a-dank-cabaret sound of the excellent Strange Weather.) Stylistically, Broken English is a fusion of new wave, blues, reggae, and pop, created by a backing band talented enough to genre-hop deftly. Guitarist Barry Reynolds adds a particularly distinct flair to the record; on the incendiary "Why  D'ya Do It", his barbed, sneering riff is the perfect match for Faithfull's legendary performance. Easily one of the best songs in her repertoire, "Why  D'ya Do It" is also probably the most controversial-- a Heathcote Williams-penned, unfiltered torrent of lovers' rage scattered liberally but purposefully with a few words that still have the power to shock. Broken English's most affecting moment is Faithfull's spellbinding rendition of Shel Silverstein's "The Ballad of Lucy Jordan", a song about a bored housewife dreaming of the exhilarating life and "thousand lovers" she never had, slowly going mad. Obviously, it's far from autobiography, but when you know Faithfull's history (a veritable primer on the pitfalls of an exhilarating life), the subtext becomes almost unbearably poignant. "Lucy Jordan is me if my life had take a different turn," she has said. "It's a song of identification with women who are trapped in that life and the true private horror of the 'good life.'" But the pain in her fractured voice tells a more complicated story, pointing towards the classic catch-22 that still plagues famous and unfamous women alike: The world will size you up and make you choose one of two roles, Miss X or Lucy Jordan. And the worst of it, Faithfull is saying in this evocative performance, is that the dreamy conjectures about what your life would have been had you chosen differently will not only prove incessant, they might actually drive you crazy. The bonus material on this deluxe edition of Broken English doesn't add too much to the experience. With only one exception ("Sister Morphine"), the extra disc is all alternate mixes and extended cuts of the songs that made the record. If anything, the remixes' noodly accoutrements will make you appreciate the record's purposeful minimalism anew. In almost every case, wisely, producer Mark Miller Mundy and engineer Bob Potter let the unvarnished power of Faithfull's voice carry these songs. The deluxe edition also includes the great experimental filmmaker Derek Jarman's early music videos for "Broken English", "Witches Song", and "Lucy Jordan", but if you can make peace with the low quality you could have watched these on YouTube years ago. This particular re-release of Broken English isn't notable because of any new insight it brings to the listening experience, but for the simple fact that it might bring some new fans to an enduringly great record. Faithfull has been clean for a while now, but she still speaks freely and unapologetically about the experiences that lead her to making this record. Last week I was listening to an interview with her that I assumed was current, done in promotion of the deluxe edition. I didn't realize it was a few years old until she started talking about Amy Winehouse hopefully and in the present tense. "She's young, she's rich, she feels absolutely immortal," Faithfull said, with obvious empathy. "They judge her [harshly]... but she's going to get through it all, I know it." Feeling a little haunted after hearing this, I put on Broken English immediately, and its sheer power and purpose had never felt more obvious. This record documents a particular shade of darkness not everybody lives to describe. Like Faithfull identifying with her opposite in Lucy Jordan, Broken English is an almost otherworldly communion with the other side; it's a record for the Joneses and the Hardins and the Winehouses and all the other voices that the wild horses dragged away before they could say anything this honest about their pain. Aching and defiantly alive, it still bleeds like it was cut yesterday. Most Read Album Reviews • Related • Latest • Trending
global_05_local_4_shard_00000656_processed.jsonl/107814
From PKP Wiki Jump to: navigation, search Night.png(375 × 278 pixels, file size: 7 KB, MIME type: image/png) File history current07:03, 29 October 2009Thumbnail for version as of 07:03, 29 October 2009375 × 278 (7 KB)Colin Prince (Talk | contribs) • You cannot overwrite this file. The following page links to this file:
global_05_local_4_shard_00000656_processed.jsonl/107828
poem index Night Air C. Dale Young "If God is Art, then what do we make of Jasper Johns?" One never knows what sort of question a patient will pose, or how exactly one should answer. Outside the window, snow on snow began to answer the ground below with nothing more than foolish questions. We were no different. I asked again: "Professor, have we eased the pain?" Eventually, he’d answer me with: "Tell me, young man, whom do you love?" "E," I’d say, "None of the Above," and laugh for lack of something more to add. For days he had played that game, and day after day I avoided your name by instinct. I never told him how we often wear each other’s clothes— we aren’t what many presuppose. Call it an act of omission, my love. Tonight, while walking to the car, I said your name to the evening star, clearly pronouncing the syllables to see your name dissipate in the air, evaporate. Only the night air carries your words up to the dead (the ancients wrote): I watched them rise, become remote. From The Second Person by C. Dale Young. Copyright © 2007 by C. Dale Young. Reprinted with permission of Four Way Books. C. Dale Young by this poet Midsummer lies on this town like a plague: locusts now replaced by humidity, the bloodied Nile now an algae-covered rivulet struggling to find its terminus. Our choice is a simple one: to leave or to remain, to render the Spanish moss a memory or to pull it from trees, repeatedly. And this must be what Someone has already pulled a knife across my chest, and the rope has already gripped our wrists drawing blood. I am naked, and I cannot be sure if you are as well. In the room, the men come and go, yelling blood bath, half-blood, blood-bitch. We never hear the word trueblood. In my dreams I am Not tenderness in the eye but the brute need to see accurately: over the ridge on a trail deep in Tennessee, the great poet looked out and saw the vista that confederate soldiers saw as they rode over the edge rather than surrender. I saw only the edge of the cliff side itself and then estimated the distance
global_05_local_4_shard_00000656_processed.jsonl/107830
Meta Battle Subway PokeBase - Pokemon Q&A How many Pokemon are EATEN in Pokemon? 1 vote I know Basculin is. "They are also remarkably tasty,". Are there any others? asked Jan 24, 2013 by Ayan reshown Apr 13, 2013 by Mewderator 2 Answers 8 votes Best answer enter image description here Humans eat Magikarp. Zubat and Golbat suck blood from any Pokemon. Pidgey, Pidgeotto and Pidgeot each Caterpies and Weedle if possible to avoid the stinger. Meowth try's to eat James' Magikarp. Tailow feed on Wurmple. Cherubi is eaten by all the bird Pokemon in it's area. Pokemon eggs are eaten by the Ekans and Sneasel family. Chansey's and Blissey's eggs are eaten by humans and Pokemon. Inconclusion, Pokemon are like animals thier food chain is related to a animals food chain. For example: Pidgey is based on a Pidegeon and they eat worms or caterpillas like Wurmple and Caterpie. So if you look at it like this then most weak Pokemon are generally tasty snacks for other Pokemon. Ikr... Humans eat Magikarp and Cherubi!!! answered Jan 24, 2013 by Scizornician selected Jan 24, 2013 by Ayan Haha I love this answer! Thnxs xD dont people eat farfetch'd as well? i remember someone say it in the game and that is why it is rare slowpoke tails are also eaten. there are some missing.... Slowpoke tails are chewed on, actually. 2 votes Whether I say games or anime, it means that's where they have mentioned eating them. I count it as mentioned if it says something in their or another Pokemon's Pokedex entry. Cherubi(games), Magikarp(anime, games), Tauros(anime), Exeggecute(games), Pidgy(games, Arbok eats their eggs), Pigeot(games, Arbok eats their eggs). I'll edit if I find any more. answered Jan 24, 2013 by Poke'slash Upvote for you! Y U No give me BA?! Jk, jk. Thanks for up vote. Correct but there are a few things I don't feel like saying but he is just talking about the anime. How about slowpoke tales from Gen2 and so on.
global_05_local_4_shard_00000656_processed.jsonl/107839
home | sitemap The Unidimensional Supreme Court 10 July 2003 In a recent piece in the Proceedings of the National Academy of Sciences Lawrence Sirovich analyzed the voting patterns of the current Supreme Court ("A Pattern Analysis of the Second Rehnquist U.S. Supreme Court." PNAS, 100 (24 June 2003):7432-7437). This piece received a great deal of publicity in the popular science press. The purpose of this short comment is to show that Sirovich's findings are consistent with current work on the Court by Political Scientists such as Bernard Grofman, Kevin Quinn and Andrew Martin, and Joshua Clinton, Simon Jackman, and Douglas Rivers. This recent highly innovative research by Quinn and Martin and CJR in turn builds upon path-breaking work by Glendon Schubert (The Judicial Mind, 1965, Evanston: Northwestern University Press), David Rohde and Harold Spaeth (Supreme Court Decision Making, 1976, San Francisco: W. H. Freeman), Jeffrey Segal and Harold Spaeth (The Supreme Court and the Attitudinal Model, 1993, Cambridge: Cambridge University Press), Lee Epstein and Jack Knight (The Choices Justices Make, 1998, Washington, DC: CQ Press), Bernard Grofman and Timothy Brazill ("Identifying the Median Justice on the Supreme Court Through Multidimensional Scaling: Analysis of 'Natural Courts' 1953-1991." Public Choice, 112:55-79, 2002), to name just a few. An excellent summary of the literature can be found in "The Dimensions of Supreme Court Decision Making: Again Revisiting The Judicial Mind" by Kevin Quinn and Andrew Martin. Sirovich's approach was to perform Singular Value Decomposition (SVD) on the matrix of Supreme Court "roll calls" -- 468 votes cast during the 8 year period 1995-2002. In multidimensional scaling work the normal practice is to discard the unanimous votes because they contain no information about the ideal points of the voters unless strong assumptions are made about the proposal process. Sirovich included the 220 unanimous votes in his analysis. Consequently, when he performed a SVD on the 9 by 468 matrix the first singular vector was, in effect, (1/3, 1/3, 1/3, 1/3, 1/3, 1/3, 1/3, 1/3, 1/3) -- that is, the first singular vector picked up a "unanimous" dimension with all the justices almost at the same point (see Table 3, p. 7434). His second singular vector was: Stevens -0.445911 Ginsburg -0.367567 Breyer -0.327401 Souter -0.3127 O'Connor 0.104212 Kennedy 0.174192 Rehnquist 0.304502 Scalia 0.403145 Thomas 0.405752 This is clearly a liberal-conservative dimension that closely matches the standard journalistic description of the Court. In Table 2 Sirovich shows the Joint Probability for Disagreement for the Court. This table is reproduced below: Breyer 0.00000 0.11966 0.25000 0.20940 0.29915 0.35256 0.11752 0.16239 0.35897 Ginsburg 0.11966 0.00000 0.26790 0.25214 0.30769 0.36966 0.09615 0.14530 0.36752 Kennedy 0.25000 0.26709 0.00000 0.15598 0.12179 0.18803 0.24786 0.32692 0.17735 OConnor 0.20940 0.25214 0.15598 0.00000 0.16239 0.20726 0.22009 0.32906 0.20513 Rehnquist 0.29915 0.30769 0.12179 0.16239 0.00000 0.14316 0.29274 0.40171 0.13675 Scalia 0.35256 0.36966 0.18803 0.20726 0.14316 0.00000 0.33761 0.43803 0.06624 Souter 0.11752 0.09615 0.24790 0.22009 0.29274 0.33761 0.00000 0.16880 0.33120 Stevens 0.16239 0.14530 0.32692 0.32906 0.40171 0.43803 0.16880 0.00000 0.43590 Thomas 0.35897 0.36752 0.17735 0.20513 0.13675 0.06624 0.33120 0.43590 0.00000 Note that this table does not exactly match Sirovich's Table 2 in that his table has rounding errors. For example, the disagreement probability of the pair (O'Connor, Kennedy) is shown as 0.156 and the disagreement probability of the pair (Kennedy, O'Connor) is shown as 0.15598. These discrepancies are only at the 4th or 5th decimal place (the R software often produces this type of discrepancy!) so I simply chose one of the values to make the matrix symmetric. This should have absolutely no effect upon my analysis below. The above matrix is known in Psychometrics as a dissimilarity matrix and the properties of this type of data have been studied for almost 100 years (see The Past and Future of Ideal Point Estimation for an overview). Dissimilarities data can be treated as squared Euclidean distances and double-centered. This operation removes the squared terms and leaves only the cross-product matrix. This matrix is symmetric and can subjected to standard eigenvalue-eigenvector decomposition. A Skree plot of the eigenvalues is a good method of determining the dimensionality of a voting matrix (although it should never be used as the only method -- it should always be used in conjunction with standard fit statistics produced by a spatial voting model!). Below is a graph of the eigenvalues of the double-centered disagreement matrix: This pattern strongly suggests that there is only one dimension underlying the matrix. Indeed, below is the first eigenvector: Stevens -0.4981644 Ginsburg -0.3376050 Breyer -0.2985069 Souter -0.2694862 O'Connor 0.1074960 Kennedy 0.1602323 Rehnquist 0.3024991 Scalia 0.4167577 Thomas 0.4167775 this ordering exactly matches the 2nd singular vector shown above. Further evidence of unidimensionality comes from a non-metric multidimensional scaling analysis using KYST. Below is the one dimensional configuration from KYST: Stevens -1.248 Ginsburg -1.100 Breyer -1.054 Souter -1.041 O'Connor 0.700 Kennedy 0.776 Rehnquist 0.899 Scalia 1.034 Thomas 1.034 This ordering matches the two above. The STRESS value was 0.0098 indicating nearly perfect unidimensionality. Below is the Shepard Diagram for the scaling: Further evidence of unidimensionality of the current Court is provided by an application of Optimal Classification Analysis (OC) to the voting data for the current Court through 2001. In one dimension OC produces a rank ordering and in two or more dimensions is provides point estimates (these are really polytopes -- for a detailed explanation see): The total number of non-unanimous votes was 293 (the total number of votes in the sample was 512) and in one dimension the correct classification was 93.1% with an APRE of .755. OC produces the following rank ordering: 1 STEVENS 23 291 0.921 1.000 2 BREYER 30 290 0.897 2.000 3 GINSBURG 18 291 0.938 3.000 4 SOUTER 19 293 0.935 4.000 5 KENNEDY 13 293 0.956 5.000 6 OCONNOR 29 290 0.900 6.000 7 REHNQUIS 20 292 0.932 7.000 8 SCALIA 13 292 0.955 8.000 9 THOMAS 16 292 0.945 9.000 In the ordering above, the number just to the right of the Justice's name is the classification error and the number to the right of that is the total number of votes cast by the member. For example, placing Justice Stevens at rank 1 resulted in 23 classification errors out of a total of 291 votes cast. The proportion correct is 218/222 = .921 (which is shown just to the left of the rank). The rank-ordering from OC reverses the positions of Kennedy and O'Connor and Breyer and Ginsburg compared with the configurations above. In two dimensions the correct classification was 97.0% with an APRE of .893. Below is a plot of the two dimensional OC configuration (Justices in Blue are Republican appointees and Justices in Red are Democratic appointees): The OC results suggest the possible presence of a weak second dimension. However, this is probably simply noise fitting. Note that the second dimension is simply a Breyer-O'Connor dimension. Breyer and O'Connor are the two worst fitting (89.7% and 90.0% respectively) justices in one dimension. In two dimensions the fits for Breyer and O'Connor jump to 99.0% and 98.6% respectively whereas the increases in fit for the other justices only increase from 1 to 4 percentage points. The bottom line is that the current Court is basically unidimensional. Again, for a thorough in-depth analysis of the Supreme Court over the 1937 to 2000 period see the innovative markov-chain monte-carlo (MCMC) work of Kevin Quinn and Andrew Martin. The 1953-1991 period is analyzed by Bernard Grofman and Timothy Brazill who find basic unidimensional voting, and the 1994-97 period is used by Joshua Clinton, Simon Jackman, and Douglas Rivers to illustrate their IDEAL program in an one dimensional analysis. Site Links NOMINATE Data, Roll Call Data, and Software Course Web Pages: UC San Diego (2004 - ) University of San Diego Law School (2005) Course Web Pages: University of Houston (2000 - 2005) Spatial Models of Parliamentary Voting Recent Working Papers Analyses of Recent Politics About This Website K7MOA Log Books: 1960 - 2006 Bio of Keith T. Poole Related Links
global_05_local_4_shard_00000656_processed.jsonl/107842
Friday, May 08, 2009 This sounds like a pretty good idea, though I imagine at some point the garbage bags might start to pile up in the 'bag cupboard' at home. 1 comment: kushibo said... That is a truly good idea. I actually remember things before the "authorized" garbage bags and the extensive recycling, and there was a marked decrease in the former and a huge jump in the latter. I'm disappointed that back in Honolulu, Orange County, Las Vegas, Yolo County, the High Desert, and other places I go there just isn't the force of will to do something this extensive. Anyway, this really does kill two birds with one stone, and I imagine it will put a dent in the number of throwaway bags that people consume. Here in Hawaii, there is some effort to recycle, but it's all voluntary, not really involving any incentives to reduce as in Korea. The Safeway chain has special places where you can dump your dozens of unused plastic bags for recycling, though it relies on people just feeling like it.
global_05_local_4_shard_00000656_processed.jsonl/107855
Miami's Party Station Morning Show 30 Brilliant Test Answers From Cheeky Kids Bored Panda When a child’s answer to a question on a quiz or test is incorrect but clever, should they get credit for it? Here are 30 clever test answers that will make you wonder what’s better – the correct answer or the clever one. Naturally, the best-case scenario would be that one’s students would … Read More
global_05_local_4_shard_00000656_processed.jsonl/107856
PPC Wiki Jurassic Park 2,519pages on this wiki Most of the dinosaurs in these movies are from the Cretaceous period, actually. Jurassic Park refers to two novels by Michael Crichton which were made into a popular movie series. The books are heavily based on science and its perils—especially "playing god." Some of the science in it is technically possible, but most of it's plain and straight bad biology. There are several errors in the movies that paleontologists and dinosaur fans may find head-bangingly bad, as well as out-dated depictions of dinosaurs paired with errors in paleochronology. The films and books are pretty cool, though, so they're forgiven on account of being entertainment rather than a scientific documentary. The movies were adapted by Steven Spielberg, and mostly follow the books... except for a third movie, which was directed by Joe Johnston and was a sequel. Jurassic Park minis are mini-Tyrannosaurus rex. In Badfic Edit "Clever girl..." Jurassic Park badfic may focus on the relationships of the human cast of the story far too much, as in far too much for people who are being chased by dinosaurs, or may exploit post-trauma angst for hurt/comfort. Gary Stus able to kill all the dinosaurs are not unheard of, or even for the dinosaurs themselves to be Sued, especially the raptors. Mary Sues appear suddenly—for example, living in peace with the dinosaurs, or even turning into them. Dinosaurs, once again especially raptors, molesting people instead of eating them are depressingly common. Expect any overly sexual dinosaurs to have mammalian genitals or overly large equipment. Missions in this ContinuumEdit Around Wikia's network Random Wiki
global_05_local_4_shard_00000656_processed.jsonl/107858
1. Health Discuss in my forum Choosing Music to Be Born to... Updated April 29, 2014 Pregnant Woman Listening to Music Photo © iStockPhoto When I teach my childbirth classes about using music in labor, we play a really fun game. I've got a playlist on my iPod that is entitled childbirth class. In there I have a very unique selection of music. The instructions are to raise your hand if it's something that you might consider listening to for your birth. Then I start the music. The class gets to hear song selections from Beethoven to Prince, Sarah McLachlan to Hot Chocolate, and Amy Grant to the Mamas and the Papas. Some songs are slow, some are fast, some are merely ocean sounds or drum beats set to a baby's heart beat. There is never one song that everyone loves or everyone hates. It just goes to prove that music choice is much more personal than many believe when it comes to labor. When asked what music is best for labor most women and men will give you answers that entail soft selections, peaceful and calming music or nature sounds. While these might be great for some women, they are not perfect for others. To use music as a source of pain relief and relaxation in labor, you must feel a sense of connection with the music that is playing. If you choose the right music, you can increase your body's production of endorphins, nature's morphine-like substance used to combat pain in labor. So, what song does that? The song that will help you fight the pain of labor and make it more comfortable is the music that makes you turn up your radio and sing even if people in the car next to you are staring at you. It's the music that makes you move in your seat, even when you know you should sit still. It can be music that you danced to at your wedding, it can be your favorite songs form high school, it can simply be music that you currently just really, really love. This is why it's different for everyone. In my years as a doula, I've seen women give birth while listening to John Tesh and turn around and attend another birth where Pink Floyd was on tap. The bottom line is to choose music that you like. I do encourage you to find a selection of fast or moderate paced music for early labor it helps you bring out the dance and sway that helps rock the baby down into your pelvis. Then add some slower music for a calming effect in later labor or transition. The use of an iPod has really revolutionized how music is brought to labor. No longer do you have to haul around 40 CDs or tapes to get a few songs on each CD. I'd also recommend that you have a small set of portable speakers in your labor bag. Readers Respond: What music do you want for your labor? Related Video Making Music With Children 1. About.com 2. Health 3. Pregnancy & Childbirth 4. Labor and Birth 5. Pain Relief in Labor 6. Relaxation for Labor 7. Music for Labor & Birth - Choosing Music to Be Born To ©2014 About.com. All rights reserved. We comply with the HONcode standard for trustworthy health information: verify here.
global_05_local_4_shard_00000656_processed.jsonl/107882
On Air Now Listen Live Now » 106.1 FM Lansing, Michigan Current Conditions(Holt,MI 48842) More Weather » 48° Feels Like: 48° Current Radar for Zip PM Thunderstorms 74° Isolated Thunderstorms 55° Scattered Thunderstorms 74° Whitewashing in Joe Wright's 'Pan' Is Just the Tip of the Iceberg By Rosie Narasaki, Hollywood Staff We don't live in a post-racism society, folks. I mean, come on - yesterday, a homeless woman very pointedly told me not to eat my dog! Granted, she was probably nuts, but this is happening on much larger scale than crazy ladies and my evening walk with my dog. Last week, it was announced that Joe Wright - the director behind critical hits like Atonement and Pride and Prejudice (as well as critical misses, like Anna Karenina) - had cast Rooney Mara as Native American character Tiger Lily. Now, that's just plain wrong. Many fans are petitioning for a recast, yet some don't seem to mind - and even go so far as to liken the situation to Michael B. Jordan's upcoming turn as the Human Torch. Luckily, Whedonverse actress Felicia Day is setting people straight; she has some wise and cogent words on why Tiger Lily and the Human Torch are not even remotely the same situation: Most lead characters and lead actors of movies are white ... Across 100 top-grossing films of 2012, only 10.8% of speaking characters were Black, 4.2% were Hispanic, 5% were Asian, and 3.6% were from other (or mixed race) ethnicities. Just over three-quarters of all speaking characters are White (76.3%) ... Bottom line, actors of ethnicity don't get a lot of work to begin with. And that very fact creates a scarcity in the number of actors of different ethnicities to choose from when casting ... In what instance can you point out a role where a Native American actress has a chance to be a lead in any movie? Almost none ... The opportunity to give a leading role that could be a Native American, a possible protagonist role that the audience could relate to and live the story through, to a white actor, is kind of s**tty and backwards to me. But you know what the worst part of this whole debacle is? We're not moving forward: whitewashing is not something we left back in the days of ultra-racist filmmakers like D.W. Griffiths and grossly distorted stereotypes like Mr. Yunioshi. No, it's still a pervasive problem that continues to flood all avenues of pop culture - films, music, television - even celebrities. Remember when former DWTS star Julianne Hough thought it was okay to don a little blackface to portray her favorite Orange Is the New Black character? Just last summer, J.J. Abrams cast whiter-than-white actor Benedict Cumberbatch (he and Rooney Mara could probably go head-to-head in a Caucasian-quotient contest) to play Khan Noonien Singh, a role originally played by Mexican actor Ricardo Montalban. How telling is it, that in some ways, 1960's Gene Roddenberry was more progressive than present-day Abrams? And a little more than month ago, Katy Perry shamelessly appropriated Egyptian culture in her latest music video - and that's after dressing up like a geisha at the VMAs. Oh, and let's not forget that at the beginning of this year, well-loved sitcom How I Met Your Mother (or, as dubbed by Twitter, #HowIMetYourRacism) employed some tasteless (not to mention tin-eared) yellowface. It's hard to believe that we're still seeing this kind of ignorance and blatant whitewashing in this day in age. Well, at least we can still hold out hope for a recast. Follow @Hollywood_com Follow @RosieNarasaki
global_05_local_4_shard_00000656_processed.jsonl/107884
Celebrity videos and pictures We Have Tons Of Die Another Day Pictures & Videos We have found some free die another day videos and pictures. Browse die another day Videos » Get More Die Another Day Stuff « Manowar - Return of the Warlord [HD 720p] Madonna - La Isla Bonita (Live Sticky & Sweet Tour) Jeff Hardy *NEW* TNA Heel Theme - Another ( Dale Oliver Remix ) + Lyrics the bee gees-paying the price of love Disturbed Warrior Asylum 2010 [HD720p] with Lyrics Skillet- Hero Official Music Video Avenged Sevenfold - Tonight The World Dies Bittencourt Project - Holding Back the Fire Helloween-March Of Time (GOOD QUALITY) Dior Haute Couture Fall/ Winter 2003 (part 1) Avenged Sevenfold - Unbound (The Wild Ride) Lyrics Stephen Lynch - Grand Father Die Another Day - Fencing Scene Part 1 [HD].avi Megadeth - Endgame - 2. This Day We Fight! Meshuggah - Straws Pulled At Random (Original Version) Tango CBJ 3º ano - Die Another Day The Die- Lupe Fiasco Terry Tate - Draft Day K-os Crucial Alice's Theme (Alice In Wonderland) 2010 Danny Elfman Manowar (The Sons of Odin) - Berserk AMV A Normal Day Nick Drake - Day is Done Breaking Benjamin - Until the End More Die Another Day Videos Browse die another day Images Die Another Day video script Die Another Day Die Another Day EP3 Die Another Day 007 - Die Another Day Die Another Day Chris - Die Another Day Die Another Day die another day Die Another Day Bob Anderson signing my picture (Darth Vader stunt double and swordmaster also LOTR Mask of Zorro Pirates of the Caribbian Die Another Day etc) Die Another Day Crew Jacket Die Another Day 007: Die Another Day Frost Miranda Frost Die Another Day 2002 Guess I'll die another day Die Another Day Crew Jacket die another day Die Another Day James Bond Sideshow 2002 boxfront Die Another Day 1 Die Another Day (2002) Die Another Day getting ready for die another day More Die Another Day Images Die Another Day In The News Sundance 2011: 'Another Happy Day' Another Happy Day," an utterly routine dramedy aimed at middle ... There's a doddering grandpa (George Kennedy) who keeps threatening to die in a funny way (and eventually does), a precocious little kid who might have Asperger's and a cynical teen who is ... Source: New York Post How Do You Want to Die? He called me the next morning said he had an upset stomach and was going to wait another day before he started to drive home. That evening his niece called and said she went to get some take out for dinner and when she returned my father was found on the ... Source: Associated Content Afghan police: 8 die in Kabul supermarket blast Earlier in the day, Mohammad Zahir, the chief of criminal investigation for the Kabul police, had said five foreigners - a man and four women - had been killed. He said an Afghan child was among the other three victims. Ahmad Zaki, another criminal ... Source: Forbes Up to 13 die in latest attacks in central Nigeria The attack in the town of Tafawa Balewa in Bauchi state came the same day police said members of a radical Muslim ... Those tensions have seen more than 200 people die in the last month's time around the central Nigerian city of Jos, a flash point of ... Source: Associated Press I Can Die Now, I've Met Betty White: National Treasure Stars in Hallmark Hall of Fame As I was leaving the Hallmark Of Fame reception at 20th Century Fox' commissary, a studio guard wished me a good night to which I replied, "I can die now, I've met Betty ... Someone like Betty White, someone said. Another replied, So why not get the real ... Source: Huffingtonpost.com Challenger tragedy: A day time stood still The crew compartment shot out of the fireball, intact, and continued upward another three miles before plummeting ... They became the first shuttle astronauts to die on the job. Dick Scobee. Michael Smith. Ellison Onizuka. Judith Resnik. Source: Cincinnati.com At least 5 die in another bombing of Iraqi security forces Inside the building, an employee described the blast as a "death storm." "We felt that life was over and it was Judgment Day," he said. "Everything collapsed." An intelligence officer in Diyala said police had reports of four vehicles with explosives in ... Source: Denver Post On this Day in History for January 29 904 – Sergius III comes out of retirement to take over the papacy from the deposed antipope Christopher. 1676 – Feodor III becomes Tsar of Russia. 1814 – France defeats Russia and Prussia in the Battle of Brienne. 1834 – US President Andrew Jackson ... Source: ArkansasMatters i>Make My Day While there is satisfaction in knowing that the 71-year-old Madoff will likely die in disgrace behind the walls of a federal ... What we don't need is for the FCIC to be another version of the 9/11 Commission, a panel that was never allowed to fully and ... Source: American Reporter 25 hit-man movies to die for Moving to another seat would only be an admission that she had beaten ... Prizzi's Honor" - This is a couple with serious trust issues. 9. "The Day of the Jackal" - Rid your mind of the Bruce Willis remake. This 1973 original is a great one. 8. Source: Kansas City Star
global_05_local_4_shard_00000656_processed.jsonl/107894
Chinese authorities are turning their noses up at fake Champagne Chinese authorities are adopting a French attitude about the making of Champagne. In other words, “It’s not Champagne if it’s not Champagne.” On May 27, Chinese authorities registered Champagne as an official label (link in French) to be used only for wine hailing from the French region for which the sparkling drink is named. Some analysts think China is using the Champagne deal to cozy up to France and put pressure on the UK. Chinese-British relations have been cool since British prime minister David Cameron met the Dalai Lama last year. Champagne producers and president Francois Hollande have been lobbying countries to restrict use of the name. In France, only wine made in officially designated vineyards in France can be labeled Champagne. But in the US, up to 50% of sparkling wine (paywall) sold is labeled Champagne despite not being from the region, according to the US Champagne Bureau. By banning Chinese Champagne copycats, French producers hope to gain an edge in China’s growing luxury wine and liquor market as sales slow elsewhere. Last year, global sales of the sparkling wine fell 4.4%, mostly because of a 9% drop in France, where half of all Champagne is consumed. Still, Chinese citizens are less taken by the beverage than other imports like Cognac and red wine. Sales of sparkling wine account for only 0.5% (pdf, registration required) of Chinese wine consumption (even though sales are expected to grow 27% between 2012 and 2016, according to Vinexpo, a wine trade fair, and International Wine & Spirit Research). “The Chinese ignore the sparkling wines right now,” Robert Beynat, chief executive of Vinexpo, told the Wall Street Journal (paywall) in March. The hitch, according to some, is temperature and taste: cold, acidic Champagne doesn’t fit mainland tastes for Chinese drinks like baijiu, a white grain liquor that is served at room temperature. There’s also a language barrier. The term for sparkling wine, qipao jiu, could also be translated as “blister wine.” Top News Powered by WordPress.com VIP
global_05_local_4_shard_00000656_processed.jsonl/107913
DNSimple Ruby Client Build Status A Ruby command line utility and wrapper for the DNSimple API. DNSimple provides DNS hosting and domain registration that is simple and friendly. We provide a full API and an easy-to-use web interface so you can get your domain registered and set up with a minimal amount of effort. $ gem install dnsimple-ruby Create a file in your home directory called .dnsimple. In this file add the following: Or if using an API token api_token: YOUR_API_TOKEN There are two ways to interact with the DNSimple Ruby wrapper. The first is to use the command line utility that is included. The commands available are as follows: For help: The following commands are available for domains: Please note that domain registration and transfer can only be done through the API for domains that do not require extended attributes. A future version of the API will add support for extended attributes. The following commands are available for records: The following commands are available for custom templates: The following commands are available for managing contacts: The following commands are available for purchasing certificates: The contact name/value pairs are: Wrapper Classes In addition to the command line utility you may also use the included Ruby classes directly in your Ruby applications. Here’s a short example. require 'rubygems' require 'dnsimple' DNSimple::Client.username = 'YOUR_USERNAME' DNSimple::Client.password = 'YOUR_PASSWORD' DNSimple::Client.http_proxy = {} user = DNSimple::User.me puts "#{user.domain_count} domains" puts "Domains..." DNSimple::Domain.all.each do |domain| puts " #{domain.name}" domain = DNSimple::Domain.find("example.com") domain.apply("template") # applies a standard or custom template to the domain domain = DNSimple::Domain.create("newdomain.com") puts "Added #{domain.name}" domain.delete # removes from DNSimple For the full API documentation visit http://rubydoc.info/gems/dnsimple-ruby
global_05_local_4_shard_00000656_processed.jsonl/107930
You are here AKVIS Retoucher plugin i found out that akvis has a lot of very beneficial plugins for photo editing softwares. however i found out that Retoucher Plugin is not available for GIMP. this is such a downer since this is a very important plugin. i know some programming. is it possible to create an AKVIS Retoucher like plugin for GIMP? anybody who knows how? can you help me and walkthrough with me in this project? big thanks. there is also the standalone version, about your project AKVIS Retoucher is commercial not Open Source so its code is secret as , i suppose the algorithm it use to denoise but could be possible modify this script to call AKVIS Retoucher (Not the plugin but the standalone) from gimp.. this works well with many other SW so may(be) works also with AKVIS Retoucher anyway you may found some very good denoising filter in the GMIC plugin, another alternative may be waveleight denoise (you will found both on this side) Subscribe to Comments for "AKVIS Retoucher plugin"
global_05_local_4_shard_00000656_processed.jsonl/107934
Onward Christian Terrorists; Fighting Evil in the Obama Era Could it be sheer coincidence that the murderous attack on the Holocaust Museum in Washington DC on Wednesday by James W. von Brunn, an anti-Semitic Christian terrorist, occurred scarcely a week after an attack on a Wichita health clinic that performed abortions? Perhaps. Though it is also possible that these incidents, and a host of other threats in recent months, are the violent fringe of a new wave of religiously-motivated violence that might rival America’s Christian terrorism of the 1990s. If, as it seems, Scott Roeder was indeed the culprit behind the ghastly killing of Dr. George Tiller last week in a Wichita church, the attack raises the possibility of the beginning of a new wave of Christian terrorism in the Obama era. Ruby Ridge and other incidents in the 1990s culminated with the Oklahoma City Federal Building bombing, an event so horrendous that it seems to have sobered the radicalism of many Christian militia members. Then came the eight-year reign of President George W. Bush who voiced his support for anti-abortion activists and gave the impression that they had a friend in the White House. The violence abated. All this may now be changing. A new president is vilified in the right-wing press not only as pro-abortion but as a demonic figure. The image is one of desperation: that the moral authority of the country has been taken captive by an evil enemy. This has the effect of giving moral license to an image of cosmic war, goading the violent urges of some of the most extreme of the Christian activists, whose world view is a melange of millenarianism and anti-abortion adventurism. Scott Roeder’s religio-political stance is a disturbing example of the revival of this 90s-era Christian terrorism. Though Roeder has been identified with the right-wing Freeman movement, he is also closely related to one of the 1990s most vicious Christian extremist groups, the Army of God [warning: while this link leads only to the Wikipedia page, should you then decide to click through to the AOG website please note that it can be very disturbing]. Roeder has been associated with the movement for some years, and his actions—such as pouring glue into the locks of clinics that perform abortions—are straight out of the Army of God Manual, said to have been authored by Rev. Michael Bray, the Army’s “chaplain.” Last week, soon after Roeder’s attack on Dr. Tiller, Bray wrote a publicly-published letter to Roeder, declaring that the assassin had acted in “righteousness and mercy.” Bray went on to praise Roeder for following the commandments of God as he “sought to deliver the innocents from the knife of a baby murderer.” Bray is the author of A Time to Kill, the 1990s booklet that gave a theological justification for anti-abortion activism. One of Bray’s best friends, Rev. Paul Hill, was a Presbyterian pastor who killed several staff members of a Pensacola, Florida clinic that performed abortions. Hill was convicted by the State of Florida, sentenced to the death penalty, and recently executed for his crime. Bray himself served prison time for a lesser offense, bombing several abortion-related clinics on the Eastern seaboard. Some years ago I interviewed Bray at his home in Bowie, Maryland [see Terror in the Mind of God, UC Press, 2003]. What I found was a likeable Lutheran pastor with a solid theological background whose worldview was much more sophisticated than simply an anti-abortion stance. Bray saw society at the brink of economic and moral decay, and envisioned a radical revolution that would usher in a Christian world order. According to Bray, Americans live in a situation “comparable to Nazi Germany,” a state of hidden warfare, as the comforts of modern society have lulled the populace into apathy. Bray was convinced that a dramatic event, such as economic collapse or social chaos would reveal the demonic role of the government, and people would have “the strength and the zeal to take up arms” in a revolutionary struggle. What he envisioned as the outcome of that struggle was the establishment of a new moral order in America, one based on biblical law and a spiritual, rather than a secular, social compact. Until this new moral order is established, Bray said, he and others like him who are aware of what is going on and have the moral courage to resist it are compelled to take action. According to Bray, Christianity gave him the right to defend innocent “unborn children,” even by use of force, whether it involves “destroying the facilities that they are regularly killed in, or taking the life of one who is murdering them.” By the latter, Bray meant killing doctors and other clinical staff involved in performing abortions. Bray defended the 1994 actions of his friend, Rev. Paul Hill, in killing Dr. John Britton and his escort. Bray’s theological justifications were echoed by Hill himself. “You may wonder what it is like to have killed an abortionist and his escort,” Hill wrote to Bray and his other supporters after the killings. “My eyes were opened to the enormous impact” such an event would have, he wrote, adding that “the effect would be incalculable.” Hill said that he opened his Bible and found sustenance in Psalms 91: “You will not be afraid of the terror by night, or of the arrow that flies by day.” [NAS Bible]. Hill interpreted this as an affirmation that his act was biblically approved. When I suggested to Bray that carrying out such violent actions is tantamount to acting as both judge and executioner, Bray demurred. Although he did not deny that a religious authority has the right to pronounce judgment over those who broke the moral law, he explained that attacks on abortion clinics and the killing of abortion doctors were essentially defensive rather than punitive acts. According to Bray, “there is a difference between taking a retired abortionist and executing him, and killing a practicing abortionist who is regularly killing babies.” The first act is in Bray’s view retributive, the second defensive. According to Bray, the attacks were aimed not so much at punishing clinics and abortionists for their actions as at preventing them from “killing babies,” as Bray put it. He was careful to say that he did not advocate the use of violence, but morally approved of it in some instances. He was “pro-choice,” as he put it, regarding its use. Bray found support for his position in actions undertaken during the Nazi regime in Europe. His moral exemplar in this regard was the German theologian and Lutheran pastor, Dietrich Bonhoeffer, who abruptly terminated his privileged research position at Union Theological Seminary in New York City to return to Germany and clandestinely join a plot to assassinate Hitler. Bray also cited Reinhold Niebuhr, one of the greatest Protestant theologians of the twentieth century. Niebuhr began his career as a pacifist, but in time he grudgingly began to accept the position that a Christian, acting for the sake of justice, could use a limited amount of coercive force. Once again Christian theological arguments are being advanced to support the most lethal acts of terrorism. In the imaginations of Scott Roeder, James W. von Brunn, and Michael Bray, they are soldiers in an awesome war, a grand struggle between the forces of good and the reign of evil—now incarnate in the Obama era of liberal society. Their positions might be taken as poignant reminders of the past if they were not so vividly in the present, and so gruesomely destructive. Mark Juergensmeyer is Professor of Sociology and Director of Global and International Studies at the University of California, Santa Barbara. He is the winner of the Grawemeyer Award for his book Terror in the Mind of God (UC Press). He is the editor of Global Religions: An Introduction and is also the author of The New Cold War? Religious Nationalism Confronts the Secular State and Gandhi's Way: A Handbook of Conflict Resolution, both from UC Press.
global_05_local_4_shard_00000656_processed.jsonl/107941
King Saud University Repository > King Saud University > Humanities Colleges > College of Languages and Translation > College of Languages and Translation > Title: Phonological and orthographic problems in EFL college spellers Authors: Al-Jarf, Reima Keywords: Spelling EFL spellers Issue Date: 2009 Publisher: Azad Islamic University‐Roudehen Citation: TELLIS Conference Proceedings. Azad Islamic University‐Roudehen, Iran. Abstract: 36 EFL freshmen students took a listening-spelling test in which they filled out 100 blanks in a dialogue. Results indicated that 63% of the spelling errors were phonological, 37% were orthographic. Saudi freshman spellers in general have more phonological problems with whole words but more orthographic problems with graphemes. The most common phonological problems that poor spellers have are: Inability to hear and discriminate all or most of the phonemes in a word, hearing and inability to discriminate vowel phonemes and hear the final syllable or suffix. They mostly have orthographic problems with vowel digraphs, double consonants, silent vowels and consonants and homophones. A detailed report of EFL students are given. URI: http://hdl.handle.net/123456789/5618 Appears in Collections:College of Languages and Translation Files in This Item: File Description SizeFormat Phonological and Orthographic Problems in EFL College Spellers.pdf73.52 kBAdobe PDFView/Open
global_05_local_4_shard_00000656_processed.jsonl/107993
TY - THES T1 - Studies on the phase I and II metabolism and the toxicological analysis of the alkaloids of the herbal drug of abuse Mitragyna speciosa Korth. (Kratom) using gas chromatography-mass spectrometry and liquid chromatography coupled to low- and high-resolution linear ion trap mass spectrometry A1 - Philipp,Anika-Anina Y1 - 2011/07/05 N2 - In the presented studies, the herbal drug Kratom (Mitragyna speciosa) was investigated regarding its metabolism and its toxicological analysis in rat and human urine. Depending on the plant species and plant parts the three most abundant alkaloids of Mitragyna speciosa are MG, PAY and the MG diastereomer SG. Further alkaloids are the MG diastereomers SC and MC and ISO-PAY the diastereomer of PAY. The diastereomers of MG and PAY were mainly metabolized by hydrolysis of the methylester in position 16 and O-demethylation of the 9-methyoxy group. Further steps were the O-demethylation of the 17-methoxy group, followed, via the corresponding aldehydes, by oxidation to carboxylic acids or reduction to the correspondent alcohols, and combinations of these steps. As metabolic phase II reactions, partial glucuronidation and sulfation were observed. The metabolism study showed that all diastereomers of MG and PAY were extensively metabolized in rats and humans with some differences, particularly in phase II metabolism. In the case of Kratom, the target analytes for the toxicological analysis were the derivatized MG parent substance, the 9-O-demethyl metabolite of MG, the free carboxy group metabolite of MG, and the 9-O-demethyl-16-carboxy metabolite of MG. KW - Pflanzliche Droge KW - Stoffwechsel KW - Harn KW - GC-MS KW - LC-MS CY - Saarbrücken PB - Saarländische Universitäts- und Landesbibliothek AD - Postfach 151141, 66041 Saarbrücken UR - http://scidok.sulb.uni-saarland.de/volltexte/2011/4074 ER -
global_05_local_4_shard_00000656_processed.jsonl/107994
Hot models! One of the things I love about science–but that can also be frustrating–is that every new piece of information leads to a new unanswered question. We’ve learned so much about microbiology and human disease since the time of Koch and Pasteur, but in many other ways, we’re still at square one. One reason is because research over the last century has largely focused on disease-causing organisms–and within those, many studies have focused on identifying factors that allow these organisms to cause disease. This concentration has led to many breakthroughs (such as vaccine targets), but it has also left a number of notable shortcomings in our knowledge. For instance, I’ve written previously mentioning just how little we know about our own commensal flora. Another area where we have a surprising dearth of knowledge is the transmission of infectious agents. To back up a bit, when we look at the components of an infectious disease, we often break it down into a few steps. (Note that I’m simplifying quite a bit here, but bear with me). The organism must first colonize the host, which means either being able to avoid or otherwise escape the host’s intrinsic defenses. These defenses include “mechanical” barriers (such as the mucus layer) as well as more specific defenses, including the various cells and proteins of the immune system. They then must be able to replicate. Depending on the organism, this may require additional invasion into host tissues or the host cells themselves (such as viruses and intracellular bacteria). These organisms then may either persist in the host for years (such as the Pseudomonas I described here), or they may cause an acute infection and be quickly cleared by the host. In either case, the host will be a “dead end” unless the organism is then transmitted to another host. Examining the phenomenon of transmission isn’t as easy one may think. Generally, there are two ways we can approach it (and again, I’m simplifying). We can carry out epidemiological studies, looking at how an organism passes between individuals, and then working to correlate that to the biology of the organism (and/or the host). Occasionally, we can use human volunteers, but this frequently isn’t possible. Alternatively, we can model this in animals. This is how typical studies of pathogen virulence have been carried out: inoculate a model animal with the organism of interest, and observe whatever parameters are of interest. Many permutations, of course, exist: the investigator can knock out a putative “virulence gene” in one strain of pathogen and inoculate them into one group of animals, while infecting a second group of animals with the wild-type strain to see whether the knocked out gene affects the course of disease. There are dozens of possibilities, but generally they involve an artificial administration of the pathogen (for example, by injection). This allows the investigator to control the dose of the organism the animal receives, but real life is obviously much more messy. These types of animal studies have taught us a lot about factors that contribute to colonization and virulence, but not as much about the other important part of disease development: transmission of the agent to a new host. Additionally, for transmission studies, it’s difficult to directly extrapolate from animals living in cages to the human population. Therefore, while we can glean a great deal from these types of studies, they’re certainly not perfect. This gap has recently been highlighted by the outbreak of H5N1. We have a few clues suggesting why it’s so virulent, but the million dollar question is: what will make it more easily transmissible between humans? This is when the trouble really starts: when it spreads among humans without any need for birds as a reservoir. There has been at least one aspect of the host-virus interaction that has been proposed to play a role in effective transmission. As reviewed at Effect Measure, two groups of scientists have suggested that the specific types of sugars on cells of our lungs–and where they appear within the lobes of our lungs–play a role in the binding of H5N1 to mammalian cells, and therefore may effect how efficiently transmitted these viruses are. However, the basis of this is rather sketchy: we don’t have enough information about other influenza viruses that were present in the human population but not effectively transmissible to know if this is a valid generalization or not. Additionally, animal models of influenza transmission have been less than optimal. Mice don’t consistently transmit the virus from one animal to another, and influenza viruses generally have to be “mouse adapted” (for example, by serial passage) in order to efficiently infect the animal. (The 1918 “Spanish” influenza strain, and several recent H5N1 strains, have been notable exceptions). Additionally, even when using a mouse-adapted strain (WSN), it wasn’t found to be transmitted between mice in an experimental setting. The other animal model commonly used in studies of influenza–ferrets–are more naturally susceptible, but present other difficulties as far as acquisition and housing of animals. Therefore, a new study went back to the animal whose very name is synonymous with medical research–the guinea pig. They found that this served as an improved model. Virus was transmitted between guinea pigs that were housed together, both in the same cage and when separated by a distance of ~3 feet (meaning you might want to stay a little farther away from those infected co-workers…) However, I don’t think this paper was PNAS material. Yes, the guinea pig model seems to be less cumbersome than the ferret one, and perhaps more biologically similar to humans than a mouse one, but it’s not a huge breakthrough, nor a particularly novel piece of research. Still, anything that draws more attention to this critical gap in our understanding of agent transmission is a good thing, IMO. If we had a better handle on the factors that caused an avian strain of influenza virus to be more efficiently transmitted among humans, then we could better focus our resources and know when to really sound the alarm–unlike now, when we’re flying blind in many ways. Lowen et al. 2006. The guinea pig as a transmission model for human influenza viruses. PNAS. 103:9988-92. Image from 1. #1 revere June 30, 2006 Nice post, Tara. What’s especially interesting is your use of the word “model” here, which is the use biologists prefer. Models for a biologist are animal models, i.e., what Keller calls “stable targets for explanation,” like a fruitfly, a mouse or a ferret. Animal models have several characteristics that make them useful to biologists. They can be “standardized,” so that findings of one lab can be checked and compared with another; they can be manipulated experimentally, something we usually cannot do with the human animal (and hence provides employment for us observational epidemiologists); they retain all the relevant complexity of the real object of investigation (e.g., the mammalian cell, human physiology or biology). This last is one of the things that differentiates the biologist’s models from those of the mathematician or physicist. For those of us who are “modelers” a model is a stripped down bones-only version of what we are trying to understand. We try to get rid of just those complexities that are so important to biologists. This is one of the reason that mathematicians and physicists had such a hard time collaborating historically. The minute the physicist says to the biologist, “First assume your mouse is a perfect sphere,” the biologist tunes out. The science studies scholar Evelyn Fox Keller at MIT has written a fascinating book about the history in the 20th century of mathematicians and physicists trying to work with developmental biologists. Keller is especially well equipped to discuss this as before she became one of the better known feminist science study specialists she was a mathematical biologist who worked with Lee Siegel on slime molds. Her book, Making Sense of Life was published in 2002 by Harvard Univ. Press and is now out in paper. It is a really fascinating read and I recommend it highly. 2. #2 Salvador July 1, 2006 That’s very true. Another point that I find crucial and is most of the times misleading is not only the model used, but the strain. We think of pathogenic organisms as homogeneous entities that have been waiting for us to come during their evolutionary lifetime, and to which we are the tastiest thing. With this common way of thinking we forget first of all, that in many cases most of the strains are non-pathogenic. That they might not be obligate pathogens.That they might not get as much as we think they can get from us ( there are many places where you can get food and you don’t find such a “ferocious” immune system as ours ). And, finally, that what we call “pathogenicity factors” might have, in their original environment, a more useful function than to “cause disease”. Examples of this are found in the literature. The outcome of this is that we have a lot of fascinating work to do, and many uncovered secrets to find! 3. #3 Sandra Porter July 1, 2006 Quoting revere: Try explaining “vector masking” to a programmer. Interdisciplinary language is sooo much fun!
global_05_local_4_shard_00000656_processed.jsonl/107997
Currently Being Moderated How to Implement an Web Dynpro for Java Application with Stateless and Stateful Behavior In this tutorial you learn how to implement a Web Dynpro application which runs stateless and how you switch between stateless and stateful mode. It explains the concept of stateless and the differences between running stateless and stateful and thus helps to decide in which cases it makes sense to run an application in stateless mode. Furthermore it explains the API methods offered for stateless support. View this Document Delete Document Are you sure you want to delete this document?
global_05_local_4_shard_00000656_processed.jsonl/107998
Off to CES… We’re going to be streaming live from the CES bus. Mogulus is streaming (starts at around 1 p.m. today Pacific Time — our bus ride will take at least eight hours, so come join us this afternoon). I’m using my cell phone over at Qik too (they just shipped me a new version that lets me deliver really high resolution while we’re on a 3G network). I’ll be doing a lot of little live snippets on my cell phone. And, of course, I’ll be on Twitter and Seesmic too. For those of you coming to CES, there’s a bunch of events listed on Yahoo’s Upcoming Events page for CES2008. Plaxo: the social monster? First of all, just to make clear, I have NOT used any of the data I collected using Plaxo’s service. That all went into a separate test account and I’m not using that data and neither is Plaxo. Why not use it? Because of exactly the issues that Judi brings up. Trust. Why do it? Well, I wanted to push Facebook’s buttons. I think it’s sad that they import email addresses and other data from Gmail and track my Blockbuster usage and use my adding my name to the Saturn page but they aren’t willing to share some of its data back out with these systems. So, to Judi, why is it OK for Facebook to import all my Gmail email addresses? Why aren’t you screaming bloody murder about THAT? After all, did anyone on Gmail approve me to import their email addresses to Facebook? On another similar, but tangental point. Second, if you add me as a friend I assume you want me to send you emails and interact with you. But, it’s clear that some of you didn’t really want me to do that when you added me as a friend. Maybe we need DRM for friends. Something with options like: COMPLETELY OPEN: You’re allowed to take anything on my profile page and import it, use it, copy it, print it, import it. EMAIL ONLY: You can only take my name, and email address to other systems. EMAIL PLUS CORE PERSONAL INFO: In addition to email address and name you can also take my birthday and phone number to other systems. CUSTOM: You choose which fields can be exported or used on other systems. NAPKIN ONLY: You can use anything you want, but no automated systems, you’ve gotta manually copy everything over by hand. PUBLIC ONLY: Only data that I put on my public profile can be used elsewhere. FAN ONLY: I only wanted to see your social network and behaviors here, I don’t want to give you access to mine. But, back to Judi: she asks what will Plaxo’s future owners do with the data it collects? Now THAT is a good question but I’m wondering the same thing about Facebook. Will they sell it to the government? Will they sell it to General Motors? Will they give it to their partners like Blockbuster? EXCELLENT question! The thing is, you shouldn’t worry too much about your friends. It’s easy to kick them in the butt if they sell you out. But what if Mark Zuckerberg sells you out? Or, even, decides to erase you for whatever reason he comes up with tomorrow? What then? Oh, and to the few people who thought I had a financial arrangement with Plaxo, let me make this extremely clear: I disclose ALL financial arrangements with companies I use. I have NONE with Plaxo. Is Plaxo a social monster for trying to import? That’s for you to decide, but why weren’t you all up in arms when Facebook imported your data and your friends email addresses from Gmail? Inspiration and repetition When the first email came through telling me about Major Andrew Olmsted getting killed in Iraq and how he was a blogger and that I should read it, I ignored the advice. Too busy getting ready for CES and needed to finish off a Fast Company column that’s overdue. But then I started reading my feeds and it kept getting recommended to me over, and over, and over again. Now I’m going to add onto that repetition. His blog post that he had a friend post after his death is wonderful . I’m glad I listened to all of you who suggested that it is something I should read. I bet on the wrong HD format, sorry… I bought an HD-DVD player back when I worked at Microsoft and I evangelized for the format. As Christopher Coulter loves making fun of, the format I bet on today turned out to be the wrong format. Am I going to run out and buy a BluRay player? Maybe, I’ll definitely be looking at those next week at CES. One thought, though, is that I can’t watch all the HD movies I’m getting from NetFlix, my Xbox, and my DirecTV dish so there’s not a pressing need on me to go out and get a box immediately.
global_05_local_4_shard_00000656_processed.jsonl/108020
SEO News Movie Theater 1. How People Search For Movies on Google Predicts Box Office Revenues [Study] Theater count Who doesn't love a good movie? Searches on Google tell us that moviegoers are actively engaged in search and use the results to make decision on what movie to see. Not only has Google found a way to quantify movie search intent, but... 2. How the Gun Control Debate is Impacting Search Results Between May and July of last year (the month when the movie theater shooting occurred), the number of results increased drastically and continued a steady climb as the months progressed. With the December massacre at Sandy Hook Elementary in... 3. Social Retail: Finding, Engaging & Cultivating Today’s Connected Consumer Users engaged with TV and movie content aren’t simply sitting on the coach or in a theater watching the entertainment anymore. No longer is a consumer finding the next styles or products they want in a catalog that ends up in their mailbox. Drive-in Movie Theater Stars in Animated Google Doodle Happy Fourth of July to all of our readers in the United States! Just as barbecues and fireworks have become tradition on this date, so too have holiday Google Doodles. Drive-in Movie Theater Stars in Animated Google Doodle Google honors the life and work of a man whose accomplishments were many; a brilliant academic and codebreaker, Turing is also known amongst computer scientists as the father of artificial... 6. Alam Ara, First Indian Film With Sound, Celebrated with Google Doodle It debuted March 14, 1931 in Bombay, and to celebrate the 80th anniversary of the movie, Google India has posted a "Alam Ara" movie theater-themed Doodle: "Alam Ara" (which means "The Light of the World") was the first movie featuring sound in... Okay, so maybe that was a little like shouting "fire" in a crowded theater. Sooner or later, they need to heed the advice of Cher in the movie Moonstruck: "Get over it! I apparently caused a stir yesterday at the PRSA International Conference in...
global_05_local_4_shard_00000656_processed.jsonl/108024
jump to search box Handbook of fuel cells : fundamentals, technology, and applications / editors, Wolf Vielstich, Arnold Lamm, Hubert A. Gasteiger. At the Library Other libraries Beginning date: Ending date: Chichester, England ; New York : Wiley, c2003-2009. • Book • 6 v : ill. (some col.) ; 29 cm. Includes bibliographical references and index. • VOLUME 1: FUNDAMENTALS AND SURVEY OF SYSTEMS.Contributors to Volume 1.Foreword.Preface.Abbreviations and Acronyms.Part 1: Thermodynamics and kinetics of fuel cell reactions.Part 2: Mass transfer in fuel cells.Part 3: Heat transfer in fuel cells.Part 4: Fuel cell principles, systems and applications.Contents for Volumes 2, 3 and 4.Subject Index.VOLUME 2: ELECTROCATALYSIS.Contributors to Volume 2.Foreword.Preface.Abbreviations and Acronyms.Part 1: Introduction.Part 2: Theory of electrocatalysis.Part 3: Methods in electrocatalysis.Part 4: The hydrogen oxidation/evolution reaction.Part 5: The oxygen reduction/evolution reaction.Part 6: Oxidation of small organic molecules.Part 7: Other energy conversion related topics.Contents for Volumes 1, 3 and 4.Subject Index.VOLUME 3: FUEL CELL TECHNOLOGY AND APPLICATIONS: PART 1.Contributors to Volumes 3 and 4.Foreword.Preface.Abbreviations and Acronyms.Part 1: Sustainable energy supply.Part 2: Hydrogen storage and hydrogen generation. Development prospects for hydrogen storage.Chemical hydrogen storage devices.Reforming of methanol and fuel processor development.Fuel processing from hydrocarbons to hydrogen.Well-to-wheel efficiencies.Hydrogen safety, codes and standards.Part 3: Polymer electrolyte membrane fuel cell systems (PEMFC).Bipolar plate materials and flow field design. Membrane materials.Electro-catalysts.Membrane-electrode-assembly (MEA).State-of-the-art performance and durability.VOLUME 4: FUEL CELL TECHNOLOGY AND APPLICATIONS, PART 2.Contributors to Volume 3 and 4.Foreword.Preface.Abbreviations and Acronyms.Part 3: Polymer electrolyte membrane fuel cells and systems (PEMFC) (Continued from previous volume).System design and system-specific aspects.Air-supply components.Applications based on PEM-technology.Part 4: Alkaline fuel cells and systems (AFC).Part 5: Phosphoric acid fuel cells and systems (PAFC).Part 6: Direct methanol fuel cells and systems (DMFC).Part 7: Molten carbonate fuel cells and systems (MCFC).Part 8: Solid oxide fuel cells and systems (SOFC).Materials.Stack and system design.New concepts.Part 9: Primary and secondary metal/air cells.Part 10: Portable fuel cell systems.Part 11: Current fuel cell propulsion systems.PEM fuel cell systems for cars/buses.PEM fuel cell systems for submarines.AFC fuel cell systems.Part 12: Electric utility fuel cell systems.Part 13: Future prospects of fuel cell systems.Contents for Volumes 1 and 2.Subject Index. • (source: Nielsen Book Data) Publisher's Summary: This four volume set brings together for the first time in a single reference work the fundamentals, principles and the current state-of-the-art in fuel cells. Its publication reflects the increasing importance of and the rapidly growing rate of research into alternative, clean sources of energy. With internationally renowned Editors, International Advisory Board members, and Contributors from academia and industry, it guides the reader from the foundations and fundamental principles through to the latest technology and cutting-edge applications, ensuring a logical, consistent approach to the subject.The Handbook is divided into three main themes, covered in four volumes: Volume 1: "Fundamentals and Survey of Systems"; Volume 2: "Fuel Cell Electrocatalysis"; Volumes 3 and 4: "Fuel Cell Technology and Applications". Volume 1, "Fundamentals and Survey of Systems", provides the necessary background information on fuel cells, including the fundamental principles such as the thermodyamics and kinetics of fuel cell reactions, mass and heat transfer in fuel cells, and an overview of the key principles of the most important types of fuel cell, and their related systems and applications.Volume 2, "Fuel Cell Electrocatalysis", is concerned with the most important basic phenomenon of fuel cell electrodes, electrocatalysis. It includes an introduction to the topic, and a detailed account of the theory. A number of the key practical methods used to study this phenomenon are discussed, as are a number of the key surface reactions. Finally, a number of other related topics associated with energy conversion are discussed. Volumes 3 and 4, "Fuel Cell Technology and Applications" open with an overview of a range of sustainable energy supplies for fuel cell development.The key issue of fuel storage is considered in detail, before a detailed discussion of the most important types of fuel cells and their applications is presented. Among these, polymer electrolyte membrane fuel cell systems, alkaline fuel cell modules and systems, phosphoric acid fuel cells, direct methanol fuel cells, molten carbonate fuel cells and solid oxide fuel cells are covered in depth. The use of fuel cells in a range of systems is then considered, including portable systems, propulsion systems and electric utility systems.In addition to domestic and industrial systems, use of fuel cells in such novel environments as the space shuttle and submarines is addressed. Finally, Volume 4 closes with a discussion of the future prospects of fuel cell systems. Comprising approximately 170 articles by more than 200 contributors, "The Handbook of Fuel Cells: Fundamentals, Technology and Applications", will be an invaluable source of reference for all those working directly in this important and dynamic field, for electrochemists, and for scientists, engineers and policy-makers involved in the quest for clean and sustainable energy sources. (source: Nielsen Book Data) Vielstich, Wolf. Lamm, Arnold. Gasteiger, Hubert A. (Hubert Andreas) powered by Blacklight jump to top
global_05_local_4_shard_00000656_processed.jsonl/108034
Take the 2-minute tour × Internet Protocol Security (IPsec) is a successor of the ISO standard Network Layer Security Protocol (NLSP). What are the advantages, disadvantages, other interesting facts regarding the protocol? share|improve this question 4 Answers 4 up vote 11 down vote accepted IPsec is actually a family of protocols, it has several sub-protocols that could be used or not used, and the overall security depends on each of these in turn and how they're configured: • IKE for protocol negotiation and key management • AH for authentication, integrity and I think some protocol protection • ESP for encryption and then some. • Transparent to applications and users (in most scenarios). To emphasize, this is not a trivial point - I have had many times when my recommendations to clients would be to encrypt the channel, e.g. with SSL - however they dont have access to source code, or SSL is not supported by vendor, etc - and IPsec is basically drop-in encryption (as far as the app is concerned) and totally out of view of the app. • Very secure, if implemented correctly • Less prone to user mistakes (as SSL) • More efficient than SSL, if you're encrypting most of the traffic anyway • Can be complex to deploy, depending on your network and requirements • Cannot be used over Internet or with unknown clients (okay not strictly accurate, but still holds for most intents and purposes). • Can provide false sense of security to network admins, if deployed incorrectly (e.g. without ESP, but hey I've got IPsec, right?). • Much less efficient than e.g. SSL, if you don't need to encrypt all the traffic (but IPsec will do so anyway). share|improve this answer IPsec provides two modes: • Authentication Header: each packet has an attached Message Authentication Code which guarantees its integrity; this also includes some protection against replay attacks (when the attacker sends copies of a previously exchanged packet). • Encapsulated Security Payload: each packet is encrypted (and also has a MAC); the encryption covers not only the packet data but also most of the header; a new header is added. This can be used to send the packet to a decrypting host which will then route it to its ultimate destination (the attacker cannot know where the packet is really intended to go). The cryptography is sound, since it went through the same painful specify-attack-fix cycle than other protocols such as SSL or SSH. The main difference with SSL is that IPsec runs at the machine level: it protects data from one machine to another, whereas SSL is between applications (e.g. a Web browser and a Web server). In most contexts (but not all), this makes no relevant difference, but it is still good to remember it. The biggest practical difference is that Average Joe's PC is a fully configured SSL-able engine, but any attempt at IPsec is likely to fail, because it would require Joe to fiddle quite a bit with its configuration (most operating systems implement IPsec, including Windows since Windows 2000, but the implementation is not a problem -- the configuration is). IPsec is a mandatory component of IPv6, so IPsec will be widespread at least when IPv6 becomes prevalent -- an event which was supposed to take place in 2007... share|improve this answer It doesn't operate/scale to the needs of cloud-based networks and is therefore irrelevant (or soon to be) share|improve this answer More humour? Or are you really such a cloudy fanboy? –  AviD Nov 15 '10 at 11:52 @ AviD: Do you see a lot of IPSec going into and out of the cloud? More or less with private clouds? I try not to ever be a fanboy of anything, but I do hate everything fairly equally... –  atdre Nov 15 '10 at 12:02 A. IPsec has a lot more than just cloud networks, and it will be many decades before everything else is irrelevant; B. Yes, actually depending on the cloud model IPsec CAN be relevant in the cloud too, and even strongly recommended in some cases. C. In this day and age, I can totally sympathize with hating everything equally :). But still, lighten up. –  AviD Nov 15 '10 at 13:03 @ AviD: I don't need to lighten up -- I'm really laid back and "cool". I guess IPSec is going to be around for a little bit longer than I had planned for it. Maybe we have to wait for IPv6 before it goes away... –  atdre Nov 15 '10 at 14:31 Umm... what? IPsec is part of IPv6, and is mandated as part of the protocol. When we all move to IPv6 there's gonna be a whole lot more IPsec goin' round.... Maybe you meant IPv8? –  AviD Nov 16 '10 at 5:51 IPsec was designed to improve security, but again, this protocol is also not so close to ideal solution. One of advantages that comes to mind is security, that is obvious. Depending on situation it may have following disadvantages: • encryption / decryption will use some CPU resources; • it can be complicated to manage traffic policy for complex networks; • promised security is questionable if IPsec is used in transport mode; share|improve this answer @Ams, I've never heard that transport mode is directly questionable, in fact this is the default mode as used in point-to-point communications (as opposed to site-to-site). Do you have any resources on that? –  AviD Nov 14 '10 at 15:10 Well, as it's known, in transport mode only IP payload is encrypted, IP headers remains untouched. This is what allows attacker to conduct analysis on data stream. Those attacks are quite sophisticated, but can provide such information like number of transferred packets. Also there are known attacks on AH, IKE and ESP protocols. What first comes to my mind is old replay-attack. Sure, it all depends on that how configured software and old it is, but we never can blindly say that administrator does his work fairly. –  anonymous Nov 14 '10 at 15:36 @Ams, AH and ESP both provide anti-replay. Moreover, AH will prevent the IP headers from being altered (because of the hash). Obviously attacks may invalidate this, but currently none of the known attacks are feasible. And misconfiguration is an issue regardless of mode, tunnel or transport... –  AviD Nov 15 '10 at 11:51 @AviD, I agree with what you have said - today and with more or less proper configuration such attack is rare to conduct. I was talking specifically about CVE-2006-0905 and cases without AH usage. Also, I would like to point to tool ike-can: nta-monitor.com/tools/ike-scan. –  anonymous Nov 15 '10 at 12:14 Your Answer
global_05_local_4_shard_00000656_processed.jsonl/108040
… for the heart of it… Any creative process is difficult, time-consuming and arduous, when we lose touch with the “simple heart” of what we are trying to say or do. Two questions are very important in searching for the heart of a story or a character… 1. What is it about? 2. What does that character (person) really want? So often our answers to these questions, are bogus, superficial or false; they reflect the creative persons fear of going deep and actually revealing a truth about themselves. I wonder what happens when I step away from the creative process and ask my friends and/or myself these questions… Often the answers are about a daily routine, or a career path, or a family goal; these answer are either a reflection (or a deflection) protecting something deeper, something more like a groan than a single word. 3 Responses to “… for the heart of it…” 1. The Animated Woman April 12, 2011 at 9:27 am # This resonates with me. I even made a film about the heart of “me” in an attempt to peel away the layers and get to what’s inside. If you’re interested, here’s the link …http://www.theanimatedwoman.com/2011/02/heart-of-me.html 2. Paul Lewis April 12, 2011 at 12:39 pm # I can’t agree with you more,but as an artist I fell I have no choice but to be honest and in many cases brutally honest, w/ relationships ,w/life & especially in my art. I would not be a true artist in every sense of the word if I wasn’t. • geofftalbot April 12, 2011 at 12:40 pm # thanks… so good… Artist = truth Leave a Reply: Gravatar Image CommentLuv badge
global_05_local_4_shard_00000656_processed.jsonl/108073
County seat From Wikipedia, the free encyclopedia Jump to: navigation, search In the United States and other countries, the county seat is the capital of a county. It is where the government for the county is found. The county seat is usually the largest town or city in the county, oldest, or most central town or city. In Louisiana, Counties are called Parishes. Because of this, they have Parish seats instead of county seats. Related pages[change | change source]
global_05_local_4_shard_00000656_processed.jsonl/108074
Kurdish people From Wikipedia, the free encyclopedia Jump to: navigation, search Area where Kurds live The Kurds are an ethnic group found in Iraq, Iran, Syria, Armenia, Turkey and Lebanon. They have no country of their own. Kurds are Indo-European settlers together with the people of Western and northwestern Iran, widely thought to be descended from the Medes. They speak Kurdish. Kurds have similarly distinct features like those of southern Europe, however their looks vary from blondes to brunettes and although they have mainly brown eyes they can have varied colours. They have a rich culture which is their own despite the long struggle by their neighbours to demolish it: it remains a strong influence on their way of life. Today, there are around to 27 to 37.5 million Kurds. Most are Muslim.
global_05_local_4_shard_00000656_processed.jsonl/108075
Vidalia onions From Wikipedia, the free encyclopedia Jump to: navigation, search Vidalia onions are a variety of onions. They are native to Toombs County, Georgia. They are unique from other onions in that they are sweeter in taste. Southeast Georgia's mild climate, the area's sandy, low sulfur soil, exclusive seedvarieties, and precise farming practices make this original sweet onion, mild and flavorful. Other websites[change | change source]
global_05_local_4_shard_00000656_processed.jsonl/108086
Forgot your password? Comment: Re:Pick your units of radiation... (Score 2) 190 Ten trillion nuclear disintegrations of potassium-40 occur in a cubic kilometre of seawater every second. A single nuclear disintegration per second is a becquerel (Bq). Usually Bq are qualified by being associated with a mass or volume, Bq/litre or Bq/kg. Radioactivity in seawater is usually measured in terms of litres but if you make the sample size big enough (cubic kilometres) the numbers can look really scary. Comment: Re:Pick your units of radiation... (Score 4, Interesting) 190 A cubic kilometre of seawater contains about 10 trillion becquerels of the naturally-occurring potassium K-40 isotope. That's ten fucking disasters per cubic kilometre using your scale and there's a lot of seawater on this planet (1.3 billion cubic kilometres according to most sources). Comment: Re:Aluminium (Score 1) 365 by nojayuk (#47340835) Attached to: Germany's Glut of Electricity Causing Prices To Plummet Modern nuclear reactors can load-follow quite well, swinging output by 30% in fifteen minutes thanks to newer control tech and a lot of operational experience over the past 50 years. Load-following can even be done somewhat with older second-generation LWR plants. It's not actually done much since baseload nuclear power is very cheap in terms of fuel consumption and refuelling tends to be done at fixed intervals anyway. Other thermal generators like gas where the fuel is a major part of the cost of operations are normally used to top-up baseload stations -- in the UK the nuclear generators run full-out as much as possible with gas filling in much of the rest and coal as a cheap backstop, limited by pollution and carbon controls. Comment: Re:Aluminium (Score 1) 365 by nojayuk (#47340071) Attached to: Germany's Glut of Electricity Causing Prices To Plummet Most renewable generators get a guaranteed minimum payment for electricity they feed into the grid (in the UK where I live windfarm operators get about £145 per MWh) so the "excess" production is not free, it is paid for by the grid operators and ultimately the consumers even if it is not needed sometimes. If the renewable generators stored their excess production and dispatched it into the grid at times of low output that would be a different story, but that would cost them money so they don't do that. The round-trip efficiency losses are even more reason for them not to build storage into their operations. Comment: Re:Aluminium (Score 3, Informative) 365 by nojayuk (#47339703) Attached to: Germany's Glut of Electricity Causing Prices To Plummet Storage costs money. Lots of storage costs lots of money. Storage wastes energy too -- pumped hydro, the cheapest form of bulk energy storage has an input-to-output efficiency of about 65 percent. Baseload coal, gas and nuclear generation doesn't need storage to be useful and meet demand 24/7/365 unlike intermittent renewable generating capacity, but no-one ever adds the cost of storage to the cost of renewables when comparing prices. Comment: Re:Serously? (Score 1) 398 by nojayuk (#47267101) Attached to: Why China Is Worried About Japan's Plutonium Stocks You mean like the major Japanese Army command centre in Hiroshima? Or the extensive Naval dockyards and repair facilities in Nagasaki, close to where the Allied invasion was going to hit the beaches in Kyushu? Nagasaki was actually a secondary target due to bad weather over the primary target, a place called Kokura Arsenal which might give you an idea why it was on the target list. In reality the atomic bombs were used because they were ready to be used, just one more wonder weapon in a war filled with wonder weapons. They contributed to the decision by the Japanese War Party, the military/political group in power at the time, to surrender but it was mostly down to the Russians declaring war on Japan on the 9th of August 1945 and promptly destroying the last major Japanese army outside Japan itself, the million plus Manchurian occupation force with embarrassing ease. Comment: Re:Early days of KIA repeated (Score 1) 431 by nojayuk (#47257691) Attached to: Chinese-Built Cars Are Coming To the US Next Year Diesel engines typically run at twice the compression ratio of a gasoline/petrol engine. They also last a lot longer than petrol engines in my experience. This may be because they are designed to deal with the higher compression and greater loads on crankshaft bearings etc. from day one. They do tend to be heavier than gasoline engines of the same power and torque though. + - Ask Slashdot: What's the best rapid development language to learn today? 2 Submitted by Anonymous Coward Ideally, I'd like to learn a language that has web relevance, mobile relevance, GUI desktop applications relevance, and also that can be integrated into command-line workflows for data processing—a language that is interpreted rather than compiled, or at least that enables rapid, quick-and-dirty development, since I'm not developing codebases for clients or for the general software marketplace, but rather as one-off tools to solve a wide variety of problems, from processing large CSV dumps from databases in various ways to creating mobile applications to support field workers in one-off projects (i.e. not long-term applications that will be used for operations indefinitely, but quick solutions to a particular one-time field data collection need). I'm tired of doing these things in bash or as web apps using PHP and responsive CSS, because I know they can be done better using more current best-of-breed technologies. Unfortunately, I'm also severely strapped for time—I'm not officially a coder or anything near it; I just need to code to get my real stuff done and can't afford to spend much time researching/studying multiple alternatives. I need the time that I invest in this learning to count. Others have recommended Python, Lua, Javascript+Node, and Ruby, but I thought I'd ask the Slashdot crowd: If you had to recommend just one language for rapid tool development (not for the development of software products as such—a language/platform to produce means, not ends) with the best balance of convenience, performance, and platform coverage (Windows, Mac, Unix, Web, Mobile, etc.) what would you recommend, and why?" Comment: Re:I wonder (Score 1) 190 by nojayuk (#47098069) Attached to: B-52 Gets First Full IT Upgrade Since 1961 A Korean comics artist name of Anyan does a web manga with anthropomorphic representations of military aircraft as high school girls. Tu-95 is very inquisitive, always sticking her nose in other people's business and always surprised that folks notice her doing it because of the racket she makes. Comment: Re:I wonder (Score 4, Interesting) 190 by nojayuk (#47095951) Attached to: B-52 Gets First Full IT Upgrade Since 1961 Runs to about 12MB or so as a zip download. Comment: Re:Godzilla! (Score 2) 75 by nojayuk (#47069745) Attached to: Japanese Court Rules Against Restarting Ohi Reactors Actually the Japanese are burning more LNG with some extra coal to replace some of their nuclear generating capacity. In the 12 months up to March 2013 TEPCO burned 23 million tonnes of LNG and 7 million tonnes of coal to generate electricity, in comparison in the same period ending March 2011, just after the earthquake and tsunami they burned 19.5 million tonnes of LNG and 3.5 million tonnes of coal. LNG has twice the energy of coal tonne for tonne. As for coal as a long-term solution the Germans plan to be still generating at least 40% of their electricity from coal and lignite by 2050. That seems quite long-term to me. I doubt very much the US will have stopped mining coal in South Dakota and West Virginia to burn in power stations by then either. The Japanese don't have any significant amounts of native coal left to burn, no oil and no gas so they have to import it. Uranium is cheap, their nuclear generating plants are still in place ready to restart and their balance of payments are in the crapper for the 22nd month in a row mostly due to buying carbon instead. Comment: Re:Keystone XL (Score 1) 411 by nojayuk (#47066435) Attached to: US Officials Cut Estimate of Recoverable Monterey Shale Oil By 96% Which refineries in the north? The Texas and Gulf refineries have underutilised capacity especially for the heavy form of oil that is the end product of the Athabasca tarsands production. That's why the producers want to pipe it across America north to south, it's cheaper than building new refineries in Canada and it guarantees jobs and profits for US-based operations. As for shipping the refinery product to Europe or China, if the US consumers are willing to pay the going price for the refinery output then it will sell in America. If other folks abroad are willing to pay more even with the shipping costs well that's capitalism for you, you know, free movement of goods and materials, one of the lynchpins of an unregulated market. Of course you do realise that the Athabasca reserves are not American property but in fact the product of a foreign country being imported to the US, that free market capitalism at work? Why should the end result of processing foreign oil be reserved to subsidise US consumers when the source material is imported? Comment: Re:obsolete (Score 1) 323 by nojayuk (#47045073) Attached to: Rising Sea Level Could Put East Coast Nuclear Plants At Risk you're lying, or maybe you're just ignorant or you got your "information" from bullshit anti-nuclear blogs and such, but... a) nuclear power reactors are decommissioned to "greenfield" status, that is the land is fit to grow crops on afterwards. It's a lot more work than brownfield where the ground will be repurposed for industry but it's a cost the nuclear industry has to bear unlike, say, coal mining. No a nuclear site doesn't need to be quarantined for "hundreds of years". Heck, even after Chernobyl burned its core to the atmosphere the other three reactors on the site were kept in operation. No quarantine. Storm surges affect ex-nuclear sites in the same way they affect farmland since they present the same levels of threats of toxicity. If you're really worried about flooding then look to coal mines and coal power stations which regularly dump millions of tonnes of poisonous effluent into streams and drinking water after flooding takes out their inadequate levees and dykes. Nobody cares much though because it's not scary radioactivity. As for the British SafeStor decommissioning system, it's an alternative method to prompt disassembly of a power reactor -- tear down everything around the containment since it's not radioactive and then wait about 60 to 80 years for the remaining radioactivity in the pressure vessel and surrounding structures to decay to the point where it can be dismantled with minimal precautions. Other countries deal with this differently, in the US the reactor vessel is usually extracted promptly and put in a pit to "cool down" for about the same length of time so the entire site can be cleared more quickly. Comment: Re:Yeah... (Score 1) 146 They're not using any pesticides or herbicides as they would have to in the "wild". There are no caterpillars, no fungus or microbial antagonists or weed seeds that could destroy or deplete the crop, they're kept at bay because the facility is a clean-room setup with filtered air and water. That's the big "no chemicals" deal with this greenhouse.
global_05_local_4_shard_00000656_processed.jsonl/108087
Forgot your password? Comment: Article itself is a waste of memory (Score 2) 407 by tknd (#44245843) Attached to: Why JavaScript On Mobile Is Slow GC sucks, real programmers can do memory management, blah blah blah. Tell me the last time a programmer made billions because "he could memory manage" and I'll show you plenty of poorly written websites, apps, software, that suck at memory management yet still managed to become popular and used by millions. The market decided long ago that fewer programmer hours was better than users waiting a few seconds everyday for their device to GC. Users don't exactly like it, but it works, they get their hands on a more than usable product faster. But back to the article. In the article there's some fancy charts about how iphone 4s only has 512mb of ram. Ok, a mobile device isn't going to run with a swap file because, well, the manufacturer decided to skimp on Flash chip quality so not only does writting to flash suck, but it also runs the risk of forcing the cell to over-provision (meaning shrink in usable capacity). But iphone 4s will be 2 years old in 4 months! 2 years = EOL in the phone world. How about a more current phone? Ok, the Google LG Nexus 4 which will become 1 year old in 5 months comes with a whopping 2GB of RAM. And its a relatively cheap phone! That's already half of my 2011 Macbook Air's RAM. Prediction? In 4-5 years, mid-range phones will be shipping with 4gb of RAM. Ok, let's go the other direction. Let's say we all agree and programmers should sit down and memory manage again. Hurray! Problem solved? No. Because programmers are inherently bad at memory management. Memory will leak. Look at some popular web browser named after a type of animal. So instead of your phone pausing for a second to GC, now your app just crashes! AWESOME. The standard software engineering practice still applies. Design your system. Build your system. Once it is usable and more importantly has a market, then profile for optimization. Comment: Re:iOSification? (Score 1) 965 by tknd (#43168231) Attached to: Ask Slashdot: Mac To Linux Return Flow? Yes you do because on small windows that appear to be simple forms do not imply that scrolling is available when it actually is. On a web browser maybe you could hide them, but otherwise it is confusing to have to learn to "try" to scroll when not every window is scrollable. As far as other critiques of OSX, I would say Finder and App management (meaning Finder > Applications, Launchpad, the Dock) are also incredibly annoying or confusing. Ever since Microsoft introduced the Start menu, Apple seems to have been butt-hurt and intentionally obfuscates application launching/organization as some sort of silent retaliation against Microsoft's obviously successful usability paradigm. It is so bad that even iOS prefers you to manage your own damn icons. The iOS icon grid was great...for the original iphone. It is a giant mess now. Comment: GET a TV (Score 1) 375 by tknd (#42904117) Attached to: Ask Slashdot: What Is Your Favorite Monitor For Programming? My Panasonic 32" HDTV has an option to turn off the overscan so I can use it perfectly as a monitor. It even has an older dsub/vga input so I can hookup older PCs. The difference is the pixels are less squarish because of a cheaper filter technology (more expensive TVs come with a better filter and result in monitor-like pixels) and the colors are slightly over-saturated. Despite this I am happy with it because I can sit 1 foot further away from the TV, and since I have it mounted into the wall above my desk, I now have a lot more usable desk space. Both of these upsides translate into more productivity and less squinting. Comment: Re:"Flaw"? (Score 2) 269 by tknd (#42901203) Attached to: Google Store Sends User Information To App Developers They aren't - Google Play is the merchant, the developers are the manufacturers. And you're incorrect. If Google Play was the merchant, then they would collect sales tax on my behalf, but Google has chosen to put this weight on the "manufacturer" therefore I as a developer become a "merchant" and Google Play is nothing more than a distribution mechanism and marketplace. This is why I receive information about customers and their locations so I can correctly compute taxes. Comment: A Lot of Bad Advice Here... (Score 2) 347 by tknd (#42862741) Attached to: Ask Slashdot: Best Alternative To the Canonical Computer Science Degree? First off, there's a lot of stupidly bad advice here. The OP states that his intention is to become a web developer and feels his current 2 years of CS is useless. Naturally everyone becomes polarized and offers their bad advice. On the same token, most bad programmers will do the exact same thing when a customer comes to them and asks for a solution to a problem. The correct advice should first identify the problem correctly, then offer the right insight to lead the OP to the correct solution for his unique situation. Why do you think you'll become irrelevant? Because the technology you learn today will be deprecated for next year's flavor of the month technology? And if that's the case, why do you think learning that particular technology will grant you anymore longevity? Consider this: technology will always become obsolete. If you accept that, then you will continuously be forced to learn new things regardless of how you learn it. Secondly, why do you want to start your career right now? Is it out of envy? A feeling of wasting time? I would be lying if I didn't say I wanted to graduate 4-5 years earlier. After my first year in college, the internet bubble burst. I was entering CS with older peers landing rock star programmer jobs with little effort. And that all quickly changed. At the same time, the core fundamentals of computer science are allowing me to stay relevant today. I started with the web, went on to complete my 4 year CS degree and now I've been able to learn the Android SDK on my own time without the aid of classes. What little I remember of my advanced game programming course (I didn't stay in it) and linear algebra has allowed me to work at the 2D level canvas without ripping my hair out. When you understand and correctly apply the theory, you are able to digest much more complicated things much more quickly. You know a bad algorithm when you see it. You know how to correctly optimize rather than wasting your time with trial and error. But if you sit through class thinking "I don't see the direct connection" well consider trying to do algebra without knowing how addition works. That's what you're up against. Now despite that, that doesn't mean that school is best for everyone. If you feel you are capable of learning things on your own, no matter how complex or how convoluted, then school may actually slow you down. But if you still feel you can't correctly teach yourself, then school is a good option. If you feel you can go faster, then do so. By that I don't just mean stopping school. You can actually accelerate your school if you have the desire. I had the option of actually graduating a quarter early, but I chose not to in order to explore other topics the school offered (one was the game programming course). Looking back, graduating in 3 years is actually do able with summer courses and maxing your units per semester/quarter. Finally don't discount the trade-offs. Starting work early is good for those that want to be entrepreneurs. Those that simply want a desk job for the rest of their lives, it is probably a really bad idea. Never again will you be surrounded by people of the exact same age and never again will you have culturally "approved" time to actually just sit down an learn whatever you want. That includes studying abroad on educational loans and studying seemingly useless topics. At my age, people around me find more interest in these sorts of topics than their own specialty simply because they're hired and forced to work on their specialty for at least 8 hours a day. As a student I thought I could sit in front of the computer all day, today I look for things to get me away from the computer. Comment: Re:Who cares, this is not the important point! (Score 1) 442 by tknd (#42540755) Attached to: The Trouble With 4K TV Exactly. I bought a 32" LCD 1080P TV and mounted it directly into the wall above my desk. The result is the TV no longer takes up desk space meaning I can actually use the desk...as a desk! Other benefits are I can actually sit back in my chair and still see clearly despite being 4-5ft away from the TV. Now if a 4k 40" or 42" TV came out, I would buy it in a heartbeat. The problem with 32" at 1080P is the pixels are quite large. 4k would solve this and give me a huge increase in usable resolution. Comment: Re:The more..... (Score 5, Insightful) 384 by tknd (#42502963) Attached to: What Are the Unwritten Rules of Deleting Code? If you're going to do this, YOU HAD BETTER COMMENT ON WHY YOU COMMENTED IT OUT. Too often I come across a block of code that is just commented out. A quick glance means it had a purpose, but for what reason, I'm not sure because apparently it isn't needed anymore. So then I ask "why?" But there is no answer to this question. This is possibly the worst feeling of working with code--the idea that something was there, now is not, but they left it in for some reason and you don't know why. Now you're left with a couple scenarios: • The code caused a bug, but had some sort of purpose. • The code was replaced, and the new implementation is experimental which leads to • Exactly which lines of code did it replace? • It is dead code It is like walking into an offline factory line. Most bystanders will simply think "I had better not touch this or it could cause serious problems" so the only people in full control was the last shift of factory workers for that line. Meanwhile similar lines are still operating so you're not exactly sure why this particular production line was halted. Meanwhile if the code was in version control, I get a much clearer picture from diff on what exactly changed. If you just comment out a giant block and leave it there, check it in, then diff shows me that 2 lines had a comment added (in the case of block comments) or all the lines are commented out (modified, for single line comments). Now I have to diff again and skip to the version before that to get the picture I want, but now I may see other changes that may not be relevant. Either way, if you are commenting out code for the first two scenarios I listed, you need to think again about your version control system and manage it better. Experimental or untested stuff should be branched, not visible to other devs otherwise people make mistake it for production code. If I see commented out code blocks, I'm simply going to delete them myself because I can't read your mind and never will be able to. Comment: Re:I don't.. (Score 5, Insightful) 453 by tknd (#42500509) Attached to: Why JavaScript Is the New Perl I'm not sure why this comment is modded so highly. The reason web programming sucked was because we have things called browsers that restricted our capabilities. Add on to that the need for everyone to agree to standards which caused progress in browser technology to slowly adopt newer technology. It is still the same problem even today. Think about it for a second even if you aren't a web programmer. There was a reason (not just Microsoft) for IE6 adoption: it actually, at one point, implemented more than the competition. Mozilla was around but not nearly as capable. Netscape, too, was around but clearly lacking in the quality and performance of IE at that particular point in time. But everyone would rather believe that IE6 was just flat out terrible throughout its entire existence. To that I ask, would you like to use and program for Netscape 4 or 5 for the same period IE6 was dominant? Obviously not! What we should have received is more intense competition rather than a lengthy side lawsuit about how MS abused its monopoly. To make a long story short, Netscape was not our savior, Microsoft was still the bad guy (honestly), and the world finally learned that monopolies sucked. The true turning point wasn't until Mozilla came around with Firefox and other companies like Apple and Google began creating their own browsers for the purpose of expanding web technology. It wasn't until Firefox, Safari, and Chrome browsers that we finally exited the lack of improvements in client browser technology. Any industry stuck in an old way of doing things is going to suck. It doesn't matter if you're the smartest person in the world. If you can only using a hammer, nails, and wood, you're not going to be building skyscrapers quickly or efficiently anytime soon. This is exactly what restricted the web and people that worked for the web. Now to address some key point presented by the parent: The entire AJAX and framework of web programming is wrong. It was a quick hack added so that you could make dynamic apps using existing technologies without major changes to clients. But its layered hack upon hack upon hack. We really need to scrap it all and come up with a web application programming stack- a new markup language that's meant to do pixel perfect rendering (HTML is not, but its used that way), an HTTP replacement that's stateful rather than stateless, a cleaner way of sending data back and forth from the server. But if you write on top of an ugly platform, you're going to get ugly code. There is so much wrong with this claim that I don't know where to begin. Let's start with stateless programming since that's the key theme in this opinion. I would be curious to hear what the parent's idea of "right design" is when a service is expected to provide for millions of requests simultaneously. At some point you're going to be forced to parallelize that work. Congratulations, you've just been forced one step closer to implementing a stateless system. You see, in a stateless system, it is much easier to cut off pieces of work into bite-sized chunks to be handled out of order. When you restrict yourself to state, you're at the mercy of single threaded technology to get your work done. It is 2013, we have CPUs in our pocket phones that have 4 cores. Stateless is here to stay and it will become more pervasive even without any web interaction. Let's also look at how stateful systems do under latency. Just go play any online game to get a feel for this and login to some far off server that crosses an ocean or two. Your latency will suck, packets will be dropped, and the overall experience sucks. The internet was designed to be world-wide. It was designed to travel great distances where latency and reliability was a real issue. Packets are not guaranteed to arrive. This is why we have TCP and an in-your-face kind of restriction that things can time out. I mean we're sending huge amounts of data around the world for christ-sake. Until we have the capacity to serve everyone's data needs redundantly, and a magical guarantee a packet will arrive around the world safely, I don't see stateful systems implemented safely for world-wide consumption becoming the norm any time soon. Now we have implemented such systems. But to the user, they appear to be unstable or unreliable. Take for example IRC. Occasionally you will get disconnected from the server, for the same reasons you get kicked out of an online multiplayer game. Somewhere along the path of servers and routers, a failure happened and now your state is worthless and has to be restarted all over again. If this was the mode of programming today people would be writing the same slashdot post about why we can maintain a solid connection for the rest of our lives instead of why web programming sucks. Finally let's talk about HTML and rendering technologies. Web browsers are going to get their "pixel perfect" rendering engine as 2D canvas. That's an HTML5 spec so that issue will eventually be addressed. Besides that I'm not sure exactly what better option we have other than HTML for non-pixel perfect rendering. If the parent is insistent on 2D Canvas as a replacement for hypertext, I say he can go to hell. That doesn't imply that HTML4 or even HTML5 is perfect, just that it takes care of lots of things people shouldn't need to care about just to relay hypertext-like information. For what it is worth, HTML has gotten us pretty for for all of the caveats it has. I don't know of any other standard that allows you to do what HTML does efficiently. For example let's take a step back and see what people did prior to HTML to "publish" their opinions. They were called editorials and published in print media like newspapers. You would send a bunch of text called a letter to a newspaper, and if they wanted they'd print it in their editorial section. But they wouldn't copy your letter verbatim as it appeared, that would be stupid. Instead they ran it through their entire typesetting process so it would appear on the paper correctly. That's right, this was a team effort, now replaced by something that people can learn to do alone in a few hours and distributed electronically, world-wide, for free. The result obviously isn't of the same quality, but for our technology, it is more than enough. Comment: Re:Meanwhile in the US... (Score 2) 322 by tknd (#42400053) Attached to: World's Longest High-Speed Rail Line Opens In China It is a success, because it works, and tons of goods and millions of people use it everyday. The same argument can be used in Europe and Asia. You never refuted the grandparent's claim which is that the interstate highway was funded by government money, not by user money which you used against HSR. HSR, will be not be, because it is simply too limited. Europe and most of Asia would disagree. I can take my car to from Sacramento to LA in about 6 hours, at a cost of (Gas Guzzler) less than $150 in petrol, taking my family (four additional people) as a bonus. Yet in your entire analysis, you only account for the cost of gasoline. You didn't account for the cost of the roads you would use (they are not free and cost money to maintain or in your words LOSE money). You didn't account for the cost of the vehicle depreciation, license, registration, and maintenance. You also can't sleep and drive at the same time. You're not supposed to eat and drive at the same time. And you're definitely not supposed to drink and drive at the same time. Meanwhile an elementary school child in Japan can travel at will as long as he has enough money to pay for the fare. The traveling business man can still drag himself onto the train despite having a bit too much to drink. Most of all, each household is perfectly happy with one car, while here in California each adult or older teenager needs their own vehicle. AND once I get there, I would still need to rent a car. HSR itself isn't enough, I'll give you that. Intra-city rail and adequate public transit would be necessary. We would also need to improve public transit in major metro areas. LA is already on its way with Measure R. And further trips, I would simply just take a plane. So you admit that cars aren't a solution, yet planes aren't a solution either. By that I would argue that the more modes of passenger transportation we have, the better off we are. In Japan the airlines compete with HSR. This directly benefits the traveler--because of the additional competition, fares become cheaper. HSR is romantic notion for idiots. IT never pans out like the proponents claim. In Japan, the rail companies are private entities just like airplanes and car manufacturers. They turn a profit. Why? I'll give you a few reasons: • Japan expressways are all tolled: users must pay a fee to use the system. In America, the interstate is subsidized or socialized--whichever term you prefer. • Rail companies are able to acquire land and re-purpose it for transportation. In California, the Interstate system was approved prior to the NEPA and CEQA regulations. These environmental regulations delay the building process for any project (including freeways) and make it more expensive. The primary target at the time was freeways due to NIMBYism. Keep in mind that the government at this time was pretty much rolling through people's backyards with freeways and using eminent domain to make it happen. • In Japan parking is not "free" or socialized. You must pay for your own parking. • Rail companies in Japan don't just operate trains, they also acquire and redevelop areas near train stations turning them into giant shopping malls or upscale living areas. This means users of the system have access to most retail they'll ever need. Some stations even have integrated retail and dining just like airports--but it works better than airports because of more repeat commuters. Now in Japan people want to live near a train station because it means convenience. Property prices generally increase the closer they are to a train station--and decrease as you get further from a train station. And people are free to own cars, and drive as much as they would like, yet people choose the trains? Keep in mind that Japan especially during their boom years was not automobile averse. In fact during their boom years, it was common for individuals to purchase a car even though they wouldn't use it. Yet the public transit system and rail network still flourishes. That's not to say that all cities in Japan are car-free. Many cities in fact require a car or an alternate mode of transit (bicycle). Yet it all works together, trains and HSR included. Now I'll go ahead and agree with you that perhaps the government shouldn't be managing HSR. The root of the problem, I believe, is the fact that we do not treat modes of transit equally. Automobiles are heavily subsidized through road and interstate construction. So it is like we are encouraging people to drive because we're giving them access to something that would normally be very expensive. The solution is actually to stop subsidizing the interstate, roads, and parking so that other modes of transit can become competitive. But roads (namely city roads) are certainly a public good; a city road can be multipurpose and support not just cars but bicycles and pedestrians. So I'm all for subsidizing city roads. Interstate/freeways and parking however shouldn't. I would cut interstate funding through taxes and switch to a toll based system: all users pay a toll and tolls must support the maintenance of the road. For parking I would do the same: users pay for parking and all municipal minimum parking regulations are revoked. This means it would be possible to build stores with no parking in high density areas rather than paying for an expensive underground garage that would sit unused anyway. Finally I would change property/land taxes to be separated. Currently you are taxed on the value of the property as a whole. So if you make an improvement to the property like build a skyscraper, you actually end up paying more property taxes because the total value has gone up. What this encourages is for people to purchase land, build a parking lot, and wait for nearby property to increase the value of the area. Then when the increase comes along, they then sell the land back at an increased price. If instead they were taxed relative to the value of the land, they would be encouraged to actually build something of value instead of a vacant parking lot. Comment: Re:Not yet... (Score 1) 943 by tknd (#42151831) Attached to: Is It Time For the US To Ditch the Dollar Bill? This is kind of how the Japanese yen works except they haven't phased out there version of a "nickle" and "penny". In Yen, they have 1 yen, 5 yen, 10 yen, 50 yen, 100 yen, and 500 yen coins. The smallest bill is 1000 yen. About 100 yen feels like $1 in their economy. Japanese people hate the 1yen coins just as much as we hate pennies and there is usually a donation box at the register of big chain stores for you to donate your 1 yen coins. Or you can go to a shrine or temple and get rid of them there. The 5 yen coin, however, seems to symbolize some kind of luck in their culture so they probably will never phase out the 5 yen coin. I'm all for USA switching to dimes and dollar coins as well as reintroducing the half dollar coin while phasing out $1 bills and all of the existing coins. But but, what about vending machines! Just give up. One thing I hate about today's American culture is how everyone expects their opinion to be preserved for their own benefit when it is clearly dragging down everyone else. Comment: Re:Autonomous Cars (Score 1) 717 by tknd (#41588253) Attached to: How We'll Get To 54.5 Mpg By 2025 Autonomous cars aren't going to magically solve the traffic congestion problem. You can look at it in two ways. If human driven cars are following each other too closely, that means that the road is congested even though speed may be at the specified speed limit. Another way to look at it is that road is already "full". A road that isn't "full" means that each car has sufficient space to account for changes in speed. There's a video of a quick experiment some kids did where they took all four lanes of a high way and drove right next to each other at exactly the speed limit. What followed was traffic. So in a sense, when drivers exceed the speed limit, they are naturally "increasing" the capacity of the road. Now let's say you do have every car on the road be an autonomous car and the average length of each car is 15ft. That means in 150ft of a single lane of road, that road can fit a maximum of 10 cars side by side. But let's add in a merge in the middle of this 150ft of road. If the cars are riding exactly right next to each other, merging cars will not be able to merge in. The only way a car would be able to merge in would be if cars slowed down and let the car in. If the flow of cars merging in is constant, then that means cars will continuously slow down to let more cars in. Thus you will get traffic. Even if you stop and say "hey, let's put 15 feet or so of space between each car" well now you've cut the capacity of the road in half, and even if a car merges in during a "full" condition, it will still create traffic because the cars will try to slowly create their 15 feet of buffer space. If the flow of cars coming in on the merge is constant, then all cars in back of the merge will continuously slow down again to maintain their 15ft of buffer space. Now you say "1 car length is all an autonomous car needs while human drivers need more." I would say that human drivers can get by with close to 1 car length at the risk of increasing accidents. Which is exactly what happens. Go to LA during rush hour and drive along the 405. There won't be much more than 1 car length between cars. The only way you can merge in is to "force" your way in by putting the front of your car in the slight gap so the driver behind you has to slow down and let you in otherwise he will hit you. It is simple really. If a road can only handle 10 cars per a second, the second you get more than 10 cars per a second, traffic will occur. It doesn't matter if the driver is a computer. We see the same conditions for bandwidth on the internet where everything is controlled by a computer. Comment: Re:Am I missing the point (Score 1) 128 by tknd (#40522783) Attached to: Is the Google Nexus Q Subtraction by Subtraction? For specs it looks like a decent device. For price and features, it is certainly a hard sell with the only compatible devices/media being Google content and specifically movies and music. It seems like a premature launch. As a developer I don't care much for hackability. Random Joes aren't going to randomly go out and buy this thing for its hackability. What they should have done is at least provide a developer API. If pandora, netflix, and the rest had access to this thing, I'm sure it would be much more palatable as a viable product. Also if it had a real "on screen" UI, that would be great too...but I guess they really want you to buy a Nexus 7 first. Comment: Pointless (Score 1) 339 by tknd (#40353907) Attached to: Ask Slashdot: Instead of a Laptop, a Tiny Computer and Projector? We're currently in a "gap" in technology where most of the functions are starting to move to phones yet phones aren't quite powerful enough or usable enough yet. Right now your best option is the Macbook Air. I own the 11" i5. Buy it and don't look back. It has plenty of power that most netbooks lack and the smallest form factor. Also at ~2lbs, it is as light as you're going to get. The trackpad is also very usable so you don't have to drag the mouse if you don't need it. The keyboard is full size so unlike most netbooks, your hands won't cramp up. Since I bought it I've sold/gave away pretty much all of my other PCs. It is my primary computer for development now. At home I connect it to a 32" lcd hdtv which is mounted on the wall above my desk. It also fits into much smaller bags. So you don't need a giant bag.
global_05_local_4_shard_00000656_processed.jsonl/108089
SCORE 1132 Where do babies come from? SCORE 288 I see what you did there. SCORE 217 Thanksgiving Food Pyramid. SCORE 62 I KNEW they were the droids we were looking for... SCORE 775 Scumbag Santa. SCORE 1012 Scumbag brain. SCORE 60 Knowledge is power. SCORE 130 How Starbucks got its logo. SCORE 148 Slow Robots need love too! Slow Robots need love too!
global_05_local_4_shard_00000656_processed.jsonl/108108
Is "Bing Maps REST Services" supported in Japan? • I'm tying to use "Bing Maps REST Services" to display a route search result in Japan. But, the search result is very different from actual route. For example, the test result from 'Massachusetts Institute of Tech, MA' to 'Harvard University, MA' is not bad. But when I test for Japanese location for example from 'Tokyo station' to 'Osaka station', the maneuverPoints are very different from correct answer. That means "Bing Maps REST Services" is not supported in Japan? (Below is my test code) function getRoute($wayPoint0, $wayPoint1){ $baseURL = "http://dev.virtualearth.net/REST/v1/Routes"; $key = 'my key'; $optimize = "time"; $routePathOutput = "Points"; $distanceUnit = "km"; $travelMode = "Driving"; $routesURL = return file_get_contents($routesURL); $wayPoint0 = str_ireplace(" ","%20",$_GET['origin']); $wayPoint1 = str_ireplace(" ","%20",$_GET['destination']); $json_string = getRoute($wayPoint0, $wayPoint1); echo $json_string; • Edited by mas178 Tuesday, July 02, 2013 8:19 AM Tuesday, July 02, 2013 5:41 AM • The Bing Maps REST Services are supported in Japan. If you look closer at the response from the REST services you will see that it found the cities and not the stations. That's why the end points are slightly different from what you expect. Note that stations are points of interests, not addresses. Monday, July 15, 2013 10:29 AM
global_05_local_4_shard_00000656_processed.jsonl/108118
Blast From the Past: Beast Wars Beast Wars Megatron by EspenG Blast From the Past: Beast WarsWhen we were all kids, our imaginations went wild. If I had even a fraction of the ability I had when I was seven to create an alternate reality in my own head I would have long since been rich and connected and pissing on the underclass (to fit in). What toys did you play with?  Legos, K-nex, Beast Wars, plastic swords? If you were dirt poor and all you had to do as a kid was throw rocks through the windows of abandoned buildings, then please tell us in the comment in the box below.0099 beast wars transformers airhammer6 e1359141673433 Blast From the Past: Beast Wars I played with Legos my entire childhood, but the toy that was nearest and dearest to my heart was Beast Wars. I always liked animals so you can see how an animal turning into a tank kept my imagination cranking. The Beast Wars television centers around two warring factions of robots who have crashed on a planet populated by animals like those on Earth. The planet abounds in mystery, with vast deposits of raw Energon and evidence of alien activity. The Energon forces the newly arrived Transformers to take on protective beast forms to shield themselves from the ambient Energon radiation. And so begin the Beast Wars… How many of you reading this blog remember any of these? Silverbolt, Dinobot, and Cheetor.reduced bwfuzsil l e1359141723281 Blast From the Past: Beast Warsdinobot e1359141765330 Blast From the Past: Beast WarsBeastWars Cheetor Original Blast From the Past: Beast Wars Image Source:,,,,, Blast From the Past: Beast Wars
global_05_local_4_shard_00000656_processed.jsonl/108127
The research, he says, is an attempt to make this indeterminate peanut crop more determinate, and it’s a way to increase the amounts of black, browns and oranges on the profile board because they are the biggest, densest and most mature peanuts. They have the highest oil-to-water ratio so when you dry them they don’t shrink. “Our concept was to look at two different herbicides. One is glyphosate and the other is diflufenzopyr Na, which is BASF product,” says Lamb. “We wanted to see if we could come in at different times and terminate flowering. When you’re harvesting peanuts on the black part of the board, you’re blowing lighter ones out of the back of the combine. “Another problem we have is getting the less mature ones to mature quicker because when a flower turns into a peg and hits the soil, they’re going through the most rapid cell division and cell elongation of any part of the entire plant. “That is stealing energy from something you will never harvest and never benefit from and not putting the energy where it is most needed.” This research, says Lamb, is focused on stopping the flowering at a set time to petition the energy away from the peanuts that won’t be harvested. “We chose our timing based on the black part of the traditional maturity board. We were looking to get about a 15 to 20-day break in the flowering cycle from approximately day 100 to day 110, depending on where the crop is. “When we started this, we didn’t know which rates to use, so we looked at different rates with these two herbicides. “We used a 41-percent formulation of glyphosate, which is the case with most generics. For weed control, you’d use 32 ounces per acre. But we used different rates at 2 ounces per acre, 4 ounces per acre, and 6 ounces per acre. We used the lower rates because we don’t want to kill the peanuts. We don’t want a lot of foliage damage — we just want to terminate the flowering.” There’s a reason for choosing glyphosate, says Lamb. “If you remember when Roundup Ready cotton first became available, we were spraying it with Roundup almost season-long. But we discovered that the late-season application of glyphosate was affecting the pollination of the flowers in cotton and reducing yield. When we discovered that, we knew best how to use it.” Diflufenzopyr is being used as a herbicide, but it also has been shown that it will interrupt the flowering as well, he says. “We’ve got three different rates of each of these, and we’ve got irrigated and non-irrigated, three different timings — one time at day 100, one time at day 110, and then we have a repeated application at 100 and 110, so it’s a double application. We’re trying to determine timings and rates.” The research includes an untreated check and hand-removal of the flowers every day for 20 days, he says.
global_05_local_4_shard_00000656_processed.jsonl/108153
Thursday, January 25, 2007 Komodo 4 released; new free version ActiveState has released Komodo IDE 4. Perhaps more interesting, if you're not already a Komodo user, is the release of Komodo Edit, which is very similar to the old Komodo IDE Personal edition, only instead of costing around $30, Komodo Edit is free. The mental difference between "free" and "$30" is much more than the relatively small amount of money; it will be interesting to see what happens in the IDE space now. After a brief evaluation I would say Edit is perhaps the strongest contender for "best free python IDE." The only serious alternative is PyDev, which on its Eclipse foundation provides features like svn integration that Edit doesn't. PyDev also includes a debugger, another feature ActiveState would like to see you upgrade to the full IDE for. But Komodo is stronger in other areas such as call tips and, well, not being based on Eclipse. I also think its code completion is better, although this impression is preliminary. It's also worth noting that so far, Edit doesn't sport the "Non-commercial and educational use only" restrictions that Komodo Personal had. Monday, January 22, 2007 Wednesday, January 17, 2007 Caution: upgrading to new version of blogger may increase spam Could just be a coincidence. I hope so. Monday, January 15, 2007 Abstract of "Advanced PostgreSQL, part 1" In December, Fujitsu made available a video of Gavin Sherry speaking on Advanced PostgreSQL. (Where's part 2, guys?) Here's some of the topics Gavin addresses, and the approximate point at which they can be found in the video. wal_buffers: "at least 64"; when it's ok to turn fsync off [not very often]; how hard disk rpm limits write-based transaction rate, even with WAL wal_sync_method = fdatasync is worth checking out on Linux FSM [free space map], MVCC, and vacuum; how to determine appropriate FSM size; why this is important to avoid VACUUM FULL background writer history of buffer replacement strategies scenarios where bgwriter is not useful how random_page_cost affects planner's use of indexes logging; how to configure syslog to not hose your performance linux file system configuration solaris fs config raid; reliability; sata/scsi; battery-backed cache ("for $100, you can triple the write throughput of your system") increasing pgsql_tmp performance for queries that exceed work_mem and how to tell if this is worth worrying about cpu considerations Friday, January 12, 2007 Why SQLAlchemy impresses me One of the reasons ORM tools have a spotted reputation is that it's really, really easy to write a dumb ORM that works fine for simple queries but performs like molasses once you start throwing real data at it. Let me give an example of a situation where, to my knowledge, only SQLAlchemy of the Python (or Ruby) ORMs is really able to handle things elegantly, without gross hacks like "piggy backing." Often you'll see a one-to-many relationship where you're not always interested in all of the -many side. For instance, you might have a users table, each associated with many orders. In SA you'd first define the Table objects, then create a mapper that's responsible for doing The Right Thing when you write "user.orders." (I'm skipping connecting to the database for the sake of brevity, but that's pretty simple. I'm also avoiding specifying columns for the Tables by assuming they're in the database already and telling SA to autoload them. Besides keeping this code shorter, that's the way I prefer to work in real projects.) users = Table('users', metadata, autoload=True) orders = Table('orders', metadata, autoload=True) class User(object): pass class Order(object): pass mapper(User, users, 'orders':relation(mapper(Order, orders),, That "properties" dict says that you want your User class to provide an "orders" attribute, mapped to the orders table. If you are using a sane database, SQLAlchemy will automatically use the foreign keys it finds in the relation; you don't need to explicitly specify that it needs to join on "orders.user_id =" We can thus write for user in session.query(User).select(): print user.orders So far this is nothing special: most ORMs can do this much. Most can also specify whether to do eager loading for the orders -- where all the data is pulled out via joins in the first select() -- or lazy loading, where orders are loaded via a separate query each time the attribute is accessed. Either of these can be "the right way" for performance, depending on the use case. The tricky part is, what if I want to generate a list of all users and the most recent order for each? The naive way is to write class User: def max_order(self): return self.orders[-1] for user in session.query(User).select(): print user, user.max_order This works, but it requires loading all the orders when we are really only interested in one. If we have a lot of orders, this can be painful. One solution in SA is to create a new relation that knows how to load just the most recent order. Our new mapper will look like this: mapper(User, users, 'max_order':relation(mapper(Order, max_orders, non_primary=True), uselist=False, viewonly=True), ("non_primary" means the second mapper does not define persistence for Orders; you can only have one primary mapper at a time. "viewonly" means you can't assign to this relation directly.) Now we have to define "max_orders." To do this, we'll leverage SQLAlchemy's ability to map not just Tables, but any Selectable: max_orders_by_user = select([func.max(orders.c.order_id).label('order_id')], max_orders ='max_orders') "max_orders_by_user" is a subselect whose rows are the max order_id for each user_id. Then we use that to define max_orders as the entire order row joined to that subselect on user_id. We could define this as eager-by-default in the mapper, but in this scenario we only want it eager on a per-query basis. That looks like this: q = session.query(User).options(eagerload('max_order')) for user in print user, user.max_order For fun, here's the sql generated: SELECT users.user_name AS users_user_name, users.user_id AS users_user_id, anon_760c.order_id AS anon_760c_order_id, anon_760c.user_id AS anon_760c_user_id, anon_760c.description AS anon_760c_description, anon_760c.isopen AS anon_760c_isopen SELECT orders.order_id AS order_id, orders.user_id AS user_id, orders.description AS description, orders.isopen AS isopen FROM orders, ( SELECT max(orders.order_id) AS order_id FROM orders GROUP BY orders.user_id) AS max_orders_by_user WHERE orders.order_id = max_orders_by_user.order_id) AS anon_760c ON users.user_id = anon_760c.user_id ORDER BY users.oid, anon_760c.oid In SQLAlchemy, easy things are easy; hard things take some effort up-front, but once you have your relations defined, it's almost magical how it pulls complex queries together for you. I'm giving a tutorial on Advanced Databases with SQLAlchemy at PyCon in February. Feel free to let me know if there is anything you'd like me to cover specifically. MySQL backend performance Vadim Tkachenko posted an interesting benchmark of MyISAM vs InnoDB vs Falcon datatypes. (Falcon is the new backend that MySQL started developing after Oracle bought InnoDB.) For me the interesting part is not the part with the alpha code -- Falcon is competitive for some queries but gets absolutely crushed on others -- but how InnoDB is around 30% faster than MyISAM. And these are pure selects, supposedly where MyISAM is best. Of course this is a small benchmark and YMMV, but this is encouraging to me because it suggests that if I ever have to use MySQL, I can use a backend with transactions, real foreign key support, etc., without sucking too badly performance-wise. (It also suggests that people who responded to the post on postgresql crushing mysql in a different benchmark by saying, "well, if they wanted speed they should have used MyISAM," might want to reconsider their advice.) Wednesday, January 10, 2007 Fun with three-valued logic I thought I was pretty used to SQL's three-valued logic by now, but this still caused me a minute of scratching my head: # select count(*) from _t; (1 row) # select count(*) from _t2; (1 row) Both _t and _t2 are temporary tables of a single column I created with SELECT DISTINCT. # select count(*) from _t where userhash in (select userhash from _t2); (1 row) # select count(*) from _t where userhash not in (select userhash from _t2); (1 row) Hmm, 982 + 0 != 1306... Turns out there was a null in _t2; X in {set containing null} evaluates to null, not false, and negating null still gives null. (The rule of thumb is, any operation on null is still null.) Tuesday, January 02, 2007 Good advice for Tortoise SVN users My thinkpad R52's screen died a couple days ago. I decided that this time I was going to be a man and install Linux on my new machine: all our servers run Debian, and "apt-get install" is just so convenient vs manual package installation on Windows. And it looks like qemu is a good enough "poor man's vmware" that I could still test stuff in IE when necessary. Alas, it was not to be. My new laptop is an HP dv9005, and although ubuntu's livecd mode ran fine, when it actually installed itself to the HDD and loaded X it did strange and colorful things to the LCD. Things that didn't resemble an actual desktop. When I told it to start in recovery mode instead it didn't even finish booting. That was all the time I had to screw around, so I reinstalled Windows to start getting work done again. Which brings me (finally!) to this advice on tortoisesvn: it really puts teh snappy back in the tortoise. Thanks annonymous progblogger!
global_05_local_4_shard_00000656_processed.jsonl/108155
This set of lab exercises supplements the Certifiably SQL "Defining Jobs" column in the June 2000 issue of SQL Server Magazine. These lab exercises show you how to automate regular tasks, such as backups and data importing and exporting, by defining jobs to run at certain times or based on certain conditions. Related: Defining Jobs Task Administration Open the SQL Server Enterprise Manager. Expand Management, SQL Server Agent to see Alerts, Jobs, and Operators. You'll be working mostly with the Jobs item in this lab. Automate a Backup Sequence In this exercise, you're going to automate a sequence of backup jobs for the Master, msdb, Model, Pubs, and Northwind system databases. The first step is to create backup devices for each database. Under Management, right-click Backup, then select the option for New Backup Device. Supply the device name and the backup file location for each system database. Create a backup job for the Master database by following these steps: 1. Right-click Backup in the Enterprise Manager hierarchy, then select Backup a Database to open the SQL Server Backup dialog box. Leave the database set to Master. 2. Click Add, then add the name of the backup device. For this backup, select the "Overwrite existing media" option. 3. To create a job, click Schedule. Notice that the default is to back up once a week on Sunday. Click the ellipsis (...) button to the right of the schedule window to open the Edit schedule dialog box. Set the job's start time so that the job will run when you're done setting up this example—say 15 minutes from now. Click OK to close the Edit schedule dialog box, then click OK again to close the Backup dialog box. Modify the Job to Add Multiple Steps Now, switch to the Jobs item under Management in the Enterprise Manager hierarchy, and open the Properties dialog box by double-clicking the job you just created. You may have to refresh the Agent to see the new job listed in the Jobs window. Click the Steps tab, and notice that only Step 1 is defined; at this point, you have only the one backup job for the Master database set up. Click the Edit button to show the Edit Job Step dialog box for Step 1. While you're here, change the step name to "Backup Master database." You can now highlight the text in the Command window, and copy it to the clipboard. Click OK to exit the Edit Job Step dialog box. You're now ready to add a second step. Click New, then name this step "Backup MSDB database." Leave the job type as TSQL. Now paste the TSQL command into the command box. Change the name of the database in this command to msdb, then change the name of the backup device to the one you defined for msdb. Controlling Job Flow When you switch to the Advanced tab, notice that the "On success" action for Step 2 is "Goto step," but there's no next step to go to. If you click OK to close the Edit Job Step dialog box and click OK again to close the Job Properties dialog box, you'll see a message telling you there's a problem with the job flow and asking whether you want SQL Server to fix the problem. Although SQL Server can correct the problem in Step 2 by changing the "On success" action from "Goto step" to "Quit with success," you still have to set up the "Goto step" for Step 1. Click No to return to the Job Properties dialog box. Double-click Step 1 to open the Edit Job Step dialog box, then select the Advanced tab. Drop down the list of choices for the "On success" action, and note that Step 2 is now in the list. Select Step 2 from this list as the "Goto step" that will start as soon as Step 1 completes successfully. Click OK to close this dialog box. You can now repeat the process, adding a backup job for the Model, Pubs, and Northwind databases. Set Up an Operator Notification In the Job Properties dialog box, click the Notifications tab. Select the check box to notify an operator (perhaps the operator you configured if you went through last month's lab exercises to set up alerts and operators). Change the option so that, for this test, the operator receives notification whether the job succeeds or fails. Close the dialog boxes, and return to the Enterprise Manager. Testing the Job Flow Right-click on the name of the job you want to run, then select Start Now. Click Start to begin the job at Step 1. Alternatively, you can wait for the job to start at the time you scheduled earlier and watch the Last Run Status to see whether it runs. Check the Job History When the job completes, right-click the job name again, and select View Job History. Select the box in the upper right corner of the Job History window to expand the step details, and you'll see the job steps in the order they ran. Verify that all the steps completed successfully, then close the Job History window. Configure Job History Settings Right-click the SQL Server Agent icon in Enterprise Manager, then select Properties. Select the Job System tab, and verify that you've selected the "Limit size of job history log" check box. You can also change the maximum size of the job history file or change the maximum number of rows per job. Close the dialog box. Job Scripting SQL Server creates scripts to help you keep track of the actions you've taken. You can use these scripts to create an identical job on another server. Just right-click the job you just created, then select All Tasks, Script Job. Specify a file name for this job script, and click OK to generate the script. You can open a Query Analyzer window and read in the script. If you want, delete the job, then run the script to recreate it. Note that you may see errors about a "non-existent step referenced by @on_success_step_id." Don't worry about such error messages. The script builds the job from the top down, so Step 1 will produce an error because you've set it up to go to Step 2, which the script hasn't built yet. Finally, delete the job and the backup devices you created for this exercise.
global_05_local_4_shard_00000656_processed.jsonl/108158
Take the 2-minute tour × If I have a script like: class ClassA(object): def methodA(...): def funcA(...): I mean I intend to write a small function inside a class method, which is only used inside this class method. Is this code style OK? I think it's a little ugly. Is there alternate? share|improve this question One potential problem is that you'll be re-defining funcA every time methodA is called. –  Blender Dec 21 '12 at 6:55 Have you considered using a lambda function instead? –  Martinsh Shaiters Dec 21 '12 at 6:56 @Blender then how can I avoid re-defining funcA? –  ThunderEX Dec 21 '12 at 6:59 @ThunderEX: By defining it outside of methodA. –  Blender Dec 21 '12 at 7:00 See this question from just an hour ago for some discussion. –  BrenBarn Dec 21 '12 at 7:19 1 Answer 1 up vote 1 down vote accepted Beauty is in the eye of the beholder. It is totally fine having a very "local" function nested inside another function - especially from the point of readability of code. Others will argue with coding style and best practice. It is your code and you must feel fine with your code in order to understand and read it later. So if it is fine for you and your understanding of "nice" code, go ahead. share|improve this answer Your Answer