id
stringlengths
50
55
text
stringlengths
54
694k
global_05_local_5_shard_00000035_processed.jsonl/760
What is meta? × Example: [and(int first, int second)][1] [1]: http://easymock.org/api/easymock/3.0/org/easymock/EasyMock.html#and(int, int) It's rendered correctly in edit preview. share|improve this question 1 Answer 1 up vote 1 down vote accepted The space is a problem, you will need to encode that space. Spaces are not allowed in URLs. share|improve this answer Yes, change space in URL to %20 then it works. –  aleung Nov 30 '10 at 21:57 You must log in to answer this question. Not the answer you're looking for? Browse other questions tagged .
global_05_local_5_shard_00000035_processed.jsonl/761
This question already has an answer here: I want to know why I haven't got Electorate Badge. I think I fulfill its requirements: I have almost 750+ votes and around 39 percent Votes on question but I still don't have the badge. I think I am entitled to that badge. If I am not, then how much more percentage do I require to get that badge? Following is link to my profile marked as duplicate by gnat, Code Lღver, IronMan84, Reuben Mallaby, Seymour Feb 19 at 19:01 1 Answer 1 up vote 9 down vote accepted You say you have 750+ votes, and 39% of them are on questions. That means you've got around 292 votes on questions alone. The badge requires 600 votes on questions alone, and 25% of all your voting history has to be on questions. So yes, you fulfill the requirement for the percentage currently. But you have 307 question votes to go before the badge is awarded. Voted on 600 questions and 25% or more of total votes are on questions , so what does this means? i mean it just says 600 questions and and 25 percent or more are on questions –  noobie-php Apr 29 '14 at 13:55 It means just that; you need to vote on 600 questions, and it looks like you have only 298 votes on questions. Answer votes don't count! You'll basically have the 25% requirement once you hit 600 questions and have less than 1800 answer votes. –  ChrisForrence Apr 29 '14 at 14:01 @noobie-php To earn the badge, you need to cast 600 question votes. Then once you've reached 600 question votes, 25% of all of your votes (on both questions and answers) must be on questions. Maybe reading this answer on Meta Stack Exchange (find the Electorate heading in the answer) could bring some clarification? –  Steven V Apr 29 '14 at 14:03 Ok i got the point thanks all. –  noobie-php Apr 29 '14 at 14:04 @noobie-php - You can see how many question votes you have on your profile by scrolling to the bottom and finding the "Votes Cast" section on the right. You'll be looking for the "by type" part. –  ChrisForrence Apr 29 '14 at 14:04 Not the answer you're looking for? Browse other questions tagged .
global_05_local_5_shard_00000035_processed.jsonl/786
Submitted by nullifier 711d ago | news Injustice gets Man of Steel movie DLC Warner Bros has just announced that Injustice will receive a Man of Steel Superman skin from the newly released Warner Bros. Pictures and Legendary Pictures’ feature film “Man of Steel.” (Injustice: Gods Among Us, PS3, Xbox 360) Alternative Sources Genki  +   711d ago Nice. I thought the movie was awful, but the suit really does look remarkable. Love the style of the 'S' emblem as well. CaptainPunch  +   711d ago Awful? Get out of here. Nightcrawler913  +   711d ago ^^what he said. pixelsword  +   710d ago "I thought." As opposed to "it's a well-known scientific fact that..." KillrateOmega  +   711d ago You think you are safe? I WILL FIND YOU! HiddenMission  +   711d ago Well we think your awful...Genki Inception  +   711d ago I think Genki watched Superman Returns, not Man of Steel. Donnieboi  +   711d ago Superman Returns was pretty decent too. Inception  +   711d ago Superman Returns decent? I'll give that applause to Kevin Spacey. His amazing as Lex Luthor and because of him Superman Returns is watchable. But if you compare it to Man of Steel, Superman Returns looks bad. #1.4.2 (Edited 711d ago ) | Agree(1) | Disagree(1) | Report Genki  +   710d ago Nice to know that most of the community can't deal with an opinion. In the years I've been frequenting this site, it's crystal clear that not much has changed. Funny thing is that I said more positive than negative, but leave it to the N4G lynch mob to zero in on whatever they disagree with and curbstomp it into the ground. Grow up folks, it's just a movie. PositiveEmotions  +   711d ago The movie was cool KillrateOmega  +   711d ago "I was bred for this! I was trained all my life to be a warrior! Where did you train? A farm?" God, I loved Man of Steel :) #3 (Edited 711d ago ) | Agree(4) | Disagree(0) | Report | Reply Norad6  +   711d ago I read that line in Vegeta's voice. :/ Speaking of voice, will this skin come with a voice swap of Henry Cavil's voice like they did with Stephen Amell's Arrow voice? o_o Nice!!! OMG loved MoS :D General Zod character is coming aswell. Any chance we'll get a Michael Shannon skin or at the very least a Terrance Stamp skin? :P Plz WB? optimus  +   710d ago Man of steel was one of the worst movies of the year and one of the worst comic movies of all time...i think i enjoyed superman returns a little more than this super snoozefest.... It tried to be 2 movies in one and you could see the struggle not just with clark not knowing who he is or should be but with the direction the movie takes...it's like they tried to piece together superman 1 and 2 and got lost in the process... I can accept deviating from comic folklore a little bit but they changed some of the most prominent things about superman... There simply was no sense of heroism throughout the movie despite his ill faded heroic acts. The score was forgettable the moment it faded in every scene...there just wasn't any buildup like in the original...and zod? Puh-lease! way to tarnish one of the greatest on screen villains of all time....Not to mention the entire cast was one of the worst castings i've seen for any movie... I simply could not be convinced that lois lane was indeed lois lane. I kept waiting for perry white to give her a blue pill. Really?? Lawrence??? Of course, all of the shortcomings might have had a chance if they had a better written script than the garbage they were spewing. "i will find you!" oh he's mad now...i think. It's no wonder Christopher Nolan approved this garbage, after the tripe he did with batman this was right up his ally. To quote the real and still the best General Zod of all time... "this super-MAN is nothing of the kind." And neither is his suit. #5 (Edited 710d ago ) | Agree(1) | Disagree(2) | Report | Reply wanieldiik  +   710d ago you should watch catwoman, superman 4, iron man 3. batman & robin, or spiderman 3 if you believe this to be one of the worst comic book movies of all time #5.1 (Edited 710d ago ) | Agree(0) | Disagree(0) | Report | Reply optimus  +   710d ago I did, this ranks right up there with those... I will say this about the ones you mentioned... At least they have moments of utter ridiculousness that you can laugh at...i couldn't find any in the man of steel and if there were, it was obviously forgettable. wanieldiik  +   709d ago oh well... to each his own :) Genki  +   710d ago Agreed. The dialogue was utterly insipid, and the deadpan acting from most of the cast is a direct result of Goyer's shallow writing. Pacing? It was nonexistent; transtions were missing as each scene jumped from place to place aimlessly. Made for a painfully incoherent narrative, and by the time the action kicked in, I just didn't care anymore. It would have been nice if the title character had some semblance of development, but Clark probably had around 30 lines throughout the course of the film. I can't understand how films like Transformers get the derision they do, but a film like this, which makes similar mistakes and then some, gets praise. I would think that Superman fans would have higher standards, but apparently not. Whizz bang action and excessive angst are the formula these days it seems. optimus  +   710d ago EXACTLY...it boggled me when jonathan kent told him the world wasn't ready for him when he had already done a few heroic acts prior to that point and the "world" around him didn't seem to care. And why people seem to dismiss the fact that clark gets reintroduced to her as clark kent when she spent half of the movie talking to farm boy clark kent...i know i wasn't that sleepy to miss a pivotal scene that would explain that part... Maybe the director figured people will eat it up cause Christopher nolan is backing it...i sure hope they get a different director and writer for the next one. Add comment New stories Hatred: The Kotaku Review Resident Evil Revelations 2 Review : GEARNUKE Top 5 Video Game Releases - June 2015 Is Valve shafting themselves and game developers with Steam Refunds? Nom Cats: Tips, Tricks, Cheats and Strategy Guide 20 Times Luigi Was Literally You
global_05_local_5_shard_00000035_processed.jsonl/792
- this week Gender: F Origin of Emelia: Variation of Emilia or Amelia Emelia's Popularity in 2014: #625 Emelia takes elements from soundalike sisters Emilia and Amelia, which actually derive from different roots and have different meanings. So rather than cobbling the two together, it's better to make a choice. Rival or work? Latin or German? Pick a lane and stick to it. People who like Emelia also like: Alena   Carmine   Corina   Eliot   Emelie   Emelyn   Emilee   Evrose   Mattie   Mattison   Monica   Rosemarie   Tatyana   Thayer   Zoie Show me more names similar to Emelia Comment on Emelia Famous People Named Emelia Emelia Jane Burns, Australian actress Pop Culture References for the Name Emelia Inspired by Emelia? Discover 1000s more amazing names you'll love with NameHunter Hunt Me Some Names
global_05_local_5_shard_00000035_processed.jsonl/798
From NeuroLex (Redirected from Category:NCI) Jump to: navigation, search National Cancer Institute Name: National Cancer Institute Abbreviation: NCI, CA Is part of: National Institutes of Health Super-category: Government granting agency *Id: nlx_inv_1005082 Parts of National Cancer Institute Aarnaud, Akash, Bandrow, Memartone Facts about National Cancer InstituteRDF feed AbbrevNCI  + CurationStatusuncurated  + DefiningCitation  + DefinitionOne of the US National Institutes of Healt One of the US National Institutes of Health and the Federal Government's principal agency for cancer research and training. The National Cancer Act of 1971 broadened the scope and responsibilities of the NCI and created the National Cancer Program. Over the years, legislative amendments have maintained the NCI authorities and responsibilities and added new information dissemination mandates as well as a requirement to assess the incorporation of state-of-the-art cancer treatments into clinical practice. It was established under the National Cancer Institute Act of 1937. the National Cancer Institute Act of 1937. Idnlx_inv_1005082  + Is part ofNational Institutes of Health  + LabelNational Cancer Institute  + ModifiedDate6 March 2015  + SuperCategoryGovernment granting agency  + SynonymNational Cancer Institute  +
global_05_local_5_shard_00000035_processed.jsonl/819
WaPo's Richard Cohen: Perry's Global Warming Beliefs Make Him Joe McCarthy The media must really believe Rick Perry can defeat their beloved President Obama for they are coming at the Texas governor with guns blazing. On Tuesday, Washington Post columnist Richard Cohen likened Perry to the late Sen. Joe McCarthy because of his disbelief in manmade global warming: "Intellectually unqualified to be president." If disbelief in this theory makes one unqualified to be president, Cohen must think almost half of the nation are unqualifed to be Americans. As Gallup reported in March: Yet to Cohen, Perry's beliefs make him a McCarthyite: Let's look at what Perry actually said that has generated so much consternation by America's global warming-obsessed media: No one can argue with this first sentence, for global warming has certainly been politicized. As for more and more climate scientists "coming forward and questioning the original idea that man-made global warming is what is causing the climate to change," the website Climate Depot along with the Oregon Global Warming petition continually demonstrate this. Of course, no one debates "our climates change" or that they've "been changing ever since the earth was formed." Given what we've been able to uncover about these scientists in the past couple of years, neither do a growing percentage of Americans according to Gallup: Since last fall, there have been widespread news accounts of allegations of errors in scientific reports on global warming and alleged attempts by some scientists to doctor the global warming record. These news reports may well have caused some Americans to re-evaluate the scientific consensus on global warming. Roughly half of Americans now say that "most scientists believe that global warming is occurring," down from 65% in recent years. The dominant opposing thesis, held by 36% of Americans, is that scientists are unsure about global warming. An additional 10% say most scientists believe global warming is not occurring. As such, Perry's views are by no means out of the mainstream - unless, of course, you're a liberal columnist that has bought into Nobel Laureate Al Gore's nonsense hook, line and sinker, and your resolve hasn't been shaken by the findings in the past two years: List Cohen as part of this intransigent group; he concluded his piece: Well, if Cohen continues to completely believe in a theory regardless of the holes being blown in it, it is really him and others in his profession that are demonstrating a lack of critical thinking. Americans are in large numbers beginning to see through the con that folks like Cohen have foisted upon the population, and the press can't stand it. Now they've set their sights on political candidates that are also skeptical. This might make them feel better about themselves as they try to save their drowning ship, but with public opinion moving against them, they're likely to find they're preaching to a continually diminishing choir. Even more frustrating for them, those in Perry's pews are growing by the day. Noel Sheppard Noel Sheppard
global_05_local_5_shard_00000035_processed.jsonl/852
User:Mike Hwang From OpenWetWare Jump to: navigation, search I am a new member of OpenWetWare! Contact Info Mike Hwang (an artistic interpretation) Mike Hwang (an artistic interpretation) I work in the Your Lab at XYZ University. I learned about OpenWetWare from Chris Anderson, and I've joined because Wiki Access. • Year, PhD, Institute • Year, MS, Institute • Year, BS, Institute Research interests 1. Interest 1 2. Interest 2 3. Interest 3 leave a comment about a paper here All Medline abstracts: PubMed HubMed Useful links Personal tools
global_05_local_5_shard_00000035_processed.jsonl/883
VA/UCLA researchers pinpoint role of histamines in waking Sepulveda, CA-- A study by scientists with the Veterans Affairs' Neurobiology Research Laboratory and UCLA Neuropsychiatric Institute shows that brain cells containing the chemical histamine are critical for waking. Detailed in the May 27 edition of the journal Neuron, the findings show that the cessation of activity in histamine cells causes loss of consciousness during sleep, while cessation of activity in other brain cells--those containing the brain chemicals norepinephrine or serotonin--causes loss of muscle tone in sleep. The findings also help explain why antihistamines, often taken to control allergies, cause drowsiness. "Our findings greatly improve our understanding of the brain activity responsible for maintaining consciousness and muscle tone while awake," said Dr. Jerome Siegel, senior author on the study. "The findings should aid in the development of drugs to induce sleep and to increase alertness." Siegel is chief of neurobiology research at the VA Greater Los Angeles Healthcare System, Sepulveda, and a professor at the UCLA Neuropsychiatric Institute. The research team conducted their study using dogs with the sleep disorder narcolepsy, in which sudden collapses of muscle tone, known as cataplexy, occur during waking. Although waking alertness is maintained during cataplexy, muscle tone is lost. In both narcoleptic and normal animals, cells containing histamine, norepinephrine and serotonin are active in waking and inactive in sleep. The researchers studied their activity in cataplexy to pinpoint the roles of the three cell groups in the loss of consciousness and loss of muscle tone that occur during sleep. The VA/UCLA researchers found that histamine cell activity continued during cataplexy, indicating that their activity is linked to waking. The team also found that norepinephrine and serotonin cell activity ceases in cataplexy, showing that their activity is related to muscle tone, rather than waking. In 2000, Siegel's team published its findings that narcoleptics had 95 percent fewer hypocretin (orexin) nerve cells in their brains than those without the illness. The study was the first to show a possible biological cause of narcolepsy. Source: Eurekalert & others     Published on All rights reserved.
global_05_local_5_shard_00000035_processed.jsonl/886
Search tips Search criteria  Cell Host Microbe. Author manuscript; available in PMC 2009 November 13. Published in final edited form as: PMCID: PMC2658612 Structure and function of SifA indicate that interactions with SKIP, SseJ, and RhoA family GTPases induce endosomal tubulation The Salmonella typhimurium type III secretion effector protein SifA is essential for inducing tubulation of the Salmonella phagosome and binds the mammalian kinesin-binding protein SKIP. Co-expression of SifA with the effector SseJ induced tubulation of mammalian cell endosomes, similar to that induced by Salmonella infection. Interestingly, GTP bound RhoA, RhoB, and RhoC also induced endosomal tubulation (ET) when co-expressed with SseJ, indicating that SifA likely mimics or activates a RhoA-family GTPase. The structure of SifA in complex with the PH domain of SKIP revealed that SifA has two distinct domains; the amino-terminus binds SKIP and the carboxyl-terminus has a fold similar to SopE, a Salmonella effector with Rho GTPase guanine nucleotide exchange factor activity (GEF). Similar to GEFs, SifA interacted with GDP-bound RhoA, and purifed SseJ and RhoA formed a protein complex, suggesting that SifA, SKIP, SseJ, and RhoA family GTPases cooperatively promote host membrane tubulation. Salmonellae are medically important intracellular pathogens that cause a variety of diseases ranging from gastroenteritis to typhoid fever. Salmonella enterica serovar Typhimurium (S. typhimurium) invasion and replication within host cells requires the delivery of effector proteins to the host cytosol by two type III secretion systems (TTSS), which are located on Salmonella pathogenicity island (SPI)-1 and -2 (Haraga et al., 2008). Bacterial mediated macropinocytosis is induced by translocation of SPI1 effectors across the plasma membrane. Several SPI1 effectors facilitate invasion and alter inflammatory responses, in part, by manipulating various host small Rho family GTPases. Following internalization, salmonellae reside and replicate within a phagosome. From there, SPI2 effectors are translocated to the cytoplasmic face of the phagosome membrane, where they promote intracellular replication and virulence by undefined mechanisms. One SPI2-dependent morphological alteration observed during infection is the formation of tubular membranous extensions of the phagosome, which are microtubule-dependent and have been termed Sif for Salmonella-induced filaments (Brumell et al., 2002; Garcia-del Portillo et al., 1993). The phagosome and Sif (also referred to as phagosome tubulation for conceptual simplicity), co-localize with markers of late endosomes and lysosomes, suggesting they form from these compartments (Brumell et al., 2001b). SifA is a SPI2 TTSS effector, which localizes to the phagosome and is required for its tubulation (Brumell et al., 2002; Stein et al., 1996). Salmonella ΔsifA mutants are attenuated for virulence in mice and for intracellular replication in cultured macrophages, indicating that phagosome tubulation is likely an important pathogenic mechanism that promotes intracellular replication (Beuzon et al., 2000; Stein et al., 1996). Other SPI2 effectors that localize to the phagosome, including SseF, SseG, SopD2, and PipB2, have been shown to modulate phagosome tubulation, however, only SifA seems to be absolutely required (Guy et al., 2000; Jiang et al., 2004; Knodler and Steele-Mortimer, 2005). SifA binds to a host protein termed SifA kinesin interacting protein (SKIP) that also binds the plus-end directed microtubule motor kinesin (Boucrot et al., 2005). The observation that phagosome tubulation is impaired in Salmonella-infected cells subjected to SKIP siRNA (Boucrot et al., 2005), suggests that the SifA-SKIP interaction contributes by manipulating interactions with microtubule motors. SifA does not have homology to any proteins of known function, but was recently identified as a member of the WxxxE family of bacterial TTSS effectors that mimic activated small GTPases or activate their pathways through a novel mechanism (Alto et al., 2006). Small GTPases are guanine nucleotide binding proteins that interconvert between active GTP-bound and inactive GDP-bound states as a mechanism for regulating a wide variety of cellular processes, including actin polymerization, cell division and polarity, and vesicular trafficking (Takai et al., 2001). Active GTPases regulate cellular function by recruiting proteins, also called effectors, which initiate cell-signaling cascades or mediate downstream cellular events. Host GTPases are the target of bacterial virulence proteins that have guanine exchange factor (GEF), GTPase activating protein (GAP) (Patel and Galan, 2006), or guanine dissociation inhibitor (GDI) (Prehna et al., 2006) activity, suggesting that altering these pathways is a common mechanism by which TTSS effectors manipulate host cells. The TTSS effectors with GTPase mimicry activity were identified by the presence of a minimal tryptophan (W) and glutamic acid (E) containing (WxxxE) motif, which is essential for their function, and in contrast to other effectors that target GTPases, WxxxE effectors appeared to function by directly mimicking activated GTPases (Alto et al., 2006). Characterized members of this family include Map, IpgB1, and IpgB2, produced by E. coli and Shigella spp., which induce classic actin cytoskeleton rearrangements like those induced by the activated GTPases Cdc42, Rac1, and RhoA, respectively (Alto et al., 2006). Effectors with the WxxxE motif do not have known structural similarity to GTPases, and their activity is unaltered by GTPase inhibitors, although their effects require downstream GTPase effector proteins (Alto et al., 2006). Consistent with the possibility that WxxxE effectors mimic GTPases, IpgB1 was shown to bind to ELMO, an effector of RhoG, as a mechanism to activate cytoskeletal rearrangements (Handa et al., 2007). In Salmonella, the WxxxE motif is present in SifA and a similar SPI2 effector SifB (Alto et al., 2006). Furthermore, SifA contains a carboxy-terminal CaaX motif, which is prenylated by PGGT-1, a mammalian protein geranylgeranyl transferase that lipidates GTPases to facilitate membrane localization (Reinicke et al., 2005). Therefore, SifA may function by mimicking an activated GTPase on the phagosome membrane. SifA has been shown to regulate the stability of the Salmonella phagosome with the SPI2 effector SseJ, because ΔsifA bacteria lose the phagosome membrane and are released into the cytoplasm in an SseJ-dependent fashion (Ruiz-Albert et al., 2002). In contrast to its role with SifA in phagosome stability, SseJ is not essential for the Sif phenotype as ΔsseJ bacteria are competent for phagosome tubulation (Birmingham et al., 2005). SseJ has homology to glycerophospholipid-cholesterol acyl transferase enzymes of the lipase superfamily and localizes to the phagosome membrane during infection (Freeman et al., 2003). Purified SseJ has deacylase and acyltransferase activity in vitro, and SseJ catalytic-triad mutants that reduce deacylase activity are attenuated for virulence in mice, indicating that SseJ enzymatic activity contributes to intracellular replication in host tissues (Nawabi et al., 2008; Ohlson et al., 2005). To better understand how Salmonella effectors and host proteins contribute to phagosome tubulation, we investigated the interaction of SifA and SseJ with host membranes and proteins. Co-expression of SifA and SseJ in HeLa cells induces endosomal tubulation The observation that SseJ and SifA coordinate the stability of the Salmonella phagosome membrane (Ruiz-Albert et al., 2002) suggested that they might function cooperatively to alter host membranes. To test this, HeLa cells were transiently transfected with epitope-tagged SseJ and SifA, either alone or together, and monitored for alteration of the endosomal/lysosomal compartment. SseJ alone localized to membranous LAMP1 positive, late endosomal/lysosomal vesicles (Figure 1A), and produced the formation of globular membranous compartments as observed previously (Ruiz-Albert et al., 2002). SifA alone was diffusely cytoplasmic and occasionally localized to the plasma membrane, but did not exclusively co-localize with LAMP1 (Figure 1B). Other studies have reported that ectopic expression of SifA induces filamentation of lysosomal membranes (Brumell et al., 2001a), however, we rarely observed this phenotype (<0.1% of SifA expressing cells, Figure 1E). In contrast, HeLa cells co-expressing SseJ and SifA exhibited a 100-fold increase (15.4 ± 3.6%) in tubule-like extensions of SseJ-coated late endosomes/lysosomes (Figure 1C and 1E). We termed these structures endosomal tubules (ET), and noted that they were very similar in appearance to the phagosome tubules in Salmonella infected HeLa cells. In contrast, co-expression of SifB, a WxxxE effector with 26% identity and 46% similarity to SifA, with SseJ did not induce ET (Figure 1D), and SifB localization was identical to its expression alone (Figure S1). The significant increase of ET upon co-expression of SseJ and SifA indicated that SifA and SseJ likely cooperate, and that co-expression of these proteins can be used to study membrane tubulation. Figure 1 SseJ and SifA induce endosomal tubulation The conserved motifs of SseJ and SifA are important for endosomal tubulation To determine whether SseJ enzymatic activity contributes to ET, SseJ containing mutations in the catalytic triad residues, which are essential for enzymatic activity and virulence in mice (Ohlson et al., 2005), was co-expressed with SifA in HeLa cells and analyzed for ET. Catalytic triad mutant SseJ co-localized with SifA like wild-type SseJ (data not shown), however, no ET was observed (Figure 1E). These results demonstrate that the enzymatic activity of SseJ is essential for ET formation. Unlike SseJ, the biochemical activities of SifA are poorly understood. SifA belongs to the WxxxE family of bacterial effectors (Alto et al., 2006) and interacts with the host protein SKIP (Boucrot et al., 2005). To determine whether the conserved WxxxE residues of SifA were important for ET formation, a mutant AxxxA-SifA construct, containing alanine substitutions of the tryptophan (W197) and glutamic acid (E201) residues, was co-expressed with SseJ. Despite normal expression and co-localization (data not shown), ET induction in AxxxA-SifA expressing cells was reduced by 70% compared to wild type SifA, as only 4.6 ± 1.5% of SseJ and mutant SifA co-transfected cells expressed ET compared with 15.4 ± 3.6% for SseJ and wild type SifA (Figure 1E). Consistent with these observations, ΔsifA S. typhimurium expressing AxxxA-SifA was attenuated for phagosome tubulation (8.0 ± 1.8%) compared to ΔsifA expressing wild type SifA (22.1 ± 1.8%) (Figure 1F). This difference was not due to altered translocation because equivalent translocation was observed (Figure S2). These results provide further support that the WxxxE motif contributes to the function of SifA. The dual requirement of the conserved motifs of SseJ and SifA supports the hypothesis that cooperation between their activities is important to ET formation. ET formation involves microtubules and SKIP To determine whether ET induced by SifA and SseJ were similar to the phagosome tubules induced during infection, we analyzed ET for the known properties of phagosome tubulation; LAMP1 co-localization, nocodazole sensitivity, and SKIP-dependence (Boucrot et al., 2005; Garcia-del Portillo et al., 1993). Like phagosome tubulation, ET induced by SseJ and SifA stained positively for LAMP1 (Figure 2A). In addition, nocodazole treatment completely inhibited ET formation, however cytochalasin D had no effect, similar to Salmonella-induced phagosome tubulation (Brumell et al., 2002) (Garcia-del Portillo et al., 1993) (Figure 2B). Together, these results suggest that ET form from late endosomal/lysosomal compartments and form along microtubules. Figure 2 Tubulated endosomes induced by SseJ and SifA co-localize with LAMP1 and require microtubules and SKIP for formation SKIP is a mammalian protein essential for phagosome tubulation, which binds to SifA and the microtubule motor kinesin (Boucrot et al., 2005). In cells co-expressing SseJ, SifA and SKIP, all three proteins co-localized in clusters towards the cell periphery (Figure 2C). When exogenously expressed, SKIP co-localized more exclusively with SifA than SseJ, and SKIP localized to ET at the cell periphery (Figure 2D). This likely resulted from its interaction with kinesin, producing outward movement towards the plus-ends of microtubules. The localization of SKIP to ET at the cell edge suggested that SKIP might contribute to ET formation via its interaction with kinesin. In HeLa cells subjected to SKIP siRNA, only 3.0 ± 1.8% of cells co-expressing SseJ and SifA had ET (Figure 2E) compared to 11.4 ± 3.5% in cells with non-targeting siRNA. Although a lack of anti-SKIP antibody precluded confirmation of SKIP depletion, these results are consistent with work showing that SKIP siRNA inhibits phagosome tubulation (Boucrot et al., 2005), and indicate that SKIP is important for ET. Therefore, our findings strongly support the notion that ET induced by exogenous SifA and SseJ recapitulates the molecular cooperation between SifA and SseJ during S. typhimurium infection. Importantly, it is also evident that ET form through a dual-mechanism that involves the SifA-SKIP interaction and SseJ enzymatic activity. SseJ and constitutively active RhoA-family GTPases induce endosomal tubulation The presence of the WxxxE motif suggested that SifA may function to mimic a specific GTPase. However, in contrast to the actin cytoskeleton phenotypes observed for other WxxxE effectors (Alto et al., 2006), actin staining in cells expressing SifA did not exhibit alterations in lamellipodia, filopodia, or stress fiber formation (data not shown). Interestingly, a yeast-two hybrid screen using a mammalian spleen cDNA library and full-length SseJ as bait identified five independent interacting clones that encoded full length RhoA or RhoC cDNAs, suggesting that SseJ can bind these GTPases (data not shown). Therefore, various epitope-tagged GTPases, including RhoA, RhoB, RhoC, Rac1, Cdc42, and Rab7, were assayed for the ability to induce ET by co-expression with SseJ in HeLa cells. Remarkably, expression of constitutively active RhoA, RhoB and RhoC with SseJ induced ET (Figure 3A, 3B, and 3C), indicating that SifA could have a parallel activity to these highly similar small GTPases. Despite weaker staining for RhoA due to differing antibody quality, ET induced by RhoA, RhoB and RhoC were virtually identical, and there were no differences between them in regard to co-localization with SseJ. In contrast, no ET was observed when SseJ was co-expressed with Rac1, Cdc42, or Rab7 (Figure 3D, 3E, and 3F), despite recruitment of Cdc42 to the endosome membrane by SseJ (Figure 3E). These results suggest that SifA could mimic or activate RhoA, RhoB and/or RhoC. If this were the case, then GTP-bound RhoA should induce more ET than GDP-bound RhoA when co-expressed with SseJ. Indeed, ET was observed in 14.7 ± 1.9% of cells expressing SseJ and constitutively active RhoA, compared with only 3.4 ± 1.4% and 1.3 ± 1.0 % of cells expressing SseJ and wild-type or dominant negative RhoA, respectively (Figure 3G). Similar to expression of SifA alone, RhoA expression alone did not induce ET (data not shown). Thus, co-expression of SseJ with activated RhoA family GTPases can induce ET in the absence of SifA, probably as a result of recruitment of the activated GTPase to the endosome membrane. Figure 3 SseJ induces endosomal tubulation with RhoA, RhoB and RhoC, but not Rac1, Cdc42, or Rab7 SseJ and RhoA form a protein complex Our observation that SseJ and RhoA family members interact in the Y2H assay and can cooperate to induce ET suggested that they directly bind. To test this, purified His-SseJ was mixed with GST-RhoA or GST control protein and immunoprecipitated with anti- His anti-bodies. His-SseJ co-immunoprecipitated GST-RhoA, but not GST alone (Figure 4A) providing further evidence that SseJ binds RhoA. Purified His-SseJ and GST-RhoA were also mixed and analyzed by size exclusion chromatography (SEC). SseJ alone eluted according to its molecular weight and GST-RhoA alone eluted predominantly as a GST-dimer, however, when His-SseJ and GST-RhoA were pre-incubated together, a novel peak corresponding to a molecular weight of 2 His-SseJ for each GST-RhoA dimer appeared (Figure 4B). Immunoblotting confirmed the presence of both proteins in the novel peak (Figure 4C), demonstrating that SseJ and RhoA directly bind in the absence of accessory proteins and their native intracellular environments. Figure 4 SseJ interacts with RhoA and SifA SifA interacts indirectly with SseJ If SifA were a structural mimic of RhoA family GTPases then SifA and SseJ might directly interact. Therefore, GST-SifA, GST-RhoA, and GST control protein bound to glutathione beads were incubated with lysate from cells expressing myc-SseJ and analyzed for interaction with SseJ. Immunoblotting revealed that GST-RhoA and GST-SifA specifically precipitated myc-SseJ, suggesting that SseJ interacts with SifA in addition to RhoA (Figure 4D). However, the interaction of SseJ with SifA appeared to be weaker than with RhoA, and attempts to demonstrate direct binding between SseJ and SifA with purified proteins and the Y2H assay were unsuccessful (data not shown), indicating that other mammalian cofactors may be required for SifA and SseJ to interact. Thus, the interaction between SifA and SseJ appears to be indirect. The amino-terminal domain of SifA interacts with SKIP To provide further insight into the protein-protein interaction network required for ET, the interaction of SKIP with SifA was analyzed. Previously, the PH domain (PHD) of SKIP was shown to be necessary and sufficient to bind SifA in vitro (Boucrot et al., 2005). To identify the PHD-interacting regions in SifA, His-tagged fragments of SifA were purified and tested for binding to SKIP. SifA residues 1–330 (lacking the CaaX motif) bound to SKIP PHD (residues 774–883), but a C-terminal fragment, residues 101–330 containing the WxxxE motif, did not interact (Figure 5A), indicating the N-terminus of SifA binds to SKIP. To further validate the interaction, GST-PHD and His-SifA (1–330) were co-expressed in E. coli and purified to homogeneity. These proteins formed a stable complex that could be purified by SEC (data not shown), and exhibited a dissociation constant of 2.58 µM as measured by isothermal titration calorimetry (Figure 5B). These results demonstrate that the amino-terminal domain of SifA mediates the interaction with SKIP. Figure 5 Structure of SifA complexed with the PH domain of SKIP Specific recognition of SKIP by the amino-terminus of SifA To gain a greater understanding of the SifA-PHD interaction, the SifA-PHD protein complex isolated by SEC was crystallized and the structure solved using selenium Multiple-wavelength Anomalous Diffraction (MAD). The final atomic model was refined to the resolution 2.6 Å with crystallographic working and free factors 25.8% and 28.8%, respectively (Table S1). One SifA-PHD complex is present in each asymmetric unit and their interaction results in a 1:1 stoichiometric complex, with a total burial of 1020 Å2 surface area (Figure 5C). SKIP PHD exhibits a typical PH domain fold, with 7 strands forming a barrel-like structure blocked by an α-helix at one end, while SifA consists of two separately folded domains. The N-terminal PHD-interacting domain of SifA contains a five-stranded β-sheet flanked by three helices, and the C-terminal WxxxE-containing domain contains two three-helix bundles that form a V-shaped structure. The interaction between the N- and C-terminal domains of SifA is mediated by a C-terminal anti-parallel β-sheet that packs against one of the two N-terminal three-helix bundles. Consistent with our previous results, the SifA-SKIP interaction is exclusively mediated by the N-terminus of SifA (Figure 5C). Specific recognition of SifA by PHD is achieved through a large network of hydrogen bonds and van der Waals contacts. Specifically, four pairs of main chain hydrogen bonds form an anti-parallel β-sheet between SifA and PHD, dominating their interaction (Figure 5D). Mutational analyses confirm the importance of hydrogen-bonding residues L130 and M131 in SifA, and R831, C870, G829, and R832 in PHD, as purified SifA or PHD with these mutations exhibits abolished or reduced binding to wild type PHD or SifA in vitro, respectively (Figure 5E). In addition, ET formation was reduced when a SKIP-binding mutant, L127I-M131D-SifA, was co-expressed with SseJ (Figure 5F), supporting our previous conclusion that SifA-SKIP binding is important for ET. The C-terminus of SifA is similar to the guanine nucleotide exchange factor SopE A database search using DALI was performed to determine whether SifA had similarity to known structures of GTPases, but none shared structural homology with SifA. However, this analysis revealed that the Salmonella SPI1 TTSS effector SopE, which activates the host GTPases Rac1, Cdc42, and RhoG by guanine-nucleotide exchange factor (GEF) activity (Hardt et al., 1998), was the closest structural homologue of the SifA C-terminus, with a root-mean-square-deviation (RMSD) of 3.8 Å over 106 α-carbon atoms. This structural comparison indicates that SifA may be a member of the GEF family of proteins. Superposition of the SifA-PHD and SopE-Cdc42 (Buchwald et al., 2002) complexes (Figure 6A) demonstrated that the potential GTPase-binding site of SifA is located far from SKIP and is available for binding other protein(s). Interestingly, some of the Cdc42-interacting residues of SopE are conserved in SifA (figure 6B). The residues in the catalytic loop of SopE that interact with the two switch loops of Cdc42 are also similar to those in the corresponding loop of SifA in that they are all hydrophobic. Binding of Cdc42 to SopE may contribute to the comparatively large conformational difference between SopE and SifA around the region of the catalytic loop. To further support the idea that SifA exhibits a GEF-like conformation, SifA was found to specifically precipitate the GDP-bound form of RhoA, but not GTP-bound RhoA (Figure 6C), indicating that like GEFs, SifA preferentially interacts with GDP-bound GTPases. However, no GEF activity was specifically detected with purified SifA alone (data not shown), indicating that other unidentified bacterial or host factors may be required. Figure 6 SifA contains a C-terminal fold similar to SopE and interacts with GDP-RhoA The WxxxE motif is conserved among the family of bacterial TTSS effectors with GTPase mimicry activity, and is required for their function. Our structure reveals that the WxxxE motif of SifA is located on α-helix 6, around the junction region of the two three-helix bundles in the C-terminus. W197 in the WxxxE motif plays an important role in maintaining the local structural integrity by making extensive hydrophobic contacts with M261, the α-carbon atom of P257, and I258 (Figure 6D). Due to these interactions, W197 is completely buried and solvent-inaccessible. Additionally, E201 in the WxxxE motif further stabilizes α-helix 8 by interacting with I258 through a hydrogen bond and hydrophobic contact (Figure 6D). Thus, in SifA this motif likely plays an important role in maintaining a proper conformation of the loop preceding α-helix 8, which is the counterpart of the catalytic loop in SopE. Therefore, it is plausible that mutations in the WxxxE motif alter the surface conformation of residues important for protein binding, and this may be the mechanism by which WxxxE-motif mutations reduce activity of SifA and other family members. Together, our results suggest that SifA and SseJ cooperate through interactions with SKIP and RhoA family GTPases to induce ET, and other unidentified mammalian proteins likely participate in this process (Figure 7). Figure 7 A model of the contribution of SifA, RhoA, SseJ, and SKIP to endosomal tubulation Since the original observation that S. typhimurium induces phagosome tubulation, elucidation of the contributing factors and their molecular mechanisms has been occult. Here, we show that two SPI2 effector proteins, SseJ and SifA, cooperatively induce endosomal membrane tubulation (ET), which, like Salmonella-induced phagosome tubulation, required microtubules and SKIP. Furthermore, SseJ was found to bind RhoA and to induce ET with the GTP-bound form. The structure of the SifA-SKIP PHD complex demonstrated that the N-terminus of SifA binds SKIP, while the C-terminus folds similar to the SPI1 GEF SopE. In addition, SifA was shown to interact with the GDP-bound form of RhoA, as would be expected for a GEF. These results suggest that both SseJ and SifA interact in a protein complex with SKIP and RhoA family GTPases as a mechanism to promote phagosome tubulation. Our observation that expression of SseJ and SifA recapitulated phagosome tubulation was surprising since previous reports suggested that SseJ is not required for phagosome tubulation (Birmingham et al., 2005) and that SifA expressed alone, or with the SPI2 effector SopD2, induces LAMP1-positive filamentous structures (Brumell et al., 2001a; Jiang et al., 2004). However, we only rarely observed ET on expression of SifA alone or with SopD2, using a variety of different cell lines (data not shown). These differences could reflect experimental techniques since others have measured SifA-induced phenotypes using LAMP1 staining. Assaying specifically for SseJ-localized compartments revealed an increase in SifA-induced ET, indicating that even if SifA alone can induce ET at low frequency, the activity is increased in the presence of SseJ. In the absence of SseJ, other S. typhimurium effectors with redundant membrane altering activities likely contribute to phagosome tubulation in vivo. A redundant-effector scenario is not without precedent as effectors in other TTSS, including those encoded on SPI1 required for S. typhimurium invasion, have been demonstrated to have overlapping and/or redundant functions (Staskawicz et al., 2001). For example, deletion of at least three SPI1 effectors, including the GEF SopE, is required for strains to exhibit reduced bacterial invasion and ruffling phenotypes (Zhou et al., 2001), while exogenous expression of a single effector in mammalian cells will produce membrane ruffling. Previous work on WxxxE-containing bacterial effector proteins indicated that they mimicked the activities of different Rho GTPases (Alto et al., 2006). Expression of Map, IpgB1, and IpgB2, produced the classic GTPase-specific actin cytoskeleton effects of filopodia, lamellipodia, and stress fibers, respectively, which allowed characterization of their activities. Although SifA-expressing cells did not exhibit the actin cytoskeleton phenotype of any activated GTPase, including the stress fibers characteristic of RhoA, our work provides evidence that a property of SifA is to stimulate RhoA-family GTPase signaling pathways on the phagosome membrane, as constitutively active RhoA, RhoB, and RhoC were able to substitute for SifA in cooperating with SseJ to induce ET. Moreover, the SifA structure revealed that SifA contains a C-terminal domain that resembles the GEF SopE. This structural observation is consistent with the result that SifA can interact with the GDP-bound form of RhoA, as would be expected for a GEF. Though preliminary attempts to detect SifA GEF activity for RhoA were unsuccessful (data not shown) it is plausible that additional proteins could be essential for SifA GEF activity or that RhoA may not be the SifA substrate. The native substrate of SifA could be RhoB or RhoC, since they are also competent to induce ET with SseJ, and like mammalian GEFs, SifA could be GTPase specific. RhoB is an attractive candidate for the specific activity of SifA since it localizes to trafficking vesicles in mammalian cells (Adamson et al., 1992). We attempted to identify which GTPase participates in ET by screening for reduced ET in the presence of siRNA targeting each RhoA family GTPase, and found that ET was reduced when RhoABC or RhoC alone were depleted (data not shown). However, since these proteins are important for cell cycle and their depletion can result in major alterations to the cytoskeleton, this method could have indirect effects that may not directly relate to mechanisms of ET induction. Interestingly, SifA contains a stretch of residues (243–257) that is unique among WxxxE effectors (Alto et al., 2006). In the structure of SifA, this region appears to be stabilized by W197 of the WxxxE motif, and is analogous to the catalytic loop of SopE that interacts with Cdc42 (Buchwald et al., 2002), suggesting that the same region of SifA may also be involved in interactions with RhoA family GTPases. Consistent with this idea, mutating W197 and E201 reduced the ET-inducing activity of SifA (Figure 1F). Therefore, though it is unknown whether SifA functions to bind or activate GTPases, we tentatively conclude that rather than functioning independently of small GTPases, as originally postulated for the WxxxE family, SifA interacts with GDP-bound RhoA family GTPases as a mechanism to manipulate host cell processes. In addition, it is possible that SifA binds and/or activates RhoA as a mechanism to modulate the activity of SseJ, since it also binds RhoA. Importantly, this study also demonstrated the structural basis of the interaction of SifA with the kinesin-binding protein SKIP and provided additional evidence that the SifA-SKIP complex is essential to ET. The crystal structure of the PH domain of SKIP with SifA provided fine detail of the interaction between SKIP and the amino-terminal domain of SifA, and mutants generated based on the interface provided additional evidence that the interaction of SKIP with SifA is essential to ET. Thus, SKIP likely facilitates ET by linking SifA protein complexes to the microtubule network. Our results indicate that at least four proteins are required to induce ET. This leads to a working model for the mechanism of membrane tubulation, as depicted in Figure 7. Lipidated SifA localizes to the membrane and binds SKIP via its N-terminus, which could serve to link SifA and the membrane to the microtubule network by binding to kinesin. Moreover, this interaction could also provide the direction and stability for membrane tubulation. SifA could also bind membrane associated GDP-bound RhoA (or RhoB or RhoC) via its C-terminus, and possibly activate it through GEF activity. Since SseJ also interacts with RhoA, RhoA may link SseJ and SifA on the membrane, and possibly other mammalian binding partners interact with the SKIP/SifA/RhoA/SseJ complex through additional direct protein-protein interactions. Each of the proteins in the complex appears to be required for membrane tubulation to occur, and its possible that their interaction influences the specific activity of each other. Precedent for the analysis of membrane tubulation has been established by analyzing cultured cells treated with Brefeldin A (BFA), which causes tubulation of Golgi membranes (Lippincott-Schwartz et al., 1991). BFA inactivates the secretory GTPase Arf, causing Golgi compartments to elongate and fuse with the ER, creating tubular structures (Nebenfuhr et al., 2002). Interestingly, BFA-tubulation is blocked when cytoplasmic phospholipases are inhibited (de Figueiredo et al., 2001), suggesting that phospholipases are required for BFA-tubulation, and this may be similar to the requirement of SseJ activity for ET. Additional proteins may also participate in ET, such as BAR domain-containing proteins, which induce membrane tubulation in vitro by sensing and maintaining membrane curvature (McMahon and Gallop, 2005). Regardless of the specific mechanism, our work indicates that SifA and SseJ recruit protein complexes that link GTPase activity and membrane alteration with movement along microtubules. This is consistent with live videomicroscopy of S. typhimurium infected HeLa cells, which indicates that LAMP1-positive phagosome tubules demonstrate dynamic and directional motility (, courtesy of Alex Merz and Maggie So). One of the most fascinating, yet perplexing, questions regarding S. typhimurium pathogenesis is what is the function of phagosome tubulation with respect to intracellular replication and virulence in animals? Perhaps directional phagosome movement in infected cells is necessary for nutrient acquisition. Or, the bacteria could be attempting to move in a directional manner, such as through polarized epithelia, to the plasma membrane, or to accomplish cell-to-cell spread. Tubular endo/lysosomal structures containing MHC class II antigen have been shown to form in dendritic cells in response to exposure to bacterial LPS and capsule (Stephen et al., 2007; Vyas et al., 2007), suggesting that ET may be a host mechanism for movement of bacterial products that has been co-opted by salmonellae. The relevance of dendritic cell membrane tubulation to MHC presentation remains to be established, however it is interesting to note that S. typhimurium inhibits MHC class II presentation in a SifA-dependent manner (Mitchell et al., 2004). Although the exact function of phagosome tubulation is currently undefined, the discovery reported here that SifA and SseJ can interact with host GTPases and promote manipulation of host membranes should allow such questions to be better addressed, and should provide a bounty of information about bacterial mechanisms that promote intracellular replication and mammalian proteins involved in vesicular traffic. Bacterial strains and mammalian cultured cells A complete description of plasmids, strains, and oligonucleotides used in this study is provided in Supplemental Data and Table S2. Transfection of plasmids and RNAi Plasmids were purified using Endo-free Maxi kits (Qiagen) and transfected using FuGENE6 (Roche) according to manufacturers instructions for 24 h. Non-targeting control and anti-SKIP siRNA oligonucleotides (Dharmacon) were co-transfected with DNA plasmids using FuGENE6 for 72 h. Indirect immunofluorescence and deconvolution microscopy Infected or transfected cells were processed as described in (Ohlson et al., 2005). All antibodies were incubated at 1:200 for 1 h in blocking buffer (phosphate buffered saline with 5% bovine serum albumin, 5mM EDTA, 0.2% saponin, and 5% donkey serum) unless indicated, including the following; mouse anti-LAMP1 (1:100), mouse anti-HA, mouse anti-myc, rabbit anti-myc, rabbit anti-LPS (Difco); tetramethyl rhodamine isothiocyanate (TRITC)- and fluorescein isothiocyanate (FITC)-conjugated donkey anti-mouse; and TRITC-, FITC- and Cy5-conjugated donkey anti-rabbit (Jackson). Mouse anti-LAMP1 (H4A3) developed by J. Thomas August and James E. K. Hildreth was obtained from the Developmental Studies Hybridoma Bank, developed by the NICHD and maintained by the U. of Iowa, Biological Sciences Dept., Iowa City, IA 52242. Microscopy images were collected with a DeltaVision restoration microscopy system (Applied Precision) using an Olympus 60X PlanApo NA 1.4 objective with green (ex 490/20, em 528/38), red (ex 555/28, em 617/73), and far-red (ex 640/20, em 685/40) filters. Images were captured with a Photometrics CH350 CCD camera (Roper Scientific), deconvolved using SoftWorx software (Applied Precision), converted to 16 bit color files, and cropped in Photoshop (Adobe). Phagosome tubulation and endosomal tubulation quantitation S. typhimurium infection of HeLa cells was performed as described previously (Ohlson et al., 2005). Infected cells were stained with anti-LPS and anti-LAMP1 antibodies and scored for phagosome tubulation by counting 120 infected cells each on three separate coverslips in at least three experiments, and the percent infected cells with tubulated phagosomes was calculated ± SEM. To quantify endosomal tubulation (ET), co-transfected cells stained for the SseJ-tag were scored for ET by counting 120 co-transfected cells each on two separate coverslips in at least three separate experiments, and the percent cells with ET was determined ± SEM. GST precipitation Fifty mL cultures containing GST-RhoA or GST-SifA expression plasmids were grown at 37°, induced with 1mM IPTG for 3 h, resuspended in 2 ml PBS/DTT buffer [phosphate buffered saline (PBS) with 5 mM dithiothreitol (DTT) and complete EDTA-free protease inhibitor tablets (Roche)], sonicated on ice 6 times for 30 s to lyse, and clarified by centrifugation at 14K for 30 min at 4°. GST-protein lysate or 100 µg GST control was incubated with 100 µl glutathione agarose beads for 1 h at 4° and washed 3 times with PBS/DTT buffer. The lysate from 10 cm dishes with 1×106 HeLa cells transfected with myc-SseJ or myc-RhoA, lysed in 500 µl NP-40 buffer [50 mM Tris pH 8, 150 mM NaCl, 5 mM EDTA, 1% NP-40, protease inhibitor tablets (Roche)], clarified by centrifugation at 14K for 20 min at 4°, were incubated with the GST-protein bound glutathione beads overnight at 4° with rotation. The beads were washed three times with 1mL NP-40 buffer, and resuspended in 40 µl sample buffer. Lysate and glutathione bead samples were by resolved by SDS-PAGE and stained with coomassie or immunoblotted with mouse anti-myc antibodies. Purified His-SseJ was made as described previously (Ohlson et al., 2005). GST-RhoA (cytoskeleton) and GST protein used for co-immunoprecipitation and SEC were purchased. Five µg His-SseJ was mixed with 5 µg GST-RhoA or 5 µg GST protein in 200 µl PBS and incubated with 20 µl protein G agarose beads plus 0.5 µg mouse anti-His antibody (Qiagen) at 4° with rotation. After 4 h the beads were pelleted, washed 5 times with PBS and resuspended in 40 µl sample buffer. Samples were immunoblotted using anti-His and anti-GST antibodies (Amersham). Size exclusion chromatograpy Equal molar His-SseJ and GST-RhoA were mixed in 200 µl PBS at 4° for 1 h. Samples containing His-SseJ alone, GST-RhoA alone, or pre-mixed His-SseJ and GST-RhoA were injected into a 24 ml bed volume sephadex-200 column interfaced to an Acta FPLC (Amersham) and 1ml elution fractions were collected. Fractions were immunoblotted using anti-His (Qiagen) and anti-GST (Amersham) antibodies. Structure determination A description of the protein purification, crystallization, data collection, and structure refinement methods are provided in Supplemental Data and Table S1. Coordinates deposited in the Protein Data Bank were assigned accession number 3CXB. SifA-PHD interaction assay 200 µg of purified wild type, truncated, or point mutant His-SifA bound to Ni+ resin was incubated with an excess of wild type or point mutant GST-PHD at room temperature for 1 h. After washing with 25 mM Tris (pH 8.0) and 100 mM NaCl buffer, bound proteins were visualized by coomassie staining. Isothermal Titration Calorimetry 0.1mM PHD was titrated against 9 uM SifA in a buffer containing 25mM HEPES pH 8.0 and 150mM NaCl at 25°C, using a VP-ITC microcalorimeter (MicroCal), and was analyzed using ORIGIN software (Microcal Software, Northampton, MA). Supplementary Material We would like to thank Miller lab members Lisette Coye for the GFP-SifB plasmid and Richard Pfeutzner for SEC assistance. We thank Alex Merz (U. of Washington) and Maggie So (U. of Arizona) for graciously sharing and providing a link to their movie. We also thank the W. M. Keck Center for Advanced Studies in Neural Signaling for use of their Delta Vision microscope, and we express gratitude to J.H. Brumell (U. of Toronto) and S. Meresse (CNRS-INSERM-Université de la Méditerranée) for sending plasmids. This work was supported by the Comprehensive Training in Inter-Disciplinary Oral Health Research T32 grant DE07132 (M.B.O.), the Chinese Ministry of Science and Technology (J.C.), and by the NIH/NIAID grants R01 AI048683 and U54 AI057141 for the Northwest Regional Center of Excellence for Biodefense and Emerging Infectious Diseases Research (S.I.M.). • Adamson P, Paterson HF, Hall A. Intracellular localization of the P21rho proteins. J Cell Biol. 1992;119:617–627. [PMC free article] [PubMed] • Alto NM, Shao F, Lazar CS, Brost RL, Chua G, Mattoo S, McMahon SA, Ghosh P, Hughes TR, Boone C, et al. Identification of a bacterial type III effector family with G protein mimicry functions. Cell. 2006;124:133–145. [PubMed] • Beuzon CR, Meresse S, Unsworth KE, Ruiz-Albert J, Garvis S, Waterman SR, Ryder TA, Boucrot E, Holden DW. Salmonella maintains the integrity of its intracellular vacuole through the action of SifA. Embo J. 2000;19:3235–3249. [PubMed] • Birmingham CL, Jiang X, Ohlson MB, Miller SI, Brumell JH. Salmonella-induced filament formation is a dynamic phenotype induced by rapidly replicating Salmonella enterica serovar typhimurium in epithelial cells. Infect Immun. 2005;73:1204–1208. [PMC free article] [PubMed] • Brumell JH, Goosney DL, Finlay BB. SifA, a type III secreted effector of Salmonella typhimurium, directs Salmonella-induced filament (Sif) formation along microtubules. Traffic. 2002;3:407–415. [PubMed] • Brumell JH, Rosenberger CM, Gotto GT, Marcus SL, Finlay BB. SifA permits survival and replication of Salmonella typhimurium in murine macrophages. Cell Microbiol. 2001a;3:75–84. [PubMed] • Brumell JH, Tang P, Mills SD, Finlay BB. Characterization of Salmonella-induced filaments (Sifs) reveals a delayed interaction between Salmonella-containing vacuoles and late endocytic compartments. Traffic. 2001b;2:643–653. [PubMed] • Buchwald G, Friebel A, Galan JE, Hardt WD, Wittinghofer A, Scheffzek K. Structural basis for the reversible activation of a Rho protein by the bacterial toxin SopE. Embo J. 2002;21:3286–3295. [PubMed] • de Figueiredo P, Doody A, Polizotto RS, Drecktrah D, Wood S, Banta M, Strang MS, Brown WJ. Inhibition of transferrin recycling and endosome tubulation by phospholipase A2 antagonists. J Biol Chem. 2001;276:47361–47370. [PubMed] • Freeman JA, Ohl ME, Miller SI. The Salmonella enterica serovar typhimurium translocated effectors SseJ and SifB are targeted to the Salmonella-containing vacuole. Infect Immun. 2003;71:418–427. [PMC free article] [PubMed] • Garcia-del Portillo F, Zwick MB, Leung KY, Finlay BB. Salmonella induces the formation of filamentous structures containing lysosomal membrane glycoproteins in epithelial cells. Proc Natl Acad Sci U S A. 1993;90:10544–10548. [PubMed] • Guy RL, Gonias LA, Stein MA. Aggregation of host endosomes by Salmonella requires SPI2 translocation of SseFG and involves SpvR and the fms-aroE intragenic region. Mol Microbiol. 2000;37:1417–1435. [PubMed] • Handa Y, Suzuki M, Ohya K, Iwai H, Ishijima N, Koleske AJ, Fukui Y, Sasakawa C. Shigella IpgB1 promotes bacterial entry through the ELMO-Dock180 machinery. Nat Cell Biol. 2007;9:121–128. [PubMed] • Hardt WD, Chen LM, Schuebel KE, Bustelo XR, Galan JE. S. typhimurium encodes an activator of Rho GTPases that induces membrane ruffling and nuclear responses in host cells. Cell. 1998;93:815–826. [PubMed] • Lippincott-Schwartz J, Yuan L, Tipper C, Amherdt M, Orci L, Klausner RD. Brefeldin A's effects on endosomes, lysosomes, and the TGN suggest a general mechanism for regulating organelle structure and membrane traffic. Cell. 1991;67:601–616. [PubMed] • McMahon HT, Gallop JL. Membrane curvature and mechanisms of dynamic cell membrane remodelling. Nature. 2005;438:590–596. [PubMed] • Mitchell EK, Mastroeni P, Kelly AP, Trowsdale J. Inhibition of cell surface MHC class II expression by Salmonella. Eur J Immunol. 2004;34:2559–2567. [PubMed] • Nawabi P, Catron DM, Haldar K. Esterification of cholesterol by a type III secretion effector during intracellular Salmonella infection. Mol Microbiol. 2008;68:173–185. [PubMed] • Nebenfuhr A, Ritzenthaler C, Robinson DG. Brefeldin A: deciphering an enigmatic inhibitor of secretion. Plant Physiol. 2002;130:1102–1108. [PubMed] • Prehna G, Ivanov MI, Bliska JB, Stebbins CE. Yersinia virulence depends on mimicry of host Rho-family nucleotide dissociation inhibitors. Cell. 2006;126:869–880. [PubMed] • Reinicke AT, Hutchinson JL, Magee AI, Mastroeni P, Trowsdale J, Kelly AP. A Salmonella typhimurium effector protein SifA is modified by host cell prenylation and S-acylation machinery. J Biol Chem. 2005;280:14620–14627. [PubMed] • Staskawicz BJ, Mudgett MB, Dangl JL, Galan JE. Common and contrasting themes of plant and animal diseases. Science. 2001;292:2285–2289. [PubMed] • Stephen TL, Fabri M, Groneck L, Rohn TA, Hafke H, Robinson N, Rietdorf J, Schrama D, Becker JC, Plum G, et al. Transport of Streptococcus pneumoniae capsular polysaccharide in MHC Class II tubules. PLoS Pathog. 2007;3:e32. [PubMed] • Vyas JM, Kim YM, Artavanis-Tsakonas K, Love JC, Van der Veen AG, Ploegh HL. Tubulation of class II MHC compartments is microtubule dependent and involves multiple endolysosomal membrane proteins in primary dendritic cells. J Immunol. 2007;178:7199–7210. [PMC free article] [PubMed]
global_05_local_5_shard_00000035_processed.jsonl/896
QDB: Latest Approved Quotes #310406 (148/160) ↑Funny ↓Unfunny ⚐Flag <@pronto> The future is stupid. #310136 (52/118) ↑Funny ↓Unfunny ⚐Flag #310161 (29/77) ↑Funny ↓Unfunny ⚐Flag <RHExcelion> I'd shoot the damn tumbleweed <RHExcelion> And wonder why I never got any meat #309980 (24/84) ↑Funny ↓Unfunny ⚐Flag #304384 (94/136) ↑Funny ↓Unfunny ⚐Flag <JDigital> lungfish: I thought you were 28 Comment: #raspberryheaven Become a fan of QDB on Facebook! #301866 (134/172) ↑Funny ↓Unfunny ⚐Flag <rogueclown> ??? <@packrat> theres a cat on indigo's keyboard <Sneakyness> hahahahahahahahahahahaha <@packrat> thats my guess <rogueclown> meow. <Sneakyness> :3 <nullspace> rawr <nullspace> shoo cat (twenty minutes later) <indigo> well, sorry about that <Stormgren> cat? <indigo> i don't know <indigo> i think i've been sitting here all that time (two hours later) #310139 (58/80) ↑Funny ↓Unfunny ⚐Flag <mroman> how do i rotate the cube? <boily> you click in the emptiness and drag. <quintopia> boily: this sounds like a philosophy of life #309494 (72/86) ↑Funny ↓Unfunny ⚐Flag <DeadStar> how do power buttons work on computers <DeadStar> thats a good point <DeadStar> didnt think of that #303390 (48/80) ↑Funny ↓Unfunny ⚐Flag #310122 (66/82) ↑Funny ↓Unfunny ⚐Flag <Aragan> That is artillery. Comment: From #ragnarokwisdom, irc.esper.net #310551 (122/142) ↑Funny ↓Unfunny ⚐Flag [MobileJovian] If something is objective only for one person, then it's not objective [MobileJovian] That's sort of the exact definition of subjectivity [Me-me] maybe for you it is [MobileJovian] I see what you did there. #308834 (53/61) ↑Funny ↓Unfunny ⚐Flag Nevermind: About shitty code Nevermind: There is an hierarchy - WidgetBase - GuiWidget - Rectangle Nevermind: What do you call a programmer who adds a scroll event handler to Rectangle class, which changes value of a field added to WidgetBase, which is later used in GuiWidget as a text argument to a low leve render code Nevermind: All this just to make a scrolling text show up over Rectabgle in a single place? MaxEd: You don't call him anything, he should not hear you coming #304152 (89/127) ↑Funny ↓Unfunny ⚐Flag <konaya> Right, I'm having a slight dilemma here. <nickp666> konaya: sup? <konaya> If I take the lift, I'll probably timeout on IRC. <konaya> But I'm too lazy to take the stairs. <rekoil> is the lift faster than freefall konaya? <konaya> rekoil, that would be funny but no <rekoil> you could throw the laptop, take the lift and catch it <rekoil> thus remaining connected! <konaya> Hm. They've fixed the wlan coverage in the elevators. <konaya> I see my letters of complaint finally paid off then. Comment: #[email protected] #305477 (21/97) ↑Funny ↓Unfunny ⚐Flag <rd8t> i asked her to log in with her account...she asked if she users her own password or do i give her mine #306570 (101/143) ↑Funny ↓Unfunny ⚐Flag <dd7> i once had a virus that didn't do anything but move icons back to the spot i dragged them from <dd7> it was terrible <dd7> i think i'd much rather deal with a stolen credit card than not being able to organize my fucking desktop Got Twitter? Follow @qdb for updates #302239 (109/161) ↑Funny ↓Unfunny ⚐Flag <bofh> how did little endian come about anyway? <tgies> ok you know about the original sin right <bofh> like big endian seems fairly obvious as it's how we typically read numbers, and it was also used by the TCP/IP spec <bofh> as in the trig function? <tgies> no the biblical original sin <tgies> god showed up <tgies> and he was like <tgies> ok, since you guys are dillholes and dont know how to fucking listen <tgies> from now on you have to work for your food <tgies> childbirth will be painful <tgies> and you'll have to work with this fucking stupid god damn system for representing numbers where the least significant byte comes first Comment: wgiowrb.dyndns.org #animutation #307705 (53/91) ↑Funny ↓Unfunny ⚐Flag <BMF54123> bluh, what the hell is wrong with FCEUX <BMF54123> I have to load Metroid several times to keep it from crashing at a grey screen <Inuyasha> it's a REALLY accurate emulator :o #307308 (18/156) ↑Funny ↓Unfunny ⚐Flag Thurmond: I only know one Russian word Thurmond: and it's the word for hedgehog JBIC: Nyet JBIC: Vodka #304607 (143/215) ↑Funny ↓Unfunny ⚐Flag The_Jack_of_Clubs: you need to upgrade to safari cause it fixes 1 little issue that youll never notice, mostly cause you use firefox, also it needs to restart and to "optimize the hard drive" and while your at it, would you like to install the new version of itune+quicktime? its only 20gb and it has the ability to upgrade the firmware of the iphone that you dont have! #304173 (3/115) ↑Funny ↓Unfunny ⚐Flag <FaithPvP> God loves trolls. <FaithPvP> That's why He invented bridges. <FaithPvP> And noobs. #310318 (102/134) ↑Funny ↓Unfunny ⚐Flag <danh> there is this insanely important insanely crazy suite of perl scripts here <danh> this guy is here trying to figure out why it doesnt work <danh> he has a value '7.0.3' <danh> he keeps calling it a float <danh> he keeps trying to multiply it <danh> im looking him up in LDAP <danh> he's been here for 5 years <danh> now he's multiplying it by 1 to make it an integer #307808 (42/112) ↑Funny ↓Unfunny ⚐Flag <&o11c> http://qdb.us/305729 <&o11c> A UDP packet walks into a bar and says "I want a beer". The barman charges him twice but doesn't actually give him one. #303058 (43/111) ↑Funny ↓Unfunny ⚐Flag <DuClare> The presence of tech people is what made freenode really different <DuClare> But these days I'm on #freenode helping people buy a dog kennel because they can't comprehend inches and feet #300532 (45/83) ↑Funny ↓Unfunny ⚐Flag <denz> experience says, a as2100 fits in the trunk of an audi a6 sedan <jbenedetto> tnet2: dont be a pussy. just get a tow hitch and hook it up to the back of your car <jbenedetto> :P <LordNUniv> yeah, wear those piddly casters raw with some real road hauling <LordNUniv> think of the looks you'll get driving on the highway with some huge server tied to the back of your car and being dragged along <jbenedetto> hell yeah <jbenedetto> people will know you mean goddamn business then <jbenedetto> SRS E-BUSINESS <LordNUniv> bonus points if something is dragging on the road and making sparks Comment: Freenode, #classiccmp #307214 (81/127) ↑Funny ↓Unfunny ⚐Flag <Superfoxy> I hate everyone <Lexy> Me too!  Wanna be friends? <Lexy> Oh wait. Subscribe to the RSS feed to get the latest approved quotes save page | share 123456..576Next> 0.004 (3) 14,307 quotes approved; 9,760 fermenting; karma: 190.6966
global_05_local_5_shard_00000035_processed.jsonl/909
@Inproceedings {export:79176, address = {Washington, DC, USA}, author = {Stuart E. Schechter and Rachna Dhamija and Andy Ozment and Ian Fischer}, booktitle = {Proceedings of the 2007 IEEE Symposium on Security and Privacy}, isbn = {0-7695-2848-1}, month = {May}, pages = {51–65}, publisher = {IEEE Computer Society}, title = {The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies}, url = {http://research.microsoft.com/apps/pubs/default.aspx?id=79176}, year = {2007}, }
global_05_local_5_shard_00000035_processed.jsonl/915
Sacred Texts  UFOs  Index  Previous  Next  Buy this Book at Amazon.com p. 56 But space travel! p. 57 We climbed quickly, and the familiar outline of Manhattan took shape like a map pin-pointed with millions of lights. p. 58 In the file, I saw a memo DuBarry had written: "I would take the very early reports with caution. For instance, the one on August 9, 1762, which describes an odd, spindle-shaped body traveling at high speed toward the sun. I recall that Charles Fort accepted this, along with other early sightings, as evidence of space ships. But this particular thing might have been a meteor--meteors as such were almost unknown then. The later reports are more convincing, and it is also easier to check the sources, especially those from 1870 on." From 1762 to 1870, the reports were meager. Some described mysterious lights in the sky; a few mentioned round objects seen in daylight. Even though they were not so fully documented as later ones, one point struck me. In those days, there was no telegraph, telephone, or radio to spread news rapidly and start a flood of rumors. p. 59 A sighting in Scotland could not be the cause of a similar one two days later in the south of France. Beginning in 870, there was a series of reports that went on to the turn of the century. In the London Times, September 26, 1870, there was a description of a queer object that was seen crossing the moon. It was reported as elliptical, with some kind of tail, and it took almost thirty seconds to complete its passage of the moon. Then in 1871, a large, round body was sighted above Marseilles, France. This was on August 1. It moved slowly across the sky, apparently at great height, and was visible about fifteen minutes. On March 22, 1880, several brilliantly luminous objects were reported seen at Kattenau, Germany. Sighted just before sunrise, they were described as rising from the horizon and moving from east to west. The account was published in the British Nature Magazine, Volume 22, page 64. The next report in the file mentioned briefly a strange round object seen in the skies over Bermuda. The source for this account was the Bermuda Royal Gazette. This was in 1885. That same year, an astronomer and other witnesses reported a gigantic aerial object at Adrianople, Turkey. On November 1, the weird apparition was seen moving across the sky. Observers described it as round and four to five times the size of the moon. This estimate is similar to the Denison, Texas, comparison with an orange. The object would actually be huge to be seen at any great height. But unless the true height were known, any estimate of size would be guesswork. On March 19, 1887, two strange objects fell into the sea near a Dutch barkentine. As described by the skipper, Captain C. D. Sweet, one of the objects was dark, the other brightly luminous. The glowing object fell with a loud roaring sound; the shipmaster was positive it was not a meteor. In New Zealand, a year later, an oval-shaped disk was reported speeding high overhead. This was on May 4, 1888. About two years after this, several large aerial bodies were sighted hovering over the Dutch East Indies. p. 60 Most accounts described them as roughly triangular, about one hundred feet on the base and two hundred feet on the sides. But some observers thought they might be longer and narrower, with a rounded base; this would make them agree with more recent stories of cone-shaped objects with rounded tops seen in American skies. On August 26, 1894, a British admiral reported sighting a large disk with a projection like a tail. And a year after this, both England and Scotland buzzed with stories of triangular-shaped objects like those seen in the Dutch East Indies. Although many officials scoffed at the stories, more than one astronomer stuck to his belief that the mysterious things might be coming from outer space. Since planes and dirigibles were then unknown, there was no one on earth who could have been responsible for them. In 1897, sightings in the United States began to be more frequent. One of the strangest reports describes an incident that began on April 9. Flying at a great height, a huge cigar-shaped device was seen in the Midwest. Short wings projected from the sides of the object, according to reports of astronomers who watched it through telescopes. For almost a week, the aerial visitor was sighted around the Midwest, as far south as St. Louis and as far west as Colorado. Several times, red, green, and white lights were seen to flash in the sky; some witnesses thought the crew of this strange craft might be trying to signal the earth. On April 16, the thing, whatever it was, disappeared from the Midwest. But on April 19, the same object--or else a similar one--appeared over West Virginia. Early that morning the town of Sisterville was awakened by blasts of the sawmill whistle. Those who went outside their homes saw a strange sight. From a torpedo-shaped object overhead, dazzling searchlights were pointing downward, sweeping the countryside. The thing appeared to be about two hundred feet long, some thirty feet in diameter, with stubby wings and red and green lights along the sides. For almost ten minutes the aerial visitor circled the town, then it swung eastward and vanished. The next report was published in the U.S. Weather Bureau's monthly Weather Review. On page 115 in the p. 61 March 1904 issue, there is an account of an odd sighting at sea. On February 24, 1904, a mysterious light had been seen above the Atlantic by crew members of the U.S.S. Supply. It was moving swiftly, and evidently at high altitude. The report was attested by Lieutenant Frank H. Schofield, U.S.N. On July 2, 1907, a mysterious explosion occurred, in the heavens near Burlington, Vermont. Some witnesses described a strange, torpedo-shaped device circling above. Shortly after it was seen, a round, luminous object flashed down from the sky, then exploded, (Weather Review, 1907, page 310.) Another cigar-shaped craft was reported at a low altitude over Bridgewater, Massachusetts, in 1905. Like the one at Sisterville, it carried searchlights, which swept back and forth across the countryside. After a few moments, the visitor rose in a steep climb, and the searchlights blinked out. There was no report for 1909 in America, though an odd aerial object was sighted near the Galapagos Islands. But in 1910, one January morning, a large silvery cigar-shaped device startled Chattanooga. After about five minutes, the thing sped away, appearing over Huntsville, Alabama, shortly afterward. It made a second appearance over Chattanooga the next day, then headed east and was never seen again. In Popular Astronomy, January 27, 1012, a Dr. F. B. Harris described an intensely black object that he saw crossing the moon. As nearly as he could tell, it was gigantic in size--though again there was no way to be sure of its distance from him or the moon. With careful understatement, Dr. Harris said, "I think a very interesting and curious phenomenon happened that night." A strange shadow was noted on the clouds at Fort Worth, Texas, on April 8, 19, 3. It appeared to be caused by some large body hovering motionless above the clouds. As the cloud layer moved, the shadow remained in the same position. Then it changed size, diminishing, and quickly disappeared, as if it had risen vertically. A report on this was given in the Weather Bureau Review of that year, Number 4-599 p. 62 By 1919, dirigibles were of course well known to most of the world. When a dirigible-shaped object appeared over Huntington, West Virginia, in July of that year, there was no great alarm. It was believed to be an American blimp, though the darkness--it was eleven at night--prevented observers from being sure. But a later check-up proved it was not an American ship, nor was it from any country possessing such craft. For some time after this, there were few authentic reports. Then in 1934, Nicholas Roerich, head of the American-Roerich expedition into Tibet, had a remarkable experience that bears on the saucer riddle. On pages 361 and 362 of his book Altai Himalaya, Roerich describes the incident. The expedition party was in the wilds of Tibet one morning when a porter noticed the peculiar actions of a buzzard overhead. He called Roerich's attention to it; then they all saw something high in the sky, moving at great speed from north to south. Watching it through binoculars, Roerich saw it was oval-shaped, obviously of huge size, and reflecting the sun's rays like brightly polished metal. While he trailed it with his glasses, the object suddenly changed direction, from south to southwest. It was gone in a few moments. This was the last sighting listed before World War II. When I had finished, I stared out the plane window, curiously disturbed. Like most people, I had grown up believing the earth was the center of everything--life, intelligence, and religion. Now, for the first time in my life, that belief was shaken. It was a curious thing. I could accept the idea that we would eventually explore space, land on the moon, and go on to distant planets. I had read of the plans, and I knew our engineers and scientists would somehow find a way. It did not disturb my belief in our superiority. But faced with this evidence of a superior race in the universe, my mind rebelled. For years, I had been accustomed to thinking in comic-strip terms of any possible spacemen--Buck Rogers stuff, with weird-looking space ships and green-faced Martians. But now, if these sightings were true, the shoe was on the other foot. We would be faced with a race of beings p. 63 at least two hundred years ahead of our civilization--perhaps thousands. In their eyes, we might look like primitives. My conjectures before the take-off had just been idle thinking; I had not really believed this could be the answer. But now the question came back sharply. How would we react to a sudden appearance of space ships, bringing that higher race to the earth? If we were fully prepared, educated to this tremendous adventure, it might come off without trouble. Unprepared, we would be thrown into panic. The lights of Philadelphia showed up ahead, and a thought struck me. What would Philadelphians of 1776 have thought to see this DC-6 flying across their city at three hundred miles an hour? What would the sentries at Valley Forge have done, a year later, if this lighted airliner had streaked over their heads? Madness. Stampede. Those were the plain answers. But there was a difference now. We had had modern miracles, radio, television, supersonic planes, and the promise of still more miracles. We could be educated, or at least partly prepared, to accept space visitors. In fifty years we had learned to fly. In fifty years more, we would be exploring space. Why should we believe such creative intelligence was limited to the earth? It would be incredible if the earth, out of all the millions of planets, proved the only inhabited spot in the whole universe. But, instinctively, I still fought against believing that the flying saucers were space ships. Eventually, we would make contact with races on other planets; they undoubtedly would someday visit the earth. But if it could be put off . . . a problem for later generations to handle . . . If the disks proved American guided missiles, it would be an easier answer. Looking through the Project "Saucer" report DuBarry had loaned me, I read the space-travel items, hoping to find some hint that this was a smoke screen. On page 18, in a discussion on Mars, I found this comment: "Reports of strange objects seen in the skies have been handed down through the generations. However, scientists believe that if Martians were now visiting the earth p. 64 without establishing contact, it could be assumed that they have just recently succeeded in space travel, and that their civilization would be practically abreast of ours. This because they find it hard to believe that any technically established race would come here, flaunt its ability in mysterious ways over the years, but each time simply go way without ever establishing contact." There could be several answers to that. The Martians might not be able to live in our atmosphere, except in their sealed space ships. They, or some other planet race, could have observed us periodically to check on our slow progress. Until we began to approach their level of civilization, or in some way caused them concern, they would probably see no reason for trying to make contact. But somehow I found a vague comfort in the argument, full of holes though it was. Searching further, I found other space-travel comments. On one page, the Air Force admitted it was almost a certainty that space travelers would be operating from planets outside the solar system. But on the following page, I discovered this sentence: "Thus, although visits from outer space are believed to be possible, they are thought to be highly improbable." What was the answer? Was this just a wandering discussion of possibilities, badly put together, or was it a hint of the truth? it could be the first step in preparing America for a revelation. It could also be a carefully thought-out trick. This whole report might be designed to conceal a secret weapon. If the Air Force or the Navy did have a secret missile, what better way to distract attention? The old sighting reports could have been seized on as a buildup for space travel hints. Then suddenly it hit me. Even if it were a smoke screen, what of those old reports? They still remained to be answered. There was only one possible explanation, unless you discarded the sightings as lies. That meant discrediting many reliable witnesses--naval officers, merchant shipmasters, explorers, astronomers, ministers, and responsible public officials. p. 65 Besides all these, there had been thousands of other witnesses, where large groups had seen the objects. The answer seemed inevitable, but I held it off. I didn't want to believe it, with all the changes it might bring, the unpredictable effect upon our civilization. DuBarry had put another group of reports in the envelope; this series covered the World War II phase and on up to the outbreak of the saucer scare in the United States. Some of it, about the foo fighters, I already knew. This was tied in with the mystery rockets reported over Sweden. The first Swedish sightings had occurred during the early part of the war. Most of the so-called "ghost rockets" were seen at night, moving at tremendous speed. Since they came from the direction of Germany, most Swedes believed that guided rockets were the answer. During the summer of 1946, after the Russians had taken over Peenemunde, the Nazi missile test base, ghost rockets again were reported flying over Sweden. Some were said to double back and fly into Soviet areas. Practically all were seen at night, and therefore none had been described as a flying disk. Instead, they were said to be colored lights, red, green, blue, and orange, often blurred from their high speed. But there was a puzzling complication. Mystery lights, and sometimes flying disks, were simultaneously reported over Greece, Portugal, Turkey, Spain, and even French Morocco. Either there were two answers, or some nation had developed missiles with an incredibly long range. By January 1947, ghost-rocket sightings in Europe had diminished to less than one a month. Oddly enough, the first disk report admitted by Project "Saucer" was in this same month. The first '47 case detailed by Project "Saucer" occurred at Richmond, Virginia. It was about the middle of April. A Richmond weather observer had released a balloon and was tracking it with a theodolite when a strange object crossed his field of vision. He swung the theodolite and managed to track the thing, despite its high speed. (The actual speed and altitude--the latter determined by a comparison of the balloon's height at p. 66 various times--have never been released. Nor has the Air Force released this observer's report on the object's size, which Project "Saucer" admitted was more accurate than most witnesses' estimates.) About the seventeenth of May 1947, a huge oval-shaped saucer ten times longer than its diameter was sighted by Byron Savage, an Oklahoma City pilot. Two days later, another fast-flying saucer was reported at Manitou Springs, Colorado. In the short time it was observed, it was seen to change direction twice, maneuvering at an unbelievable speed. Then on June 24 came Kenneth Arnold's famous report, which set off the saucer scare. The rest of the story I now knew almost by heart. When the DC-6 landed at Washington, I had made one decision. Since it was impossible to check up on most of the old sightings, I would concentrate on certain recent reports--cases in which the objects had been described as space ships. As I waited for a taxi, I looked up at the sky. It was a clear summer night, without a single cloud. Beyond the low hill to the west I could see the stars. I can still remember thinking, If it's true, then the stars will never again seem the same. p. 67 Next: Chapter VIII
global_05_local_5_shard_00000035_processed.jsonl/919
Camping in New Zealand, small items left lying around are at risk from thieves. I was reminded of this whilst sitting on the foundation stones of what was once an old gold miner’s hut, the iron remains of the roof and perhaps chimney at my feet, reading a novel with my tent pitched on the other side of the clearing where the thief stalked. Stamping battery How many from outside Australasia see New Zealand as a place where men—and it was mostly men—boarded sailing ships to come and explore the rugged interior with dreams of riches? The 1860s gold rush boosted the colonisation of New Zealand. Who could resist the description of Gabriel Read in May 1861, reporting his discovery of gold in Lawrence near Dunedin where I live: (The public heard of his prospecting a few weeks later via an account in the Otago Witness in June.) While the rush started near the Southern coast, it spread to many areas. Central Otago is, perhaps, the better known of these, but remains of this era can still be found in many other areas of New Zealand. Some of these reminders of early New Zealand can be found in the hills. A few tracks, now used as easier tramping routes are distinctly cut as former narrow wagon trails on step hillsides. In a few clearings in odd corners of the country are the remains of where some hardly soul lived alone, eking out a life digging or panning the precious metal. I suspect many would not recognise these sites as a gold digging era homes as they are now a simple clearing with clumsy hints of once being a more-or-less ‘permanent’ home. The campsite: iron from the former hut in the foreground, my tent across the clearing. Some of these camping grounds are now, and probably were then, home to endogenous thieves. As I sat on the foundation of the miners hut, my back against a tree, I became aware that one such cheeky thief was prowling my tent on the other side of the little clearing. The thief Weka* is the local name for woodhen. They were fairly common around some campsites when I was younger and can be incredibly cheeky little buggers. I wandered over to my tent and sat down. The weka continued to strut about, quite happy to walk within a couple of metres of me. Close up (taken at 35mm equivalent of 114mm focal length, from about 2m distance). Those not familiar with wekas might think that they would only steal food, but stories say that weka will steal seemingly anything portable that attracts their attention. Of the non-edible objects, lore has it that a bit like the gold miners they prefer shiny things. Probing under the outer fly of the tent for items to steal… They are also reported to have surprising homing instincts, with weka having been reported to travel hundreds of kilometres to return to the their grounds.** That’s a long hike for short legs. * There a many other sites with details on weka, such as the Department of Conservation, which also offers advice of what to do if they do try steal something… ** I have been unable to location formal publications of this in the limited time available. All photographs taken using a Fujifilm X10. With the exception of the last they are unaltered from the original image. (Other than to reduce the resolution; the last image has been slightly cropped.) All images are copyright of the author; please ask if you wish to use them. Other articles in Code for life: Scientists’ other lives Mad on Radium Doggie ERVs Haemophilia – towards a cure using genetic engineering New academic visas for New Zealand
global_05_local_5_shard_00000035_processed.jsonl/924
Take the 2-minute tour × does having varnish as a reverse proxy/cacher with nginx backend for dynamic content a good idea? im looking for a way to really speed content up when dealing with a ddos or get flood. share|improve this question closed as primarily opinion-based by Tom O'Connor Aug 25 '13 at 21:37 1 Answer 1 Using varnish for caching is a really good idea since varnish was designed for caching. You will get a specific caching policy description language, proper statistics and logging, some tracing capabilities. I prefer to use varnish for caching and nginx for other tasks (like FastCGI proxying in your case). share|improve this answer
global_05_local_5_shard_00000035_processed.jsonl/925
Take the 2-minute tour × I am having a problem with installing bind9 on Ubuntu 12.04 LTS. I have installed a Plesk 11 server but DNS service is not running. root@cp11:~# apt-get install bind Reading package lists... Done Building dependency tree Reading state information... Done Package bind is not available, but is referred to by another package. is only available from another source However the following packages replace it: bind9 dnsutils dnsutils:i386 bind9:i386 manpages E: Package 'bind' has no installation candidate root@cp11:~# /etc/init.d/bind9 start * Starting domain name service... bind9 [fail] root@cp11:~# /etc/init.d/bind9 restart * Stopping domain name service... bind9 [ OK ] * Starting domain name service... bind9 [fail] When I try to check the log file: root@cp11:~# tail -f /var/log/messages tail: cannot open `/var/log/messages' for reading: No such file or directory I checked in /etc and there is a bind directory root@cp11:/etc/bind# ls bind.keys db.127 db.empty db.root named.conf.default-zones named.conf.options rndc.key db.0 db.255 db.local named.conf named.conf.local rndc.conf zones.rfc1918 When I try to uninstall bind9 it also removes the Plesk control panel. So I updated and the upgraded the packages and I see bind error: root@cp11:~# apt-get upgrade Processing triggers for libc-bin ... ldconfig deferred processing now taking place Processing triggers for initramfs-tools ... update-initramfs: Generating /boot/initrd.img-3.2.0-23-generic Processing triggers for resolvconf ... Processing triggers for python-support ... Errors were encountered while processing: share|improve this question closed as off-topic by HopelessN00b Mar 3 at 7:09 2 Answers 2 The package name is bind9 not bind. So, the installation command should be: $ sudo apt-get install bind9 Make sure you have bind9 installed using the following command and then try to start it and check your logs for relevant error messages: $ sudo dpkg -l | grep bind9 For the system logs, there is no /var/log/messages file in Ubuntu 12.04. However, you can find the same information in /var/log/syslog. share|improve this answer I experienced an issue where Apparmor was causing this in Ubuntu. So try #/etc/init.d/apparmor teardown then try again share|improve this answer
global_05_local_5_shard_00000035_processed.jsonl/945
Slashdot is powered by your submissions, so send in your scoop Forgot your password? User Journal Journal by Zarf This is the first story I've submitted in years. Why do I have to wait? I haven't commented here in *hours* Comments Filter: • No, wait, you're right. Anyway, makes sense. We're not the customers. We're just bait for advertisers. • Re: (Score:2, Insightful) by Bill Dog (726542) Bingo. Slashdot is here to serve us, like "To Serve Man" was. This site must be an udder cash cow. If you think about it, web sites are in the business of delivering content and receiving ad revenue for viewership. And like the TV networks found out with going to "reality" shows in primetime, vastly cheaper content is better, as it means greater profits, even with less-satisfied viewers and less of them period. The business model of this site has to be the most lucrative -- all they have to do is pick inflam
global_05_local_5_shard_00000035_processed.jsonl/946
Forgot your password? Comment: Re:Just wondering (Score 1) 225 by Sloppy (#49799153) Attached to: Why Detecting Drones Is a Tough Gig I'm suggesting we JAM 2.4Ghz around the Whitehouse lawn. We need to do that everywhere. It's not as if presidents are the only people who ever get attacked. Then I'm suggesting we track WiFi signals in an effort to catch the pilot, not the aircraft. Another reason we have to do it everywhere (and over a broader range of frequencies). If the defender has lots of resources (might be capable of tracking and/or retaliating), then the attacker will use at least one relay node. As attacker, I'd be a mile away transmitting 433 MHz or 915 MHz (*) to the node near the whitehouse lawn, and then that thing retransmits the command at 2.4 GHz (**) to the vehicle. (*) We're going to try to stay within legal frequencies here, because in the course of the assassination, it's important that we don't break the law. (**) Per the agreement that the vehicle must receive commands on 2.4 GHz, in order to make the contest fair (***). You have to give the defender a fighting chance. (Your honor is at stake!) (***) But if the government takes the common-sense precaution of jamming most frequencies and over the entire country of their jurisdiction (to protect all citizens, not just presidents) then one might argue that fairness suggests the attacker should be freed of the 2.4 GHz requirement. I think balancing the rules will be a subtle and important part of formulating the contest rules. It's not as easy as it sounds. Submitted by Anonymous Coward Link to Original Source User Journal Journal: Chronicle: Another day, another cup Journal by Chacham User Journal Journal: Verbiage: Some puns (2) Journal by Chacham Sixteen sodium atoms walk into a bar followed by Batman.
global_05_local_5_shard_00000035_processed.jsonl/947
Slashdot is powered by your submissions, so send in your scoop Forgot your password? Comment: Re:lets pump the brakes here and analyze. (Score 1) 165 It's as stupid as suggesting that giving support to homeless people encourages more people to be homeless. Poor comparison. Homelessness is mostly involuntary. While hostage taking may be an act of desperation, it is a choice with an expected outcome. If you consistently refuse to negotiate with hostage takers, then only the most desperate will take hostages. If you consistently negotiate with hostage takers, you are as much as saying that hostage taking is a viable strategy - you just have to find the right target, demand something not too outrageous etc. Perhaps you can explain how this reasoning is 'stupid'. Comment: Re:The only good thing (Score 1) 511 You're still not approaching it from the RISK MITIGATION angle, which is the only thing that matters in this discussion. Really? The only thing? Well, I'm glad you're hear to hand down some more 'sensibleness' like that. To continue to argue against this point is to say people should take drugs if the statistics say it's mostly harmless. Where have I said that? This is the second time you have made that assertion of me and I state, again, that I am not making a recommendation either for or against. I am pointing out the fallacies that you cling to. If an activity of any sort is misunderstood, misrepresented or poorly researched then you cannot make an informed decision about it. You are poorly informed. Clearly you find me saying that offensive. Let me be plain. I do not think people _should_ do anything. I think that it is reasonable to let people make their own decisions and to assist them in making the best decisions by making sure they have accurate information and are capable of informed consent. That includes driving in traffic, using caffeine, taking antibiotics or using recreational drugs. They test the materials for their tolerances. Then they build as far away from the thresholds as is physically and financially and ethically/legally possible. So you are saying that first they thoroughly understand the materials they are working with, research the matter and then decide whether something is too risky to proceed, or whether it is safe enough? That sounds sensible. Why do you object so much when I suggest that this might be a good model for assessing drug use? In the case of recreational drugs, NOT DOING IT is a completely REASONABLE decision regardless of the statistics because it DOESN'T COST YOU ANYTHING. Friend, you drink tea. Therefore you use a recreational drug (caffeine). It has very few side effects and most people can use it sensibly and without addiction. A few do not. Clearly you have made the cost/benefit and risk/reward analysis and decided that, for you, tea is an acceptable recreational drug. In fact, you probably don't even consider it a drug because it is so socially acceptable and you are clearly incapable of objectivity (on this matter at least). Fearmongering is not reasonable, no matter how you capitalise it. You have seen some examples of people who have used drugs and who have had their lives 'ruined'. You have chosen to blame drugs, even though most evidence shows that people who do struggle with drug addiction do so because they have deeper problems in their lives. By blaming the drug and asserting that "NOT DOING IT" "DOESN"T COST YOU ANYTHING" you get to ignore whether they are struggling with mental illnesses, whether their lives are so bleak and hollow that the temporary respite of narcotics is worth the escape, regardless of the price. You get to sit in lofty judgement and continue to deliver your homilies on how easy choosing not to use is. You refuse to accept the possibility that you may be wrong on a topic that you continue to demonstrate you have next to no experience in or with, and yet cling to your ignorance as a defence against having to consider that life might not be so black and white as you'd like. Fucking hell drug users have the most inane justifications for their failures. And you have the most self-righteous justification for your success. I get that you worked hard to get where you are, and I truly am happy that your life is going well. Being the child of poor migrants cannot have been easy, and it is to your credit that you have succeeded as well as you have. But hard work alone is not enough. Whether you realise it or not, your success is also dependent on a large number of factors over which you had no control. I know many people who have worked hard and continue to work hard who have not had your success. Difficult as your life may have been, others face greater difficulties. Perhaps they aren't as smart as you, perhaps they didn't have access to the education that you had. It sounds like your parents encouraged and taught you the value of saving and working hard. Not everyone has parents that can or will do that. Some have parents that abused them. Some have worked hard and then had chance take that from them. An accident. An illness. By seeing drug abuse (not drug use - you continue to conflate the two) as the _cause_ of the problem and not a symptom, you get to maintain your moral superiority and to assert that their problems would go away if they just didn't take drugs. How simple. Why don't they just do it? Other people have tried to tell you how smug, self-congratulatory and unsympathetic that sounds. I'll go further. Your position is childish, selfish and ill-educated. Grow up. Seriously. Teaching kids to not do something that is ENTIRELY VOLUNTARY is not "incomplete" or "incorrect". Teaching them that 10% of drug users ruin their lives is. That's a statistic you just made up. Go on, back it up. Educate yourself. Try and find some real statistics on drug use vs drug abuse. You realise that alcohol is a drug, right? That in small doses it is pleasant and even has some positive health benefits. Too much, too often and it is harmful. Dependency is harmful and addiction is harmful. It is responsible to teach people the facts and then to assist them in making informed decisions. You have chosen not to drink alcohol. That's your decision - but it's not the only 'correct' decision. Banning alcohol didn't work in the US. In fact, it caused more problems than it solved. Countries like Portugal have legalised and decriminalised a number of drugs and have seen a drop in usage as well as the associated problems of creating a black market for drugs (like crime). Prohibition, scare tactics, misinformation and teaching people to 'just say no' have been shown again and again not to work. Accurate information, support for people who are struggling with substance abuse and a destigmatisation including decriminalisation have been shown to be far more effective. Most people can handle caffeine. Most people can handle alcohol. Most people can handle a wide range of substances because their lives are generally good. The people who struggle with dependence and addiction do so not (entirely) because of the substance but because of the other factors in their lives. I do not advocate taking drugs. I advocate making an informed choice based on accurate information. In all things. Like whether I drink tea or not, whether I drive in heavy traffic or not, whether a cider or two at the end of the week is acceptable or not. I've seen people ruin their lives with alcohol. I've seen people ruin their lives with gambling. I've seen people ruin their lives chasing sex. Addiction and addictive behaviours are destructive. Alcohol isn't. Gambling isn't. Sex isn't. Driving is "ENTIRELY VOLUNTARY" and has a higher death rate, per year, than all illegal drugs combined, so clearly teaching kids to "NOT DO IT" is entirely "REASONABLE" and "DOESN'T COST YOU ANYTHING". I mean, that's "RISK MITIGATION" and teaching anything else is "BULLSHIT" reasoning. Or, perhaps, you have made the assessment that given your knowledge of yourself, the benefits of driving outweigh the risks and that you can take steps to minimise or manage the risks that do exist and so driving is a reasonable choice for you to make. Not, perhaps, for someone who doesn't know how to drive (like me), but reasonable for you. Recreational drugs range from those that enhance certain faculties (like focus and attention), mitigate negatives (pain for the opiates, sleep for amphetamines) or provide profound new insights (like hallucinogens). Some are toxic in high doses. Some will rapidly reduce in effect if taken too frequently. Some will impair functions. Some will cause dependence if used to frequently. These are all risks that can be managed and minimised by people who are well informed and acting reasonably. Clearly you have chosen that the benefits do not outweigh the risks. That's perfectly reasonable. What is not reasonable is to insist that there are no benefits to anyone else and to claim that any risk is too much. _Everything_ has a risk of harm associated with it. Standing up (you might fall down), eating food (it might be tainted), breathing (you might catch something). You have an exaggerated estimation of both the risk and the harm of drug use because you fail to distinguish between 'sensible' us and abuse. My attempts to highlight this have been met with hostility and now swearing. We are no longer having a meaningful or useful conversation. Be well. Comment: Re:The only good thing (Score 1) 511 Teachers have a responsibility to impart sensibleness to their students Teachers have a responsibility to educate. Ideally that includes the ability to reason, which is what I really hope you mean when you say 'impart sensibleness'. To the extent that they are imparting incorrect (by way of being incomplete) information they are failing as educators. It shouldn't even matter about the actual statistics Are you seriously arguing that the facts don't matter, so long as the message gets through? I'm sorry but the actual statistics most certainly matter. You claim that drug use is bad because some people who use drugs have terrible lives. I am trying to show you that until you know the actual population of drug users, their usage patterns and a host of other 'statistics' then you can't possibly make reasoned and informed decisions about whether 'drugs' are 'bad', whether they are causative or co-symptomatic, or any of the other positions you so blindly assert. As long a sizeable percentage of drug users ruin their lives You don't know that it is a "sizeable percentage" (whatever that means). You have your opinions based on what you have seen/read/found-out and from what you are saying, I am becoming more and more convinced that for all you 'love' of science, you actually have a fairly poor understanding of the scientific method. What you have is anecdotal. At best it is horribly biased. Yes, because there is a physical reality that is true regardless of the statistics. Driving involves small humans and huge metal machines. Anyone with a sensible ability to use logic and reason about physics should be able to make a safe decision. The reality of road conditions? Of other drivers' abilities? Of traffic conditions? All of these (should) go into making decisions about driving. you know about these because they are reported on accurately and in depth. You can, therefore, make an informed decision about the risk of driving. I am learning to drive. Consequently, assessing my own abilities and the state of Parramatta Rd at peak hour, I choose not to drive there. That's an informed choice based on (reasonably) accurate information. Now assume that you don't know the state of the roads, that the only reports you have of traffic conditions are sensational reports of traffic accidents and the only information you have about other drivers is that a "sizeable percentage" ruin their lives by having traffic accidents. Regardless of my self-assessment, in the light of such poor information about "physical reality" I am not able to make an informed assessment of risk. It shouldn't take statistics to reason that messing about with your brain chemistry is not a good thing to do Woah there, that's a very different argument. You have gone from asserting that drugs are bad because "most", I mean "a sizeable percentage", I mean 'the statistics don't matter' people end up ruining their lives to now asserting that drugs are bad because they mess with your brain chemistry and that they are a waste of money. Given your ... cavalier attitude towards the importance of fair sampling and statistics, I'm not certain that you're qualified to be talking about brain chemistry. Would you like to dignify your position with an argument, rather than an assertion? Many drugs have very well known and studied effects - it's hardly 'messing around' and while you assert that this is 'not a good thing to do', you don't say why. Some people are moved by the music they listen to. They weep over tragic arias, beam with happiness over something upbeat and catchy. Their mood is altered by music, they are, therefore "messing ... with [their] brain chemistry". Is this "not a good thing to do"? Some people seek out excitement - thrill seekers. Anything from extreme sports to simply going on a roller-coaster. The adrenaline from the thrill alters their brain chemistry, alters their mood, is literally mind-altering. Some people are addicted to thrill seeking. Some of these people die from seeking ever greater thrills. Is thrill seeking bad, or is the addiction bad? Throughout the course of human history humans have used alcohol, sometimes for entirely recreational purposes. A very, very small percentage of these people end up addicted and with their lives ruined. Is this the fault of the alcohol, or the addiction? As to your 'waste of money' - I'm sure that the hobbies and/or interests that you enjoy would seem a complete waste of money to me, if I were condescending and completely lacking in empathy. People value different things to you. They spend money differently to you. Not all drug users end up with ruined lives. Not all ruined lives are caused by drugs. Not all drug users are addicts. Not all addicts use drugs. You keep conflating these and refusing to accept that you are doing so based on faulty reasoning. Comment: Re:The only good thing (Score 1) 511 So you think I should take drugs if it doesn't present a danger to a statistically significant majority of people? Not at all. I am challenging your assertion that teachers should demonise marijuana because "most" of those who use it do "nothing with their lives ...". A "great many people" die in traffic accidents every year. Yet I dare say you still travel by road (whether you drive, cycle or use public transport). You have assessed the risk and take steps (I presume) to maximise your safety. Now imagine if driving were forbidden. Illegal. Unreported. If the newspapers only every reported on the sordid death of another person in a road fatality. Would you be as able to properly assess the personal risk of driving under such (ridiculous, I know, but I'm trying to make a point) circumstances? I am not advocating for or against drug use. I'm pointing out that your position that the majority of drug use leads to "doing nothing with their lives" or other problems is drawn from a very biased set of data. Your personal decision to use or not use drugs is entirely your own. Your assumptions about the use of others are flawed. Comment: Re:The only good thing (Score 1) 511 I see people on marijuana who can't think coherently Given your obvious opinion on the topic, the only people who don't keep their drug use hidden from you are those who are completely incoherent. For someone who claims to 'love science' you certainly don't seem to understand the problem with things like confirmation bias and drawing conclusions from non-random sampling. It's very difficult to properly estimate drug usage due to its illegality and the social stigma surrounding it. Without knowing how many people are using (and to what degree) then any conclusions you draw based on those who _are_ visible are going to be grossly inaccurate. You clearly have strong opinions on the matter and have made several assertions - can you cite reputable studies to back up those claims, or are you relying on (very fallible) personal experience? Comment: Re:Gun nuts (Score 1) 1374 by another_twilight (#46895601) Attached to: "Smart" Gun Seller Gets the Wrong Kind of Online Attention That seems to be the gist of it for self-defense ... and that's one (perhaps even the most common) interpretation. Argument about the intent seems lively. there are people in the US who fear the things so much, they want to restrict who can and cannot have a firearm There are only a very few obvious prohibitions, namely against convicted felons is an interesting juxtaposition - at least to an outside observer (caveat, I'm not from the US). They did their time, served their sentence, why should they be denied a right granted them in the Constitution? If you can justify why one group should be denied such a right, then it simply becomes a game of 'norming' where the line between the haves and have-nots gets drawn. Either it's a right or it's not. Either it applies to all or you end up negotiating who does and does not get that right. There is a route by which this can be accomplished, but it would require amending the US Constitution, Or working around it, such as the restrictions that apply to felons. Comment: Re:Did this really happen? (Score 1) 109 by another_twilight (#46752241) Attached to: Inside the Stolen Smartphone Black Market In London So the BBC showed that a call center worker would record the cc numbers of callers if they were paid (and were told it was for the BBC?). How is that not a problem? What's to stop me, for example, calling that worker and paying for some cc numbers - even if I have to claim i work for the BBC? Comment: Re:Don't forget Ananias (Score 2) 537 And Zeus lives in Olympus, Odin in Valhalla (when he's not wandering amongst us), Horus is in the sky (at least we can see His presence) and Russell's teapot is in orbit. We have as much evidence for each of these as we do for Yahweh, Jehovah, Jesus etc. Why do you believe in the version of God you do? Is it just a matter of needing to believe in something and that Christianity is 'good enough'? You are correct, I cannot disprove the existence of your god. Or of Lugh, Coyote or Quetzalcoatl. You do believe in them, too, right? Comment: Re:Hysteria! (Score 1) 274 by another_twilight (#45032417) Attached to: Asian Giant Hornets Kill 42 People In China, Injure Over 1,500 And you believe your *inset nation* will handle things any differently ...? Australia. Poisonous insect, you say? That'll make a change from the poisonous spiders, reptiles and monotremes. Oh, and jellyfish. And octopus. And toads (although they are an import and more dangerous to pets than humans) ... Comment: Re:God says... (Score 1, Interesting) 157 by another_twilight (#44569635) Attached to: MIT Research: Encryption Less Secure Than We Thought Which god? Zeus? Odin? Quetzacoatl? Given the differences between some people's definitions of what 'god' is, I am unconvinced of the 'all aspects of the one divinity' argument, so before we start playing 'what if' let's establish what you mean when you say 'God' and why we should accord that definition primacy over another. The thought exercise you pose is little different to any one of the form that posits a state of being where your senses are fooled so that you cannot perceive the true reality - brain-in-a-jar, plugged-into-the-Matrix, figment-of-a-dreaming-god. The answer is the same in all cases - if the environment I perceive is consistent, if the illusion is complete, then the difference that makes no difference is no difference. The 'glitches in the Matrix', the 'glimpses of the divine' are less likely to be cracks in the slightly-less-than-perfect-illusion and more likely a figment of our imperfect perception and/or cognition. If we are figments of a gods imagination, then it is either indifferent or malicious. The mental gymnastics required to claim that a beinn who keeps us in ignorance whilst imbuing us with reason and curiosity is benign are ridiculous. Comment: Re:Ubermensch (Score 1) 3 by another_twilight (#44183649) Attached to: 130701 (La Jolla, CA, 92037, war v7.034) Ah, yes. your current obsession. Accusing and imagining the people around you engaged in perverse sex acts. You attribute to others behaviour that lets you dehumanise them and feel superior to them. Given that, socially speaking, you are about as close to zero as it is possible to be, the 'crimes' that you must invent for _you_ to feel superior need to be heinous. It's telling that most of what you project is sexual in nature. I mean, no accusations of cannibalism? That's a classic, historical crime with which to paint your enemies prior to whipping yourself into a frenzy of moral outrage. There's the odd half-hearted claim that 'they'/'we' worship false gods - I guess devil-worship has just fallen out of style these days. Several times a week, sometimes every day you have another rage-filled rant filled with lascivious details about the perversions of the people you see. So while neither of us engages in sex with animals, one of us spends most of his day thinking about it. Writing about it. Describing, out loud, what he thinks is happening when two people walk past. Oh, I know, it's not your fault. I mean, you wouldn't have all those thoughts or get so hot and flustered if there weren't so many dogs being paraded past you, to tease and haunt you - right? Comment: Re:Hmm... (Score 1) 101 by another_twilight (#43145239) Attached to: The Manti Te'o of Physics You can't have a meaningful dialogue with someone who is lying. It's not money you are spending, it's your time. This is the classic Gambler's Fallacy with, I dare say, a touch of the "I'm not going to find anything/anyone else". Without knowing more I'm going to take a punt and suggest it's not her you like or care for but an idealisation that you have built. Perhaps a 'potential her' or 'she as she might be'. While you are pouring your life into this you are missing opportunities that might actually bear fruit. If you are talking about it, that's fantastic. Keep at it. Talk to people you can trust. Part of you is concerned. Nurture that part. In any event, may I suggest you take a break. Find another escort and see her regularly enough to get over the 'strange and new'. See if and how that changes your perspective and how your current companion reacts.
global_05_local_5_shard_00000035_processed.jsonl/948
Forgot your password? Comment: Re:Ejectrode? (Score 1) 211 by drinkypoo (#49827797) Attached to: Ask Slashdot: Your Most Unusual Hardware Hack? Now I have one of those flippy-key things like the VW and MB owners have, and saved about $35,000 on the car. That's on my list of things to do for my Audi. Apparently the system has support for fobs, and I have instructions for coding them, but I don't actually have any fobs. So I have to go through the same process. It's an old car though, so it wasn't expensive either... just leaky. The mechanics I've talked to say pretty much all the 4.2 liter Audis they've seen have been leaky... story of my life with bored-out versions. The 7.3 Ford is the same way. Comment: Re:You're Talking About a Different Scale (Score 1) 239 by ultranova (#49827715) Attached to: Professional Russian Trolling Exposed I just don't think those tactics would work all that well within the US. It seems like whenever an organization DOES try an astroturfing campaign ("Citizens for Enhanced Comcast Monopoly") it gets spotted so quickly for what it is that it seems to achieve negative results. Russians aren't idiots, they simply think things will get better if they pretend to believe the lies and let their country and its leaders engage in one immoral act after another - just like Americans, or really anyone. And their reward is the same, too. Comment: Re:par for the course (Score 1) 239 by ultranova (#49827611) Attached to: Professional Russian Trolling Exposed The professional Russian trolls are about as subtle. Do we know Cold Fjord is not a Russian troll? After all, he's making American patriotism look bad by associating it with authoritarianism. Thing is, you don't need to be very good at trolling if you are working full time at it. You will always get the last word against people who has better things to do than to argue with paid trolls. You will always get the last word, and then what? The point of such trolling is to disrupt, to keep people arguing over stupid shit forever so they're too busy to discuss Putin's failures or what to do about him; if other posters ignore him, he has failed. Comment: Re:Timeo Danaos et dona ferentes (Score 1) 198 by drinkypoo (#49827443) Attached to: Microsoft To Support SSH In Windows and Contribute To OpenSSH This doesn't compete with PuTTY, probably: odds are it will be a console-mode ssh binary just like what cygwin users have already but without a dependency on cygwin, and a server just like what cygwin users have already but with NT auth (incl. AD) rather than /etc/passwd authentication which maps to local SIDs. PuTTY does have a command-line client, but nobody is paying for that. They're paying (if they pay at all) for the interface. Comment: Re:Cygwin (Score 1) 198 by drinkypoo (#49827433) Attached to: Microsoft To Support SSH In Windows and Contribute To OpenSSH No. Cygwin runs everything under one process. windows$ ps -aef cyg_serv 2588 1 ? May 29 /usr/bin/cygrunsrv cyg_serv 2672 2588 ? May 29 /usr/sbin/sshd cyg_serv 7016 2672 ? 18:46:49 /usr/sbin/sshd   user 8108 7016 pty0 18:46:52 /usr/bin/bash   user 6536 8108 pty0 18:46:58 /usr/bin/ps debian$ ps -aef | egrep '(sshd|bash)' root 13792 1 0 Apr24 ? 00:00:06 /usr/sbin/sshd root 19995 13792 0 18:48 ? 00:00:00 sshd: user [priv] user 19997 19995 0 18:48 ? 00:00:00 sshd: user@pts/0 user 19998 19997 0 18:48 pts/0 00:00:00 -bash user 20131 19998 0 18:50 pts/0 00:00:00 egrep (sshd|bash) So uh, what's the difference? Looks like all cygwin is missing is proper authentication. AFAIK it maps UIDs to SIDs, but yes, is missing AD support. Comment: Re:excellent (Score 1) 198 by drinkypoo (#49827385) Attached to: Microsoft To Support SSH In Windows and Contribute To OpenSSH now you can use Windows computers the way they were meant to be used, as dummy linux clients I've been doing that for so long I've actually given Chameleon money (for Xoftware.) No, wait. Except the last time I actually wanted to do it was years ago, because it's been years since I had any Unix-specific machines. Now it's just PC Unix. I just threw away my last Unix machines, a POWER1 and an Indy R4400SC@200MHz. It wasn't worth dusting them off. Comment: Re:Odd thoughts: (Score 1, Insightful) 198 by drinkypoo (#49827355) Attached to: Microsoft To Support SSH In Windows and Contribute To OpenSSH When you're typing, period, creating short options first makes a lot of sense. Powershell is a shell which is apparently not designed to be used by typing. Too bad it has a typing interface. Comment: Re:Quality of thought from nuclear playboys (Score 1) 147 by drinkypoo (#49827327) Attached to: Cool Tool: The Nuclear Fuel Cycle Cost Calculator Yeah, France still has a nuclear waste issue, and they do reprocess. No need to apprehend nuclear physics to understand that humans are fallible and corruptible. Comment: Re:What do they need to contribute back? (Score 2) 198 by Burdell (#49826611) Attached to: Microsoft To Support SSH In Windows and Contribute To OpenSSH You obviously haven't ported OpenSSH to a different OS before. Even among Unix/POSIX-like OSes, there is significant variance between platforms that something like OpenSSH has to deal with. Go look at the diff between OpenBSD OpenSSH and portable OpenSSH (for all the other supported platforms). Also, portable OpenSSH uses extended security features that tend to be platform-specific (but useful enough to make it worthwhile to use on each specific system). I expect that there is Windows security functionality that doesn't map onto the current OpenSSH setup (but is worth extending OpenSSH to use). I really hope that Microsoft makes a native port of portable OpenSSH to Windows. Nothing against the Cygwin folks (the Cygwin OpenSSH is great), but a native port that is more integrated into the "Windows" way of doing things would be good. Comment: I dunno about unusual (Score 2) 212 by drinkypoo (#49825093) Attached to: Ask Slashdot: Your Most Unusual Hardware Hack? I get a lot of crap at yard sales, thrift stores, etc. Eventually the stuff makes its way into projects. Got some of those NHT transducers out of some toy cardboard guitar amplifiers. Used one of them to make a lunchbox into a speaker, it sounds a little tinny... Got a LCD backup mirror with a broken mirror for $10, nice source of a backup camera (with range marks) and a 4.3" LCD. $10 later and I've got a touch panel to go with it, I plan to attach them to my R-Pi soon. Outside I've made a table for my (yard-sale acquired) lathe out of pallets and I made a 4x8 table saw by making a wooden frame for a portable jobsite table saw I got for ten bucks missing the extending fences and whatnot but with the pusher. I don't depend on this stuff for livelihood, it's just a hobby, but you can live better on the trash in this country than you can on normal wages in some others. There's just valuable shit going to hell everywhere. If you could line up end-to-end all the cars that people would have liked to fix up which have been parked in people's yard and just rusted away, they'd probably reach across the country.
global_05_local_5_shard_00000035_processed.jsonl/957
Cassini Division - Developers The Open Construct Engine (OCE) is a suite of frameworks, applications and utilities for the development of content management solutions, based around Java and Apple's WebObjects application server platform. Project Admins:
global_05_local_5_shard_00000035_processed.jsonl/973
Take the 2-minute tour × I am writing a basic authorization system and I am struggling with it a bit. There are two files involved - index.php and login.php. The login form is pretty simple (it's inside index.php): <fieldset class="right"> <label for="email">Email <label for="password">Password <a href="#" onclick="$('#password-box').toggle();" >Forgot your password?<span></span></a> <div class="btn-login"><button type="submit" value="Login"></button></div> The login.php contents: // Include the launcher file. require_once(CORE . 'launcher.php'); // Collect the information sent to us. $mail = (isset($_POST['email'])) ? $_POST['email'] : ''; $password = (isset($_POST['password'])) ? $_POST['password'] : ''; $LoginError = false; if ($LoginError) { header('Status: 200'); header('X-Test: test'); header('Location: index.php'); As you can see, I'm sending a custom header to the script containing the form in case there was an error during signing in. In the index.php, I'm using headers_list(), but the header I'm sending is not present in the list. What is causing that? I've tried with php_value "output_buffering" "0" in the .htaccess file, but no success. UPDATE After checking in Chrome, the header is being received by the browser, but is not available in PHP. Thanks in advance. share|improve this question The answer should be clear now with four different explanations :D –  The Nail Apr 10 '12 at 18:58 Please see the update. –  Pateman Apr 10 '12 at 19:00 4 Answers 4 up vote 3 down vote accepted The redirect is sent to and processed by the client which responds by navigating to the given Location: index.php. You should not expect that the custom header is provided by the browser when it is requesting index.php from the server. CLIENT SERVER |------- POST login.php ------------------>| | | |<- 200, Location: index.php, X-Test:test -| (this is where you send the header) | | |------- GET index.php ------------------->| (no header from client to server) share|improve this answer The headers() you specify with header() will be present in the output from server -> client. However, when doing a redirect, the browser will perform a NEW request, client -> server, and the browser is under no obligation to include your custom headers in this new request. share|improve this answer I'm sending a custom header to the script containing the form No you're not. Your sending a custom header to the client (user's browser) and the client will simply ignore/discard it. If you need to maintain state, use a cookie/sessions or place something in the new location, e.g., header('Location: index.php?login=false');. share|improve this answer The custom headers you are sending to the user are being received. But they're being discarded when the browser does the redirect because the browser isn't sending them to the redirected page. That's why you don't see them. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/974
Take the 2-minute tour × I have had a look into this question a lot however I'm still unclear whether it's possible or not. Essentially what I want to do is to create a UIPickerView that is continuous in the sense that you can spin it forever and you will never reach the end of it (since the last value is followed by the first value). I have had a look around online and there seem to be a wide variety of hacks to achieve the desired effect. However a lot of these solutions seem to increase the number of rows in the UIPickerView to trick the user into thinking the UIPickerView is continuous (however, in reality if they kept scrolling they would eventually reach the end). What I'm after is a way of creating a UIPickerView that is genuinely infinite in the sense that you will never reach the end if you keep scrolling for days, weeks, months or years. I don't mind too much if the solution is a hack since I understand that Apple hasn't provided a way of achieving the effect as of yet. Please can someone advise on a way of doing this (or point me in the right direction at least)? share|improve this question 7 Answers 7 I have used this source. Implementation is not clear, but it works share|improve this answer Find the custom UIPickerView class which works very well and is very easy to implement here share|improve this answer I really think, that the only hack you can do with native UIPickerView is described here: How do you make an UIPickerView component wrap around? The other way do make really looped picker is to implement it by yourself. I saw pickers that were implemented with cocos2d, that is OpenGL-based. I think, you can try to do it using UIKit if you really need to. Or just forget it and make a picker with NSIntegerMax rows with repeatable content. I think that nobody will spin it till the end. share|improve this answer It's possible. Here is how you can do it. First setup a timer. Let's assume int maxNumber is an instance variable set to some arbitrary value. - ( void) viewWillAppear:(BOOL)animated{ [super viewWillAppear:animated]; [self.timer invalidate]; self.timer = [NSTimer scheduledTimerWithTimeInterval:0.01 target:self selector:@selector(timerFireMethod:) userInfo:nil repeats:YES]; - (void) viewWillDisappear:(BOOL)animated{ [self.timer invalidate]; [super viewWillDisappear:animated]; - (void)viewDidLoad [super viewDidLoad]; [self.infinitePickerView selectRow:(int)maxNumber*5 inComponent:0 animated:YES]; In the timer fire method check if any of the 'edge' view of your uipickerview are showing. - (void)timerFireMethod:(NSTimer*)theTimer{ int rowSelected = [self.infinitePickerView selectedRowInComponent:0]; UIView * viewBelow = [self.infinitePickerView viewForRow:i forComponent:0]; UIView * viewAbove = [self.infinitePickerView viewForRow:maxNumber*10-20+i forComponent:0]; if(viewBelow!=nil || viewAbove!=nil){ int middlePosition = maxNumber * 5 + (rowSelected % maxNumber); [self.infinitePickerView selectRow:middlePosition inComponent:0 animated:NO]; Note this works because [self.infinitePickerView viewForRow:i forComponent:0]; returns a UIView only if it's visible. Of course your UIPickerViewDelegate must use be something like return maxNumber * 10; //returning a large number //You cannot use this method You have to use the method below in lieu of it UILabel * label; if (!view) { label = [[UILabel alloc] initWithFrame:CGRectMake(0, 0, self.infinitePickerView.bounds.size.width, 30)]; }else { label = (UILabel *) view; [label setText:[NSString stringWithFormat:@" %d", row % maxNumber]]; return label; Hope this works!! :) Good luck! share|improve this answer looks like a nice hack. @The Crazy Chimp let us know if it works. –  Holger Frohloff Jun 7 '12 at 15:18 There is not a native picker that wraps (not as of iOS7.1 anyway.) You can fake this by something along these lines: NSArray *picks = @[ @"zero", @"one", @"two", @"three" ]; // 4 entries // ... return (3 * [picks count]); // we're very tricky, displaying only // ...the SECOND set of entries, to // ... give the impression of wrap-around // ... // All "3" sets of entries have the same values; // this is what gives the appearance of wrap-around. int titleRow = row % [picks count]; return [picks objectAtIndex: titleRow]; // ... // If the wheel turns to outside our 2nd-set range, // ...set it to the matching item in the 2nd set. // In this way, we always display what looks like a wrap-around. int count = [picks count]; if ((row < count) || (row > (count * 2) ) [pickerView selectRow: (row % count) inComponent: component animated: NO]; You'll have to tweak and adjust to fit your needs, of course, but this is the basic gist of it. Good luck! share|improve this answer Hm.. I've been looking around, and there are a couple links to a few possibilities, the most outstanding being this one: The Abusive Pickerview, the basic idea being that you populate the pickerview with 3 sets of your data and start and the center set. Whenever the user scrolls to the center of either of the top or bottom sets, you set the row value back to the center of the center set! It seems to be more genuine then making a really long list that will create the illusion of infinity. This solution may be the most effective and simple as to solving the infinite pickerview problem! Hope this helped! share|improve this answer Generally, you shouldn't copy and paste your answers from other posts stackoverflow.com/questions/10815435/… –  pasawaya Jun 7 '12 at 17:12 Hm.. I didn't actually view this post... –  WayWay Jun 8 '12 at 19:33 It seems to me that solutions requiring large amounts of data be stuffed into the pickerView are wasteful. The following solution uses smarts instead of memory. The only rows that need to be populated are the rows visible in the view and the row immediately preceding the first one and the row immediately following the last one. When the user scrolls a component, pickerView:titleForRow:forComponent: is called for each row that scrolls by. So the solution is to update the data in pickerView:titleForRow:forComponent: and then call the appropriate method to reload the data so that it is there when the pickerview scrolls one more tick. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/975
Take the 2-minute tour × I downloaded the Feeds API Section Client Library for php but there is no config.inc.php file. I even searched for the config file in other api library. Can anyone guide me through the problem??? To solve the issue, I created my own config.inc.php file and included the essential credentials, and made necessary changes in the SubmitFeedSample.php. But I am getting " Class 'MarketplaceWebService_Model_SubmitFeedRequest' not found" error. Help!!! share|improve this question 2 Answers 2 up vote 1 down vote accepted Yes config.inc.php is actualy .config.inc.php and it is hidden as well. And for MarketplaceWebService_Model_SubmitFeedRequest you need to include or require_once as below require_once 'FeedsAPIClass/src/MarketplaceWebService/Client.php'; require_once 'FeedsAPIClass/src/MarketplaceWebService/Model/SubmitFeedRequest.php'; share|improve this answer The config.inc.php has a leading '.' (.config.inc.php) and it should be in the Samples directory. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/976
Take the 2-minute tour × I'm tring to get image from gallery (by intent). I got this error: 985120-byte external allocation too large for this process. Out of memory: Heap Size=4871KB, Allocated=2472KB, Bitmap Size=19677KB VM won't let us allocate 985120 bytes That's my code where I get image: mBitmap = Media.getBitmap(this.getContentResolver(), data.getData()); How can i solve it ? I noticed that if I select a pre-existent image (HTC photo installed) I get this error. If I select image picked from camera all works fine. So, I change my code according to this http://developer.android.com/training/displaying-bitmaps/load-bitmap.html: BitmapFactory.Options options = new BitmapFactory.Options(); options.inJustDecodeBounds = true; InputStream stream = getContentResolver().openInputStream(data.getData()); mBitmap = BitmapFactory.decodeStream(stream,null,options); But now the bitmap is NULL !!! share|improve this question Possible duplicate of stackoverflow.com/questions/6118464/… –  Ridcully Aug 27 '12 at 18:38 options.inJustDecodeBounds = true; with this you only decode the size of the bitmap, not allocate it, so that's why it is null. Try using options.inScale to decrease the size of the bitmap. –  nininho Aug 27 '12 at 19:01 stackoverflow.com/a/4665992/1615280 –  bjorncs Aug 27 '12 at 19:17 2 Answers 2 up vote 1 down vote accepted It looks like your application uses a lot of high-res bitmap (the bitmap memory partition is 19677KB). The sie of 'heap' and 'allocated' are quite normal, and should not be of any problem. Make sure that you remove unused bitmap from memory. You can free a bitmap from memory by calling bitmap.recycle(), or setting the reference to it to null. Take a look at LruCache if you want to cache bitmaps for performance reasons. share|improve this answer LruCache example with a bit more details –  zapl Aug 27 '12 at 18:46 I got this error when i pick example image in my gallery (htc image installed) that is 19MB (maybe). –  enfix Aug 27 '12 at 19:00 Okay, I thought that the 985120 bytes mentioned in the error message was the size of your image. 19MB is a lot of data, there may not be any good solution for that if you are using a low-spec HTC phone. There is a function for resizing images on the fly while parsing, hang on.... –  bjorncs Aug 27 '12 at 19:07 Try to use this method for parsing: stackoverflow.com/a/4665992/1615280 –  bjorncs Aug 27 '12 at 19:16 This work if I add stream.close() before second usage. Otherwise I got bitmap=null –  enfix Aug 27 '12 at 21:24 I always wrap decoding in a while loop increasing the inSampleSize and catching OutOfMemoryError. This will give you the maximum possible resolution image. Always use LRU caches! Bitmap image; boolean success = false;int counter = 0; while (success == false && counter < 10) image = BitmapFactory.decodeFile(photoPath, options); success = true; catch(OutOfMemoryError e) share|improve this answer Don't work. Image is always null –  enfix Aug 27 '12 at 21:25 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/977
Take the 2-minute tour × How do I combine few weak learners into a strong classifier? I know the formula, but the problem is that in every paper about AdaBoost that I've read there are only formulas without any example. I mean - I got weak learners and their weights, so I can do what the formula tells me to do (multiply learner by its weight and add another one multiplied by its weight and another one etc.) but how exactly do I do that? My weak learners are decision stumps. They got attribute and treshold, so what do I multiply? share|improve this question 2 Answers 2 up vote 5 down vote accepted If I understand your question correctly, you have a great explanation on how boosting ensambles the weak classifiers into a strong classifier with a lot of images in these lecture notes: Basically you are by taking the weighted combination of the separating hyperplanes creating a more complex decision surface (great plots showing this in the lecture notes) Hope this helps. To do it practically: in page 42 you see the formulae for alpha_t = 1/2*ln((1-e_t)/e_t) which easily can be calculated in a for loop, or if you are using some numeric library (I'm using numpy which is really great) directly by vector operations. The alpha_t is calculated inside of the adaboost so I assume you already have these. You have the mathematical formulae at page 38, the big sigma stands for sum over all. h_t is the weak classifier function and it returns either -1 (no) or 1 (yes). alpha_t is basically how good the weak classifier is and thus how much it has to say in the final decision of the strong classifier (not very democratic). I don't really use forloops never, but I'll be easier to understand and more language independent (this is pythonish pseudocode): for t in T: #over all weakclassifiers indices response += alpha[t]*h[t](x) return sign(response) This is mathematically called the dot product between the weights and the weak-responses (basically: strong(x) = alpha*weak(x)). This is what is happening inside strongclassifier(x): Separating hyperplane is basically decided in the function weak(x), so all x's which has weak(x)=1 is on one side of the hyperplane while weak(x)=-1 is on the other side of the hyperplane. If you think about it has lines on a plane you have a plane separating the plane into two parts (always), one side is (-) and the other one is (+). If you now have 3 infinite lines in the shape of a triangle with their negative side faced outwards, you will get 3 (+)'s inside the triangle and 1 or 2 (-)'s outside which results (in the strong classifier) into a triangle region which is positive and the rest negative. It's an over simplification but the point is still there and it works totally analogous in higher dimensions. share|improve this answer I appreciate your help but there's still something that I don't know. I think you understood my question correctly and these lecture notes are really good but I still don't know how to implement it. Let's say I have my input data in an ArrayList (JAVA) and I trained some classifiers - how do I separate hyperplanes? Please, help me! –  AjMeen Aug 31 '12 at 20:53 I tried to break it down as much as possible, but I'm not breaking it down i Java since I have never used it for numerical problems. –  SlimJim Sep 2 '12 at 7:33 Aren't you using any numerical library in java handling matrices and stuff btw? –  SlimJim Sep 2 '12 at 7:42 No, I'm not, probably because it's my first time with this kind of stuff. I think I understand your explanation and I hope that I'll be able to implement it because I've got only 2 days left. Anyway - thank you a lot! It is possible that I'll have more questions soon... –  AjMeen Sep 2 '12 at 10:50 Hey, take a look at this paper: csie.ntu.edu.tw/~b92109/course/Machine%20Learning/… It's a clear example and I get it good, but tell me please - is this: f3(x) = 0:423649 I(x < 2:5) + 0:6496 I(x < 8:5) + 0:752 I(x > 5:5); 0 mistakes final result? Or I should somehow compute it? I mean - how do I know what exactly is 0.42 from (x < 2.5) or 0.69 from (x < 8.5)? –  AjMeen Sep 2 '12 at 20:11 In vanilla Ada Boost, you don't multiply learners by any weight. Instead, you increase the weight of the misclassified data. Imagine that you have an array, such as [1..1000], and you want to use neural networks to estimate which numbers are primes. (Stupid example, but suffices for demonstration). Imagine that you have class NeuralNet. You instantiate the first one, n1 = NeuralNet.new. Then you have the training set, that is, another array of primes from 1 to 1000. (You need to make up some feature set for a number, such as its digits.). Then you train n1 to recognize primes on your training set. Let's imagine that n1 is weak, so after the training period ends, it won't be able to correctly classify all numbers 1..1000 into primes and non-primes. Let's imagine that n1 incorrectly says that 27 is prime and 113 is non-prime, and makes some other mistakes. What do you do? You instantiate another NeuralNet, n2, and increase the weight of 27, 113 and other mistaken numbers, let's say, from 1 to 1.5, and decrease the weight of the correctly classified numbers from 1 to 0.667. Then you train n2. After training, you'll find that n2 corrected most of the mistakes of n1, including no. 27, but no. 113 is still misclassified. So you instantiate n3, increase the weight of 113 to 2, decrease the weight of 27 and other now correctly classified numbers to 1, and decrease the weight of old correctly classified numbers to 0.5. And so on... Am I being concrete enough? share|improve this answer It's not the answer I'm looking for. You told me something that I already know. Maybe I should tell how my application looks like: My input data is an ArrayList of Elephants. Each Elephant has a size, weight and type(it can be Asian or African). My weak classifiers classify if an elephant is Asian or African by size or weight. I sort my data by elephants weight or elephants size and create all possible classifiers (which in case of decision stumps are those with treshold between each of data points). (more in next comment...) –  AjMeen Aug 28 '12 at 10:07 Then I pick the best one (which has the lowest error rate). I classify my data using that one classifier and update weights of samples (increase misclassified samples weight and decrease weights of classified correctly). Then I choose samples with greatest sample weight (misclassified ones) and I match a classifier which will classify them correctly. "And so on..." BUT I still don't know what is my final result and how do I "extract" it? –  AjMeen Aug 28 '12 at 10:08 Eg. by majority voting. The idea is, that between iterations you don't change weights that much, and you do a lot of iterations, and you do stop before you are overtrained, ie. don't try to classify in the last 1%. And then you let them vote on classification of each element. And when there is a lot of discord, you can even introduce ambiguity function, that shows how confident your system is about each elephant's classification. –  Boris Stitnicky Aug 29 '12 at 10:04 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/978
Take the 2-minute tour × I was given C# code and I'm trying to generate the equivalent SHA1 using Perl. public string GetHashedPassword(string passkey) // Add a timestamp to the passkey and encrypt it using SHA1. string passkey = passkey + DateTime.UtcNow.ToString("yyyyMMddHH0000"); using (SHA1 sha1 = new SHA1CryptoServiceProvider()) byte[] hashedPasskey = return ConvertToHex(hashedPasskey); private string ConvertToHex(byte[] bytes) StringBuilder hex = new StringBuilder(); foreach (byte b in bytes) if (b < 16) hex.AppendFormat("0{0:X}", b); hex.AppendFormat("{0:X}", b); return hex.ToString(); The same as: use Digest::SHA1 qw( sha1_hex ); my $pass = "blahblah"; $year += 1900; my $date = sprintf("%d%02d%02d%02d0000", $year, $mon+1, $mday, $hour); my $passSha1 = sha1_hex($pass.$date); I don't actually have any C# experience so I'm not able to test what is normally outputted from the C# code. The code is supposed to be used as a checksum for a website but the one I'm providing is failing. Edit: it also adds the UTC timestamp (yyyyMMDDHH0000) to the end of the pass before hashing so I've added that code in case the issue is there. share|improve this question First off, the C# code smells. The author does not know about precision specifiers for the format string. –  Sinan Ünür Aug 5 '09 at 4:46 Could you provide the output of your C# program? I.e., whats the value of hex.ToString() –  Matt Bridges Aug 5 '09 at 4:47 I can't sorry - I didn't write the C#. I was just given it in some spec. Was hoping someone would be able to tell me. –  rezzif Aug 5 '09 at 4:51 5 Answers 5 up vote 5 down vote accepted I do not know C# either. However, {0:X} formats hex digits using upper case letters. So, would my $passSha1 = uc sha1_hex($pass); help? (Assuming GetHashedPassword makes sense.) share|improve this answer Thats it thanks. –  rezzif Aug 5 '09 at 4:55 The only difference I can see (from running the code under Visual Studio 2008) is that the C# code is returning the hex string with alphas in uppercase and the perl code is using lower case for alphas The format string used in the C# code is asking for uppercase ("X" as opposed to "x"): Maybe the code at the website is using a case sensitive comparison? I assume it would be trivial for you to convert the output from the CPAN function to uppercase before you submit it? share|improve this answer Could it be as simple as changing the uppercase 'X' in the AppendFormat call to a lowercase 'x'? share|improve this answer I think you're looking for Digest::SHA1 share|improve this answer No, he knows about Digest::SHA1. He wants to verify if the C# code he has will produce the same output as the sha1_hex method. –  Sinan Ünür Aug 5 '09 at 4:34 My reading of the question is that the asker has the C# code and wants equivalent Perl code, in which case using the CPAN module is a much better idea that writing new code (with some exceptions - learning about stuff being one reason to rewrite it) –  Cebjyre Aug 5 '09 at 4:42 Thanks Sinan I edited my question to make it clear that I'm using Digest. –  rezzif Aug 5 '09 at 4:43 I've already provided the code that uses the cpan module! –  rezzif Aug 5 '09 at 4:44 Your SHA-1 could have also just been: BitConverter.ToString(SHA.ComputeHash(buffer)).Replace("-", ""); share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/979
Take the 2-minute tour × I am new in drupal 7 and I want to create one view blog in which I can list out taxonomy as category and in under that I want to display two articles and a read more link to that category. Can any one explain in details how can i do that. share|improve this question 1 Answer 1 If you use a content type with a Term reference field for your category, it wil automatically create pages for each category with the articles tagged with that category listed within it. If you want to have more control over these pages generated by the Taxonomy module, you can turn on the Taxonomy Term example view in de Views UI and add and remove the fields you want to display. The layout of these pages can be edited by creating a custom template file in you themes template folder for the file page--taxonomy.tpl.php. There you could als create an additional block display (I assume you mean block when you say blog), and in the Page settings area, you can turn on de More link, and this will display a more link when more articles are available then you have set you pager to display (i.e. Use pager - Display a specified number of items - Items per page = 2). Make sure you change de setting from For all displays to This block (override) to not override the other displays. This block you can place in any region on any page via the Blocks UI and is should do what you want. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/980
Take the 2-minute tour × I've to acquire data from various sensors like accelerometer, gyroscope, microphone and GPS. The sensing action shouldn't be continuous, but rather single short intervals of sampling should be periodically scheduled according to various policy (for example power saving). Each sensor sampling action lasts few seconds, say 5 seconds. I would realize a "Client" for each sensor, deputed to the listening of sensor data when necessary, and a "Controller" that control the execution of Clients, but I'm not sure about the way to realize this. Is it correct to realize a Service for each Client? or would be better a simple AsyncTask or Handler? It's better if each Client is responsible of a single sensing action, executed in a single onStartService(), or if the onStartService() action enable a periodic action of sampling? Help would be appreciated. share|improve this question 3 Answers 3 up vote 2 down vote accepted This sounds like a task for a Service, that is triggered by Alarms at (regular) scheduled intervals. An AsyncTask is usually something that is started after the user has done some interaction and the system is supposed to do a "long running" operation (like network i/o), which could otherwise block the UI. Note that it is very well possible to also trigger a service like an AsyncTask - have a look at IntentService. share|improve this answer +1 for IntentService –  Squonk Oct 28 '12 at 17:36 so the Controller controls the scheduling of each single sensing action executed by each Service properly setting the repeating period of each Client? It's sounds good! Thank you very much! –  user1781028 Oct 29 '12 at 8:43 Yes, of course each Client spawns it's own thread to compute a sensing action, so i will use Intent Service for some CLients, or Looper/Handler for others (if sensor events are dispatched in a Listener). Also, all this components (Controllers and Clients) are totally detached from UI elements since they run in a separate process, and they don't even communicate with the UI. –  user1781028 Oct 29 '12 at 8:52 After a further reading, seems that Alarm is conceived for a more sporadic periodicity. In my case, the events are scheduled with period from 30 seconds to 30 minutes. Is it ok to use Alarm so repeatedly? For now i'm using Timer from Java.. –  user1781028 Oct 29 '12 at 9:23 I suggest that you have a look at my answer regarding a similar question here: Service v/s AsyncTask. Personally, I would use a simple Handler to post a task to run with a specific time interval. private Handler mHandler = new Handler(); private void startTimer(Runnable Task, long delay) { mHandler.postDelayed(Task, delay); private void stopTimer(Runnable Task) { private Runnable registerListeners = new Runnable() { public void run() { startTimer(registerListeners, 10*60*1000); //register to run again in 10 minutes startTimer(unregisterListeners, 5*1000); //to unregister in 5 seconds //here register your listeners private Runnable unregisterListeners = new Runnable() { public void run() { //here unregister your listeners When you want to start the listening process: //To start you listeners startTimer(registerListeners, 0); When you want to stop everyting: //To stop registering/unregistering listeners Note: If you are doing long running code in your listeners, then you should have a look to the answer in the link I gave above. share|improve this answer Best practices from android developers site Best Practices for Accessing and Using Sensors Best Practices for Background Jobs share|improve this answer While these links may answer the question, it is better to include the essential parts of the answer here and provide the link for reference. Link-only answers can become invalid if the linked page changes. –  bummi Dec 23 '13 at 13:55 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/981
Take the 2-minute tour × In app/services, I have some classes, as Notification::Finder and Notification::Builder. They are placed as app/services/notification/builder.rb and app/services/notification/finder.rb. There is also the Notification class as a model, at app/models/notification.rb The autoload_path is configurated as in config.autoload_paths += %W(#{config.root}/app/services) When I try to load Finder, it works: Loading development environment (Rails 3.2.9) [1] pry(main)> Notification::Finder => Notification::Finder But when I try the Builder, I get a problem with the rails autoloading: Loading development environment (Rails 3.2.9) [1] pry(main)> Notification::Builder => ActiveRecord::Associations::Builder It just ignores the namespace I've used when the constant name (Builder) has already been defined by other namespace, and gets the ActiveRecord::Associations::Builder instead. Is this the expected behavior, or a rails bug? Going more detailed, the const_missing method at activesupport/dependencies.rb receives a const_name 'Builder', and nesting.inspect => 'nil'. Curious that when I use constantize, it resolves as expected: Loading development environment (Rails 3.2.9) [1] pry(main)> 'Notification::Builder'.constantize => Notification::Builder ( Rails issue at github: https://github.com/rails/rails/issues/8726 ) share|improve this question Is it possible that Builder is a reserved name? –  tadman Jan 3 '13 at 16:55 @tadman it's not =/ –  Victor Rodrigues Jan 3 '13 at 16:58 can you reproduce it in a fresh application? If so, please put one up on github and let me know. I'll take a look. There are situations where the rails autoloader will not be able to return the right result. I think this one should be possible though... –  Yves Senn Jan 3 '13 at 17:06 @YvesSenn, thanks for the help :D I've put a simpler version of the error here: github.com/rodrigues/autoload_zomg –  Victor Rodrigues Jan 3 '13 at 17:18 2 Answers 2 This problem exists because you are using an ActiveRecord model as a namespace. I created a gist with some experimentation until I saw the root cause. ActiveRecord models include the ActiveRecord::Associations module. Since you can get to a constant when including a module the Builder constant defined within Associations is now also reachable through the AR model. You will get this behavior with every class defined in the modules, which are included into an AR model: 1.9.3-p194 :010 > Post.ancestors => [Post(id: integer, title: string, published_at: datetime, created_at: datetime, updated_at: datetime), Post::GeneratedFeatureMethods, #<Module:0x007fec74dc33a0>, ActiveRecord::Base, ActiveRecord::Core, ActiveRecord::Store, ActiveRecord::Serialization, ActiveModel::Serializers::Xml, ActiveModel::Serializers::JSON, ActiveModel::Serialization, ActiveRecord::Reflection, ActiveRecord::Transactions, ActiveRecord::Aggregations, ActiveRecord::NestedAttributes, ActiveRecord::AutosaveAssociation, ActiveModel::SecurePassword, ActiveRecord::Associations, ActiveRecord::Timestamp, ActiveModel::Validations::Callbacks, ActiveRecord::Callbacks, ActiveRecord::AttributeMethods::Serialization, ActiveRecord::AttributeMethods::Dirty, ActiveModel::Dirty, ActiveRecord::AttributeMethods::TimeZoneConversion, ActiveRecord::AttributeMethods::PrimaryKey, ActiveRecord::AttributeMethods::Query, ActiveRecord::AttributeMethods::BeforeTypeCast, ActiveRecord::AttributeMethods::Write, ActiveRecord::AttributeMethods::Read, ActiveRecord::AttributeMethods, ActiveModel::AttributeMethods, ActiveRecord::Locking::Pessimistic, ActiveRecord::Locking::Optimistic, ActiveRecord::CounterCache, ActiveRecord::Validations, ActiveModel::Validations::HelperMethods, ActiveSupport::Callbacks, ActiveModel::Validations, ActiveRecord::Integration, ActiveModel::Conversion, ActiveRecord::AttributeAssignment, ActiveModel::ForbiddenAttributesProtection, ActiveModel::DeprecatedMassAssignmentSecurity, ActiveRecord::Sanitization, ActiveRecord::Scoping::Named, ActiveRecord::Scoping::Default, ActiveRecord::Scoping, ActiveRecord::Inheritance, ActiveRecord::ModelSchema, ActiveRecord::ReadonlyAttributes, ActiveRecord::Persistence, Object, PP::ObjectMixin, ActiveSupport::Dependencies::Loadable, V8::Conversion::Object, JSON::Ext::Generator::GeneratorMethods::Object, Kernel, BasicObject] A possible solution is to use a module as a namespace. For example module Notifications. share|improve this answer ActiveRecord::Associations::Builder is a module in Rails. If you have a Notification::Builder, you can ask it its class: >> Notification::Builder => ActiveRecord::Associations::Builder >> Notification::Builder.class => Module >> Notification::Builder.ancestors => [ActiveRecord::Associations::Builder] Is this expected behavior? OK, so... what choices do you have? • You can use a different term than Builder. Like Factory. or Notification::NotificationBuilder More info: * http://www.rubydoc.info/docs/rails/3.1.1/ActiveRecord/Associations/Builder/Association * http://apidock.com/rails/ActiveRecord/Associations/Builder share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/982
Take the 2-minute tour × I need help, pls…or, at least, a direction… I have a very peculiar scenario for WCF…I need to self-host a service (no IIS permitted) and consume it through a HTML page using jQuery ajax … (no IIS allowed too)…the page will run “standalone”, plain HTML with javascript…Is it possible?? Note: WCF Service and HTML/javascript on the same machine. share|improve this question Please more this to comments not answer. –  Rohit May 31 '13 at 19:58 2 Answers 2 Is it possible?? I believe it should be possible, assuming you configured the application correctly to support HTTP endpoints: http://msdn.microsoft.com/en-us/library/ee939340.aspx If you go down to the section "Define Endpoints in Configuration Files" you'll even see after they configure the server, they then configure the client which connects to localhost. Of course you will have javascript connecting to the service instead, but the point being that there is no restriction that prevents WCF from communicating with a client on the same machine over HTTP. The details of how to consume WCF from javascript are covered elsewhere: Consume WCF with JavaScript but keep it generic enough for all clients? share|improve this answer up vote 0 down vote accepted Ok...I get it....I can't consume a self hosted WCF service from a page in file system (different domains)...instead, i serve my html page throught one service and, using ajax, consume the others services...well...that's not the real good solution but works for me right now... anyway, tks very much AaronLS! share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/983
Take the 2-minute tour × I knew that PHP is able to read file content by different ways, for example: fread, file_get_contents, file, readfile, etc. Currently, I am looking for an API that can read real index of files and folders in specific partition or folder, for example: drive d:\ in windows contains three folders (folder1, folder2, folder3), and each folder contains some files, we can get these directory structure using PHP (opendir, scandir, readdir, etc) and list them as I want, however, windows saved file and folder names inside hard-disk with their attributes (size, last modified, created on, etc). How I can read hard-disc using PHP and retrieving all file and folder attributes for a specific path? for instance, if we consider last modified time we can use (filemtime()) function, but this attribute not saved inside the file, its saved some where else inside hard-drive, other attributes also saved in other location not inside the file. When windows user copying file from flash-drive to local hard, windows will copy all file and folder attributes and saves them inside local hard drive. When using PHP for copying file, it depends on OS to handle this job, its not native support (as I think) for file and folder operations. Do you have any idea? There are many recovery program that uses this technology for reading hard-drive indexes, however, for PHP: I cant find any source for this problem. Applications if I get correct answer: I can check if such file securely deleted from my hard-drive? I can create secure delete application using PHP, or clearing hard-drive indexes for a given file. Your help appreciated. share|improve this question I'm not sure if I understand what your goal is. Do you really want to use PHP for file recovery? Is there a specific reason for it? For file synchronization there are good command line tools like rsync on Linux and robocopy on Windows, you could use them from PHP via exec() if you must. –  fschmengler Jan 29 '13 at 12:07 @fab: I just want to be able to read real location of file and folder index table using PHP –  user1646111 Jan 29 '13 at 12:34 Just curios why you need the real index and why php as a choice for this task ? –  Baba Feb 2 '13 at 15:59 @Baba because its easy to implement it with current Security Application that I use it for auditing. –  user1646111 Feb 2 '13 at 16:15 3 Answers 3 Problems with the proposition The attributes of files, such as timestamps, permission flags etc, are stored in the file system (FAT, NTFS, Ext3 etc). As you say some of them can be read using PHPs different file and directory methods, but they all act through the OS file system abstraction and cant have access to block level information on the disk, such as what precise byte on disk stores the archive flag for file X. The whole point of the OS and FS is to abstract away this information from the user/client programs. As suggested there are external tools, written in c or similar, that does have this access and that you can call from inside PHP. If you want a 'native' PHP way of doing this you'll have to compile a c extension for PHP that exposes these low level functions to you. I'd say external tools is the way to go if you want to stick with PHP but for the task at hand, as far as we can see from your description, I'd go with another language that has more low level access. Like C or C++. PHP is a high level language for HTML pre processing and as such is a poor choice for low level system programming. Practical advice After looking through the PHP documentation and assorted third party libraries: An of the shelf solution for reading file system information on a file allocation table level doesn't exist for PHP. The lowest level you get is the fstat() function, and that is not very far for what you want. External tools No mater exactly what you want to do there is probably a small binary that does it. PHP can be integrated with these programs, as suggested elsewhere, via the exec() function. This is probably the easiest approach for you unless you have serious amounts of time and/or development resources to devote to this problem. Wrapping a library There are libraries that solves this problem for you, written in low level languages. An open source library can be wrapped with SWIG to expose it to PHP. This will give you access to the low level methods you need, but it's a non trivial task. These kind of libraries also often require sole access to the device while they work on it, something that is difficult to achieve in most normal operating environments. Note also that you will probably need a library per file system. Microsofts VFAT extension to FAT12/16/32 requiers a licens to use. So if you want to work with FAT and have files with long names (not 8.3 format) you'll have to fork up some dough to be legit. Low level implementation A last middle ground would be to write your own CLI tool that uses an external library to access the low level FS functions. You can then use exec() from inside PHP to interact with your own implementation. This might be a reasonable path if you cant find an existing tool that solves your problem and you are not willing to spend the time to wrap a library. In closing You give a very narrow problem description with little to go on as for what the application is about. A broader discussion (in another forum) might yield better results since the problem might be better solved in another way entirely. share|improve this answer Thanks, useful information –  user1646111 Jan 29 '13 at 12:35 Thanks again, you are best candidate for the bounty –  user1646111 Jan 29 '13 at 20:07 I gave the bounty but sorry I can't accept it as answer. Thanks –  user1646111 Feb 4 '13 at 12:39 I found something on PHP.net which appears to do what you want: Edit: I mis-understood the question. Attributes such as the last modified time, last accessed date and the like are stored in the file systems master file table. As far as I can tell, this isn't accessible with PHP, and if you were to write your own method to do this then you'd also have to account for different file systems as they all handle the storage of these attributes in their own unique way. It could be that to get all of the information you're looking for is not possible with PHP without writing some form of extension to PHP itself. Edit 2: Upon researching a little more... This function could be an interesting one to look at. share|improve this answer I mentioned in my question that I knew about these functions, my aim is to read hard drive index of which the file names and attributes were saved. –  user1646111 Jan 29 '13 at 12:06 My apologies, I misinterpreted the question, I've updated my answer with the extend of my knowledge on this subject. –  Seer Jan 29 '13 at 12:16 thanks any way... –  user1646111 Jan 29 '13 at 12:30 I've updated the answer again with a little bit more, what are all of the attributes that you want? –  Seer Jan 29 '13 at 12:43 The inode number is basically a logical block in ext and other unix filesystems. It's not available on NTFS or FAT/FAT32 nor does it give you any information on where that file is stored on the physical device, files keep their inode numbers when moved. –  d-Pixie Jan 29 '13 at 12:57 Well if I understand correctly you just want to securely delete a file. You can just call [shred][1] [1]: http://linux.die.net/man/1/shred via system or exec if you are on linux and you are good to go share|improve this answer Thanks, but not by this way, I need a real API that can be used with other programming language, as @d-Pixie explained that, this might be possible with low level access programming languages such as C. –  user1646111 Jan 31 '13 at 5:02 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/984
Take the 2-minute tour × I'm just trying to optimize some code (From a beginners stand point). I have options passed into a function and I want to determine whether a variable is defined in the options object and set it ... or set it to true by default. I could use jquery to $.extend a default options object but the options object is also used by something else in which I'm only sending certain object properties. How can this be optimized even shorter (barring white-space): var show = typeof options.show == 'boolean' ? options.show : true; This code is definitely quite short but I'm just looking for anything that may be even more compact. So, using something like: var show = options.show || true; doesn't give me proper values. // Pass in options like { show : false } var show = options.show || true; // show will be set to true because options.show === false // therefore evaluating to the other side of the "||" Using something like: var show = !!options.show; // show will be set to false if options.show is undefined but we want true instead Abstraction seems to be the only course of action here. share|improve this question migrated from programmers.stackexchange.com Mar 28 '14 at 2:11 @scriptocalypse This is one reason why I said "barring white-space". Meaning that it's code logic optimization and not code file size :) –  Vincent Wilkie Mar 27 '14 at 21:38 A minifier will solve your want for compactness much more efficiently. If you are aiming for runtime execution performance, i would suggest that this is probably the wrong place to look for those gains unless it's performed many times in a loop. –  scriptocalypse Mar 27 '14 at 22:06 2 Answers 2 up vote 1 down vote accepted A terse way would be var show = options.show != false Since undefined is not equal to false, this sets show to true unless it's set to false. My preferred way of handling this situation is actually to change the key from "show" to "hide". Then you can safely do var hide = options.hide since undefined will behave the same as false when used as a conditional. share|improve this answer You can still use $.extend but with a slight twist to it: var defaults = {show: true}; var optionsByUser = {}; var defaultsAndUsersOptionsCombined = $.extend({}, defaults, optionsByUser); As you can see I added {} as the first argument to $.extend. This will make sure that the data is copied to new object instead of modifying defaults or optionsByUser. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/985
Take the 2-minute tour × I'm trying to use elisp as a shell script language. I'm writing a script where I need access to a file encrypted with gpg. I'm not sure how to handle the password prompt. In the examples below, he program is called from the command line (bash). First try: #!/usr/bin/emacs --script (setq passwd-file "~/password.gpg") (let ((passwd-buffer (find-file passwd-file))) (switch-to-buffer passwd-buffer) (princ (buffer-substring 1 30)))) This lets me enter the password in the terminal, but the password is shown in plaintext. Second try #!/usr/bin/emacs --script (setq passwd-file "~/password.gpg") (setq pstring (shell-command-to-string (concat "gpg -d " passwd-file))) (princ pstring) This gives the error gpg: cannot open tty /dev/tty: No such device or address share|improve this question Do not use find-file for file IO. It may cause arbitrary side-effects, and could block Emacs in non-interactive sessions. –  lunaryorn Jun 22 '14 at 15:35 Would something like this help? (read-passwd "Password: ") Here is the printout of the available arguments for this function: (read-passwd PROMPT &optional CONFIRM DEFAULT) –  lawlist Jun 22 '14 at 15:36 lunaryorn: What should I use instead? I had a look in the elisp manual but didn't find anything explicitly for IO. –  snowape Jun 22 '14 at 15:49 lawlist: That function doesn't seem to work when called from the terminal. –  snowape Jun 22 '14 at 15:52 @snowape Reported at debbugs.gnu.org/cgi/bugreport.cgi?bug=17839. You may want to join the discussion to voice your support. –  lunaryorn Jun 23 '14 at 16:26 1 Answer 1 up vote 2 down vote accepted You are likely out of luck. You first example suggests that even read-passwd does not hide the password input in a non-interactive session, as insert-file calls out to EPA for encrypted files, which in turn uses read-passwd for GPG password input. Try to report this to the Emacs maintainers with M-x report-emacs-bug, asking them to suppress input echo in read-passwd in non-interactive sessions. That'd be the behaviour I'd expect. For now, you cannot work around this limitation, because Emacs does not expose the underlying TTY to Emacs Lisp code, so you have no chance to manually disable input echo on the underlying TTY device. From my experience in writing and contributing quite some non-interactive Emacs Lisp programs, I'd personally advise against using Emacs for non-interactive scripts. It's a poor platform for such programs. The API is limited, and there is a lot of implicit behaviour standing in the way of non-interactive programs, which you can't get rid of. For instance, you cannot safely pass command line arguments to Emacs, since Emacs will automatically visit any existing file in its command line arguments, triggering all sorts of side effects such as prompts for unsafe local variables, etc. share|improve this answer I agree that elisp isn't an optimal scripting language, but FWIW you need only pass the -- argument to prevent Emacs processing subsequent arguments. See stackoverflow.com/a/6807133/324105 (and for a robust standard approach, stackoverflow.com/a/6259330/324105 ). –  phils Jun 22 '14 at 21:58 @phils -- separates options from arguments, but does not actually stop Emacs from trying to visit all arguments as files. See gist.github.com/lunaryorn/66b2e9ad35ffb4bad8c2. –  lunaryorn Jun 23 '14 at 9:57 Apologies, you're absolutely right. I believe I'd never noticed that. Jurijs Oniscuks has the solution to that (in the same linked Q&A), which is to (setq argv nil) (or indeed command-line-args-left) before the script exits. –  phils Jun 23 '14 at 17:29 @phils Thank you, I didn't know that. It's a fancy trick, indeed, but imho shows all the more why you should not use Emacs Lisp for scripts. It's just too flaky, in very subtle ways. –  lunaryorn Jun 23 '14 at 17:42 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/986
Take the 2-minute tour × Michael Feathers, in Working Effectively With Legacy Code, on pages 13-14 mentions: A unit test that takes 1/10th of a second to run is a slow unit test... If [unit tests] don't run fast, they aren't unit tests. I can understand why 1/10th a second is too slow if one has 30,000 tests, as it would take close to an hour to run. However, does this mean 1/11th of a second is any better? No, not really (as it's only 5 minutes faster). So a hard fast rule probably isn't perfect. Thus when considering how slow is too slow for a unit tests, perhaps I should rephrase the question. How long is too long for a developer to wait for the unit test suite to complete? To give an example of test speeds. Take a look at several MSTest unit test duration timings: 0.2637638 seconds The average for all 21 of these unit tests comes to 0.019785 seconds. Note the slowest test is due to it using Microsoft Moles to mock/isolate the file system. So with this example, if my unit test suite grows to 10,000 tests, it could take over 3 minutes to run. share|improve this question I think your average is wrong. –  Will A Sep 29 '10 at 18:38 You're right. I've adjusted it. 0.019785 instead of 0.19785 –  Matt Sep 29 '10 at 18:41 6 Answers 6 up vote 13 down vote accepted I've looked at one such project where the number of unit tests made the system take too long to test everything. "Too long" meaning that you basically didn't do that as part of your normal development routine. However, what they had done was to categorize the unit tests into two parts. Critical tests, and "everything else". Critical tests took just a few seconds to run, and tested only the most critical parts of the system, where "critical" here meant "if something is wrong here, everything is going to be wrong". Tests that made the entire run take too long was relegated to the "everything else" section, and was only run on the build server. Whenever someone committed code to the source control repository, the critical tests would again run first, and then a "full run" was scheduled a few minutes into the future. If nobody checked in code during that interval, the full tests was run. Granted, they didn't take 30 minutes, more like 8-10. This was done using TeamCity, so even if one build agent was busy with the full unit test suit, the other build agents could still pick up normal commits and run the critical unit tests as often as needed. share|improve this answer +1 for how you defined "too long." "Too-long" is often defined for UI commands as about 3 seconds - the amount of time the user is willing to wait before they either give up or become severely annoyed. In this case we have to remember that we are still users, and your definition is just such a reminder. –  devgeezer Nov 11 '11 at 15:38 I like your idea of using critical as a dimension for deciding how to split the tests. However, critical is orthogonal to speed. In our case, we have tests that are both "if something is wrong here, everything is going to be wrong" and slow because they require an SQL database running. (Yes, we must have SQL execute to determine correctness. Mocking it would involve re-writing an RDBMS.) We use sqlite3, but need PostgreSQL and MySQL support too in our Python 3 project. Still figuring this out... –  Matthew Cornell Jun 6 '13 at 14:35 I've only ever worked on projects where the test suite took at least ten minutes to run. The bigger ones, it was more like hours. And we sucked it up and waited, because they were pretty much guaranteed to find at least one problem in anything you threw at them. The projects were that big and hairy. I wanna know what these projects are that can be tested comprehensively in seconds. (The secret to getting things done when your project's unit tests take hours is to have four or five things you're working on at the same time. You throw one set of patches at the test suite and you task-switch, and by the time you're done with the thing you switched to, maybe your results have come back.) share|improve this answer It sounds like you don't understand the difference between UNIT testing and INTEGRATION testing. By definition a unit test should test one unit (neat how the name indicates its purpose) of code. Using an MVC example, if you have a Controller test that instantiates an object (or more) in your business layer which in turns instantiates one or more objects in your repository layer, you don't have a UNIT test. You have an integration test. While instantiating a mock object is not "free", good mock frameworks are still way faster than hitting your repository. –  Andrew Steitz Nov 7 '12 at 15:07 If you have a test suite that truly consists of UNIT tests only and it still takes hours to run, then your enterprise architects have failed because they have allowed you to create a seriously monolithic system that should instead be broken down into parts which expose functionality as services. –  Andrew Steitz Nov 7 '12 at 15:10 I guess you've never worked on, for instance, a web browser. Validating the CSS parser in Firefox, all by itself -- no related functionality, just "parse this and check that the resultant data structure is what it should be" -- involves order of 100,000 tests which, in total, take about five minutes to run. That is how big and complicated the CSS grammar is. –  zwol Nov 7 '12 at 15:32 Yeah, you got me on that. Thing is, not many people out there have. Most work on LOB (line of business) apps and my comments are more than appropriate for that. –  Andrew Steitz Nov 7 '12 at 19:17 I guess there's a two-cultures thing here -- I've never worked (professionally) on anything that wasn't that complicated. –  zwol Nov 7 '12 at 20:42 I've got unit tests that takes a few seconds to execute. I've got a method which does very complicated computing and billions and billions of operations. There are a few know good values that we use as the basis for unit testing when we refactor this tricky and uber-fast method (which we must optimize the crap out of it because, as I said, it is performing billions and billions of computations). Rules don't adapt to every domain / problem space. We can't "divide" this method into smaller methods that we could unit test: it is a tiny but very complicated method (making use of insanely huge precomputed tables that can't be re-created fast enough on the fly etc.). We have unit tests for that method. They are unit tests. They takes seconds to execute. It is a Good Thing [TM]. Now of course I don't dispute that you use unit testing libraries like JUnit for things that aren't unit testing: for example we also use JUnit to test complex multi-threaded scenario. These ones aren't "unit test" but you bet that JUnit still rules the day :) share|improve this answer First, see my comment to Zack's answer regarding the difference between UNIT tests and INTEGRATION tests. Next, use a tool like Might-Moose (http://continuoustests.com/) that only runs the tests affected by your code change (instead of your entire test library) everytime you check-in a file. Before you start whining about "How long would that take", look at the videos on their site. Oh, by the way, it is free. share|improve this answer So what's your question? :-) I agree, the true metric here is how long developers have to wait for a complete run of the unit tests. Too long and they'll start cutting corners before committing code. I'd like to see a complete commit build take less than a minute or two, but that's not always possible. At my work, a commit build used to take 8 minutes and people just started only running small parts of it before committing - so we bought more powerful machines :-) share|improve this answer How long is too long for a developer to wait for the unit test suite to complete? It really depends how long the devs are happy to wait for feedback of their change. I'd say if you start talking minutes than it's too slow and you should probably break up the test suite into individual test projects and run them separately. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/987
Take the 2-minute tour × I need to open, read and insert items into an online SQLite database from an Android app. I know url, username and password. In JavaSE i would do the following: Connection dbConnection = DriverManager.getConnection(URL, USER, PASSWORD); I read that I can't do this in Android because there is not a JDBC Driver (there is a "SQLite.JDBCDriver" but it is not documented and not recommended). So which is the easiest way? I asked to Google but it looks like he either doesn't know. share|improve this question I suspect the "correct" way would be to create a RESTful webservice as an interface to your db. –  Benny Jobigan Dec 30 '10 at 13:09 2 Answers 2 up vote 2 down vote accepted You should expose your datasource like this via an intermediary such as a Web Service for at least the following reasons: • someone has direct access to your datasource and can read, manipulate or destroy the data • abstraction; you can control the way in which the data is sent and how it's represented. Should the database tables/objects change, you'd only have to change the web service instead of force an update (in some cases) • JSON interaction is very well supported on Android out of the box, whereas JDBC isn't (for previously documented reasons) I'm sure there are plenty of more reasons, but the above are the most prevalent in my mind. share|improve this answer There is no official support for JDBC on Android. There is a private SqlLite driver, but it's not recommended as it is unsupported and might go away in the future. Read these: does android support JDBC So the recommended way is to not use internal (private) SQlite driver and instead create a REST layer on server through which you access data. This is a recommended way as it minimizes load on device side and also gives you opportunity to create authentication on the server side - having publicly accessible JDBC connection is a big no-no. share|improve this answer I already read these three pages but they don't help me in the practice way :) Which classes should i use? Using this sqldroid driver is a good idea? –  Oneiros Dec 30 '10 at 13:17 Don't use JDBC. Create a REST layer on server. I updated the answer. –  Peter Knego Dec 30 '10 at 13:18 Use Jersey to simply build a REST layer: wikis.sun.com/display/Jersey/Main –  Peter Knego Dec 30 '10 at 13:21 ehm... it looks quite advanced for my knoledges :) –  Oneiros Dec 30 '10 at 13:27 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/988
Take the 2-minute tour × trying to evaluate the XPath expression /xs:schema/xs:element[@name='StrikeOptionReservationSummaryData']/xs:complexType with the following document produces an XPathExpressionException <xs:element name="StrikeOptionReservationSummaryData"> The error from from xjc is [ERROR] XPath error: null What is wrong with this? share|improve this question The XPath expression is fine, syntactically. Please provide more info on the error itself. –  Tomalak Jan 10 '11 at 20:13 Eh... xs:complexElement != xs:complexType ? –  Bittrance Jan 10 '11 at 20:26 Without the evaluation context, we can only guess. So, this is not a complete question. The easy guess is that it's missed/wrong the namespace URI binding. But there is already too much of this kind of questions here. So, this would be a duplicate. –  user357812 Jan 11 '11 at 18:46 1 Answer 1 up vote 10 down vote accepted It's a lousy diagnostic, but perhaps you didn't give the XPath processor a binding for the namespace prefix "xs"? share|improve this answer making sure the xs prefix was mapped into the external .xjb customization file seems to eliminate the error... now I just have way more jaxb problems to solve. –  Andrew Jan 11 '11 at 0:06 how can I process "xs" profix? –  kodmanyagha Sep 26 '13 at 12:15 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/989
Take the 2-minute tour × I try to execute this request window.requete ="INSERT INTO logfile VALUES(" + omsg.get_Creator() +","+ omsg.get_CreatorParent() +","+ omsg.get_SequenceNumber()+ ","+omsg.get_CreatorCost()+ ","+omsg.get_CreatorEnergy()+","+interval+","+lplinterval+ ","+omsg.get_Data()+"," + tmp2+")"; try { Statement stmt = window.connexion.createStatement(); int resultat = stmt.executeUpdate(requete); } catch (SQLException e1) { window.error("pb insert"); I get an exception while inserting. Is there something wrong in my syntax? My table contains: | Creator(INT) | CreatorParent(INT) | SequenceNumber(INT) | CreatorCost(INT) | CreatorEnergy | | Data(INT) | SampInterval(INT) | LplInterval(INT) | SampTime (DATETIME)| share|improve this question Always: What is the errormessage? But it seems the last tmp2-thing you insert is not in the table. –  Erik May 19 '11 at 15:07 And the usual comment: don't EVER insert values in a SQL-statement by string-concatenation. ALWAYS use prepared statements. –  Erik May 19 '11 at 15:09 2 Answers 2 Stringbased values needs to be quoted in SQL string. But, better is to use PreparedStatement. Then you don't worry about quoting the values nor about escaping from SQL injection attacks. String sql = "INSERT INTO logfile VALUES(?, ?, ?, ?, ?, ?, ?, ?, ?)"; preparedStatement = connection.prepareStatement(sql); preparedStatement.setInt(1, logMessage.getCreator()); preparedStatement.setInt(2, logMessage.getCreatorParent()); preparedStatement.setInt(3, logMessage.getSequenceNumber()); preparedStatement.setInt(4, logMessage.getCreatorCost()); preparedStatement.setInt(5, logMessage.getCreatorEnergy()); preparedStatement.setInt(6, interval); preparedStatement.setInt(7, lplinterval); preparedStatement.setInt(8, logMessage.getData()); preparedStatement.setTimestamp(9, new Timestamp(tmp2.getTime())); // Assuming tmp2 is java.util.Date. (and work on your coding conventions, yours is pretty terrible, also don't forget to properly close JDBC resources, you don't seem to take this into account as well) Update: as per the comments, tmp2 is a String. Here's how you could convert it to Date so that you can use it in setTimestamp() so that the value will be properly saved in a DATETIME column type. Since you didn't mention what date format the tmp2 is in, I'll just take "yyyy-MM-dd HH:mm:ss" as an example: String datestring = "2011-05-19 12:34:56"; // Just an example. Date date = new SimpleDateFormat("yyyy-MM-dd HH:mm:ss").parse(datestring); Timestamp timestamp = new Timestamp(date.getTime()); // Store in SQL string by PreparedStatement#setTimestamp(). share|improve this answer Hi, THX, mp2 is a string and the comumn 9 is DateTime and not timestamp. why do u add new timestamp? –  user405684 May 19 '11 at 16:19 JDBC Timestamp is the right type for MySQL DATETIME type. See also download.oracle.com/javase/1.3/docs/guide/jdbc/getstart/…. You just need to convert String to Date by SimpleDateFormat and then wrap it in new Timestamp(). –  BalusC May 19 '11 at 16:21 i'v always the pb !! the conversion work well but the query throw exception !_! –  user405684 May 19 '11 at 17:28 Well, just read the exception message and stacktrace and fix the code accordingly. More can't I be of help to you since you didn't share the exception details. Exceptions contain very important information about the cause of the problem. By doing as if they are for decoration and thus ignoring them you don't help yourself much in fixing the problem ;) –  BalusC May 19 '11 at 17:29 may be it because i'v some fiels smallint(4) ? whad do u think? –  user405684 May 19 '11 at 17:33 Looks like you need quotes around your datetime field. ,'" + tmp2+"')" Do you get a specific error message? share|improve this answer com.mysql.jdbc.exceptions.jdbc4.MySQLSyntaxErrorException: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?, ?, ?, ?, ?, ?, ?, ?, ?)' at line 1 at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method) –  user405684 May 19 '11 at 20:44 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/990
Take the 2-minute tour × today, I encountered a problem with NSURLConnection. I want to download the contents of the URL http://api.wunderground.com/api/fs3a45dsa345/geolookup/q/34.532900,-122.345.json. If I simply paste the URL into Safari, I get the correct response. However, if I do the same thing with NSURLConnection, I get a "not found" response. Here's the code I'm using: NSURL *requestURL = [[NSURL alloc] initWithString:@"same url as above"]; NSURLRequest *urlRequest = [[NSURLRequest alloc] initWithURL:requestURL]; NSURLConnection *urlConnection = [[NSURLConnection alloc] initWithRequest:urlRequest What's the problem here? share|improve this question 2 Answers 2 up vote 2 down vote accepted Make sure you're escaping any special characters in the URL string by sending it a stringByAddingPercentEscapesUsingEncoding: message, for example: NSString *s = [@"some url string" stringByAddingPercentEscapesUsingEncoding:NSUTFStringEncoding]; NSURL *requestURL = [NSURL URLWithString:s]; It turns out the web service request is failing because the User-Agent header doesn't get set by default. To set it, use an instance of NSMutableURLRequest rather than NSURLRequest to create the request, as shown below: NSMutableURLRequest *myRequest = [NSMutableURLRequest requestWithURL:myURL]; [myRequest setValue:@"My App" forHTTPHeaderField:@"User-Agent"]; share|improve this answer Doesn't work either (the method doesn't alter the string). I used other url encoding techniques, too, but none of them worked. –  ryyst Sep 28 '11 at 13:10 Thanks for the edit, it now works! May I ask how you found this out? –  ryyst Sep 28 '11 at 19:41 Where is the delegate code? For async NSURLConnection there needs to be a delegate method to receive the returned data. Other options include sendSynchronousRequest: or if it must be async wrapping sendSynchronousRequest in a GCD block. share|improve this answer It's implemented, but I left it out because it is working correctly (the website returns an HTML page that says "not found"). –  ryyst Sep 28 '11 at 12:58 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/991
Take the 2-minute tour × I am testing Java app with JUnit. The following is the source code of a specific method: public class Surgery { Vector<Patient> patients; String name; public Surgery(String name){ patients = new Vector<Patient>(); this.name = name; public Patient findPatient(String name){ Iterator<Patient> patientIt = patients.iterator(); Patient next = patientIt.next(); return next; return null; This is JUnit test method: public class SurgeryTest { private Vector<Patient> vector; Surgery surgery_N =new Surgery("Teddy"); ByteArrayOutputStream ans = new ByteArrayOutputStream(); final String separator = System.getProperty("line.separator"); public void testFindPatient() { I need to test each statement in the source code method. I stuck, don't know what else to do. Any solution? share|improve this question this looks like a class assignment. if so please tag this post as homework –  Dmitry Beransky Nov 18 '11 at 0:47 3 Answers 3 up vote 1 down vote accepted Your Surgery class contains no way to add patients to it from the code sample you have given us, so your unit test should be finding nothing. To test each statement in the source code method you should create multiple tests that cover each one of the possible paths in your code. That means, in your tests you will want to test for the scenario where you return a patient name if it exists, and one for where the patient doesn't exist (returning null). Here's some example methods for you to work from: public void testFindPatientWherePatientExists() { Patient thePatient = surgery.findPatient("Teddy"); assertEquals("Teddy", thePatient.getName()); public void testFindPatientWherePatientDoesntExist() { assertNull(surgery.findPatient("I dont exist")); share|improve this answer What is the expected result when you call findPatient(...)? You can compare the expected result with the actual result using assertEqual(...) public class SurgeryTest { Surgery surgery; public void setUp() { surgery = new Surgery("Teddy"); public void testFindPatient() { Patient p = ...; // expected result assertEquals(p, surgery.findPatient("Teddy")); The method with @Before annotation will be called before each method with @Test annotation. Therefore, the new surgery object is tested every time. share|improve this answer First, note that the name you pass to the Surgery constructor does NOT get placed into the patients Vector. It is a field of Surgery. Suggest you rename the arg to "surgeryName" and then you'll need a new method, addPatient(String patientName);, and call addPatient("Teddy"). That said, in general, you should test for both the name present and name absent case. e.g. (exact name of the assert methods might vary) assertNull(surgery.findPatient("A Name I did not add")); (first line would be more precise if it were assertEquals() like wannik suggested. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/992
Take the 2-minute tour × I have a 3 column data frame which looks a little like this: id name links 1 134235 dave "34657","34563","23459" 2 23459 mary "134235","45868","45677" 3 165432 jane "134235","23459","44657" where id and name values are unique, and links is a string of ids which indicate an association with some of the names in each row. So for example dave includes the links id 23459 which is mary so dave is connected to mary. What I need to produce is a pair list of all the connections in the data so with the example data I would output something like: Very new to R and seen amazing things done with methods like apply and before going off and trying to replicate a solution which would look more like a javascript routine and be very inefficient I wondered if anyone could help. share|improve this question 3 Answers 3 up vote 1 down vote accepted One solution, using Matt's dput(): tab <- structure(list( id = c("134235", "23459", "165432"), name = c("dave", "mary", "jane"), links = c("'34657', '34563', '23459'", "'134235', '45868', '45677'", "'134235', '23459', '44657'")), .Names = c("id", "name", "links"), row.names = c(NA, -3L), class = "data.frame") conns <- function(name, links) { paste(name, tab$name[tab$id %in% as.numeric(unlist(strsplit(gsub('\'|\"', '', links), ',')))], sep=',') connections <- unname(unlist(mapply(conns, tab$name, tab$links, share|improve this answer <stunned silence ... then/> this is awesome! I knew R was powerful, but this puts it in another league. So I can learn from this mapply is going to run the function conns on each row of tab doing something with name and links (what is returned from this is unlisted and unnamed). Within conns for each 'links' you split and see if each id is in it. If it is this match is used to return the name. –  mhawksey Feb 2 '12 at 8:58 mhawksey, impressive use of all the two letter words beginning with 'i' in a single clause (ok, you're using the variable 'id', but it's one of the closest examples I've found using a google search). –  Kylos Jan 9 '14 at 19:42 The first step should be to normalize the data, in particular, parse the strings. You can use ddply: it applies a function that takes a chunk of a data.frame (a row, in our case) and transforms it in some way. You just have to write a function that works on one row, i.e., on one string. # Sample data n <- 10 k <- 3 ids <- as.character(unique(round(1e5*runif(n)))) n <- length(ids) names <- LETTERS[1:n] links <- lapply( ids, function(u) sample(setdiff(ids,u),k,replace=FALSE) ) links <- sapply( links, function(u) paste( '"', paste(u,collapse='","'), '"', sep="" ) ) d <- data.frame( dd <- ddply( c("id", "name"), function(u) data.frame( link=unlist(str_split( str_replace_all( u$links, '"', '' ), "," )) You can then join the data, either with merge or sqldf. SELECT A.name, B.name FROM dd AS A, d AS B WHERE A.link = B.id share|improve this answer dat<- structure(list( # It can all be done in base, of course... # This would be easy to do if links weren't in that format - # one record per id-link pair would be preferable. # Split dat$links and remove any quotes dat.wider <- data.frame( dat[ , c("id", "name")], str_split_fixed(string = gsub(dat$links, pattern = "['|\"]", replace = ""), pattern = ", ", n = 3) # Reshape dat.long <- melt(dat.wider, id.var = c("id", "name")) # Self-join - this is not quite the right method, but I'm just not # thinking straight right now dat.joined <- unique(merge(x = dat.long[ , c("name", "value")], y = dat.long[ , c("id", "name")], by.x = "value", by.y = "id" # And, finally, if you wanted vector output... res <- with(dat.joined, paste(name.x, name.y, sep = ", ")) share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/993
Take the 2-minute tour × I'm having serious issues concerning Facebook Connect plugin. I'm trying to use this feature in order to let my users login on a website. So I used basicaly the example given with php SDK mixing JS SDK. I successfully managed to allow my users to login, but I can't make them logout. I'm becoming mad, I don't understand... It just doesn't work... Later on I'll use the facebook session in a session php variable so I need to logout destroying both session and cookie. Could you just help me Here is my code : //uses the PHP SDK. Download from https://github.com/facebook/php-sdk require 'src/facebook.php'; $facebook = new Facebook(array( 'appId' => 'ddddd', 'secret' => 'ddddddddddddddd', $userId = $facebook->getUser(); <?php if ($userId) { $params = array('next' => 'http://www.nofrenchtouch.com/include/logout.php'); $logout = $facebook->getlogoutURL($params);?> <span class="facebook-in">Bienvenue <?= $userInfo['name']?> - <a href="#" onClick="logoutUser(); return false;" class="facebook-bt"> Se déconnecter</a> <?php } else { ?> <a href="#" class="facebook-bt" onClick="loginUser(); return false;">Se connecter avec Facebook</a> <?php } ?> window.fbAsyncInit = function() { cookie: true, xfbml: true, oauth: true FB.Event.subscribe('auth.login', function(response) { FB.Event.subscribe('auth.logout', function(response) { js.src = "//connect.facebook.net/fr_FR/all.js"; function loginUser() { function(response) { getStatus(); //This is a call to a different function... {scope:'email,publish_stream, user_birthday, friends_birthday'} function logoutUser() { function(response) { Thanks a lot for reading. share|improve this question Where are you destroying the php session at? –  DMCS Feb 14 '12 at 21:13 2 Answers 2 When you are logging out of facebook remove your session and cookies of user. function logoutUser() { function(response) { //Pass control to function in php where you can destroy your session and cookies. // windows.location=PHP function share|improve this answer FB.logout(); will log the user out of Facebook. Logging out of Facebook does, essentially, end the session with your server, but I think that that is not what you are trying to achieve. Nonetheless, I have found that the following code works for logging out of Facebook: <a href="javascript:FB.logout();void(0)">Log Out</a> When a user grants your application privileges to his or her account, the JS SDK will automatically pass session information about the user to the server every time that a page is loaded. In order to let your user log out, you have to create your own authentication system that can be logged in and out of at will. It will use its own session hashes and whatnot that are separate from the ones that the JS SDK creates. Only use the Facebook PHP SDK to get information about your user and store it in your database. This will allow the user to log out of your website (even though the Facebook JS SDK actually still is connected). I can provide more information on user account systems if you need. share|improve this answer Thanks a lot for your help. :-) –  Hugo Trial Mar 17 '12 at 11:06 You're welcome. –  wecsam Mar 17 '12 at 19:02 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/994
Take the 2-minute tour × I am trying to implement OpenGraph actions and object. It works fine, I am able to create objects and actions in the ticker/Timelime. My only concern is when you display the object, its title is a link. But it links to the page I use to generate the object, so there is nothing to display : <head prefix="og: http://ogp.me/ns# fb: http://ogp.me/ns/fb# name_space: http://ogp.me/ns/fb/name_space#"> <meta property="og:type" content="name_space:object" /> <meta property="og:url" content="PATH_TO_METHOD_TO_CREATE_OBJECT?img_link=<%= CGI.escape(@img_link)%>&points=<%=@points%>&description=<%= @description%>" /> <meta property="og:title" content="<%= params[:units_offered] %> Points" /> <meta property="og:description" content="<%= params[:description] %>" /> <meta property="og:image" content="<%= params[:img_link] %>"> if I change the og:url meta tag to the url of my FB page then the object picks my FB page value.. in a perfect I wanted to link to nothing or my FB page. Any clue ? share|improve this question 2 Answers 2 up vote 7 down vote accepted Since the linter doesn't run javascript, you can do a javascript redirection for the user to go to the place you want. <script> location.href = 'http://example.com/the_real_page.php'; </script> This way the linter can still see the correct og meta tags, and the user who clicks the link gets redirected to the correct location. share|improve this answer are you making this dynamic also? constructing the url from the passed in parameters? –  Zsolt May 21 '12 at 15:01 Add this to the head: <script type="text/javascript"> location = 'YOUR_HOME_PAGE'; share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/1010
Lt. Commander Join Date: Dec 2007 Posts: 120 i know you trying to fix the last episode mission of searies 2 but what about the crystal entity and fluid space fleet action? they both are next to impossible to do. noone goes there anymore. i didnt see anything mentioned about them in dstauls report or any interviews. Thread Tools Display Modes Posting Rules You may not post new threads You may not post replies You may not post attachments You may not edit your posts BB code is On Smilies are On [IMG] code is Off HTML code is Off
global_05_local_5_shard_00000035_processed.jsonl/1024
Take the 2-minute tour × I am compiling some documents on a proof of concept. I want to find an authority that could store a document and certify in the future that: • I am the author of said document. • The date at which the document was uploaded has not been tampered with. • The document remained unchanged since. Is there a website that can act as such an authority? share|improve this question 1 Answer 1 up vote 3 down vote accepted Try some timestamping services online. They'll digitally sign a timestamp. You get both free and paid for services. To get you started, have a look at these: For more info, read the wikipedia article on the subject. You'll have to choose a service that answers to your needs. (that will depend on a lot of factors that only you will know) share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/1025
Take the 2-minute tour × or does depend on the model? share|improve this question migrated from stackoverflow.com May 18 '10 at 20:00 This question came from our site for professional and enthusiast programmers. The number of ALU's on a chip doesn't directly correlate with performance because of factors such as architecture design, instruction set, and pipelining. –  wag2639 May 18 '10 at 20:50 1 Answer 1 Each CPU is different. I don't think they normally review this information but you can check with either AMD or Intel's documentation. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/1026
Take the 2-minute tour × Resuming from Hibernate on my Windows 7 desktop takes an awefully long time, I'd guess 5 minutes. It is an Intel DP35DP with 64 bit Intel Core2 Duo E6750, 2GB and 2x320GB RAID0. Sony Lin's blog post Fixing Windows 7 can't return from stand by (sleep) or hibernate when Readyboost is used points to the problem. It would seem that Windows 7 has to recreate the ReadyBoost cache, possibly at low speed, before it is able to come back up. Removing my ReadyBoost setup (Lexar Jump Drive Lightning II 120x 18MB/s 2GB USB key) eliminates the long resume issue. Challenge is that I'd like to use ReadyBoost, without having to wait for my system when it resumes? Anyone able to help? share|improve this question 3 Answers 3 The problem may also be that your hard disk and the ReadyBoost is has different formats (e.g. HD is NTFS and the USB/Flash Fat32). Reformat (the latter). See: Microsoft Answers A rather late answer ,-) but other may pop in via Google and find it useful. share|improve this answer Amazing that this isn't prominent in the help or suggested via the Action Center. Thank you! –  andybjackson Nov 15 '11 at 18:41 Afraid this seems to have lessened the occurence, but hasn't resolved ,the problem. Purposefully putting the PC into sleep mode and then resuming is quick, but if the machine hibernates on its own, then the lengthy resume reoccurs. Still a useful tip that I hadn't seen anywhere else. I've now given up on Readyboost for good. –  andybjackson Nov 23 '11 at 16:42 Okay this answer is a work in progress, but my solution would be to disable readyboost just before hibernate and re-enable just after hibernate resume. So we use task scheduler with triggers to launch the script like so: 1. Open Task Scheduler [Start> Control Panel> System and Maintenance> Administrative Tools> Task Scheduler (or just type "task Scheduler" into the Start Search box)]. You will need an Administrator's Account/Password to access this. 2. Select "Create a Task" to create a new task. 3. A panel with several tabs will open. 4. Fill the "General" tab to suit your needs. 5. Switch to the "Triggers" tab and choose "new". Another Panel will open. At the top of this Panel, you will see a drop-down menu (see below). Open it and choose "At Workstation Unlock". Then choose whether you would like this task to run just for your profile or for everyone's. Click "ok". (You may find it useful to use the "Delay task for" option to delay the task for 15/30 seconds to give your desktop a chance to load before the program runs.) Switch to the Actions tab, select "new", choose "Run a Program", and browse to the program you wish to run. 1. Switch to the "Conditions" & "Settings" tabs, respectively, and change the various settings to suit your needs. (Make sure that the "Run on AC Only" option is unchecked if you are using a laptop and want the task to run when it is unplugged.) 2. Click ok to save your new task. from here: http://social.answers.microsoft.com/Forums/en-US/vistaappearance/thread/72150ea7-22f2-4043-93b0-aad517c28fc0 on lock and on unlock are probably the trigger events you need To start a service: Net start name_of_service To stop a service: Net stop name_of_service Service Name (registry): EMDMgmt haven't tested it, but it should make resume faster, going to hibernate might still be slow share|improve this answer Great answer, thank you. Is a little more complicated than I was anticipating. Are "On lock" and "On unlock" the right triggers (I allow the system to determine standby, sleep & hibernate after periods of inactivity)? –  andybjackson Dec 11 '10 at 13:22 lock and unlock should happen for all three –  hbdgaf Dec 11 '10 at 13:35 Formatting the USB as exFAT could solve the problem. share|improve this answer How does it solve the problem? –  Simon Sheehan Dec 1 '11 at 21:17 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/1027
Take the 2-minute tour × On windows 7 there's 'pause' and there's 'indexing speed is reduced due to user activity' but what if one wants full speed during desktop activity? share|improve this question In XP, I believe you could do this by accessing the indexing service utility. From MS documentation: 1.Open Computer Management (Local) 2.In the console tree, double-click Services and Applications. 3.Double-click Indexing Service. To open Computer Management, click Start, and then click Control Panel. Click Performance and Maintenance, click Administrative Tools, and then double-click Computer Management. –  Harv Jan 17 '11 at 18:28 And then what? You only click there. –  leladax Jan 19 '11 at 19:59 What is the indexing process' execution priority set to? –  cp2141 Jun 30 '11 at 13:48 By the way, for what is worth I noticed that it doesn't take more than 2 to 5 minutes for it to go to full speed so it's not a critical functionality to have in the first place. At least in Windows 8. –  leladax Mar 11 '13 at 18:00 5 Answers 5 up vote 12 down vote accepted Summary from this page • limit what folders are indexed • update your Windows Search to version 4.0 (But only if Windows Updater hasn't already done) • HKLM\Software\Policies\Microsoft\Windows\Windows Search\DisableBackoff set the value to 1 if you are on a non-domain joined computer • on domain joined computer, edit your group policy and set Disable indexer backoff to enabled Computer Configuration\Windows Settings\Administrative Templates\Windows Components\Search DisableBackoff=1 in other words: Don't worry about system activity - just index and get it over with already! share|improve this answer the first link you gave doesn't contain anything but ads –  glance Jan 8 at 16:47 There is a setting in the group policy for the computer, so you don't have to manually edit the registry. • Open run dialog: Win+R • Type gpedit.msc and hit OK • Browse to Administrative Templates\Windows Components\Search • Select disable backoff, and set it to Enabled. enter image description here share|improve this answer This is really a better method than editing the registry. –  alx9r Aug 31 '13 at 17:45 If the index service is running at the moment: services.msc -> Windows Search -> stop -> wait a sec... -> start again. Or restart your PC. –  mgutt Feb 18 at 14:57 Above registry "hack" in the first top rated answer only seems to apply to Windows search 4 in XP, not 7. The correct path to the registry key is: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Search\Gathering Manager Furthermore, you have to change the permissions to allow the change, then restart the search service. These are the instructions I found which worked: 1. Start up the registry editor. Press Windows Logo Key+R, type in regedit, and press enter. Alternatively, if you don’t have a Windows Logo Key on your keyboard, click the start menu button, type in run, press enter, then type in regedit, and press enter once more. 2. Find the key to change. In the folder view tree to the left, browse your way through to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Search\Gathering Manager. Once you’re there (the Gathering Manager folder is selected in the tree), a whole bunch of keys will appear in the right-hand window. Find the one that’s called DisableBackOffOnUser. • This key is what it’s all about. It basically determines whether or not the indexing process should stop when the user’s doing something. There are other similar keys that you could edit to force the indexer to keep indexing even if you were playing Bioshock while ripping a DVD and little flames were coming from your processor, but that’s not really necessary, so we’ll just focus on this one key. Unfortunately, Vista won’t let you change the key’s value (if you try, it’ll let you down with: Error writing the value’s new contents.), even though we've been elevated to have administrator privileges. So, to get permission to change the key's value, you need to do the following. 3. Click on the key, so that it’s selected. Go to the Edit menu and select Permissions. In the pop-up window, click the Advanced button. In the new pop-up window, select the Owner tab, then in the list below Change owner to:, select Administrators, then click the OK button on both pop-up windows to return to the registry editor. 4. Now, we can double-click the key and change its value to 1 (one). Click OK and close the registry editor. 5. Restart your computer (or just restart the Windows Search service if you know how), and the indexer will start indexing your stuff even while you’re working. In the about twenty minutes it took me to write this, Vista has indexed 46,000 files on my computer. share|improve this answer Go in the registry to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Search\Gathering Manager\ and set the value of "DisableBackoff" to 1 Other interesting registry keys: • DisableBackOffNotificationOverride • DisableBackOffOnCPU • DisableBackOffOnIO • DisableBackOffOnNotifications • DisableBackOffOnUser share|improve this answer "Searchindexer.exe" in task manager (you may have to show processes from all users), you can set the priority for that program in there. Right click on Searchindexer.exe, select Priority> Above Normal or High (never select "real time") The down side: It could slow desktop performance or lock up the system if set to high of a priority, A restart of the system or kill the process will clear this setting. You have to set this every time SearchIndexer loads. Here is some software that can change the priority on a permanent basis, I wold not make a permanent change utill you have experimented with settings first, it could cause problems when booting if you choose a too high priority and set it permanently. share|improve this answer I'm not sure the indexing service does its thing by changing its own process priority.. –  Harv Jan 17 '11 at 18:25 Not sure what the OP means by "Full Speed" either, just posted the only thing that could apply to the question, at least to me anyway. –  Moab Jan 17 '11 at 20:49 The question is clear, it does not mean priority. It means the opposite of 'it's reduced due to user activity' which is mentioned in the question. So stop blaming me. –  leladax Jan 19 '11 at 19:56 It is not to me, link to where I blamed you for anything. –  Moab Jan 19 '11 at 22:14 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/1028
Take the 2-minute tour × Is it possible to specify VNC port number in built-in VNC client of Mac OS X? I'm trying to connect to Xen VPS machine with Finder's built-in VNC client. I used address like this. But it fails because it uses another port, and Finder's built-in VNC cannot handle port number. As I know it handles the number after colon as display-number, not a port number. Is there a way to specify port number on the VNC client? Or any workaround for this? (port forwarding??? I have no idea about it...) share|improve this question 4 Answers 4 Open a terminal window and type in: open vnc://server:5900 Or try 5901 if it is on that port number. share|improve this answer A VNC display number is just another way of specifying a port. Display 0 is, by convention, port 5900; display 1 port 5901 and so on, so if the port your server is using is close to 5900, you can simply subtract 5900 and use that as the display number. Contrary to what you say, Mac OS X's screen sharing client does accept port numbers with a vnc://server:port url. Either use open from the terminal as Michael Dillon suggests, or select "Connect to Server..." from the Finder's "Go" menu, and type the address in. Finally if that won't work, it may be that your VNC client and server are incompatible - the Mac OS X VNC server is certainly a bit idiosyncratic. Try downloading a different VNC client such as Chicken of the VNC. If that doesn't work, you'll know that it's not client issues and could be something like a firewall getting in your way. share|improve this answer I cant find Chicken of the VNC but found Vine VNC server for OSX and that solved my problems with the built in OS X VNC server. share|improve this answer Whether or not you are able to connect to the port you wish may depend on your router configuration. You may need to configure some port forwarding from the NAT settings of your router. E.g. if your router has a public IP address, say, but your computer has a local IP address only (e.g. 192.168.x.x or similar, depending on your ISP) you need to forward port 5900 of your router to port 5900 of your computer so that any incoming request on port 5900 of your router is forwarded onto port 5900 of your computer. How to do this depends on your router and internet configuration, but look for some advanced setting under the NAT configuration. I just did it for me, successfully. Both using open vnc://server:port from terminal or Finder > Connect to server > vnc://server:port work fine. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/1029
Take the 2-minute tour × I have ghost backup of my desktop. Now i want to use that Backup and create a VM for my personal Laptop. How can i convert a Ghost Backup to a VM. Can anybody done it already? Please, Can anybody help me out to do it. share|improve this question migrated from stackoverflow.com Jul 24 '11 at 10:26 This question came from our site for professional and enthusiast programmers. 2 Answers 2 I've done that in the past: 1. Set up a new virtual machine with a virtual disk large enough to comfortably fit the image (no need to install the OS) and set up booting priority in the virtual machine settings (enter BIOS setup by pressing Esc or F2)to boot the VM session from Ghost DVD or with a bootable media (USB for example) with Ghost executable files on it. 2. Connect an external USB HDD with the Ghost image on it to host computer (or use a DVD but then you have to boot from a USB unless your bootable CD with Ghost executables is an ISO image mounted in VMware settings as the first CD/DVD), then make sure the guest VM will see it (VM settings - devices) and boot the VM, start Ghost software and restore the image to the virtual disk. After the cloned file system boots in the virtual environment, its OS will detect the new virtual hardware and install the necessary drivers. share|improve this answer up vote 0 down vote accepted I have used VMWare Converter to convert my Desktop into a VM directly. Now my Desktop is on VM. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/1030
Take the 2-minute tour × Where can I see the most recent updated time and the other things list in windows 7 and is there any way to reverse it back once after updating the OS? share|improve this question 1 Answer 1 Open Control Panel, then Programs and Features, then choose View Installed Updates. From there, you can request to have a selected update uninstalled. You can also do all this from the Windows Update utility. Microsoft's help page is here: http://windows.microsoft.com/en-US/windows-vista/Remove-an-update. share|improve this answer In the case of updating an OS, note that some updates cannot be uninstalled. You should think about making a backup for those updates. –  surfasb Dec 28 '11 at 6:53 @raj also . . in the "event viewer" Windows Logs, Setup, you can see the actual package number that was installed, and time that it was installed. using the number, back on the MStech site , you can often get more information about what exactally was changed. Lately more of the updates are more uninstallable than before , due to the complex system of isolation, and nothing ever leaving anymore :-) –  Psycogeek Dec 28 '11 at 11:07 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/1031
Take the 2-minute tour × I have a Samsung SyncMaster T190 LCD monitor which I've had for about 5 years. It hissed slightly then went dim (readable but the top half of the screen is less bright). I'm pretty sure that after 5 years of service it's just got to the point where something's burned out, so my question is can I repair this myself, or should I just get a new monitor. I'm currently a student so self repair would be a better option if cost effective. share|improve this question 1 Answer 1 up vote 2 down vote accepted Unless you're a skilled electrician, this probably isn't worth your time. There are two possibilities here - either a failing backlight assembly, which might be an easily replaceable module if you can actually find one (I'm not familiar enough with this model to say but I'd doubt it) or more likely capacitor failure, which would require locating the failed capacitor(s) and soldering in replacements. If that's meaningless to you, then it's not something you should be trying on your own. share|improve this answer I thought this might be a bit too far - I'll look into finding a replacement instead - thanks. –  Ross Apr 20 '12 at 16:41 19" TFT panels are very cheap now - I think paying somebody to fix it would certainly cost more than just replacing it, so yeah...if you don't know what you're doing, don't sweat it. These Samsungs are known for lousy capacitors, anyway. –  Shinrai Apr 20 '12 at 16:42 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/1032
Take the 2-minute tour × It seems to be a common thing that a Windows Update creates a Windows.old folder under C:\Windows.old My question is now, can it be deleted with Windows 8 and how can I do that? If I try to manually delete it in Windows Explorer it does not let me, a permissions issue. enter image description here share|improve this question No @Moab, you can't simply use Explorer's Delete command to delete the directory because the ownership and file security rights block deletion without taking ownership and changing permissions on all the files. It is doable, but not intuitive for the average Windows user. –  Mufasa Oct 29 '12 at 17:07 @Mufasa Thanks, forgot, been too long since I did that. –  Moab Oct 29 '12 at 17:12 1 Answer 1 up vote 17 down vote accepted The Windows.old folder is a backup of the previous installed windows. It can be removed after some weeks when you think that all configurations are migrated correctly to Windows 8. See Microsoft statement The folder can be removed with the Disk Cleanup (cleanmgr.exe) program, that can be found by typing "Disk Cleanup" in the Modern UI. enter image description here Choose Clean up System Files. Then check the Previous Windows installation(s), click OK and confirm with "Delete Files". Then the folder should be removed. enter image description here share|improve this answer actually does that file has any uses? I mean how do I, for example, restore to the old file? –  Jim Thio Dec 8 '12 at 15:56 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/1033
Take the 2-minute tour × I'm trying to use Autohotkey to map ´+a to something different than the á that is expected in my Spanish keyboard. This thread gives me the impression that it is not possible, but I'm just a Autohotkey newbie. I want to do that, and several more similar combinations trying to survive the hell of reaching a Mac machine from a Windows one through VNC Edit with additonnal info This is the key history displayed by AutoHotkey VK SC Up/Down Elapsed Key DE 028 d 3.74 ´ DE 028 u 0.16 ´ 41 01E d 0.25 A 41 01E u 0.11 A share|improve this question 2 Answers 2 Well, you can't map a dead key directly; they are so called because they don't send a keycode to the system, but just notify the keyboard's microcontroller to possibly do something unusual with the next character typed. What you probably can do, though, is map á itself; you may need to do a little hunting around to find the keycode (the AHK documentation keycode list is here, and a script that shows keycodes of pressed keys can be found here -- I'm not sure how accurate that last one is, but you can probably make something of it. Also, if you open the main script window from its system tray icon, then click "View -> Key History", you'll see a list of keys the script has seen pressed, which may well give you the keycode. Anyway, once you know how to refer to a particular accented character in your scripts, you can map it to a fare-thee-well, just as with anything else on your keyboard. share|improve this answer Thanks! I added the Key History: it would be great if you could give me a hint of what should I be trying with them... –  Xv. Apr 10 '13 at 14:48 Wow! That dead key's not dead at all. Since it's got a scan code of its own, you can map just the dead key via the SCxxx form described in autohotkey.com/docs/KeyList.htm#SpecialKeys -- to map the combination of both keys entails essentially treating the dead key as a custom modifier key, which I haven't done before but this advice looks good: autohotkey.com/board/topic/… –  Aaron Miller Apr 10 '13 at 14:54 Thanks for the pointer. ~SC028 & a:: blablabla sort of works. Sort of. The usual way to type an accented char is press and release <kbd>´</kbd> and then press and release <kbd>a</kbd>. This only works if <kbd>´</kbd> is kept pressed, and I don't think I will be able to convince my fingers that this is the proper way to type accented chars –  Xv. Apr 11 '13 at 16:28 Fair enough. So I can be sure I understand what you're after -- you're looking to have the same key sequence (', then a) produce the same result (á) on the OS X machine you're accessing remotely, as it does on the Windows machine you're sitting in front of, right? If so, I think I can see a way to do that, but it'd be every bit as ugly as complex AutoHotKey scripts always are... –  Aaron Miller Apr 11 '13 at 18:17 Thanks a lot for your time. No need to get into ugly scripts for me: I ended up finding a VNC server/viewer combo that dealt properly with international keyboards out of the box (RealVNC) –  Xv. Apr 12 '13 at 4:11 Try this: SoundBeep, 500, 500 B.t.w. I use these accented characters, but without using the international keyboard setting, but by using ahk This way I have full control (and no dead keys) The only problem is that this key will no longer work when used alone, it will function inside a word. share|improve this answer Thanks. Did not work. :*:e:: makes a beep, while :*:á:: or :*:´a:: do not. –  Xv. Apr 11 '13 at 16:12 Wow, this is unexpected. Thank you for the feedback. I checked it now and am stunned my self. –  Robert Ilbrink Apr 11 '13 at 18:51 I'd have expected it to work as well, but looking at the key history output in the post, AutoHotkey seems to be seeing the "dead" key separately from the 'a' key. Very strange. –  Aaron Miller Apr 11 '13 at 19:18 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/1034
Take the 2-minute tour × I'm trying to create a VLOOKUP formula in excel, however, the table array may be in a number of different worksheets. For example, I have this forumula =Vlookup(a1, ‘[Datafile.xlsx]worksheetapples’!$A1:F500,3,False) This works fine in a single scenario, but worksheetapples isn't my only worksheet that I want to do a lookup from, I have worksheetbananas and worksheetpears Is there a way to pass in the worksheet to reference? EDIT: I'm trying to avoid having to write an IF formula which checks a value and then uses the relevant VLOOKUP. It would be much easier to pass in the name of the worksheet rather than check if A1 is apples, do VLOOKUP on apples, if A1 is pears then do lookup on pears etc share|improve this question 2 Answers 2 up vote 8 down vote accepted Try using INDIRECT, as in =Vlookup(a1, INDIRECT(CONCATENATE("‘[Datafile.xlsx]",B1,"'!$A1:F500")),3,False) where B1 contains the sheet name. share|improve this answer Use INDIRECT function. For example, put [Datafile.xlsx]worksheetapples’!$A1:$A10 as text in A1 and =SUM(INDIRECT(A1)) in A2. Check what it happens to A2 value! share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/1040
Best MB for video editing? Moderators: Flying Fox, morphine Postposted on Mon Jan 14, 2002 11:03 am Hello everyone, Just curious as to what everyone believes the best board for video editing is. Right now I'm using the ECS KS75A. Is there a better alternative that other people have experienced? Posts: 28 Joined: Sun Jan 13, 2002 7:00 pm Postposted on Mon Jan 14, 2002 12:49 pm if you really meant K7S5A, then you should be fine, Dark Lord. Just so long as you stay away from any Via crap when you're moving a crapload of data (and I assume you will be during video editing), you'll be okay. <font size=-1>[ This Message was edited by: Despite on 2002-01-14 11:51 ]</font> Gerbil XP Posts: 496 Joined: Thu Dec 27, 2001 7:00 pm Location: Oklahoma Postposted on Sun Feb 03, 2002 5:40 pm I have the AbitKR7A "Via Crap" and daily work with Video files over 1 gig with no problems. This is on a Raid 0 stripe between 2 30 G maxtor 7200 rpm drives. I have heard much of the latency problem, but have never seen it. Just lucky? I dunno. VapoChill/XP Pro OS XP2000+ 1942mhz=155x12.5 AbitKR7A /2x256 2.2.2. Mushkin PC2100/DDRHP Plextor16xCDRW / PioneerDVD 100GB WesternDigital SpecialEdition7200HDD Turtle Beach Sound Channel Well 420PSU Posts: 28 Joined: Sat Feb 02, 2002 7:00 pm Return to Processors Who is online Users browsing this forum: Exabot [Bot] and 2 guests
global_05_local_5_shard_00000035_processed.jsonl/1061
Learn Japanese with JapanesePod101.com View topic - Radicals Postby somethinorwatever » Wed 03.30.2005 1:33 am Does learning kanji by radicals help? how does the meaning of the radicals affect the meaning of th kanji? User avatar Posts: 47 Joined: Thu 03.24.2005 5:27 pm RE: Radicals Postby clay » Wed 03.30.2005 2:31 pm There have been a few very helpful posts on this subject. Do a quick search (search link to the left just under "Friends!" for "radicals" and be sure to click 'forum' I also have some limited info here: User avatar Site Admin Posts: 2809 Joined: Fri 01.21.2005 9:39 am Location: Florida Return to Grammar Questions and Problems Who is online Users browsing this forum: Taylorsits and 8 guests
global_05_local_5_shard_00000035_processed.jsonl/1066
Tolkien Gateway Revision as of 22:51, 6 November 2012 by Mith (Talk | contribs) eitha- is a Sindarin word given three different meanings: 1. "to ease, assist" (root ATH; cognates: Quenya asya-, asië)[1] 2. "to prick with a sharp point, to stab"[2] 3. "to treat with scorn, insult"[2] [edit] References
global_05_local_5_shard_00000035_processed.jsonl/1067
Tolkien Gateway Letter 112 Revision as of 02:20, 11 April 2011 by Gamling (Talk | contribs) The Letters of J.R.R. Tolkien Letter 112 RecipientKatherine Farrer DateNovember 30, 1947 Subject(s)The Hobbit, Runes Letter 112 is a letter written by J.R.R. Tolkien and published in The Letters of J.R.R. Tolkien. Katherine Farrer, an Oxford-based detective author,[1] had apparently asked for her copy of The Hobbit to be signed. Instead, Tolkien wrote her a note in Runes. In the letter (transcribed on page 441), Tolkien thanks her for her request, and tells her he is glad The Hobbit is obtainable again (most stores had run out). He tells her of "the next book", and how it will contain more information about the alphabets. 1. Classic Crime Fiction, University Murder Mysteries
global_05_local_5_shard_00000035_processed.jsonl/1076
Paul Greenberg "The only time this country ever gets into trouble is when there is some so-and-so in the White House lying to the American people." The quote turned out to be an unfortunate choice, and the senator's timing even more so. For that was just before Mr. Bumpers would return to the Senate to defend his presidential client by saying, among other dubious things, that some lies on the part of a president really shouldn't be taken all that seriously. The big problem with that selective approach to truth is that, once truth has been declared expendable where one subject is concerned, the truth about anything else becomes contingent on whether it suits our political purposes, too. And we are left unmoored. Bill Clinton only practiced moral relativism; in defense of his client, Dale Bumpers raised it to a philosophy. The quotation from Harry Truman about the dangers of presidential dissimulation remains a jewel, if a kind of diamond in the rough. For when Mr. Truman told it with the bark off, the result was a kind of folk art. Dale Bumpers said hearing Harry Truman talk about the importance of telling the truth was a Defining Moment in his own life, but he would soon enough forget it. At least officially. For when his valedictory address appeared in the Congressional Record, the quote from Mr. Truman had disappeared. Vanished. Gone. Down the memory hole. The official record had been "corrected." When the omission in the official record was noted, it was blamed on somebody else. Some unidentified underling on the senator's staff must have dunnit. Could it have been the senator himself who'd erased the quote from his speech? Oh, no, it had gone missing when "some staff member was cleaning it up," explained the Honorable Dale Bumpers. The senator's loyal staff backed him up: He'd had no role in the deletion, they claimed. The senator hadn't even known about the omission. Case closed. The usual anonymous suspect had been rounded up. All was in order. Ten years passed in the usual blur. The body had been buried, the questions interred. Any doubts lay a-molderin' in the grave. But somewhere deep, conscience must have stirred. Because that's when Dale Bumpers fessed up, or came close to it. "Whatever the staff did," he said, "I probably instructed them to do." Because when things were edited out of the official record, he admitted, "I did most of it myself." Some of us had suspected as much, though I for one wasn't about to say so -- not without a confession. Or at least a semi-confession like this one. Call it a hang-up from a brief, inglorious stint as a court reporter for the estimable Columbia Missourian in Harry Truman's home state. All of us journalism students at Mizzou were assigned beats on the local paper so we could learn the trade under the watchful eyes of veteran editors. They taught us not to leap to conclusions -- and that you never, ever fiddle with a direct quote. It was a useful lesson. Dale Bumpers might have profited by it. Some of us still miss Harry Truman. His candor could be embarrassing -- just ask Bess -- but he was no moral relativist. His aye was aye, his nay nay. Paul Greenberg
global_05_local_5_shard_00000035_processed.jsonl/1094
->''"Well, maybe IT shouldn't drink so much coffee."'' -->- '''[[MysteryScienceTheater3000 Crow T. Robot]]''' ->''"Squeak."''[[note]]''"Fucking squeak."''[[/note]] -->- '''[[MysteryScienceTheater3000 Tom Servo]]''' ''It Lives By Night'', also known as ''The Bat People'', is an Creator/AmericanInternationalPictures horror film from [[TheSeventies 1974]] that's best known for its appearance on ''Series/MysteryScienceTheater3000''. It's the story of a researcher and his wife who suffer a case of [[IdiotBall The Stupids]] and wander away from the tour group in a cave for a bit of honeymoon-making. Of course, they are attacked by a bat and he gets bitten, and from then on he periodically turns into a sort of half-bat-half-human monster. His symptoms are first mistaken for rabies, as the [[PornStache Grooviest Doctor in the World]] ascertains. However, this turns out not to be the case. Given the unexplained, violent deaths that tend to follow cases like this, law enforcement becomes interested. Said law enforcement is one loathsome, perverted cop who seems to have a thing for women in vulnerable situations. Just what will be the fate of our hapless, transforming protagonist? Can he rid the bats from his belfry and return to a normal life? Will he outwit the lecherous Sergeant? Will he lay with his pinched, ferret-y killjoy of a wife to infect her with his were-bat affliction, and then run off to kill a smelly homeless guy? Answer key: ''no'', ''kinda'', ''[[BigNo NOOOOOOOO!]]'' and ''yes''. For the ''Series/MysteryScienceTheater3000'' episode see ''[[Recap/MysteryScienceTheater3000S10E10ItLivesByNight here]] ''. !!Tropes found in ''It Lives By Night'': * AbhorrentAdmirer: Sgt. Ward, a.k.a. Sheriff Menacing W. Pervert. * TheBadGuyWins: Well, your precise definition of "bad guy" may be important here, but at the end of the movie [[spoiler:John, who you may remember murdered several people, is at large and remains a danger to all. His wife supports him and implicitly becomes a bat person herself. Sgt. Ward is killed by a bat...swarm. Bats swarm, right?]] * CarChase: Man, for a crazy guy Johnny drives like a maniac! Wait... * CatapultNightmare: Several times. At one point he just darts up and starts screaming. * CatchPhrase: Ward's "Know what I mean?" His last utterance is a DarkReprise / PreAssKickingOneLiner. * CorruptCop: Sgt. Ward. * FateWorseThanDeath * HeroAntagonist: Sgt. Ward may be a slimy person, but he's the only one who seems to be aware that Johnny is trouble. Too bad he's too inept to do anything about it. * {{Jerkass}}: Johnny seemed to be an asshole even before he was bitten, especially to his wife Kathy. ** Made even more cringe-inducing by the fact that the two actors who played Johnny and Kathy are real-life husband and wife. ** Perhaps justified when Kathy explains to Doctor Mustache Love that Johnny's bat-involved symptoms started well before he was bitten, though they never attempt to explain that. * MonsterMisogyny: John kills four people, on-screen (not counting Ward, who was killed by a bat swarm). The only one not a young, attractive female was a drunk hobo - who got several lines of dialog before dying. * MurderTheHypotenuse: Implied with Ward. * ObviouslyEvil: John isn't ''evil'' per se, but his guilt is very apparent to Sgt. Ward and the viewer. Too bad Ward was too stupid to do anything about it when he had the chance.
global_05_local_5_shard_00000035_processed.jsonl/1095
[[quoteright:336:[[VideoGame/{{Touhou}} http://static.tvtropes.org/pmwiki/pub/images/cimo_cleaned_1867.png]]]] [[caption-width-right:336:[-[[{{Pun}} Windows]] [[WindowsOfTheSoul of the Soul]] has encountered a problem and needs to shut down. We are sorry for the inconvenience.-] ]] ->''"Well, lad, the brain be a funny thing. Sometimes, it just stops workin' right when ye've been through a bad scene."'' -->-- '''Durkon''', ''Webcomic/TheOrderOfTheStick'', [[http://www.giantitp.com/comics/oots0247.html Strip #247]]. A stunning revelation or horrible event affects a character or someone they care deeply about, leaving them shocked to the point of mentally shutting down for a while, analogous to the [[http://en.wikipedia.org/wiki/Blue_Screen_of_Death Blue Screen of Death]]. The effect is similar to passing a DespairEventHorizon, but is temporary rather than permanent. Alternatively, if, say, this occurs during a fight, a hero may have a [[FoeTossingCharge violent outburst]], killing EvilMinions and hurling their own companions aside. They may run off and have to be tracked down by their friends for EpiphanyTherapy. AloneInACrowd typically represents a milder, non-disabling form of BSOD; a related trope is HeroicSafeMode, wherein the hero "defaults" to a fight or flight mindset before rebooting in safety. A ShellShockedVeteran may have a BSOD in their back story. The trope name notwithstanding, [[TropesAreFlexible the character suffering a Heroic BSOD may not necessarily be a fully-fledged hero]]. However, if something like this happens to a more ambiguous or mundane character, it is ''much'' more likely to be PlayedForLaughs or just taken less seriously. But a BSOD is never brief or trivial; the effect must involve some kind of total mental shut-down to qualify. Also, an outright ''villain'' suffering a similar effect will usually experience a VillainousBreakdown (often involving them going completely crazy instead of shutting down) or a VillainousBSOD (whereby they gain a conscience). Possible triggers include [[MyGreatestFailure failing in something crucial]] such as [[ILetGwenStacyDie saving a loved one]], being [[EtTuBrute betrayed]] by [[HeartbrokenBadass a close friend]], being forced to make an "impossible" choice (e.g. having to choose between using "evil" methods or laying friends open to attack), or being hit with a BreakingSpeech or ArmorPiercingQuestion. Other tropes such as TheseHandsHaveKilled often overlap. When the trope is PlayedForLaughs or used for {{melodrama}}tic effect, the cause can be less substantial; deranged behavior from someone supposedly sane, seeing something completely surreal, or being hit with a WallOfText, say. Other people can attempt to [[HaveYouTriedRebooting reboot]] the character; GetAHoldOfYourselfMan may work (especially in the stories where violence is always the answer), as may telling them to QuitYourWhining. The best thing that can happen to a hero suffering from a BSOD is meeting a friendly WarriorTherapist; the ''worst'' thing is meeting a ''hostile'' WarriorTherapist, as such a foe can BreakThemByTalking. Even after regaining some function, a BSOD sufferer may evince a ThousandYardStare, or go into TenMinuteRetirement. In the longer term, a hero may become [[TheStoic emotionally comatose]] (entering an AngstComa), [[OutDamnedSpot obsessive and guilt-ridden]], [[DumbStruck mute]], or in really bad cases, a [[JadeColoredGlasses jaded]] violent [[AmnesiacDissonance amnesiac]]. A really long-term BSOD would be catatonia; GoMadFromTheRevelation is the worst case. Those who remain functional but don't find a cure for the problem may eventually find SafetyInIndifference or EmotionSuppression; other people may fear that they have become a FallenHero. Comedy and melodramatic uses of the trope are far less likely to lead to long-term problems; the character simply snaps back after a few minutes. A character in a {{slapstick}} comedy show may be thrown into ''several'' blue screens in one episode, as a RunningGag. If opponents discover a character's BSOD trigger, they may employ it as a weapon -- although if they over-use it, the victim may wise up and seek treatment. Even comedy characters can find that a BSOD leads to CharacterDevelopment, marking the start of a series of new experiences, or causing them to revise their world-view. HopeIsScary is a frequent reaction to the beginning of recovery for any character. HesBack often marks a character's full recovery, perhaps accompanied by a WorldOfCardboardSpeech. Conversely, a character who never recovers has fallen over the DespairEventHorizon. Compare HeroicRROD (the physical equivalent), FreakOut, and DeerInTheHeadlights. One common reaction is IThinkYouBrokeHim. In RealLife psychology, this sort of thing is known as an [[http://en.wikipedia.org/wiki/Acute_stress_reaction acute stress reaction]], or a [[https://en.wikipedia.org/wiki/Mental_breakdown mental breakdown]], and is related to Post Traumatic Stress Disorder. If a character starts singing about their (or someone else's) Heroic BSOD, then it's also an example of BSODSong The trope is named in honor of [[http://en.wikipedia.org/wiki/BSOD an infamous Microsoft Windows error]] that indicates that the system has screwed itself big time. A particularly literal version could involve a character (preferably a supercomputer or other ArtificialIntelligence) literally displaying a Blue Screen Of Death. Individuals afflicted with this trope are often seen exhibiting the classic ThousandYardStare, with its blank, emotionless expression and unfocussed, empty eyes. !!Examples go on subpages: * HeroicBSOD/AnimeAndManga * HeroicBSOD/ComicBooks * HeroicBSOD/FanFiction * HeroicBSOD/{{Film}} * HeroicBSOD/{{Literature}} * HeroicBSOD/LiveActionTV * HeroicBSOD/{{Music}} * HeroicBSOD/{{Mythology}} * HeroicBSOD/ProfessionalWrestling * HeroicBSOD/{{Roleplay}} * HeroicBSOD/TabletopRPG * HeroicBSOD/{{Theater}} * HeroicBSOD/VideoGames * HeroicBSOD/WebAnimation * HeroicBSOD/WebComics * HeroicBSOD/WebOriginal * HeroicBSOD/WesternAnimation * HeroicBSOD/RealLife
global_05_local_5_shard_00000035_processed.jsonl/1096
Bart's newfound friendship with Nelson turns into a possessive relationship. Meanwhile, Homer becomes engrossed in Lisa's ''Angelica Button'' fantasy books, and worries that Lisa will be upset when he discovers that one of the characters will die. !!"The Haw-Hawed Couple" contains examples of: * DoesThisRemindYouOfAnything: Bart and Nelson's friendship is treated like a romantic relationship -- to the point that the music from ''BrokebackMountain'' is used for a scene near the end. * HaveAGayOldTime: Martin says that the class banding together will make them form a "mighty faggot", then a dictionary definition appears at the bottom of the screen to show that it's not the anti-gay slur (though the "bundle of sticks" definition of "faggot" does have a connection with the derogatory term for a homosexual, as there was a time in history where homosexuals were burned at the stake, along with women who were accused of witchcraft -- and sometimes, the homosexual men were used as kindling for the women who ended up burned for witchcraft, hence the term "flaming faggot"). * KissOfLife: Skinner gives Bart CPR after almost drowning; Bart opens his eyes at the moment their lips touch. The students laugh, which prompts this reply from Skinner: --> '''Skinner''': Shut up! I'm just giving him CPR. ''The kiss of life''. * PrimalScene: Bart walks in on his parents having sex and is traumatized about it in school. -->'''Milhouse:''' Trust me Bart, it's better to walk in on both your parents than on [[ADateWithRosiePalms just one of them]]. * TrialBalloonQuestion: Homer asks Lisa how she would react if Wizard Greystache died, she says that would be the day her childhood ends. This promts Homer to revise the book's ending. * {{Yandere}}: Nelson, a non-romantic example.
global_05_local_5_shard_00000035_processed.jsonl/1098
Analysis: Hatfields And Mc Coys Inexact title. See the list below. We don't have an article named Analysis/HatfieldsAndMcCoys, exactly. We do have: If you meant one of those, just click and go. If you want to start a Analysis/HatfieldsAndMcCoys page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those.
global_05_local_5_shard_00000035_processed.jsonl/1099
Analysis: Imperial Dawn Inexact title. See the list below. We don't have an article named Analysis/ImperialDawn, exactly. We do have: If you meant one of those, just click and go. If you want to start a Analysis/ImperialDawn page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those.
global_05_local_5_shard_00000035_processed.jsonl/1100
Analysis: Road Rules Inexact title. See the list below. We don't have an article named Analysis/RoadRules, exactly. We do have: If you meant one of those, just click and go. If you want to start a Analysis/RoadRules page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those.
global_05_local_5_shard_00000035_processed.jsonl/1101
Analysis: The Mambo Kings Inexact title. See the list below. We don't have an article named Analysis/TheMamboKings, exactly. We do have: If you meant one of those, just click and go. If you want to start a Analysis/TheMamboKings page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those.
global_05_local_5_shard_00000035_processed.jsonl/1102
Analysis: Torpedo Inexact title. See the list below. We don't have an article named Analysis/Torpedo, exactly. We do have: If you meant one of those, just click and go. If you want to start a Analysis/Torpedo page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those.
global_05_local_5_shard_00000035_processed.jsonl/1103
Awesome: For Colored Girls Inexact title. See the list below. We don't have an article named Awesome/ForColoredGirls, exactly. We do have: If you meant one of those, just click and go. If you want to start a Awesome/ForColoredGirls page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those.
global_05_local_5_shard_00000035_processed.jsonl/1104
Fridge: The Colbert Report Fridge Brilliance: • Whenever Stephen Colbert talks to his Companion Cube handgun, Sweetness, he holds it up to his deaf ear. I thought this was just weird until someone pointed out that this is to emphasise that the gun isn't really talking to him - the voice is in his head. All the impulses to kill the studio audience are his. —Rissa • Or it could just be that he's right-handed, and would naturally hold a pistol with that hand and hence, lift it to the same ear if he were going to pretend it was speaking to him. • OR it could be that all of the above also factor into him being deaf because he discharged the pistol right next to his ear... • As per his news commentator persona, Stephen almost always has a pen and some paper with him at his desk. And as per his persona's deep-seated rage, Stephen often points an accusing finger at people (he even has a segment called "Tip of the Hat, Wag of the Finger"). It just suddenly hit me one day that, because Stephen holds the pen with his index finger, that means that when he points at something he's usually using a finger that's ... how should I put this? A little more towards the middle of the hand. • As seen on the Flame War page. • Many people point with their middle finger, without meaning anything by it. • Yes, but many people aren't Colbert. It's unlikely that this was unintentional on his part. • As mentioned on the Bears Are Bad News page: Colbert mocks the typical conservative talk-show host mentality with his routine. The talk-show movement stems in large part fromt he success of Bill O'Reilly, who Colbert has nicknamed "papa bear". Colbert has also declared Bears the greatest threat to America. That means Bill O'Reilly is the greatest threat of the greatest threats to America. -TS Basilisk • 10/30/14, Stephen asks the Grim Reaper where he's going after his final Report. Grimmy points at the fire and makes devil horns. Yeahhh... • Or maybe he's pointing at the initial C above the fireplace and making rabbit ears, indicating CBS and broadcast TV, respectively. • Jossed in the finale. Stephen kills death during the Cheating Death segment, becoming immortal in the process. • In the August 1, 2011 episode, Stephen compares Barack Obama to the Troll from The Three Billy Goats Gruff. What is the most famous trait of DnD trolls? • The recurring 434-part series "Better Know A District" is innovative because it gives U.S. representatives 15 minutes of fame that would otherwise never receive it. • The choice of "Holland, 1945" as the final credits song is a fridge-ey Tear Jerker. • In the finale the entire 9-year run was revealed to be a Daily Show segment. This is in-series confirmation that Colbert Report Colbert was just a character played by the "normal" Daily Show Colbert and helps bring his fans along in the transition to his new role hosting the Late Show. Fridge Horror: • Taken out of context, "Ukraine is on the brink of disaster. So, things are improving" implies that the situation in Ukraine used to be, well, disastrous. Then again, that's technically true.
global_05_local_5_shard_00000035_processed.jsonl/1105
Fridge: The Muppets Take Manhattan • Fridge Horror: It's made very obvious that the dogs at Rowlf's work are dropped off by their owners on vacation. However Rowlf takes them with him to New York - there's going to be some unhappy owners.... • Though one of the owners was a jerkass anyway. Still, he clearly loved his Snookums. • This is probably the very reason Rowlf took them to New York with him. He didn't want them left unattended.
global_05_local_5_shard_00000035_processed.jsonl/1106
Funny: 2001: A Space Odyssey • Dr. Floyd reading the long list of instructions for using a zero-gravity toilet. • HAL's entire sequence as Bowman tries to get into the master control room, though it ends pretty abruptly afterwards.
global_05_local_5_shard_00000035_processed.jsonl/1107
Playing With: Florence Nightingale Effect Basic Trope: Someone brought another back to health. Romance ensued. • Exaggerated: Alice and Bob have never looked at each other before. Alice tended to Bob's cut finger, and before she's even finished they're rolling around naked on the floor. • Inverted: • Enforced: The Moral Guardians want Bob to settle down from his action- and sex-filled life. • Invoked: Alice went into nursing for the romantic possibilities. • Defied: "Do you know how many patients have fallen in love with me? Twenty-three. This morning." • Discussed: ??? • Conversed: "That's the Florence Nightingale Effect. It happens in hospitals when nurses fall in love with their patients. Go to it, kid!" • Implied: Bob is already married to Alice, who had always been working as a nurse. She once mentions how she met Bob in an accident where she tended to him. Back to Florence Nightingale Effect
global_05_local_5_shard_00000035_processed.jsonl/1108
Video Game: Super Robot Wars Alpha We'll go into the space over our future. We're looking for the place under the shining star. - JAM Project, "Skill" In the year 179 of the New Western Calendar, the One Year War breaks out between the Earth Federation and the Principality of Zeon, but is halted when an object crashes to Earth, landing on South Atalia Island. An investigative team from the "Extra-Over Technological Investigative Institute" discovers the object is an alien battleship with highly-advanced technology. Heeding the warnings of Dr. Bian Zoldark, the Federation secretly increases its military power, while hiding the evidence of intelligent extraterrestrial life beyond the Earth. In the meantime, Bian utilizes "Extra-Over Technology" found on the ship to devise weapons capable of protecting the Earth from alien forces, should the planet become embroiled in conflict. However, the economic troubles caused by the Federation's buildup sees the rise of many anti-Federation movements, such as the Neo Zeon, who have retreated to the asteroid Axis. In response, the Federation establishes special forces units, including the Titans and the Organization of Zodiac. Other forces, like the Dinosaur Empire and Dr. Hell begin their plans for world domination, but are pushed back by the teams of Mazinger Z, Getter Robo, and Raideen. In the year 187, the battleship Excelion engages a force of "STMCs" (Space Terrible Monster Crowd) when they are suddenly attacked by another unknown alien fleet, codenamed the "Aerogaters"... Thus begins the four-part saga of Super Robot Wars Alpha, perhaps the best-known and most popular of all the Super Robot Wars series. It also holds the distinction of introducing the music of JAM Project into the franchise. This page is not enough to cover this series; as a result, there's a recap summary for the fine details. Series Introduced In Alpha (Bold indicates debuting series): Alpha Gaiden cut several series from the cast, some of whom return in the sequels: Gundam F91 reappears in Alpha 2, while Evangelion and Gunbuster return for Alpha 3; Giant Robo, Dunbine, original Gundam, and War In The Pocket do not. In addition, several new series were added, all making their Super Robot Wars debut. Series Introduced In Alpha Gaiden: Unfortunately, none of the new Alpha Gaiden debuts would return for Alpha 2 and beyond (due to being set in an alternate timeline), while Victory Gundam vanishes with them. Raideen, Dancougar and Macross are conspicuously absent, but they return for the finale. Series Introduced In Alpha 2 (Bold indicates debuting series): Only Brain Powerd and Crossbone Gundam are removed for Alpha 3, but many titles that appeared in Alpha and Alpha Gaiden make their reappearance. Series Introduced In Alpha 3 (Bold indicates debuting series): Tropes associated with the Alpha series: • Adaptational Badass: Shinji Ikari, after receiving the infamous "Bright Slap". • After the End: In Alpha Gaiden, after Scenario 9, no less than three of them have occurred. • Apocalypse How: So many on so many levels. In Alpha 3, there's no less than three "X-2" situations; in fact, achieving the bad ending of Alpha 3 results in an "X-4" event. • Back for the Finale: Many of the series removed for Alpha Gaiden and Alpha 2 (such as Evangelion, Raideen and Gunbuster) return in Alpha 3. Averted with the Alpha Gaiden-only series; they never show up again, which makes sense given they come from a Bad Future-turned-alternate future and returned there. • Bad Ass: Every single playable pilot in the games is one. • Behind the Black: This explanation is used in regards to the sudden appearance of Gundam SEED in Alpha 3; it essentially amounts to "Oh, Coordinators and the PLANTs have always been there: they just didn't get involved in any of the stuff that happened in the last three wars." • The second half of the Raideen plot happens offscreen in-between Alpha Gaiden and Alpha 3, explaining the absence of Akira Hibiki in Alpha 2. • Big Bad • Bigger Bad: While they aren't the biggest threat faced in-game, the STMC could count. Not only do they pre-date all the other enemies, The First People built the Gan Eden systems specifically to combat against them. • Big Bad Wannabe: Due to the nature of the series, a number of villainous factions are clearly trying to bite way more than they can chew. They end up as quickly disposed-of fodder or puppets for the more capable villains. The best example is probably the Mariemaia Army in Alpha Gaiden, which gets crushed in the span of three scenarios, two of which are not mandatory. • Bitter Sweet Ending • Alpha ends with the Aerogaters defeated. Unfortunately for the SRX Team, they are detained by the Federation and placed under house arrest for "having military secrets", as a result of Ingram Plisken being The Mole for the Aerogaters. Likewise, Viletta Vadim and Mai Kobayashi are arrested for having collaborated with them. Since Viletta reappears in Alpha 2, it's implied the government has cleared her of charges; similarly, the rest of the team returns for Alpha 3, indicating they are free to return to duty. • In Alpha 2, the Earth is unsealed, but the Alpha Numbers cannot rescue Irui Gan Eden in the routes for Sanger Zonvolt and Ibis Douglas. However, this is Retconned in Alpha 3 thanks to She's Just Hiding. • Boss Rush • Boring but Practical: Gundam Sandrock and Gundam Deathscythe in Alpha Gaiden have only vulcan guns and their basic melee attack, so their fights tend to be "repetitive". However, these "melee" attacks have good weapon range, all-around good terrain rating, decent damage for non-beam type weaponry and require neither ammunition nor energy, making them solid choices for most of the game. • Bonus points in they gain quite a number of attack power with upgrades. In general, any weapons with a range of 4 and post-movement with an attack power of 2500 or higher are considered this trope in Alpha Gaiden. • Brainwashed and Crazy: Of course, there are the usual suspects from various series, plus some extras - for example, Katejina Loos is now this, while in the original she was simply crazy (and evil). • Break the Cutie: Happens to plenty of people in the licensed properties - the Evangelion pilots and the crew of the Solo Ship perhaps being the standouts. A lot of the originals don't catch a break, either. • There are several times Kusuha Mizhua believes Bullet has been Killed Off for Real, and that's never a happy time for her (the worst is later on in the series when she mistakenly believes she hears his mental death-scream, ala Tiffa Adill; that one nearly breaks her) • Half of Ibis' story (and, in a sense, her appeal) is nothing but taking a brick to her, over and over. She eventually recovers, but it's a long road. • Breakout Character: Sanger from Alpha Gaiden. If side materials are anything to go by, Tetsuya Tsurugi, which is a pretty good example in Alpha itself, going from normal, but not really important enough of a character in the first game, into one of the more developed figures to the plot and back-story of Alpha Gaiden. He winds up becoming the primary mentor to Touma in Alpha 3, since Tetsuya gives him his training schedule to fit his role as Drill Sergeant Nasty of the Alpha Numbers. • Kusuha is a selectable protagonist from the start, whereas Sanger's character and Alpha Gaiden wasn't in the original plan for the series, but she proved popular as an option in Alpha that Banpresto more or less felt compelled to make her the consistent choice in the sequels. As a result, she has more merchandise focused around her than any other original or even the entire casts of some of the shows she shares games with. • Calling Your Attacks • Canon Immigrant: Ratsel Feinschmecker is clearly a Paper-Thin Disguise for Elzam von Branstein, who made his debut in Super Robot Wars Original Generation before his appearance in Alpha 2. Alpha 3 brings Ratsel's mecha from Original Generation 2 into the former. • Chuck Cunningham Syndrome: Quite a few series vanish without explanation and never return. Sometimes there's an excuse (Alpha Gaiden characters only exist in an alternate future, while the Dunbine and Masou Kishin casts return to Byston Well and La Gias, respectively, and just don't come back), but not always (Victory Gundam and Brain Powerd characters disappear without comment). Most notable is Giant Robo, who is set up to have a major role in later games but is written out and never mentioned again (Banpresto didn't have a choice, as the holder of the rights to Giant Robo changed after Alpha, and it became too expensive to reacquire the license for sequels). As a result, Big Fire, a major villainous faction in Alpha, inexplicably goes away. • Cloning Blues: Euzeth's plan to conquer the Earth in Alpha. • This sums up a chunk of the route for Cobray Gordon in Alpha 3, specifically, Calico McCready, who serves as The Rival for Cobray and hates him for being chosen by the "Originator" (Ingram) to succeed him. Cobray's biggest stigma is he thinks he can't escape Ingram's shadow. • Crapsack World: The split timeline in Alpha Gaiden - the fallout from the events of Alpha and attacks by underground forces nearly destroyed humanity and most of the Earth is reduced to a scorched wasteland. After humanity partially recovers, another war breaks out between the Earth and the colonies, annihilating most of it again. In the primary timeline, the Solar System is torn by a number of successive wars, between Colony Drops and various genocidal invaders successfully striking at major population centers across the globe. Some of the aliens opposing the Earth have suffered their own catastrophes, such as the loss of their homeworlds. At least the Alpha Numbers manage to fix most of the problems by Alpha 3, including some of the invaders. • Crutch Character: The Mazingers in Alpha Gaiden. The way they play with this trope is complicated. • The Masou Kishin cast from the same game. Early on, Mooks are weak enough to be devastated by their MAP Attacks, particularly the Cybuster and Valsione, who have post-movement MAP Attacks, essentially making them some of the better characters. By late game, due to the low rate of upgrades for MAP Attacks and the expensive cost of upgrading weapons, coupled with a low supply of EN and a weak weapon set, these characters are less valuable in the final scenarios in contrast to their capabilities at the start. • Cultural Cross-Reference: In an Alpha Gaiden Yonkoma, Presia Zenozakis wants to see what Harry Ord really looks like and snatches his Cool which point he starts uncontrollably spraying the room with optic blasts while shouting "Give them back!" • Cutscene Boss: Neo Neros is defeated by Kenta Sanada in a cutscene during the GoShogun finale in Alpha 2. In terms of gameplay, the final "boss", or rather the final obstacle to completing the scenario is a bunch of missiles that need to be destroyed. • Disc One Final Boss: Emperor Gore and Queen Himika near the halfway point of Alpha 2. Even after their defeat, the Yamatai Kingdom and Dinosaur Empire continue on, absorbed by the Mycenae Empire. Himika's followers also prioritize Avenging the Villain, and in Sanger's route intend to use "Machine Cells" to restore their kingdom. • Did You Just Punch Out Cthulhu?: The Angels and Mass Production Type Evangelions, Euzeth's Black Judecca, Magus' Aurgelmir, Shu's Neo Granzon, Gym Ghingham's Turn X Gundam, The Emperor of Darkness, Don Zauser, Emperor Darius, Baron Maximillian's Hyper Baronz, Irui Gan Eden, The Z-Master, The 11 Lords of Sol, Emperor Ryuuma, Emperor Muge Zorbados, Geppernitch, Evangelion Unit 01 fused with the Tree of Life (effectively GOD), Ruach Gan Eden and Keiser Ephes • Honorary mention goes to Alberto the Shockwave, who, though he could not defeat Cthulhu, battled him to a standstill while on foot. • Difficulty Spike: From battling the Turn-X onwards in Alpha Gaiden. • Dummied Out: The SRX, RyuKoOh/KoRyuOh, Texas Mack and a few other units are in the files of Alpha Gaiden, and are usable if players cheat in the game. • Dynamic Difficulty: The Alpha series introduces the "Skill Point" System, acquired by achieving optional objectives in scenarios. Obtaining these Skill Points decides whether the next scenario will net players the easy, normal or hard version of the stage, as well as certain secrets. Beginning with Alpha Gaiden, getting enough Skill Points also influences which ending route will be taken. Although earlier games do not tell players what the Skill Point objectives are, Alpha 2 listed the optional objectives alongside the primary objectives. • Early Installment Weirdness: The first Alpha game has a very peculiar Skill Point system. In addition to hidden objectives, some points were tied to dialogue choices (such as one for skipping the tutorial in the first scenario), certain stages had multiple objectives available while others had none, some objectives were worth multiple points, and it was possible to lose Skill Points, as laid out in this chart. Furthermore, there was no notification for gaining or losing Skill Points; players had to check the protagonist's status screen manually every time. Modern games using the Skill Point system or variant of it don't have such restrictions and clearly indicates how many points players have achieved once the menu is pulled up. • Elsewhere Fic: Alpha Gaiden features these after a fashion, with two separate manga side-stories detailing what happened to those left behind when the Alpha Numbers get sent to the Bad Future. One centers on Relena Peacecraft and characters from series that were in Alpha Gaiden, while another focuses on Shinji, Asuka Langley Soryu and others from Alpha who didn't return for the sequels or sat out a few games. • Evil Costume Switch: Bullet in Alpha 2 • Face-Heel Turn: Shu in Alpha Gaiden, Char in Alpha 2 • Fix Fic: Amongst other things, the Alpha series fixes the many tragedies of the various Universal Century Gundam series and averts the Kill 'em All endings of Ideon and The End of Evangelion. However, the Ideon "Be Invoked" Kill 'em All can still be triggered by accessing the bad ending route in Alpha 3. • Fragile Speedster: Most real robots, but particularly the "Variable Fighters" of Macross, who will likely die in one, at most two hits, but have enormous mobility stats. • Gainaxing: Starting in Alpha 2 (one of the first SRWs to include "pilot cut-ins"), virtually every major female pilot... except Ibis. • Hannibal Lecture: What many of the major villains of the Real Robot series will do when they are confronted. It never works. • Heel-Face Turn: Too many to list, but the one that stands out is possibly the Ide, which give up its quest to wipe out all life from the galaxy and even sends the Alpha Numbers back to Earth. • Heel Face Door Slam: Kukuru unfortunately gets killed off just on the verge of making one in Alpha 2, but the biggest one in these games comes at the tail end of Alpha if players choose to make peace with Kycillia Zabi. Although she can't do much to help take the edge off of the remaining conflicts, she does at least pledge to do what she can and her Zeon faction will keep from causing trouble. Shortly thereafter though, Angel Halo activates and, in a show of power, leaves the entire population of Side 3 braindead. • Heroic BSOD: Happens a fair bit, both to the licensed characters and to some of the originals. Of course, all of the enthusiasm on the team tends to help people recover. • Shinji, the Master Of BSODs himself, is a major cast member for Alpha and Alpha 3, and is kind of the poster child for an SRW setting making this better. • Kusuha runs close to this a few times in the series, when she has good reason to think Bullet has been flat-out killed. She doesn't completely shut down, but she's very badly affected; it's more "Heroically Spitting Stack Errors" than a full BSOD. • Seolla Schweizer in Alpha 2 is badly affected by Arado Balanga and his Heel-Face Turn to the Alpha Numbers, wavering between this and murderous rage for him even daring to betray the Titans. He eventually brings her around with the help of some of the Gundam cast, however. • Sanger, of all people, can suffer from this if one of the "middle" endings in Alpha 2 is taken, where it isn't clear that Irui survived. • Insane Troll Logic: Char's rationalization for dropping Axis onto Earth was pretty insane in the source material, but in Alpha 2, the plan is repeated with practically no changes in a world where humanity is simultaneously hammered by joint invasion forces of three alien worlds, the Mycene Empire (which, in fact, immediately takes advantage of the havoc caused by Char) and a number of other extinction-level threats. This is left for players to wonder how destroying most of human civilization is going to help them survive, considering these circumstances. • Lethal Joke Item: Alpha has the equippable part "Tem Ray's Circuit", which drastically reduces unit stats, but if the mecha is destroyed, it will cost only 10 credits to repair (in other words, the part turns it into another Boss Borot). For a real menace, put it on something like the Evangelion Unit 01 along with another part to lessen the penalty, then send Shinji on a suicide attack. Paying only 10 credits instead of its usual repair cost of 40000 makes using the "Berserk Unit 01" sound like a practical strategy, not to mention the Berserk Evangelion is considered an enemy unit, thus destroying it nets a neat bundle of credits as well. • Loads and Loads of Characters: Alpha 3 still has the largest cast of characters in any SRW to date. • Massive Multiplayer Crossover • Nice Job Breaking It, Hero: Thanks for stopping the STMC in Alpha, only now the shockwave from the blast used to kill them is headed towards Earth and will destroy the planet in Alpha Gaiden. To be fair, that is the lesser of two evils, considering the STMC practically wins anything through sheer attrition. • From Bad to Worse: Turns out the STMC fought in Alpha were only a small fraction of them. Their main force arrives in Alpha 3. • Nintendo Hard: Alpha Gaiden, which itself is easy in comparison to getting Tiffa and the G-Bits in the game. Scenario 15 alone frustrates players to no degree because of how many times they're going to reset the game in order to get those six kills in three turns with Garrod Ran; the substantial power boost they give to the Double X makes them worth the effort. • Non-Entity General: Only mentioned during the final bonus scenario in Alpha 3 and most likely a joke. When someone mentions the "player" and confuses Cobray, Ryusei Date explains it's the strategist who keeps watching them from "that monitor". • Older and Wiser: The cast of the previous games in the sequels, notably the SRX Team, Getter Team, Evangelion pilots and various Gundam protagonists. A small portion of them have also become Shell Shocked Veterans, but this being SRW, they get over it. • Tetsuya is a REALLY good example of the latter, as a result of Alpha Gaiden. • Once per Episode: The GP-02A Physalis getting hijacked and needed to be taken back; this stops with Alpha 3. • Original Generation: Aside from the game-specific originals, characters from Masou Kishin: The Lord of Elemental, Shin Super Robot Wars, Super Hero Sakusen, Super Robot Spirits and Super Robot Wars 4 reappear for the Alpha series. • The Alpha series is notable in SRW for being the first to really have a substantial "mythology" of its originals, separate from all of the crossover series, and sufficiently developed to the point they felt like their own thing intellectual property. Alpha was likely the catalyst for the Original Generation series as it came to be. • Pet the Dog: In Alpha 3, after defeating the copy of the Unit 01 in the final scenario of The End of Evangelion plot, Gendo Ikari tells his son he actually wanted to comfort him, but never had courage to open up. Before he dies, he finally tells Shinji he's glad to see his son grow into such a strong man. • The Power of Rock: Naturally, Macross 7 in Alpha 3, but also Mic Sounders the 13th in the same game. • The Prophecy: In Alpha 2, the Bronze Bell foretells of a malevolent force that will unify the subterranean forces of the Dinosaur Empire, Yamatai Kingdom, and Mycene Empire. The Emperor of Darkness appears to fit the bill and goes on to be one of the final bosses in the game until Alpha 3 reveals everyone jumped to conclusions and the prophecy actually spoke of Emperor Ryuuma, instead. • Purposefully Overpowered: Certain late-game mecha, notably the SRX in Alpha. Three sets of Spirit Commands (later four, with the addition of Mai), a powerful set of weapons, even by Super Robot standards, and a Combination Attack accessible in the final scenario that can potentially One-Hit Kill the Final Boss. • Mazinkaiser in Alpha Gaiden is far more powerful than the rest of the team, including the Shin Getter Robo, thanks to high Hit Points, EN, good mobility (comparable to some Gundams) and armor rating, alongside a great set of weapons, augumented with the "Mazinpower" unit abilitynote  and can use its attacks right off the batnote . Of course, this being Alpha Gaiden, it's actually a godsend rather than it ruining the game. • Sanger and the Thrudgelmir from the same game: good attacks rivaling those of the Mazingers, comparable stats to the Mazinkaiser, and a set of abilities that make it almost invulnerable. Note that it's only playable in the last two scenarios of the game, and despite its setup, the Thrudgelmir cannot win the scenarios alone. • Recurring Boss: Players will be continually plagued by the forces of the Dinosaur and Mycenae Empires until they're blown up for good in Alpha 2. Resident Psycho for Hire Yazan Gable holds the distinction of being the only enemy to show up in all four games and still live until he's finally Killed Off for Real in Alpha 3. • Dr. Hell is another: he reappears in Alpha 2 and Alpha 3 as the Grand Marshall Of Hell. • Shapiro Keats, who always survives that. • While they aren't quite as strong as true boss units, even in their final mecha, players must fight Jerid Messa, Timp and Kid Hola repeatedly, reflecting their status as persistent nemeses in their original anime storylines. • Road Cone: Between Alpha 2 and Alpha 3, parts of the story change between the various protagonists. What's more, each protagonist in Alpha 3 is linked to a protagonist in Alpha 2 (except Kusuha, due to her link being Shaped Like Itself). In other words, Selena Recital is linked to Ibis, Touma to Sanger and Cobray to Arado. • Robeast: Mechanical Beasts, Warrior Beasts, Fossil Beasts, Slave Beasts, Beast Fighters, Mecha Soldiers, Haniwa Phantom Gods, Mechasauruses, Zonders and the Angels. • Saved for the Sequel: Compared to the Super Robot Wars Z series, the Alpha games often didn't tie up every loose plot thread at the end of the earlier installments, to help serve as a Sequel Hook. For instance, Alpha only covers the first half of Combattler V with its second season being saved for Alpha 3. • Secret Character • Sequel Difficulty Drop: The Alpha series got considerably easier as it went on. Although bosses did become statistically stronger as the games progressed, allied units scaled in power much faster. • Sequel Escalation • Shut Up, Hannibal!: Uncountable, but the best one has got to be the final scenario to The End of Evangelion story, where Shinji not only rejects the intended Assimilation Plot, but also Gendo, asserting he's his own person. In fact, the entire scenario is a MASSIVE invoking of this trope, seeing as how the Alpha Numbers are so Hot-Blooded, it prevents them from turning into LCL. • Spared by the Adaptation: Not as much as it might seem at first sight, due to a number of characters surviving exclusively as secrets, but aren't treated as canon in the sequels. For example, Musashi does not survive in Alpha 2, even though he can be saved on certain routes. • Possibly due to the One Year War getting interrupted, a lot of the Zeon aces from Mobile Suit Gundam, War In The Pocket and Stardust Memory appear in Neo Zeon's forces. However, as the Haman Route in Alpha 2 is rendered Canon Discontinuity in Alpha 3, they are all Killed Off for Real. • Spotlight-Stealing Squad: In Alpha Gaiden, most of the spotlight goes to Tetsuya, who is useable for most of the game, the first character playable post-Time Skip, has plenty of voiced dialogue rivaling Heero Yuy and has a lot of scenarios that places him center stage. By the end of the game, he is basically the most developed character in the entire cast. • Stationary Boss: Shu, as usual; however, the first time players fight him in Alpha Gaiden, he will move if unprovoked for a while. • Suspicious Video Game Generosity: Scenario 36 of Alpha Gaiden is noted by players to be one of the best points in the game. The Mazinkaiser, Shin Getter Robo, R-1 Custom, Gundam X and Gundam Double X (alongside the G-Bits, if the requirements are met), the "HPHGCP" part and two free units that give tons of "Blue Stones" for the Bazaar are acquired. The game's Difficulty Spike starts to go wild from that point on. • The Starscream: Euzeth in Alpha; Shiva Gozzo also pulls this off in Alpha 3, although the one he usurped was only a mask for the real Big Bad in the first place. • Theme Naming: Obviously, the "Space Jews" of the Ze Balmary Empire. A much more subtle one is the naming scheme of Ingram and his clones. Their real names correspond to their numbers and the respective letter in the Hebrew alphabet. Ingram, the first clone, is "Aleph"; Villeta, the second, is "Bet" Vadim; Cobray, the sixteenth, is "Ayin". • The World Is Always Doomed: Goes into overdrive in Alpha 3 with the concept of "Apocalypsis", a galaxy-wide force of destruction exploited by Keisar Ephes. • True Final Boss: Shu in Alpha Gaiden • Unwitting Pawn: Exalted Ruler Olban is manipulated by Emperor Zu Zambojil and the Dark Horror Army. Mind you, the latter two intend to use his race as shock troops to weaken the Earth's defenders, then enslave or exterminate them. Meanwhile, the Yamatai Kingdom end up as pawns themselves to the Mycenae Empire. • Villain Team-Up • Villainous Valor: A few examples; besides the obvious suspects among Noble Demon opponents and redeemable villains, a number of stalwartly evil characters, including the Great General of Darkness, General Bat and Queen Himika deliberately sacrifice themselves to ensure a victory for their side. • Wake-Up Call Boss: At least one in every game • Alpha has the Dragonsaurus from the crossover movie between Getter Robo G, Great Mazinger, and Grendizer, fought in Scenario 12 of the South Ataria Route. 28000 HP with large "HP Regeneration"note , hits like a truck and can be exceptionally difficult to damage due to it being underwater. • Alpha Gaiden has Shu and the Granzon/Neo Granzon early in the game, but it's Gym in the Turn X that fits this trope better, as he sets the trend where late-game bosses will spam recuperating Spirit Commands repeatedly and destroying them will be multi-turn affairs. • Alpha 2 has the Death Gale unit. Without proper planning, attacks from them can be devastating since the accuracy from Giri Gadeucca Aspis's Quavarze is increased due to Rosemary Raspberry providing a supporting squad-attack with the Abijo (which will also eat up any "Support Defend"note  players hope to use). Barnes Gernsback with the Tortuga has high HP, armor rating, strong counterattacks, and multiple ranks in "Support Defend", meaning he can intercept any attack players attempt to send at Gigi or Rosemary's way first. • Alpha 3 has Ephesus Judecca Gozzo and Ace Gozzo in their Hemrodr and Devariim, respectively, in Scenario 14. The Devariim has several MAP Attacks (all post-movement) at its disposal and while it's hardly difficult to destroy, the problem is Ace's Will skyrocketing too high and letting him take action during the enemy turn. The Hemrodr has a MAP Attack of its own with a long, wide firing range that limits the number of units that can attack it safely, along with "HP Regeneration" to take the edge off the damage players do inflict to it. Worth mentioning is the Hemrodr is a battleship, and players will be seeing more of these down the line when fighting groups of Balmar enemies. • Wham Episode: In Alpha Gaiden, this comes around post-scenarios 9 and 10, where up until this point, the game seemed to be about a conflict with the Titans until Shu appears, announces they are in an alternate timeline and the only way to solve it is by using millions as a sacrifice. When he's defeated, he teleports Londo Bell to a Bad Future where the Earth is a barren wasteland. • What If?: The Alpha series basically poses this versus the "Classic Timeline", in regards to Divine Crusaders' leader Bian Zoldark being listened to instead of being ignored. • What the Hell, Player?: When fighting Shu for the first time in Alpha Gaiden, he will accuse the player of cowardice if five turns pass before attacking him. In Alpha 2, rejecting Haman's offer for an alliance also leads to one, since Londo Bell's actions in the original game were what convinced her there was a better way than the rat race. We'll go into the space over our future. We're looking for the place under the shining star. We'll try to sing a song for our new world.
global_05_local_5_shard_00000035_processed.jsonl/1109
WMG: Kick Buttowski Wade has been seriously abused and/or neglected his entire life. He's made subtle complaints about his stepmom a time or two, and the episode "Live in Wade," he gets kicked out by his stepmom and explicitly states that he has never slept in a bed before, and that he has night terrors, which are commonly caused by abusive situations. Kick has some sort of terminal illness His love of stunts has gotten to such an extreme because either he wants to get the most out of life and figures he'll be dying prematurely anyway, or he would rather die a cool death than be overtaken by some lame illness. Kick is "extreme" because he is overcompensating for something. He has already been insecure about his height. What if this applies to his other body parts too? Or, he could simply be an Armored Closet Gay. • What about the one where he fell for that daredevil, stunt double female. • Isn't he too young to worry about that or care? • Given how low his voice is, his worries very well could be just the opposite. Kick is purposefully speaking lower than his voice actually is. Some of his 'oof's sound way higher than they should. Kick isn't human. He was made by the government to be able to do more, and survive more, for whatever reason. He was locked away in Mellowbrook ala Truman Show Plot to be subtly made into an awesome dude with awesome skills, as it is the perfect place for all fear to be lost. His desire to become a daredevil was unexpected but not unwelcome. Kick is really a blond. Another reason he wears a helmet is because he's ashamed of it. He doesn't wanna be called a Dumb Blonde, or it's So Beautiful, It's a Curse. Either way, he deserves to be the leader of the Blonde Brigade.
global_05_local_5_shard_00000035_processed.jsonl/1110
YMMV: Ask Dr Rin Inexact title. See the list below. We don't have an article named YMMV/AskDrRin, exactly. We do have: If you meant one of those, just click and go. If you want to start a YMMV/AskDrRin page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those.
global_05_local_5_shard_00000035_processed.jsonl/1111
YMMV: Dino-Boy • Anvilicious: Some of the episodes can tend to this. • Moral Event Horizon: Monkey crossed this and never looked back. But particular mention must go to when he lures Talon to a construction site, and proceeds to nearly beat her to death with an iron rod. Complete with creepy singing. • Nightmare Fuel: When Richard Kranley first transforms into Parasite, becoming a virus Half-Human Hybrid. Or when Monkey crosses the Moral Event Horizon with Talon...
global_05_local_5_shard_00000035_processed.jsonl/1112
YMMV: The Foreigner • Crowning Moment of Awesome (Charlie has many: "Gonna look into your bones when the bees come down!" and of course "KLATU! BARADA! NIKTO!) • Crowning Moment of Funny (Charlie's story, and how) • Narm (David shouting "I wanted it to be a surprise!", and Charlie's reaction to what we believe is his wife's death, until we find out that she ran off with a proctologist, making his reaction a little more understandable. • which says something about her or the proctologist: Either he picked the right career or Mary was really desperate. • The Woobie (Charlie and Ellard both qualify for this)
global_05_local_5_shard_00000035_processed.jsonl/1114
[Twisted-Python] PB, t.web tracebacks with Debian 1.1.0alpha Moshe Zadka twisted at zadka.site.co.il Thu Oct 16 13:36:35 EDT 2003 On Thu, 16 Oct 2003, Alex Levy <mesozoic at polynode.com> wrote: > Moshez pointed out that the problem I'm having, originally listed here > <http://www.twistedmatrix.com/users/roundup.twistd/twisted/issue345>, is > not a bug, but a feature. I'm posting my code; could someone explain > what I'm doing wrong? Well, apparently there was a bug in the CGI code. I'm guessing m-t works with CGI? In any case, you should move the server to new application: from twisted.application import service, strports > file = static.File('./site') > site = server.Site(file) > application = app.Application('movabletype') application = service.Application('movabletype') s = strports.service('unix:/home/mesozoic/.mt', More information about the Twisted-Python mailing list
global_05_local_5_shard_00000035_processed.jsonl/1117
Browsing by Subject Contract of employment or enter first few letters:   Showing results 1 to 1 of 1 Issue DateTitleAuthor(s) 2010Transfer of business, trade or undertaking and its effects on contract of employmentLetsoalo, J.H.; Mohlabi, Glynn Stephen Mabuela
global_05_local_5_shard_00000035_processed.jsonl/1124
P.A.P.A., after "Blowup: Every Artist, A Journalist" (2011); photo: Jan Sprij Document Actions Mailinglist: Subscribe to the English or Dutch version. Related Items Radioscape IV Radioscape is an immersive electromagnetic environment (2004) by Edwin van der Heide. Dream Kitchen S.S.S. (Sensors Sonics Sights) is the trio consisting of Atau Tanaka, Cecile Babiole and Laurent ... OLFACTOSCAPE - deconstructing Chanel No. 5 - (2012) is a work by Maki Ueda. Images (larger than) 1:1 Marrow and Bone Marrow & Bone is research project and form experiment by Ishèle Levy and Lee Rammelt, aiming at ... Nuzzle Afar Description of Masaki Fujihata's 3D virtual environment "Nuzzle Afar," published in "The Art of ... Variable Media: Lecture by Lev Manovich Nov 03, 2005 07:00 PM In November 1994 Lev Manovich gave one of his first public lectures at V2_. 11 years later Manovich ... Face Your World "Face Your World" (2002-2003) is a community project for children by Jeanne van Heeswijk (NL). Passage Sets/One Pulls Pivots At The Tip Of The Tongue "Passage Sets/One Pulls Pivots At The Tip Of The Tongue" (1994 - 1995) is an interactive ... Navigating the Collective Unconscious Nuzzle Afar, Distant Affairs and Greetings 'Nuzzle Afar, Distant Affairs and Greetings' (1998) is a 3D environment created by Masaki Fujihata. Catalogue text about Herwig Weiser's "zgodlocator," published in "The Art of the Accident," 1998. oss/**** (1998) is a work by JODI, published in 1998 as a CD-Rom, and shown as an installation in ... more ... Personal tools Log in
global_05_local_5_shard_00000035_processed.jsonl/1155
Temples, Shrines and other structures of Ancient Kamakura Date of Submission: 01/10/1992 Category: Cultural Submitted by: Agency for Cultural Affairs - Government of Japan State, Province or Region: Kamakura-Shi, Kanagawa Prefecture Coordinates: N35 19 E139 34 Ref.: 370 Word File Kamakura was constructed by the samurai (warrior class) to be the seat of their political power. It is surrounded by hills to the north, east and west, and faces the ocean to the south. For this reason, it is ideally protected. The samurai government controlled all of Japan from here for over 150 years, and Kamakura became the center of politics, economy and culture. The samurai government of Japan continued from 1192 to 1868, during which period the cities of Kamakura and Edo were constructed to serve as places of administration. However, Edo later changed into the modern city of Tokyo, so that the only remaining place where one can find a grouping of cultural properties reminiscent of samurai culture is the area around Kamakura. Today one may see in Kamakura the Tsurugaoka Hachiman-gu (Tsurugaoka Hachiman Shrine), which was at the center of the city plan, and Wakamiya Oji, a large avenue that stretches from the front of the shrine toward the sea. There are a number of temples and temple sites like Kenchoji, Enkakuji, Kotoku-in and Yofukuji, built on the surrounding hillsides, as well as sites of houses belonging to the samurai in power at the time. Also in the surrounding hills are steep pathways, known as the Kamakura Nakakuchi, which served as routes to the outside. Along the ocean front there is Wagae-jima, a port site.
global_05_local_5_shard_00000035_processed.jsonl/1164
Valiance Keep Revision as of 23:21, April 23, 2014 by XxSMOKERxX35 (Talk | contribs) 102,769pages on this wiki Alliance 32 Valiance Keep Valiance Keep RacesIconSmall Human MaleIconSmall Human Female Human IconSmall Dwarf MaleIconSmall Dwarf Female Dwarf IconSmall Gnome MaleIconSmall Gnome Female Gnome IconSmall NightElf MaleIconSmall NightElf Female Night elf IconSmall Draenei MaleIconSmall Draenei Female Draenei RulerGeneral Arlos AffiliationAlliance Vanguard LocationSoutheastern Borean Tundra [57, 69] Sources: Wrath of the Lich King Valiance Keep is the major Alliance settlement in the Borean Tundra,[59, 65] similar to Warsong Hold for the Horde. It has a large icebreaker in the center of the town and has regular transport service from Stormwind Harbor via another icebreaker, The Kraken. Valiance Keep is one of the two primary ports of entry for the Alliance in Northrend (the other being Valgarde in the Howling Fjord, far to the east) and serves as the headquarters for the Valiance Expedition — the main armies of the Alliance in Northrend, under the personal command of King Varian Wrynn. The king remains in Stormwind, leaving his forces on the front lines under the command of his subordinates: Highlord Bolvar Fordragon, who commands the Alliance siege at Angrathar the Wrathgate, and General Arlos, who commands Valiance Keep itself. The Keep is besieged from without and within by the armies of the Lich King. Outside the walls, the Scourge's nerubian armies dig their sinkholes to provide an underground line of reinforcements for their siege, while they send their flyers to pound the inner defenses. From within, the Cult of the Damned and The San'layn attempt to undermine the Alliance command structure, and has unleashed the plague upon the town of Farshire that provides front-line supplies to the Keep. Travel connectionsEdit Neutral 15 Amber Ledge Official alliance mini-icon Fizzcrank Airstrip Official alliance mini-icon Stars' Rest Neutral 15 Unu'pe Official alliance mini-icon Stormwind Harbor NPCs of Valiance KeepEdit Quest giversEdit Goods and servicesEdit Additional charactersEdit • A section of Valiance Keep is given the name Inner Hold in a quest. • This town was originally called "Justice Keep", but Blizzard reconsidered and gave it its current name. Justice Keep was given to the tower built at Crusaders' Pinnacle. Whether there was an existing name conflict, or whether the name was simply appropriated after the renaming, is unknown. • Most of the cannons in the keep can be fired, producing a small muzzle flash and a sound effect. They then need a moment to reload before they can be fired again. Around Wikia's network Random Wiki
global_05_local_5_shard_00000035_processed.jsonl/1278
| | Darden Restaurants: Formula for Growth October 16, 2010 John Caron, chief marketing officer, Darden Restaurants, discussed how Darden manages their six, very different brands successfully. Members Only Content User Name (email): Relevant Topics
global_05_local_5_shard_00000035_processed.jsonl/1285
Hand Of Doom Testo Testo Hand Of Doom Amici, ecco i finalisti What you gonna do? Time's caught up eith you Now you wait your turn, you know there's no return Take your written rules, you join the other fools Turn to something new, now it's killing you First it was the bomb, Vietnam napalm Disillusioning, you push the needle in From life you escape, reality's that way Colours in your mind satisfy your time Oh you, you know you must be blind To do something like this To take the sleep that you don't know You're giving Death a kiss, Oh, little fool now Your mind is full of pleasure Your body's looking ill To you it's shallow leisure So drop the acid pill, don't stop to think now You're having a good time baby But that won't last Your mind's all full of things You're living too fast go out enjoy yourself Don't bottle it in You need someone to help you To stick the needle in, yeah Now you know the scene, your skin starts turning green Your eyes no longer seeing life's reality Push the needle in, face death's sickly grin Holes are in your skin, caused by deadly pin Head starts spinning 'round, you fall down to the ground Feel your body heave, Death's hands starts to weave It's too late to turn, you won't want to learn Price of life you cry, now you're gonna die!
global_05_local_5_shard_00000035_processed.jsonl/1299
Isn't the Calumet 540 the square rail model made by Cambo? The parts are interchangeable with the square rail Cambo models and the bellow and backs are interchangeable with all Cambo models. I believe the round rail model is the Calumet CC400. If it's the square rail model I would keep it,you can find rails from 12 inches to 30 inches and bellows from bag bellows to extra long bellows. It's a very versatile camera.
global_05_local_5_shard_00000035_processed.jsonl/1319
New York Kouros Gallery Exhibition Detail 23 East 73rd Street New York, NY 10021 March 3rd, 2011 - April 2nd, 2011 Flower, Lin EmeryLin Emery, Flower, 2008, polished aluminum, 80 x 42 x 30 inches © Courtesy of the artist & Kouros Gallery upper east side Tues - Sat, 11 -6 New Orleans artist Lin Emery seeks to capture the energy inherent in nature in her kinetic sculpture. Not only does her iconography rely on natural shapes, but it is the forces of nature such as wind or water that set her sculptures in motion. Movement, or kinetic activity, whose aim is to express harmonic patterns visually, is the central element for Emery. The highly polished surfaces of her welded aluminum sculptures invite a dialogue between the industrial character of their construction and the organic connotations that the works evoke. Although her sculptural forms are abstracted from nature, her work has always had a relationship to modern science and mathematics and chaos theory, which deals with the elements of predictability and unpredictability. Referring to these ideas, the English critic, Edward Lucie-Smith wrote "The motions made by her wind-powered sculptures are similarly unpredictable, within a given set of rules, in this case, being the actual form of the piece and how many moving elements it possesses. The constantly changing relationships of the different parts have an almost hypnotic effect, constantly teasing the eye, which can never quite guess what the next configuration will be... As one looks at them, the sculptures take on the qualities of living, growing, natural things." Emery begins each of her large-scale public sculptures with a scaled-down model. Rather than employing industrial fabricators to execute the final sculpture, she insists on hands-on-control of every stage of the process, working with her own crew. Her sculptures employ a new system of bearing assemblies that she developed in order to manipulate the elements so that they move freely and randomly in space. In 1996 Lin Emery had an acclaimed comprehensive retrospective exhibition at the New Orleans Museum of Art. In 1997 her 10 meter kinetic sculpture commissioned for the Osaka Dome, Japan, was awarded the Osaka Grand Prize for Public Sculpture. Her work is in many major public and corporate collections in the United States, as well as the Far East and Europe.
global_05_local_5_shard_00000035_processed.jsonl/1326
A Sprightly Explanation for UFOs The appearance of a "sprite," flashing above a distant thunderstorm. Credit: American Friends of Tel Aviv University Thunderstorms, says Prof. Colin Price, head of the Geophysics and Planetary Sciences Department at Tel Aviv University, are the catalyst for a natural phenomenon called "sprites." He and his colleagues are one of the leading teams in the world studying the phenomenon, and Prof. Price leads the study of "winter sprites" – those that appear only in the northern hemisphere’s winter months. "Sprites appear above most thunderstorms," explains Prof. Price, "but we didn’t see them until recently. They are high in the sky and last for only a fraction of a second." While there is much debate over the cause or function of these mysterious flashes in the sky, they may, Prof. Price says, explain some bizarre reports of UFO sightings. An Electrifying Discovery Credit: University of Alaska, Fairbanks "Lightning from the thunderstorm excites the electric field above, producing a flash of light called a sprite," explains Prof. Price. "We now understand that only a specific type of lightning is the trigger that initiates sprites aloft." "Sprites, which only occur in conjunction with thunderstorms, never occur on their own, and are cousins to similar natural phenomenon dubbed by atmospheric electricians as ‘elves,’ ‘goblins’ and ‘trolls,’" Prof. Price says. These flashes are so named because they appear to "dance" in the sky, which may explain some UFO sightings. Candles on a Celestial Birthday Cake Credit: University of Alaska, Fairbanks Tel Aviv University’s research team is one of the leading global groups studying the phenomenon. But Prof. Price and his students are now working in collaboration with other Israeli scientists from The Open University and The Hebrew University to take three-dimensional pictures of sprites to gain a better understanding of their structure. Using remote-controlled roof-mounted cameras, the researchers are able to look at the thunderstorms that produce sprites when they are still over the Mediterranean Sea. From their unique vantage point in Israel, the researchers are leading the world in the study of winter sprites. Prof. Price’s new camera techniques, in particular, have revealed the sprites’ circular structures, which are much like those of candles on a birthday cake. Using triangulation, Prof. Price and his team have also been able to calculate the dimensions of the sprites’ features. "The candles in the sprites are up to 15 miles high, with the cluster of candles 45 miles wide – it looks like a huge birthday celebration!" Because of their high altitude, sprites may also have an impact on the chemistry of the Earth’s ozone layer. "Since they are relatively infrequent, the global impact is likely small," says Prof. Price. "But we’re researching that now." This story has been translated into Portuguese.
global_05_local_5_shard_00000035_processed.jsonl/1331
Atheist Nexus Logo Do you remember what you were doing that day? Views: 324 Replies to This Discussion Yeah, after that happened everything has changed. I was at work. I was a phone surveyor that year. Can't get more embarrassing than calling people up to do stupid surveys on a day like that. Luckily we were sent home early. I was getting ready for work. I was in bed when my wife (then girlfriend) woke me up to tell me that a plane hit one of the WTC towers.  I was watching the news for about 10 minutes before the other plane hit.  So, long story short, I was sitting in my boxer shorts on the edge of my bed, when I realized that this wasn't just some horrible plane crash, this was so much bigger. I was teaching high school science. The decision to send student home early was made, but because this required buses to come at an unexpected time, few students actually got home early who could not walk or take public transport. I can't forget one student, her face lit with joy, so excited to get out of school early. It struck me how not all of the students grasped what was happening. Oh, Ruth!  I can't imagine what it would have been like having high school children in your care while learning such news.  I'm not surprised some were more excited about missing school... this news took a while to sink in with me.  It wasn't until my husband mentioned our dear friend (who is a NYC firefighter and used to work at the station adjacent to the WTC) that I even considered to call him.  It just didn't register.  I felt so bad that I forgot about him.  Turned out he was transferred to another station a few weeks prior, and didn't arrive at the scene until the 2nd tower collapsed.  He survived, yes, but he lost so many friends and fellow firefighters.  It was so difficult for him. Ruth -- Yes, it's apparent that she did not really understand what was happening.  Maybe when she got home and actually saw it on TV that she realized the gravity of the situation. Ruth. The same thing happened in at least one elementary school when the students were sent home after JFK was murdered.  They didn't grasp what had happened, they might not even have been told...just knew they were getting a day off. I had the day off from work so I was sleeping in that morning. All of a sudden my dad bursts into my room yelling "WE'RE BEING ATTACKED!! GET UP!!!" I LITERALLY jump out of bed, grab a bat I keep in my room and go running upstairs read to swing it over some peoples heads like there's no tomorrow only for my dad to point at the TV and say to watch it. I had been employed as a Tool & Die Maker in an Easthampton, MA machine shop on the morning of Sept. 11th. Around mid-morning, a fellow worker who had a radio in his work area told me that a plane had crashed into the World Trade Center. From the way he described it, the incident sounded like an accident involving a small plane that had deviated from its flight path. About half an hour later he came back to my corner to tell me that another plane had crashed into the second WTC tower. This time I went to his work area and listened to the radio coverage of the incident. By then, the station's regularly scheduled programs had been cancelled so that news coverage of the attack could continue uninterrupted. Soon afterwards, we were all told to go home so that we could follow the news on TV. I got home around noon. Every TV station was reporting live on the situations in New York and Washington. I kept switching between news stations for the next six hours, trying to get the most detailed coverage of the afternoon's reports. All the while, I had my VCR taping continuously. By 6:00 p.m. I had had enough and switched off the TV. A great depression had come over me. A few months later I destroyed all the tapes I had recorded, deciding that they'd be too depressing to watch. I didn't mention that my sons attended a Ukrainian Catholic school (K - 12 & Byzantine).  In spite of having TVs in many classrooms and many older students asking to watch the news coverage, they didn't allow it and didn't really talk about it at all - my sons shared this with me when I picked them up that afternoon.  Makes me wonder if the teachers didn't want to try to do damage control and try to explain why such a loving god would kill 3,000 innocent people...... I was still asleep. (I live on the West Coast...3-hr time difference) A friend who is more of a TV news junkie than I am called and just said, "Turn on the news!" and hung up.  So I turned on the local NBC station, and they were showing replays of various tapes of the obscenity.  By that time they had some idea of who had done it, and all I could think was, "They used planes full of passengers as bombs?!?  Unspeakable!" Actually, I think it took days or weeks to grasp the horror completely.  If I ever did. One of the best comments I saw was a photograph of both Towers engulfed in smoke, with a caption that read, "A Faith-Based Initiative" PS: I was thoroughly disgusted with all the flag-waving that went on afterward...especially the car-window flags that I saw all over town.  And all the "foreign" shopkeepers felt it was necessary to put "God Bless America" stickers on their doors and windows to keep from being vandalized by "Real Amurricanz.".  That was depressing. A lot of so-called patriots behaved abominably. I'm still ashamed. Support Atheist Nexus Donate Today Help Nexus When You Buy From Amazon Nexus on Social Media: Badges  |  Report an Issue  |  Terms of Service
global_05_local_5_shard_00000035_processed.jsonl/1335
Atheist Nexus Logo To create the entire multiverse comprising several universes and our visible universe with 200 billion galaxies, each galaxy with 200 to 400 billion stars, each star with its planets and to create life on some planets, is a stupendous task for any creator. Such a creator cannot be a simple entity. It has to be a very complex entity. We have seen that simple molecules combine to make powerful chemicals. Simple cells combine to make powerful life-forms. Simple electronics combine to make powerful computers. Logically, all things are created by a combination of simpler, less capable components. Therefore, a supreme being must be our future, not our origin! And you know what? If there is a God, and it's that same God who's so eager to have temples built in honor of his greatness, and wars fought over him, and people dropping to their knees telling him what a wonderful, magnificent being he is? If this all-powerful, all-knowing creature for some reason just can't get by without my worship? Let’s face it; God has an ego problem. Did he create us so that he will be always have some "captive slaves" to worship him? One day, in my teens, when I was praying, it suddenly occurred to me that I was talking to only myself. There is no one there to receive my prayers. That was a revelation. I realized that whatever we cannot easily understand we call God; this saves much wear and tear on the brain tissues. And "God only knows" that we need to conserve our brain resources to fight for our survival in this world, which is the top most priority for us. I realized that God for us is where we sweep away all the mysteries of the world, all the challenges to our intelligence. We simply turn our mind off and say God did it. God is an ever receding pocket of scientific ignorance. If you're an atheist, you know, you believe, that this is the only life you're going to get. It's a precious life. It's a beautiful life. It’s something we should live to the full, to the end of our days. Whereas if you're religious and you believe in another life, that means you don't live this life to the full because you think you're going to get another one. That's an awfully negative way to live a life. Being an atheist frees you up to live this life properly, happily and fully. What used to be 'demonic possession' is now known to be neuro-psychological disorders. What used to be 'divine wrath' is now known to be the Earth's geological and meteorological processes. What used to be 'curse' is now known to be microbial infections. What used to be a 'miracle' is now known to be a hoax. What used to be 'god' is now known to be an excuse to solicit money from ignorant people. By all means let's be open-minded, but for "God's sake", not so open-minded that our brains drop out. Views: 47 Join Atheist Nexus Support Atheist Nexus Donate Today Help Nexus When You Buy From Amazon Nexus on Social Media: Badges  |  Report an Issue  |  Terms of Service
global_05_local_5_shard_00000035_processed.jsonl/1396
Entertainment & Arts Cannes Film Festival to open amid 'sexism' row A picture of the Palme d'Or trophy The Palme d'Or will be awarded on 27 May Workers unroll the red carpet in Cannes The red carpet is rolled out for the stars at the entrance of the Palais des Festivals Andrea Arnold Fish Tank director Andrea Arnold was also behind a recent adaptation of Wuthering Heights He has been nominated 11 times, last winning the Palme d'Or in 2006 for the IRA drama The Wind That Shakes The Barley. Past winners Michael Haneke and Jacque Audiard - who won the jury's Grand Prize for his film A Prophet in 2009 - are also in the running. Canadian David Cronenberg is in competition with his film Cosmopolis, starring actor Pattinson, while Cronenberg's son Brendan is competing in the Un Certain Regard category - which awards new talent - with his film Antiviral. Two female film-makers join him in that category: France's Catherine Corsini and Sylvie Verheyde. Related Internet links The BBC is not responsible for the content of external Internet sites
global_05_local_5_shard_00000035_processed.jsonl/1419
A brighter future for LEDs The light-emitting diode has long promised cleaner, cheaper light. New advances are making good on that promise. February 26, 2007 | The light-emitting diode (LED) has come a long way and hasn't even reached its 45th birthday. Long the preferred lighting device for consumer electronics, solid-state LEDs (many tiny LED chips clustered together to form a light source) are starting to find acceptance in architectural and commercial lighting. The advantages of LEDs are that include operation on milliamps of electric current, they create almost no heat output, deliver an average of 32 lumens of light from a single watt of electricity, and they burn about 50 times as long as the average incandescent bulb. The Department of Energy estimates that LED lighting could reduce U.S. energy consumption by 29% by 2025, slicing $125 billion off our national energy bill in the process. But the promise of the LED hasn't been fulfilled. LEDs are still too expensive for most applications due to the cost of the materials needed to build them. Currently, LEDs are still more expensive, in lumens per dollar, than more conventional lighting technologies. LEDs couldn't even produce white light until the early '90s, and even then the process didn't produce a bright, white light that doesn't have blue or yellow edges. But advances in materials and energy efficiency over the last five years are finally unlocking the commercial and architectural lighting potential of the LED. A growing number of Building Teams are starting to adopt LEDs, especially for niche applications, where long life and the ability to operate with very little maintenance. Recent advances in university research have the potential to help LEDs to replace incandescent light bulbs in the next five to seven years. “Most of the advances have come in light extraction from the chip,” said Dr. Nadarajah Narendran, director of the Lighting Research Center at Rensselaer Polytechnic Institute in Troy, N.Y. “The problem has been that too much of the photon light created in a semiconductor chip has been stuck in the chip. Over the last three to five years we've seen increases in light output per chip. If we can get more light out of the chip, then the cost goes down in terms of how much light it produces. Then it can be used in more applications.” Better light, same chip Last June, Cree Lighting of Durham, N.C., reported results of 131 lumens per watt from a white LED source. The results were confirmed by the National Institute of Standards and Technology in Gaithersburg, Md. Tests were performed using prototype white LEDs with Cree EZBright LED chips. “This is the highest level of efficacy that has been publicly reported for a white LED and raises the bar for the LED industry,” said Scott Schwab, Cree general manager of LED chips. Incandescent light bulbs typically use 10 to 20 lumens per watt and compact fluorescent bulbs usually range from 50 to 60 lumens per watt. If LEDs can consistently produce so much more light per watt, then they, indeed, have a bright future. Philips LumiLEDs of San Jose, Calif., and GELcore, based in Cleve-land, also have produced high lumen-per-watt white LEDs, but none with results as high as Cree's. Why is it so important that the light be white? Because the color of an LED's light is determined by the materials creating the positive-negative electrical junction that produce it. LED manufacturers have struggled to find a proper material to create clean, white light comparable to what fluorescent and incandescent bulbs produce. Nichia Corp. of Japan first created white LEDs (using augmented light from blue chips) in 1993 using gallium nitride and indium gallium nitride, but almost no LEDs are produced using this method today. Most of today's white LEDs are produced by a blue light LED chip with phosphors that produce yellow light. When bonded together they produce a beam of white light. But even this solution doesn't produce combined, pure white light. You can still see the yellow and blue edges of the light sources. In June 2005, Philips LumiLEDs patented a proprietary phosphor conformal coating process that gives its LEDs a more consistent spectrum of white light for its Luxeon product line. The closely guarded bonding process eliminates the problem of varying phosphor thickness around the LED chips enabling Philips's LEDs to produce correlated color temperature measurements (a test of color variation of light sources) that show conventional white LEDs have roughly 15 times more color variation than white Luxeon emitters. The company has even started marketing its white LED products in a line of tiny chips, available at home-decorating stores, that customers can place in tinted candle holders to create the illusion of candlelight without the wax and fire hazard. Solid uses for solid-state light While cost is still a prohibitive factor for widespread LED adoption, the technology has been used for decades in consumer electronics and is now being embraced for high-visibility and high-energy consumption uses like grocery case lights. Wal-Mart recently announced that it will outfit low- and medium-temperature refrigerated display cases in more than 500 of its U.S. stores with a GE ecomagination-certified LED system from GELcore, the LED business unit of GE. Wal-Mart is the first GELcore customer to roll LEDs out in a widespread application, but 20 other grocery customers, including eight of the top 10 chains in the nation, are already using ecomagination LED systems. Wal-Mart expects to net up to 66% energy savings from the retrofit. The savings are expected to come from occupancy sensors and dimming systems as well as electricity savings from the LED system itself. Grocery chains such as Giant Eagle and Albertson's that are already using LEDs in grocery cases have said that LED light gives their products a better presentation than fluorescent light. Because LEDs produce less heat, grocers don't need to offset the heat they create with higher refrigeration energy costs. Maintenance-intensive applications like traffic lights and signals have been turning to LEDs to save energy. Kentucky and Delaware currently use LEDs in all traffic signals statewide. Outdoor concert and art lighting designers often use LEDs because of their light direction capabilities. “In addition to better phosphors, we're seeing more applications where the advantages of the LED, less maintenance, less energy, are being taken advantage of,” Narendran said. “With new technologies that are being developed right now, we're seeing advances that can make an impact in the market.” Will quantum dots replace the light bulb? Last year, Vanderbilt University graduate student Michael Bowers was asked to help a fellow researcher in the production of quantum dots, a special microscopic light-producing nanocrystal. Post-doctoral student and electron microscopist James McBride was interested in the way in which quantum dots grow. He thought that the structure of very small dots might provide him with new insights into the growth process, so he asked Bowers to make him a batch of small quantum dots that he could study. He sent Bowers back twice because the dots weren't small enough. Finally, Bowers made the smallest batch of quantum dots he knew how to create. The tiny quantum dots were relatively easy to make even though they are less than half the size of normal quantum dots. After Bowers cleaned up the batch, he pumped a solution containing the nanocrystals into a small glass cell and illuminated it with a laser. A white glow covered the table. The quantum dots were supposed to emit blue light, but instead they were giving off a beautiful white glow. The small size of the quantum dots that Bowers created turned out to be the perfect size to create white LED light. The Vanderbilt researchers are the first to report making quantum dots that spontaneously emit white light, but they aren't the first to report using quantum dots to produce hybrid, white-light LEDs. Researchers at many universities are studying the commercial viability of quantum dot white LEDs. University researchers are also studying the use of nanophosphors to achieve the same effect as quantum dots. Nanophosphors are just like the regular phosphors currently used to produce hybrid yellow-blue white LEDs, except that they're so small that they're only visible in the nanometer range. By interacting with LED substrates at that microscopic level, researchers believe nanophosphors can achieve the same effect as quantum dots because the properties of quantum dots and nanophosphors are so similar at that level. If nanophosphors can create less scattering and consistency of light in the LED package, they would significantly reduce the cost of spontaneous white LEDs because they would eliminate the expensive process of creating quantum dots. Evident Technologies of Troy, N.Y., is working with the Lighting Research Center at Rensselaer Polytechnic Institute on a project funded by the New York State Energy Research and Development Authority to produce quantum dot-based LED lights. “Part of what we're doing here [at the lighting research center] is setting realistic expectations,” Narendran, the RPI researcher, said. “The increases we've seen in light output per chip are certainly significant. When we can make an LED that has 100,000 or 200,000 hours of lifetime, it becomes equivalent to a building material.” How LEDs were invented In 1962 Dr. Nick Holonyak, Jr., working for the General Electric Corp., invented a semiconductor diode device that emits light in the practical visible spectrum. LEDs consist of a chip, made of semiconductor material, impregnated with impurities to create a junction. Electrical current flows easily from the positive anode to the negative cathode of the junction but not in the reverse direction. Electrical charge-carriers, electrons, and electron holes flow into the junction from electrodes with different voltages. When an electron meets a hole, it falls into a lower energy level and releases light energy in the form of a photon. In other words, when electrical current passes through them, LED chips illuminate, creating fast direct light that lasts much longer, about 50 times as long, and burns much brighter than conventional incandescent light bulbs. Many researchers were working at the time on semiconductor advances using infrared light. In interviews Holonyak has said, “I wanted to work in the visible spectrum, I wanted to actually see the light.” Holonyak is now the John Bardeen Endowed Chair Professor of Electrical and Computer Engineering and Physics at the University of Illinois at Urbana-Champaign, his alma mater. He worked with Bardeen, the only two-time winner of the Nobel Prize for physics, on semiconductor and superconductor technology throughout the late '80s. In 2002 Holonyak was awarded the National Medal of Technology. Holonyak is still innovating. In 2005, a research center was set up by the Defense Advanced Research Projects Agency (DARPA) to develop Holonyak's and Illinois colleague Milton Feng's proposed LET, light-emitting transistor. LETs and transistor lasers enable optical and electronic functions to be integrated on a single chip and could lead to the development of optical computers that can run 1,000 times faster than today's electronic computers. Add new comment Your Information Your Comment Filtered HTML • Lines and paragraphs break automatically. Plain text • No HTML tags allowed. • Lines and paragraphs break automatically. Overlay Init
global_05_local_5_shard_00000035_processed.jsonl/1447
1 Peter 3:1-7 ESV Wives and Husbands 1 Likewise, wives, 1be subject to your own husbands, so that 2even if some do not obey the word, 3they may be won without a word by the conduct of their wives, References for 1 Peter 3:1 2 when they see your 4respectful and pure conduct. References for 1 Peter 3:2 References for 1 Peter 3:3 4 but let your adorning be 6the hidden person of the heart with the imperishable beauty of a gentle and quiet spirit, which in God's sight is very precious. References for 1 Peter 3:4 6 as Sarah obeyed Abraham, 7calling him lord. And you are her children, if you do good and 8do not fear anything that is frightening. References for 1 Peter 3:6 7 Likewise, 9husbands, live with your wives in an understanding way, showing honor to the woman as the weaker 10vessel, since they are heirs with youa of the grace of life, so that your prayers may not be hindered. References for 1 Peter 3:7 • f 3:7 - Some manuscripts since you are joint heirs
global_05_local_5_shard_00000035_processed.jsonl/1491
Entropy: At the Rim of a Black Hole In the Craft • Broadcast in Lifestyle Follow This Show If you liked this show, you should follow MASONIC COMPANION. Call in to speak with the host (646) 381-4675 When a renowed physicist is asked to share his ideas, only fools would ignore the opportunity. In 2011, Professor Leonard Susskind  spoke to us to help us make sense of theoretical physics.  What is visible only accounts for a small amount of the total matter in the universe. The rest is called 'dark matter'.  If the remainder is absorbed into black holes, has all the information contained in that matter also disappeared?  It matters because all things are effected by certain laws. Until the Professor enlightened me, I had understood the universe is expanding, a process that included laws of entropy- laws hold atoms into molecular structure no longer effective as all matter reaches a point of homeostasis.   Entropy is better explained as a lost of information.  Much later, in another frame of mind, I began wondering. and today I want to ask for your help making sense of this. Over the years, has freemasonry been expanding according to laws that are not obvious, Has freemasonry has been effected  on a much smaller scale by laws of entropy?  Over the years, have we lost information into some sort of black hole?  Whether we have or not, can we retrieve it or has it disappeared? Universe of masonic thought?  We never did and do not exist in isolation. We have existed long before we were organized into bodies. But what forces influence our evolution, our expansion, our destiny? We really should talk...
global_05_local_5_shard_00000035_processed.jsonl/1536
The Square Root of Wonderful Test | Final Test - Easy Buy The Square Root of Wonderful Lesson Plans Name: _________________________ Period: ___________________ Multiple Choice Questions 1. Which character tries most to console Mollie in her most desperate, grieving time? (a) Mother Lovejoy (b) Sister (c) John (d) Paris 2. What does Mollie feel the new house will do to the relationship she has with John? (a) Provide an easier life (b) Test their strength (c) Bring them closer together (d) Help raise Paris 3. Where is Philip by the time Mollie rises? (a) He is in the kitchen (b) He has left (c) He is waiting in the car (d) He has gone to the barn 4. What is name of the character who first comments on the furnishings in Paris's house? (a) Sister (b) Mollie (c) Hattie (d) Mother Lovejoy 5. How does Paris describe the act of suicide? (a) It is inevitable for some people (b) It is an act of courage (c) It is an act of defeat (d) It is a weak act 6. What is Philip inevitably intending to do because he cannot solve his own problems? (a) Kidnap his son (b) Run away (c) Kill himself (d) Kill Mollie 7. What has Philip done to convince Mollie that he loves her? (a) Everything he can (b) Used his son to get to her (c) Threatened her (d) Become enraged with passion over her 8. What essentially trigger's Paris to decline his father's offer to leave together? (a) The color of Philip's face (b) The tone of Philip's voice (c) The cold touch of Philip's hand (d) The feeling in Philip's gut 9. What does Paris go to do after his father discusses love and nature with him? (a) To find Mother Lovejoy (b) To wake Sister (c) To get ready to go fishing (d) To rouse Mollie 10. What does the state of the furniture in Paris's house make it look like the family is in the throws of? (a) Refurbishing (b) Cleaning (c) Moving (d) Mourning 11. Why does Philip need Paris to accompany him? (a) To make his mother worry (b) To save him from himself (c) As payback to Mollie (d) To soothe him from fear 12. What is Philip ultimately seeking as he is making his escape and intending to end his life? (a) Happiness (b) Satisfaction (c) Acceptance (d) Comfort 13. Why is Mollie the square root of wonderful? (a) Because she is the source of passion (b) Because she is the source of growing love (c) Because she is the source of family (d) Because she is the source of pride 14. Who informs Philip that Mollie is prepared to leave? (a) Sister (b) John (c) Mother Lovejoy (d) Paris 15. What does Philip now see love and nature to be? (a) Uncontrollable (b) Pure joy (c) A struggle (d) Fleeting happiness Short Answer Questions 1. What is the best word to describe the scene between father and son when it becomes clear that Philip intends to kill himself? 2. What is literary device is employed in Paris's statement that his father does not look well? 3. What is the main realiziation that Philip has that pushes him over the edge? 4. What is John's profession of an architect a metaphor of? 5. How does Paris feel about his father's irrational behavior? (see the answer keys) This section contains 517 words (approx. 2 pages at 300 words per page) Buy The Square Root of Wonderful Lesson Plans
global_05_local_5_shard_00000035_processed.jsonl/1542
OT thread here.  I've noticed that other forums have OT threads, but for us, it's not as easy.  Why would we want to take a break from discussing music?  But it's Friday, and it's quiet.  I don't know about you, but IMO, the Boston / MA drivers are crazier in the summer, and they are already out in force.  I'm generally not one to complain, and it's not as though I lose sleep over any of this, but, let's put it this way: the state might as well remove all the STOP signs, because no one heeds them anyhow.  :P If you're feeling it, voice some of your favorite Boston driving maneuvers and some of the many <sarcasm on> courteous <sarcasm off> moves your fellow drivers make on the road.    And if you currently live out of MA, do the drivers in your state rival the nasty, rude, inconsiderate, hostile (need I go on?) MA drivers?    Drive safely and have a nice weekend.  :P
global_05_local_5_shard_00000035_processed.jsonl/1571
National Army Museum Museum, London, United Kingdom National Army Museum, museum of the British army. Established in 1960 at the Royal Military Academy, Sandhurst, it has occupied purpose-built premises since 1971 on Royal Hospital Road, Chelsea, London. The collections of the National Army Museum relate to all aspects of the British army from the Battle of Agincourt (1415) to the present day. They include material from the militia, yeomanry, volunteers, and territorial armies. The uniform and decoration collections are particularly outstanding. An important art collection of notable military personalities and events includes works by Thomas Gainsborough, Sir Thomas Lawrence, Sir Henry Raeburn, Sir Joshua Reynolds, and George Romney. There is also a strong section on the army in India and on the armies of the East India Company. At an "outstation," or branch museum, at Sandhurst, Berkshire, is the Indian Army Memorial Room. Another branch is utilized by army recruits at the Museum of Infantry, Catterick, North Yorkshire. The museum provides both permanent and temporary exhibitions. The story of the British soldier is told through a series of permanent galleries, the first of which brings the visitor through time from the 15th century to the redcoats of the American Revolution and the last to conflicts of recent years. Throughout the sequence, particular attention is paid to the individual soldier. Contributing to this focus are unusual personal relics, video recordings, scale models, and realistic life-size models. Thus, visitors can listen to recordings of soldiers’ songs; view life-size models and reconstructions of life in Wellington’s army during the Napoleonic era, in a Flanders trench during World War I, on a landing craft during the Normandy Invasion, or in the Burmese jungle during World War II; or see an exhibit on the role of women in war that includes orders, decorations, and personal jewelry belonging to Florence Nightingale. The orders, decorations, and uniforms of Edward VIII (the duke of Windsor) as well as those of a number of field marshals are also exhibited, as are the personal stories of more than 30 people awarded the Victoria Cross, Britain’s highest honour for valour in war. What made you want to look up National Army Museum? (Please limit to 900 characters) MLA style: "National Army Museum". Encyclopædia Britannica. Encyclopædia Britannica Online. APA style: National Army Museum. (2015). In Encyclopædia Britannica. Retrieved from Harvard style: National Army Museum. 2015. Encyclopædia Britannica Online. Retrieved 03 June, 2015, from Chicago Manual of Style: Encyclopædia Britannica Online, s. v. "National Army Museum", accessed June 03, 2015, Editing Tools: We welcome suggested improvements to any of our articles. National Army Museum • MLA • APA • Harvard • Chicago You have successfully emailed this. Error when sending the email. Try again later. Or click Continue to submit anonymously:
global_05_local_5_shard_00000035_processed.jsonl/1572
Alternate title: Friedrich Wilhelm Ostwald Scientific career In 1881 Ostwald was appointed a full professor of chemistry at the Riga Polytechnic Institute. In 1887 he accepted the chair in physical chemistry at the University of Leipzig, from which he retired in 1906. By the time he started his scientific career, chemistry, particularly in Germany, was dominated by synthetic organic chemistry, which was primarily concerned with investigating what products can be produced from chemical compounds. Ostwald recognized the lack of a more profound and quantitative understanding of general issues of chemistry, such as the selective forces (chemical affinities or activities) in chemical reactions, which he sought to achieve by applying physical measurements and mathematical reasoning. To that end, in 1875 he began studying the equilibrium point in an aqueous solution in which two acids compete to form an acid-base reaction with one base. Because chemical analysis would have changed the equilibria, he skillfully adapted the measurement of physical properties, such as volume, refractive index, and electrical conductivity, to indirectly analyze the reactions. The idea was not completely new, as the Danish chemist Julius Thomsen had already studied the heat of such reactions. Ostwald could, however, also draw on the important law of mass action, which had been recently proposed by the Norwegian chemists Cato Guldberg and Peter Waagey, for analysis of his experimental results. Ostwald extended and generalized such approaches, adapting physical measurements to issues of chemical dynamics, to create a program not only of his own chemical work but also of a new school of physical chemistry. In 1884 Ostwald received the doctoral thesis of Swedish chemist Svante Arrhenius on the electrical conductivity of solutions, which contained the bold claim that salts, acids, and bases dissociate into electrically charged ions when dissolved in water. The dissociation theory eventually became a backbone of the new school of physical chemistry, whose members were initially known as the “Ionists” and who soon counted Arrhenius himself among their members. Ostwald immediately recognized that if all acids contained the same active ion, then the differing chemical activities of various acids simply would be due to the concentration of active ions in each—and the concentration of active ions in turn would be dependent on the differing degrees of dissociation of the acids. In addition, if the law of mass action was applied to the dissociation reaction, a simple mathematical relation could be derived between the degree of dissociation (α), the concentration of the acid (c), and an equilibrium constant specific for each acid (k): α2/(1 − α)c = k. This is Ostwald’s famous dissolution law (1888), which he tested by measuring the electrical conductivities of more than 200 organic acids, thereby substantiating the dissociation theory. At the same time, the Dutch chemist Jacobus Henricus van ’t Hoff, who would join Ostwald and Arrhenius to form the “triumvirate” of the new physical chemistry school, suggested his theory of osmosis, according to which the osmotic pressure of solutions depends on the concentration of dissociated ions, in analogy to the pressure relationship obeyed by a perfect gas. Putting his theory on general thermodynamic grounds, van ’t Hoff also derived Raoult’s laws of vapour pressure, which assert that adding a solute to a liquid lowers its freezing point and raises its boiling point because of a reduction in the solution’s vapour pressure. (For instance, seawater has a lower freezing point and a higher boiling point than fresh water.) Through the combination of the triumvirate’s work, the new physical chemistry grew to a comprehensive theory of solutions based on both thermodynamics and dissociation theory. Ostwald was especially successful in systematizing the subject of physical chemistry, applying it to other fields, and organizing a school. This was particularly important, as most chemists rejected the dissociation theory on partly justified grounds, such that convincing them required both concessions about its restricted validity and proofs of its broad usefulness. In various textbooks on general, inorganic, and analytical chemistry, Ostwald presented the new ideas not only in a comprehensive form as a new branch of chemistry but also as an extremely fruitful approach to classical issues. He particularly revolutionized analytical chemistry through solution theory and his theory of indicators. His Zeitschrift für physikalische Chemie (“Journal for Physical Chemistry”), founded in 1887, rapidly established itself as the standard journal in the field. Furthermore, the Leipzig Institute of Physical Chemistry attracted students and researchers from around the world. Educated in both the new ideas and experimental skills, numerous students of Ostwald later became professors of physical chemistry in many countries. Ostwald’s later work on catalysis originated from early attempts at taking reaction velocities as a measure of chemical activity. As that turned out to be wrong on thermodynamic grounds, he broadly investigated temporal aspects of chemical reactions and provided a systematic conception of the field. He first recognized catalysis as the change of reaction velocity by a foreign compound, which allowed him to measure catalytic activities. He distinguished catalysis from triggering and from autocatalysis, which he considered essential to biological systems. His most famous contribution to applied chemistry was on catalytic oxidation of ammonia to nitric acid, a patented process that is still used in the industrial production of fertilizers. What made you want to look up Wilhelm Ostwald? (Please limit to 900 characters) Please select the sections you want to print Select All MLA style: "Wilhelm Ostwald". Encyclopædia Britannica. Encyclopædia Britannica Online. APA style: Wilhelm Ostwald. (2015). In Encyclopædia Britannica. Retrieved from Harvard style: Wilhelm Ostwald. 2015. Encyclopædia Britannica Online. Retrieved 03 June, 2015, from Chicago Manual of Style: Encyclopædia Britannica Online, s. v. "Wilhelm Ostwald", accessed June 03, 2015, We welcome suggested improvements to any of our articles. Wilhelm Ostwald • MLA • APA • Harvard • Chicago You have successfully emailed this. Error when sending the email. Try again later. Or click Continue to submit anonymously:
global_05_local_5_shard_00000035_processed.jsonl/1573
The Brill Building Building, New York City, New York, United States Thank you for helping us expand this topic! This topic is discussed in the following articles: • The Brill Building: Assembly-Line Pop The Brill Building: Assembly-Line Pop Located at 1619 Broadway in New York City, the Brill Building was the hub of professionally written rock and roll. As the 1960s equivalent of Tin Pan Alley, it reemphasized a specialized division of labour in which professional songwriters worked closely with producers and artists-and-repertoire personnel to match selected artists with appropriate songs. • Diamond Neil Diamond ...his final year to take a job as a staff songwriter for the Sunbeam Music Company. His tenure at Sunbeam was short, and he became one of a stable of songwriters who worked out of New York’s famed Brill Building. • Drifters the Drifters ...soloist, scoring hits with “Spanish Harlem” (1960) and “Stand by Me” (1961). However, the Drifters continued their string of hits, benefiting from the Brill Building-style songwriting prowess of teams such as Carole King and Gerry Goffin and Mort Shuman and Doc Pomus. Lewis sang lead on “Up on the Roof” (1962) and ... • girl groups girl groups ...labels such as Philles, Scepter, Red Bird, Dimension, and Motown. The material for many of the genre’s biggest acts came mainly from three successful husband-and-wife songwriting teams with Brill Building connections: Gerry Goffin and Carole King, Ellie Greenwich and Jeff Barry, and Barry Mann and Cynthia Weil. Meanwhile, the Motown girl groups benefited from the songwriting talents of... • Goffin and King Carole King ...1959 (divorced 1968), who abandoned his plans to become a chemist in order to write music with her. Together Goffin and King began writing songs for Aldon Music in the confines of a cubicle near the Brill Building on Broadway; they quickly became one of the most successful songwriter duos in the industry. Their first hit, “Will You Love Me Tomorrow” (1961; recorded by the... • Shangri-Las the Shangri-Las ...providing backing vocals, a reworked version of “Remember (Walking in the Sand)” reached the Top Five in the summer of 1964. Morton then enlisted songwriting veterans at the Brill Building to provide the group with material. The Shangri-Las’ next single proved to be their defining hit. “Leader of the Pack,” which topped the charts in 1964, was a... • Shirelles the Shirelles ...Scepter Records (for which Dionne Warwick also recorded). Unlike most girl groups, the Shirelles wrote some of their own songs, but their biggest hits were written by others—including Brill Building stalwarts Carole King and Gerry Goffin, whose “Will You Love Me Tomorrow” (1960) became a pop classic for the Shirelles and the first girl group record to reach... MLA style: "The Brill Building". Encyclopædia Britannica. Encyclopædia Britannica Online. APA style: The Brill Building. (2015). In Encyclopædia Britannica. Retrieved from Harvard style: The Brill Building. 2015. Encyclopædia Britannica Online. Retrieved 03 June, 2015, from Chicago Manual of Style: Encyclopædia Britannica Online, s. v. "The Brill Building", accessed June 03, 2015, Editing Tools: We welcome suggested improvements to any of our articles. The Brill Building • MLA • APA • Harvard • Chicago You have successfully emailed this. Error when sending the email. Try again later. (Please limit to 900 characters) Or click Continue to submit anonymously:
global_05_local_5_shard_00000035_processed.jsonl/1574
Chandi, ( Sanskrit: “The Fierce”) also called ChandikaCaṇḍī, painting at the Caṇḍī Temple, Cuttack, India.Sankar Viswanathandemon-destroying form of the Hindu goddess Shakti, particularly popular in eastern India. She is known by various names, such as Mahamaya (“Great Magic”) or Abhaya (“She Who Is Without Fear”). Her representation is similar to that of Durga, another form of Shakti. She is shown with either 8 or 10 arms, seated on a lion vehicle. Hundreds of folktales and songs tell of her exploits. She is the central figure of an extensive medieval Bengali literature known as Chandi-mangal, the most famous of which is that of Mukundarama Chakravarti (c. 16th century).
global_05_local_5_shard_00000035_processed.jsonl/1575
Prebendaries: Pratum Maius Pages 54-55 Since the preb. mentioned in the taxation of pope Nicholas IV of c. 1291 as being endowed with an acre of meadow valued at 6d is stated to have been held then by M. Richard, archdcn., it is clearly the preb. of Pratum Minus, because it is named as such when Richard's successor in the preb. was relinquishing it to take another one (see list 29). Therefore Pratum Maius must be the preb. held by M. Alan de Crepping at the time of the c. 1291 taxation, whose revenue consisted of a truss of hay valued at 2d in the manor of Marden (Taxatio p. 169a), and may also be the preb. of Pratum listed in the prebendal taxation list entered in 1294 into bp. Swinfield's register (Reg. Swinfield p. 305: the value of the preb. is effaced). Valor III 11 assessed the value of Pratum Maius at 41s 8½d, of which only 4s was revenue from the preb., the remainder consisting of small commons. M. Alan de Crepping (fn. 1) Can. of Hereford, preb. unspecified, by 9 Aug. 1272 (Hereford ch. no. 2868); ordained pr. at Tottenham 13 June 1278 (Reg Cantilupe p. 304); is prob. the Alan can. of Hereford who occ. at Orvieto 26 Apr. 1291 (Reg. Swinfield p. 270); occ. as can. of Hereford, holding 'in the name of a preb.' one truss of hay in the meadow of Marden worth 2d, c. 1291 (Taxatio p. 169); occ. as can. of Hereford, 14 March 1292 (CPL I 557); occ. as resident can., preb. unspecified, 29 Sept. 1295 (Capes, Charters p. 169); occ. as can. 14 Apr. 1297 (Cal. Chanc. Rolls 1277-1326 p. 29). D. 24 Feb. 1297 (app. 1 fo. 7r-v), bequeathing 6 volumes of canon law to the cath. Immediately after the first anniversary of his d., 25 Feb. 1298, the dean and chapter of Hereford issued an ordinance establishing an anniversary service and annual distribution of money to commem. him (Capes, Charters pp. 171-2). The preb. which Alan had held was gr. 22 Aug. 1300 to Philip Talbot (Reg. Swinfield p. 547). M. Philip Talbot Archdcn. of Shropshire by 22 Aug. 1300 (list 7); coll. 22 Aug. 1300 to an unnamed preb. previously held by M. Alan de Crepping (Reg. Swinfield p. 532; 2 Fasti II 41 identifies this preb. as Pratum Maius). Had d. by Apr. 1309 when his successor as archdcn. of Shropshire occ. in office (2 Fasti II 6-7). • 1. For his career, see Biog. Ox. I 512.