id
stringlengths
50
55
text
stringlengths
54
694k
global_05_local_5_shard_00000035_processed.jsonl/14124
Welcome to the Forum Archive! Ridiculous Surrender Comment below rating threshold, click here to show it. Ok, so please view my last game. Four people on my team surrendered right after it confirmed the enemy team surrendered in an attempt to "make me rage" All four of them were on it, they surrendered 4 vote extremely quickly after it confirmed the enemy teams surrender.. Excerpt from chat: Kaindakule: we were planning on surrendering when we were for sure winning Cyanide Chaos: had reallll fun Cyanide Chaos: LOL Kaindakule: just happened that they started surrendering so we had to be quick :-D Is this against the rules? Why would they do this? This definitely seems like assisting the enemy team.
global_05_local_5_shard_00000035_processed.jsonl/14143
Click to expand User avatar #18 - xxxdemongirl (11/17/2012) [-] Then they deny people rights that were implied in the Constitution, by claiming religion, the ONE thing it says NOT to include in government #19 to #18 - fagmastertwotausan (11/17/2012) [-] as well as force people to buy healthcare, disallow the states the right to decide abortion and gay marriage laws, and (in vietnam) send troops without congress' approval. we gotta listen to the constitution User avatar #22 to #19 - kanatana ONLINE (11/17/2012) [-] But... states ARE deciding on their own about abortion and gay rights. And weed. And guns. And press. And immigration.  Friends (0)
global_05_local_5_shard_00000035_processed.jsonl/14144
Click to expand User avatar #11 - sketchysketchist (04/30/2013) [-] I would accept waluigi if his name wasn't just luigi with "wa" in front of it. Wario is just mario with an upside-down "m" but that was clever in a half-assed way. User avatar #43 to #11 - burningsmurfs (04/30/2013) [-] Something about that name always irked me too I think it'd sound not as idiotic if it was Wuigi at least. #12 to #11 - anonymous (04/30/2013) [-] waru is the japanese word for evil that's where the wa comes from User avatar #34 to #12 - joshwontwon (04/30/2013) [-] wa in japanese is evil. Rio in spanish is river. wario = evil river. User avatar #61 to #34 - Wario (04/30/2013) [-] Your mom is an evil river. User avatar #13 to #12 - sketchysketchist (04/30/2013) [-] Oh yeah! But I'd still wish they'd of gone with something else. User avatar #37 to #13 - HolyArachnid (04/30/2013) [-] To add to what Nonada said, the Japanese word "ijiwaru" refers to an ill-tempered or mean person. The original Japanese name, Waruiji, was a pun on that. User avatar #15 to #13 - Nonada (04/30/2013) [-] For the Japanese it works out awesome because their name for Luigi is Ruiji so Waluigi's name (Waruiji) is a really easy pun for evil Luigi.  Friends (0)
global_05_local_5_shard_00000035_processed.jsonl/14147
Jump to: navigation, search Hans Gentner of Sulzfeld in the government district of Eppingen in Baden, Germany, where the parson Gallus, a friend of Johannes Brenz, had early turned to the Reformation together with his patron, Göler von Ravensberg, was won to Anabaptism by Philip Plener and Blasius Kuhn or Kumauf, who had been very active in and around Bruchsal. With Plener he went to Moravia and served as a preacher under the Philipites. But when he became acquainted with the principles of the Hutterian Brethren in Moravia he left the Philipites and joined the Hutterites. Among the Philipites his withdrawal aroused great offense, which found expression in Blasius Kuhn's accusation that Gentner had not been honest with money entrusted to him. He must have succeeded in acquitting himself, for he received a position of confidence among the Hutterian Brethren. In 1539 Gentner was sent to his former friends in Württemberg and the Palatinate with the prayers of his brethren. In Malsch (Wiesloch district), in cooperation with Wendel Metzger of Heidelsheim, he baptized men and women, some of whom were imprisoned. This mission indicates that he must have been an ordained minister. The brotherhood was so well pleased by his success that in 1540 they sent him again to the Swabian Unterland and to Württemberg, then into northern Württemberg, the nearby Palatinate, and Baden. This time he succeeded in persuading a considerable number to emigrate to Moravia. In 1541 he was again sent to Württemberg and also to Hesse. The high regard of the brotherhood for Gentner was revealed in 1542. The charge of moral misconduct brought against Christoph Gschäl, a missionary in Carinthia, compelled the brotherhood to have a conference of preachers summoned by the new  bishop, Leonhard Lanzenstiel, and his assistant Gentner, whereupon Gschäl was expelled from the brotherhood. Another journey to Württemberg in 1543 with the deacon Michael Kramer brought Gentner into serious difficulty. He met a number of Schwenckfeldians, who believed that Jesus brought His flesh from heaven and did not receive it from Mary. Their leader was Jörg Nörlinger. Since their doctrine in general was in harmony with that of the Hutterian Brethren, Gentner, on the advice erf Kramer, remained silent on this point, for he hoped that their peculiar ideas would naturally disappear if they joined the brotherhood in Moravia. But when Nörlinger arrived in Moravia and tried to come to an agreement with the elders, he stated that Gentner had not opposed him on this point. Hans Feuerbach, a recent convert, was then sent to Württemberg to summon Gentner and Kramer to Moravia. Gentner was deprived of his preaching office and Kramer was also punished (Geschicht-Buch, 190-193). Gentner, however, soon regained the confidence of the brotherhood. For in 1545 he was sent with Georg Liebich, who had proved his faithfulness in a long prison term at Innsbruck, to Silesia, to inform Gabriel Ascherham's numerous adherents (about 300) that the Gabrielites had joined the Hutterites after the excommunication of their leader. In 1548 Gentner died in Schäckowitz, a half mile from Auspitz. The Geschicht-Buch (242) calls him "a faithful servant of the Word of God and His Church," who "had to endure much sorrow and many a struggle and battle for the sake of the Lord." [edit] Bibliography Zeitschrift für die Geschichte des Oberrheins (1905): 75. Author(s) Gustav, Sr Bossert Date Published 1956 [edit] Cite This Article MLA style Bossert, Gustav, Sr. "Gentner, Hans (d. 1548)." Global Anabaptist Mennonite Encyclopedia Online. 1956. Web. 3 Jun 2015.,_Hans_(d._1548)&oldid=105580. APA style Bossert, Gustav, Sr. (1956). Gentner, Hans (d. 1548). Global Anabaptist Mennonite Encyclopedia Online. Retrieved 3 June 2015, from,_Hans_(d._1548)&oldid=105580. Adapted by permission of Herald Press, Harrisonburg, Virginia, and Waterloo, Ontario, from Mennonite Encyclopedia, Vol. 2, p. 475. All rights reserved. For information on ordering the encyclopedia visit the Herald Press website.
global_05_local_5_shard_00000035_processed.jsonl/14148
Jump to: navigation, search The West Zion Mennonite congregation at Carstairs, AB began services and formally organized in 1901. The first building was occupied in 1902, with a subsequent building program in 1932. Israel R. Shantz is considered the founding leader of the group. The congregation originated through colonization of Alberta from Ontario. The first Mennonite to settle in the Carstairs-Didsbury area was Andrew Weber, who came from Ontario in 1894. The main settlement was made in April 1901. The congregation was unusual for its time, as half the membership in the 1950s was of British descent.  In 1925 there were 35 members; in 1950, 78; in 1965, 68; in 1975, 59; in 1985, 58; in 1995, 73; in 2000 82. The congregation has been affiliated with the Northwest Mennonite Conference (1903-) and the Mennonite Church. The language of worship is English. Ministers who served prior to 1960 included Israel R. Shantz, Amos Weber, Moses H. Schmitt, Noah R. Weber, Henry Weber, Allan Good, Norman Buschert, Alvin Steckly, Abe Reist, Ezra Stauffer, Linford Hackman, Henry J. Harder and Gordon Buschert. The congregation's address is Box 626, Carstairs, AB, T0M 0N0. (403) 337-2020. The church is located 1.5 km north, 6 km west, 1.5 km, 0.5 km east. Minister Trevor Kiriaka served in 2006 as a congregational leader. Stauffer, Ezra. History of the Alberta-Saskatchewan Mennonite Conference. 1960: 36. Additional Information West Zion Mennonite Church website Author(s) Ezra Stauffer Marlene Epp Date Published July 1986 Cite This Article MLA style Stauffer, Ezra and Marlene Epp. "West Zion Mennonite Church (Carstairs, Alberta, Canada)." Global Anabaptist Mennonite Encyclopedia Online. July 1986. Web. 3 Jun 2015.,_Alberta,_Canada)&oldid=78785. APA style Stauffer, Ezra and Marlene Epp. (July 1986). West Zion Mennonite Church (Carstairs, Alberta, Canada). Global Anabaptist Mennonite Encyclopedia Online. Retrieved 3 June 2015, from,_Alberta,_Canada)&oldid=78785. Adapted by permission of Herald Press, Harrisonburg, Virginia, and Waterloo, Ontario, from Mennonite Encyclopedia, Vol. 4, p. 930. All rights reserved. For information on ordering the encyclopedia visit the Herald Press website.
global_05_local_5_shard_00000035_processed.jsonl/14154
The Feld-Dog Says Everything Is Going To Be All RightClick to At the Fox Reality Awards, Corey Feldman took time out of his busy schedule to soothe the frayed nerves of everyone affected by the current state of the economy and the upcoming presidential election. Feldman said, “Don’t worry about anything. I got this. Sues and me are going to Washington right after this event and we’re going to solve everything. We saved the Haimster, so we could probably save the McCain campaign and Wall Street before our first coffee break.” [Photo Credit: Getty Images] *A Call To The Bullpen is a work of fiction. Although the pictures we use are most certainly real, Defamer does not purport that any of the incidents or quotations you see in this piece actually happened. Lighten up, people ... it's a joke.
global_05_local_5_shard_00000035_processed.jsonl/14156
Oh, Weed Spots Don't Actually Reduce Crime What if I told you that having a medical marijuana dispensary near you could actually reduce crime in your neighborhood? You'd probably be like "duuuude," or some other stereotypically "stoner" thing, because your "glaucoma treatment" has been particularly good lately. Well, snap out of it, man: I'm here to tell you that a medical marijuana dispensary does not reduce crime in your neighborhood after all! You see, the respected Rand Corporation did a big study of crime data and put out a fancy report last month saying that hey, these weed stores sure do bring down crime! It's probably all the surveillance cameras they have, was the theory, although of course the real reason would have been the marijuana smokers all having the "munchies" too much to do crime—hey, why do crime when there are Chips Ahoy! brand cookies to be eaten while intoxicated on the THC found in marijuana, am I right? You're welcome, Rand Corporation, for this humorous—but not without an element of truth—insight. The point is, that report was all messed up. The Rand people forgot to include crime data from the LAPD. That's a lot of crime data! The Rand researchers relied on data posted by CrimeReports.com, which they mistakenly believed included LAPD data. Knopman said Rand was not blaming the website. She said Rand reviewers, digging deeply into the data, only recently discovered that it did not include LAPD reports. Well well, what do you know, "stoner" marijuana apologists try to throw together a report using whatever they could find on the internet, only to find out that their data was incomplete, likely because Rand researchers were too overcome with the intoxicating effects of the THC found in marijuana to properly focus on their work! Just joshing you, Rand Corporation. Seriously everyone, we could all stand around making jokes about marijuana on the internet all day, but let's just remember that medical marijuana leads to crime and move on with our lives—we need to go smoke more marijuana! We don't really. But the Rand Corporation researchers probably do, to "come down" from this bummer! We're joking, that would be defamatory. Not that there's anything wrong with smoking marijuana—we love it! We really don't. [LAT. Photo: harminder dhesi/ Flickr]
global_05_local_5_shard_00000035_processed.jsonl/14157
Americans Moving Exclusively to Shitholes The complete and total collapse of the global economy had at least one upside for Americans: it briefly stopped them from moving to brand new housing developments in hellish southwestern desert exurbs. Only for a few years though, alas. The great migration of Americans towards hot places their children will come to loathe is back on! From the summer of 2011 to the summer of 2012, what was the fastest growing metro area in America? What do you think? What would you guess? LA? New York? Denver, or some shit? Try Midland, Texas. Just pack up, move on out to Midland, Texas, get a nice job in a gas field, make friends with the god damn Bush family put a deposit on a nice split-level ranch, and promptly die from petroleum-induced cancer. It's the American dream. I challenge you to find a single location on this list of the ten fastest growing metro areas that proves that Americans have any good ideas whatsoever: 1. Midland, Texas 2. Clarksville, Tenn.-Ky. 3. Crestview-Fort Walton Beach-Destin, Fla. 4. The Villages, Fla. 5. Odessa, Texas 6. Jacksonville, N.C. 7. Austin-Round Rock, Texas 8. Casper, Wyo. 9. Columbus, Ga.-Ala. 10. Manhattan, Kan. "Austin is nice..." South by Southwest. "Destin's beaches are..." Hurricane bait. The ten fastest growing metro areas prove that Americans are just not good at picking places to move to that are not dead end small town hellholes. I hate to be blunt. I really do. But I come from North Florida, a similar once-attractive shithole. And if you do not think that, 15 years from now, there will be an entire generation of kids sucking down stolen Oxycontin in cheap areas of The Villages, drowning in angst, pining for the vitality of urbanism, then brother, I have a nice condo to sell you in Columbus, Georgia, which is conveniently located near lots of good hunting and fishing, so no one will notice when you wander out into the woods to blow your head off because you moved to Columbus, Georgia and you just can't get out of the damn place now. The macro data taken as a whole shows that in general the big American migration to the west and southwest is back on again, which is good, because the desert scavengers can pick clean the bodies of the dead and leave only bones for future anthropologists to wonder over. "Why were they here?" they'll wonder, fingering a bleached skeleton in a bed of petrified Fritos somewhere in the parched post-global-warming western deserts. "Why did they ever come here?" [US Census. Photo of the natural beauty of Midland, Texas: Flickr]
global_05_local_5_shard_00000035_processed.jsonl/14161
Snappy Face Recognizer For Computer Authentication Because fingerprint readers are so 2003, the Snappy Face Recognizer uses your unique natural handsomeness as a password to log into your computer. The 1.3 megapixel camera snaps a few shots of you to compare to whenever you try and authenticate on your machine. You could probably use the Face Recognizer as a regular webcam when it's not guarding your PC. Then again, with the right software, you could probably use a regular webcam to do authentication too. That is, if you don't suddenly gain 50 lbs and it can no longer recognize you. Available for $98. Snappy Face Recogniser [Widget via Ohgizmo]
global_05_local_5_shard_00000035_processed.jsonl/14166
Samsung, Google, and Sprint are all trying to figure out why some users' Nexus S phones are nuking pictures without any explanation, Computerworld reports. It's a toughie, because there doesn't seem to be any common cause behind the deletions. The lack of a shared error is making things tough for Google: "Thanks for the responses. Seems like you are all having slight different experiences, but I'll pass your reports along and see what we can find!," lamented one customer service rep to griping Nexus owners, claiming there wasn't "a ton of consistency in reports" regarding missing pics. One thing is certain: Anthony Weiner is kicking himself for not owning a Nexus S right now. [Computerworld]
global_05_local_5_shard_00000035_processed.jsonl/14182
Feb 19, 2014      Feb 21, 2014 I said your name and you barely turned around When you saw me, you looked away and put on a little frown What is it? Can you tell I'm (gay?) Or are you just pissed, or down? I love you far too much to see you this way But maybe it's not you, it's me The beautiful dances we used to execute Were not what they will be I'm not sure what's going on with you You avert your eyes and don't reach or conclude, Tarry a bit too short, dislike spending time, I won't pretend I'm anyone else's but mine. The light in your eyes, what's made them see and lose? Is it me you hate? Is there nothing I can do? Log in or register to comment
global_05_local_5_shard_00000035_processed.jsonl/14198
You are here Soft Shell Crab With Potato Salad smcki's picture We all enjoy a picnic! This summer should be perfect for spending time enjoying our fresh and local foods. This month, Chef Maxwell prepares a softshell crab dish with potato salad.   Soft shell crabs 4 Small   All purpose flour 1 2⁄3 Cup (26.67 tbs)   Cornstarch 2 Cup (32 tbs)   Eggs 1 Large   Milk 1⁄2 Cup (8 tbs) For the potato salad   Red potatoes with skin 1 Cup (16 tbs), cooked and diced   Oil 1 Tablespoon   Red onion 1⁄2 Cup (8 tbs), diced   Green bell pepper 1⁄4 Cup (4 tbs), finely diced   Red bell pepper 1⁄4 Cup (4 tbs), finely diced   Celery 1⁄4 Tablespoon, finely chopped   Thyme 1 Tablespoon   Worcestershire sauce 1 Tablespoon   Horseradish paste 2 Tablespoon   Mayonnaise 1⁄2 Cup (8 tbs)   Salt and pepper 1 Teaspoon (to taste)   Dijon mustard 1⁄8 Cup (2 tbs)   Bacon 1⁄4 Cup (4 tbs), cooked crisp and chopped For the sauce   White wine 2 Cup (32 tbs)   Honey 1 Teaspoon   Peppercorns 6 Small   Lemon juice 1 Tablespoon   Heavy cream 1⁄4 Cup (4 tbs)   Butter 1⁄4 Pound 1. For the sauce: In a sauce pan on medium high, add and combine together red wine, honey, peppercorns and lemon juice. Stir well and bring it to a boil. 2. Once it starts boiling, lower the temperature and add in the heavy cream, mix well. Cook the mixture to reduce the sauce. 3. After 15 minutes, add butter and mix until well combined and continue reducing it until thick. 4. For the potato salad: In a saute pan on medium high, heat oil, add green peppers, onions, red peppers, celery and stir fry them for 2 minutes until the vegetables soften. 5. In a large mixing bowl, add the potatoes, stir in the sauteed vegetables, mayonnaise, bacon, salt and pepper to taste and horseradish. Mix until well combined and set the bowl aside to cool the mixture. 6. For the crab: In a deep frying pan, heat oil for frying the crabs. 7. Take the crabs one at a time, dust it in flour, dip it in a bowl of milk mixed with egg and finally into a bowl of flour mixed with cornstarch. Once the oil is hot, gently put the flour coated crabs and deep fry for 5 - 6 minutes or until golden brown and crispy. 8. On a serving plate, add the potato salad in the center and place the deep fried crabs on one side of the salad. 9. Serve this soft shell crab and potato salad drizzled with sauce. Recipe Summary Difficulty Level:  Main Dish Deep Fried Soft Shell Crab High Fiber, High Protein Preparation Time:  35 Minutes Cook Time:  45 Minutes Ready In:  80 Minutes Rate It Your rating: None Average: 4.9 (3 votes) Soft Shell Crab With Potato Salad Recipe Video
global_05_local_5_shard_00000035_processed.jsonl/14210
Ben Blatt tallied up the adjective, adverbs, common phrases, and sentences that appear in the three series. The results aren't surprising—Collins' phrases tend to be descriptive and action-based, while Meyer's are related to emotion and Rowling's speak to the fantasy and intensity of her world—but it's still interesting to see which descriptive words show up frequently in each set of books. And it's a bit amusing to see which sentences the writers tend to repeat. Head over to Slate for the full analysis. A Textual Analysis of The Hunger Games [Slate via TDW]
global_05_local_5_shard_00000035_processed.jsonl/14220
Hey Ladies: John McCain Values Your Potential Offspring More Than Your Actual Votes Ever since the end of the Democratic primary left some Clinton supporters less than inclined to support Barack Obama, John McCain has been wooing them by sending female surrogate Carly Fiorina around to meet with select groups of women and Clinton supporters. While Carly's careful not to besmirch McCain's stellar anti-choice record, she tends to hint that he might be willing to "compromise" on other issues, like paid maternity leave (which he voted against), equal pay (ditto) and a federal mandate to cover birth control. If that story and polls suggesting that 49 percent of women in battleground states who favor McCain are pro-choice — and almost half of them think McCain is, too — there's quite a gap between the myth of Maverick McCain and the reality of the guy who panders to the right wing and thinks Roe v. Wade should be overturned. I'm not really sure how McCain's record on reproductive rights could be mistaken as anything other than anti-choice. Of 130 votes on reproductive choice in his legislative career, he voted against choice 125 times. Those votes include everything from voting for and co-sponsoring the Federal Abortion Ban (which criminalizes some procedures), to voting to define a fetus as human life. He voted to deny family planning centers federal health care funds if they provide abortions with any money (not just the federal government's). He opposed letting soldiers get abortions abroad with their own money and refused to allow the government to offer its employees health insurance that even covers abortion services. He stood against bills that would penalize violent and disruptive anti-abortion protesters and in favor of global gag rules and abstinence-only education time and time again. And, really, that's just the beginning of his anti-woman legislative record. McCain is no friend to any woman who believes it is the right of women to choose (or at least be allowed to know about) abortion, and that's before we get to his stance against the Lily Ledbetter equal pay bill this year and his recent statements on Viagra and birth control coverage. Look, ladies who are flirting with McCain: I understand that he's kind of dashing, and he plays around with that damaged-flyboy-debonair-older-man thing. It was sort of cute when he was 40, and maybe even when he was 50. But now he's an old man who doesn't even know that the former Czechoslovakia is two countries. And he's sending out his Girl Friday to tell you that while he's going to do everything in his power as President to make sure you and your daughters and their daughters can never obtain a legal abortion in this country, he'll totally think about letting you get a bill that says you should get paid the same as your male counterparts and he might think about defying everyone in his party on a federal birth control coverage mandate. And girlfriend, if you buy that, let me introduce you to a couple of Congressmen who will just swear their marriages are shams and they're totally leaving their wives after the next election. I understand that times are tough and you feel like it's all Obama's fault that Hillary lost and sexism is bad and Carly's so cool when you meet her, but please, please, please just stop and think about the issues. You know, those issues you claimed were so important during the primary when you talked about Obama's "present" votes? The ones you wanted people to vote on? The ones you swore you were going to vote on when you decried how pundits and pollsters portrayed all of us as led by our emotions and empathy after New Hampshire? Yeah, please think about those, and if you just have to spitefully vote for McCain in November could you maybe stop talking about spitefully voting for McCain in November despite the issues so that people can maybe take the rest of us women voters seriously? Thanks. Senator John McCain [NARAL] McCain Surrogate Fiorina Meets With Clinton Supporters [Wall Street Journal] Unmasking McCain: His Reactionary Record on Reproductive Rights [HuffPo] John McCain [NARAL] After Voting Against Equal Pay Legislation, McCain Claims He's 'Committed To Equal Pay For Equal Work' [Think Progress] John McCain's Birth Control Dodge [Washington Independent] McCain Defends Czechoslovakia, A Non-Existent Country — Again [HuffPo]
global_05_local_5_shard_00000035_processed.jsonl/14222
Men's Health Knows You're Interested, Ladies Ladies, you are terrible at hiding your lady emotions, which is why Men's Health was able to compile a top ten list of the signs that you're interested in a dude. Like to hear it? Here it go: Some women go out looking for sex," the article begins, "Here's how to find them and make it happen." Charming! Let's make it happen, shall we? She's Chatting Up the Bartender Women be flirtin', yeah? I know whenever I've been really into a dude, the first thing I do when I get to a bar is immediately hit on the bartender, because as everyone knows, any woman who shows any signs of sexual interest whatsoever is a total whorebag who simply can't contain her whorishness and must flirt with every man on earth, no matter what. Bonus points for using words like "yummy," especially if you deliver them in a voice that sounds like a 4th grader who just figured out how to suck helium out of balloons at a birthday party. Her Drink is Big, Frozen, and Blue That's right, bro. If she's drinking a big, dumb-looking drink, it means she totally wants you. Just you, and nobody else. It couldn't possibly be that she actually just wants, you know, a big blue frozen drink, because everyone knows that big blue frozen drink is code for "I'd like the penis of the gentlemen in the corner, please, the one who reads Men's Health and therefore has seen the sign which has opened up his eyes." I once forgot this rule when ordering a Blue Raspberry Icee at the movies and had to fight off 10 dudes with Men's Health subscriptions by flinging pieces of super pretzel at their faces and yelling, "I should have ordered cherry! Symbolism! SYMBOLISM!" Her Pupils are Dilated Either that or she's just spent a half-hour at LensCrafters, you know? She's a Chatterbox Ugh, women, am I right? Always talking and shit! And when they lean in because they can't hear you when the music's blaring, or when they like, ask you questions and shit? What a drag! You better shut her up and kiss her, bro, or you'll have to deal with like, the thoughts in her head and whatever bullshit she has to spew that doesn't involve what a rad stud you are. She's Wearing Thigh-High Stockings Oh man. Lesbians, did you know this? Do your girlfriends know? You should probably inform them that sexy underthings are only for the heteros, according to Men's Health. And ladies, unless you want to have sex, you should probably hit the club in your sweatpants and period underwear, preferably the blue ones with the print on them that reads, "No sex tonight, thanks, I'm not wearing my 'asking for it' clothes." Remember: you're not allowed to wear anything for your own comfort or pleasure. Only for the bros. Why do you think Miss Havisham is constantly on the Maxim Hot 100? Lace, ladies. Lace. Perhaps a better way to find out if a lady is truly interested is to, I don't know, strike up a conversation with her, or at least attempt to, and see if she responds. Her drink, her clothes, her ability to talk, her bartender flirting, her dialated pupils: none of these things are guarantees that she wants you in any way. Some women may indeed be looking to hook up with a guy, but if you think her drink choice or her stockings are an open invitation to skeeze all over her, you are sorely mistaken. Her underpants won't say "I want you," she will. But then again, you're probably too busy trying to kiss her and shut up to actually hear what she's saying. Ladies! They are the worst. Top 10 Signs She's Interested [Men's Health] Men's Health Knows You're Interested, Ladies Natalie Dee." />
global_05_local_5_shard_00000035_processed.jsonl/14223
Yet Another TV Show Doesn't Understand How the Morning After Pill Works Last week, we wondered whether legislators who conflate RU-486 and emergency contraception are deliberately misleading or just really ignorant. Sure, vaginas are mysterious, bewildering flowers, but the morning after pill prevents pregnancy shortly after unprotected sex while the abortion pill actually causes abortions; it's not that hard to comprehend that there's a huge difference between terminating a pregnancy and not getting pregnant in the first place. So when a tipster told us that the premiere episode of The L.A. Complex included a plot line about the morning-after pill that called it the "abortion pill" and bleeped out the word "abortion," we weren't sure whether the show's writers had anything to gain from being intentionally confusing, or if they were just ridiculously misinformed. The show, which premiered April 24 on the CW (as well as CTV and MuchMusic, because it's made in Canada) and is kind of like Melrose Place for millennials, stars Cassie Steele (Manny from Degrassi!) as Abby Vargas, an aspiring actress who has unprotected, Ecstasy-fueled sex with an actor on the roof at a random party. (It's actually a really awesome roof with a beautiful view, so I'm confused as to how they had it all to themselves? And then who gave them that comfy blanket to sleep on? Sorry, I digress.) When they wake up and confront each other in the harsh morning light, this conversation ensues: Abby: You wore a condom last night, right? Connor: No. Abby: Why the hell not? Connor: You said you were on something. Abby: Yeah, drugs! Connor: I guess we should get one of those, you know, "morning-after" things? … Come on, I'll get you some breakfast, too! Abby: Breakfast and an [abortion] pill? And they say there are no good guys in L.A. It turns out that the CW meant to bleep the entire phrase after "breakfast" because they didn't want to be misleading. "We receive the episodes in full, so we can't edit the entire thing," a network spokesman told me. "We thought the best thing to do was wipe the entire thing out." It's definitely great that the CW, unlike other U.S. networks, recognized that the term was problematic and did what they could, but the whole episode is kind of iffy when it comes to depicting reality: later, Abby learns some important lessons when she gets nauseous from the Plan B (we know that's what it is for sure, because there's a long pharmacy scene) and ruins an otherwise successful singing audition by throwing up on a piano. When she tries to explain that she just took the morning-after pill, she doesn't get the job. And despite the censoring attempts, the episode is confusing lots of people, such as Andy Swift from Bonnie Fuller's The Hollywood Life's, who summarized the episode like this: "Real talk: When the main character gets an abortion, vomits on a piano and becomes a stripper all in the pilot episode, you're in for an awesome ride." Swift also notes that the moral of the episode is that "auditions and abortions don't mix." You know, that is probably sound advice! BUT THAT'S NOT WHAT HAPPENED ON THE SHOW. Is it too over the top to insinuate that inconsistencies like these illustrate how little people care about women's health? I think not. Sure, some people get nauseous from Plan B, but god forbid there's ever a TV character that takes emergency contraception and doesn't suffer life-altering consequences. The whole plot line kind of seems like a fuck up that can't just be fixed with a bleep. You can watch The L.A. Complex (which, otherwise, is kind of amazing in a really trashy way) on Hulu.
global_05_local_5_shard_00000035_processed.jsonl/14239
Bush isn't pro-life Letter to the editor Posted: Sunday, August 15, 2004 I was dismayed to learn that President Bush has denied $34 million in family planning funds to the United Nations Population Fund (UNFPA) for the third year in a row. The money was approved by Congress but withheld by Bush because UNFPA allegedly supports coerced abortion programs in China, a claim which has never been proven. Several fact-finding teams, including one sent by the U.S. State Department, could find no evidence that the fund supports coercive activities of any kind. Meanwhile, UNFPA estimates that the $34 million could prevent 2 million unwanted pregnancies, 800,000 abortions, 4,700 maternal deaths, and more than 77,000 infant and child deaths in 136 poor countries worldwide. So this putatively pro-life president has passed up a chance to prevent nearly a million abortions at a cost of $42.50 each while saving and improving lives of the neediest people. It seems he'd rather spend our money killing and torturing people, but $34 million won't go very far in a war that's expected to cost at least $200,000 million. Nathan Borson Trending this week:
global_05_local_5_shard_00000035_processed.jsonl/14244
Audio by title joe_and_abe_20080715 Abe Minus Joe on Obama the Wimp program date:  Mon, 07/14/2008 Host Abe Proctor leads a discussion on Obama, the Lessor of Two Evils, or How Much Stink Are You Willing To Tolerate To Keep McCain OUT of the White House?!? 83:31 minutes (38.24 MB)
global_05_local_5_shard_00000035_processed.jsonl/14248
When Movie Posters Meet Video Games Movie posters can be an art form. See anything ever done by Drew Struzan. But other times, they're not, and all they're doing is calling out for video game characters to make them better. Least, that's what the folks at film mag Empire reckon, as they've got a long-running a contest to see how movie posters can be made better by adding characters/people from other mediums. While there are plenty of great examples from cartoons and sports, it's the recent video game mash-ups we're interested in. Especially that Dhalsim one, because he looks like he's....having....the time of his liiiiifeee.... When Movie Posters Meet Video Games
global_05_local_5_shard_00000035_processed.jsonl/14249
Maybe The Worst Thing This Wife Could Do Cheat on her husband? No. Spend all his money? No. For one man, this just might be worse. Much worse. From the advice column of Japan's news source Yomiuri (translated by Matt Alt): Before we got married, he didn't exhibit much of this kind of behavior but I've really been noticing it lately. He collects these pathetic dolls. They're called "Chogokin" robots or something, I don't know. He seems to have been collecting them since he was a kid, and he filled like four cardboard boxes with them. Sometimes he'd take them out and gaze at them lovingly. It really grossed me out. So one day when he was at work I threw them all out. When he came home, we got into a big fight. Getting angry about dolls... it's so childish! How can I get him to admit he was wrong? Please give me some advice. "Chogokin" means "super alloy" and used by Popy Toy company in the early 1970s for its die-cast robot toys that included the GA-01 Mazinger Z, a character from famed manga creator Go Nagai and one that was later spun off into video games. As Matt Alt, who wrote Super #1 Robot, points out that some of these Chogokin toys were sold as Shogun Warrior toys in the USA during the 1970s. Maybe The Worst Thing This Wife Could Do "If they are old Chogokin you are talking probably a couple hundred bucks a pop," says Alt, "and the high end stuff can be worth a thousand or more." Some on the Japanese internet are saying that it's possible the Yomiuri piece is not true — you know, shenanigans. (Surely no one could be so cruel!) The Yomiuri, however, is one of Japan's most respected news sources. The Chogokin line is currently owned by Japan's Bandai Namco with its "Soul of Chogokin" line. Read more about Chogokin here and here. 夫がオタクで困ってます : 家族・友人・人間関係 : 発言小町 : 大手小町 : YOMIURI ONLINE(読売新聞) [Yomiuri Online via AltJapan]
global_05_local_5_shard_00000035_processed.jsonl/14252
Your Complete Guide To The SimCity Disaster Misinformation. Server errors. Fan backlash. Since EA launched SimCity two weeks ago, the online city-builder has been nothing short of a catastrophe for everyone involved. Much has changed since the game's rocky launch on March 5. Things have gotten better. But all still isn't well, even as EA takes its latest step to make amends with angry fans. In order to make sure you're caught up, we're zooming out and taking a look back at the whole SimCity Disaster so far. Wondering how things got this way? What's gone right and wrong and right again? Fear not. We're here to explain everything. Okay. I've heard of SimCity, but what's this new one? It's a reboot! SimCity 2013, also known as SimCity 5 or just SimCity, is designed to take the popular simulation series in a new direction. Over the past year or so, the folks at longrunning studio Maxis—now a subsidiary of the massive publisher Electronic Arts—have been making lofty promises for SimCity. It'll come with all sorts of improvements, they said. New transportation options. Population determined by roads. And... an intricate multiplayer network that supports inter-city trading and requires SimCity to be online at all times. That sounds really cool! Why's everyone so angry? Well... for one, you can't play SimCity offline. So your $60 game probably can't be played on, say, an airplane. Or while on duty in Iraq. Or when your router's on the fritz. Or when EA's servers are down. By now you may have heard something about servers being down. OK, I don't get it. What makes SimCity different than other online games? I don't see anyone getting pissed that they can't play World of Warcraft on a boat. That's how Maxis would like you to think of it: "In many ways, we built an MMO," Maxis boss Lucy Bradshaw wrote on EA's website last week. But MMOs justify their connectivity requirement by offering players features that would only be possible in an online game. You can't really look at World of Warcraft and say "oh boy, I wish I could play this by myself!" It takes place in a persistent world where everything you do is connected to everyone else in one way or another. As you walk from area to area, you can see other people interacting with the world, and you can thoroughly grasp why this is a game that needs to be online. In contrast, SimCity lets you sometimes trade with your neighbors. Every city is located in a region, next to a bunch of other cities, and they can interact and connect and help one another to a limited extent, but the majority of your time will be spent, like it is in every SimCity, creating and managing your own metropolis. Play the game for any serious amount of time and it becomes obvious that this is a game that could work well offline. The game is made by Maxis, but everyone's mad at EA. What's the deal there? EA is a very large video game publisher and a lot of people dislike them. EA also owns Maxis. So with a game like SimCity, people refer to the two companies interchangeably. So with so much controversy leading up to release, surely EA must have been prepared for launch day? Surely they must have seen what happened to Diablo III and ensured that their servers worked flawlessly so everyone could play the game when it went live? Ha ha ha. No. On day one, the game didn't work. Day two? Game didn't work. It took almost a week before people could actually play SimCity, and EA had to disable a bunch of features in order to get the game running properly. So for way too much time, people who spent $60 on SimCity just straight-up couldn't play it. They couldn't play online because the servers were down, and they couldn't play offline because there's no offline mode. Whoops. Did the people at EA/Maxis really not realize that this could happen? Good question. In fact, way back in June of last year, Maxis producer Kip Katserelis assured Kotaku that this sort of thing wouldn't happen. "We've got experience from Spore and Darkspore," Katserelis said. "EA is an online company. We're definitely watching what's going on at Blizzard, and we're putting in backstops and checks to try to prevent those kind of things from happening." Wow, what a bummer. Couldn't they just let people play offline? You'd think so. But EA insists that SimCity was built as an online-only game. In a blog post last December, Maxis's Bradshaw said just that: Yet... something doesn't seem to add up. Kotaku editor Stephen Totilo found that he could play offline for almost 20 minutes without a problem. There appears to be some sort of code in the game that prevents people from playing offline for more than those 20 minutes. On top of that, Rock Paper Shotgun's John Walker says he spoke to a Maxis source who said that SimCity doesn't require server-side computing at all, and that in fact it could be played offline. "I have no idea why they're claiming otherwise," Walker's source said. "It's possible that Bradshaw misunderstood or was misinformed, but otherwise I'm clueless." So, wait. If it's not necessary, why is the game online-only? Why not offer a single-player mode? We sure think so. But EA isn't saying. We asked them last year, and again two weeks ago, if they made the game online-only as a form of digital rights management. They won't answer. They won't talk about DRM. OK. But won't these sort of crazy restrictions just encourage *more* people to try to pirate the game, even if they wouldn't before? It's certainly possible! Now I see why everyone was so upset. But by now, the servers must be working. So everything's good with SimCity, right? Not quite. Last week, people started discovering that the game is fundamentally broken in a lot of different ways. For example, Maxis/EA advertised that this SimCity would give every individual Sim his or her own life. That "massive amount of computing" went into SimCity's GlassBox Engine, a "revolutionary simulation technology" according to the game's product listing. Except... fans discovered that GlassBox had some issues. Instead of returning to their own homes, individual Sims would drive into the nearest home available. Instead of driving on empty roads, Sims would take the shortest path available, even if that led straight into congestion. As one EA forum member points out, SimCity's sim-people use the same sort of AI-handling "agent system" that traffic and sewage and power uses. The results are not pretty. The problem is that, just as power can sometimes take a ridiculously long time to fill the entire map (because the "power agents" just randomly move about with no sense) traffic and workers can do the same thing. Workers leave their homes as "people agents." These agents go to the nearest open job, not caring at all where they worked yesterday. They fill the job, and the next worker goes to the next building and fills that job, and so it goes until all the jobs are "filled." So, when you have all your "worker" sims leaving their houses for work in the morning, they all cluster together like some kind of "tourist pack" until they have all been sucked into "jobs." They don't seem to care if the job is Commercial or Industrial, only that it's a job. "Scholars" are handled exactly the same way. As are school busses and mass-transit agents. This is why you see the "trains" of busses roaming through your city, and why entire sections of town may never see a school bus, despite having plenty of stops... Once all the busses are full, they return to school and stay there until school is done for the day. Now, here is where it gets really good... In the evening, when work and school lets out, they all leave and proceed to the absolute closest "open" house. They don't "own" their houses. The "people" you see are actually just mindless agents (much like the utilities agents, as I said earlier) making the whole idea of "being able to follow a 'Sim' through their entire day" utterly POINTLESS!!" "Wow" is right. Has EA addressed any of this stuff? Sort of. They're aware of all that AI wackiness, and they say they're working on it. But it's really the publisher's insistence upon keeping the game online-only that continues to rub fans and observers the wrong way. While admitting that SimCity could very well have an optional offline mode, Maxis's Bradshaw shot down any notions that we might be seeing one in the future: Translation: "Online-only is here to stay. Also we sold like a million copies. Deal with it." But is there anything good about the game? Sure. It's a beautiful-looking piece of work. It's got a lot of interesting simulation ideas. The music is great. The sound design is incredible. It's really fun and feels really good to play, at least for the first few hours before you realize how limiting it is to build on such a small plot of land. It's just too bad about all that other stuff. What a disaster. So what's next? If you bought SimCity, you're getting a free game! Well, a free PC game. Published by EA. That's one of these eight choices. And if this whole debacle has left a sour taste in your mouth—and not pleasant sour like a lemon candy, but gross sour like expired milk—rest assured you're not alone. Hopefully, we'll all come away with this experience learning to be far more skeptical of online-only games in the future.
global_05_local_5_shard_00000035_processed.jsonl/14253
After ten years, EA is pulling the plug on The Sims 2. Today the company said that it "will no longer be providing any new content or making any additional technical updates" for the game. The good news is that if you're still playing the 2004 installment to pass the time until The Sims 4 drops in September, EA said it's going to give everybody with a registered copy a free Ultimate Collection. Figure out how to register your copy of The Sims 2 with Origin here, and make sure to do so in the next five days!
global_05_local_5_shard_00000035_processed.jsonl/14262
DragonFly On-Line Manual Pages GROWFS(8) DragonFly System Manager's Manual GROWFS(8) growfs -- grow size of an existing ufs file system growfs [-Ny] [-s size] special The growfs utility extends the newfs(8) program. Before starting growfs the disk must be labeled to a bigger size using disklabel(8). If you wish to grow a file system beyond the boundary of the slice it resides in, you must re-size the slice using fdisk(8) before running growfs. If you are using volumes you must enlarge them by using vinum(8). The growfs utility extends the size of the file system on the specified spe- cial file. Currently growfs can only enlarge unmounted file systems. Do not try enlarging a mounted file system, your system may panic and you will not be able to use the file system any longer. Most of the newfs(8) options cannot be changed by growfs. In fact, you can only increase the size of the file system. Use tunefs(8) for other changes. The following options are available: -N ``Test mode''. Causes the new file system parameters to be printed out without actually enlarging the file system. -y ``Expert mode''. Usually growfs will ask you if you took a backup of your data before and will do some tests whether special is currently mounted or whether there are any active snapshots on the file system specified. This will be suppressed. So use this option with great care! -s size Determines the size of the file system after enlarging in sec- tors. This value defaults to the size of the raw partition spec- ified in special (in other words, growfs will enlarge the file system to the size of the entire partition). growfs -s 4194304 /dev/vinum/testvol will enlarge /dev/vinum/testvol up to 2GB if there is enough space in /dev/vinum/testvol. disklabel(8), dumpfs(8), fdisk(8), ffsinfo(8), fsck(8), newfs(8), tunefs(8), vinum(8) The growfs utility first appeared in FreeBSD 4.4. Christoph Herrmann <[email protected]> Thomas-Henning von Kamptz <[email protected]> The GROWFS team <[email protected]> The growfs utility works starting with FreeBSD 3.x. There may be cases on FreeBSD 3.x only, when growfs does not recognize properly whether or not the file system is mounted and exits with an error message. Then please use growfs -y if you are sure that the file system is not mounted. It is also recommended to always use fsck(8) after enlarging (just to be on the safe side). For enlarging beyond certain limits, it is essential to have some free blocks available in the first cylinder group. If that space is not available in the first cylinder group, a critical data structure has to be relocated into one of the new available cylinder groups. On FreeBSD 3.x this will cause problems with fsck(8) afterwards. So fsck(8) needs to be patched if you want to use growfs for FreeBSD 3.x. This patch is already integrated in FreeBSD starting with FreeBSD 4.4. To avoid an unexpected relocation of that structure it is possible to use ffsinfo -c 0 on the first cylinder group to verify that nbfree in the CYLINDER SUM- MARY (internal cs) of the CYLINDER GROUP cgr0 has enough blocks. As a rule of thumb for default file system parameters one block is needed for every 2 GB of total file system size. Normally growfs writes this critical structure to disk and reads it again later for doing more updates. This read operation will provide unex- pected data when using -N. Therefore, this part cannot really be simu- lated and will be skipped in test mode. DragonFly 4.1 September 8, 2000 DragonFly 4.1
global_05_local_5_shard_00000035_processed.jsonl/14270
Take More Daydreaming Breaks to Improve Your Focus We cram a lot of work into our daily lives, constantly fighting off the temptation to sit back and daydream because we view it as wasted time. New research shows that daydreaming, however, can actually encourage better thought process. Photo by Karen Mrnane. While it's common sense that working without a break can lead to burnout, some new research is showing that one of the most effective ways to use those breaks is to really let your mind wander: [There is] some interesting new research on the link between resting state activity - the performance of the brain when it's lying still in a brain scanner, doing nothing but daydreaming - and general intelligence. It turns out that cultivating an active idle mind, or teaching yourself how to daydream effectively, might actually encourage the sort of long-range neural connections that make us smart. While focus is important, it can be easy to get into a writer's block-type situation, where focusing harder only makes it harder to get things done. Next time you're feeling stuck, take some time away from your work and think about something else entirely. In fact, while you're at it, grab a small workout too—many of us daydream when we exercise anyways, and a bit of physical activity never hurt anybody. Just make sure you're aware of your daydreaming—you don't want to cross the line into time-wasting. Hit the link to read more.
global_05_local_5_shard_00000035_processed.jsonl/14272
You are viewing lihan161051 Previous 10 Mar. 8th, 2013 This is why we can't have nice things .. I've been thinking a lot over the past couple of days about social-normative enforcement, the kind that ranges from general hostility to outright verbal harassment and/or violence. And there are some thoughts in there that I think are worth sharing. One fact of life that social-outliers like me grow up aware of, that isn't immediately obvious to people who tend to be closer to majority social norms, is that being a social outlier can sometimes be dangerous in unpredictable ways. There are people in this society who are driven by a certain kind of impulse to feel powerful over other people in ways that involve punishing them, and people who feel such impulses tend to justify them with pseudo-religious reasoning of various sorts to rationalize what they are at least dimly aware is not actually right, in general, but might be excused in specific cases. And make no mistake about it, the impulse comes first, and the outlet is only a superficial perception that the abuse the impulse calls for is somehow socially sanctioned .. the bottom line is that if you are visibly and publicly not compliant with some aspect of Accepted Social Order, and you happen to come into contact with someone who sees that as an excuse to use you as an outlet for that kind of violent impulse, you're likely to become a victim of a hate crime, whether it's called that or not. And this kind of thing happens in the shadows, in private, covertly, all the time. Feminist bloggers encounter this every day, in anonymous vitriolic sockpuppet comments from angry men that escalate exponentially with the success of their blogs. The news is full of stories of men who begin an evening with the desire to go out looking for men they think might be gay, because they're feeling the impulse to engage in violent behavior and looking for an excuse. I could go on. But it seems to be very significant to me that these things happen in the dark, in the wee hours, up close and personal, and out of sight, most of the time. It seems to me to speak of a deep seated inner raging hate, simmering and biding its time until something comes along against which it can feel safe lashing out, but even then it hides to some degree, behind supposed anonymity or safety-in-numbers. To some extent, that's also due to the disconnect between the reality of the law and the standards of genuinely civil society and that perceived social sanction for "corrective" harassment, abuse, and violence, but to me, there's something about the nature of it that seems to be dark in and of itself, that seems to belong in those out-of-sight moments when deeper and baser emotions can come out to play more easily. To me, that dark rage and the perception of that kind of twisted social sanction for using it to punish anyone who strays too far from (again, mostly arbitrary) Accepted Social Order is the heart of the cancer I see in this society, in the genes of the dysfunctionality inherent in it. And I don't see any way at present to get past its superficial rationalizations of pseudo-religious reasoning and deal with the darkness itself, and it's far too easy for people to give in to impulses and far too difficult for their victims to counter it when neither side has enough critical awareness to have any idea what's really going on under the surface. I intend to write more on this, but it may be in book form .. I'm back. I've been online mostly through Facebook and Google+, and had some success and made some connections on both, but I'm not happy with either, because neither one is particularly geared to writers. So I'm re-emerging from my dormancy here and will be posting again from time to time. I might link some or all of my posts here to both FB and G+, but I'm going to be migrating my longer and more elaborate posts here because this site just works better for some of what I want to say.. Aug. 14th, 2012 Crossing a bridge .. maybe. This article started out in a direction sort of like the one that triggered a near-catastrophic meltdown for me, a couple of days ago, but then went somewhere interesting. And I decided to open up a bit about why the one a couple days ago nearly caused me to cut almost all of my social connections with a certain community where it was circulating pretty widely with pretty enthusiastic applause -- and a lot of connections with other communities associated with it -- and why a few conversations with friends, and the more recent article, changed my mind on that and made me aware of a bridge I've burned down and rebuilt so many times in my life, but never crossed, that it was time to maybe make some steps in that direction. To start with, as anyone who knows me is already well aware, I'm not the most socially conscious or socially skilled person around, not by a long shot. I can function socially in a variety of situations I've managed to adapt to consciously, but when I hit the limits of what I know how to handle, I tend to get cautious about approaching new territory, very cautious indeed. And I'm very neuro-atypical in some ways, ADHD for sure, and almost certainly some degree of high-functioning autistic and Asperger's in addition, and some of the ways I interact with people can seem very weird to people who aren't already used to them. I have a number of cognitive and functional hacks in place that allow me to emulate "normal" social behavior, even some aspects of extrovert behavior, in specific contexts and specific circumstances and specific environments, but those are conscious adaptations I've put in place to be able to function well enough in social environments to allow people to get to know me as I really am before they hit the "weird" nature and get scared off by it. And I'm male. And this is a big deal in the context of this particular question, because the male and female experiences related to "creepy" sexually-predatory behavior, and the unintentionally "creepy" behaviors that fit the profile of that kind of behavior enough to make people uncomfortable, are fundamentally different, in ways that are very difficult to explain from either side. And there's been a lot of discussion of it in various aspects from the female experience, because, unfortunately, the female experience is very often that of being on the receiving end of a whole range of extremely unpleasant behavior from (usually male) perpetrators, with few if any warning signs other than vague profiling-type indicators that have a very high false-positive rate, and that experience is anywhere from extremely frustrating to existentially terrifying, and everyone reacts to experiences in that range in their own way. But there's been very little discussion of it from the male perspective, with the possible exception of social-in-group-entitled-extrovert male perspectives on how best to intimidate and shame and out and exclude types of men who may or may not be actual predators, but who are, shall we say, just a little bit less conventionally "hot younger male" type attractive and maybe possessed of less than astronomical self-confidence. And while I've been told by a number of friends that I'm attractive and intelligent and to a certain degree quite socially desirable, more so than I'd ever have expected to be even just a year or two ago, I'm the exact opposite of social-in-group-entitled, and apart from my conscious adaptations, I'm an extreme introvert, and I've had enough experiences during my lifetime of having intimidation and outing and shaming and any number of other exclusion tactics employed against me -- in some cases as a "suspected creeper", and in other cases as simply someone who dared to express interest in or attraction to someone the alpha males/females decided I wasn't entitled to associate with -- the "let's shut out all the creepy folk so all us cool kids can hang out together" approach is gibbering-fetal-position triggering for me, and in all honesty, this past few days, it almost did lead to me doing the disappearing-act thing again and never talking to anyone in the community again, possibly even cutting ties with a few very close friends, simply because I am the kind of person who very often gets caught up in the creeper-outing/shaming hysteria when this kind of thing gains momentum, just because of the kind of personality I have and the ways in which I normally interact with people, and it's happened to me before, and the consequences of still being around and having to be told to leave when that happens are catastrophic enough that I cannot risk letting this kind of thing go to that point without being long gone when certain substances hit the fan. So that's why I almost burned a whole lot of bridges with a whole lot of people this week. And the reason I didn't was because of one friend who went to great lengths to be constructive about what she recognized that I am not, and what other things she recognized that I very much am .. and because of another friend who was very up front that I wasn't the only one who was very concerned about the carelessness with which a lot of people were eager to burn witches and went so far as to make a public statement to that effect. And then I read the second article, and it gave me something of a new insight on the issue, one that's probably been out there for a good long while but I honestly just hadn't thought of it that way. So, for the record, here's who I am and what my own perspective on this is. I'm careful about boundaries and consent. Very careful. Extremely careful. Sometimes, i think, possibly pathologically careful. It has actually literally only been in the past few years, and mostly this past year, that I've figured out how to negotiate some of the things I want that go beyond the limits of basic social activity or friendship, or even ask about some of those things without panicking about the possible consequences of expressing interest. The latter is largely an artifact of some bad experiences I've had in the distant past where expressing attraction or interest was itself taken as a boundary violation -- which nowadays I chalk up to default-culture dysfunctionality -- and I'm getting more comfortable about asking for what I want and taking responsibility for my own agency in getting my own needs met, but it's been a long hard road, and I've erred on the side of caution for so much of my life that even now my default habit is to just assume the answer will be no and preemptively self-reject out of a (possibly misguided) sense of courtesy, which I'm still learning not to do, and that's probably going to take a very long time to get past just because it's set in so deeply in my usual behavior. I've also gained familiarity with my own sexuality over a very recent period of time, basically over the last 8 years or so. Before that, I had only vague notions of what actually attracted me or what I actually wanted from sexual relationships, and when the reality of how that side of me works was revealed to me in the course of a brief experimentation with a friend that crossed a lot of boundaries I thought I had and needed that I turned out not to need at all, and were in fact getting in the way of what really worked for me, it came as a considerable surprise and it took me a while to put a sense of who I really was back together, but at the same time it was one of the most empowering and liberating experiences of my entire life, because it also taught me that desires are not wrong, no matter what they are (which was the hardest lesson there), and the only possible wrong is in acting on them in harmful ways .. and many desires can be met in ways that seem to be very wrong indeed (quite realistically, in fact) but which involve no actual danger to anyone. So some of my habits do still go back to those days of not being quite sure what I want, and being cautious about negotiating things that I'm still a little bit used to thinking of as off limits. (And the thing about that caution that's sort of an underlying theme of my habits when I get out of the bounds of things I'm used to with people is that for people who don't have the experience of things I have, sometimes it reads to them like "suspected predator" profile behavior, and while that's a potentially legitimate misunderstanding, it's still a misunderstanding, and when people are in an outing/shaming mood, it can in fact be very dangerous to be a little too cautious and land in uncanny-valley territory.) I'm very respectful of people for who they are, and when I'm interested in someone, I'm interested in the whole person, in very deep ways, and that interest may or may not include physical aspects -- it often does, because while I don't express it much, I am a very sexual person as well as a very affectionate person and, to the extent I believe is acceptable to whomever I happen to be with, and within my own comfort level, I might choose to express that in various ways. That's complicated, because while some people are very clear about verbalizing their boundaries and respond positively to being asked for permission, others view it very negatively -- I was once told that "if you have to ask permission, the answer's going to be no, so if you want to do something, just do it" -- and that's a serious problem for me, because as much of a hard limit as I have with boundaries and consent, I either need to ask in the moment or have the boundaries clearly negotiated before anything starts. But if I do something that goes beyond "average social behavior" with you, it's because I have reason to believe that consent has been negotiated, and I will not do it otherwise, so if consent has in fact not been established, it is absolutely OK to stop me and communicate that very clearly to me, and then we can talk it out or not depending on what exactly happened. I say that because mistakes and miscommunications happen, and as careful as I am, that kind of miscommunication is extremely unlikely, but if it should ever happen, that's why, and that's what I'm OK with being done about it. And the crossing-the-bridge part is right here: There's a lot I want to do, and there's a lot I normally keep my mouth shut about because I'm never sure when it's OK to talk about it. If you're reading this (and are female, sorry guys!) and have ever entertained any notion of doing anything outside of ordinary boundaries with me and wondered if I'd have been interested, the answer is very likely yes. I'm saying that here because it's safer to say that to a collective audience that's not any one person in particular, so no one feels singled out or put in an awkward position. Chances are also very good that if you make advances to me, I'll be interested, and if I'm not for whatever reason, I'll be totally respectful and constructive about setting those limits -- believe me, I've been the guy with the non-mutual unrequited desires enough times that I know what that experience is like -- and it won't mean losing a friend, if we're friends, strictly no harm/no foul. (And that's crossing a bridge because it's very likely you didn't know that, or at least weren't sure, because under most circumstances in direct interaction with people, I keep my mouth shut about it unless the situation seems far more than normally safe and I already have reason to trust everyone involved.) So that's who I really am. I'm not a predator, I'm not a creep, I'm not a stalker, I'm not any of those things. I know that guys who are any or all of those things also make exactly those claims and it's often hard to tell that, so if you need proof but can't tell which is which, I can't help you there. But I am not any of those things, and I will no longer be afraid of being mistaken for any of them. If you choose to be in my life, I will welcome you, and if you choose not to be, I will wish you well. That's all anyone can do. Jul. 25th, 2012 I don't know that much about Boston and have never been there personally (despite having both church and friend connections there), but this made my day. :) Jul. 15th, 2012 An interesting conversation from work .. I have a neighbor at work who's been doing an unusually good job of challenging my brain lately, and one of the subjects we keep coming back to is the economics of why the US economy fundamentally isn't working, and why the "economic stimulus" measures that were supposed to fix that don't seem to have done much other than make the bankers richer. And what the discussion boiled down to was the basic fact that the economy is the middle class -- the whole middle class, as the entire middle three quintiles of the population -- and the problem with it is that while the middle class is working, after a fashion, the quality of that income is far poorer than it was a few decades ago, and the security of that income is questionable at best. The economy is that middle section of the population who are the customers that make it profitable for businesses to create jobs. We are the job creators. The money we spend on goods and services is what makes creating jobs possible -- it's literally the heart and soul of the entire economy. And the trouble with that, in turn, is that the way things stand now, we don't make anything in this country. Increasingly, we don't even design much in this country, with a few rare exceptions, companies that have managed to keep a core of knowledge and expertise in a few niche markets and succeeded in keeping it from being exported. The rest has been shipped overseas to places that aren't interested in implementing our relatively progressive labor laws where people will tolerate far worse working environments and far less pay. And to a large extent, we, collectively at least, let that happen. A number of automotive, consumer goods, appliance, and other major manufacturing firms learned too late that outsourcing the raw labor aspects of their operations put those operations into the hands of people well equipped to analyze what that raw labor was doing, learned how the design process worked, and bootstrapped their own industries into higher and higher levels of proficiency until they were manufacturing the products from beginning to end and only the most superficial cosmetic aspects of those products were being designed here. Even the ones who managed to avoid exporting their entire intellectual capital to the outsource firms wage a constant fight against many of their suppliers and those vendors' competitors, who will happily counterfeit not just the products but many aspects of the entire marketing apparatus of the parent companies, and the sophistication of the competition steadily improves. And we let it happen because many of those manufacturers couldn't see past the next quarter's bottom line and the reduced cost of labor that quarter and maybe the one after that, when they were dealing with vendors who were thinking in much longer-term strategies. This is a pattern of systematic neglect of the fundamentals that make a society work, that has progressively broken down over a generation or more. Part of that is a stagnation of our education process, aided and abetted by our almost universal cultural value of anti-intellectualism to the extent of genuine prideful ignorance -- encouraged in turn by a religious extremist faction that is simultaneously trying to wreck the public school system and subvert the remaining functional parts of it into mere tools of mass indoctrination to turn out whole generations of loyal followers, to be certain, but the cold fact of the matter is that such an absurdly, catastrophically irresponsible program of sabotage would not gain traction in a society that did not to a certain extent welcome the saboteurs into the machinery with open arms. The extremist campaign against public schools, public libraries, and taxpayer funded education in general should by all rights have been stillborn at its very inception, shouldn't have been allowed anywhere near our schools, but because this culture has its perverse fixation on the supposed virtues of a life lived unsullied by dangerous knowledge, the extremist con artists who know just which buttons to push are practically welcomed in to set up shop tearing the system down. We let this happen. It couldn't have happened here if on some level this society hadn't wanted it. And the generation of kids fed on the useless drivel we let pass for primary education went on to high school where they slept through government class and skipped algebra class and goofed off in chemistry class and spent most of English class plotting how best to humiliate the few outliers who were, God forbid, actually interested in learning something into what they consider a proper sense of deference to the minimally-achieving "cool" kids who put their value in clothes and cars and dating. We let that image be sold to them on TV and in movies until it was practically a sacrament -- and even today the nerd/cool kid dichotomy permeates so many aspects of our society we practically breathe it. And that generation of kids went to college where they were only minimally prepared for serious study, on student loans they were certain they'd pay off when they got the 6-7 figure job on graduation, and struggled through basic undergraduate math and science and business administration, and some of them did make it into the upper echelons of corporate management, but more by chicanery and knowing people who knew people than by any real merit, and got by doing just enough to look like they were doing something worthwhile, and wound up in the corner offices making the strategic decisions, and somewhere along the line someone decided that the factory full of union workers making their products cost too much and they should ship the operation overseas to 140-hour-week $2-a-day laborers and save a buck or two, and soon they found themselves dealing with vendors taking over more and more of the higher level operations, and even then didn't see the trap coming until the day the overseas vendors were driving them out of business. This is a story of decades of systematic neglect of the things that make society function, driven by a combination of good-enough-to-get-by educational values and an absurdly myopic focus on short-term strategies of corner-cutting and cost-shaving that have, bit by bit, given away the principal of our savings, intellectually and financially both, in a mad chase after a few extra percentage points of interest. And this will take a long time to fix. We have to start by dispensing with that suicidal fascination we have with the supposed nobility of ignorance and the mythical dangers of somehow corrupting one's morals by being "too smart". That needs to go. Now. We simply cannot afford to go on congratulating ourselves for having escaped contaminating our hearts and souls with knowledge .. it's cost us far too much for far too long. We need to elevate curiosity, and creativity, and the pursuit of knowledge for its own sake, into our new ideals. We need to stir an insatiable hunger for new understanding in our kids and get them excited about every opportunity to learn. Because the only way we win this game, in the long run, is to become the society that does what no one else can, and do that by becoming the society that has the vision no one else has. And we do that by rebooting our whole cultural knowledge-framework with regard to how we educate ourselves and our kids. And we don't do it by emulating China, or India, or even Japan. We won't win anything by trying to out-discipline and out-regiment our kids and whip them into obedient little productive interchangeable parts. That approach created the forces that learned how to do all the tedious parts of making our stuff to the point of burying us in what we thought we wanted. We do it by going the direction no one has gone before, by starting with the very next generation of kids and nurturing their curiosity and their innate desire to learn everything they can get their hands on. Kids are born with that, it's part of who we are, it's how our brains wire themselves up for language and cognition, but it doesn't stop there unless we kill it .. and we need to stop killing it with our socially-destructive memes about what makes a "cool kid" and keep nurturing it, and never stop. Imagine a whole generation of kids who have only known the fascinating, thrilling quest for understanding of everything around them, a whole generation of autodidacts with an insatiable drive to innovate and improve the world. Imagine that generation growing up and turning the whole society into the one that mines industrial raw materials from asteroids and colonizes the moon and Mars and does all the other things no one else even thought of doing. Yes, it's subversive. We've been out-ordinaried, out-mediocred, and out-competed, and our only way forward now is to break the molds and reframe the whole economy game into something only we know how to do. Sputnik is beeping in our sky, and this is the wake-up call, and this time, we don't just run to catch up to the ones who reverse-engineered our former success, we jump in a completely new direction because that's what our new ideal and our new cultural value is, and our vision can't help but be subversive. We do nothing less than jumpstart the new paradigm, trigger the phase change, and embrace what we feared for so long. That's the only way forward that I see. And that, folks, is what creates the future economy. This book is free .. both as in beer and as in speech: From Dictatorship to Democracy It is, in fact, the very definition of free in both senses, because the entire work was published virally, initially in the pro-democracy movement in Myanmar, and is now completely in the public domain. I was not aware this book existed until about a month ago when CNN posted this article about Gene Sharp, the author, and the story of his conception of the book in the context of his discussions with friends and colleagues in Myanmar, and his development of a work that was necessarily rather abstract and general, due to his unfamiliarity the specifics of the protests in Myanmar, but which nevertheless ended up shaping and in many ways transforming the movement, largely due to its uncensored and viral publication. But it didn't stop there. It had propagated to a number of other countries before Sharp heard from the people who were reading it, and around the time it was beginning to surface thousands of miles away from where it was first released, it had, among other things, provided the blueprint for non-violent anti-government protests in Serbia that brought down the government of Slobodan Milošević. It's a free download, and officially in the public domain, and anyone anywhere with access to the Internet (or who has friends with Internet connections and printers) can read it. Almost every non-violent protest I've seen since the mid to late 1990's has borne this book's DNA, from the Arab Spring to the anti-government protests in Iran to the Occupy movement to the anti-PRI protests currently happening in Mexico. Every one of those protests will make perfect sense if you've read it. The basic idea is pure genius in its simplicity. Governments derive their just powers from the consent of the governed, and the only way dictatorships maintain power is by maintaining the illusion of the consent of the people. They do this in various ways, by isolating (and Sharp uses the ingenious word "atomizing") individual relationships with the state, and by making the idea of public dissent so frightening that no one dares speak out enough to break the illusion. Perform simple acts of defiance, just visible enough to communicate non-consent, and that small act in and of itself is both empowering and transforming for both the people feeling the heady rush of taking those brave steps out of their silence and for the people watching and realizing they are not alone. The defiance need not be directed at anything or demand anything -- the mere fact of its existence under the nose of the dictatorship galvanizes the people who immediately realize that the disaffection they thought only they felt is actually far more universal. And some of those acts of defiance are subtle and ingenious, and freeing the defiance from the need to be violent puts it squarely in the realm of art with a purpose. Do something distinctive (I keep wishing someone would set some good Spanish words to Sibelius' Finlandia Hymn, and teach that song to everyone in Mexico who wants to learn it -- imagine hearing that song, everywhere in Mexico!) and simultaneously peaceful, yet defiant, and you not only show everyone who sees/hears what you do that defiance itself is possible, but if the dictatorship tries to silence you with violence, it only weakens its own power. Because this approach (as Sharp makes clear) fights a dictatorship not where it is strongest, but where it is weakest -- the more it abuses its people to hold onto its power, the more it demonstrates that it is exactly what the opposition has accused it of being. And this book cannot easily be censored, and it's a simple enough read that it can easily be remembered even if it can't be kept around. The idea cannot be stopped except with measures so brutal that they would themselves alienate even the most devoted followers .. it will get through, one way or another. This, folks, is what genius looks like. My wildest dreams of memetic warfare against any kind of tyrant fall far short of what this book has already done, and will do in the future. It may not by itself trigger the oncoming paradigm shift .. but it will make it very difficult to stop it (or even dodge it) once it starts .. Jul. 9th, 2012 Why free-market health care doesn't work .. With the ink on recent SCOTUS decision on the individual-mandate provision of the Affordable Care Act still not quite dry, it's worth discussing some of the benefits and shortcomings of that measure as well as why it is a good thing for now, but is not a good thing in the long term. One of the most fundamental aspects of economics is the law of supply and demand, in which supply and demand balance each other to drive pricing of a marketable commodity. For typical commodities, the demand for a product is driven by desirability, the supply is constrained by production capacity, and a consumer of the commodity (for appropriate definitions of "consumer" with regard to the commodity) can choose whether to buy or not buy at any given pricing, and thus incrementally influence the seller's pricing. For most commodities, whether they're tangible products, stock in publicly traded corporations, gold or silver, or what have you, that model tends to produce an equilibrium price for a given set of supply and demand considerations, and that price may fluctuate above and below that equilibrium, but by and large, the opposing pressures of demand driving pricing up and supply driving it down will balance out at some sort of equilibrium somewhere. This is the fundamental way in which health care does not fit the classic supply/demand model. Health care consumers are not consumers by choice -- the circumstances that create their demand for health care services are dictated by forces mostly beyond their own control, preventive care notwithstanding -- and thus demand is not subject to decision making on the consumer's part, it either exists or does not depending on the consumer's state of health at the moment. It's probabilistic in that the circumstances under which any given individual might need to be a health care consumer are relatively unlikely at any randomly chosen moment, but for those who are in that overall-unlikely situation, the need for medical treatment is not optional. (Granted, this is an extremely simplistic modelling of what is in fact a nearly infinitely complex medical discussion, but for economic purposes, it covers enough of the nature of a health care consumer to suffice for this discussion.) The fact that being a consumer of health care is not optional changes the entire equation, because it makes the demand side of the supply/demand balance effectively infinite -- there is no price point or scarcity of supply that makes the "oh well, I won't buy that today" decision appropriate, since it means either continued or worsening illness or even death. Thus the only equilibrium in that equation is the point at which consumers literally cannot afford the services at all, because that is the only point at which demand can begin to drop and stop driving the pricing up. So health care is essentially a captive market -- its consumers have no choice but to seek services if they can afford them -- and this alone completely skews the supply/demand balance. The other important condition of the supply/demand law is that it depends on a direct coupling of pricing to consumer ability to pay -- the drop in demand as the price rises above a consumer's desire, in the case of ordinary commodities, or ability, in the case of health care, to pay for those services is the pressure that limits pricing. Once pricing increases beyond a certain point, no one can pay for the services and it is no longer profitable to provide them, as they've been priced out of the market. The widespread availability of health insurance was the last ingredient of the perfect storm. For a bit of background on how insurance works, let's take an extremely simplistic example: A group of 100 people decide to protect themselves from a relatively rare -- 1 in 100 -- but expensive -- $10,000 cost -- event by each contributing the total cost of the event multiplied by the probability it will happen to them -- $10 in this case -- to a risk pool. If the 1-in-100 event happens to anyone in the pool, they then can use the entire $10,000 pool to pay for the cost of the event and not have to pay out of pocket. The pool as a whole might join up with other pools to protect themselves against the unlikely but expensive possibility of two or more people incurring the $10,000 cost at a given time -- this is called "reinsurance" -- but the overall effect is that under certain defined circumstances any one of the people in the pool could conceivably draw on it to pay a much larger cost than they could out of pocket. What this does to supply and demand pricing, especially in the extremely asymmetrical case of health care with its anomalous demand side, is vastly increase the ability of any individual consumer to pay for certain costs .. completely decoupling the pricing from the individual's own ability to pay out of pocket, which in the short term makes the costs far more affordable by spreading them out across a large pool of individuals each of whom is relatively unlikely to need services, but can then pay for them when needed, but in the long term, allows providers to charge far more for those services, eventually reaching the point where even with the risk pool, the services cost more than the pool can cover. At this point, the pool needs to either increase income by having each person contribute more, or reduce costs by reducing its liability for indemnity, in other words, what it's required to pay out for, so some instances of the large cost might be refused coverage (either completely or in part), or the pool may start being selective about who it allows in, since some people may have a higher probability of encountering the cost than others. (And all of these things have happened -- increasing premiums, increasingly restricted treatment coverage, and refusal to cover people with pre-existing conditions who bring more cost into the risk pool than they offset with premiums.) The compromise in the ACA -- the mandate to obtain health care coverage -- was a necessary offset to the increased cost exposure of requiring coverage with pre-existing conditions, because it offset the costs in a third way, by expanding the pool to include a large number of people with a low probability of needing to use the coverage. This was also the main point of attack for opponents, who knew full well that eliminating the mandate would have made the remainder of the plan so costly to insurance providers that the entire plan would have collapsed and returned us to the same crisis we just escaped. But the ACA was not a long-term fix, it merely delayed the inevitable and shifted the equilibrium cost point still higher, because costs, as yet, are still following the free-market model, which with captive demand, will only drive pricing higher until it strains even a pool containing every single citizen in the country. The flaw in free-market health care is still the captive demand side of the equation, which only drives pricing up and has no countering force to drive pricing down except the limit of consumers, in this case now insurance and reinsurance risk pools rather than individuals, and already astronomical costs will increase still further until they reach the limit of what that market will bear. So why are we not looking at the supply side of that equation yet? Why are we not regulating costs at all? "Because it's SOCIALISM!!1!1!" is one answer -- not a particularly helpful one in that tone, but an answer nonetheless. In essence, the free-market model is what got us into this mess, and while it's making a handful of healthcare and medical technology CEO's and upper level management rich beyond the dreams of avarice, and making them very disinterested in changing the game and killing their golden goose, the fact is that as long as the supply side of the system is unregulated and there are no controls on end-delivery-to-patient costs, we're simply going to be going through this cycle of straining increasingly widely distributed resources to their limits until payers start refusing coverage again. So how do you control costs? By getting out of the free-market mentality, because these services are not really free-market services -- they're captive-market services and need to be treated accordingly. Every single cost point of the chain needs to be analyzed to determine whether it's excessive or whether it covers upstream costs, starting far enough upstream that all of the price-gouging (and I'm certain there is price-gouging) is squeezed out, going back to raw materials suppliers for pharmaceutical companies and medical technology providers, and working forward through the chain to point of delivery to the patient. And a lot of the "fat" in a lot of the pricing throughout the chain is liability insurance -- because malpractice insurance is an ever-present threat at almost every point in the chain that has deep pockets -- so some offset to that may need to include addressing the liability in other ways that don't pass costs through to the patient. Like it or not, that will probably include some form or other of subsidies at various points in the system. And I'm sorry, but the payer side of the system cannot continue to be for-profit. The runaway price escalation we've seen over the past few decades has been partly due to insurers and providers both taking profit margins off the top of virtually every transaction in the system. For-profit corporations are required to turn profits, every quarter, or face civil liability to their stockholders -- they are not in the charity business. They have to make money everywhere they can find a profit center, and the proliferation and expanding exploitation of profit centers inflates both sides of the equation. Remember, individual consumers are not a part of this pricing game at all anymore -- the costs are far more than the wealthiest of the wealthiest of us could possibly pay out of pocket -- and it's strictly a game between for-profit payers and for-profit providers controlling the price equilibrium. The only way for-profit payers can continue to be part of this system is if the entire structure of transactions between payers and providers is so structured and so regulated that their choice in the pricing equation is minimized or even eliminated. And it has to be on both sides. Control only the costs, and unregulated payers might inflate their margins and still deny care. Control only the payers, and providers will simply find the point at which the market bleeds and prices will settle there. Create any solution that regulates one but not the other, and the more regulated one will revolt and lobby (most likely successfully) to get the regulation removed and you're back at square one. It has to be a balanced solution that takes the captive-market nature of health care into account, or it won't work long-term at all. So, ultimately, the long-term workable solution is either to nationalize both sides of the system, to put governments on various levels in both the payer and provider roles, or so thoroughly regulate both sides as to create more or less the same system out of the private payers and providers by strict regulation of both sides. Simply expanding the pool of consumers to offset the cost of including the higher-cost one is nowhere near enough .. it gives us a break for now, but doesn't address the free-market thinking behind it .. Jun. 29th, 2012 And a tangent .. One aspect of mass-media communication that bears further discussion is the one-to-many (or in some cases, few-to-many) aspect of mass media, and the illusion of perception that it creates, and the illusion of legitimacy that it lends to what it presents to us on the screen. Everything you see on TV, hear on the radio, read in a magazine, or receive any other way from commercial mass media is carefully filtered. You've been conditioned to perceive what you receive in all those ways as part of your extended reality, your view over the horizon, so to speak, in certain contexts, and that "events really happening a long distance away" perception is triggered by certain visual and/or aural cues that signal "news". There's a trust built into that perception that leaves us extremely vulnerable to manipulation. Consider for a moment that you perceive a large part of the world through mass media communication channels that are run by corporate owners who are not impartial, and the bulk of the ownership is concentrated in a very small number of companies with their own agendas .. and you still perceive what they report as actually happening, somewhere in the world far outside your direct experience. You also tend to perceive things not reported through these channels as not really happening. Mass media, corporate-owned media, shape your perception of the world in ways that convince you they're reality or, by their absence, remove themselves from your perception completely. It's a subtle trick, and there are countless ways to exploit it. And it's been exploited, in a number of those ways. How much of that shaping process is deliberate and by design? Probably very difficult to tell for sure, but given the concentrated ownership of most news outlets, and the agendas most if not all of them are pressured to follow, it's almost a certainty that it's being exploited in at least some ways. And it's a shaping process you're exposed to on a nearly constant basis, if you watch TV or listen to the radio at all during the day, or read magazines on a regular basis. It's a wicked bargain -- you gain the sense of being an informed citizen who's knowledgeable about current events, but your perception of those events is inevitably skewed and slanted in the direction the people who bring it to you want it to be, and you accept information as factual that is often incomplete if not outright misleading. And that's one of many ways in which we're programmed to believe what we're supposed to, and accept a view of reality that's favorable to certain powerful interests in this society that have a vested interest in our beliefs about them -- and about ourselves -- not undergoing significant changes from the status quo. And those beliefs serve the people controlling our perceptions, not us, because their interests are entirely motivated by profit, and reinforcing devaluing perceptions of ourselves is a profitable angle to their business. One reason there's any awareness of this process at all is the channel by which you're reading this: the Internet. For the first time in history, we have genuine many-to-many communication -- we can talk back to the TV, in a sense, and be heard. This one medium is a complete game-changer in this equation, and its true significance and the extent to which it will ultimately change our perception of the world and our interactions with others is still largely unknown. It's potentially as fundamental an innovation as the invention of printing itself, and has the potential to make one-to-many mass communication completely obsolete. And challenge or even completely defeat the process by which we've been trained over the past decades to think the way we're supposed to. And the major corporate media players have come late to the game, and for once, the democratic nature of many-to-many communication slipped in under their radar, and gave us a huge head start. We have the potential, still, to leverage that advantage into a true fair marketplace of ideas that allows us to gain a truer understanding of our world and of ourselves. The corporate players have definitely joined the game and begun putting strategies in place to monopolize our perception through this channel, as well, and have engaged in a number of legislative lobbying efforts to dilute the influence of many-to-many communication if not outright make it impossible, but in this instance, it's not at all clear whether or not they even can succeed. That question is one we have the power to answer, ourselves, by either asserting our ownership of the channel -- which we still have, for now -- or allowing them to take it over and turn it into just another kind of TV that tells us what we're supposed to think. So, if it comes down to it, are you willing to fight for an unfiltered reality and the right to your own autonomy in it, or are you comfortable going back to being told what to think and how to perceive the world? It's up to you .. if you're reading this, you have the power to get involved, and there's a window of opportunity that may soon close .. The dysfunctional society I had a conversation the other day about relationships and other sorts of human interactions that put some things into perspective for me. We are a social species. Our experience of our lives is shaped in large part by our connections and interactions with others, and almost every part of that experience exists in a social context. It's part of our perception to such an extent, both consciously and unconsciously, that our understanding of the universe we live in is inevitably shaped by our communications with others. And that communication must be balanced and fair for that experience to be a healthy one. We have to have a sense of agency in those communications -- some aspect of them must represent our identities, desires, needs, some aspect of them must actualize our selves in some external way -- and we have to feel that the meaning we are communicating to others is respected at least in the most basic sense as fellow human beings, for those communications to feel nurturing and healthy. Many aspects of our interaction with others outside of our immediate person-to-person connections (and in some cases, within that sphere as well) completely ignore this, and this starts in the schools when we are children, when we're taught to value obedience, and deference to authority, and acquiescence to challenges -- all the behaviors that condition us to be compliant employees and consumers, and condition us to be other-centered in our reasoning -- but not taught to value our own identities and our own selves in ways that strengthen our sense of agency. And it continues through our adult lives with a constant bombardment of advertising messages that train us to want what corporations and political candidates want to sell us in an almost infinite number of overt and covert ways. We're subjected to pressure to normalize our behavior every day, largely in the examples we're presented in mass media programming but often in the more immediate sense by partisan bullies who criticize us for deviating from their own concepts of conventional behavior. I believe that the majority of this is evolved, emergent social behavior that probably served us well as hunter-gatherers when divergent behavior had serious consequences for the survival of the tribe as a whole, and normative influences of various kinds ensured social cohesion in the face of a number of existential threats. The only fault in these mechanisms is the progressively accelerating rate at which our circumstances change, and will continue to change; the coerced normalization that used to ensure the social cohesion of small tribes at the mercy of an often dangerous environment, and in fact a generalized notion of the tribe itself, have been carried over largely intact into a modern world where they have mostly lost relevance and become liabilities, but are nonetheless still part of our collective psychology, and the behaviors they still tend to drive in us are largely just part of how we're wired and part of how we function in terms of interacting with each other. But there are a number of elements in our society that have learned to exploit that wiring in a variety of ways. Some of them are organized, some are individuals, some are loosely organized groups who simply exchange information on what gets them what they want and what doesn't, but all of them in one way or another make some sort of use of our tendency to comply with normative pressures from others, whether through direct person-to-person interactions or through an increasingly broad range of mass-communication surrogates, and all of them in some way benefit from exploiting that tendency. Some are cynical and sophisticated, such as the complex and nearly ubiquitous campaigns of collective social programming run by major corporations that not only condition us to want to buy their products, but now more often than not condition us to vote in favor of comfortable legal environments for them and thus make them even wealthier. Some are very simple and individual indeed, such as bullying others for simple ego gratification, or the slightly more complex strategies of social and sexual predation that use coerced compliance for psychological advantage. And last but not least, there are religious extremist organizations that leverage both the tendency to bow to normative social pressure and the common (and somewhat inaccurate) perception of the norms being enforced as being of some cultural value in and of themselves simply due to tradition. So on the one hand, we find it difficult to accept non-tribal social functioning even when its value to us as a species has been clearly demonstrated, and on top of that, appeals to that sort of non-tribal social functioning immediately attract active opposition from actors of various sorts who have a stake in maintaining the vulnerabilities that are part of their daily business of exploiting us. But the single weakest point in all of this is that omission in our social conditioning that I mentioned above: self-value, self-actualization, and agency. It's not always a simple omission -- part of what many of us were taught as children was the profoundly stigmatized concept of selfishness, and its latter-day cousin, entitlement. Granted, there are selfish and entitled people, and they can be unpleasant and tedious to interact with, especially when one stands in between them and what they want, and entitlement at its worst can include aspects of bullying or even predation. But when we fear being selfish or showing entitled behavior, we risk throwing out something very important along with those -- we run the very real risk of defeating our own sense of self-value and agency along with those undesirable behaviors. Agency is central to our self-actualization, and in many ways, it actually defines it. Almost every single positive interaction we have with other humans begins with ourselves -- you cannot respect others until you respect yourself, and you cannot love others or indeed have much hope of receiving love from others until you love yourself -- and agency is literally our ability to represent those basic needs and values. It is important to respect others and maintain a balance between that and our agency, but it's also important not to neglect our own agency and our own self-value. And we don't teach that enough to our children, either in school or in many cases at home to our own kids. To some extent it's a convenience thing -- even the best behaved children can be trying, and it's always tempting to emphasize obedience and other-centeredness in what we teach to children simply to get them to settle down and exercise some self-control -- but to some extent, for some parents and teachers alike at least, it's more of an emphasis on control and obtaining obedience at all costs, which either accidentally or in some cases crushes the entire life out of their sense of self-value and trains them not only not to seek a sense of agency in their own lives, but to actively resist it on an often-unconscious basis .. and there are few things more solidly guaranteed to produce a hostile, malicious person who only relates to the world in ways that involve breaking or destroying every part that comes within reach than to plant a suggestion that seeking one's sense of agency is forbidden somehow. There is no deeper resentment than that, and no surprise -- it's a direct attack on one's own identity. I think the single best thing we could do for this society is to ensure that every child grows up with a balanced sense of agency and respect for fellow human beings and has it well established throughout childhood and into early adulthood. Where that takes them from there should take care of itself. I think the entire dialogue on what constitutes traditionally undesirable behaviors such as selfishness, entitlement, bullying, and so on should be defined in that framework, and kids in school who show signs of being other-centered to their own detriment should be treated with the same level of concern as the ones who show signs of being self-centered to the detriment of others. Fix that one thing, and many other things fall into place .. maybe not all of them, but a lot of them, to be sure. Jun. 24th, 2012 On agency, consent, respect, and identity .. I've talked a lot about consent in the context of how one responds to, or reacts to, the actions and expressed intents and desires of others, and about choosing which of those expressed intents and desires one is and is not willing to participate in. Mostly in the context of sexuality, sex-related communication, and promoting sex-positive culture, but these concerns abstract much farther than that relatively limited area .. in fact, in an ideal world, they would reflect back into those things rather than be confined entirely to that territory. I've also talked a lot about the principle that everything positive and empowering about the human experience begins with oneself -- that one must respect oneself in order to be able to respect others, honor oneself to be able to honor others, and love and care for oneself in order to be able to love and care for others, and so on -- and touched on the ways in which one's own treatment of oneself is mirrored in one's treatment of others and their behavior in return. And I've touched on the need to know oneself and be honest with oneself about one's own needs and desires, and express them without fear or shame. The latter argument is about agency, which Wikipedia defines as "one's independent capability or ability to act on one's will." Consent is a passive thing -- it comes down to choosing what one accepts or refuses from the external social influences one can exert control over, either directly or indirectly -- but it's about choosing from what's on the menu, so to speak. Agency is a more active process of choosing which menu to order from, or if need be, going off the menu and creating choices on one's own, asserting one's own identity and autonomy. There's a balance, I think, and a very important one, to be struck between agency and respect of others' boundaries. We are social creatures and our lives are largely defined by the points where our lives intersect with those of others, but agency is crucial to using our fair share of the space we live in, both literally and figuratively, because without agency, we concede too much of ourselves to others and allow them to set their boundaries so close in to us that we have no room left to live in. It's certainly important not to do the reverse, to steamroller over other people's boundaries and force them into such a crisis, but it's equally important to assert our own and strike a fair balance. This is kind of a new concept in western society at least, mainly because the majority religious traditions in this society have a history of downplaying individual agency as a concept and demonizing it as rebellious selfishness in all but the most limited cases. That's an inevitable consequence of living under religions that have been all about social control since the 4th century if not earlier, and one religion in particular that has the unique distinction of having conducted one of the most complete programs of cultural genocide in the history of our species, and one from whose shadow we are only now beginning to emerge. Agency is still a suspect idea, in many ways, because the vast majority of people in this society were taught as children that being too assertive about one's own desires, especially if one should have the temerity to desire things that differ slightly from what the collective considers "normal", is at least suspect if not an open invitation to corrective action either from the church or from other authorities, or even from extralegal social normative enforcers like the bullying institution still tacitly tolerated in many school systems. So there are a lot of forces working against this idea as a general concept, on outdated but still very much enforced moral principles. But my vision of the society of the future, the one that has outgrown motivating people by fear and shame and has embraced positive and empowering human interactions, definitely includes agency as a core value, as much as it does a basic mutual respect for the people one interacts with, all in balance, but in a fair balance, one in which our respect for others flows from our respect for ourselves, and one in which none of us fears the judgments of others simply for speaking our minds and our hearts. Both of those, agency and respect, are core responsibilities, to ourselves and to those around us, and I believe that to be true about everything we do as a species. We're not there yet, but I believe we can get there if we try. And I for one plan to lead the charge. Previous 10 March 2013 RSS Atom Powered by
global_05_local_5_shard_00000035_processed.jsonl/14274
Re: Last-Modified in chunked footer From: Scott Lawrence <[email protected]> Date: Mon, 15 Sep 1997 12:27:32 -0400 Message-Id: <[email protected]> To: http-wg%[email protected] >>>>> "YG" == Yaron Goland <[email protected]> writes: YG> "A header included in the message-header of a message is overridden by YG> headers of the same name included in a chunked transfer footer. YG> Implementers need to be aware that RFC 2068 compliant servers and YG> clients will ignore all headers but content-MD5 in a chunked transfer YG> footer. Thus, for example, if a Vary header is dynamically generated, it YG> would be reasonable to place a "Vary: *" in the message-header and then YG> the proper Vary value in the footer. That way RFC 2068 clients and YG> servers will not cache the document improperly thinking there was no YG> Vary header at all." I'm not comfortable with the idea of overriding a value in the header; this is (as Yaron pointed out) in conflict with the normal rules for combining multiple instances of a header field. However, this is not such a problem if the header field in the message header has _no_ value. To use Yarons example, if a Vary header is to be dynamically generated, the server would place 'Vary:CRLF' in the message header and a normal Vary header in the trailer. This would produce some change to the existing parsing rules, but might provide a usefull hint for many cases. I almost suggested this back when I had misinterpretted the wording of 2068 to mean that Content-MD5 was specifically forbidden in the trailer. I had assumed that implementors did not want to perform the MD5 calculation just in case the digest apeared in the trailer (reasonable), and thought that we could signal that the value would be in the trailer by sending an empty Content-MD5 in the header. Scott Lawrence EmWeb Embedded Server <[email protected]> Agranat Systems, Inc. Engineering http://www.agranat.com/ Received on Monday, 15 September 1997 10:11:13 UTC
global_05_local_5_shard_00000035_processed.jsonl/14275
From: Sam Ruby <[email protected]> Date: Mon, 15 Jun 2009 08:31:25 -0400 Message-ID: <[email protected]> To: Jonas Sicking <[email protected]> CC: Rob Sayre <[email protected]>, Shelley Powers <[email protected]>, Edward O'Connor <[email protected]>, "[email protected] WG" <[email protected]> Jonas Sicking wrote: > On Mon, Jun 15, 2009 at 2:59 AM, Sam Ruby<[email protected]> wrote: >> Jonas Sicking wrote: >>> On Sun, Jun 14, 2009 at 4:31 AM, Sam Ruby<[email protected]> wrote: >>>> Rob Sayre wrote: >>>>> On 6/9/09 10:52 PM, Sam Ruby wrote: >>>>>> Rob Sayre wrote: >>>>>>> On 6/9/09 6:02 PM, Shelley Powers wrote: >>>>>>>> Why reference the Mozilla API? I'm assuming because it drives the >>>>>>>> Mozilla editor, as well as the browser, which puts the API into the >>>>>>>> conforming author territory, while still being part of a user agent. >>>>>>> That's a good point. Just more fallout from the ridiculous author >>>>>>> conformance requirements. Pseudo-intellectual ideas about "semantic >>>>>>> markup" >>>>>>> just don't buy you that much as requirements. >>>>>>> Like anything else, some HTML files are better crafted than others, >>>>>>> but >>>>>>> conformance requirements should address showstoppers. >>>>>> Are there MUSTs in the current spec that the Mozilla foundation is >>>>>> unlikely to ever implement? Can they be identified specifically? >>>>> Yes, most of the authoring requirements are meaningless or at least >>>>> pointless. I hope you can forgive me for failing to produce an >>>>> exhaustive >>>>> list, but the subject of this message is a good example. >>>> Just to be clear: the subject of this messages is an example of something >>>> that absolutely prevent one or more products that aspires to be HTML 5 >>>> conformant from ever being so? Do I have this correct? Do others at >>>> Mozilla agree? >>> While I think it's an interesting idea, I'm not convinced it's >>> practical. I certainly agree that author conformance is a very weak >>> concept, and that most authors are not going to care if leave the spec >>> the way it is, or if we leave it up to the community to create some >>> sort of lint too, or if we say nothing about what is conformant and >>> what is not. >>> But I'm actually more worried about how the standards community would >>> cope. Though it's entirely possible to it'd cope better than it does >>> now (avoiding rat-hole about what should be valid and what shouldn't). >>> Another problem that we'd have to solve is what recommendations to >>> give to authoring tools. Right now we can tell them to output >>> conforming documents, but if that concept disappears we'd have to >>> replace it with something else. >> Forgive me, it is not clear to me how that response relates to my questions. >> Is there or is there not any product produced by Mozilla foundation that >> would be considered to be an authoring tool or markup generator that can be >> used to produce markup containing a font element? > Ah, yes, it appears I misunderstood your question. > Firefox does have code that deals with HTML authoring. I'm not sure if > that code specifically will output <font> tags, or if it only exposes > an API for surrounding text with an arbitrary element. Or if it's > something inbetween, such as it only exposes such an API, but that > it's aware that <font> is an inline element or some such. > Then there is Thunderbird which allows you to author HTML mail, and > which I just tested does output <font> tags. > Finally there is Composer which is a pure HTML editor, and which I'm > fairly certain in certain modes will output <font> tags. Though I > think the default behavior is not to, but I'm just working on vague > memories on that. > (Technically speaking mozilla doesn't produce a "product" with > Composer in it, just a platform which others turn into a product, but > that distinction I don't think is important here. Similarly, mozilla > foundation doesn't output any product, just technologies. It's > subsidiaries of the foundation that ship firefox and thunderbird. But > again, I don't think the distinction is relevant to this discussion). > So yes, we do currently ship products that do not conform to HTML 5 > when it comes to authoring requirements. I do hope that this is > something that we'll look into and fix as appropriate (amend the spec > or file and fix bugs). Just like we today don't nearly follow conform > to the HTML 5 parsing algorithm, but are working on fixing that. > Possibly thunderbird would have to keep outputting <font> elements if > other mail clients don't support @style as well as <font>. > I hope that I got your question correct this time :) Yup. :-) But you didn't answer it. :-P The specific question: "amend the spec or file and fix bugs"? Which do you (Jonas) think is more appropriate in this instance (font color)? Don't worry about the current state of tools or timeframes: what I am curious about is your thoughts on what the long term goal should be. This is an instance of a more general question, but lets explore that after we resolve the specific question. > / Jonas - Sam Ruby Received on Monday, 15 June 2009 12:32:19 UTC
global_05_local_5_shard_00000035_processed.jsonl/14276
RE: Updated DOCTYPE versioning change proposal (ISSUE-4) From: Larry Masinter <[email protected]> Date: Thu, 7 Jan 2010 18:04:03 -0800 To: Adam Barth <[email protected]> Message-ID: <[email protected]> >From change proposal rationale: >> While everyone *hopes* there are never going to be any further >> incompatible changes to HTML in the future, there *is* a >> possibility that in some unfortunate situation, it will be >> necessary to introduce incompatible changes. In that case, it will >> be necessary to introduce a new version indicator, to allow (alas) >> processors to determine which of the incompatible interpretations >> was meant. > If the new version is going to be incompatible anyway, why not add > the version indicator at that time? If you have a production workflow that only deals in valid documents, and you later introduce a version indicator which isn't valid now, then the existing workflow would reject the new version indicator as >> While this will be unfortunate, it would be doubly unfortunate to >> have to introduce a new "place" for a version indicator that was >> previously non-conforming, which would cause even worse uproar, >> because documents that *didn't* want the new incompatible behavior >> would have no place to say explicitly that which version of the >> incompatible behavior they wanted. > We wouldn't need to invent a new "place" for this information, we > could just resurrect this proposal to use the old place. The > documents that don't want the new behavior can just use the HTML5 > doctype of "<!DOCTYPE html>". If we were certain that this > eventuality would come to pass, we might want to optimize for it by > providing a more elegant alternative, but the current indications > are that this not a likely course of events. If you remember from the issue with "Referer", using the absence of an indicator to indicate something is ambiguous; a user specifying <!DOCTYPE html> might be saying they want the HTML5 behavior, or they might be saying they don't care about the behavior because they're not using the feature that has the incompatible change, or that they are willing to accept either behavior. >> By *allowing* a version indicator in conforming content today, we >> can avert more serious damage. Having a location for a version >> indicator, even if it isn't explicitly used, allows it to be used >> at some point in the future. > This is the core of your argument, but if the future version we're > planning for is incompatible anyway, why does it matter if it > re-introduces versioned doctypes? This isn't the core of my argument, by the way; it's only one of several arguments. And I think "incompatible" is not a binary "yes it's incompatible" or "no it is not". In most cases, incompatibilities are minor, only affect edge cases, may not be particularly significant to most users and only apply in particular cases. > You're not asking for anything to change for user agent > implementations, so it's not like user agents will act differently > in your alternative future. I think you have to be careful to allow staging of incompatible changes, basically, to allow for new browsers which implement the incompatible behavior to be deployed asynchronously with new content that is explicit that it wants the current behavior and not the new behavior. The way that can happen is: 1. allow current browsers and validators to accept a current version 2. allow (but do not encourage) content to be deployed which explicitly calls for current behavior using a current version indicator LATER: (after deciding to introduce incompatible change): 3. encourage current content which depends on old behavior to identify old version (only allowed by 2) 4. deploy new browsers which implement the new incompatible behavior, if there is an explicit new version indicator 5. deploy content which uses the version indicator to call for new behavior rather than old This change proposal basically does 1 and 2. Step 3 is possible because conforming validators allow current version indicators in 2. Steps 3 and 4 are asynchronous, and step 5 (which is what you need to get any benefit) is delayed until 4 reaches an acceptable If you do not allow explicit version indicators now, then we would need another step before 3 which would be to deploy validators which accepted a current version indicator. This would delay consistent adoption; more likely people would deploy incompatible content labeled with "Best Viewed With Firefox 12" instead. > You explicitly tell authors not to use the extended syntax: "A > PublicIdentifier SHOULD NOT be used," so the extant documents on the > world-wide web at this future time when we need an incompatible > version will likely be the same. I use "SHOULD NOT" carefully in the RFC 2119 sense, that the practice is not recommended except when there are good, well-understood reasons. There are some such justifications now (for use within editing or polyglot pipelines), but should an incompatible change be necessary, then the reasons would increase. Well before browsers that implement the incompatible change are widely deployed, content which is explicit as to the version intended can be deployed. And plans for incompatible changes would add to the justification for using version indicators. Possibly the SHOULD NOT in fact should be softened to MAY, or only applied in the context of hand-edited or manually assembled content, or situations where the actual version is > All that seems to change is the conformance status of documents > produced *after* the new incompatible spec is issued. No, documents with an explicit version indicator would be conforming NOW. That's important in staging the deployment of (unfortunate, hopefully unnecessary) incompatible changes. > Moreover, it's only the conformance status of those document > w.r.t. the *old* specification. That seems like pedantry in the > extreme. * the character, qualities, practices, etc., of a pedant, esp. undue display of learning. * slavish attention to rules, details, etc. I'm not sure how "pedantry" applies. Is supplying technical analysis based on facts and previous experience "undue"? We're engaged in writing a technical specification for a language used by millions, and being careful about rules and details. Is it "slavish" to do so? I think "pedantry" is inappropriately pejorative in this context. I said: >> In the history of computer languages, there are no languages that >> have not evolved, been extended, or otherwise "versioned" as long >> as the language has been in use. to which you replied: > Really? Where are the version indicators for C++? The C++ > languages has certainly evolve since its inception, but it hasn't > needed an explicit version indicator. I didn't say that there are no languages without in-band version indicators. C++ programs are not self-contained. They come with make files, version compatibility installers, and other documents which indicate -- usually pretty clearly -- which version of which language of which compiler is to be used to compile the program. C++ versioning is in fact problematic, and there are numerous ad-hoc solutions to managing the evolution of programming languages and compiler implementations. It is not possible to retrieve a C++ program and run it without getting out of band information about which version of C++ was intended, or using version information embedded in the README or configuration files or scripts. One of the key innovations of the web (in the early '90s) over previous distributed network information systems was the adoption of the MIME architecture, previously invented for email, to make interpretation of message bodies and content self-contained, so that a large amount of contextual information wasn't necessary in order to discern the meaning of an exchange. This allows HTTP to be stateless, which allows for load balancing, distribution, cloud computing, caching, and a wide variety of other facilities that were not possible with other distributed information systems. And part of the MIME architecture is that the content-type label in a message indicates the general category of information contained in the message, while any other versioning information is contained within the message itself. The adoption of MIME in HTTP wasn't a slam-dunk; it followed from the resolution to use MIME in Gopher at GopherCon '93; see The adoption of the MIME architecture in HTTP between HTTP 0.9 (which had no content labels at all) and HTTP 1.0 was again one of the major innovations in the web which has led to its growth and evolution over such a long period of time. Most of the MIME types in use on the web for stand-alone content contain in-band version indicators, whether for the whole file (as with image/gif, image/jpeg, application/ogg, application/pdf, Flash, Java), or through version indicators on chunks in an unversioned file structure (as with image/png and audio/mp3). While CSS and JavaScript don't have versions, but they are also not standalone content -- a CSS style sheet doesn't constitute a "message" in any meaningful way, and so the type and the version of the type can be managed as part of the bundle. > It seems entirely likely that HTML will continue to evolve without a > version indicator because the mechanism we've been using for > versioning has been more or less ignored because authors screw it up > too much. "more or less ignored" is in browsers; it seems to me that the majority of HTML editors use version indicators as part of the HTML authoring process. That the web has been successful, but that much current web content seems to be sloppily constructed, is not evidence of a causal relationship. By itself, it not an argument for reifying sloppy construction or adding a requirement for sloppy construction (by, for example, not allowing authors to identifying in a standard way which specification(s) they are attempting to be compatible with). The sloppy construction was a result of the success of the web and the DotCom bubble, not a cause. When I said: >> This applies to network protocols, character encoding standards, >> programming languages, and certainly to every known technology >> found on the web. You replied: > That's quite a bold claim and certainly untrue. But the "this" was in context of languages evolving without incompatible changes, and subsequently when I asserted: >> There are no known cases where a language hasn't gone through some >> at least minor incompatible change. you replied: > Right, but that doesn't mean we need a version indicator. So I think your "certainly untrue" is contradicted by your "right". If you had a counter-example of a web language that hasn't had at least a minor incompatible changes, you would have supplied it. > HTML has gone though a number of minor incompatible changes and the > world has managed not to end in spite of everyone ignoring the > version indicator. I don't think the criteria for continuing an HTML 4 feature in HTML 5 includes the requirement that "the world will end if we don't". And *everyone* does not ignore version indicators. In fact, the change proposal is much more explicit than before in requiring BROWSERS to not exhibit different rendering behavior in the face of version indicators, but to allowing validators, editors, and content production pipelines to use them. Yes, HTML can survive without a global version indicator, and only specifying <!DOCTYPE html> may continue to work in the narrow context of communication between web server and current browser, but leaving the ability to provide a PublicIdentifier and SystemIdentifier will allow some current production and editing tools to work better, and, if used carefully, will cause no harm. I think that's all we ask for new features, and the threshold for retaining old features should be lower than the threshold for adding new ones. > In summary, we don't need to add versioning now to future-proof the > spec because the effects of this change are felt only after we > discover an incompatible version is required. Attempting to prepare > for that eventuality as described in you change proposal doesn't > actually do anything substantive to help. The Change Proposal is not to "add versioning" but to "leave (some parts of) HTML4 versioning as a HTML5 feature". Couching this as an "addition" is misleading. The argument for "future proofing" was just one of several arguments. And I think I've made the case for why attempting to add a version indicator later would require an extra step in staging the deployment of what would be, presumably, an fix important enough to introduce an incompatibility. Received on Friday, 8 January 2010 02:04:50 UTC
global_05_local_5_shard_00000035_processed.jsonl/14278
Re: Checker Home Page and Regular Teleconference Details From: Sean Owen <[email protected]> Date: Mon, 21 May 2007 00:23:54 -0400 Message-ID: <[email protected]> To: "Roland Gülle" <[email protected]>, [email protected] I checked in code that now tests for "moki.xml" in test/docs/XXXXXTest/YYY test directories. So, you'll have moki.xml examples with which to test, and also an ability to inject your own for testing. On 5/18/07, Roland Gülle <[email protected]> wrote: > > Everything gets run for you, including Tomcat. I can imagine adding an > > intermediate "moki" document to the expected test results directory, > > and checking against it. I can then imagine running the tests in a > > mode that only checks the results of transforming that correct moki > > document into the results document. Or only checks the moki document. > > Does that answer the concerns? > yes, thanks. > roland Received on Monday, 21 May 2007 04:24:09 UTC
global_05_local_5_shard_00000035_processed.jsonl/14281
Re: Lifetime of Blob URL From: Arun Ranganathan <[email protected]> Date: Tue, 7 Sep 2010 16:08:26 -0700 (PDT) To: Darin Fisher <[email protected]> Cc: Jonas Sicking <[email protected]>, Jian Li <[email protected]>, Eric Uhrhane <[email protected]>, Dmitry Titov <[email protected]>, Michael Nordman <[email protected]>, David Levin <[email protected]>, Adrian Bateman <[email protected]>, Web Applications Working Group WG <[email protected]>, Anne van Kesteren <[email protected]> Message-ID: <841077255.502340.1283900906219.JavaMail.root@cm-mail03.mozilla.org> OK, thank you Darin :) This alleviates the naming tension. FileReader, FileException, and FileError it is, then. (Eliminating Blob from the inheritance hierarchy causes the problems Darin mentions below). On Mon, Aug 30, 2010 at 10:52 PM, Anne van Kesteren < [email protected] > wrote: On Tue, 31 Aug 2010 01:22:45 +0200, Darin Fisher < [email protected] > wrote: Another idea (possibly a crazy one) would be to eliminate Blob, and just use File for everything. We could rename BlobBuilder to FileBuilder and have it return a File instead of a Blob. Same goes for Blob.slice(). Of course, the File would not necessarily correspond to a real physical file on disk for performance reasons. Not having Blob at all works for me! I gave this some more thought. Here's some issues I came up with: 1) BlobBuilder -> FileBuilder This renaming seems to suggest the creation of a file, which is not the intent at all. 2) XHR.{asBlob,responseBlob} -> XHR.{asFile,responseFile} This renaming seems to suggest the creation of a file, which is not necessary for small responses. 3) Combine Blob and File into a single File interface This merging has the unfortunate side-effect of introducing a "name" property for the result of a File.slice() operation. It also means that the result of FileBuilder and XHR.responseFile would have a name. Considering the above, it seems like there is a place for Blob (or something like it). I can see Jonas' points about BlobReader vs. FileReader, and so I'm happy to backpedal and go with FileReader, FileException, and FileError, keeping Blob for cases where we don't promise a file. Received on Tuesday, 7 September 2010 23:09:00 UTC
global_05_local_5_shard_00000035_processed.jsonl/14282
W3C home > Mailing lists > Public > [email protected] > February 2005 Unavailable information in an assignment/copy expression - what happens? From: Gary Brown <[email protected]> Date: Fri, 4 Feb 2005 09:52:05 -0000 Message-ID: <002a01c50a9f$32cab370$0200a8c0@LATTITUDEGary> When a copy expression references a variable that has not been set, what should happen. The assign activity talks about the assign only succeeding if all of the copies succeed, otherwise the target variables are not affected. Does this mean that if one of the copies attempts to use an unset variable that it will fail, and therefore the assign will fail - then what happens? Does the next activity following the assign get executed? Received on Friday, 4 February 2005 09:52:16 UTC
global_05_local_5_shard_00000035_processed.jsonl/14284
[Bug 46] URLs in Multistatus From: <[email protected]> Date: Sat, 28 Jan 2006 02:07:44 -0800 Message-Id: <[email protected]> To: [email protected] [email protected] changed: What |Removed |Added Status|RESOLVED |REOPENED Resolution|FIXED | ------- Additional Comments From [email protected] 2006-01-28 02:07 ------- I'm not sure why this paragraph was moved into Section 8, and rewritten to indicate it applies to things other than hrefs in multistatus. It doesn't. Please move it back into the section about Multi-Status. Also, the normative statement about URL escaping is incorrect; this directly follows from URI syntax, thus all that is needed is a non-normative reminder. Changes (also in Section 8.2., para. 1: URLs appear in many places in requests and responses: the Destination header, the If header, and 'href' elements in XML marshalling. In particular, servers need to be careful in handling URLs in responses, to ensure that clients have enough context to be able to interpret all the URLs. Generally, the sender has a choice between using a Relative Reference (see Section 4.2 of [RFC3986]), which is resolved against the RequestURI, or a full URI. A sender SHOULD generally be consistent once it has chosen one of these approaches, but a server MUST ensure that every 'href' value within a Multi-Status response uses the same The Multi-Status response format may contain 'href' elements (Section 14.7) in multiple places, namely as child element of 'response' elements (Section 14.24). When the contents of an 'href' element contains a Relative Reference ([RFC3986], Section 4.2), it is relative to the Request-URI of the HTTP request. Section 8.2., para. 6: Identifiers for collections appearing in the results SHOULD end in a '/' character. Characters that aren't legal in HTTP URL paths MUST be percent-encoded (see section 2.1 of [RFC3986]) everywhere, including in XML marshalling defined in this specification. Identifiers for collections appearing in the results SHOULD end in a '/' character. Received on Saturday, 28 January 2006 10:07:48 UTC
global_05_local_5_shard_00000035_processed.jsonl/14285
Re: non-sgml characters From: David Woolley <[email protected]> Date: Wed, 17 Jul 2002 07:21:03 +0100 (BST) Message-Id: <[email protected]> To: [email protected] > Does this mean that I only have to change the charset element on my meta > tag to "UTF-8", with the *same* big5 text, and the browser will > automatically show the correct characters? If this is what you meant, No. You must provide a charset HTTP attribute, that describes the character set in which the document was sent, in the content attribute of the meta element, or in the real HTTP header and the browser will then convert the big5 into UCS internally, and display that. The browser should already be interpreting HTML numeric entities in Unicode, so should not change in that respect. If the browser displays Chinese characters when you include something like &#xa3;&#a3;, rather than two UK currency symbols, its broken - it probably means you are using a "Chinese environment" rather than the browser's own international character support. Such hacks are not necessary on NN6, IE4+, NN4.7+ (and maybe earlier NN4.x's, but not necessarily all), and correctly congfigured versions of Lynx, where the terminal supports the characters. It seems that you are already providing the correct charset. This is quite rare on CJK pages from academic sources and personal pages, although it is becoming quite common on Chinese news organisation pages. (Even worse than no character set, but which would appear to work with a Chinese environment, and with a suitably misconfigured standard browser, is using western Front Page's default of windows-1252.) To the extent that Chinese environments are still in use (for display - they tend to have richer input methods than the OS) and people don't specify the true character set, it is the result of workarounds for early commercial expediency, in going to market with US only products, which have outlived their usefulness, but still get in the way of proper use of the standards. Received on Wednesday, 17 July 2002 02:21:42 UTC
global_05_local_5_shard_00000035_processed.jsonl/14287
From: Charles McCathieNevile <[email protected]> Date: Wed, 12 Sep 2001 20:03:54 -0400 (EDT) To: Jim Ley <[email protected]> cc: "Ian B. Jacobs" <[email protected]>, Jonathan Chetwynd <[email protected]>, Al Gilman <[email protected]>, <[email protected]>, <[email protected]> Message-ID: <[email protected]> Right. I wuld expect onfocus and onmouseover to be used analagously, and it is true that a user agent can quite easily collapse the two as required. onclick is only triggered with a mouse (big bug in my opinion) although there is an onactivate in DOM 2 and in SVG and SMIL 2 which is designed to be triggered by click, double-click, keyboard activation, or whatever is appropriate for the user interface in question. On Thu, 13 Sep 2001, Jim Ley wrote: >There is a problem, if it is done in the obvious way. As I originally thought, but obviously didn't explain well. >Having the author set an onClick and an onFocus >that lead to the same script, if it shows up as two >entries in the context-adapted "what can I do?" >menu, is a real performance degrader. onMouseOver and an onFocus are more likely, click isn't defined only for a pointing device is it? If they are identical scripts handlers for the two events point to the same function, then a UA could collapse them to one, the same as collapsing icon and text links could be done, so the approach is possible, it needs to be mentioned in the specifications. Location: 21 Mitchell street FOOTSCRAY Vic 3011, Australia Received on Wednesday, 12 September 2001 20:03:59 UTC
global_05_local_5_shard_00000035_processed.jsonl/14288
Re: remedy for click event From: Sean Hogan <[email protected]> Date: Sun, 20 Sep 2009 13:27:10 +1000 Message-ID: <[email protected]> To: Doug Schepers <[email protected]> CC: [email protected] Doug Schepers wrote: > Hi, Krzysztof- > For reasons I've already stated, I respectfully disagree with your > interpretation of "deprecated", and I don't intend to apply it in the > case of DOM3 Events. While I am writing the spec for both authors and > implementers, the implications of deprecation most directly impact > implementers. I already use the term "deprecated" in what I see as a > specific and pragmatic approach throughout the spec, and unless I hear > from implementers that they disagree with that use, I'm not going to > change it. > I don't really understand the specific problems that 'click' presents > for you in the pragmatic case. If you show me examples where it > causes scripting or usability problems, that might help. > As a caveat: right now, I'm not prepared to develop features based on > general use cases (unless it's something I particularly want). If you > DOM3 Events, but we can always consider it for DOM4 Events. Yes, can it be added to the DOM4 Events wishlist. Received on Sunday, 20 September 2009 03:27:58 UTC
global_05_local_5_shard_00000035_processed.jsonl/14294
RE: New version of URI Declarations [Usage scenarios] From: Pat Hayes <[email protected]> Date: Wed, 5 Mar 2008 17:52:12 -0600 Message-Id: <p06230906c3f4721137b0@[]> At 7:06 AM +0000 3/5/08, Booth, David (HP Software - Boston) wrote: > > From: Pat Hayes [mailto:[email protected]] >> [ . . . ] >> There is a problem (more down-to-earth) with the notion of >> 'should be accepted', as well. This sounds like its >> impossible to enforce, >Correct. It is impossible to enforce because it is impossible to >know the user's intent. For example, if you use my URI to denote >the moon in some statements that you publish, there is no way for >other people's software that reads your statements to distinguish >between: (a) you chose to accept the assertions; and (b) you did >not choose to accept the assertions and violated this >architectural guidance. Therefore, your choice to use my URI to >denote the moon should be taken as prima facie evidence that you >agreed with the core assertions in my URI declaration. If you >don't, you should use a different URI. They have become necessarily attached to that particular URI: so we resolve the mistake not by saying (as we should) that your facts are wrong, but instead by saying that (since your declared assertions can't possibly be wrong) that your URI doesn't in fact denote what you say it denotes. Which is why I have to use another URI to denote what you said your URI should denote; but then how do you know that my URI is intended to denote the same thing as your URI? (Why would I coin a new URI if I intend to refer to the same thing?). In fact, this proposal, ironically, does the exact opposite of what you originally said it was for. It is a mechanism which makes it impossible to have genuinely referring URIs - we could call them de re URIs instead of de dicto URIs - because you have given us a de dicto mechanism and called it a de re one. >> and worse, that there are going to be >> cases where it shouldn't be enforced. Suppose A publishes >> some rdf R and says it is a declaration of the URI x:y, and >> also says (perhaps using English or a controlled vocabulary) >> that x:y is supposed to denote, say, the moon; and suppose >> that R says that x:y is made of cheese. Are we supposed to >> accept this, just because this twit has called it a >> declaration? >No. But if you *choose* to use that URI to denote the moon then >you are indicating that you *have* accepted the assertions. WHY?? I know that is your proposal, but it seems to make no sense. intentions for using it, that I must therefore agree with everything you say about it? This seems to get two different ideas - of referring to the same thing, versus agreeing with your propositions - mixed up. >Therefore, if you do not wish to accept the assertions, then you >should use a different URI when you make statements about the But then we BOTH have the problem of making sure that the other is agreeing with our intended referential purposes. You have gone to all this trouble to tell me that your URI denotes the moon, and lets presume you have succeeded in this task. OK, it denotes the moon: we agree. Why the hell should I not then use it to denote the moon while talking to you about your claims about the moon? It seems to me that if we follow your proposal to its logical conclusion, that all differences of fact will be transformed to differences of reference. You coin a URI to refer to the moon and make an assertion about the moon which is false. I am obliged to conclude that your URI does not in fact denote the moon, in spite of your claims. (It denotes some imaginary moonie-ish thing that you claim exists and satisfies your assertions.) So I coin a new URI to denote the real moon, and use to tell you about your mistake: but you think I'm wrong, so your conclusion is that my URI doesn't really denote the actual moon but must denote yet some third imaginary thing that satisfies all my assertions. At this point we are in a worse state of mutual confusion that we would be if we simply disagreed about the moon. >You could even mint your own URI based on the subset of my >URI's assertions that you do choose to accept, And what relationship would its denotation bear to the denotation of your URI, in this case? > in a manner >comparable to the URI substitution technique described here: >> These assertions are intended to delimit the range of >> possible interpretations of what the denoted resource might >> be -- ideally uniquely determining the resource, but (a) >> that depends on the quality of the assertions, and (b) as >> you pointed out, ultimately there is no way to ensure that >> a user's actual interpretation is the same as the minter's >> intent. >> Right, so the 'ideally' here isn't even an ideal: its >> impossible. >Yes and no. I completely agree that it is impossible in >general, as you've aptly pointed out over the past couple >of years. But for a given application, it may well be >adequate in uniquely determining the resource. I remain sceptical. Show me ONE example of how this might be achieved, without using an appeal to some commonly accepted referential vocabulary. > Thus, >someone publishing a URI declaration should strive to >make their assertions uniquely determine the resource >as best they can for the range of applications that they >anticipate, realizing that it is not possible to make >one that will be uniquely determining for all applications. But now we are back in a familiar situation where publication of SWeb content has to be made in some kind of 'closed' world of particular applications. And also, this gives every publisher of a new URI a huge and ill-defined task to strive to do. Strive is right, by the make great efforts to achieve or obtain something; struggle or fight vigorously. >> SCENARIO 1: Fred wishes to publish some RDF assertions >> about a particular protein. He notices that Alice, Beatrice and >> Carl have already published assertions about the protein, and >> they all use the same URI to denote that >> protein: the URI minted by Alice. Fred notices that if he >> uses Alice's URI to denote the protein, his assertions will be >> logically inconsistent with some of Alice's assertions, >> although they are logically consistent with Beatrice and Carl's >> assertions. He wonders whether he should publish his assertions >> using Alice's URI -- and post a blog entry noting that his >> assertions should not be used in conjunction with Alice's >> assertions -- or mint a new URI. >> Question: Should Fred use Alice's URI? >> relationship (not owl:sameAs) to Alice's URI -- at least >> rdfs:seeAlso. >> Whoa. I think this is crazy. The scenario says that the URI >> denotes the protein, so lets accept that it indeed does. (The >> 'attachment' to the particular protein may be done for example >> by relating the URI to a standardized protein database accepted >> by the community.) If this is so, then the only way that Fred >> and Alice can be inconsistent is if they actually disagree >> about the facts of the matter. Perhaps Fred has a more >> up-to-date value for the molecular weight than Alice had, or >> something. But in this case, I think Fred should use the same >> URI to refer to the protein. Removing the inconsistency by >> using a different name is like saying: Oh, I guess we must be >> talking about different proteins, then. But they aren't, right? >> They are talking about the same thing, but they disagree on the >> facts. This is a case where some published RDF is *wrong*, and >> should be corrected: or at least, the real disagreement should >> be resolved. >The problem with Fred using Alice's URI is that there is no >way in general to distinguish between: (a) Fred attempting to talk >about a different resource than Alice was talking about; and (b) >one of them being wrong. Indeed, there isn't, and your proposal doesn't help; in fact, it makes things worse. Two different URIs can denote the same thing or different things. Whereas one URI must denote a unique thing in each model, so at least our arguments about it can be cast into a framework of arriving at a state of mutual consistency. By using the same URI we are, in effect, agreeing that we are talking about the same thing or things, no matter how vague we might both be about what exactly this or these actually are. >>From an architectural perspective, there is no objective notion >of right or wrong: some assertions are merely useful to some >applications, while others are useful to other applications. Even >assertions that you and I might think of as "wrong" may be >adequate and useful for any applications. For example, highway >mapping assertions that presume the earth is flat may be >perfectly adequate for many guidance applications. Sure. Though this is a dangerous line of argument to follow too far: it leads to the 'rejoice in ambiguity' line I tried to sell a while back, which didn't meet with a very eager audience :-) >> [ . . . ] >> SCENARIO 3: Erin has accumulated some observations >> about a different protein, and she wishes to publish them as >> assertions. Some of them are merely assertions that serve to >> uniquely identify the protein that she wishes to talk about. >> Others are observations about the protein's behavior. >> Its not obvious that this distinction makes sense. Or at any >> rate, its not obvious that there is a particular category of >> facts that serve only to pin down reference. >I agree that there may be no way in general to distinguish >between assertions that serve to identify something and >other assertions. This is why the "core assertions" in a URI >declaration are, by fiat, viewed as identifying assertions. There is no way to tell male from female chicks. So we will put a red mark on some of them and say that the ones with a red mark are male, by fiat. Seems like a poor strategy to me. >> She is very confident about the correctness of the >> first set of assertions, but no so confident about the >> assertions about the protein's behavior. She mints a URI >> http://example/erin/proteins#p4 for the protein and wonders >> whether she should publish all of her assertions in one OWL > > document at http://example/erin/proteins, or separate them >> into two documents. >> Question: Should Erin put all of these assertions in >> a single document? >> Answer: No. Erin should separate them into two documents. >> Well, I agree that is good practice, but because she is more >> confident about some than about others. Thats the reason for >> the distinction, not that some pin down reference and others >> are mere facts. > > >> YOu have assumed that the reference-nailing assertions are >> also the ones that are known with confidence, but that begs > > an important question. >Yes, I made that simplifying assumption in this scenario. >> Consider a case where some empirical >> results are available which are very confidently true, but >> its not clear which protein they are relevant to (perhaps >> they were extracted from a biopsy which may have mixed two >> kinds of tissue: if this were genes instead of proteins, and we are >> talking about cancer typing, this is a real problem.) Now >> what do we 'declare' ? >You can declare a URI for the substance that was observed: a >potetial mix of two kinds of tissue. You could, but its unlikely to be a useful strategy. It amounts to saying that because there is a likelihood of experimental error, we should treat each observation as a separate experiment, and that eliminates the error. 40 South Alcaniz St. (850)202 4416 office Pensacola (850)202 4440 fax FL 32502 (850)291 0667 cell http://www.ihmc.us/users/phayes phayesAT-SIGNihmc.us Received on Wednesday, 5 March 2008 23:52:33 UTC
global_05_local_5_shard_00000035_processed.jsonl/14297
RE: updated service model From: Ugo Corda <[email protected]> Date: Wed, 14 Jan 2004 09:37:18 -0800 Message-ID: <[email protected]> To: "Francis McCabe" <[email protected]>, "Paul Denning" <[email protected]> > > > > I am uncomfortable with > > > > Interface *defines* choreography > As far as I am concerned, how you use a service is part of its > interface. And that is essentially what a choreography is (although > choreography extends to a more global POV). I am uncomfortable with that myself. There is more to a choreography than the interfaces involved. To take the WS-Chor example, if I only have a bunch of interfaces I have no choreography. What the choreography defines is the connection of interfaces to one another (in the sense that, for instance, one interface describes the response to a message associated with another interface), the correct sequence of messages, and the change in internal state of the various services involved. Received on Wednesday, 14 January 2004 12:38:46 UTC
global_05_local_5_shard_00000035_processed.jsonl/14322
Daa Daa Daa Manga UFO Baby Miyu, was sent to live with Kanata, a boy she just met when her parents go to America to live their dreams at NASA. Soon after, Kanata's father leave the two to live alone. Amidst the panic, a mysterious UFO came... and out popped baby Ruu and his babysitter-pet Wannya. For the sake of Ruu, the four of them start living together until help comes to take Ruu and Wannya back home... Daa Daa Daa Forums 10 People reading this Daa Daa Daa Chapters Daa Daa Daa Manga Cover 1. Comedy, Romance, Sci-fi, Shoujo 2. Completed 3. Kawamura Mika 4. 1 Votes, Rating: 5 Please rate this manga! 5. Watch Daa Daa Daa Anime Online Related Manga ×Sign up Sign up is free! Can't register? CLICK HERE Remember me - Forgot your password?
global_05_local_5_shard_00000035_processed.jsonl/14324
The Full Wiki More info on Jean-David Levitte Jean-David Levitte: Map Wikipedia article: Map showing all locations mentioned on Wikipedia article: Levitte as Permanent Representative of France to the United Nations, addressing the Security Council before its vote on resolution 1441. Jean-David Levitte (born June 14, 1946) is a French diplomat of Jewish heritage, formerly the French ambassador to the United States, and currently diplomatic advisor and sherpa to President Nicolas Sarkozy. He has also been named head of the future National Security Council. Levitte was born in Moissacmarker, in the south of France. He is a graduate of Sciences Po and of the French National School of Oriental Languages, where he studied Chinese and Indonesian. He is married to Marie-Cécile Jonas and has two daughters. A career in the French Foreign Affairs His firsts posts were in Hong Kongmarker in 1970 and in Beijing, China from 1972 to 1974. In the French Ministry of Foreign Affairs itself, he has served as Director of Economic Affairs (1974–1975), Assistant Director of West Africa (1984–1986), Assistant Director of the Cabinet (1986–1988), Director of Asia and Oceania (1990–1993), and General Director of Cultural, Scientific, and Technical Relations (1993–1995). Ambassador to United Nations in Geneva Between 1981 and 1984 he was the Adviser to the Permanent Mission of France at the United Nations in New York. Between 1975 and 1981, he was the chargé de mission at the General Secretariat of the President Valéry Giscard d'Estaing. Between 1995 and 2000 he was a diplomatic adviser and sherpa to the French president Jacques Chirac, a position to which he returned in 2007, under President Nicolas Sarkozy. Ambassador to the UN and Security Council From 2000 to 2002, he was Ambassador to the United Nations in New York, representing France at the Security Council before and during the negotiation that lead to the United Nations Security Council Resolution 1441 on Iraq. He was president of the Security Council in September 2001 and presiding over the Council's deliberations following the September 11, 2001 attacks on the United States. Ambassador to the US From late 2002 to 2007, he was Ambassador to U.S. J. D. Levitte presented his ambassadorial credentials to George W. Bush in Washington on December 9, 2002. He was succeeded by the current ambassador, Pierre Vimont, who was appointed on August 1, 2007. Back to the Élysée On May 16, 2007, he was appointed diplomatic advisor and sherpa to President Nicolas Sarkozy, and the head of a future American-style National Security Council. The nature and extent of his new role is not yet clear. While some commentators have suggested he will not eclipse Minister of Foreign and European Affairs Bernard Kouchner, Levitte has elsewhere been referred to as "seemingly the true Minister of Foreign Affairs." Despite assertions made while campaigning, it remains to be seen to what extent President Sarkozy will treat national security and foreign affairs as the "reserved domain" of the presidency. 1. [Un Conseil de sécurité nationale ? Oui, mais à la française !], "Le Figaro", May 30, 2007, "Mais l'idée qu'il veuille - ou puisse - éclipser un chef de la diplomatie comme Bernard Kouchner n'est pas concevable." 2. [Sarkozy et ses ministres], Novopress, May 31, 2007, "celui qui est semble-t-il le vrai ministre des Affaires étrangères." 3. [Qu'est-ce que c'est le domaine réservé?] 4.,1-0@2-823448,36-911881,0.html [Défense : M. Morin devra tenir compte du "domaine réservé" du chef de l'Etat], "Le Monde", May 18, 2007, "M. Sarkozy ayant estimé pendant la campagne électorale qu'il ne devait pas y avoir de "domaine réservé" du président de la République, il reste à voir si ce souhait va se concrétiser." External links Embed code: Got something to say? Make a comment. Your name Your email address
global_05_local_5_shard_00000035_processed.jsonl/14330
LTE Connected Car 4G Internet Coming to a Car Near You [Video] While newer cars have certainly become more sophisticated with technologies like Microsoft's Sync, we've always dreamed of an in-car dashboard capable of surfing the web at high speeds -- it would be like having a giant smartphone built-in to our car...
global_05_local_5_shard_00000035_processed.jsonl/14332
Hey guys, can any of you shed any light on this strange looking example?! The iteration Xn Xn+1 is given by: Xn+1 = Xn + Xn(1 - A Xn) A is an invertible mxm matrix and also : ll1 - AXoll = q < 1. Show that the sequence converges to A⁻1 with the estimates: llXn – A-1ll < 1/(1-q) . llX0ll . ll1 – AXnll < 1/(1-q) . llX0ll . q(2^n) Consider using matrix Rn = 1 - AXn and expressing A⁻1 in terms of Ro. Help would be very much apprieciated and your knowledge is of great value to me. May thanks!
global_05_local_5_shard_00000035_processed.jsonl/14341
What is meta? × Where can I ask if some language feature is better than others, if other programmers feels the same as me about some aspect of certain programming aspects and so on? On Stack Overflow, the questions simply get removed or similar, so which is the right Stack Exchange section? Super User does not seem enough programming related, and I don't have idea where to go ask... share|improve this question migrated from stackoverflow.com Jun 22 '13 at 20:24 This question came from our site for professional and enthusiast programmers. programmers.stackexchange.com –  austin Jun 22 '13 at 20:23 @austin: No. –  BoltClock's a Unicorn Jun 22 '13 at 20:24 If you are asking for people to agree/disagree with you on any programming issue (or any issue for that matter), Stack Exchange sites are out. This is not the kind of question we are interested in. –  Oded Jun 22 '13 at 20:29 @BoltClock'saUnicorn why not? If they're discussion kind of questions, they'll get closed out downvoted, but other than those types, it seems like the place he/she is looking for. –  austin Jun 22 '13 at 20:33 @austin: because both types of proposed questions are discussions? –  Mat Jun 22 '13 at 20:35 @Mat probably. Without knowing the question or the context it's hard to tell. In any case, Quora might be a good option if the question seems to open for discussion. –  austin Jun 22 '13 at 20:43 Quora accepts such questions. Sample: Why is Python better than PHP? –  Peter Mortensen Jun 23 '13 at 12:28 Reddit (I think): reddit.com/r/programming –  Old Checkmark Jun 23 '13 at 12:55 1 Answer 1 up vote 11 down vote accepted Programmers.SE supports somewhat more subjective/philosophical questions than SO, but I doubt a "Do you feel the same way I do about X" will work on any Stack Exchange site. People still have quite a bit of trouble figuring out exactly what does or doesn't fall within scope at Programmers though (the last time I counted, a simple majority of questions were being closed) so you probably want to read its FAQ and attempt to phrase your questions to be constructive before asking something there. To work on Stack Exchange in general, it still needs to be a question with some sort of real answer, not just inviting others to voice their agreement or disagreement with your rant. To characterize the two, I'd give a sample question that I thing would be reasonably suitable for each (though others might disagree): SO: I've written this code and it doesn't seem to be working out. Can anybody suggest a better way to write it? P.SE: Several times, I've tried to write this type of code using the Visitor pattern, but it generally hasn't worked out well. Can anybody suggest an approach that's likely to work better in this type of situation? share|improve this answer thanks, that is what I was looking for! –  Liquid Core Jun 23 '13 at 14:47 You must log in to answer this question. Not the answer you're looking for? Browse other questions tagged .
global_05_local_5_shard_00000035_processed.jsonl/14364
Ulquiorra "Schiffer" Cifer Ulquiorra Cifer add Supporting add Supporting Bleach Unmasked Short Stories add Main Member Favorites: 5170 Ulquiorra Cifer (ウルキオラ・シファ) Birthdate: December 1 Zodiac sign: Sagittarius Height: 169 cm (5'7") Weight: 55 kg When released his zanpakutō, Murciélago, Japanese for "giant black-winged demon," Spanish for "bat") creates two large black wings on his back. His hollow helmet centers atop his head, sporting two large horns, and his arrancar uniform appears more form fitting at the top, becoming robe-like towards the bottom. Additionally, Ulquiorra is apparently unique among the Espada in that he has a second release; Resurrección Segunda Etapa (Spanish for "resurrection second stage"). He becomes more muscular with clawed hands and feet, the whites of his eyes turn black, and his helmet is replaced with elongated horns. He loses his clothes; his arms and legs from the hip down are covered in black fur, and he gains a long thin tail. In both forms he can create long "lances" of energy called Lanza del Relámpago ,ransa deru reranpāgo?, Japanese and Spanish for ”lance of the lightning”), and when thrown can cause an explosion. Ulquiorra seems unfamiliar with the technique when he uses it in his second release state, unexpectedly missing Ichigo with his first one, however, to compensate, he can produce more should his first miss the target. (Source: Bleach character books I-III) Voice Actors Namikawa, Daisuke Oliver, Tony Yang, Seok jeong Lebret, Gwen Lott, Igor
global_05_local_5_shard_00000035_processed.jsonl/14365
Ranked #5827 LuCu LuCu (Manga) LuCu LuCu Alternative Titles English: LuCu LuCu Japanese: るくるく Type: Manga Volumes: 10 Chapters: 90 Status: Finished Published: Oct 25, 2001 to Mar 25, 2009 Authors: Asari, Yoshitoo (Story & Art) Serialization: Afternoon Score: 7.331 (scored by 593 users) Ranked: #58272 Popularity: #3800 Members: 1,296 Favorites: 13 1 indicates a weighted score 2 based on the top manga page. Popular Tags Suzuki Rokumon wakes up one morning to find a little demon girl, who can use her hair as appendages, preparing breakfast. In the living room he finds another strange demon, who claims to be his new Dad. Rokumon asks where his real Dad is and the demon tells him it is in the next room. Needless to say he's having a pretty bad morning. Thus begins Rokumon's strange new life, with Lucu and her demons, who according to her "want to save the world, and mankind." Suzuki, Rokumon Write a review | More reviewsReviews User Recommendations Strange little girl with prehensile hair joins a small family and helps them out with house work all the while learning about the world they're entirely new to. Both also happen to have a stalker for a crush, loveable lunatics that try (and fail repeatedly) to best the MC with absurd methods and a sensible person to keep their actions in line when not busy with school.  reportRecommended by ChainsawGuitar Off-beat comedy manga about unusual maids.  reportRecommended by Babby-Princess Both involve cute little girls discovering the world. Good for people looking for heartwarming comedy, wanting to d'awwww, and pedophiles. reportRecommended by CrashRHCP Recent News No posts for this board were found Recent Forum Discussion Poll: Lucu Lucu Chapter 90 Discussion 0 replies by -Kazu »» 06-27-13, 12:20 PM Poll: Lucu Lucu Chapter 1 Discussion 1 replies by jadsanime »» 08-09-10, 5:29 PM Related Clubs Manga Exchanger, seinen & josei More Users | My FriendsRecent Updates by Users External Links MangaUpdates, Wikipedia
global_05_local_5_shard_00000035_processed.jsonl/14372
Submitted by leonHurley 685d ago | article All your GTA 5 question answered – gameplay details & behind closed doors info from Rockstar OPM: There’s never been a Rockstar game as gigantic as Grand Theft Auto 5. Its land mass alone is three-and-a-half times bigger than Red Dead Redemption’s, and the total playable area once you factor in underwater regions is five times the size of John Marston’s cowboy classic. Overall, it’s larger than GTA: San Andreas, GTA 4 and Red Dead Redemption combined. That’s a lot of Blaine County to get lost in. (Grand Theft Auto V, PS3, Xbox 360) hiredhelp  +   685d ago How about is it official there s a PC version in the works.. Valkyre  +   685d ago You PC folks have to keep polishing and greasing your uber machines for quite a while, to receive games from us console peasants... And thats if you are lucky...! (Red Dead says hi btw) Pray each night and keep those transistors running! Open a petition! Fil101  +   685d ago A bit harsh buddy, I'm a ps3 gamer and in all honesty think it's a real shame that pc gamers dont get a chance to play RDR as it's one of the best games i've ever played this gen and am sure alot of people will agree. Einhert  +   685d ago A massive amount of fantastic PC exclusives say hi honestly such petiness from gamers is sad, the only peasants are those who game on one platform only. QuantumWake  +   685d ago They will probably release a PC version later this year or next year like they did with GTA 4. But I wouldn't wait up. Some people are still waiting for Red Dead Redemption to come to PC. lol Valkyre  +   685d ago By the way i was just joking around in a sarcastic way mind you, in my previous post. Dont take it literally. Besides I am playing on PC myself quite a few games. I am a strong believer though that if you are a gamer you need both a PC and a console. Consoles have lots of exclusive games that are nowehre to be found. GTAV will eventually land on PC in my opinion. It will just take some time. Fil101  +   685d ago lol sorry I dent see your secound post but totally agree with you that if you can afford a decent gaming pc aswell as a console then that is the way to go. Valkyre  +   685d ago No problem, i got it comming since i forgot to put the /s sign or j/k It was my bad. I am of the opinion that all great games should be enjoyed no matter the medium they are in. I mean I cannot understand -no matter how tech savy someone is- not to play the Last of Us, because it is on a console. At the same time I cannot understand if you have a good gaming rig not to demand high profile games such as GTAV. The only thing I hate are the extremes... I hate when some PC folks bash consoles and I hate it when console people bash PC. (ironic since my sarcastic 1 st post did just that hehehe) Anyway game on! GamerToons  +   685d ago So why the hell didn't they choose questions that we DIDN'T know the answers to? Audiggity  +   685d ago Because any question we don't already know the answer to, Rockstar wouldn't have answered :o) The media embargo process is tightly controlled. They know exactly what they can/can't say. Look what happens when hip hop artists leak details on in-game tracks and German e-commerce sites post the "PC Version". The interwebs blows up. R* knows they can squeeze more money out of this PR effort by funneling the followers down a predefined path. GamerToons  +   678d ago Lol I know. I was just pointing out the article trying to hype new information Evildoomnerd  +   685d ago Almost all my questions were answered. I'd still like to know if I can change my Aim/Fire buttons to L1/R1, like in Red Dead Redemption. shadowmist13  +   685d ago Im a pc gamer but I had a xbox 360 for a while and played skate and rdr,in the end all i played was skate so I sold it but regretting it haha,really hoping gta v is coming to pc,sucks that ps3 games wont work on ps4,because i want to buy a ps4,man this situation sucks hahaha. CaptainYesterday  +   685d ago It's coming to PC guys don't worry! :) Add comment New stories The 12 Best and Worst Splatoon Miiverse Posts Thus Far Start Making Games for the PS4 Endless Legend - Guardians - DLC PC Review | Chalgyr's Game Room Splatoon might be the start of a more creative Nintendo
global_05_local_5_shard_00000035_processed.jsonl/14373
Submitted by s8anicslayer 615d ago | opinion piece Is 2013 Gaming’s Greatest Year Ever? WC - "I remember around February of this year, I read an article that stated 2013 would be a boring year for gaming. At the time of reading, I thought to myself how stupid that was, seeing as how Bioshock: Infinite, God of War: Ascension, Splinter Cell: Blacklist, Gears of War: Judgement, Tomb Raider, The Last of Us, Grand Theft Auto V and more were all due out this year!" (BioShock: Infinite, Culture, Grand Theft Auto V, PS3, PS4, The Last Of Us, Tom Clancy's Splinter Cell: Blacklist, Wii U, Xbox 360, Xbox One) Neonridr  +   615d ago It's got to be up there as one of the great years that's for sure. With GTA V, Last of Us, Bioshock Infinite, Rayman Legends, Wind Waker HD and 2 new console releases there was a lot to be excited about. Ezz2013  +   615d ago agree 100% this year is incredible P0werVR  +   615d ago Also, given the all around great games from indies and just new ways of general gameplay that is on the rise throughout this year. So yes, AMAZING year. Nothing short of gaming stamina. UnHoly_One  +   615d ago How does Wind Waker HD qualify to make that list? lol Neonridr  +   614d ago why shouldn't it, have you seen the review scores of the game by any chance? Have you even played the game to justify that comment? Please enlighten us all and explain why it SHOULDN'T be on that list? UnHoly_One  +   614d ago Because it is just an higher res version of an older game. I'm not saying anything bad about it, it's just not a game that belongs in a list concerning 2013. Games4ever  +   615d ago The Last of Us and GTA V two of the best ever imo. MR123_C  +   615d ago I think 2011 was the best year. Skyrim, battlefield 3, infamous 2 and dark souls. Supermax  +   615d ago Bio shock last of us gt5 beyond 2 souls killzone shadowfall bf4 it's a great year JS100  +   615d ago I hate to point out the obvious, but with the constant improving off technology, every year is the best gaming year yet as it happens. It goes without saying to the extent that anyone thinking it needs to be stated may be mentally handicapped. Coffee tastes like coffee. #5 (Edited 615d ago ) | Agree(0) | Disagree(1) | Report | Reply Neonridr  +   614d ago huh? Just because tech gets better doesn't mean games get better. Some of the best games ever created are 15+ years old now. Half Life, Ocarina of Time, Mario 64 are 3 games that deserve to be way up on the list and were all created in the 90s. JS100  +   613d ago "Just because tech gets better doesn't mean games get better." Actually, yes it does. It takes nothing away from classic games, or replay-ability. #5.1.1 (Edited 613d ago ) | Agree(0) | Disagree(1) | Report Neonridr  +   613d ago I guess if you are referring to graphics and game world sizes, then yes, games get better with newer tech. But having more horsepower does little to aid in the creativity of gaming. A pretty game can still be a $hitty game. Add comment New stories Domination Event Unleashed in World of Tanks TCG Tuesday: Modern Masters Weekend Start Making Games for the PS4 Radeon Fiji Will Come With 700-750 Euro Price Tag Related content from friends
global_05_local_5_shard_00000035_processed.jsonl/14383
Page last updated at 00:24 GMT, Thursday, 26 March 2009 Ready for lift-off on the Kazakh steppe By Rayhan Demytrie BBC News, Baikonur cosmodrome Behind the scenes at the Soyuz spacecraft launch site Despite the freezing wind of the Central Asian steppe, photographers have been trying to get the best shots of a Soyuz spacecraft being slowly transported by rail to the launch site. This is the Baikonur Cosmodrome - the world's largest and oldest space launch facility. Every launch here follows the same ritual. It starts with assembling the rocket at the Installation and Test Building three days before lift-off. A tour of the Kazakhstan space museum At 0700 sharp, two days prior to launch, the assembled rocket is transported by railway in a horizontal position to the launch site. The train moves at 5 km/h (3 mph) - an average human walking speed. Originally, the founder of the Soviet space programme Sergei Korolyov used to personally lead the procession to the launch pad by walking ahead of the train. At the launch pad, engineers slowly raise it to its vertical starting position. "Most Soyuz spacecraft take off from Site Number 1, also known as the Gagarin start," says Igor Barmin, chief engineer of the launch pad. "Among the nine launch complexes at Baikonur, the Gagarin Start has been used the most. So far more than 400 rockets have taken off from this position." Space tourism The next Soyuz launch is scheduled for 1149 GMT on Thursday. Soyuz spacecraft ready for launch Baikonur is the world's busiest space launch pads Expedition 19 will include Russian commander Gennady Padalka, US flight engineer Michael Barratt and US businessman and space tourist Charles Simonyi. Its destination is the International Space Station (ISS). This is software billionaire Charles Simonyi's second mission into space. He previously flew to the ISS in 2007, for which he paid $24m. This latest journey is costing him $35m. But Simonyi could also be the last space tourist travelling to the ISS because there may not be enough room on board for future space adventurers. In 2010 the US space shuttle programme is expected to retire for at least four years, which means that Nasa astronauts will depend on Russian Soyuz rockets to send their crews to the ISS. Secret location Baikonur Cosmodrome covers almost 7,000 sq km of Kazakh steppe, three times the size of Luxembourg. The entire centre includes nine launch complexes and is leased to Russia until 2050. Established in the 1950s as a top-secret facility, Baikonur was originally built to develop and test the largest range of intercontinental ballistic missiles. To keep the location as secret as possible, the name Baikonur was deliberately chosen by the Soviets to be misleading. The real Baikonur is a village in northern Kazakhstan, several hundred miles away from the actual cosmodrome. The official name of the centre was State Test Range No 5 and is located in Tyuratum, southern Kazakhstan. After the break-up of the Soviet Union the cosmodrome fell under the ownership of Kazakhstan. But an agreement was reached in the 1990s for Russia to pay an annual fee for renting the complex, currently worth $115m. The former military facility has been fully transformed into a civilian launch pad, but it is still one of the most difficult places to visit in Kazakhstan, requiring permission from the Russian Federal Space Agency. Print Sponsor Timeline: Space flight 29 Jul 08 |  Science & Environment The BBC is not responsible for the content of external internet sites Has China's housing bubble burst? How the world's oldest clove tree defied an empire Why Royal Ballet principal Sergei Polunin quit Sign in BBC navigation Americas Africa Europe Middle East South Asia Asia Pacific
global_05_local_5_shard_00000035_processed.jsonl/14387
Page last updated at 14:45 GMT, Thursday, 1 October 2009 15:45 UK Fossil finds extend human story By Jonathan Amos Science reporter, BBC News Ardipithecus artist's conception (Science) An impression of what "Ardi" would have looked like based on the fossil finds The most important specimen is a partial skeleton of a female nicknamed "Ardi". If Ardipithecus ramidus was not actually the species directly ancestral to us, she must have been closely related to it The Ardipithecus project team The international team has recovered key bones, including the skull with teeth, arms, hands, pelvis, legs, and feet. But the researchers have other fragments that may represent perhaps at least 36 different individuals, including youngsters, males, and females. One of the lead scientists on the project, Professor Tim White from the University of California, Berkeley, said the investigation had been painstaking. "It took us many, many years to clean the bones in the National Museum of Ethiopia and then set about to restore this skeleton to its original dimensions and form; and then study it and compare it with all the other fossils that are known from Africa and elsewhere, as well as with the modern age," he told the journal. Tree life The fossils come from the Middle Awash study area in the Afar Rift, about 230km northeast of Addis Ababa, Ethiopia's capital. Natural History Museum's Professor Chris Stringer: "The skeleton is very primitive" Some of the characteristics of the animal's skeleton are said to echo features seen in very ancient apes; others presage traits seen in later, more human-like species. The scientists say 1.2m-high (4ft) Ardi was good at climbing trees but also walked on two feet. However she did not have arched feet like us, indicating that she could not walk or run for long distances. "She has opposable great toes and she has a pelvis that allows her to negotiate tree branches rather well," explained team-member Professor Owen Lovejoy, from Kent State University, Ohio. "So half of her life is spent in the trees; she would have nested in trees and occasionally fed in trees, but when she was on the ground she walked upright pretty close to how you and I walk," he told BBC News. Map of sites in Ethiopia That she lived in what would have been a wooded area 4.4 million years ago is somewhat challenging, says the team. It had been thought that early human evolution was driven, if only in part, by the disappearance of trees - encouraging our ancestors to walk on the ground. "These creatures were living and dying in a woodland habitat, not an open savannah," said Professor White. Because of its age, Ardipithecus is said to take science closer to the yet-to-be-found last common ancestor with chimps, our close genetic relatives. And because many of Ardipithecus' traits do not appear in modern-day African apes, it suggests this common ancestor may have existed much further back in time than had previously been supposed - perhaps seven or nine million years ago. Comparisons with modern chimp and gorilla anatomy also underline just how much these African apes themselves have evolved since parting company with the line that led eventually to modern humans. Rapid evolution Asked whether A. ramidus was our direct ancestor or not, the team said more fossils from different places and time periods were needed to answer the question. "We will need many more fossil recoveries from the period of 3-5 million years ago to confidently answer that question in the future," the scientists said in a briefing document that accompanied their journal papers. "But if Ardipithecus ramidus was not actually the species directly ancestral to us, she must have been closely related to it, and would have been similar in appearance and adaptation. Ardipithecus skull reconstruction (Science) It has been a 17-year investigation to assess the discoveries Independent experts in the field are struck by how primitive Ardipithecus appears compared with the Australopithecines, another group of hominid (human-like) creatures from Africa that lived slightly nearer to us in time. One species in particular, Australopithecus afarensis, the famous "Lucy" fossil found in 1974, is very strongly linked into the human story because of its developed walking ability. For Ardipithecus ramidus to also sit on that direct line seemed to require some rapid evolutionary change, commented Professor Chris Stringer from London's Natural History museum. "With Australopithecus starting from four million years ago, one would have thought that things would have moved further down the line by 4.4 million years ago," he told BBC News. "OK, you can have very rapid change, perhaps; or Ardipithecus might be a residual form, a relic of a somewhat older stage of evolution that had carried on. Perhaps we will find something more like Australopithecus at 4.4 million years old somewhere else in Africa." Hominids timeline Print Sponsor Fossils fill gap in human lineage 12 Apr 06 |  Science & Environment 'Lucy's baby' found in Ethiopia 20 Sep 06 |  Science & Environment Ancient skull found in Ethiopia 27 Mar 06 |  Science & Environment Scientists unearth early skeleton 07 Mar 05 |  Science & Environment Amazing hominid haul in Ethiopia 19 Jan 05 |  Science & Environment The BBC is not responsible for the content of external internet sites Has China's housing bubble burst? How the world's oldest clove tree defied an empire Why Royal Ballet principal Sergei Polunin quit Sign in BBC navigation Americas Africa Europe Middle East South Asia Asia Pacific
global_05_local_5_shard_00000035_processed.jsonl/14388
[an error occurred while processing this directive] BBC News watch One-Minute World News Last Updated: Wednesday, 2 August 2006, 07:53 GMT 08:53 UK Champion beer holds on to crown A beer brewed in Essex has been named Champion Beer of Britain for the second year running. Brewers Gold, by Crouch Vale Brewery in South Woodham Ferrers, beat more than 50 other finalists to scoop the Campaign for Real Ale (Camra) accolade. The Camra Good Beer Guide describes the winning beer as "a honey-toned golden ale with grapefruit sharpness offset by suggestions of melon and pineapple". Colin Bocking, who runs the brewery, said he was surprised to have won. "It's a recognition from the people who actually drink the stuff that they like it, and it's very important to me." Brewers Gold accounts for more than 50% of Crouch Vale Brewery's beer production. Pubs not as popular in the east 18 Feb 03 |  England The BBC is not responsible for the content of external internet sites Has China's housing bubble burst? How the world's oldest clove tree defied an empire Why Royal Ballet principal Sergei Polunin quit Americas Africa Europe Middle East South Asia Asia Pacific
global_05_local_5_shard_00000035_processed.jsonl/14420
Paris Hilton Launches Eighth Fragrance; Lash Conditioner Hits the Market • Paris Hilton's next perfume is called Fairy Dust, and she will appear dressed as a fairy in all marketing materials. This is her eighth fragrance. Clearly, seven weren't enough. [Cosmetic News] • A 13-year-old boy in Ohio was banned from wearing black eyeliner, black fingernail polish, and black lipstick to school because administrators deemed it "distracting." His mother is fighting back, saying that it's gender discrimination because they would never force girls to take off their makeup. Go Mom. [Jezebel] • Model Julia Stegner is the new face of Maybelline's Lash Stiletto mascara. So that's what our eyelashes are missing — stilettos. [WWD] • Beauty companies thought they wouldn't get hit hard by economic conditions because people are more likely to buy a $20 lipstick than a $2,000 bag. But sales in the prestige beauty market are in steady decline. [WWD] • Ironically, Skin Research Laboratories just came out with NeuLash, a $150 conditioner for your eyelashes. Yes, eyelash conditioner. We love our beauty products and all, but puh-lease. [WWD]
global_05_local_5_shard_00000035_processed.jsonl/14428
Chapter 5. Foucault, Davidson, and Interpretation 1. Timothy O'Leary2 and 2. Christopher Falzon3 1. C. G. Prado BA, MA, PhD Professor Emeritus Published Online: 25 FEB 2010 DOI: 10.1002/9781444320091.ch5 Foucault and Philosophy Foucault and Philosophy How to Cite Prado, C. G. (2010) Foucault, Davidson, and Interpretation, in Foucault and Philosophy (eds T. O'Leary and C. Falzon), Wiley-Blackwell, Oxford, UK. doi: 10.1002/9781444320091.ch5 Editor Information 1. 2 University of Hong Kong 2. 3 University of Newcastle, Australia Author Information 1. Queen's University, Kingston, Ontario, Canada Publication History 1. Published Online: 25 FEB 2010 2. Published Print: 19 MAR 2010 ISBN Information Print ISBN: 9781405189606 Online ISBN: 9781444320091 • Foucault, Davidson, and interpretation; • two thinkers - more disparate than Michel Foucault and Donald Davidson; • the misperception - Foucault's relativistic conception of truth; • Foucault's relativization of truth - his understanding of truth as entirely linguistic; • Foucault's understanding of truth as a property - practice-bestowed rather than world-bestowed; • Foucault's rejection of linguistic idealism - rooted, in his repudiation of implications of his archaeological work; • Foucault understanding of all truth - as linguistic and power-produced; • Davidson's account of interpretation, central - rejecting traditional understanding of language as conventional; • the principle of charity or presupposition - true beliefs about the common environment; • Davidson's interpretation, understanding acquisition of interpretive inclinations - or prior and passing theories as changes in subjects This chapter contains sections titled: • The Misperception • Davidson on Interpretation • The Proposal • References
global_05_local_5_shard_00000035_processed.jsonl/14429
• Spanish; • foreign language; • proficiency development; • speaking; • writing An important task for foreign language (FL) instructors and researchers is to understand how the development of each language skill affects other aspects of language acquisition. This case study seeks to determine if speaking and writing proficiencies develop at similar rates among FL learners. Seventeen students enrolled in beginning, intermediate, and advanced Spanish courses at a mid-sized U.S. university were administered the ACTFL Oral Proficiency Interview and Writing Proficiency Test. Speaking and writing proficiency scores were then correlated. Results showed a fairly strong correlation between speaking and writing scores among experimental group participants, but much weaker correlations between proficiencies when each of the three groups was examined individually. Some students were more proficient writers than speakers, others better writers than speakers, and others equally proficient.
global_05_local_5_shard_00000035_processed.jsonl/14431
• Dinitrogen fixation; • carbon costs; • Pisum; • Vicia; • legumes Abstract: Long-term (14 days) carbon costs of N2 fixation were studied in pot trials. For this purpose the CO2 release from the root space of nodulated and non-nodulated (urea nourished) Vicia faba L. and Pisum sativum L. plants was compared and related to the amount of fixed or assimilated N. Additional measurements of shoot CO2 exchange and dry matter increment were carried out in order to calculate the overall carbon balance. The carbon costs for N2 fixation in Vicia faba 1. (2.87 mg C/mg NfiX) were higher than in Pisum sativum L. (2.03 mg C/mg Nfix). However, the better carbon efficiency in Pisum sativum 1. did not lead to a better growth performance compared to Vicia faba L. Vicia faba L. compensated for the carbon and energy expenditure by more intensive photosynthesis in the N2-fixing treatment. This was not the case with Pisum sativum L., where the carbon balance indicates that the carbon costs of N2 fixation restricted root growth. It is proposed that low carbon costs for N2 fixation indicate an adaptation to a critical carbon supply of roots and nodules, e.g., during the pod-filling of grain legumes.
global_05_local_5_shard_00000035_processed.jsonl/14438
29 January 2009 Stinky: Another Kind of Easy Reader? • Oversized, capitalized, and boldfaced letters for emphasis. • Sound effects, such as the boy's whistling and chomping. AliceB said... I agree that it's a different way of reading. I disagree that it's a challenge. Kids are bombarded with images from birth: television, signs, boxes, toys, billboards, board books (on a literary level), and more. They learn to read faces very early on and interpret simple lines. Punctuation as emotion may be new, but reading pictures dates back to Neolithic times, and was used with powerful effect in stain glass for illiterate church goers. J. L. Bell said... I think a beginning-reader book in comics form is a challenge in the same way as a beginning-reader book in prose form. They both are enticing young children to develop new skills. I'm not sure which form, if any, is more challenging. I also think there's a secondary challenge lurking here, which is figuring out what's acceptable in one form but not the other. Combining punctuation marks (e.g., "?!?!") is common in comics, non-standard in prose. (Though there's an example in Alvin Ho.) Expressing fondness by drawing a little heart is acceptable in comics, emails, personal letters, and on Valentine's Day. Doing so in a literary novel or business letter would be thought askance. AliceB said... All good points. But do all beginning readers need to be pedagogical? Why can't they be for fun? There'll be plenty of teachers to tell the kid the proper use of exclamation points and question marks in prose, and to stifle her/his use of little hearts. And on a pedagogical note, I have seen reluctant readers turned around by Captain Underpants -- because of the comics. Although there's a significant prose element, the pictures are what brought the reader to the book. J. L. Bell said... But do all beginning readers need to be pedagogical? Once we call them “books for beginning readers,” I think there’s an implicit message that the books are educational. That label says they’re not for anyone who simply wants simple stories. They’re stories for readers at a particular stage of intellectual development. The word “beginning” might further imply that those readers will progress to another stage. It’s not necessary to classify books that way, but our culture does. And given that classification, I thought it significant that the ALA committee found this book for beginning readers worth honoring, given that people read it in a different way from the other honorees. It’s been so long since I looked in a Captain Underpants book that I don’t recall how much of them comes in prose form and how much in comics form. Obviously, their superhero milieu owes a lot to comics. And might keep them from being considered for such an honor.
global_05_local_5_shard_00000035_processed.jsonl/14451
You are viewing pocketwatched 19 December 2011 @ 07:54 am lol because promised: My River / season 6 rant / essay-type... thing   River Song is a terrible character and an even worse plot device. Season 6 was basically all about the origins of River Song, which, if you weren't a fan of the character, was mostly an unsatisfying season to put it mildly. From the jump-hop-spring from plot to plot, skipping over character development and established personality traits entirely, and timey loopholes that, when you think about it for a while, really don't hold up (apart from ~*~timey wimey~*~) and the dependency on these timey-wimey 'puzzles' (they're not really puzzles if you can solve it by handwaving it, but I can't very well call it an egocentrical pat on the back from the writer to the writer himself) to make up for the lack of weight and danger that this entire season encompasses, season 6 has definitely been a low point in my Doctor Who watching history. But the worst part was definitely River Song - not even Alex Kingston's brilliance can make me like this shoe-horned in 'heroine' (or is it sympathetic villain?) who we are all supposed to fall in love with. Moffat gives River Song such qualities and paints her with these EPIC GLASSES (which are cool, of course) that the character in reality can never really live up to it. I'll start with her timeline. This is the first thing we learn about River Song, and it does its job in attracting our attention; she and the Doctor's timelines are opposites, and an older Doctor will always meet a younger River. Don't ask me how this even works - I assume the Doctor keeps traveling to her previous time to pick her up, which I'm sure isn't meant to be weird but ~*~romantic~*~ because they're star-crossed lovers this way. LITERALLY! However, it's also incredibly manipulative writing, by which I mean we're supposed to care about River Song because she is important to the Doctor, and knows about his future, and even knows his name! Clearly she is an amazing character, and so ~*~deep~*~. I didn't mind this so much at first, because it was a clever mirror on what must be a lot of people's first impression of the Doctor himself, plus, she sacrificed herself for the Doctor! She was kind of epic, and spunky, and didn't take the Doctor's crap like most people who meet the Doctor do. When 10 meets her, she's just an enigma trapped in a mystery and she remains that until we see each other the next time. I like it when writers do that, kill a character before their story is told. It's a sure-fire way to get people interested in what the hell the character was really about. However, that is at the end of River's life (Well, not really, but I will get back to that later), so it was rather inevitable that we would meet her again, right? I wasn't too enthused by her but I didn't mind learning more about her. But as we see more and more of her timeline, the events unfolding just make me more and more disturbed by how her entire character was written. It's so problematic in so many different ways, none of which are more than just fleetingly, if at all, touched upon. I know that her tragic past and lack of agency about anything in her life (because since she apparently goes time-backwards, all of this has been seen by every other person in her life and thus they... make it happen for her, I assume? I'll get on that later) is supposed to make me feel sorry for her and is supposed to be the 'soft' side to her quirky and at times psychotic personality... but it really doesn't succeed at making me feel for her. So, in season 6 we find out that River Song is (sort of) a Timelord (Timelady? Although I've been told that this is actually a title you have to study for, like Professor or Doctor. But I digress - clearly that doesn't matter to Moffat since it sounds cool so WHATEVER). Also, she is the Ponds', his current companions, future daughter. Who was necessary to kill him to keep the Doctor quiet because he knew the answer to the universe's first question. And apparently everyone in the Universe knows that the Doctor is meant to die at a certain spot on Earth, at a certain date, except the Doctor himself (Who knows how that works when he has a TARDIS and should've presumably at least met someone with that information before, let alone come past a date PAST that event and found out through that way? Never mind). So she's trained from birth in ways how to destroy the Doctor. Apparently, by being forced to wear an astronaut suit(?). Except she escapes from the Silence (I mean the aliens, not the order... this will get confusing really fast because they never officially gave us a name for these aliens you forget once you look away from them) and somehow, despite her escaping on Earth in the 60s as a child, she is still a child (regenerated in the meantime, so she doesn't look like Amy and Rory) once she meets up with Amy and Rory in the 90s. And then she grows up alongside them. And she knows she will meet the Doctor through Amy and Rory because she knows they will become his companions in the future because she knows she's their child... Are you keeping up? Because I sure am not. Now, after seeing the end of season 6, how necessary was it for River to be Amy and Rory's daughter? I'm only questioning this from a writer's point of view, because it just felt, once again, like I was being manipulated to care for this baby because she mattered to Amy and Rory. In fact, the half-season finale revolved solely about the 'shock' of River being their daughter. And after she was kidnapped and revealed to have been their child all along, the baby Melody is oddly lacking from the script. Some of the episodes got reshuffled and placed before the reveal rather than after and vice versa, but that still doesn't excuse the ridiculous lack of concern Amy and Rory have for their baby. Not even a mention of her! Clearly, they know she's going to be fine, and because River is in such a consctricted timeline (lack of agency coming into play again), they can't do much more than accept that they grew up with their baby thinking she was their friend, and that's as good as they're gonna get. Oh well, let's not mention her anymore then, shall we? Even though season 6 was obviously written with a specific parents and children theme in mind. There was such a disconnect of emotions for me (no, the trailer for the back episodes of season 6 doesn't count) and it was hard to remember Amy and Rory were even parents. If you are going to make River Amy and Rory's daughter, you should at least be able to follow-up with that in your writing. Even though they knew River would be fine, making the danger of the show once again lackluster if it was there at all. Now, if River had just been a random baby which somehow had Timelady... abilities ready to be awakened, then I would've understood the lack of concern Amy and Rory had for this baby so much more. And it wouldn't have made an ounce of difference. Now, granted, River supposedly was picked as the Doctor's killer for being a Timelady, which is why they needed her to be conceived in the Tardis (let's do the handy-dandy timey-wimey handwave!). But why was it necessary for River to be a Timelady in the first place? Apparently the Silence wanted River to be the perfect killer so... how does being a Timelady fit into that? In fact, River 'kills' the Doctor because she was placed in an astronaut suit that was automated. So couldn't the suit have done it by itself? Why did we need a Timelord killer for this? Why did we need a person for this at ALL? Did it somehow magically run on Timelady energy? Was it because it was already known River would kill the Doctor, so they just needed to complete the circle of her timeline and in order to stop time from collapsing in on itself they HAD to kidnap her? I am completely lost on this point. In fact, they never mention her being a Timelady again, apart from when she gives him all her regeneration cycles... and that's where her Timelady plot point ends. I maybe understand needing the regeneration cycles from a writer point of view so that Amy and Rory could grow up with Mel without realizing she is River, as well as River going from wanting to kill him to wanting to love him (really? What? I guess it makes sense because River is quirky right? A 180 is totally believable from her!) but from an organisation who supposedly cares about nothing but keeping the Doctor quiet about this so-called dangerous answer, there is no logical reason to jumpstart her Timelady abilities. To me, the worst part of River, despite her special snowflake origins and general Mary Sue-isms, is her awful dependency on the Doctor. I know, people (read;everyone but me) find this romantic, and it was kind of inescapable with her life being what it is, but to me, it made the River Song I watched originally become nothing more than a front to hide the woman inside who wanted to be with the Doctor so badly she was happy destroying the rest of the Universe. I know, I know, the River we see when she meets 10 is the old, wisened River, who grew up a bit, but knowing River comes from a mindset like that makes me feel disgusted by the writing. The writing of her character, the writing of her story, and she's nothing more than a pawn in her own plot point. It's frustrating, because when we see River have fun, she is actually pretty damn cool, but then the plot intervenes once more. Right from the beginning of season 6 we're told that River doesn't fear death, she fears the day the Doctor won't know who she is. Apparently, her entire life and identity is so zero-focused on the Doctor that she literally has no reason to live without him and his regard for her. I mean, I get it, it's sad, but really? That's how you're planning on writing your kickass and capable archeologist professor who doesn't take crap from anyone, not even the Doctor? That was the big fat warning sign for what was to come for the rest of the season. Now we know that Melody was kidnapped and placed on Earth in the 60s and that the Doctor failed to rescue her. Probably because he already knew they saw and freed her in the 60s so he can't interfere before that. But, from what we know of Mel, her entire scholarly focus was on the Doctor. The Doctor was the answer for everything. Her entire storyline from that point on is that she was indoctrinated to kill the Doctor, which she does indeed try once she finally meets him, and seems to succeed at before she gives him her regenerations. But when Amy and Rory convince her that the Doctor is worthy of being alive (and I guess, worth living for?), she drops her entire raison d'etre and becomes determined to be the River Song the Doctor said is his friend. I guess it's a good change, and a healthy one for her, but her enormous focus for the Doctor doesn't fade at all and in fact just gets worse. Which is why I was yelling at my television when the Doctor married River in the finale. I have to admit, I was holding onto the faint hope that the title of the finale, 'The Marriage of River Song' was going to be a clever misnomer and it was going to be something entirely unexpected. Sadly, this was not the case. River is kidnapped by the Silence (she never escaped!) and put in the astronaut suit and shoved into Lake Silencio, where she (read: the suit) will kill the Doctor. However, she refuses to kill him, but because it was a fixed point in time and it had to happen, she caused time to collapse in on itself. Myfanwys roaming the parks! Dickens on television! Cleopatra being around! Now, only River and the Doctor remember what really happened in the 'real' timeline, but River doesn't want to reverse it. She instead calls for help from the entire Universe, because the Doctor believes he's better off dead and River wants to show him that he's loved (by nobody more than by her). I believe the dialogue goes "I can't let you die without knowing you are loved. By so many, and so much. And by no-one more than me." "Billions on billions will suffer and die." "I'll suffer if I have to kill you." "More than every living thing in the universe?!" Which, okay, is definitely a sign that she's way too co-dependent on you, right? I know millions of fangirls of this show/pairing erupted in estatic glee, but this is just so incredibly disturbing to me. But the Doctor's reaction to this is not saying GURL COOL YO TITS but instead MARRIES HER. I didn't believe it when I saw it at first. I mean, the Doctor has always been pretty aromantic and I know 11 is a very different person than 10 and 9, but it still struck me as weird. And I know the Doctor marries random people all the time, so it's not that I object to the Doctor marrying her, but the fact that he chooses to do it at a time like that, after a conversation like that. Way to encourage her entirely unreasonable fixation on you, Doctor! And from the Doctor's point of view, does he even love her, really? Let alone be his TRUE LOVE (like Moffat is portraying she is)? I know River didn't want to kill him and the Doctor didn't want to marry her, so I guess it was meant to be more symbolic and doing what the other didn't want to keep it even, but it was still so agonizingly wrong. I'm not going to say it didn't happen because it was in an aborted timeline, or River doesn't remember it (presumably doesn't, because the Silence make her forget...? I will get on this later!), but this just seems like Moffat took his Mary Sue five steps too far and went onto marrying the Doctor. Whelp. And then the entire death and timeline was retconned and none of it ever mattered. Nobody was ever in danger, and the season was just a giant timey-wimey puzzle dedicated to portray Moffat's great IQ (read: ego). Whelp x2. And people really liked this season finale and thought it was amazing and romantic and Doctor/River OTP forever. Triple whelp, my boy! Let me get my cane and wave these fans from my lawn, because I am officially an unhip old fogey who complains that Doctor Who used to be good (cool). I'll refrain from beating a dead horse over season 6's general awfulness for a bit longer to get back to River Song. Now, her entire character has been kind of written terribly, and I have to admit her backwards timeline doesn't endear me to her because despite knowing she evolves into this wizened River who knows better than to mess with the timelines, we now see a River who petulantly wants to let the universe implode for a few more moments with the Doctor. It's not a very positive look of her character. The thing that frustrates me most about River is that she has no agency. Her timeline is almost preordained and she just has to fill in the blanks by being there. She's literally dragged from birth to where she needs to be, presumably because people... knew that's where she needed to be? The Silence knew she had to become a professor, because the Doctor told her she was a professor (and mistakenly assumed she already was one)... There are many times in her life in which we can assume River needed to be there so she was. Even her actions which she chose voluntarily... How many of her trips were free will? Presumably all of them (since she enjoys them, right? And we see her do missions alone before meeting the Doctor, so it's not like she travels WITH him every time?) but even then the events she causes put a future Doctor on a path to a younger River, ad infinitum. River and the Doctor's lives are like an intricate puzzle and none of it can go out of line. It must be maddening, knowing you're acting out of free will yet knowing the other person has already lived it and knows you were going to do it before you do? And we're told that the Doctor often travels with River by picking her up in his Tardis from her jail cell... is that how she keeps getting out? So does the Doctor literally point here where she needs to go? So many questions unanswered, but I don't think I even want to know the answers. I guess River doesn't know any better and for the Doctor it would be an interesting way to romance someone, but I personally wouldn't care for it. That's just me, of course, so not a legit bitching... A lot of what went wrong with the writing of River Song was just that, the writing. Many of my complaints about Moffat's writing is that he doesn't show, he tells. It's especially true in the case of River Song, who he claims is a powerful, smart woman who even puts the fear of God in Daleks... (looking back, that should've been a warning enough that River was going to be his baby. Really, Daleks? That is a tiny bit over the top there, Moffat). For instance, at the battle in AGMGTW, we're told that there is going to be a great battle, and the Doctor will rise higher than ever only to fall so much further than ever before, and, don't get me wrong, AGMGTW was neat, but it wasn't a super dangerous all-out war. The Doctor gathered some peeps and went YO WASSUP DUDES GIMME MELODY. Yes, he got angry, but was the rhyme and lore really necessary? It seemed so over the top to make it seem more epic than it actually was. That's basically River in a nutshell to me. We keep being told that she's a hardass, and an evil murderer(!!11), and she can even fly the Tardis better than the Doctor (don't even get me started on that one, sigh), she is just more ruthless than the Doctor in that she doesn't mind killing people who get in her way. But whenever we see River, we see the Doctor kill the Silence just as eagerly as River does, and she's sassy and flirty with the Doctor, but she's in no way the unstoppable nightmare we've been told she is. We were shown, look, she's in jail, she must be awful and fierce, but then we find out in the finale that she was just trapped in that suit and doesn't even remember killing the Doctor, for fuck's sake. River can't battle her hype, even with as big a personality as she has. There's no way she would compare to someone who would strike fear in the Daleks even if she loves shooting at the Doctor (to destroy his hats). Not to mention the time the Doctor has spent running away from his supposed death, around 200 years? And he was still the same person, although presumably he spent these 200 years with River...? (Spoilers: it's a sign of pacing beating writing when some viewers don't even realize 200 years have passed for the Doctor. He hadn't changed a bit, still the exact same personality.) This show never shows us the development of their relationship (apart from the very key points) and thus the relationship becomes so jarring and unbelievable because we never see the Doctor show River much affection (in my opinion). It's all 'You are embarrassing me' and 'Just do what I say', which, fair, he does with all his companions, but since River has been portrayed as the Doctor's equal and nemesis it just puts her back on uneven footing with him. River's existence is somewhat of an impossibility. It's never more clear as when team Tardis tells her something she would then tell... them. Like the Doctor saying the dreaded SPOILERS after River has been using it on him for season 4-5. Or Melody being named after Mel, who turns out to be Melody. Or Mel hooking Amy up with Rory, which in turn causes them to have Melody who turns out to be, yep, Mel. Or Mel finding out who River Song is by seeing her in the future database and wanting to be her instead of... her name being a wonky translation (like even the TARDIS had suggested, and was shown on the handkerchief sown for baby Melody. I don't understand what the point of her name in the first place is then, if River is named after the data saying her name is River and the translation from Melody Pond = River Song never coming into it apart from being the DRAMATIC CHIPMUNK MOMENT (dun dun duuun)). It's all enough to break my brain. I know Moffat does this on purpose and to troll the viewers, but logically it makes about zero sense. But these are really just minor nitpicks. Moffat's writing is riddled with fast-paced timey-wimey scenes so we don't get to think too hard about these scenes and figure out just why they don't really make sense. On the surface, it's all there, but when you think about it, just like with River's impossibilities, it really falls flat on its face. For instance, I figured in season 6 we'd find out why in season 5 the Tardis just happened to blow up. Did the Silence do this? To what end? I mean, the timeline's been retconned (how was River in that timeline when Rory was deleted from it anyhow?) but couldn't they at least try and explain WHY it happened? Or did the Doctor just leave the break on for too long (sigh)? Or did it just explode because of Moffat's timey-wimey explanations going too far? Why did River have to forget she killed the Doctor? Is it because the Silence knew she wouldn't remember from their future database and so just made her forget to make sure she fit into the timeline? Does she remember getting married then, because when she meets 10 it sounds like she knows she's married but she's meant to forget that event ever happening? Then why does the River who visits Amy remember the Doctor dying and how does she know he's still alive then? And then, why does she insist that she killed 'the best man she ever knew' at 10? Should we just take that as OH, RIVER LIES, THE DOCTOR LIES, whatever? I feel like there's ten more for every flaw I name, and of course, Doctor Who will never be literary genius and flawlessly put together, but these are not nitpicks, these are major flaws that prevent anything from making any sense. You can say from RTD what you like, but at least his plots made sense (even if they were sometimes less than impressive). I feel like if you're going to not focus as much on character development/likability like RTD did, you should make sure the story is damn involving... and it just feels like Moffat either didn't try hard enough, or tried too hard. It's just so convoluted. Season 6 as a whole just seemed like an incoherent mess of all sorts of things trying to fit together and then just failing horribly. The Silence were introduced in the first episode but they still make no sense at the end of the season. Why did the Doctor even want to kill them so badly? Is the Doctor suddenly not for hearing out aliens anymore? The Silence is apparently the cause for humanity's fast evolution (wow thanks for robbing us of our entire history and accomplishments in one scene Moffat) and is involved in protecting the Universe from the knowledge that the Doctor has? And they have to kill the Doctor because they know when the Doctor is killed so they're basically making sure the timeline stays as it should be? And it's actually River and team Tardis who want to prevent this and cause the Universe to implode? And we're not supposed to be on the Silence's side why again? Oh, because you made the Silence shoot one person in the first episode to show that OMG THEY ARE EVIL REALLY LOOK!!!1? And brainwashing the human race to kill the Silence upon sight is kind of super dangerous, don't you think, especially if there's no handy dandy weapon at hand and they have LIGHTNING HANDS. Sure Doctor, this is a fool-proof plan. Also, this confusing mess of what looks like a vendetta between the Silence and the Doctor isn't even wrapped up with this finale and looks to be coming back for season 7. Maybe it'll clear things up by then, but honestly with Moffat's plotholes-are-cool writing I doubt we'll get more but more questions. So we have the overreaching arch of the Silence and The Question (really? The question is Doctor Who? Wow Moffat, way to make the entire show's title about your own ego... This explanation cannot possibly live up to the expectations.), and then we have Melody Pond, aka. River Song. I've described in my tl;dr above how I feel about River Song's arch (increasingly disappointing), so I'll move on. Then we have the themed single adventure episodes, which all seem to be about parents and children. Fathers giving up their reality to keep their kid safe and alive, a cloned dad wanting to get back to his kid, an alien taking the shape of a child and his father choosing to be his dad despite knowing the truth, Cybermen being destroyed by the power of love for a child (...) (WHERE ARE THE MOMS MOFFAT. Christ. You'd think this would be a subtle plot point, with absentee moms and hell, they even have a lactating alien dude. ). It's all very endearing, but it made the unfortunate implication that all of these people cared more about their kid than Amy and Rory, who seriously NEVER mention Melody again outside of in the first 5 minutes of Let's Kill Hitler. Oh, and in the finale Amy mentions that she will never see Melody again, but sadly this mention doesn't make up for the rest of the season being deathly quiet about Melody. I was hoping there'd be some terrible fate for Rory involved, since he kept dying. It was almost like the Universe was trying to erase Rory because he didn't belong there anymore. This would've been a more interesting plot point, and added some sort of weight and danger to the story where I seriously feared for nobody's life except the extras. Sadly, this was only made into a rhymey joke by the Silence (which, while hilarious, also felt a bit disappointing since I had been hoping for more). Or the Doctor suddenly liking apples and switching coats (I was sure there was a ganger!Doctor in there somewhere), or a sort of plot point with the weirdass rubix cube focus? Overall, I cannot comprehend why people say they like season 6. It sort of feels like a boring and mostly nonsensical inbetween part in a movie, as the payoff is nonexistent and the explanations are still far to be found. I seriously don't understand why people don't even question season 6 a LITTLE, even if they do like it. I like 11 as a Doctor, but the things introduced in this season... Just boggle the mind. Character-wise? River, who had been portrayed as the Doctor's equal, is revealed to be unhealthily fixated on him and is said to obey him without question now. The Doctor himself is shown to be rather violence-happy himself, ordering (and brainwashing) all of humanity to kill the Silence even though he doesn't know what or who they are. Amy and Rory were mostly emotionless zombies (apart from the brief relief/fear they should feel in situations, there's no long-term consequences with them. It's like that Star Trek TNG episode where counsellor Troi loses her baby and in the next episode is just fine and never mentions it again. It's jarring and unrealistic, even though mentioning traumas may not have the lighthearted feel the show is going for), even if I liked them the most this season because of their ocassional bamf moments. Then there's the plot - the existence of the Silence ruins almost all of existing earth history and the drive the Doctor always painted humanity with for their desire and urgency to see the stars and the unknown (because that drive was mostly the Silence, yeah thanks Moffat). I'm not saying I have a raging HUMAN PRIDE hard-on, but for a throwaway line and plot that makes no sense, having the entirety of human history rewritten just feels sort of cheap. The overarching plot itself makes little to no sense whatsoever, the bad guys aren't even explained properly (I know it's a to be continued in season 7 but really there's been so little payoff for the plot we've already been having, ffs), the whole 'trapped inside an incubator' deal with Amy was absolutely reprehensible and gross and was NEVER dealt with appropriately, and most of what happened wasn't that... dangerous. I don't even mean the whole 'the Doctor was never going to die so this whole season was pointless', but even the 'small' dangers. Like Rory putting the fear of God in Cybermen of all things? And Ralph overcoming his Cybermen conversion because of love...? I know that's partially to be written off as 'oh Doctor Who is a cheesy show it's supposed to be lighthearted at times' but it just comes off as cheap (as much as I love Rory being a badass, it comes off as highly unrealistic and I know the Cybermen are sort of goofy-looking but they're never intimidating because people beat them with bamf and love). I've never been worried for a character's continued existence in this entire season. So what are the good points of this season? I did like that everyone had their own kind of character arcs. River had Melody's, the Doctor had the moment of truth that he's dangerous and sometimes the world is better off without him (but that doesn't mean he doesn't do good things either!), Amy had to grow up and become a mom (of sorts...) and finally learned that the Doctor isn't her personal hero and he's fallable too, and Rory... well... Rory just died a lot. He was courageous for and next to Amy and he's not scared of anything anymore (I guess after losing his daughter and seeing Amy's fate in The Girl Who Waited he's seen his worst fears already). All in all though, I really only enjoyed the Doctor's Wife and The Girl Who Waited. Some other stand-alone episodes I could take or leave, and the River episodes can just drown in Lake Silencio for all I care, and I will pray to the Silence that I may forget about them. Sadly, I don't think we've seen the end of River Song yet, and she will definitely return because now she's the Doctor's wife for real (for the viewers, in any case).
global_05_local_5_shard_00000035_processed.jsonl/14459
Take the 2-minute tour × I've been looking around and I've found some questions similar to mine but have never been quite satisfied with the answers. I'm more or less a Java n00b, although I am moderately proficient with C++ and I would consider myself intermediate to advanced, as a programmer in general. I'm looking to write a program in Java that functions similarly to a tuner - what I want to do is record an instrument's pitch over about a 3 second time frame, and to measure the average deviation. (This is for a band class.) What I'm thinking is that I'll have a big array of numbers, and each entry in the array will be a number in terms of frequency. I want to be able to loop through the array, and calculate the average Hertz for displaying it on screen or something. So what I want to do is have some way of "polling" (for lack of a better word) the microphone to see what frequency is being inputted right that instant. Is there a simple way to accept audio input from a microphone in terms of Hertz? This will be in Java, under a Windows platform. share|improve this question Are you after help with the design or the coding? If it's the former you're in the right place, but for the latter Stack Overflow is the site you want. However, you will have to show what code you already have and explain what's not working. –  ChrisF Feb 21 '12 at 23:29 Well, what I want is to be headed in the right direction, I haven't written any actual code for this program yet. I'm still planning it out, but I have no idea where to start, so that's why I'm asking here. –  Butts Fredkin Feb 22 '12 at 0:02 do you consider using Java Media Framework or some other library? –  gnat Feb 22 '12 at 14:56 3 Answers 3 You will need to do some spectrum analysis. Take a short piece of audio data, maybe some 256 samples, then calculate a fast fourier transform (FFT) for each piece of data. However, a fourier transform itself is not enough since the process of cutting up sound in short samples introduces some distortion. This distortion will mainly be in the higher frequencies. For pitch detection, you can get away with simply filtering away this distortion using a low pass filter. Alternatively, you can window your sound sample, usually using hanning or blackman window functions (different sine-slopes, basically). In order to improve time resolution you should also overlap the individual samples you take. At last, you should average your individual spectra over as long a time as you want to analyze. Doing all that will give you something called a Power Spectral Density function. This method of deriving it is called the Welch method. Hence, if you are lucky, Java Sound will include a method for calculating one of these. In many signal processing environments, this would be called "pwelch" or "psd". Of course, the spectrum will use logarithmic frequencies (way more frequency points towards the high frequencies) and the amplitudes will most likely be denormalized and linear instead of simply dB values. Also, you will still have to find a good method to find your actual pitch frequency amongst all the harmonic noise etc. What I want to say is this: Either your library has an easy function that does exactly what you want or this stuff is probably too complex to have an easy answer. Sorry. share|improve this answer I suggest you look into some tutorials or textbooks on digital signal processing. What you are trying to do is actually quite complicated. Some of the things that make it complicated are: • Audio samples will be coming to you from the sound card in PCM (Pulse Code Modulated) samples. That is just a fancy term for time domain samples. That is, the analog sound wave going into the microphone is sampled at a regular interval and you are given those samples as numbers. This does not directly give you any frequency information, you will have to perform an FFT to transform the time domain data into the frequency domain. • Even after the FFT, you still do not have the array of frequencies you are looking for. What you have is an array of magnitudes at each sampled frequency. So you will have to do some kind of detection to determine which frequencies are actually present in your signal. This could be a simple threshold and peak pick, or something more involved. • In addition to this difficulty, there is a tradeoff when performing spectral analysis with the FFT between time and frequency resolution. If you want to get more frequency resolution, you must sacrifice time resolution. For example, if you want to be able to detect a 1Hz change in a signal that is sampled at 44100 Hz, you will need to perform an FFT of 44100 samples. Well, 44100 samples is an entire second of data, which means that even though you can detect a signal to 1Hz resolution, you don't know where in that second it occurred. This is why many pitch detection algorithms use time-domain methods like auto-correlation to find the pitch. • Another difficulty is that an instrument does not produce a pure tone (single frequency), but produces a number of harmonics as well. So you will not only have the true pitch frequency, but there will be other frequencies present in the signal that you will have to account for. All of this is not to discourage you from doing this project, I am just trying to lay out some of the issues you might face when doing the project. I worked on a similar project and ran into these issues. share|improve this answer it depends on what format you get your data, the most efficient way is direct PCM which is really just samples of the sound stream (and what you'll likely be getting from most mice API's). To get frequencies from this you'll need to fourier transform the samples. This will result in a set of values (one for each frequency). share|improve this answer Any idea how to do this, or get me pointed in the right direction with Java Sound? –  Butts Fredkin Feb 22 '12 at 0:57 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14460
Take the 2-minute tour × I am working on a web application which operate with different types of objects such as user, profiles, pages etc. All objects have unique object_id. When objects interact it may produce "activity", such as user posting on the page or profile. Activity may be related to multiple objects through their object_id. Users may also follow "objects" and they need to be able to see stream of relevant activity. Could you provide me with some data structure suggestions which would be efficient and scalable? My goal is to show activity limited to the objects which user is following I am not limited by relational databases. As I'm getting advices on ORM and how index things, I'd like to again, stress my question. According to my current design model the database structure looks like this: enter image description here As you can see - it's quite easy to implement database like that. Activity and Follower tables do contain much larger amount of records than the upper level but it's tolerable. But when it comes for me to create a "timeline" table, it becomes a nightmare. For every user I need to reference all the object activities which he follows. In terms of records it easily gets out of control. Please suggest me how to change this structure to avoid timeline creation and also be abel to quickly retrieve activity for any given user. Thanks. share|improve this question Index well my friend. –  JeffO Apr 17 '12 at 19:15 I see that your description is not exactly consistent with the picture. For example, you say "I am working on a web application which operate with different types of objects such as user, profiles, pages etc.", but the picture shows users and objects like 2 separate entities. Also, you have profiles part of the 'objects' entity, yet you have users in the 'object' entity but with no association to either users or self reference to 'object'. Maybe you want to clarify the meaning of each entity a bit. –  Emmad Kareem Apr 18 '12 at 23:39 I don't get the "timeline" to "follow" relationship. What does this represent? –  James Anderson Apr 19 '12 at 6:18 It is like twitter's firehose filtered by user. –  romaninsh Apr 19 '12 at 9:13 Try github.com/tschellenbach/Feedly, this is an opensource design for timeline management backed by either Redis or Cassandra (in Python using DRF and Django), you can either use it or check the multitude of resources they used in designing the library (directly from their readme under section Background Articles) –  JohnnyM Jun 20 '14 at 10:47 5 Answers 5 up vote 2 down vote accepted You wrote that you are not limited to relational databases. You could consider using a graph database, like neo4j. Graph databases are particularly well-suited for situations like yours where relations are more important than, say, averages and sums. You can find an introduction here and a working example here. A more complex, but more efficient structure that you could use is graphity. share|improve this answer Thanks Vitalij, Your answer was the most helpful. I will research graph databases more, but it seems like what I need. –  romaninsh Jun 18 '12 at 8:14 It's hard to say without knowing too much more, but it sounds like you want something very generic. Maybe something like this would help: activity_id - the ID of the activity participating_object_id - ID of a participating object activity_type_id - ID of the Type of activity activity_datetime - When this activity occurred data - context data of the activity This would let you have things like: activity_id | participating_object_id | activity_type_id | date | data 1 | 2 | 3 | ... | this is a post 1 | 84 | 3 | ... | [email protected] This describes an activity instance (ID #1): a user (object #84, context data "[email protected]") created a posting on a forum (activity type 3) whose object ID is 2, and the posting contained the text "this is a post". You'll probably need to expand on this as your situation requires. ...actually, now that I think about it, the data column is probably not needed, since you can get any data you want from your base object table (whatever it looks like) by querying it using the values in participating_object_id. share|improve this answer i do have activity table and then "object_activity" which joins multiple objects into a single activity. I wouldn't have problem to design the structure, but my design doesn't seem to be very scalable, especially when you need to determine which "activities" i need to show to the "users" –  romaninsh Apr 17 '12 at 15:56 Why doesn't it seem scalable? –  FrustratedWithFormsDesigner Apr 17 '12 at 16:12 when you have 1000 users and each is following 100 objects then either each objects needs to add "timeline" event into the queue of each user every time or user need to iterate through all 100 objects to collect the updates. –  romaninsh Apr 17 '12 at 16:50 @romaninsh: If I understand you correctly: You are concerned that it will be very time-consuming for a user to get updates on the 100 objects that they are following? –  FrustratedWithFormsDesigner Apr 17 '12 at 17:22 exactly. I've added clarification to my original question to highlight that. –  romaninsh Apr 17 '12 at 21:38 Why not use a ORM that can build the scheme for you around your classes? This way you can workout the details at a higher level of abstraction, let the ORM design the schema and then review what its done to change/tweak it based on performance. share|improve this answer I am using the ORM, but I need to decide how to structure my data model first. –  romaninsh Apr 17 '12 at 18:46 This is the sort of problems where ORMs tend to fall flat on their face as they tend not to handle complex scale issues. –  Wyatt Barnett Jun 17 '12 at 23:11 One possibility is to use "inheritance", esp. if the objects you refer to have common fields. The schema looks like this: followable_id primary key -- common fields user_id primary key references followables(followable_id) -- user specific fields page_id primary key references followables(followable_id) -- page specific fields followed_id references followables(followable_id) This means that both pages and users "are" followables, have followables' attributes and can be referenced alike. ORMs often create schemas like this to model inheritance, and handle the joining for you. Do not worry about inefficiency until you can prove it is a problem. wrt. to efficiency. Write a simple SQL script that inserts test information up to the number of rows you deem you need. Write your queries (remember, you don't want to query your entire timeline, you will normally LIMIT your queries), check their execution speed- with the stuff you mention I'm guessing the performance will be satisfactory. If not, post your queries and the outputs of EXPLAIN. share|improve this answer Thanks. I'm already using Agile Toolkit ORM which takes advantage of OOP. agiletoolkit.org/intro/1 –  romaninsh Apr 17 '12 at 21:29 updated with performance hints –  alex Apr 18 '12 at 21:25 Denormalization is going to be your friend here -- have you considered just making a static timeline table that you can SELECT from easily? I would also strongly consider non-relational data stores here -- they tend to fit this sort of problem well. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14461
Take the 2-minute tour × I want to learn ASP.NET web-application development by example. I want to learn it from an already developed web-application that is good as a tutorial for newbies. A fully functional web application that is small but powerful enough to teach newbies the development effort required for web-application development. I am looking for some application that is made using software engineering principles and not just a code written haphazardly. share|improve this question closed as off-topic by gnat, BЈовић, GlenH7, MichaelT, Kilian Foth Jul 30 '13 at 14:30 Check out nerddinner.com if you want to look at some code, link to the source code at the bottom. –  chris Jun 25 '11 at 10:50 1 Answer 1 up vote 2 down vote accepted There are 2 different flavors of ASP.NET. and MVC See here ASP.NET Webforms or ASP.NET MVC ? for the difference. For MVC Go here http://www.asp.net/mvc and look at all the tutorials in particular the Music Store App demo To learn WebForms go here http://www.asp.net/web-forms share|improve this answer I highly recommend you don't learn WebForms as less you need to. MVC is simply better to work with coming from a new and fresh perspective. –  Raynos Jun 25 '11 at 12:17 @Rayons @Daveo Why is there an emphasis not to learn WebForms! –  A-Cube Jun 25 '11 at 14:13 Music Store App Demo looks nice to start with! :) –  A-Cube Jun 25 '11 at 14:15 @A-Cube see here stackoverflow.com/questions/726755/… and here stackoverflow.com/questions/661181/asp-net-mvc-vs-webforms basically webforms is the older way to do things and is still ok to use for some Interal websites and you may have to update an existing systems that uses webforms. However for external websites and most new sites they will be written in MVC .NET as it works more inline with how the Internet was intended to work (stateless). –  Daveo Jun 27 '11 at 23:32
global_05_local_5_shard_00000035_processed.jsonl/14465
HibariLelouch37's Silent Hill 3 HD PlayStation Trophies Viewing HibariLelouch37's Silent Hill 3 HD trophies. Remove Sort by XMB/Type/Alphabetical I Guess it's Time to Roll the Credits Unlock all Trophies in SH3. Adrenaline Junkie Complete SH3 in 3 hours or less. Coolest. Dad. Ever. Unlock the "UFO" ending. Heather's Got a Gun Acquire the Unlimited Submachine Gun. If Looks Could Kill Unlock the Heather Beam. Makes My Head Hurt Complete SH3 with 2 saves or less. Where's Luna? Equip the "Princess Heart" costume. A Time to Kill Defeat Leonard in under 3 minutes. Defeat God in under 8 minutes. Eye For an Eye Defeat Missionary in under 2 minutes. Flame On Acquire the Flamethrower. Pick up at least 100 items in SH3. It Was All in Your Head Unlock the "Possesed" ending. Lost Memory Defeat Memory of Alessa in under 3 minutes. Pest Control Defeat Split Worm in under 2 minutes. There's a New Sheriff in Town Acquire the Beam Saber. They Look like Monsters to You? Defeat at least 75 enemies by fighting in SH3. This Isn't an FPS! Defeat at least 75 enemies by shooting in SH3. What the Hill Just Happened? Acquire the Gold and Silver pipes. I'm Normal I Promise Unlock the "Normal" ending. Wall Basher Acquire the Silencer.
global_05_local_5_shard_00000035_processed.jsonl/14499
Take the 2-minute tour × I have aliases set up in postfix, such as the following: [email protected]: [email protected], [email protected] ... When an email is sent to [email protected], and any of the recipients in that alias is cc:ed which is quite common (ie: "Reply all"), the e-mail is delivered in duplicates. For instance, if an e-mail is sent to [email protected] and [email protected] is cc:ed, it'll get delivered twice. According to the Postfix FAQ, this is by design as Postfix sends e-mail in parallel without expanding the groups, which makes it faster than sendmail. Now that's all fine and dandy, but is it possible to configure Postfix to actually remove duplicate recipients before sending the e-mail? I've found a lot of posts from people all over the net that has the same problem, but I have yet to find an answer. If this is not possible to do in Postfix, is it possible to do it somewhere on the way? I've tried educating my users, but it's rather futile I'm afraid... I'm running postfix on Mac OS X Server 10.6, amavis is set as content_filter and dovecot is set as mailbox_command. I've tried setting up procmail as a content_filter for smtp delivery (as per the suggestion below), but I can't seem to get it right. For various reasons, I can't replace the standard OS X configuration, meaning postfix, amavis and dovecot stay put. I can however add to it if I wish. share|improve this question I think it's really just not possible... –  Antoine Benkemoun Feb 15 '10 at 12:40 I'm truly starting to believe that you are right Antoine. –  macke Feb 24 '10 at 10:07 Well that was a waste of a bounty... –  macke Feb 25 '10 at 15:26 did you ever find a solution for this? I'm having the same issue. –  Tommy Arnold Sep 29 '14 at 17:12 3 Answers 3 Postfix has no idea about duplicate emails due to the way it's structured. It is possible to do what you're suggesting by using procmail as your delivery agent. Essentially, each message coming from a client should be delivered with a unique Message-Id. In the case that it's delivered to multiple people, the Message-Id should be the same, so we save any Message-Id headers we've seen and discard and future ones that match that list. From http://novosial.org/procmail/ :0 Wh: msgid.lock | formail -D 8192 ~/.procmail/msgid.cache share|improve this answer If I understand the problem correctly, it isn't possible to solve in Postfix because Postfix sends the e-mails in parallel, ie it sends to [email protected] at the same time as it expands [email protected] and then again sends to [email protected]. Wouldn't the Procmail solution then possibly introduce a race condition where another unrelated e-mail (with a different message id) is sent in between the two e-mails in question and thus overwriting the cache making it so that duplicate e-mails are delivered anyhow? –  macke Feb 15 '10 at 16:14 I'm trying to get your suggestion to work, but I'm not really sure how to combine this with dovecot delivery, which is used by OS X 10.5+ by default. –  macke Feb 15 '10 at 22:46 If you're using dovecot as a delivery agent, you can use procmail as a content_filter which will allow you to perform the same task on a global level –  Philip Reynolds Feb 16 '10 at 9:23 I have to confess that I probably am in way over my head here. I've been staring myself blind on the configuration parameters page for postfix and googling till my fingers bleed but I can't seem to figure out how to configure this. Any resources you might know of or nudges in the right direction would really be appreciated! –  macke Feb 16 '10 at 18:14 I think I sort of understand how it works now, but there's already a content_filter set to amavis. This seems to be some sort of anti virus checker. I've read that it's possible to chain content_filters, but it seems rather unintuitive and the documentation is less than stellar. It's really quite ridiculous how difficult it is to just weed out duplicate e-mails. Design desicions regardless, this seems to me like it should be in there out of the box or at least not require these monstruos hacks. –  macke Feb 16 '10 at 21:25 This is from some old postfix faq: • One message is sent to the user, and to an alias that lists the user. The user receives one copy of the mail directly, and one copy via the alias. • One message is sent to multiple aliases that list the user. The user receives one copy of the mail via each alias. So by design you are seeing that behavior. Perhaps if you find a content filter that can strip duplicate message IDs, you can eliminate this after the delivery event. Sendmail does not have this problem because it expands everything first and strips out duplicates. share|improve this answer Yes, I read that, perhaps I should have updated my question. By design or not, it's still an issue. I understand why it's behaving the way it does and I understand that trying to find a solution in Postfix is futile. However, I've tried coming up with some content filter solution using Procmail and I just can't seem to get it right. It's highly likely that I'm not understanding content filters or procmail correctly, or both. In either case I still would like to fix this. Unfortunately, the setup as it is cannot be modified, only added to. I can't use sendmail instead of postfix, unfortunately. –  macke Feb 19 '10 at 1:03 I updated the question with some more information but honestly, the link to the FAQ was in there to start with. I do appreciate any helpful suggestions though! –  macke Feb 19 '10 at 1:09 Did not realize that was a link to the same content. Working in IT security, you become rather paranoid about clicking random links. Can you confirm that the duplicate messages have the same message IDs? –  jeffatrackaid Feb 19 '10 at 1:21 Been a long day so I need to review your original post but what about this: postfix.org/postconf.5.html#duplicate_filter_limit –  jeffatrackaid Feb 19 '10 at 1:28 I can indeed confirm that the duplicate messages have the same message IDs. Setting the duplicate_filter_limit does nothing to help unfortunately. –  macke Feb 19 '10 at 12:52 The oficial solution is here.. http://osdir.com/ml/mail.postfix.devel/2007-05/msg00010.html duplicate_filter_limit (10000) The maximal number of addresses remembered by the recipient duplicate filters for aliases(5) or virtual(5) alias expansion, or for showq(8) queue displays (with earlier Postfix releases the default limit was 1000). duplicate_filter_style (strict) The duplicate recipient filter policy: strict or pragmatic. share|improve this answer This doesn't seem to do anything... –  GruffTech Jan 30 '12 at 23:06 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14500
Take the 2-minute tour × I'm looking for a reverse proxy solution which either: a) Let's me explicitly define which requests go to which servers based on a regex (or some other similar way of defining that certain URL patterns get mapped to certain back-end servers) b) Supports some sort of hash algorithm for proxying so that requests for a given URL always get mapped to one specific server, and publishes that algorithm so that I can use it in my application to determine which server a given URL will be mapped to. Anything out there like this? Or do I have to write my own...? share|improve this question 2 Answers 2 up vote 2 down vote accepted As far as full-on web servers with proxy capabilities go, both Apache and nginx would both be capable of satisfying option a. In Apache, you would want to use mod_rewrite's proxy capability: RewriteRule /(location[1-5]*\.html)$ http://sourceserver.example.com/$1 [P] In nginx, you'd just use a regex for your location directive - see here For option B, most proxies that implement a hashing option use the opposite approach; making sure that all the requests from a given client are sent to the same server to maintain session state. Can you go into a little more detail about why that would be desirable? share|improve this answer Sweet, that is super helpful. I wasn't even aware Apache could do that with mod_rewrite. Thanks! –  Keith Palmer Mar 2 '11 at 15:52 Pretty sure you can do this with haproxy too, see http://code.google.com/p/haproxy-docs/wiki/MatchingLayer7 The previous serverfault question: choose server backend to some URL with haproxy has an example. Whether or not this is sensible, I don't know. Probably isn't looking at the other answer and the warning in haproxy's documentation. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14501
Take the 2-minute tour × I just set up a virtual machine running Ubuntu Server, with a LAMP stack and OpenSSH installed. What now would be the best way to enable that server to run both rails and PHP applications? Would it be best to virtualise the two servers on the host server machine? - Or can they run happily alongside each other? Would Mongrel would be the best option for the rails server? share|improve this question You need to be more specific as to what the LAMP and Rails apps will be. Are you going to have two different virtual hosts, one LAMP and the other Rails (e.g., example1.com -> LAMP, example2 -> Rails)? Will you have one site, but with different paths going to LAMP/Rails (e.g., example.com/app1 -> LAMP, example.com/app2 -> Rails)? Anyway, yes, you can do it, mainly by setting up your front end web server to proxy to the desired stack. –  cjc Dec 30 '11 at 12:58 separate domains for LAMP/Rails –  Alex Coplan Dec 30 '11 at 13:00 2 Answers 2 up vote 2 down vote accepted So, keeping your existing LAMP stack serving example1.com,, do the following to set up the Rails side on example2.com: Run mongrel to listen on port 8000 (or whatever) (FWIW, we use Unicorn, which will handle the workers more elegantly). On the Apache side, do something like this configuration: <VirtualHost example2.com:80> ServerName example2.com ProxyPass / http://localhost:8000/ ProxyPassReverse / http://localhost:8000 ProxyPreserveHost on You should peruse your Apache documents on "reverse proxy" and the "ProxyPassReverse" directive for specific details and gotchas. So, your existing VirtualHost for example1.com will handle the LAMP stuff, and the VirtualHost for example2.com will proxy requests over to your Rails stack. Your Rails server will listen on port 8000, which is out of the way from LAMP. share|improve this answer They can run alongside each other perfectly happily. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14502
Take the 2-minute tour × Is it possible to use Exchange 2003's Message Tracking Center to search for emails received from / sent to a particular domain (e.g. domain.com.au) ? If not, is there a program that can achieve this? share|improve this question 1 Answer 1 up vote 1 down vote accepted No, the Message Tracking Center is designed to track a particular message, not do what you're looking for. It does, however, create a daily log you could look at with (among other tools), the Microsoft Log Parser. You could even use Windows Search to find the domain name as a string inside your Message Tracking Center logs. Assuming, of course, you have logging turned on, which you may not. By default, the message tracking center log is at ..Program Files\Exchsrvr\[Exchange server name].log\[yyyymmdd].log share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14503
Take the 2-minute tour × We have taken over a legacy web application that we cannot modify (the source code is broken and deployment fails) and we will eventually rewrite. Ideally we would migrate it one step at a time but this is not possible since we cannot effectively modify the application. I am in charge of rewriting the application and there are some complex synchronization algorithms that I'd like to test against the data POST'd to the current API. What's the easiest and safest way to capture incoming HTTP requests with all associated data? The solution must be transparent to API users. The server is running on Ubuntu Linux and we have SSH access to it. The web app is running on Apache 2 on Ruby. • Use some sort of packet sniffer to capture incoming traffic. I'd have to figure out a way to replay these requests against a server of my own. • Change the DNS to point to another IP that would capture and log the request data, then redirect the request to the production server. I don't think we have access to network infrastructure so I assume this must be executed as a web service that returns a request with a redirect header to the real server. Seems fragile and could pose security concerns for browsers? • Use some sort of Apache module to do this. How do the above solutions compare in terms of: • The risk imposed on bringing the server and/or website down • The ease of implementation Please feel free to suggest any further/better alternatives. share|improve this question 3 Answers 3 up vote 1 down vote accepted I would use tcpdump or ngrep, it would be nice to have the port on the switch connected to the web server mirrored, but in absence of that, you can run ngrep or tcpdump on the server itself. You will need superuser access to run either of those programs. You're going to want to read a bit, as you obviously know what you are looking for in the traffic, ngrep does allow you to select traffic by regex, which might allow you to pick out packets with better accuracy. ngrep -l -q -d eth0 "^POST " tcp and port 80 -O dump.file This would get you any HTTP data POSTed to port 80 on eth0. You might be able to pick out something much more specific. If you are going to be reading the traffic directly from the file, you might want to add -W byline as it makes the packets much more readable as it respects the line breaks, so you can see the packet written out more logically (for humans). -O dump.file will write the output of your packet capture to a file. The output can be as detailed as you'd like, to replay the packets, have a look at tcpreplay share|improve this answer Could you please comment on the output format of ngrep? I'll be trying to replay the requests on Windows. –  georgiosd Apr 8 '13 at 9:20 The output is as detailed as you'd like, the -W byline respects the line breaks, so you can see the packet written out more logically (for humans), to replay the packets, have a look at tcpreplay.synfin.net –  NickW Apr 8 '13 at 9:33 Please edit your original answer to include this comment for completeness. Thank you. –  georgiosd Apr 8 '13 at 20:48 The easiest and safest way to capture it would be to simply run a packet sniffer, as you suggested. If you simply do a web search for "replay http requests", you'll get any number of programs that can capture and then replay your requests. There are also professional tools for this, e.g. "LoadRunner" which is used at my job. If you don't want to install any extra software, you could use tcpdump -s0 -w /path/to/output.file to capture the traffic. That will give you a file from which you can read, using "tcpdump -A -r /path/to/output.file', presumably using filters such as "dst=ip.to.webserver". But then you'd need something to replay it. Here's an example of me using tcpdump on localhost: $ tcpdump -i lo0 -s0 -w /tmp/tcpdump.out meanwhile I access a web site on localhost from another window; once that's finished, I'll press ctrl-c to stop the tcpdump $ sudo tcpdump -r /tmp/tcpdump.out -t -q -n -A 'tcp dst port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' reading from file /tmp/tcpdump.out, link-type EN10MB (Ethernet) IP > tcp 122 .9...9..GET /~dyho01/ HTTP/1.0 User-Agent: Wget/1.11.4 Red Hat modified Accept: */* Host: localhost Connection: Keep-Alive You could probably get the same information by opening the raw tcpdump file in a windows program such as wireshark. share|improve this answer Could you please comment on the output format of tcpdump? I'll be trying to replay the requests on Windows. –  georgiosd Apr 8 '13 at 9:19 If you use '-A', the entire contents of the request will be written out. I'll add an example to my answer. –  Jenny D Apr 8 '13 at 9:27 Both answers are of good quality. I'll choose @NickW's answer because ngrep allows the use of convenient regular expressions. –  georgiosd Apr 8 '13 at 20:48 The packet sniffer option is a good one so long as the connection does not have encryption in play, then you will be SOL. In that case you will need a proxy model for the capture, where the users connect to the proxy using SSL, accepts the proxy certificate and then the connection to the proxy is again under SSL to the destination host. Testing tools like LoadRunner, Jmeter or the like would be good for capturing a proxy conversation for a single user to allow you to examine the structure of information being passed, but would be impractical for production use for multiple users. I would look for a proxy server package where you could configure the proxy to dump the requests to a log for analysis purposes. This way you would have a raw view of the request outside of SSL and having to reassemble packets from a packet level trace. share|improve this answer Thanks for the proxy hint: that is a great solution when SSL/HTTPS is involved. –  Jeroen Wiert Pluimers Jul 17 '14 at 9:00 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14504
Take the 2-minute tour × We have a small business and currently don't have a need for a domain within our office. We have a basic network and a single server running Windows Server 2008 R2 with some file shares and 3rd party apps. We use Office 365 and have a Windows Azure subscription. The two seem to be keeping the Active Directory for our organisation in sync pretty well. (i.e. The data looks the same on both systems) All of the thrid party apps we run on our app server support LDAP as an identity provider but because we don't run a domain we are having to get each user to create a new login/password for these services. Ideally we'd like to get this server to sync from Azure/Office 365 and allow users to then authenticate using their Office365 credentials. All of the literature I have found talks about synchronising FROM on-premise to Azure but we'd like to rather sync FROM Azure/Office 365 to our on premise server. I guess our on-premise server become a federated identity provider for our Office 365 directory... Is this possible or do we need some 3rd party LDAP provider that can federate identities from Azure or Office 365? share|improve this question If you're running AD in Azure, you can just run requests against that DC. You may need a VPN to link your network with azure, though. –  Nathan C Nov 4 '13 at 16:56 @NathanC there's a difference between running a domain controller in an Azure VM instance (not what this fellow is doing) and running Azure AD w/ DirSync for your O365 tenant, which is what he's talking about. –  MDMarra Nov 4 '13 at 17:25 @MDMarra Ah, learned something from someone else's question. :) –  Nathan C Nov 4 '13 at 17:35 @NathanC yeah Azure AD is something that exists in Azure and is accessible though a web interface for managing users, groups, and DirSync for use with Office 365 and Intune. It's not an actual server that you can log into interactively. It's some multitenant Microsoft AD variant with some web front-end special sauce. –  MDMarra Nov 4 '13 at 17:44 Adrian - what did you end up doing? We are considering a similar route, curious how it ended up working out for you? –  aSkywalker Jun 10 '14 at 21:43 1 Answer 1 up vote 7 down vote accepted Short answer: No. However, like @Nathan-C described, you can stand up the required services using Azure Iaas (either DC+DirSync+ADFS or DC+Dircync w/pwd sync) in order to achieve single sign-on between your your Office365 apps and your on-prem apps. You would need to deploy a VPN link between Azure and your local network. Azure AD is NOT "regular" Active Directory. share|improve this answer Thanks, I suspected this was the case. What we have managed to do is configure most of our 3rd party apps to use OAuth2 for identity provision. We then installed the auth0 service from the Azure store and setup our Azure AD as an enterprise identity provider (connection) for the auth0 service. The 3rd party apps now use auth0 as ID provider which federates to our Azure AD. (hope I got my terminology right but basically the apps use OAuth2 to authenticate against auth0 which "proxies" our Azure AD) –  Adrian Hope-Bailie Nov 5 '13 at 17:35 Another comment on the proposed solution: We don't want to do this because we 1) like using Office 365 to manage our users 2) don't actually want to force our users to login to a domain which I assume implementing a DC would involve –  Adrian Hope-Bailie Nov 5 '13 at 17:38 1) is a fair point. 2) seems a bit unclear to me. If you mean implementing domain-joined workstations, there is no requirement to do this if you're implementing any of the dirsync options. –  Trondh Nov 6 '13 at 15:12 Is it possible to install DirSync on a DC? I think I read somewhere that it's not? –  Adrian Hope-Bailie Nov 6 '13 at 15:57 With the newest version of DirSync, you can install it onto a DC. It used to be the case that you couldn't. –  Trondh Nov 6 '13 at 21:18 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14514
Forgot your password? Comment: Let the baby keep it as well... (Score 1) 321 Having looked into it several times (2 kids) we have decided that it is simply to expensive to store our own. Donating works well though. Often times the donation centres keep your name on a list so that you have priority for the future as well. Also, be aware that while storing the cord blood is useful, actually allowing the blood to completely go to the baby is even better. All the blood in the cord / placenta is the baby's blood. By depriving it of that blood, that can put them down a lot of iron. Often letting the blood pump for 10 minutes after birth before clamping is sufficient (our doctor in Canada says the standard here is 1.5 - 2 minutes now but the parents can ask for more). Many mid-wives will actually let the placenta "birth" before clamping to be sure the baby gets all of its own blood. Comment: Re:That's why I like the basic Kindle (Score 1) 418 by NotNormallyNormal (#39249413) Attached to: The eBook Backlash I agree. I use a kobo now and I doubt I will rarely buy a paper book again. Tablets are too big and bulky - my wife even dumped her iPad for reading and bought a kobo too. Colour would be nice if you read magazines or something, but for printed word, the straight eReader is great - Compact, light weight and I will never lose my bookmark! Comment: Re:Sun - Earth Connections (Score 1) 569 by NotNormallyNormal (#36451302) Attached to: Big Drop In Solar Activity Could Cool Earth You are talking only about the total solar irradiance increase. This doesn't include other solar parameters such as x-ray flux, interplanetary magnetic field effects, etc that would all be effected solar quieting. How these things tie in is the question. I agree that the TSI would not affect the warming enough however. Comment: Re:Sun - Earth Connections (Score 1) 569 by NotNormallyNormal (#36446926) Attached to: Big Drop In Solar Activity Could Cool Earth This is of course correct if you think purely about EUV/x-ray but the majority of the solar radiation is not of these type and varies by less than 1% over a solar cycle. This is what the climate models tend to incorporate. X-rays especially are related to the acceleration of plasma and the magnetic energy conversion during reconnection events. The biggest of these are flares and tend to have a footprint on the solar surface in a sunspot. Therefore, I would venture a guess that the x-ray and EUV energies decrease as the magnetic field reversal becomes more dipolar near solar minimum (which is what the graph shows). The question then becomes, can the x-ray/EUV events be correlated to macroscopic affects on the Earth? Given that the Earth and sun have been interacting for 4 billion years, it is certainly possible. Comment: Sun - Earth Connections (Score 2) 569 by NotNormallyNormal (#36443196) Attached to: Big Drop In Solar Activity Could Cool Earth An examination of sunspots over the last 10+ years by looking at Fe lines shows that the magnetic fields and temperatures in the sunspots are decreasing. There is apparently a "minimum" value for the magnetic field for a sunspot to form. The average value has been decreasing rather rapidly of late (10 years or so). This leads to smaller and less intense sunspots. If the magnetic values generated are no longer strong enough to generate sunspots, how is the magnetic field of the sun affected? Will it still go through a 22-year cycle (I suspect yes, the lack of sunspots should not affect that cycle)? So simply the 11-year SUNSPOT cycle will be affected. Further to this, I (as an actual real life scientist) have been looking at the activity of the solar magnetic field. Specifically the transition from a dipolar field (at solar minimum) to a non-dipolar field (near solar maximum) and back again. Given the long relationship the Sun and Earth have had (some 4 billion years) I thought I'd throw in some macroscale effects seen on the Earth for comparison. Very surprisingly, the sunspot cycle and the El Nino/La Nina cycle is actually reasonably correlated (remember, correlation does not equal causation). There is a bit looser relationship better the solar cycle and Typhoons (though this may be more related El Nino) and monsoon rains (very likely correlated to the El Nino cycle). However, solar variation in radiation is not the cause (this is what is taken into account in climate models) but the magnetic fields and the solar wind appear to play a much larger role (See multiple articles by Scafetta and West for example). The solar wind interacts with polar atmosphere and there is a suggestion (questionable) that is may link the Quasi-biennial ocsillation to solar activity. There seems to be relationship, however, it is not clear what it is or how a lack of solar activity would affect the Earth (or what the "lag time" might be). Will it get cooler if there is an extended period of low to no solar activity? Yes, there is strong evidence of that based on previous examples (Maunder and Sporer minimums for example). Will the cooling completely counteract the greenhouse gas warming? Good question. Comment: Re:EASY!!!! Science *CAN* produce miracles! (Score 1) 1486 by NotNormallyNormal (#35748270) Attached to: Is Science Just a Matter of Faith? You are describing technology, not science. People made everything you describe without using scientific theories. Really? Please tell me that Bernoulli didn't do the SCIENCE behind understanding fluids and buoyancy. Or the science behind technology. No offence to any of the engineers out there, but with out physics, chemistry and even biology as building blocks there would be NO technology. Nature is a wonderful and amazing thing. Science helps us to understand nature. Technology uses science based on natural discoveries to improve our lives (mostly). Without science we could never build planes, combustion engines, skyscrapers, spacecraft, build massive bridges, drill for oil, and many many other things. Science is the foundation of technology. Now, let me guess. People could have made those things without doing science, right? Do you think that the Wright brothers just built their plane and said "okay, no problem, this will fly" ? No, they experimented with different designs and test flights - they didn't necessarily know the mathematics or the "theory" but they began to understand by EXPERIMENTATION what works - that is science as much as sitting at a desk and doing math to describe some abstract concept (flight). Comment: Re:Just rename it! (Score 2) 435 by NotNormallyNormal (#35588470) Attached to: Firefox 4, A Day Later LOL. For some time one of the Web interfaces (think corpo-ware) sold by my employer was broken under IE. Nobody noticed. For two+ years. Our University recently e-mailed out to all students and employees to NOT download IE9 as none of the blackboarding, registration, payroll and admin, etc software works in IE9. That was good for a laugh! + - New copyright bill to be introduced Submitted by NotNormallyNormal NotNormallyNormal writes: The Canadian Gov't is about to introduce new legislation to parliament. It will be a tough new copyright bill — dubbed 'Anti-consumer' by the CBC. Michael Geist reports it is the "most anti-consumer copyright bill in Canadian history". The Globe and Mail notes that the bill will be introduced in the next six weeks and will attempt to bring a tough copyright law that would mimic the much-loathed U.S. Digital Millennium Copyright Act in the U.S. and provide Canada's position on the ACTA Treaty. Please write or e-mail to your MP, PM Harper, Ministers Moore and Clement, and the opposition leaders as well. Also, consider joining the new Pirate Party of Canada. Comment: Re:They are wrong (Score 1) 508 by NotNormallyNormal (#31849804) Attached to: Neil Armstrong Criticizes Obama's Space Strategy So - you are assuming that space science is solely NASA then? While that make up a large chunk of the resources for space science, they are not the only resource. As you say, DoD does provide instruments such as DMSP and LANL as does NOAA. In Canada our resources are small and we often have to use multiple agencies just to cover over a small project (for example, our current project uses funding from NSERC as well as CSA and CFI grants. NASA does have several multi-spacecraft projects (see THEMIS for example). But, you are correct, ESA does have a leg up on this sort of stuff. Now, don't get me wrong. I think that human space flight does have it's place. My question at this point is more "Is it worth (scientifically) putting money into human space flight or instrumentation and robotic exploration and space technology and engineer?" I would say without any reservation, that human space flight, at this point, is not worth it. Is it worth sending a couple of men to the moon to collect a few rocks and find out some tiny info about the 50 square km that they land in or use a high resolution imager to map the moon? Then using that same technology - adapt it to map Mars? Or Europa or Titan? That spacecraft could also have instrumentation to study high energy particles near the moon, looking at safety issues for long term stays - all sort of useful science that would lose out. What about developing the engineering and technological means to allow for long stays on the moon? Spend 5-10 years researching astronaut safety, building materials, biospheres, ecological and environmental surveys for using natural resources - then go to the moon for extended stays of weeks and months? Using this technology to then go to Mars? It is the choice of where to put the limited funds for the next 5 years, 10 years... where will it be of the most use? Comment: Re:They are wrong (Score 2, Interesting) 508 by NotNormallyNormal (#31848340) Attached to: Neil Armstrong Criticizes Obama's Space Strategy Actually, I am a space scientist. In fact we know all to well about the economics of doing our work. For many years we've had to scrounge money and expertise to engineer our projects. I have been advocating in Canada for many years about the problems with the CSA supporting human space flight while leaving potentially important scientific work behind. That is how things like micro- and nano- satellites and the cubesats have evolved. As far as one offs - you are obviously not familiar with space instrumentation. Most projects I have been involved with use sensors that were developed long ago and have just been tweaked for new technology and communication. The last imaging project launched in 2000 used the same sort of imager design done in the 80's. The same design is once again likely to be used on the next set of flights, just with upgraded technology - better detectors and communication hardware. Ever heard of the DMSP and LANL satellites? They have many satellites, and continue to launch them all with the same instrument packages. This is the same for sounding rocket launches and ground-based stations. It is the norm not the exception to re-use designs that work. One-off such as the Hubble telescope and CASSINI tend to take millions and billions of dollars that few people can even get. And believe me when I say, the data we retrieve is EXTREMELY important to us. We are careful to make sure that our projects are as cost-efficient but still get a "bang" for our buck. Many satellites we keep running long past their lifetimes, even if it is just for one or two instruments, the simple fact is that these instruments are generally hard to replace (money is usually the sticking point - competition for it is extreme). So unless you are an actual expert in space science and instrument design, I would be very careful about who you insult. Comment: Re:They are wrong (Score 1) 508 by NotNormallyNormal (#31847640) Attached to: Neil Armstrong Criticizes Obama's Space Strategy And, really, as a scientist, sending PEOPLE into space is useless save to do maintenance for really science projects such as the Hubble Telescope. Even the space station is useless as most of the time is spent trying to keep it functioning than doing actual science. What science can be done on the moon that a rover can't do? I think that the astronauts are clearly not looking at the bigger picture of doing real science but simply looking at the fact that having a human (a very select human unless someone has a tonne of money) in space is cool. College To Save Money By Switching Email Font 306 Screenshot-sm Posted by samzenpus from the smallest-things dept. Comment: Re:The debate is long from over. (Score 1) 590 by NotNormallyNormal (#31012238) Attached to: The Lancet Recants Study Linking Autism To Vaccine This is an interesting comment. My mother worked with mentally challenged kids for many years before retiring from the school division. Recently she was visiting while some friends had come over with their son. Afterwards, she asked if we knew if he had been diagnosed as autistic. We (my wife and I) said that our friends wouldn't believe that and some "holistic" doctors had told them that he was just sensitive to some preservatives and that was what was causing his issues... now, of course, he has gone into pre-school and his teachers are skeptical about this sensitivity. Our friends still refuse to believe there is anything else wrong. So, I agree, people having spent time working with these kids can easily pick out others with the same problems (my wife and I also figured he was too... Personally, I think it is very obvious and our friends are desperately avoiding the issue). Simulation of Close Asteroid Fly-By 148 Posted by Soulskill
global_05_local_5_shard_00000035_processed.jsonl/14524
Philipp Allgeuer Subtitle Adjuster 1.0 Author: Philipp Allgeuer Date: 21/03/12 General Overview This program is largely aimed for use with media players such as VLC, with which the user can supply an external subtitle file to play along with the movie they are watching. This program does not embed the subtitles inside the movie file! Feature List How to Use Subtitle Adjuster General Usage and Tips • Press F1 in the program for some visual help! (or alternatively just refer to the screenshot below) • Only load into the program the subtitle file(s) for one movie at a time. The output is an attempted merge of all the subtitle files in the merge list. • Although the word 'merge' is predominantly used to describe the action of this program, think of it more as an 'append' action if there is more than one file involved in a single conversion. In fact, the last subtitle of a file is expected to occur at a time before the first subtitle of the next file in the merge list, and if this is not the case Subtitle Adjuster will complain of overlap and say that it has omitted from the output the subtitle elements from the second file that overlap. This can be avoided by putting in the correct reference point timings, which should not result in overlap. • Continuing on from the last point, as a result order is important in the merge list! You can adjust the order if it is incorrect using the Move Up and Move Down buttons. • Clicking on a subtitle file in the merge list (listbox at the top left) updates the preview table with the contents of the file and updates the subtitle controls (just below the Remove File and Move Down buttons) with the specific settings for that file. Each subtitle file has its own subtitle control values that individually specify the reference point(s) for each file! • Enabling fine tuning controls allows you to set fraction of a second timing values for the reference points • Enabling dual reference points means that two points are used in calculation of the linear function that the program maps all the subtitle times with in the output. Using one reference point means that all the other times are shifted by a constant time value. Using two reference points means that all the other times are scaled and then shifted by some time value. This is useful for videos where the subtitles slowly drift out of sync (for example if the framerate is slightly off). • The MovieFPS numeric field is only relevant if the output file type is *.sub, in which case it is used to convert the required time values into required frame values. • Newline characters in subtitle texts are replaced with pipe characters ('|') in the preview window for better readability (otherwise only one line is visible at a time). • The New Movie button resets the whole window to its original state and automatically opens the Add File dialog. • You can use the Preview Output button to view the time adjusted output without saving it to file. Note that the table header changes to green. You can get back to viewing the input files and changing their reference points simple by clicking on them in the merge list again. • Save the calculated output to a subtitle file using the Save Output button. You can change the desired output file type inside the save file dialog as well, but it you pick *.sub make sure you've set the FPS correctly back on the main form. Usage Example Say I have the following two subtitle files that I've downloaded from the internet for my movie. Actually, this is the same example as in help window of the program itself (see screenshot below), only described in writing as opposed to visually. • Add both of them to the merge list. This is shown in point 2 in the help window, and the picture directly beneath it. • Click on the CD1 file in the merge list (i.e. the “List of Subtitle Files to be Merged”) • Set subtitle ID 1 to start at 00:00:02 and 300ms say (you will need to check Enable fine tuning controls to do this) • Click on the CD2 file in the merge list (which timing-wise actually should start halfway through the movie) and... • Set subtitle ID 1 to start at 01:01:00 and 0ms say (this is approximately the true value). • Now, clicking on the CD1 file should recall the options set before for CD1 (i.e. subtitle ID 1 should start at 2.300s) • Now, clicking back on CD2 should bring the program back to where it just was. Either way, hit Preview Output and the header of the table changes to green and displays the combined output with the new shifted times according to the two inputs that were set. Scrolling down to subtitle ID 995 in the output reveals that what used to be the first subtitle of the CD2 file is now at the correct time of 01:01:00, and comes after the last subtitle of the CD1 file as expected. If this was not the case, the subtitle would have been omitted/truncated and a warning would have been displayed. Try the program out yourself and let me know what you think! Check out the screenshots of this project to get a good idea of what Subtitle Adjuster is like... Screenshot thumbnail The help dialog box (press F1 to access this) Screenshot thumbnail The main window, including subtitle preview table Project Admins:
global_05_local_5_shard_00000035_processed.jsonl/14540
Download the Code iconReaders often ask where I get the ideas for my columns. One plentiful wellspring of inspiration is the public newsgroups, where I frequently answer anywhere from 5 to 20 questions a day. If I find myself composing a long, detailed reply to a question, I wonder whether the topic is worth a column. In other cases, if I see similar questions repeatedly within a few days, I take that as a sign that many people want to know about the topic. Recently, I responded to questions on three different forums about what goes on inside SQL Server when it performs an ALTER TABLE operation. I realized I also had questions about which variations of ALTER TABLE require SQL Server to do more work than others do, so I rolled up my sleeves and started testing. You can use an ALTER command in SQL Server 2000 and 7.0 to modify almost every kind of object that you can create with a CREATE command (e.g., database, procedure, view). For most objects, ALTER is a better choice than using DROP and CREATE to change an object, mainly because using ALTER maintains the object permissions. The new definition for procedures, functions, triggers, and views overwrites the old definition, but the permissions remain because you're not modifying the system table that stores permissions. Using the ALTER command to change a table is different than altering other kinds of objects—you can use ALTER TABLE to change just one table property without changing everything about the table. SQL Server 2000 and 7.0 let you use the ALTER TABLE command to make many kinds of changes to a table, far more changes than earlier releases did. Before SQL Server 7.0, the only option available for the ALTER TABLE command was adding a new column, and then only if the new column allowed NULLs. Starting with SQL Server 7.0, ALTER TABLE lets you make any of the following changes inside one command: • Adding new columns, which don't allow NULLs if you specify a default • Adding new constraints • Changing a column's data type or NULL property • Dropping columns • Dropping constraints • Enabling or disabling foreign key or check constraints • Enabling or disabling triggers When you change an existing column's properties, you have to work within certain restrictions, which appear in SQL Server Books Online (BOL). One important thing to remember about modifying a column is that all changes must be compatible with existing data. How Does It Do That? Let's look at what SQL Server does internally when performing an ALTER TABLE command. SQL Server can carry out an ALTER TABLE command in any of three ways: 1. SQL Server might need to change only metadata. 2. SQL Server might need to examine all the existing data to make sure it's compatible with the change but then change only metadata. 3. SQL Server might need to physically change every row. For years, I've wanted to compile a definitive list of which ALTER TABLE options fall into each of these categories. This column is a start at building that list. I ran tests in an attempt to determine which of the three types of alterations was happening. The first type is by far the easiest to track down; you just need to set STATISTICS IO ON in Query Analyzer before issuing an ALTER TABLE command. If SQL Server is changing only metadata, you get no output back for STATISTICS IO. The ALTER TABLE command updates metadata only when SQL Server makes the following changes to a table: dropping a column or constraint, disabling a constraint, or disabling or enabling a trigger. In addition, SQL Server changes metadata only when you add a new column to a table without specifying a default value (the new column must allow NULLs in that case) or when you modify a column definition to allow NULL values. After setting STATISTICS IO ON and executing the ALTER TABLE commands, you'll see that this batch returns no statistics output. The second and third possibilities are more difficult to distinguish because both require SQL Server to read all the pages in a table. I originally thought that if STATISTICS IO reported the same number of logical I/O operations as the number of pages in the table, SQL Server was only looking at the data. However, sometimes it's doing more. SQL Server might read each page only once even if it's changing every row. But consider the converse. If STATISTICS IO reports that SQL Server is accessing many more pages than are in the table, you can assume that SQL Server is doing more to the pages than reading all the rows. So, how can you tell whether the table data (and not just the metadata) has changed? One way is to use fn_dblog() to look at the number of log records, as I did in my June 2003 column, "Inside Recovery Models." If SQL Server is only examining each row without making any changes, the log should contain few new records. However, if you're running tests in a database that other people are using concurrently, their operations will affect the log, and checking the number of new log records might not be useful. An alternative method is to examine the data pages, as I did in my April 2001 column, "The Fill-Factor Truth." That article contains details about using the DBCC IND command, which tells you which pages belong to a table, and using the DBCC PAGE command to see the actual data in the table. Testing, Testing You need to find the page that has no value for previous page but has a next page value—that will be the first page of the table. Use that page number in place of XXX in the DBCC PAGE command. Now let's look at five tests I ran to see what SQL Server does when it performs different types of ALTERs. The first test changes a data type from int to smallint in NewOrders: And the following command changes a column in NewOrders to not allow NULLs: smallint NOT NULL In both of these tests, note that SQL Server needs to scan the table because it must ensure, in the first case, that no values are too big for a smallint and, in the second case, that no rows already contain NULLs. If any rows contain unacceptable data, the ALTER TABLE command will fail. Using DBCC PAGE to examine the page shows that the ALTER command made no changes on the page; it just changed the metadata describing the table structure. Another change that requires SQL Server to examine every row is adding a new constraint. For unique and primary key constraints, SQL Server checks for existing duplicates and, if it finds any, rejects the ALTER. SQL Server must ensure, for check and foreign key constraints, that no existing data violates the constraint. For check and foreign key constraints, you can alternatively include the WITH NOCHECK option, which tells SQL Server not to verify existing data. The next test adds in NewOrders a new column that has a default value: ADD big_column CHAR(200) NOT NULL DEFAULT 'big_column' And the following test changes a data type in NewOrders from int to bigint: ALTER COLUMN ShipVia bigint The last test changes an int data type to char(10): ALTER COLUMN EmployeeID char(10) For these three changes, SQL Server must change every row because the row will increase in size. As the altered columns grow, the new row might not fit on the original page, and the page will need to split. You'll notice a lot of page accesses in these cases, perhaps several hundred for the 21-page NewOrders table. When I ran these tests, I noticed another interesting fact about the rows moving as pages need to split. If in a previous test I'd added a fixed-length column that allowed NULLs, SQL Server didn't change the rows at that time to include the space for the new column. But when a later ALTER TABLE command resulted in page splits and row movement, SQL Server adjusted the rows that were moving to new pages, making space for the previously added column. Rows that didn't move didn't reflect the space for the new column until SQL Server received an UPDATE for the row. Keep in mind that an int column takes only 4 bytes of disk space even though it can store a 10-digit decimal number. So if you change an int column to char(10), the column must grow. However, if you change an int column to char(4) (assuming all existing data values are less than 10,000), the column doesn't need to grow. SQL Server will modify the rows, as you can verify by using DBCC PAGE, but the rows don't need any new space. I also tested changing a char column to varchar and vice versa. For these tests, the number of pages STATISTICS IO returned was much higher than the number of pages in the table, so I knew that SQL Server was modifying the pages. I also used the syscolumns table to examine what kinds of changes SQL Server made. SQL Server stores fixed-length and variable-length columns in different ways within the row. All fixed-length columns are in the first part of the row, at a known byte offset within the row. You can find this offset in the syscolumns table's xoffset column. For example, you'd use this query to find an offset for the NewOrders table: SELECT * FROM syscolumns WHERE id = object_id('NewOrders') SQL Server stores variable-length columns at the end of the physical row; they don't have the same byte offset in every row in the table. The syscolumns table shows their offset as a negative number, indicating a position counting from the end of the physical row in which SQL Server stores the column. For example, a column that has an offset value of -1 in syscolumns.xoffset is the last column; the column with an offset value of -2 is the next to last, and so on. (Additional metadata in the row reports exactly where each variable-length column starts, but I won't go into that level of detail here.) When changing a char column to varchar or vice versa, I noticed in the syscolumns table that the xoffset value changed from a fixed number to a negative offset position or from a negative offset position to a fixed number. This list of tests isn't complete, but it's a good starting point for you to create tests of your own. For an exhaustive list of how every ALTER TABLE variation behaves internally, you'd need to run tests both on tables that have clustered indexes and on heaps—particularly those cases where making the requested change to the table requires moving rows. For a table that has a clustered index, SQL Server splits a page if a new row doesn't fit on the original page. But in a heap, SQL Server moves the updated, enlarged row to a new location and leaves a forwarding pointer in the original location. Other Changes SQL Server 2000 and 7.0 also provide another command that you can use to make metadata changes to tables: the sp_tableoption stored procedure. I discussed the text in row option to this procedure in my March 2003 column, "Text in Row Internals." I showed that when you enable this option, the changes to the table are just metadata changes, and when you disable the option, SQL Server physically updates the pages. The other options to sp_tableoption (pintable and table lock on bulk load) change only the table's metadata when the sp_tableoption procedure is executed. Be aware that if you use Enterprise Manager to change tables, SQL Server might end up working much harder than if you had used Query Analyzer to run the T-SQL statement. Sometimes, particularly in SQL Server 7.0, SQL Server changes an existing table by completely rebuilding the table, moving all the data, dropping the original table, and renaming the new one. Although this process produces the same result as if you merely altered the table, SQL Server does a great deal of extra work, especially if your table contains a lot of data.
global_05_local_5_shard_00000035_processed.jsonl/14541
Take the 2-minute tour × I've just upgraded from XAMPP 1.7.3 to 1.8.0, this included quite a few changes (PHP 5.4 etc) as I went through the reinstallation of my dev-environment. Anyways, everything works now, except for Sendmail. Before, you had a configuration in sendmail.ini like this: logfile "C:\XAMPP\sendmail\sendmail.log" ## A freemail service example account Hotmail tls on tls_certcheck off host smtp.live.com from [exampleuser]@testmail.loc auth on user [exampleuser]@hotmail.com password [examplepassword] # Set a default account account default : Hotmail Plus some values in php.ini: SMTP = localhost smtp_port = 25 Now it all looks a lot different (and the old config wouldn't work), an example: http://pastebin.com/M83bNmJw A little php mail script: ini_set('display_errors', 1); $to = "[email protected]"; $subject = "Hi!"; } else { Message delivery failed... I guess I'm too stupid to change the correct things, it just won't work, plus I barely get an error in my log-files, so I don't even know where to start. share|improve this question 4 Answers 4 #GMAIL mit XAMPP 1.8.1 und sendmail tls_certcheck off auth_username= [email protected] this settings in php.ini [mail function] ; SMTP = smtp.gmail.com ; smtp_port = 25 ; For Win32 only. ; http://php.net/sendmail-from sendmail_from = [email protected] ; XAMPP IMPORTANT NOTE (1): If XAMPP is installed in a base directory with spaces (e.g. c:\program filesC:\xampp) fakemail and mailtodisk do not work correctly. sendmail_path = "\"C:\sendmail\sendmail.exe\" -t" ; XAMPP: Comment out this if you want to work with mailToDisk, It writes all mails in the C:\xampp\mailoutput folder ;sendmail_path = "C:\xampp\mailtodisk\mailtodisk.exe" ;mail.force_extra_parameters = mail.add_x_header = Off mail.log = "C:\xampp\php\logs\php_mail.log" share|improve this answer I see that in 1.8.0, the default will send mail through mailtodisk.exe. You have enabled it in your PHP config file, but have you disabled mailtodisk.exe? In addition, you'll need to ensure that smtp_server in sendmail.ini is set to localhost. I just found this solution myself, and all mail sent using PHP works. share|improve this answer Michael, I've found a good example now (linked in a different post), in between the biggest issue was, that I used the sendmail-tag in the sendmail.ini twice (yeah, I'm too stupid to comment out everything). –  user828591 Sep 10 '12 at 14:44 My xampp is 1.8.2 with window 8.1 In php.ini smtp_port = 587 In sendmail.ini To account gmail "auth_password" you need create new password "Your application-specific passwords", check [here][1] then follow these steps: The problem is that sendmail has to be run as an administrator. This is the solution to help any one on my situation. 1. Right click on sendmail.exe 2. Properties 3. Compatibility 4. Change the configuration for all users 5. Execute as Windows XP SP 3 6. Execute as adminitrator 7. test email $to = "[email protected]"; $subject = "Hi!"; $headers = "From: [email protected]" . "\r\n"; echo ("Message successfully sent!"); } else { echo ("Message delivery failed..."); share|improve this answer up vote -1 down vote accepted I've found a working example, it works like a charm now share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14542
Take the 2-minute tour × The new Facebook PHP-SDK have a getApplicationAccessToken method, which is the join between your [appID]|[appSecret]. I usually use a request from graph with this url https://graph.facebook.com/oauth/access_token and turn out have a different value from the first. Both access token can access the app detail by using this request https://graph.facebook.com/[appID] So which one should be use???, its confuse me, I would rather to use the first one, bcoz it doesnt have to make a graph request but can I do that or should I??? share|improve this question Of course you can use the first version, app_id|app_secret. Since internally the PHP SDK creates the app access token the same way, I think its safe to say that this will always work. –  CBroe Sep 19 '12 at 10:36 Sorry, but what do u mean with "the same way", the app access token that generated from graph is totally different with the one from PHP-SDK, I don't know which one more consistent :( –  Khalid Adisendjaja Sep 20 '12 at 8:54 @CBroe is right, the token you get from https://graph.facebook.com/oauth/access_token is actually User Access Token which is deemed to be different. If you want access data accessible publicly or by your app only then you don't require the same as access to graph.facebook.com/appID doesn;t requires any token. –  Anvesh Saxena Oct 1 '12 at 12:57 Your Answer Browse other questions tagged or ask your own question.
global_05_local_5_shard_00000035_processed.jsonl/14543
Take the 2-minute tour × I want to use use a customer ttf font as the Web View's default font. the html documents i wish to display using UTF8 characters and they needs a special font ttf to display. btw, they are unicode characters on mac, i could change my default font to that xyz.ttf. on iphone safari i could not set default font for fallback. so, i am creating this simple app using UIWebview with custom ttf font. Wondering if this is possible? Thanks guys share|improve this question 2 Answers 2 you can use @font-face, but you need to convert that font to svg. share|improve this answer NSString *myDescriptionHTML = [NSString stringWithFormat:@"<html> \n" "<head> \n" "<style type=\"text/css\"> \n" "body {font-family: \"%@\"; font-size: %@;}\n" "</style> \n" "</head> \n" "<body>%@</body> \n" "</html>", @"helvetica", [NSNumber numberWithInt:kFieldFontSize], content]; Please check above code... reference : code share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14544
Take the 2-minute tour × I've just started learning Lisp and I can't figure out how to compile and link lisp code to an executable. I'm using clisp and clisp -c produces two files: • .fas • .lib What do I do next to get an executable? share|improve this question 5 Answers 5 up vote 41 down vote accepted I was actually trying to do this today, and I found typing this into the CLisp REPL worked: (EXT:SAVEINITMEM "executable.exe" :QUIET t :INIT-FUNCTION 'main :EXECUTABLE t :NORC t) where main is the name of the function you want to call when the program launches, :QUIET t suppresses the startup banner, and :EXECUTABLE t makes a native executable. It can also be useful to call at the end of your main function in order to stop the user from getting an interactive lisp prompt when the program is done. EDIT: Reading the documentation, you may also want to add :NORC t (read link). This suppresses loading the RC file (for example, ~/.clisprc.lisp). share|improve this answer On ccl on mac os x 10.9 i am having a problem cretaing executables. (save-application "/full/path/to/saved-app" :prepend-kernel t) double clicking the produced executable file enters on terminal showing very long errors starting with a one like error: problems loadiing bundle:can't determine class name and ending with the kernel debugger options. On ccl on windows i simply define a function and do the same above to save executable, later i can double click the output file it runs and remembers my defined function, ccl on mac dont remember also when i save image and load it to kernel manually –  FSC Jan 6 '14 at 0:53 This is a Lisp FAQ (slightly adapted): *** How do I make an executable from my programme? This depends on your implementation; you will need to consult your vendor's documentation. • With ECL and GCL, the standard compilation process will produce a native executable. • With LispWorks, see the Delivery User's Guide section of the documentation. • With Allegro Common Lisp, see the Delivery section of the manual. • etc... However, the classical way of interacting with Common Lisp programs does not involve standalone executables. Let's consider this during two phases of the development process: programming and delivery. Programming phase: Common Lisp development has more of an incremental feel than is common in batch-oriented languages, where an edit-compile-link cycle is common. A CL developer will run simple tests and transient interactions with the environment at the REPL (or Read-Eval-Print-Loop, also known as the listener). Source code is saved in files, and the build/load dependencies between source files are recorded in a system-description facility such as ASDF (which plays a similar role to make in edit-compile-link systems). The system-description facility provides commands for building a system (and only recompiling files whose dependencies have changed since the last build), and for loading a system into memory. Most Common Lisp implementations also provide a "save-world" mechanism that makes it possible to save a snapshot of the current lisp image, in a form which can later be restarted. A Common Lisp environment generally consists of a relatively small executable runtime, and a larger image file that contains the state of the lisp world. A common use of this facility is to dump a customized image containing all the build tools and libraries that are used on a given project, in order to reduce startup time. For instance, this facility is available under the name EXT:SAVE-LISP in CMUCL, SB-EXT:SAVE-LISP-AND-DIE in SBCL, EXT:SAVEINITMEM in CLISP, and CCL:SAVE-APPLICATION in OpenMCL. Most of these implementations can prepend the runtime to the image, thereby making it executable. Application delivery: rather than generating a single executable file for an application, Lisp developers generally save an image containing their application, and deliver it to clients together with the runtime and possibly a shell-script wrapper that invokes the runtime with the application image. On Windows platforms this can be hidden from the user by using a click-o-matic InstallShield type tool. share|improve this answer Take a look at the the official clisp homepage. There is a FAQ that answers this question. share|improve this answer CLiki has a good answer as well: Creating Executables share|improve this answer I've never found a good way to do it in Common Lisp and I wrote about it on: and some possible solutions on: http://pupeno.com/blog/solving-lisps-problem-a-simplistic-solution http://pupeno.com/blog/another-simplistic-solution-with-scons Now I'm working with Clojure, where the usual way to write Java programs apply. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14545
Take the 2-minute tour × In a specific project at my work, I have a method that returns IList. But this interface does not contain where, or FindAll filters. However, when I open a new project, IList contains all. What is the difference? share|improve this question 5 Answers 5 up vote 19 down vote accepted Did you import System.Linq ? share|improve this answer Thanks so much. What a stupid mistake... –  bileyazan Jul 21 '10 at 11:06 You should accept ScottE's answer if it's the right one. –  Will Dean Jul 21 '10 at 11:20 @bileyazan - I agree with @Will Dean, it's important to accept answers that help you out from SO. It doesn't just give the answerer reputation, it lets future googlers know which answer helped you figure out your problem. –  Dave McClelland Jul 21 '10 at 13:06 Nope. IEnumerable<T> has "where" as an extension method. Assuming your project is .Net 3.5 or greater, you need to have using System.Linq; share|improve this answer IEnumerable<T> you mean. :) The plain old IEnumerable is not supported by LINQ - you have to do Cast/OfType first. –  Noldorin Jul 21 '10 at 12:58 @Noldorin: Yeah, I actually had <T>, but I forgot to put it in a code block and StackOverflow lost it... probably got rendered as a HTML tag. Thanks :) –  Brian Genisio Jul 21 '10 at 13:03 Check .NET Framework of opened framework, may be its .NET Fx 2. System.Linq added in 3.5 share|improve this answer Here's a basic discussion of extension methods in general. As mentioned by others, the Where method is an extension method found in the System.Linq namespace so you need to import it in order to have intellisense detect the existence of those methods. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14546
Take the 2-minute tour × I have an assembly. Is there a way to detect which version of .NET was used to build that assembly? share|improve this question 5 Answers 5 up vote 2 down vote accepted You could possibly use Assembly.ImageRuntimeVersion. According to the MSDN docs, by default this is set to the version of the CLR used to build the assembly. Though apparently it can be changed. It is a string property, so you would have to do some string comparison on it. share|improve this answer So presumably this would distinguish between 1.1 and 2.0, but nothing more than that (until 4.0 comes out)? –  Jon Skeet Dec 5 '08 at 9:22 That seems to be the case. I've got a recently built assembly here reporting "v2.0.50727"...That's with 3.5 SP1 no build number info. –  ckramer Dec 12 '08 at 1:30 For frameworks < 2.0 and framework 4.0, the version of the referenced mscorlib will give you the framework version. For frameworks 2.0 - 3.5, check for the presence of any reference to System.Core or one of the other 3.5+ assemblies, and PresentationCore or any other 3.0+ assemblies. If you don't have any of those, it should be targeting 2.0. share|improve this answer I don't believe so. It's relatively hard to build a .NET 1.1 app with .NET 2.0, although it's not impossible - so if you checked the version of mscorlib the app referenced, you could get a "probably accurate" picture of whether it was built with 1.1 or 2.0+. You'd also need to ask yourself what answer you wanted when using VS2008 but building against a target of .NET 2.0. Are you actually interested in which version of the compiler was used? There may be some characteristic differences between the output of different versions of the compiler. Extra features could give it away too - if the app was written in C# targeting .NET 2.0, you could find types which look like they were generated from anonymous types in the source code. Of course that relies on the language feature being used in the first place... Why do you need to know this, out of interest? share|improve this answer You could maybe use System.Reflection to check version number of system referenced assemblies. using System; using System.Reflection; class Module1 public static void CheckReferencedAssemblies(string assemblyPath) Assembly a = Assembly.Load(assemblyPath); foreach (AssemblyName an in a.GetReferencedAssemblies() ) // Check an.Version for System assemblies Edit: I'm not sure that I've understood what you want. share|improve this answer Part of the problem with your question is that .NET has done a pretty good job of not changing code as versions increase. By that I mean that the mscorlib will be the same in .NET 4.0 as it was in .NET 1.1. But I sort of agree with the implied question of Jon Skeet: Why do you need to know? Is it purely out of interest, because I would think that it shouldn't matter to you. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14547
Take the 2-minute tour × I am using Graph api to obtain friend list. Once I receive an id of friend using /me/friend, now I wish to obtain further information. Code I wrote for it is: $fr = $app->facebook->api('/'.$uid); echo $fr['id']; Though it gives error. What am I doing wrong? Thank you. share|improve this question 1 Answer 1 up vote 0 down vote accepted What error does it give you? That might give us a clue as to what went wrong. most errors from graph are because you haven't authenticated properly. share|improve this answer OK. Maybe I was in a wrong direction. The error as I checked was about crossing the maximum execution time. But then how do I process friends without crossing limit? FQL? –  mihsathe Jan 4 '11 at 6:25 That just sounds like php timed out trying to make the call - either you have a network problem or facebook is down ( which is surpisingly likely ) –  canuckistani Jan 8 '11 at 6:46 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14548
Take the 2-minute tour × I'm trying to get hold of the current 'middle' row as a UIPickerView is spinning. I am trying out the technique from this question here: UIPickerView: Get row value while spinning? However, I'm not really sure how to use this override in MonoTouch - I can't call the base, as it's not implemented, and I the fourth parameter (UIView) is always null. Any ideas? public override UIView GetView(UIPickerView picker, int row, int component, UIView view) // now what to return? share|improve this question 2 Answers 2 You can never call the "base" method in [Model] classes. This is why you get a descriptive exception that says "Do not call the base method". All you have to do is not call the base method :-) Return the last view parameter that is passes as the method return value. share|improve this answer Thanks, but the last view parameter is null (from my question: "the fourth parameter (UIView) is always null.") –  vlad259 Mar 21 '11 at 9:37 I found this code that Miguel wrote that answers the question. Posted for future reference: http://primates.ximian.com/~miguel/tmp/monocatalog/pickercustom.cs share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14549
Take the 2-minute tour × Is there a way in HTML, JavaScript or jQuery to make an input element "readonly", i.e. • the user can read it • the user can copy its content to the clipboard • the user can't change it that will work in all browsers? I know there is a "readonly" attribute but it's not supported in all browsers. I'm not asking about security aspects, just user experience. share|improve this question +1 just to see those those pretty unicorns –  Shekhar_Pro Apr 1 '11 at 1:47 @Slurpie It is supported in all current browsers. What you need is a fix for IE8 and below... (let's say it as it is) –  Šime Vidas Apr 1 '11 at 1:49 I want it to work in all browsers in common use –  JoelFan Apr 1 '11 at 1:50 Why "not supported"? MSDN says it's defined in HTML 4 and DOM level 1 -- don't they support it by now? (disclaimer: I 'm just asking, I don't know) –  Jon Apr 1 '11 at 1:51 @Slurpie google.com/images?q=unicorn –  Šime Vidas Apr 1 '11 at 1:59 3 Answers 3 if you using jQuery (as you put in tag) it cross-browser: $(...your input ...).attr('readonly','readonly'); edit: from http://www.w3schools.com/tags/att_input_readonly.asp The readonly attribute is supported in all major browsers. share|improve this answer Is this going to magically make it cross-browser? –  Jon Apr 1 '11 at 1:49 So are you saying that jQuery does more than just set the "readonly" attribute? It actually makes it work in browsers that don't support the "readonly" attribute in HTML? –  JoelFan Apr 1 '11 at 1:49 Woe to you oh earth and sea -- they see the $ in front and they upvote. On the other hand, it may be the unicorns that do it. –  Jon Apr 1 '11 at 1:52 @bensiu: You put up the w3schools link as an argument for your answer? w3fools.com –  Jon Apr 1 '11 at 2:00 @bensiu W3 Schools has issues –  Šime Vidas Apr 1 '11 at 2:01 One way is to fake it: <p class="fake_input">The readonly Value</p> <input type="hidden" name="real_input" value="The readonly Value" /> And if you wanted it to look like a disabled input box, you could style it and stuff. Just remember that people can change hidden inputs willy nilly. share|improve this answer hidden is hidden for users -> not copyable –  bensiu Apr 1 '11 at 1:49 @bensiu That's why you have the paragraph that people can see. –  sdleihssirhc Apr 1 '11 at 1:51 OK, good idea... now how to style it, please? –  JoelFan Apr 1 '11 at 1:51 @Slurpie You could use images or tables, but most people these days use CSS to style their markup. –  sdleihssirhc Apr 1 '11 at 1:53 @Slurpie What does a readonly textbox look like? I'm not being intentionally obtuse; in Chrome and IE, a readonly textbox looks like a normal textbox. But that would be a UX nightmare. People would think your site was broken if it looked like they could edit something, but then it refused to change. –  sdleihssirhc Apr 1 '11 at 2:08 Although the readOnly attribute is case insensitive in html it must be written 'readOnly' in js. It works when directly assigned in all browsers from and including IE6, but the way you assign it can be browser specific. element.setAttribute('readOnly','readOnly') does not work in older browsers, but element.readOnly='readOnly' (or any truthy value') works x-browser. share|improve this answer what about setting it in jQuery or HTML? –  JoelFan Apr 1 '11 at 16:24 Thanks @kennebec! This was doing my head in. @JoelFan - yes, it's true in jQuery too. –  Greg Ball Apr 4 '12 at 22:26 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14550
Take the 2-minute tour × I'm working my way through Bruce Tate's Seven Languages in Seven Weeks and am having a hard time understanding his implementation of sizer.scala (Scala: Day 3). In particular, consider the following Singleton object object PageLoader { def getPageSize(url : String) = Source.fromURL(url).mkString.length and the following method that, using actors, calculates the number of characters in each web page given by the urls array. def getPageSizeConcurrently() = { val caller = self for(url <- urls) { actor { caller ! (url, PageLoader.getPageSize(url)) } for(i <- 1 to urls.size) { receive { case (url, size) => println("Size for " + url + ": " + size) 1. What does self refer to? getPageSizeConcurrently? Is it possible for self to refer to a function? 2. Assuming that self does refer to getPageSizeConcurrently, is this considered to be pretty standard in the Scala world? Why send messages to a function instead of an object, or vice versa? UPDATE: The code in question only uses self once, but it does start with the following import statements. import scala.io._ import scala.actors._ import Actor._ Looking through the Scala API, it appears that the Actor singleton object has a self method. Even if that's the self assigned to caller, though, I don't see why the receive block would be executed. share|improve this question What class or object has getPageSizeConcurrently as one of its methods? –  Rex Kerr Jul 19 '11 at 7:34 @Rex Nothing, as far as I can tell. I've omitted a few other methods (and the definition of urls) here, but otherwise this is verbatim from the book. The only class or object declared in the code is PageLoader, as shown above. –  Chris Frederick Jul 19 '11 at 7:40 3 Answers 3 up vote 4 down vote accepted There is a self method on the Actor companion object. From the scaladoc: Returns the currently executing actor. Should be used instead of this in all blocks of code executed by actors. I'm guessing that your code has imported the Actor object, and that it is the self method on the Actor object your code is calling. This way you get a reference to the main actor thread you're in, and the anonymous actors you start to get page size can send the message back to the thread you're in. share|improve this answer Interesting! So there's a distinction between the main actor thread returned by Actor's self method and the anonymous actors in the code above? I would have thought that the "currently executing actor" would actually be one of the anonymous actors that was started... –  Chris Frederick Jul 19 '11 at 7:36 No, there's no distinction, but at the time you call self, the currently executing actor is the main actor thread. So that's what the caller reference points to later when you use it in the creation of the anonymous actors. –  Jostein Stuhaug Jul 19 '11 at 7:49 Ah, of course, that makes sense. So the following calls to receive are implicitly invoked on the main actor thread, right? –  Chris Frederick Jul 19 '11 at 18:14 I don't think it's correct to say implicitly invoked, as that might be interpreted as implicit in the special scala sense of the word. "receive" is a normal method call just as "self" further up, and invoked in the same main thread, yes. –  Jostein Stuhaug Jul 24 '11 at 10:00 self is not a Scala keyword. Although I don't have the book, Scala classes allow aliases for themselves; self is commonly chosen. Here's why you might want to do that (not counting that you can restrict the type that the class can be when you specify the alias): class A { self => val a = 7 class B { val a = 7 // Uh-oh, we've shadowed the parent class a. val outerA = self.a // Whew, we haven't lost it! So, self is almost certainly the class that implements the getPageSizeConcurrently method. Without seeing more of the code, I don't have any insight into why exactly it's written this way (looks kind of strange to me). But there's no weird message-to-method going on here. (Incidentally, note that it is formally possible to define an actor that extends a Function trait. So you could, in fact, send a message to a function (function object, not a method). But the syntax wouldn't look like what you've got above.) share|improve this answer Thanks for pointing me in the right direction! You were correct in guessing that I thought of self as a Scala keyword. I've updated my question to incorporate this new information. –  Chris Frederick Jul 19 '11 at 7:25 Although actors are not bound to threads as they were in the earlier versions of Scala, self is comparable to Thread.current. You use it, because Thread.current does not have the necessary methods to view the current thread as an actor. "What class or object has getPageSizeConcurrently as one of its methods?" - Rex Kerr "Nothing, as far as I can tell..." - Chris I assume self tries to treat the current thread as an actor. Note: Be careful, when using self in the REPL. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14551
Take the 2-minute tour × It strikes me as a Good Thing™ (ie. in terms of compilation time), that the Python interpreter will create bytecode .pyc files. I believe python uses some sort of hash to determine if the source has changed and then recompile. Would this be a good idea for Perl? ( with respect to the larger projects with many dependencies etc ). share|improve this question What's with the trademark? Is it something Pythonic? –  Zaid Dec 22 '11 at 8:32 @Zaid Good Thing is jargon and usually emphasized with a trade mark. Geeks. Go figure. –  Linus Kleen Dec 22 '11 at 10:02 4 Answers 4 up vote 11 down vote accepted For quite long explanation of .pmc files, there is lenghty article on perlmonks, also explaning why nobody uses it. share|improve this answer Whilst the python functionality is built in it looks like (from what i just read) that perl pmc is a bit of an afterthought! –  Richard Dec 22 '11 at 16:37 Actually, there is a way to compile Perl to bytecode, but it has some limitations. See B::Bytecode. share|improve this answer Parrot is a bytecode VM which should be used by next version of Perl, i.e. Perl6 share|improve this answer Perl6 is another type of Perl, rather than the "next" as in successor. It's a language spec, much like common lisp is a language spec. –  tempire Dec 25 '11 at 2:26 Yes, but the only (prototype, incomplete, alpha-stage) implementation of Perl6 seems to be Parrot based. –  Basile Starynkevitch Dec 25 '11 at 8:01 It took longer for Perl to load from binary than from source. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14552
521 reputation 4 14 Started my Career in programming with ASP.NET while pursing the Masters degree. From a point where a big junk of code seemed scary and a complex ternary operator seemed alien, to creating small-simple-cute websites and web application, today have reached a point where the thought of a complex logic gives a thrill and solving it like sorting a tangled thread gives a calm satisfaction to this ever curious brain. All this time in Industry has given me a chance to work on wide range of applications from various domain with different job roles, right from assisting a senior to sharing a module with peers to Masterminding the entire project both backend & frontend. Architect and Designing a project gives me happiness. Though I'm not a person to point fingers but Debugging Code(Mine or Others) & finding the Culprit line seems to be a fun job to me. In all these time of programming and debugging, JavaScript became the love of my Work life. You will find me on my toe tip when heard JavaScript anywhere. My tool-set includes : ASP.NET, HTML, HTML5 , C#, VB, SQL Server, MySQL, SQL Lite, CSS, CSS#, Javascript, JQuery, AJAX, Web Services, WCF, LINQ, Entity Framework,Visual Studio, Visual Source Safe, Team Foundation Server, Social Network Integration, IIS, Windows Servers. Apart from the regular, also had a chance to try hands on PHP, Android Development, VBA, Leap Motion, Photoshop, Flash. If not programming, I will be into Books, Music, Photography or Simply roaming around somewhere admiring nature.. Copyright © 2010 Neelam Gupta Top Tags (70) Score 9 Posts 20 Posts % 38 Score 9 Posts 8 Score 5 Posts 21 Score 5 Posts 16 Score 3 Posts 2 Score 2 Posts 2 Top Posts (53) All Questions Answers | Votes Newest View all questions and answers Badges (18) Silver 4 Bronze 14
global_05_local_5_shard_00000035_processed.jsonl/14556
Editorial: People prefer voting by mail Published Thursday, November 09, 2006 But before we kiss these elections good-bye, we want to talk about one of the more unpleasant parts of this election: the act of voting itself. Did you opt for early voting? If so, did you use a paper ballot or a touch screen? Absentee ballot, perhaps? Did you go to your precinct location on Election Day to vote? Were there lines? We can tell you this, unless you voted absentee, you voted the soon-to-be old-fashioned way. Voters across the country and in St. Johns County are making it clear they like voting by mail over other methods. It's convenient, takes only a few minutes and has a paper trail, so you know your vote will be counted. Before the election, St. Johns County Supervisor of Elections Penny Halyburton estimated that 9,000 county voters would vote by absentee ballot, which other states call voting by mail. On top of that, another 11,000 went to early voting polls, Halyburton said. To us, that says voters' appetite is strong for a new way to vote that doesn't mean standing in line on Election Day. The model that makes the most sense is Oregon's, where everybody votes by mail. Last year, Reed College in Oregon did a study for the Commission on Federal Election Reform on how Oregon's voting experience was working. Co-chairs where former President Carter and former Secretary of State Jim Baker. Here's some of what they found: Non-precinct voting exceeded 30 percent in 13 states. Voting by mail increases voter participation in primaries by as much as 10 percent, although not in general elections. n Voting by mail increases the overall integrity of the system. In 2004, Oregon had non person -- that's right, one -- who tried to vote twice. That person was caught. The main argument against voting by mail is the possibility of fraud, but in Oregon that hasn't happened. And that state has had voting by mail since 1981. It's time for the Florida Legislature to get with the program and start to move us all to voting by mail. It's easy, convenient, free of fraud, has a paper trail and seems to be growing in popularity here and across the country. StAugustine AllAccess Trending this week:
global_05_local_5_shard_00000035_processed.jsonl/14564
Thread: Borg Set Change View Single Post Join Date: Jun 2012 Posts: 1,374 # 10 10-17-2012, 03:24 AM I'm only just collecting my borg set now (Got engines, 1 EDC away from getting the shield, still need the deflector), so don't know what's happened in those links provided. What exactly has happened?
global_05_local_5_shard_00000035_processed.jsonl/14573
You are viewing strong_pie ++++++++Collapse ) Comments are  Do not repost, hotlink or modify xD The Avengers icons this wayCollapse ) Comments are  Do not repost, hotlink or modify xD Writer's Block: B.Y.O.B. Holidays Elf and Scrooged. I watch them every year without fail. Still here! Gee, it's been ages since I posted anything. Making some icons, so will post them as soon as am done! btw, any requests? more this waaaay!Collapse )  It's been aaaaages since I last made a post. Well, I've decided that maybe posting icons is a good idea :) Fassy thanks you for your time xD I did it!  I can't believe I survived uni! *\o/*  Well, when I say survive I mean still with a pulse, because I'm so sick I think I'll die soon. Uni has been the most stressful experience in my life so far. Here's hoping I don't have to go through a more stressful moment. That said. now I can try to relax. And hopefully this course of antibiotics should be enough. I'm tired of going to the doctors all the time. It's like I'm worse than my grandmother lol  In my to-do list (which is massive) catching up with tv shows/films is #1. I should start now then :) Because you can never get enough Mark Whalberg (at least I can't) :P 1st New Year 2011 post! First of all, HAPPY NEW YEAR!!!!!! I hope everyone has had a great time, and fingers crossed this year is better than the last one. boooooringCollapse ) 10 things I hate about you picspam Moulin Rouge song picspam Thinking about a suitable is hard. But the other day I stumbled upon Zombieland. It's a kick ass film, and it turns out it could save your life. Literally. OK, so zombies is a bit unrealistic, but who knows? Columbus rules Rule #1: Cardio Columbus: "Rule #1 for surviving in Zombieland, CARDIO. When the virus struck, for obvious reasons, the first ones to go were the fatties. Poor fat bastards." Yeah, if you can't run away from a mad zombie that's after your flesh, don't run in the first place. Rule #2: Double tap Columbus: "You need to get a gun and learn how to use it which leads me to my second rule, the double tap. In those moments when you're not sure that the undead are really dead-dead, don't get all stingy with your bullets, I mean one more clean shot to the head. You can avoid becoming a human happy meal. Woulda, shoulda, coulda." Exactly. 3. Beware of the bathrooms "It wasn't long before the zombies began to get clever. When you were at your most vulnerable, somehow they could just smell it. Don't let them catch you with your pants down." No one wants to die, specially eaten by a ugly-looking zombie. But if you have to die, at least do it with some dignity and fight. Being trapped in a toilet (and not because it was the first door available between you and the zombie ) is not a cool way to die. Rule # 4: Seatbelts Columbus: "You have to focus, on your own survival, which leads to rule #4. Pretty basic. Fasten your seatbelts." There's nothing more sad (and annoying) than escaping a horde of hungry zombies to then die because such a stupid thing as not wearing a seatbelt. Rule #7: Travel light Travel light means small backpack/suitcase, taking just the bare essentials. You can't run or hide from the undead with a back the size of Paris Hilton's now can't you? Rule # : Don't be a hero Being a hero doesn't mean you will make it to the end. This is about survival, no contest! Rule # : Limber up Tallahassee: "Time to nut up or shut up." If your awesome kick ass partner is hell-bent on rescuing a box of pink Tweenkies, the best thing is to follow him. But limber up first. You don't want to be surprised by a zombie and pull a muscle. Rule #31: Check the back seat Tallahassee: "What are you looking for?" Columbus: "Nothing" OK, so hungry zombies have taken over the world. They could come out any minute. Besides, being cautious is not a crime. Rule #32: Enjoy the little things Columbus: Even though life would never be simple or innocent again, as he savored that spongy, yellow log of cream, we had hope and each other. And without other people, we might as well be zombies." The age expentancy will be incredibly low during a 'zombie age', so take pleasure wherever you can find it. Our hero Columbus has survived so far. Maybe he knows what he's doing after all xD Comments are Tom Hiddleston Latest Month June 2012 RSS Atom Powered by Designed by Tiffany Chow
global_05_local_5_shard_00000035_processed.jsonl/14575
Take the 2-minute tour × I have an external hdd which is formatted with fat for use by both on linux and windows. The issue is that I can't delete some of the files I have which show up with size 0. Also, the modification timestamp (as detected by Krusader, the file manager I am using) is 1935. How can I delete these kind of files without affecting the running fs? share|improve this question It would help to know why you can't delete them - without the error message it'll be hard to help you. –  Cry Havok Oct 11 '10 at 20:04 I agree with @CryHavok, otherwise use "rm -f" –  LightlySalted Oct 11 '10 at 20:09 Doh, sorry, here's the error: rm: cannot remove `file': Input/output error –  hyperboreean Oct 11 '10 at 20:18 Have you run fsck or equivalent on the file system? –  Cry Havok Oct 11 '10 at 21:48 “Input/output error” points to a damaged filesystem or a damaged disk. Do any messages show up in /var/log/kern.log (better check from the time you plug in the disk to the time you get the error)? –  Gilles Oct 11 '10 at 22:40 1 Answer 1 Most likely your FAT table is damaged. You can run fsck to see if this is indeed the case. But I would recommend finding other tools (ie. Testdisk) to fix FAT table before you run fsck to "fix" it...if you value the other data on the drive. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14576
Take the 2-minute tour × My company restricts access to the outside via an (HTTP) proxy. My Firefox settings for the proxy are working (proxy address + port as well as "use this proxy server for all protocols"). However, if I use the same settings for the proxy in Thunderbird I cannot access any NNTP groups. (I use one unsecured server over port 119 and one secured server (eternal-september.org) over port 563 -- both do not work via this proxy. What can I do to read+post text NNTP messages? (I would like to avoid Google Groups as it doesn't work properly for some moderated newsgroups.) Oh, and note that all of the NG I access are actually work related :-) share|improve this question 2 Answers 2 There are a variety of www-nntp gateways that allow nntp over a web interface example: http://www.nntp.hk/web/ you can easily roll out your own if you use the perl Net::NNTP interface which in my opinion is very easy to use. share|improve this answer Thanks. It seems rather more inconvenient than using a dedicated client though. Do you know of any such (free or commercial) gateway that would provide me with a user login and store read messages/state server side? –  Martin Dec 15 '10 at 7:21 i haven't seen one so far. However, how about you script a customised CSS to be applied onto the site, with read links being shown e.g. in gray... read here on how to do that in firefox.. coreygilmore.com/blog/2008/10/23/per-site-custom-css-in-firefox –  bubu Dec 15 '10 at 7:52 this server support HTTP to read/post in usenet http://gall.mine.nu/cgi-bin/dnewsweb.exe share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14577
Take the 2-minute tour × I have a device for which there are no 64 bit drivers (a USB connected scanner). I am replacing the 32 bit machine (Windows XP) to which it is attached with a 64 bit Windows 7 machine. Will it be possible to create a virtual 32 bit machine instance in the 64 bit environment to run that scanner? share|improve this question 2 Answers 2 up vote 6 down vote accepted Yes you can install those drivers into a 32-bit OS running in a VM on a 64-bit host. The biggest concern is ensuring you use a VM solution that allows passing the (assumed) USB connection for the scanner. Since you mention you are using Windows 7 you may (depending on your edition of Windows 7) be able to use the "XP Mode" VM setup supplied by Microsoft. It's existence is intended for these exact situations. share|improve this answer This is exactly what I do . I have an old scanner that whoops the crap out of anything on the market. Got for cheap on Craigslist. However, no x64 drivers. XP mode to the rescue! –  surfasb Jul 15 '11 at 19:16 Thanks, surfasb - I love to hear users who report real experience instead of just giving the results of an intelligent google search. –  BGM Jun 21 '12 at 18:44 If you install 32-bit Windows XP, it will run as 32-bit You can then add the scanner as a device on the XP machine. Source: Here share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14578
Take the 2-minute tour × I need this information because the two threads below didn't really clarify. I mean, does a DVI → VGA adapter suitable for the included HDMI → DVI adapter exist? How would I find it? Would it work with an old CRT monitor? share|improve this question 1 Answer 1 up vote 1 down vote accepted Unfortunately it won't work. The DVI output from a MacBook is DVI-I, containing both analog (DVI-A) and digital (DVI-D) data. DVI-D is very similar to HDMI bar the audio component (both use TDMS, though the HDMI can use a larger colour space). So HDMI --> DVI-D is simple - electrically compatible. DVI-A contains analog data equivalent to VGA - again a trivial conversion. So DVI-I ---> VGA is simply choosing which pins to pass through. HDMI doesn't contain the DVI-A component so plugging the connectors together, though physically feasible, will simply transmit a null signal. To get this to work as you want would require non-trivial processing (and all the HDCP fuss) to produce an image and then export in analogue. And would be legally awkward anywhere in US jurisdiction to produce or possess... share|improve this answer are you talking about mac mini too? And what about that guy that bought a mini-DVI->VGA adapter for macbook? –  P5music Sep 20 '11 at 11:48 Any recent Apple hardware with a DVI port is sending DVI-I, hence has the analog component for the DVI->VGA. The problem is that the HDMI->DVI only delivers the digital signal. To put it another way, consider HDMI as (-D), DVI as (AD) and VGA as (A-). DVI can talk to either as it's "bilingual"; HDMI and VGA don't have any common ground. –  J.C Sep 20 '11 at 12:58 cancelled comment –  P5music Sep 20 '11 at 14:25 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14579
Take the 2-minute tour × I have been really scratching my header over how to install Windows 8 dev preview from a USB hard drive. It is an iso file. There is a Microsoft program that will easily set up a USB flash drive to install from, but it won't work with a USB hard drive. I've searched Google but cannot find an answer to this seemingly simple question. How do you install Windows from a USB hard drive? I've read that I can use disk management to 'mark partition as active' and then extract the contents of a mounted iso into that volume... but disk management won't let me mark the partition on my USB hard drive as active. Any ideas? share|improve this question Again, apologies if this question seems too simple to bother posting, but i really haven't been able to find an easy solution. So much so that i have almost just resigned myself to buying a 8gb usb flash stick to complete the task. –  Daniel Gratz Oct 20 '11 at 8:39 2 Answers 2 up vote 1 down vote accepted Ok so you don't need to do everything from GUI. Here is a tutorial which works as a charm. share|improve this answer ahh diskpart... but does the partition HAVE to be fat32? Can it be ntfs and still work? –  Daniel Gratz Oct 20 '11 at 8:55 I think you should follow the tutorial. Maybe it will work maybe not. Just copy your data and make the partition fat32. Or you could try to convert it with some partition manager. –  v01d Oct 20 '11 at 9:01 How to: Windows To Go To begin you will need the following: • A Windows 8 PC to build the USB drive on. • Windows 8 DVD ISO. Creating the Windows 8 To Go USB Device 3. Then list the available disks by running list disk and you should see your usb device. 4. Select your USB drive by typing select disk # and hit Enter. 5. Clean the partitions on the disk by typing clean and hit Enter. 6. Now create the partition by running the following command: create partition primary format fs=ntfs quick 8. Set the partition active by typing active and hit Enter. 9. Exit Diskpart by typing exit. enter image description here imagex.exe /apply install.wim 1 d:\ Replace d with the drive letter of your USB drive. bcdboot.exe d:\windows /s d: /f ALL Replace d with the drive letter of your USB drive. Credits go to Steve Sinchak @ Tweaks.com for the original article. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14580
Take the 2-minute tour × Does anyone know any tricks to move over a 4.5 gb file from local pc to virtual server?? I am working on the last hairs of my head, and I would like to keep them. share|improve this question migrated from stackoverflow.com Dec 19 '11 at 5:50 This question came from our site for professional and enthusiast programmers. scp? cifs? smb? bittorent? irc dcc? what have you tried? Why haven't they worked? –  sarnold Dec 18 '11 at 22:51 A local virtual server, or a remote one? On a machine you have physical access to (if so, how far away? What's the bandwidth between them?) As long as the link is ~100KB/s, you might as well scp it, it's unlikely you'll get a better answer before it's done. –  Kevin Dec 18 '11 at 22:56 Whichever approach I started with, I would ensure it had resume support :) –  pst Dec 18 '11 at 23:18 HOW DO I USE SCP? –  HelloJonnyOh Dec 18 '11 at 23:40 2 Answers 2 a) Map the virtual server as a network drive (like: \\\C$) in Windows Explorer, and do a standard copy. b) I usually manage my virtual hosts via Remote Desktop, if you're using the recent remote desktop client, you can Ctrl+C -> Ctrl+V any files and easily copy from one location to another. (Warning, it may lock your desktop with a sticky copy dialog). share|improve this answer c) some of them also supports drag'n'drop. d) samba e) ftp server f) http server in case the machine and virtual server are in other subnets use port forwarding share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14581
Take the 2-minute tour × I have an iPhone 4 that is not jailbroken and crashed when it was updating itself to iOS 5.1. I can go into recovery mode and DFU mode, is there anything I can do to get my photos? share|improve this question 1 Answer 1 up vote 1 down vote accepted RecBoot kicked it out of its funk and corrected the problem. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14582
Take the 2-minute tour × I have been using Skype for a very long time, but lately I have been facing a lot of issues with the voice clarity. What messenger or VOIP clients that you know out of experience that are better than Skype for voice communication ? share|improve this question 3 Answers 3 up vote 1 down vote accepted You could try Gizmo5 share|improve this answer It's better than skype in terms of call quality though i will not consider switching coz the interface is very unfriendly –  rzlines Sep 29 '09 at 1:30 I've been using Google Talk. share|improve this answer Google Talk is very good. I'm always using Skype though beacause all my friends are on too. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14583
Take the 2-minute tour × I recently installed Ubuntu Server 12.04 LTS in a VirtualBox machine, and manually installed the Guest Additions successfully. However, I found I couldn't use shared clipboard with the operating system. Being a server machine, I don't plan on installing X11 and a window manager. I noticed that during the Guest Additions installation, the graphics drivers were obviously not installed due to the lack of X11. This terminated the installation; could this mean that the shared clipboard drivers might have been installed after the graphics drivers, if the installation had continued? Also, I know I can just SSH into the server and use my clipboard there, but that's slightly inconvenient as I already have the actual machine open in a window on the same PC. I just want to know if this is possible. share|improve this question +1, same problem here –  Eric J. Sep 24 '12 at 22:34 1 Answer 1 up vote 2 down vote accepted The clipboard sharing feature only works in Xorg. This applies to both VMWare's and Virtualbox's additions. You can simply use a GUI ssh client, or just the ssh command to get a shared clipboard and all the goodies that ssh comes with. share|improve this answer Thank you. SSH is the way to go, really. :) –  Archimaredes Nov 2 '12 at 11:23 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14584
Take the 2-minute tour × One of my drives exhibits near-death symptoms a short time (10-15 minutes) after the system is started. I did a S.M.A.R.T check and the verdict is good health. I happen to know for certain that periodic ticking from the reader-head is indicative or anything but good health. Mind you, this is not the typical stress-seek sound. Apart from having it looked at by professionals, or replacing it all-together, what can I figure out on my own using the S.M.A.R.T interface and preferably some Free or Open software tools? I realize that the implementation varies across manufacturers, but what I'm looking for is general advice about how to use the S.M.A.R.T capabilities of a drive and what to reasonably expect from these features. share|improve this question closed as not constructive by Xavierjazz, Ƭᴇcʜιᴇ007, Mokubai, Dave, Indrek Sep 22 '12 at 16:57 1 Answer 1 SMART doesn't do everything perfectly (and I won't go into details). If you have the money, buy SpinRite. It offers much more thorough than a normal SMART test. As per Ramhound comments from a similar post "The results of reports based on S.M.A.R.T data should be taken into context. Many of the problems HDDs have they are not even aware of. The best way to have a healthy drive is to run it through a program that will read each and every sector often. This allows the HDD to move data from bad sectors to good sectors and then mark any sectors it determines as bad as unusable. This is far more useful then say a defrag although it should be said, running a defrag, often does exactly this. One program I use for for all my HDDs is SpinRite." share|improve this answer Why would you not go into details? If I had the money, I'd just throw the disk away already. –  Ярослав Рахматуллин Apr 21 '13 at 12:43 @ЯрославРахматуллин Because each SMART tool is different, it would mean my answer wouldn't be useful! What may or may not occur in one tool may or may not in other, and then there is a debate about truly constitutes as a smart tool etc! Why else? –  Dave Apr 23 '13 at 8:11
global_05_local_5_shard_00000035_processed.jsonl/14585
Take the 2-minute tour × I have a Ubuntu server with 9 backplanes. Each backplane can have 5 hard drives (45 in total). I plugged in 45 hard drives, and a quick ls /dev/sd* shows only 43 drives (other than the boot drive). Is there a quick way to find out which two hard drives are bust? The back planes are wired in a special order, so that if all the hard drives were working, I know exactly which slot is sdb, sdc and so on. I can list the serial numbers of the hard drives using smartctl -a /dev/sdb | grep Serial for each drive, and then match them physically by looking at the drives. But I was hoping that there will be an easy way to find it out! share|improve this question Exercise them and check the activity LEDs? –  RedGrittyBrick Sep 28 '12 at 7:08 Oh yea... I could have done that. Although the LEDs are not that visible in this particular, but I could have tried. By the way I found the two bust drives. The strange thing is, they were rotating and when I pulled them out, I saw some exception on the screen. But anyways, they didn't work on another server either. –  Richard Whitman Sep 28 '12 at 7:12 Your Answer Browse other questions tagged or ask your own question.
global_05_local_5_shard_00000035_processed.jsonl/14586
Take the 2-minute tour × I have a 1TB Western Digital hard drive which is almost full and last time I tried to plug it into my laptop, I got a Windows dialog saying "this hard drive needs to be formatted". I did not panic because I have experienced things like this before and I know it's often solved by simply re-inserting the drive. Now however, whenever I plug it in and try to browse it in explorer by going to "computer", the explorer process crashes after a while. I simply close explorer since it takes ages trying to read the disk and nothing happens. After searching on the internet, the best thing to do would be a chkdsk. I tried it via properties in explorer (which also took a good 5 minutes to open up), locks up as well, after waiting a couple of minutes it says there's no access to the disk so a chkdsk is not possible... I want to make clear that I always use safe removal before pulling out the USB cable. Last time however, safe removal just would not work and when trying to shut down Windows, the logoff screen just would not disappear (I've waited at least 10 minutes or so) and I powered off the PC by force. This may be the cause of the problems but the disk was still recognised immediately after that. I really don't want to format this thing because it contains C: clones of 3 computers and a lot of other stuff that I don't want to re-copy. What would be the best course of action? I got chkdsk working via the command line. I used the /F and /R options. I already got a bunch of lines saying "file record segment X is unreadable" or whatever it is in English, my OS is Dutch. It looks bad... Will chdsk repair these errors? Update 2 I have a CentOS 6 VM and when trying to mount the disk there, it says "invalid filesystem type ntfs". The Disk utility warns me of imminent disk failure. There are over 800 bad secotrs. I tried e2fsck on it but it says the superblock is bad. Then I did dumpe2fs to find backup superblocks but the command fails with a message about a bad magick number in the superblock. How the hell does this happen to me while yesterday everything was perfectly fine... share|improve this question One of two things, the usb controller inside the enclosure is failing or the hard drive is, remove the hard drive from the enclosure and connect it using a different hard drive to usb adapter, see if you can read the data on the drive. –  Moab Oct 15 '12 at 15:00 @Moab would there be any other solution? –  MDeSchaepmeester Oct 15 '12 at 15:26 There are plenty of other things that could be wrong, but @Moab's is a fairly simple way to eliminate one big potential cause of trouble. –  Zac B Oct 15 '12 at 16:38 @MarioDeSchaepmeester always is, but I suggest the safest solutions first, besides what is the data worth..... –  Moab Oct 15 '12 at 18:51 2 Answers 2 up vote 3 down vote accepted Hold up. Seriously, stop for a moment. It sounds like you're running potentially destructive Linux-specific filesystem repair utilities (e.g. e2fsck) willy-nilly on a Windows hard drive. Even if there wasn't something wrong before, this could make it worse. Before you do anything else, I highly recommend taking the drive out of the enclosure, connecting it to a lightweight, natively-booted (no VM layer) Linux environment (Puppy is my favorite), and using dd or similar to take a full-image backup of everything readable on the drive--either to a file on a known-good drive (preferable), or straight across to a same- or larger-sized drive with the same interface (i.e. SATA). Get a frozen copy of the data somewhere you know it won't get further corrupted by using incompatible repair utilities on it/performing intensive operations on a failing drives. Once you've done that, put the image on a known good hard drive (but seriously; keep a copy of the image somewhere that you know it won't be altered. If this data is important, it's worth buying/loaning a big HD to store on). Load the known-good hard drive up, connected to a Windows environment, and try to run CHKDSK on it. It sounds like there is a lot of corruption, but I've often seen repairs work very well on bad-sector filled drives once the readable data was cloned to a working drive. share|improve this answer Thanks for your answer but I have concluded that the hard drive is unsavable. The data can still be read with a data recovery tool I'm running now. I just bought another HDD (the same to be precice) and I'm moving all readable data to it. The disk itself seems beyond repair as chkdsk etc did nothing. –  MDeSchaepmeester Oct 15 '12 at 17:39 Right click on computer and choose manage. Then on the left hand side of the manage window go to disk managment. For the external drive is it listed as a usable drive or does it list as unallocated? If a window comes up when you go to disk managment asking about MBR click cancel or you will begin formatting the drive. share|improve this answer It does come up as a usable drive. It's just not readable anymore somehow. –  MDeSchaepmeester Oct 15 '12 at 15:30 Try using the drive on another computer to see if you can replicate the error. –  PlanOfAction Oct 15 '12 at 15:53 I just tried to mount it in a CentOS VM. It says "disk failure imminent" and reports 892 bad sectors. WTF... –  MDeSchaepmeester Oct 15 '12 at 15:55 It sounds like something on the drive is corrupt. check disk should be able to fix the error without removing any data. I beleive that is your best bet. –  PlanOfAction Oct 15 '12 at 16:00 I have done a chkdsk to no avail –  MDeSchaepmeester Oct 15 '12 at 16:02 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14587
Take the 2-minute tour × There is a shared directory that is used by many different people for different purposes. Some of the files are text, xml, pdf, etc. The users are in different geographic locations as well. How should I go about organizing this directory? There are so many files it is difficult to find the one you need. These files are written by different processes, or sometimes pasted directly by the users. It is difficult training the users to do anything differently and adding subdirectories may not work as some files would fall into multiple groups. I wouldn't want the users copying the file twice, and they don't fully understand creating shortcuts to allow it to be in multiple directories. What are my options for organizing this mess? share|improve this question What do you mean by "a shared directory" - a network share? What operating system are you using? do you have administrator access to the server? –  John T Oct 6 '09 at 20:26 Yes, it's a network share on a Windows system. I do have admin access to the system. –  George Oct 6 '09 at 20:42 So... you want to organize a directory, without adding any type of organizational structure (like subdirectories)?? And you have untrainable users. The only alternative I'm aware of is to create an index and make it searchable. –  DaveParillo Oct 6 '09 at 21:01 1 Answer 1 This might be a need for search rather than organise. Assuming Vista or W7, the built in search (as in start, type a few letters) is pretty easy to use. I'm a fan of Everything, and it's customisable to only search designated folders and network locations. It may also be customisable (although I can't find how) to only report certain file types. Edit: Just noticed Dave Parillo's comment which says the same thing. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14588
Take the 2-minute tour × Title says all. (the one when you use the scrollwheel to see the old commands and results) I do not wish to clear it for sure as some data I have lost is within some old scrollback. share|improve this question I don't even have a Mac, but did you try the Page Up / Page Down buttons (represented by symbols with arrows on a page on Mac keyboards)? Or maybe it's an option hidden somewhere within the application menu on the top of the screen. Or the window's contextual menu (ctrl-click). With Macs, things are often where you least expect them. –  Ariane Jan 8 '13 at 3:13 1 Answer 1 up vote 1 down vote accepted Somewhere in memory or maybe the data files in ~/Library/Saved Application State/com.apple.Terminal.savedState/. (sudo opensnoop -n Terminal shows what files are accessed by Terminal.) I don't know any way to see the scrollback history of old tabs. This shows lines that are cleared with C-l but not ⌘K: osascript -e 'tell application "Terminal" to history of window 1' share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14589
Take the 2-minute tour × I am experiencing something strange in one of my laptops that I haven't seen before. The laptop is an ASUS K52JC, has an Nvidia Geforce 310M. I have it setup as a dual boot with both windows 7 and windows 8. It has worked fine for about 2 years. However, today windows suddenly crashed. After a reboot, the nvidia control panel complained that no nvidia graphics card was found. After running windows update, it now has a, fully functional, Intel HD graphics card. I first thought it was a software issue, but after rebooting to windows 7, exactly the same thing happened. Is it possible that the graphics card downgrades itself to an intel HD graphics when the nvidia card breaks down? Or is this some a software/driver problem? share|improve this question Interesting. The processor in your laptop does have an integrated gpu, but I am surprised that it could "take over" without support in the bios and hardware. Have you checked the bios to see if you can choose which graphics card to use? –  Paul Feb 11 '13 at 2:39 1 Answer 1 up vote 2 down vote accepted Its not possible for a graphics card to downgrade itself. You will probably find there is a GPU (graphics card) built into your CPU as well as an external one with the NVIDIA Chipset. Somehow it looks like you have managed to force the system to run off the internal card. Have you tried downloading and reinstalling the NVIDIA drivers for your card ? share|improve this answer My nvidia card has completely disappeared. There is no sign of it in the device manager. When I try to install nvidia drivers, it just tells me that no nvidia graphics card has been detected. –  Jeroen Feb 11 '13 at 6:46 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14590
Take the 2-minute tour × I have inherited a proprietary, distributed storage system that exposes its files through NFS. I need to move these files off the system. The trouble is that NFS links are reported as stale before I can list -- let along move -- even a modest fraction of the files. Current solution is to restart the NFS client every time a call to cp -aur * fails, but that is gets very inefficient as the number of files already copied grows. Any advice? share|improve this question migrated from stackoverflow.com Oct 19 '09 at 15:43 This question came from our site for professional and enthusiast programmers. 2 Answers 2 Use rsync instead. $ rsync -rav /path/to/nfsmount /path/to/local You can remove the 'v' if you don't care for it to be verbose and list the files. If the nfs mount goes stale before it finishes just run it again and rsync will only copy what it missed. share|improve this answer When I have been faced with this type of situation in the past, I have always copied things one directory at a time so that I don't have to restart at the beginning each time. Alternatively, I would start by making a shell script that repeatedly calls "cp" to copy one file at a time. Then, when it fails, I edit the shell script to remove the lines referring to files that have successfully been copied, and restart the script. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/14593
Trisetum spp. Family: Poaceae Project: Southwest Biodiversity Consortium Plants annual or perennial; sometimes rhizomatous, sometimes cespitose. Culms 5-150 cm, glabrous or pubescent, basal branching extravaginal. Sheaths open the entire length or fused at the base; auricles absent; ligules membranous, often erose to lacerate, sometimes ciliolate; blades rolled in the bud. Inflorescences terminal panicles, open and diffuse to dense and spikelike; branches antrorse-scabrous. Spikelets (2.4)4-9 mm, usually subsessile to pedicellate, rarely sessile, laterally compressed, with 2-5 florets; reduced florets (if present) distal; rachillas hairy, internodes evident, prolonged beyond the distal bisexual florets; disarticulation usually above the glumes and between the florets, subsequently below the glumes, in some species initially below the glumes. Glumes subequal or unequal, keels scabrous, apices usually acute and unawned, often apiculate; lower glumes 1(3)-veined; upper glumes 3(5)-veined, lateral veins less than 1/2 the glume length; calluses hairy; lemmas 3-7-veined, margins hyaline, unawned or awned from above the middle with a single awn, apices usually bifid, sometimes entire; paleas subequal, equal to, or longer than the lemmas, membranous, 2-veined, veins usually extended as bristlelike tips; lodicules 2, shallowly and usually slenderly lobed to fimbriate; anthers 3; ovaries glabrous or pubescent; styles 2. Caryopses elongate-fusiform, compressed, brown; embryos elliptic, to 1/3 the length of the caryopses; endosperm milky. x = 7. Name from the Latin tres, three, and seta, bristle, alluding to the three-awned appearance of the lemmas of the type species, Trisetum flavescens.        View Parent Taxon       Close window