id
stringlengths
50
55
text
stringlengths
54
694k
global_05_local_5_shard_00000035_processed.jsonl/23904
Take the 2-minute tour × Iv'e seen a couple of similiar questions but have not had one which answers mine. I have an export to CSV button which exports results from my database to CSV. I don't want to save the file, but just want to use headers to export the echoed content to a file which should then be opened in XLS (or similiar product). All works fine but Excel does not appear to seperate the values, but rather shows all rows in 1 row with the commas intact. I found a solution elsewhere where I should add "sep=,\r\n" to the first line to tell Excel to use commas as the dilimiter, which then makes it work great, but in other products it now shows the sep=, on the first line and continues with the remaining of the output. Here is the code i'm using: header("Expires: 0"); header("Cache-control: private"); header("Content-Description: File Transfer"); header("Content-Type: application/vnd.ms-excel"); header("Content-disposition: attachment; filename=export.csv"); echo "sep=,\r\n"; // This makes it work in excel but fails in other products such as openoffice echo "this,is,just,a,test\r\n"; share|improve this question The character separator that you need for MS Excel is locale-specific.... use ; for locales that use a , as a thousands separator; or , for other locales. Alteratively, create an Excel BIFF or OfficeOpenXML file, and this problem simply doesn't arise –  Mark Baker Jun 15 '13 at 12:10 I'm not sure about Excel, but OpenOffice makes me choose which delimiters I want to use for a table when I open it. You might want to use the default delimiter for Excel if you want best compatibility for both - that is - without having a selection for the user before they download the file. –  3ventic Jun 15 '13 at 12:14 1 Answer 1 up vote 0 down vote accepted As Mark Baker suggested, as the dilimeter is set by locale settings, I changed it to ; and it worked like a charm :) Thank you! share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23905
Take the 2-minute tour × I'm currently working on a batch import feature that sits on top of Hibernate and MySQL. My goal is to have Upsert functionality for several tables. I'm finding myself writing a lot of code to deal with seeing if the row exists by key and branching to right method. I was wondering if there might be a better way, i.e. something analogous to the tools that come with SQL-Server SSIS but for Hibernate and MySQL. What tools or elegant solutions have you used to handle bulk Upserts with hibernate and/or MySQL? share|improve this question 1 Answer 1 up vote 2 down vote accepted You might look into MySQL's ON DUPLICATE KEY UPDATE feature: share|improve this answer I didn't realize that feature existed for MySQL, that is huge! –  James Jan 14 '10 at 21:56 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23906
Take the 2-minute tour × I want to rotate my UIImageView and set the size according to the aspect ratio. But I have some problems with that. First I paste here my code, then I explain the problem. imageView.size = CGSizeMake(myWidth, myHeight); [imageView setContentMode:UIViewContentModeCenter]; So these two lines set the size and the contentMode of my imageView. When I do this the image appears correctly. So when the device is rotated I catch the rotation notification and if ([self isLandscape]) { CGFloat aspect = myHeight / myWidth; imageView.size = CGSizeMake(myWidth/aspect, myWidth); [self rotateView:imageView withDegree:degree]; imageView.origin = CGPointMake(x, y); } else { [self rotateView:imageView withDegree:degree]; imageView.origin = CGPointMake(x, y); imageView.size = CGSizeMake(myWidth, myHeight); So then the rotation is done. But you can see that I am also do a resizing. The problem is that my imageView has a minimum size which cannot be overridden. But I figured out that if I change the contentMode property of my imageView from UIViewContentModeCenter to UIViewContentModeScaleAspectFit then it will work good but the size is smaller than what I expect. Why is that? :( How can I solve this? Please if you have any help! share|improve this question 1 Answer 1 up vote 1 down vote accepted ScaleAspectFit will only scale up the content so that it is all visible and no clipping occurs. If you want your content to fill the view and possibly have some clipping, you should use UIViewContentModeScaleAspectFill instead. However, if all you want to do is enforce a minimum size for each dimension, you could use the MAX macro instead. CGSize mySize = CGSizeMake(myWidth, myHeight); mySize.x = MAX(mySize.x, myXMin); mySize.y = MAX(mySize.y, myYMin); imageView.size = mySize; Also, just checking that you really meant for landscape size to be (width*width/height, width) and not just (height, width). share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23907
Take the 2-minute tour × When a continue statement is used inside a loop in C code, GCC creates a new label with a nop instruction right before the end of the loop block and jumps to it, rather than jump to the end of the loop block itself. For instance, the following C code if (i < 10) continue; puts("This shouldn't be printed.\n"); produces the following ASM equivalent (using gcc -S ): movl $0, 28(%esp) jmp L2 movl $LC0, (%esp) call _puts cmpl $9, 28(%esp) jle L7 movl $LC1, (%esp) call _puts jmp L4 incl 28(%esp) cmpl $9, 28(%esp) jle L5 (The if (i<10) part is inserted so that the compiler doesn't "optimize" the section by removing whatever follows the continue statement) My question is, why not jump directly to L4 instead? IMO we could just as well jump to L4, am I missing something? share|improve this question 2 Answers 2 up vote 4 down vote accepted What you're describing is an optimization. Surely enough, if you tell gcc to optimize (-O1 is enough), it'll do exactly what you describe. share|improve this answer Thanks for the quick reply! -O1 did the trick, though the program flow after the optimization seems somewhat less intuitive now -- unless I'm mistaken, the loop seems partially unrolled now. I'm curious now as to whether there is any incentive to creating the label with the nop instruction. Is there any situation where this approach would prevent something that would happen if one was to jump directly to L4? –  susmits Mar 1 '10 at 10:45 For debugging purposes, you could set a breakpoint in the L7 label - it'd be hard to break on the continue case if it was not there. –  nos Mar 1 '10 at 10:56 @susmits: With -O1 the assembly is less verbose, but the loop isn't unrolled (with -O3 you can see the unrolled version - notice it doesn't even include the i<10 check or the 2nd puts()). Generally, creating the label and not performing such optimizations helps a lot in debugging. –  Michael Foukarakis Mar 1 '10 at 11:16 My guess is that it's a placeholder for some kind of skipped-code fixup sequence. Perhaps the nop is sometimes replaced with instructions to store registers to the stack or some such. But to get more evidence for this, it would help to find an example where the nop is replaced with something else. share|improve this answer I think this is probably it. In this case there are so few variables involved that the set of variables in registers at the "continue" is the same as the set of variables in registers after the second puts. If that wasn't the case, then after L7 would be the code to sync them. If there were multiple "continues" in the loop, then each would still have to sync itself to the correct L7 state before jumping, of course. –  Steve Jessop Mar 1 '10 at 10:50 On the other hand, placing such code in a block associated with a continue statement is extremely inefficient, so I'd guess it's a pretty rare sight anyway. –  Michael Foukarakis Mar 1 '10 at 11:19 Bear in mind that susmits has implicitly requested inefficient code (by not specifying -O) ;-) –  Steve Jessop Mar 1 '10 at 11:37 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23908
Take the 2-minute tour × I'm not sure this is possible, but is there a syntax to be used in CSS when you want to style an element based on the combination of classes applied to it? I understand that I can check an element with jQuery or something and change it's style based on the classes it has, but is there a pure CSS way to do this? For example, if I have a class for bold and green: .bold_green { color:green; font-weight:bold; } And a class for bold and blue: .bold_blue { color:blue; font-weight:bold. } Now, say I am using jQuery to add and remove classes dynamically and want any element that has both classes to turn italic pink. Something like: .bold_green AND .bold_blue { color:pink; font-style:italic; } Or, if I want to style an element that has aclass, and is a descendant of another element that has another class? Something like: .bold_green HAS_CHILD .bold_blue { color:black; background-color:yellow; } Thanks for all the answers. These are pretty much what I thought (just treating the classes as regular selectors), but they don't seem to be working for me. I will have to check my code and make sure they aren't being overridden somehow... share|improve this question Didn't you mean to use color: blue in the bold_blue class? –  BalusC Mar 16 '10 at 0:32 Yep =o) |||||||| –  Eli Mar 16 '10 at 3:48 as a sidenote, if you have classes like bold_green, then there's probably something wrong with the way you're designing. <insert semantics spiel> –  Mark Mar 16 '10 at 3:51 Dude. It's an example. –  Eli Mar 16 '10 at 22:53 3 Answers 3 up vote 34 down vote accepted Or in CSS: .bold_green.bold_blue { color: pink; } Notice there's no space between the selectors. share|improve this answer There are IE compatibility issues though, no? –  Richard JP Le Guen Mar 16 '10 at 0:33 Yes, IE6 will read that css as .bold_blue { color: pink; }. You should use a variation of the jQuery Paul provided since jQuery can select it properly, and add a new class with appropriate css: .something-else { color: pink; } I also hope those aren't real class names. –  Isley Aardvark Mar 16 '10 at 0:48 Ideally, you add the CSS as recommended here first, and then add the jQuery mentioned inside a conditional comment for IE6. –  Eric M Suzanne Mar 16 '10 at 7:46 Can anyone point to this in the CSS spec? –  aaaidan Oct 31 '12 at 3:55 Hrm, mentioned here ... w3.org/TR/CSS2/selector.html#class-html ... 'To match a subset of "class" values, each value must be preceded by a ".".' –  aaaidan Oct 31 '12 at 4:02 You don't need anything special, just .bold_green.bold_blue { color:pink; font-style:italic; } share|improve this answer Paul and Voyager are correct for the multiple classes case. For the "HAS CHILD" case you would use: .bold_green .bold_blue { ... } /* note the ' ' (called the descendant selector) */ Which will style any bold_blue elements inside a bold_green element. Or if you wanted a DIRECT child: .bold_green > .bold_blue { ... } /* this child selector does not work in IE6 */ Which will style only bold_blue elements which have an immediate parent bold_green. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23909
Take the 2-minute tour × One of our client has an old winform application that contains forms with a lot of controls on them. Some of those controls have a deep hierarchy and that make it to hard to select them in the designer. I would need to understand this hierarchy to make modification and correct some bugs, is there a tools, plugin or something to be able to clearly see this hierarchy ? Something like in the aspx source when you have a breadcrumb of where you are in the HTML hierarchy (HTML > Body > div > etc ...) or something more visual maybe ? Any ideas ? PS : we use Visual Studio 2008, .NET 2.0 share|improve this question 3 Answers 3 up vote 66 down vote accepted You need to use the Document Outline View > Other Windows > Document Outline Ctl + ALT + T share|improve this answer Oh thank you, didn't know about this window ! exactly what I need ! –  Cédric V Jun 9 '10 at 12:21 Thanks a lot, this looks very helpful –  Quagmire Dec 14 '11 at 12:29 Click on View > Other Windows > Document Outline in Visual Studio. That should show the control hierarchy. share|improve this answer Visual Style Builder for UI Customization - Download this tool and use it... Another tool is present which is "Control Spy Tool for Easier Development" You will find the solution easily.. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23910
Take the 2-minute tour × I am getting the 'dreaded' error The entitlements specified in your application’s Code Signing Entitlements file do not match those specified in your provisioning profile. (0xE8008016). when trying to deploy my first app to an un-jailbroken device on iOS 4.2.6 (Verizon). The thing is, I do not have a Entitlements file in my project, as I am not distributing it at all, only putting it on one device. I have gone through all the hoops and loops apple puts you through (certificate, device, provisioning) down to the letter, and I cannot figure out what is going wrong. Can anyone please help me with this problem? share|improve this question would suggest you to go through the following post. stackoverflow.com/questions/1410080/… discussions.apple.com/thread.jspa?threadID=2162558 –  Jhaliya Mar 9 '11 at 3:19 That's strange, I have a downvote. Would the person who did this please explain? –  Richard J. Ross III Nov 4 '12 at 0:03 29 Answers 29 Just came across this issue myself, the problem was that I had a Entitlements.plist file in the project as part of an ad hoc distribution, and its get-task-allow (ie. 'can be debugged') property was set to NO - setting this to YES fixed the issue and allowed the app to run from Xcode4 on the device in development. Naturally need to set it back to NO for ad hoc distributions, but just thought I'd mention it in case anyone else comes across the same problem. share|improve this answer Thanks - this finally fixed my problem. –  EasyCoder Aug 1 '11 at 19:24 Thank you! That was killing me. –  alan Nov 1 '11 at 6:59 "get-task-allow = NO" made my app see iCloud, when distributed as AdHoc ipa. –  Tertium Sep 26 '12 at 18:53 By the way, check that you specify correct sign identity exactly in Target -> Build Settings, not in Project. Target overrides the Project. I've forgot about this and got 0xE8008016 error message. –  Tertium Sep 26 '12 at 18:59 One more thing, if your app uses 'iCloud Key-Value Store' in the entitlements, you need to remove this key for the Debug version. Otherwise the app won't run on your device and will continue to give this error even if you have 'get-task-allow' set to YES. –  strangetimes Apr 29 at 13:43 I had this issue with Xcode 4.2.1. For me it was nothing to do with Entitlements file, or Ad-hoc... I was returning to and old project, and I'd forgotten to add my new iPhone to the provision. Silly mistake, but also a silly corresponding error message... :-/ share|improve this answer Silly mistake that apparently we both did. –  Patrick Bassut Nov 23 '13 at 18:47 I wish I could +2, what a ridiculous error message for this problem. I'd have searched for hours were it not for your post. –  DelightedD0D Apr 14 '14 at 9:03 Thanks for pointing it, i too did this silly mistake. finally resolved. –  Gaurav aka sparsh Apr 18 at 18:07 I've had this issue with the iCloud entitlements. My problem was that I forgot to enable iCloud for my App ID in the Provisioning Portal. After enabling iCloud for your App ID, you will need to recreate the provisioning profiles. share|improve this answer Yip, this worked for me. Cheers man. –  imnk Oct 25 '11 at 12:14 I had this error happen to me again. I needed to add my new device to the development provisioning profile, then refresh the list in Xcode. –  adjwilli Feb 16 '12 at 18:27 Had the same issue. Which is odd, because this app was enabled and working for ad-hoc deployment before. –  raeldor Jan 14 at 17:43 What worked for me was to completely delete the entitlements file, from the groups list, and from the Build Settings in both Project and Target. Then I recreated the entitlements from the Summary tab in the target, and it loaded fine without any error messages. share|improve this answer As stated above, Entitlement value must be deleted manually in Build Settings also –  petershine Jun 25 '12 at 2:51 deleting the entitlements file and adding it again worked for me - i did a clean too –  Jasper Pol Jul 19 '12 at 11:27 This was my key here! I checked both the Project and Target Build Settings. In the Code Signing section there is a setting "Code Signing Entitlements" - I expanded, highlighted both the debug and release lines, and pressed Delete key. This then allowed my app to build without any errors. However, it still won't debug - it immediately exits with a message in the console, I will have to look it up. –  Jay Imerman Jul 24 '12 at 20:04 This worked as well when trying to run the HealthKit "fit" app for iOS8 - there was an additional identifier string in the entitlements file. Removing it allowed the project to run after following other steps mentioned in this thread –  Alex Stone Jul 17 '14 at 18:38 This fixed my issue with iCloud. Seems there were a couple of extra settings in the Entitlements file which didn't need to be there. Deleting them and all and having the General tab rebuild it worked. –  AndyDunn Aug 31 '14 at 17:58 None of the many answers fixed the 0xE8008016 Error for me. But when I chose "Automatic Device Provisioning" in Xcode 4 > Organizer > Devices > Provisioning Profiles, it finally worked. share|improve this answer That rocks! Worked for me too. I think it was a combination of all the above, since the app was originally developed with XCode 3, then brought up to 4.2, I removed the Entitlements.plist file from the project, deleted the code signing entitlements entry in the Build Settings/Code Signing section, then set the provisioning profile to automatic. That last one did it. –  Jay Imerman Jul 24 '12 at 20:11 This was my problem too, except it was automatically selecting the wrong provisioning profile, and by manually selecting the correct one the issue is fixed. –  Abhi Beckert Aug 10 '12 at 4:27 That did it for me. I am not sure how a few iOS Developer Team provisioning profiles got removed but clicking refresh in the Provisioning Profiles page you refer to resolved this error for me. –  sean808080 Sep 12 '13 at 15:56 In my case it was a stupid mistake. I incorrectly set the "Run" scheme to use the "Distribution" build configuration instead of the "Debug" or "Release" one. Stupid mistake, but it took a while to debug it, so I'm going to add my answer to improve the knowledge base inside stack overflow! share|improve this answer Just putting in my 5 cents here. For me none of the above worked, so I was forced to stress down and actually look at every part of the process with fresh eyes. In rushing this I forgot that I was trying to install my app on a totally new device. So my error was that I hadn't updated my provisioning profile by ticking off my new device int the "Devices" section of the provisioning profile setup in the Provisioning Portal. Apparently not including your device in the provisioning profile also generates this error message. share|improve this answer Agree - if you don't have your provisioning profile right, you can get this error. –  Matt Feb 19 '13 at 7:37 @PinkFloydRocks you deserve more upvotes :) thanks –  death7eater Aug 22 '13 at 15:47 Delete your provisioning profiles, do a 'Clean All', make sure that your provisioning setting are correct, redownload, and try to run again. share|improve this answer nope :( didn't work –  Richard J. Ross III Mar 9 '11 at 3:11 What version of Xcode are you using? If it's 4.0, there have been problems with this. You may have to restart Xcode or even restart your Mac. Make sure that the provisioning settings are right in both the project and target. The target setting take precedence over the Project though. –  W Dyson Mar 9 '11 at 3:20 I am using Xcode 3.2.6 –  Richard J. Ross III Mar 9 '11 at 12:51 I think its a problem with the device, its an iPhone 4 from Verizon, and with the same provisioning profile, I can deploy an app to my iPad.. has anyone else had this problem with an iPhone 4 from Verizon? –  Richard J. Ross III Mar 9 '11 at 13:18 Are you using an old provisioning profile? You have to add the Verizon iPhone as a device in the Provisioning Portal and then update the development profile, re-download, and reinstall the new profile. If this doesn't work, you're going to have to provide more information. –  W Dyson Mar 9 '11 at 13:22 Deleting the xcuserdata folder solved my issue. More on that here: http://stackoverflow.com/a/9968884/300694 share|improve this answer Worked in my case, thank you. –  gotnull Oct 28 '14 at 4:29 1. Open 'iOS Provisioning Portal' in Safari. 2. Tap 'Devices' in the sidebar. 3. Register your device's UDID 4. Tap 'Provisioning Profiles' 5. Edit your apps profile. 6. Select the device your have just added. 7. Download the .mobileprovision file. 8. Install it. 9. Build again. share|improve this answer I ran into this problem today and I was pulling my hair out trying to figure it out. Like many people here, it would work if I removed the iCloud options in my entitlement file. When I would go to debug the app with the iCloud options enabled then I would get the 0xe8008016 error. This was right after revoking and regenerating new certificates. So what solved it for me was to turn on iCloud support for the automatically generated Xcode team profile. Log onto the online provisioning tool, go to App IDs, click on Xcode iOS Wildcard App ID, click on edit, enable iCloud by checking the checkbox, and finally clicking Done. Refresh your profiles in Xcode and then it will start to work. This makes some sense - when you're debugging it defaults to the team profile and the team profile needs to have iCloud turned on. share|improve this answer YES! That was my problem and enabling iCloud on the All Apps ID did the trick. Thanks so much –  Guy Aug 19 '13 at 8:50 Keep your entitlements file in Target> Build Settings > Code Signing > Code Signing Entitlements. Go to Target > Capabilities. Toggle On/Off or Off/On one of the capabilities. share|improve this answer This worked for me. but again i have to select the provisioning profile in build setting page. –  Rinku Jan 15 at 9:41 up vote 1 down vote accepted Upgrading to XCode 4 fixed the issue. share|improve this answer In my case, it looks like Xcode (secretly) reset the Scheme. I found that the build configuration for Archive was set to Release instead of distribution one, and after I changed it to the correct one, it worked. I think it is better to check the Schemes as well as the build settings. share|improve this answer I had old project and same problem and I solved . 1.Go to summary 2.Summary have keychain groups and delete keychanin groups's object. I hope it's will work for you . Regards. share|improve this answer Happened to me when I was trying to use an app store distribution provisioning profile for local test by mistake. When I used the proper development profile it worked just fine. Maybe this helps somebody too. share|improve this answer what can I do if I want to test the profile of the app that was uploaded to the App Store? Is there a way to do so? –  roi.holtzman Nov 14 '14 at 15:51 i'm using xcode 6 and encounter this issue for one particular iphone 4 finally , i go to device => provision profile => and then add the profile manually and problem is fixed . share|improve this answer For me in Xcode 5.1 I was getting The entitlements specified in your application’s Code Signing Entitlements file do not match those specified in your provisioning profile. when trying to test the app on my device. Device Development Certificate has to expire Feb 2015. Issue was resolved: Selected Target->Capabilities, under GameCenter, here I was getting error on GameCenter entitlement as it was not added to project, although first version of application was released via same XCode 5.1 but there were no errors like this before. Below, a button was given with title Fix Issue. When clicked it added the GameCenter entitlement and issue was resolved. After wards the screen looks like: enter image description here For me, there was nothing to do with certificate. App now runs successfully on the device. share|improve this answer If you didn't change anything related to certificates (didn't replace or update them) just do a Product -> Clean. It helped me several times. (Xcode 6.2) share|improve this answer If you are trying to activate iCloud syncing, you will need to enable iCloud for the AppID that is used to create the development provisioning profile (which Xcode does automatically). You'll also need to enable this for distribution profiles as well. The tricky part is that when you refresh profiles in Xcode, this does not trigger a renewal of the profiles; they are simply re-downloaded. So in your iOS Provisioning Portal under Provisioning/Development, you'll need to check the profile that is labeled (Managed by Xcode) and delete it (Remove Selected button). Do this for ALL profiles, development & distribution, that you need to regenerate. Now, in Xcode in the Organizer, delete provisioning profiles that you are about to replace. Now to get new ones. If you develop for more than one team and only want to refresh a particular one, select the appropriate Team in the left pane under TEAMS, otherwise select Provisioning Profiles under LIBRARY, then select Refresh. Finally, remove any old provisioning profiles on your device that could conflict with the new ones since profiles are never deleted automatically; newer profiles are simply added to the list. share|improve this answer My problem was that the scheme was having Archive point to Release, and Release in the Build Settings had the Code Signing Identity set to the one of the automatic profile selectors. Well the "automatic" did the wrong thing (and in fact changed what it pointed to since two days ago), and was pointing to a different profile than the one I was selecting when creating the ad-hoc release. Pointing the identity to an explicit setting and using that same profile when distributing fixed the problem. share|improve this answer Check your entitlements against your app bundle id. It is probable it is not the same. The way this still do not work is when I export for testing in my device but in Release mode. That work to me. share|improve this answer I had the same problem as 'Snips' above - I forgot to add my phone to an updated dev provisioning profile! Just go to the provisioning portal, add your phone & then download the new profile. And agreed - the message you get isn't very helpful! share|improve this answer I fixed this by generating my provisioning profile again (and again). share|improve this answer This worked for me... 1. I deleted the Entitlements file from the target. 2. Deleted the app off all my devices 3. Cleaned the build in Xcode 4. *optional delete the provisioning profile and re-add it Hope it works for you guys too :) share|improve this answer The issue for me was trying to sign the application with the app store distribution certificate. Switching the cert to the Xcode generated Team provisioning profile fixed the issue. share|improve this answer I had the same problem in my app, after a few month this specific app worked fine. The problem was that the Capabilities configured in my Xcode project (under Targets -> {ProjectName} -> Capabilities) were not the same as the Capabilities configured in the provisioning profile (you can check that in the Apple member centre under Identifier -> App Ids -> {your app ID}. In the member centre I saw that Game Center is enabled and so in my project I also enabled Game Center. Then the app was able to launch. I don't know how it worked until now. That's still a mystery :) share|improve this answer I now realised that push notifications does not work anymore. I removed the Game centre capabilities in Xcode. The app now runs, but the push notifications are not coming anymore. Anyone knows why? –  roi.holtzman Jan 23 at 18:02 These steps solved my problem: 1. Go into organizer 2. Devices 3. select your device 4. Delete the particular profile. 5. Run again share|improve this answer which particular profile you said to delete ? It might work for you but not for others consider adding more info –  vishal Mar 23 '14 at 10:38 If you have the certificate for Apple IOS Developer, there is no need to set value for key:"Code Signing Entitlements". Build Settings -> Code Signing Entitlements -> delete any value there. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23911
Take the 2-minute tour × I'm using amazon rds with a heroku app and would like to automate daily snapshots. My intention is to schedule a rake task that will perform the snapshot. How can I perform an amazon rds snapshot from ruby? share|improve this question 1 Answer 1 up vote 1 down vote accepted No dice yet but this is pretty close: # Gemfile source :rubygems gem 'amazon-ec2' gem 'rake' # Rakefile require 'rubygems' require 'rake' require 'AWS' desc 'create snapshot' task 'create_snapshot' do @rds = AWS::RDS::Base.new(:access_key_id => ACCESS_KEY_ID, :secret_access_key => SECRET_ACCESS_KEY) @rds.create_db_snapshot :db_snapshot_identifier => 'snapshot name', :db_instance_identifier => 'db name' Only problem is I get the error: Unsupported digest algorithm (sha256). Any ideas? share|improve this answer Your solution worked perfectly in Rails 3 rake task. I didn't get any errors. –  Slobodan Kovacevic Aug 16 '11 at 10:42 Yes it works for with my current setup, rails 3, ruby 1.9 –  opsb Aug 31 '12 at 9:08 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23912
Take the 2-minute tour × I had this task to read a file, store each character in a dict as key and increment value for each found key, this led to code like this: chrDict = {} with open("gibrish.txt", 'r') as file: for char in file.read(): if char not in chrDict: chrDict[char] = 1 chrDict[char] += 1 So this works ok but to me, atleast in Python, this looks really ugly. I tried different ways of using comprehension. Is there a way to do this with comprehension? I tried using locals() during creation, but that seemed to be really slow, plus if I've understood anything correctly locals would include everything in the scope in which the comprehension was launched, making things harder. share|improve this question 2 Answers 2 up vote 7 down vote accepted In Python 2.7, you can use Counter: from collections import Counter chrDict = Counter(f.read()) share|improve this answer Here's Counter backported to python 2.5: code.activestate.com/recipes/576611-counter-class –  Lauritz V. Thaulow Mar 17 '11 at 9:40 Counter seems like a really nice option. Thank you! –  Guu Mar 17 '11 at 9:59 Use defaultdict: from collections import defaultdict chr_dict = defaultdict(int) for char in file.read(): chr_dict[char] += 1 If you really want to use list comprehensions, you can use this inefficient variant: text = open("gibrish.txt", "r").read() chr_dict = dict((x, text.count(x)) for x in set(text)) share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23913
Take the 2-minute tour × It is my first day to perl, and I find this warning very confusing. Parentheses missing around "my" list at ./grep.pl line 10. It seems open FILE, $file; works fine. What is wrong with open my $fh, $file; use strict; use warnings; sub grep_all { my $pattern = shift; while (my $file = shift) { open my $fh, $file; while (my $line = <$fh>) { if ($line =~ m/$pattern/) { print $line; grep_all @ARGV; share|improve this question Always, always, always check whether open succeeds! –  Greg Bacon Apr 8 '11 at 14:55 use three argument open –  Nikhil Jain Apr 8 '11 at 15:01 6 Answers 6 up vote 29 down vote accepted I've been hacking Perl for more than 15 years, and I admit this warning caused me to scratch my head for a minute because almost every example call to open in the standard Perl documentation and nearly every Perl tutorial in existence contains open with no parentheses, just like you wrote it. You wrote this question on your first day with Perl, but you're already enabling the strict and warnings pragmata! This is an excellent start. False starts An easy but dumb way to “fix” the warning is to disable all warnings. This would be a terrible move! Warnings are meant to help you. Naïve ways to squelch the warning are abandoning the lexical filehandle in favor of the bad old way with a bareword open FH, $file; using explicit parentheses with open open(my $fh, $file); making my's parentheses explicit open my($fh), $file; using circumscribed parentheses (open my $fh, $file); or using 3-argument open. open my $fh, "<", $file; I recommend against using any of these by themselves because they all have a severe omission in common. The best approach In general, the best way to silence this warning about missing parentheses involves adding no parentheses! Always check whether open succeeds, e.g., open my $fh, $file or die "$0: open $file: $!"; To disable Perl's magic open and treat $file as the literal name of a file—important, for example, when dealing with untrusted user input—use open my $fh, "<", $file or die "$0: open $file: $!"; Yes, both shut up the warning, but the much more important benefit is your program handles inevitable errors rather than ignoring them and charging ahead anyway. Read on to understand why you got the warning, helpful hints about your next Perl program, a bit of Perl philosophy, and recommended improvements to your code. Finally, you'll see that your program doesn't require an explicit call to open! Write helpful error messages Notice the important components of the error message passed to die: 1. the program that complained ($0) 2. what it tried to do ("open $file") 3. why it failed ($!) These special variables are documented in perlvar. Develop the habit now of including these important bits in every error message that you'll see—although not necessarily those that users will see. Having all of this important information will save debugging time in the future. Always check whether open succeeds! Once again, always check whether open and other system calls succeed! Otherwise, you end up with strange errors: $ ./mygrep pattern no-such-file Parentheses missing around "my" list at ./mygrep line 10. readline() on closed filehandle $fh at ./mygrep line 11. Explanation of Perl's warnings Perl's warnings have further explanation in the perldiag documentation, and enabling the diagnostics pragma will look up explanations of any warning that perl emits. With your code, the output is $ perl -Mdiagnostics ./mygrep pattern no-such-file Parentheses missing around "my" list at ./mygrep line 10 (#1) (W parenthesis) You said something like my $foo, $bar = @_; when you meant my ($foo, $bar) = @_; Remember that my, our, local and state bind tighter than comma. readline() on closed filehandle $fh at ./mygrep line 11 (#2) (W closed) The filehandle you're reading from got itself closed sometime before now. Check your control flow. The -Mdiagnostics command-line option is equivalent to use diagnostics; in your code, but running it as above temporarily enables diagnostic explanations without having to modify your code itself. Warning #2 is because no-such-file does not exist, but your code unconditionally reads from $fh. It's puzzling that you see warning #1 at all! This is the first time I recall ever seeing it in association with a call to open. The 5.10.1 documentation has 52 example uses of open involving lexical filehandles, but only two of them have parentheses with my. It gets curiouser and curiouser: $ perl -we 'open my $fh, $file' Name "main::file" used only once: possible typo at -e line 1. Use of uninitialized value $file in open at -e line 1. Parentheses are missing, so where's the warning?! Adding one little semicolon, however, does warn about missing parentheses: $ perl -we 'open my $fh, $file;' Parentheses missing around "my" list at -e line 1. Let's look in perl's source to see where the warning comes from. $ grep -rl 'Parentheses missing' . Perl_localize in op.c—which handles my, our, state, and local—contains the following snippet: /* some heuristics to detect a potential error */ while (*s && (strchr(", \t\n", *s))) while (1) { if (*s && strchr("@$%*", *s) && *++s && (isALNUM(*s) || UTF8_IS_CONTINUED(*s))) { sigil = TRUE; while (*s && (isALNUM(*s) || UTF8_IS_CONTINUED(*s))) if (sigil && (*s == ';' || *s == '=')) { Perl_warner(aTHX_ packWARN(WARN_PARENTHESIS), "Parentheses missing around \"%s\" list", ? (PL_parser->in_my == KEY_our ? "our" : PL_parser->in_my == KEY_state ? "state" : "my") : "local"); Notice the comment on the first line. In My Life With Spam, Mark Dominus wrote, “Of course, this is a heuristic, which is a fancy way of saying that it doesn't work.” The heuristic in this case doesn't work either and produces a confusing warning. The conditional explains why perl -we 'open my $fh, $file' doesn't warn but does with a trailing semicolon. Watch what happens for similar but nonsensical code: $ perl -we 'open my $fh, $file =' syntax error at -e line 1, at EOF Execution of -e aborted due to compilation errors. We get the warning! The 3-argument open case doesn't warn because "<" prevents sigil from becoming true, and the or die ... modifier passes muster, in obtuse terms, because the or token begins with a character other than ; or =. The intent of the warning appears to be providing a helpful hint for how to fix code that will otherwise produce surprising results, e.g., $ perl -lwe 'my $foo, $bar = qw/ baz quux /; print $foo, $bar' Use of uninitialized value $foo in print at -e line 1. Here, the warning does make sense, but the case you found is a leak in the heuristic. Less is more Perl has syntactic sugar that makes writing Unix-style filters easy, as explained in the perlop documentation. while (<>) { ... # code for each line is equivalent to the following Perl-like pseudo code: while ($ARGV = shift) { open(ARGV, $ARGV); while (<ARGV>) { ... # code for each line Using the null filehandle (also known as the diamond operator) makes your code behave like the Unix grep utility. • filter each line of each file named on the command line, or • filter each line of the standard input when given only a pattern The diamond operator also handles at least one corner case that your code doesn't. Note below that bar is present in the input but doesn't appear in the output. $ cat 0 $ ./mygrep bar 0 Keep reading to see how the diamond operator improves readability, economy of expression, and correctness! Recommended improvements to your code #! /usr/bin/env perl use strict; use warnings; die "Usage: $0 pattern [file ..]\n" unless @ARGV >= 1; my $pattern = shift; my $compiled = eval { qr/$pattern/ }; die "$0: bad pattern ($pattern):\n$@" unless $compiled; while (<>) { print if /$compiled/; Rather than hardcoding the path to perl, use env to respect the user's PATH. Rather than blindly assuming the user provided at least a pattern on the command line, check that it's present or give a helpful usage guide otherwise. Because your pattern lives in a variable, it might change. This is hardly profound, but that means the pattern may need to be recompiled each time your code evaluates /$pattern/, i.e., for each line of input. Using qr// avoids this waste and also provides an opportunity to check that the pattern the user supplied on the command line is a valid regex. $ ./mygrep ?foo ./mygrep: bad pattern (?foo): m/? <-- HERE foo/ at ./mygrep line 10. The main loop is both idiomatic and compact. The $_ special variable is the default argument for many of Perl's operators, and judicious use helps to emphasize the what rather than the how of the implementation's machinery. I hope these suggestions help! share|improve this answer Greg, I certainly always use parens in my open examples in my tutorials. I do this because precedence is too hard for me to remember. I always get screwed up with or and // and stuff, so I just use the C conjunctions that I actually understand. And therefore I always use parens. Makes it easier to read, too. –  tchrist Apr 8 '11 at 19:23 Can you explain the reason for unshifting "-" in @ARGV in the explanation of <>? I am a Perl beginner. Thanks! –  Alby Apr 18 '12 at 21:13 @Alby Note that it's conditional and happens only when <code>@ARGV</code> is empty. Perl's magic open treats - as a synonym for the standard input, from which the empty filehandle or "diamond operator" reads when no arguments are on the command line. –  Greg Bacon Apr 18 '12 at 23:11 Thank you. That explanation clears up my initial confusion of "why put in something that you will take out in the next line?" :) –  Alby Apr 19 '12 at 4:16 This is an excellent complete answer! –  tatlar Feb 5 '13 at 16:43 my is for declaring a variable or a list of them. It is a common mistake in Perl to write my $var1, $var2, $var3; to declare all of them. The warning should advice you to use the correct form: my ($var1, $var2, $var3); In your example the code does exactly what you want (you didn't get any errors or wrong results, did you?), but to make it absolutely clear you can write open my ($fh), $file; Although one could argue that putting my in the middle of line is like hiding it. Maybe more readable: my $fh; open $fh, $file; share|improve this answer I see. Thank you ! –  zjk Apr 8 '11 at 15:01 +1 for putting my on its own line...it's easier to notice that way. –  Alex Feinman Apr 8 '11 at 16:45 To get a more verbose explanation of warning messages, use perldoc diagnostics. For example, use strict; use warnings; use diagnostics; my $fh, $file; Will generate the following useful explanation: Parentheses missing around "my" list (W parenthesis) You said something like my $foo, $bar = @_; when you meant my ($foo, $bar) = @_; You can also look at the documentation for my at your command prompt: perldoc -f my share|improve this answer The real problem is that omitting around function calls is rather fragile. Expect weird errors if you do. $ perl -we'$file="abc"; open(my $fh, $file);' $ perl -we'$file="abc"; open my $fh, $file;' share|improve this answer It is. I strongly recommend using parens for all function calls. –  tchrist Apr 8 '11 at 19:24 It seems to me that your code is longer than it need be - you should employ more laziness. #!/usr/bin/env perl my $pattern = shift; while (<>) print if m/$pattern/; If you decide you need line numbers, or file names (perhaps if there's more than one file), or some other more complicated printing, then you may want to write things out. But I believe the code I show is equivalent to the code you show. Normally, I'd add use strict; and use warnings; to the code. However, in this example, the only named variable is defined with my (so strict won't help), and there's nothing for it to warn about. However, if you are learning Perl, or if the program is much more complex than this, I would add the use lines, even after about 20 years of using Perl. share|improve this answer You may be doing a school or learning project. But when I want to do something like this is perl, I will usually use this more concise version of your program. perl -ne 'print if /your_regex/' your_file_list For more info try perldoc perlrun and look for the explanations of -n and -p. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23914
Take the 2-minute tour × How to post a message on the wall of facebook or add comment to the thread using a graph api.I want a url of that. like for adding a message to wall https://graph.facebook.com/profile_id/feed?access_token=generated token&message=hi But it not working ,it not get added to my wall. share|improve this question 2 Answers 2 You need to add &method=post to your request URL. Also, you must have the `publish_stream extended permission for your application. share|improve this answer Thank you.But I want to asked u that how to give publish_stream permission?If i trying to post on own wall,still it is saying that user is not authorised the application to do this action.I don't have any app. –  user744957 May 12 '11 at 5:16 https://graph.facebook.com/user_id/feed?method=post&message=hi&access_token=generatedtoken.. will work instead of profile id give the user id Hope this will work share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23915
Take the 2-minute tour × I am working on a library that uses Maven. The current pom.xml file has a lot of stuff related to tests, reports, etc. I now want to publish a release of this library to a private Maven repository. I need to supply a much simpler pom.xml file to the repository. How is this managed? Can you generate the simpler pom file from the one used in development? share|improve this question What do you mean with "I need to supply a much simpler pom.xml file to the repository"? Whose restriction is this? –  Puce May 18 '11 at 10:32 maven.apache.org/guides/mini/… Check at the bottom of the basic sample. <!-- NOT ALLOWED: (see FAQ) <repositories></repositories> <pluginRepositories></pluginRepositories> --> –  Iker Jimenez May 18 '11 at 10:41 2 Answers 2 up vote 2 down vote accepted • Set up your private Maven repository to mirror/ proxy all required repositories and pluginRepositories • Configure your settings.xml to redirect all requests to your private Maven repository • Remove the repositories and pluginRepositories from your POM -> no separate POM needed for deployment share|improve this answer Otherwise pom simply is an XML. You can apply an XSLT wrapper to sort out the entries you want to change and wrap the maven build scripts within some batch commands. share|improve this answer The whole point of using a system like maven is to escape from build script hell. Now you are suggesting to wrap maven in a build script??? –  Sean Patrick Floyd May 18 '11 at 13:06 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23916
Take the 2-minute tour × If I need to perform some resource cleanup (deleting temporary files) upon Flow completion, including when the HttpSession times out, what's the best way to do this? FlowExecutionListener.sessionEnding() is called when an end-state is visited, but not when the HttpSession times out. Is there a safe way for an HttpSessionListener to access to SWF scopes? (Spring 3.0, WebFlow 2.3) share|improve this question FYI, opened a Spring JIRA issue to request a new capability jira.springsource.org/browse/SWF-1506 –  dbreaux Jan 6 '12 at 15:10 Your Answer Browse other questions tagged or ask your own question.
global_05_local_5_shard_00000035_processed.jsonl/23917
Take the 2-minute tour × I have a simple Java console application that I have built in NetBeans. It runs fine within NetBeans, but I want to export it into a jar so I can run it on other machines. I have been trying to export this project but am encountering numerous fails, and have been told to try building the jar file with Maven. I can't find any good online resources to achieve this and am not actually sure that it's the correct thing to do to get my java app going. Any advice would be appreciated. share|improve this question If you have a simple application, maybe maven will be an overkill. If you create a Java Desktop Application, Netbeans will automatically try to create a jar file for you upon build (in your /dist directory). If the jar file is unrunnable, try seetting its main class. –  baba Jul 28 '11 at 15:30 Even a plain old Java Application gets a JAR. Have you looked the tutorial? –  trashgod Jul 28 '11 at 15:46 does the project have any external depencencies eg Apache File Utils? If not then you could just copy the jar file out of the project\target folder –  Tim Sparg Jul 28 '11 at 21:07 Your Answer Browse other questions tagged or ask your own question.
global_05_local_5_shard_00000035_processed.jsonl/23918
Take the 2-minute tour × I'm trying to convert an ArrayList containing Integer objects to primitive int[] with the following piece of code, but it is throwing compile time error. Is it possible to convert in Java? List<Integer> x = new ArrayList<Integer>(); int[] n = (int[])x.toArray(int[x.size()]); share|improve this question Not an EXACT duplicate of that question (although not very far either) –  Jonik Apr 5 '09 at 13:12 Yes, this is an ArrayList, "duplicate" is about a normal array. –  smackfu Oct 16 '12 at 14:27 10 Answers 10 up vote 112 down vote accepted You can convert, but I don't think there's anything built in to do it automatically: public static int[] convertIntegers(List<Integer> integers) int[] ret = new int[integers.size()]; for (int i=0; i < ret.length; i++) ret[i] = integers.get(i).intValue(); return ret; (Note that this will throw a NullPointerException if either integers or any element within it is null.) EDIT: As per comments, you may want to use the list iterator to avoid nasty costs with lists such as LinkedList: Iterator<Integer> iterator = integers.iterator(); ret[i] = iterator.next().intValue(); return ret; share|improve this answer Now I have my own primitive conversion utility! yay Jon! –  masher Apr 7 '09 at 23:39 It might be better to iterate using the List's iterator (with for each) so as to avoid performance hits on lists whose access is not O(1). –  Matthew Willis Apr 2 '11 at 20:52 @Matthew: Yes, possibly - will edit to give that as an alternative. –  Jon Skeet Apr 3 '11 at 7:58 You can also utilize the fact the ArrayList implements Iterable (via Collection inheritance) and do: for(int n : integer) { ret[counter++] = n; } ... and initialize int counter = 0; –  gardarh Feb 14 '14 at 15:04 Apache Commons has a ArrayUtils class, which has a method toPrimitive() that does exactly this. import org.apache.commons.lang.ArrayUtils; list.add(new Integer(1)); list.add(new Integer(2)); int[] intArray = ArrayUtils.toPrimitive(list.toArray(new Integer[0])); However, as Jon showed, it is pretty easy to do this by yourself instead of using external libraries. share|improve this answer Note that this approach will make two complete copies of the sequence: one Integer[] created by toArray, and one int[] created inside toPrimitive. The other answer from Jon only creates and fills one array. Something to consider if you have large lists, and performance is important. –  paraquat Oct 18 '10 at 18:48 I measured performance using ArrayUtils vs pure java and on small lists (<25 elements) pure java is more than 100 times faster. For 3k elements pure java is still almost 2 times faster... (ArrayList<Integer> --> int[]) –  Oskar Lund Apr 4 '13 at 16:26 @paraquat & Oskar Lund that is not actually correct. Yes, the code provided will create two arrays, but this approach does not. The problem in this code here is the use of a zero length array as the argument. The ArrayList.toArray source code shows that if the contents will fit, the original array will be used. I think in a fair comparison you'll find this method to be as efficient (if not more) and, of course, less code to maintain. –  Sean Connolly Apr 23 '13 at 12:10 PS: a nice related post –  Sean Connolly Apr 23 '13 at 12:20 I believe iterating using the List's iterator is a better idea, as list.get(i) can have poor performance depending on the List implementation: private int[] buildIntArray(List<Integer> integers) { int[] ints = new int[integers.size()]; int i = 0; for (Integer n : integers) { ints[i++] = n; return ints; share|improve this answer That's why I love SO. Good answers always get seen. +1 by the way. –  Croo Apr 27 '13 at 12:29 Glad I kept scrolling, was just about to paste in this exact same code :) –  Kenny Cason Jan 27 at 23:01 Google guava now provides a neat way to do this: List<Integer> list = ...; int[] values = Ints.toArray(list); share|improve this answer I think this'll be the answer for me - I'll take a library over a copy-paste function any day.. especially a library that a decent sized project likely already uses. I hope this answer gets more up-votes and visibility in the future. –  Sean Connolly Apr 23 '13 at 12:15 Much better than the accepted answer. –  George Karpenkov Oct 6 '14 at 9:17 If you are using there's also another way to do this. int[] arr = list.stream().mapToInt(i -> i).toArray(); What it does is: • getting a Stream<Integer> from the list • obtaining an IntStream by mapping each element to itself (identity function), unboxing the int value hold by each Integer object (done automatically since Java 5) • getting the array of int by calling toArray You could also explicitly call intValue via a method reference, i.e: int[] arr = list.stream().mapToInt(Integer::intValue).toArray(); It's also worth mentioning that you could get a NullPointerException if you have any null reference in the list. This could be easily avoided by adding a filter condition to the stream like this : int[] arr = list.stream().filter(i -> i != null).mapToInt(i -> i).toArray(); List<Integer> list = Arrays.asList(1, 2, 3, 4); int[] arr = list.stream().mapToInt(i -> i).toArray(); //[1, 2, 3, 4] list.set(1, null); //[1, null, 3, 4] share|improve this answer Great answer. Hopefully it will be chosen as the correct answer one of these days. –  Julien Chastang Nov 17 '14 at 5:25 using Dollar should be quite simple: List<Integer> list = $(5).toList(); // the list 0, 1, 2, 3, 4 int[] array = $($(list).toArray()).toIntArray(); I'm planning to improve the DSL in order to remove the intermediate toArray() call share|improve this answer Hey, just wanted to say I hadn't seen Dollar before, but I'm definitely giving it a try on my next project. That's a nifty little api you have going there, keep up the good work :) –  Bart Vandendriessche Sep 15 '11 at 9:22 If you're using GS Collections, you can use the collectInt() method to switch from an object container to a primitive int container. List<Integer> integers = new ArrayList<Integer>(Arrays.asList(1, 2, 3, 4, 5)); MutableIntList intList = Assert.assertArrayEquals(new int[]{1, 2, 3, 4, 5}, intList.toArray()); If you can convert your ArrayList to a FastList, you can get rid of the adapter. FastList.newListWith(1, 2, 3, 4, 5) Note: I am a developer on GS collections. share|improve this answer It bewilders me that we encourage one-off custom methods whenever a perfectly good, well used library like Apache Commons has solved the problem already. Though the solution is trivial if not absurd, it is irresponsible to encourage such a behavior due to long term maintenance and accessibility. Just go with Apache Commons share|improve this answer It bewilders me that anyone would need to depend on a 3rd party lib to do something as easy and basic as this. In fact, I would say it edges on being irresponsible. –  mmattax Apr 30 '10 at 13:28 I do agree with the previous commenter. Not only do you drag in Apache Commons, but it easily translates into a large set of transitive dependencies that also need to be dragged in. Recently I could remove an amazing # of dependencies by replacing one line of code :-( Dependencies are costly and writing basic code like this is good practice –  Peter Kriens Oct 29 '10 at 14:45 int[] result = null; StringBuffer strBuffer = new StringBuffer(); for (Object o : list) { result = new int[] { Integer.parseInt(strBuffer.toString()) }; for (Integer i : result) { strBuffer.delete(0, strBuffer.length()); share|improve this answer This answer does not work, it returns an array with a single element instead of multiple elements. –  Mysticial May 3 '13 at 8:15 Integer[] arr = (Integer[]) x.toArray(new Integer[x.size()]); access arr like normal int[]. share|improve this answer this does not answer the question, the question was about converting to primitive type (int) –  Asaf Oct 27 '12 at 23:21 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23919
Take the 2-minute tour × I want to open multiple search views in the IDE( preferably without multiple instances of the eclipse ide). How can i do it? share|improve this question 2 Answers 2 You can not do that. But if you realy need this, register to bugzilla of eclipse and write an feature-request. share|improve this answer Found this question while looking for a similar answer myself; apparently now you can, though it's not something that is achievable through menus / options etc.. take a look here http://wiki.eclipse.org/FAQ_How_do_I_open_multiple_instances_of_the_same_view%3F share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23920
Take the 2-minute tour × I am trying to build a dictionary with frequent terms for my website. So basically I will retrieve a paragraph from my database and this paragraph most likely will contain terms which appear in the aforementioned dictionary. What I am looking for is a nice way (and fast) to parse the paragraph text and map the dictionary terms which might appear in that text with the dictionary entries. Is there a Python module which can assist me with this task? I am not looking for something fancy but it must be fast. share|improve this question Are you looking for exact matches, respecting word boundaries? I. e., if your item is foo, do you want to find it within confoobulation? –  Tim Pietzcker Sep 26 '11 at 16:13 Oh yeah. I should have cleared this up before. I am looking for exact matches. So if there is a word "foo" in the dictionary ONLY the word "foo" should be matched from the text (not "foobar" or "confoobulation") . –  George Eracleous Sep 26 '11 at 16:18 1 Answer 1 up vote 2 down vote accepted Something like this? >>> s = "abc def, abcdef" >>> w = {"abc": "xxx", "def": "yyy"} >>> def replace(text, words): ... regex = r"\b(?:" + "|".join(re.escape(word) for word in words) + r")\b" ... reobj = re.compile(regex, re.I) ... return reobj.sub(lambda x:words[x.group(0)], text) >>> replace(s, w) 'xxx yyy, abcdef' Note that this only works reliably if all the dictionary's keys start and end with a letter (or a digit or underscore). Otherwise, the \b word boundaries fail to match. share|improve this answer Great! That seems perfect. Thanks a lot:) –  George Eracleous Sep 26 '11 at 16:54 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23921
Take the 2-minute tour × Anyone know a good alternative to the flowplayer tooltip? I need same functionality of HTML content with Tip remaining active when mouseenter inside of tooltip as the below demo shows. Also need tooltip to close onclick share|improve this question What's wrong with the flowplayer tooltip? It seems to support the behaviours you require. The documentation states " By default the tooltip stays visible when the mouse is moved over it and it is hidden upon mouseleave. If you don't want to close the tooltip upon mouseleave, you can simply specify: tooltip: "mouseenter". This gives you the possibility of closing the tooltip programmatically. This has been done on the login/signup boxes on the main navigation bar of this website." –  JaredMcAteer Oct 5 '11 at 17:00 Flowplayer's jQuery Tools is a dead/dying project, IMHO. The developer had "lost interest" for over a year and it has not been upgraded since jQuery 1.4.2. This does not mention the unconventional methods, the large amount of HTML/CSS markup or the lack of support in the developer's own forum. The developer states that the next upgrade will not be backward compatible with your existing markup so the OP might as well move forward with something more up to date and better supported by today's browsers (IE9, IE10, etc.). –  Sparky Oct 5 '11 at 17:06 3 Answers 3 up vote 2 down vote accepted I prefer qTip2. It does everything you'd ever need a Tooltip plugin to do. It comes preloaded with several CSS themes and the best part is that the developer answers questions in his forum on a daily basis. EDIT 8/28/13 Now I prefer a jQuery plugin called Tooltipster. Mainly because it's much easier to configure, and I don't have to do anything to the CSS because I already like how it looks. share|improve this answer Link is not working –  Subodh Joshi Apr 22 at 12:01 @SubodhJoshi, links fixed. –  Sparky Apr 22 at 14:19 I use tooltipsy, this is an EXCELLENT tooltip program. You can set it to do pretty much anything you want. If you want custom CSS, okay, if you want to set your own show and hide events, okay, you can change what the tooltip aligns to, the delay until it shows, you can do whatever you want. Tootipsy is the best one I ever used. (I had to make a little modification to it to get it to use HTML in the tooltips though, but it's a very simple change) share|improve this answer What about Prototip? share|improve this answer Prototip requires PrototypeJS, the user tagged jQuery as the framework he's using. –  JaredMcAteer Oct 5 '11 at 16:59 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23922
Take the 2-minute tour × I have an iPhone application that contains several views and their associated controllers. Looking at sample code, I've seen different different ways to organize these files - either have all of the views grouped, then all of the controllers grouped, or group the views and controllers by functionality. Option 1 - Views and controllers grouped separately - EditItemView.h - EditItemView.m - AddItemView.h - AddItemView.m - EditItemViewController.h - EditItemViewController.m - AddItemViewController.h - AddItemViewController.m Option 2 - Items grouped by functionality - AddItemViewController.h - AddItemViewController.m - AddItemView.h - AddItemView.m - EditItemViewController.h - EditItemViewController.m - EditItemView.h - EditItemView.m Option 1 seems to make more sense from a MVC standpoint - the code is grouped together, but I'm wondering as the app grows to 10+ views and controllers, is that the most logical and maintainable? Is there a best practice recommendation around this? Currently, I will be the only one maintaining the app, but whether or not there will be multiple developers, I want to use best practices as much as possible. Are there published standards on this? share|improve this question 6 Answers 6 up vote 18 down vote accepted I'm working on a big xCode project right now. It isn't for the iPhone, but I don't think that matters for the sake of file structure layout :) I started out with option #1 and later moved to something like option #2 when the number of files increased. I tend to group things by "interfaces" i.e., all of the sources associated with a particular area of functionality within the application, and then create sub-groups for larger sections if need be. As far as naming goes, I prefer to identify Model, View and Controller using as little class name real-estate as possible, so my class names look similar to: AM_DillPickle // model class AV_Sasquatch // view class AC_DirtBike // controller class This still allows for a quick visual check to see the type of a class (M, V, or C) but it leaves more room for the descriptive part of the name. I've also found it useful to specify some classes that do not fit into the MVC pattern (gasp!): AU_Helper // utility class (text formatting, high-level math, etc.) AD_Widget // device class (used to represent hardware drivers) Anyway, that's already more information than you asked for, but I find the naming issue to be relevant to the layout issue, since the real question is: what is the best way to organize my code for a large xCode project? Hope it helps. Here is how it all looks when put together: [+] Project [-] Target One [+] Target Two [-] Preferences [-] Login [+] Main Window # MainWindow.XIB # AC_MainWindow.h # AC_MainWindow.m # AC_DisplayScreen.h # AC_DisplayScreen.m [-] Home Screen # HomeScreen.XIB # AC_HomeScreen.h # AC_HomeScreen.m # AV_FancyDisplay.h # AV_FancyDisplay.m [+] Widget Screen [+] Other Screen share|improve this answer The second option makes way more sense as your project grows. Furthermore, the default project has xib files go into "resources" but again as a project grows it makes a lot more sense to move related files into a logical group for some screen or other piece of functionality. One grouping arrangement by way of example would be: 3rdParty (for something like regex) Utilities (for category additions to classes like UITableViewCell) Data (for holding plists or other data you may want to load during an app run) Resources (still here for random images it makes sense to keep central) The App delegate could hang out in Utilitites, or perhaps just floating above all those groups under Classes. share|improve this answer Where would generic UI widgets go in your system? Say a checkbox widget that inherits from UIView and is used on multiple screens? –  Jason Moore Feb 18 '10 at 20:48 Probably under Utilities, in a UIWidget sub-group. –  Kendall Helmstetter Gelner Feb 19 '10 at 1:24 I don't know that there is a standard organization in XCode, especially since project organization inside the IDE often does not translate to file organization on disk. That said, I usually do something similar to your Option 1, for no better reason than that more closely resembles the folder structure in Rails, which is what I was most used to when I started messing with the iPhone. share|improve this answer Sometimes the best practice is to do what most makes sense to you. I personally like the grouping by functionality, but either way it can become unwieldy if you are not thoughtful about meaningful names and refactoring names when they no longer describe the functionality. share|improve this answer Option 2 makes more sense to me.Think about it ,while you are coding,you always editing around the "view" and its controller,option 2 makes you find the appropriate files in the most efficient way. share|improve this answer Please refer the following link. Hope it helps ! http://akosma.com/2009/07/28/code-organization-in-xcode-projects/ (Please note "Conclusion Structure" in this link - At the end of this link) share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23961
Take the 2-minute tour × I have this weird problem that Firefox does not open a perfectly normal select box (see code below). I've already tried to disable all the plugins, themes etc, but still it won't open them. Is there probably some strange setting that causes this? <option value="0">aaaaaaaaaaa</option> <option value="1">bbbbbbbbbbbbb</option> <option value="2">cccccccccccc</option> <option value="3">dddddddddddd</option> share|improve this question Any other sites that are giving you trouble? Which OS and which Firefox? (The above jsbin.com/equtu works fine in Firefox 3.6 on Mac OS X.) –  Arjan Feb 2 '10 at 12:00 Works fine here as well FF3.6 W7 –  MrStatic Feb 2 '10 at 13:10 works fine here, firefox 3.5.7, archlinux –  barraponto Feb 3 '10 at 4:36 And works fine in 3.6 on Win XP –  njd Feb 5 '10 at 15:50 I have the same issue and no solution... –  Ashley Ward Feb 15 '11 at 17:58 2 Answers 2 up vote 1 down vote accepted Just in case this is caused by an extension or by something odd in your profile: try running firefox without any extensions, and with a fresh (empty) profile: firefox -safe-mode -P new_profile_name and see if you can reproduce the problem. share|improve this answer Sometimes Firefox doesn't like select boxes not in a form. Put tags around your select box. share|improve this answer sorry - meant "put FORM tags around..." –  gaje Aug 27 '10 at 20:01 you are able to edit your own answers :) –  John T Aug 27 '10 at 20:02 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23962
Take the 2-minute tour × Possible Duplicate: Installing Multiple OS on external hard drive I made a little research before coming here. And found out that I need to disconnect all internal hard drive before proceeding. http://www.pendrivelinux.com/installing-ubuntu-to-a-usb-hard-drive/ Here's my question: 1. If I install Windows XP or Ubuntu on an external hard drive. Would it be universal? Can I use it or run it on any computer. Assuming that the bios allows you to boot from USB hard drive. Or even not because there's PLoP Bootmanager And has the considerable amount of memory and processor power to run the OS. 2. What other things to consider when installing an OS in an external hard drive? 3. Is installing in the external hard drive the same as when installing in an internal hard drive? Can I also boot multiple OS? What are the things to consider when doing this? And if you have a tutorial there. Showing how to install an OS in an external hard drive. Please link. share|improve this question marked as duplicate by Sathya, random Jul 23 '10 at 4:25 2 Answers 2 up vote 2 down vote accepted You should check these two links out More detailed, ThechSpot: techspot.com/vb/topic116114.html share|improve this answer It really feels unsafe to be following tutorials from unreliable sources like e-how. –  soul May 30 '10 at 1:35 With Fedora, passing expert to the installer will allow you to do various "expert" things such as installing to a removable drive. As long as grub is installed to the removable drive and the BIOS is capable of booting off it, you should be able to use it on any appropriately-similar machine. share|improve this answer
global_05_local_5_shard_00000035_processed.jsonl/23963
Take the 2-minute tour × I have an HP system that came with Vista installed and also a hidden restore partition. I subsequently upgraded to Win7(32 bit) Ultimate, and from there to Win7 Pro. Now the hard drive is failing. I managed to use partimage to grab the recovery partition (without errors) before I put it on ice in preparation for a freezer-based recovery of the Win7 partition. On another drive I created 3 primary partitions and one extended partition: 1. Recovery partition (NTFS) 2. Win7 partition (NTFS) 3. Ubuntu root (ext4) 4. Ubuntu swap (ext4) (logical partition) Next, I installed Ubuntu 10.4 and allowed grub2 to install the MBR. Then, I used partimage to populate the recovery partition with the image that I pulled off the failing drive. Now, before I attempt to recover the Win7 partition I want to be sure I can access the existing recovery partition. And I can't. I can see the files but I can not boot it up. Grub sees it as a Windows partiton and lists it in the menu. But when I try and boot to it I just stare at a blank screen with a blinking cursor. I tried to bypass grub by using gparted to make the recovery partition active and boot directly to that instead of grub, but I still boot into grub. So with that background, let me pose my questions. 1. As I understand it, the standard IBM/WIndows MBR code looks in the partition table for the first primary partition with the active/bootable flag set and then transfers control to the code it finds at the beginning of that partition, or the "partition boot record" (PBR). The PBR then locates NTLDR/BOOTMGR/grub/etc and loads it. Is my understanding correct? 2. Where in the boot process is the interrupt key (f11 in the case of HP) to boot into the recovery partition handled? MBR? PBR? Boot manager/loader? 3. When grub writes the MBR it also seems to use the rest of track 0 and the MBR code executes this code before moving on to load the rest of the grub code in whatever partition it is loaded in (in my case partition 3). In this sense it disregards the active/bootable flag in the partition table. Have I understood this correctly? I am obviously missing some pieces here because I can not get my recovery partition to load. I would think the grub "chainloader" (why +1?) command would just exec PBR code. If this is true then something in my recovery partition is hosed. share|improve this question 3 Answers 3 The MBR (1 sector, 512 bytes) contains boot code and the partition table. The "default" MBR code finds the active primary partition and chain loads it. (In GRUB parlance, +1 means the first sector, the boot sector of that partition.) When you install GRUB into the MBR, it replaces the default MBR code (keeping the partition table of course) and instead loads the rest of the GRUB core image, which is installed in the "MBR gap" -- the supposedly unused part of the first "track" that comes after the MBR sector. If you install GRUB into a partition, it installs it as the boot sector; the default MBR code chain loads that GRUB boot sector. So that's why you're always running GRUB -- that's what the code in the MBR has been modified to do. You can restore the default MBR code with some variation of fixmbr. But at best, that would only prove that your image of the recovery partition is good, and that you can access it through a vanilla MBR. Actually, if you prove that your image of the recovery partition is bad, maybe that's why it didn't work through GRUB, and if it was good, it would have worked. So that might be better, if you can make a good copy. It's possible that the recovery partition won't boot through GRUB, for some bizarre reason. There may have been some special sauce in the factory original MBR that was a prerequisite for the recovery partition. I have eschewed systems that had them, so I can't offer much insight there. share|improve this answer Thanks Ken, this corroborates some other info I have been reading about how GRUB installs itself. I wanted to avoid the MS boot loader process if possible because I just do not like the way it operates. I am pretty sure I have a complete and integral copy of the recovery partition, but it's contents are a bit strange. I don't see a bootmgr.exe, but I do have a bootmgr and a boo.mgr. There is also a "boot" dir with a "bcd" file. I dumped the VBR and it appears valid, though it looks as though it is pre-Vista. I say that because the error strings contain "NTLDR" not BOOTMGR. Strange. –  NetWorker Sep 24 '10 at 2:32 Question 3: Yes grub does put some of itself in track 0. I personally never put grub in the mbr, I always use a "normal" mbr and install grub in a primary partition. Whether using a part of the disk that is not marked as being used will cause a problem will depend. I believe that the disk partitioner in Windows Vista and 7 behaves differently to previous version, but I don't know if it utilises the spare parts of track 0. I did hear recently of people having problems because a trial version of a program (Adobe something?) writes to that area of the disk overwriting some of grub (in order to be able to stop people reinstalling the trial again and again I suppose). (Listen to a recentish episode of the Ubuntu UK podcast for details) My view is that if you write to areas that don't belong to you, you can't complain about other people doing exactly the same thing. The mbr bit of grub writes the physical disk address of the next stage of itself into its own code, and takes no notice of partitions at all, active or not. share|improve this answer Hi Neal. I believe that the older partitioners left the first cylinder alone completely, the Vista+ ones align the partitions on 1 MB boundaries ignoring geometry altogether. So there is less of a MBR gap than before. I still don't understand why when grub chainloads the VBR on the restore partition it just hangs though. And I really want to know where the F11 bit is handled. It just bugs me when I can't figure this stuff out. I have become obsessed. –  NetWorker Sep 24 '10 at 2:38 On systems with such a recovery partition, usually the active partition is the recovery partition. The recovery partition displays the "Press F11" message, and if not pressed, forwards over to the main OS partition. The MBR is essentially dumb; all it does is choose one of the partitions, and forwards over to that partition's VBR. If you wanted a linux/windows dual boot, then the recovery partition would need to be forwarding to the GRUB partition, which would then allow options, and would forward to Windows if Windows got picked. I'd not waste time with the recovery partition -- you can get all the drivers there from HP's web site, and if you've already got 7 on the box I think we can both agree wanting to revert back to Vista is unlikely. So, to your specific questions. 1. Yes, your understanding is correct 2. Answered above 3. Not sure specifically what GRUB does when installed to the MBR. To my understanding it didn't really put business logic there, but I could be wrong. Hope that helps :) share|improve this answer Thanks Billy. The only reason I want the recovery partition is for licensing reasons, as my Win7 is an upgrade copy and if I need to reinstall I thought I might need it (though I have done some further investigation and understand I may not). Not sure what was the active partition on the original HP build. The restore partition was hidden. It never displayed a message about pressing F11, you just had to know. I will grab the MBR when I remove it from it's cryogenic chamber (between the peas and the pizza rolls). –  NetWorker Sep 24 '10 at 2:18 It turns out that the main Win7 partition was the first partition on the disk and it was active. So it was not booting into the recovery partition. –  NetWorker Sep 24 '10 at 13:30 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23964
Take the 2-minute tour × My keyboard doesn't have power-related keys. I would like to enter the hybrid sleep using the keyboard and only with a minimum of keystrokes. If there is none, how do I bind a hotkey to it? share|improve this question 4 Answers 4 up vote 5 down vote accepted Windows doesn't have a standard hotkey or keyboard shortcut for going to sleep - except the "sleep" button that you see on some keyboards. Instead, you can use a program to trigger the sleep state, and you can assign a shortcut to launch this program: 1. Download Steve's Wizmo tool. 2. Create a shortcut to this program on your desktop. 3. Right-click the shortcut, and select Properties. 4. In the field Target, add the word standby. *) 5. Click in the field Shortcut key, then press the key combination you want to use. This is then displayed in the field. Note: Not all shortcuts work, e.g. Win+S gets translated to Ctrl-Alt-S instead. 6. Click OK and try out the shortcut! *) See the Wizmo webpage for complete documentation. Wizmo can do lots more! share|improve this answer Glad to see there's more Steve Gibson fans here. –  qroberts Oct 5 '10 at 14:09 In English Windows Windows + -> + -> + s will put the computer to sleep. If sleep is configured to be hybrid, then it will be a hybrid sleep. share|improve this answer +1, Relatively easy to remember and works always as it does not require changes to the system. –  mgronber Aug 24 '13 at 16:53 You can use the free utility NirCmd as follows: "C:\Program Files\Nircmd\nircmd.exe" hibernate The rest you can find in torbengb's answer. share|improve this answer You can try this command instead (no external programs are required): Rundll32.exe Powrprof.dll,SetSuspendState Sleep share|improve this answer Unfortunately, if you have hibernation enabled, this will hibernate instead of sleep. –  Jeremy Stein Dec 10 '14 at 20:10 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23966
Take the 2-minute tour × How can spell checking be turned off for a portion of a OneNote page? The set language form does not have a checkbox (like the one for Word 2010 has). There are over 100 languages to choose from, but all of then will perform some sort of proofing. share|improve this question 4 Answers 4 up vote 3 down vote accepted I'm afraid this is not possible. In order for this to happen, a OneNote page would have to be come much more complicated, there is no way to 'fine-tune' spell-checking that specifically. However, you can tinker with the spell checking options in Tools -> Spelling -> Spelling Options: enter image description here Try experimenting with some of the highlighted options above. For example, you can have it suggest words from the main dictionary only, or use a custom dictionary, or even edit the word list yourself... You can also disable spell checking or only have it check it in one sweep. To have it check in one sweek, uncheck Check spelling as you type. share|improve this answer Not the answer I was hoping for, but good to know. –  Jay Elston Oct 4 '11 at 22:07 A variation on the language support trick from Petri above seems to do what you want: 1. Select a block of text in your document that you want to disable for spell checking 2. Go to the Review tab and select Language > Set Proofing Language 3. Select a language for which you and your likely readers have no dictionary, e.g. Afrikaans, Cherokee etc. work for me. The other text will still default to being in the original language, e.g. English (UK) in my case and will still be spell checked as normal. You can also keep the proofing language pane open to make it quicker to apply the same change to multiple areas of your document. I guess the reason for this functionality is for when you quote something in another language, you can spell check it correctly. share|improve this answer The trick works for me is to set page language to something you don't have language support in your computer. For example I changed page language to "Afrikaans". Then OneNote does not make spelling checking for this page because Afrikaans -dictionary is missing. share|improve this answer That doesn't work for PART of a page, which is what the question requires. –  Chenmunka Dec 20 '13 at 12:30 It worked for me. Highlight the area you don't want spell-checked then set proofing language to Afrikaans. Only the selected section of the page uses the new language. –  xcud Mar 30 at 14:52 Install OneTastic addin, which has one of macros, named "No spell check" Works perfectly P.S. Onetastic is an add-in, which is made by Microsoft OneNote team developer, and has lots of useful features. You can trust it. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23967
Take the 2-minute tour × I have converted any video format to 3gp file format using ffmpeg on one server. But on another server it not works. Following is my script: exec("ffmpeg -i test.flv -sameq -acodec libmp3lame -ar 22050 -ab 96000 -deinterlace -nr 500 -s 320x240 -aspect 4:3 -r 20 -g 500 -me_range 20 -b 270k -deinterlace -f flv -y test.3gp "); Can anyone tell me what is wrong in script? Following is my ffmpeg setting: root@ninja [~]# ffmpeg -formats ffmpeg version CVS, build 3277056, Copyright (c) 2000-2004 Fabrice Bellard configuration: --enable-mp3lame --enable-libogg --enable-gpl --disable-mmx --enable-shared built on Jun 17 2009 10:51:43, gcc: 4.1.2 20080704 (Red Hat 4.1.2-44) share|improve this question migrated from stackoverflow.com Oct 20 '11 at 16:39 This question came from our site for professional and enthusiast programmers. have you try running the command manually? any error messages from ffmpeg? –  melaos Jun 25 '09 at 6:26 Actually ,We have a shared server and ssh is not enabled on that. So I am not able to run it manually. –  Chetana Jun 25 '09 at 6:34 2 Answers 2 The "-f flv" isn't right. You're encoding to 3gp, not flv. I think the acodec should be aac, and vcodec should be h263, unless the 3gp codec is broader than I thought. A third thing is that at some version they changed the naming of the codecs. If you have an old version of ffmpeg (it says 2004), it might be "mp3" instead of "libmp3lame", unless my memory is backwards. You have some conflicting parameters too, but ffmpeg probably just goes with the last. -sameq (match quality of source) conflicts with -b (adjust quality for constant bitrate), and you have -deinterlace twice. share|improve this answer Are you not able to capture any error messages from your script? I assume that output is from your first server? check that the version of ffmpeg on the second server supports flv and 3gp, I know some versions of linux ship with a crippled version of ffmpeg due to patent concerns in some countries. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23968
Take the 2-minute tour × A server I've recently taken charge of has a copy of SharePoint installed. Add or Remove Programs shows "Microsoft Office SharePoint Server 2007". How do I find out if I'm running Standard, Enterprise or something else? Additional facts: • The server is running Windows Server 2003. • The version hasn't been documented anywhere and there's nobody I can ask share|improve this question 2 Answers 2 up vote 1 down vote accepted Go to Central Admin -> Operations -> Convert License Type and the current license should be shown there. share|improve this answer You might want to know the patching level of SharePoint on that server too: http://msfarmer.blogspot.com/2009/07/sharepoint-versions.html There are more version listings around, this one just to get you started. share|improve this answer Thanks for this! :) –  Cosmic Flame Nov 22 '11 at 13:52 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23969
Take the 2-minute tour × I was having some troubles with byobu lately while using the screen back-end, so I switched to using the tmux back-end, which works like a charm. The problem is now that my keyboard has tiny F1­-F12 keys, so it's hard to use them without looking at the keyboard. I'd like to continue using Cltr+A Cltr+C for new screen, etc. Is there a way to re-map these to the tmux-specific keys? I'm using Konsole as my terminal emulator and Awesome as my window manager. share|improve this question 1 Answer 1 up vote 3 down vote accepted After reading a bunch of man-pages, I figured out that adding the line set -g prefix C-A to ~/.byobu/.tmux.conf changes the escape sequence. This way, Ctrl+A A does what it would do in screen. Only problem is now that Ctrl+A Ctrl+A doesn't, but that's fine, it can be changed by changing key bindings one-by-one in the .tmux.conf file: bind-key C-C new-window bind-key C-A last-window bind-key C-Space next-window share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23971
Take the 2-minute tour × I have the following: - Domain with DNS record set to my Public IP - Public IP, via Comcast Modem/Router Sending all web traffic to the Web Server (1st Network Card) - I also Have Cisco ASA5505 after Modem and all internal network sits behind it - When I try to open my site from local network, it does nto work- I can browse it y IP only. But it works from outsite my local network. Maybe Cisco blocks someting? like some DNS requests? I don't know. Need help of the expert! share|improve this question 1 Answer 1 up vote 2 down vote accepted 1. On your computer open Network Connections. 2. Right-click on Local Area Connection and select Properties. 3. Click Internet Protocol Version 4 line. 4. Select Properties. 5. I'm using (the local address my router forwards port 80 to) 6. Click the Advanced button. 7. Click the Add button and enter the public address (the number displayed by WhatsMyIP) Save and you're ready to connect via localhost or www.myname.com share|improve this answer it did not help –  Andrew May 16 '12 at 22:28 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23972
Take the 2-minute tour × I need to compare if two developers did the job correctly and created identical tables. The problem is more complex, but I will try to solve it somehow if I solve the problem of comparing two tables (let them be in different SQL Server 2008 databases) and their properties. No data needs to be compared. share|improve this question If you're actually wondering about a solution to a different issue, feel free to ask a question about that specific issue instead of asking a question about a solving attempt ;) –  Oliver Salzburg Aug 15 '12 at 17:18 1 Answer 1 According to http://stackoverflow.com/a/1930040/477035 In SQL Server Management Studio, right click on your database and choose 'Tasks' -> 'Generate Scripts'. You will be asked to choose which DDL objects to include in your script. I would guess you can then diff the DDL. share|improve this answer There is a number of comparison tools as well, some of which come with a trial period, so can be used for free. I'm disinclined to suggest specific software titles though :-) –  user3463 Aug 15 '12 at 19:17 but I have plenty of columns (that's why I wrote 'huge' tables) ... I don't want to manualy compare. –  Robert Jung Aug 16 '12 at 13:08 @Robert: when I wrote "diff", I meant something like diff joe.ddl jim.ddl - an automated comparison. See en.wikipedia.org/wiki/Diff and gnuwin32.sourceforge.net/packages.html –  RedGrittyBrick Aug 16 '12 at 13:12 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23973
Take the 2-minute tour × Microsoft just launched a new logo and from this video you can see that the different colors represent different parts of Microsoft. From the video you can clearly see that: Blue = Windows Green = Xbox Orange = Office Yellow = ? Is it windows phone or what? share|improve this question closed as off topic by Dave M, Indrek, Sathya Aug 24 '12 at 13:06 Yellow is for the return of Microsoft BOB, Microsoft's new cross platform companion. –  dangowans Aug 24 '12 at 13:34 It’s definitely not Windows Phone. The only product that fits at this time is Bing: [1] [2]. –  Synetech Aug 26 '12 at 2:13 Yup, definitely Bing. –  Synetech Nov 30 '13 at 6:12 2 Answers 2 I think the yellow is just because it's always been there, since the logo for Windows 3.1. Every few years, they slighly reinterpret the logo, removing the black borders between the colours, and now straightening out the swoosh. The rebranding campaign can't fully change the logo to something no one recognizes, so the colours were maintained. The logo now also looks more like four "tiles" used in Windows 8 and Windows Phone. Probably not a coincidence. It just so happens they can make green into Xbox. I'm sure that wasn't the intention in the 80s when the Windows logo was first made. Maybe they do have something up their sleeve for what yellow means, but I think it can only be speculated. share|improve this answer It maybe be related to the Windows Phone. From Wikipedia: Microsoft unveiled a new corporate logo at the opening of its 23rd Microsoft store in Boston indicating the company's shift of focus from the classic style to the tile-centric Metro interface which it uses on the Windows Phone platform, Xbox 360 and the upcoming Windows 8 and Office Suites. Then again the next line says: It's more like that they used the old logo and gave it new meaning. share|improve this answer > It maybe be related to the Windows Phone. Not likely. –  Synetech Aug 25 '12 at 5:58
global_05_local_5_shard_00000035_processed.jsonl/23974
Take the 2-minute tour × I am trying to create an automated monitoring system that other people can see but cannot do commands. I have a problem where the user is automatically connected to a screen where the monitoring is happening but they can close the screen. I would like some way so that any user except root to have their keyboard disabled. share|improve this question do you want it to make users just check mail or something like that? –  poz2k4444 Oct 8 '12 at 20:53 I run a Siri Proxy but I need other people to monitor it so I am trusted with that the proxy does. –  Muktadir Miah Oct 8 '12 at 21:08 So, you just want other people run a specific application? –  poz2k4444 Oct 8 '12 at 21:31 Yes, I have setup, so when the user logs in they are automatically connected to a screen. The script runs "screen -x root/" All I need it to do is stop the keyboard from typing and make them control the screen. –  Muktadir Miah Oct 8 '12 at 22:29 @MuktadirMiah I added screen-related stuff to my answer –  artistoex Oct 9 '12 at 10:38 1 Answer 1 up vote 0 down vote accepted Screen-based solution You can configure screen to open a window, share the session and write-lock it for USER on startup. Put the following commands in your .screenrc: screen 1 multiuser on aclchg <USER> +x detach writelock on This prevents the USER from executing any commands except detach (so he can log-off). X-based solution You can expose your X display read-only via vnc x11vnc -viewonly -display :0 where :0 is the display number. You can also create an X server by the -create option. On the ordinary user accounts you can start up all X sessions with the vnc client as the only program. share|improve this answer Do you know any way to make user connect to the screen as soon as they log in? And make it automatically run the "multiuser on.." when I make a new screen e.g. I make a new screen by typing "screen -S 1234" Then the "multiuser on", "aclchg <USER> -x ?", etc runs automatically. –  Muktadir Miah Oct 9 '12 at 17:00 You can put the commands into root's .screenrc. For the user append the lines screen -x root/ and logout to the .bash_login and make sure bash is the login shell for the user (usermod $USER -s /bin/bash). If you like the answer, you can also vote it up. –  artistoex Oct 9 '12 at 18:14 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23975
Take the 2-minute tour × My question is about popular YouTube downloaders like youtube-dl (a command line program) or VideoDownloadHelper (a Firefox-browser extension). Comparing two cases: 1. Watching a video on YouTube 2. Download the video using a downloader (to be specific let's assume youtube-dl) Is it possible to tell – for instance by inspecting the network traffic – that the video was downloaded and not "only watched" on YouTube? Maybe one could compare network traffic using programs like Wireshark? I cannot do that myself, but maybe this will help somebody to answer the question. share|improve this question Unless it's some kind of special player+stream combo using anti-copying measures, when online videos are played they're also downloaded to your local machine, and you can copy them from your browser cache. –  Karan Nov 10 '12 at 16:00 I have to give this browser cache some background research. Maybe this way I can find a way / software which when downloading does not generate any difference to the simple watching of a video. –  humanityANDpeace Nov 10 '12 at 16:28 2 Answers 2 up vote 1 down vote accepted Yes, it's possible to differentiate between these two use cases when looking at network traffic. The simple explanation is: • When you're downloading the raw video file with youtube-dl, you're loading a complete file at once. • When you're watching YouTube video through the browser, the Flash client downloads the video in chunks. The chunks fill up a buffer, and once that buffer is about to run out, the player fetches the next chunks. Both can be done through HTTP these days. You can observe the client behavior when you load up a video. It is never completely downloaded at once: The buffer will be played out, then the next part will be loaded. This of course is visible in network traffic, as multiple requests are sent to YouTube for one resource over the course of time. To cite Kuschnig et al. (see below): A video segment is split into chunks of size lch, which are served by a standard HTTP server. The download of the video chunks is coordinated by the client. For that purpose, the client maintains nc HTTP-based request-response streams and schedules the downloads of the different chunks by using a separate queue for each stream If you want more specifics about the YouTube streaming traffic, I could of course explain more. We currently conduct various simulated experiments regarding optimization of YouTube buffering and analysis of diverse video streaming scenarios. Further reading: • Kuschnig, Robert, Ingo Kofler, and Hermann Hellwagner. "Evaluation of http-based request-response streams for internet video streaming." Proceedings of the second annual ACM conference on Multimedia systems. ACM, 2011 (PDF) • Stockhammer, Thomas. "Dynamic adaptive streaming over HTTP--: standards and design principles." Proceedings of the second annual ACM conference on Multimedia systems. ACM, 2011. (PDF) share|improve this answer So is it not entirely possible for a downloader to mimic data requests in a manner similar to that of the Flash client? Along with the correct user agent string and what not, would it still be possible to differentiate? –  Karan Nov 10 '12 at 22:03 Well, then of course it's splitting hairs between what's a proper video client or merely a downloader acting as such :) You're right of course: You could definitely mimic video player requests, and changing user agent strings would be another way to obscure traffic. I'm sure if you're clever enough you could fool any detection algorithm. –  slhck Nov 10 '12 at 22:07 True. Referring to the original question, Google/the music industry is not so stupid as to be ignorant of the fact that content can and is downloaded (often with multiple connections to the server using download accelerators). Guess either they don't care as long as it's for personal use, or don't want to reduce their popularity and/or spark off an arms race by introducing some form of DRM, or whatever. In any case, I doubt there'd be much left if all copyrighted content not uploaded by the copyright owners themselves were to be removed from YouTube. :) –  Karan Nov 10 '12 at 22:14 Yes it is different (in the special case of using youtube-dl) which can be seen by the fact that the traffic while watching on youtube.com website uses a https:// transfer and the traffic generated by youtube-dl is using an unencrypted http://. If somebody sniffes the packages he can tell that the file was not watched on youtube. At least not the ordinary way share|improve this answer Can't youtube-dl be made to use an https connection? Does YouTube always use https? –  Karan Nov 10 '12 at 16:36 I see no reason why it should be impossible to make youtube-dl use https connections. Still the handling of https is a little more tricky and as it seems not required to achieve the goal (to provide a mechanism to download the resource). In the current way it would still not achieve the side-goal of downloading the data an "mimic video watching way". This goal (even with using https-connections) would not be achieved since I doubt the elaborate behaviour of the browser is immitated. I think youtube-dl is more like small python app. –  humanityANDpeace Nov 12 '12 at 8:57 why the downvoting? It answers the question by showing an example of a case where it is different. At least it thereby partially responds to the question. It took some work to use wireshark and investigate this. I feel unappreciated for this work. –  humanityANDpeace Nov 12 '12 at 8:59 Although I don't know who downvoted, don't take it so seriously. It's just how the site works. –  Karan Nov 12 '12 at 16:51 @ Karan :thanks for the consolation. Still I am confused to see a downvote on an "not-wrong" even partly helpful answer of mine. Instead of downvoting I would rather see better answers to be voted up. I am confused, since I though the site works the way that wrong answers are downvoted. –  humanityANDpeace Nov 14 '12 at 9:24 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23976
Take the 2-minute tour × I need to run Windows 8 and occasionally Windows XP in my laptop. So, is it possible to use two operating systems like Windows 8 and Windows XP? It should ask me while staring the computer for example which OS you need to load then I may choose XP, or 8 as I wish. Any idea? share|improve this question install windows XP first, and then WIndows 8. –  Sathya Jan 21 '13 at 17:22 but i have installed windows 8 already so is there any problem if i install windows xp now? –  BLuMn Jan 21 '13 at 17:25 I am sure this is probably a duplicate, but there are so many dual boot questions on the site I can't even find it. –  Shinrai Jan 21 '13 at 17:31 @patty general rule when you want to install two different versions of the same software on a machine at the same time - Always install the older one first. The new software may be able to recognise the old version, and work out how to co-exist (eg set up dual-boot, know which files can be overwritten with newer versions safely, etc), but there's almost no chance the old software will recognize and know what to do with the newer version if the new one's already on there. –  GAThrawn Jan 21 '13 at 17:42 @Shinrai Based on tags, maybe SU509940. –  pnuts Jan 21 '13 at 17:42 Your Answer Browse other questions tagged or ask your own question.
global_05_local_5_shard_00000035_processed.jsonl/23977
Take the 2-minute tour × I have made a simple .sh script which checks every minute whether a particular file is empty or not, and if it is not empty, makes a led on my laptop blink at 0.5Hz. I call this script from my .bash_profile. Whenever I am in TTY, the thing works flawlessly (to say: when the file is not empty the led on my lappy blinks at that precise frequency). But when I run X (I use Xmonad/urxvt, invoked via startx if that could help) something strange happens. The frequency of the blink is erratic, it slows down (a bit) the machine and when I call top I see various sudo processes (the one I call to turn the led on or off). It is the same behavior as if I called the script three or four times. I don't know how to diagnose the problem. The manual says .bash_profile gets read once (at login time). Can you help me out? # blink mail led while true; do hasIt=$(cat ~/someFolder/hazText.txt) # 1: has text if [ $hasIt -eq "1" ] echo "1" | sudo tee /sys/class/leds/led:alarm/brightness > /dev/null sleep $blinkTime echo "0" | sudo tee /sys/class/leds/led:alarm/brightness > /dev/null sleep $blinkTime sleep $checkTime share|improve this question Can you share the script? I guess you have some kind of sleep logic in there to slow down the looping of the script. Bear in mind that PATH variables may not be available if you run scripts this way. So if you are calling sleep for example you actually have to use the absolute path (can be determined via which sleep) otherwise your system won't be able to execute it. –  leepfrog Jun 8 '13 at 14:45 Also, some distributions cause .bashrc to source .bash_profile that could explain why the script is called many times. –  terdon Jun 8 '13 at 14:50 yes I can paste.debian.net/9196 (also, I run Debian stable) –  Gerreffo Jun 8 '13 at 14:51 Don't know why your script gets called multiple times but you can fix that by using a lockfile. This answer on SO shows you one way to do it. –  Nifle Jun 8 '13 at 15:17 @september: | sudo tee is needed because a normal redirect would be done (or rather, would fail) in the calling shell, before sudo even launches. See this previous question –  Gordon Davisson Jun 9 '13 at 6:08 1 Answer 1 .bash_profile is executed when Bash starts as a login shell, not "at login time" as you wrote. This means that every time Bash starts either with "--login" option or as "-bash", it will read and execute .bash_profile. Most likely starting your X session implicitly starts several Bash instances (since it's a default shell on Linux). Some of these instances probably happen to be login shells, your script gets called severals times, which makes your LED go into disco mode. The solution to your problem would be to move the script out of the .bash_profile, and either create a cron job for it, or rewrite it using inotify-tools. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/23983
Single page Print ATI's All-In-Wonder X1900 graphics card 48 pixel shaders, one rabid octopus — 5:00 AM on January 31, 2006 I SUPPOSE THIS REVIEW should be fairly simple. We've reviewed ATI's All-In-Wonder video cards in the past, and we just recently examined the new Radeon X1900 family of graphics cards. Package together the standard suite of All-In-Wonder extras with a Radeon X1900 graphics processor, and you pretty much have the AIW X1900—a $499 graphics card with a laundry list of multimedia features that will record your favorite TV shows, let you edit family videos, play DVDs while you relax on the couch, slice through the latest 3D games with ease, feed the cat, and wash the dishes while you aren't looking. It is, indeed, a wonder. However, each new All-In-Wonder packs so many features into one box, just understanding what all you're getting with the product can be daunting. AIW + X1900 = AIW X1900? Take, for instance, the 3D graphics and gaming capabilities of the AIW X1900. This card is based on the Radeon X1900 GPU, but it runs at different clock speeds than the familiar Radeon X1900 models XT and XTX, so its performance will be quite a bit different. In fact, in place of the stratospheric 600MHz-plus clock speeds of the other members of the X1900 family, the AIW's frequencies are rather modest: 500MHz for the GPU and 480MHz (or 960MHz DDR) for the card's 256MB of GDDR3 memory. That's exactly the same core clock as the Radeon X1800 XL and a slightly lower memory speed. Combined with the Radeon X1900 GPU's basic architecture, these clock speeds give the AIW X1900 eight gigapixels per second of pixel-pushing power and just over 30GB per second of memory bandwidth—virtually the same as the Radeon X1800 XL and in the same neighborhood as NVIDIA's GeForce 7800 GT. Those numbers would practically be fate for the AIW X1900 if not for one thing: the Radeon X1900 GPU architecture crams fully 48 pixel shader processor units on a single chip, so the AIW X1900 should be a massive leap in computational power over the Radeon X1800 XL. One way to roughly compare pixel shader power between GPUs with the same basic heritage is to look at the number of pixel shader cycles per second running on the chip. At 500MHz with 16 pixel shader processors, the Radeon X1800 XL churns through 8 billion pixel shader cycles per second. The higher end Radeon X1800 XT pushes 10 billion. But thanks to its 48 shaders running at 500MHz, the AIW X1900 rips through 24 billion pixel shader cycles each second. That's considerably more shader power than even the very high end of ATI's last generation GPU lineup—which seems eerie to say since the Radeon X1800 series was only just released in October. Comparing pixel shader cycles across GPU architectures is quite a bit trickier, because different shader units have divergent types of execution resources onboard capable of handling different mixes of math each clock cycle. Right now, it seems NVIDIA's GPU are performing better on a per-clock basis in most applications, perhaps in part because of the G70 GPU's focus on executing lots of MADD instructions. That said, the GeForce 7800 GTX's 24 pixel shader units running at 430MHz endow it with just over 10.3 billion pixel shader cycles per second. Obviously, at 24 billion, the AIW is a dead-serious challenger to the GeForce 7800 GT's bigger brother, despite a pixel fill rate and memory bandwidth more comparable to the GT than the GTX. The 3D graphics power of this thing is considerable, but there is no close analog to it on the market right now. I expect—and hope—that the release of the AIW X1900 at these clock speeds presages the release of a non-AIW Radeon X1900 card with the same basic clock speeds and memory size for $50 to $100 less. That would be a very nice development, indeed, and finally put ATI back into contention versus NVIDIA in a segment of the market above $169 and below $499. For now, though, the AIW X1900 is ATI's only contender in high-end graphics under $500. Fortunately, it can most likely fend for itself. So, you see, summing up the AIW X1900 isn't quite as simple as mashing together the AIW feature set with a Radeon X1900 card—and that's just the 3D part. The All-In-Wonder X1900 The AIW X1900 card itself comes dressed in a purple-and-gold color scheme that's more muted than the fire-engine-red ATI standard, yet somehow has a higher bling factor. It's regal, I guess. Like all X1900s, it comes in PCI Express flavor only, at least for now, but the AIW X1900 has a decidedly different port configuration than most video cards. Believe it or not, all of the AIW X1900's ample array of I/O options will pass through one of the four ports on the back of the card; there's no separate back plate or drive-bay insert needed. At the bottom left of the card in the picture above, you can see a rectangular gold plating covering the AIW's TV tuner. That's a Microtune 2121 silicon tuner, the device that receives RF signals from over-the-air broadcasts or the cable TV network and coverts them into analog video streams. This tuner works in concert with ATI's own Theater 200 video decoder chip, which is on the underside of the board and not shown in the picture above. The Theater 200 translates analog video streams into digital data for computer use, handling the analog-to-digital conversion, filtering, and scaling. This combo of the Microtune 2121 and the Theater 200 have been powering AIW cards since the release of the All-In-Wonder X800 XT, and little has changed on the AIW X1900. ATI does have the newer Theater 550 video chip with hardware MPEG2 encoding, and we found it to be excellent in our round-up of stand-alone TV tuner cards not long ago. However, ATI has yet to integrate the Theater 550 on an All-In-Wonder.
global_05_local_5_shard_00000035_processed.jsonl/23986
Tuesday, Jun. 2, 2015    Login | Register            Writers greet readers at Books Down South 11-Alive news anchor and author Karyn Greer greets one of the hundreds of readers attending the inaugural Books Down South festival Saturday in Fayetteville. Below, Steve Eubanks, author of more than 30 books has a light moment. Eubanks’ newest book, “All American,” about two men who faced each other in the Army-Navy football game in 2001 and then fought with each other in Iraq, made its debut at the festival. More than 40 other authors also interacted with their fans during the event at the former Rivers Elementary School on Sandy Creek Road. Other scenes from Books Down South below. Photos/Maggie Zerkus. Ad space area 4 internal Sponsored Content
global_05_local_5_shard_00000035_processed.jsonl/24003
Kristen Stewart's New Chanel Ads Leaked & They're ... Interesting Kristen StewartWe already knew that she was the new face of Chanel, but now images of Kristen Stewart in the Texas-inspired collection have been leaked, after being put up on the Instagram account, garcon_chanel, and then subsequently removed. (The campaign doesn't come out until May, FYI.) We have to assume they were released prematurely if they're not featured in the account anymore -- but that didn't stop a few sites from publishing the photos before they disappeared again. And as you will see, Kristen has her hair in cornrows and is all dolled up in Western attire. At this point, I haven't decided how I feel about the pics. I mean, she looks gorgeous, because DUH -- she's KStew and she's wearing Chanel. But on the other hand, something about seeing her in cowgirl boots just seems so ... off. They seriously should've put her in a pair of Converse sneakers just to make these ads more believable. But I guess that would've defeated the whole purpose of having her photographed out of her element. And who knows -- maybe she's into the western vibe? You never know. Every gal loves to switch things up now and then. What do you think of these new Chanel ads? Image via Pacific Coast News kristen stewart
global_05_local_5_shard_00000035_processed.jsonl/24008
Tolkien Gateway Biographical Information Physical Description GalleryImages of Ibun Ibun was the son of Mîm and brother of Khîm, the last of the Petty-dwarves.[1] When they were set upon by Túrin's outlaw band, the two brothers fled into the mist. As they ran, Khîm was shot by a wild arrow from the outlaws, but Ibun survived, and shared his father's House of Ransom with Túrin and the outlaws.[1] One winter, the two Petty-dwarves went out in search of roots, and were captured by a band of Orcs. Mîm survived his capture by betraying Túrin to the Orcs, but Ibun's fate is unclear.[2] Much later, in Nargothrond, Mîm told Húrin, "I am the last of my people",[3] so Ibun cannot have survived to that time. Whether he lost his life at the hands of the Orcs, or in some later unrecorded mishap, is not known. 1. 1.0 1.1 J.R.R. Tolkien, Christopher Tolkien (ed.), The Children of Húrin, "Of Mîm the Dwarf", p. 132
global_05_local_5_shard_00000035_processed.jsonl/24009
Tolkien Gateway (Difference between revisions) m (iw de fi) m (+ fr:) Line 20: Line 20: Revision as of 18:07, 15 November 2009 Physical Description LocationShire, north Southfarthing InhabitantsHobbits (Possibly Tooks) DescriptionSmall village General Information EtymologyOE pinnuc hop ReferencesA part of the Shire (map), The Lord of the Rings Pincup was a small village of the Shire. It lay in the northern corner of the Southfarthing, some miles south of the Three-Farthing Stone, in that hilly part of the Shire known as the Green Hill Country. It seems to have been built in the southern slopes of the Green Hills, and was reached by only a single road, apparently leading from the larger settlement of Longbottom to the south. The origin of Pincup's name is given in Nomenclature. The first element is pinnuc or pink, finch, and the second element is hop, recess, retreat.
global_05_local_5_shard_00000035_processed.jsonl/24010
Tolkien Gateway Tal-Elmar (chapter) Revision as of 20:50, 17 June 2007 by Narfil Palùrfalas (Talk | contribs) Tal-Elmar is the title of an incomplete narrative of which he is the main character. The story offers a glimpse of the Númenórean colonization of Middle-earth from the perspective of its indigenous inhabitants, and was published in the final volume of The History of Middle-earth, The Peoples of Middle-earth.
global_05_local_5_shard_00000035_processed.jsonl/24011
Tolkien Gateway Revision history of "Tolkien Gateway:Bot requests" There is no edit history for this page. • 21:43, 22 August 2014 Mith (Talk | contribs) deleted "Tolkien Gateway:Bot requests" ‎ (Worthless article: content was: "{{Seealso|Tolkien Gateway:Bots}} This a page where editors can make '''bot requests''' to carry out tedious tasks. To make a request, [{{fullurl:Tolkien G..." (and the only contributor was "[[Special:Contributions/KingArag)
global_05_local_5_shard_00000035_processed.jsonl/24012
Tolkien Gateway Angle (Eriador) Physical Description LocationBetween the Hoarwell and Loudwater, south of the Trollshaws RealmsArnor, Rhudaur DescriptionTriangular area between two rivers General Information EventsDivision of Arnor Migration of the Stoors The Angle in Eriador was the wedge of land between the rivers of Hoarwell and Loudwater, south of the Trollshaws.[1] [edit] History The Angle was originally part of the realm of Arnor.[2] In T.A. 861, in the division of Arnor,[3] the Angle became part of the kingdom of Rhudaur.[2] The Stoors, a branch of the race of Hobbits, crossed the Misty Mountains westward into Eriador during the middle years of the Third Age. They were said to have emerged from the Redhorn Pass in about 1150, and from there they spread out across the wide lands, settling along their favoured riverways as far south as Tharbad and the Dunland borders. Their most noted settlement, though, was on the more northerly tongue of land - the Angle.[3] The Stoors only remained in the Angle for some two hundred years before they moved on again, but at this point their kind divided. Some travelled west and north, and their descendants eventually merged with the other Hobbits of Bree and the Shire. Others returned across the Misty Mountains and travelled back down into the Vales of Anduin.[3] By the later centuries, when Aragorn and the Hobbits passed by the Trollshaws, the area probably had been deserted.[4][5] [edit] References 5. Robert Foster, The Complete Guide to Middle-earth, entry "Angle"
global_05_local_5_shard_00000035_processed.jsonl/24013
Tolkien Gateway Daniel Govar - Gloin.jpg Biographical Information LocationThorin's Halls Lonely Mountain AffiliationThorin and Company LanguageKhuzdul and Westron BirthT.A. 2783 DeathFo.A. 15 (aged 253) HouseHouse of Durin Physical Description Hair colorLong, white, forked beard[1] ClothingWhite hood, snow-white clothes[1] chain of silver and diamonds[1] silver belt[1] GalleryImages of Glóin The Fellowship of the Ring, Many Meetings Glóin (T.A. 2783Fo.A. 15, aged 253 years), was a dwarf of Durin's Folk, the son of Gróin, the brother of Óin, and the father of Gimli of the Fellowship of the Ring.[2] He is most famous as one of Thorin's companions on the quest to Erebor. [edit] History [edit] Youth Glóin was likely born in Dunland, where the Dwarves of Durin's Line dwelt in exile[2] after their expulsion from Erebor by Smaug in T.A. 2770.[3] Glóin was present at the Battle of Azanulbizar,[2] which was odd because Dwarves were considered to be mere striplings in their thirties, yet at the time (2799[3]) Glóin was but 16. After the war Glóin returned to Dunland with the followers of Thorin, who then removed to the Ered Luin.[2] [edit] Life in Thorin's halls [edit] The Quest of Erebor On their quest Glóin was quite useful, especially at making fires, although on the night the company met the trolls he and his brother failed to start one and began to fight.[6] On the night when the company came to the glade of the Wargs, Glóin secured a seat in a huge pine tree.[7] At Beorn's home Glóin and Óin were the fifth pair of Dwarves to appear as Gandalf spun their tale.[8] And when released from his barrel near Esgaroth Glóin was one of the Dwarves who was waterlogged and seemed but half alive, and needed to be carried ashore.[9] [edit] War of the Ring In October T.A. 3018[11] Glóin and his son Gimli were sent by Dáin Ironfoot to Rivendell to seek advice concerning the fate of Balin's Colony in Moria. When Frodo Baggins recovered from his wounds and attended the feast, it was Glóin who sat next to him and gave him the news from Erebor and surrounding lands since the time of Bilbo.[1] Later, at the Council of Elrond, Glóin spoke of the shadow that had fallen upon his people and of the sinister messenger from Mordor who had come to inquire about Hobbits and where they dwelt.[12] Glóin's greatest contribution to the War of the Ring was his son Gimli, who joined the Fellowship of the Ring.[13] [edit] Etymology [edit] Genealogy Náin II 2338 - 2585 Dáin I 2440 - 2589 2450 - 2711 2542 - 2790 2560 - 2803 Thráin II 2644 - 2850 2662 - 2799 2671 - 2923 2746 - 2941 2763 - 2994 2772 - Fo.A. 91 2774 - 2994 2783 - Fo.A. 15 2879 - Fo.A. 120+ [edit] Other versions of the legendarium [edit] Portrayal in adaptations Glóin in adaptations [edit] Films 1966: The Hobbit (1966 film): 1977: The Hobbit (1977 film): Glóin is one of the minor Dwarves, voiced by Jack DeLeon. As in the book, he has little lines other than the usual grunts; he only ever speaks in unison with the other Dwarves. He is, however, the only known of the six members of the Company who survived the Battle of Five Armies in this film, as he is seen pulling Thorin's bed sheet over him after he dies.[17] 1978: The Lord of the Rings (1978 film): On a Decipher Card, Glóin is identified as the white-haired Dwarf who enters Rivendell with Gimli, but he is not present at the Council of Elrond. 2012-14: The Hobbit (film series): Glóin is played by Peter Hambleton.[18] A description of Glóin in The Hobbit films was released by the studio: Warner Bros.[19] [edit] Radio series 1968: The Hobbit (1968 radio series): Peter Baldwin plays Glóin. [edit] Games 1982: The Hobbit (1982 video game): Glóin is omitted; Thorin is the only companion of the player, Bilbo Baggins.[20] 2003: The Hobbit (2003 video game): 2007: The Lord of the Rings Online: [edit] See also [edit] References 17. The Hobbit (1977 film), "Farewell, Thorin" Members of Thorin and Company
global_05_local_5_shard_00000035_processed.jsonl/24014
Tolkien Gateway The Council of the North The Council of the North is a concept which has only appeared in an adaptation of the works of J.R.R. Tolkien. Shadows of Angmar books (Bree-landEred Luin) Book I: Stirrings in the Darkness Book II: The Red Maid Book III: The Council of the North Book IV: Chasing Shadows Book V: The Last Refuge Book VI: Fires in the North Book VII: The Hidden Hope Book VIII: The Scourge of the North Book IX: Shores of Evendim Book X: The City of Kings Book XI: Prisoner of the Free Peoples Book XII: The Ashen Wastes Book XIII: Doom of the Last-King Book XIV: The Ring-forges of Eregion Book XV: Daughter of Strife Epilogue: Laerdan's Parcel The Council of the North is the third book of The Lord of the Rings Online: Shadows of Angmar. [edit] Summary [edit] Foreword: Fires in the North [edit] Chapter 1: Ranger of the Fields [edit] Chapter 2: The Gates of Fornost [edit] Chapter 3: Fallen Once More [edit] Chapter 4: Freeing Dori [edit] Chapter 5: Tending the Glade [edit] Chapter 6: The Defence of Trestlebridge [edit] Chapter 7: The Council Assembled [edit] Comparison with Published Works
global_05_local_5_shard_00000035_processed.jsonl/24059
View Single Post Old 01-27-2013, 12:50 PM   #9 Join Date: Feb 2011 Posts: 6,281 Well of course the acceleration is greatest short before contact. however that doesn't mean players first swing slowly and then accelerate gradually. the reason for the late and steep incline of the velocity curve is that the final stages of the kinematic chain fire quite late in the swing. and just like a whip because those links are the lightest in the chain they also create the most speed. earlier in the swing you accelerate just as hard, however at this point the slower and bigger (but stronger) parts of the body are doing the job. in that phase not much speed is generated but a lot of the energy needed for the final parts of the chain. dominikk1985 is offline   Reply With Quote
global_05_local_5_shard_00000035_processed.jsonl/24063
Language Selection English French German Italian Portuguese Spanish Filed under The developers plan to integrate the various device-specific desktop interfaces (Plasma Desktop, Plasma Netbook, Plasma Active for touch devices, Plasma Mediacenter) into a workspace shell that can switch workspaces and behaviours via "shell packages". Packages will be available dynamically for selection at runtime, for example allowing the Plasma workspace to transform from a touch-optimised user interface into a classic desktop when a keyboard and mouse are connected to a tablet. more here or here
global_05_local_5_shard_00000035_processed.jsonl/24065
Top Shows Contact ONE News The Magic Of Reality: Book review By's Chris Hooper Published: 9:54AM Wednesday January 04, 2012 The subtitle for this book is How We Know What's Really True, but it could easily have been Why Your Childhood Is A Lie, or Destroying Disney Films & Everything You've Ever Dreamed. That's unfair. Let me backtrack - Richard Dawkins has written another book aimed at dispelling the myth of religion (as he sees it); but this is the first one aimed for parents and children as bedtime reading. Each chapter subject poses a tantalising question like "What is magic?" or "Who was the first person?" which he attempts to answer using science - and it's a fascinating journey. Especially for adults like me who are supposed to know all this stuff, but for whatever reason were more interested in made up stories than boring old truth at school.  But child readers be warned: prepare to have your favourite stories picked apart and trampled on as Richard goes to great lengths to point out what is and isn't possible in the realm of reality, taking a chainsaw to the world of fairytales and religion. There's one chapter that goes to great pains to explain why a fairy godmother could never turn a pumpkin into a coach. Ever. Thanks Dawkins. I found it hard to imagine a modern child who wouldn't think his tone was a little old-fashioned; it comes over a bit "jolly hockey sticks and lashings of ginger beer". As he tries to simplify his language, it feels awkward; it's like a clever, posh uncle who's been left alone to entertain a blinking 12-year-old boy who really just wants to run around and smash stuff up. But there's a really pure-hearted aim underlying the book: giving the natural world some kudos for being beautiful and perplexing, miraculous and awesome (in the true sense of the word) in and of itself. And ultimately, it sends the brain racing in other directions as you try to imagine the very, very big and the impossibly tiny - things that are all around us and no less magnificent than what we've imagined in the last millennium's back catalogue of myths. The Magic Of Reality by Richard Dawkins Available: Now Publisher: Random House
global_05_local_5_shard_00000035_processed.jsonl/24067
Whenever a character becomes upset at another character in a comedy, they'll usually lock themselves in the bathroom. Alternately, a character may lock themselves in the bathroom while being pursued to "escape" from their pursuers. The other characters will usually try [[DiscussionThroughTheDoor negotiating with them to convince them to come out]]. Things usually get interesting if another character needs to use the bathroom. In RealLife, the latter case is unlikely to offer the pursuee any protection depending on the reason he's being chased. Bathroom doors aren't meant to be much of a physical barrier and can be broken down with very little force. Plus, home bathroom doors usually have locks ''designed'' to be defeatable from the outside, by use of a small screwdriver, to prevent locking oneself out of the room. But on TV, the bathroom door is an impenetrable barricade. Once that door is closed, it can only be opened from the inside. In a less dire case, such as a child having a tantrum, an effective solution would be to leave the upset individual alone and they'll get bored and come out eventually. Opening the door with an [[SkeletonKeyCard expired credit or gift card]] could also work if a more immediate solution is desired. But banging loudly on the door and shouting is way more fun! [[folder: Advertising ]] * One promotional {{NASCAR}} on ESPN commercial in 2011 says Jimmie Johnson will do ''anything'' to win. [[http://www.youtube.com/watch?v=puPegYzK9Vc He'll even lock Kasey Kahne in the port-a-potty]], [[CrowningMomentOfFunny and then go eat a steak sandwich]]. [[folder: Anime/Manga ]] * In a chapter of the ''KeroroGunsou'' manga, Keroro locks himself in the toilet to escape the wrath of Natsumi for messing with her favorite shirt. * ''Manga/{{Hiyokoi}}'': It happens in the OVA during a sad panty shot incident during class. She (Hiyorin) felt so sad and embarrassed that she ran into the washroom. The poor girl! [[folder: Fan Fic ]] * ''FanFic/{{Override}}'': Kamui tries to get Aichi to come out on a ClosedDoorRapport after losing to Minami in the Chapter 7. [[folder: Films ]] * ''WesternAnimation/TheIronGiant'': Hogarth hides the giant's lost hand in the bathroom from his mother and Kent. After he gets it out the window, he pretends to be in the toilet when Mom and Kent force open the door. * In ''Film/TheRoom'', Johnny locks himself in the bathroom after his birthday party when he discovers his girlfriend and best friend have been having an affair. * In NeilSimon's ''Film/PlazaSuite'', a bride with cold feet locks herself in the hotel bathroom on her wedding day. * In ''The Kid, TheMusical'' of the book by Dan Savage, the song "Terry..." is an attempt to coax Terry out of the bathroom after a fight. * In a cross between this and LockedInARoom, in ''Film/CantHardlyWait'' Kenny (Creator/SethGreen) and Denise (Lauren Ambrose) lock themselves in the upstairs bathroom...and can't get out because the door's broken. * ''Film/TheShining'': Wendy locks herself in the bathroom to hide from the now (literally!) AxCrazy Jack. The lock holds. The door doesn't. * ''Film/GoingOverboard'': Dickie Diamond locks himself in a bathroom because he felt like he's going to puke. After that, he just stays there locked, but later on, the door opens and Dickie is so happy to reclaim his job as a comedian. [[folder: Lets Play ]] * ''LetsPlay/DeliciousCinnamon'': The gang theorizes that Dubz accidentally locked himself in Bert's bathroom during the Paper Mario stream. [[folder: Literature ]] * In the ''Literature/VorkosiganSaga'' novel ''Komarr'', Nikki locks himself in the bathroom and refuses to go to school the morning after he learns that he's a mutant; Miles ends up talking him out. * ''Literature/JunieBJones'': In ''Yucky Blucky Fruitcake'', Junie B. locks herself in the bathroom to pretend throwing sponges at her principal at the school's carnival. She actually throws them at the toilet, but then they get stuck in the drain, causing the toilet to flood the bathroom by accident. [[folder: Live Action TV ]] * ''Series/LeaveItToBeaver'': The first-season episode "Child Care" sees a 4-year-old girl that Beaver and Wally are supposed to be watching lock herself in the bathroom. After an attempt by Beaver to have a friend try to unlock the door fails, they resort to calling the fire department. Wally and June learn about this and the boys eventually explain things (they held off for fear they might not get to babysit again), and the folks are mighty impressed things went so well. * ''Series/FullHouse'': The Season 3 episode "The Greatest Birthday on Earth" sees Jesse, Stephanie and Michelle accidentally get locked in a gas station bathroom while on the way home for Michelle's third birthday party. "No more happy birthday to me?" Michelle asks when she realizes they might be trapped awhile. * In ''ThreesCompany'', Jack's date locks herself in the bathroom while Jack is having a food critic over for dinner. Mr. Furley, the landlord, arrives, announces himself as the manager of the building and demands that she open the door. When she refuses, Mr. Furley attempts to unlock the door with his [[SkeletonKeyCard credit card]], which she takes when he pushes it through the crack. * In the ''Series/{{Monk}}'' episode "Mr. Monk Gets Cabin Fever," Stottlemeyer uses a set of handcuffs to lock Agent Grooms in the witness protection cabin's bathroom so Grooms cannot interfere while Monk, Natalie and Stottlemeyer leave to investigate a potential murder. * ''Series/{{Supernatural}}'': In [[Recap/SupernaturalS05E20TheDevilYouKnow "The Devil You Know"]], Sam does this to Dean so he can slice on Brady. * In Danish series ''Series/{{Klovn}}'', when Frank by accident doodles on Mia's croquis drawings, she gets unusually upset and locks herself into the bathroom. Frank [[LampshadeHanging lampshades it]] by saying that [[AluminiumChristmasTrees he didn't know women may actually lock themselves into the bathroom in real life when they are upset]]. [[folder: Newspaper Comics ]] * In one ''ComicStrip/CalvinAndHobbes'' strip, Calvin takes Rosalyn's science notes when she is babysitting him and locks himself in the bathroom with them, threatening to flush them down the toilet. [[spoiler:Rosalyn ignores Calvin for a while and, thinking she has gone to call the fire department to axe open the door, he comes out to see the fire trucks.]] * Lizzie locked herself in the bathroom once in ''ForBetterOrForWorse'' when she was very young. [[folder: Pinball ]] * In ''Pinball/RedAndTedsRoadShow'', the trip to Atlanta is delayed when a worker gets trapped in a porta-potty. Red and Ted help blast him out with explosives. -->''***BOOM!***'' '''Ted:''' "See, that didn't hurt a bit." [[folder: Western Animation ]] * In one episode of ''WesternAnimation/TheAmazingWorldOfGumball'', Gumball and Darwin literally get locked in the school bathroom. They decide to tell each other a secret they'd been keeping, but they're rescued by the janitor before Dawin can tell his. Gumball spends the rest of the episode being driven crazy by not knowing the secret, until Darwin tells him that he was only going to tell him because it looked like they were going to die. So, Gumball locks them in the bathroom again, only to find out that the secret Darwin had been keeping was that he didn't like some food Gumball made. They get out this time by flushing themselves down the toilet, arguing the whole way, finally ending by angrily yelling that they love each other. * ''WesternAnimation/FetchWithRuffRuffman'': Happens to Ruff, Blossom and Chet in a Season 3 episode where Ruff's cousin, Roxie, lets a giant herd of sheep burst into the doghouse and stay[[note]]Ruff assumed he was only taking care of one sheep instead of a humongous herd[[/note]]. This trope lasts for the majority of the episode.
global_05_local_5_shard_00000035_processed.jsonl/24068
Tan Lines occur when the human body gets tanned in areas of exposed skin but the places previously covered during the tan look noticeably lighter. They are usually seen as a way to make a character look funny after a bad or flawed tan job. Other forms include the farmer's tan (face, neck, and both arms, from being out in the field while wearing a T-shirt or overalls) and the trucker's tan (face and one arm, from the sun shining through the windshield on the face, but with the pale arm inside the cab and the tan arm out the window). There are some who find tan lines, especially if the contrast is strong, to have an erotic edge, though tan lines rarely seem to be used much for Fanservice. See also EmbarrassinglyPainfulSunburn and SuntanStencil. * The girl on the Coppertone suntan lotion bottle has a white butt but tan everywhere else. * A man on the "Bud Light Cruise" commercial has tan lines that indicate he'd been wearing a woman's bikini. [[folder:Anime & Manga]] * In the obligatory BeachEpisode of ''Anime/TenchiUniverse'', Kiyone develops a classic farmers tan while working as a life-guard. When she shows off her swimsuit at the swimsuit contest later in the episode, she's initially embarrassed by the farmers tan -- until the crowd goes wild, all of them finding it sexy. * Kagura of ''Manga/AzumangaDaioh'', during the summer arcs (she's on the swim team and wears a one-piece for the rest of the year, so it shows up when she wears a bikini; she also shows Osaka, but not us). * Chika from ''Manga/AiYoriAoshi'' normally lives at the beach, so she has them following the bathing suit area. * ''Manga/KOn'': This happens to Azusa everytime there's a BeachEpisode. It's [[LampshadeHanging lampshaded]] by every one. * Momo from ''Anime/PeachGirl'' got tan lines along with her bleached out hair from swimming for school. * After returning for the beach during an episode of ''Manga/{{Beelzebub}}'', Oga admires the nice tan he got... only for him to discover the Beel-shaped tanline on his back. * ''Anime/RioRainbowGate'': Linda has tan lines around her chest that are displayed by her skimpy top. Given that she's a RidiculouslyHumanRobot [[RobotGirl Girl]], one can only presume that they were deliberately designed to be there. * Ryoko Tachi in ''Manga/NanaToKaoru'' [[folder:Comic Books]] * In part of the recent ''ComicBook/{{X-Men}}'' "Curse of the Mutants" storyline, the technology protecting the vampires from sunlight apparently also protects them from Dazzler's powers. We see a flashback of Emma Frost talking to her, Frost admonishing Dazzler for having given her tan lines. [[folder:Films -- Animation]] * That fat man who constantly loses his ice cream cone every single time in ''Disney/LiloAndStitch''. * The guards on the island in ''WesternAnimation/TheIncredibles'' have tan lines visible on their faces when their visors get knocked off. [[folder:Films -- Live-Action]] * In ''Film/PoliceAcademy 5: Assignment Miami Beach'', Harris is tanning on the beach. Nick writes "DORK" in sunblock on his chest. When he wakes up and walks on the crowded beach, HilarityEnsues. * In ''Spencer's Mountain'', Clayboy goes up the mountain with his girl-friend for a picnic, and comes back with a sunburn on his back. His father helps him put lotion on the burn, which goes much further down past his waist line than it would have if he had kept his pants on. * In John Waters' Film/CryBaby, a character "tans" the initials CB into her thigh. The letters are the white part she covers with tape and then tears off to show him. * In ''Film/FinalDestination3'', when Ashley and Ashlyn are getting into the tanning beds, Ashlyn questions why Ashley is still wearing underwear. Ashley replies that her boyfriend [[FetishFuel "gets off on tan lines."]] * In ''Film/BlameItOnRio,'' the topless extras at the beach mostly have tan lines, thus showing that they aren't usually topless. * BloodyJack in ''Rapture of the Deep'' PirateGirl/heroine "Bloody" Jacky Faber has these from her rather anachronistic bathing suit (In a series set during the NapoleonicWars) Her intended cannot help but comment. [[folder:Live Action TV]] * Detective shows like ''Series/{{Sherlock}}'' will often use tan lines as clues. For instance, in the ''Sherlock'' serial "[[Recap/SherlockS01E03TheGreatGame The Great Game,]]" Sherlock deduces that a rental car agency owner is lying about not having been to Colombia recently because of his tan. * An episode of ''Series/CSIMiami'' uses Greek letters tanned onto the back of a victim's neck as a clue. * Mentioned in the chorus of Kenny Chesney's "She Thinks My Tractor's Sexy". [[folder:Print Media]] * There's a classic ''Magazine/{{MAD}}'' cover where two boys are showering and have the usual tan from swimming, i.e., white butt and tanned everywhere else. Alfred E. Neuman's tan, however, is reversed. ** Another Magazine/{{MAD}} article of one and two panel [[BeachEpisode Beach Gags]] included two young boys rigging a glove on a stick to give an older girl an embarrassing untanned handprint in the middle of her back. * TheOnion had a picture showing a woman with tan lines zigzagging over her body in nonsensical patterns. The online version is linked in the WebOriginal section below. [[folder:Video Games]] * [[http://bulbapedia.bulbagarden.net/wiki/File:Black_2_White_2_Marlon.png Gym Leader Marlon]] in ''VideoGame/PokemonBlack2AndWhite2'' is very tan above the waist, and very pale below. So much so, in fact, that the average new player will actually believe him to be black until his pale feet are pointed out. * Homura from ''VideoGame/SenranKagura'' has these as a signature look. Because they are formed around a ''{{sarashi}}'', you have to use bit more skimpier underwear to fully see them. [[folder:Web Animation]] * Strong Bad in the Strong Bad Email "suntan" from ''WebAnimation/HomestarRunner''. [[folder:Web Comics]] * It is possible for milk teeth to get burnt as ''Webcomic/MyMilkToof'' proved in the BeachEpisode. * A strip from ''ComicStrip/ThePerryBibleFellowship'' shows a guy getting a white silhouette of his secret girlfriend where she's blocked him from getting tanned. I think you know where I'm talking about. * [[http://www.lukesurl.com/archives/1534 A strip]] of ''Luke Surl'' has tan lines shaped like mathematic curves. * The subject of [[http://buttersafe.com/2007/11/27/shirt-tan/ a comic ]] from ''Webcomic/{{Buttersafe}}''. * When Webcomic/{{Spinnerette}} got a tanline around her mask, her roommate Sahira initally laughs at the panic the former was undergoing, until it's pointed out that this would undermine her SecretIdentity. Sahira then offers to help her with using makeup to cover it. * In the BDSM-themed ''Webcomic/{{Sunstone}}'' this appears in the most embarrassing way possible: Lisa visits the beach only to notice everyone is staring at her. She discovers that she has tan lines from her previous rope suspension session with Ally. ''Including lines left from a gag.'' Poor girl. [[folder:Web Original]] * In ''Literature/TheSagaOfTuck'' the protagonist ends up with some nice tan lines caused by strappy swimsuit. "He" has to go to lengths not to let others see them. * ''Website/CollegeHumor'' [[http://www.collegehumor.com/article:1735099 presents a few other variations]]... * From ''TheOnion'', "[[http://www.theonion.com/articles/womans-tan-lines-dont-make-any-sense,9547/ Woman's Tan Lines Don't Make Any Sense]]" * Other Girl-sempai/Sunglasses from the ''WebOriginal/{{Creamsicle}}'' [[MemeticMutation internet meme]] has tan lines around her crotch. [[folder:Western Animation]] * ''WesternAnimation/KingOfTheHill'' is notorious for having almost all the white male characters having untanned portions of skin when they take off their shirts. Boomhauer, on the other hand, consistently has a dark tan (he has a tanning bed in his bedroom). * In ''WesternAnimation/RocketPower'', former new guy Sam had one when he moved to Ocean Shores, even though his body should have evened out by now. * In the episode ''[[WesternAnimation/DannyPhantom "Eye for an Eye"]]'', we learn Danny has these when Vlad's vultures reveal a naked, showering Danny to the entire school. --> '''Tucker''': A ghost kid with tan lines, who knew? * Owen and Harold from ''WesternAnimation/TotalDramaIsland'' have tanned arms, legs and face, but has pale upper arms and stomach. Ezekiel has much of the same, except his legs are pale. * Hawkeye from ''WesternAnimation/AvengersEarthsMightiestHeroes'', has a farmer's tan while he sits out in the sun in episode 20. That episode marked the first time in the show when he wore something ''other'' than his superhero costume. * Howie, the lead character of ''WesternAnimation/AlmostNakedAnimals'', combines this with FurIsClothing. Like the entire cast, he wears only underwear and has most of his fur shaved off, but there are tan lines on his bare skin. * Eddy from ''WesternAnimation/EdEddNEddy'' has tan lines around his eyes. * On ''WesternAnimation/StevenUniverse,'' Greg is a weird example: he usually wears a tank top, which reveals the kind of farmer's tan that comes from wearing a T-shirt. Also, when barefoot, you can see tan lines in the shape of his sandals. * On ''DanVs,'' the already sallow [[JerkWithAHeartOfGold Dan]] is basically white under his shirt and pants. [[folder:Real Life]] * In the early 1950s, a [[http://www.gettyimages.co.uk/detail/news-photo/people-oddities-pic-circa-1946-syria-the-syrian-gazelle-boy-news-photo/80752184 story began to circulate]] about a boy in Syria who had allegedly been [[WildChild raised by gazelles]]. The story was debunked partly because photos of the nude boy showed him with a farmer's tan. * Movie critics and commentators will often point out the common mistake of actors and actresses forgetting to get rid of their tan lines before appearing in a role where these would be improbable, like bikini tan lines on a character from Ancient Greece or Rome. ** Although the Romans did have a bikini-like set of garments that appear in surviving frescos and wall paintings. It took the form of what might be called a bandeau top with a minimal modesty-covering loincloth. ** This can be seen midway through ''GangsOfNewYork''. When Bill the Butcher is seen lying with a nearly naked prostitute, the character has a thong-underwear tan line in a story set in the 1860s. Thong underwear didn't become available until the 1980s. ** Also seen in the 1983 film The Wicked Lady, which is set in medieval England; one scene shows a young woman with 'French bikini' tan lines. * Partial tanning on otherwise clothed people explains the derogatory term for dirt farmers - in pre-Civil War times, poor white farmers who couldn't afford even a single slave and so had to do their own heavy labour. Bending over a plough or to pick/tend crops caused sunburn on the back of the neck - hence ''redneck''. (''Rooinecker'' in South Africa, for those whites who could not afford to pay black labour).
global_05_local_5_shard_00000035_processed.jsonl/24069
Analysis: Mixed Myth Inexact title. See the list below. We don't have an article named Analysis/MixedMyth, exactly. We do have: If you meant one of those, just click and go. If you want to start a Analysis/MixedMyth page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those.
global_05_local_5_shard_00000035_processed.jsonl/24070
Analysis: Morality Dial Inexact title. See the list below. We don't have an article named Analysis/MoralityDial, exactly. We do have: If you meant one of those, just click and go. If you want to start a Analysis/MoralityDial page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those.
global_05_local_5_shard_00000035_processed.jsonl/24071
Awesome: Alphaman Inexact title. See the list below. We don't have an article named Awesome/Alphaman, exactly. We do have: If you meant one of those, just click and go. If you want to start a Awesome/Alphaman page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those.
global_05_local_5_shard_00000035_processed.jsonl/24072
Awesome: Halloween (2007) • Michael's escape in either both the normal cut or in the Director's Cut. • In the normal cut, he breaks out during his prison transfer, killing the several guards transferring him, just using his brute strength and the chains on him. • However, in the Director's Cut two orderlies pick a female inmate to rape and decide to do it inside Michael's room, while the killer is there, making his masks. But one of them takes one of his masks and mocks him during the rape, a cathartic curb stomp ensues. • What makes the Director's Cut version more awesome is that Michael is shown in this and Halloween II (2009) to be a merciless killer, killing anyone who gets in his way of escape (Case in point, Ismael Cruz's death, even know Ismael was the most kind to him and tried to put him back kindly, only to get dunked in the toilet mutliple times and a TV dropped on his head.), but it's the fact that after killing the two orderlies brutally, he doesn't even attempt to hurt the female inmate. Kinda somewhat doubles as a... somewhat twisted Pet The Dog moment. • To be fair that Cruz warned that man not to touch Myers' masks. And the female inmate did nothing to provoke him. Whilst Cruz tried to lock him back up.
global_05_local_5_shard_00000035_processed.jsonl/24074
'''[=George MacDonald=]''' was a Victorian era Scottish writer chiefly known for his fantasy works, which were read by such authors as Creator/GKChesterton, Creator/JRRTolkien, and Creator/CSLewis. They include ''Literature/AtTheBackOfTheNorthWind'', ''Literature/{{Lilith}}'', ''Literature/{{Phantastes}}'', ''Literature/ThePrincessAndTheGoblin'', ''Literature/ThePrincessAndCurdie'', and ''Literature/TheLightPrincess''. He also wrote a fair number of non-fantasy works, primarily concerned with romance, suffering and adventure in [[UsefulNotes/{{Scotland}} the Highlands]], which are generally passed over [[TastesLikeDiabetes for some reason.]] Other writers who [[SincerestFormOfFlattery cited [=MacDonald=] as an influence]] include Creator/WHAuden, Roger Lancelyn Green, Creator/MadeleineLEngle, Creator/ENesbit, and Elizabeth Yates. Essentially, he's the grandfather of nearly the entire modern genre of {{fantasy}}. Appropriately enough, he sported a pretty impressive WizardBeard. He is not Creator/GeorgeMacDonaldFraser. !!Works by [=George MacDonald=] with their own trope pages include: * ''Literature/TheLightPrincess'' * ''Literature/ThePrincessAndTheGoblin'' !!His other works provide examples of: * AnAesop: Often to the level of WriterOnBoard (see below). * AerithAndBob: Irene and ... Curdie? * BittersweetEnding: [[strike: Frequently]] ''Always''. * ChildrenAreInnocent * CoolOldLady: Fairy grandmothers often appear, and are always awesome. * DeadGuyJunior * {{Determinator}}: Many of his child characters, especially the virtuous ones. Occasionally crosses over into BadassAdorable. * DiedHappilyEverAfter * DiedInYourArmsTonight: ** In one of the stories in ''Phantastes'', Cosmo von Wehrstahl dies in the arms of the Princess von Honenweiess he has released from the mirror she has been enchanted in, but she finds him too late and cradles him as he dies in her arms. ** In ''Lilith'', [[spoiler: Lona dies in her true love's Vane's arms after she's killed by [[LukeIAmYourFather her mother]], Lilith]]. * DirectLineToTheAuthor: [=MacDonald=] includes himself as a character in the last few chapters of ''At the Back of the North Wind'', meeting and befriending the protagonist, who subsequently tells him of the events recounted in the earlier part of the novel. * DontFearTheReaper: The North Wind, in ''At the Back of the North Wind,'' is implied to be an angel of Death, and always treats Diamond with the greatest gentleness. * DreamingTheTruth: In "Port In A Storm" how he finds the port. * EverythingsBetterWithPrincesses * EverythingsBetterWithRainbows: In ''The Golden Key'' * EvilIsDeathlyCold: At first it seems to be played straight, but is ultimately subverted in ''Lilith''. * FairytaleMotifs * FirstNameBasis * FunetikAksent: Just in case you ever forgot you were in Scotland. * GoodIsNotNice: Many of the good characters in ''Lilith'', but especially Mara. * GreatBigLibraryOfEverything: Mentioned in ''Phantastes,'' ''Lilith,'' ''Alec Forbes''... This is a recurring image throughout [=MacDonald's=] fiction, probably inspired by a year [=MacDonald=] spent as a youth cataloging books in a large house in Scotland. ** Such places tend to be more of a MagicalLibrary at heart. * HeldGaze: The supernatural variant of the trope, in which case it fills the two gazers with such longing that they are so consumed with love that they depart from each other and die, being reborn as children. * TheHeroDies * HeroicSacrifice: In ''Phantastes'', a [[{{Tearjerker}} heartrending]] tale is related by the narrator about a man named Cosmo, who loves a princess imprisoned in a mirror, and to release her from her thrall, he shatters the mirror, but it ends up killing him, and he dies in the princess' arms. * IGaveMyWord * IWantMyBelovedToBeHappy: The final conclusion Anodos comes to in Fairyland. * JamesBondage * LittlestCancerPatient: They appear with some regularity in his non-fantasy works, dying of VictorianNovelDisease rather than cancer. (Three of [=MacDonald's=] thirteen children died of tuberculosis.) * LivingShadow: Pops up frequently, notably in ''Phantastes'', and have a story to themselves in "The Shadows." * LoveRedeems: Central to arguably all of [=MacDonald's=] work. * MyGreatestFailure: In ''Phantastes'', the knight in rusty armor atones for being taken in by the Alder-Tree by combating evildoers until every speck of rust is scraped off. * {{Mythopoeia}}: C. S. Lewis cited him as a TropeMaker. * OffingTheOffspring: [[spoiler: Lilith]] in ''Lilith.'' * OrphansOrdeal: ''A Rough Shaking.'' * OurGoblinsAreDifferent * ThePowerOfLove * ThePromise * PurpleProse: The prose in ''Phantastes'' is quite often ornate, but it doesn't detract from the pleasure derived from the perusal of the novel. * UsefulNotes/{{Scotland}}: The setting of many of [=MacDonald's=] non-fantasy novels, as well as the homeland of the author himself. * ShadowArchetype: Appropriately enough, the Shadow in ''Phantastes'' is this to the protagonist. * TheSpeechless: Wee Sir Gibbie in... ''Sir Gibbie.'' * TooGoodForThisSinfulEarth * TheVamp: {{Lilith}} in her eponymous novel, and the Maiden of the Alder-Tree in ''Phantastes''. * WeNamedTheMonkeyJack: Diamond, the protagonist of ''At the Back of the North Wind'', was named after his father's horse. * WhatCouldHaveBeen: [=MacDonald=] once proposed to an American literary friend that they should collaborate on a novel in order to secure copyright on both sides of the Atlantic. The friend's name? MarkTwain. Unfortunately the project never transpired. However, scholars have pointed out some similarities between [=MacDonald's=] ''Sir Gibbie'' and Twain's ''HuckleberryFinn'' and have suggested that they discussed such a story together. [[http://www.george-macdonald.com/resources/mark_twain.html]] * WriterOnBoard: An example that even this [[TropesAreNotBad trope is not bad]]. Creator/CSLewis observed of [=MacDonald's=] non-fantasy novels, "Sometimes they diverge into direct and prolonged preachments which would be intolerable if a man were reading for the story, but which are in fact welcome because the author... is a supreme preacher." !! George [=MacDonald=] in fiction: * Creator/CSLewis was particularly moved after reading ''Phantastes'', and much of Lewis' writing reflect the themes that [=MacDonald=] used. Accordingly, in ''TheGreatDivorce'', Lewis used [=MacDonald=] as a [[TheMentor guiding character]] in the same way that Dante had used Creator/{{Virgil}} in ''Literature/TheDivineComedy''.
global_05_local_5_shard_00000035_processed.jsonl/24075
->''They're not lost in space. They're loose!'' -->-- Tagline for the trailer. '''''Dark Star''''' is a tongue-in-cheek 1974 sci-fi/comedy motion picture directed by Creator/JohnCarpenter (helming his first feature film) and co-written with Dan O'Bannon. ''Dark Star'' was ranked #95 on Rotten Tomatoes' ''Journey Through Sci-Fi''. The film is about the small crew of the titular scout ship, whose job is to destroy unstable planets which might threaten future colonization. Not to be confused with the video game featuring the cast of [[MysteryScienceTheater3000 MST3K]]. !! This movie contains examples of: * BetterThanItSoundsFilm: The plot: Incompetent hippies on a deep space demolition tour dispel their boredom by chasing and deflating a sentient beach ball. Over-confidently, they then enter a debate with a sentient thermo-stellar bomb. * CurseCutShort: The computer automatically censors obscenities in Pinback's diary entries, including gestures. * DramaticSpaceDrifting: The ending. Completely PlayedForLaughs, especially given [[SoundtrackDissonance the music playing at the time]]. * DyingMomentOfAwesome: Surfing into a planet's atmosphere on a piece of debris has to count. * EpicFail: Doolittle's attempt to stop the bomb from detonating. * FromBadToWorse: In a diary entry, a very pissed off Doolittle mentions that a malfunction just destroyed the ship's entire supply of toilet paper. * GeorgeLucasAlteredVersion: This movie was originally a 68-minute student short film. When it was acquired for distribution, new footage was added by the producer. Later, John Carpenter and Dan O'Bannon re-edited the film into a "director's cut", removing much of the footage shot for the theatrical release and adding new special effects. * AGodAmI: [[spoiler:Doolittle succeeds at convincing Bomb #20 that its external sensory data is a lie and it itself is the only thing it can be sure exists, in a desperate gambit to make the bomb disregard an order to detonate while still attached to the ship.]] Unfortunately, the character in question uses this new 'insight' to become a solipsist and eventually decides that, in the absence of anything else having any proof of existence, this means it is, in fact, God. And God said "let there be light"... And there was light... * IrrevocableOrder: The bomb that refuses to drop from the bomb bay cannot be shut off. * KillerRabbit: "When I brought you on this ship, I thought you were cute." A living HappyFunBall. * KillEmAll: Did you read the description? It's mostly played for laughs. * LogicBomb: "Let there be light." * MikeNelsonDestroyerOfWorlds: The entire crew. * OhCrap: The crew, especially Pinback, when the just activated Bomb No. 20 fails to deploy. -->'''Pinback:''' Mark at 5, 4, 3, 2, 1, DROP! ''DROP! DROOOOOP!'' ** And when the bomb reasons that it's God and starts quoting Genesis. -->'''Pinback:''' Hey...bomb? * PluckyComicRelief: Pinback and Bomb No. 20. * RidiculouslyHumanRobots: The intelligent bombs. Especially Bomb No. 20. * ShaggyDogStory: Four idiots hang around a ship in the arse-ends of space, doing a meaningless construction job none of them wants to do, and get on each others' nerves. The ship breaks down because none of them bother to do any maintenance. Then the ship blows up. PlayedForLaughs. * ShoutOut: ** The ending was inspired by the ending of Creator/RayBradbury's short story ''Kaleidoscope''. ** Guess where indie band Pinback got their name from? ** The character Pinbacker from Danny Boyle's film ''{{Film/Sunshine}}'' is (somewhat) named after Pinback, [[WordOfGod as confirmed by Boyle himself]]. ** One piece of debris in the end is labeled {{Film/THX1138}}. It also appears to be part of [[TakeThat a toilet]]... * SoundtrackDissonance: The title theme is the country/western/Special Theory of Relativity song "Benson, Arizona". ** ...or perhaps it's not as dissonant as it first seems: Carpenter described the crew as "space truckers" and felt that a sad country and western song about missing loved ones would therefore be perfect for them. * SpaceDoesNotWorkThatWay: While the ''Dark Star'' does not make noise in space, it does stop on a dime...intentional use of the RuleOfFunny. * SpaceIsNoisy: Mostly averted...one of the few movies to get it right, at least as far as ships go. However, explosions are another matter...and apparently in space you CAN hear someone scream.... * SpaceMadness: Played completely for laughs. The entire crew has gone visibly unhinged from five years stuck inside cramped space, performing a thankless job that nobody wants and having nothing to do. * StarfishAlien: The alien the crew encounters looks like a beach ball with eyes and feet. it's also filled with gas. * TakeThat: A computer screen flashes "FUCK YOU HARRIS" in one scene. Carpenter feuded with producer Jack Harris. * UsedFuture: Taken to the extreme. Quite possibly also the TropeCodifier, predating its later uses in StarWars and Film/{{Alien}}, both of which co-writer Dan O'Bannon was involved with (special effects in the former and writing the original script for the latter, which was heavily reworked from this film after it failed at the box office). * {{Zeerust}}: The reel to reel computers in the opening communication from Mission Base. ** Well, he did say there'd been some budget cuts...
global_05_local_5_shard_00000035_processed.jsonl/24076
Film: Zoom: Academy for Superheroes Zoom: Academy for Superheroes (more commonly known as Zoom) is the story of Jack Shepard (Tim Allen), formerly Captain Zoom of the superhero group Team Zenith. Years ago, an attempt to boost the powers of Jack and his brother Conner (Concussion) resulted in Conner going mad, killing his teammates, and being exiled into a dimensional vortex by Zoom. Thirty years later, a retired Shepard is called in to train a group of super-powered youngsters, at Area 52. Unbeknownst to him, the real purpose of their training is so they can battle Concussion, who is on the brink of returning to his home dimension. The film is loosely based on the Zoom's Academy children's book series. Zoom: Academy for Superheroes provides examples of the following tropes:
global_05_local_5_shard_00000035_processed.jsonl/24077
Heartwarming: Becoming A Better Writer Inexact title. See the list below. We don't have an article named Heartwarming/BecomingABetterWriter, exactly. We do have: If you meant one of those, just click and go. If you want to start a Heartwarming/BecomingABetterWriter page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those.
global_05_local_5_shard_00000035_processed.jsonl/24078
Heartwarming: Count And Countess Inexact title. See the list below. We don't have an article named Heartwarming/CountAndCountess, exactly. We do have: If you meant one of those, just click and go. If you want to start a Heartwarming/CountAndCountess page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those.
global_05_local_5_shard_00000035_processed.jsonl/24080
Marine Express Inexact title. See the list below. We don't have an article named Main/MarineExpress, exactly. We do have: If you meant one of those, just click and go. If you want to start a Main/MarineExpress page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those.
global_05_local_5_shard_00000035_processed.jsonl/24082
'''Basic Trope''': That one teacher who ''loves'' to oppress and humiliate their own students. * '''Straight''': Teacher Stan regularly ridicules his students. * '''Exaggerated''': Teacher Stan ''outright tortures'' his own students. * '''Downplayed''': ** Teacher Stan is a jackass, but he's only targeting one student. ** Teacher Stan is a jackass, but that's because some students grate on his nerves, albeit [[DisproportionateRetribution disproportionately]]. * '''Justified''': ** Teacher Stan has a FreudianExcuse (such as being bullied when he was a student) which the students he teaches touch on, prompting him to treat them poorly as 'revenge' for his own mistreatment. ** Teacher Stan believes that making them feel miserable is what molding them and shaping them better students. * '''Inverted''': ** Teacher Stan is actually a fairly good and kind teacher. ** All the students are horribly mean to their teacher. ** CoolTeacher * '''Subverted''': Teacher Stan is a jackass, [[JerkWithAHeartOfGold but only has his students best interests in mind]]. * '''Double Subverted''': [[JerkWithAHeartOfJerk It's a front]]. * '''Parodied''': ** Teacher Stan is a blatant rip-off of [[Franchise/{{Saw}} Jigsaw]], who straps his students to intricate and overtly cruel torture devices which activate if they score a less than optimal grade in their assignments. And, OF COURSE, he does it under the pretense that it is [[InsaneTrollLogic to teach them a lesson and make them appreciate learning]]. ** Alice, who teaches [[EverybodyHatesMath maths]] is a {{Dominatrix}} whose students fear wronging her, for the punishments she's said to inflict. Except [[AllMenArePerverts for]] [[AllWomenAreLustful a]] [[EvenTheGirlsWantHer few]] who love every minute of it. * '''Zig Zagged''': Teacher Stan's anger and hatred of his students varies between writers. * '''Averted''': Teacher Stan has no sadistic tendencies and is, at worst, a SternTeacher. * '''Enforced''': ??? * '''Lampshaded''': "Shouldn't this guy have been fired by now?" * '''Invoked''': ??? * '''Exploited''': ??? * '''Defied''': Teacher Stan has a lot of pent up anger, but refuses to take it out on his students because he knows they don't deserve it. * '''Discussed''': ??? * '''Conversed''': ??? * '''Deconstructed''': ** Teacher Stan's activities are discovered, and he's fired for it. ** Teacher Stan's students are too resentful of him to actually listen to what he says, especially since half or more of it is just flat-out abuse. As a result of having a teacher more interested in emotional abuse than actually ''educating'', none of the students ''learn'' anything, and since Stan grades rather unforgivingly, most of his students fail the class. Since he's proven to be ineffectual as a teacher, Stan gets fired. Back to SadistTeacher
global_05_local_5_shard_00000035_processed.jsonl/24083
Recap: The West Wing S 01 E 03 A Proportional Response As Josh is walking into the work area, Donna walks over to him and urgently tells him C.J. is looking for him. Though Donna doesn't exactly know why, she tells Josh enough that he figures out C.J. knows Sam slept with a call girl and told Josh and Toby but not her. Josh tells Donna he'll be in his office mapping out a strategy, but to tell C.J. or anyone else who asks that he went to the dentist. Naturally, when he opens the door to his office, C.J. is there waiting for him, and says, "Wow, are you stupid!" After berating Donna for not knowing C.J. was already there, and Donna leaves, Josh defends Sam, saying because Sam didn't know Laurie was a call girl when he slept with her, nor did he pay for her services. C.J. points out none of that will matter to the media. Josh tells C.J. she's overreacting, and C.J. assumes he means because she's a woman: Josh: You know what, C.J., I really think I'm the best judge of what I mean, you paranoid Berkeley shiksa feminista! (Beat) Wow, that was *way* too far. C.J.: No, no. (Beat) Well, I've got a staff meeting to go to and so do you, you elitist Harvard fascist missed-the-Dean's-list-two-semesters-in-a-row Yankee jackass! C.J.: I'm a whole new woman. As they walk to the staff meeting, Toby joins them in the lobby, and mentions how the President was snapping at everybody at a dinner the previous night, including the First Lady. Josh reveals that C.J. knows about Sam and Laurie, which makes Toby even unhappier. Leo and President Bartlet are walking towards the latter's office from outside, and President Bartlet is snapping at Leo that the State Department and Joint Chiefs aren't moving fast enough in a response to Syria shooting down the plane, while Leo maintains both State and the Joint Chiefs are doing everything they can. As they get inside Bartlet's office, Mrs. Landingham greets them, and the President tells her he can't find his glasses and asks her to help find them. President Bartlet then tells Leo it's been 72 hours since they shot "him" out of the sky, and he wants a response today. Leo warns Bartlet he shouldn't say "him" in front of anyone else, because it makes it sound like the only reason he's going after Syria in the first place is because they shot down Morris. President Bartlet denies this, saying he's upset because Americans were killed, and he barely knew Morris. He asks Mrs. Landingham once again to find his glasses. Leo seems about to say something, but thinks better of it and takes his leave. In Leo's office, the others ask him about the President's mood, but he tells them not to worry. He then asks Sam if "it's" true, and Sam confirms that Congressman Bertram Coles, while speaking on a radio program about cuts to the military the President made in his district, said if the President went down to visit his district, he might not get out alive. Toby goes ballistic, especially since Coles is a member of their party, but the others tell him not to take the bait, to no avail. Leo then tells everybody an attack order is imminent, tells Toby and Sam to work on a speech and C.J. to not tell anyone until the last minute. As they leave, C.J. and Josh confer about who they need for interviews, and C.J. then tells Sam to stop by. Toby then confirms to Sam that C.J. knows about Laurie, but he's distracted when he sees a group of reporters in their path, along with Ginger. As Sam goes towards his office, Toby grabs a file from Ginger and tells her to stay there. The reporters ask Toby about what Coles said, and Toby replies, "The Secret Service investigates all threats made against the President. It's White House policy not to comment on those investigations." A reporter asks if this means Coles is under investigation, and Toby says again he can't comment before "remembering" he has to get back to the office. He walks to Ginger, gives her the file back, and silently thanks her before walking off. C.J. is in her office when Sam stops by. Sam admits he knows why C.J. wants to see him, and C.J. again points out if she knows, it won't be long before the media does as well. She also wants to know why Sam went and saw her again. Sam gets upset and points out he's not out to solicit Laurie, but he wants to be friends with her and maybe get her to stop being a call girl. C.J. brings up the fact there's a perception issue, and Sam says he doesn't care about that. C.J. then tells him next time he's in a situation like this, he needs to talk to her first, and points out if Sam really thought this was above-board, he wouldn't have gone to Josh or Toby first. Sam again tells her he thinks she's letting the "character cops" win again because she's too scared. He realizes he's gone too far and, attempting to be conciliatory, asks about the order to strike, but C.J. sharply replies she doesn't know. Sam leaves. President Bartlet and Leo join Admiral Percy "Fitz" Fitzwallace (John Amos) and the rest of the Joint Chiefs in the Situation Room. Admiral Fitzwallace says they have three scenarios planned, all of which meet the standards of a proportional response, and starts to describe the first one when the President interrupts, asking what the point of it all is, when the Syrians know what's coming and they've most likely cleared out, so there won't be significant damage. The others, especially Leo and Fitzwallace, don't know what to say to this, but Fitzwallace asks what the President thinks they should do instead. President Bartlet responds they should come up with a response that makes it seem like they're punishing Syria, not just doing the equivalent of docking their allowance. He storms out. Charlie Young (Dule Hill) stands in the Roosevelt Room, nervous. Josh, carrying several files, and Donna walk towards the room, and Josh tells her what kind of food he wants. She introduces Josh to Charlie and leaves. Josh tells Charlie he's there to vet him - ask about his background - and introduces himself. Josh asks Charlie to sit, but Charlie is still too nervous. After changing his mind about what food he wants, Josh asks Charlie to sit again, to which he complies, and starts to describe the job, which he says will involve being sensitive and hard, with long hours. Charlie thinks there's some kind of mistake, because he applied for a bike messenger's job, but Josh says Charlie's been recommended for the job of personal aide to President Bartlet instead. Charlie is flummoxed by this. After yelling at Donna for a misspelled word in a memo, Josh asks Charlie why he's not in college, given how good his test scores are, and Charlie explains he's been taking care of his little sister ever since their mother, a police officer, was shot and killed in the line of duty five months before. President Bartlet goes back to the Situation Room, and Admiral Fitzwallace unveils a scenario that, if they went forward with it, would do what the President asked, but would also cripple Syria's ability to receive any medical or food aid, as well as cause massive civilian casualties; not only that, but the rest of the world would see this as a gross overreaction by the United States for what he terms a "fifty buck crime", especially without the support of their allies. President Bartlet, deflated, asks for a cigarette. As an officer gives one to him and he lights it, President Bartlet asks about "Pericles One", the scenario Admiral Fitzwallace tried to tell him about earlier, and he confirms it'll strike high-rated targets and cause minimal civilian casualties. He also confirms the plan is ready to go when President Bartlet confirms it, and when he does confirm it, Admiral Fitzwallace gets on the phone and tells the person on the other end to go ahead. Fitzwallace then congratulates the President, but he responds, "'Fifty buck crime'? I honestly don't know what the hell we're doing here," and leaves. Back in the Roosevelt Room, Josh is asking Charlie what he assures him are routine questions ("Have you ever tried to overthrow the government?"), and points out to a still-nervous Charlie that the job of personal aide is a much better job than the bike messenger job. Sam comes in, and Josh introduces the two of them. Sam gets upset on Charlie's behalf when Josh starts to asks Charlie about his personal life, and he becomes disruptive enough that Josh asks Sam to step outside the room with him. Once outside, Josh points out Sam knew when he took the job he was going to be held to a higher standard, but Sam says he's just sticking to his principles. Toby interrupts them, saying the retaliatory strike has occurred, and they need to go to Leo's office. In Leo's office, he tells the staff about Pericles One and the targets (two munitions dumps, a bridge and Syrian intelligence headquarters). He tells Toby and Sam to finish their speech, and tells C.J. to sit in on a briefing and repeats his order not to tell the press anything until they're ready. C.J. wants to speak to the President alone, and Leo assures her everything will be fine. Everyone leaves except Josh, who starts to bring up the President snapping at the First Lady until Leo tells him it's the wrong time. Josh then brings up Charlie, and mentions how much he likes him and how qualified he is for the job, but Josh is worried about the image of a black man waiting on the President and holding the door open for him. Leo points out *he* opens the door for the President, and if Charlie is the right man for the job, they should hire him regardless of the image. Admiral Fitzwallace joins them, and after he and Josh greet each other, Josh leaves. Fitzwallace tells Leo he needs to calm the President down, and tells him the President is really doing fine, he just doesn't know it. Leo thanks him, and brings up Charlie. Fitzwallace tells Leo as long as they pay Charlie a good wage and treat him with respect, it makes no difference what kind of job he has. In the main office area, as the secretaries field phone calls, Toby and Sam finalize the speech, but Sam takes a minute to go apologize to C.J. about being so hard on her before. C.J. accepts. As Sam goes back to Toby, a group of reporters circle C.J. and ask what's going on, and C.J. feigns ignorance. As she leaves, she runs into Danny Concannon (Timothy Busfield), a senior White House correspondent, and she impatiently tells him he'll have to wait with everyone else for the briefing, but he's there to talk about Sam and Laurie. C.J. reluctantly asks him into her office. At Donna's desk, Josh sits with her and marvels that he has absolutely nothing to do. To Josh's consternation, Mandy comes out of his office, saying how much it sucks. Josh joins Mandy in his office, and she tells him she came in a week early to get psyched. Josh points out how bad her timing is, and Mandy admits she had a feeling, but wanted to give Josh a present; a picture of the two of them at the Democratic Leadership conference, which they reminisce about, even as Josh points out she drew over his picture. The phone rings, and Josh finds out he now has something to do. Mandy says goodbye and leaves. In C.J.'s office, Danny says he doesn't have enough for a story, but as a courtesy, he's letting C.J. know he's going to be asking around. C.J. then defends Sam using the same logic Sam used to defend himself, without telling Danny exactly what Sam's doing. This convinces Danny, but he warns C.J. other reporters will be more unscrupulous than he is. C.J. then gives him a heads-up on the Syrian bombing in exchange "for being a good guy". Josh shows Charlie around the rest of the West Wing, and then brings him to the Oval Office to meet President Bartlet, which freaks him out even more. In the Oval Office, the President is going over the speech with C.J., Sam and Toby, but is exasperated because they don't know the bomb damage assessment (BDA), and because no one has found his glasses yet. C.J. brings up an aircraft the President needs to be briefed on, and Bartlet snaps he knows about it, because he read about it the night before in his study. Hearing this, Charlie whispers to Josh, and Josh says he should tell the President. After C.J. lends the President her glasses and they don't work, Charlie finally speaks up, and reminds the President he was in his study the night before. As everyone looks on in stunned silence. Mrs. Landingham, who gets it, orders another secretary to go to the study and search for the glasses, and Josh tries to introduce Charlie to President Bartlet, but Bartlet testily replies he doesn't have time to meet any new people now. At that point, Leo, finally having had enough, asks the President for a minute and escorts him away. In Leo's office, he tells President Bartlet he doesn't want the President to take his anger out on the American people, and tells him to send Mrs. Bartlet flowers when all of this is over. Bartlet brings up the fact that in ancient Rome, a Roman citizen could walk across the earth without fear of being attacked at all, and wants to know why Americans aren't entitled to that. Leo points out they're behaving as a superpower ought to, and when Bartlet brings up past U.S. failures, Leo retorts that ratcheting up the body count won't help, and if Bartlet wants to start using American military strength as the arm of God, he'd better start with killing Leo. A bit deflated, Bartlet brings up the fact Morris had a ten-day-old baby, and repeats that the "proportional response" is nothing. Leo yells that it isn't nothing, and there is no "good"; it's how a superpower behaves. Leo then adds quietly, "It's what our fathers taught us." As the tension between them is finally relieved, Leo brings up Bertram Coles, which President Bartlet laughs about, especially at Toby getting upset about it. President Bartlet then asks about Charlie. In the Oval Office, C.J. asks Toby about the quote he gave to the reporters about Coles being investigated by the Secret Service. Toby says she should tell Coles there's a new sheriff in town. Meanwhile, Josh apologizes to Charlie for the President, pointing out it's been a really bad day for him. Just then, President Bartlet comes over and asks to see Charlie privately. He tells Charlie he looked up some information on Charlie, including the fact his mother was killed with "cop killer" bullets, and asks Charlie if he wants to help Bartlet try and pass legislation banning the ammunition and the guns used to fire them. After a moment, Charlie smiles and says he does. The President thanks him. As the President prepares to go before the camera, and he and Leo banter about the tie he's wearing, Charlie tells Josh, "I've never felt like this before." Josh replies, "It doesn't go away." President Bartlet then begins his address to the nation. This episode contains examples of: • Bait-and-Switch Comment: President Bartlet: Oh, man, Leo. When I think of all the work you put into getting me to run, and when I think of all the work you did to get me elected...I could pummel your ass with a baseball bat. (both the President and Leo start laughing) • Call Back: To Sam and Laurie, Morris, and the history between Josh and Mandy. • Department of Redundancy Department: A rare serious version of this trope: C.J.: What this is about, Sam, is you're a high profile, very visible, much noticed member... Sam: What I think it's about is you, once again, letting the character cops win in a forfeit, because you don't have the guts or the strength or the courage to say, "We know what's right from wrong, and this is none of your damn business." C.J.: Really? Sam: Yes. C.J.: Strength, guts and courage. Sam: Yes. C.J.: You just said three things that all mean the same thing. Donna: C.J.'s looking for you. Josh: (as he walks towards his office) Huh? Donna: C.J.'s looking for you. Josh: Donna? Donna: Yes? Josh: "Good morning, Josh" is a pretty good way to start the day. Donna: Good morning. Josh: What's up? Donna: C.J.'s looking for you. • Don't Call Me Sir: Charlie keeps calling Josh "sir": Josh: Seriously, Charlie, we call the President "sir"; everyone else is, "Hey, when am I gonna get that thing I asked for." • Foreshadowing: This won't be the last we hear of Danny, and we'll hear more about Debbie DiLaguardia in Season 4. • Hand Wave: Josh and Leo worrying about hiring a black man to fill just a servant's role in the White House is basically Aaron Sorkin and NBC doing the same thing in regards to hiring a black actor to just play a servant role. • Heroic BSOD: President Bartlet is having one this entire episode. • Ironic Echo: From the previous episode. In his private conversation with Dr. Tolliver, Bartlet admitted feeling uncomfortable around the Joint Chiefs because he felt they looked down on him due to his lack of military experience, and in particular the fact that he was uncomfortable with violence. In this episode, the Joint Chiefs are in fact utterly freaked out by the President's anger and desire to make people and things he doesn't like explode, and corner Leo to ask him to try and get him to cool down a bit. • It's Personal: Although the President denies it when Leo initially confronts him on the subject, it's pretty clear that a lot of his anger and aggression is being driven by the death of his personal physician in the attack on the American military plane. • Seinfeldian Conversation: Before President Bartlet comes into the Situation Room for the first time, Admiral Fitzwallace mentions how the coffee is different from what they usually have. • Self Plagiarism: In The American President, when he makes the decision to attack Libya, President Andrew Shepherd says, "Someday someone's gonna have to explain to me the virtue of a proportional response." There's also an element of Ironic Echo, in that President Shepherd, though he recognized the necessity of the attack, didn't like having to do it in the first place, while here, President Bartlet thinks a proportional response is too little (at least until Leo talks him down). • Shout-Out: When the press is asking why there's so much activity in the White House, C.J. lies and says it's because "Menudo is in the building". • Tempting Fate: Josh: At least there's some comfort in knowing that whatever's gonna happen today has already happened. Josh: (looking at Donna) I don't understand it. Why can't you tell me that there is a person in my office? • Third Episode Introduction: This was Charlie's first appearance in the series.
global_05_local_5_shard_00000035_processed.jsonl/24084
Tropers: Roxor Usually going by the alias Roxor, but sometimes his real first name of Rohan, this troper is one of several with Asperger's Syndrome and the one responsible for the Paranoia Fuel page mentioning that people with Asperger's Syndrome seem to be immune to it. He has a hatred for the use of spoiler tags used anywhere (many of his edits at this wiki have been to remove them when he feels they've been around for too long) and if he could figure out how to write a program to remove all the ones in a text file correctly, would copy the entire text of any article he's editing into a file and run it through the program in question. When editing pages, he will add in any missing spaces he finds after one or more asterisks. Could probably write a program to do the task, but can't be bothered. With a background in science and technology, especially computing, he has something of a knack for writing decent Technobabble in fiction and using too much in Real Life. He is responsible for writing the initial versions of the following pages: Has also written the first versions of at least three computing-related pages at Wikipedia.
global_05_local_5_shard_00000035_processed.jsonl/24158
Jump to: navigation, search Difference between revisions of "ATL/Developer Guide" (Examples of use) m (LauncherService: fixed typo) Line 124: Line 124: ==== LauncherService ==== ==== LauncherService ==== The launcher service allow to launch a transformation from a set of parameters like maps of path and maps of model names: this is strongly related to launch configurations and ant tasks as it allows to launch the transformation on any virtual machine.   === EMF interactions === === EMF interactions === Revision as of 05:48, 8 June 2009 This documentation aims at contributing to improve the comprehension of the ATL source code. ATL Source Code Plug-ins organization Below is the list of the ATL plugins: External dependencies Install ATL from CVS Import team project set ATL provides team project sets in order to simplify access to the source code. You have to download an atl.psf file on your local disk, and then you can import projects in Eclipse using : File->Import->Team->Team Project Set Anonymous access Anonymous access use pserver to connect on CVS. Here are the two psf files. Commiter access Commiter access use extssh to connect on CVS. Here are the two psf files. ANTLR installation Note that the download of this plugin is embedded into atl.psf files. So, if you followed the previous instructions, you don't need to read the next steps. In Eclipse, antlr is managed by the Orbit project. To checkout this plugin, follow those steps : • Open an anonymous/commiter CVS connection to dev.eclipse.org, repository /cvsroot/tools • Right-click on the repository location, then choose Refresh branches • In the wizard, check the org.eclipse.orbit project • In the branches, select the one named v3_0_0 • Checkout org.antlr.runtime MDR installation (Regular VM only) In each psf/ subdirectory there are two .psf files : • atl.psf • mdr4atl.psf The last one provides a project set which only contains the mdr4atl driver, you can use it as for atl.psf. Now, you need to go to the Plug-in perspective. Some external libraries are required for the plug-in org.eclipse.m2m.atl.drivers.mdr4atl but not available on the CVS repository. You need to download the jar files into the lib/ directory of this project. Download mdr-standalone.zip from http://mdr.netbeans.org/download/ and put the included jar files into lib/ of plugin org.eclipse.m2m.atl.drivers.mdr4atl. Note that mdr-standalone.zip is updated more often on the MDR website than in our development source. As a consequence, bugs may appear when using the last-in-date mdr-standalone version of MDR. When you have finished this operation, there is normally no error left. WARNING: The MDR model handler is no more maintained, so it may need to be fixed. ATL is ready to be tested. There are two ways to use it: ATL Architecture The ATL architecture consists on: • a Core, which describes ATL concepts in an abstract way • a Parser and a Compiler • Virtual Machines, allowing to execute transformations • an IDE: editor, debugger, perspective, all based on previous components ATL compilation process.JPG This schema describes the ATL Core and how it interacts with tools like LaunchConfigurations, Ant tasks. ATL Core Architecture.png • An IModel is an adapted representation of a model, suitable for ATL transformations. It provides methods to lookup elements, create new ones, etc... • The IReferenceModel interface extends the IModel one, and is a specific version of an IModel which symbolizes metamodels. It defines metamodel-specific operations which are useful for ATL transformations • The ModelFactory is dedicated for model and reference model creation • The IInjector, IExtractor interfaces provide a way to load and save models previously created by the modelFactory • The ILauncher interface is dedicated to be implemented by ATL virtual machines: it defines methods to parametrize and launch a transformation To simplify the use of ATL Core and reduce code duplication, two services are provided: CoreService and LauncherService. This utility class provide a way to lookup into eclipse extensions, or an internal storage, for Core implementations. Those implementations can be registered into the CoreService for a standalone use. For instance, here we register the extensions needed to launch a transformation using EMF-specific VM, in standalone: CoreService.registerLauncher(new EMFVMLauncher()); CoreService.registerFactory("EMF", EMFModelFactory.class); CoreService.registerExtractor("EMF", new EMFExtractor()); CoreService.registerInjector("EMF", new EMFInjector()); EMF interactions The main implementation of the ATL Core is the EMF one, which is used by ATL itself for parsing and compilation. It is defined under the org.eclipse.m2m.atl.core.emf plugin. Here is an explanation about the use ATL EMF-specific injector/extractor. For both, we use the EMF notation to select Resources: Resource Type ATL EMF API Syntax Example File system Resource file:/<path> file:/D:/eclipse/workspace/mmproject/sample_metamodel.ecore EMF uri <uri> http://www.eclipse.org/uml2/2.1.0/UML pathmap pathmap:<path> pathmap://PROFILE/sample_profile.uml#_0 Workspace Resource platform:/resource/<path> platform:/resource/mmproject/sample_metamodel.ecore Plug-in Resource platform:/plugin/<path> platform:/plugin/mmproject/sample_metamodel.ecore Here is an example of usage: ModelFactory factory = CoreService.createModelFactory("EMF"); IReferenceModel umlMetamodel = factory.newReferenceModel(); injector.inject(umlMetamodel, "http://www.eclipse.org/uml2/2.1.0/UML"); According to the previous table, you can use another notation to load the model: injector.inject(sampleMetamodel, "file:/D:/eclipse/workspace/mmproject/sample_metamodel.ecore"); Examples of use ATL Virtual Machine The ATL VM is a byte code interpreter which manages OCL and ATL types hierarchy. A complete ATL VM specification is available : ATL_VMSpecification. This specification consists on a precise description of the ATL VM functionalities, but doesn't describe the implementation. The intent is to allow any developer to create an ATL VM in any language. The Native Library (org.eclipse.m2m.atl.engine.vm.nativelib package) gathers all basic type definitions used by the ATL VM : OCL types and ATL specific types. Both are defined at the same level, and use reflexion. OCL appears at several levels in the ATL architecture : • nativelib implementation • OCL package in the ATL, ACG and TCS metamodels The following schema shows the ATL VM working: ATL ASMInterpreter.JPG At this time there are two implementations of the ATL VM. Regular VM The Regular VM is the first version of the ATL Virtual Machine. The implementation is abstracted from the used model management framework, using model handlers. Model Handlers consists on an abstraction layer dedicated to model access. This access is implemented by two classes : ASMModel et ASMModelElement. • AtlModelHandler : implementation of the basic tasks "newModel", "saveModel", "loadModel" • ASMModel : getElementsByType implementation, framework oriented "newModelElement" method, etc... • ASMModelElement : "allInstances" implementation, etc... Input and output models are loaded using the same API and are differenciated with an "isTarget" property. That API implements the "getMetaElementsByName" method which correspond to the "findme" ASM instruction. This VM implementation is still used in ATL, because it is strongly linked to several parts (now only the ATL Debugger). But the Regular VM has a lot of performance issues, especially because of the model handler architecture. EMF-specific VM The EMF-specific VM is a redefinition of the Regular one, which resolves a lot of performance issues by avoiding EObjects wrapping. Its API allow to consider EMF Resources directly as models, without complex loading as done previously in the Regular VM. ASM format • The getasm instruction retrieves the ATL Context Module, i.e. The "thisModule" equivalent for ATL. • N symbolizes a native type, ATL specific • TransientLink are traceability links • all functions like "getLinkBySourceElement" are implemented in the nativelib • Object creation : • A delete instruction could be implemented in the ATL VM To manually parse (or extract) ATL files, see the ATLParser class. Note that as ATL parser implements IInjector and IExtractor interfaces, it can be use in ant tasks to parse or extract atl files (just specify "ATL" as injector/extractor name). To manually compile ATL files, see the AtlDefaultCompiler class. ACG (ATL VM Code Generator) A complete ACG documentation is available here. The following schema places ACG in the AMMA platform. AMMA bootstrap.JPG
global_05_local_5_shard_00000035_processed.jsonl/24159
Jump to: navigation, search Difference between revisions of "Equinox Summit 2007" (Results and Minutes) m (Results and Minutes) Line 19: Line 19: The results of each breakout group are reported in the [[Equinox Summit 2007 Breakout Results]]. The results of each breakout group are reported in the '''[[Equinox Summit 2007 Breakout Results]]'''. === Registration === === Registration === Revision as of 23:14, 24 September 2007 The Eclipse Foundation and the Equinox project team are hosting an Equinox Summit in Ottawa at the Minto Suites Hotel from Sept 25-26, 2007. This event is modeled after and co-located with the very successful CDT summits. (To be clear, the CDT Summit is 3 days, the Equinox Summit is 2). See the Equinox Summit 2007 Agenda for a breakdown of the time we have available. The precise technical content has intentionally been omitted from the agenda: it will be our combined task to shape the agenda according to the needs and interests of those who show up. The agenda should be nicely finalized by the time we go home... We have two full days and there is a lot of ground to cover. There will be sessions covering the four main areas of work related to Equinox: 1. Framework/runtime This includes (but is not limited to): class loading, specification directions, programming models, security, ... To help gather a list of specific discussion topics, please add your areas of interest to the topics page. Results and Minutes The summit is organized into a set of lightning talks and a series of breakout topics defined and voted on by the participants. The presentations given were relatively informal. Any slides used are given below: The results of each breakout group are reported in the Equinox Summit 2007 Breakout Results. Who's coming. Hotel Info
global_05_local_5_shard_00000035_processed.jsonl/24160
Difference between revisions of "IceWM/9.2/en" From PC-BSD Wiki Jump to: navigation, search (Importing a new version from external source) m (FuzzyBot moved page IceWM/en to IceWM/9.2/en without leaving a redirect: Part of translatable page "IceWM".) Revision as of 08:14, 2 December 2013 (Sorry for the inconvenience) Figure 6.9a: IceWM on PC-BSD® IceWM[1] is a light-weight window manager. Figure 6.9a shows a screenshot of IceWM running on PC-BSD®. In this example, the user has launched the Application menu by clicking on the IceWM button in the lower left corner. This menu can also be launched by right-clicking anywhere on the desktop. If you are new to IceWM, see the IceWM FAQ and Howto[2] for more information about configuration, customization, and keyboard shortcuts. 1. http://www.icewm.org/ 2. http://www.icewm.org/FAQ/ Personal tools
global_05_local_5_shard_00000035_processed.jsonl/24166
Microsoft TechNet Article How to Configure Memory Protection in Windows XP SP2 contains the following introduction: Microsoft Windows XP Service Pack 2 (SP2) helps protect your computer against the insertion of malicious code into areas of computer memory reserved for non-executable code by implementing a set of hardware and software-enforced technologies called Data Execution Prevention (DEP). Hardware-enforced DEP is a feature of certain processors that prevents the execution of code in memory regions that are marked as data storage. This feature is also known as No-Execute and Execution Protection. Windows XP SP2 also includes software-enforced DEP that is designed to reduce exploits of exception handling mechanisms in Windows. Unlike an antivirus program, hardware and software-enforced DEP technologies are not designed to prevent harmful programs from being installed on your computer. Instead, they monitor your installed programs to help determine if they are using system memory safely. To monitor your programs, hardware-enforced DEP tracks memory locations declared as "non-executable". To help prevent malicious code, when memory is declared "non-executable" and a program tries to execute code from the memory, Windows will close that program. This occurs whether the code is malicious or not. Note: Software-based DEP is part of Windows XP SP2 and is enabled by default, regardless of the hardware-enforced DEP capabilities of the processor. By default software-enforced DEP applies to core operating system components and services. The default configuration of DEP is designed to protect your computer with minimal impact to application compatibility. However, depending on your DEP configuration, it is possible that some programs might not run correctly. You can use the tasks described in this document to configure DEP on your computer: Enable DEP for all programs on your computer Add programs to the DEP exception list Disable DEP for your entire computer IMPORTANT:  The instructions in this document were developed by using the Start menu that appears by default when you install your operating system. If you have modified your Start menu, the steps might differ slightly. For definitions of security-related terms, see the following: "Microsoft Security Glossary " on the Microsoft Web site at For more information regarding DEP, see the following: Microsoft Knowledge Base Article 875352 on the Microsoft Help and Support Web site at
global_05_local_5_shard_00000035_processed.jsonl/24167
International Tempranillo Day Temp, from the Sumarian word for "tasty." Pran, the Antarctic Penguin God of good taste. Ill, the '80s hip hop term for "great." And O, meaning "Oh." All together? Tempranillo. A reason to celebrate. Tempranillo Day official site Ends on November 12 at 9AM CT About Tempranillo Day "Do you ever think Tempranillo Day's gotten too commercial?" you'll be saying to yourself in 2113, as you sing Tempranillo Carols around the Tempranillo Tree. And, ultimately, you'll decide that the answer's no. HAPPY TEMPRANILLO DAY! Tempranillo Day official site
global_05_local_5_shard_00000035_processed.jsonl/24171
Crippling Poison (item) Revision as of 09:42, September 8, 2009 by PCJ (Talk | contribs) 102,769pages on this wiki Ability poisonsting2020 • Crippling Poison • Classes: Rogue Each strike has a 50% chance of poisoning the enemy, slowing their movement speed by 70% for 12 sec. You won't escape my blades so easily... Crippling Poison is a poison that is bought by rogues who then apply it to their weapons. Every time the rogue hits with the weapon, there is a 50% chance of the victim being slowed for 12 seconds. Crippling Poison is sold by poison vendors. • Useful in PvP and instances to slow runners. Using this in your offhand and Shiv makes this very reliable. • Only affects movement speed, does not affect attack speed. • Crippling Poison, Shiv, and Deadly Throw combined allow a form of kiting. External links Around Wikia's network Random Wiki
global_05_local_5_shard_00000035_processed.jsonl/24188
Buying Gear?  Click Here Buying gear? Please use these links to help More info... Other ways to help...  Information Entries for Longs Peak and Name History Name History (Longs Peak) Title: Naming of Longs Peak Entered by: 14erFred Longs Peak and its southern neighbor, Mt. Meeker (13,911 ft.), were called "Nesotaieux" (The Two Guides) by the Arapaho Indians and were known as "Les Deux Orielles" (The Two Ears) by early French fur traders. The mountain takes its name from Major Stephen H. Long (1784-1864), whose expedition made the first recorded sighting of the peak on June 30, 1820. © 2015®, 14ers Inc.
global_05_local_5_shard_00000035_processed.jsonl/24189
Points: 5 Cover Story: It Came From Outer Space! Brian Lang Total Points: Kill Streak Last Visit: Apex, NC What I'm Playing My Friends My Clubs 5599 members Win a free PSP + six games! Ultimate Ghosts _N Goblins Giveaway Ultimate Ghosts _N Goblins... 1432 members Halo 3 vs. Gears of War Halo 3 vs. Gears of War Jun 15, 2007 10:25AM PST I just saw the recent "did you like Halo 3" thread here on 1Up. Suffice to say that my own opinion was that it was "more Halo," which is both a good and a bad thing. However, I also believe that it was meant to whet our appetite, not satiate our hunger. Sept 25th will tell the tale. During my perusal of the various responses, I kept running across the whole "Halo is better than Gears," "no it's not," "yes it is," "no it's not," "yes it is" etc etc etc ad nauseum. I can understand, I suppose, why the two are being compared. They are likely to be the most played Xbox 360 multiplayer games of 2006-2008. Sure, Rainbow fans can throw their hat in the ring, but let's face it: Halo 3 and Gears of War will have the most online players during this period of time. What I don't understand is why there's such angst about which one is better. I mean, they're totally DIFFERENT. One's an FPS that can be anything from rumble pit mayhem to team-based slaughter, with bunny jumping, rockets, swords and bullets a-flying. There's a little blood but not much. It's all about getting to 50 (or 25) before the other guy, and frankly, once you get a decent lead you can employ a strategy of "as long as I take one out every time I die, I'll win." The other is a 3rd person action game focused on brutal up-close combat. Sure there's a sniper rifle and the torque bow, but their utility is not as great -- in most cases -- as getting up in someone's grille. It's a game that is team-based all the way online, focused on ganging up and outlasting your enemies. The two will, frankly, co-exist. One's not better than the other. They are complementary. Depending on what mood you're in, you might play them both in the same night. I, for one, will be playing both of them for years to come. • E-mail it • 0 Comments (0) Title Of Comment Maximum characters for title is 120 Around the Network IGN Entertainment Games
global_05_local_5_shard_00000035_processed.jsonl/24213
You are here Meet the Man If you haven't yet met the Man of Love who has power to forgive the past, transform the present, brighten the future, and grant heavenly happiness forever, you can by sincerely praying the following prayer: Dear Jesus, thank You for dying for me so I can have eternal life. Please forgive me for every wrong and unloving thing I have ever done. Please come into my heart, give me Your gift of eternal life, and help me to know Your love and peace. Thank You for hearing and answering this prayer and for being with me always, from this moment on. Amen.
global_05_local_5_shard_00000035_processed.jsonl/24227
Emily Bazelon Lands Book Deal for Bullying Investigation By Jason Boog Comment Slate senior editor Emily Bazelon has landed a book deal with Random House for Sticks and Stones–an investigative study of bullying. Andy Ward acquired the book  and Elyse Cheney at Elyse Cheney Agency negotiated the deal. At Slate, Bazelon (pictured) recently wrote a series about this emotional topic: “Bull-E 2010: The new world of online cruelty.” You can also follow her on Twitter. Here’s more about the book: “[A]n investigation into the new world of bullying – its roots, its current, destructive cyber incarnation, its psychological, social, and legal implications, and what parents and schools can ultimately do to prevent it.”
global_05_local_5_shard_00000035_processed.jsonl/24296
Welcome to my website! I’m a children’s novelist from Massachusetts represented by the Sheldon Fogelman Agency. Read about some of my works-in-progress or check out my blog and leave a comment. I would love to hear from you. If you live in the Boston area, be sure to check out my calendar of children’s author events. You can also find me on TumblrTwitter, Google Plus, and Goodreads, so if you use any of those website, be sure to follow me. I might just follow you back! Can’t find an answer to your question on my website? Email me: amitha (at) amithaknight dot com. Comments are closed.
global_05_local_5_shard_00000035_processed.jsonl/24301
| | A Better Island Vacation September 25, 2013 To shift the definition of what an “island vacation” means in the minds of consumers, British Airways and Visit Britain created a mobile campaign based on an iconic London sight — the Royal Guards — that encouraged viral buzz. Members Only Content User Name (email): Also See Relevant Topics Recent Smarties Awards Oct 1, 2014 Oct 1, 2014 Oct 1, 2014 2013 MKZ/29HD Tablet Magazine Integration Oct 1, 2014 Air on the Side of Humanity Oct 1, 2014 Oct 1, 2014 AT&T Career Site See full index for Smarties Awards
global_05_local_5_shard_00000035_processed.jsonl/24310
This is the latest in our Weekend Poll series. For last week's, see Manufacturer UIs: Love 'Em Or Hate 'Em? I have to admit: as a newly-former starving college student, it's hard for me to see the same sort of value in a $400 tablet that I see in a $200 smartphone or a $600 laptop (or even a $300 netbook). During my month or so with the O.G. Galaxy Tab, I found the tablet to be more of a complement than a replacement - though certainly the new crop of tablets with docks and keyboards has pushed them closer to laptops than ever before. So my question to those of you who own both a tablet device (be it Android or otherwise) and a computer is: how much has owning a tablet impacted your computer use? You know what to do: sound off in the poll below, then head to the comments to spark some discussion. How Much Has Owning A Tablet Impacted Your Computer Use? View Results Loading ... Loading ...
global_05_local_5_shard_00000035_processed.jsonl/24311
Site hosted by Build your free website today! chemical extraction of plants anonymous Subject: Alkaliod extraction EXTRACTION: The method I use is a general one - I copied it from one used by some scientists to extract mescaline from peyote, but I have since seen close variations used on many plants. . This procedure is followed, whenever a plant is studied for its alkaloids. A few ingredients and bits of equipment are necessary. I am a chemist, and have my own chemistry set. . I have considered manufacture, but I find that there are enough interesting things to do just extracting natural compounds, which is much easier, indeed, possible in the home. You will need: A few flasks, glass containers, etc. of suitable sizes, depending on how large a volume you are playing with. A separating funnel is almost essential - this could be tricky to get without a little effort. . If you don't know, it is an inverted conical flask with a hole at the top to pour stuff in , and a tap at the bottom to let the stuff out accurately . It is used for separating immiscible layers. A vacuum filtration apparatus would be very useful; I did have a bodgy one rigged up myself, but it was always difficult to use. . Some kind of still, though, is pretty important to have, although conceivably for a once off you could get by without it, if you don't mind breathing in a lot of solvent. As far as still goes it is to recover solvent, and leave goodness as a residue at the bottom. . I use a bit of quickfit I nicked: a round bottom flask, short column, thermometer on top, and a small condenser... takes for ever, but don't expect to follow this procedure in anything under a day. . Other bits and pieces: A filtre of some sort is a necessity; preferably a good one, with a vacuum pump if you are filtring gluggy stuff (cactus is the worst, sticky goo, e.g., other things like seeds and bark are better). . People have been known to use such devices as coffee filtres, t-shirts, tins with holes in the bottom (as a filtre press) and so on. Whatever you can scrounge. A lab buchner funnel, sidearm flask, and venturi pump are ideal. . All this stuff is standard in any chemical lab, regardless of discipline. (cont'd in part ii) CTION part ii: Chemicals necessary: The paydirt (obviously) Some solvents: methanol (lots), and a non polar solvent. . Some people use ether - this is dangerous and doesn't dissolve everything. Your best bet is probably something chlorinated - I use dichloromethane, although chloroform will do (don't breath too much - it is fun at first, but ends up making you feel ill). Drycleaning fluid... petrol.... I don't know what you have access to. . Dichloromethane is good because it is non-toxic, volatile, and a good solvent. It has a major drawback: separation is often very difficult once you have placed your gluggy plant muck in there. The shot is to use large quantities of everything, and be patient. . You will also need an acid (Hydrogen chloride is good) and a base/alkali (Sodium hydroxide is good - that way, if you stuff up, you end up synthesizing salt instead of something nasty.) Also useful: acid/base indicator paper, boiling chips (porcelain grains) and activated charcoal - see local chemist. . The idea is this: Most fun compounds (the only exception is maybe THC, and alcohol if you count that) are basic - they contain nitrogen. So: in general, if you react them with hydrochloric acid, the form a water soluble chloride. . If you react them with dilute base in the aqueous phase, they go back to being a base, which is insoluble in water, but soluble in organic non-polar solvents (like CH2Cl2). So, the theory is, that only a base will go from water to solvent and back to water etc. when changed from acidic to basic and back to acidic. . This gives you a way of removing all the other crap which is not alkaloid from a sample. That is the theory. When I do this, if I can get down to some brown or green sludge that I can throw down or smoke, I am happy with a good days work. . Ideally, you should end up with lovely white crystals, but I think that would require a lot of time and effort, and indeed a considerable loss of product in the process. . Procedure: Get your stuff. Dry it as much as possible - this makes life easier later on. You will never get all the water out, but too bad. Chop it up as fine as possible: a blender comes in handy. You may wish to chop then dry. . A word of caution : try to avoid exposing your stuff to excessive heat. I dry in low heat oven. Heat and air destroy good compounds from upwards of 100 degs C. All this bit will depend on exactly what you are extracting. . Once it is finely divided - powdered if possible, put it in a big container, and cover it with methanol. Alternatives to methanol here are ethanol (not as good) and acetone (good solvent - rips the crap out of anything, but is more reactive - can react with your actives). . Now, depending on what your stuff is, you have to let the methanol have time to remove it all. This is best done by leaving in a quiet warm place for a few days, even up to a week, and shaking it occasionally so it is mixed. . Some papers recommend solvent extraction (soxhlet apparatus) and refluxing at the boiling point of the methanol (80 degs or so - I can't remember). I usually just rely on time to get the good stuff out. When you are ready (early in the morning), filtre the muck, to give you methanol+dissolved brown gunk, and a residue soaked with methanol. . The residue still contains a lot of good stuff, so soak again for an hour, and repeat, and do a third time if you are feeling generous (3 is the magic number in extraction work). . When you are done, there is another thing you can do finally, if desired: depending on what your stuff is, mix it up with dilute hydrochloric acid, 1M is appropriate. . let stand for an hour, then filtre (this may be very difficult) That will get the last of the alkaloids out of the substrate. (continued in part iii) EXTRACTION part iii You now have a methanol-plant stuff mixture, and a dilute HCL-plant stuff mixture, if you bothered to do that part. . Evaporate the methanol, to leave a small amount of goo. This will contain water, a bit of methanol, and all kinds of resins and muck, and if you are lucky, the alkaloids. If a very quick and crude extraction was all that was desired, then after stripping the last of the methanol with vacuum if possible, this residue could be smoked eaten or whathaveyou. . I leave that to your discretion. However, if a cleaner product is desired, the double layer extraction will need to be performed. Combine the evaporated methanol gunge with the hydrochloric acid filtrate if you have any. . If you don't then mix the methanol stuff with an excess of dilute (1M) HCl. Feel free to filtre again at this point. Anything of marginal solubility here is no good to you. . Get the stuff as clean as possible. Boiling with activated charcoal is another useful trick for removing gunge. Just boil it up, and filter off the charcoal for a cleaner brew. . You should now have an acid aqueous solution of alkaloids and water solubles from the plant. Take your acidic solution, and bassify. This is done by mixing in dilute sodium hydroxide (I use up to 5M to save on total volume. . Be careful with conc NaOH - apart from eating skin, it eats alkaloids) As you mix in the NaOH, you will see swirls of white precipitate form and redissolve. Continue until the white swirls stay, and until the solution is quite cloudy. . Indicator paper is necessary to see that the solution is basic. If you can't get indicator paper, you can make an indicator by boiling up some purple flowers. The dyes in most flowers go bright red in acid, and green in strong alkali. . Just a drop of dye and a drop of mixture should tell you what is acid or base. The white precipitate is the alkaloids. The more the better. Next, add equal volume of non-polar solvent (dichloromethane) to the mix. Place in separating funnel, and shake. Separate. This may be very difficult or slow. . Adding more solvent, more basic water, etc. may help. Adding lots of salt to the water layer will help break an emulsion. Ideally you want it do this step 3 times - to extract as much as possible from the water layer into the organic. . I find this part very difficult, and you have to accept that you will lose quite a lot of material here. It is, however probably easier with some plants that others: cactus is very difficult, barks and seeds would be easier. . Use plenty of salt, and agitate to separate. When you have finished extraction, chuck the basic water layer. The solvent layer is kept, and can be backwashed with salty water for a cleaner mixture. . The solvent can now be dried, (using salt or some dry powder, the filtred) (I don't usually bother with this - the old hairdryer at the end can remove some last solvent and water) then strip the solvent in a vacuum to get your final product - some kind of syrup could be expected. . This is super concentrated, but may only be half the strength of the original. e.g. put in enough for 10 doses of morning glory seeds, get back 5 doses or more of concentrated alkaloids. . If it is desired to take the process still further, you can do the obvious thing - mix your solvent layer with dilute acid again and extract back into water. Acid layer could be evaporated under vacuum to give salts of alkaloids. . Alternatively, if the organic layer were scrupulously dry, bases could be salted out with some organic acid - a tartrate, oxalate could be formed. I have never bothered with such things - you would need a lot of pure extract to be bothered. The acid-base extraction process can be continued as many times as is desired. . If a truly pure product is desired, the only way to go from here is chromatography. I have never used this at home, and wouldn't think it was worth the trouble, but there will be papers available on what was used for a particular extraction case. ----------------- . I can get some anyway. I'll see. First of all, you need either (a) a _lot_ of morning glory seeds or (b) some hawiian baby woodrose seeds. You also need petroleum ether, which is a petroleum refining byproduct, and some high proof drinkable ethanol. I'll explain the theory as I understand it so that you can understand the flexability in this recipe. . There are two kinds of solvents, polar and nonpolar. Generally, the good stuff in seeds is polar soluable, and the bad stuff is nonpolar soluable. So the idea is to first make a nonpolar solution, which of course means that you take a nonpolar solvent and soak the ground up seeds in it. . The result is a solution of garbage from the seeds and the nonpolar solvent. Petroleum is a nonpolar solvent, so it will function in this capacity. The down side is that petroleum is poisonous, so you don't want to drink it. . The good news is that petroleum is extremely volatile, so it evaporates quickly and cleanly. So the first stage is to soak the ground up seeds in petroleum ether for a few days, and then filter the resulting cloudy solution through some coffee filters, throw away the solution, and keep the seed mush. . The seed mush consists of nondisolved LSA's, fiber, and the remaining solution that didn't drip through the filter. This part can be iterated to get more and more garbage out of the mush. . The final time, let the seed mush dry thoroughly so that the petroleum evaporates so that you don't have any poison in there. After the seed mush dries, the nest stage is to make a polar solution, which separates the alkaloids (the LSA'a) from the fiber of the seeds. . This is done with alcohol. There are other polar solvents, but again, the key is to have one which easily evaporates, one which will not destroy the LSA's, and one which is not poisonous. Ethanol serves this purpose. . Methanol will also work, but methanol causes blindness, so if you use methanol, make damn sure it's all evaporated before consuming the product. In some states ethanol is illegal, and California is such a state. In that case, using methanol is probably the way to go. . Also keep in mind that there is such thing as denatured ethanol, which is ethanol which has been intentionally poisoned so that it is undrinkable. The reason for doing this is that drinkable ethanol is taxable under the Tobacco Alcohol and Firearms people, and denatured ethanol has uses in chemistry and cleaning. . The point is that you should under no circumstances use denatured ethanol because it will make you sick or kill you or cause cancer or all three. So, make an alcohol solution of the seeds. . Then filter the solution through filter paper, like before, except this time keep the liquid in a jar. Repeat this step 3 or 4 times, always keeping the liquid. When you've exhausted the seeds, throw them away. . The liquid you have should be yellow and smelly. Put this in a shallow flat tray or pan or large bowl, and let it evaporate in a dark dry place for a day or two, or until there is no liquid. The pan should have a yellowish scum residue. . That's the LSA gunk. Scrape that up with a razor blade or credit card or whatever works. It'll be sticky and gummy, and once it's all scraped up it will look dark brown. That's pretty much all there is to it. . You can take this several steps further to get a more pure product. That would be to alternately make an acid solution and base salts from the LSA's, which would eventually leave you with a very pure white powder. This requires much more effort, and wastes some of the product, and the only reason for doing it would be to remove more garbage, but the amount of garbage left in the brown gunk is insignificant. . Once you have this stuff as pure as you want it, you can ingest it in your favorite form. You can either swallow it as a lump, put it into a gelitain capsule, drink the ethanol solution, or dissolve it in some cool-aid. I recommend either capsules or swallow the lump if you can handle the taste. . Other notes: Petroleum ether is in Naptha, which is available in hardware stores. That's what I've used, and it works fine. Other petroleum solvents would work like ethyl ether, which evaporates much more easily and is a better solvent, and something like gasoline, which has additives and does not evaporate as cleanly as naptha. . If you can get petroleum ether from a chemical supplier, try it instead of naptha. A rule of thumb is that after making a solution with the nonpolar solvent, and after it dries, it should smell absolutely nothing at all like petroleum, or whatever solvent you used. . If you use gasoline, you'll notice a strong gasoline smell, which means you're screwed. I know first hand from repeated experience that naptha works. Also, read the labels of whatever solvent you use. . Make sure it contains no benzene. Benzene is the most evil carcinogen known, and even in trace amounts it can cause cancer. There is no safe amount of benzene. On the other hand benzene is everywhere, and if some chemical engineer points out to you that there is benzene in naptha even if it's not on the label keep in mind that there is an enormous amount of benzene in automobile exhaust. . You're going to die anyway. If there is no mention of carcinogens or benzene on the label of the naptha, then there isn't enough such that you should not use it. . The finer details of this recipe I can give you another time, but I just wanted to give you some theory and a general idea of what the procedure is. I can give you some things I have from off the net pertaining to this. . : Extracting alkaloids from Tricocereus cacti. . Instructions for purifying alkaloids from Tricocereus cacti. This is a general method for concentrating alkaloids, with emphasis on mescaline, but which may be adapted to other plants and alkaloids. It requires that the alkaloids be relatively basic and that the base form be less soluble in water. . So it would work well for DMT, but not psilocybin of caffeine for example. The principle of alkaloid purification is to obtain from a plant only that fraction which is basic. This is achieved by a double layer extraction, relying on the principle that amines (as opposed to most of the other compounds in a plant) are soluble in acidic (the salt form) but insoluble in basic (the basic form) aqueous solution. . However, the basic form is soluble in non-polar organic solvents whereas the acidic/salt form is not. Thus, by varying the pH, alkaloids can be taken from aqueous solution to organic solution or vice-versa, leaving behind other materials. . Some chemicals and equipment are important for successful extraction of alkaloids from cactus. The chemicals include methanol, dichloromethane or chloroform, sodium hydroxide and hydrochloric acid. The equipment includes a distillation apparatus, a separating funnel, and various beakers and containers, pH tester, and filter. . Alternatives can be found for each of these. Method: 1) Slice and dry the cactus. I haven't worked out the best way to do this; no matter how I do it, I am always afraid that I am destroying the alkaloids. In . general, what seems to work is to slice it thinly, and run hot air over it overnight. The more water which can be removed from the cactus at this stage, the easier the process will be. 2) Pulverise the dried cactus. . I have tried using a blender, and it seems to work moderately well. The cactus is tough so you will have to be patient. The finer the grinding, the better the extraction. 3) Extract dried cactus with methanol. Ideally this is done hot using solvent-extraction apparatus (soxhlet). . Various makeshift methods may suffice for a hot extraction, but I have generally merely soaked the stuff for up to a week, cold. Ideally this step should be done three times, and the extracts concentrated. I have done it once for a week, and then washed out the absorbed methanol with fresh methanol once or twice over an hour or two. . What you should end up with, after filtering out the bulk of the cactus, is a green methanol extract. Ethanol or acetone could be substituted for methanol, but neither of these is quite as effective. It is generally desirable to use several times the weight of the dried cactus for the methanol extraction, or at least enough to cover it well in a container. . 4) Remove the methanol to leave just an extract residue. This is best done using vacuum distillation, but can be done using atmospheric distillation, to recover the solvent. If you don't mind losing several litres of methanol, you can merely boil the stuff into the atmosphere; just avoid starting a fire. ALWAYS no matter what use boiling chips (porcelain) to promote even boiling. . Methanol superboils easily, as I have found :-(. Once most of the methanol is removed, you will be left with a hundred ml or so of watery, methanoly, green slime. If it weren't for the methanol and the bad taste, this could be consumed at this point. In general, I would say that it may be worth your while going to the next stage if you can manage it. . 5) Add dilute hydrochloric acid. Sulfuric acid, etc. could be used instead, but I like to use HCl and NaOH, because the product is NaCl, which is of no consequence if it contaminates anything. HCl is not as oxidising as H2SO4. The HCl should be less than 1M, but not weaker than 0.1M (pH 0-1). . Add a few times the reduced volume of liquid - e.g. take the stuff to 400 ml from 100 ml, etc. One good idea is to let the bulk cactus residue (post methanol) dry, and then soak it for a few hours in the acid you are going to use to add at this point. This will extract the last of the alkaloids. Unfortunately, cactus being what it is, will swell enormously, and removing the HCl is tricky. . I have resorted to large quantities of HCl and a kind of press to squeeze out the acid from the bulk residue. This acid should then be filtered, and added to the methanol extract residue as above. 6) (optional) The stuff at this point will be a bit of a mess. . Adding activated charcoal and boiling gently for 10 minutes will help to congeal the chlorophyll etc. which is gumming up the stuff. Do not add too much charcoal - less than a gram should be plenty. Too much will adsorb alkaloids. . Don't use burnt wood, burnt toast, etc - get the proper stuff from the local pharmacist. Performing this step will make the next stages considerably easier. . 7) Filter the HCl extract. This will remove a proportion of the gunge. This will be easier if charcoal was used. The more gunge that can be removed at this stage, the better. . Washing the residue with fresh HCl before discarding, and adding this to the rest will ensure no loss of yield. 8) carefully basify the HCl solution with NaOH. I tend to use around a 5M solution for this, which is OK as long as you stir as it reacts. Take it well above pH 7. . You should get white clouds of alkaloids forming in the solution, and the whole will become turbid as some of the acid soluble components precipitate. Ammonia or KOH should work for this purpose as well. I have had some difficulty with ammonia not being quite basic enough in other systems. . 9) Add dichloromethane (or chloroform); be generous with the quantities if possible. Ideally, one would like to extract into CH2Cl2 3 times with equal volumes, but the amount of solvents gets huge. Ether is not all that good with mescaline extraction, I believe, even though it is easier to separate from water. . CH2Cl2 is handy because it has a very low boiling point. It is at this point in the whole operation that the most care and patience is necessary. A separating funnel is really a must - one could plausibly separate the layers with a very tall thin jar and a syringe, but this would be difficult. . Ideally, the basic solution and the CH2Cl2 will separate into 2 nice layers, the lower one (organic) containing the alkaloids. Unfortunately, while this is not difficult with most plants, it is very difficult with cactus extracts because the cacti contain so much resinous junk and natural surfactents (to retain water). . The best way I have found to separate the layers once you have shaken them together is to add plenty of salt (NaCl) to the water/base layer. This is excellent for breaking the emulsions which form. Be prepared to use large quantities of salt. 10) Separate dichloromethane layer from mixture and put aside. Repeat steps 9-10 a few times: once is insufficient, three is good, four is excessive. . Combine all the dichloromethane extracts together. This should be a slightly green solution. It will contain a bit of water, most likely. 11) Backwash the dichloromethane once with a solution of salt and NaOH (dilute). . This will clean up the last of the junk from the organic solution. Separate the layers as before and discard all aqueous material. 12) Distill off the dichloromethane (or allow to escape to the atmosphere if you are rich and don't like the ozone layer). I have found that once you are down to maybe 20 ml of residue, the best option is to place the remainder in a petri dish (or some flat dish you are going to store it on) and hitting it with a hairdryer to remove any last CH2Cl2 and water. . You should be left with a small quantity of moderately pure alkaloids. This can be easily consumed by dissolving in vodka, e.g., or should be stable for extended periods if refrigerated, frozen, kept airtight and away from moisture. . Do not expect more than a 50% yield the first time you try this: theoretically if everything is done properly, the yield should approach 100%, but this is rarely the case.
global_05_local_5_shard_00000035_processed.jsonl/24312
Site hosted by Build your free website today! There are pleasures in a pathless wood. There is calming in the lonely falls; There is society where none intrudes, cradled in the Cherokee forest, with music in its call; Nestled among the hemlock and laurel, 'tis a sanctuary to one and all.
global_05_local_5_shard_00000035_processed.jsonl/24313
Grils Just Wanna Have Fun Testo Testo Grils Just Wanna Have Fun Amici, ecco i finalisti [Intro] Killa!! Dipset, shallowmain Jim jones, santana, freaky Lets go! what they want sing [chorus] Girls just wanna have fun (oh girls) Girls just wanna have fun (girls juss wanna have) [verse 1] Damn chump pass, he a dumb ass Call jay off get a fun pass Yeah she come fast, so she leave quicker Cause she cum fast than ski ski nigger We be wit her, me, jim. zee, kidder Then she wit flea flicker, don gg get her P.e wit her, wee wee, eazy, ol me, ol g little me lick her So she need liquor never seem sicker, nigger, rap as fast She could be twista Had her alley to alley, hawai and maui, and cali the valley Up in white lotus dog you might notice That you type bogus me im quite focus And hope is hopeless, dissapaer in the air hocus pocus [chorus] [verse 2] Godamn we stuck like stuck-o Cut loose slut no here he come uh oh (uh oh) Man see what the fighting do thats why im pipng boo Aint even liking you, im exiting true Just right i do, heals high, wheels fly, real fly, nice immune And a rightous view, from high to noon, day, he play Theres a flight for two (first class!) and you caught you a baller. baller! Hawker, dog you a stalker! (stalker) Upset cause what she was showin, awww man yo you aint even knowin Ask question if youre a hoe and Whatz that?, who you wit?, where you at?, where you goin?, (where you goin) Where you goin, im flowin, she blowin, shy high like a bowing Got pies like it snowin [chorus] [verse 3] Females better twirl off yours, better curl off yours Cause i swirl off shores (then what) come back to a pearl golf course (who you) Im parock, cause girls are hoars, and the world is yours, honey sim sim with a pearl off cours And you know im in the buildin mister, wit the olsen twins, or the hilton sisters And i haul em in to the hiltons mister I milked them, i killed them, you quilt them, you missed her (missed her) You helped her, you kissed her You felt all the blisters, melt on your whiskers [chorus 2x]
global_05_local_5_shard_00000035_processed.jsonl/24314
Fadeout 1930 Testo Testo Fadeout 1930 Amici, ecco i finalisti Fadeout 1930 era I never really tried you out But all my friends who used to be Just never had the time for me You can change your colours I'll just change my point of view I'll live a lie to prove my point Or I'll turn all my thought to you Fadeout 1930 Keep a low profile Strange how it gets around Out of sight, Out of mind I look through me, I'm out of mine Everything I say, I've heard And nothings mine except my wall Do you being (begin?) to see There really is no me at all Fadeout 1930 Please don't feel scared Nothing's ever quite what it seems I hope the sadness doesn't show For I still cling to some old dreams Private thoughts just to you My head liked private ways I've never tried so hard before I've really nothing left to say Fadeout 1930
global_05_local_5_shard_00000035_processed.jsonl/24315
Memorial Day Testo Testo Memorial Day Amici, ecco i finalisti I bet you never though you'd see me scratching at air like an amputee. So what's left? I've got a head like a trainwreck. Who's keeping count of the casualties? Fatigue thrusts its jackhammer fists into my eyes, but I'm afraid to lie down. Afraid to slow down. Afraid to go home. (It's gonna catch up to me…) I'm tied in knots because of what I'm not and I can't share what I haven't got. So here's to the skinned knees and sutured hearts. Here's to the unhappy endings and all the false starts
global_05_local_5_shard_00000035_processed.jsonl/24317
(direct market link) For Android Congratulations on your purchase of FingerSmoke for Android by Aniviza! With FingerSmoke you now have a virtual fire chamber right on your screen, an interactive particle physics simulation of smoke, air currents, and OMG FIRE! If you liked lava lamps back in the hippie days, you're going to have hours of fun with FingerSmoke. Your finger sprays a hot aerosol of fuels which instantly ignite and send billowing clouds of green and purple haze, undulating smoke plumes and jets of flame may ignite the edges of the screen, usually the bottom but they can crawl up the sides. At first only a few wisps of smoke will follow your finger, as the chamber becomes more saturated with fumes, the smoke starts to build up, and pretty soon you've got an inferno on your hands, well in one hand at the least. The FingerSmoke window is invisible, so you can for example take a photo and make it your home screen background, then set it ablaze. Drop an air burst over your favorite city skyline and watch as the fireball makes a billowing mushroom cloud and sets the ground on fire!
global_05_local_5_shard_00000035_processed.jsonl/24323
Search AOL Mail AOL Mail | Weather Weather 1 - 12 out of2605 results • Warren Buffett's Buy List(01:16) • Legendary billionaire investor Warren Buffett unveils more of his stock picks, saying that he bought more shares of IBM in the first quarter, saying t... • Date: May 04, 2015 • Source: Reuters • What Is Warren Buffett's Berkshire Hathawa...(02:46) • After 50 years with Warren Buffett at the helm, Berkshire Hathaway has grown to be one of the largest companies in the world. Here's a look at how Ber... • Date: May 01, 2015 • Source: WSJLive • Questions for Warren Buffett(04:24) • Morningstar's Gregg Warren, one of three analysts who will be quizzing Warren Buffett and Charlie Munger in Omaha, describes how he narrows down his l... • Date: May 01, 2015 • Source: Morningstar.com • Warren Buffett Should Buy AutoNation Says ...(06:07) • Warren Buffett should consider buying AutoNation (AN) to add to his portfolio of companies, according to Mario Gabelli, Chairman and CEO of GAMCO Inve... • Date: May 01, 2015 • Source: The Street • Warren Buffett Says He Eats Like a Six-Yea...(04:11) • Is consuming Coca-Cola as a quarter of your daily diet the key to longevity and good health? Berkshire Hathaway CEO Warren Buffett thinks so, because ... • Date: February 26, 2015 • Source: WSJLive • Top Takeaways From Warren Buffett's Letter(02:00) • Warren Buffett’s letter to his Berkshire Hathaway shareholders was released on Saturday. WSJ's Erik Holm has all of the details. Photo: AP • Date: February 28, 2015 • Source: WSJLive • Warren Buffett Walks the Convention Floor ...(05:44) • Investor Warren Buffett walks the convention floor ahead of the annual meeting of Berkshire Hathaway (BRK.A) as shareholders look on. Buffett visits v... • Date: May 03, 2015 • Source: The Street • Berkshire Hathaway Meeting Marks 50 Years ...(01:27) • Berkshire Hathaway's (BRK.A) annual meeting this year marks a milestone - it's Warren Buffett's 50th year of controlling the massive conglomerate. Dur... • Date: May 03, 2015 • Source: The Street • Warren Buffett Talks New CEO in Berkshire ...(01:01) • Berkshire Hathaway CEO Warren Buffett talks about 50 years running the company, the CEO succession plan and the current business environment in this y... • Date: March 02, 2015 • Source: The Street • Warren Buffett Says He Eats 'Like a 6-Year...(01:07) • The third richest person on the planet, Warren Buffett, claims he eats like a 6-year-old. According to him, that means a lot of Coca-Cola, Potato Stix... • Date: March 09, 2015 • Source: Buzz60
global_05_local_5_shard_00000035_processed.jsonl/24336
I'm not looking to build a complete Minolta kit; this camera I got cheap and I just want to have it in instances where using my Nikon F100 would be too much, either due to weight, environmental factors, etc. In those instances, it makes sense to me to keep my lenses as cheap as possible. It's a stunning camera in excellent condition, but I got it mostly to use when I need a rugged manual focus camera that doesn't care if I have batteries in it, and isn't as computerized as an F100 so there's less to break if it gets humid.
global_05_local_5_shard_00000035_processed.jsonl/24337
In my test roll I ended up with 40 asa and 6 min in D76d (started in 1985 and replenished ever since, like me it continues to improve with age), Back to subject, the few prints I made were good for first work prints (I sold my 300' to Kate as I could see no great advantage in running three 35mm film types, and am back to two)
global_05_local_5_shard_00000035_processed.jsonl/24341
I want to a point I didn't see mentioned about the 67 cameras - the negative aspects of a giant negative The epson flatbed scanners use a strip film holder, so they scan 645, 6x6, 67, 6x9 with no difference. My 16bit b&w tiffs are 280mb from a 2400dpi 645 scan, so you are looking at 500mb digital negatives for the 67. If you have a modern computer with plenty of ram (8gb or more) you'll be okay, but I wouldn't try to edit one of those one a machine with only 2gb of ram. Now, you can drop the dpi to 1200 and cut that by 4 and still have good looking images; they will look fine on facebook, but your prints won't be nearly as nice as they could be. If you don't already, at some point you will want to see your MF images enlarged on traditional photopaper. I find making a good looking print is much easier in either a fully digital or fully analog process. You can still get a good print from a hybrid process, but I find (even as a complete noob) it is far easier to get an amazing looking print from 645 in the dark room than scanned, edited, and sent to the local lab. Getting a good looking 8x10 print from 645 is much easier than from 35mm, so you'd expect me to say go up to a 67 for something even better - but that only works if you have access to an enlarger that can handle 67 negatives, and many can't. You'll find that at the amateur level (ie not absolutely huge and heavy), most enlargers can only take up to a 6x6 negative. Since I'm in the process of setting up my own darkroom I'm very grateful that I went with 645 and not 67 (like you, I had considered a 67 system at one point). Since you need to crop a 6x6 for an 8x10 or 11x14 print, there isn't much resolution difference between 6x6 and 645 (unless you are printing square). If you print a 67 negative on a 6x6 enlarger, you'll be cropping it down to 6x6 in the negative carrier, then down to (almost) 645 when you put it on paper. So why bother with the extra cost and weight of the 67? Now, if you have access to an enlarger that can handle the larger negative, by all means, go for it. If like me, your darkroom dreams are realised in a small photoclub darkroom or a bathroom with a portable enlarger, 645 is a better choice.
global_05_local_5_shard_00000035_processed.jsonl/24345
It sounds as though your shortest exposure was enough, and the other negatives have more exposure than necessary. In foggy conditions, there may be no subject areas that are rendered as full black, even at night. Rather than chemical fog or light leaks, it sounds as though you&#39;ve simply photographed the subject fog itself.
global_05_local_5_shard_00000035_processed.jsonl/24348
TERRART® polished terracotta by NBK Keramik TERRART® polished terracotta Manufacturer NBK Keramik Architonic id 1072162 Send page Print page Save page The colour tones and surfaces that are portrayed here only represent a selection from our range. Any nuance is possible if requested. It is absolutely essential that an original sample is submitted, in order to establish the colour tone. Please note that colour representations on the internet can perhaps vary from the real colour. More More Similar products
global_05_local_5_shard_00000035_processed.jsonl/24353
Skip to Content World Wide Web Conference 2004 Printer-friendly versionPrinter-friendly versionSend to friendSend to friend WWW2004 [1] was the 13th conference in the series of international World Wide Web conferences organised by the IW3C2 (International World Wide Web Conference Committee). This was the annual gathering of Web researchers and technologists to present the latest work on the Web and Web standardisation at the World Wide Web Consortium (W3C). This conference is very much a networking event in both the technical and personal sense. For the last 3 years it has had pervasive wireless networking ('wi-fi') available, allowing interaction with the sessions and the speakers during the conference. For the last two years, I have been involved in providing community coverage [2][3] via IRC and weblogging (with the help of the XMLhack people) to take a contemporaneous record of the event, thereby allowing users on- and off-site to participate as well as making it possible to keep an eye on multiple sessions, which is tricky in multiple parallel-track conferences such as this. It also means that a more permanent public record of the event appears rather quickly. Conference Tutorials and Workshops One of my favourite sessions was something that (sadly) I could not attend all day, a fascinating workshop Beyond the Click: Interaction Design and the Semantic Web [4]. This discussed many interesting research problems about dealing with representing richer information which the Semantic Web can provide. I dipped into this a few times and wished I could have seen more. This looks like an area to watch. Opening Keynote The conference opened with a declaration that 19 May was 'World Wide Web Day in New York City', read by Gino Menchini, standing in for the Mayor of New York who was attending the 9/11 hearings. This was followed by the opening keynote from Sir Tim Berners-Lee, Director of the W3C and inventor of the Web. This year he celebrated the achievements and discussed some topical Web-related technologies in his keynote Celebrations and Challenges [5]. Berners-Lee described how the foundation of the Web rested not only on the use of URIs for naming Web pages, but that it was critically based on a lower-level technology, the Domain Name System (DNS). The DNS provides the distributed naming system that allows the Web to scale by removing the need to pre-cordinate names; this was one of the big problems affecting earlier closed hypertext systems with centralised linkbases. This meant making links between Web pages became cheap and easy, although they could now fail (i.e. error 404). He described how domain names are now brands that people use like when they want to find out about a brand or company. Short domain names are one of the few limited resources on the Web. Most recently there have been proposals to expand the Top Level Domains (TLDs) such as .com, .org etc. to include many more. Author's Aside: There have already been domain name expansions but I have never seen an .aero or .museum web address used prominently. More popular recent expansions have included .name for personal sites. The new domains being suggested tend to be for particular content such as .xxx to fence off a space for pornography. This has been suggested in the past and the key issue remains: whose community or legal standard defines this term? He suggested that these are more motivated by the desire to print money in the form of domain names. Only the largest organisations can afford to keep buying up etc. for each new .abc to protect their brands, this despite the fact that nobody is ever likely to seek out the bigco site - people will just add .com and try that first. Berners-Lee cited the .mobi domain proposal for mobile phone content as a good example of a bad idea. If you are using a .mobi Web site on your phone and synchronise with your laptop or desktop, does the bookmark still work? Why not? It was a wrong-headed choice and there are better solutions for the actual problem - such as dynamically adjusting the content for the device through the server, a solution which works right now. Burning that single content choice into the URI will not work; 'small devices' are changing all the time and acquiring more features, thereby making it a choice that will soon be out of date. Imagine a .html1 domain for all original Web content and new domains each time a new type of content is needed [6]. Consequently Berners-Lee was of the view that we should avoid the temptation to create new top-level domains except in special circumstances, for example in order to identify phones, (for which there are several proposals). However the approach should be to identify the device - not its properties.( I should add that I was just picking one topic from a larger speech a lot of which has been reported elsewhere [5]). Main Conference As my research interest for some time has been RDF and the Semantic Web, this is the main conference for that area and indeed there were multiple tracks that essentially served as a mini-conference with several interesting papers from practitioners. On the first day I attended a panel entitled Will the Semantic Web Scale whose members, for the most part, appeared not to have noticed that it already had. There were several audience members who vigorously disagreed with the panel. One other highlight of the first day was in the Web of Communities track presentation The Role of Standards in Creating Community by Kathi Martin, Drexel University. It included an analysis of words taken from subtitle indexing of President Bush's State of the Union speech; this was run in parallel with a display of retrieved images matching the words which gave a novel form of display. Kathi also discussed other work being done on the Digimuse Project [7] at Drexel. Later that day in Semantic Interfaces and OWL Tools, the Haystack browser was again demonstrated by Dennis Quan of IBM. It's a powerful interface but rather scary, you could call it a 'Shrek' if you like! The second day started with a pair of plenary talks. The first one, Empowering the Individual, by Rick Rashid of Microsoft, was more of a rush through possible future technologies than anything profound. The buzzword density was huge. Following that was an interesting presentation by Udi Manber from search company, (an Amazon company), on their work on search innovations and the problems they had found, including their work on long-term search problems. He was limited in talking about the cool stuff coming up, but it was good to see a serious competitor and innovator to match Google. If you try you may be surprised to see it recognise your name, this is because as part of Amazon, it reads your cookie and can link the items together. There were several questions raised about their site privacy and Udi pointed out that there was a cookie-free anonymous site [8] that people could use without all the cool bits. The sessions on the second day that stood out for me were in the Semantic Web Applications track, CS AKTive Space: Representing Computer Science in the Semantic Web presented by Les Carr and Monica M.C. Schraefel from the University of Southampton. I've seen some of the CS AKTive Space work before, but it's always interesting since it shows the use of real data in a Semantic Web of information which, to a UK computer scientist such as myself, is very topical. The other fun, fact-filled talk in the Reputation Networks track, Information Diffusion through Blogspace, was presented by Andrew Tomkins of IBM. He showed multiple ways of presenting information grabbed from 12,000 RSS feeds over time to synthesize such things as current, and especially evolving blog topics. It's probably unclear whether this is yet a robust source of information, but it was certainly interesting, in the style of the Google Zeitgeist [9], or Yahoo! Buzz [10], but more detailed. On the final day of the main conference, Friday 21 May, the best presentations that I saw were Newsjunkie and Information Diffusion through Blogspace by Gruhl et al in the Mining New Media track. More delving into blogspace for fascinating facts, which seems to be a bit of a trend here. As a Semantic Web developer I also found Index Structures and Algorithms for Querying Distributed RDF Repositories by Heiner Stuckenschmidt et al in the Distributed Semantic Querying track, a very useful analysis for future consideration. This session was a highlight of the conference for several Semantic Web developers to whom I talked, as it presented results of practical work. Although I missed it, I heard that the Semantic Web Foundations track was pretty good and A Proposal for an OWL Rules Language by Horrocks et al will probably be a good pointer to future work at the high-end of Semantic Web development. Developer's Day My favourite part of the WWW2004 series is the Developer's Day, this year even larger than ever and with lots of interesting things in parallel tracks - how to choose between a track called "cool stuff" and "Semantic Web" for example? I went to see Doug Cutting about the Nutch [11] open source Web search engine. Doug was one of the creators of the well-regarded Lucene search engine, and Nutch is his latest work. It seems really handy and looks like it might be a replacement for the venerable ht://Dig. He was aiming to improve the transparency of Web search, (what the commercial engines won't tell you), such as how the results were created. This presentation was very well received and I expect there were more than a few downloads during the talk. As last year, Tim Berners-Lee did a live question-and-answer walkabout over lunch and the topics ranged from the general Web to applications for the Semantic Web. Maybe not as good as last year. After lunch I saw Tucana [12] demonstrate their Semantic Web work, (the core of which is open source, the rest commercial), which includes a high performance and scalable Semantic Web system. They have reached over 1 billion triples on 64-bit PCs which they provide with advanced inferencing and searching; which somewhat contradicted the earlier panel on scaling the Semantic Web. Jim Hendler of the University of Maryland and his group demonstated their SWOOP [13] ontology browser and editor. They showed how much easier it was to create OWL ontologies and work with them. If you have ever had a brush with the Protege editor, and come off worse, this is the friendly version, designed for OWL and still being improved. The final session I attended was that of my colleague Alistair Miles from RAL who was presenting on our SWADE Project Thesaurus Activity [14] which has produced the SKOS (Simple Knowledge Organisation Systems) set of schemas and documents and is generating good feedback. A great conference to attend in a central venue in Manhattan, five minutes from Times Square and lots of innovation going on. It feels a bit like the Web conference from the late 1990s as the Web grew. 1. WWW2004 Conference 2. Kelly, B., "WWW 2003 Trip Report", Ariadne 36, July 2003, 3. Various, "WWW2004 Community Coverage", 4. WWW2004 workshop Beyond the Click: Interaction Design and the Semantic Web 2004 (IDSW04), 5. • Berners-Lee, T., "Celebrations and Challenges, WWW2004 Keynote", 19 May 2004, • Foley, M-J., "Berners-Lee: Just Say No to More Domain Names", Microsoft Watch, 19 May 2004,,1995,1595457,00.asp • Ford, P., "Berners-Lee Keeps WWW2004 Focused on Semantic Web",, 20 May 2004, • Ford, P., "WWW2004 Semantic Web Roundup",, 26 May 2004, 6. Berners-Lee, T., "New Top Level Domains Considered Harmful", W3C, 30 April 2004, 7. Digmuse Project, Drexel University 8. A9 cookie-free anonymous site 9. Google Zeitgeist 10. Yahoo! Buzz Index 11. Yahoo! Labs demo of Nutch 12. Tucana Technologies 13. Semantic Web Ontology Overview and Perusal (SWOOP), Mindswap lab, University of Maryland, 14. Semantic Web Advanced Development for Europe (SWADE) Thesaurus Activity Author Details Dave Beckett Senior Technical Researcher Institute for Learning and Research Technology University of Bristol Web site: Return to top Date published:  30 July 2004 How to cite this article Dave Beckett. "World Wide Web Conference 2004". July 2004, Ariadne Issue 40 article | by Dr. Radut
global_05_local_5_shard_00000035_processed.jsonl/24386
Atheist Nexus Logo The historical Jesus of Nazareth is the author of the New Testament and finisher of the Books of Ezekiel and Daniel cryptanalysis. Proof that Jesus is the author and finisher, the Holy Ghost-writer of the New Testament, rests under a Rock at Stonehenge [four feet (4 ft, 1.2 m) below Heelstone] and in seven (7) known facts: 1. Matthew was a functionally illiterate tax collector; 2. Mark was a functionally illiterate 'missionary'; 3. Luke was a functionally illiterate 'slave physician'; 4. John was a functionally illiterate 'fisherman'; 5. Jesus' the "author and finisher" (Hebrews 12:2); 6. Jesus' disclosed personal thoughts therein; 7. Jesus' signature in the New Testament ending. Matthew, Mark, Luke, and John, were good-hearted Rocky Balboa types (first Rocky movie). Not much of a difference between them really. The early 1st century Roman system for collecting taxes lent itself to excess, exploitation, and corruption. Consider the structure in 25 AD. The Italian government 'bid out' the right to collect taxes in a region of the empire. Rome's government would say, We need 'x' amount of revenue from this region. Wealthy people (mob bosses) would bid on the right to collect (shake down) taxes in that region. What these thugs collected above the Italian bosses' demand was their profit (the take). These Roman regional collectors would hire managers (gangsters) in specific districts of the region (such as Zacchaeus) for the shake down. The man would have a specific sum he must collect in the district. Anything he collected above that sum was kept (his take). These managers would hire local Italian gangs in their district to do the actual collecting (like Matthew's gang). It was their job to actually collect (shake down) amounts assigned by their managers (gangsters) from the poor souls. When they collected more than the managers requested, the amount which they collected above what was required was kept (their take). It does not require a genius to imagine how Matthew, Mark, Luke, and John, functionally illiterate Rocky Balboas, worked. The Stallion Church is rooted from this origin of the Italian (Roman) mob and their bosses. Most just good-hearted thugs like Matthew, the functionally illiterate tax collector, and his good-natured associates; Mark the functionally illiterate 'missionary', Luke the functionally illiterate 'slave physician', and John the functionally illiterate 'fisherman'. They were debt collectors actually, not one of them capable of authoring Matthew, Mark, Luke, John, etc, nor finishing the Books of Ezekiel and Daniel cryptanalysis. Old Testament authored in the First Person, Holy Qur'an (recited) in the Second Person, New Testament written in the Third Person, Holy Ghost-writer Views: 48 Join Atheist Nexus Badges  |  Report an Issue  |  Terms of Service
global_05_local_5_shard_00000035_processed.jsonl/24413
Search form An Interview With Richard Williams Dean Kalman Lennert interviews Richard Williams on his new book, music, 3D vs. 2D and more. Richard Williams. All photographs by Jacob Sutton. Richard Williams. All photographs by Jacob Sutton. Master animator. Teacher. Three time Academy-Award winner. These are just a few titles and honors associated with director Richard Williams. Now, with the publication of his new book, The Animator's Survival Kit, he can add the title of author to that list. I recently had the chance to speak with Richard Williams about the book, his most recent animation masterclass and his opinions on the latest animation technology. Before I begin, however, I would like to thank the members of ASIFA-East and the folks at Blue Sky Studios for contributing some wonderful questions to this interview. Dean Lennert: I understand that you had a masterclass in Hong Kong last year? Richard Williams: Yeah, and it went really well. I was very apprehensive because, I thought, with the cultural differences, will my so-called humor work? And the answer is yes. DL: Was the class predominantly traditional animators or computer? RW: There were 150 students and only two were 2D animators. One fellow used to work for me over here in England. DL: I'm surprised that there weren't more traditional animators from the studios that do series work for the U.S. RW: No. It wasn't that kind of thing. It was the government backing the development of animation in Hong Kong. And, of course, it's all on computer. So, they've got the equipment and they've got marvelous ideas but, they're missing pieces of information. So, I was the missing link between the classical knowledge and the modern technology. They were very happy, saying that it was exactly what they wanted to get. It was very informal. A very enjoyable experience. DL: At that point how many masterclasses have you taught? RW: Hong Kong was number twenty. Well, we're trying to give them up you see. That's one of the reasons for doing the book. DL: Oh, really? RW: I don't want to make a career of this thing. We started the masterclass because I didn't want to go back into the animation industry as such and wanted to do my own work. As this is the information age and I've got all this information, Mo [Richard's wife, documentary filmmaker Imogen Sutton] said, "Well, why don't you teach for awhile?" DL: How has it been making the transition from being a student of animation masters like Milt Kahl, Ken Harris and Art Babbitt to teaching the next generation of animators? RW: Well, none of my teachers, except for Art Babbitt, were actually teachers. Ken Harris would sometimes have a burst of eloquence but he'd usually have to show you on the drawing board. And with Milt, he just kept saying, "Well. You know. You know." I'd say, "No. I don't know." And then, finally, out would come the answer and I'd remember it. I have total recall of anything I'm interested in and no recall of anything I'm not interested in. (laughs) I can recall practically every conversation I ever had with Milt Kahl about animation so, it was easy. What was hard was to boil it all down so it's simple. I mean, it is simple really. All the information from the different guys nearly always comes out to the same thing. But, to get it down into a really simple phrase or drawing that covers it, is the hard part. DL: Do you ever find yourself saying, "Oh, I wish I could ask Milt this," or "I wish I could run this by Ken or Art?" RW: No, truthfully. I never even think, "Now, how would Milt approach this?" I just think, "How would I approach this?" When I do my own work I don't think about it that way. The whole idea is to already have the knowledge absorbed into your bloodstream, and then it's automatic. A concert violinist doesn't think of the scales when he's playing. If he did, he'd crash. DL: Has the content or format of the masterclass evolved over time? RW: Yes. I think that it's much less spontaneous but I can get more information in now. As I keep doing it I get to be like a nightclub comic or an actor and I can tell when I'm not being clear enough and when they are getting it right away. The whole thing is to be clear, isn't it? There's a lot of show business in it. I think that the answer is that I'm much better at it now and I don't have to sweat as much before I do it because I've done it so many times. And because of that, I'm able to get more in. DL: I've heard that you have some 35 volumes of notes you made from your mentors and teachers? RW: Yeah. DL: And that you boiled these down into ten volumes of what you considered to be the most important information? RW: That's right. Ten volumes of a hundred pages each, which I did for Alex [Richard's son] years ago when he got a job in Germany as an animator. And then that's boiled down into three hundred pages which I used for the classes. Then when I did the book I've sort of expanded it out. Not more information but, more examples of the same information. I didn't just use the three volumes. I went back through everything (laughs), which took forever. DL: Did you find it a little more liberating working in book format than to have to cram everything into a three day masterclass? RW: No. I actually found it much harder. Because I had to get everything absolutely right. In the class you might gloss over something without noticing, because of the shortage of time. Well, in the book it's got to be absolutely bombproof. So, I worked very hard to make sure everything is absolutely clear. It just took forever, three and a half years. I thought that it would take a year. I'm like a terrier, ya know. I just won't let go of the bone until it's done. And I think it's done. I'm happy with it. I'm very pleased that Faber [the book's publisher] allowed me to do it my way. I said to Mo at the end of it, "Well this time I can't blame anybody. This is 352 pages of stuff and if there is anything wrong with it it's my fault." (laughs) That's it. Nobody screwed with it. DL: Did you run across any stumbling blocks when putting the book together? RW: No. I just found that I had an awful lot of material and yet it all had to get in. What was it Shakespeare says? "More matter with less words." So, that was the hard part just to keep making it clear and getting it all in. I think I managed to keep it full of air and light. It's easy to look at, easy to read. DL: Does the information in the book follow the structure of the masterclass? RW: Yes. You could say that the masterclasses were rehearsals for the book. Although we didn't know it at the time. DL: It has been observed that you bring a lot of energy and enthusiasm to your teaching style. How does this translate to the printed page? RW: When we were checking the proofs, Mo picked up a whole bunch of them and was reading them on the train, she said that my voice was so strong that, to her surprise, it was a page-turner. And I said, "What? During all that technical stuff? That can't be." I looked at it a couple of days ago, I have enough distance from it now, and I think, in ways, it's funnier than the class. Whatever it is I have to offer is definitely in there. DL: Are there any recommended exercises in the book? RW: No. Ya' know I hated school. I just hated school. Anything to do with the professorial, I've tried to get that out of there. I've put in my experience; here's the principle, this is how it works and this is how to use it. Use it your way. It's everything I've absorbed over the years. My experience and what I found to be true and what I found wasn't. DL: Do you include many of your anecdotes? RW: There's enough in there to give a feel for the background to all this knowledge. DL: Are there any plans to have this book translated into other languages? RW: I guess so but my hand written text is really part of the drawings. It's a mountain of art work and most of the text is embedded into the drawings like an artists' notebook. Also it's conversational not didactic. DL: What are some of your non-animation related inspirations? RW: Bix Beiderbecke [jazz cornetist, pianist and composer 1903-1931]. I'm crazy about a lot of music but Bix is my favorite artist in any medium. Ever! Two notes of Beiderbecke and I'm off. He just kills me. And in movies Kurosawa is by far my most favorite. He's the master as far as I'm concerned. When I first saw Rashomon I was 16, and I thought, "Oh! I see, movies are art! Or at least this man's movies are art." (laughs) DL: You play the cornet, correct? RW: The cornet and flugelhorn. DL: What type of music do you like to play? RW: I'm a kind of New York-Dixielander ... whatever you call it. 1940's Dixieland, swing and mainstream. I used to play with Max Kaminsky, the great trumpeter in New York. He was my teacher and friend and he gave me on the job training. DL: How often do you get out to play? RW: At the moment I play three times a week. And I practice all the time. I had to cut the playing down a bit while doing the book. DL: Do you find that there is a difference in expressing yourself through music vs. animation? RW: Only in that it's immediate. You play and there's the sound. It flies into the air and it's gone. You can't play it back and you can't fix it. I think of animation as drawn music. It's very similar; the timing is similar -- the passion, the contrast, how you join things together interestingly. DL: Do you have a preference of one over the other? RW: Oh, I think I'd rather draw. Music takes me a lot of time and I feel it can sabotage my other work if I'm not careful. So, I think that it is drawing and playing, in that order. DL: When you started in the industry what was your vision for the future of animation? RW: Why I never had any, Dean. Never. And I still don't. I just think that it's such an amazing medium that, cripes, I wonder what I could do with it? Like the thing I'm on now. I've been thinking about it since I was 15. I was at that time giving up my earlier ambition to animate in favour of painting but I wondered if I became an animator would I ever be good enough to animate this idea here? So, now I am seeing if I am good enough. (laughs) We don't know yet. DL: Would you have any interest in utilizing a computer or directing computer animators? RW: I think if I was younger, yes definitely. I am doing it indirectly, I guess, since nearly every time we have a masterclass it's a higher percentage of computer guys. There's usually about 20% average of 2D now. In the beginning it was 80% 2D animators. DL: What effect do you see these new tools having on the quality of the work? RW: Oh, I think it's great! The computer guys are getting better and better at aping reality. That's marvelous that they can do it but, how much better it would be if you invent what can't be. I mean when was the last time you saw a really funny walk in animation like they did in the 1930s? Where the action itself was funny or fascinating? I think that's the place to go; step backwards and invent with modern technology. DL: Do you feel that with having the unlimited un-do option a computer offers a benefit or detriment to the mastery of the art form? RW: Oh, benefit, benefit! But, everything in life is a double-edged sword isn't it? It seems to me that every time they invent a new thing they gain this terrific new thing and they also lose a little bit of something else. I certainly don't think that every new innovation is a step forward particularly. It's just a step different. DL: Could you place the following aspects of animated film production in the order of most important to least important: voice talent, animation, story, production design. Production design is the least important. I would put animation first but, only just ahead of story. I think that stories are pretty easy to come by and most stories these days are just formulas. I think what you remember, or at least I remember in a movie, is the characters. If I think of Seven Samurai I don't think of the story I think of the seven different samurai. As Disney said to Frank Thomas, "Get the entertainment right." Then getting good voices is absolutely vital. Take The Lion King as a good example. The voices are marvelous and all utterly separate from each other in tone. With voices it's very important that they contrast each other. Laurel and Hardy; utterly, utterly different voices. Abbott and Costello. We have to separate the personalities into big and little, fat and thin, upper-class, lower-class. You've got to have contrast. Yeah, production design is way down the line. I think that's just giving it an interesting look. Although the whole thing should be organic, shouldn't it? Whenever I have an idea it's all of a piece. I couldn't separate it out. DL: With the success of Shrek this summer over some traditionally animated films, what are your thoughts about the future of 2D animation? RW: I think it should go graphic. I think it's a shame when the 2D tries to look like 3D because it can't. It shouldn't try to follow the fashion for this burgeoning, expanding computer thing, which is wonderful of itself. The 2D should go do what it does best. The Sistine ceiling is pretty impressive but, you can take a drawing of Michelangelo's and it is, in a way, more impressive than the painting in that you see his direct thinking. There's something good about an old master's preparatory drawing, before he does the painting. And the great stuff, say, Degas' last paintings. You know, those big chalk things of the women in the tub? He couldn't see very well at that point and they were rough as hell. They're the best things he ever did! And I think we should go that way. I think, because the computer thing can take over all the polished areas so beautifully, we 2D artists should just go back to a hand-crafted approach. Obvious drawings that walk and talk. Dean Kalman Lennert is an animator/lecturer working in New York. His latest work can be seen in Twentieth Century Fox's Ice Age coming to theaters March 15, 2002.
global_05_local_5_shard_00000035_processed.jsonl/24469
Vitamin E 'may be bad for bones' • 5 March 2012 • From the section Health Almonds are a dietary source of vitamin E Vitamin E supplements may interfere with the process that keeps bones healthy, suggest Japanese scientists. Writing in the journal Nature Medicine, the Keio University team said mice given large doses had lower bone mass - if the same was true in humans, fracture risk would be increased. Vitamin E is found in oils, green vegetables such as spinach and broccoli and in almonds and hazelnuts. But a UK expert said supplements could be problematic. The relationship between nutrients such as vitamin D and bone health are well established, but there is far less research which looks at the role of vitamin E. Bone stripping The research at Keio University in Tokyo looked at what happened when mice had not enough vitamin E, and what happened when they were given supplements. Although some early studies suggested that consumption of the vitamin had a positive effect on bone mass, the Japanese team found the reverse was true, with bone health improving in the deficient mice, and losing bone mass when given supplements. The size and density of bones in the body is not fixed in adulthood, but dependent on a balance between cells which lay down new bone, called osteoblasts, and cells which strip it away, called osteoclasts. The researchers suggested that vitamin E could encourage the formation of osteoclast cells, which meant more bone was lost than would be laid down. Similar experiments in rats, including work published in 2010, found the opposite results to the latest study, even suggesting that vitamin E could be useful as a bone-growth promoting treatment for older people. But Dr Helen Macdonald, who researches the influence of nutrition on bone health at Aberdeen University, said that there were a small number of studies, including her own, which found negative effects. She stressed there was no reason for people to change their diet to avoid the relatively small amounts of vitamin E contained in it. She said: "However, vitamin E supplements involve doses far higher than those in a normal diet. "There is increasing evidence that taking supplements doesn't do any good, and if anything, may be doing harm." More on this story Related Internet links The BBC is not responsible for the content of external Internet sites
global_05_local_5_shard_00000035_processed.jsonl/24531
The History, Imprisonment, and Examination of Mr. John Hooper, Bishop of Worcester and Gloucester John Hooper, student and graduate in the Uersity of Oxford, was stirred with such fervent desire to the love and knowledge of the Scriptures that he was compelled to move from thence, and was retained in the house of Sir Thomas Arundel, as his steward, until Sir Thomas had intelligence of his opinions and religion, which he in no case did favor, though he exceedingly favored his person and condition and wished to be his friend. Mr. Hooper now prudently left Sir Thomas' house and arrived at Paris, but in a short time returned to England, and was retained by Mr. Sentlow, until the time that he was again molested and sought for, when he passed through France to the higher parts of Germany; where, commencing acquaintance with learned men, he was by them free and lovingly entertained, both at Basel, and especially at Zurich, by Mr. Bullinger, who was his singular friend; here also he married his wife, who was a Burgonian, and applied very studiously to the Hebrew tongue. At length, when God saw it good to stay the bloody time of the six articles, and to give us King Edward to reign over this realm, with some peace and rest unto the Church, amongst many other English exiles, who then repaired homeward, Mr. Hooper also, moved in conscience, thought not to absent himself, but seeing such a time and occasion, offered to help forward the Lord's work, to the uttermost of his ability. When Mr. Hooper had taken his farewell of Mr. Bullinger, and his friends in Zurich, he repaired again to England in the reign of King Edward VI, and coming to London, used continually to preach, most times twice, or at least once a day. In his sermons, according to his accustomed manner, he corrected sin, and sharply inveighed against the iniquity of the world and the corrupt abuses of the Church. The people in great flocks and companies daily came to hear his voice, as the most melodious sound and tune of Orpheus' harp, insomuch, that oftentimes when he was preaching, the church would be so full that none could enter farther than the doors thereof. In his doctrine he was earnest, in tongue eloquent, in the Scriptures perfect, in pains indefatigable, in his life exemplary. Having preached before the king's majesty, he was soon after made bishop of Gloucester. In that office he continued two years, and behaved himself so well that his very enemies could find no fault with him, and after that he was made bishop of Worcester. Dr. Hooper executed the office of a most careful and vigilant pastor, for the space of two years and more, as long as the state of religion in King Edward's time was sound and flourishing. After he had been cited to appear before Bonner and Dr. Heath, he was led to the Council, accused falsely of owing the queen money, and in the next year, 1554, he wrote an account of his severe treatment during near eighteen months' confinement in the Fleet, and after his third examination, January 28, 1555, at St. Mary Overy's, he, with the Rev. Mr. Rogers, was conducted to the Compter in Southwark, there to remain until the next day at nine o'clock, to see whether they would recant. "Come, Brother Rogers," said Dr. Hooper, "must we two take this matter first in hand, and begin to fry in these fagots?" "Yes, Doctor," said Mr. Rogers, "by God's grace." "Doubt not," said Dr. Hooper, "but God will give us strength;" and the people so applauded their constancy that they had much ado to pass. January 29, Bishop Hooper was degraded and condemned, and the Rev. Mr. Rogers was treated in like manner. At dark, Dr. Hooper was led through the city to Newgate; notwithstanding this secrecy, many people came forth to their doors with lights, and saluted him, praising God for his constancy. During the few days he was in Newgate, he was frequently visited by Bonner and others, but without avail. As Christ was tempted, so they tempted him, and then maliciously reported that he had recanted. The place of his martyrdom being fixed at Gloucester, he rejoiced very much, lifting up his eyes and hands to heaven, and praising God that he saw it good to send him among the people over whom he was pastor, there to confirm with his death the truth which he had before taught them. On February 7, he came to Gloucester, about five o'clock, and lodged at one Ingram's house. After his first sleep, he continued in prayer ujntil morning; and all the day, except a little time at his meals, and when conversing such as the guard kindly permitted to speak to him, he spent in prayer. Sir Anthony Kingston, at one time Dr. Hooper's good friend, was appointed by the queen's letters to attend at his execution. As soon as he saw the bishop he burst into tears. WIth tender entreaties he exhorted him to live. "True it is," said the bishop, "that death is bitter, and life is sweet; but alas! consider that the death to come is more bitter, and the life to come is more sweet." The same day a blind boy obtained leave to be brought into Dr. Hooper's presence. The same boy, not long before, had suffered imprisonment at Gloucester for confessing the truth. "Ah! poor boy," said the bishop, "though God hath taken from thee thy outward sight, for what reason He best knoweth, yet He hath endued thy soul with the eye of knowledge and of faith. God give thee grace continually to pray unto Him, that thou lose not that sight, for then wouldst thou indeed be blind both in body and soul." When the mayor waited upon him preparatory to his execution, he expressed his perfect obedience, and only requested that a quick fire might terminate his torments. After he had got up in the morning, he desired that no man should be suffered to come into the chamber, that he might be solitary until the hour of execution. About eight o'clock, on February 9, 1555, he was led forth, and many thousand persons were collected, as it was market-day. All the way, being straitly charged not to speak, and beholding the people, who mourned bitterly for him, he would sometimes lift up his eyes towards heaven, and look very cheerfully upon such as he knew: and he was never known, during the time of his being among them, to look with so cheerful and ruddy a countenance as he did at that time. When he came to the place appointed where he should die, he smilingly beheld the stake and preparation made for him, which was near unto the great elm tree over against the college of priests, where he used to preach. Now, after he had entered into prayer, a box was brought and laid before him upon a stool, with his pardon from the queen, if he would turn. At the sight whereof he cried, "If you love my soul, away with it!" The box being taken away, Lord Chandois said, "Seeing there is no remedy; despatch him quickly." Command was now given that the fire should be kindled. But because there were not more green fagots than two horses could carry, it kindled not speedily, and was a pretty while also before it took the reeds upon the fagots. At length it burned about him, but the wind having full strength at that place, and being a lowering cold morning, it blew the flame from him, so that he was in a manner little more than touched by the fire. Within a space after, a few dry fagots were brought, and a new fire kindled with fagots, (for there were no more reeds) and those burned at the nether parts, but had small power above, because of the wind, saving that it burnt his hair and scorched his skin a little. In the time of which fire, even as at the first flame, he prayed, saying mildly, and not very loud, but as one without pain, "O Jesus, Son of David, have mercy upon me, and receive my soul!" After the second fire was spent, he wiped both his eyes with his hands, and beholding the people, he said with an indifferent, loud voice, "For God's love, good people, let me have more fire!" and all this while his nether parts did burn; but the fagots were so few that the flame only singed his upper parts. The third fire was kindled within a while after, which was more extreme than the other two. In this fire he prayed with a loud voice, "Lord Jesus, have mercy upon me! Lord Jesus receive my spirit!" And these were the last words he was heard to utter. But when he was black in the mouth, and his tongue so swollen that he could not speak, yet his lips went until they were shrunk to the gums: and he knocked his breast with his hands until one of his arms fell off, and then knocked still with the other, while the fat, water, and blood dropped out at his fingers' ends, until by renewing the fire, his strength was gone, and his hand clave fast in knocking to the iron upon his breast. Then immediately bowing forwards, he yielded up his spirit. Thus was he three quarters of an hour or more in the fire. Even as a lamb, patiently he abode the extremity thereof, neither moving forwards, backwards, nor to any side; but he died as quietly as a child in his bed. And he now reigneth, I doubt not, as a blessed martyr in the joys of heaven, prepared for the faithful in Christ before the foundations of the world; for whose constancy all Christians are bound to praise God.
global_05_local_5_shard_00000035_processed.jsonl/24532
Parallel Bible results for Psalm 116:17 New American Standard Bible New International Version Psalm 116:17 NAS 17 To You I shall offer a sacrifice of thanksgiving, And call upon the name of the LORD . NIV 17 I will sacrifice a thank offering to you and call on the name of the LORD.
global_05_local_5_shard_00000035_processed.jsonl/24534
Introduction to the Dead Sea Scrolls The Dead Sea Scrolls and why they matter << Back to Dead Sea Scrolls Topic Page Remarkable Finds In early 1947 (or late 1946) an Arab shepherd searching for a lost sheep threw a rock into a cave in the limestone cliffs on the northwestern shore of the Dead Sea. Instead of a bleating sheep, he heard the sound of breaking pottery. When he investigated, he found seven nearly intact ancient documents that became known as the Dead Sea Scrolls. Three of the scrolls, including the Book of Isaiah, were acquired in Bethlehem by Eleazar L. Sukenik of The Hebrew University just as the United Nations voted by a two-thirds vote to partition Palestine, thus creating a Jewish state for the first time in 2,000 years. The other four scrolls were acquired by the Metropolitan Samuel, the Jerusalem leader of a Syrian sect of Christians. When he was unable to sell them in Jerusalem, he took them to the United States, where they were displayed in the Library of Congress. Still unable to sell them, he placed a classified ad in The Wall Street Journal offering them for sale. Through fronts, they were purchased for Israel by war hero and archaeologist Yigael Yadin, Sukenik’s son. A special museum, The Shrine of the Book, was built in Jerusalem to house the scrolls. Excavations Begin Père Roland de Vaux of the École Biblique et Archéologique Française de Jérusalem, together with G. Lankester Harding, the British-appointed head of the Jordanian Department of Antiquities, mounted an archaeological excavation early on at Khirbet Qumran, near the cave where the scrolls had been found (by that time, the Bedouin had also found a second cave). Since then, a debate has raged among scholars over the relationship of the Qumran ruins to the scrolls. The majority of scholars believe Qumran was the monastery-like settlement of a Jewish sect known as Essenes, to whom the scrolls belonged. Other suggestions range from a caravanserai to a pottery factory. Ultimately a total of 11 caves were found (mostly by the Bedouin) containing ancient manuscripts. Scholars date the scrolls between about 250 B.C.E. and about 68 C.E., when Roman legionaries overran the Judean Desert on their way to destroying Jerusalem and the Temple (which they did in 70 C.E.). The most famous, or infamous, of the caves is Cave 4, found by the Bedouin practically under the noses of the archaeologists digging at the adjacent ruins. Cave 4 contained more than 500 different manuscripts, but all in tatters. About 80 percent of them had been looted by the Bedouin before the archaeologists discovered the cave. The archaeologists retrieved the remaining 20 percent, but they were forced to buy the other 80 percent, chiefly through an Arab middleman known as Kando. The publication of the Cave 4 fragments was assigned under Jordanian auspices to eight scholars. Over the years the publications of this team gradually dwindled to a trickle and finally disappeared. In the meantime, the unpublished texts were unavailable to the public or to other scholars. Academic Scandal In 1977, Oxford don Geza Vermes declared that the failure to publish these scrolls and make them publicly available was threatening to become “the academic scandal par excellence of the 20th century.” In the late 1980s, BAR took up the call, publicly demanding the release of the scrolls so that all scholars could study them. After the Six-Day War of 1967, Israel gained control of the scrolls in Jerusalem’s Rockefeller Museum (formerly the Palestine Archaeological Museum), but the Israelis did not change the situation. The scrolls remained under the control of the small, non-Jewish, practically nonfunctioning scroll-publication team. The then-editor-in-chief of the scroll team was Harvard’s John Strugnell, whose personal emotional problems, including alcoholism, were affecting his work. After Strugnell gave a grossly anti-Semitic and anti-Zionist interview to an Israeli journalist, Israel finally replaced him with Professor Emanuel Tov of The Hebrew University. At first he, too, refused to release the scrolls, although, as Strugnell had also done toward the end of his editorship, Tov appointed additional scholars to the publication team, including Israelis. The first break in the release of the scrolls came when the Biblical Archaeology Society published some unpublished texts that had been reconstructed with the aid of a computer, based on a private concordance of the Cave 4 fragments. Then the Biblical Archaeology Society published a two-volume work of photographs of the unpublished scrolls, obtained in a still-mysterious way by Professor Robert Eisenman of California State University. Even now Eisenman declines to divulge how he obtained the photographs, although it was always clear they were genuine. Finally, director William Moffett of the Huntington Library in California decided to release images of the unpublished scrolls on a microfilm strip that had been deposited in the library as a security measure in case the originals were lost. The Huntington’s decision to release its copy of the unpublished scrolls was announced at the top of the Sunday edition of The New York Times on September 21, 1991. Although Israel first considered suing the library (and the Biblical Archaeology Society), saner minds eventually prevailed, and the scrolls were declared open and available to all. Posted in Dead Sea Scrolls. Add Your Comments 4 Responses 1. BAROSWA says 2. Robert says The people to assign the importance of these finds to them won’t be scholars. They will be the Mystics who understand what they say. 3. Japanese says Do yοu have any video of that? I’d like tо find out some additional information. 4. Jeff says What an interesting story! I wonder what pressures Israel faced leaving the scrolls to such a disinterested party. What did they fear to find? Some HTML is OK or, reply to this post via trackback. Enter Your Log In Credentials Change Password
global_05_local_5_shard_00000035_processed.jsonl/24551
Email updates Open Access Poster presentation Histogram binwidth and kernel bandwidth selection for the spike-rate estimation Hideaki Shimazaki1* and Shigeru Shinomoto2 Author Affiliations 1 Theoretical Neuroscience Group, RIKEN Brain Science Institute, Wako-shi, Saitama, Japan 2 Department of Physics, Kyoto University, Kyoto, Japan For all author emails, please log on. BMC Neuroscience 2009, 10(Suppl 1):P116  doi:10.1186/1471-2202-10-S1-P116 Published:13 July 2009 © 2009 Shimazaki and Shinomoto; licensee BioMed Central Ltd. Poster presentation Histogram and kernel methods have been used as standard tools for capturing the instantaneous rate of neuronal spike discharges in the neurophysiology community. These methods are left with one free parameter that determines the smoothness of the estimated rate, namely a binwidth or bandwidth. In most of the neurophysiology literature, however, the binwidth or bandwidth that critically determines the goodness of the fit of the estimated rate to the underlying rate has been selected by individual researchers in an unsystematic manner. Recently, we established a method for selecting the histogram binwidth [1] as well as the kernel bandwidth [2], with which the estimated rate best approximates the unknown underlying rate. The resolution of the optimized estimated rate increases, or the optimal bin/band-width decreases, with the number of spike sequences sampled. It is notable that the optimal bin/band-width diverges if only a small number of experimental trials are available from a moderately fluctuating rate process [3]. In this case, any attempt for characterizing the underlying spike rate will lead to spurious results. To assist those who are confronted with such paucity of data, we developed a method that can suggest how many more trials are needed until the set of data can be analyzed with the required resolution. 1. Shimazaki H, Shinomoto S: A method for selecting the bin size of a time histogram. Neural Comput 2007, 19:1503-1527. Publisher Full Text OpenURL 2. Shimazaki H, Shinomoto S: Kernel width optimization in the spike-rate estimation. In Neural Coding. Montevideo Uruguay; 2007:120-123. OpenURL 3. Koyama S, Shinomoto S: Histogram bin width selection for time-dependent Poisson processes. J Phys A: Math Gen 2004, 37:7255-7265. Publisher Full Text OpenURL
global_05_local_5_shard_00000035_processed.jsonl/24583
Shiny Quantum Dots Brighten Future of Solar Cells Shiny Quantum Dots Brighten Future of Solar Cells Photovoltaic solar-panel windows could be next for your house PR Newswire LOS ALAMOS, N.M., April 14, 2014 LOS ALAMOS, N.M., April 14, 2014 /PRNewswire-USNewswire/ -- A house window quantum-dot work by Los Alamos National Laboratory researchers in collaboration with scientists from University of Milano-Bicocca (UNIMIB), Italy. Their project demonstrates that superior light-emitting properties of quantum dots can be applied in solar energy by helping more efficiently harvest sunlight. Quantum dot luminescent solar concentrator devices (embedded in the glowing pink bar) under ultraviolet illumination. "The key accomplishment is the demonstration of large-area luminescent solar concentrators that use a new generation of specially engineered quantum dots," said lead researcher Victor Klimov of the Center for Advanced Solar Photophysics (CASP) at Los Alamos. Quantum dots are ultra-small bits of semiconductor matter that can be synthesized with nearly atomic precision via modern methods of colloidal A luminescent solar concentrator (LSC) is a photon management device, representing a slab of transparent material that contains highly efficient emitters such as dye molecules or quantum dots. Sunlight absorbed in the slab is re-radiated at longer wavelengths and guided towards the slab edge equipped with a solar cell. Klimov explained, "The LSC serves as a light-harvesting antenna which concentrates solar radiation collected from a large area onto a much smaller solar cell, and this increases its power output." "LSCs are especially attractive because in addition to gains in efficiency, they can enable new interesting concepts such as photovoltaic windows that can transform house facades into large-area energy generation units," said Sergio Brovelli, a faculty member at UNIMIB. Because of highly efficient, color-tunable emission and solution processability, quantum dots are attractive materials for use in inexpensive, large-area LSCs. To overcome a nagging problem of light reabsorption, the Los Alamos and UNIMIB researchers developed LSCs based on quantum dots with artificially induced large separation between emission and absorption bands (called a large Stokes shift). These "Stokes-shift" engineered quantum dots represent cadmium selenide/cadmium sulfide (CdSe/CdS) structures in which light absorption is dominated by an ultra-thick outer shell of CdS, while emission occurs from the inner core of a narrower-gap CdSe. Los Alamos researchers created a series of thick-shell (so-called "giant") CdSe/CdS quantum dots, which were incorporated by their Italian partners into large slabs (sized in tens of centimeters) of polymethylmethacrylate (PMMA). While being large by quantum dot standards, the active particles are still tiny - only about hundred angstroms across. For comparison, a human hair is about 500,000 angstroms wide. A journal article is in Nature Photonics at About Los Alamos National Laboratory ( Los Alamos National Laboratory, a multidisciplinary research institution the Department of Energy's National Nuclear Security Administration. Los Alamos enhances national security by ensuring the safety and reliability weapons of mass destruction, and solving problems related to energy, environment, infrastructure, health and global security concerns. Photo - SOURCE Los Alamos National Laboratory Contact: Nancy Ambrosiano, 505.667.0471, Press spacebar to pause and continue. Press esc to stop.
global_05_local_5_shard_00000035_processed.jsonl/24614
Blue Nile Glossary   Natural Pearls:     A pearl that forms naturally when a grain of sand or other small irritant enters the pearl. If the oyster is unable to eject the object, the oyster will coat the object with layers of nacre to form a pearl. Natural pearls are very rare. There is no way to determine if an oyster contains a pearl, so to create a dependable pearl supply, the culturing process was invented. See also: Nacre, Orient. Close Window
global_05_local_5_shard_00000035_processed.jsonl/24641
The Mafulu eBook Mt.  Pizoko village spoke Afoa fluently, as this mountain is close to the Fathers’ Fuyuge-Afoa boundary.  Also Mt.  Davidson is according to the Fathers in the Boboi area; but Dr. Strong seems to have regarded it as Ambo, and to have treated vocabulary matter collected from a native who came from a village “apparently on the slopes of” that mountain as having been taken from an Ambo native.  In this case, however, there seems to be some doubt as to where this native did in fact come from; and the eastern slopes of Mt.  Davidson are not far from the Fathers’ Afoa boundary. I think that these linguistic materials, taken as a whole, are, so far as they go, well in accord with the delimitation by the Fathers of the Fuyuge area, except as regards their view concerning Korona, as to which they did not profess actual knowledge, and merely expressed a doubt, and subject to the point that, for linguistic purposes at all events, the Fathers’ use of the word “Mafulu” as representing the whole Fuyuge area is perhaps not desirable, and would be better replaced by the term “Fuyuge,” with subdivisions of “Mafulu,” “Korona,” and “Kambisa,” as given by Mr. Ray; though probably Sikube might be included in either Mafulu or Korona, as geographically it is evidently between these two. Illness, Death, and Burial Ailments and Remedies. All serious ailments occurring up to certain ages, and except in certain cases, are generally assumed to be the work of someone acting in connection with a spirit; but, speaking generally, no efforts appear to be made by imprecation or other supernatural method to propitiate or contend against these spirits, except by the use of general charms against illness, and except, so far as the propitiation or driving out of the spirit is involved, by one or other of the specific remedies for specific ailments mentioned below.  The natives have, however, for common diseases cures of which some are obviously purely fanciful and superstitious, but some are probably more or less practical. The chief ailments are colds and complications arising from them, malaria, dysentery, stomach and bowel and similar complaints, toothache and wounds. Dysentery has recognised and accredited curers, both men and women.  The operator chews and crushes with his teeth the root of a vegetable (I do not know what it is) which they grow in their gardens, and then wraps it up into a small bundle in a bunch of grass, and gives it to the patient to suck.  This remedy does not appear to be effective. There are men who are specially skilled in dealing with stomach and bowel troubles.  The operator takes in his hand a stone, and with the other hand he sprinkles that stone over with ashes.  He then makes over it an incantation, in which, though his lips are seen to be moving, no sound comes out of them; after which he takes some of the ashes from the stone, which he still holds in his hand, and with these ashes he rubs the stomach of the patient, who, I was told, generally at once feels rather better, or says so. Project Gutenberg The Mafulu from Project Gutenberg. Public domain. Follow Us on Facebook
global_05_local_5_shard_00000035_processed.jsonl/24642
D-Day, June 6, 1944: The Climactic Battle of World War II Test | Mid-Book Test - Easy Buy the D-Day, June 6, 1944: The Climactic Battle of World War II Lesson Plans Name: _________________________ Period: ___________________ Multiple Choice Questions 1. Which unit of paratroopers drops where they are supposed to with minimum problems? (a) 1st Battalion of the 505th. (b) 2nd Battalion of the 505th. (c) 3rd Battalion of 222nd. (d) 4th Battalion of the 325th. 2. What day are the two soldiers sent to the French coast to get secret soil samples by the Allies? (a) Christmas. (b) Christmas Eve. (c) New Year's. (d) Easter. 3. What does RAF stand for? (a) Radar Air Freight. (b) Royal Aeiral Force. (c) Radar Aerial Freighter. (d) Royal Air Force. 4. Which American commander stands up and symbolically throws the thick book of D-Day plans over his shoulder? (a) Col. Good. (b) Capt. Miller. (c) Col. Van Fleet. (d) Brig. General Cota. 5. Where does Eisenhower give an impromptu graduation address in the spring of 1944? (a) West Point. (b) Sorbonne. (c) Sandhurst. (d) Slapton Sands. 6. What does Eisenhower want to paralyze in the weeks leading up to D-Day? (a) French railway system. (b) German oil reserves. (c) French and German farms. (d) German artillery stockpiles. 7. What compounds Germany's strategic problems as the war goes on? (a) Spies. (b) Arrogance. (c) Shortages. (d) Troop morale. 8. What is Rommel given command of in 1940? (a) SS Division. (b) Sicily. (c) Afrika Korps. (d) Fifteenth Army. 9. How many bombers are shot down by Luftwaffe on D-Day? (a) 9. (b) 47. (c) 0. (d) 113. 10. Where do the Germans build the Atlantic Wall? (a) England. (b) Japan. (c) Italy. (d) France. 11. What is handed out along with rations to the troops as they board vessels for the invasions? (a) Ammunition. (b) Bibles. (c) Cigarettes. (d) Condoms. 12. The lesson Hitler took from World War I is that Germany could not win a war of __________. (a) Strategy. (b) Politics. (c) Fire power. (d) Attrition. 13. What does SOS stand for? (a) Supply or Services. (b) Save Our Ships. (c) Service of Ships. (d) Services of Supply. 14. Where does Eisenhower go to college? (a) Harvard. (b) Notre Dame. (c) West Point. (d) Annapolis. 15. How many members of the 101st Airborne are captured by Jahnke's Germans? (a) 6. (b) 20. (c) 25. (d) 18. Short Answer Questions 1. What group is the first to attend the Assault Training Center? 2. The navy refers to "crafts" as being under _________ feet and "ships" as being anything over that. 3. What are B-24s known as? 4. Pegasus Bridge is on which river? 5. What is the date that Eisenhower originally sets for D-Day? (see the answer keys) This section contains 351 words (approx. 2 pages at 300 words per page) D-Day, June 6, 1944: The Climactic Battle of World War II from BookRags. (c)2015 BookRags, Inc. All rights reserved. Follow Us on Facebook
global_05_local_5_shard_00000035_processed.jsonl/24643
Silent Spring Essay Topics & Writing Assignments Buy the Silent Spring Lesson Plans Essay Topic 1 The world that Carson describes in the beginning of "Silent Spring" is one that provokes several reactions from readers. Part 1: Describe the first world that Carson envisions in the first chapter of the book. Part 2: How does the world change as the description continues on? Part 3: Why does Carson use this description in the beginning of the book? Essay Topic 2 Life is something that has existed for millions of years, but the introduction of humans has altered the way life has changed. Part 1: What does Carson have to say about the way humans have affected the world around them? Part 2: What does Carson say about how the environment generally interacts with itself? Part 3: What does Carson mean by the idea that "life does not have the luxury of time?" Essay Topic 3 Carson attempts to explain that humanity's ever growing need to control the world is actually... (read more Essay Topics) This section contains 1,365 words (approx. 5 pages at 300 words per page) Buy the Silent Spring Lesson Plans Follow Us on Facebook