id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_05_local_4_shard_00000656_processed.jsonl/113691
|
look up any word, like fluffer:
A bunch of human rejects that have nothing better to do with their poor excuses of so called lifes, than to hack newgrounds.com.
Duck Division: Cyber Terrorists.
by LD Portion July 11, 2009
A crew of neo nazi flash artists they constantly spam the newgrounds portal with poorly made flash movies.
it used to be just the forums,the games, and the hentai, but now i am dedicated to stopping all flashes from the Duck Division.
by Elios March 04, 2009
the duck division post cp on newgrounds
by 0000000101010010010010100111 June 25, 2009
A group of people who have used basic phishing skills to steal passwords of moderators on the website Newgrounds. Both parties involved, the phishers and the phished, are idiots.
I'm a hardass and the Duck Division is evil.
by Kyothine July 15, 2009
Weirdos who claim to be Newgrounds Protectors/Admins. They also claimed to attract the first pool of members in 2005, when Newgrounds opened. They're actually people who spam Newgrounds and dump their bad flashes. They're terrible administrators and moderators, their reply to spammy/threatening comments, 'LOL' or any pointless word. They often go off-topic or post pornography on a topic. They have no knowledge of how to be a good moderator/administrator.
Their flashes made are labeled with DD. They're normally hate flashes, but some of the Newgrounds users aren't taking their flashes seriously.
Also, they're planning to inject a virus into Newgrounds. What a group of failures.
Person 1: Hey Person 2, Duck Division posted another flash.
Person 2: What's it called?
Person 1: DD Wade Fulp Gets Laid.
Person 2: Blammed?
Person 1: Yep.
Person 1: They've also spammed up Newgrounds' forums but the moderators cleaned it up. And they're posting shit about Newgrounds in their forum.
Person 2: Typical Duck Division style.
Person 1: Yea.
by MisaTange July 24, 2009
the duck division is a bunch of douche-bags that think they own newgrounds. they are often referred to as DD for short.
They spam it with their crap.
recently they have been submitting a video of terrorists cutting another guys head off - a lot of blood!
A: hey did you hear about that crappy submission on newgrounds about that guy getting his head cut off?
B: yeah
A:guess who submitted it
B: the duck division
A: yeah
by andale524 August 26, 2009
The owners of Newgrounds dot com.
The Duck Division own Newgrounds.
by from the dd June 30, 2009
|
global_05_local_4_shard_00000656_processed.jsonl/113693
|
look up any word, like half chub:
Someone who uses pictures off of google images to represent themselves on the internet
OMG, NO!! She's just another GOOGLE GIRL, I found her image, under emo hair. She's a fake scene girl!
by Mark ;o August 21, 2008
The superhero (usually female) who can answer any question posed by referring to google.
Me--Crap who is that actor who played Snape?
Google Girl--*tap tap tap tap tap* It is Alan Rickman....
Thanks Google Girl!!!!
by Google girls Mom November 27, 2011
A girl who pays to be at the top of your list. A girl who pays per hit.
I just shelled out mad cash on that googlegirl and got a she paid me back in triple traffic.
by thelesbianfromct February 28, 2008
|
global_05_local_4_shard_00000656_processed.jsonl/113696
|
look up any word, like cleveland steamer:
A person who voluntarily gives animals orgasms for the purpose of insemination. Basically beats them off until the animal achieves orgasm.
Owen is a good squeegler because he gets animals to ejaculate quickly.
by Snowdrif May 26, 2009
Words related to Squeegler
bestiality science sex weird zoophilia
|
global_05_local_4_shard_00000656_processed.jsonl/113698
|
look up any word, like fluffer:
Use to describe the term where a line of blow is done off one's penis followed by a blow job. Primarily used as a better way to ask someone for said activity
I got the best bloblo from my girlfriend last night.
by NYCMitty August 30, 2010
French slang word meaning 'large droopy breasts' but occasoinally used in English to mean the same thing.
That gross chick has bloblos.
by Wop-anza April 28, 2004
French slang for tits. This noun is plural and female. It is usually vulgar, and often used by men who prefer big droopy boobs.
Regarde des bloblos!
Check those tits!
by Ninja337 August 23, 2006
|
global_05_local_4_shard_00000656_processed.jsonl/113703
|
look up any word, like plopping:
Indonesian slang term for police, cops and pigs
idn: "tai! ada plokis, sobb!"
eng: "shit! it's the cops, brah!"
by indo-gangsta April 29, 2008
Ploki is a word used for computer programming development testing. It has no meaning other than its significance as a word with no prior meaning. It therefore is easily found in a code search and thus finds its usefulness in spotting test code before it goes live for any developer who uses this word as their "testing word" while working. The word was picked for its prior meaninglessness, its unique order and combination of letters, and for the convenience of the approximity the letters have to one another on the standard English keyboard.
// this will dump stuff onto the page, right?
echo "ploki";
by GC June 19, 2006
|
global_05_local_4_shard_00000656_processed.jsonl/113771
|
HACKER SAFE certified sites prevent over 99% of hacker crime.
Want to tell a friend about Mizuno 9 Spike Advanced Finch 5 Mid? It's easy. Just enter the information requested below, click the "E-mail a Friend" button, and your message is on its way.
Name of recipient:
*Recipient e-mail address:
Your name:
Your e-mail address:
Personal Message:
The above image says:
|
global_05_local_4_shard_00000656_processed.jsonl/113787
|
The Photography of R. Scott Hooper
Shop for Las Vegas souvenirs
Playboy Australia
Playboy Argentina
Playboy Brazil
Playboy France
Playboy Germany
Playboy Greece
Playboy Hong Kong
Playboy Japan
Playboy Italy
Playboy Netherlands
Dutch Playboy December 1983
Dutch Playboy July 1983
Dutch Playboy May 1983
Dutch Playboy November 1983
Playboy Netherland Aug 1983
Dutch Playboy Oct1983
Dutch Playboy Sept 1983
Dutch Playboy April 1984
Playboy Netherland Sept 1984
Dutch Playboy August 1984
Dutch Playboy June 1984
Dutch Playboy November 1984
Dutch Playboy Feb 1984
Dutch Playboy Oct 1984
Dutch Playboy March 1985
Dutch Playboy May 1985
Dutch Playboy Aug 1985
Dutch Playboy April 1985
Playboy Netherland Nov 1986
Playboy Netherland Dec 1986
Dutch Playboy April 1987
Playboy Netherland Feb 1987
Playboy Netherland Jan 1987
Playboy Netherland March 1987
Playboy Spain
Playboy Turkey
Site Map
About Us
About The Prints
Private Portraits
Dutch Playboy Maart 1987
Foreign Playboy Mags $30
Collectible Playboy Magazine Foreign Editions. FREE SHIPPING in the USA!
Playboy Netherland March 1987
Sexy Stars
The photo here is of the actual magazine so you can see pretty much what condition it is in, which is excellent. Most of these foreign editions have only been handled once when we got them in the mail. This magazine is in LIKE NEW shape.
• COVER: Hilde van Mieghem, Bo Derek
• CENTERFOLD: Ava Fabian
• INTERVIEW : Willum Duys
• PICTORIAL: Fien & Fientje (single girl layout)
• PICTORIAL: Hilde van Mieghem
This magazine has an insert that looks to be pics of stars from that year, Bo Derek, Sydne Rome, Bridgitte Neilson. It has a shiny cover and the gatefold is heavy stock and looks laminated as well.
Playboy Netherland March 1987
Add Your Comments
HTML is not allowed in comments.
March 11th 2014, 11:45PM.
|
global_05_local_4_shard_00000656_processed.jsonl/113807
|
Showing All "No Thanks" Posts
Don't be lying to you?! I don't even know you! I don't even like your team! Why are you being so scary?! Don't pee on the seat??! How about don't yell at me about peeing in front of everybody! If I… Read Story »
It's incredible that everyone is still talking about Kendrick Lamar's verse on that Big Sean song when Tan Mom released a new music video today in which she disses Farrah Abraham, Howard Stern kind… Read Story »
"Bored of being in a dark room, she flips on the light, opens the door and bails. This particular episode takes place at 1am." Oh no, "good job" is totally 100% what I was going to say too.… Read Story »
You're standing in clothing store with your significant other. You came there today to buy a few new shirts and a skirt for spring, because you don't buy new clothes for yourself very often, and you… Read Story »
You see things like this all the time. For example, parents who bring their children to grown up parties, or events, or concerts when they put big headphones on them as if that is fooling anyone into… Read Story »
I'd like to ask you all to please take a few moments out of your day, go into the bathroom, splash water on your face, put your elbows on the sink, put your head in your hands, breathe deeply in and… Read Story »
|
global_05_local_4_shard_00000656_processed.jsonl/113808
|
High Times
Smiley Face the stoner comedy to end all stoner comedies. Plus it's funny!
In a perfect world, or maybe one that was just, like, super, super, super-stoned on some dope-ass weed . .. like some revolutionary ganja and shit, man. . . . But that'd be the same thing, though, wouldn't it? Perfect. Stoned. Hmm . . . awesome. Um, one sec. I'll be right back.
What's this all about again? Smiley Face, right. Anna Faris, man. That chick from Scary Movie, you know. She's a fucking genius. In a perfect world, Smiley Facewould make her bigger than that girl from Juno, or Meryl Streep, or something.
Truth is, in a perfect world pot wouldn't turn my mouth into a sandbox and my nervous system into one giant, uptight twitch. Can't stand the stuff, frankly, so I'm not exactly an ideal candidate to evaluate the blunted verisimilitude of Smiley Face, stoner farce par excellence. On the plus side, 100 percent sober when I watched it, I can say with some authority that Dylan Haggerty has written an eleventh-hour candidate for the funniest movie of 2007, that Gregg Araki has directed his finest film since 1997's Nowhere, and that Faris, flawless, rocks their inspired idiot odyssey in a virtuoso comedic turn.
Don't worry: She's stoned.
First Look Studios
Don't worry: She's stoned.
Smiley Face
Directed by Gregg Araki
First Look Studios
Opens December 26, IFC Center
Related Stories
More About
Smiley Face tells the story of how Jane F (Faris) got from point A (the letter A on her laptop, upon which, in a Mary Jane stupor, she recently purchased the most comfortable bed ever for $995.99, thereby emptying out a checking account that would have come in handy right about then when, after having devoured a plate of cupcakes improbably laced with massive quantities of dope, baked by her nerdy, "skull-fucking" roommate and explicitly labeled DO NOT EAT, she could have used the money to whip together a new batch and pay off her dealer, who just stopped by to demand the balance, or else—"or else" being the confiscation of the most comfortable bed ever, and that would be such a total bummer!) to point Z (stuck on a Ferris wheel high above Venice beach, hallucinating a voiceover spoken by Roscoe Lee Browne).
Confused? Just ride, man: Points B–Y will take Jane, aspiring actress, from an audition that ends with her offering to sell the casting agent a baggie to having a dentist-office freakout in the company of an über-dork who might be able to lend her the cash to pay the dealer and give her a ride to the 33rd Annual Venice Hemp Festival. Visiting the house of a former professor in Marxist studies, she'll inadvertently get her hands on an original copy of The Communist Manifesto (and promptly daydream the glorious results of an eBay auction) and later head to a pork-processing plant in the middle of nowhere, and so on and so forth with maximum silliness, deft narrative drive, and dialogue of sustained hilarity.
Dealer, explaining his métier in Reagonomic terms: "It's all about capitalism, shit like that, you know?"
Jane, exhaling a gigantic toke: "Just because weed isn't taxed doesn't mean it exists in some sort of, you know, laissez-faire paradigm. Or whatever."
Araki, the man who put the "ew" in New Queer Cinema (The Living End, The Doom Generation), keeps his screwball rolling with a freewheeling touch, bouncing with ease from goofball monologue to manic slapstick to dusted interludes of unconsciousness and hallucination. Haggerty writes the smartest kind of dumb comedy; his fuzzy nuggets of Marxist mumbo jumbo neatly acknowledge the countercultural pretensions and random acts of thinking that accompany a monumental pot binge.
There ends up being a moral to the Smiley Face story. As Jane fumbles toward her Ferris-wheel epiphany, the play of motifs (Marx, marijuana, most comfortable bed ever) mesh with surprising and delightful intricacy, snaring our heroine in a net of accountability—saving her, really, from the farcical solipsism of the professional pothead. The larger point, of course, is to laugh your lazy, extremely wasted ass so totally off that it floats up, up, out of the theater and across the hall of the IFC Center, where Smiley Face opens and where I do NOT (ahem) by any means (heh-heh) recommend you light up in the bathroom—nice bathrooms, by the way—la, la, la, float my funny ass, float! into the evening show of the uncut Fanny and Alexander (opens January 2—fuckin' hilarious!!!), giggling so hard your ass actually laughs its own ass off, and comes back to join you at Smiley Face.
My Voice Nation Help
Now Showing
Box Office Report
|
global_05_local_4_shard_00000656_processed.jsonl/113810
|
" Version 0.2 " Usage: ":TeXtags foo" will generate a tags file from foo.aux . If you " are currently editing foo.tex or foo.bar then ":TeXtags" alone will do. " The file you are editing must be in the same directory as the .aux file. " " If your LaTeX source is split among several files, the script works well " with \include{file} commands, but NOT with \input file commands. " " Using tags: If many of your labels look like \label{eqn:foo} then try " :tag eqn:foo " :tag eqn: " :tag /eqn " :ts " for example. Also try :ptag variants. For details, read " :help tagsearch.txt " If you want to use to jump to tags, either use the Visual-mode variant " or make sure that your labels are recognized as words. For example, with " the format \label{eqn:foo}, make sure that ":" is included in 'isk'. " :help ctrl-] " :help word command! -nargs=? TeXtags call TeXtags() " Generate a tags file from a LaTeX .aux file. " This version clobbers any existing tags file! fun! TeXtags(...) if a:0 let fname = a:1 " Get file name from argument list. else let fname = expand("%:t:r") " Get file name from current file. endif if !filereadable(fname . ".aux") echohl WarningMsg execute "echo 'TeXtags: could not find file " fname . ".aux'" echohl NONE return -1 endif split %:p:h/tags %d " Clobber the old tags. " put='Tags file generated by TeXtags() Vim script' put='\@input{.aux}' " dummy line, so search cannot fail 1d " Remove the blank line added by :put command. while strlen(fname) if filereadable(fname . ".aux") execute "$-1r" fname . ".aux" " Remove all lines from fname.aux except \newlabel and \@input ones: '[,'] v/^\\newlabel{.*}\|^\\@input{\f*.aux}/d " v/^\\newlabel\|^\\@input{\f*.aux}\|^\\bibcite/d " The next few lines transform \label{foo} into the tag line " foo{Tab}fname.tex{Tab}/\\label{\s\*foo\s\*}/ " Note that we use '\*' because tag searches are done with 'nomagic'. let tagline = '\1\t' . fname . '.tex\t' let tagline = tagline . '\/\\\\label{\\s\\*\1\\s\\*}\/' execute '%s/^\\newlabel{\(.\{-}\)}.*/' . tagline endif " Find the next included .aux file. Note that fname = '' if we are on " the dummy line (last line of the file). 0/^\\@input{\f*.aux} let fname = substitute(getline('.'), '.*{\(\f*\).aux}.*', '\1', '') d " Remove the \@input{} line. endwhile 0put='!_TAG_FILE_SORTED 0 /some command/' wq endfun
|
global_05_local_4_shard_00000656_processed.jsonl/113812
|
Text Size:-+
Spectator Ratings On Your Mobile Phone
Thanks to a tip from Professor Bainbridge, Vinography has just learned that you can get all of Wine Spectators wine ratings accessible through your cellphone. Of course, you can't actually look at the advertisement for the service, or find out anything about it without first becoming a paid subscriber to the Wine Spectator Web site, which as a fellow wine blogger put it so nicely yesterday, requires you to pay for even thinking about the site (yes, even if you are already a subscriber of the magazine, like me).
<dripping sarcasm> Hmm. Yeah, I'm definitely in the habit of buying services for my cellphone without knowing what they can actually do.</dripping sarcasm> Of course, that's presumptuous of me. It turns out that I can't actually buy this service without...yes, you guessed it: first buying a subscription to the Web site!
Comments (2)
01.24.05 at 12:03 PM
Hi Alder,
Here is some more info (demo, faq, etc) on the new Wine Spectator mobile app: http://www.airborne-e.com/website/winespectator/
Brad wrote:
11.30.08 at 8:31 AM
Alder -
I guess the question is: what *is* the right model for bringing content to consumers through the phone?
I agree that wine spectator is taking the wrong approach, forcing people into website subscriptions before they've even tried the app. On the other hand, few content providers have cracked the "mobile nut" and figured how to make money, so maybe they're onto something...
I'd be interested in your (and your reader's) thoughts on business models for mobile and mobile's place in the wine industry. Should content be free and ad-supported, subscription-based, based on a snacking model i.e. micro-payments per inquiry? These apps take time and money to develop, so the money has to come from somewhere...
Comment on this entry
(will not be published)
(optional -- Google will not follow)
Type the characters you see in the picture above.
Pre-Order My Book!
Follow Me On:
Twitter Facebook Pinterest Instagram Delectable Flipboard
Most Recent Entries
Favorite Posts From the Archives
Archives by Month
Required Reading for Wine Lovers
|
global_05_local_4_shard_00000656_processed.jsonl/113834
|
Religious Exemptions and the Elane Photography Case:
I'm wondering whether the religious exemption question might be getting lost in our discussion of the compelled speech issue. The compelled speech issue is a First Amendment question, and thus arises everywhere, and for all photographers, so that is more important. But the religious exemption issue remains significant, since about half the jurisdictions have a general religious exemption rule (by statute or by interpretation of the state constitutional provision).
Recall that the New Mexico Religious Freedom Restoration Act provides that:
A government agency shall not restrict a person's free exercise of religion [i.e., an act or a refusal to act that is substantially motivated by religious belief] unless ... the application of the restriction to the person is essential to further a compelling governmental interest and is the least restrictive means of furthering that compelling governmental interest.
Assume, as seems to be the case, that Elaine Huguenin's refusal to photograph a same-sex commitment ceremony does seem to be substantially motivated by her religious belief. Is applying the antidiscrimination law to Huegenin really "essential to further a compelling governmental interest," especially given that there are doubtless many other Albuquerque photographers who would have no religious objections to photographing same-sex ceremonies? Will it even materially advance whatever compelling governmental interest is present, given that forcing photographers to photograph events that they find repugnant is not likely to produce the warm, affectionate photographs that couples want?
I discussed this more here, but I wanted to ask what you folks -- and especially those who defend the New Mexico Human Rights Commission decision -- think about this.
|
global_05_local_4_shard_00000656_processed.jsonl/113836
|
Tuesday, July 29, 2014
The FDA is cracking down on wood-aged cheese — and it's a terrible idea
Gruyere cheese ages on wooden shelves in Switzerland. FABRICE COFFRINI/AFP/Getty Images
This weekend, news emerged that the Food and Drug Administration was cracking down on the use of wooden boards in the aging of cheese. (Update: After this post was published, the FDA responded to my request for comment and clarified that no explicit ban is in place, though they are concerned about the practice. Their letter is at the bottom.)
Though they aren't banning the practice entirely, the FDA appears to have already ordered some New York State cheesemakers using wood shelves to cease operations, sending a letter to the New York State government saying "The use of wooden shelves, rough or otherwise, for cheese ripening does not conform to cGMP requirements."
Their reasoning was that these boards can't properly be sanitized, increasing the risk of Listeria and other pathogens spreading as cheeses ripen.
Wooden boards have been traditionally used in the ripening of all sorts of artisan cheeses for hundreds of years. The rule would apply to both American-made cheeses and anything imported to the US, so people throughout the cheese industry are understandably freaking out.
But here's the thing: all sorts of factors can contribute to the incidence of harmful strains of bacteria like Listeria on cheese surfaces, and it's not clear that wooden boards are especially dangerous.
"I don't think we should just say 'Don't produce cheeses on wooden boards.' It's more complicated than that," says Arthur Hill, a food scientist who studies cheese at the University of Guelph in Canada. "The literature on this is not conclusive, and I'm not sure that the risk analysis justifies the FDA's ruling."
Only a few cheesemakers that use wood have been forced to suspend operations so far, and it's unclear whether the FDA is retreating from public backlash or never intended this to be an actual policy in the first place. Still, at the moment, the artisan cheese industry is very upset about the possibility.
How wooden board aging works
Cheese aging at Cato Corner Farm in Connecticut. Robert Nickelsberg/Getty Images
All types of cheese go through an aging process, during which distinct flavors and textures develop. For most cheeses, a rind forms, and it includes benign bacteria that grow and contribute to the cheese's flavor.
Many cheesesincluding Beaufort, Parmigiano Reggiano, and others you've probably heard of and may love dearly — are traditionally placed on wooden shelves while they age. Sometimes, wooden molds are used as well. This is because wood is porous, so it allows airflow, crucial to the growth of these flavorful bacteria.
In some cases, the bacteria that grow on the rind are simply the strains naturally present in the aging facility. In other cases — for washed rind cheeses, which are bathed in saltwater before aging — the cheeses are intentionally inoculated with bacteria. Cheesemakers do this by putting them on the same wooden shelves where the previous batch ripened, so the new cheese picks up the old bacteria culture.
The FDA is especially concerned about the safety of this latter type of cheese, but suggested they'd ban the use of wooden shelves for all varieties, because they say wood can't be fully sterilized. Cheesemakers say the material, however, is absolutely necessary for their product.
"If you take the wood away from a traditional plant that's making the cheese, they will probably never be able to get that same flavor profile back," Hill says. In some cases, plastics have been substituted for wood, but they alter the flavor of the cheese. Many cheesemakers even swear by a particular type of wood to ensure it tastes right.
Why this ban on wood won't increase safety
DeAgostini/Getty Images
It's true that cheese occasionally causes Listeria outbreaks, and washed rind cheeses may be especially prone to them, because bacteria strains are intentionally cultivated on their surfaces.
"They are a little risker," Hill says. "I love them, and their earthy flavors, but I wouldn't give them to my 90-year-old father, or someone who was pregnant." Pregnant women, older adults, and people with weakened immune systems have the highest risk of getting infected.
However, a range of factors determine which types of bacteria grow on a cheese's rind, and the use of wood doesn't seem to be especially important in promoting Listeria.
In the FDA's letter clarifying its position on wood, it cited studies showing small amounts of Listeria can survive in boards after they were cleaned with detergent. But the same studies also concluded that the Listeria were wiped out when the boards were cleaned and cooked at high temperatures, making the wood safe for cheese production. Additionally, other studies the FDA cited note that the material used is much less crucial than other factors — such as the presence of benign bacteria that can outcompete Listeria.
"There's occasional evidence of toxigenic bacteria, but there's also evidence of other bacteria that produce antimicrobials that limit the growth of toxigenic ones," Hill says. " So if you arbitrarily say, 'you can still do the washed rind, but you can't do it on wood,' you may actually create conditions in which Listeria can grow more effectively."
Moreover, the numbers of Listeria detected in these tests aren't particularly high — probably not enough to actually cause an outbreak. The truth is that the age-old tradition of washed rind aging produces a complex mix of bacteria strains that we still don't fully understand — and the answer isn't banning wood, but conducting more research.
What's going to happen to your favorite wood-aged cheeses
All this isn't a result of a new law, but a so-called "clarification" of the FDA's position on the topic. It came about after the FDA's Center for Food Safety and Applied Nutrition issued citations to several New York State cheesemakers for the use of wood shelves, which prompted an inquiry from the state government, which allows the practice.
In response, the FDA clarified its position, saying that the use of wood shelves violates a provision of its Current Good Manufacturing Practice regulations that requires "all plant equipment...to be adequately cleanable." The agency is applying this interpretation to all imports as well — an important aspect, since the majority of cheeses imported from Europe are aged on wood.
Obviously, that's a very vague provision, and no one in the industry seems to have expected the FDA to interpret it as a ban on wood. This is part of the continuing implementation of the 2011 Food Safety Modernization Act — intended to prevent contamination, instead of merely responding to it — which gave the FDA all sorts of new powers over food safety.
It's unclear what will happen next. The rule won't affect large-scale manufactured cheeses, since they aren't aged on wood anyway. If heavily enforced, it could throw the small-scale artisan cheese industry into disarray, since the majority of its cheeses are aged on wood. Some European cheeses — like Comte and Beaufort — are legally defined by their aging process, and the law specifies to use the name, the product must be aged on wood.
At the same time, the FDA is now saying that there is no new policy, although it has already forced a few cheesemakers in New York State to suspend sales.
Some commentators are claiming that the agency is going beyond its legal authority, partly because it didn't conduct a process called notice-and-comment rulemaking, in which new rules or interpretations are open to public comment before they're enforced. If the agency did go forward with the no-wood rule on a broader scale, Hill expects it'd face lawsuits from cheesemakers saying it endangered their livelihoods without a sound scientific basis.
Update: Here's the text of the FDA's statement on the issue:
In the interest of public health, the FDA’s current regulations state that utensils and other surfaces that contact food must be "adequately cleanable" and properly maintained. Historically, the FDA has expressed concern about whether wood meets this requirement and has noted these concerns in inspectional findings. FDA is always open to evidence that shows that wood can be safely used for specific purposes, such as aging cheese.
Read This
Log In Sign Up
Log In Sign Up
Forgot password?
We'll email you a reset link.
Forgot password?
Try another email?
Almost done,
Choose an available username to complete sign up.
|
global_05_local_4_shard_00000656_processed.jsonl/113840
|
From Semantic Web Standards
Jump to: navigation, search
Name of the tool: djubby
Home page:
Date of latest release:
Relevant semantic web technologies: RDF, SPARQL
Categories: Triple_Store, Development Environment
See also:
Public mailing list:
Preferred project URI:
DOAP reference:
Company or institution:
(Tool description last modified on 2011-03-18.)
Djubby is a Linked Data frontend for SPARQL endpoints for the Django Web framework, adding a Linked Data interface to any existing SPARQL-capable triple stores. It is inspired by Pubby but uses Python.
|
global_05_local_4_shard_00000656_processed.jsonl/113841
|
Skip to contents |
W3C Ubiquitous Web Domain | XML home
Extensible Markup Language (XML) Activity Statement
Highlights since the previous W3C Advisory Committee meeting
Low W3C staff resources in the XML Activity meant that much work was done without technical staff involvement. However, the Activity was renewed with new charters.
Overall, XML has seen a resurgence in uptake because of the publishing industry. Producing multiple output formats for documents, such as PDF, print, EPUB and more, from the same input source, was one of the original design goals for XML, and the maturity of the XML toolchain has made it a good and safe choice. W3C has started work in the area of digital publishing as a separate Activity, but the XML work remains within the XML Activity.
The XML Print and Page Layout Working Group (working on XSL-FO for formatting) was closed because of a lack of participation.
The XML Schema Working Group was closed because it has successfully completed its primary chartered work.
Upcoming Activity Highlights
XSLT 3 is attracting interest wth its support for streaming of large documents. XQuery 3.1 and XSLT 3.0 will have an increased level of support for working with the JSON format, as well as higher order functions and an associative dictionary data structure (maps).
XProc, the the XML pipelining language, has been gaining industry traction. The XML Processing Working Group is working on requirements for a version 2.0.
Efficient XML (EXI) is used in places where it cannot be seen, such as between a computer and a digital camera; a new EXI version may increase visibility.
The XML Core Working Group has taken on some work on XML Security, as well as continuing infrastructure-level work.
Summary of Activity Structure
GroupChairTeam ContactCharter
Efficient XML Interchange Working Group
Takuki KamiyaCarine BournezChartered until 31 May 2015
XML Coordination Group
Paul GrossoLiam QuinChartered until 31 May 2015
XML Core Working Group
Paul Grosso, Norman WalshLiam QuinChartered until 31 May 2015
XML Processing Model Working Group
Norman WalshLiam QuinChartered until 31 May 2015
XML Query Working Group
Jim Melton, Andrew ColemanLiam QuinChartered until 31 May 2015
XSLT Working Group
Sharon AdlerLiam Quin, Carine BournezChartered until 31 May 2015
This Activity Statement was prepared for AC 2014 per section 5 of the W3C Process Document. Generated from group data.
Liam R. E. Quin, XML Activity Lead
$Id: Activity.html,v 1.618 2014-07-21 14:24:28 sysbot Exp $
Valid XHTML 1.0!
|
global_05_local_4_shard_00000656_processed.jsonl/113868
|
IGOR Pro 4.0 New Feature Details
Below are the details of Igor Pro 4. Click here for the highlights.
On Macintosh, Igor Pro 4 requires Mac OS 8.5 and later. It does not run on Macintosh 68K machines.
On Windows, Igor Pro 4 runs under Windows 95, Windows 98, Windows NT4, Windows 2000, and Windows Millennium Edition (Windows ME).
Version Compatibility
Igor Pro 4 can read files created by all earlier versions of Igor.
If you don't use features new in Igor Pro 4, then experiment files that it writes are readable by earlier versions (except that to read Windows files on Macintosh you need Igor Pro 3.1 or later).
Once you use features added in Igor Pro 4 and save an experiment file, that file may cause errors if you try to read it in an earlier version of Igor. Just in case you need to go back to an earlier version of Igor, it is a good idea to make backup copies of all your Igor files now.
There is a slight incompatibility between Igor Pro 4 help files and help files from previous versions. For most people, this is of no consequence. This is described in the Igor online help files under Help System Improvements.
When you open an old experiment, you may see a dialog complaining about "extra text" and asking if you want it to be considered an error. If you are not an Igor programmer, you should answer that it not be an error. Programmers, however, should fix their code. This is described in the Igor online help files under Legacy Code Issues.
IMPORTANT: All users should be aware that when Igor opens an old (pre Igor4) experiment, it enters a compatibility mode that allows legacy code to continue to use a vertical bar (|) as a comment character in procedures. New experiments do not operate in compatibility mode and | is then the bitwise OR operator while || is logical OR. This distinction will be of little consequence until you start to mix old and new procedures. However this mixing can happen very easily when you choose certain items from a Packages menu. Don't worry about it now, see the online help topic Packages if you run into trouble.
Improvements have been made to the methods Igor uses when printing and exporting. This should not cause problems but just in case, techniques are available to revert to older methods. This is described in the Igor online help files under Printing and Export Changes.
Guide To Igor Pro 4 Improvements
Here are the Igor Pro 4 improvements discussed on this page.
Packages Feature
WaveMetrics has long provided handy procedure files that extend Igor's capabilities using Igor's own programming language. However, to use a provided procedure, you had to first find it in the WM Procedures Index help file, copy a line or two into your main procedure window, close the procedures window and finally chose an item from a menu.
Now, for select procedure packages, this can all be accomplished with a single selection from a Packages menu. This is explained in the online help topic Packages.
Documentation Improvements
We have revamped the part of the manual that covers programming with the goal of making it easier for someone learning Igor programming to separate the signal from the noise. As a result:
1. The one big Igor Programming Chapter is split into several smaller chapters.
2. Almost everything having to do with macros is segregated into a single chapter.
3. Everything having to do with old methods of programming is segregated.
If you are an Igor programmer, reading the new documentation may clarify some murky issues for you. The new material starts with Chapter III-2.
We have also reorganized the help files, splitting analysis, graphics, and programming into their own help files.
Help System Improvements
The new Help Browser includes:
• Ability to search all help files, procedure files, notebooks.
• Modeless help for functions and operations.
• Display of all shortcuts.
• One-click access to online manual.
See The Igor Help Browser online help topic for details.
Previous versions of Igor included a FAQ help file and a Known Problems help file. We have removed both of these help files. In their place, we have created a support web page where you can search for the kinds of information previously in the FAQ and Known Problems files. Using a web page rather than a help file ensures that you get the latest information. To access the support web page, choose Support Web Page from the Help menu.
In Igor Pro 3.1 for Windows, WaveMetrics included an online manual and two kinds of help. One type of help used Igor's own help system and the other type of help used the Windows help system. Maintaining the manual plus two kinds of help was very time consuming. Also, Microsoft is phasing out the old Windows help system. Consequently, in Igor Pro 4, WaveMetrics no longer includes Windows help system files.
Igor Pro 4 help files are slightly different from previous help files in that links are blue and underlined. Previously they were black and bold and not underlined. If you open a help file from an earlier version of Igor in Igor Pro 4, Igor Pro 4 will ask if you want to convert the help file. If you open an Igor Pro 4 help file in an earlier version of Igor, the links will not work. If you are an author of an Igor help file, see Help Link and Subtopic Formatting in Chapter II-1 of the manual for further information.
Data Browser Improvements
The new Data Browser allows you to preview your data graphically, to view and edit properties of waves and variables, to sort objects alphabetically (use the Preferences button), and to focus on deeply buried data folders
Graphing Improvements
The Modify Axis dialog was revamped. You can now make all axis-related changes in one dialog. You can change multiple axes at once, enter axis range as date/time, set axis colors in the dialog. Dialog includes a live update mode that allows you to see changes on your graph as you make them.
Date/Time axes have been greatly improved. You can display date axes using a wide variety of date formats, you can now use manual ticks, you can now use the Round to Nice Values axis autoscaling modes and date/time axes have been revised to give rational minor ticks. Igor now supports elapsed time, fractional seconds and negative time in time axes
You can now cause axes to be drawn with purely user-defined tick mark positions and labels. See User Ticks from Waves in the online help. This capability is used extensively in the TransformAxis procedure file.
Igor can now create true waterfall plots using the NewWaterfall command line operation. There is no built-in dialog for creating waterfall plots but a user interface is provided via the Packages mechanism. Choose Windows->New->Packages->New Waterfall.
The Add Annotation dialog was revamped.
You can create color scale annotations (those spiffy image or contour legends you see in the scientific journals).
Annotations can be hidden. See the Textbox /V flag.
You can specify the thickness of a legend symbol.
You can attach tags to images.
Igor's cursors are now much more capable. You can now have crosshair cursors instead of icon cursors, you can attach cursors to images and cursors can now be "free", meaning they are not constrained to be on an existing data point. Cursors can now read out date/time values. You can move two cursors at once by dragging if you press shift before clicking one of them. You can press shift-arrow-key to move cursors 10 times as fast using the arrow keys. See Cursors and Info Box.
You can create graphs containing arrows for each data point instead of markers. See ModifyGraph arrowMarker.
You can now exercise greater control over graphs containing multiple plot areas. See ModifyGraph axisClip.
More new ModifyGraph keywords: prescaleExp, tickExp, tickUnit & linTkLabel.
Added SETAXISFLAGS keyword to the information returned by AxisInfo.
The ReplaceWave operation can now be used to convert a trace from waveform to XY or XY to waveform.
Printing and exporting of images is much faster in most cases. See Printing and Export Changes for details.
On Windows, Igor now pays attention to the scaling control that appears in the properties dialog for some printers.
Igor can now print to large paper sizes that previously caused problems. This was an issue with HP DesignJet printers/plotters.
Table Improvements
You can display date data using a wide variety of date formats. Use the Table Date Format item in the Table menu.
You can display and edit elapsed time, fractional seconds and negative time in time-formatted columns.
You can view and edit dimension labels. Use the Append Columns To Table dialog.
You can display data in hexadecimal and octal
You can now cmd-click (Macintosh) or right-click (Windows) anywhere in a table column to get a popup menu. Before you had to click in the column name.
Page Layout Improvements
You can now select and operate on multiple objects in the layout layer.
The new Align submenu in the Layout menu allows you to align objects in the layout layer.
The new Make Same Width, Make Same Height, and Make Same Width and Height menu commands in the layout menu make it easier to format the page.
The new Make Plot Areas Uniform menu command in the Layout menu makes it much easier to stack graphs.
You can now tell Igor to print graphs in Layouts using a high-res bitmap rather than the usual object draw method. This is provided only for emergency use when a printer driver has bugs that affect normal operations. It may also be useful for printing graphs with very large numbers of data points. See Printing as Bitmaps in Chapter II-15 of the manual.
Added the LayoutInfo function for getting information about layouts from procedures. This is intended to allow a programmer to write a procedure that acts on all layout objects or just selected layout objects. GetWindow also returns information about the printable area of a page layout.
Added NewLayout, AppendLayoutObject, and RemoveLayoutObjects operations. You should use these instead of the old Layout, AppendToLayout, and RemoveFromLayout operations which can not be invoked from user functions.
The ModifyLayout and PrintLayout operations can now be invoked from user functions.
You can set a page layout to hide or be killed without a dialog. See Layout's /K option.
Notebook Improvements
You can do a find across multiple windows. See Finding Text In Multiple Windows in the online help.
You can export a notebook as an HTML file using the File->Save Notebook As menu command. See Exporting a Notebook as HTML in the online help.
The SaveNotebook operation allows you to export as RTF or HTML.
You can set a notebook to hide or be killed without a dialog. See NewNotebook's /K option.
You can retrieve information about a notebook using the WinRecreation function.
You can adopt a notebook using the Notebook operation.
Drawing Improvements
You can select drawing elements and controls simultaneously.
There is a Distribute command in the drawing tools palette.
Pressing the shift key while resizing can now constrain to rectangular rather than square.
Pressing the option or Alt key while resizing does a proportional resize.
Control Improvements
These new and improved features are for Igor programmers who create control panels.
The new TitleBox operation creates a static text readout with fancy text and optional hookup to a string variable.
The new Slider operation creates slider controls.
You can visually group controls using the new GroupBox operation.
You can create lists using the new ListBox operation.
You can create a tabbed control panel using the TabControl operation.
You can create a non-editable SetVariable control using SetVariable noedit.
You can associate a Checkbox with a global variable and checkboxes can now take on the appearance of radio buttons.
Several new keywords have been added to the ValDisplay control. You can change the style of the frame, set colors and can even make it look like an LED.
When creating or modifying a control panel, you can select multiple controls at one time and you can select drawing elements and controls simultaneously. You can cut, copy and paste selections of controls. (If you hold down the option/Alt key while copying a single control, you can paste the commands that recreate it into a procedure or notebook.)
You can disable or make invisible any control using the disable keyword.
You can create a PopupMenu control that displays colors or dashed-line styles.
You can get a list of controls in a window with the new ControlNameList function.
The new bodyWidth keyword can be used with SetVariable, PopupMenu and ValDisplay controls to make it easier to keep a set of controls aligned.
The default font for controls is now independent of the graph default font and some sizes have been reduced from 12 to 10 points.
On the Mac, some controls previously drawn with a white background color are now drawn with the window color. The default window color is now grey. To compensate for this non-backwards compatible change, a new keyword, labelBack, is now available in certain controls to allow explicit background colors.
You can prevent a panel or graph from being resized by the user with the ModifyPanel fixedSize=1 command.
You can constrain the size and shape of a panel or graph resized by the user with the new resize event passed to the window hook function. See the SetWindow operation.
Analysis Improvements
New Operations And Functions
Enhanced Operations And Functions
The resolution and accuracy of enoise and gnoise were improved.
EdgeStats, FindLevel, and FindLevels now return double-precision x locations.
Matrix Improvements
New Operations And Functions
MatrixDet (determinant)
Enhanced Operations And Functions
MatrixMultiply (supports complex math)
Curve Fitting Improvements
Completely revamped the Curve Fitting dialog, adding new functionality. Added a subdialog to assist in creating or editing user-defined functions. Curve Fitting dialog now handles multivariate fits, you can specify initial guesses inside the dialog, you can specify simple coefficient constraints in the dialog.
Added the following built-in curve fitting functions, which are accessible through the Curve Fitting dialog:
HillEquation, Sigmoid, Power, lognormal, Gauss2D, Poly2D
Auto-destination will now plot log-spaced X values if data is graphed on a log axis.
You can exclude points from the fit using a mask wave.
You can command Igor to calculate parameter confidence intervals.
You can hold parameters in line fits and in polynomial fits.
You can now specify your own coefficients wave with a built-in fit with kwCWave keyword.
Special comments in a user-defined fitting function allow you to associate mnemonic names with each fit coefficient.
Added the FitFunc procedure sub-type for user-defined fitting functions so that only actual fitting functions are listed in the function menu in the Curve Fitting dialog.
You can return all model values in one call to the user function using the all-at-once mode.
Image Processing Improvements
WaveMetrics has created an Image Processing Tutorial. The tutorial covers the basics of image processing and shows how to do image processing in Igor. See "Igor Pro Folder:Learning Aids:Tutorials:IP Tutorial".
New Operations
Enhanced Operations
3D Analysis Improvements
New Operations And Functions
Data Import And Export Improvements
The LoadWave operation supports "fixed-field" (FORTRAN-style) files.
The LoadWave /B flag allows you to specify wave names, data type, and other parameters on a column-by-column basis.
The LoadWave operation now accepts column labels that don't start with a letter.
LoadWave can now handle a wide variety of date formats
LoadWave now supports elapsed time, fractional seconds and negative time in time-formatted data
The new ImageLoad and ImageFileInfo operations handle various graphics file formats including GIF, JPEG and TIFF. Some of these formats require QuickTime 3.0 or later.
The new ImageSave operation saves waves in various graphics formats. ImageSave requires QuickTime 4.0 or later.
The Save operation can now save an unlimited number of waves using a single command.
The Macintosh-only SndLoadWave XOP adds the SndSaveAIFF operation and corresponding dialog.
Graphics Export Improvements
Added many graphics export formats (see SavePICT). Most of these require QuickTime 4.0 or later. QuickTime is available from http://www.apple.com/quicktime/. Be sure to do a full install (but the QuickTime Pro version is not necessary).
Miscellaneous Improvements
Internet support - write notebooks as HTML files, summon your web browser from a procedure (BrowseURL operation), do FTP transfers (FTPUpload and FPTDownload operations).
You can enter dates and times in the Change Wave Scaling dialog.
Igor's behavior is improved when data files, especially image files, are dropped on the Igor icon.
On Windows, added support for the mouse wheel in notebooks, procedure windows, command window, help windows and the help browser.
On Windows, Shift-Delete now does a cut, Ctrl-Insert now does a copy, and Shift-Insert now does a paste.
The Secs2Time function can handle elapsed times.
Holding down the option key (Macintosh) or Alt key (Windows) while Igor launches automatically opens the most recently opened experiment.
New And Improved Example Experiments
Check out these new and improved example experiments in your Igor Pro Folder.
Select the Load Examples item in the File menu to create a menu of example experiments. This provides easy access to the examples. This menu item is created using a mechanism similar to the Packages mechanism.
Igor Pro Folder:Learning Aids:Tutorials:IP Tutorial:
IP Tutorial
Igor Pro Folder:Learning Aids:Tutorials:
Data Folder Tutorial
User Fit Tutorial
Igor Pro Folder:Examples:Analysis:
Gaussian Filtering
Ave, Box Plot, Percentile
Igor Pro Folder:Examples:Curve Fitting:
Global Fit Demo
Igor Pro Folder:Examples:Example Igor Procedures:
XCEL Drag&Drop
Igor Pro Folder:Examples:Feature Demos:
Live Mode
Smoothing Control Panel
ValDisplay Demo
Web Page Demo
Igor Pro Folder:Examples:Graphing Techniques:
Arrow Plot
Colorize Traces Demo
Drawing Axes Demo
New Polar Graph Demo
Transform Axis Demo
Igor Pro Folder:Examples:Programming:
Load File Demo
gradient arrows
Igor Pro Folder:Examples:Sample Graphs:
Contour Demo
Igor Pro Folder:Examples:Testing & Misc:
ColorScale Demo
ListBox Demo
Map Projections Demo
MatrixOps Tests
Resize Panel and List Demo
Slider Labels
User Menu Tests
Igor Pro Folder:Examples:Visualization:
Surface Plotter Demo
New And Improved WaveMetrics Procedure Files
Here are the WaveMetrics procedure files added or enhanced in Igor Pro 4.
Igor Pro Folder:WaveMetrics Procedures:Analysis:
Global Fit.ipf
Log Histogram.ipf
ODE Panel.ipf
Smoothing Control Panel.ipf
Igor Pro Folder:WaveMetrics Procedures:Analysis:DSP
Cross Spectral Density.ipf
Igor Pro Folder:WaveMetrics Procedures:Graphing:
Polar Graphs.ipf
Igor Pro Folder:WaveMetrics Procedures:Image Processing:
All IP Procedures.ipf
Image Calibration Panels.ipf
Image Common.ipf
Image Contrast.ipf
Image Edge Panel.ipf
Image Grayscale Filters.ipf
Image Histogram Panel.ipf
Image Line Profile.ipf
Image Morphology Panel.ipf
Image Normalization.ipf
Image Particle Panel.ipf
Image Range Adjust.ipf
Image ROI.ipf
Image Rotate.ipf
Image Threshold Panel.ipf
Tiff Loader.ipf
Tiff Saver.ipf
Igor Pro Folder:WaveMetrics Procedures:Utilities:
Igor Pro Folder:WaveMetrics Procedures:Utilities:String Utilities:
File Name Utilities.ipf
Obsolete WaveMetrics Procedure Files
The following WaveMetrics Procedure Files are obsolete. The same functionality is now available either built-in or by a newer and better procedure file. The files are still provided for backwards compatibility.
Igor Pro Folder:WaveMetrics Procedures:Analysis:
WM_MDFitFunctions.ipf. These functions are now available as built-in curve fitting functions.
Curve Fit Control.ipf. Most of the functionality has been incorporated into the Curve Fitting dialog.
RemoveAfterFit.ipf. This functionality is automatic.
Igor Pro Folder:WaveMetrics Procedures:Graphing:
Drawing Axes.ipf. New TransformAxis.ipf procedure file does the same thing in a new and better way.
Probability Graph.ipf. New ProcessProbabilityData.ipf file does the same thing using the new TransformAxis.ipf file.
Igor Pro Folder:WaveMetrics Procedures:Image and Contour Plots:
Path Profile.ipf. The same thing and more is done by the built-in ImageLineProfile operation.
Obsolete WaveMetrics XOP Files
The following WaveMetrics Procedure Files are obsolete. The same functionality is now available either built-in operations and functions. The XOPs are still provided for backwards compatibility.
Igor Pro Folder:Igor Extensions:TiffReader
Igor Pro Folder:Igor Extensions:ImageReader. Now replaced by the built-in operation ImageLoad.
Igor Pro Folder:Igor Extensions:ImageWriter. Now replaced by the built-in operation ImageSave.
Igor Pro Folder:Igor Extensions:MDInterpolator. Now replaced by the pair of operations Interp3dPath and ImageInterpolate.
Programming Improvements
Extensive changes have been made to Igor's programming environment but the biggest change is the one that is the least visible. Igor's procedure window compiler was changed to use separate compile and link stages. The upshot is that only those procedure windows that have been changed need to be recompiled, resulting in much faster program development.
As of Igor Pro 4, we now suggest that all programming be done with functions and that macros and procs not be used. Prior to version 4, you had to use a macro in order to get the missing parameter dialog. But now you can do the same thing from functions using the DoPrompt statement. See The Simple Input Dialog in the online help for details.
You'll love the new symbolic debugger.
Ambitious programmers swamped by a huge number of user-defined functions or procedure files should try the Procedure Browser (implemented using still more user-defined functions!).
New flow control structures:
elseif (See Body Code)
For Loop
Switch Statements
Previous versions of Igor did not check for junk after a flow control test. For example, Igor would not complain if you wrote:
if (<text>) <junk>
Igor now detects this and brings it to your attention.
For years, we have warned Igor programmers to stop using | as a comment symbol. We hope you have heeded these warnings because....
....Igor now uses the following C-like symbols:
// Starts a comment
&& Logical AND
|| Logical OR
& Bitwise AND
| Bitwise OR
~ Bitwise complement
? : Conditional construct
If you still have procedure files that you wrote using | for comments, change them to use // instead. You don't need to do this immediately, as explained next. However, you should do it without undue delay.
Because previous versions of Igor accepted | or || as the start of a comment, experiments not created by Igor Pro 4 are opened in compatibility mode. In this mode, | still starts a comment. If you want to use the new symbols in old experiments, you have to explicitly tell Igor to switch out of compatibility mode. See the "Note for Users of Igor Legacy Code" under Command Line Operations in the online help.
The previous symbols for bitwise AND, OR and complement (%&, %| and %~) are still available, but new programming should use &, | and ~.
Previously, when a complex wave was used in a real number context, Igor would silently throw away the imaginary part. Now a runtime error is reported.
You can send results in one function back to the calling function using Pass-By-Reference.
You can pass a reference to a function to another function.
A programmer can define constants for use within procedure files.
You can now create functions that are private to a given procedure file.
It is possible to override a user function with another user function.
#pragma IgorVersion can be used to prevent use of a procedure file with a version of Igor that is too old.
The WAVE, NVAR, and SVAR keywords can take an abbreviated format. For example:
WAVE wave0
is equivalent to
WAVE wave0=wave0
The new /Z option to WAVE, NVAR, and SVAR defeats the new debugger's NVAR SVAR WAVE Checking feature, which normally drops into the debugger when a null NVAR, SVAR, or WAVE reference is created. You can/should use WAVE/Z if you subsequently check the reference yourself with WaveExists or the new NVAR_Exists, and SVAR_Exists functions.
The NVAR_Exists and SVAR_Exists functions tell you if an NVAR or SVAR references an existing global variable.
You can save an experiment from a procedure. See the SaveExperiment operation.
The new sscanf operation makes parsing strings easier. It works in user functions only.
Text in procedure windows is displayed with syntax coloring.
The Edit menu contains commands for commentizing and decommentizing procedure text as well as for adjusting indentation.
You can insert a template for a user-defined function by typing or selecting the function name and pressing shift-help (Macintosh) or Ctrl-F1 (Windows).
The contextual menu (cmd-click on Macintosh, right-click on Windows) in procedure, notebook and help windows includes items that allow you to insert a template, find help for the selected term, or find the definition of the selected user function.
You can jump to the definition of a user-defined function by typing or selecting the function name and pressing shift-option-help (Macintosh) or Ctrl-Alt-F1 (Windows).
For a complete list of procedure window shortcuts, see Procedure Window Shortcuts in the online help.
You can now add items to the Help menu using a Menu declaration in the Procedure window. For unknown reasons, submenus added to the Help menu on Macintosh do not work.
When you do a New Experiment or an Open Experiment and elect to not save the current experiment, Igor now prompts to ask if you want to save standalone procedure files that would previously have been closed without saving
A help file can contain a link to a web page or FTP site. See Creating Links in Chapter II-1 of the manual.
The DisplayHelpTopic operation allows procedures to display help topics.
The GetWindow operation returns more information about windows.
The BackgroundInfo operation returns more information about the background task.
New keywords, dialogOK and noBurst, have been added to CtrlBackground.
The ControlInfo operation returns more information about controls.
The ControlUpdate operation causes the named control to "take" any value currently being edited.
The new FastOp operation can be used to get improved speed out of certain wave assignment statements. This makes the FastWaveOps XOP obsolete.
The SetIgorOption operation allows you to fine-tune various Igor behaviors.
The NewPath operation now sets V_flag to zero if it succeeded or to non-zero if it failed.
Operations that create windows (Display, NewImage, Edit, NewLayout, NewPanel, NewNotebook, OpenNotebook) take a /K flag that allows you to determine what happens when the user clicks the window's close box.
The following operations now take a /W flag which tells them to operate on a specific window.
AppendText, ReplaceText, TextBox, Tag, Legend
AppendToGraph, ModifyGraph, RemoveFromGraph, Label
AppendMatrixContour, AppendXYZContour, ModifyContour, RemoveContour
AppendImage, RemoveImage
GetAxis, SetAxis, ErrorBars, ReorderTraces
GraphNormal, GraphWaveDraw, GraphWaveEdit
Cursor, HideInfo, ShowInfo, HideTools, ShowTools
DrawLine, DrawOval, DrawRect, DrawRRect, DrawText, DrawPICT, DrawPoly
SetDrawEnv, SetDrawLayer
NewNotebook, OpenNotebook
The Execute/P operation allows an advanced programmer to post commands to be executed after procedure execution finishes. This can be used to load or unload packages of procedures. See Operation Queue in the online help.
The PauseForUser operation allows an advanced programmer to suspend execution of a function to allow the user to make manual changes. See Pause for User in the online help.
Advanced programmers can hide procedure files from novice users. See Invisible Procedure Files in Chapter II-23 of the manual.
New Operations And Functions
Here are the built-in operations and functions added in Igor Pro 4.
New Graph Operations And Functions
New Layout Operations And Functions
New Control Panel Operations And Functions
New Programming Operations And Functions
New Analysis Operations And Functions
New Matrix Operations And Functions
New Image Processing Operations And Functions
New 3D Analysis Operations And Functions
Printing and Export Changes
You do not need to read this section unless you encounter problems with printing and exporting.
Mac and Win: Image printing and export
An attempt has been made to improve the speed of image printing and exporting in certain modes. This improvement is active only when the image is evenly spaced (no log axes or user supplied x or y waves) and only when the image is free of holes (usually caused by NaN in floating point data). A side effect of the new technique is that the quality of the image color or gray scale now depends on the current screen depth. Igor's native EPS export is not affected (yet). The export modes that are affected (improved) are PICT on Mac and emf on Win.
If you encounter problems, you can cause Igor to revert to the old method like so (on the command line):
Variable/G root:V_UseOldImageCode= 1
Be sure to let us know if you need to revert to the old method.
During testing, a quirk of the Epson Stylus Photo was encountered. It appears that if the only use of color or grayscale on a page is in the interior (not periphery) of an image, then the whole page will be printed in black and white (not even grayscale).
NOTE: if you do not get fast image printing and think you should, try setting the following option to cause information about the drawing (or printing) of an image to be sent to the history window. As long as the option is in effect, the info will be printed each time an image is updated, exported or printed.
SetIgorOption imagedraw,bmdata=<1 or 0>// puts info in history about image draw using bitblit of data method
Mac and Win: PageLayout printing using bitmaps
You can now tell Igor to print graphs in Layouts using a high-res bitmap rather than the usual object draw method. This is provided only for emergency use when a printer driver has bugs that affect normal operations. It may also be useful for printing graphs with very large numbers of data points. There are drawbacks to the bitmap method. A large amount of memory will be needed and on the Mac, patterns will be too small to be useful. Also, the quality of lines (especially dashed lines) may be inferior.
To cause Igor to print graphs in Layouts using the bitmap method, execute the following on the command line:
Variable/G root:V_PrintUsingBitmap= 1
Windows only: Printing and exporting
An attempt has been made to use printing and exporting methods resembling those of MS Word97 in hopes of improving Igor's compatibility with printers (especially fill patterns under Win95/98). The compatibility of EMF export to MS apps should be improved but we were not able to figure out what to feed MS Word97 so that emfs with filled shapes could be edited in Word.
If you run into problems that you think may be caused by these changes, you may revert to the original Igor method like so:
SetIgorOption WinDraw,UseWord97Fill=0 // turn off new method of pattern fill
SetIgorOption WinDraw,UsePrinterRes=0 // Turn off use of printer resolution in emf export
SetIgorOption WinDraw,UsePrinterDC=0 // Turn off use of printer as reference device in emf export
Note 1: setting UsePrinterDC to zero also turns off UsePrinterRes.
Note 2: UsePrinterRes only affects graphs.
|
global_05_local_4_shard_00000656_processed.jsonl/113895
|
I'm new to JavaScript and hope somebody can help me with the following.
I'd like to create some tabs with one active tab. Now the problem is I don't want to load all tabs at once, but only load the content of the active tab, the first tab by default and the content of the other tabs stored in a database.
I thought this would be possible with JavaScript and/or Ajax (however I'm new to this matter) but I only can find tutorials where all content of all tabs is loaded at once like the following:
I hope somebody understand what I mean and can help me with this.
Thanks in advance!
|
global_05_local_4_shard_00000656_processed.jsonl/113902
|
Daily Ubuntu / Linux news and application reviews.
When you want to compile something from source in Ubuntu/Debian, the easiest way to install the dependencies required to compile it is to run (sudo) "apt-get build-dep PACKAGE_NAME". But there is no built-in command to remove these dependencies (like apt-get remove-dep).
But thanks to tvst and Wesley Schwengle, you can undo "apt-get build-dep" by running the following command (firstly install aptitude using "sudo apt-get install aptitude"):
sudo aptitude markauto $(apt-cache showsrc PACKAGE_NAME | sed -e '/Build-Depends/!d;s/Build-Depends: \|,\|([^)]*),*\|\[[^]]*\]//g')
sudo apt-get autoremove
In the above command, replace "PACKAGE_NAME" with the name of the package you've previously ran "apt-get build-dep" for. Running "sudo apt-get autoremove" should then remove all the packages that are build dependencies for PACKAGE_NAME and thus, were installed by the "apt-get build-dep" command.
Update: there are issues with this command and some packages. For instance, trying to undo "apt-get build-dep" for Wine results in marking a huge number of packages as automatically installed. If that happens, running "sudo apt-get install PACKAGES-MARKED-AS-AUTOMATICALLY-INSTALLED" marks the packages as installed so they won't be removed, undoing the command above. So use this with care and only if you know what you're doing!
In case you're wondering what the above command does:
• aptitude auto - Mark packages as having been automatically installed (so if no package depends on them, they will be removed)
• apt-cache showsrc - Show source records
• sed ....: - searches for "Build-Depends:" in the source records and removes useless stuff from the package names (extra characters like parentheses and so on are removed from the output).
To use it as an alias in your ~/.bashrc file, see wilo108's comment below.
Credits for the command: tvst and Wesley Schwengle @ Launchpad.
Newer Post
Older Post
|
global_05_local_4_shard_00000656_processed.jsonl/113953
|
An Enemy of the People
Plough Arts Centre
9-11 Fore Street, Great Torrington, Devon EX38 8HQ
Click for map and directions
Dr Stockmann attempts to expose a water pollution scandal in his home town - about to set itself up as a spa - but his brother conspires with newspapers and politicians to suppress the story. When Stockmann tries to put over his story at a public meeting he is reviled as an `enemy of the people'.
An interactive adaptation of An Enemy of the People created by innovative director Rebecca Manson Jones, where the audience will choose the ending. Ibsen?s classic, famed for its final meeting scene of community debate and discord, 'the Majority is always wrong', will be reinterpreted with a female Dr Stockmann (played by Malin).
|
global_05_local_4_shard_00000656_processed.jsonl/113956
|
Monday, February 14, 2011
From the vault: My black history--70% African, 30% European: Who am I now?
I have spent a lot of time over the past few days ruminating on racial identity. My thoughts were sparked by a confluence of events: Last week, PBS aired the final episode of Dr. Henry Louis Gates' "Faces of America"--the one where participants including comedian Stephen Colbert, cellist Yo-Yo Ma and poet Elizabeth Alexander learned the results of autosomal DNA tests designed to uncover their "racial" lineage. I received a link to a study being conducted by the University of British Columbia, seeking to determine if and how similar DNA tests have influenced participants' identities. And I also received the results of my own autosomal test--the most recent of several DNA tests I have taken to help further my family history research, pinpoint my African origins and shed more light on my lineage. So, I have been wondering:
Can getting a piece of paper in the mail that says 20 percent this and 30 percent that and 50 percent the other change the way we see ourselves? Should it?
What does it mean for someone who identifies as culturally mono-racial to discover they are, in fact, genetically multi-racial?
What does it mean for a person of color in America to discover that they are genetically more white than anything else?
What are African Americans to feel about those white ancestors who are on our family trees because of the sexual violence regularly committed against our enslaved foremothers?
Should finding out that one is, for instance, of 50 percent English ancestry, lead a person of color to embrace that culture despite how that DNA came to be a part of her? What about Native American or Asian ancestry?
What is autosomal DNA testing and who cares how not-black you are?
I first became aware of tests that could determine a person's admixture or "racial" makeup when PBS aired the first of Dr. Gates' genealogy programs, "African American Lives." That show, which ignited my interest in family history research, also caused a buzz by revealing that the host, a self-identified black man and head of Harvard's W.E.B. DuBois Institute for African and African American Research, was genetically of more than 50 percent European in ancestry--in other words, more "white" than "black," despite being the progeny of two self-identified African American people. Of course, Gates' heritage was really no surprise for most other black Americans. We know that the black descendants of enslaved Africans are a mixed bunch. You can see it in our family portraits. You can hear it in our family stories. It is there on the vital records that black family historians mine for details about their heritage. There is no need for an expensive test to tell us what we already know. But genealogists are like good detectives. If we want to accurately tell our families' stories, we need to back up family lore with documents and DNA--just like the folks on CSI. Autosomal tests help confirm and illuminate our lineages.
Actually, these tests help confirm our BioGeographical Ancestry (BGA), according to Ancestry by DNA, the company that completed my testing. They are quick to point out that race, as we often hear, is a social construct not a biological one. (That is why I am using scare quotes around racial designations in this post.) Ancestry by DNA describes their process as follows:
What is BioGeographical Ancestry (BGA)?
BioGeographical Ancestry (BGA) is the term given to the biological or genetic component of race. BGA is a simple and objective description of the Ancestral origins of a person, in terms of the major population groups. (e.g. Indigenous American, East Asian, European, sub-Saharan African, etc.). BGA estimates are able to represent the mixed nature of many people and populations today. In the US, as in many other countries across the globe, there has been extensive mixing among populations that had initially been separate. In the fields of human genetics and anthropology, this mixing is referred to as admixture. BGA estimates can also be understood as individual admixture proportions, which take the form of a series of percentages that add to 100%. For example, a person in question may be found to have: 75% European; 15% African; 10% Indigenous American ancestry, or they may be found to have 100% European ancestry.
How is BioGeographical Ancestry estimated?
But the question for some isn't how does autosomal testing work, but why any self-respecting black person would be interested in exploring their non-African heritage. As a poster named Original Man on the African Ancestry forum offered, regarding black people who claim Native American heritage:
Be African and stop trying to be something that you are not!
There is a suspicion that too much attention to non-African ancestry denotes a desire to escape blackness, to be more than (i.e. better than) "just" black. This racial testing could simply be a corollary to "we got Indian in the family" type thinking.
In various genealogy and DNA testing forums, I have witnessed discussions that went like so: If we live in a majority white society that has decided one drop of African blood equals blackness; if we outwardly "look black;" if we are proud of our African roots, as we should be; if we know that we are descendants of enslaved Africans and we are culturally African American, what can be gained by learning about some small fraction of European or Asian or Native American DNA? What does it matter?
Related Posts Plugin for WordPress, Blogger...
|
global_05_local_4_shard_00000656_processed.jsonl/113977
|
Edit Article
Edited by Matt Sieberg, Maluniu, Maniac, Teresa and 8 others
Are your 18 inch dolls just thrown in your closet? Give them a room! They need their space too, you know. This works for all 18 inch dolls like American Girl Doll, Madame Alexander, Springfield Collection, Gotz, etc.
1. 1
Find an area! Use your closet (the floor), the attic, the corner in a spare room, your cellar, your basement, etc.
2. 2
Give her a bed! If you don't know how to, here is how: Take a skinny 18 inch box and put spare blankets in it, as well as some small pillows and maybe a doll and some stuffed animals. Or, get your parent to make a bed out of wood. Or, just simply buy a bed. If you don't now where to get one, go to Target or Wal-Mart or online on AmericanGirlDoll.com or Ebay.
3. 3
Give her a night stand! Take a small box like a IPod speaker box and put a 11-13 inch blanket, maybe even put a wrap on the box. Decorate it: put a picture of her, a drink, magazine, a phone/iPod/MP3 player.
4. 4
Give her a rug! Put in front of her bed. Maybe put some slippers on it.
5. 5
Decorate her wall.
Add your own method
Article Info
Categories: Doll Houses
Recent edits by: Jordan, Anugal, Rock20000
Was this article accurate?
an Author!
Write an Article
|
global_05_local_4_shard_00000656_processed.jsonl/114005
|
MapnificentStefan Wehrmeyer
You must know what it's like. After a while on the internet, you think you've seen every map mashup that's possible. But then one comes along that blows you away, all over again. This is that map mashup.
It's called Mapnificent, and it displays mobility and access for a given point in more than 20 cities, including San Francisco, New York, London (using TfL's APIs), and Berlin. What does that mean? It means that you can select a point and see instantly how far you can realistically expect to travel on public transport in a given timeframe.
It means that you can pick two points -- one location for you and another for a friend -- and see the optimum place for you both to meet to minimise the time you both have to travel. It means you can view heatmaps of how easy it is to travel from any given location. It even allows you to find local businesses located a given time distance away from you, or from you and a friend.
Terra Curtis from Living Labs says: "Mobility and access are two important facets of a transportation system. Mobility essentially measures the speed with which one can travel from one point to another; access measures how many destinations are located nearby or within a given travel time. New York City has low mobility (for automobiles) but high accessibility; rural areas have high mobility but low accessibility." Curtis added: "What I like most about Mapnificent is its demonstration of both concepts together."
If you want to give it a try, head on over to, and then select a city that you'd like to view. During our testing it was a little on the slow side, but perfectly usable. Give it a shot.
Thanks to Juliana for the tip.
1. It would be magnificent if you could set settings as only buses or only walking, etc.
Nov 24th 2010
1. In reply to Miguel
Considering this is a beta version, I'd bet you'll get your wish in the future
Nov 24th 2010
2. Looks like Mapumental -- which is great, but *still* in private beta -- with some added tweaks.
Lorenzo Wood
Nov 24th 2010
Reply to a comment
Submit »
Latest on
|
global_05_local_4_shard_00000656_processed.jsonl/114014
|
Article Header Image
Rule-of-Three: 03/06/2012
Rodney Thompson
1 What kind of steps are you guys taking to make sure we don't see a big difference in complexity between classes like the fighter and the wizard, and what are you doing to avoid the linear fighter/quadratic wizard issue?
One of the challenges when talking about these kinds of issues is terminology, and the tendency for concepts to get lumped in with one another when they can be quite separate issues. Complexity is a separate issue than power; I can design an incredibly complex class that isn't very powerful, and some very simple things that are extremely powerful. Take a look at feats in 4th Edition; the original Weapon Expertise feat is an incredibly simple feat, yet many people would argue that it is one of the most powerful feats because it provides a raw numerical upgrade to accuracy that is not contingent on meeting certain conditions, and that cascades throughout the entirety of the attack system. Additionally, there is a difference between symmetry and parity. When looking to design two classes, I may want to make sure that there is parity between the options available to each class, without needing to be symmetrical and give them the exact same kinds of options in the same frequency. Parity and symmetry can be applied to both power and complexity, making these two axes of design. Personally, my experience with games (both RPGs and board games) is that symmetry is not essential for parity, and in many cases the game can often be made more exciting by asymmetrical mechanics.
The linear fighter/quadratic wizard phrase, for those of you unfamiliar with it, refers to an environment where the fighter progresses at a steady pace, with its output increasing by a relatively set amount at each level. The quadratic wizard, on the other hand, gains output increases both from additional spells (more spells = more output) but also from those spells dealing more damage and having more powerful effects (turning people to stone, instant death, etc.). Thus, the wizard eventually outstrips the fighter in output thanks to an ever-increasing series of gains over many levels.
To address the first part of the question, I think it's OK for it to be possible to have a big difference in complexity between the fighter and the wizard, if that is what the player wants. What is important is that if the player chooses this path, we want to ensure that there remains parity in his effectiveness despite the difference in complexity. We've already shown how this is possible with the slayer fighter from Essentials; complexity of options is lower with the slayer, but the slayer can still retain parity of effectiveness with the other classes. I've said it before, but one of the best things we gained from the design and development of 4th Edition is a handle on how to examine the math behind a character's effectiveness, and there are even more steps we can take to accurately gauge a character's capabilities given the last five years of experience working on that game. Whether a player chooses to play a complex character or a simple character, making sure that character has parity with the effectiveness of the other members of the party should always be a goal.
When we look at providing options for character building, however, symmetry does not need to be a goal. The goal should be to provide a satisfying experience that does what the players want. Take, for example, the fighter. In a previous column, I mentioned that the fighter could serve the need for a low complexity class, and also have options to serve the needs of those who want a high complexity class. It is important when examining ways to build in that complexity that we focus not on symmetry, but on the needs of the player who plays the more complex character. I would argue that what the player looking to play a complex fighter needs (in broad, generalized terms; I full well realize that every single player's needs are different) includes things like having multiple options for things to do on their turn, have some expendable resources, have the ability to expend those resources for great effect, and have some ability to customize a fighting style to match their vision of the character. (Note that I chose to focus on combat here, but the same points can apply to exploration and interaction). Those goals can then be married with story goals, and verisimilitude needs, and a host of other goals to, hopefully, produce the fighter that meets the players' needs.
There is a challenge in making sure that higher-level non-spellcasters have a good variety of unique, and compelling options available to them (if the wizard can fly, teleport, and travel the planes, what does the rogue do?), but that's something we solve by making available those creative options; again, parity of compelling options, not symmetry of mechanics. I think we see some great examples of compelling mechanics for non-spellcasters at higher levels in 4E, especially in epic destinies. Take the Thief of Legend's ability to steal intangible things, or to basically be so good of a thief that he can steal something and have it appear in a place of his choosing.
2 I was wondering about some of the more dreaded monster abilities that made some previous edition monsters scary. Are you guys looking at the return of things like level drain, instant death effects, harmful polymorph spells or abilities, etc?
In general, I think that monsters should do what fans of D&D lore expect them to do, and if that means being really scary mechanically then so be it. I think there's room in the game for monsters that simply are more dangerous and deadly than others, just as I think there's room in the game for monsters whose purpose is to be interacted with, not fought. I also think it's good for monsters to exist that you don't want to face in a straight-up fight, but that you need to be prepared for or figure out a clever way to outwit rather than going in spells a-blazin'. There needs to be an element of danger in the world in order for the game to feel exciting, and unpredictability is important for sustaining engagement.
We have some game tech developed for 4E that helps a lot here; for example, rather than being petrified instantly, we might use the method that requires you to fail two saving throws before becoming petrified, allowing the player (and his or her allies) to try and intervene in the process. And we may look at something like level drain and say, "Here's a mechanic that is both scary, and causes some game play issues," and then try and find a new solution that retains its sense of danger without using the exact same mechanics.
The other important element when dealing with monsters that have scary abilities is education. We need to be able to communicate to the DM when a particular monster is suitable for a straight-up fight, and when it should be used more carefully. For example, if a medusa can instantly turn you to stone, that's fine, provided that the DM knows that a medusa shouldn't be just casually tossed into an adventure without first dropping hints to the players (allowing them to be prepared for the medusa when encountered) or being aware of the consequences of using a monster that instantly petrifies foes.
3 It was mentioned in the recent Legends and Lore that Vancian magic rewards smart play for wizards. What kinds of things are you working on to reward smart play for fighters? For other classes?
I prefer not to use the term "smart play," because even if I decide I don't want to carefully mete out my resources doesn't mean I'm not playing smart—it just means I am not as interested in the game-centric aspects of D&D. To address the question of what we're going to do to engage players of other classes looking for a more strategic play experience, it's going to depend on the class, truthfully, and the play style of the character. For example, the fighter might be concerned with things like the preservation of hit points, which not only includes making strategic choices at character creation, but also might involve managing a pool of self-healing resources, or using defense-based options to mitigate damage while still occupying an enemy's attention (thus also mitigating the damage that enemy could do to the fighter's allies). The rogue might be more concerned with the management of risks, moving into a dangerous fray to fell a dangerous foe vs. sitting back and playing it safe, but not dropping an enemy as quickly. However, those need to be meaningful decisions; if it's always simply the right thing to do, there's no real reward for thinking strategically or tactically.
Resource expenditure is not the only source of fulfilling tactical and strategic play, but it is a perfectly valid one. Just as valid are things like target selection, knowing when to take risks, choosing the right tool for the job, knowing how to mitigate randomness, having backups ready in case of failure, and balancing a trade-off between accuracy, damage, and defenses. Moreover, it's a perfectly valid choice to decide that one wants to eschew all of that and focus more on the narrative of the character. This touches again on the symmetry issue from the first question: giving a class a fulfilling strategic or tactical play option is not about mirroring the options of other classes, but creating a satisfying experience for that class. Who is the ultimate judge of what is satisfying? Well, you are, which is why we want to use the playtesting process to make sure we are achieving that goal.
|
global_05_local_4_shard_00000656_processed.jsonl/114029
|
Dossier 17: Cultures and Religions in Senegal
Publication Author:
Aminata Sow Fall
September 1997
Прикрепленный файлРазмер
Word Document81.65 кб
number of pages:
Soon after the introduction of Islam to Senegal, Muslims organized into Confreries*. This meant that the first religious leaders taught Islam according to the tradition of their spiritual leaders. This is why one finds in Senegal three major Confreries. The first are the Tidjanes, who are inspired by the doctrine of Cheikh Ahmed Tidjani from Algeria. The second are the Khadria, who teach the doctrine of Abdel Kadr Al Djinani who died in Baghdad in 116 of the Christian era. The heart of this Confrerie, in West Africa, is in Mauritania but it is most active in Senegal. The third Confrerie, developed during the last century, is Mouridism founded by Cheikh Ahmadoou Bamba. It is unique in that he never pledged allegiance to any Arab leaders and founded a doctrine based on obedience to the Prophet and the work ethic.
These Confreries proliferated deep inside the country, reaching the peasantry. They made adepts and became pressure groups with whom the colonial authorities had to cooperate after having first battled with them.
While Islam was introduced without really upsetting local cultures, Christianity was more aggressive for in many instances missionaries destroyed objects used in traditional cult rituals. Moreover, Christianisation was a political means of assimilation, at various levels: clothing, culture, spirituality. Christians had to adopt the same attitudes as the Western world. Even traditional first names were sacrificed, although in some ethnic groups the first names were a means of identification of the individual within his/her family and clan. Among Muslim, too, first names of Arab origin were progressively imposed over time, but this was not compulsory, and one often found parents naming their child after the first name of a Christian friend or relative: for instance Mary, John, etc…
In fact, missionaries were never able to strip away the cultural roots from the Christians, for those constituted an intimate part of their identity. Nor were the Muslim fundamentalists able to do this. In fact, all Senegalese, irrespective of their religion, are soaked in their cultures. At the spiritual level, one witnesses a sort of religious syncretism, where on the surface, religion is Islam or Christianity, but where the ancestral beliefs are lived daily and determine the behaviour of people. There are still Muslim and Christian families which offer a bowl of water to someone who died, somewhere in the middle of the night.
Cultural practices can be a balancing factor and attenuate the pressure from the fundamentalists. Tolerance has always been the rule between the different religions; some years ago, there was a difficult case when Christians wanted to build a church at Tivaouane, the fief of the Tidjanes who opposed it. The two Muslim and Christian leaders mediated with their troops.
It is also culture which renders Muslim women so visible. But until when? The question can be raised when one knows that some fundamentalist groups are on the rise and convince women who, themselves, preach fundamentalism right up to the schools. This, however, is an epiphenomenum, but the fragile nature of our world should incite us to vigilance, particularly in wake of the power of organised groups to manoeuvre and mobilise in more and more sectarian ways. I am, however, optimistic because I believe in human intelligence.
My optimism is confronted by the fact that, beyond religions, the communities agree on the same values: respect of the human person, moral austerity, ethic of work, sense of honour and dignity, respect of culture and traditions. Regarding this last point there are many conflicts related to new economic factors, technology and communications. But there is one constant element in Senegal that any observer can remark: no religion, no group preaches hatred, exclusion, or djihad against other groups.
Editors note: Confrerie is used here to denote a group of faithful to the teachings of a spiritual leader.
|
global_05_local_4_shard_00000656_processed.jsonl/114034
|
News and Talk
FM Schedule |
Classical Music
Classical Schedule |
Close Listen Live Area
Dragon Docks with Space Station
[Photo credit: SpaceX/NASA]
[Photo credit: SpaceX/NASA]
The Dragon space capsule, launched from Cape Canaveral by the private company SpaceX, is safely attached to the International Space Station.
Dragon was grappled with a robotic arm and secured to the space station on Wednesday morning.
Astronauts will unload nearly 1000 pounds of equipment from the spacecraft and fill it with hardware and scientific experiments from the ISS before it returns to earth on October 28th.
The spacecraft launched from Cape Canaveral Sunday night and made it into orbit even though one of the nine engines on the Falcon 9 rocket failed and had to be shut down.
The engine failure interfered with the deployment of a secondary payload, a private communications satellite. The orbcomm satellite had to be put into a lower orbit than planned so as not to compromise the safety of the NASA mission.
SpaceX says its still reviewing flight data along with NASA to find out what went wrong.
"We have achieved our goal of repeatedly getting into orbit by creating a careful, methodical and pragmatic approach to the design, testing and launch of our space vehicles," the company said in a statement Wednesday.
"We will approach our analysis in the same manner, with a careful examination of what went wrong and how to best address it."
The flight to the ISS is the first of 12 resupply missions under a $1.6 billion contract SpaceX has with NASA.
All active news articles
|
global_05_local_4_shard_00000656_processed.jsonl/114056
|
Skip to definition.
Noun: faquir fu'keer or fa'keer
1. A Muslim or Hindu mendicant monk who is regarded as a holy man
- fakir, fakeer, faqir
Derived forms: faquirs
Type of: angel, holy man, holy person, Moslem, Muslim, saint
|
global_05_local_4_shard_00000656_processed.jsonl/114057
|
Skip to definition.
Noun: honours list
Usage: Brit, Cdn
1. A list issued by examiners that categorizes students according to the class of honours they achieved in their degree examinations
- class list [Brit]
Type of: list, listing
Encyclopedia: Honours list
|
global_05_local_4_shard_00000656_processed.jsonl/114058
|
Skip to definition.
Noun: USS Cole
1. A United States destroyer
"17 sailors died as the result of a terrorist attack while the USS Cole was anchored in Aden"
Type of: destroyer, guided missile destroyer
Encyclopedia: USS Cole
|
global_05_local_4_shard_00000656_processed.jsonl/114074
|
Crown of the Forlorn Vanquisher
101,313pages on
this wiki
Revision as of 23:21, February 16, 2011 by Servian (Talk | contribs)
Inv helmet 24
Source Edit
You can purchase this from Official alliance mini-icon Faldren Tillsdale in Stormwind City or Official horde mini-icon Jamus'Vaz in Orgrimmar for 1x [Essence of the Forlorn]
Currency for Edit
Patches and hotfixes Edit
External links Edit
Around Wikia's network
Random Wiki
|
global_05_local_4_shard_00000656_processed.jsonl/114127
|
XLR8R - logo
Mark Bell Feat. Blakkat Revolution (Rae and Christian Rmx)
I just sort of came across this and know little about it. A scatty guitar starts the proceedings before a huge funky bass enters the fray. Wailed female vocals and more vocals way back in the mix complete a deceptively dancefloor-friendly release.
Follow us on...
Get the lowdown weekly newsletter
XLR8R Downloads Player
|
global_05_local_4_shard_00000656_processed.jsonl/114128
|
Introverted activist with a flair for agitation, Quiara can most often be found sporting yoga pants and improbable eyeshadow. She writes about the weird things that cross her mind or the things that make her cross; either way, she tends to write a lot. She's an incorrigible smartass and general heathen, but mostly goodhearted, especially when medicated. In lieu of flowers, always send vodka.
|
global_05_local_4_shard_00000656_processed.jsonl/114135
|
Energy in Kicks
Energy in Kicks
Postby Audi » Sun Mar 18, 2001 1:05 am
When we straighten the leg to stand up for a kick, should any of the momentum be used in the energy of the kick? When I have seen instructors perform kicks quickly, it seems as if the kick rises from the ground. However, when the form is performed slowly, it looks as if the kick is not initiated until the leg fully straightens.
Also, is there any waist energy used in the heel kicks?
Posts: 1130
Joined: Sat Jan 27, 2001 7:01 am
Location: New Jersey, USA
Return to Tai Chi Chuan - Barehand Form
Who is online
Users browsing this forum: No registered users and 1 guest
|
global_05_local_4_shard_00000656_processed.jsonl/114149
|
Ukrainian protesters end occupation of City Hall - Israel News, Ynetnews
Israel News
Israel News
World News
Israel Opinion
Israel Business
Israel Culture
Israel Travel
Breaking News
Ukrainian protesters end occupation of City Hall
Published: 02.16.14, 22:40 / Israel News
But tensions remained high as hundreds stayed outside the building, vowing to retake it if the government failed to drop all charges against the protesters. Late that night, after a meeting with opposition leaders, Prosecutor General Viktor Pshonka said the criminal cases would be closed Monday. (AP)
PrintPrint Send to friendSend to friend
Tag with Bookmark to
Site developed by YIT Advanced Technology Solutions
פיקוד העורף התרעה במרחב:
רשימת יישובים במרחב
|
global_05_local_4_shard_00000656_processed.jsonl/114158
|
API Trina Landlord and Joel Isaac
by Your Alaska Link News Team
Joel Isaac, Alaska Native artist, teacher and fashion designer along with Trina Landlord from the Alaska Native Arts Foundation, talk salmon skin wearable art and how Alaska couture is going to take New York by storm with the new "Water Collection".
Add a comment
Comment: 1000 Characters Left
|
global_05_local_4_shard_00000656_processed.jsonl/114168
|
'Basketball Wives' Royce Reed: 'I was selling my soul' on the show
royce-reed-basketball-wives-VH1-selling-her-soul.jpgRoyce Reed, the former girlfriend of NBA player Dwight Howard who starred on VH1's "Basketball Wives" for its first four seasons, has spoken candidly about her time on the show in a recent interview with the network, talking about how she felt hypocritical advsising the young girls in her dance company, Fantashique, on how to conduct themselves when she was being paid to fight on TV.
"[Being on the show], I felt like I was being a hypocrite, because I'm on a show where there's like, constant fighting, and yet I'm sitting here trying to voice something different [to the girls]," says Reed. "As much as I enjoyed the checks, it wasn't worth contradicting myself and doing something I didn't really believe in. I felt kinda like I was selling my soul. I was totally fine with the way I went out last season, you saw me doing my career, you saw me being me."
Reed also says she's mended some fences that were broken during her time on the show.
"Gloria and I don't have any beef. She actually reached out to me to get Evelyn's contact information after Evelyn went through all her stuff, and I mean, Evelyn obviously is not my favorite person in the world. Neither is Shaunie. Outside of that, I'm just doing me."
Reed is also expanding her dance company from Orlando to Atlanta and pitching a reality show about the company, so perhaps be on the look out for that in the future.
Photo/Video credit: Getty Images
|
global_05_local_4_shard_00000656_processed.jsonl/114172
|
William Shatner seeks out strange new worlds on Broadway
Yes, he really does go where no man has gone before because he goes his own way, and that's quite wonderful.
William Shatner's one-man show, "Shatner's World we just live in it ..." opened Thursday night (Feb. 16) at The Music Box. It's great fun, and this is from someone who was not a bona fide Trekkie.
Clearly many in the theater were, and cheered as soon as the familiar strains of the theme song filled the theater. What Shatner very ably does, with "Star Trek" and other earlier TV gigs, stage work and movies, is give the audience his perspective on himself.
To do a one-person show about one's life, one must have lived; think about how thrilling memoirs from teenagers are. And at 80, Shatner has lived a terrific life. He opens with "Star Trek" memories, which makes sense because he knows that he will always be remembered as Captain James Tiberius Kirk. (Even those among us who never owned a phaser gun know his full name.)
Against a set with a desk and a small table, a huge moon, and stars, a shaft of light beams down and he says, "I'm not beaming in. I can make an entrance with a rocket strapped to my a**."
Wearing jeans, a nicely tailored black jacket, a white shirt and a gray vest, Shatner talks and introduces clips of his work for over an hour and a half, with no intermission.
He reminisces about his childhood, pokes some gentle fun at his mom: "What's the difference between a Rottweiler and a Jewish mother? A Rottweiler eventually lets go."
Like so many actors, he knew his calling very young. His mom had sent him to summer camp, where he was in a play and realized the effect he could have on the audience. That was it.
He cut high school to hang out at Montreal's last burlesque house where striptease artist Lili St. Cyr enchanted him and vaudevillians cracked him up: "My cousin got an exorcism," he says. "She couldn't afford to pay -- so they repossessed."
He talks of those who influenced him, and adored Dick Shawn who died on stage, still getting a laugh. "That's the way comics want to go," Shatner says. "I don't know if it will happen tonight."
It didn't. He tells long stories, which have the feel of truth, burnished by many retellings. Shatner shows photos of his family, dances with a chair and basically charms. He maintains he was the worst student to ever attend Medill, and gets the irony when the university invites him back to bestow an honorary doctorate.
"Don't be afraid of making an a** of yourself," he told Medill students. "I do it all the time and look where I got."
He seems fearless, and thank you, Mr. Shatner for answering the question that has long dogged those who wonder about his rather emphatic delivery of lines.
Shatner was in a Broadway play, "The World of Suzy Wong" which had gotten panned out of town and in New York. But the producers wouldn't close it, even though entire rows of people were leaving during the performance. The star, France Nuyen, wanted out because she was in love with Marlon Brando, so Shatner says she would simply stop talking - on stage. To fill the silence, Shatner just started talking more and more, faster and faster. The rhythms of his speech came out this way and stuck.
After listening to Shatner for a while, you can't help but marvel at his varied career, which includes cutting three LPs. And if you have never heard his spoken word version of "Mr. Tambourine Man" truly, you must.
He talk sings -- that is his style -- a song Brad Paisley wrote for him, and it is perfect: "Just because you have seen me on TV doesn't mean I am any more enlightened than you," Shatner says. "Sorry to disappoint you but I am real."
Photo/Video credit: WilliamShatner.com
|
global_05_local_4_shard_00000656_processed.jsonl/114173
|
Todd TV Add to Favorites
Meet Todd Santos, a 30-year-old waiter and musician living in laid-back Hermosa Beach, Calif. He takes the ``laid-back'' part a little too much to heart, however, and turns his life over to TV viewers. In each episode of this reality series, the audience votes on some of Todd's decisions, such as finding a new job and choosing which of two women to date.
Show More »« Less
Language: English Release Date: 21 January 2004 Genres: Reality Time Period: 2000s
Rate it
0 Users
|
global_05_local_4_shard_00000656_processed.jsonl/114174
|
What Google does when a government requests your data | ZDNet
What Google does when a government requests your data
What Google does when a government requests your data
Screen Shot 2013-01-28 at 08.36.09
Google Transparency Report shows US leads in user data requests.
(Credit: Google)
And that's why they sometimes fight.
What does Google do when it receives a request?
What kind of data is requested?
For instance:
• Subpoena:
• Sign-in IP addresses and associated time stamps
• Court order:
• Information obtainable with a subpoena
• Search warrant:
• Email content
• Information obtainable with a subpoena or court order.
Topics: Privacy, Google, Government, Security
Log in or register to join the discussion
• i don't see any problem...
I simply use my neighbors address.
FBI stopped there several times now! LOL! ! ! ! !
Poor little 87 year old lady.
• So you're the reason
my grandma was indicted last week!
• Send them on wild goose chases.
Weaponized Anthrax.
• Short answer:
we do what the government orders us to because they are the government and we are not. Yes, we know that you have been indoctrinated to think that governments are benevolent deliverers of utopia and the corporations are the focus of evil in the modern world, but, well, reality isn't interested in what you think is true.
• So we should do what corporations order us to do?
Perhaps look for a way to transfer governmental authority from the U.S.A to the U.S. Chamber of Commerce?
John L. Ries
• How much money Google receives from these requests
Government use taxpayers money to pay Google for this requests, it is extermely important for Drummond to explain the price Google charges each government for these requests since it's public money that is being used.
Gabriel Hernandez
• A fair sum for retrieval costs.
Of course it's public money being used. What's your point?
• What Google does when a government requests your data
I'm surprised that Google doesn't charge the government for requests. They sell the data to everyone else. Google only has your data if you sign in, don't sign in and they won't know who you are.
• If Google wants to do business, they have to follow the rules
Pursuant to European legislation, the applicable data privacy laws are regulated in accordance with the location of the client/customer. The same applies to other legislation, such as consumer rights, etc.
In other words, Google must follow the regulations of every country where they want to do business.
If they do not follow the rules, Google's products and services may be denied market access.
Google is a signatory to the US-EU Safe Harbor provisions. This signifies that Google guarantees an adequate protection of data (as defined in the EU Directive). Google can be fined and assets seized etc.
• Great article...
Very informative article, Thanks a lot. :-)
• Hey Google
• Longer than you think...
Many years ago, as a mainframe programmer for an airline that has long gone out of business (for other reasons), when airlines were almost the only business that validated credit cards with real time access to the data (if it was issued by the same airline), a request came from a government agency, with a search warrant, to trigger a call when a certain stolen card was used to buy a ticket, for police to go directly to the airport without tipping off the cardholder or the ticket agent. This was so rare and unprecedented that, rather than use the normal database (which had no such option; the only options were to sell, decline, or decline and confiscate the card), we had to put the logic to check for that number into the online software directly. But not in the source code where any other programmers in the company could find it. We had to code up, and punch into cards, a "patch" that altered the compiled code when that module was installed, by inserting direct machine language. Only the IT director and the programmers knew of that patch, which instructed the machine room operator to call the authorities. I believe it was triggered a few months later and the person of interest was caught doing something. Whether the patch was later altered to use on someone else, I have no idea.
Now, it seems that an agent hacking into a server could do something like that from their own office without the company that owned the server, or the company issuing the card, even knowing! Times have changed!
|
global_05_local_4_shard_00000656_processed.jsonl/114180
|
Re: Delayed smtp-delivery
On Mon, 25 Aug 1997, Dean Michaels wrote:
>> Not such a good solution for me because people from within my network
>> have
>> to send mail using smtp.
>> expensive and enabled 'keep expensive'. That was a good solution; no
>> starts...)
>Just launch smtpserver from inetd. It will leave all of the pending
>e-mail in the postoffice until you launch your router and scheduler.
>(don't forget to change your $ZMAILER/bin/zmailer script to exclude
>smtpserver from startup).
Isn't that inefficient or slower? I'd like to run it as a daemon, because
of saving cpu and mem, or am I crazy saying that? :-)
And, it doesn't give me a solution for my second problem; what if a site
connects where I have to send mail to; running etrn isn't possible in that
case isn't it?
-= Paul =-
__ _
/ |_| |
/ _ \ Paul Dekkers ([email protected])
| o o `. _
| O |_| | discover Atomic Infinity!!!
`.___/ | | | http://library.advanced.org/12082/
/` \
|
global_05_local_4_shard_00000656_processed.jsonl/114198
|
USA: 1-800-4GIBSON
Europe: 00+8004GIBSON1
GibsonProductsStoreNews-LifestyleLessonsCommunity24/7 Support
Síguenos en
Classic Amps: The 1950s Gibson GA-40 Les Paul Amp
Dave Hunter
A tweed 1959 GA-40 on top of two mid-’60s examples
In the early days of the electric guitar, manufacturers who made both guitars and amps very often attempted to sell them as matched sets—and players very often bought them that way, until they figured out there was nothing wrong with mixing and matching to suit your varying tastes in each. Throughout the mid to late1950s, Gibson’s flagship solidbody electric, the Les Paul, was partnered with an amp that has become a classic in its own right: the GA-40 Les Paul Amp. While, of course, this combo hasn’t attained values anywhere near those of the guitar it was designed to sell with, this sleeper of a tone machine has recently become far more appreciated by players and collectors alike, and recognized for the unique and inspiring piece of amp design that it is.
Surprisingly, the GA-40 wasn’t Gibson’s most powerful amp of the time, contrary to the kind of firepower that you might think the powerful Les Paul Standard demanded. But remember, the Les Paul wasn’t designed to be the blues-rock and heavy-rock monster that it would prove itself to be in the mid ’60s and beyond. It was originally designed as a solidbody alternative for jazz and pop players, guitarists much like its namesake, and for this market, Gibson deemed a pair of lower-powered 6V6 output tubes and a conservative 14 to 16-watt rating absolutely adequate. Don’t believe for one second, however, that this diminutive rating means a GA-40 can’t roar when you want it to: these are real fire breathers, truly scorching when you crank them up, and a lot louder, too, than that output rating might imply.
GA-40s with two-tone covering made between 1956 and ’59 are generally the most desirable, because they also house the preferred circuit and tube configuration for this model. Part of what’s so groovy about this amp is that it is nothing like any of the Fender designs from the same era that have become such classics. The Gibson brand has been relegated to the darker corners of amp collecting, but throughout the ’50s and early ’60s the company really was trying to cut its own path, offering bold designs and impressive workmanship, and unwilling to follow the lead of any other maker, no matter how popular those “youngsters’” amps might be proving! As such, the GA-40’s circuit is very different from any of the classic tube-amp templates that are more familiar today in so many repro, reissue, and “boutique” amplifiers (other than one… mentioned below).
Inside the chassis of a 1956 GA-40
Much of the GA-40’s excitement revolves around the unusual preamp tubes used in each of its two channels. This is a rather unusual “pentode” preamp tube—meaning it has five functional elements other than the three of the standard 12AX7 dual-triode—called a 5879. Something of a cousin of the EF86 pentode preamp tube familiar from early Vox AC30 and AC15 amps, and sometimes used by newer makers such as Matchless, Dr Z, 65 Amps and others, the 5879 sounds nothing like the familiar 12AX7, and has a higher gain and a fatter, thicker overall tone. This higher gain doesn’t necessarily mean that this tube itself distorts more easily, but rather that it pushes a firm, bold signal onto the next stage, where you can definitely kick the whole shooting match into distortion if you want to.
The fun factor is multiplied by the fact that each of the GA-40’s two channels was voiced differently, Channel 1 (designated Instrument/Microphone) being noticeably hotter than Channel Two (designated Instrument). Using an A/B/Y pedal to switch between them (or to use both together) offers a useful instant lead-boost from Ch1, or you can patch them together (by plugging into Input 1 of Ch1 and running a jumper cable from Input 2 to Input 1 of Ch2, or vice versa) to blend the two voices together all the time. Channel 2, the Instrument channel, has its own little treat in store in the form of one of the most delectable tremolo circuits available. Powered by a single 6SQ7 preamp tube, the GA-40’s tremolo is deep, thick and lush, and provides anything from a throbbing, swampy wobble to a machine-gun staccato.
The control panel for a 1956 GA-40
Both channels share a single Tone control, but even that is very different than the simple, single-knob Tone controls in so many amps of the era. The GA-40’s Tone control is located in the output stage of the amp, between the phase inverter and the output tubes, rather than immediately following the volume controls like most. It serves to subtly tweak the high-end content of the sound, following a “less is more” philosophy that leaves the GA-40 sounding rich and full-throated at just about any setting. All of this tonal goodness was pumped through a single Jensen P12Q 12-inch speaker. It’s a classic in its own right, but some contemporary owners of these amps prefer to replace it with a modern, more efficient speaker—especially if they are going to be gigging the amp on a regular basis—in order to protect the Jensen for posterity, while also getting a little more oomph out of the amp. That said, the original P12Qs, when in good condition, break up beautifully for blues and vintage rock and roll. Now that this model is definitely in the spotlight, good original GA-40s are becoming hard to find, and expensive when you do find them. Gibson has never offered a precise reproduction of the model, but the Victoria Amp Company does manufacture an amp called the Electro King, which is very faithful to the original circuit, complete with dual 5879 preamp tubes and 6SQ7-powered tremolo circuit.
Amps courtesy of Nate Riverhorse Nakadate
Photo Credit: Kerry Beyer
blog comments powered by Disqus
|
global_05_local_4_shard_00000656_processed.jsonl/114202
|
By Lynn Yarris
The ancient Greek philosopher and scientist Aristotle told of Greeks living in the city of Magnesia who had discovered a most unusual stone with the power to attract iron. William Gilbert, physician to Queen Elizabeth I of England, produced the first accurate theory on magnetism in 1600 with the publication of his book which described the Earth as a giant magnet. Two centuries later, English physicist Michael Faraday became the first to produce an electric current from a magnetic field, laying the groundwork for Scottish physicist James Clerk Maxwell's electromagnetic field theory a few years later.
Imagine what Aristotle, Gilbert, Faraday, Maxwell, and all the other great scientists and engineers who contributed to the development of magnets and magnetic technology would think about this: Berkeley Lab researchers in the Superconducting Magnet Group shattered the world-record in magnetic field-strength when their newest niobium-tin dipole electromagnet reached 14.7 Tesla. How strong is it? 14.7 Tesla is better than 300,000 times the strength of Earth's magnetic field.
"We're always looking forward. After we reach 15 Tesla, we'll aim for 16 Tesla."
"Our job is to push the technology envelope as far as we can in terms of high magnetic field-strength and that is what we did," said Steve Gourlay, a physicist with the Accelerator and Fusion Research Division (AFRD) who lead the team that designed and built the magnet known as RD-3.
The new world record-holding magnet is one-meter long and weighs several tons. It consists of three magnetic coil modules (a double-pancake outer and single-layer inner) which were wound from more than eight miles worth of niobium-tin wire. The previous record field strength for a dipole electromagnet was 13.5 Tesla. That record was set in 1997 by a niobium-tin electromagnet called D20 which was also designed and built here at Berkeley Lab.
Members of the Berkeley Lab team that designed and built the record-shattering RD-3 magnet pose in front of it.
Members of the new record-holding team in addition to Gourlay were Robert Benjegerdes, Paul Bish, Doyle Byford, Shlomo Caspi, Daniel Dietderich, Ray Hafalia, Charles Hannaford, Hugh Higley, Alan Jackson, Alan Lietzke, Nate Liggins, Alfred McInturff, Jim O'Neil, Evan Palmerston, GianLuca Sabbi, Ron Scanlan, and James Swanson.
Dipole magnets are used to bend and maintain the path of accelerating particle beams. The higher the field strengths of the magnets, the tighter the arc of the beam. With stronger dipole magnets, an accelerator can push particles to much higher relativistic energies around the same-sized circular beam path.
"We're charged with developing superconducting magnet technology that not only yields high field-strength but is also cost-effective for the next generation of accelerators," says Gourlay. "To achieve this, we have been working with a niobium-tin superconductor (Nb3Sn) and emphasizing simplicity in our design."
The design Gourlay and his colleagues employed was centered around a "common-coil racetrack" geometry, an idea that originated at Brookhaven National Laboratory, in which a pair of coils shaped like an oval racetrack are shared between two apertures to produce opposing magnetic fields.
Berkeley Lab's Superconducting Magnet Group is now planning the design of a magnet that should reach a field strength of 15 Tesla.
"We're always looking forward," says Gourlay. "After we reach 15 Tesla, we'll aim for 16 Tesla." - end -
< Research Review Top ^ Next >
|
global_05_local_4_shard_00000656_processed.jsonl/114216
|
Page background blue
State-Support & Self-Support Combined Reporting
Tables and graphs in this section combine counts of students enrolled in regular state-support credit courses along with those enrolled in self-support special sessions credit courses.
Students at Dominguez Hills can enroll in state-supported, regular university credit courses or they can enroll in self-supported credit courses (also referred to as Special Sessions) through the College of Extended and International Education. State-support courses are partially funded by the state of California while self-support courses are funded entirely by student fees.
Reports in all other sections of this Factbook follow the California State University reporting convention of only counting students enrolled in state support coursework. CSUDH offers several degree programs that can be taken entirely through self-support enrollment, however, there are some programs in which students may take a combination of state-support and self support coursework. This section of the Factbook was created to give a fuller picture of students in these programs and their eventual success at the university.
|
global_05_local_4_shard_00000656_processed.jsonl/114233
|
You Drive What?
Saturday, September 4th, 2010 Car, Massachusetts, Paint Job
8 Comments to Lonely?
1. Putting Vinyl figures of anime girls on your car is a trend in Japan and is referred to as “Ita-Sha” First time I’ve seen it done in the states though, props to the owner.
2. Hondaguy on September 4th, 2010
3. On a Kia, no less……….
4. HandleBar Said It on September 4th, 2010
5. Nice,looks good on any car,I like it…
6. Bud on September 5th, 2010
7. hell yeah
8. rachel on September 5th, 2010
9. Is it me or are her bottom bits 180 degrees out of place?
10. Hawk on September 5th, 2010
11. IMO… Ita-stupid.
12. Matt on September 5th, 2010
13. lulz america is gettin crazier every year
14. 118572433 on September 9th, 2010
15. Next you’re going to tell me that someone is marrying the car.
16. Val on October 8th, 2010
Leave a comment
Three Ring Blogs
© Copyright 2011 You Drive What?
Myrtle Beach Web Design by Three Ring Focus
Three Ring Blogs
|
global_05_local_4_shard_00000656_processed.jsonl/114245
|
ImageThis winter, learn all about one of our favorite cold-climate animals: seals! Many seals live in arctic and Antarctic regions, where a thick layer of blubber keeps them warm even in icy waters. But not all seals live where it’s cold—Hawaiian monk seals live in a tropical paradise. When it’s too hot, they sleep in wet sand to cool off.
Seals come in all shapes and sizes. Baby seals triple their weight in three weeks, thanks to a rich diet of milk that’s almost half fat. The largest seal is the elephant seal. A fully grown male can weigh over 5,000 pounds—as much as a truck! Scientists study all the different kinds of seals to learn more about them and their environment. But even if you don’t live near any seals, you can watch the animals that live near you to learn more about nature. What kinds of animals can you spot by your house?
About these ads
|
global_05_local_4_shard_00000656_processed.jsonl/114249
|
Fashawn, Homeboy Sandman, Deal The Villain, Grafik, Daniel Joseph, Fresh Daily, Vertual Vertigo & Mazzi (S.O.U.L. Purpose) – Cypher (part 1 of 2) @ Fat Beats, NYC on February 26th, 2010.
PREVIOUS: XXL Freshmen Class of 2010
Post a Comment
Share on Tumblr
• http://cocotaso01.spaces.live.com/ Steph
So crazy. homeboy, Fash & Fresh Daily killed this.
• sam sneako
^ basically.
• The wha?
Man I was there for this live! St Joe Louis some othervwhite kid n Sene killed it!
• BoogieDown
High Water Music = the new Rawkus Records. Every release and event they put out there is dope!
• 1woRd
Mazzi went off!
• http://Myspace.com/vertualvertigo Shamon
was definately real live. And I agree
With the statement above about highwater music.
Word to sucio.and "the white kid" is actualy
"Ezekiel38" 1/3 of the chicago based crew
"VERTUAL VERTIGO" (myspace.com/Vertualvertigo)
Alongside Dj Japandrew and Cerebral Vortex.
|
global_05_local_4_shard_00000656_processed.jsonl/114254
|
Command & Conquer 4 Public Beta
Tagged: Command & Conquer, Gaming
Source: GameSpot - Read the full article
Posted: 4 years 25 weeks ago
Command & Conquer 4 allows C&C fans to finally experience the epic conclusion to one of gaming's most beloved and longest-running series, the 15-year Tiberium saga. Kane. GDI. Nod. Tiberium. How will it end? Find out in Command & Conquer 4, told through persistent player progression, trademark live-action cinematics, and a multitude of innovations to the classic fast and fluid Command & Conquer gameplay.
Now is your opportunity to be a part to the development of Command & Conquer 4 by participating in this exclusive Beta program! Choose your class and command more units than EVER in a C&C game, as you team up and take on your opponents in 5-on-5 online battles! Strategize with your teammates or talk smack to your opponents over VOIP in fast, fun, and furious C&C action. We want to hear your feedback to help us deliver the C&C experience that you want when the game ships!
Visit the official site for Command & Conquer 4, or become a fan on Facebook!
The Open Beta is open to all GameSpot members worldwide, and keys will be released starting at 9:00am Pacific Time on January 28, 2010.
lttrrL xzllzhwotpaw, bnlbabxcbvsu, [link=]bxvxznhhrlfe[/link],
|
global_05_local_4_shard_00000656_processed.jsonl/114264
|
Learning About Systems That Contain State Variables
Thomas G. Dietterich
It is difficult to learn about systems that contain state variables when those variables are not directly observable. This paper formalizes this learning problem and presents a method called the iterative extension method for solving it. In the iterative extension method, the learner gradually constructs a partial theory of the state-containing system. At each stage, the learner applies this partial theory to interpret the I/O behavior of the system and obtain additional constraints on the structure and values of its state variables. These constraints can be applied to extend the partial theory by hypothesizing additional internal state variables. The improved theory can then be applied to interpret more complex I/O behavior. This process continues until a theory of the entire system is obtained. Several sufficient conditions for the success of this method are presented including (a) the observability and decomposability of the state information in the system. (b) the learnability of individual state transitions in the system, (c) the ability of the learner to perform synthesis of straight-line programs and conjunctive predicates from examples and (d) the ability of the learner to perform theory-driven data interpretation. The method is being implemented and applied to the problem of learning UNIX file system commands by observing a tutorial interaction with UNIX.
|
global_05_local_4_shard_00000656_processed.jsonl/114287
|
Project info for TrafDisp
Share This Created 30 Mar 2001 at 14:10 UTC by tcg.
Freshmeat page:
TrafDisp is a network traffic measurement package. It allows you to monitor the amount of incoming/outgoing KBps on a selected network interface(s) from at least one machine. It allows a network administrator to monitor the traffic that is generated by all the hosts on the network. The traffic is viewable in neat graphs that are generated by a PHP-enabled Web-server. The logs are stored in a MySQL table.
License: BSD
This project has the following developers:
New Advogato Features
Share this page
|
global_05_local_4_shard_00000656_processed.jsonl/114312
|
Have you ever been mistaken for a doctor? - page 5
by ThePrincessBride
10,307 Views | 49 Comments
So, I have heard some stories of female doctors being mistaken for nurses...so I was wondering this: have you, as a male nurse, been mistaken for a doctor?... Read More
1. 0
A million times, especially since I've been out of uniform!
Sometimes it's helpful if a patient is disoriented: they sometimes take more notice of a "doctor" than a nurse!!
2. 0
This should be combined with the "male nurses with beards" thread, I wager you'd get a really high correlation between +beards and +doctor recognition hits on that study =)
3. 0
I used to work in aged care facility in England. Quite often the female nurses would ask me to pretend to a doctor in order together confused residents to take their meds!
4. 0
experienced it before when im doing my hospital RLE (related learning experience) in one of the government hospital here....an old lady keep on saying "doc i have this and i have that...etc"....then i keep on saying too "I'm not a doctor Mam"....maybe because im wearing white uniform and stethos in hand thats why she think i'm a doctor....
5. 0
All the time unfortunately.
6. 0
Yup, happens all the time, especially if I go in to help a female nurse with a pt. Usually I'll say the female nurse is the Doc, just to throw her and the pt off.
7. 0
Yep, happens all the time :icon_roll
8. 0
My patients call me "Doc" all the time. Of course where I work, - a State Prison - the term is a sign of respect and not my title.
9. 0
I get called so many things I don't bother keeping track ;-)
10. 0
Heaps, they probably thought I was an intern (I mean I'm only 25)...and that's how I got called 'doc' by the nurses, whilst the doctors get called by their first names. funny that.
|
global_05_local_4_shard_00000656_processed.jsonl/114343
|
Fear, Threat Inflation, and Public Choice
John Glaser, February 23, 2012
In Foreign Affairs, Micah Zenko and Michael A. Cohen argue that despite the constant fear-mongering and threat inflation in America, we are actually very secure and face very few, very minor external threats. And one of the reasons we have a system that fuels unnecessary alarm and paranoia?
Ah yes, the public choice of U.S. warfare. This is why most Americans are terrified of Iran, China, and North Korea, despite the near-impossibility that any of them could pose an actual military threat to America. It’s why they’re concerned about terrorist attacks but not about heart disease. It pushes the military budget to $1 trillion, more than the rest of the world combined. Indeed, the dangers we do face are largely the result of the excessive warfarism produced by all this threat inflation. I was surprised such a frank admission made it into Foreign Affairs, to be honest.
6 Responses to “Fear, Threat Inflation, and Public Choice”
1. Echoing Fareed Zakaria who echos FDR, "We have nothing to fear but fear itself." I fear. I fear that Israel will bomb Iran and the 21st Century will begin as the 20th did. Let's pray that our world will take a different and more courageous tack.
2. Can you tell me where can I get some more info on this matter? I must confess you've inspired me by this article, put one's money where one's mouth is
3. I'm not trying to be mocking but it's really not that difficult…Google handles unstructured searches very well. Try something like: "fear-mongering" "threat inflation" "war-mongering"
Trust me, just from that simple search you will have enough reading material to keep you busy for awhile and probably open up more sources for your enlightenment.
4. [...] [1] Thanks to John Glaser for pointing out the Foreign Affairs article in his blog post at AntiWar.com. [...]
5. So encouraging things are provided here,I really happy to read your post
6. It's really pleasure to read your post.
|
global_05_local_4_shard_00000656_processed.jsonl/114345
|
Astronomy Picture of the Day
February 13, 1997
See Explanation. Clicking on the picture will download
the highest resolution version available.
More Jets From Comet Hale-Bopp
J. A. DeYoung (USNO)
Explanation: Comets become fountains of gas and dust as they get near the Sun. Solar heat vaporizes the outer layers of these spectacular orbiting icebergs, exposing caverns of pressurized gas that erupt into jets. The above digitally enhanced image of Comet Hale-Bopp was taken on January 29th and highlights several of these dust jets. Here, background stars appear as faint raised streaks. Comet Hale-Bopp is currently brighter than most stars, and is visible in the morning sky. Comet Hale-Bopp will continue to brighten and develop an extended tail until April.
Tomorrow's picture: NGC 1818: A Young Globular Cluster
NASA Technical Rep.: Jay Norris. Specific rights apply.
A service of: LHEA at NASA/ GSFC
&: Michigan Tech. U.
|
global_05_local_4_shard_00000656_processed.jsonl/114346
|
Take the 2-minute tour ×
I see many people asking how to save the Lion installer, and ofter the way to go is unpacking the installer and saving the disk image.
In my case, I saved the whole installer app (the same as downloaded) in an external disk before installing it in my iMac. Now, can I just copy the installer to my MacBook Pro and run it with no trouble? Or should I burn the disk? I don't really intend to burn it now, using the installer would be more practical.
share|improve this question
1 Answer 1
up vote 0 down vote accepted
There is no reason that running it from the installer won't work. That's the way Apple intended the installation to run, so that is probably the safest way to perform the upgrade.
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/114347
|
Take the 2-minute tour ×
I use Cmd+L to make a alias, and the alias has "alia" appended to the original file name. I move the link to a directory, then remove the "alias" part manually.
Is there a tool that can do this kind of automatically? I mean, if a tool can catch the event a file is copied to a specific directory to call a tool (python, ruby or applescript) with a parameter, I can easily rename the file name.
Thanks to Ben and Dori, I could get it working.
1. Go to /Library/Scripts/Folder Actions directory to Folder Actions Setup.
2. Run Automator
3. Utilities -> Run Shell Script
4. Use python as a shell, and pass input should be as arguments
5. Run the following code
import sys
import os
for f in sys.argv[1:]:
(name, ext) = os.path.splitext(f)
newname = "%s%s" % (name, ".pdf")
os.rename(f, newname)
Philip's method should work, but I think Automator is easier to get it work. On my Snow Leopard, I couldn't see the folder action context menu.
share|improve this question
2 Answers 2
up vote 3 down vote accepted
In addition to Applescript, Automator allows you to create Folder Actions as well, at least in 10.6. (This should have been a comment on Philip's post, but I don't quite have enough rep for that yet.)
share|improve this answer
+1 Automator might be the easier of the two ways to do this. I don't use it because my daily needs are for more advanced and I sometimes forget it even exists. – Philip Regan Oct 7 '10 at 19:22
I'm not sure what you're using to make symbolic links (it's not built in to OS X), so I can't say if something could be added at that step.
For Folder Actions, the three places to look are:
• /Library/Scripts/Folder Actions
• /Library/Scripts/Folder Action Scripts
• /Library/Scripts/Script Editor Scripts/Folder Actions Handlers
In the first folder, you'll find Configure Folder Actions - run that, and you can enable folder actions, including choosing folders and what scripts apply to those folders.
The last two folders will give you some places to start writing the script you want.
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/114348
|
Take the 2-minute tour ×
I'm wondering if there is a car-friendly way to play music on the iPhone without any type of car kit. Specifically, I am looking for a way to change tracks without unlocking the phone. I'm okay with pressing the home button, I just don't want to worry about unlocking the phone.
Some examples would be:
1) Swipe controls accessible from the lockscreen.
2) Shaking/moving the iPhone in a certain way.
I know Siri can do this, but I was hoping there was a way to accomplish this pre-Siri.
The normal music player on the lockscreen is not suitable for driving, as I have to look at the phone to press the touchscreen in the right place.
share|improve this question
Disable locking while in the car? – Thorbjørn Ravn Andersen Dec 17 '12 at 19:48
@ThorbjørnRavnAndersen, not that familiar with iOS. Can you disable lockscreen? Can you swipe w/ normal music player? – Chance Dec 17 '12 at 20:52
To disable lockscreen: Settings/General/AutoLock/Never – dsteele Dec 18 '12 at 0:07
1 Answer 1
up vote 2 down vote accepted
You could get something like this remote, which has passthrough for any standard 3.5mm audio, and provides volume controls and a clicker remote (just like on Apple's headphones). The clicker can to play, pause, and skip (double click for forward, triple click for backward).
There are other similar products out there, I found a few by searching for "iPhone inline remote".
share|improve this answer
It appears that this is a very cheap device (giving a lot of bad reviews). Perhaps there is a more expensive but better version of this? – Thorbjørn Ravn Andersen Dec 18 '12 at 10:00
I didn't really look at the reviews, but you're probably right. As I noted, there are other similar products out there, I just picked the first one I found as a representative sample. Actual shopping is left to the reader. – robmathers Dec 18 '12 at 14:06
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/114349
|
101 reputation
bio website zebishop.com
location Paris, France
age 37
visits member for 1 year, 5 months
seen Jul 13 at 17:43
.net addict (c#, asp.net, winforms, webforms, mvc, silverlight, etc.). But once in a while I get a kick with jquery, angularjs, that kind of kinky stuff.
This user has not answered any questions
This user has not asked any questions
This user has not participated in any tags
Stack Overflow 362 rep 217
The Workplace 151 rep 13
Arqade 137 rep 3
Drupal Answers 113 rep 5
Super User 101 rep 2
1 Vote Cast
all time by type
1 up 1 question
0 down 0 answer
|
global_05_local_4_shard_00000656_processed.jsonl/114360
|
State Background Info:
Upcoming SoS Elections:
Connecticut Electoral Situation
Absentee ballots require an excuse: yes
Early voting: no
Felons: The State of Connecticut prohibits felons currently in prison or on parole from voting. Once an individual has completed their sentence, their right to vote is automatically restored. In 2001, Connecticut enacted a law restoring the right to vote for persons currently on probation for a felony conviction.
ID Laws: Each elector who registered to vote by mail for the first time on or after January 1, 2003, and has a "mark" next to the elector's name on the official registry list, shall present either a current and valid photo ID that shows the elector's name and address or a copy of a current utility bill, bank statement, government check, paycheck or other government document that shows the name and address of the elector. Each other elector shall present to the checkers the elector's Social Security card or any other preprinted form of identification which shows the elector's name and either the elector's address, signature or photograph, or on a form prescribed by the Secretary of the State, write the elector's residential address and date of birth, print the elector's name and sign a statement under penalty of false statement that the elector is the elector whose name appears on the official checklist. Such form shall clearly state the penalty of false statement.
Mandatory poll worker/election official training:
Paper trail: passed by legislature on 6/2/2005 and awaiting signature of governor
Registration deadline: Registration ends 15 days before the election.
Uniform voting system: no
|
global_05_local_4_shard_00000656_processed.jsonl/114373
|
SIGNAL NEWNYM and firefox browser settings
if you are having problems with SIGNAL NEWNYM having no effect it may
be firefox browser settings that are keeping a cached tcp session to
the target host (and/or proxy).
verify that the following are disabled in "about:config"
network.http.keep-alive = FALSE
network.http.max-persistent-connections-per-proxy = 0
network.http.max-persistent-connections-per-server = 0
pipelining is OK. it does not matter if the following are on or off:
it is suggested that these be enabled for better performance.
best regards,
|
global_05_local_4_shard_00000656_processed.jsonl/114400
|
Take the 2-minute tour ×
So to start out with, I having figured out how to animate a number of still frames into a video, like this:
avconv -f image2 -i %06d.png -r 24 -qscale 1 aniron.avi
I have a bunch of files in the directory named 000000.png, 000001.png, 000002.png. I am able to make a video of sufficiently high quality this way. However, efforts to add an audio track by putting "-i aniron.mp3" and a few other options have failed thus far. I always get this:
avconv version 0.8.5-4:0.8.5-0ubuntu0.12.04.1, Copyright (c) 2000-2012 the Libav
built on Jan 24 2013 18:03:14 with gcc 4.6.3
[mp3 @ 0x8623aa0] max_analyze_duration reached
[mp3 @ 0x8623aa0] Estimating duration from bitrate, this may be inaccurate
Input #0, mp3, from 'aniron.mp3':
encoder : Lavf52.64.2
TDTG : 2012-07-28T18:05:36
Duration: 00:07:11.46, start: 0.000000, bitrate: 191 kb/s
Stream #0.0: Audio: mp3, 44100 Hz, stereo, s16, 192 kb/s
Input #1, image2, from '%06d.png':
Duration: 00:07:09.88, start: 0.000000, bitrate: N/A
Stream #1.0: Video: png, rgb24, 1920x1080, 25 fps, 25 tbr, 25 tbn, 25 tbc
File 'aniron.avi' already exists. Overwrite ? [y/N] y
Incompatible pixel format 'rgb24' for codec 'mpeg4', auto-selecting format 'yuv420p'
[buffer @ 0x8629500] w:1920 h:1080 pixfmt:rgb24
[avsink @ 0x8657d60] auto-inserting filter 'auto-inserted scaler 0' between the
filter 'src' and the filter 'out'
[scale @ 0x8634940] w:1920 h:1080 fmt:rgb24 -> w:1920 h:1080 fmt:yuv420p flags:0x4
[ac3 @ 0x86438e0] invalid bit rate
Output #0, avi, to 'aniron.avi':
encoder : Lavf52.64.2
TDTG : 2012-07-28T18:05:36
Stream #0.0: Video: mpeg4, yuv420p, 1920x1080, q=2-31, 200 kb/s, 90k tbn, 24 tbc
Stream #0.1: Audio: ac3, 44100 Hz, stereo, flt, 200 kb/s
Stream mapping:
Stream #1:0 -> #0:0 (png -> mpeg4)
Stream #0:0 -> #0:1 (mp3 -> ac3)
as bit_rate, rate, width or height
I may just end up doing this in Kdenvlive but this is bugging me.
share|improve this question
The problem appears to be that by default it is trying to re-encode your input MP3 into AC3 format. This is causing an error since the AC3 encoder apparently doesn't like 16bit samples (I suspect it prefers more). By adding -c:a copy after -i somefile.mp3 it should re-use the MP3 input rather than transcoding it. – chronitis Feb 5 '13 at 10:46
3 Answers 3
avconv -f image2 -i %06d.png -r 24 -qscale 1 -i audiofile.mp3 -c:a copy aniron.avi
Things to note:
• -c:a determines the output audio codec - we just copy the one from the input file here
• The avi container is quite lacking, for example, you might get sync problems if your mp3 file is VBR. A better alternative would be MP4 or MKV.
• You might specify the output video codec (-c:v) if you don't like the default one
• As for ffmpeg vs. avconv: ffmpeg is far from deprecated - this is deliberately misleading. If you're interested read this
share|improve this answer
for the record: I dont't see anyone in this thread suggesting ffmpeg was deprecated: Sadiq asked if it might be. I answered that is wasnt. If that was the reason the other was downvoted, please read more carefull. Cheers. – matv1 Feb 5 '13 at 18:38
Yes I know, but I didn't downvote your answer ;D – phoibos Feb 5 '13 at 18:51
Alright phoibos, I had sucess with your answer ... after a fashion. It worked after I permuted the arguments. I'm going to submit what worked, upvote your answer, but accept mine. – Sadiq Feb 6 '13 at 13:02
How about using ffmpeg on the avi you created? Syntax would be something like:
ffmpeg -i sound.wav -i input.avi output.mpg
I an not sure if it will take mp3 as audio import so you might have to do a conversion of your soundfile.
Gd luck
share|improve this answer
I'll consider it but isn't ffmpeg deprecated? That means it might disappear soon. I'm sort of uncomfortable with using it then. Anyway, right now I'm wrestling with kdenlive, sigh... – Sadiq Feb 5 '13 at 8:50
I don't think its deprecated. There has been a Libav fork off ffmpeg but the latter is still being developped. – matv1 Feb 5 '13 at 9:05
I think I figured out the voodoo I need to get the ugly black bars out of the kdenlive video. Thanks for the help anyway. I'll let you know whether it works shortly. – Sadiq Feb 5 '13 at 9:08
Sorry it didn't work. Virtually same error as before. And I hate to say it but I do get the message "This program is only provided for compatibility and will be removed in a future release. Please use avconv instead." – Sadiq Feb 5 '13 at 9:14
ffmpeg and avconv are the results of a rather acrimonious splitting of the original ffmpeg project. At this time the syntax and capabilities of the two are very similar. Debian (upon which Ubuntu is based) has chosen in theory to follow the avconv rather than ffmpeg fork, but it is unlikely that the latter will cease to be available. – chronitis Feb 5 '13 at 10:43
This worked in that all arguments were respected; the output was what I wanted, in great quality:
avconv -f image2 -i %06d.png -i aniron.mp3 -c:a copy -r 24 -qscale 1 test.avi
Order of arguments is a subtle annoyance in avconv and ffmpeg.
share|improve this answer
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/114403
|
Press releases on KAIT/LOSS (1997)
October 21, 1996 Contacts: Robert Sanders, UC Berkeley--(510) 643-6998, Robert Irion, UC Santa Cruz--(408) 459-2495,
MT. HAMILTON, CA--Computers soon will take total control of a 30-inch telescope at Lick Observatory, making it the most sensitive fully robotic telescope anywhere.
The Katzman Automatic Imaging Telescope (KAIT), built by astronomers at the University of California, Berkeley, will be dedicated Friday, October 25, by officials from UC Santa Cruz, which operates the observatory atop Mt. Hamilton east of San Jose, California. UCSC Chancellor M.R.C. Greenwood will lead the dedication, which is not open to the public.
The instrument is named for the Sylvia and Jim Katzman Foundation of Saratoga, which donated $50,000 at a critical time in the telescope's development, said Alex Filippenko, professor of astronomy at UC Berkeley and leader of the seven-year effort to build the instrument.
Much of the rest of the funding for KAIT, which totaled about half a million dollars, came from the National Science Foundation in the form of a Presidential Young Investigator Award to Filippenko in 1989.
KAIT will devote itself full-time to checking the night sky for flaring supernovas, to following the changing brightnesses of variable stars, or to observing any object that changes over short or long periods of time. And since it is totally under computer control it can easily be redirected to new targets at an astronomical whim.
The astronomers even hope to give students ready access to the instrument to conduct nightly studies of changing celestial objects, from orbiting moons to comets and asteroids.
"With this telescope, the University of California and Lick Observatory jump to the forefront of research and science education using robotic telescopes," Filippenko said.
"This project fit hand-in-glove with my longtime interests in astronomy and computer engineering," said Jim Katzman, cofounder of Tandem Computers and a member of the Dean's Advisory Council for the Natural Sciences Division at UCSC. "Sylvia and I thought this was a unique and exciting project, because it will allow astronomers to do serious science remotely and to schedule observations that aren't possible with normal telescopes."
KAIT can track a given area of the sky for hours, better than any other robotic telescope now in operation. During a half-hour observation it can detect objects 10,000 times fainter than other such telescopes, or a million times fainter than the human eye can see unaided.
In 1991 Filippenko took over operation of another 30-inch UC Berkeley telescope at Leuschner Observatory that had been automated by astronomers at Lawrence Berkeley Laboratory, but it could not remain fixed on a given star for more than a few minutes. He subsequently modified a 20-inch telescope, also at Leuschner, turning it into a prototype of KAIT called the Berkeley Automatic Imaging Telescope (BAIT).
Both Leuschner telescopes were too old to withstand constant use, however, so Filippenko terminated their robotic capabilities to focus on finishing the new 30-inch automatic telescope at Lick Observatory. Both BAIT and KAIT were constructed with the help of engineer Dick Treffers, who improved and rebuilt much of the purchased instrumentation, and former graduate student Michael Richmond, who contributed to the operations software.
One major difference between KAIT and previous robotic telescopes is the tracking system. KAIT has a separate CCD imaging system for a guide star that allows it to remain precisely fixed on a given area of sky. Other robotic telescopes employ simpler tracking that allows a star to drift significantly in a couple of minutes.
Another key improvement is complex software that makes it easy to orchestrate a night's observing. Targets are entered with a priority number and the computer determines when and how long during the night to look at each one. The computer can automatically change the effective priority of a given target, depending on whether observations were successful in preceding nights. Target requests are sent via email, and data returned via the Internet to the astronomer's computer, or to a school.
The images are captured on electronic film--a CCD camera, like today's camcorders but much better quality, that integrates the amount of light coming through the telescope and spits out a final image at the end of the observation time. Depending on how bright the object is, this could be one second to minutes later, with a practical limit of about half an hour.
Filippenko's main interest is exploding stars or supernovas, which flare suddenly into very bright objects and then dim to obscurity within weeks or months. Capturing the entire process once the supernova is detected requires nightly observation, which on short notice is often impossible to arrange.
"If you want to monitor an exploding star you often have to plead with colleagues for a small amount of time each night, sometimes at telescopes all around the world," he said. "It's not easy to do this, and the data are often of heterogeneous quality in a situation where slight differences are important.
"So I embarked on a project to build an automated, dedicated telescope that could be used for a variety of projects: searching for supernovas, monitoring known variable stars, supernovas and novas, looking at quasars and active galaxies, and very importantly, homing in on targets of opportunity."
One important use of KAIT may be for quick-hit observations. Astronomers frequently need to know how bright an object is so they can estimate how much time to reserve on larger and more expensive telescopes. KAIT can easily accommodate such brief observations.
"I'm already getting requests from people who need to know, for example, the brightness variations of a quasar so they can judge how much time they will need on the Hubble Space Telescope," Filippenko said.
KAIT, located at 1,280 meters elevation, has 20 filters that can be shifted into position automatically for each new observation.
Other contributors to the telescope include the University of California, The California Space Institute, Sun Microsystems, Photometrics Ltd., AutoScope Corporation, and Lick Observatory.
Lick Observatory, which opened in 1888, is used by faculty and students throughout the UC system. Its primary observing instrument is the 120-inch Shane Telescope, which began collecting data in 1959. Recently, astronomers Geoffrey Marcy and Paul Butler of San Francisco State University and UC Berkeley used the Shane Telescope and an ultrasensitive device, the Hamilton Spectrograph, to detect evidence of at least half a dozen new planets outside of our solar system.
UC also owns a share of the W. M. Keck Observatory in Hawaii and its 400-inch telescopes, Keck I and Keck II. Both Lick Observatory and UC's share of Keck Observatory are administered by UC Santa Cruz within one unit, UC Observatories/Lick Observatory.
Editor's note: You may reach Alex Filippenko at (510) 642-1813 or
|
global_05_local_4_shard_00000656_processed.jsonl/114412
|
'Sherlock' Season 3 RECAP: 'The Sign of Three,' End of an Era, Beginning of a New Adventure
• Rate this Story
• 0
• 0
By Anshu Shrivastava | January 6, 2014 6:28 PM EST
"The Sign of Three" opens with Lestrade and Donovan unable to catch a criminal gang, Waters Gang, over a period of eighteen months. The opening scenes show Lestrade getting increasingly frustrated, with each passing month. When Lestrade is all set to catch the gang red-handed, he gets a text on his cell phone, "Help. Baker St. Now. Help Me. Please." Lestrade tells Donovan to go ahead and make the arrest, as he needs to go. A worried Lestrade calls for maximum back-up at Baker Street and drives-off in his car.
Lestrade runs-up to Sherlock's room only to find him in a thoughtful state, sitting in front of the laptop. "This hard, very hard. Hardest thing ever have to do." Sherlock has to write a best man speech and he needs anecdotes. Obviously, the maximum security is not needed.
Ms Hudson catches Sherlock practicing waltz for Watson and Mary's wedding. It is the big day, according to an excited Ms Hudson. The wedding of Watson and Mary is on the day. Sherlock does not share Ms Hudson's excitement and like his landlady, he does not think marriage changes people. Ms Hudson points out to him that he won't possibly understand that because he always lives alone.
Ms Hudson walks down her memory lane and talks about her chief bridesmaid at her wedding, and how they were supposed to be best friends forever, but they hardly saw each other after the wedding. She [Ms Hudson's friend] cried the whole day, saying that it is the end of an era.
Sherlock looks at his best-man dress and says: "into battle." The scene shifts to a mysterious man in uniform getting ready. He is using only one hand to do that.
Watson and Mary come out of the Church as a married couple. Sherlock is standing with them and the photographer asks him to move out of the picture as it is the newly-wed, couple picture. A bridesmaid tells Sherlock that he is going to be "incredibly useful." The incredibly useful means getting first impression information on the interesting looking men at the reception.
The mysterious man arrives at the wedding reception. He is the former commanding officer of Watson, Sholto. He is a good friend of Watson and holds the designation of Major. Sherlock wonders if they are good friends why Watson doesn't talk about him. Mary says that Watson talks about the Major all the time to her. Sherlock is surprised to know that Watson never shuts-up about the Major. Sherlock is jealous and Mary tells him that, "neither of us were the first."
Mycroft is working out and is not at the wedding. Sherlock calls him up and Mycroft tells him that the couple will be delighted to not see him on their wedding day. Mycroft tells Sherlock that it looks like he will be seeing him a lot just like the old time. Like Ms Hudson, he also mentions "end of an era" and adds it is the beginning of "John and Mary, domestic bliss." Sherlock calls it the "beginning of a new chapter." The call ends on Mycroft telling Sherlock, "enjoy not getting involved, Sherlock."
It is time for Sherlock's best-man speech. As expected, Sherlock gets the stage fright and is finding it difficult to continue after the initial two lines. Sitting in the audience, Lestrade remembers the day he and Molly had a conversation about Sherlock being the best-man and the worrying prospect of him giving the speech in front of so many people. The flashback shows a hysterically laughing Ms Hudson and Watson walking in, asking for Sherlock. Ms Hudson mentions telegram and in the present time, Watson gives the hint of telegram to his best-man. Sherlock gets the cue and starts reading the telegrams that have been sent to Watson and Mary, but soon gives-up. He mentions about the first time Watson had asked him to be his best-man.
In the flashback, Watson tells a clueless Sherlock that he needs a best-man for his wedding. Sherlock suggests other names, but Watson says that he wants the two people he loves and care about the most to be at his side on his big day. The first is Mary and the second person is Sherlock. A completely shocked Sherlock does the fluttering of eyes, and does not say anything for a long time.
The best-man speech may have begun with 'terrible' written across it, but then Sherlock soon says all the right things, including saying that Watson is sitting between two people who love him the most in this world [indicating Mary and Sherlock]. Also, he mentions about these two people have a life-time ahead to prove that. Everyone is touched by his speech. They are teary-eyed and Watson gets-up and envelops Sherlock in a tight hug.
Sherlock talks about his and Watson's association in solving cases. The bizarre murder cases that they had solved, together. He talks about two particular cases, the murder of a royal guard and the Mayfly Man.
The royal guard had emailed Sherlock about a man keeping a watch on him, all the time. The guard was murdered before Sherlock or Watson could have a talk with him. It is one of the unresolved murder cases, and at the reception, Sherlock asks for the one key element of the case. Neither Lestrade nor Molly's boyfriend are able to answer that, correctly. Sherlock says that there is only one element in the element and that is while he was busy solving the murder, Watson was trying to save the royal guard's life.
Sherlock also talks about another of their bizarre, unresolved case, 'The Mayfly Man'. Sherlock and Watson were completely sloshed when a woman had visited them. In their sober state of mind, the two would have dismissed her, quickly. The woman had talked about a ghost that she had dated. The man had disappeared after dating her and when she had visited his place, she had found that he had died a day before her date. Sherlock and Watson had visited the man's house but had landed up in a prison cell thanks to their drunken behaviour. Sherlock had gone through a blog on dating men from the spirit world. He had identified women who had similar stories to share. Sherlock could not find something that could link all the women. However, he had identified that they all had some secret. The Mayfly man had stolen the identity and house of the dead men mentioned in the obituary section.
As part of the best-man speech, Sherlock says that his and Watson adventure was full of mystery, murder and mayhem, and now there will be a new adventure for Watson and Mary, which is the beginning of a new chapter. However, he drops his toast drink when he suddenly realises that the woman who had come with her case of dating a ghost had mentioned Watson's full name, John Hamish Watson. Watson hates his middle name and only a handful of people knew his middle name, including Sherlock and Irene Adler. The only time he had made that name public was on his wedding invitation and that invitation card was sent to a limited number of people. Sherlock realises that Mayfly is there in the reception.
Mycroft's apparition in his head tells him that if a person assumes false identity, it suggests of criminal intention. Also, it is suggestive of intelligence and planning, while elaborate planning suggests murder. Sherlock walks around the reception hall, trying to figure out who will be murdered. He texts Lestrade to lock down the place.
Sherlock says to the invitees that "lets play a game. Lets play murder." He realises that Sholto will be murdered. Sherlock gives a slip to Sholto, telling him about that. He tells Watson to save Sholto. In his hotel-room, Sholto intends to kill himself. He tells Watson that that he will open the door only if Sherlock correctly tells how the royal guard was murdered.
Sherlock is able to finally crack that murder mystery. He tells Sholto that a dagger was put in the guard's tight belt, and it became lethal once the binding was removed. Sholto intends to die the same way. However, Sherlock tells him not do that, especially on Watson's wedding day. Sholto opens the door and Watson is there to help provide medical attention. The photographer is caught and is revealed as the Mayfly Man. The death of the guard was a practice run to kill Sholto.
Murder case solved and a life saved, Sherlock plays the violin while John and Mary dance. He says his final vow that he will be always there for Mary and Watson. He then says, "I'll always be there for all three of you." He has correctly deduced that Mary is pregnant. He tells the newly married couple that they have had enough practice and will make wonderful parents. Sherlock adds that they would hardly need him, now that they have a real baby.
The dancing begins. Everyone is happy and dancing. Sherlock sees that and quietly walks out of the wedding hall, probably realising it is the end of an era.
To contact the editor, e-mail:
• Rate this Story
• 0
• 0
This article is copyrighted by IBTimes.com.au, the business news leader
Join the Conversation
IBTimes TV
|
global_05_local_4_shard_00000656_processed.jsonl/114453
|
What is Big Think?
We are Big Idea Hunters…
Big Think Features:
12,000+ Expert Videos
Watch videos
World Renowned Bloggers
Go to blogs
Big Think Edge
Find out more
Models and Stars: You Can Never Look Like Them Because They Don’t Look Like Them, Either
July 22, 2013, 9:48 AM
“I’ll never look like the women with beautiful bodies in the glossy magazines.”
Right. You won’t. Because they don’t.
This wonderful photo compilation by a model generously and compassionately reveals the insider secrets—published photos of male and female stars or models, before and after they’d been edited and photo-shopped.
We all know that images are manipulated, but it’s something else, and consoling, to see precisely how and how much.
Photographic and visual editing is in one sense as old as the Medicis, who insisted that artists improve and “correct” their portraits for the record. This sort of editing is more dispiriting, however, in a photographic genre that seems accurate, and real.
And we’re not talking about minuscule, mercy changes, here, such as the airbrushing of a scratch, or pimple. In some of these photos, entire bellies have been cleaved off, breasts massively augmented, and serious wrinkles magically erased. Some of the models have lost what looks like at least 10 or 15 pounds, all through the instantaneous diet of the virtual X-acto knife.
Magazines will continue to give you these doctored images, just as long as real humans keep falling short of their needs, and real readers keep buying the magazines.
So young women and men, especially, need to develop a high Visual IQ. They have to understand what they’re looking at—really understand it, and internalize it--because the photos are otherwise dangerously and depressingly deceptive. Generically, they “code” as if they’re accurate.
We need to flex our visual IQ by practicing reading the photos as things closer to art, or cartooning, or even human caricature, where the aim is to capture the gist of the body, or a gesture, or to exaggerate its iconic, signature features, but not to represent it truthfully and with ruthless precision, a la Depression documentarian Walker Evans.
There’s nothing wrong with taking pleasure in the images, so long as they’re read visually as representations of reality rather than reality itself.
It’s like those Betty Boop cartoons from the 1930s. No one really expected a woman to look like Betty, with her non-existent waist, bovine eyes, and huge boobs. Instead, she represented a convention of femininity, rendered through artistic liberty and exaggeration.
In a similar way, the Fashion Week runway shows present extreme clothing that few of us would ever actually wear, in order to dramatize and highlight trends in silhouette, color, hem length, fabric, attitude, and so on. The images of the models’ bodies in magazines are as suggestive (not literal) as the dramatic, “editorial” fashions that the models wear on the runway: neither is to be taken entirely literally.
We can take pleasure in the images for what they are: pictures with things that magazine editors and others feel are aesthetically pleasing, ideal physical traits and characteristics, for both the male and female body, that exist somewhere between documentary and expressive art.
Models and Stars: You Can N...
Newsletter: Share:
|
global_05_local_4_shard_00000656_processed.jsonl/114458
|
On Our Radar: Today's Feminist News Roundup, Special Patriarchy-Is-Dead Edition
Big news, everyone! According to Slate's Hanna Rosin, the patriarchy is dead. Like really dead. Super deceased. She has no idea why feminists won't stop banging on about inequality and stuff, because she's just not seeing it. Ladies in Congress exist, y'all! Feminist pundits sometimes get airtime! White ladies with books to sell, like Rosin herself, feel totally equal! So in honor of patriarchy's cool new dirt nap, let's read a roundup of all the news that's on our radar that we might call "feminist" but that Rosin would probably just label "victimy whining."
We'll miss you, patriarchy! Kinda odd that many of your fruits (vajazzling! rape culture! no mandatory maternity leave!) seem to be sticking around, though. [The Cut]
• A group of more than 100 Latina activists who traveled to Washington to advocate for an immigration-reform bill that recognizes the need for family support and reproductive justice were arrested after a peaceful protest on Capitol Hill. [National Latina Institute for Reproductive Health]
• What do the tech-bro events of this past week have in common with Riptide, the new history of how the rise of new media disrupted the old status quo of journalism? Both almost completely ignore women's participation in shaping the culture of digital technology and information. [LinkedIn Today]
• Remembering Chien-Shiung Wu, the female physicist who along with two male coworkers disproved The Parity Law in the 1950s. Her male coauthors—but not Wu—were awarded the Nobel Prize. [American Association of University Women]
• Bitch has written before about the conservative Catholic phenomenon of "stay-at-home daughters." This week brings a new video by one man who wants to warn others about the dangers of sending young women to college. Among them: learning, independence, and autonomy. Wow, it's a really good thing that the patriarchy doesn't exist anymore; otherwise this could seem like a textbook example. [Jezebel]
Big Brother is a crappy show, but we should definitely listen when its host, Julie Chen, talks about feeling pressured to have eyelid surgery when she was younger to better conform to Western notions of beauty. That would never happen now, of course, what with patriarchy and all its beauty imperatives being totally dunzo. [Angry Asian Man]
• The candy chain It'Sugar is selling a classy little baby onesie emblazoned with the words "Hung Like a Preschooler." If you're interested, you can sign a petition asking the chain to stop sexualizing babies' bodies. (Don't use the word "patriarchy," though, since everyone knows that has nothing to do with penis size as a measure of masculinity.) []
• Anyone who takes public transportation is no doubt familiar with the phenomenon of men taking up more than their fair share of space while women are expected to crunch up all their limbs to accomodate them. A new Tumblr documents some of the most egregious examples, including one that appears to be Robb Stark of Game of Thrones. It's not patriarchy, though! It's biology. You know, because testicles need air. That's just science. [Men Taking Up Too Much Space on the Train]
man holding a cane and sitting with his legs spread wide on a subway seat
Sorry about that Red Wedding, guy, but your comfort is not more important than others'.
Subscribe to Bitch
2 comments have been made. Post a comment.
Men taking up more space
This is something I notice ALL THE TIME as a daily utilizer of public transit in Boston. Men never look where they're going, EVER, to see if anyone might be in their way when they are walking, changing direction, stopping, or sitting down. They simply feel "entitled" to their space and screw anyone else who might be near them. Everyone else needs to watch out for them, not the other way around. SO inconsiderate.
Did y'all see Genevieve
Did y'all see Genevieve Valentine's post about Dealing With It? "Lavaballing"--the practice of spreading one's legs as wide as possible in order provide cooling airflow to one's genital areas, which are obviously on the verge of melting through the seat due to their extreme heat output. (The post includes the fallout from her reporting harassment at a Sci-Fi con, but it's also a discussion about gender expectations for dealing with intrusions into your time and space in general, from childhood onward.)
|
global_05_local_4_shard_00000656_processed.jsonl/114471
|
Last meal
From Wikipedia, the free encyclopedia - View original article
Jump to: navigation, search
A condemned prisoner's last meal is a customary part of their last day before execution. Often, the day of or before the appointed time of execution, the prisoner receives a last meal and religious rites, if they desire. In the United States, inmates generally may not ask for an alcoholic drink. Other countries have different traditions, such as the "little glass of rum" granted to the condemned in historical France in the minutes before execution, but no formal last meal is offered as they were told of the impending executions only on the fatal morning, generally minutes before the actual event.[1]
In many countries, the prisoner may, within reason, select what the last meal will be and the authorities do their best to satisfy the request.
In pre-modern Europe, granting the condemned a last meal has roots in superstition in that a meal was a highly symbolic social act. Accepting freely offered food symbolized making peace with the host. The guest agreed tacitly to take an oath of truce and symbolically abjured all vengeance. Consequentially, in accepting the last meal, the condemned was believed to forgive the executioner, the judge, and witness(es). The ritual was supposed to prevent the condemned from returning as a ghost or revenant to haunt those responsible for his or her killing. As a superstitious precaution, the better the food and drink, the safer the condemned's oath of truce. The law of 18th-century England, however, as noted by Blackstone's Commentaries on the Laws of England, ca. 1765, made no such concession and stated that "during the short but awful interval between sentence and execution, the prisoner shall be kept alone, and sustained with only bread and water".[2]
The provision of alcohol to the condemned may well have its roots in biblical times: "Give strong drink unto him that is ready to perish, and wine unto those that be of heavy hearts."[Proverbs 31:6] The Talmud instructs that those condemned to death are to be intoxicated before execution is carried out, most likely drawing from this verse.
Contemporary restrictions[edit]
In the United States, most states give the meal a day or two before execution and use the euphemism "special meal". Alcohol or tobacco are usually denied. Unorthodox or unavailable requests are replaced with substitutes. Some states place tight restrictions. In Florida, the food for the last meal must be purchased locally and the cost is limited to $40.[3] In Oklahoma, cost is limited to $15. In Louisiana, the prison warden traditionally joins the condemned prisoner for the last meal. On one occasion, the warden paid for an inmate's lobster dinner.[4]
Sometimes, a prisoner shares the last meal with another inmate (as Francis Crowley did with John Resko) or has the meal distributed among other inmates (as requested by Raymond Fernandez).[5]
In September 2011, the state of Texas abolished all special last-meal requests after condemned prisoner Lawrence Russell Brewer requested a huge last meal and did not eat any of it, saying he was not hungry. His last-meal request was for a plate of two chicken-fried steaks with gravy and sliced onions, a triple-patty bacon cheeseburger, a cheese omelet with ground beef, tomatoes, onions, bell peppers and jalapeños, a bowl of fried okra with ketchup, a pound of barbecued meat with half of a loaf of white bread, a portion of three fajitas, a meat-lover’s pizza (topped with pepperoni, ham, beef, bacon, and sausage), a pint of Blue Bell, a serving of ice cream, a slab of peanut-butter fudge with crushed peanuts, and a serving equivalent to three root beers (normally non-alcoholic). The abolition followed a complaint by a Texas Senator, John Whitmire (Democrat, of Houston), who called the meal "inappropriate".[6][7][8][9] The tradition of customized last meals is thought to have been established around 1924 in Texas.[10]
Documented last meal requests[edit]
Notorious condemned prisoners[edit]
United States[edit]
Other prisoner requests[edit]
See also[edit]
1. ^ Lynn-Geroge, Michael. "The Writing Lesson: From the Dragon’s Teeth to Tristes Tropiques". The International Journal of the Humanities 4 (8): 61–72. Retrieved 23 September 2011.
2. ^ Blackstone's Commentaries on the Laws of England
3. ^ "Death Row Fact Sheet". Florida Department of Corrections. Retrieved 11 November 2007.
4. ^ Last-meal requests come to an end on Texas death row (Houston Chronicle, 22 September 2011)
5. ^ The Book of Lists #3. Bantam. 1983. pp. 85–87. ISBN 0-553-27868-1.
6. ^ Ward, Mike. "Last Meals for Condemned Cons Off Menu". Austin American Statesman.
7. ^ "Texas jails abolish last meals after uneaten banquet". BBC Online. 23 September 2011. Retrieved 24 September 2011.
8. ^ Last meal requests come to an end on Texas death row
9. ^ Fernandez, Manny (23 September 2011). "Texas Death Row Kitchen Cooks Its Last ‘Last Meal’". The New York Times. Retrieved 24 September 2011.
10. ^ Last-meal requests off death row menu
11. ^ a b The Book of Lists #3. Bantam. 1983. p. 85. ISBN 0-553-27868-1.
12. ^ a b c The Book of Lists #3. Bantam. 1983. p. 86. ISBN 0-553-27868-1.
13. ^ a b c d e "No Seconds". TIME Magazine. 23 May 1994. Retrieved 11 August 2007.
14. ^ "Mona Fandey - A modern witchcraft murder.". Retrieved 24 April 2013.
15. ^ "Mona Fandey, hubby and assistant hanged". The Star (Malaysia). November 3, 2001. Retrieved 24 April 2013.
16. ^ Ned Parker and Ali Hamdani (1 January 2007). "How one mobile phone made Saddam's hanging a very public execution". The Times (UK) (London). Retrieved 7 May 2010.
17. ^ Google. "Saddam Hussein Last Meal". Google.
18. ^ Shaikh, Asseem; Mihir Tanksale; Umesh Isalkar (22 November 2012). "Ajmal Kasab sang in cell the night before". Times of India (Pune). TNN. Retrieved 7 December 2012.
19. ^ "John Martin Scripps". Retrieved 2013-06-29.
20. ^ The Last to Die: Ronald Turpin, Arthur Lucas, and the End of Capital Punishment in Canada. Dundurn. 2007. p. 176. ISBN 978-1550026726.
21. ^ a b "Last Meals on Death Row (2002)". Dead Man Eating. Retrieved 11 August 2007.
22. ^ "Clarence Ray Allen". Clark County Prosecutor. Retrieved 29 September 2010.
23. ^ "'Gainesville Ripper' Danny Rolling Executed". WESH. 25 October 2006. Retrieved 18 October 2010.
24. ^ "The 29,000 calorie last meal: Murderer who dismembered his victim requests last meal with two pizzas, five lbs of cheese, super sized french fries, nachos, cherry Cokes, milkshakes, strawberry ice cream and more". Daily Mail. 21 June 2012. Retrieved 22 June 2012.
25. ^ a b John Peck (5 January 2006). "Last Meals". Tucson Weekly. Retrieved 11 August 2007.
26. ^ Katherine Ramsland. "Gary Gilmore: Death Wish". Crime Library. Retrieved 11 August 2007.
27. ^ Meserve, Jeanne; Mike M. Ahlers (11 November 2009). "Sniper John Allen Muhammad executed". Jarratt, Virginia: CNN. Retrieved 2 October 2010. "The lawyer said Muhammad's last meal was "chicken and red sauce, and he had some cakes."
28. ^ "Michael Bruce Ross". Clark County Prosecutor. Retrieved 7 January 2010.
29. ^ Ryan, Perry T. (1992). "24. Final Preparations for the Hanging". The Last Public Execution in America. Ryan, Perry T. ISBN 0-9625504-5-0. Retrieved 31 January 2011.
30. ^ Paula Tully Bryant. "Timeline: 1989 – A History of Corrections in Florida". Florida Department of Corrections. Retrieved 11 August 2007.
31. ^ Catherine Quayle (11 June 2001). "Execution of an American Terrorist". Court TV.
32. ^ Rita Cosby (12 June 2001). "Timothy McVeigh Put to Death for Oklahoma City Bombings". FOX News. Retrieved 11 August 2007.
33. ^ William E. Schmidt (3 November 1984). "First Woman Is Executed in U.S. Since 1962". The New York Times. Retrieved 11 August 2007.
34. ^ Mark Gribben. "William Bonin: The Freeway Killer". Crime Library. Retrieved 11 August 2007.
35. ^ "Allen Lee "Tiny" Davis". Clark County Prosecutor. Retrieved 17 April 2008.
36. ^ "Last Meals on Death Row (2006)". Dead Man Eating. Retrieved 11 August 2007.
37. ^ "Killer Calmly Goes To Death". The Florence Times. Associated Press. 7 June 1958. p. 1. Retrieved 4 October 2010.
38. ^ "Dennis Wayne Bagwell". Clark County Prosecutor. Retrieved 3 July 2008.
39. ^ "Last Meals on Death Row (2003)". Dead Man Eating. Retrieved 11 August 2007.
40. ^ "Wrinkles Awaits Death For Triple Murder". WRTV. 10 December 2009. Retrieved 18 October 2010.
41. ^ Ryckman, Lisa (14 October 1997). "Davis pays final price". Rocky Mountain News. Retrieved 18 October 2010.
42. ^ Wolcott, Martin Gilman (1 January 2004). The Evil 100. Citadel Press. p. 286. ISBN 978-0-8065-2555-6. Retrieved 5 June 2010.
43. ^ "Final Meal Requests." Texas Department of Criminal Justice. 1 October 2003. Retrieved on 4 December 2010.
44. ^ Hal Schindler (28 January 1996). "Taylor's Death Was Quick . . . But Some Weren't So Lucky". The Salt Lake Tribune. Retrieved 26 June 2010.
45. ^ Murphy, Sean (17 December 2010). "Oklahoma executes man with new drug combination". The Oklahoman. Associated Press. Retrieved 31 January 2011.
46. ^ Bryson, Amy Joi (14 October 1999). "Death wish Execution comes 12 years after murder at rest stop". Deseret News. p. 3. Retrieved 27 September 2010.
47. ^ a b c "Final Meal Requests". Texas Department of Criminal Justice. 12 September 2003. Archived from the original on 2 December 2003. Retrieved 11 August 2007.
48. ^ "Man Put to Death in Pennsylvania". San Francisco Chronicle. 3 May 1995. Retrieved 18 October 2010.
49. ^ Scott Lawrence (September 21, 2011). "Lawrence Russell Brewer refuses to eat final meal". KFDM News. Archived from the original on 2012-02-17. Retrieved 2013-02-10.
50. ^ "Texas kills fancy last meal requests on death row". Reuters. 23 September 2011. Retrieved 22 September 2011.
51. ^ The Book of Lists #3. Bantam. 1983. pp. 86–87. ISBN 0-553-27868-1.
52. ^ Ashley Fantz (9 May 2007). "Killer orders pizza for homeless as last meal". CNN. Archived from the original on 15 May 2007. Retrieved 11 August 2007.
53. ^ "Last Meals on Death Row (2007)". Dead Man Eating. Retrieved 12 August 2007.
54. ^ Beam, Christopher. "Can a prisoner request anything for his last meal?". Slate. Retrieved 5 June 2010.
55. ^ "Capital Punishment – Harris, Robert Alton". California Department of Corrections and Rehabilitation. Archived from the original on 8 August 2007. Retrieved 11 August 2007.
56. ^ Lance Morrow (4 May 1992). "Television Dances With the Reaper". TIME Magazine. Retrieved 11 August 2007.
57. ^ Jonathan Kellerman, ed. (2008). "Dean of Death Row (by Tad Friend)". The best American crime reporting, 2008. New York: Harper Perennial. p. 143. ISBN 0-06-149083-0.
58. ^ Sanchez, Ray (18 June 2010). "Ronnie Lee Gardner Executed by Firing Squad in Utah". Good Morning America. pp. 1–4. Retrieved 18 June 2010.
59. ^ "Stephen Wayne Anderson". Clark County Prosecutor. Retrieved 29 September 2010.
60. ^ Glod, Maria (23 September 2010). "Teresa Lewis pronounced dead by Va. authorities". The Washington Post. p. 2. Retrieved 23 September 2010.
61. ^ Collins, Nick (7 December 2010). "Last meals: weird requests on death row". The Daily Telegraph. Retrieved 5 December 2011.
62. ^ Schwartzman, Paul; Finnegan, Michael (20 March 1995). "Grasso Is Put To Death; Poem, Complaint His Final Words". New York Daily News. Retrieved 26 December 2009.
63. ^ Savali, Kirsten West (21 September 2011). "Troy Davis To Refuse His Last Meal: "This Meal Will Not Be My Last"". Your Black World. Retrieved 5 December 2011.
64. ^ "Federal govt.'s last execution was in Iowa in 1963". USA Today. 20 June 2001. Retrieved 11 August 2007.
65. ^ "Last Meals on Death Row (2005)". Dead Man Eating. Retrieved 11 August 2007.
Further reading[edit]
External links[edit]
|
global_05_local_4_shard_00000656_processed.jsonl/114503
|
June 13, 2012
According to this, Chinese equipment makers have built backdoors into their hardware (which may be the root of Mr. Panetta's remarks).
First, a little perspective: Most intelligent networking equipment, manufactured by almost any vendor anywhere in the past 20 years have been shown to contain some kind of a backdoor. Master passwords for routers and secret technician codes for mobile phones or set top boxes have been published over the year (not to mention those secret key combination in Microsoft products that invoke flight simulator games). This development begs two questions:
What percentage of infrastructure, civilian as well as military, is vulnerable to APT (enemy) shutdown?
The answer really depends on which country, what infrastructure and who is the enemy. In general large modern economies with decentralized infrastructure are less vulnerable. If you have twenty telcos, for example, each using equipment from 2-3 different vendors than the chances for a single blow by an adversary that controls a back door in the equipment of a single vendor are low.
What can companies do about it?
The “text book” mitigation strategy is indeed the use of redundant equipment by multiple vendors. This recommendation conflicts with the attempt to lower the costs of deployed system (as operating two different types of equipment by the same team is of course more costly).
Posted by Imperva Blogger at 02:46:41 PM
Verify your Comment
Previewing your Comment
Your comment could not be posted. Error type:
Having trouble reading this image? View an alternate.
Post a comment
|
global_05_local_4_shard_00000656_processed.jsonl/114513
|
From the Editor: Being Sure God Exists
The “nones” are on the rise. Those who record “no religious preference” on surveys and censuses is growing year by year. Which is why Session 2 of Robert Jeffers Honest to God: Real Questions People Ask is so poignant. In a recent blog post, Dr. Ronnie Floyd, General Editor for Bible Studies For Life, examined Psalm 19 and discussed the difference between general revelation and special revelation. Read more
Speak Your Mind
+ 7 = thirteen
|
global_05_local_4_shard_00000656_processed.jsonl/114514
|
The smart way to add maps to smart websites
1. Drag the Mapanui link to your bookmarks bar: Mapanui
(but take note of the privacy notice)
2. Whenever you visit a site's About/Contact page, or any (smart*) page with an address, hit the Mapanui bookmark.
3. If the address didn't resolve on the map automatically (not a smart page), hit the search link and enter the address data to find it manually.
Go ahead, click the link now! I dare you. This page contains some address information.
-New York 40.756040 -73.986941
-Sydney, Australia -33.85862 151.213331
Privacy notice:
Because of the hosted nature of this bookmarklet (hosted on the server), please be advised that Mapanui is able to see where it is being used, as it is called from the referring site (the site with the address you want to map). We are not able to identify you, nor do we use this referral information at all. But if you feel uncomfortable with this, then please don't use the Mapanui bookmarklet.
*Note: By "smart" page, we mean a webpage for which the page author has added additional, semantic information (Microformats) about the (address) data on the page. This allows third-party applications, like search engines, web services, Mapanui,..., to easily find and use that data.
Mapanui sample
|
global_05_local_4_shard_00000656_processed.jsonl/114531
|
Kept your kids from hearing President Obama's school speech? Congratulations.
on September 09, 2009 at 7:27 AM, updated September 09, 2009 at 7:32 AM
Congratulations to all of you parents who took a stand, exercised your rights in a free society and kept your kids from hearing the president's back-to-school address.
Goodness knows you wouldn't want your little Johnny or Janey indoctrinated with such radical ideas as taking responsibility for their own lives.
How dare the president presume to tell your children to pay attention to their teachers, listen to their parents and grandparents and "put in the hard work it takes to succeed?" Who is he to suggest that "when you give up on yourself you give up on your country?" Geez, if kids believed that sort of drivel, they'd never be able to blame the rest of the world for their failures.
With your superior wisdom and fine parenting you've instead taught your children other valuable lessons, like intolerance. Sure, the United States is a democracy, but that doesn't mean we have to listen to people we don't agree with.
And that goes for the president especially. We're Americans -- we haven't respected a president since George Washington. Unless we voted for him, of course. So good for you for teaching your child to tune out the president until one you like comes along.
Johnny also learned that school is optional if you don't like the lesson, or the lesson-giver. Maybe you should just keep him out of school altogether so you can teach him that man didn't really land on the moon, 9/11 was a government conspiracy and President Obama's birth certificate is phony.
You don't want your children going to a school that allows the president to fill their heads with dangerous messages like this: "Every single one of you has something that you're good at. Every single one of you has something to offer."
It's enough to make them think they could grow up to be president.
|
global_05_local_4_shard_00000656_processed.jsonl/114594
|
Come See My Dead Person LP Whistles Past the Boneyard
Categories: Listen Up!
CMSDP 1214 B.jpg
Photo courtesy of CSMDP
Come See My Dead Person is one of those bands people have constantly tried to get me into over the years, but the time never seemed right. Well, the release of their new self-titled album should be a good enough place to begin, I thought, and I'm very glad I did.
The sound is a mix of pretty much every single genre that has a set of nuts. Country, blues, jazz, klezmer, zydeco, psychobilly, rock, even a few little moments of Rasputina-esque goth, rock and ragtime weave themselves in and out of the 14-song funeral procession.
No, not a funeral procession. That's inaccurate. It's more like a wake, a proper Irish one where there's plenty of joking, good stories, as well as maudlin moments of mourning and probably even a good dive across the coffin. Alcohol, too, but I probably didn't really need to say that.
Things really get cooking with "John Doe" early in the experience. The track is a toe-tapping, high-paced road song that would sound perfect in an episode of True Blood as some vamper left a trail of passengers with ill-luck bloody and dead behind her. If there is another song that manages to be a rockin' ode to a corpse experiencing its own decomposition then there can't be many.
That playful morbid streak is probably the most defining aspect of Come See My Dead Person. It's certainly the parts that are going to garner the most comparisons to The Nekromantix and, more accurately, to The Creepshow. CSMDP, though, manages a subtlety in their approach that is less overtly ghoulish and closer to the darker moments of honky-tonk.
Take "Kidney in a Jar." If you're not really paying attention you might be able to hear it just as a dancehall tune, but there are deep-cutting turns of phrase that keep it well outside the Social Distortion "Ball and Chain" tone. Not to mention I still want to know why someone's granddaddy's left kidney was in a pickle jar in the first place.
Location Info
Cactus Music & Video
2110 Portsmouth St., Houston, TX
Category: Music
My Voice Nation Help
Sort: Newest | Oldest
Now Trending
Houston Concert Tickets
From the Vault
|
global_05_local_4_shard_00000656_processed.jsonl/114607
|
The method we'll use to transfer context between the web site and our application is a simple file. I refer to these files 'Launch Files' and the real trick is getting windows to open our application when it sees them instead of prompting the user to save to disk.
You may not realize it but you've probably seen this before. Outlook does this with V-Card, V-Calendar and ics files. It's the same mechanism that allows you to subscribe to a SharePoint calendar in Outlook with a single click. (In truth it's 2 clicks in Vista because UAC asks the user if it's OK to send data to the app. But that's a topic for another day.)
The Launch File
The first thing you need to do is determine the structure for your launch file. I recommend XML because it's easy to generate and the format can grow with your application over time. You can place any data you want in this file, but keep in mind that it serves as context between your web site and your smart client.
File Extensions and Associations
Once you've determined the file format you need to settle on a unique file extension. It doesn't really matter what the extension is, it just has to be unique. This is no different than files intended for the local disk.
With the extension in mind, next you need to modify your application installer to include the new file type. The file type association registry keys are where you instruct Windows to launch your application whenever it sees a link for your file. Here's an example screenshot from a setup project in Visual Studio:
EditFlags indicates what explorer should do with a particular file type and/or defines what class it is. 0x10000 turns off the "Confirm open after download" box in IE. If this flag is set, the file will be automatically downloaded to the browsers temporary folder and its 'open' verb will be executed.
For more details, read the File Types article on MSDN.
Existing Application Instances
The next thing you want to consider is what to do if the application is already running. By default, the registry settings above will simply start another instance of your application. Instead, you probably want to notify an existing instance. That's why in the screenshots below you will see the 'open' verb is associated with a DDE command (ddeexec). If the application is not already running, Windows starts it before the DDE command is sent.
In this example, Windows will send the DDE command [Import("<FilePath>")]. The Application and Topic names are flexible, but you'll want to filter on them later.
Net DDE. I'm including this for sample purposes only and it doesn't come with any kind of warranty. :)
static void Main()
// Create DDE client
dde = new DDEClient();
// Filter on app name
dde.AppName = "Cartographer";
// Start listening for DDE messages
dde.Execute += new DDEExecuteHandler(dde_Execute);
// Run application as normal
Application.Run(new MainUI());
And the DDE message handler looks something like this:
// We only pay attention to the first command
DDECommand command = commands[0];
// The only command we support is Import.
if (command.Name != "Import") return;
// Get the launch file path
string launchFilePath = command.Params;
// TODO: Open the launch file and do something
I hope this helps, and happy coding.
|
global_05_local_4_shard_00000656_processed.jsonl/114610
|
What Phoenix Restaurants Have the Best Playlists?
Categories: Let's Eat!
Desmond Dekker, one of the dudes we heard spinning at the Parlor Pizzeria.
See also: Ten Favorite Playlists at Metro Phoenix Restaurants
We like to think we've got similar attitudes about music and food: There's a time for the out-there stuff, there's a time for the cheap and greasy, and there's a time for everything in between.
Whether you're into dining on bone marrow and Filipino sisig to a Sun Ra/La Monte Young record or getting ribs and cheeseburgers while blasting War and AC/DC, a good soundtrack can make a great meal that much better.
Our foodie pals at Chow Bella put up a great post today checking out the playlists heard overheard at some of Phoenix's finest grub-spots. The results range from eclectic (Pita Jungle) and soulful (the excellent sounds at the Parlor Pizzeria), to Tumblr-ific (the P-Fork grooving sounds at Astor House) and brah-dawg (the fratty tunes at Brat Haus).
Take a few minutes to peruse the playlists, then leave a comment with your favorite Phoenix restaurant sounds.
On that note, here's Wendy Rene's smokin' Stax cut "Bar B-Q."
Follow us on Twitter and friend us on Facebook
Location Info
Pita Jungle
1850 W. Southern Ave., Mesa, AZ
Category: Restaurant
The Parlor Pizzeria
1916 E. Camelback Road, Phoenix, AZ
Category: Restaurant
Astor House: Coronado 'Cue & Southern Speakeasy
2243 N. 12th St., Phoenix, AZ
Category: Music
Brat Haus
3622 N. Scottsdale Rd, Scottsdale, AZ
Category: Restaurant
My Voice Nation Help
Sort: Newest | Oldest
I really like the music at The Main Ingredient! It's always hip-hop I've never heard before that's quality.
Now Trending
Phoenix Concert Tickets
From the Vault
|
global_05_local_4_shard_00000656_processed.jsonl/114652
|
Saturday, June 13, 2009
Book addendum...
Anonymous said...
'The Painter of Battles'
J - tR
Nick Pacific said...
definitely great book.
Carteach0 said...
Funny thing, that. I'm looking at that book on the shelf right in front of me.
Marja said...
Better be good. I just bought it from a Finnish net shop, on your recommendation. Will get it in a couple of weeks.
Mad Saint Jack said...
OK, I admit I bought the book for the cover photo. Turned out to be one of my favorites.
WV: subilm
Subliminal by They Might Be Giants
Dr. StrangeGun said...
Speaking of rare books, I've been hunting a copy of "Ignition!" for years... found out about it just after some college press that was selling copies from microfiche for $80 folded up, and that seems to be the only source.
Damn thing sells for $300 and up regardless of condition.
Closest thing to an NFA/Hughes amd. regulated book I've ever seen.
heh, capcha = "grate".
Oleg Volk said...
If you are so near Nashville, why don't you stop by for a visit. Call me.
dave said...
read it. Great book. can't recommend it enough.
Ed Foster said...
A buddy of mine is half Serb Christian, half Serbian Moslem, and assures me that, as General DeChastellain, the NATO commander said, "There are no good guys here".
Boy Clinton selectively demonized the Serbs to draw attention from his own peccadillos. Yes, Milosevic deliberately used his worst prison sweepings as irregulars. And thousands of Afgani and Irani volunteers used by the Moslems were even worse.
An interesting bit of history, delivered from as impartial an observer as one could find (Milo hates both sides).
The Moslems in Bosnia are the remains of the medieval Serbian middle class, which converted to Islam to keep it's property and enjoy a tax rate half that of their Christian neighbors.
They were also exempt from surrendering their babies to be raised as a Janissaries by the Turkish army, unlike Christians.
The king and army of Serbia died at the battle of Kosovo Polye, the aptly named Blackbird Fields, and the peasants were all that were left of the culture.
They rose in hopeless rebellions for almost four centuries, until, in the 1870's, they shamed the Czar into giving them support, and threw the Turks out.
The surviving Moslems, called "Baby-Stealers", were driven across the Danube into the wilds of Bosnia.
During WWI, the Moslems joined the Turks again, and administered the campaign of butchery and torture carried out against the Serbian population after the Serb army had been driven back into Greece.
When King Peter and his army fought their way back into the country again, the Moslems once more paid the price for their actions, the survivors again seeking the security of Bosnia's hills.
During Hitlers time, the Moslems joined the Nazis and formed their most effective SS units in the campaign that killed off almost half the world's supply of Serbs.
At war's end the usual cycle of reprisal didn't happen, as a Croatian named Tito, "The Only Yugoslav", placed regular army troops throughout Bosnia and required all priests and imams to get real jobs, confiscated the churches and mosques, saying "Do the religion thing on your own time, on your own property".
Sadly,the enforced peace lasted only as long as Tito.
When the fighting started again, the regular army units in Bosnia, heavily Serb in the tanks, armor and artillery units, gave the national government a major advantage.
German and American support gave the Croatians an enourmous edge over the Serbs, who were quickly driven out of the oil fields of eastern Croatia.
In Bosnia, the country was checkerboarded with Serb, Moslem, Albanian, and Croatian villages, all of which were at war with most of their neighbors.
It was common to see a Moslem village come to the rescue of a Serb village, in order to gain an advantage over a Croatian village they both feared, and vice-versa. It was, is, a total madhouse, and was brought to some form of stability only by the organization of the Albanian Moslems, mostly 20th century illegals who jumped the border.
The Kosovo Liberation Army is a criminal organization that controls most of the drugs, prostitution, car theft, and white slavery in central Europe.
They were on the State Department's list of bad guys until they were legitimized by Mr. Clinton after their successfully driving out a majority of the province's Serbs, Turks, and twenty plus other ethnic groups.
Now they openly hunt the few remaining Serbs, Croatians, and other holdouts. Last year they killed a Serb mayor, knowing it would yield an excellent concentration of targets at the cemetery, all of which were massacred. I'm not usually a cursing man, but FUCK THEM ALL!
Milo is married to a classy little French girl who understands his demons and gives him an anchor to swing around. He deserves it, he's a fine man.
As to the former Yugoslavia, may I suggest Kim Du Toit's idea for fixing Africa, to whit: Build a wall around it, then throw ammunition and raw meat over it until the noise and smoke stops.
Anonymous said...
Anonymous says "The Painter of Battles". (Arturo Perez-Reverte is the author.)
I agree.
And Tam, thanks for the tip.
Ed Foster said...
Anonymous, please try Reverte's historical fiction stuff. The Captain Alatriste series obviously had a lot to do with LT Leary's adventures, and I suspect Adele Mundy is in part a homage to Adele De Otero in "The Fencing Master".
Off and on, I'm trying to read some of his stuff in the original Spanish, but cracking the dictionary every two sentences does reduce the suspense a tad.
Still, even in English, the prose is superb, and the action amazingly real. The concept of an honorable man in a corrupt time, clinging to that honor as the only excuse for existence, rings more truely every day.
|
global_05_local_4_shard_00000656_processed.jsonl/114666
|
Medieval manuscripts blog
21 November 2012
Pop Goes the Weasel
If you have been reading this blog on a regular basis, you may have discovered that beavers used to gnaw off their testicles to evade hunters, that owls were associated with sickness, that monkeys could play bagpipes, and that people used to eat unicorns in the Middle Ages. But none of those marvellous beasts can quite match the magnificent weasel, which at various times was said to conceive young through their mouths, to give birth through their ears, and to be able to cure other animals.
Detail of a miniature of a fox, afflicted with dropsy, being cured by a weasel, in Ulrich von Pottenstein, Spiegel der Weisheit: Salzburg, c. 1430 (London, British Library, MS Egerton 1121, f. 109v).
What lent the weasel these supernatural qualities is unknown, but it is curious to note that different cultures have attached different significance to this animal. For example, in ancient Greece a weasel around the house was a sign of bad luck, and even more so if a girl was about to be married -- the animal was believed to be an unhappy bride who was transformed into a weasel, and delighted in destroying wedding dresses. Native Americans likewise regarded weasels as a bad omen, since crossing their path led to a speedy death; but elsewhere, including Macedonia and in the territory of the Wends (the western Slavs), weasels brought good fortune.
A bas-de-page scene of weasels, who are said to conceive young through their mouths, and to give birth through their ears, in the Queen Mary Psalter: England (London/Westminster or East Anglia?), between 1310 and 1320 (London, British Library, MS Royal 2 B VII, f. 112v).
The medieval tale Eliduc, by Marie de France, contains another story of the weasel's miraculous powers. A female weasel stumbled across the body of her male companion, and ran to the neighbouring wood where she fetched a certain red flower. She then placed the flower in the mouth of her partner, who was instantly revived, and the happy weasels ran away together. Observing this amazing recovery, the flower was used in turn to revive a damsel who had collapsed in a swoon, and who so happened to be Eliduc's long-lost love.
Miniatures of a weasel and other animals, including a cat and a hedgehog: England, middle of the 13th century (London, British Library, MS. Harley 3244, f. 49v).
Those of you familiar with English nursery rhymes may also recall that the weasel turns up in "Half a pound of tuppeny rice" ... though in that case perhaps simply to find a word that rhymes with "treacle"! We're sure you would agree that there must be more to the weasel than meets the eye ...
Marginal drawings of a weasel and other animals, in Gerald of Wales, Topographia Hibernica: England (Lincoln?), late 12th or early 13th century (London, British Library, MS Royal 13 B. VIII, f. 11r).
Verify your Comment
Previewing your Comment
Your comment could not be posted. Error type:
Having trouble reading this image? View an alternate.
Post a comment
|
global_05_local_4_shard_00000656_processed.jsonl/114693
|
mary-the-penitent.jpgNumber 131 of the Rite of Penance, gives us something of a Jekyll-and-Hyde reading. The first six verses are one of the most powerful laments in the Old Testament. The prophet Micah has really hit bottom, hasn’t he? Everyone is under suspicion: political leaders, friends, wives and children.
The faithful are gone from the earth,
among (people) the upright are no more!
They all lie in wait to shed blood,
each one ensnares the other.
Their hands succeed at evil;
the prince makes demands,
The judge is had for a price,
the great man speaks as he pleases,
The best of them is like a brier,
the most upright like a thorn hedge.
The day announced by your watch!
your punishment has come;
now is the time of your confusion.
Put no trust in a friend,
have no confidence in a companion;
Against her who lies in your bosom
guard the portals of your mouth.
For the son dishonors his father,
the daughter rises up against her mother,
and a (person’s) enemies are those of (their) household.
But as for me, I will look to the Lord,
I will put my trust in God my savior;
my God will hear me!
A long litany of mistrust is punctuated twice. A warning at verse 4cde: punishment and confusion. The prophet concludes his litany with an acclamation of trust. Micah looks to God–and no other.
We might ask why this litany is included. Is it an examination of conscience, and are we to see ourselves among corrupt leaders and unfaithful family members? Are ordinary sins so gross and exaggerated? Or is it more likely we see ourselves, with Micah, as victims beset by people who don’t care, don’t understand, and don’t love us? My own sense is that this passage has a broader footprint. Didn’t the Lord allude to verse 6 in his warning of divisions in the household?
The Saturday of the second week of Lent has a commonality with the Reconciliation Lectionary, namely the following three verses, which are appended to the ones above:
Who is there like you, the God who removes guilt
and pardons sin for the remnant of his inheritance;
Who does not persist in anger forever,
but delights rather in clemency,
And will again have compassion on us,
treading underfoot our guilt?
You will show faithfulness to Jacob,
and grace to Abraham,
As you have sworn to our fathers
from days of old.
When I work with people preparing liturgy–engaged couples, mourners, or youth–I observe that we can take one of three approaches. We can find Scripture that is suggestive of a person, perhaps like the worthy wife of Proverbs 31 (a wedding selection) or the enthusiastic Zacchaeus (Rite of Penance 194).
We might look for a reading that illustrates a holy principle, like love or the seven gifts of the Holy Spirit.
We can also engage a text that describes God. And this is what we have in Micah 7:18-20, the last three verses of this prophetic book. This short passage, placed in context of a well-celebrated reconciliation, is as compassionate and tender as the previous verses are harsh and skeptical. Perhaps God has reason to be harsh and skeptical of many of his believers. We are the sons and daughters who stray, who betray the principles and honor of the Christian household.
But we have a God who not only forgives us, but who actually “delights” in showing us mercy. What a concept! As enthusiastically as we might hold grudges against a leader, a neighbor, or even the one who shares our marital bed, God feels the same way about forgiving us.
On second thought, perhaps that litany of verses 2-7 is needed. It places raw human evil in perspective. Perhaps it raises a hint of guilt in us. Perhaps it raises more. However much we bring to the Lord in the Sacrament of Penance, we will encounter a God who will like nothing more than to take the grossest of our sins and toss it into the ocean depths.
About these ads
About catholicsensibility
Leave a Reply
You are commenting using your account. Log Out / Change )
Twitter picture
Facebook photo
Google+ photo
Connecting to %s
|
global_05_local_4_shard_00000656_processed.jsonl/114694
|
Quote Originally Posted by matthayzon89 View Post
So, once it breaks it up into parts, how is it successful in accessing a whole string via 1 array slot?
What does the above statement mean?
Are you using the increment operators?
char *names[3];
char **p = names;
p[0] /* 1st array slot... names[0] */
(++p)[0] /* 2nd array slot... names[1] */
(++p)[0] /* 3rd array slot... names[2] */
|
global_05_local_4_shard_00000656_processed.jsonl/114706
|
1. Education
Discuss in my forum
November 10 Science History
Science History of November 10
1918 - Ernst Otto Fischer was born.
Fischer was a German chemist who shares the 1973 Nobel Prize in Chemistry with Geoffrey Wilkinson for their independent pioneering work with organometallic compounds. He worked on compounds with transition metal complexes and catalysts to hydrogenate alkenes into alkanes. He also identified the structure of the sandwich compound, ferrocene.
1861 - Robert T. A. Innes was born.
Robert Thorburn Ayton Innes (1861 - 1933)
1799 - Joseph Black died.
Joseph Black (1728 - 1799)
William Ramsay/The Gases of the Atmosphere 1896
Black was a Scottish chemist who was one of the founders of thermochemistry. He discovered that when ice melts, the temperature does not change leading to the idea of specific or latent heat. He also researched carbon dioxide or what he called 'fixed air'. This research led to the discovery of bicarbonates.
1764 - Andrés Manuel Del Rio was born.
Andrés Manuel Del Rio (1764 - 1849)
Rio was a Spanish mineralogist who discovered the element vanadium. He named the his discovery pancromium and sent his samples to be verified. They were mistakenly identified as chromium and his claim was rejected. Twenty nine years later, Swedish chemist Nils Sefström rediscovered the element and named it vanadium.
©2014 About.com. All rights reserved.
|
global_05_local_4_shard_00000656_processed.jsonl/114711
|
HOME > Chowhound > Home Cooking >
Fruit with Meat; a Do or a Don't
• 35
• Share
What's your take??
1. Click to Upload a photo (10 MB limit)
Posting Guidelines | FAQs | Feedback
Thare, I've started another argument!
1 Reply
1. re: Steve
1. My first reaction was uh-uh. Don't like it. But I do love sauteed apples with my pork chops. And raisins, pears, or apricots in my tagines. And my Hungarian grandmother used to make a brisket with apricots and prunes. Sounds horrendous as I type it, but it was a special treat when I was a kid. Wonder how I'd like it today?
1. I love fruit-meat combinations... especially beef dredged in cocoa powder and then sauteed, with cherry sauce. (It's a dessert.) And I always simmer pork chops in orange juice.
1. I loooove fruit-meat combo as well -- be it meatballs with lingonberry, or plov with lamb and apricots, carbonade of beef flamande with prunes, chicken with mango chutney, port with blue cheese, candied walnuts and figs, etc, etc.
I think sweet and savory complement each other really well (although I must admit I am a desert person if that makes it less weird)
1. I hate fruit with meat combinations, except when it comes to foie gras...seared foie gras with mango or papaya mojo is really nice.
1. I love the fruit/meat combinations found in Moroccan cooking. And don't forget, olives are fruits. Okay, I apologize; I know that's not what you meant.
2 Replies
1. re: Mrs Fang
Tomatoes are fruits, too. No ketchup on Kate's burgers?
1. re: Gary Soup
Mayo and Avocado on Kate's burgers... Mmmmm
I wonder why they consider that California style. Is best foods/hellman's based out of california? I know that avocado's are clearly the place to get avocado in the US, but lots of times a "california style burger" is just a burger with mayo, lettuce and tomato.
2. One warning.
Don't cook pineapple directly with the meat. I baked ham with fresh pineapple last year and the enzymes in the pineapple turned the ham into mush.
1 Reply
1. re: jlawrence01
This only happens with fresh. The same will happen if you use fresh kiwi or papaya -- it's the papain in the fruit that breaks down the meat. The canning process wipes out a majority of the papain and so canned pineapple (which is really a different beast altogether) will work fine.
The general rule is that if you can't put it in Jell-O (and the fruits are usually listed on the box) you can't put it on meat without it breaking down.
2. Fruit with meat. It depends on the dish. I take it case by case. For example, I don't like raisins in empanadas but I do like pineapple on pizza sometimes. So, it depends.
1. My knee jerk reaction was that I only like fruit with meats that I don't mind sweet (pork or chicken), but then I remembered citrus fruits, which I've used with practically everything.
My seafood, poultry, and lamb have all reaped the benefits of lemon (and possibly orange or lime) and my carne asada or green chile wouldn't be the same without lime juice.
1. I do not particularly like the chicken fruit combination. I think it's because I just associate both with different situations.
I want to eat fruit to be refreshed, and as a light snack, and I want to eat meat as a substantial meal with hearty flavors.
I do like chicken with lemon, like in chicken piccata, and chicken with lime, like in fajitas, but that's about it.
However, my favorite chinese dish is honey sesame chicken, which is really sweet, but I doubt that it has any actual fruit in it :)
1 Reply
1. re: juliehf
oh, i'm definitely down with lemon and lime in my meats. but they aren't sweet!!
(goes back to smarty Gary's comment that tomatoes are fruit, but ketsup IS sweet, and I don't love the stuff. I'll take some bearnaise sauce with my frites over ketsup any day of the week!)
2. I'm all for fruit and meat combinations: grilled chicken and peaches or mangoes, chicken salad with grapes, chicken roasted with apricots, pork loin roasted with dried plums/prunes ... yum.
1. I'm all about sweet and savory... I love...
* Good sweet Cranberry Sauce with turkey.
* Ligonberries with Swedish Meatballs.
* WF's Tuna and Cranberry Salad
* Raisins in my Lumpia (this ALWAYS starts a debate with my Filipino Friends)
My favorite combo is strawberry jam with sausages. It makes SO cringe... LOL! :)
1. I think my aversion to the fruit/meat combo can be attributed to the fact that I usually don't like the texture of cooked fruit (spiced apples, cherries in cherry pie, the exception to this is peach cobbler). But I like using fresh (like lime on beef) and one of my favorite summer time treats is proscuitto wrapped cantaloupe. Yum!
1 Reply
1. re: donnaaries
Yes, that's another combo I forgot! Also Procuitto wrapped in figs. I also always have a bit of Membrillo on my cheese and meat plates! :)
2. I love to grill fruit, but I eat it seperately from my meat, although I love grilled apples and pork and grilled peaches and pork. I love to eat grilled pineapple so much that I will cook it and then want to eat it right off the grill before it can lose even an ounce of the heat. Mmmmm....seared with brown sugar...it's like heaven on a plate
1. There are some combinations I do no like. I don't like Hawaiian pizza with bacon and cheese. I do like most meat and fruit combinations like pork with prunes.
Do you not like fruit and meat because those dishes are unfamiliar to you?
1. I have sweet/savory issues too. Here's the breakdown:
Loves: dates wrapped in bacon, foie gras with peach preserves and mesclun, cheese with fruit.
Hates: Beef, chicken, duck or pork dredged/drizzled/glazed in honey, maple syrup or any combo thereof. Sticky sweet, dessert-like ribs. Lamb with the mint jelly that my mom used to serve. Restauranteurs deciding that every entree should include a sweet-savory combo and leaving no options for the haters. It was worse two years ago, but I still find it on occasion.
1. I don't think I've met a fruit I wouldn't try with meat. Winning combo to me.
One that suprised me (and was fantastic) was at Rumba in New Haven, CT - BBQed banana on top of fish (had several other layers as well). We oohed and aahed over how fantastic it tasted.
1. Chicken stuffed with golden raisins, almonds and whole dried apricots yum
1. Certain parts of the world have traditions for cooking certain kinds of fruit, served with meats. Plantains are a staple throughout Latin America, cooked in various ways; In cuba they make them into mariquitas (long strips thinly sliced and deep fried to a crisp), puerto rico brings tostones (under-ripe plantains cooked twice), with various countries giving us platanos maduros ( sauteed ripe plantains which makes them sweet). While all of these are served as sides, they are usually served with meat, along with beans and maybe rice, for lunch or dinner. I definitely enjoy the contrast, whether it is texture or flavor that plantains provide.
I also like figs or melon with prosciutto, pork chops with apple compote, meat tamales with prunes and/or raisins (popular in the northern mexican states such as sinaloa as well as the gigantic nacatamales of nicaragua), green papaya and salty fish or crab thai style also comes to mind as a good combo.
1. I am with you. I never order or make main dishes with fruit in them (grapes in chicken salad, dried cherries in couscous, mango salsa with fish). However, if that is what there is, I will eat it and enjoy it. I've often wondered why it sounds so unappealing to me when I always end up liking it. Clearly something in the depths of my unconscious.
1. You KNOW how I feel about this matter...maybe it is genetic :-) I do, however, like non-sweet citrus (lemon and lime) with fish and meat, esp. gremolata with osso bucco. BTW, we had GREAT sushi tonight for dinner.
1. As a chef, these are the fruit and meat creations that I am most proud of:
1. Charbroiled Pork Tenderloin & Peaches with Bourbon-Maple Syrup-Balsamic Reduction. Hell Yeahhh!
2. Roasted Cornish Game Hens with a Basmati Rice-Wild Rice-White Grape-Currant-Orange-Cinnamon-Pine Nut Stuffing.
3. Seared Magret Duck Breast with Raspberry-Chipotle-Red Onion-Bacon Relish.
4. Fresh Quebec Foie Gras on Corn Bread with Grilled Pineapple-Ice Wine Reduction.
1. Not a huge fan of the combo, but there's one I like: it's a grilled Pork Chop served alongside grilled peaches. You must use the best summer peaches you can find, and they're basted in a little melted butter, lime juice and, I think, molasses as they grill. But they go well with simply salt and peppered grilled Pork Chops.
1. Re: the papain effect, you can use it to your advantage to help make a cheap, sinewy cut of meat into something tender and nice. If you're going to add figs or pineapple (or the like) to a cooked meat dish, you do it at least halfway through cooking (if not longer). One of the best briskets is one made with papaya, but the papaya is added about 15-20 minutes before the meat finishes cooking.
NYCnosh: http://nycnosh.com
1. I love fruit meat combos...one christmas comes to mind when, after much family debate lead to replacing the traditional turkey with a gorgeous pork loin stuffed with apricots, prunes, and apple!
I think Duck is a natural with fruit. Also, there is a wonderful organic butcher in Toronto called the Healthy Butcher on Queen street that sells all sorts of sausages with fruit meat combinations. One great one I have had is a venison/cranberry sausage.
|
global_05_local_4_shard_00000656_processed.jsonl/114740
|
A lot of talking went on in the last months whether 1.1 was a good version number for Silverlight vNext, the one that will support managed code, a more extended BCL. And almost everybody agreed that, since the "next" Silverlight was a completely different beast from the currently released 1.0, a point release didn't give the feel of the differences between the 2 versions. Today ScottGu announced that Silverlight 1.1 has been renamed to Silverlight 2.0:
Previously we've been referring to this .NET-enabled Silverlight release as "Silverlight V1.1". After stepping back and looking at all the new features in it (the above list is only a subset - there are many more we aren't sharing yet), we've realized that calling it a point release doesn't really reflect the true nature of it. Consequently we have decided to change the name and refer to it as "Silverlight V2.0" going forward.
The first beta release of this managed Silverlight will be in Q1 2008, and will support a Go-Live license.
This next release will feature:
• Richer WPF UI: with layout manager, data-binding, skinning and control template
• Rich Controls: the next version will have the common controls like button, textbox, radio button, check box, etc.
• Network Support: REST, POX, RSS, WS* and cross-domain network access
• Extended BCL support: LINQ to XML, HTML DOM API, and more
But I fear that it will not be released for the Silverlight Challenge, actually my guess is that it will be released for the MIX08 in March 2008.
Technorati tags:
posted on Thursday, November 29, 2007 8:44 PM
Comments have been closed on this topic.
|
global_05_local_4_shard_00000656_processed.jsonl/114747
|
New Trailer for HAPPY FEET TWO
by Posted 2 years, 296 days ago
A new trailer has gone online for George Miller’s Happy Feet Two. I know I’m not the target audience for these movies but I find penguins adorable. Theoretically, I should be willing to give the Happy Feet flicks the benefit of the doubt on that alone. But the animators for the Happy Feet films made a serious error when they decided to give the penguins human eyes. The characters all exist in a weird middle ground between trying to have animated expressions and still remain realistic-looking. The movies are made worse by the having penguins squeak out hip-hop songs. But none of that matters because the movie will probably make hundreds of millions of dollars. Hooray.
Hit the jump to check out the trailer, which doesn’t tell you what the movie is about (Mumble and his son have to find an escape route when the penguin population is covered in ice). The film features the voices of Elijah Wood, Robin Williams, Hank Azaria, Alecia Moore (P!nk), Brad Pitt, Matt Damon, Sofia Vergara, Hugo Weaving, Richard Carter, Common, Magda Szubanski, and Anthony LaPagila. Happy Feet Two opens in 3D on November 18th.
Click Here
|
global_05_local_4_shard_00000656_processed.jsonl/114758
|
Sunday, July 27, 2008
A wise and understanding heart
Homily for Seventeenth Sunday in Ordinary Time
I think we all might be envious of King Solomon
and the opportunity that was his when the Lord told him,
Suppose the Lord came to you in a dream
and said the same thing…
For what would you ask?
What comes first to your mind?
What’s at the top of your “wish list?”
It seems the Lord’s offer had one string attached to it:
he tells Solomon,
“Because you asked for what you did,
and not for some other things,
I will give you what you asked for.”
So there may have been things
for which Solomon might have prayed
but which the Lord would not have granted…
What came to your mind
when I asked what you might ask for?
Do you suppose what you thought of might be a “match”
on the Lord’s list of requests to grant?
We ask for many things in prayer,
and more often than not the things we pray for
are very good things indeed -
but the Lord does not send us all the good things we pray for
even if our request seems what we think to be
just what God would want to grant us.
Solomon asked for a wise and understanding heart:
not so much a “thing” but more a way to discern, to discern:
what’s right from what’s wrong,
what’s true from what’s false,
what’s just from what’s not,
what’s real from what’s fantasy.
That desire to discern with a wise and understanding heart
is the wisdom at work in the two parables in the gospel.
First there’s the image of the treasure hunter
who, upon finding what she’s been looking for,
is willing to let go of everything else she owns
for the joy of having what she has found.
Then there’s the merchant in search of fine pearls.
At last he comes upon the finest pearl he’s ever seen
and surrenders everything he has for it,
believing this one pearl to be more valuable
than anything else he might possibly possess.
How about us?
What treasure are you looking for in your life?
What treasure are you working hard for in your life?
What treasure do you spend your life saving up for?
In what treasure do we invest ourselves,
our time, our resources?
The treasure we work for, whatever it might be:
can it fulfill our hearts' deepest longing?
What “pearl,” would be so valuable to our hearts’ desires
that we might surrender all we have to possess it?
or half of what we have, or a quarter
or even 10% of what we already have – often in abundance?
Or do we hold on to and even hoard temporary treasure
at the expense of treasure that is priceless?
Perhaps these scriptures are less
about getting what I want or wish for
and more about discerning, searching for what God wants for me:
searching for the treasure God has planted in the fields of my life;
for the pearl of great price, for which God hopes
I might surrender much less valuable things in my life.
We can be sure of this:
God desires our happiness
and seeks to heal and reconcile the pain and burdens
that keep us from peace of mind and heart.
But in seeking that happiness
most of us have to do a lot of digging
before finding the buried treasure,
and most of us sort through a lot of costume jewelry
before discovering the pearl of great price.
Is any treasure greater, any pearl more valuable
than the gift of faith which helps me to believe and trust in God
when times are most difficult?
For each of us there is a treasure to be found,
a pearl to be discovered.
What we need is a share of the wisdom of Solomon
to pray, not for the fulfillment of fantasies and wishes
but rather for the treasure, the pearl God has in store for each of us.
It’s in such wise prayer, as St. Paul wrote, that
all things do work together for the good, for those who love God.
We are about to break open the treasure of the Eucharist
and to pour out the Lord’s wisdom by the cupful.
Pray with me that the sacrament of this table,
for which Christ gave away everything he had – for us -
that the sacrament of his sacrifice
will nourish wise and understanding hearts in us all.
Anna said...
The Native American prayer is beautiful! For something so short it says many powerful words.Words I hope I live by.
I also was lucky enough to hear you preach your homily. Very thought provoking. Definitely something I could relate to. Thank you for the prayer and for the your words you share with us.
mary said...
It's a thought provoking question: "What would I ask of my Lord"????
I imagine it would be different for each and every one of us. If we had a loved one, dying and we knew they were too young to die... I imagine our prayer would be for them. Because it wasn't meant to be.
I imagine, it would be different requests, at different times of our lives.
I thought about it a lot, and at this time of my life I think I would ask of the Lord to use me. Use me to bring something good into somebody else's life.
Hopefully, He will. And I may never know that He did, but that is my prayer.
ConcordPastor said...
Mary: I think you're really on to something when you say, "at this time of my life I think I would ask of the Lord to use me. Use me to bring something good into somebody else's life."
I think that's the kind of prayer Solomon offered, too - and the Lord answered his prayer.
The other things you mentioned - all good and selfless things - are things the Lord may or may not grant, and seldom do we know just why he does or doesn't.
But the prayer you mention is the open ended one - the one that is open to what the Lord might have in store for you, where your treasure or pearl might be.
Pray for the other things, too? Of course! But the prayer that opens one's self to the Lord and the mystery of his moving in our hearts and lives - there's the prayer where buried and hidden things may be found - and bring joy.
mary said...
The hard part of that prayer is you may never "know" the goodness or joy you bring into someone's life. You keep trying and trying ... but you may never know if your prayer was answered, and if someone has been helped by whatever you've tried to do. Therefore, you keep seeking for the "joy".
I'll keep trying and praying.
|
global_05_local_4_shard_00000656_processed.jsonl/114771
|
Take the 2-minute tour ×
In the poor student or youth worker days it was popular to have never ending soup; a large pot on the stove that was topped up with new and leftover ingredients when available.
Normally the pot was stored in the fridge overnight.
Food items added were sometimes plate leftovers from fellow flat (share house) mates, who would in turn be eating the soup, too.
Most days other ingredients would be fresh(ish) vegetables, beans, grains, and fresh meat products sourced from the local butcher as money allowed.
Brussels sprouts where banned, and so were strong spices (you added those to your bowl before serving).
Fresh bread was sometimes baked in the oven while cracked bones were browning, but the oven was often an electrical and environmental death trap.
The pot kept going till the summer holidays, and no one got food poisoning in my time, or from any student stories I have ever heard.
This sort of activity is recorded in history as being a popular resource-saving idea.
Are there any real food safety implications with this method of cooking? And have any actual studies of this technique ever been published?
I still recommend this money-saving idea to current students, not keen on bad practices being continued though.
share|improve this question
That's hilarious... and kind of disgusting. I assume that the pot was actually heated and not just sitting there, right? It's a bit similar to the question Can one preserve food by periodically re-heating it?. – Aaronut Feb 1 '12 at 13:42
I think there are some modern day inexpensive buffet restaurants that still work sort of like this. There may be one piece of pasta in the mac n cheese that has been traveling in there for months... Shudder. – renegade Feb 1 '12 at 17:20
Put was pulled out of fridge (it was usually in there), and then put on the stove to boil. If we got too tanked and no one put it away, the cat would start eating it when it had cooled sufficiently by the middle of the night. The cat ate at our table anyway, so no biggie – TFD Feb 1 '12 at 19:56
We had stone soup as a kid, but the soup was always made fresh. We had a "soup stone" that was re-used, a nice smooth river rock. – thursdaysgeek Feb 2 '12 at 23:02
If you'd left it going all the time on the stove, it would be perfectly safe... ironically the refrigeration is what makes it unsafe. Also... the cat eating from the pot. Nasty! – BobMcGee Jul 6 '12 at 19:22
3 Answers 3
up vote 15 down vote accepted
It takes quite a while for a pot of hot soup to cool down to 40°F in the fridge. Several hours, sometimes, depending on the shape of the pot and the volume of soup. If you're heating and re-chilling the same soup daily, it's going to spend a lot of time in the danger zone. From a safety perspective, you'd be much better off making a pot of soup every few days and then reheating just the portion that you're actually going to eat.
I still recommend this money saving idea to current students
Soup is a great food for stretching a dollar, but I don't see how it's any more expensive to make a fresh pot twice a week and it shouldn't take much time either. I understand that you were adding scraps each night, but you could as easily save those scraps for a day or two until you make the next pot of soup.
share|improve this answer
Good point about the amount of time in the 'danger zone'. If someone insisted on doing this it would be a good idea to use a "cold paddle" or "ice wand" to speed up the cooling process. But I agree that just being in a routine of starting over again every so often is the best policy. Saving up scraps and even peelings is not at all unusual. I do this myself with chicken parts for example and make a big batch of stock whenever I have material and time. – renegade Feb 10 '12 at 18:39
Officially, its unsafe.
This is largely due to the fact that the time spent in "the danger zone" is cumulative. You may be killing off bacteria, but during their lifespan they may release toxins and spores that you may not kill. Every time you reheat the bits of leftovers, they're adding up time in the 'danger zone'.
Addionally, soup is only good in the fridge 3-4 days - so unless it was fully reheated every 3-4 days, its unsafe that very first 5th day , irrespective of any other debate. Bacteria still grow in the fridge, just slower.
share|improve this answer
Are you sure about this? Assuming the food is being reheated to cooking temperature each time - we're talking about the very bottom of an exponential growth curve, combined with regular consumption and replacement (i.e. dilution). – Aaronut Feb 1 '12 at 19:05
@Aaronut - I'm definitely sure that the danger zone is cumulative and there is food that is being reheated well beyond 2 hours in it. The problem is you never know if you're consuming the toxins or just making it more concentrated. You then re-dilute it, but you could be just bring it back to the strength it was. Would I personally do it? Sure. Is anything likely to happen? Probably not. Could I in good conscious call it 100% safe to a stranger on the Net? No. – rfusca Feb 1 '12 at 19:12
@Aaronut - The difference here between this and Bob's answer on cooking.stackexchange.com/questions/16872/… is that they're keeping it out of the danger zone by periodically reheating it and they might cool it down and reheat it again for a day or maybe two. Not indefinitely. – rfusca Feb 1 '12 at 19:29
@rfusca It was boiled most week days – TFD Feb 8 '12 at 6:51
The good thing about soup is it is hot enough to kill all potential pathogens. It is also unlikely to be a low-acid low-oxygen environment long enough for botulism to rear its head. Sounds completely practical and the safest possible way to make use of left overs and questionable cuts (the other way is curries I guess).
Seems to me a "cup of brown" was available from soup vendors in the distant past. Maybe that's just in fantasy novels :-).
share|improve this answer
I'm not entirely sure that that soup vendors in the distant past would hold up to modern food safety standards... – KatieK Feb 8 '12 at 2:10
Your Answer
|
global_05_local_4_shard_00000656_processed.jsonl/114778
|
=pod =head1 NAME Embperl FAQ - embed Perl code in your HTML docs =head1 CONTENTS =over 4 =item L<"Downloading, Compiling & Installing"> =item L<"Common Problems"> =item L<"Common Questions"> =item L<"Escaping & Unescaping"> =item L<"Debugging"> =item L<"Customizing"> =item L<"Optimizing & Fine Tuning"> =item L<"Additional Help"> =back =head1 Downloading, Compiling & Installing For basics on downloading, compiling, and installing, please see the L in the Embperl documentation. Please be sure to load Embperl at server startup - if you do not, various problems may result. An exception to that rule is when you have compiled mod_perl with B. In this case you B load Embperl at server statup, neither via an use in your startup.pl file, nor via PerlModule from your httpd.conf. =head2 Is there a binary distribution of Embperl for Unix? No. =head2 Is there a binary distribution of Embperl for Win32? Win NT/95/98 binarys for Apache/perl/mod_perl/Embperl are available from ftp://theoryx5.uwinnipeg.ca/pub/other/ . A european mirror is at http://www.robert.cz/misc/ . =head2 I want to run Embperl with mod_perl under Apache. In what order should I do the compiling? First mod_perl and Apache, then Embperl. =head2 I'm getting: ../apache_1.3.0/src/include/conf.h:916: regex.h: No such file or directory Try compiling Embperl again, like this: make DEFS=-DUSE_HSREGEX =head2 I'm trying to build HTML::Embperl, and while running 'make' i get: cc: Internal compiler error: program cc1 got fatal signal 11 make: *** [epmain.o] Error 1 GCC croaking with signal 11 frequently indicates hardware problems. See http://www.bitwizard.nl/sig11/ =head2 I have a lot of errors in 'make test' from mod_perl when using Embperl Try recompiling Perl and all modules -- this can sometimes make those annoying error messages disappear! =head2 How can I prevent 'make test' from running some of the tests? For example, I don't allow CGI scripts, so 'make test' fails at CGI. How do I run just the other tests? Try: $ make test TESTARGS="--help" # and for just offline and mod_perl: $ make test TESTARGS="-hoe" =head2 Running 'make test' fails with an error message at loading of Embperl (even though mod_perl compiled and tested cleanly!) see "I get symbol ap_* undefined/cannot resolve ap_*" =head2 I get symbol ap_* undefined/cannot resolve ap_* This can happen when symbols in the Apache binary can not be found or are not being resolved correctly. Some OS do this (for instance bsdos), and it can also happen if your Apache binary is set to strip symbol information out from binaries. Try: =over 4 =item 1.) make clean =item 2.) perl Makefile.PL NOTE: answer _no_ to mod_perl support. (This is important!) =item 3.) make test =back If that works, it means that your installation of Embperl is OK, but is having problems resolving symbols with Apache. Try rebuilding Apache and mod_perl from scratch, and make sure you do not strip symbols out of either. On some systems/linker you need to tell the linker explicitly to export such symbols. For example FreeBSD linker needs the C<-export-dynamic> option. If you don't succeed with this approach, try statically linking Embperl to Apache/mod_perl (please see the next question for step-by-step instructions on how to do this). =head2 How can I build a statically-linked copy of Embperl with mod_perl support? =over 4 =item 1.) go to your mod_perl directory, change to src/modules/perl and edit the Makefile so that it contains the line #STATIC_EXTS = Apache Apache::Constants HTML::Embperl =item 2.) add a definition for EPDIR and change the ONJ= line so that it looks like this: EPDIR=/usr/msrc/embperl OBJS=$(PERLSRC:.c=.o) $(EPDIR)/Embperl.o $(EPDIR)/epmain.o $(EPDIR)/epio.o (EP DIR)/epeval.o $(EPDIR)/epcmd.o $(EPDIR)/epchar.o $(EPDIR)/eputil.o =item 3.) go to the mod_perl directory and run perl Makefile.PL =item 4.) go to the Embperl directory and do make clean perl Makefule.PL make (to compile in mod_perl support) =item 5.) go back to the mod_perl directory and remake Apache by typing make Now you have successfully built a httpd with statically-linked Embperl. NOTE: If you want to stop here, you can skip to step 11. and run a 'make install' in the Embperl directory to finish. But if you want to run Embperl tests and/or if you want to be able to use Embperl in offline or "vanilla" CGI mode, we need to continue: =item 6.) go back to the Embperl directory =item 7.) backup the file test/conf/config.pl =item 8.) now build Embperl again but _without_ mod_perl support make clean perl Makefile.PL make =item 9.) restore your saved config.pl to test/conf/config.pl (without this step, only the offline mode would be tested) =item 10.) run 'make test' for Embperl =item 11.) do 'make install' for Embperl =back NOTE: You should do it in this order, or it may not work. NOTE: It seems to be necessary to load Embperl at server startup, either by PerlModule or in a PerlScript. See next question on how to do this. =head2 How do I load Embperl at server startup? You can load Embperl at server startup by PerlModule or in a startup.pl: =over 4 =item 1.) edit your srm.conf file to read: PerlModule HTML::Embperl =item 2.) edit your startup.pl file to read: use HTML::Embperl =back NOTE 1: Either of these approaches can often 'fix' SIGSEVs in any mod_perl handler, not just Embperl. NOTE 2: When mod_perl is compiled as loadable module (i.e. with USE_DSO) you B load Embperl at server startup time! =head2 make test fails with a SIGxxxx, how can I obtain a stack backtrace from gdb? The eaiest way is make install -> if Embperl is installed, it's easier gdb perl -> start the debugger with perl binary set args test.pl -> set the arguments for perl r -> start the program -> Here you should receive the signal share -> makes sure all symbols are really loaded bt -> show the backtrace To get some more information it would be a good idea to compile Embperl with debugging infomation enabled. Therefor do =head2 How do I build Embperl with debugging informations =over 4 =item edit the Makefile =item search for the line starting with 'CC = ' add the -g switch to the end of the line =item search for the line starting with 'LDDFLAGS = ' add the -g switch to the end of the line =item type make to build Embperl with debugging infomation =back now start the gdb as decribed before. =head2 make test fails with SIGXFSZ This may occur when the filesize limit for the account, either test is running as or the test httpd, is too small. Embperl make test generates a really large logfile! Yu must increase the filesize limit for that accounts. =head2 Embperl on SCO Unix >From Red Plait My OS is SCO Unix 3.2v4.2, Apache 1.3.4, perl 5.004_4, mod_perl 1.18 and Embperl-1.1.1 I done following: =over 4 =item 1) I made HTML-Embperl-1.1.1 with no mod_perl support ( when I builded it with mod_perl 1.18 I can`t link it because it don`t finds ap_XXX functions. When I manually insert src/main/libmain.a from Apache 1.3.4 I got message "Symbol main is multiple defined in /src/main/libmain.a. and perlmain.o" ). Then I "make test" - all tests was O`k. After this I "make clean", "perl Makefile.pl" with mod_perl support and "make install" =item 2) I installed mod_perl and "perl Makefile.PL", then "make" =item 3) because I have`nt dynamical loading ( very old and buggy OS ) I had to manually change src/modules/perl/perlxsi.c to insert bootstraps function`s and it`s invocations and also /src/Makefile to manually insert libXXX.a libraries =item In access.conf I insert code: PerlModule HTML::Embperl SetHandler perl-script PerlHandler HTML::Embperl::handler =back =head2 Embperl and mod_perl on AIX You need at least mod_perl 1.22. For mod_perl 1.22 and higher Embperl should compile out of the box on AIX. If you run into problems with undefined symbols (like C) make sure you have the newest mod_perl version (as of this writing this is mod_perl 1.24_01). =head2 Embperl does not write to the logfile, because of missing permissions of the user Apache runs as. The apache server is started as root, then set the effective uid to user "www", who can then write to the embperl logfile (owned by root) file handle that is passed along. However, if this log file handle is later accidentally closed, then reopen, the www user would have problem writing to it? The reopen is only done when the logfile name changes. As log as you don't change the name on the logfile, the logfile will stay open. The problem (in this case) is, that Embperl init function ,(Init in epmain.c) calls OpenLog will an second argument of zero. Which will only save the filename. The log will actually opened on the first write to it (or at the start of the first request). At this time your Apache has alreay switch to user www. This is done to allow to change the logfile name before an request, but after the init is already called (which is done when you or Apache "use" the module) The current solutions is to write something to the log, before Apache changes it's user (i.e. in the startup.pl) =head2 Is it possible to install EmbPerl into a private directory on my Unix/Linux Internet Service Provider account of which I have no root privilege? Like any other Perl module it can. Read "perldoc ExtUtils::MakeMaker", to see which parameters are needed for Makefile.PL to change the installation directory. Additionally, you have to change the @INC path to contain your private directory and possibly paths to other object files. Here are the brief details: B: =over 4 =item * At least Perl 5.004_04 =item * cc or gcc (your isp must give you access to the gcc compiler) =item * URI =item * MIME::Base64 =item * HTML::Parser =item * HTML::HeadParser =item * Digest::MD5 =item * libnet =item * libwww =item * File::Spec (I believe you may have to install this too if you are using Perl 5.004_04 as it may not be a standard module) =back B: =over 4 =item * Get your copy of EmbPerl (HTML-Embperl-x.x.tar.gz) =item * % tar -xvzf HTML-Embperl-x.x.tar.gz =item * % cd HTML-Embperl-x.x =item * % perl Makefile.PL PREFIX=/to/your/private/dir =item * % make =item * % make test =item * % make install =back Replace /to/your/private/dir with the path to the directory you want the module to be placed in. Now preface your CGI scripts with something like this: [Alternative 1] #!/usr/bin/perl -wT use CGI::Carp qw( fatalsToBrowser ); #recommend using this to report errors on die or warn to browser use lib '/to/your/private/dir/lib'; #for FILE::Spec use lib '/to/your/private/dir/'; #to find Embperl use lib '/to/your/private/dir/i386-linux/auto/HTML/Embperl'; #to find Embperl compiled stuff #if for some very weird reason the above 'use lib' pragma directive doesn't work, see Alternative 2 use HTML::Embperl; #your code below ... [Alternative 2] #!/usr/bin/perl -wT use CGI::Carp qw( fatalsToBrowser ); #recommend using this to report errors on die or warn to browser BEGIN { unshift @INC, '/to/your/private/dir/lib'; #for FILE::Spec unshift @INC, '/to/your/private/dir/'; #to find Embperl unshift @INC, '/to/your/private/dir/i386-linux/auto/HTML/Embperl'; #to find Embperl compiled stuff } use HTML::Embperl; #your code below ... When you make test, you may encounter superfluous warnings, you may want to change the test.pl that ships with EmbPerl from BEGIN { $fatal = 1 ; to BEGIN { unshift @INC, '/to/your/private/dir/lib'; $fatal = 1 ; ... because the test.pl may not be able to find FILE::Spec if you have it installed on a private directory for Perl 5.004_04. Do something similar to the important file embpcgi.pl as you do for all your CGI scripts, like modifying the @INC as shown above, to allow perl to find in particular the EmbPerl shared obj files... And when you invoke your CGI scripts like so, http://www.yourdomain.com/cgi-bin/embpcgi.pl/templateFiles/myNifty.epl the script should work. =head1 Common Problems The most common problems of all involve Escaping and Unescaping. They are so common, that an entire section on L<"Escaping & Unescaping"> is devoted to them. =head2 When I use a module inside a Embperl page, it behaves weired when the source changes. Nothing weird here. Everything is well defined. Just let us try to understand how I, I and I works together: "perldoc -f use" tells us: Imports some semantics into the current package from the named module, generally by aliasing certain subroutine or variable names into your package. It is exactly equivalent to BEGIN { require Module; import Module LIST; } except that Module must be a bareword. So what's important here for us is, that C executes a C and this is always done before any other code is executed. "perldoc -f require" says (among other things): ..., demands that a library file be included if it hasn't already been included. and Note that the file will not be included twice under the same specified name. So now we know (or should know) that I starts the Perl interpreter once when I is started and the Perl interpreter is only terminated when Apache is terminated. Out of these two things follows, that a module that is loaded via C or C is only loaded once and will never be reloaded, regardless if the source changes or not. So far this is just standard Perl. Things get's a little bit more difficult when running under mod_perl (only Unix), because Apache forks a set of child processes as neccessary and from the moment they are forked, they run on their own and don't know of each other. So if a module is loaded at server startup time (before the fork), it is loaded in all childs (this can be used to save memory, because the code will actually only reside once in memory), but when the modul is loaded inside the child and the source changes, it could be happen, that one child has loaded an ealier version and another child has loaded a later version of that module, depending on the time the module is actualy loaded by the child. That explains, why sometimes it works and sometimes it doesn't, simply because different childs has loaded different versions of the same module and when you reload your page you hit different childs of Apache! Now there is one point that is special to Embperl to add. Since Embperl compiles every page in a different namespace, a module that doesn't contains a C statement is compiled in the namespace of the page where it is first loaded. Because Perl will not load the module a second time, every other page will not see subs and vars that are defined in the loaded module. This could be simply avoided by giving every module that should be loaded via C/C an explicit namespace via the package statement. So what can we do? =over 4 =item * If a module change, simply restart Apache. That's works always. =item * Use I This will do a stat on every loaded module and compare the modification time. If the source has changed the module is reloaded. This works most times (but not all modules can be cleanly reloaded) and as the number of loaded modules increase, your sever will slow down, because of the stat it has to do for every module. =item * Use C instead of C. C will execute your file everytime it is used. This also adds overhead, but this may be accpetable for small files or in a debugging environement. (B Be sure to check C<$@> after a C, because do works like C) =head2 Why doesn't the following line work? [+ $var . "". $foo . "". $bar +] See what we mean? This is an Escaping & Unescaping problem for sure. You need to escape as ' <b> ' and you probably also need to read the section on L<"Escaping & Unescaping">... =head2 I'm getting: "Glob not terminated at ..." This might be a problem with L<"Escaping & Unescaping"> as well. =head2 My HTML is getting stripped out. Sounds like a problem with Escaping & Unescaping again! Unless, of course, you have already read the section on Escaping & Unescaping, and it is still happening... Like if you are using optRawInput and your HTML is _still_ being stripped out... =head2 I _am_ using optRawInput, and my HTML _is_ still being stripped out! Aha! Well that's different! Never mind.. It can be easy to accidentally set optRawInput too late in your code... Try setting it in an extra Perl block S<( [- $optRawInput = 1 -] )> earlier in the code, or in the server config, and see if that doesn't solve the problem... (optRawInput must be set before the block that uses it begins, as the block which uses it shouldn't be translated). =head2 Help! I got a SIGSEGV! Ack! If Embperl is not compiled at server startup, it can cause error messages, SEGfaults, core dumps, buffer overflow, etc - especially if you are using another module inside an Embperl page. As far as anyone can tell, this seems to be a Perl/mod_perl problem - but maybe not. If you have any ideas, let me know. To see the steps for loading Embperl at server startup, please see the section L<"Downloading, Compiling & Installing">. NOTE: When mod_perl is compiled with B it behaves vice versa and you may get SIGSEGVs when Embper is loaded at server startup time. =head2 I am having troubles with using Embperl in combination with Apache::Include inside a Apache::Registry script. This is a known problem, but it is a problem with mod_perl rather than with Embperl. It looks like mod_perl clears the request_rec after the first subrequest, so that it later doesn't know which subrequest was intended (unless it's explicitly specified). Try using: Apache::Include->virtual("test.epl", $r); (instead of just Apache::Include->virtual("test.epl"); where $r is the apache request rec) =head2 I can't get PerlSendHeader to work under Embperl? You don't need PerlSendHeader when using Embperl - Embperl always sends its own httpd header. =head2 But how do I customize the header that Embperl is sending? You'll find the answer to this and many other header issues in the L<"Common Questions"> section. =head2 I can't figure out how to split a 'while' statement across two [- -] segments That isn't surprising, as you cannot split Perl statements across multiple [- -] blocks in Embperl :) You need to use a metacommand for that. The [$while$] metacommand comes to mind... :) For a list of all possible metacommands, see the section on L in the Embperl documentation. [$ while $st -> fetch $] #some html or other Embperl blocks goes here [$ endwhile $] Newer Embperl versions (1.2b3 and above) supports the [* *] which can be used for such purposes. [* while ($st -> fetch) { *] #some html or other Embperl blocks goes here [* } *] While the later can use all Perl control structures, the first seems to me more readable and is better debugable, because Embperl controls the execution of the control structure it can do a quite better job in debug logging. =head2 My HTML tags like '<' '>' and '"' are being translated to <, > !!! Hey! Not you again!? I thought we already sent you to the L<"Escaping & Unescaping"> section of the FAQ?!?! ;) =head2 Netscape asks to reload the document If you have something like this in your source, it may be the problem: Netscape seems to have a problem in such cases, because the http header is only content-type text/html, while the META HTTP-EQUIV has an additional charset specified. If you turn optEarlyHttpHeader off, Embperl will automatically set the http header to be the same as the META HTTP-EQUIV. =head2 I get "Stack underflow" The problem often occurs, when you have a tag in one file and a
tag in another file and you both include them in a main page (e.g. as header and footer). There are two workarounds for this problem: =over 4 =item 1. Set optDisableTableScan This will avoid that Embperl takes any action on tables. You can disable/enable this (also multiple times) inside the page with [- $optDisableTableScan = 1 -] If you put this at the top of your header/footer which you include with Execute, then the main page will still process dynamic tables. =item 2. Add a as comment Add the following to the top of the footer document: This will work also, because Embperl (1.x) will not scan for html comments =back =head1 Common Questions The most common questions of all deal with L<"Escaping & Unescaping"> - they are so common that the whole next section is devoted to them. Less common questions are addressed here: =head2 How can I get my HTML files to be converted into Perl code which, as a whole, could then be compiled as function so that I could, for instance, fetch Perl docs from the Formatter table and compile them the way AUTOLOAD does. Embperl cannot covert your HTML into one piece of Perl-code, but you can wrap the call to Execute into a Perl function and let AUTOLOAD call it. =head2 I have an HTML page which is dynamically generated at runtime and should be post-processed by Embperl. How can I do this? =over 4 =item 1.) Generate the page within a normal CGI/Apache::Registry script and put the result into a scalar - then you can call HTML::Embperl::Execute to post-process your document. Execute can either send the document to the browser or put it into another scalar for further processing. =item 2.) Use EMBPERL_INPUT_FUNC (1.1b1 and above). With this configuration directive, you can specify a custom input function which reads the HTML source from the disk or even from a database. Embperl also provides the function ProxyInput, which allows you to get input from another web server altogether. =item 3.) Look at the module Apache::EmbperlChain, which is able to chain multiple modules, including Embperl, together. =back =head2 How can I customise the header that Embperl is sending? You can write it as (Embperl will automatically insert all meta http-equiv tags into the http header) or use %http_headers_out [- $http_headers_out{'Content-Type'} = 'text/html' -] or (only when running under mod_perl) you can use [- $req_rec -> content_type ('text/html') -] =head2 Can I use Embperl to send cookies? Yes. Embperl sends its own headers, so all you have to do to send cookies is to remember to print an additional header. Example Code: =over 4 =item 1.) in documents, add =item 2.) or use %http_headers_out [- $http_headers_out{'Set-Cookie'} = "$cookie=$value" -] =item 3.) or - using mod_perl's functionality - use [- $req_rec -> header_out("Set-Cookie" => "$cookie=$value"); -] =back NOTE: You make also take a look at Embperls (1.2b2 and above) ability to handle sessions for you inside the %udat and %mdat hashes. =head2 Can I do a Redirect with Embperl? The following way works with mod_perl and as cgi: [- $http_headers_out{'Location'} = "http://www.ecos.de/embperl/" -] the status of the request will automaticly set to 301. or use the mod_perl function Apache::header_out. Example Code: [- use Apache; use Apache::Constants qw(REDIRECT); $req_rec->header_out("Location" => "http://$ENV{HTTP_HOST}/specials/"); $req_rec->status(REDIRECT); -] If there is nothing more to do on this page, you may call C directly after setting the status. =head2 Can I serve random GIFs with Embperl? (Will Lincoln Stein's GD.pm module work with Embperl??) As always, there is more than one way to do this - especially as this is more of a question of how you are coding your HTML than how you are coding your Embperl. Here are some ideas: =over 4 =item 1.) You could include an IMG tag which points to your cgi-bin, where a regular CGI script serves the graphics. =item 2.) You could be running Apache::Registry, which can generate on-the-fly GIFs using GD. (This is just the same as if you were including the GD image from a static page or from another CGI script, but it allows all of the appropriate logic to live in a single document, which might be appropriate for some Embperl users). =back If you think of another way, or come up with some sample code, I'd love to hear from you, so that I could add it to the FAQ... =head2 Can I use Embperl as a template for forms? Can I make form values persist (like with "vanilla" CGI)? Does Embperl rewrite my template file so that parameters of things like INPUT/TEXTAREA/SELECT persist? Yes. Your page design staff should just be able to say and let the default attributes of "foo" be defined elsewhere - for instance in a settings file. In this case, %fdat should be pre-set with your default values. Setting $fdat{foo} = "abc" will cause Embperl to change the above code to . =head2 Does Embperl automatically add HIDDEN fields? The [$hidden$] metacommand creates hidden fields for every entry in %fdat which was not used by any other input tag so far. You can also try something like this: [- $fdat{foo} = "abc" ; $fdat{bar} = "xyz" ; -] [$hidden$] and Embperl will create: For a list of all possible metacommands, see the section on L in the Embperl documentation. =head2 What about security? Is Embperl Secure? Just like anything else, Embperl is as secure as you make it. Embperl incorporates Safe.pm, which will make it impossible to accidentally access other Packages - it also permits the Administrator to disable Perl opcodes, etc. For more on security, please see L in the Embperl documentation. =head2 Is there any plan to make Embperl an Object so someone could subclass it and override certain of its methods? (For example, I'd like to let it parse the file for me, but then let me control the manipulation of the form tags.) Embperl is going to be an Object from version 1.2b1. This, among other things, make it re-entrant, so that you will be able to call Execute from within an Embperl page. It will also mean that Embperl will come with hooks, which will allow you to alter or change the way Embperl processes code. The details have not all been worked out yet, but I'm working on it... :) =head2 Are Embperl routines currently pre-compiled or even cached, or are only fragments cached? All embedded Perl code is compiled the first time it is executed and cached for later use. The second time the code is executed, only the precompiled p-code is called. Every code block is compiled as a single subroutine. The HTML text between the Perl block is still read from the file. =head2 Why are Perl blocks broken up into single subroutines? =over 4 =item 1.) It makes it easier to process the HTML tags between the Perl blocks - this gives you more control over what's happening =item 2.) If you compiled _everything_ to Perl, you would hold all of the HTML text in memory, and your Apache child processes would grow and grow... But often-accessed documents are still held in memory by your os disk cache, which is much more memory-efficient. =item 3.) There is only so far that you can go with precompiling until you reach the point of diminishing returns. My guess is that converting dynamic tables and other HTML processing to Perl at this point in Embperl's development would actually slow down operation. =back =head2 Can I pass QUERY_STRING information to an HTML::Embperl::Execute call? With Embperl 1.0 and higher, you can do this. QUERY_STRING is set as $ENV{QUERY_STRING} by default. Alternatively, you can use the fdat parameter to pass values to %fdat. =head2 How to include other files into Embperl pages? I am using embedded Perl on my site and am curious if I can use it for server side includes. I want to embed the contents of file x.html into file y.html such that whenever I change x.html, displaying y.html will also reflect this change. How do I do it using embedded perl? You need Embperl 1.2b4 or above. Then you can say inside of y.html: [- Execute ('x.html') -] =head2 EmbPerl iteration without indexing I have a rather large table in a database which I'd like to display using EmbPerl. All of the examples show a process of fetching all the data first, then iterating through it using $row and $col, like this: [- $sth = $dbh -> prepare ("select * from $comptbl order by SubSystem"); $sth -> execute; $dref = $sth -> fetchall_arrayref; -]
I'd prefer to fetch the data one row at a time, how can I do this? For solution 1 you may write [$while $rref = $sth -> fetch $] .... [$endwhile$]
Solution 2 should work like this [- $dummy = $row ; $rref = $sth -> fetch -] ....
The table ends when the expression where $row is used in some way returns . So also there is no releation between $row and the fetch, both conditions are met. =head2 How to display arrays with undef values in it? I'm doing a search on a table where some of the columns have NULL and non-NULL values. DBIx::Recordset has no problem reading this values The problem is that I then tried to print these values out in a table using Embperl's table feature, like this. The problem is that I got 5 rows instead of the 15 that I was expected. I have been trying all kinds of tweaks to the arguments to the Search function and getting nowwhere, until I re-read the Embperl docs. Embperl will not print out a table row if one of the columns has an expression that is undefined. This is a problem since DBIx::Recordset (and DBI) natually uses undef to represent a NULL value for a column. So I made a slight modification to my embperl code.
$set[$row]{column_name1} $set[$row]{column_nameN}
. . . Now all 15 rows appear as expected, with "UNDEF" representing the NULL values in the database. Another way top solve you problem may be:
defined($set[$row]{column_name1}) ? $set[$row]{column_name1} : "UNDEF"$set[$row]{column_nameN} ? $set[$row]{column_nameN} : "UNDEF"
[- $r = $set[$row] -] . . . This will only refer one time to $row and the expression is defined, as long as the row could be fetched from the db. All NULL fields will be displayed as empty table cells. =head1 Escaping & Unescaping =head2 Escaping & Unescaping Input By default, Embperl removes all HTML tags from the Perl source. It does this because many high-end WYSIWYG HTML Editors (like MS Front Page) insert HTML tags like and in rather random places (like in the middle of your Perl code). This Embperl feature keeps things like [- $var = 1;
$foo = 2 -] permissable, so that you can enter Perl code while you mark up pages in an editor, all at once. In this example, Embperl would remove the unnecessary
tag and, therefore, make Perl happy. And if Perl is happy, we are all happy. It is not difficult to change this behavior, if you are the kind of person who codes HTML in an ascii editor (like vi or emacs). If you use a high-level HTML editor, you shouldn't have any problems with input escaping, because the editor will, for example, write a '<' as '<' in the HTML code. Embperl translates this back to '<' and therefore it knows that this wasn't an HTML tag which should be removed. Problems with input escaping only occur if you use an ascii editor. Then you will need to escape input (see the next section for details on how to do this). To see the exact steps taken by Embperl to process a Perl-laden document, please see the section L in the Embperl documentation. =head2 Ways To Escape Input: =over 4 =item 1. Escape it -> \
NOTE: Inside double quotes you will need to use \\ (double backslash), since Perl will remove the first Escape itself. Example: In most cases '\
' but inside double-quotes "\\" =item 2. Turn off Escaping for all input by setting the optRawInput in EMBPERL_OPTIONS =item 3. Learn to avoid using HTML tags inside Perl code. Once you get the hang of it, you'll love it. =back Here is one example of how to do it: [- $output = "Hello world" -] [+ $output +] write [- $output = "Hello world" -] this outputs Hello world or [+ $output +] this outputs Hello world And here is another example of how to do it: [- @a = ('a', 'b', 'c') ; foreach $i (0..2) { $output. = "" ; } -]
[+ $r -> {column_name1} +] [+ $r -> {column_nameN} +]
Row $a[$i]
[+ $output +]
The output here would be: Row aRow bRow c
The Embperl version is [- @a = ('a', 'b', 'c') ; -] " ;
Row [+ $a[$row] +]
The output will be " ; " ; " ;
Row a
Row b
Row c
And another: This elegant solution shows you how to take advantage of Embperl's ability to create dynamic tables: [- use DBI; my $dbh = DBI->connect("DBI:mysql:database:localhost","Username","Password") || die($!); $hstmt = $dbh->prepare("select ID, Heading from Shops order by Heading"); $hstmt->execute(); $dat = $hstmt->fetchall_arrayref() ; $hstmt->finish(); $dbh->disconnect(); -]
This HTML code will then display the contents of the whole array. =head2 Escaping & Unescaping Output Embperl will also escape the output - so
will be translated to <H1> To see the exact steps taken by Embperl to process a Perl-laden document, please see L in the Embperl documentation. =head2 Ways To Escape Output: =over 4 =item 1.) Escape it -> \\
(You need a double backslash \\, because the first one is removed by Perl and the second by Embperl. =item 2.) set $escmode = 0 -> [- $escmode = 0 ; -] =item 3.) set SetEnv EMBPERL_ESCMODE 0 in your srm.conf =back =head1 Debugging =head2 I am having a hard time debugging Embperl code Have you, umm, checked the error log? ;) Have you tried setting debug flags higher by resetting EMBPERL_DEBUG in the server config files? (And still higher? :) dbgMem isn't usually very useful as it always outputs a lot of allocation. dbgFlushLog and dbgFlushOutput should be used if (and only if) you are debugging SIGSEGVs. For easy debugging, you can tell Embperl to display a link at the top of each page to your log file. Then every error displayed in an error page is a link to the corresponding position in the logfile, so you can easily find the place where something is going wrong For more on using HTML links to the Embperl error log, see L in the Embperldocs. =head2 Embperl is running slow. There are some debugging settings which may cause Embperl to drastically slow down. If you are done with debugging, set debugging bits back to normal. Also, using dbgFlushLog and dbgFlushOutput will make execution much slower. These are only intended for debugging SIGSEGVs. Never set all debugging bits! =head2 How can I improve Embperl's performance? =over 4 =item 1.) Load Embperl at server startup. This will cause UNIX systems to only allocate memory once, and not for each child process. This reduces memory use, especially the need to swap additional memory. =item 2.) Disable all unneeded debugging flags. You should never set dbgFlushLog dbgFlushOutput, dbgMem and dbgEvalNoCache in a production environment. =item 3.) You may also want to take a look at the available options you can set via EMBPERL_OPTIONS. For example optDisableChdir, will speed up processing because it avoid the change directory before every request. =back =head1 Customizing =head2 How can I fiddle with the default values? How can I override or alter this or that behavior? Usually, defaults are set in a way that is likely to make most sense for a majority of users. As of version 1.0, Embperl allows much more flexibility in tweaking your own default values than before. Take a look at EMBERPL_OPTIONS. =head2 I'd like to (temporarily) disable some of Embperl's features. What can be customized? =over 4 =item 1.) Use optDisableHtmlScan to disable processing of html tags. If this is set, Embperl will only pay attention to these types of constructs: S<[+/-/!/$ .... $/!/-/+]> =item 2.) optDisableTableScan, optDisableInputScan and optDisableMetaScan can be used to disable individual parts of HTML processing. You may set these flags in your server config, or at runtime: [+ $optDisableHtmlScan = 1 +] foo
[+ $optDisableHtmlScan = 0 +] =back =head2 How can I disable auto-tables? Set optDisableTableScan in EMBPERL_OPTIONS =head2 How can I change predefined values like $escmode from my Toolbox module? $HTML::Embperl::escmode = 0 ; Predefined values in Embperl are simply aliases for $HTML::Embperl::foo (for instance, $Z<>escmode is an alias for $HTML::Embperl::escmode) =head2 How can I customize the header that Embperl is sending? You'll find the answer to this and many other header issues in the L<"Common Questions"> section. =head2 How can I use a different character set? ASCII values over 128 are showing up as ? (question marks)! This is caused by the translation of characters to HTML escapes. Embperl translates them to escapes which are then sometimes not understood by the browser, which may display a "?" instead, because it is using the wrong character set. If you want to use the escaping features of Embperl in this case, you have to adapt the file C to your character set. The distribution contain already an C from Jiri Novak which is an replacement for epchar.c for the iso-8859-2 (iso-latin-2) character set. If you want to use iso-latin-2, simply renmae C to C. There is also an file C from Sangmook Yi, which leaves all chars above 128 untouch, which is especialy usefull for two byte charsets. This file contains three tables: Char2Html [] Convert characters to html escape Char2Url [] Convert characters to url escapes (do not change this one!!) Html2Char [] Convert html escapes to characters You need to change the first and the last tables. Do not change the second table!! Please make sure Char2Html contains one entry (and only one entry) for each of the 256 ascii codes (with none left undefined) in the right order, and that Html2Char is sorted by html escape. If somebody generates new tables for national character sets, please send a copy to the author, so it can be included it in future versions of Embperl. =head1 Optimizing & Fine-Tuning =head2 How can I be sure that Embperl is re-compiling my page template (and the Perl blocks contained in it) only when needed, and not each time? As long as your input file's time stamp stays the same, Embperl will only compile the script the first time it's called. When you use the Execute function, Embperl will recompile the script only if the input file and mtime paramenters have changed since the last time the script was called. You can verfiy this by setting dbgDefEval. Now, every time a Perl block is compiled, Embperl logs a line starting with DEF:. You will see this line only on the first request. The cached Perl blocks are stored as a set of subroutines in the namespace of the document. (HTML::Embperl::DOC::_ is the default) Look at the logfile to see the actual name. =head2 How can I pre-compile pages, so that each httpd child doesn't have to have its own separate copies of the pre-compiled pages? To pre-compile pages, just call Execute once for every file at server startup in your startup.pl file. =head2 In what namespace does Embperl store pre-compiled data? The cached Perl blocks are stored as a set of subroutines in the namespace of the document. (HTML::Embperl::DOC::_ for default) Look at the logfile to see the actual name. =head2 I have both Embperl and ordinary Perl processes running. The docs say that Embperl uses a CGI.pm instance in its own internal processing, but they don't say how to control it. How can I get Embperl to use *my* CGI.pm object instead of creating its own? Embperl only creates a CGI objects to process multipart form data (from fileupload). In all other cases Embperl doesn't use CGI.pm. There is no way to change this behaviour, or access the internal CGI object in case of file-uploads. =head1 Additional Help =head2 Where can I get more help? You can get free support on the mod_perl mailing list. If you need commercial support (with a guarantee for response time or a solution) for Embperl, or if you want a web site where you can run your Embperl/mod_perl scripts without setting up your own web server, please send email to [email protected]. Please also see the section L in the Embperl documentation. =head1 SEE ALSO some links here =head1 AUTHOR Gerald Richter Edited by Nora Mikes
|
global_05_local_4_shard_00000656_processed.jsonl/114807
|
The One Where Sweaty Will Leitch Startles A Man
Citizen Journalism At Its Finest
A. Has anyone actually SEEN Mark Sanchez's birth certificate? If I am not mistaken, Sanchez is a Mexican name. And have you seen the way he scrambles? Is it possible he honed these skills evading the US Border Patrol? All I'm saying is that someone should at least look into it...and perhaps we should save QB jobs in the National Football League for those who are, you know, US nationals.
B. This morning while fetching some bagels for my family, I was passed on the street by Will Leitch, a famous sports blogger (see attached photo). He was wearing a Cardinals #47 Ludwick t-shirt and maroon shorts. He was sweaty and surprisingly small.
Just thought you'd like to know!
It's really hard to ignore how much worse the site has become with you in charge. I'm a Philly guy myself and I do(?)/did like when you would write in occasionally when Leitch was running the ship, but since you took over the site has simply sunk to mediocrity. I could care less about the comments - what bothers me is how often you just link to other stories on other sites rather than have original Deadspin stuff. That's the lazy way out. Craggs journalism is hardly journalism. In fact, it's not, and what he writes usually just sucks. The only good thing I've seen in the last, I don't know, four months, was the homage to the Mets season yesterday.
This email won't do anything, I know that. The site won't change, it'll just continue to get worse and worse, but I couldn't take it any longer. I had to voice my opinion via email.
My suggestion - put Drew in charge. When he writes I actually laugh, and it seems like he tries. He won't just link to another site. Also the FJM guys. They gave a damn. You should take some notes, but until then, keep up the suck.
That's His Prerogative
You never talked to the parents of the 120 folks who want to stay and become young men and leaders. You talk to "former" players who dont like to work and left the program. Cmon Mr Cragg how bias can you be? You corner two young freshman during media day and of course they are going to say that they work all day long...this is nothing more than a smear campaign and you know it! Get the facts before you write stuff like this. Talk to your fellow journalist and see what they are saying about Rosenberg's article. Presents fact Mr Craggs.
Bobby Brown
This Person Does Not Want Drew In Charge
Drew Magary is 20% more gay than your average sportswriter.
Fuck you. You fat ugly piece of shit. I know what you look like and I speak on behalf of every Niner fan when I wish you a slow and painful death. You self righteous asshole, how dare you write about the 49ers. You are dog shit and you don't deserve to write about the 49ers. I'm sorry you had to live through the 80's and 90's and watch the best team in football. Jerry Rice, Joe Montana, Bill Walsh, Ronnie Lott, your fat ass doesn't deserve to hold their sweaty jock straps, and this team will be back. Fuck you. You sit behind a desk and think that you can write whatever you please. You better watch your back Drew Magary, your personal information is on the web for anyone with half a brain to hack and find out where you live. You are a fat, angry slob. FUCK YOU. if you ever write about the 49ers again you will be sorry.
-49er Faithful
No Hitting, FYI
Bringing Craggs on was genius but it seems this Blazer Girl is the
Foxy Brown to your Reservoir Dogs. Please do not condone the voice of
blond sorority girls that have sports knowledge based off what they
hear off Sportscenter and Rome is Burning. You are ruining Deadspin
with this girl. Sorry dude. I was a big fan of yours but Jesus
Christ, did you end up at a Red Bull promotion and fell in live with
some cute girl that had half a pulse on sports?
I know i have no credence as I attempted to send you a video of a bud
of mine pissing himself in a pair of Depends, but Jesus Christ, if
Leitch pooped the bed with the idea of going on Costas Now, you are
entering the same said bed with explosive diarrhea.
I have faith that you will make the right decision. (I.e. hit it and quit it.)
Matt T.
Dallas, Tx
Yeah, You Guys Suck Too
What the fuck happened to the comments on this site? They used to be funny and entertaining, now it just seems like you have a bunch of little politically correct, crybaby pussies trying to drop life lessons on me. Every time I I read the comments on the site, I feel like I'm in the middle of a debate, with a bunch of socialist nerds, in a political science class. You have a bunch of people, who's opinions I could give two shits about, telling me why it's so wrong that some big black man knocked out a douchey looking white guy for talking shit after a football game. That is funny. That is in the word's of Kenny Banyan "Gold". Why take something so good and ruin it by talking about how disgusting nature of someone's actions. If I wanted that I would go read that yinzer Jay Mariotti's blog.
Image of Black Hammer White Lightning Black Hammer White Lightning
10:42 AM
"But isn't part of you a little bit pleased that he wiped that fucking smirk off Byron Hout's face?"
Not at all, Dash. How exactly did Hout "start it" when Blount was talking shit all week leading up to the game. As soon as he got a little of it back, he got all punchy.
I find more enjoyment from reading the comments of an article on foxnews than deadspin. You need to strip all these pansies' commenting privelages and encourage more participation from ppl like Gourmet Spud. It's bad enougg I'm wasting my company's money reading comments about sports, but at least try and help me waste their money reading something that makes me laugh.
Former avid reader of Deadspin comment section
No, Thank You. I Guess.
Random rednecks. Thank you facebook
The One Where Sweaty Will Leitch Startles A Man
This Song Has The Potential To Be Huge
I Want to Fuck Your Face Until You Sneeze Pud Snot
Oh, how I want to penetrate your mouth with my wang...
so you'll have a throatful of of scrotum meringue
I'll smack that dirty mouth with my thunder snake skin,
and maybe if you're good...(BEAT)i'll stick it under your chin.
Yeah, you herpe'd faggot, I'm gonna blow the love fog in,
drop my balls in some yolk, let's get to homo egg noggin'
Cover your back with my squishy thick man spray,
punch your mother in the face, then fuck her on a stingray
Pre Chorus:
You're flying blind, your eyes are filled with spunk,
You want my love you have to worship dago junk.
Iiiiiiii....gonna fuck you, fuck you, fuck you fuck you in the face
fuck you, fuck you, fuck you, fuck you in the face.
Fuck you, fuck you, fuck you in the face.
The pud snot's rockin', let's join the gang rape.
Tha't's all i got right now. I envision this sounding a little like Tin Machine.
|
global_05_local_4_shard_00000656_processed.jsonl/114817
|
Taoist Meditation
Health and Wellness
During meditation we quiet the mind and body, turn the 5 senses inward, and come into stillness. This class will introduce basic methods of sitting, quieting the mind, focusing the breath, and finding stillness. We'll also introduce basic Taoist theory of meditation and concepts of Jing, Qi, and Shen, the three treasures of the human body.
|
global_05_local_4_shard_00000656_processed.jsonl/114821
|
Forgot your password?
Python Open Source United States
Finance, Scientific Users Get ActivePython Updates 131
Posted by kdawson
from the snakes-on-a-filing dept.
Finance, Scientific Users Get ActivePython Updates
Comments Filter:
• IOW fudging the numbers.. only faster and easier
• Re: (Score:1, Funny)
by Anonymous Coward
only faster and easier
Since when has python ever been faster at something? *ducks*
• Re: (Score:2, Insightful)
by Migala77 (1179151)
Actually the proposal is meant to make this harder. I haven't read the full proposal (667 pages!), but it looks like the Python program requested is to help investers do their own analysis of the risks/performance/... of asset backed securities.
From http://www.sec.gov/rules/proposed/2010/33-9117.pdf [sec.gov] (p 205-206)
This proposed requirement is designed to make it easier for an investor to conduct a thorough investment analysis of the ABS offering at the time of its initial investment decision. In addition, an investor may monitor ongoing performance of purchased ABS by updating its investment analysis from time to time to reflect updated asset performance.338 In this way, market participants would be able to conduct their own evaluations of ABS and may be less dependent on the analysis of third parties such as credit rating agencies.
The waterfall is a critical component of an ABS. Currently investors receive only a textual description of this information in the prospectus, which may make it difficult for them to perform a rigorous quantitative analysis of the ABS.339
• Now people will be getting paid to obfuscate Python code.
• by drewhk (1744562)
It does not really matter. You can still execute it and do a lot of useful analysis. Simply sweeping over the input space and plotting the output will help. If the output is really crazy (chaotic, whatever), then you can conclude that the asset is too complex and risky to buy.
• What the hell is ActivePython and why the hell would anyone use it?
I've been using Python, numpy, scipy and matplotlib, and I know of absolutely no issue on any platform. How does this "news" affect me (or anyone)?
• by flink (18449)
Although now available for multiple platforms, originally ActivePerl/Python/Tcl's main attraction is that they were a commercial port of popular UNIX scripting languages to Windows with the added feature of being able to interact with ActiveX components. This made them attractive alternatives to VBScript.
• ActivePython is just another CPython Distribution. Previously, the SciPy and NumPy libraries were modules were only found 'pre-compiled' in the Enthough Python Distribution. Now when I download ActivePython I have two fewer modules to hunt down. In the windows world, it is a pain to try and build scipy and numpy. It's not enough to have the correct version of C and C++, you need a Fortran compiler as well.
• here [activestate.com]
ActiveState has left a bad taste in my mouth in the past. My quick research just now may have dug up some reasons to re-evaluate them.
• Great tools (Score:2, Insightful)
by AstroMatt (1594081)
These are great and free tools for making publication-quality plots as well as the analysis of the data.
• by SeriouslyNoClue (1842116) on Friday June 25, 2010 @11:49AM (#32691522)
Okay so I'm the lead Microsoft certified developer at a Fortune 500 company. I have to get this crappy software integrated with our project that is running as a Win32 application by the end of the month and so I downloaded the packages and dragged and dropped them into Microsoft Visual Studio. Then I created a VB file that basically calls SciPy.getSECReport(somedata) and nothing happens. I get some "Error Method or data member not found" even though the stuff I downloaded was unzipped and dragged right into the rest of my libraries in my WIN32 directory.
Oh and I also tried double clicking the packages and nothing happens ... as well as dragging and dropping the excel files onto the packages (I'm not an idiot, I've tried everything). I even went to SourceForge to find documentation on this crap and there is nothing. Nothing! Can someone help me figure this crap out? It's impossible to use, the open source nuts have made it so it isn't streamlined and integrated with Windows. I mean, I'm a pretty talented hacker (MSCD and everything) and this just goes to show how crappy open source can be.
Will someone please rewrite this in Visual Basic so I can do my job?
• Re: (Score:3, Informative)
• by X0563511 (793323)
The shitty end of the stick finally comes around and slaps em in the face. Bought into Microsoft? Sure it was painless. At first. It takes a good while to set in, but like a burn you feel the fucker nice and good.
• I must have worked for five companies that had legacy apps running on Windows servers. Lots of companies seem to start that way (Microsoft everywhere) and within a few years they realize their mistake and switch to Solaris or Linux. Trouble is, they never bother to port their Windows-based apps to *nix and are stuck supporting gimpy Windows 2000 servers forever. Do business schools cover this scenario at all? It's so common it could be called universal.
• Re: (Score:1, Funny)
by Anonymous Coward
You need to replace Visual with Vim, Microsoft with a Unix flavour, drag-and-drop with shell, unzipped with untarred or unbzipped2, WIN32 with BIN, Basic with Python or C before you will be recognised here as a hacker :D
• by codepunk (167897)
Just goes to show the value of a MSCD now doesn't it. You may wish to start with a little trip through the Win32 API.
• I think you meant to say, "Can someone at Microsoft please re-write VBasic to work with these modules?" Yeah, it can never be Microsoft's fault.
• by ceoyoyo (59147)
The funny thing is, anyone who can type "easy_install" on the command line doesn't really need Activestate's distribution and has been happily using Numpy, Scipy and Matlotlib for years.
In some ways, ActivePython is like the VB of the Python world.
• While we're on the topic, here's something that confused me about the SEC / Python idea.
Python is Turing complete, which means some Python programs may never terminate*. Has the SEC taken this into consideration in its plans to use them?
Or is the SEC planning to impose limitations such as, "These Python programs must complete within 1 hour when run on an Intel Pentiun IV 2.8 GHz with 4 GB RAM and Windows XP SP 3"?
(* Of course, real computers have finite memories, so it's actually theoretically possible to
• by maxume (22995)
It seems fairly likely that the implementation of the regulation would require the models to be useful.
But maybe not.
• Re: (Score:3, Informative)
by DoofusOfDeath (636671)
• Re: (Score:3, Funny)
by X0563511 (793323)
Or the loop was part of the design.
I leave my machine on overnight and lots of things are looping "endlessly" - and that's not a problem.
(* Of course, real computers have finite memories, so it's actually theoretically possible to detect looping on such a computer. But at this point we get back to specifying a particular memory size I think, which kind of goes to my question about the SEC specifying the particular hardware on which the program must run.)
Gag, I hate Python; it has to be the most annoying language to code in since COBOL. White-space blocked languages needed to die with the Hollerith card.
• by Jonner (189691)
If you think Python's syntax has anything to do with COBOL or Hollerith cards, I doubt you've ever even looked at any Python code.
• Good stuff (Score:4, Interesting)
by stokessd (89903) on Friday June 25, 2010 @12:15PM (#32691850) Homepage
Those packages are fantastic and really 90% of what I use in python are in those packages. I have been using enthought edition python rather than active-state (many reasons), and this tips the scales a bit more toward recommending active-state to others.
FYI: Matplotlib makes 2D and 3D presentation quality plots of data (even an absurd quantity of data). Numpy and scipy provide scientific and matrix functions that pretty much cut matlab off at the knees unless you are a simulink user. Matlab is many thousands of dollars, python is free, and they are both remarkable similar, except matlab chokes on large data sets where python doesn't.
• by iguana (8083) *
What he said! I love numpy+scipy+matplotlib. Makes my life soooo much easier.
• Re: (Score:3, Insightful)
I would be very interested in what matlab is choking on that Python wouldn't. The only data I've had matlab give me errors on is stuff that starts breaking 32-bit memory addressing. (In 32-bit Windows).
I'm a hardcore matlab user and while there is no chance in hell my company would ever give it up for python, I'd consider it for some of my personal projects.
And as limited as it is, there is one feature of the Matlab Editor that I don't think my lazy self could live without. Ctrl-A Ctrl-I, select all and aut
• Re: (Score:3, Funny)
by sourcerror (1718066)
Auto-indenting for Python? Are you serious?
• Re: (Score:3, Insightful)
Yes, I am. I know absolutely nothing about Python. I earn my keep with Matlab. I know C (which is quite useful for CANape scripts) and use PHP in my free time.
I just asked a simple question. Rather than answering, you respond with a jackass comment of "ha, are you serious?". Which now just makes me want to disregard Python and all this crap and I'll just stick with my Matlab and short PHP script for doing repetitive stuff.
It's a little less forward than RTFM but just as condescending. And you wonder why com
• well, you could use Eclipse or Emacs or any other editor.
• Re: (Score:2, Informative)
by Follis (702842)
• Re:Good stuff (Score:5, Informative)
by mrcaseyj (902945) on Friday June 25, 2010 @04:35PM (#32695986)
• by ceoyoyo (59147)
TextMate. If you're not on a Mac you have a choice of all the other Python editors, one of which must surely have those basic functions.
• Re: (Score:2, Informative)
by mikiN (75494)
• Slash should get paid for this. These packages have always been available. Where is the news?
• Not free, however (Score:5, Informative)
by osvenskan (1446645) on Friday June 25, 2010 @12:40PM (#32692288)
http://www.activestate.com/activepython [activestate.com]
• wow. these people pay to install a python distribution? check the umpteenth proof that the economy went bad because stupid people are in charge.
seriously now... I use all these, and they're free, and in ubuntu I just had to click install to get them.
• Re: (Score:3, Informative)
• Re: (Score:3, Informative)
Thus, they are free.
• Does this mean one less reason (scientific field) to use commercial Matlab and prefer free Sage/ActionPython/NumPy/SciPy/matplotlib?
Just asking, but since Sage can offer so much functionality, I wonder if now the community gets one more extra boost.
• by Vireo (190514)
I'm not sure about ActionPython -- why pay for a bundle of free components? But I for one am a long-time Matlab user, and I am slowly migrating towards Python (using numpy, scipy, matplotlib, ipython, etc.). Migration is slow mainly because I have to recode some of my own Matlab tools, but so far it's been succesful. Not painless mind you, as the differences in numpy and Matlab can cause really subtle bugs.
So while it's great that ActivePython now gets numpy and matplotlib, I wouldn't say there is one less
• by Kensai7 (1005287)
That's one reply I was looking for. Indeed I agree that the situation is as you describe it.
Nevertheless, for the frugal scientist, Sage and there rest of Python toolkits seem like nice alternatives.
• by pavon (30274)
Or you can use Octave which is about the same performance as python + SciPy/NumPy/matplotlib, but has the added benefit of being largely compatible with Matlab.
• I've been using Python + SciPy / NumPy / matplotlib / IPython at work recently and it's awesome. I don't have a MATLAB license, so whereas some of my colleagues are using MATLAB, I've been doing my plotting and analysis work with just Open Source tools. I played with Octave (albeit the Cygwin port) and SciLab but in the end, the Python-based solution gave me access to a core programming language that's very neat and that I like, plus it's really fast and proficient at dealing with large datasets. It's no
• Use Macports. Manual package management is something I try to avoid - 'sudo port install matplotlib py26-matplotlib' and all the dependencies and compiling are taken care of, not to mention the ability to cleanly uninstall if you wish. Macports recently upped to v1.9.1, which now tracks which ports you requested, so it's easy to prune away orphan libraries you no longer need.
And matplotlib is a gem. It's got a ridiculuous number of plot-styles so it's remarkably flexible - if you are into GIS, look at
• by ceoyoyo (59147)
Unless Macports supports Aqua now, don't do it.
1. Install Python (available as a double click install from python.org).
2. Install Matplotlib (available as a double click install form matplotlib.sourceforge.net
2 (alternate). At the command line type easy_install matplotlib
• I hate to essentially troll, and I hate to burst your bubbles, but these math packages aren't really doing anything all that wonderanomous. The guy I learned numerical analysis from in college used to use Excel to do a lot of his numerical techniques - and used to do a lot of them on a TI-80. Numerical analysis is all about knowing a lot to write an efficient algorithm to get the answer.
I've done Q/R decomposition in VB6 (for a real honest to god client! for money!)
I'm glad these tools are around for peo
• by Japher (887294)
Except that NumPy will use LAPACK and BLAS for it's linear algebra making it far more efficient. Try a QR decomposition on a matrix of any significant size in VB, then do the same decomposition using LAPACK and you'll see a huge difference. As for numerical analysis being about writing efficient algorithms, sure, that's true, but why would you want to rewrite those algorithms when highly optimized versions come by default?
Disclaimer: Yes, I'm sure you could get VB to use LAPACK and BLAS but python will do i
• You're comparing apples and cadillacs. Excel doesn't use LAPACK either, but Prof used to dig it because of it's profound recursive capabilties. I didn't write the Vb6 code from scratch - it was originally written in Fortran using LAPACK there, and for some reason the guy wanted it in VB6 (I guess so he could enter the parameters from a database using a form.) It was a simulation of some complexity and ran well enough for his purposes. The same calculations were being done, on ordinary PCs.
It's a distinc
|
global_05_local_4_shard_00000656_processed.jsonl/114835
|
something that obstructs, blocks, or closes up with an obstacle or obstacles; obstacle or hindrance: obstructions to navigation.
an act or instance of obstructing.
the state of being obstructed.
1525–35; < Latin obstructiōn- (stem of obstructiō) barrier. See obstruct, -ion
preobstruction, noun
1, 3. encouragement.
Dictionary.com Unabridged
Cite This Source Link To obstruction
World English Dictionary
obstruction (əbˈstrʌkʃən)
1. a person or thing that obstructs
2. the act or an instance of obstructing
3. delay of business, esp in a legislature by means of procedural devices
4. sport the act of unfairly impeding an opposing player
5. the state or condition of being obstructed
Collins English Dictionary - Complete & Unabridged 10th Edition
Cite This Source
Word Origin & History
1530s, from L. obstructionem (nom. obstructio) "a building up," from obstructus, pp. of obstruere "block up, build up, hinder," from ob "against" + struere "to pile, build" (see structure).
Online Etymology Dictionary, © 2010 Douglas Harper
Cite This Source
American Heritage
Medical Dictionary
obstruction ob·struc·tion (əb-strŭk'shən, ŏb-)
2. The state of being obstructed.
The American Heritage® Stedman's Medical Dictionary
Cite This Source
Example sentences
the job was done.
hose ferocity.
Keep the exhausts and intakes free from obstruction.
obstruction and light pollution.
Copyright © 2014 Dictionary.com, LLC. All rights reserved.
• Please Login or Sign Up to use the Recent Searches feature
|
global_05_local_4_shard_00000656_processed.jsonl/114837
|
Document Type
Honors Project
Extensive colonization was a key feature of Greek-speaking societies of the ancient Mediterranean. Diffusion of colonizers likewise led to a diffusion of the colonized, ramifications of which pepper extant literature. Rather than acknowledging these groups’ multi-vocality, Classical scholarship traditionally discusses their relationship employing the one-sided term, “Hellenization.” Even those interested in the experiences of the colonized often employ concepts such as appropriation and assimilation in their discussions. Rejecting these approaches, this paper employs a case study of Greek colonization in eastern Sicily to seek, instead, a dialectic, a lens to account for the nuances of pluralism inherent in these interactions.
© Copyright is owned by author of this document
|
global_05_local_4_shard_00000656_processed.jsonl/114843
|
Free Software Foundation!
Join now
Revision history of "Devhelp"
Jump to: navigation,
• (cur | prev) 10:17, 12 April 2011WikiSysop (Talk | contribs). . (2,290 bytes) (+2,290). . (Created page with "{{Entry |Name=Devhelp |Short description=API documentation browser for GNOME 2 |Full description=Devhelp is an API documentation browser for GNOME 2. It works natively with Gtk-d...")
Personal tools
|
global_05_local_4_shard_00000656_processed.jsonl/114858
|
Please use this identifier to cite or link to this item:
Title: Neely Hall during renovations in 2011
Authors: Gates, Elizabeth E.
Keywords: Buildings and grounds;Burrow Refectory;Renovations;Refectories;Interiors
Issue Date: 21-Jul-2011
Publisher: Memphis, Tenn. : Rhodes College
Series/Report no.: Digital Image Collection;
Buildings and Grounds;
Appears in Collections:Refectory
Files in This Item:
File Description SizeFormat
July 29 2011 023.jpg67.17 kBJPEGThumbnail
|
global_05_local_4_shard_00000656_processed.jsonl/114872
|
Cool Drinks, NY: Turmeric Elixir
[Photo: Kathy YL Chan]
The elixir is spicy with only a touch of sweetness, plus a slight citrus twist. They even blend a vegan version where cinnamon dominates and the honey is swapped out for agave. They claim a bevy of health benefits, but I'd drink this golden beverage even without any.
Sold at these retailers around New York.
Add a comment
Previewing your comment:
|
global_05_local_4_shard_00000656_processed.jsonl/114873
|
"My Makeover Didn't Work"
March 26, 2004
Nose jobs, breast implants, liposuction, Botox ... you name it, people are doing it. In 2002, 6.6 million people had cosmetic surgery. But what if changing your outside doesn't fix your inside?
"I thought I'd look like Pamela Anderson."
The result of Debra's 15 cosmetic surgeries has her questioning why she did it.
"I want my sister and mom to know I'm OK."
Kris' mom and sister worry about her many surgical procedures, and want her to stop.
"Every time we're together, people have to judge us."
Cosmetic surgery to look more like her twin didn't give Sharon the results she was hoping for.
Dr. Phil's Tip of the Day
|
global_05_local_4_shard_00000656_processed.jsonl/114911
|
About NanoNote development and availability
Jump to: navigation, search
Moved from the page:
PS: undoing my edit is a little pointless. I can redo it just as easily as you can unto it. I'm just trying to prove a point here, don't you get that? You're preserving a dead page. There is no NanoNote any more. There are a handful of people left with them, and some vestige of community spirit. But they're three years old now. I can buy something for a tenth of the price with equivalent computing power. And here's Qi Hardware, letting broken promises lie. Preserving a future that might have been, but isn't.
In other words: if you're going to preserve this page, why not update it from time to time? If you're going to make the Ya NanoNote, why don't you stop fantasizing and make it? But if you've given up on it, as you clearly have for the most part, why don't you just take down the NanoNote stuff?
Huh? I'm just a volunteer here removing endless weight-loss spams and reverting general vandalism. And I moved your remarks to the talk page where they belong. I could probably lock this page if I wanted, but maybe people want to improve this site rather than just accuse people of "lying". It's not up to me to take this page down: Wolfgang seems to have given me access to administer this site, so I'm taking on that responsibility because maybe people will pick up on this again in future. I don't think anyone is "fantasizing" about anything: these were the original plans and they haven't worked out. No conspiracy theory or big deception at all!
I'll leave this little discussion up for now, but really it belongs on the talk page, not here. Perhaps we could put a note saying that this information is out of date without accusing people who made the effort to produce something in the first place of "lying".
PaulBoddie15:15, 22 June 2013
Personal tools
|
global_05_local_4_shard_00000656_processed.jsonl/114914
|
Mastering Sleep
From Wikibooks, open books for an open world
Jump to: navigation, search
Mastering Sleep
Mastering Sleep - Alarms - Resources - Licensing - Discuss
—Benjamin Franklin
The intent of this book is to arm the reader with knowledge and skills to overcome common sleep problems. The reader may be frustrated by sleeping too much or too little, and by the stress and unsatisfactoriness he/she may feel as a result thereof.
Table of Contents[edit]
Going to Sleep[edit]
Waking Up[edit]
In other words, it's easy to fall back asleep after the alarm has gone off, often multiple times! How are we to overcome this hindrance? It takes 15-20 minutes for the body to overcome the desire to go back to bed after waking up, the last thing you should do is lie back down in bed! People have many different methods to try wake up on time, however unsuccessful they may be.
One might begin by having multiple alarms at different times, and at different places in the room. Alarms can cause you to have intense sleep inertia if your are not awoken at an arousal point (semi-awake state) during your sleep. The product WakeMate claims to wake you at these arousal points, to avoid sleep inertia. The product monitors motion during sleep, and uses actigraphy to analyze and decide to sound the alarm.
If multiple alarms don't work, it is advised to create some obstacles (chairs and the like) to the alarm clock. Moving the obstacles will take more time and will get your blood flowing a little bit. Stretching (especially around the neck and shoulders) might also help, as the body can become very sore from lying down for so long. If you don't find it easy to fall asleep in a chair, you may set one beside your alarm clock so you may sit for 15-20 min (instead of lying down) and wake up.
Polyphasic sleeping refers to trading core sleep for 20-minute naps during the day. The conversion is generally one 20-minute nap for 1.5 hours of core sleep. These naps should be as evenly spaced out as possible, but may be moved according to your schedule.
Sleep Schedule Total Amount of Sleep (hours) Amount of Core Sleep (hours) Number of 20-min Naps
Monophasic 8 8 none
Siesta 6.3 6 1
2-nap Everyman 5.2 3.5 2
3-nap Everyman 4 3 3
4-nap Everyman 2.8 1.5 4 or 5
Uberman 2 0 6
Dymaxion 2 0 4 30-min naps
The Everyman polyphasic schedule is most common since it can easily be adapted to a normal work schedule. For example, one might sleep from midnight to 3am, taking naps at 7:30, noon, and 6pm. To account for a typical work schedule, the naps are not evenly spaced.
The Uberman is considered the most difficult of the 20-min nap variety. There is no core sleep, and the naps can't be missed by more than 30 minutes or you will feel very tired! This is in contrast to the Everyman schedule, where naps may be missed by a few hours without much consequence.
The Dymaxion is known to be more difficult than the Uberman because the body's tendency to fall into deep sleep after 20 minutes, making it very difficult to wake from a nap.
|
global_05_local_4_shard_00000656_processed.jsonl/114915
|
Adel Emam
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Adel Imam
Adel Imam 2009 cropped.jpg
Born Adel Mohammed Imam
El Mansoura, Kingdom of Egypt
Personal life[edit]
Adel Emam is married and has three children: the young director Rami Imam, Sarah Emam, and Mohamed Imam, who also starred in the movie The Yacoubian Building as Taha ElShazli. He is the brother of Esam Imam and Iman Imam. His brother-in-law is the late actor Mustafa Metwalli. Adel Emam stated on a talk show with host Hala Sarhan that Amin Shalaby and the late Younes Shalaby as well as Saeed Saleh were his best friends since university. He is also an important figure in the Arab community largely because of the political roles he took on in many of his films and plays. These roles, whether he intended it or not, often put him in a critical position vis-à-vis the president or the government. He was (February, 2012) sentenced (in absentia) to three months in jail for offending Islam.[1] Imam had appealed the sentence.[2]
Selected Filmography[edit]
Adel Imam 2009
Year Film Name Translation Role
2014 Saheb El Saada The Happiness Mate's Bahgat Abou-Kheir
2013 Al Aaraf The Fortune-teller Abd-El-Hamid El-Bakry / Hazem Ghorbal / Mostafa Zahran / Araby El-Kahky / Sobhy Abou-El-Fadl / Abou-El-Haggag El-Masry
2012 Firqat Naji Atallah Naji Atallah's Team Naji Atallah
2010 Zahaymar Alzheimer's Mahmoud
2009 Bobbos Bobbos Mohsen Hendawi
2008 Hassan w Morqos Hasan and Marcus Paulus
2007 Morgan Ahmad Morgan Morgan Ahmad Morgan Morgan
2006 Emaret Yaqubian The Yacoubian Building Zakki
2005 El-sefara fi El-Omara The Embassy Is In The Building Shereef
2004 Arees Menn Gehha Amneya A Security Service Groom Khattaab
2003 Al-Tagroba Al-Danemarkeya The Danish Experiment Qadri
2002 Ameer Al-Zalaam Prince of Darkness Saeed Al-Masri
2000 Bekheet Wa Adeela 3: Hello America Bekheet And Adeela 3: Hello America Bekheet
1999 El-Wad Mahroos Betaa El-Wazeer Mahroos; The Minister's Guy Mahroos
1998 Ressala Ila Al-Wali A Message to the Governor Harfoosh
1997 Bekheet Wa Adeela 2: El-Gardal wel-Kanaka Bekheet and Adeela 2: The Pail and the Coffeepot Bekheet
1996 Al-Nom Fil-Assal Sleeping In The Honey - Fast asleep Colonel Magdi
1995 Bekheet Wa Adeela Bekheet And Adeela Bekheet
1995 Toyoor Al-Zalaam Birds Of Darkness Fathy Nofal
1994 Al-Erhabi The Terrorist Ali[3]
1993 El Mansy The Forgotten Youssef El Mansy
1992 El Erhab Wal Kabab Terrorism and Kebab Ahmed
1991 Shams Elzanaty Shams Elzanaty Shams Elzanaty
1987 Al-Nemr Wal-Ontha The Tiger And The Female Waheed
1984 Hatta La-Yeteer Al-Dukhan So that smoke won't fly Fahmi
1983 El Harrif The Street Player Fares
1983 Al-Motasawel The Beggar Hasanin
1979 Ihna Bitua' al-Autobis We're from the Bus Jabir
|1985 || Zawg tahta at-talab ||
• Ana Wa Howa Wa Heya (1964)
• Al-Nassabeen (1966)
• Dhat Al-Bijama Al-Hamraa (1967)
• Ana Feen W Enti Feen (1970)
• Madrast Al-Mushaghebeen (1973)
• Gharameyat Afifi (1975)
• Shahed Ma Shafsh Haga (1975)
• Al-Wad Sayed Al-Shaghal (1984)
• Al-Zaeem (1998)
• Body Guard (1999)
1. ^ "BBC News - Egyptian court upholds actor Adel Imam's sentence". 2012-04-25. Retrieved 2013-06-30.
2. ^ "Islamists halt filming of Egyptian TV series." Daily News Egypt. Thursday, February 9, 2012. NewsBank Record Number: 17587021. "Earlier this month, the Arab world's most famous actor, Adel Imam, was sentenced to three months in jail for "defaming Islam" in several roles on stage and screen. Imam said he would appeal the sentence."
3. ^ Murphy, Kim (12 April 1994). Movie Breaks Arab World's Silence on Terrorism Issues, Los Angeles Times, Retrieved December 14, 2010
External links[edit]
|
global_05_local_4_shard_00000656_processed.jsonl/114916
|
Benjamin Haydon
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Self-portrait of Benjamin Robert Haydon, c.1845
He gave lectures on art, and kept extensive diaries, which were published after his death.
Haydon was born in Plymouth, the only son of another Benjamin Robert Haydon, a prosperous printer, stationer and publisher, and his wife Mary, the daughter of the Rev. Benjamin Cobley, rector of Dodbrooke, near Kingsbridge, Devon. At an early age he showed an aptitude for study, which was carefully fostered by his mother. At the age of six he was placed in Plymouth grammar school, and at twelve in Plympton Grammar School, where Sir Joshua Reynolds had received most of his education. On the ceiling of the school-room was a sketch by Reynolds in burnt cork, which Haydon loved to sit and look at. Reading Albinus inspired him with a love for anatomy, and from childhood he wanted to become a painter.[1]
Head of Selene's horse, 1809. British Museum, London.
Full of energy and hope, he left home, on 14 May 1804, for London, where he entered the Royal Academy Schools. He was so enthusiastic that Henry Fuseli asked when he ever found time to eat. In 1807, at the age of 21, Haydon exhibited, for the first time, at the Royal Academy, The Repose in Egypt, which was bought by Thomas Hope a year later for the Egyptian Room at his townhouse in Duchess Street. This was a good start for the young artist, who shortly received a commission from Lord Mulgrave and an introduction to Sir George Beaumont.[1] In 1809 he finished his picture of Dentatus, which, though it increased his fame, resulted in a lifelong quarrel with the Royal Academy, whose committee hung it in a small side-room instead of the in great hall.[1] That same year, he took on his first pupil, Charles Lock Eastlake, later a leading figure in the British art establishment.
The financial difficulties which were to dog him for the rest of his life began in 1810 when, in response to Haydon having achieved a certain amount of commercial success,[2] his father stopped paying him his annual allowance of £200. His disappointment was embittered by the controversies in which he now became involved with Beaumont, for whom he had painted a picture of Macbeth, and Richard Payne Knight, who had denied both the beauties and the financial value of the Elgin Marbles.[1] Haydon was fascinated by the sculptures, and believed that they provided evidence that ancient Greek artists had studied anatomy.[3] The Judgment of Solomon, his next production, was sold for £700, to two Plymouth bankers,[4] and also brought £100 voted to him by the directors of the British Institution, and the freedom of the borough of Plymouth.[1] The income was not enough to pay off all his debts, but it maintained his credit, allowing him to continue borrowing.[5]
Portrait of Haydon by his pupil Georgiana Margaretta Zornlin
At the end of May 1814 he took advantage of the cessation of hostilities with France to visit Paris with his friend David Wilkie, and see the art collections gathered by Napoleon from across Europe at the Louvre.[6] Much of what he saw there disappointed him: he described Raphaels's Transfiguration, a painting he had particularly wanted to see as "small & insignificant".[7] At François Gerard's studio he saw a portrait of Napoleon, and began to develop a fascination with the defeated French leader, although unlike some of his more radical friends, such as William Hazlitt, Haydon never admired him politically.[8]
Portrait of William Wordsworth, 1842.
Haydon became well known as a lecturer on painting, and from 1835 onwards visited all the major cities of England and Scotland on lecture tours. His ambition was to see the most important buildings of Britain adorned with history paintings representing her glory.[1] Within three days of the destruction of the Palace of Westminster by fire in 1834 he visited the prime minister, Lord Melbourne, in order to impress on him the importance of government patronage of art, and especially the opportunities offered by the rebuilding made necessary by the disaster.[14] He lived to see the establishment of schools of design and the embellishment of the new Houses of Parliament; but in the competition of artists for the carrying out of this object, the commissioners (including his former pupil, Eastlake) considered that he had failed.[1] When, in 1843 an exhibition was held at Westminster Hall, to choose designs for paintings to decorate the Houses of Parliament.[15] Haydon submitted two cartoons, The Curse of Adam and Edward the Black Prince, but neither was awarded a prize.[1]
Critical opinion[edit]
Curtius, an example of Haydon's history painting
Haydon had several pupils, including Charles and Edwin Landseer, William Bewick, John Jackson and Edward Chatfield
In written works[edit]
In drama[edit]
• In 1977, the British actor Leonard Rossiter played Haydon in a West End play, written by satirist John Wells titled The Immortal Haydon. It is held to be one of Rossiter's greatest performances. A BBC camera crew from the documentary series Arena filmed his rehearsals for the show.
References and sources[edit]
1. ^ a b c d e f g h i j k l m n o p q r Public Domain One or more of the preceding sentences incorporates text from a publication now in the public domainChisholm, Hugh, ed. (1911). "Haydon, Benjamin Robert". Encyclopædia Britannica 13 (11th ed.). Cambridge University Press. pp. 111–112.
2. ^ O'Keefe 2009, p.91
3. ^ O'Keefe 2009, p.73
4. ^ O'Keefe 2009, p.124
5. ^ O'Keefe 2009, p.146
6. ^ O'Keefe 2009, p.128
7. ^ O'Keefe 2009, p.130
8. ^ O'Keefe 2009, p.147
9. ^ O'Keefe 2009, p.217
10. ^ O'Keefe 2009, pp.240 – 1
11. ^ O'Keefe 2009, p.245
12. ^ O'Keefe 2009, pp.280–3
13. ^ O'Keefe 2009, pp.312 –7
14. ^ O'Keefe 2009, pp.348 – 9
15. ^ O'Keefe 2009, p.441
16. ^ O'Keefe 2009,
17. ^ O'Keefe 2009, p.490
22. ^ "Influence". Vancouver Sun.
External links[edit]
|
global_05_local_4_shard_00000656_processed.jsonl/114917
|
Category:Assassinated United States Presidents
From Wikipedia, the free encyclopedia
Jump to: navigation, search
This category is for Presidents of the United States who died in office as the result of assassination.
Pages in category "Assassinated United States Presidents"
|
global_05_local_4_shard_00000656_processed.jsonl/114919
|
George Monck, 1st Duke of Albemarle
From Wikipedia, the free encyclopedia
Jump to: navigation, search
The Duke of Albemarle
George Monck 1st Duke of Albemarle Studio of Lely.jpg
George Monck, 1st Duke of Albemarle , part of the Flagmen of Lowestoft series from the studio of Sir Peter Lely, painted 1665–1666
Born December 6, 1608
Merton, Devon
Died January 3, 1670(1670-01-03) (aged 61)
Allegiance Kingdom of England
Commonwealth of England
Service/branch English Army
New Model Army
Years of service 1626-1660, 1665-1667
Rank Captain general
Battles/wars Battle of Newburn
Irish rebellion
Battle of Nantwich
Battle of Dunbar
First Anglo-Dutch War
Second Anglo-Dutch War
Awards Knight Companion of the Most Noble Order of the Garter;
Arms of Monk of Potheridge, Devon: Gules, a chevron between three lion's heads erased argent[1]
George Monck, 1st Duke of Albemarle, KG (6 December 1608 – 3 January 1670) was an English soldier, a politician and was the key figure in effecting the Restoration of the Monarchy to King Charles II in 1660.
He was born on 6 December 1608 on the family estate of Potheridge[2] in the parish of Merton, near Great Torrington, Devon, the second son of Sir Thomas Monk (1570–1627) MP for Camelford in 1626, a member of a Devon gentry family of ancient origins but then in straitened financial circumstances.[3] Sir Thomas's wife and George's mother was Elizabeth Smith, a daughter by his first marriage of Sir George Smith (d.1619) of Madworthy, near Exeter,[4] Devon, a merchant who served as MP for Exeter in 1604, was three times Mayor of Exeter and was Exeter's richest citizen, possessing 25 manors.[5] Elizabeth's sister Grace Smith was the wife of Sir Bevil Grenville[6] (1596-1643), of Bideford in Devon and Stowe, Kilkhampton in Cornwall, the Royalist soldier killed in action during the Civil War in heroic circumstances at the Battle of Lansdowne in 1643. Sir Bevil's son and heir, and thus George Monk's first cousin, was John Grenville, 1st Earl of Bath (1628–1701), a fellow promoter of the Restoration, whose elevation to the peerage was largely due to Monk's influence.[7]
Early life and career[edit]
Having assaulted the undersheriff of the county in revenge for a wrong done to his father, he was forced to go abroad.[3] Becoming a soldier, he served as a volunteer in the 1626 expedition to Cadiz, Spain,[3] and the next year fought well at the siege of the Île de Ré (an abortive attempt to aid French Protestants in the city of La Rochelle).[3][8]
In 1629 Monck went to the Netherlands, then a centre of warfare, and there he gained a high reputation as a leader and a disciplinarian. He fought bravely at the 1637 Siege of Breda, first in the breach amongst his men. In 1638 however he surrendered his commission in consequence of a quarrel with the civil authorities of Dordrecht and returned to England.[3] He obtained the lieutenant-colonelcy of the Earl of Newport's regiment.[3]
Service in the Royalist cause[edit]
At the outbreak of the Irish rebellion (1641) Monck became colonel of Robert Sidney, 2nd Earl of Leicester's regiment under the command of James Butler, 1st Duke of Ormonde. All the qualities for which he was noted through life—his talent for making himself indispensable, his imperturbable temper and his impenetrable secrecy—were fully displayed in this post. The governorship of Dublin stood vacant, and Leicester recommended Monck.[3]
However, Charles I overruled the appointment in favour of Charles Lambart, 1st Earl of Cavan, and Monck surrendered the appointment without protest. James Butler, 1st Duke of Ormonde viewed him with suspicion as one of two officers who refused to take the oath to support the Royal cause in England and sent him under guard to Bristol.[3]
Monck justified himself to Charles I in person, and his astute criticisms of the conduct of the Irish war impressed the king, who gave him a command in the army brought over from Ireland during the English Civil War.[3] Taken prisoner by Parliament's Northern Association Army under Sir Thomas Fairfax, 3rd Lord Fairfax of Cameron at the Battle of Nantwich in January 1644, he spent the next two years in the Tower of London.[3] He spent his imprisonment writing his Observations on Military and Political Affairs.[3]
Career under the Commonwealth and Protectorate[edit]
George Albemarle, General Anglois. d'Apres Barlow undated French engraving
Although Parliament disavowed the terms of the truce, no blame was attached to Monck's recognition of military necessity.[3] He next fought at Oliver Cromwell's side in Scotland at the 1650 Battle of Dunbar, a resounding Roundhead victory.[3] Made commander-in-chief in Scotland by Cromwell, Monck completed the subjugation of the country.[3] In February 1652 Monck left Scotland to recover his broken health at Bath, and in November of the same year he became a General at Sea in the First Anglo-Dutch War,[3] which ended in a decisive victory for the Commonwealth's fleet and marked the beginning of England's climb to supremacy over the Dutch at sea.
On his return to shore Monck married Anne Radford (née Clarges).[3] In 1653 he was nominated one of the representatives for Devon in Barebone's Parliament.[9] He returned to Scotland, methodically beating down a Royalist insurrection in the Highlands. At Cromwell's request, Monck remained in Scotland as governor.[3]
Restoration of the monarchy[edit]
Monck was elected Member of Parliament for both Devon and Cambridge University[9] in the Convention Parliament of 1660. Though he protested his adherence to republican principles, it was a matter of common knowledge that the parliament would have a strong Royalist colour.
Charles II's gratitude[edit]
King Charles II rewarded Monck suitably for his services in restoring him to his throne. He was made Gentleman of the Bedchamber,[13] Knight of the Garter, and Master of the Horse in the King's household.[3] The King also raised him to the peerage in 1660 as Baron Monck of Potheridge in the County of Devon, Baron Beauchamp of Beauchamp in the County of Devon, Baron of Teyes in the County of Devon, Earl of Torrington in the County of Devon and Duke of Albemarle. He also received an annual pension of £7,000.[13] The preamble of his peerage patent recited his female descent from the Beauchamp family, Earls of Warwick, which family had also held the titles Baron Beauchamp, Baron Teyes and anciently the Norman comté of Aumale, traditionally Latinized to "Albemarle".[14] The title Earl of Warwick was at the time of his elevation unavailable to him, being then held by the Riche family.[14] In the same year of 1660 his first cousin and colleague in the success of the Restoration, Sir John Grenville (1628–1701), was created Earl of Bath, and Monck obtained from the king the extraordinary warrant promising the reversion of his dukedom to his cousin the Earl of Bath should his issue fail in the male line. The 1st Duke's son did indeed die childless in 1688, but no claim was in fact then made to the dukedom by the Grenvilles to the new king, William III, and the title was conferred in 1697 as an earldom to Arnold Joost van Keppel, 1st Earl of Albemarle (1670–1718), the king's favourite. However, in fulfillment of Charles II's promise, a supposed Dukedom of Albemarle was bestowed in 1721 in France by the Old Pretender "King James III" onto the 1st Earl of Bath's nephew, and heir male to the family which held the extinguished Earldom of Bath, the Jacobite George Granville, 1st Baron Lansdowne (1666-1735) created Baron Lansdowne of Bideford in 1712, who had fled England in 1721.[15]
He entirely concurred in the disbandment of the New Model Army, and only the regiment of which he was colonel, given the name Coldstream (Guards) after his death[16] survives unamalgamated to this day,[13] as such one of the oldest military formations in the world, becoming the last standalone representative of the New Model Army when the Blues and Royals merged in 1969.
As a further token of Charles II's gratitude, in 1663 Albemarle was named one of eight Lords Proprietors given title to a huge tract of land in North America which became the Province of Carolina, the present-day American states of North and South Carolina. The Albemarle Sound in North Carolina is named after him.[17]
End of career[edit]
His last service occurred in the Raid on the Medway of 1667, when the Dutch fleet sailed up the Thames, and Monck, though ill, hurried to Chatham to oppose their farther progress.[13] From that time he lived generally privately (although he officially served as First Lord of the Treasury).[3]
Death, burial & succession[edit]
He died of edema on 3 January 1670, "like a Roman general with all his officers about him".[13] He is buried in Westminster Abbey.[13] His titles were inherited by his only son, Christopher Monck, 2nd Duke of Albemarle (1653–1688),[3] on whose death they became extinct.[13]
Monument in St Giles in the Wood[edit]
For such a great product of Devon it may be a surprise that no monument of any sort exists to the Duke in the parish church of Merton, in which parish was situated his ancestral estate of Potheridge. The church was however heavily restored in 1872-5.[18] The road sign on entering the village does however proclaim: "Merton, birthplace of General George Monck". The remaining truncated wing built by him at Potheridge survives as a former farmhouse, now used as an adventure holiday centre. Some remnants of its grandeur survive inside, including a grand wooden staircase and above on the ceiling three ornate oval plasterwork wreaths framing paintings.[19]
The Duke's connection with this church, the parish church of the Rolle family of Stevenstone, is not clear. It is not known where his residence in Devon was, if any, whilst his mansion of Potheridge was being rebuilt on a grand scale after 1660
Critiques of his character[edit]
—Gilbert Burnet.[22]
—Burnet's editor's comment.[22]
2. ^ Vivian, p.569
7. ^ J. Hoace Round, Family Origins and Other Studies, ed. Page, William, 1930, p.163, The Granvilles and the Monks: "Great as was the favour bestowed on Sir John Granville" (i.e. later cr. 1st Earl of Bath) "and his brothers under Charles II, the actual part taken by Sir John in the restoration of the King was less potent to obtain it than his lucky relationship to George Monk, the prime agent in that event"
9. ^ a b History of Parliament Online - Monck, George
11. ^ Anonymous 1911, pp. 723,724.
13. ^ a b c d e f g h i j k Anonymous 1911, p. 724.
14. ^ a b Round, p.164
15. ^ Round, pp.141-2, 165
17. ^ "Museum of the Albermarle". Retrieved 19 April 2011.
20. ^
21. ^ Vivian, p.569
22. ^ a b Burnet 1850, pp. 66,67
Further reading[edit]
Military offices
New title Commander-in-Chief of the Forces
Title next held by
James Scott
Honorary titles
English Interregnum Lord Lieutenant of Devon
Succeeded by
The Earl of Bath
Custos Rotulorum of Devon
Preceded by
The Earl of Dorset
The Earl of Berkshire
Lord Lieutenant of Middlesex
Succeeded by
The Earl of Craven
Political offices
Preceded by
Edmund Ludlow
(Lord Deputy)
Lord Lieutenant of Ireland
Succeeded by
The Duke of Ormonde
Preceded by
Prince Rupert of the Rhine
Master of the Horse
Succeeded by
The Duke of Buckingham
Preceded by
The Earl of Southampton
(Lord High Treasurer)
First Lord of the Treasury
Succeeded by
The Lord Clifford of Chudleigh
(Lord High Treasurer)
Peerage of England
New creation Duke of Albemarle
2nd creation
1660 - 1670
Succeeded by
Christopher Monck
|
global_05_local_4_shard_00000656_processed.jsonl/114920
|
German nationality law
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Coat of arms of Germany.svg
German citizenship is based primarily on the principle of jus sanguinis. In other words one usually acquires German citizenship if a parent is a German citizen, irrespective of place of birth.[1]
A significant reform to the nationality law was passed by the Bundestag (the German parliament) in 1999, and came into force on 1 January 2000. The new law makes it somewhat easier for foreigners resident in Germany on a long-term basis, and especially their German-born children, to acquire German citizenship.[2]
The previous German nationality law dated from 1913. The law was amended by the Nazi regime (see Nuremberg Laws), and these amendments were revoked by Allied occupational ordinance in 1945. Germany has ratified the European Convention on Nationality, which came into force in Germany on 1 September 2005.[3] All German nationals are automatically also citizens of the European Union.
Under the Third Reich, in 1934, the German nationality law was amended to abolish separate state citizenships and creating a uniform Reich citizenship, with the central Reich authorities having power to naturalise or denaturalise persons. In 1935, the Reich Citizenship Law (Reichsbürgergesetz), the second of the Nuremberg Laws, created a new category called "state subjects" (Staatsangehörige) to which Jews were assigned, thereby withdrawing citizenship from previous Jewish citizens. Only "Aryans" retained Reich citizenship.
In 13 March 1938, the German nationality law was extended to Austria following the Anschluss which annexed Austria to Germany. On 27 April 1945 Austria was re-established and conferred Austrian citizenship on all persons who would have been Austrian on that date had the former (pre-1938) nationality law of Austria remained in force. Such persons lost their German nationality automatically.[4] Also see Austrian nationality law.
The Nazi amendments of 1934 and the Nuremberg Laws of 1935 were revoked by Allied occupational ordinance in 1945, restoring the 1913 nationality law. That law was operational until the 1999 reforms.[5]
Article 116(1) of the German Basic Law (constitution) confers, within the confines of the laws regulating the details, a right to citizenship upon any person who is admitted to Germany (in its 1937 borders) as "refugee or expellee of German ethnic origin or as the spouse or descendant of such a person." At one time, ethnic Germans living abroad in a country in the former Eastern Bloc (Aussiedler) could obtain citizenship through a virtually automatic procedure. Since 1990 the law has been steadily tightened to limit the number of immigrants each year. It now requires immigrants to prove language skills and cultural affiliation.
Article 116(2) entitles persons (and their descendants), who were denaturalised by the Nazi government, to be renaturalised if they wish. Those among them, who after May 8, 1945 take up residence in Germany are automatically considered German citizens. Both regulations, (1) and (2), provided for a considerable numbers of Poles and Israelis, residing in Poland and Israel, to be concurrently German citizens.
Birth in Germany[edit]
• has a permanent residence permit; and
• has been residing in Germany for at least eight years.
Such children will be required to apply to retain German citizenship by the age of 23. Assuming this law is not changed or overturned by a court, these persons will normally be required to prove they do not hold any other foreign citizenship. The only exceptions are EU citizens and citizens of countries where it is impossible to lose your citizenship, like Morocco, Nigeria or Iran, for example.
Descent from a German parent[edit]
1. The child would be stateless.
Naturalisation as a German citizen[edit]
Naturalisation by entitlement[edit]
• he/she has legal capacity or a legal representative
• he/she is a European Union or Swiss citizen in possession of the appropriate residence permit which permits the free movement of persons, or he/she is a non-EU/Swiss citizen who has been granted a permanent right of residence
• he/she possesses an adequate knowledge of German
Exceptions to the normal residence requirements include:
• former German citizens
Naturalisation by discretion[edit]
Victims of Nazi persecution[edit]
Under Article 116 (2) Basic Law,[8] some people who lost German citizenship under the Nazi regime may be eligible for naturalisation without requiring residence in Germany or renunciation of their existing citizenship. Descendants of such persons may also be eligible for German citizenship.[9]
German-born children[edit]
• An application for naturalisation was required by 31 December 2000.
Naturalization statistics[edit]
Between 1995 and 2004, 1,278,424 people have obtained German citizenship by naturalization. This means that about 1.5% of the total German population had been naturalized during that period.
Source: Official 2012 Migration Report, p. 212
Russian Federation 4,583 4,972 3,734 2,764 4,381 2,965 3,167
Ukraine 2,978 3,295 3,656 3,889 3,844 4,264 3,691
Loss of German citizenship[edit]
Other cases where German citizenship can be lost include:
• A German citizen who voluntarily serves in a foreign army (over and above compulsory military service) from 1 January 2000 may lose German citizenship unless permission is obtained from the German government. From 6 July 2011, the permission to serve above compulsory military service is automatically given for the armies of EU, EFTA, NATO countries and the armies of Australia, Canada, Israel, Japan, New Zealand, the Republic of Korea and the United States.[10]
Dual citizenship[edit]
Allowed under following circumstances:
2. If a German citizen acquires a non-EU/non-Swiss citizenship with the permission ("Beibehaltungsgenehmigung") of the German Government (e.g. existing relative ties or property in Germany or in the other country or if the occupation abroad requires domestic citizenship for execution.). The voluntary acquisition of a non-EU/non-Swiss citizenship without permission usually means the automatic loss of the German citizenship (but see Point 4). The permission is not necessary if the other citizenship is of another EU country or of Switzerland or if dual citizenship was obtained at birth.
3. If he/she is a refugee and holds a 1951 travel document during naturalization.
4. If a child born to German parents acquires another citizenship at birth (e.g. based on place of birth [birth in a jus-soli country such as Canada or the United States of America], or descent from one parent [one German parent and one foreign parent]).
Citizenship of the European Union[edit]
Germans living abroad[edit]
• Switzerland: 265,944 (2009, 3.3% of Swiss population)[11]
• Austria: 124,710 (2008, 1.5% of Austrian population)[12]
• Australia: 106,524 (2006, 0.53% of Australian population)[13]
• Russia: 597,212 (2002, 0.4% of Russian population). [14]
• United Kingdom: 92,000 (2008, 0.15% of UK population)[15]
• France: 75,057 (1999, 0.12% of French population).[16]
2. ^ Reform of Germany's citizenship and nationality law
6. ^
7. ^ "Germany Nationality Act, Section 14". Retrieved 2012-06-30.
11. ^ Wohnbevölkerung nach detaillierter Staatsangehörigkeit, Swiss Federal Statistical Office
12. ^ Wer sind die Deutschen in Österreich?
14. ^ "Всероссийская перепись населения 2002 года". Retrieved 18 September 2012.
15. ^
16. ^
17. ^
External links[edit]
|
global_05_local_4_shard_00000656_processed.jsonl/114921
|
From Wikipedia, the free encyclopedia
Jump to: navigation, search
For the village in Hamarøy, Norway, see Karlsøy, Nordland.
Karlsøy kommune
Gálssa suohkan
View of the Kåja island with Torsvåg Lighthouse off Vanna
View of the Kåja island with Torsvåg Lighthouse off Vanna
Coat of arms of Karlsøy kommune
Coat of arms
Official logo of Karlsøy kommune
Troms within
Karlsøy within Troms
Karlsøy within Troms
Coordinates: 70°7′48″N 19°25′51″E / 70.13000°N 19.43083°E / 70.13000; 19.43083Coordinates: 70°7′48″N 19°25′51″E / 70.13000°N 19.43083°E / 70.13000; 19.43083
Country Norway
County Troms
District Nord-Troms
Administrative centre Hansnes
• Mayor (2011) Hanny Ditlefsen (Ap)
• Total 1,090.04 km2 (420.87 sq mi)
• Land 1,049.22 km2 (405.11 sq mi)
• Water 40.82 km2 (15.76 sq mi)
Area rank 97 in Norway
Population (2012)
• Total 2,355
• Rank 308 in Norway
• Density 2.3/km2 (6/sq mi)
• Change (10 years) -5.0 %
Demonym Karlsøyværing[1]
Time zone CET (UTC+1)
• Summer (DST) CEST (UTC+2)
ISO 3166 code NO-1936
Official language form Neutral
Website www.karlsoy.kommune.no
Data from Statistics Norway
Karlsøy (Northern Sami: Gálssa suohkan) is an island municipality in Troms county, Norway. The administrative centre of the municipality is the village of Hansnes. Other villages include Dåfjord, Hessfjord, Karlsøya, Torsvåg, Vannvåg, and Vannareid. The municipality is made up of many islands including Ringvassøya, Reinøya, Vannøya, Karlsøya, and Rebbenesøya plus several uninhabited islands (many of which were formerly inhabited). Some of the currently uninhabited islands include Helgøya, Nordkvaløya, Grøtøya, and Nord-Fugløya.[2]
General information[edit]
Map of Karlsøy
Karlsøy was established as a municipality on 1 January 1838 (see formannskapsdistrikt). On 1 January 1867, the district of Ullsfjord (population: 862) was transferred from Karlsøy to the neighboring municipality of Lyngen. On 1 September 1886, Helgøy was separated from Karlsøy to become a municipality of its own. This left Karlsøy with 1,334 inhabitants. Then on 1 January 1964, the municipality of Helgøy was merged back into the municipality of Karlsøy. At the same time, all of the mainland areas of Karlsøy (the northern part of the Lyngen peninsula, with 1,001 inhabitants) was transferred from Karlsøy to neighboring Lyngen municipality. After all the changes, the new Karlsøy had 3,414 residents. On 1 January 2008, the southern part of the island of Reinøya was transferred from Tromsø to Karlsøy.[3][4]
The municipality (originally the parish) is named after the small Karlsøya island (Old Norse: Kalsøe), since the first church (Karlsøy Church) was built there. The first element is the genitive case of the male name Karl and the last element is øy which means "island". Prior to 1909, the name was spelled Karlsø.[5]
The coat-of-arms is from modern times. They were granted on 12 December 1980. The arms show the head of a White-tailed Eagle on a blue background, since one of Europe's largest colonies of these birds is found on the island of Nord-Fugløya in the municipality. Furthermore the eagle symbolizes the importance of fishing for the municipality.[6]
The Church of Norway has one parish (sokn) within the municipality of Karlsøy. It is part of the Tromsø arch-deanery in the Diocese of Nord-Hålogaland.
Churches in Karlsøy
Parish (Sokn) Church Name Location of the Church Year Built
Karlsøy Helgøy Church Helgøya 1742
Karlsøy Church Karlsøya 1854
Ringvassøy Church Hansnes 1977
Sengskroken Church Vanna 1962
Karlsøy is among the world's most important exporters of dried and salted cod, with Portugal, Spain, and Brazil among the main markets. The population is almost totally dependent on fishing. There are also goat herding businesses and some music professionals that live on the island community. There is an increasing amount of tourism, mostly as a result of the festival that runs in the Summer promoting the isle and the alternative history there. As a result there are plans for 50 holiday homes to be built on the isle.
Geography and nature[edit]
The island Vanna seen from the ferry
The municipality consists of islands only. Ringvassøya, Norway's sixth largest island, is the largest island in the municipality. Nordkvaløya, Helgøya, Karlsøya, Vanna (Vannøya), Reinøya, and Rebbenesøya are the other major islands.
The islands of Rebbenesøy and Ringvassøy are split (as was Reinøya before 2008), with the southern part belonging to neighboring Tromsø municipality. The reason is that the borders were drawn when boat was the only means of transportation; then it made sense that the southern parts of the islands belonged to Tromsø while the northern parts belonged to Karlsøy. Today, when roads have replaced the boats, the situation is awkward, which is why the Norwegian government transferred all of Reinøy to the municipality of Karlsøy on 1 January 2008.[4] Soltindan is the highest mountain on the island of Ringvassøy at 1,051 m (3,448 ft) above sea level.
Karlsøya, the little island after which the municipality is named, has a picturesque village with the stately 19th century Karlsøy Church. The inhabitants are an interesting and welcoming mix of the original inhabitants, hippies, and Norwegian Muslims. The flora on the island is also interesting.
Helgøya, the former seat of the independent municipality of Helgøy in the western part of present Karlsøy, is today a more or less abandoned village of picturesque wooden houses and the old Helgøy Church. The island can only be reached when services are celebrated in the church, and ferry rides are organized.
Lake Skogsfjordvatn, in the centre of Ringvassøy, is a beautiful lake with good fishing, surrounded by lush, sub-Arctic forests. This is Norway's largest lake in an island. The island of Vannøya has several picturesque villages, notably Burøysund and Torsvåg, the latter offering a wonderful view of the Atlantic from the Torsvåg Lighthouse.
Climate data for Torsvåg
Average high °C (°F) 0.7
Daily mean °C (°F) −1.1
Average low °C (°F) −2.9
Precipitation mm (inches) 73
Avg. precipitation days (≥ 1 mm) 14.5 12.5 12.1 11.9 10.5 11.0 10.9 11.7 15.0 17.4 16.3 15.9 159.7
Source: Norwegian Meteorological Institute[7]
The pretty, nondescript municipal centre is at Hansnes, which can be reached through an undersea tunnel from Tromsø, and the drive is about one hour. From here ferries depart to Vannøy, Reinøy, and Karlsøy. The Langsund Tunnel is under construction and was planned to be completed by 2015, but it is currently on hiatus. It will connect the islands of Reinøya and Ringvassøy. The few inhabitants of Rebbenesøy are served by a ferry from Mikkelvik on the western side of Ringvassøy.
View from Burøysund
Karlsøy is full of interesting places:
2. ^ Store norske leksikon. "Karlsøy" (in Norwegian). Retrieved 2012-12-16.
4. ^ a b "Søndre del av Reinøy i Troms overføres til Karlsøy kommune" (in Norwegian). Norwegian Ministry of Local Government and Regional Development. Retrieved 2008-12-04.
7. ^ "eKlima Web Portal". Norwegian Meteorological Institute.
External links[edit]
|
global_05_local_4_shard_00000656_processed.jsonl/114923
|
Kjell Aukrust
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Aukrust in 1965
Kjell Aukrust (19 March 1920 – 24 December 2002) was a Norwegian author, poet and artist.
He was born in Alvdal as a son of Lars Olsen Aukrust (1886–1965) and Louise Walmsnæss (1887–1973). He was a nephew of Olav Aukrust, brother of Odd Aukrust, a noted economist who was responsible for research at Statistics Norway, and first cousin of Tor Aukrust. He was married to Kari Holter since 1947.[1]
He is most famous for his memoirs of his childhood in Alvdal in the books Simen, Bonden and Bror Min, and his creation of the fictional Norwegian village of Flåklypa and its cast of idiosyncratic characters. This setting was the basis of the 1975 animated film "Flåklypa Grand Prix", directed by Ivo Caprino. The film was the first full length animated feature in Norway, became an international success and has been translated into more than seventy languages. In Britain it is known as "Pinchcliffe Grand Prix". The protagonist Reodor Felgen (English version: Theodore Rimspoke) has become synonymous in Norway with Rube Goldberg type contraptions.
Some of the characters who populated the village of Pinchcliffe were also the basis for the first full length handdrawn animated feature in Norway, "Solan, Ludvig og Gurin med reverompa".[2] Released in 1998, this movie takes place in Oslo and Alvdal. In Britain it is known as "Gurin with the Foxtail".
1. ^ Jor, Finn. "Kjell Aukrust". In Helle, Knut. Norsk biografisk leksikon (in Norwegian). Oslo: Kunnskapsforlaget. Retrieved 17 December 2011.
2. ^ "Gurin with the Foxtail on IMDB". IMDB. (Norwegian)
External links[edit]
|
global_05_local_4_shard_00000656_processed.jsonl/114925
|
Louis Pouzin
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Louis Pouzin (born 1931 in Chantenay-Saint-Imbert, Nièvre, France) invented the datagram and designed an early packet communications network, CYCLADES.[1][2]
He studied at the École Polytechnique.
His work influenced Robert Kahn, Vinton Cerf, and others in the development of TCP/IP protocols used by the Internet.[1]
Having participated in the design of the Compatible Time Sharing System (CTSS), Pouzin wrote a program called RUNCOM around 1963/64. RUNCOM permitted the execution of contained commands within a folder, and can be considered the ancestor of the command-line interface and shell scripts. Pouzin was, in fact, the one who coined the term shell for a command language in 1964 or '65. Pouzin's concepts were later implemented in Multics by Glenda Schroeder at MIT.[3]
In 2013, he founded Savoir-Faire, an alternative root company, with Chantal Lebrument and Quentin Perrigueur. [4][5]
1997 - Pouzin received the ACM SIGCOMM Award for "pioneering work on connectionless packet communication".[1]
2003 - Louis Pouzin was named a Chevalier of the Legion of Honor by the French government on March 19, 2003.
2012 - Pouzin was inducted into the Internet Hall of Fame by the Internet Society.[6]
2013 - Pouzin was one of five Internet and Web pioneers awarded the inaugural Queen Elizabeth Prize for Engineering.[7]
1. ^ a b c "Postel and Pouzin: 1997 SIGCOMM Award Winners", ACM SIGCOMM web site
2. ^ "A Technical History of CYCLADES", Technical Histories of the Internet & other Network Protocols (THINK), University of Texas, 11 June 2002
3. ^ "The Origin of the Shell", Multicians, accessed 31 March 2012
4. ^ http://owni.fr/2012/01/13/les-nouvelles-root-de-l%E2%80%99internet/
5. ^ Savoir-faire biographies - http://www.open-root.eu/decouvrir-open-root/biographies/
7. ^ "2013 Winners Announced" Queen Elizabeth Prize for Engineering
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.