id
stringlengths
50
55
text
stringlengths
54
694k
global_05_local_5_shard_00000035_processed.jsonl/29382
Re: Is a namesapce a resource? - was: duck From: David Carlisle <[email protected]> Date: Thu, 8 Jun 2000 12:16:59 +0100 (BST) Message-Id: <[email protected]> To: [email protected] CC: [email protected] > Ignoring, for now, issues of relative and context-dependent URIs. If a > namespace is a resource, and a namespace name is a URI: what resource is > identified by that URI? Logically, it is the namespace "logically" is rather a contentious word to use:-) If the method of naming namespaces is as indicated in the rec, and clarified by the vast majority of namespace use and discussion since then, then to name a namespace you pick a URI of any resource at all (preferably one you control) so the answer to "what resource is identified by that URI" is just "whatever resource whose URI was used as the namespace name". > But if one chooses a namespace name > that can also be used (directly) to retrieve some schema bound to the > namespace, then the resource identified by the URI ipso facto is the schema > document. (Or is it?) Some people have the mistaken belief that namespaces and schema are effectively the same thing, so don't see that having the same URI relate to a namespace and to a schema describing one possible language using names from that namespace is at all strange. Of course it isn't only a schema you might get. You might get the text of the rec, or an add hoc html page describing some aspect of the namespace or you might get someone's home page, or probably more often than not you'll get nothing. > Where now the 1:1 correspondence between URIs and resources? It's where it always was, but the mistake in the argument was the idea that the namespace name being the URI of some possibly existing resource implies that the namespace is that resource. > There is, I think, a related issue: I had thought that content negotiation > might be used to select different representations of a schema associated How would content negotiation distinguish which of the 5 or 6 so far published schema (dtd) for the xhtml namespace you want to use, or which of the arbitrary many schema for the same namespace that you can create using xhtml modularisation? > I think a basic formal algebra of URIs and resources might help to set > some of these issues in place. If there is no agreement on whether namespaces are the resources identified by the URI used as the namespace names then I don't see how any such algebra is going to help. I claim http://www.dcarlisle.demon.co.uk is the URI representing the "home page" of myself and my wife. Since I pay to have that URI work, and I wrote the page in question, I think it is reasonable for me to assert that that is the resource identified by that URI. Now any namespace processor, without having read the above paragraph has to decide what to do with <x xmlns="http://www.dcarlisle.demon.co.uk"/> Given the current rec and all proposed modifications of it, the processor has no choice but to accept this as a conforming document. The namespace of the element has name But the resource identified by that URI has absolutely not changed. Unlike Dan Connolly's img example where if I gave this URI to <img it wouldn't work in a web browser, using my home page URI as a namespace name works fully for all namespace processors xpath xslt etc will all work quite happily with this namespace and the fact that no one else should define behaviour for that namespace is just excactly the reason given why URI syntax was chosen for namespace names. So not only is using my home page URI as a namesace name not wrong, it is essentially the canonical example of the method of allocating myself a namespace name that no one else should use. Tim Berners-Lee and Dan Connolly have asserted that my doing that is somehow wrong, but no one has ever suggested any change that would make that wrong. Or what the namespace processor is supposed to do to reject the document. Received on Thursday, 8 June 2000 07:12:30 UTC
global_05_local_5_shard_00000035_processed.jsonl/29383
Tag Archives | vocabulary Some Views on Comedy Comedy is, as I have said, an imitation of lower types; though it does not include the full range of badness, nevertheless to be ridiculous is a kind of deformity. The causes of laughter are errors and deformities that do not pain or injure us; the comic mask, for instance, is deformed and distorted but […] Continue Reading
global_05_local_5_shard_00000035_processed.jsonl/29392
Honesty Praised Published: Sunday, February 21, 1999 On Thursday, Feb. 4, I lost my wedding ring and birthstone ring while shopping. Several hours had passed when I realized I had lost them. After searching for them at home, we went to (a national discount retailer) at 4 a.m. Friday to look for them and ask if they had been turned in to the lost and found. We turned up nothing. We placed an ad in the paper and kept praying for the person who found them. Saturday night, our prayers were answered. Billie Schuette phoned and asked for a description of the rings. After I told her, she said, "I have found your rings." There are no words to express how thankful I am for Billie's honesty. At this time in our country's history, one begins to wonder if good, honest people are becoming fewer and fewer. It's been really difficult for me to understand how we've come to such a time as this. But there are good people who do know right from wrong and will always choose to do the honest thing. There are angels among us and we can have strength when we faint and grow weary. In Isaiah 40, it says, "But they that wait upon the Lord shall renew their strength; they shall mount up with wings as eagles; they shall run and not be weary; and they shall walk and not faint." Thanks again, Billie, for your honesty and, especially, for the renewed faith in people. Related Searches
global_05_local_5_shard_00000035_processed.jsonl/29414
Hello all, Is there a way to perform delta builds in apache ant?Any real-life experiences over there? Any help/info would be welcome! best regards; Hind Lwahhabi. This message is for the designated recipient only and may contain privileged, proprietary, or otherwise private information. If you have received it in error, please notify the sender immediately and delete the original. Any other use of the email by you is prohibited.
global_05_local_5_shard_00000035_processed.jsonl/29417
Hi guys, I started to create the Mavibot web site with Pierre-Arnaud help. It's not visible on the main site yet, but you can check it on the staging site : http://directory.staging.apache.org/mavibot/ Any review/feedback welcome ! Note : the downloads page aren't yet updated because the vote is on its way. The packages are available at people.apache.org/~elecharny Thanks ! -- Regards, Cordialement, Emmanuel Lécharny www.iktek.com
global_05_local_5_shard_00000035_processed.jsonl/29431
Social Media How Data is Redefining Business Relationships Suaad Sait is co-founder of Workstreamer, a business listening platform that delivers actionable, real-time information to business professionals. As businesspeople, we now have an unlimited amount of constantly updating information at our fingertips. It holds the promise of great value (and more importantly, profit), but it is also voluminous and fleeting.  Powerful new search engines, newfangled social CRM systems, and a preponderance of social sites and services leave us sitting at desks, feverishly fetching news and updates throughout the day in an attempt to stay up-to-date. The trick, of course, is making sense of all that data, and putting it in context of what companies — and who exactly at those companies — matter most. Increasingly, we have the palpable desire to turn good data into good decisions and profitable relationships. But how can you take advantage of that tsunami of information without risking death by data? How can everyday businesspeople get value out of these data-heavy services and sources?  Relationships Still Rule The answer to these questions starts by first acknowledging that it’s the same as it ever was: Business is still all about relationships.  This should be soothing to many for whom the data web is a brave new world.  The business world still runs on relationships, and data is as much at home at a cocktail hour or on a conference call as it is in a slide deck. The game has not changed much at all. The difference is that today’s business data has put everything in stark relief, at very high resolution. Opportunities and risks have been amplified. For example, if I notice a partner’s company's stock surge at the opening of the market and tie it to a news item on quarterly earnings, I can now send a timely congratulatory note and schedule a follow-up meeting to discuss leveraging that momentum for a proposed joint venture. Or, say I am alerted to an old college friend changing his contact info on a social network, and as a result, track down a few details on his role at a new company. I might subsequently notice via a status update that he is departing for my home city in a few days, and now I can initiate a reconnection and invite him to participate on a panel I’m organizing. Today’s most actionable business data comes from living and very human sources like social networks, wikis, microblogs, crowdsourced contact directories, collaboratively filtered finance communities, real-time search engines, hyperlocal news sites and more. Managing that data can involve a lot of mixing and matching, comparing and contrasting. Relationships Run on Data business data imageStrategic relationships with colleagues and contacts both create and consume data. In fact, data isn’t cold and impersonal at all — that’s an important misconception to put to rest. Many of your most successful and trusted business relationships now likely run on data. “Networking” in the traditional sense used to take a lot of time and effort.  But in truth, all networking has ever been is the act of information-gathering — of scouting and collating.  We used to start with an idea of a person we were trying to do business with, without nearly enough relevant information about them. That has changed as a result of the personal data now available via social media sources. Now, when you finally meet someone in person, or run into them at a conference, the interaction can be immediately more rich and productive precisely because of data — you can get right to the heart of the matter because you’re having a more informed, in-depth conversation that matters. From crunching data and doing your homework, to finding a path through your existing relationships, to setting up that first meeting with a timely and well-researched missive, the new data-driven way of doing business can be infinitely more productive. Remember the under-the-table note sharing going on in high school?  Well, imagine having the smartest kid in school organize, prioritize and collect notes for you, no strings attached. That’s the kind of information advantage that is now available to us, through an ever-growing array of new social business tools. And it’s not considered cheating, either. But even despite all this new data and these new tools, relationships are still the beginning and the end of every business decision.  There is little doubt that there will be a fundamental overhaul in the skill-set of the average businessperson in the next five years as companies grapple with, and realize the upside of making better use of data, both internally and externally. Today, the technologies and techniques that were once the exclusive domain of Wall Street analysts and Silicon Valley engineers are finally trickling down to everyday businesspeople.   But no matter how the world has changed, listening is still paramount -– listening to customers, listening to prospects, listening to colleagues, and listening to entire companies –- indeed, listening to data. More business resources from Mashable: - How Data Will Impact the Way We Do Business - HOW TO: Make Sure You’re Tracking the Right Data - 4 Tips for B2B Marketing on Facebook - What Facebook’s Open Graph Means for Your Business - HOW TO: Cultivate Your Brand’s Super Users Image courtesy of iStockphoto, Sportstock, stevecoleccs Load Comments What's New What's Rising What's Hot
global_05_local_5_shard_00000035_processed.jsonl/29432
Social Media 5 Facebook Profile Photos to Avoid If a Facebook picture is worth a thousand words, we're pretty sure there's one word in the lexicon you'd be loath to have associated with you: tool. (Unless you're a handyman, in which case, carry on.) Yes, Facebook started off as a gated community for college kids awkwardly trolling for chicks in their rooms because the outside world was just too bright ... too bright. But now, as Mark Zuckerberg sallies forth with his plan to consume all of society, it has become kind of legit. Last week, Zuckerberg unveiled a messaging system for the book of faces that will consolidate e-mail, texts, chat and Facebook messages. While we won't be calling Z's new baby a "Gmail killer" any time soon (dude, eradicate all those FB phishing scams and then we'll talk), the fact that Facebook would take such a step got us thinking. Every day, 4 billion messages are shot off via Facebook, and next to those 4 billion messages is something that could make or break the legitimacy of your missive — or, at the very least, amuse or horrify your friends: your profile picture. This is your calling card, your public face. So why do so many of you contort it into that of a duck? Read on for five common types of Facebook photos that make your friends want to block you, potential employers take pause and future suitors weep with frustration at the state of the human race. Check out the column at >> Image courtesy of iStockphoto, edfuentesg Load Comments What's New What's Rising What's Hot
global_05_local_5_shard_00000035_processed.jsonl/29446
phoneme,in linguistics, smallest unit of speech distinguishing one word (or word element) from another, as the sound element p in “tap,” which separates that word from “tab,” “tag,” and “tan.” A phoneme may have more than one variant, called an allophone (q.v.), which functions as a single sound; for example, the p’s of “pat,” “spat,” and “tap” differ slightly phonetically, but that difference, determined by context, has no significance in English. In some languages, where the variant sounds of p can change meaning, they are classified as separate phonemes—e.g., in Thai the aspirated p (pronounced with an accompanying puff of air) and unaspirated p are distinguished one from the other. Phonemes are based on spoken language and may be recorded with special symbols, like such as those of the International Phonetic Alphabet. In transcription, linguists conventionally place symbols for phonemes between slash marks: /p/. The term phoneme is usually restricted to vowels and consonants, but some linguists extend its application to cover phonologically relevant differences of pitch, stress, and rhythm. Nowadays the phoneme often has a less central place in phonological theory than it used to have, especially in American linguistics. Many linguists regard the phoneme as a set of simultaneous distinctive features , rather than as an unanalyzable unit.
global_05_local_5_shard_00000035_processed.jsonl/29449
What is meta? × I have a question I created on stackoverflow.com which was migrated to superuser.com, the question was answered on superuser.com but still remains in my questions tab in SO, how do I remove/hide these? I've now created this as a Feature request. share|improve this question 2 Answers 2 up vote 8 down vote accepted You don't. Migrated questions remain yours on the original site until they are deleted. The question becomes a place-holder for Google Searches and for duplicate question closures. It is still a question asked by you and therefore it is not disassociated from your account. These migrations stubs will be automatically removed after 30 days, but as mentioned by Jeff you can also flag it for moderator attention and it will be deleted. share|improve this answer Thankyou for this diago, I don't mind it still hanging around though I would like a way to move it off my Questions section and placed in a Migrated section, would this sound like a viable feature request do you think? –  Brett Ryan Dec 2 '09 at 7:25 Due to the small amount of questions that get migrated I really don't believe personally that it is viable. However it will never hurt to create a feature request for it and get the opinion of other users. –  BinaryMisfit Dec 2 '09 at 7:26 Thankyou Diago, new feature request created. –  Brett Ryan Dec 2 '09 at 9:22 You can flag the question for moderator attention if you really want it deleted, and a moderator can do it for you. share|improve this answer Thank you for this Jeff, there's not need to require attention for closing, though I would like it shifted to another section if it were possible instead of being in my Questions section. –  Brett Ryan Dec 2 '09 at 7:25 You must log in to answer this question. Not the answer you're looking for? Browse other questions tagged .
global_05_local_5_shard_00000035_processed.jsonl/29452
Introducing Kyctarniq's weight loss program.  With my new texture pack you get one quarter the pixels of regular Kyctarniq's Texture Pack but still all the fantastic kyctiness you have come to expect and love. Dear friends asked me to make a 16x version of my texture pack because they have the tiniest of computers.  Here you are PupFace and qpooh.  It took me longer than I expected to hand edit all the elements so I am releasing it before the mobs are done. Posts Quoted: Clear All Quotes
global_05_local_5_shard_00000035_processed.jsonl/29459
Movie Information Genre: Drama Director: Christopher Scott Cherot Rated: R I’ve no clue why anyone thought of turning F. Scott Fitzgerald’s The Great Gatsby into something that might better be called Hip Hop in the Hamptons. Perhaps director and co-writer Christopher Scott Cherot thought that since no one had made a really successful film of the novel by approaching it in a straight manner (though Jack Clayton got nearer than is generally allowed), a new spin might make it work. It doesn’t. His film starts out by seeming to follow the basic outline of the book, with the Gatsby character (here called Summer G and played by Richard T. Jones) trying to reconnect with his lost love (here named Sky and played by Chenoa Maxwell). It includes a slightly abusive, cheating husband (Blair Underwood) for Sky. And it even has a writer character (Andre Royo) to observe the proceedings — only he doesn’t really do that and is used more as a plot device — an alteration that suggests that no one involved has much of a grasp on the novel. Watching the more or less intact plot move from point to point as it reshapes Fitzgerald’s 1920s in hip-hop terms, it’s hard to see the purpose of the whole exercise. Reworking the story with a hip-hop record mogul at its center comes across as little more than a stunt. Nothing about the approach adds any richness to what finally emerges as a terribly trite story by the end of it all. And it’s not a very good stunt either. Apart from a surface rendering of something like the lifestyle of Sean Combs/Puff Daddy/P. Diddy/Diddy, there’s precious little hip hop involved. As a result, even the hip hop aspect is … guess what? Yep. A stunt. At first, there’s a sense that some cliches are going to be broken. The character of Summer G — and even the world he inhabits — is about as far removed from the stock view of the rap/hip-hop world as can be imagined. As played (quite well) by Richard T. Jones, G is sophisticated, erudite and well-spoken — in other words, nothing like Snoop Dogg or Eminem. In fact, when the script makes half-hearted attempts at tossing him a few bits of “gangsta” speak, the effect is distractingly like watching Taye Diggs and Anthony Anderson as classically trained actors trying to pass themselves off as examples of “Thug Life” in Malibu’s Most Wanted. Whatever freshness might have come from this approach, however, is lost in the fact that all G’s hangers-on, stars and would-be stars have inherited every cliche in the book — encapsulated in one ridiculous scene where a group of them take off in search of 40s, Newport cigarettes and McDonald’s! By this point, the film is verging on offensive, and while it never gets any worse, neither does it get much better. Somewhere around the two-third mark, G almost completely abandons its literary model, losing what structure it had and short-circuiting in a frankly confusing barrage of subplots that lead to an absurdly altered conclusion. If there was ever any doubt that Cherot had only the most tenuous grasp on what the novel was about, the mess of an ending proves it. I don’t mind that it departs from the novel — lots of movies have done that and still captured the essence of the source, or at least altered their source with something that worked and didn’t utterly betray it. G can’t pull off either feat — and doesn’t make much sense in the bargain. The great pity in all this is that the actors are good and try their damndest to make it all work, but the screenplay won’t let them, instead insisting that they trudge through a plot that undermines any attempt at characterization. Go read the book or see the 1974 Jack Clayton version. It will be time better spent. Rated R. — reviewed by Ken Hanke About Ken Hanke Leave a Reply
global_05_local_5_shard_00000035_processed.jsonl/29465
structure en Schumer Has Praise for Paulson's Regulatory Restructuring Plan <div class="field field-type-nodereference field-field-source"> <div class="field-items"> <div class="field-item odd"> <div class="field-label-inline-first"> By</div> <a href="/author/jeff-poor">Jeff Poor</a> </div> </div> </div> <p>&nbsp;&nbsp;&nbsp;&nbsp; In what seems like a bizarre twist, a prominent Democrat has come out in favor of the Bush administration’s plan to restructure the regulatory authority of the Federal Reserve.</p><p>&nbsp;</p> <p>&nbsp;&nbsp;&nbsp;&nbsp; Sen. Chuck Schumer (D-N.Y.) told CNBC’s Erin Burnett on the March 31 “Street Signs” that he likes Treasury Secretary Henry Paulson’s plan. Paulson <a href=""></a>unveiled his plan earlier that day in a press conference.</p><p>&nbsp;</p><p><a href="" target="_blank">read more</a></p> Articles MRC Business Taxes Banking Fed FederalReserve financial money plan Regulation regulatory SEC sector securities structure Mon, 31 Mar 2008 20:48:06 +0000 admin 26273 at
global_05_local_5_shard_00000035_processed.jsonl/29470
Ranked #128 Major S2 Major S2 Alternative Titles Japanese: メジャー (第2シリーズ) Type: TV Episodes: 26 Status: Finished Airing Aired: Dec 10, 2005 to Jun 10, 2006 Producers: Studio Hibari, NHK Duration: 25 min. per episode Rating: PG-13 - Teens 13 or older L represents licensing company Score: 8.461 (scored by 14360 users) Ranked: #1282 Popularity: #1467 Members: 20,912 Favorites: 136 1 indicates a weighted score 2 based on the top anime page. Popular Tags drama sports Recommendations Submitted by Users As I was watching Major S2, Goro's arrogance[confidence(?)] reminded me a lot of Tatsumi. I kept comparing the two characters. They both also have the determination to fight from the bottom and become the best. They are also both enjoy sports anime.   reportRecommended by mandralyne The Kaido arc in Major is basically all of Diamond no Ace. Both are baseball animes with an overenthusiastic, wild pitcher as the main character.  reportRecommended by mayukachan "Kaidou Arc" in Major reminded me a lot of "Pro-Hunter Exam Arc" in HxH. Two main characters have to team up with other applicants and to pass the qualifying examination they have to trust other members even if they are complete strangers. Both shows have other similarities, but I won't spoil it. Things often get nail bitingly intense each episode, prepare yourselves for unexpected turn of events. If you enjoyed one of them, you can get the same feeling from the other one.  reportRecommended by H_Elif eternal rivalry, friendship and both are totally addicting  reportRecommended by Lufia22 Both sports animes about an immensely gifted son and all the effort, work and sacrifice it takes to live up to his own potential. (I put the recommendation on S2 of Major because of the age similarity, but you should start at S1 if you're going to!)  reportRecommended by lowell Both are sports anime with a prodigy as a main character. Both protagonists, Goro and Ryoma, are in middle school.  reportRecommended by smileggd Baseball anime, both main characters are elite in baseball and take teams from nothing to victory...  reportRecommended by exodus1999
global_05_local_5_shard_00000035_processed.jsonl/29480
Submitted by TrendyGamers 1126d ago | rumor Ni No Kuni, Mugen Souls, The Witch & The Hundred Knights Dates Listed By Retailer After checking the pre-order section of Video Games Plus, we discovered that a lot of upcoming video games have specific release dates nailed down, even though they have yet to be confirmed by the publisher. In this post, you will find Ni No Kuni: Wrath of the White Witch, Mugen Souls, and The Witch and the Hundred Knights. - Trendy Gamers. (Mugen Souls, Ni No Kuni: Wrath of the White Witch, PS3, The Witch and the Hundred Knights) Need more votes Is this rumor true? Rumor votes 2 badjournalism  +   1126d ago These articles are bordering on spam. All you did was take one topic(supposed release dates for a list of games from one retailer) and make it multiple articles when all seven articles could have been a single story. Oh, but then you couldn't spam N4G for page views that way. BringingTheThunder  +   1126d ago Theyre ordered by console. I wouldnt look at something that just said 'bunch of games have dates, look'. At least i know what im looking at, i dont care about the 3ds ones. Relientk77  +   1126d ago Yes, finally a supposed release date for Ni no Kuni So excitied, getting it day one Moerdigan  +   1126d ago February is going to be busy. I was planning on getting both games. Chrono  +   1126d ago The same site also listed a date for Grand Knights History and after less than one week the publisher announced that they cancelled the localization. Newsman  +   1124d ago Enough with the spam please Trendy. Add comment New stories Arkham Knight Pre-Load Available on Xbox One Store Skylanders: SuperChargers Gameplay Video Preview | Grab It See what games are coming out in 2015 What do we think of 'Splatoon'? 15 Minutes of Fame: Adventures of Pip for PC First Impressions
global_05_local_5_shard_00000035_processed.jsonl/29485
Support Options Submit a Support Ticket [Illinois] ECE 416 Fluorescence III and Homogeneous Assays I By Brian Cunningham University of Illinois at Urbana-Champaign Published on &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;In this lecture, we continue the discussion of Fluorescence. Examples of results are shown from the fluorescent dyes and how they may be used from a fluorescent microscope. Getting results and images from Fluorescence Scanners are then discussed next. The laser is focused down on a point in the sensor and that point will give off light that can be detected. Then, we move on to the applications of homogeneous assays which are the same surface type the whole time (not half liquid and then half solid), but can only be performed for a small subset of assays. The fluorescence dyes can be placed on this or a heterogeneous assay which has one or both of the assay components immobilized on a sort of solid surface. The interaction occurs on the surface of the solid phase. The dyes are like antennas and when an electric field for a photon of light propagates, electrons are excited and the dye will light up. However, it depends on the direction of the propagation and polarization. With fluorescence polarization, the dye molecule will most strongly absorb light whose vector is parallel to the long axis of the molecule. The molecules have a preferred direction of physical orientation that may result in the polarized filter not becoming absorbed. If the dye molecule is attached to the protein, only the dye molecule oriented parallel to the Electric field of the incident light will be excited. It must also be stated that there is a time delay between the excitation and emission. When measuring polarization it is between 0 and 1, if we have high viscosity or volume, the molecule will rotate more slowly. Then, an example of a polarized fluorescence sensor is shown. Cite this work Researchers should cite this work as follows: • Brian Cunningham (2013), "[Illinois] ECE 416 Fluorescence III and Homogeneous Assays I," BibTex | EndNote NanoBio Node, Obaid Sarvana, George Daley University of Illinois at Urbana-Champaign
global_05_local_5_shard_00000035_processed.jsonl/29486
Support Options Submit a Support Ticket Tags: nano carbon transistor Members (1-14 of 14) 1. Vijayakumar Selvamany 2. MD. Wahiduzzaman 3. vinesh v 5. German Felipe Giraldo 7. mohammad sarikhani 8. prativendra singh 9. Tamer Elzayyat 10. K M MOHSIN 11. Farzan Abu Mitul 12. Kai Kwok Kai H. Kwok (S’88-M’01-SM’07, IEEE) received the B.A.Sc. degree in Computer Engineering at University of Waterloo, Waterloo, ON, Canada, in 1993. He then received the M.A.Sc. degree and Ph. D.... 13. Karim Ahmed Elgammal
global_05_local_5_shard_00000035_processed.jsonl/29487
Log in Will Tell Stories For Food Rating position 23 April 1973 External Services: • [email protected][email protected] I'm a fantasy and SF writer who lives in Minneapolis with a husband and two small children. The kids are my day job: I write mostly at night and on weekends. Writing takes too much concentration to do it when I'm simultaneously trying to listen for sudden escalations in the squabbling or long, suspicious silences. My published books: Fires of the Faithful and Turning the Storm (this is really one book; Bantam split it in half); Freedom's Gate; Freedom's Apprentice; and Freedom's Sisters. My unpublished-as-yet books: Bequest, in which the Ark of the Covenant arrives by UPS on the doorstep of a Wiccan woman in the Seward neighborhood of Minneapolis; Castaways, a middle-grade SF novel in which three kids wind up shipwrecked on another planet; and The House That Wasn't There, a middle-grade fantasy novel in which a girl realizes that there's a house on her block that is invisible to everyone but her. My current project: Liberty's Daughter, a dystopic near-future YA novel set on a seastead. I do occasionally write about writing in this LJ, but mostly I write about my kids. Rating position Welcome to the new LiveJournal Send feedback Switch back to old version LiveJournal Feedback Send another report Close feedback form (optional, if you're a LiveJournal user only) (optional, if you're a LiveJournal user only) (not shown to the public) Provide a link to the page where you are experiencing the error Please take a survey Take a survey Welcome to LiveJournal Create an account
global_05_local_5_shard_00000035_processed.jsonl/29507
[an error occurred while processing this directive] BBC News watch One-Minute World News Last Updated: Monday, 21 June, 2004, 09:47 GMT 10:47 UK Breaking codes: An impossible task? By Paul Reynolds BBC News Online world affairs correspondent Recent reports that the United States had broken codes used by the Iranian intelligence service have intrigued experts on cryptology because a modern cipher should be unbreakable. Four leading British experts told BBC News Online that the story, if true, points to an operating failure by the Iranians or a backdoor way in by the National Security Agency (NSA) - the American electronic intelligence organisation. The biggest prime number yet found The longest prime number discovered so far would stretch 20km if written down The reports, from Washington, suggested that the Iranians had been tipped off by Ahmed Chalabi, an Iraqi political leader with links to Iran. He is said to have learned about the code-breaking from an American official who was drunk. Simon Singh, author of "The Code Book", a history of codes, said: "Modern codes are effectively unbreakable, very cheap and widely available. I could send an email today and all the world's secret services using all the computers in the world would not be able to break it. The code maker definitely has a huge advantage over the codebreaker." The reason for this is that an encoded text is so complex that it can resist all efforts to break it. The key to codes It is probable, though not certain of course, that Iran was using what's called public-private key or asymmetric cryptography. In this system, the message is encoded by someone using a freely distributed public key. This can be decoded only by someone using a different private key. Modern codes are effectively unbreakable, very cheap and widely available Simon Singh The public-private key method has largely taken over from the purely private or symmetric system in which the sender and receiver use the same key to encrypt and decrypt a message. Some ciphers use a mixture. A private key encrypts and decrypts the message because this way is less complicated and therefore quicker but the key itself is sent by the public-private method. Professor Alistair Fitt, head of the School of Mathematics at Southampton University, said: "The private-private key is seen as obsolete. The public-private key is better. It does away with the problem of transporting the key between the two parties." I asked Professor Fitt if he would feel confident of using it if he was an intelligence chief. He replied "Yes." Too hard to crack Take a public key based on a huge number which is the result of two prime numbers multiplied together (a prime number being one which can be divided only by itself or by one). You use this number to encode your message but you do not need to know the two original prime numbers. Only the person decoding the message needs to know, because the text was encoded using an equation and both numbers are needed to reverse that equation. You design the numbers so that if you have more computers than there are in the world and you run them for ever, they are not enough Professor Alistair Fitt The system is safe because it is a curious feature of mathematics that when two prime numbers are multiplied, it is very difficult to factor, that is to work out, the two original numbers. Mathematicians have been trying to find a way to do this quickly for hundreds of years and have failed so far. Since even computers take time to wade their way through all prime numbers to find the correct ones, it has been estimated that, if the number is big enough, the world could end before they succeed. A guess would have a better chance. A large key The text to be enciphered is basically converted into numbers to which a numerical key is applied in a mathematical formula. It is important that the key has enough numbers to keep it safe but not enough to slow the whole process down too much. Professor Fitt commented: "If you are making a code, you design the numbers so that if you have more computers than there are in the world and you run them for ever, they are not enough." Ahmed Chalabi Did Ahmed Chalabi tell Iran? Seeking another answer The code breakers, or cryptanalysts, therefore have to find some other solution. Ross Anderson of the Computer Laboratory at Cambridge University pointed to some of them: "As the former chief scientist of the NSA once remarked at one of our security workshops, almost all breaks of cipher systems are due to implementation errors, operational failures, burglary, blackmail and bribery. There is a difference between breaking a code and breaking a system Professor Fred Piper "As for cryptanalysis, it happens, but very much less often than most people think." Professor Fred Piper of the Royal Holloway College made the same point strongly: "There is a difference between breaking a code and breaking a system. "In general it is true that a system using a practically unbreakable cipher might be broken though a management fault." The three B's Such faults might include lazy operating procedures or even leaving your key around on a CD which someone else could read. This is reminiscent of one of the ways the German Enigma codes were broken during World War II. One German operator always used the name of his girlfriend Cillie to send a test message. Thereafter the British code-breakers called all such vulnerable messages "cillies." The three "Bs" - burglary, blackmail and bribery - might have to be employed if there is no other way of getting at the key. We are back to the world of spies. Perhaps the need to find keys was what lay behind the former British MI5 agent Peter Wright's revelation in his book "Spycatcher" that he "bugged and burgled" his way across London. Hidden software Simon Singh says that sometimes there is a backdoor way in through deliberately corrupted software: "There is always the chance of human error. Encryption requires a key, and if I get hold of your key then I can read your messages. Or if I plant some software in I get to see the message before you encrypt it." Software allowing decryption is known to have been implanted in some ciphers in the past. In his book "Security Engineering", Ross Anderson tells the story of how this happened in Sweden: "The Swedish government got upset when they learned that the 'export version' of Lotus Notes which they used widely in public service had its cryptography deliberately weakened to allow NSA access." The Gramn Enigma coding machine The Enigma: Bad habits cost codes In another case, intriguingly involving Iran, Ross Anderson reported: "A salesman for the Swiss firm Crypto AG was arrested in Iran in 1992 and the authorities accused him of selling them cipher machines which had been tampered with so that the NSA could get at the plaintext. After he had spent some time in prison, Crypto AG paid about a $1m to bail him but then fired him once he got back to Switzerland." Whether something similar happened in this case involving Iran is simply not known. The internet - is it secure? All this has important implications, incidentally, for internet security. When you enter a secure area on the internet, to buy something for example, you are using an encryption system. Professor Alistair Fitt says that the internet codes are safe: "I do not understand why some people do not trust the internet yet they give their credit card to some waiter who disappears with it into a back room." You can also use 128-bit encryption for your e-mails. This used not to be the case. It was only in 2000 that the United States lifted most export controls on strong encryption programmes. Using such encryption, your e-mails should be safe. Unless what apparently happened to the Iranians happens to you. Largest Prime Number discovered 07 Jun 04 |  Science/Nature Chalabi denies leaking US secrets 03 Jun 04 |  Middle East Iran scoffs at Chalabi spy claims 02 Jun 04 |  Middle East US spy coup 'leaked' by Chalabi 02 Jun 04 |  Middle East New puzzle for war code breakers 11 May 04 |  Staffordshire The BBC is not responsible for the content of external internet sites Americas Africa Europe Middle East South Asia Asia Pacific
global_05_local_5_shard_00000035_processed.jsonl/29518
Dionne's Siren Song To GOP: Renounce Reagan, Embrace Bill Barbra Streisand not yet having weighed in with her advice to the Republican party as to how it might regain power, we'll have to settle for the counsel that WaPo columnist E.J. Dionne, Jr. generously offers in his column of today, Can the GOP Find Its Center? His advice boils down to a two-part program: forget about conservatism already, and Be Like Bill. Dionne begins by proclaiming that "this fall's election defeat . . . revealed that the Barry Goldwater-Ronald Reagan political settlement has expired," by which he apparently means that conservatism as a winning political philosophy has gone the way of the parrot in A Fish Called Wanda. E.J. thus goes on to deride Republican leaders such as John Boehner and Mike Pence who in the wake of the GOP's defeat call for a return to traditional conservatives principles, chief among them that of limited government. Dionne approvingly cites Sarah Chamberlain Resnick, executive director of the Republican Main Street Partnership [a liberal GOP group] who "said moderates had, to no avail, warned their leadership of 'the consequences of pushing a legislative agenda kowtowing to the far right in our party.'" "A legislative agenda kowtowing to the far right"? Earth to Sarah and EJ: this was the Republican majority that legislated the biggest entitlement expansion in history, that passed out earmark-pork millions like gumdrops, and was led by a president who used his power to veto runaway spending exactly . . . zero times. Dionne claims "the GOP desperately needs to disenthrall itself from old thinking." Translation: ditch your conservative principles. And in its place? EJ counsels Republican presidential candidates to take their lead from "a politician who liked to condemn 'the brain-dead politics of both parties.' His name was Bill Clinton." Hogwash. We all know the old saw that, given the choice between a real Democrat and an imitation one, voters will choose the real one every time. Given Hillary's likely presence on the ballot, you might extrapolate to a choice between a real Clinton and an imitation one. Any GOP presidential contender who takes advice from an MSM Democrat like Dionne and thinks the way to electoral salvation is to embrace Bill Clinton will deserve the defeat Republican primary voters are sure to inflict on him. Here's the advice an actual Republican might give: ignore the Siren song of the left, steer to the principled Reaganesque right, and win. Contact Mark at [email protected] Mark Finkelstein Mark Finkelstein Mark Finkelstein is a contributing editor for NewsBusters.
global_05_local_5_shard_00000035_processed.jsonl/29528
We Have Officially Come Full Circle on Anti-Gay Legislators Who Are Gay When the first wave of Republican anti-gay legislators who turned out to be secretly gay or have engaged in gayish acts hit the news, we couldn't understand it. Why would you vote for a constitutional amendment banning gay marriage, Ed Schrock? What if you finally meet Mr. Right? Why would you vote against adding sexual orientation to the definition of hate crimes, Larry Craig? What if someone beat you up in an airport bathroom because of your wide stance? But then, as we thought about it, there was a sort of perverse logic to it: If there is something you're disgusted with about yourself, why wouldn't you act out against that in a public forum? We thought we sort of had a handle on it. But the stories kept coming. The latest is a real doozy. Father of four Roy Ashburn, an anti-gay Republican state senator from Southern California, was busted early this morning for drunk driving. While leaving a gay bar in Sacramento. With a trick in the passenger seat. ("A male passenger, who was not identified as a lawmaker, was also in the car but was not detained," the local CBS affiliate reported. From now on we should all label our one-night stands "not identifiable as lawmakers.") The bar Ashburn was leaving was hilariously called "Faces," which, as Brian Moylan from Gawker points out, is "a name only a gay bar in a modestly sized urban area could have." We feel like we've come full circle. Ashburn has reportedly voted against every gay-rights measure to cross his desk in the State Senate. And yet he's hanging out openly at gay bars, and even convincing dudes to go home with him. We're lost again. This guy is living at least part of his life as a gay man (not the part that involved siring four daughters with a woman) and yet he's voting against gay issues. It's one thing to try to overcompensate for a private shame, or to try to pound down your own secret instincts by legislative means (not that it's not still despicable, but there's at least some sort of theory to it). It's another thing to cruise around drunkenly at bars with names like Faces. Places like Faces are for the only three hot guys in town who can actually show off their abs while dancing on a box, and white men who do a really amazing karaoke version of "I Will Always Love You," and for bouffant-wearing contestants in the Miss Gay Latina Sacramento competition. You know, people who are actually proud of what they are. Not for self-hating lawmakers who spend their days hurting the very tail they end up chasing at night. Anti-Gay Lawmaker At Gay Club Before DUI Arrest [CBS13 Sacramento]
global_05_local_5_shard_00000035_processed.jsonl/29571
Focus: Scenic Route for Sound Allows Extra Control Physics 5, 33 Z. Liang and J. Li, Phys. Rev. Lett. (2012) Right turn. In simulated data, a sound wave impinging from the bottom gets redirected to the right by a triangular prism made of an acoustic metamaterial. If this were ordinary refraction, the wave would be deflected somewhat leftward as it emerged from the prism.Right turn. In simulated data, a sound wave impinging from the bottom gets redirected to the right by a triangular prism made of an acoustic metamaterial. If this were ordinary refraction, the wave would be deflected somewhat leftward as it emerged f... Show more Physicists have discovered surprising ways to manipulate the propagation of waves, notably light, by using structures assembled from tiny elements. In Physical Review Letters, researchers propose to alter sound waves by diverting them through an array of narrow, circuitous channels, a method that wouldn’t work for light. Simulations confirm that so-called metamaterials composed of such channels have unusual properties that let them refract sound in the “wrong” direction and could improve ultrasonic imaging. For 25 years, researchers have been changing the way electromagnetic radiation travels by engineering materials with internal structures on the scale of the wavelength. In so-called photonic crystals, propagation of some waves is prevented by the cancellation of waves. More dramatic effects appear using arrays of tiny resonators that are tuned to respond strongly to the incoming wave frequency. Experiments have confirmed that these “metamaterials” can have exotic properties, like a negative index of refraction. They can be used in lenses that beat the usual limits on resolution and may even allow objects to be “cloaked,” making them appear invisible. Researchers have recently extended these methods to acoustic waves. Such control might, for example, improve medical ultrasound imaging or protect buildings from earthquakes. Now Zixiang Liang and Jensen Li of the City University of Hong Kong propose a different kind of metamaterial that could work for sound but not for light. They imagine a two-dimensional region sliced into very small squares like a checkerboard. Within each square, a narrow sound “corridor” loops back and forth in a “maze” pattern to make a long path that fills up the square, with the entrance and exit at opposite corners. The team assumed there were two types of squares, identical except for a 90-degree rotation, arranged as the black and red squares on a checkerboard. A sound wave (with wavelength larger than the squares) moving across the board gets delayed as it travels through the lengthy path within each square. The researchers focus on frequencies for which the path length is almost exactly a multiple of the wavelength. If the path is slightly longer, the wave emerges from the square at a point in its cycle only slightly delayed from when it entered, so the apparent speed of sound is very high, equivalent to an extremely small index of refraction. In contrast, at frequencies where the path is slightly shorter, the wave appears to exit before it enters. This situation leads to a negative effective index of refraction for the material, which is the same property that has allowed theorists to design super-resolution lenses and invisibility cloaks for light waves. But the principle of this new metamaterial wouldn’t work for light waves because they can’t ordinarily travel through a wave guide that is much narrower than their wavelength. Sound waves do this easily, as in a French horn, says Li. The researchers confirmed with numerical simulations that a prism made of the metamaterial with a negative index of refraction bends sound in the opposite direction from ordinary refraction. Another simulation showed that for sound waves traveling in a straight pipe filled with an ordinary fluid, a barrier that blocks most of the cross section disrupts the passage of a wave. But with the metamaterial surrounding the barrier, the entire wave can reappear intact on the far side of the barrier, as though the barrier were invisible. So far, the simulations are restricted to two dimensions, but Li notes that the principle extends easily to three dimensions. In addition, because there are no resonant structures storing large amounts of energy, the researchers hope that sound will propagate with relatively little loss. “The idea is quite original and very smart,” says Nicholas Fang of the Massachusetts Institute of Technology in Cambridge. But he cautions that experiments will be needed to find out if there are new loss mechanisms in these novel structures that would limit their usefulness. –Don Monroe Subject Areas Related Articles Focus: Acoustic Structure Could Evade Sonar Focus: Acoustic Structure Could Evade Sonar A proposed acoustic version of a material that conducts electricity along its surface could lead to an improved way to hide submarines from sonar. Read More » Focus: Single-Frequency Mirror Focus: Single-Frequency Mirror A mirror made with metamaterials reflects at a selected angle and only responds to radiation of a specific frequency, while being transparent to other radiation. Read More » Synopsis: A Black Hole for Polaritons Synopsis: A Black Hole for Polaritons The flow of hybrid electron-photon states through a black-hole-like “acoustic horizon” may produce an observable signature of Hawking radiation. Read More » More Articles
global_05_local_5_shard_00000035_processed.jsonl/29582
Take the 2-minute tour × My current job is mostly writing GUI test code for various applications that we work on. However, I find that I tend to copy and paste a lot of code within tests. The reason for this is that the areas I'm testing tend to be similar enough to need repetition but not quite similar enough to encapsulate code into methods or objects. I find that when I try to use classes or methods more extensively, tests become more cumbersome to maintain and sometimes outright difficult to write in the first place. Instead, I usually copy a big chunk of test code from one section and paste it to another, and make any minor changes I need. I don't use more structured ways of coding, such as using more OO-principles or functions. Do other coders feel this way when writing test code? Obviously I want to follow DRY and YAGNI principles, but I find that test code (automated test code for GUI testing anyway) can make these principles tough to follow. Or do I just need more coding practice and a better overall system of doing things? EDIT: The tool I'm using is SilkTest, which is in a proprietary language called 4Test. As well, these tests are mostly for Windows desktop applications, but I also have tested web apps using this setup as well. share|improve this question What test tool are you using? It may be that your testing framework isn't supporting the types of tests you are writing. Cut-n-paste of more than 3 lines is generally really bad, but if you are able to clearly add more long-term value by automating a GUI test than by performing it manually every time, then whatever you are doing is probably pretty darned good. –  GlenPeterson Sep 19 '12 at 19:02 Also, what language is this? You may have something available that's just not popping into mind, that would allow reuse (like first class functions). On the other hand, test cases are supposed to be kept simple, to keep it less likely they have bugs themselves... –  Izkata Sep 19 '12 at 20:59 In anything I've written, testing code isn't excluded from refactoring.. –  Simon Whitehead Sep 19 '12 at 22:52 8 Answers 8 up vote 19 down vote accepted Copy-pasted and then edited test cases are often fine. Tests should have as few external dependencies as possible, and be as straightforward as possible. Test cases tend to change with time, and previously almost identical test cases may suddenly diverge. Updating one test case without having to worry about breaking other cases is a Good Thing. Of course, boilerplate code which is identical in many test cases and has to change in concert can and should be factored out. share|improve this answer This is mainly how I feel. Nearly identical test code is ok in a lot of cases, but identical test code repeated is bad news. –  joshin4colours Sep 20 '12 at 21:39 Repetition is the root of all evil That is right! Repetition is the root of all evil. Probably it was Knuth saying in his book “Premature optimization is the root of all evil”, but I think it’s repetition. Whenever you look at a program or you’re writing one and you discover some kind of repetition: Remove it! Kill it immediately… whatever but get rid of it! Each time I introduced some sort of repetition and had to fix a bug in there, I forgot to fix the replica...(Donald Knuth) So, whenever there is a repetition just remove it as best as you can, don’t hack! Think of a clean lean design (like, encapsulating your repeating code blocks in helper classes) and write some tests before changing something (just to be sure you didn’t break something). This is true for any piece of code that is written and test codes are no exception. Here is a good reading from Code Horror that inspires me - A Modest Proposal for the Copy and Paste School of Code Reuse. share|improve this answer "Each time I introduced some sort of repetition and had to fix a bug in there, I forgot to fix the replica…" exactly. Also, if you c&p and you forget to adjust the copied text to your current context this will hurt a lot. Bugged test code doesn't sound like the optimal situation, now does it? –  mcwise Sep 19 '12 at 18:09 yeap, i took the stations from Knuth :) –  Yusubov Sep 19 '12 at 18:14 You repeated yourself: You repeated yourself by saying "Repetition is the root of all evil" in the title and your intro sentence. –  Thomas Eding Sep 19 '12 at 19:08 Yeap, i did that intentionally to stress the importance and you are welcome to edit thats part :) –  Yusubov Sep 19 '12 at 19:18 Thomas Eding, you repeated yourself as well. You repeated yourself as well =) –  mcwise Sep 20 '12 at 7:13 It's still pretty bad to cut and paste. There are a few problems. Your tests may well be brittle, because you are vulnerable to something that requires a change in all that copy-and-pasted code. Will you have to rewrite all the tests? If you can't encapsulate the logic into helper methods outside your tests, you can't write tests of those helper methods themselves. Writing tests of test methods is usually to hard to make worthwhile, since you have to break your code to test the test. But you can unit test helper methods. It may well make the tests less readable. A big block of copied code may be harder to read than a call to helper method with a descriptive name. Everything I've listed is something that may be a problem. If you find none of them actually are a problem then of course it's fine. share|improve this answer I used to agree with you. But then, over time, I found that every change I made (particularly DI changes in unit tests) required numerous tests to change and that was cumbersome. Now I subscribe to the school of DRY, even when writing tests. For GUI testing, you may want to look at the PageObject pattern to reduce repeated code. share|improve this answer I would recommend picking up XUnit patterns. I used to have the exact same problem until I started leveraging that book. The Object Mother pattern sounds like it would be the most helpful for your scenario. Like someone else mentioned, properly encapsulating this setup code might be onerous, but having to change it in all the places you copy and pasted is even more so. share|improve this answer +1 for the Object Mother pattern for common initialisation code. –  k3b Sep 19 '12 at 19:21 Should people try and limit repitition when they can - yes. But the payoff depends on the situation. This could go back to the 'best practice' debate. But the question is what is best for you in this situation. There are exceptions to every rule. A couple things I would ask are: 1) How likely is it that this functionality being tested in the UAT will change? If it is unlikely it will change, then there is less chance that you will have to update each of your sets of code. 2) If there is a change in UAT, will it always impact each set of the copied code or might it only impact one or two sets? If it might be isolated and only require a change to one set, it might help to have the things separated. 3) How complex will the initial method be if you try and have it handle all scenarios? Are you adding a lot of nested if/else/loops? If you start over-doing all the branching, you may end up with code that is hard to comprehend. Would it be easier to make the update in each of the copied text than it would be to revisit all the branching logic? If you are stuck copy/paste/alter I would think you would want to add comments such as 'This is copied in method xyz'. That way you will be reminded to update all the pasted versions of the code. Or (coming from another SilkTest user) could you add a separate inc file that would focus just on this repeated code. That way you have all the variations in one place and could easily see the different methods that would require updating. share|improve this answer One Big Procedure One thought: It sounds like you are trying to avoid cut-n-paste code by making methods like: testScreen(title, fieldList, linkList, param1, param2, param3,...) { test that the layout at the top of the screen is correct test if PageTitle == title? for each field in fieldList: check that it appears in order on the screen for each field in linkList: check that it appears in order on the screen test if param1 is whatever... test if param2 is whatever... test that the bottom of the screen is correct Many Little Procedures (toolkit) Have you also considered the opposite approach? Instead of passing a million parameters to one big testScreen() procedure, maybe make your own framework or tool-kit of little helper procedures that you whip out as you need them. Like: You still cut and paste these procedures into every screen, but you are cutting and pasting smaller chunks of code and carving out chunks of commonality that are not cut and pasted (the contents of each little procedures). Cut and Paste The only time cut-and-pasted code hasn't bitten me was when the code was thrown away before I had to change it. My biggest concern with UI tests is how quickly they become obsolete. If you find you throw all your code away before you change it, then maybe you have found a niche where cutting and pasting is OK! Also, it's not so bad when there is no code downstream from the cut-and-pasted code (e.g. in the UI of an application). If you are pasting more than 3 lines, I'd really look into doing something about it. At least take steps to minimize it! Automated UI Testing Heck, if you can prove greater productivity with automated UI testing than manual testing using any technique (the cost of writing/maintaining automated tests is lower than testing manually every time, yet quality is the same) I think you should write a paper. I would read it! I can see the title now, "Cut-and-paste Code a Net Win for UI Testing!" share|improve this answer It's really not that bad. In fact, if you find certain code patterns are being used very often and the changes are very routine (such as a few strings, or parameter values), you could even write a code generator that generates repetitive test code based on a small(-ish?) input list of values that change. I've done this (generated test code) many times, using batch files, SQLPlus scripts, even Excel macros (it sounds ugly, but the variables for the different test scripts were already in a spreadsheet) and it can be a great time saver. The thing is that if anything changes in the overall structure of the repetitive test case code, you can just regenerate whatever you need. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29583
Take the 2-minute tour × As I have been learning to program, be it in my intern-ship or school, I have often come across situations where an extra piece of software is needed (from fairly basic to quite complex) and I am almost always told that I shouldn't waste my time developing a solution and use something someone else has already done. Does it make sense to do this or should I take the time to research and develop my own? At the moment I'm doing my final project which I have 15 weeks to complete, but the tutor and my classmates tell me not to bother. I can't help but think I am letting opportunities pass me by. share|improve this question closed as primarily opinion-based by Ixrec, durron597, Ampt, Snowman, MichaelT May 23 at 0:05 The natural tendency for most programmers seems to be to write their own implementation rather than try to understand someone else's. This inclination is bad and dangerous. –  TehShrike Jan 14 '13 at 0:19 @TehShrike I agree, but/and I think this is a process every programmer has to go through (I will write my own better version!) before learning to become smart and lazy in a good way (let's check first if someone has wrote that before coding it) :-) –  Jalayn Jan 14 '13 at 10:04 The last sentence is not too clear. They tell you not to bother developing your own or not to bother using the existing. –  Jan Hudec Jan 14 '13 at 10:04 @Jalayn Couldn't agree more. –  Petter Nordlander Jan 14 '13 at 20:11 7 Answers 7 up vote 5 down vote accepted Wow that's a really tough question and to be honest there is no right or wrong answer. Almost every programmer has their own way of programming and therefore learning/improving their skills. I would say there are mainly four different stages in learning how to code and when/why you have to use modules/plugins/frameworks: 1. If you are at the very beginning of your programming career you have to learn to write code yourself. You have to play with the language to get a feeling of what is possible and what is not and also to get a glimpse of what patterns are, where they occur and how to use them. 2. At a certain stage after you discovered the basics of what programming means you are ready to use existing modules/plugins/frameworks. It's a necessity to learn how to read and use other peoples' code. Learn where and how patterns were applied to code others have written. Main goal of this stage is to learn that modules/plugins/frameworks can ease your daily work but also that not every module/plugin/framework is worth using. 3. At the same time you are mastering the second stage you are about to enter the third one. Reproduction! You will not only use modules/plugins/frameworks, you have to understand/reproduce them in order to use them or even alter them to contribute back. Almost every time you will use other peoples' code you will extract and reproduce the details you are interested in. 4. Never ever fully rely on frameworks others have written. From time to time you will recognize anti-patterns or just poorly written code (not to mention errors). Even if you do not expect it almost every module/plugin/framework has errors and/or misbehavior (sometimes the documentation is not matching the actual code). So the last stage of learning how to program and use modules/plugins/frameworks is to write them on your own. You can see it as a good exercise to do some of the things a module/plugin/framework could provide on your own. Sometimes this will help you to fully understand code others wrote. To answer your question you have to clarify for yourself at which stage you are with your programming skills and, as it seems, what the goal of your final project is. Is it about creating a functional application than uses "as many" modules/plugins/frameworks as there are to ease your work. However if this is an educational task most often it is not about creating an application but rather learning the way to do the job. The question what your tutor expects can only be answered by him, so go and ask. PS: Good luck. share|improve this answer Thanks for the clear answer. –  The_Cthulhu_Kid Jan 14 '13 at 15:27 You are welcome. The question reminded me of my own final exam where similar questions had arisen. I'm glad to be of help. –  pwagner Jan 15 '13 at 6:58 If you have little time to complete a project, it's a good idea to use third-party code. The only thing is to understand how it works (in the level of interfaces) in order to use it correctly and not to get any "surprises". The most rational approach, I think, is to use the third-party code and complete your project. If after that you have time left, you could start developing your own code and replacing the third-party code with yours. You could start with the most interesting/difficult/challenging pieces. And you could leave the ones that are based, for example, on covering many various and obvious cases (like a calendar drop-downs). This way you would avoid the risk of not having the project done on time. When developing your code and replacing the third-party one with it, you could study the techniques used in those codes and try to improve them. Besides, there are libraries which are very efficient and beautifully designed, so studying them would be much more useful than creating the same functionality by yourself. share|improve this answer That sounds like great advice. –  The_Cthulhu_Kid Jan 14 '13 at 15:26 @gnat, thanks for the edit. I just can't memorize when to use its or it's ((( –  superM Jan 14 '13 at 19:41 If you need to get a job done (and your final project probably counts as "a job" in that context) then the approach I tend to use is to write the code that is crucial to the problem at hand and use libraries where it saves me time and isn't core to the problem. For example importing a CSV file can be a surprisingly complex problem to solve properly, if you have to deal with all the subtleties of character encoding, embedded line breaks, nested quotation marks, badly formatted data etc. It's also (usually) not something that is of special business importance, it's just "something that needs to be done". In that case I'd find a library, use it and move on to something more important rather than waste my time reinventing the wheel. That's not to say that it might not be interesting, or instructive, or just plain fun to do those "non-core" things yourself and you'll probably learn a lot by doing them but you have to learn to pick your battles. Prioritising what is important will help you determine what you need to write yourself, and what you can bring in from other sources. share|improve this answer Reuse existing code if and whenever possible. Reading and understanding other people's code is important part of learning to be a programmer. Other people's code is a great source of idioms you can use in your own work. If you just try to solve the problem yourself, you'll no doubt get it working, and you'll get more proficient with the techniques you already know, but you are unlikely to learn new techniques. And textbooks usually limit themselves to short examples and thus limited set of idioms. By trying to understand other people's code you'll also see what is easy to understand. The assignments you get when learning generally don't include maintenance, so you don't get to look at the code you wrote a year later to see whether you can still understand it, but in practice you'll need that rather often. So other people's code can give you some sense about what to use and what to avoid to keep the code understandable. It is also an important skill of it's own, since when you start doing programming for living, you'll most of the time work in a team and most of the time work on application that at least in part existed before you came, so you'll have to understand lot of existing code. Therefore I suggest using existing code, unless it contradicts the assignment, of course. And taking time to understand first how to use it properly and than also trying to understand how it works. share|improve this answer As history shows, you can still do it your own way, after you've read other people's code and be successful with it. –  ott-- Jan 14 '13 at 12:28 @ott--: Sure you can. And you know what you didn't like about their attempts, so it even has a better chance of being worth it. –  Jan Hudec Jan 14 '13 at 12:33 Priorities. Focus on what you want to achieve and in how much time. Yes, I'ts natural to have thoughts that certain building block could have been better, if I do it myself. But keep in mind that'd take you away from primary goal and project demands. Re-use what's available and popular. Popular available components are used, tested and contributed to, by many-many developers (probably smarter than us). You can contribute too, a lot of It can be better opportunities are there. If it doesn't exists, create and share. Finally, don't just re-use without knowing it. If you use external code, take some time to peek inside and see how stuff works. You'd learn a lot. share|improve this answer If we're talking about a school project, I generally think that most of the code should be your own. I think that productivity is not the most important think in this stage. I'd decide for each problem individually depending on the scale of the problem and how the problem is related to your assignment. For example when I was making a game as a school project (Breakout clone with more complicated physics) I did write the physics engine myself, because it was essential part of the assignment and I've learned something from it. However I didn't write the XML Serializer because it could be a project on its own and it isn't related to the assignment much. share|improve this answer I'll try to give a slightly different angle to the answers already given. My main claim, and this is what takes some getting used to, conceptually, is that in most cases writing code is not the goal. Writing code is the means to an end. In most cases, the end is to get a software product out, getting it out with good quality, and getting it out in time. If writing your own code will get in the way of that (and it will. For practically all non-trivial cases, your own code will take longer to write and will be less well tested), than use existing libraries, because writing code is not the goal. There are, of course, always secondary goals. Learning and improving as a developer is one of them. Developing in-house expertise in a problem domain or a technology may be another. These must all be considered when deciding whether to use existing code or write new code. If your project is writing a new tool for market trend analysis, it doesn't make sense to use existing data-analysis code, since that's where you want your designers and coders to give the edge over the competition. But it does't make sense to write your own UI controls, since that's not what your users will be choosing you for. But if you're writing a new eCommerce platform, it makes sense to use existing components for user management, data access and payment gateways, since these are commodities, and probably not the deciding factors - but do write your own UI, since the ease of use for customers and sellers is the main advantage you can offer. And finally, the school project. You have two goals here: the first is to learn. The second is to pass and get a good grade. These two are related, but not identical, and occasionaly even contradictory. If you spend your 15 weeks developing your own tools and plugins, you will likely not be spending them doing the actual tasks you were charged with. Always remember that it's the product requirements, not the elegance of your code, that matter to those who order the project. share|improve this answer
global_05_local_5_shard_00000035_processed.jsonl/29588
darklemonily's Smart As PlayStation Trophies Viewing darklemonily's Smart As trophies. Remove Sort by XMB/Type/Alphabetical Intelligent Being Collect all Trophies Absolute Genius Finish all Free Play Games at Genius difficulty Play all games in a single day Globe Trotter Earn a total of 100 stars in Street Smart Complete 30 sessions of Daily Training Perfect Attendance Play Smart As on 100 different dates Rocket Science Earn 3 stars in a game at Genius difficulty All Adds Up Play all Arithmetic Games Brain Surgery Earn 3 stars in a game at Hard difficulty Earn a total of 20 stars in Street Smart Earn a total of 50 stars in Street Smart Heavy Brain Play Smart As on 50 different dates Logical Conclusion Play all Logic Games Perfect Vision Play all Observation Games Star Pupil Complete 20 sessions of Daily Training Stroke of Genius Finish a game at Genius difficulty The Final Word Play all Language Games 1st Day At School Complete your first session of Daily Training Bright Spark Play Smart As on 25 different dates Day Tripper Earn a total of 10 stars in Street Smart First Word Play a Language Free Play Game Home Work Complete 10 sessions of Daily Training I See What You Did There Play an Observation Free Play Game Just Testing Earn 3 stars in a game at Easy difficulty Logical Progression Play a Logic Free Play Game Marked Improvement Increase your Brain Power score Mind Game Earn 3 stars in a game at Medium difficulty Smart Move Complete a Street Smart Challenge You Do The Math Play an Arithmetic Free Play Game
global_05_local_5_shard_00000035_processed.jsonl/29590
nooant's SingStar Digital PlayStation Trophies Viewing nooant's SingStar Digital trophies. Remove Sort by XMB/Type/Alphabetical Collect every SingStar™ trophy Perform with a friend 300 times Gold rush Complete 500 Golden Notes Musical marathon Perform 400 songs Rule the stage Accumulate 10000 seconds of perfect pitch Superstar quality Earn the "SingStar" score ranking in 20 normal length performances Career crooner Accumulate 3000 seconds of perfect pitch Good vibrations Perform vibrato for a total of 300 seconds Lyrical odyssey Perform 100 songs Midas touch Fill every Golden Note in a normal length performance Nailed it Get the highest ranking on every line in a Normal length performance Perform 15 songs in one game session Star quality Earn the "SingStar" score ranking in 10 normal length performances The home team Perform with a friend 90 times Anniversary gift Play on SingStar's original launch date Back me up Complete 5 performances of a duet song with another player Be number 1 Gain the number 1 position in 10 different score charts Channel surfer View 50 pieces of media Concert debut Upload a piece of media Don't stop the music Perform 40 songs Holiday special Play on Christmas Day Improving performer Accumulate 500 seconds of perfect pitch It takes two Perform with a friend 30 times Low Rider Get the lowest score rank on any song New styles Perform vibrato for the first time Perfect harmony Sing in harmony with a friend during a Duet Play 5 random songs selected by the shuffle button Save it for later Save 20 pieces of media Sing me a love song Perform a duet song on St. Valentine's Day Stars in my eyes Rate 10 pieces of media Strong pitcher Get the highest ranking on 10 lines in a row That's a rap Complete 5 rap performances
global_05_local_5_shard_00000035_processed.jsonl/29597
Search tips Search criteria  Logo of molcellbPermissionsJournals.ASM.orgJournalMCB ArticleJournal InfoAuthorsReviewers Mol Cell Biol. 1992 September; 12(9): 4076–4083. PMCID: PMC360302 The DNA-binding defect observed in major histocompatibility complex class II regulatory mutants concerns only one member of a family of complexes binding to the X boxes of class II promoters. The X box of major histocompatibility complex class II promoters is essential for proper expression of class II genes. Here we show that two distinct protein-DNA complexes (A and B), which exhibit similar binding characteristics and identical contact points on the X box, can be formed. This suggests the existence of a family of related X box-binding factors. Complex B (and not complex A) is specifically affected in primary combined immunodeficiency, a congenital defect in class II gene regulation. RFX1, the first X box-binding protein cloned, encodes a functionally relevant factor present in complex A and not in complex B as originally suspected. This report also illustrates the need for caution in correlating specific cloned proteins with nuclear factors identified by DNA-binding assays, particularly when dealing with families of related proteins. Full text Images in this article
global_05_local_5_shard_00000035_processed.jsonl/29603
nfl offseason Fustian Fridays: Don’t Ever Tell Me the NFL Doesn’t Have an Off-Season Welcome to Fustian Fridays, a new feature on Purple Jesus Diaries during the offseason where we will rant about various topics of absurdity that have really been pissing us off to no extent. Come share your grievances with us, or suggest a topic to rage about by emailing us. Now, let's get angry! This weekend will mark the first time we've had a Sunday without NFL football in about five full months. It ends up being even more if you count some weekends like Saturday preseason games, or Thursday Night Football and other garbage like that. Point being though, there is no NFL on this weekend or in the foreseeable future, and that gives me a real big sad in my pants.  But don't worry! Depending on which dickweed of a fan you'll talk to, they're like to remind you that the NFL actually doesn't have an offseason! Nope! Despite the Super Bowl being played last week and no more games on the foreseeable horizon, the NFL is going just as strong as it was in December, apparently, because, BOY!, look at all these roster cuts, and player surgeries we get to talk about instead! Well you know what, dickweed fan? You're full of shit and I hate your face. The NFL most certainly DOES have an offseason. It exists from the moment the Super Bowl ends to the moment the Hall of Fame preseason game appears on TV. Those are the darkest days of the year. Those are the days when the NFL does not have any games which are played, meaning – almost by definition – that it is "off season" for this particular sport. Note, a sport is played, not talked about, or practiced, or compared on paper. Sport is a game, which is played, which is what the NFL is. When it is not being PLAYED, it is the offseason. This isn't that hard to understand. "But wait!" says people who are stupid. "The NFL NEVER rests! You have the combine, mini camps, the NFL Draft, more camps, free agency, training camp, preseason, and then a new season! The NFL is always going! That's no offseason!"  NFL Draft Listen, I love the NFL as much as I love a 12 year Balvenie DoubleWood, or Adrian Peterson's smile. These are things that pump blood through my veins. I also ENJOY watching all three days of the NFL draft. I most definitely look at pictures and videos from rookie camps, scouting videos, the combine, training camp, and everything else. But don't kid yourself, people. That isn't the NFL. It's a glorified marketing bonanza that the NFL uses to get more money from us, which I'm totally fine with. I'll eat that shit up, because something like the draft in April is the closest thing to the NFL I'll have until September. But it's not the NFL. The best case you can make that says the NFL in fact DOES have an offseason, and it in fact IS excruciating in it's lack of on-field activity, is to ask yourself one question … Would you rather spend a Sunday afternoon watching an NFL game, or watching rounds 4-7 of the NFL Draft? I don't even care what NFL game it is. Titans vs. Jaguars, for all I care. If you say anything but that game, you're a god damn liar. The only reason you watch the NFL Draft (and pay attention to other related off-season activities) is so that you can see how those parts of interest will perform for your team on the field, A FIELD WHICH WILL NOT BE PLAYED UPON UNTIL GAMES ACTUALLY START AGAIN. It's just ridiculous. The NFL most certainly does have an offseason, and it is horrible, no doubt about that. If a fan ever tries to tell me again that this isn't the case, you're just as horrible. And if they ever try to tell me that you just replace football Sundays with baseball games, I will bring an army to their house. Fucking baseball. About PJD
global_05_local_5_shard_00000035_processed.jsonl/29625
@Inproceedings {export:167024, abstract = { In order to study the properties of total visual input in humans, a single subject wore a camera for two weeks capturing, on average, an image every 20 seconds. The resulting new dataset contains a mix of indoor and outdoor scenes as well as numerous foreground objects. Our first analysis goal is to create a visual summary of the subject’s two weeks of life using unsupervised algorithms that would automatically discover recurrent scenes, familiar faces or common actions. Direct application of existing algorithms, such as panoramic stitching (e.g. Photosynth) or appearance-based clustering models (e.g. the epitome), is impractical due to either the large dataset size or the dramatic variation in the lighting conditions. As a remedy to these problems, we introduce a novel image representation, the “stel epitome,” and an associated efficient learning algorithm. In our model, each image or image patch is characterized by a hidden mapping T, which, as in previous epitome models, defines a mapping between the image-coordinates and the coordinates in the large "all-I-have-seen" epitome matrix. The limited epitome real-estate forces the mappings of different images to overlap, with this overlap indicating image similarity. However, in our model the image similarity does not depend on direct pixel-to-pixel intensity/color/feature comparisons as in previous epitome models, but on spatial configuration of scene or object parts, as the model is based on the palette-invariant stel models. As a result, stel epitomes capture structure that is invariant to non-structural changes, such as illumination, that tend to uniformly affect pixels belonging to a single scene or object part. }, author = {Nebojsa Jojic and Alessandro Perina and Vittorio Murino}, booktitle = {Neural Information Processing Systems}, pages = {1027-1035}, title = {Structural epitome: a way to summarize one's visual experience}, url = {http://research.microsoft.com/apps/pubs/default.aspx?id=167024}, year = {2010}, }
global_05_local_5_shard_00000035_processed.jsonl/29641
Take the 2-minute tour × I saved over the encryption key backup file when changing from one account to another. Now I can't see reports, change accounts, or use any of the Encryption key tools in the configuration manager. I receive a "Creating Encryption Key Backup" error 0x80090016. Does anyone know how to fix this? Many thanks in advance. share|improve this question 1 Answer 1 up vote 1 down vote accepted See Backing Up and Restoring Encryption Keys: 1. Start the Reporting Services Configuration tool, and then connect to the report server instance you want to configure. 2. On the Encryption Keys page, click Restore. 3. Select the .snk file that contains the back up copy. 4. Type the password that unlocks the file. 5. Click OK. Error 0x80090016 is Keyset does not exist.. This can occur when the crypto service is stopped (unlikely) or when you don't have access to the keystore you're trying to access. That would likely be caused by manually changing the service to an account that does not have enough privileges to access the keystore. Did you change the service account using the SSRS tool, or manually in the SCM? The later is unsuported. If you did the former and you're hitting a keyset access error, you'll have to call product support to investigate. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29642
Take the 2-minute tour × What does virtual memory mean? And oh btw, I have swap of 1GB and it shows 0% used. So I am confused. Java process = 1 Tomcat server + my own java daemon Server = Ubuntu 9.10 (karmic) share|improve this question See: serverfault.com/questions/48582/… –  Juliano May 5 '10 at 3:11 5 Answers 5 Virtual memory isn't even necessarily memory. For example, if a process memory-maps a large file, the file is actually stored on disk, but it still takes up "address space" in the process. Address space (ie. virtual memory in the process list) doesn't cost anything; it's not real. What's real is the RSS (RES) column, which is resident memory. That's how much of your actual memory a process is occupying. But even that isn't the whole answer. If a process calls fork(), it splits into two parts, and both of them initially share all their RSS. So even if RSS was initially 1 GB, the result after forking would be two processes, each with an RSS of 1 GB, but you'd still only be using 1 GB of memory. Confused yet? Here's what you really need to know: use the free command and check the results before and after starting your program (on the +/- buffers/cache line). That difference is how much new memory your newly-started program used. share|improve this answer "Check results before and after starting your program", alternatively, use USS (Unique Set Size) as returned by smem. –  Hubert Kario Dec 31 '12 at 10:35 So is there a tool that gives the true amount of memory being used, tools that are not third party. –  CMCDragonkai Jul 21 '14 at 8:23 @CMCDragonkai Yes, free. –  deviantfan yesterday From the top(1) man page: o: VIRT -- Virtual Image (kb) The total amount of virtual memory used by the task. It includes all code, data and shared libraries plus pages that have been swapped out. VIRT = SWAP + RES. Where RES means RESident memory (physical memory used). Actually that's not correct (anymore). When it says "swap," that also includes files that the program has mapped into its address space, which may or may not actually be consuming real RAM yet. This memory is file-backed but isn't really swap. VIRT also includes pages that have been allocated but not used for anything yet. Any page in this state is mapped to the kernel Zero Page (brilliant concept--you should look it up) so it shows up in VIRT but doesn't actually consume any memory. share|improve this answer well thats interesting, so is VIRT = SWAP + RES, how come my SWAP usage is zero, while virtual memory for the 2 java processes is close to a 1GB?? –  user42159 May 4 '10 at 18:20 basically Top shows.... Swap: 1048568k total, 0k used, 1048568k free, 505728k cached –  user42159 May 4 '10 at 18:21 VIRT column in the ps/top output is almost irrelevant to measure memory usage. Don't worry about it. http://serverfault.com/questions/122810/apache-heavy-load-virt-vs-res-memory share|improve this answer Thanks, I got worried and confused, because while swap usage was 0%, virtual memory column is very high. And also I have only 1.7GB of the total 2.7GB physical memory used, while virtual memory is high? –  user42159 May 4 '10 at 15:56 Source: http://www.faqs.org/docs/linux_admin/x1752.html share|improve this answer I found this talk very helpful in understanding the subject: http://www.youtube.com/watch?v=twQKAoq2OPE share|improve this answer Welcome to ServerFault! We prefer answers to contain an actual answer and not just a link to an answer because links go dead over time. Your answer would be better if you could add a summary of the important parts of that video to it. –  Ladadadada Jan 11 '13 at 10:35 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29644
Take the 2-minute tour × Anyone ever have this issue? To better debug SSH connection problems, remove the -q option from 'ssh' in the [tunnels] section of your Subversion configuration file. An unknown Subversion error occurred. (code = 210002) share|improve this question What do you mean by '"Versions"' in the title? –  ptman Jan 14 '11 at 8:49 @ptman, Versions is a Subversion client for OSX versionsapp.com –  LukeR Jan 14 '11 at 9:14 What are you trying to do when it throws that error? Can you perform the same action at the command line? A bit more info might help. –  LukeR Jan 14 '11 at 9:45 1 Answer 1 up vote 1 down vote accepted I have not had this issue before. Without more information, it's hard to produce a solid answer. The best answer I can give is to edit your config file and look for the tunnels section and look for a line similar to this: tunnelName=/usr/bin/ssh -p 2000 -l user Remove the -q option from whatever entry is in the tunnels list. This should allow you to better debug the problem and provide more information about the cause. Additionally, here is a resource on SSH Subversion configuration: share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29645
Take the 2-minute tour × I am confused as to how to set up username/password restrictions on tinyproxy (so that not all the world can access it - ip alow/block has limited use in my setup). Any pointers? Thank you! share|improve this question 3 Answers 3 up vote 7 down vote accepted Tinyproxy doesn't support authentication yet, there's a ticket in their bug tracker, but it doesn't look too lively: https://banu.com/bugzilla/show_bug.cgi?id=13 There's an unofficial (and possibly unstable patch) patch for tinyproxy 1.7.0 posted on their mailing list: https://banu.com/pipermail/tinyproxy-list/2006-January/000606.html share|improve this answer My solution to this problem is to configure tinyproxy to allow connections only from localhost ( and then use ssh with port forwarding to access the proxy from a remote machine. In the remote machine you need to configure the proxy address as localhost and use whatever port you forwarded with ssh to to the remote machine. This solves 2 problems: strong authentication from random IP addresses as well as encryption of all requests between the client and tinyproxy. The downside is that you have to open the ssh session in the remote machine. share|improve this answer Thank you for your input! While this is good for internal use, this way does not help in cases you want to provide standard proxy access to others. –  john Aug 2 '11 at 10:51 I don't believe it yet supports authentication: the man pages for the latest version make no indication of authentication being an option. Have a look at Squid Proxy: it's a full-featured proxy and with a minimal config, is quite lightweight. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29646
Take the 2-minute tour × A lots of Linux Distro are result to lots of options. By the way, I'm using Ubuntu 8.04LTS - Server for our File Server, and Sadly Stop today. I'd used eBox Platform for managing the Linux system. Happily enjoying "create/copy/paste" of files unto the server with its own samba profile lasting for a week. Then the nasty bugs accord. Resulting to Linux kernel Panic, due to some of buggy eBox Modules Written in Perl. The Question is: What is the best Linux Web-Base Management Tool or Platform? Options 1. eBox Platform (which i marked it negative) 2. Webmin 3. ISConfig Which one you like, or maybe the best for you. Note: Ubuntu 8.04LTS - Server is my Linux Distro share|improve this question closed as off-topic by masegaloeh, Jenny D, Ward, Andrew Schulman, BigHomie Apr 13 at 12:56 What is the purpose of your server? Is it strictly a samba/fileserver? There are several options for webservers or database servers –  Brent Jun 10 '09 at 17:04 3 Answers 3 up vote 4 down vote accepted I think for a general purpose web console, webmin is the standard. The thing I really like about webmin is that it works with your standard config files, so you can edit them either by hand, or using webmin - or stop using webmin altogether, and your config files are still consistent. share|improve this answer For the question asked, good answer. Although I'm a bit negative about GUI administration in general and would advise to learn how to do it from the commandline. It'll suck at first, but in the long run you'll be much better off. At least with webmin, you have the option of both until you are comfortable on the commandline. –  skraggy Jun 22 '09 at 14:36 Where webmin really shines is when you as the main administrator get sick or hit by a bus, and your windows administrator has to do your job :) –  Brent Jun 22 '09 at 17:25 ISPConfig is an open source hosting control panel for Linux. ISPConfig is licensed under BSD license. Managed Services * Httpd (virtual hosts, domain and IP based) * Bind (A, CNAME, MX and SPF Records) * POP3 Auto-Responder * MySQL client-databases * Webalizer statistics * Harddisk quota * Mail-Quota * Traffic limits * IP-addresses * Shell-access * Mailscanner (Antivirus) * Firewall share|improve this answer For single-application servers, there are many options: For managing Database servers, try phpmyadmin For managing webservers/web-hosting situations, virtualmin is very nice, or cpanel is another option share|improve this answer
global_05_local_5_shard_00000035_processed.jsonl/29647
Take the 2-minute tour × I have an Exchange Server 2010 running in a virtual machine on our VMWare Esx Server, and we do backups of the virtual machines regulary. I heard somewhere that the Exchange Server should be stopped during the backup, because else I would risk a data loss. Is this true? Wouldn't this also imply that Exchange Server is not tolerant to a server power loss? EDIT: I use VMWare ESX 3.5, and therefore do not have the vStorage API. share|improve this question 1 Answer 1 up vote 3 down vote accepted Exchange is based on a variation of the Jet database, and does not need to be stopped in order to be backed up (in fact, it shouldn't be stopped because some important tasks are carried out as part of an "online" backup). Exchange server backups should be carried out with an "Exchange aware" backup agent - most decent backup software for Windows Servers should include this. This should be done with Exchange online and should be done in addition to any VMWare host or OS level backups you do. Microsoft have a page about using Windows Server backup here. share|improve this answer Do you know which tasks have to be performed before a backup can start? I only have the space for a VM backup, not for additional backups. –  Daniel Mar 8 '11 at 13:05 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29648
Take the 2-minute tour × I'm trying to deploy a commercial product through Active Directory and a group policy; about a handful of computers are NOT downloading/installing the software. Anyone have any ideas/suggestions on what could be wrong? The computers in question are connecting to the network, have the proper group policies applied, and have appropriate access to the shared folder from which the MSI is being deployed. Furthermore, there are no error or warning messages in the application and system logs. share|improve this question Have you tried running the installer manually from one of those machines? Did it install? –  Zypher Aug 18 '11 at 16:01 @Zypher: Yes, we manually ran the MSI and it was successfully installed. –  murphj Aug 18 '11 at 16:51 4 Answers 4 It's possible that for some reason or another, group policy is either not applying or not refreshing on those machines. You can verify this by running gpresult /H share|improve this answer If the GPO is applying and the installation is failing you'll be getting messages in the event log (Application Event Log on Windows XP, the "Group Policy" log on Windows Vista / 7). Does Resultant Set of Policy (RSoP) show the software being assigned? If it doesn't check out the "Security" tab of the software assignment itself and make sure the computer has rights to "Read" the software assignment (not the "Security" tab of the GPO-- the assignment within the GPO). If you're sure the GPO is applying and assigning the software to the PC kick up Group Policy logging (to an insanely verbose level) and sift thru the event log by creating a REG_DWOORD value "RunDiagnosticLoggingGlobal" at "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Diagnostics" and setting it to "1" on one of the affected computers. I'm perplexed that you're not seeing anything in the Event Log. That makes me think that the assignment isn't being applied (and that it's a GPO application problem). I suppose there's also the chance that your event log is set to "Overwrite events after x days" and is full, too, and you're not seeing new messages but, hopefully, you've checked that. share|improve this answer Have you verified that the target computers have the necessary software dependencies installed (Service Packs / .NET framework). I've had remote installations fail for this reason. I would also try installing another MSI via GPO to isolate if the issue is with the policy or with the MSI you're trying to install. share|improve this answer We've manually checked that the computers are up-to-date; plus, they're monitored by a WSUS. As for the MSI itself, it has successfully been downloaded and installed on numerous other machines, so it appears the issue(s) is not with the MSI or GPO. –  murphj Aug 18 '11 at 16:53 In my experience, the Component Status section of an RSOP (Resultant Set Of Policy) report is very helpful when dealing with failed software installation policies. In the past, I've seen machines asking for a reboot over and over and I found that I needed to set the "Always wait for the network at computer startup and logon" policy to Enabled to slow down GPO processing enough for software to install. If you launch the Group Policy Management console (gpmc.msc), there is a section for Group Policy Results. This is similar to running gpresult, but it's a bit more readable. 1. Right-click the Group Policy Results "folder". 2. Click the Group Policy Results Wizard option. 3. Enter the computer name into the wizard where prompted. 4. Select the username from the Select A Specific User listbox when prompted. 5. Click Next and Finish as needed. 6. You will see an entry titled %USER% on %COMPUTER% under the folder. Click on it. 7. Under the Summary tab, you should be able to see a Computer Configuration Summary and a User Configuration Summary. 8. Under each summary, you should see • General information about the machine • Group policy objects that were applied and denied • Security group membership at time of GP processing • WMI Filters and their results • Component Status Under Component Status, there is a Software Installation entry that should give you more information about what's happening. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29649
Take the 2-minute tour × I'm using the following code (any tried many variations) in a web page that is supposed to kill a process on the server: Process scriptProc = new Process(); SecureString password = new SecureString(); scriptProc.StartInfo.UserName = "mylocaluser"; scriptProc.StartInfo.Password = password; scriptProc.StartInfo.FileName = @"C:\WINDOWS\System32\WScript.exe"; scriptProc.StartInfo.Arguments = @"c:\windows\system32\killMyApp.vbs"; scriptProc.StartInfo.UseShellExecute = false; The VBS file is supposed to kill a different w3wp.exe process, which tends to lock up. This is a legacy web app that we are going to replace soon, but in the meantime we need to limp by and force the app to shut down when this happens. I should note that killing w3wp.exe is not something I.T. professionals do. What happens is, WScript.exe is in task manager every time I run the kill page, and it never goes away. The process WScript.exe (and I tried others such a psexec.exe) is being run as a local user with admin rights (and I tried other types of users including domain admins) when run from IIS, but it works when run from the command line on the server. share|improve this question Killing another process from within IIS is highly irregular and unconventional. The whole point is for IIS to run with very very limited permissions, so that an attack on IIS cannot turn into an attack on the OS. Stated differently, the steps you need to take to make kill work will make your system much much more vulnerable to attack, and would not be acceptable to professional admins. –  samsmith Jun 5 '12 at 16:23 I'll update my post to mention this fact. This site has no external access and our business is extremely small, we have much more serious security vulnerabilities than this, but I will pass this info on to the admin in charge who requested it. –  David Jun 5 '12 at 23:35 2 Answers 2 Yes, yes it should. Network Service is a user-level account at best and AFAIK IIRC will only be able to kill processes it started. If the task is running on the server itself, the easiest way is probably to require Windows Integrated authentication for the page, and ACL it so that only Administrators and System can Read it. That'll ensure that only Administrators can log on to the page, and there's a little bit of accountability around who killed the process. Also, one other thought: have you confirmed that KillMyProcess.vbs works reliably when executed interactively with cscript killmyprocess.vbs? share|improve this answer Yes, cscript killmyprocess.vbs works at the command line. The process needs to be accessed by all users. We have an outdated web based production system that tends to lock up, and we need anyone to be able to kill the process. It doesn't interfere with the application at all. I created a local user on the IIS machine and am able to remotely execute the process under that user's name, but it still hangs and doesn't work. I also made sure that local user had accepted the Eula which was a problem earlier. In the meantime, I'm using PSexec.exe, which works, but I'd prefer to have an IIS link. –  David Jun 5 '12 at 15:11 I realize this doesn't really answer your question directly. But wouldn't it make more sense to take IIS and the manual user intervention out of the equation? Barring an actual monitoring tool (SCOM, Nagios, etc) in place, I'd think you could write a script that runs periodically via task scheduler on the offending server that can detect if the app is hung and take appropriate action. Why wait until someone actually notices the problem and then has to take time out to fix it themselves? Just automate the problem away until you can get rid of the legacy app. share|improve this answer I'll look into this. Looks like a very good option. Thanks. –  David Jun 5 '12 at 16:40 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29650
Take the 2-minute tour × I have inherited several RHEL5 servers that were set up to authenticate users against their AD accounts via winbind. Everything works fine until I update group membership in AD. For some users, the changes never make it to the output of the "groups" command, although they are reflected in the output of "getent group <groupname>". For example, consider the following: [root@hcc1pl1 ~]# groups plubans plubans : domain users systems infrastructure development [root@hcc1pl1 ~]# getent group q1esb If I add myself to q1esb on the DC that winbind is using, you can see that the membership is updated: [root@hcc1pl1 ~]# lsof -i | grep winbind winbindd 31339 root 17u IPv4 63817934 TCP hcc1pl1:56541->hcnas01:microsoft-ds (ESTABLISHED) winbindd 31339 root 21u IPv4 63817970 TCP hcc1pl1:53622->hcnas01:ldap (ESTABLISHED) [root@hcc1pl1 ~]# ldapsearch -u -x -LLL -h hcnas01 -D "[email protected]" -W -b "CN=Peter Lubans,OU=Standard User Accounts,OU=Users,OU=XXX,DC=XXX,DC=XXX" "(sAMAccountName=*)" memberOf Enter LDAP Password: memberOf: CN=q1esb,OU=Security Groups,OU=Groups,OU=XXX,DC=XXX,DC=XXX Note that winbind is running without caching (-n flag): [root@hcc1pl1 ~]# ps -ef | grep winbind root 31339 1 0 13:50 ? 00:00:00 winbindd -n root 31340 31339 0 13:50 ? 00:00:00 winbindd -n root 31351 31339 0 13:50 ? 00:00:00 winbindd -n root 31352 31339 0 13:50 ? 00:00:00 winbindd -n root 31353 31339 0 13:50 ? 00:00:00 winbindd -n Now getent shows that that group has the correct members: [root@hcc1pl1 ~]# getent group q1esb But the updated membership is not reflected in my account details: [root@hcc1pl1 ~]# groups plubans plubans : domain users systems infrastructure development [root@hcc1pl1 ~]# The truly vexing part of this problem is that it works fine for other accounts on this machine, and for my account on machines that I have configured from the ground up. Any ideas? share|improve this question 5 Answers 5 It appears that this was caused by group information being cached at logon-time in /var/cache/samba/netsamlogon_cache.tdb. I guess that although '-n' instructed winbind not to cache it's queries against LDAP, the presence of the membership information in that TDB file was enough to mess things up. share|improve this answer My only thought and it is a very vague one is that it might have something to do with communication with your Infrastructure Master (which is responsible for updating group memberships across domains). share|improve this answer I've had a similar experience with RHEL's stock samba/winbind packages. It's been my experience that RHEL's winbind is a little sketchy. What I observed was that once a user authenticated, their group membership would be accurately updated, but aside from that, no changes in group membership would ever show up. This is not an optimal solution, particularly if you remove a user from a group that would grant them access to the machine, since it effectively gives them one last login that they shouldn't get. This may or may not reflect your situation exactly though, because I also suffered from not seeing the group members of an AD group when running getent group (it would just look like a group with no members, even if groups username showed them as a member of the group), but it appears that is working for you. What solved the problem for me was installing the "tested" distribution of RPMs from enterprisesamba.org. Group membership changes showed up immediately, regardless of winbind cache settings. Required no configuration changes, BUT if you're mapping AD users and groups with a local idmap table installing the new RPMS will more than likely completely remap your numeric group and user ids, so be prepared for that (dump your getent group and getent passwd output to a file before upgrading so you have a reference to fix file ownership with. share|improve this answer I had something similar. To fix the problem I ran "authconfig --disablecache --update". Of course it made logons slow. share|improve this answer I have the same issue with this. Since this is last 2009, have you guys found solution for this problem? Any advise would be deeply appreciated. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29651
Take the 2-minute tour × Which existing software has this capability? I see that news deliver will send notification of usenet posts via e-mail, but is there software which will e-mail the actual usenet posts? Something along the lines of gmane, but in reverse. Possibly GNU mailman has this feature, but now I'm wondering whether Leafnode might also have that capability. share|improve this question closed as not constructive by mgorven, Magellan, jscott, Sven, HopelessN00b Nov 8 '12 at 17:02 Thufir, thanks for posting an answer to your own question; I found it interesting. However, may I encourage you to go back through your question queue and accept the best answer for each one? You do this by clicking on the "tick" outline next to each question, and it drives the SF reputation system for both you and the author of that answer. We also see a warning "0% accept rate" by your username, which may discourage others from answering your questions. –  MadHatter Nov 8 '12 at 7:54 1 Answer 1 up vote 1 down vote accepted Cyrus has the ability to export Usenet via IMAP and/or export shared IMAP mailboxes via NNTP. This is made possible by a new NNTP daemon which is included with Cyrus. share|improve this answer
global_05_local_5_shard_00000035_processed.jsonl/29652
Take the 2-minute tour × We are using an nginx backend behind a nginx proxy. We use upstream keepalives. They work quite nicely. We were wondering, what value would we set keepalive_requests on the backend to set the maximum number of keepalive requests to unlimited? share|improve this question 1 Answer 1 up vote 4 down vote accepted There is no special value to mean unlimited. Use some big number (up to 2147483647 on 32-bit platforms) instead. share|improve this answer yep, we have taken a look at the nginx source. nothing in there that would point to a value that sets keepalive_requests to unlimited. this will have to do. thanks! –  anonymous-one Sep 7 '12 at 7:05 Maxim, and what's the point of not having an option to let infinite keep-alive? If a connection is actively used why would it have to be reopen every N http requests? –  wick Dec 30 '14 at 12:30 @wick, the main reason is that there are some allocations from a connection memory pool which may happen, and the connection have to be closed to free the memory. –  Maxim Dounin Jan 12 at 12:46 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29653
Log in with: RuneScape Wiki Community Powered Membership badge mining gem rocks.jpg Mining gem rocks Gems are precious stones found when mining. Some gems can be found randomly when mining ore around Gielinor. After completing the Shilo Village quest, members can also mine gem rocks in Shilo Village or the Dungeoneering resource dungeon located in the mine north of Al Kharid. Wearing an amulet of glory will increase your chances of getting a gem when Mining, and wearing both an amulet of glory and a ring of wealth will increase that chance further. For instructions on how to enchant an amulet of glory or ring of wealth, see the Jewellery Craft page. Having mined or found these uncut gems, there will come a stage where your Crafting level will enable you to cut and use these gems to make jewellery. Magic can be used to enchant some of these items to make them more powerful and able to be used for a variety of skills and even transportation methods. To cut a gem, simply use a chisel on it. Be aware, however, some gems have a chance of shattering, but this risk dimishes with a higher Crafting level. You may also store large varieties of gem in a gem bag, bought from the rewards trader of Daemonheim. Mining Cutting Uncut Gem XP Gem Level XP uncut opal.gif Uncut opal 25 opal.gif 1 Crafting 15 3.8 if shattered uncut jade.gif Uncut jade Members icon ~ 65 jade.gif Jade Members icon 13 Crafting 20 5 if shattered uncut red topaz.gif Uncut red topaz Members icon ~ 65 red topaz.gif Red topaz Members icon 16 Crafting 25 6.3 if shattered uncut sapphire.gif Uncut sapphire * # 50 sapphire.gif 20 Crafting 50 uncut emerald.gif Uncut emerald * # 67.5 emerald.gif 27 Crafting 67.5 uncut ruby.gif Uncut ruby * # 85 ruby.gif 34 Crafting 85 uncut diamond.gif Uncut diamond * # 100 diamond.gif 43 Crafting 107.5 uncut dragonstone.gif Uncut dragonstone Members icon % $ # N/A dragonstone.gif Dragonstone Members icon 55 Crafting 137.5 uncut onyx.gif Uncut onyx Members icon % £ # N/A onyx.gif Onyx Members icon 67 Crafting 167.5 uncut hydrix.gif Uncut hydrix Members icon + # N/A hydrix.gif Hydrix Members icon 79 Crafting 197.5 * Can be obtained randomly from rocks around Gielinor and Shooting Stars. An Amulet of Glory and Ring of Wealth can improve your chances of obtaining these gems. Also obtainable from gem rocks. ~ Can be obtained through panning or mining gem rocks. # All of these gems can be made into tips for crossbow bolts. For further information, see Making Bolts. % Can only be obtained through Mining if a gem-finding scrimshaw is used. $ Can be found in a chest in Taverley and dropped by a very select few high level monsters. £ Can be obtained through trading, TzHaar shop run by TzHaar-Hur-Lek (bought with Tokkul) or obtained from kingly implings. + Can only be made from incomplete hydrixes that are bought for reaper points through the Grim Reaper. RuneScape Wiki Game Guide Support Centre Scribbles & Sketches The Community Hub Report a wiki page
global_05_local_5_shard_00000035_processed.jsonl/29667
Slashdot is powered by your submissions, so send in your scoop Forgot your password? User Journal Chacham's Journal: Chronicle: Internet Connection, DSL, and Comcast. 3 Journal by Chacham My Internet connection is through Comcast. I pay about $60 a month for the service. I also pay for Basic Cable, not that I use it, but it lowers the overall price by five dollars. Unfortunately, I don't have the option to use DSL, since I have no home phone. My mother has a similar problem. She has a phome phone, but she is "too far" to receive DSL through SBC, Which is saddening as there is a CO within a half-mile of her house. Apparently, they don't want to lay new copper. This means though, even in this busy area, she's likely going to have to have dial-up. I am just about ready to have my neighbor get DSL so i can lower my bill. (They're on my network as it is.) But, they are not on Ameritech's phone service, and apparently, they demand that their service is used for DSL usage. Sprint Broadband was the nicest in the area, though they are not accepting new customers. The service was fantastic, and definitely worth it, as my mother was chosen to be the test station in her sector. That means free, as long as she housed another box. No problem on that one. When the tests stopped, they wanted to charge us the full fifty dollars, so I made the erroneous decision of switching to Comcast to get the few months of a significantly lower price. When i tried switching back, i found they would not accept new customers, even if they were erstwhile customers. Oh well. Lesson learnt. Chronicle: Internet Connection, DSL, and Comcast. Comments Filter: • by turg (19864) * Around here (Toronto) you can get DSL from pretty much any ISP that does dialup (and some that don't). It requires a tech from the local telco to install a card on your line at the CO, but that card connects you to your ISP's own network, not the telco's (unless the telco is your ISP). My ISP [] charges $29.95 (Canadian) a month for 3.5 Mb downstream and 800 Kb up. When I'm doing heavy downloading and check the connection speed, it's always steady at 3.5, with occasional spikes up to 4.5 or so (once I even sa • Thanks for the sysinternals link. Cool stuff.
global_05_local_5_shard_00000035_processed.jsonl/29673
#33 Help users rejected by server with 404 - wrong SIP URI Stefan Becker When the user has been rejected by the server with 404 we know at least these: - the login credentials are correct (would get 401 otherwise) - the SIP URI is either wrong [ - or the user isn't allowed to use OCS. Extremely rare case, why would he try to use SIPE then?] Currently every 404 creates a new thread in the support forum. Instead Sipe should help the user to at least to try to fix the problem himself. The necessary information can be retrieved via LDAP from the users AD server. Known information provided by user First LDAP operation: request root base: $ ldapsearch -LLL -h DOMAIN.COMPANY.COM -b "" -s base defaultNamingContext -> defaultNamingContext: DC=XXX,DC=COMPANY,DC=COM (example) Second LDAP operation: bind with users' credentials and retrieve information from account: $ ldapsearch -LLL -h DOMAIN.COMPANY.COM -D "[email protected]" -W -b "<defaultNamingContext>" -s sub "(&(ObjectClass=user)(samaccountname=ACCOUNT))" msRTCSIP-PrimaryUserAddress mail givenName sn If LDAP succeeds (and ONLY THEN!!!) present to the user - if msRTCSIP-PrimaryUserAddress exists: "your sign-in name is xxx" - otherwise "can't determine your sign-in name. Please try one of these: givenName . sn + @COMPANY.COM • Stefan Becker Stefan Becker example LDAP code • Stefan Becker Stefan Becker The attached code is ready to be integrated. Just UI & i18n texts are missing. • pier eleven pier eleven I'll try to build and test when have access to AD at work • pier eleven pier eleven Well I'm able to retrieve SIP URI on both test and production AD interactively (ldapsearch): ldapsearch -LLL -h cosmo-ocs-r2.cosmo.local -D "[email protected]" -W -b "DC=cosmo,DC=local" -s sub "(&(ObjectClass=user)(samaccountname=alice))" msRTCSIP-PrimaryUserAddress mail givenName sn dn: CN=Alice Alisson,CN=Users,DC=cosmo,DC=local sn: Alisson givenName: Alice mail: [email protected] msRTCSIP-PrimaryUserAddress: sip:[email protected] But still many questions to the approach: 1) Input parameter: Username/password. There is SSO (Single-Sign On option), when user doesn't provide Username/password at all. That's the point of SSO. Note: Username actually accessible through env var %USERNAME% (or %USER%) on Windows. 2) AD server should be resolved somehow. Again there is env var on Windows %USERDNSDOMAIN% for default domain. For me actually DOMAIN+COMPANY.COM (in terms of this thread) doesn't point to AD. It's something else added in between. 3) No official binary openldap distribution for Windows. I.e. it's hard to find, not up to date, no sync with releases. I've experimented on Linux with the above. (I seems had enough of adopting GMime on Windows.) I'm saying that it's more problems than benefits to my mind. • Stefan Becker Stefan Becker - if openldap is not available then the code is flagged out. - If LDAP can't be accessed for any resaon then nothing is shown to the user (I thought this was clear from the example code????) • pier eleven pier eleven Not resolving AD address properly would reduce successful cases in half. Not supporting Windows users will reduce user base of the functionality to other half. What's the point to target only 25% of users? • Stefan Becker Stefan Becker 25% users which will get automatic help (I sincerely doubt your calculation though).
global_05_local_5_shard_00000035_processed.jsonl/29684
By Bill Simmons Page 2 Remember when Norman Dale glances around before Hickory's first practice, then mumbles under his breath, "Let's see what kind of hand I've been dealt here"? That's Week 10 of the NFL season. The first nine weeks are a prolonged exhibition season with one wrinkle: You can't clinch a playoff spot, but you can definitely screw one up. Just ask the 2004 Chiefs. Now the real season begins. I'm not saying that the last two months didn't count; but the fact remains, you always want to peak in January instead of November. And in the words of James Hetfield, nothing else matters. Jake Delhomme Do you think Jake keeps the Super Bowl XVIII program next to his bed to remind him it really did happen? So what kind of hand have we been dealt here? First, some housecleaning: • Five teams are D-U-N done: Carolina; Oakland; San Fran; Chicago; Miami. • Three teams are done but lurking as potential spoilers from week to week (depending on the matchup). Cincy; Cleveland; Dallas. • One team looks like a legitimate spoiler: Buffalo, a decent team with an emerging star in Willis McGahee. • Four teams are just about done, but we can't cross them off only because of their divisions: Kansas City (too many self-inflicted wounds); New Orleans (too predictable); Washington (too sloppy); Tennessee (too banged up). For the sake of this column, I'm knocking them off. That leaves us with a whopping 19 potential playoff teams, a number which must delight Paul Tagliabue to no end. Yep, we're getting closer and closer to the season where every NFL team finishes 8-8 in the same season. Congratulations. In the meantime, let's separate those 19 teams into the following categories: 19. Detroit (4-4) -- Next three road games: Jacksonville, Minnesota, Green Bay. With a Thanksgiving home game against the Colts squeezed in. Thanks for playing. (By the way, have you ever noticed the disturbing similarities between Alec Baldwin and Steve Mariucci? They look alike; they're both strangely likable; their weights fluctuate like crazy; and they're either overrated or underrated, depending on the conversation and the circumstances. I'm telling you, it's creepy. I wonder if one of Mariucci's brothers has ever acted like a drunken, deranged lunatic in a televised Celebrity Poker tournament.) Favorites -- 55-71-4 Home Teams -- 61-65-4 Home Underdogs -- 20-15-1 Underdogs winning outright -- 55 for 71 (79%) 18. Houston (4-4) -- The dream dies in Indy this weekend. At least they made it to the "Playing well enough that every pregame show did a feature on us" stage. That's always fun. 17. NY Giants (5-3) -- Not only did they lose their two best d-lineman last week, but the rest of the league finally remembered that Kurt Warner reacts to blitzes like a Yorkshire terrier during an earthquake. A heavy favorite for "The decent first half team that drops like a stone in the second half of the season" honors. (And when they make a QB change later this season, forget about Eli Manning ... what about Jesse Palmer?!?!?!?! Think he can tear himself away from wanna-be actresses and PR-conscious models to run the Giants offense for a few weeks? Or would it interfere with his social life? Would anything be funnier than Jesse telling Tom Coughlin, "Coach, I appreciate the offer, but I'm good -- I'd rather be the guy who calls in plays from the headset. Is that cool? Look, I gotta run, I have to find a tux for the American Music Awards tomorrow night.") 16. St. Louis (4-4) -- New England's nickel package last Sunday included a wide receiver (Troy Brown); a backup linebacker (Don Davis); a rookie free agent with the worst-selling jersey in the league (Randall Gay); and a practice squad CB named after Earth Wind and Fire (Earthwind Moreland). Of course, they beat the Rams in St. Louis by 22. How does this happen? How many Mike Martz games can end with everyone saying, "Wow, that was an absolutely ATROCIOUS loss" afterwards? Fifteen? Twenty? Thirty? Give me a number. The man needs to be stopped. (That reminds me, there was a classic Martz moment from Tuesday's press conference: "We got direction, we're going, you're on the train or you're not ... I know where we're going, I know where I'm going ... you're either with me or you're not." Not quite Jim Fassel pushing his chips into the middle of the table a few years ago, but I guess it will have to do. Next stop for the Mike Martz Train: 4-5!) Possible Rocky Balboas 15. Tampa Bay (3-5) -- Yeah, it's probably not happening. Not with Brian Griese prominently involved. (Then again, are you willing to hand over the NFC South to a Falcons team that lost by 46 points three weeks ago? Me neither.) 14. Arizona (3-5) -- That's fine ... I'll wait until you stop laughing. (OK, good.) Just hear me out: After a two-month stretch where they only played one lousy game (the Buffalo debacle), they finally have Boldin and Fitzgerald healthy, which means they can start cracking the 24-point barrier. More importantly, look at this schedule the rest of the way: Giants; at Carolina; Jets; at Detroit; Niners; Rams; at Seattle; Bucs. Would you wager against the mere possibility of a Denny Green team going 6-2 down the stretch? Me neither. (And would anything be more delightful than this gambling scenario: Josh McCown on the road, in cold weather, against the No. 3 seed in Round 1? I think not.) Chad Pennington Now that he's hurting, Chad is just another miserable Jets fan. Possible schedule casualties 13. NY Jets (6-2) -- Be scared, Jets fans. Be VERY scared. Your QB is Quincy Carter for the next two weeks. You're facing the Ravens D and a ticked-off Jamal Lewis this Sunday. Your last four wins came against Miami (1-8), Buffalo (3-5), San Fran (1-8) and Miami (1-8). You still have to play the Pats, Steelers and Seahawks. You have to play in Arizona and Cleveland. You might have a must-win Week 17 game in St. Louis. And you can't finish any lower than 4-4 over the next eight weeks. Then there's this: Curtis Martin is on pace to rush for 380 carries and 1,700-plus yards right now. I'm not saying he's an injury waiting to happen, but how many backs shatter their career highs in carries and yards during their 10th season? 12. Green Bay (4-4) -- Nine wins earns a playoff spot in the NFC. So can the Packers finish 5-3 over these last eight games? They're looking at the Vikes at home on Sunday, followed by three not-so-easy home games (Rams, Lions and Jags) and four tough road games (the Texans and Eagles, plus the Vikings and Bears to end the season). Yikes. Then there's this: Last time I checked, Mike Sherman was still the coach. Double yikes. (Still, I can't rule them out as a possible Super Bowl team. Not in that cruddy conference. And not with Tice and the Vikings standing in their way in the Central. Which reminds me ... ) Suspect until proven otherwise 11. Minnesota (5-3) -- Lingering questions: Did you ever think they would miss Randy Moss this much? Has any team ever given us more starting roto RBs in one season? Doesn't it seem like you can go down the field on them whenever you want? Where do they find these Kelly Campbell/Nate Burleson types? Are they just being rolled out of some factory in Duluth? During the end of games, why does Mike Tice always have the same stunned expression like everyone who found out that their TiVO didn't record the last 90 seconds of "Lost" this week? And why do I get the feeling that there isn't a single Vikes fan in the country who trusts this team? 10. Baltimore (5-3) -- Here's what we know: They aren't cracking 20 points without defensive TD's, special teams TD's and/or trick plays ... they have three impossible road games left (Indy, Pittsburgh and New England) ... their defense isn't that good, not after what KC did to them ... they can't play from behind because they have the worst receivers in the league ... and you could make a pretty solid case that Kyle Boller is the poor man's Joey Harrington. Here's what else we know: They need 10 wins to make the playoffs ... they have Quincy Carter and the J-E-T-S this week, followed by a reeling Cowboys team at home, as well as three more easy home games (Bengals, Giants, Dolphins) ... and Jamal Lewis hasn't really gotten going yet. Let's hope they make the playoffs as the sixth seed. Please. If Boller, McCown, Plummer and Griese are all starting on the road in Round 1, I could be living on the water in Malibu by mid-March. 9. Denver (6-3) -- Even S.I.'s Peter King turned against Jake Plummer this week: "None of us -- not me, you or Mike Shanahan -- know if Jake Plummer is going to throw three TDs or three picks on a given Sunday. That hurts." Of course, Peter wrote that paragraph as they were airlifting him from the wreckage of the Jake Plummer MVP Bandwagon crash. I would quibble with him on one point -- maybe you can't figure out Plummer from week to week during the season, but in January, you definitely know. He's going to self-destruct. It's like playing blackjack with someone who doesn't know how to play blackjack. Maybe they can win for an hour or so; but over the course of a marathon gambling session, those "Maybe I should split these 10s" decisions will eventually ruin them. There's a reason they call him the Snake. 8. Seattle (5-3) -- They could finish 8-8 ... they could make the Super Bowl ... all bets are off. These guys aren't even worth discussing. It's like when my roommate JackO tried to analyze the lyrics to "The Forest" by The Cure in college. Why even bother? There was no answer. (Belated tangent, and only because I found out about this last Sunday: Can you believe that Jerry Rice asked Steve Largent for No. 80? It isn't like the Seahawks have had a cavalcade of heroes over the past 28 years; Largent was the only memorable player in the history of the franchise. Steve Largent WAS the Seahawks! Why not just ask to have sex with his wife? And what was he going to say, "No, you can't have it?" I couldn't believe that. As my buddy Shek points out, if the roles were reversed, can you imagine Rice's response if Largent made a comeback with the Niners and asked to wear No. 80? Please. Somebody needs to take Rice out like Nate Scarborough in the "Longest Yard" and get this over with.) The Paris Hilton Team 7. Jacksonville (5-3) -- Won those five games by a total of 16 points. So why do I have this nagging feeling that they're still kicking around in Round 2? Peyton Manning Go ahead and name Peyton MVP. McNabb ad Brady will be happy battling in the Super Bowl. The contenders 6. Indianapolis (5-3) -- They remind me of those Spurs and Nuggets teams from the early '80's: Entertaining to watch, unstoppable at times, impossible to take seriously. Barring a serious collapse from the Pats or Steelers, they aren't getting anything higher than a third seed, which means they would have to win back-to-back games in New England and Pittsburgh in January. Not happening. (Random note: I love this revisionist claim that Manning keeps calling these audibles at the line as a savvy way to extend their time of possession and keep Indy's defense off the field. Gimme a break. He's always done this! EA Sports even mocked him in "Madden 2005" this season by having Video Peyton audibling relentlessly. Personally, I think he has some mutant form of Nomar's OCD -- those audibles are the equivalent of Nomar changing his batting gloves like a psychopath before every pitch. The man needs to be medicated. He's going insane.) (And how is the team better off with him changing the plays every down? Why even employ an offensive coordinator then? Imagine being a Colts o-lineman stuck in the three-point stance for 40 seconds per play? Wouldn't you want to throw a hair dryer into his whirlpool after the game? I've had it with this guy. If he breaks Marino's TD record, that would be almost as bad as Bonds breaking Hank Aaron's record with a size 9 3/4 head. Like Marino wouldn't have thrown 70 TDs in his prime with these passing rules and Indy's defense constantly putting him back on the field. But please, keep calling Manning the MVP over Brady and McNabb ... wins and losses clearly shouldn't matter.) (Seriously ... I'm getting angry. I might need to take a walk.) (Deep breath.) Home team in caps Ravens (-1) over JETS BROWNS (+3.5) over Steelers Texans (+9) over COLTS Bears (+5.5) over TITANS Bucs (+3.5) over FALCONS JAGS (-3) over Lions Seahawks (PK) over RAMS Chiefs (-3.5) over SAINTS REDSKINS (-3) over Bengals PACKERS (-4) over Vikings CARDINALS (+2) over Giants NINERS (PK) over Panthers PATRIOTS (-7) over Bills Eagles (-6.5) over COWBOYS Last week: 6-8 Season: 66-60-4 5. San Diego -- I wrote this right before Week 2: "I don't understand this KC affection at all. That's a 5-11 team with one great player. What's the difference between them and San Diego? Seriously, you tell me." As it turned out, that paragraph was an insult to the Bolts: Tomlinson and Holmes cancel one another out; Brees has played better than Green (and just about everyone else); Antonio Gates has been the Lindsay Lohan to Tony Gonzalez's Tara Reid; and the Chargers D is infinitely better than the Chiefs D. Plus, they have Marty Schottenheimer giving those Gary Busey-like "We need to keep protecting our house!" speeches. It's no contest. There's a reason the Chargers are scoring 29 points a game: They're good. (By the way, I haven't seen a minute of them all season -- not one -- so I'm evaluating them strictly on statistics, highlights, word of mouth and behind-the-scene clips from that goofy "Sounds of the Game" show on the channel that lured Rich Eisen into obscurity. The Bolts are blacked out here in Los Angeles. God only knows why. There's a decent chance I won't see a single live Chargers play until January. Maybe I should get DirecTV's NFL Package next season. Oh, wait ... I already have it.) 4. Atlanta (6-2) -- There's a specific formula for making the Super Bowl. You need a playmaker on offense. You need to run the ball when it matters, stop the run when it matters and score points in a pinch. You need to avoid killer turnovers. You need one token veteran who hasn't been there before, just so everyone can have something to talk about during Super Bowl Week. And you need to start making The Leap in November and December. Nail those things, throw in a quality coach and everything else is cream cheese. Unfortunately, there isn't a single NFC team that fits the formula. That's why I keep coming back to Atlanta -- easy schedule the rest of the way, budding superstar at QB, new coach settling in, decent shot at a bye week in Round 1 -- and that jaw-dropping game they played in Denver recently. Just seems like they have a higher ceiling than every other NFC team but Philly. Then again, I'm finishing this column at 3 in the morning right now. The favorites 3. Philly (7-1) -- Tough team to judge because of that creampuff schedule: They could finish the season having played seven road games against below-.500 teams. In fact, on the list you're reading right now, they only have three games all season against teams in my Top 15: Minny, Pittsburgh and Green Bay. So it wasn't shocking that the Steelers blew them out last week. Philly can't run the ball and can't really stop the run. That's a deadly combination in January. (By the way, how was the T.O. honeymoon period for you? If this was a relationship and T.O. was the chick, we'd be at the point where the Eagles just found out that T.O. stinks up the bathroom, can't cook to save his life, doesn't like sex as much as he claimed, and flips out whenever you don't want to do something with him and his family. In other words . . . um . . . maybe this was a bad idea . . . ) 2. Pittsburgh (7-1) -- Best team in the league right now ... 1. New England (7-1) -- ... but they still have to beat the team of the decade when it counts. Hey, I'm happy for Steelers fans. Good group of people. But remember the Wolf's quote from "Pulp Fiction" that I'm not allowed to print? Goes something along the lines of "Let's not start sucking each other's popsicles yet?" Exactly. It's Week 10. The season starts now. • Bill_Simmons
global_05_local_5_shard_00000035_processed.jsonl/29704
Spice Girls: Then and now Spice Girls World Tour 2007 - San Jose View gallery 53 photos It's been 16 years since the Spice Girls released their smash hit single "Wannabe" and became a global pop culture phenomenon. Now the best-selling female group of all time, they reunited to perform at the Closing Ceremony of the London 2012 Olympics. View Comments (1)
global_05_local_5_shard_00000035_processed.jsonl/29713
Take the 2-minute tour × I set up a FTP server in IIS with an SSL certificate which I created my self (using Makecert.exe and Pvk2Pfx). I attributed the PFX file to my FTP server. I have a C# script which connects to the FTP server and always gets the following error message: I installed the certificate in the "Trusted Root Certification Authorities" in the local computer and user. As it does not authenticate, I took a look via C# on the store: X509Store store = new X509Store(StoreName.AuthRoot, StoreLocation.LocalMachine); store.Open(OpenFlags.ReadOnly | OpenFlags.OpenExistingOnly); foreach (X509Certificate2 mCert in store.Certificates) var friendlyName = mCert.Issuer; But my certificate is not listed. When I open the MMC console I see my certificate. share|improve this question What reason does it give for not trusting? –  Ben Jun 26 '12 at 12:58 Did the answer help you? If so, please accept the answer, if not add info to clarify. –  Sascha Jun 29 '12 at 7:48 I'm sorry Sascha but I can't answer you right away. I'm busy on another project which was priorities. I'll clarify as soon as I can. Thank you for your help. –  Jeppen Jun 29 '12 at 11:56 2 Answers 2 Usually, C# doesn't trust certificates without a trusted root certificate - like in the case of a self-signed certificate. The ServicePointManagerallows to add a function where you can handle trusts yourself. // Callback used to validate the certificate in an SSL conversation private static bool ValidateRemoteCertificate( object sender, X509Certificate certificate, X509Chain chain, SslPolicyErrors policyErrors) if (Convert.ToBoolean(ConfigurationManager.AppSettings["IgnoreSslErrors"])) // Allow any old dodgy certificate... return true; return policyErrors == SslPolicyErrors.None; private static string MakeRequest(string uri, string method, WebProxy proxy) HttpWebRequest webRequest = (HttpWebRequest)WebRequest.Create(uri); webRequest.AllowAutoRedirect = true; webRequest.Method = method; // Allows for validation of SSL conversations ServicePointManager.ServerCertificateValidationCallback += new RemoteCertificateValidationCallback( if (proxy != null) webRequest.Proxy = proxy; HttpWebResponse response = null; response = (HttpWebResponse)webRequest.GetResponse(); using (Stream s = response.GetResponseStream()) using (StreamReader sr = new StreamReader(s)) return sr.ReadToEnd(); if (response != null) From blog post How to accept an invalid SSL certificate programmatically. share|improve this answer As a quick workaround, you could accept all certificates with: ServicePointManager.ServerCertificateValidationCallback += (o, c, ch, er) => true; share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29714
Take the 2-minute tour × Does the keyboard shortcut for moving from editor to console back and forth in Sublime Text 2 exist? If so what is it? share|improve this question 1 Answer 1 up vote 1 down vote accepted For a Python Code block you can use Ctrl + ` (The single quote on the tilde key). There are some other useful shortcuts here: Useful Shortcuts Not sure if this helps with other scenarios. share|improve this answer Thanks for the answer. Although i did not realised that by keying show console is basically the same with moving the cursor to the console. –  Afeez Aziz Sep 7 '12 at 15:02 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29715
Take the 2-minute tour × I have the next code if ($.cookie('show-tooltip') != "false") { content: { text: 'some text', title: { text: '', button: true show: { event: false, ready: true position: { my: 'bottom left', at: 'top left', adjust: { x: 80, y: 30 events: { hide: function() { $.cookie('show-tooltip', false); console.log( $.cookie('show-tooltip') ) style: { classes: 'qtip-shadow qtip-dark' }); ​ I have some issues: 1.If I pass the click arrow in front of the logo, the qTip balloon (want it to stay open) closes. 2.Can't make it closing when the X (close button) is clicked only: I want to make it re-open each time the page is refreshed, unless you have clicked the X button before. Can somebody guide me please ? share|improve this question @rajeshkakawat don't you think that in order to do the above code, I used those instructions ? I find your comment unconstructive and spam –  demlasjr Dec 29 '12 at 16:25 Your Answer Browse other questions tagged or ask your own question.
global_05_local_5_shard_00000035_processed.jsonl/29716
Take the 2-minute tour × I've got such a simple code: <div class="div1"> <div class="div2">Foo</div> <div class="div3"> <div class="div4"> <div class="div5"> and this CSS: position: relative; .div1 .div3 { position: absolute; top: 30px; left: 0px; width: 250px; display: none; .div1:hover .div3 { display: block; width: 200px; height: 30px; background: red; .div4 { background-color: green; color: #000; .div5 {} The problem is: When I move the cursor from .div2 to .div3 (.div3 should stay visible because it's the child of .div1) then the hover is disabled. I'm testing it in IE7, in FF it works fine. What am I doing wrong? I've also realized that when i remove .div5 tag than it's working. Any ideas? share|improve this question Note that it may be the case that you need to also add .div3:hover{ display: block } otherwise when you move your mouse over the child element .div3 the parent will lose its pseudo class :hover. This depends on your implementation however. –  moorej Oct 23 '09 at 15:20 3 Answers 3 up vote 24 down vote accepted IE7 won't allow you to apply :hover pseudo-classes to non-anchor elements unless you explicitly specify a doctype. Just add a doctype declaration to your page and it should work perfectly. More on IE7/quirks mode can be found on this blog post. share|improve this answer I found that this solution worked better and was a bit cleaner: <style type="text/css"> * { color: #fff; .wrapper { .trigger { background: #223; .appear { background: #334; display: none; .trigger:hover .appear { display: block; <div class="wrapper"> <div class="trigger"> <p>This is the trigger for the hover element.</p> <div class="appear"> <p>I'm <strong>alive!</strong></p> share|improve this answer This is “cleaner” than specifying a DOCTYPE? How so? –  mkoistinen Jun 3 '12 at 17:20 @mkoistinen Note that this was posted 14 hours before the DOCTYPE answer, which I did not know about at the time :) –  Ross Jun 3 '12 at 22:26 Ah, my bad, I should have looked at the dates to figure out the correct context. –  mkoistinen Jun 4 '12 at 17:03 Could it be the double margin problem? I did an display: inline-block when it happened for a li http://www.positioniseverything.net/explorer/doubled-margin.html share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29717
Take the 2-minute tour × I am trying to create a batch file. It should let specify a source and destination folder. The source folder will be parsed and depending on part of the file name the file will be moved to the destination folder. There will be multiple files in the source folder to be parsed. The files will be something like file-1-tmp.txt, file-2-tmp.txt, file-3-tmp.txt etc. I looked at using the FOR /F command using tokens and delims of - - but can't get it to recourse all of the files in the folder If the file has -1- it will be moved to destination if a file has -2- it will be moved to another destination. ps: Please help before I loose all my hair share|improve this question 2 Answers 2 Can you just do multiple commands, one for each type of file?: for %%i in (*-1-*.*) do move "%%i" dir1\. for %%i in (*-2-*.*) do move "%%i" dir2\. for %%i in (*-3-*.*) do move "%%i" dir3\. Based on @Andriy M's suggestion, a simpler approach would be: for %%n in (1 2 3 <...etc...>) do move *-%%n-*.* dir%%n\. share|improve this answer Straightforward and clear, although, to be honest, I don't see why you need to use FOR loops for this. You could simply move *-1-*.* dir1\ etc., couldn't you? –  Andriy M Jan 18 '13 at 16:02 Good point. I was originally thinking about putting all of this within another for loop. (See edits.) –  David R Tribble Jan 18 '13 at 21:35 I like your second suggestion. If the numbers are consecutive, you could also use a for /l loop instead of a simple for: for /l %%n in (1,1,10) do ... (would iterate from 1 to 10 inclusive). Of course, in both cases it is assumed that the destinations are based on the same numbers too. So it's a somewhat specific approach, although, if applicable, it would likely be more efficient than my "universal" loop. –  Andriy M Jan 18 '13 at 22:50 There may be various approaches to this problem. For instance, you could use a separate command for every set of files that need to be moved to the same destination, like in @Loadmaster's answer. A rather different approach would be to iterate over all the files, determining each one's destination as you go. The implementation of this approach might look like this: FOR %%I IN ("D:\path\to\source\file-*-tmp.txt") DO ( FOR /F "tokens=2 delims=-" %%C IN ("%%C") DO ( IF %%C == 1 ( MOVE %%I D:\path\to\destination\1 ) ELSE IF %%C == 2 ( MOVE %%I D:\path\to\destination\2 ) ELSE IF ... That is, you iterate over the files stored in a specific folder and matching a specific mask using a simple FOR loop. In the loop body, you use another loop, a FOR /F one, to split the name and get to the part that determines the destination. Once you've got that part, you compare it individually to all possible values using a set of nested IF commands, and for each match you specify a MOVE command to place the file accordingly. You could also modify the above script in a way that would allow you to specify destination paths more conveniently. In particular, you could prepare a set of variables containing all possible destination paths, at the beginning of the script. In the inner loop's body, instead of multiple IFs you would use just one that determines whether a "destination variable" corresponding to the extracted part exists. If it does, you just use the path stored in that variable to move the file to. Here's how this variation might be implemented: SET "dest1=D:\path\to\destination\1" SET "dest2=D:\path\to\destination\2" SETLOCAL EnableDelayedExpansion IF DEFINED dest%%C MOVE %%I !dest%%C! share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29718
Take the 2-minute tour × I am considering implementing a jump to item's page feature in a REST app, much like StackOverflow's does with questions with multiple answer pages. If you ask for a URL like http://stackoverflow.com/questions/194812/list-of-books/1215215, it will jump to the question's page containing the specific answer (page 4 for this specific case as of this writing). Notice that the client does not request an specific page by number, it requests a page that contains an item of interest and the server needs to resolve the page. In StackOverflow, this is used to get from a user's profile page to the user's answer in context, for example. I would like to do that within my app, but I can't get to a final (RESTful) design. I've considered the answers to question 776448 and chose to go with the query strings only solution for the base case. But should the app respond a query to an item's page with a 200 response (like StackOverflow does) containing the page with the item, or should it respond with a 302 redirect to the query string version URL? StackOverflow went with the first solution, but which solution do you find more RESTful? share|improve this question 2 Answers 2 up vote 1 down vote accepted I like the idea of a 302 response because it describes exactly the situation: the requested resource resides temporarily at this location (e.g., /.../list-of-books?page=4). This one boils down to personal preference though; there's no restriction on what your URLs look like. share|improve this answer The main problem I see with a 302 redirect is that the item may no longer be on that page when the second request hits the server (other items may be added or removed). –  Thiago Arrais Nov 1 '10 at 17:22 Then you've answered your own question. I like to be pragmatic about decisions like this. If option one will always work as expected and option two won't, ditch the questions around semantics and go with option one. –  rojoca Nov 1 '10 at 17:27 If I understand what you are asking for, you are looking to implement a fragment identifier. The resource you are accessing is /page232 and you want the client to position the UI to be looking at Item-2323. The server ignores everything after the # character. share|improve this answer I think I missphrased the question. It really wasn't about UI positioning, but how should a REST service respond to a request for a page in a paginated collection resource such that the page includes an specific item. I've changed the question example URL to try to make it more clear. –  Thiago Arrais Nov 1 '10 at 15:31 @Thiago Ahh, I see. I misunderstood. –  Darrel Miller Nov 1 '10 at 15:48 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29719
Take the 2-minute tour × I've implemented the like button on my WP blog, but for some reason some of them (not all of them) are interpreted as being the same button. If I press like, I will also like the ones that is interpreted as the same. I can't figure out why. There are several other problems with what is shared on Facebook, but I think those problems are connected to this one. It worked great for a few days, then I started getting an error each time I pressed the like button. After fiddling with the og:type value the error disappeared, but instead now I get this strange behaviour. My implementation is so simple, I can't really think of any causes: <div class="fb-like"><fb:like href="<?php the_permalink();?>" show_faces="true" width="600" font="arial"></fb:like></div> I've found that the behaviour changes depending on what og:type I define in the header section, but with no value producing the correct result. the blog can be seen at http://blog.parkov.dk/ (in Danish, though). Anyone has experience with this? share|improve this question Yes we are experiencing this as well. Facebook seems to have changed the way it handles redirects (like 302s?). Not sure yet. See if the bug I describe here is similar and vote on it if it is: bugs.developers.facebook.net/show_bug.cgi?id=16056 –  thaddeusmt Mar 21 '11 at 17:51 1 Answer 1 up vote 0 down vote accepted Remove the href parameter and instead use the Open Graph meta tags. I see that you are using them but some required tags are missing: • og:title • og:url For the homepage use blog as og:type! share|improve this answer Well, I actually did use og:title and og:url, but someone on a forum insisted these would CAUSE the problems, as they set the title and url for the whole page. About the href, it is the correct way to do it. You can even see in the document you pointed to, that the generator will produce an XFBML tag with a 'href' attribute –  Harold Smith Mar 21 '11 at 15:22 @HaroldSmith: Yes and in the page I pointed to:og:url - The canonical, permanent URL of the page representing the entity. When you use Open Graph tags, the Like button posts a link to the og:url instead of the URL in the Like button code. I always use this approach, and it's working just fine. Just leave the href empty and use the tags I suggested and then try the URL Linter –  ifaour Mar 21 '11 at 16:03 Could you perhaps show this in example? It's unclear to me exactly what you mean. –  Harold Smith Mar 23 '11 at 10:08 @Harold, my website homepage is an example. Here the Like plugin href is empty, and I set the og:url with the link I want Facebook to grab. As for the og:type I've used website instead of blog because I'll be promoting my "blog" as "website" and not just a "blog". You can use blog. –  ifaour Mar 23 '11 at 18:47 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29720
Take the 2-minute tour × Im viewing an element with IE's F12 developer tools. I can see the styles being applied to the element so I can change or disable them, but how can I add a completely new style? share|improve this question Could you change the accepted answer to the top answer? –  stefan.s Oct 31 '13 at 10:37 4 Answers 4 up vote 5 down vote accepted You could add the style attribute (Right click on the element and select "Add Attribute") to the element and add any CSS properties inline. share|improve this answer That works unless I want to apply styles to a class or id, rather than 1 element. Thanks –  jdln Jul 4 '11 at 10:00 Yes, quite correct :-) –  andyb Jul 4 '11 at 10:02 In IE9 you can select the CSS tab then right click to add a new style rule. enter image description here In IE11 you'll need to select the DOM Explorer tab, then the Styles tab on the right. Then you can right-click to add a new style rule. enter image description here share|improve this answer Indeed, the perfect answer. –  Auxiliary Nov 13 '13 at 11:19 What about IE10? –  Cthulhu Oct 10 '14 at 16:18 Same way, except it's been moved to the styles tab on the right side by default. Similar to where it's at in Chrome. –  joshb Oct 10 '14 at 20:16 What about IE11? –  Zack May 19 at 14:26 @Zack Just added instructions for IE11. –  joshb May 19 at 15:24 If IE is not finding the element you hover with the cursor it may be because part of the HTML code is being loaded with Ajax or another similar technique after the page have already being generated. If that is the case, you will have to close the inspector, reload the page, make all the steps necessary to show the element in wich you are interested and only then open the inspector again. Now it should find your element when you hover it so you can inspect it for whatever you need. share|improve this answer Click on the Attributes Tab in the Developer Tools. You can add css there. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29721
Take the 2-minute tour × I have a sample program which does nothing but Hello World. I open IE and go to my development environement and access the silverlight, it loads the XAP first time and then if I close IE and open again, XAP does not get downloaded. Since there are no changes I expect it not to download. After deploying it in QA environement, I open IE for the first time, it load XAP as expected. Now close IE and open again, I expect it not to download XAP but it does download XAP again. But if I would do refresh on the page it does not download XAp. So this happens only on Fresh IE open in our QA environment. All the above tests are done on the same box with same IE setting. So there is no client side IE cache issue. I did check the date and Time on the servers to see if there is any difference as specified in silverlight XAP gets downloaded everytime link and our servers are in same date and time. Does any one know how to prevent IIS not to download everytime? share|improve this question 1 Answer 1 up vote 4 down vote accepted The default settings in IE mean that a fresh instance of IE will always attempt to fetch each unique URL when it is first encountered. IE does this even if the cache headers sent with the resource the last time it was fetched would indicate the resource is still fresh. However IE will send If-Modified-Since and/or If-None-Match when it re-requests a resource that it has a copy of in its cache. Hence the server has the option of responding with 304 Not Modified, are you sure that is not happening? The 304 has no entity body and is therefore a cheap response. Note also that IE can make some strange heuristic choices if the server fails to send any cache control headers with a resource. One of these choices is where the resource is quite large no caching is performed. If you haven't already done so I would recommend you set some reasonable Expiration on the ClientBin folder in IIS Manager (in IIS7 select the ClientBin folder, select "HTTP Response Header", open "Set Common Headers..", enable Expire Web content. share|improve this answer Only in data center, we are not getting 304 while in development servers with fiddler I can see 304 response. I will check the enable expore web content and update back. –  Nair Jul 22 '11 at 3:31 We enabled the enable expire web content to 10 hours, still did not work. –  Nair Jul 22 '11 at 13:55 Let me correct my previous comment, by changing the response header expiration did work. But we couldn't set it at ClientBin level, I have to do it at web site, level. Is it not possible to do it at ClientBin? –  Nair Jul 22 '11 at 15:53 @Nair: Yes it is possible, IIS would be pretty rubbish if you could only configure expiration at the whole site level. What version of IIS are you using? –  AnthonyWJones Jul 22 '11 at 15:57 Using IIS 6.0 DC –  Nair Jul 22 '11 at 16:04 Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29730
Autocorrection with the wireless keyboard? Very interested in buying the Wireless keyboard... But does it allow the auto correction as does the iPad when I type on its keyboard. If I've chosen the French keyboard, it'll autocorrect my French mistakes. If I've chosen English, it'll autocorrect also, but in English. That's so amazing that I regret not to have it on my MBP when I happen to write on it... Thanx in advance. Back To Product Follow this Question No Answers have been submitted Be the first to answer this question.  Answer now Related Questions
global_05_local_5_shard_00000035_processed.jsonl/29731
can it work without the monthly fee.? For use outside United States PocketFinder GPS Vehicle Locator (Powered by LBT) PocketFinder GPS Vehicle Locator (Powered by LBT) Product No Longer Available 1 Answer from the Community • Answer The device cannot operate without a monthly service fee because it uses a cellular network to transmit the GPS way-points. Think of it like a mini cell-phone. However, unlike a cell phone, PocketFinder doesn't require a service contract, so you can keep the device de-activated and only turn on your account when you need to access the location information. You'll still be billed for the month of service, but you don't have to keep the device turned on all the time. PocketFinder does work outside of the US, but you'll need to notify customer service that you need international service. The fee for international service is higher than the standard monthly fee.
global_05_local_5_shard_00000035_processed.jsonl/29749
Take the 2-minute tour × I'm trying to export private keys from Keychains application and getting error. You failed to provide the necessary administrator authorization. Open keychains, in My Certificates - login found my keypair, right click on private one, Export as p12 on desktop, specify Fine password - error! share|improve this question Which steps are you following to export private keys? –  kiamlaluno Jun 22 '10 at 13:15 @kiamlaluno: updated. thx –  Pablo Jun 22 '10 at 13:56 3 Answers 3 up vote 1 down vote accepted I exported two private keys following the steps you reported, and I was able to export it both the times. From the reported error, it seems that you entered the wrong password when Keychain Access asked you the "login" keychain password. I entered the administrator password (the account I used in the test is an account that is allowed to administer my Mac), and I didn't get any error message. By a coincidence, I used the administrative password even when I was asked for a password the first time; I don't think that makes any difference. share|improve this answer I am not asked for administrator password, only for key encryption password. –  Pablo Jun 22 '10 at 23:23 The only case when I was not asked for the administration password is when I selected to always allow the exporting of a specific private key. I am not sure if there is a way to tell Mac to forget all the times you selected "always allow" to that dialog box; if I would know how to do it, I would suggest you to try that. –  kiamlaluno Jun 23 '10 at 1:18 @kiamlaluno: Thanks. The problem still actual, looking for solution. –  Pablo Jun 23 '10 at 1:44 @Michael: Did you try with different private keys? Do you see the dialog box asking for the "login" password? Did you try with a freshly installed certificate? Are you using an account that is allowed to administer your Mac? Did you change the password of your account, lately? –  kiamlaluno Jun 23 '10 at 2:00 @kiamlaluno: No I have just 1 private key so far. Dialog box is asking "Password for exporting the key". My account is administrative. It is freshly installed actually. The password is same for ages.. Anyway, I've found some temporary solution for now to export from terminal using security export .... Mistery. –  Pablo Jun 23 '10 at 2:11 I'm on Mac OS X 10.6 on a Mac Mini server. While exporting a private key, the error I get is: An error has occurred. Unable to export an item. You failed to provide the necessary administrator authorization. In order to export a private key out of the Keychain it is critical that you reboot the server and log in as root. • ID: root • Password: your administrator password Proceed to Keychain Access and select your Keychain (like "System") and unlock it using root and your administrator password. Now export as usual. share|improve this answer If that works, you could also start the keychain access application using sudo from the command line. but it didnt help for me. –  commonpike Oct 21 '14 at 16:37 I had the same, but something was totally messed up and I'm still not sure what caused it. For one thing, I had somewhere in the process clicked 'always allow' and entered the wrong password. It never asked me for a password afterwards, and kept insisting I failed. Miserably. Anyway, after I had clicked the lock to 'lock the login keychain' it suddenly started asking for the password again. Then it worked. share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29750
Take the 2-minute tour × Task at hand: Microsoft sign drivers on Win 7. I microsoft signed my driver package 3 times every time thinking I might have missed a step or something. However, I cannot seem to get rid of the Windows Security error message "Windows can't verify the publisher of this driver software'. This is not the first time I have signed the driver packages. I was successfully able to sign other driver packages a few months ago. However, with this driver package I keep getting Windows security dialog box. Here's the procedure I follow - 1. Create a new cat file using INF2CAT tool. 2. Self sign the driver using a Versign Class 3 Public Primary Certification Authority - G5.cer. 3. Run the microsoft tests on DTM Servers and clients with the devices that use this driver. 4. Create WLK submission package. 5. Self sign the cab file. 6. Submit the package for certification. The catalog file that comes back after successfully passing tests says Name of signer "Microsoft Windows Hardware Comptibility Publisher". When I check the validity of signature using SignTool, it says the signature is vaild. However, when I try to install the driver with new signed catalog file the windows complain. Any ideas? share|improve this question migrated from stackoverflow.com Nov 10 '12 at 21:16 This question came from our site for professional and enthusiast programmers. Haven't you forgotten to include the cross-certificate? Common mistake ... –  Eugene Mayevski 'EldoS Corp Nov 9 '12 at 21:16 Thanks for the reply. How do I do that? –  Priyanka Gupta Nov 9 '12 at 22:04 Hmm, you said you did signing before? There's a parameter in signtool that lets you specify the cross-certificate. See msdn.microsoft.com/en-us/library/windows/hardware/gg487315.aspx –  Eugene Mayevski 'EldoS Corp Nov 10 '12 at 7:31 1 Answer 1 Thanks for the help, Eugene. Yes. I did sign two other driver packages before. One of them was modified version of WinUSB driver. I am using the same certificate I used when I signed those two driver packages a few months ago. It costs $250 per signing from Microsoft. I would think that Microsoft would complain about it during certification if the certificate is wrong. I use the following command to self sign the CAT file. I don't have to specify the ceritificate name as there's only one certificate in the directory - Signtool sign /v /a /n CompanyName /t http://timestamp.verisign.com/scripts/timestamp.dll OurCatalogFile.cat Below is the result from running Verify command on the Microsoft signed OutCatalogFile.cat C:\Program Files\Microsoft SDKs\Windows\v7.1\Bin\x64>signtool verify /v "C:\User s\logotest\Documents\serialdriversigning\OurCatalogFile.cat" Verifying: C:\Users\logotest\Documents\serialdriversigning\OurCatalogFile.cat" Hash of file (sha1): BDDF39B1DD95881B462164129758A7FFD54F47D9 Signing Certificate Chain: Issued to: Microsoft Root Certificate Authority Issued by: Microsoft Root Certificate Authority Expires: Sun May 09 18:28:13 2021 SHA1 hash: CDD4EEAE6000AC7F40C3802C171E30148030C072 Issued to: Microsoft Windows Hardware Compatibility PCA Issued by: Microsoft Root Certificate Authority Expires: Thu Jun 04 16:15:46 2020 SHA1 hash: 8D42419D8B21E5CF9C3204D0060B19312B96EB78 Issued to: Microsoft Windows Hardware Compatibility Publisher Issued by: Microsoft Windows Hardware Compatibility PCA Expires: Wed Sep 18 18:20:55 2013 SHA1 hash: D94345C032D23404231DD3902F22AB1C2100341E The signature is timestamped: Tue Nov 06 11:26:48 2012 Timestamp Verified by: Issued to: Microsoft Root Authority Issued by: Microsoft Root Authority Expires: Thu Dec 31 02:00:00 2020 SHA1 hash: A43489159A520F0D93D032CCAF37E7FE20A8B419 Issued to: Microsoft Timestamping PCA Issued by: Microsoft Root Authority Expires: Sun Sep 15 02:00:00 2019 SHA1 hash: 3EA99A60058275E0ED83B892A909449F8C33B245 Issued to: Microsoft Time-Stamp Service Issued by: Microsoft Timestamping PCA Expires: Tue Apr 09 16:53:56 2013 SHA1 hash: 1895C2C907E0D7E5C0292B92C6EA8D0E236F525E Successfully verified: C:\Users\logotest\Documents\serialdriversigning\OurCatalogFile.cat" Number of files successfully Verified: 1 Number of warnings: 0 Number of errors: 0 Thank you! One of the files in my package was getting modified when I made the package. I replaced it with the one I used during signing the drivers and I got no error message. I found the following document useful - Digital Signatures For Windows® Drivers from Scott M. Johnson Program Manager Windows Hardware Quality Labs Microsoft Corporation share|improve this answer Your Answer
global_05_local_5_shard_00000035_processed.jsonl/29770
View Single Post Old February 2, 2013, 12:38 AM   #14 Senior Member Join Date: October 13, 2009 Location: nw wyoming Posts: 975 I hollow point lots of them almost the same way myself. Except I use the trimmer. Great results and its amazing how much they expand with just an 1/8" hole. Theres only one way to find out. Hillbilly, if it was me, I would try one if for no better reason than just for the sake of knowing. I dont see why it wouldnt work. If you wanted you could even drill an 1/8" dia by 1/4" deep and try it out for expansion. I've even used a counter sink bit to cone the end of the hole in the nose. Makes a BIG hole. Just a thought, but dont sand it down while its loaded. It would probly get hot. reloader28 is offline   Page generated in 0.05652 seconds with 7 queries
global_05_local_5_shard_00000035_processed.jsonl/29779
Killeen Odd Man Out in Goal for Wheeling January 24, 2013 WHEELING - With what amounts to three healthy No. 1 goaltenders, it was only a matter of time before one became the odd man out in Wheeling. That turned out to be Patrick Killeen, who was in the midst of his third season with the Nailers. I am looking for:
global_05_local_5_shard_00000035_processed.jsonl/29784
The God Dilemma This was from a question off Opinionaided. Probably one of the more deeper conversations I've had over there. This is an example of some of my feelings regarding religion and my experience growing up with it. I edited the grammar to make a bit easier to read for your eyes. Question: My mind can't get past the idea that science is behind our existence, but my heart is of the God fearing kind. Does anyone else have this dilemma? Me: I used to feel the same way when I was younger. Not to sound too negative, but if you see all these troubles around the world and throughout history with violence and hatred spreading about.. where's the judgment and punishing? I don't see a supernatural force doing anything. I basically see people hurting and killing each other. I don't see a god's judgment. BT: I, on the other hand, see the little acts of kindness, sharing, love, and generosity. I try not to read or watch much news because the media focuses too much on the negative (murders and parents hurting their children). I show too much empathy. Those heinous acts really mess me up emotionally. If I had a wish, it would be that I could save the day and help them like a superhero. However, I have hope that with 7 billion people on earth, the good will not only even out the bad, but overcome it. Then I wonder if we didn't have the idea of God, what would keep everyone from killing each other? With no moral code of some sort, would we turn into monsters? Me: I am definitely for peace and forgiveness. I just wished the world didn't rely too much on violence to get things done. I'm sure that there are better and more efficient ways to handle conflicts without bloodshed. I wished that there was something there (almost supernatural) that maintained some sort of order in everyone, but I just don't see it in reality. It's like me, as a toddler, hoping for Santa to leave presents, but in the end it was my parents tricking me. What I learned throughout my 12+ years born into a religious school was that supposedly, the image of god is in everyone and we should all strive to become like Jesus. Pardon my pessimism though, but I hardly experienced anybody acting like Jesus in high school. I, being the least religious ideally, was one of the more religious morally. I just had to ramble because there's a lot of people like that who abuse their faith and ignore it without being completely honest about how they truly feel about it. BT: I completely agree! I've never been the pessimistic kind, but I understand and empathize with those who are. Then again, I pretty much empathize with anyone.. Except baby killers. Those kinds of people unleash so much rage inside of me that it could set the world ablaze! Thanks, Breezy T!
global_05_local_5_shard_00000035_processed.jsonl/29790
Tolkien Gateway Revision as of 02:08, 28 April 2006 by Ebakunin (Talk | contribs) Amilessë, Quenya for mother-name, is one of the three names given to Eldar in Valinor. An amilessë, given at or near birth, was quite significant because Elven mothers had insight into the characters and abilities of their children, and many also had the gift of prophetic foresight. For example Fëanáro (spirit of fire) was the amilessë of Fëanor. Also called Essi Apacenyo (names of foresight). A mother-name is a private name to an elf and is used only by close friends. See Also
global_05_local_5_shard_00000035_processed.jsonl/29791
Tolkien Gateway Revision as of 14:22, 28 January 2010 by Gilgamesh (Talk | contribs) The Moriquendi (the Elves of Darkness, singular Moriquende) are, in essence, the Elves that did not join the Great Journey over the sea and behold the light of the Two Trees of Valinor. They lingered on the shores of Middle-earth or never passed the Blue Mountains and remained in the East. Those Moriquendi who originally started on the journey but for some reason did not finish it are known as the Úmanyar ("Those not of Aman"). It is a term for Avari, Sindar, and Nandor, but in practice is only applied to the Avari. An exception to the hiarachy of Elvish peoples is King Thingol, who, though he did not complete the journey, had earlier been to Valinor. Thingol was therefore considered Úmanya but not Moriquende. The term "Dark Elf" seems to hold an additional special (not explained) meaning, as it is given as a special title of Eöl of Nan Elmoth. It is also used as an insult by the Sons of Fëanor to King Thingol (which is incorrect, since Thingol alone of the Sindar was reckoned under the Calaquendi). In later versions of the Legendarian, Eöl was made a Tatyarin Avari, making him a proper Dark Elf.
global_05_local_5_shard_00000035_processed.jsonl/29792
Tolkien Gateway Old Guesthouse Revision as of 14:10, 15 July 2011 by KingAragorn (Talk | contribs) The Old Guesthouse was an inn in Minas Tirith. It was located on the first tier, on Lampwrights' Street. During the War of the Ring, Pippin met Bergil here. The inn's fate is not known, but it could have been destroyed in the Siege of Minas Tirith. It was surrounded on three sides by a lawn, and the fourth was open, leading out to the street.[1] The Old Guesthouse was known as Sennas Iaur in Sindarin.[2] 2. J.R.R. Tolkien, Nancy Smith, "Index questions". Quoted in Wayne G. Hammond, Christina Scull (2008), The Lord of the Rings: A Reader's Companion, p. 523.
global_05_local_5_shard_00000035_processed.jsonl/29798
Shiite Muslims Scott Nelson/World Picture Network, for The New York Times Shiite Muslims are members of the second largest denomination of Islam, after the Sunnis. They make up only 15 percent of Muslims, but they dominate in Iran, Iraq Azerbaijan and Bahrain, and have a plurality in Lebanon and Yemen. The groups within Islam first diverged after the Prophet Muhammad died in 632, and his followers could not agree on whether to choose bloodline successors or leaders most likely to follow the tenets of the faith. The group now known as Sunnis chose Abu Bakr, the prophet’s adviser, to become the first successor, or caliph, to lead the Muslim state. Shiites favored Ali, Muhammad’s cousin and son-in-law. Ali and his successors are called imams, who not only lead the Shiites but are considered to be descendants of Muhammad. After the 11th imam died in 874, and his young son was said to have disappeared from the funeral, Shiites in particular came to see the child as a Messiah who had been hidden from the public by God. The largest sect of Shiites, known as “twelvers,’’ have been preparing for his return ever since. Violence between the sects began in 656, when the third caliph, revered by the Sunnis, was killed. Soon after, the Sunnis killed Ali’s son Husain. Sunnis emerged victorious over the Shiites and came to revere the caliphate for its strength and piety. Shiites, by contrast, continued to revere their imams and focus on developing their religious beliefs through them. In 931 the Twelfth Imam disappeared. This was a turning point in the history of Shi’ism. As R. Scott Appleby, a professor of history at the University of Notre Dame, explained: “Shiite Muslims, who are concentrated in Iran, Iraq, and Lebanon, [believe they] had suffered the loss of divinely guided political leadership” at the time of the Imam’s disappearance. Not “until the ascendancy of Ayatollah Ruhollah Khomeini in 1978” in Iran did Shiites recognize the authority of a legitimate religious figure. Besides the “twelver” branch, which is the most significant, there are two other branches in Shi’ism: the Ismaili and Zaidi, who dispute the twelver beliefs. Shiites share fundamental theological beliefs with the Sunnis. They both agree on the five pillars of Islam: 1. the statement of faith that there is no God but God and Mohammed is his messenger; 2. the salah — the requirement to pray five times daily; 3. acceptance of a voluntary religious tax paid directly to the poor; 4. fasting for the entire month of Ramadan, unless physically impossible; 5. performing a pilgrimage to Mecca — the haj — at least once in a lifetime if financially and physically able. Many Shiites, in addition, make pilgrimages to the holy sites of Najaf, Kerbala, Samarra, and Kazimayn, “the holy thresholds” in Iraq. --Adapted from "Refresher Course:...Telling Sunni from Shiite," by Damien Cave, Week in Review, The New York Times, Dec. 17, 2006. Explosion Near Shiite Mosque Kills 4 in Eastern Saudi Arabia May 30, 2015, Saturday Sunnis Fleeing ISIS Find Few Doors Open Elsewhere in Iraq May 28, 2015, Thursday Iraqi Army and Shiite Militias Begin Push to Take Ramadi From ISIS May 27, 2015, Wednesday ‘Defending the Faith’ in the Middle East Today’s Sunni-Shiite proxy wars are not new. May 24, 2015, Sunday ISIS Claims Responsibility for Bombing at Saudi Mosque May 23, 2015, Saturday Fall of Ramadi to ISIS Weakens Rule of Iraqi Premier May 19, 2015, Tuesday After Wresting Tikrit From ISIS, Iraqis Face Sectarian and Tribal Tensions Iraq must stabilize the Sunni-dominated area without recreating the sectarian tensions that helped the Islamic State seize it in the first place. May 10, 2015, Sunday Scene of Iraqi Massacre Becomes Shiite Pilgrimage Site May 7, 2015, Thursday Proposal to Arm Sunnis Adds to Iraqi Suspicions of the U.S. May 1, 2015, Friday Iran Won't Give Up on Its Revolution April 27, 2015, Monday Rss Feeds On Shiite Muslims
global_05_local_5_shard_00000035_processed.jsonl/29803
John Leo In the wake of the London bombings, New York City is now searching the bags of subway riders. As you might expect, this is provoking the usual cluster of perverse reactions. Someone on Air America, the liberal talk radio network, suggested that riders carry many bags to confuse and irritate the cops. Mayor Michael Bloomberg, normally a sane fellow, has ordered that the searches be entirely random, to avoid singling out any one ethnic or religious group. So if someone fits the suicide bomber profile—young Muslim male, short hair, recently shaved beard or mustache, smelling of flower water (a preparation for entering paradise)—the police must look away and search the nun or the Boy Scout behind him. What’s the point of stopping a terrorist if you have to trample political correctness to do it? Besides, the New York Civil Liberties Union opposes all bag searches. No surprise there. The national American Civil Liberties Union still opposes passenger screening at airports. In a speech at the Brookings Institution, historian Fred Siegel said that the Democrats, pegged as the party of criminals’ rights, are in danger of becoming the party of terrorists’ rights. From the first moments after the attacks of 9/11, we had indicators that the left would not be able to take terrorism seriously. Instead of resolve, we got concern about emotional closure and “root causes,” warnings about the allegedly great danger of a backlash against Muslim Americans, arguments that violence directed at America is our own fault, and suggestions that we must not use force, because violence never solves anything. “We can’t bomb our way to justice,” said Ralph Nader. The denial of the peril facing America remains a staple of the left. We still hear that the terrorism is a scattered and minor threat that should be dealt with as a criminal justice matter. In Britain last October, the BBC, a perennial leader in foolish leftism, delivered a three-part tv series arguing that terrorism is vastly exaggerated. Al Qaeda barely exists at all, the series argued, except as an idea that uses religious violence to achieve its ends. Besides, the series said, a dirty bomb would not kill many people and may not even kill anyone. This ho-hum approach isn’t rare. Though evidence shows that the terrorists are interested in acquiring nuclear weapons to use against our cities, a learned writer for the New York Review of Books insists that the real weapons of mass destruction are world poverty and environmental abuse. Of course, world poverty is rarely mentioned by terrorists, and those known to be involved have almost all been well fed and are well to do. The “our fault” argument seems permanently entrenched. After the London bombings, Norman Geras of the University of Manchester wrote in the Guardian that the root causes and blame-Blair outbursts were “spreading like an infestation across the pages of this newspaper . . . there are, among us, apologists for what the killers do.” That has been the case on both sides of the Atlantic. After 9/11, Michael Walzer, one of the most powerful voices on the left, warned about “the politics of ideological apology” for terrorism. In the June 2005 issue of the American Prospect, he returned to the theme. “Is anybody still excusing terrorism?” he asked. “The answer is yes: Secret sympathy, even fascination with violence among men and women who think of themselves as ‘militants,’ is a disease, and recovery is slow.” Though the argument has shifted somewhat, he wrote, the problem is “how to make people feel that the liberal left is interested in their security and capable of acting effectively. We won’t win an election until we address this.” Walzer’s analysis is a strong one. The Bush administration has botched many things, but large numbers of Americans go along with the president because he displays what the left apparently cannot: moral clarity and seriousness about what must be done. When the ideas of the left come into view, the themes often include the closing of Guantánamo, attacks on the Patriot Act, opposition to military recruitment on campuses, casual mockery of patriotism (a whole art exhibit in Baltimore was devoted to the theme), and a failure to admit that defeating terrorism will require some trade-offs between security and civil liberties. Is this a serious program? Real security, Walzer says, will depend on hunting down terrorist cells, cutting off the flow of money, and improving surveillance at key sites. He writes: “The burden is on us—nobody else—to make the case that these things can be done effectively by liberals and leftists who will also, in contrast to today’s Republicans, defend the civil liberties of American citizens.” Good argument. How will the left respond? John Leo
global_05_local_5_shard_00000035_processed.jsonl/29813
View Single Post Old 03-26-2010, 02:47 PM   #41 Hall Of Fame Join Date: Jul 2008 Posts: 2,285 By the way, the reason your spin has improved is because low tensions allow the strings to slingshot the ball, because the mains move more freely with polys at low tension. But the stiffness of the poly allows you to string lower than a synthetic gut and still maintain reasonable control. I'd try stringing the mains four or five pounds higher than the crosses to see what happens. Nanshiki is offline   Reply With Quote
global_05_local_5_shard_00000035_processed.jsonl/29818
Awesome: Rokudenashi Blues Inexact title. See the list below. We don't have an article named Awesome/RokudenashiBlues, exactly. We do have: If you meant one of those, just click and go. If you want to start a Awesome/RokudenashiBlues page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those.
global_05_local_5_shard_00000035_processed.jsonl/29819
Funny: Exposure Inexact title. See the list below. We don't have an article named Funny/Exposure, exactly. We do have: If you meant one of those, just click and go. If you want to start a Funny/Exposure page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those.
global_05_local_5_shard_00000035_processed.jsonl/29832
You are here Member since September 2013 Cashew soft cheese What you need:  3 tsp of non dairy yogurt 1L of non dairy milk 1 cup of cashews Lemon juice Garlic powder 1 Tsp of nutritional yeast What you do:  First thing ... making the cashew yogurt. For this, you'll need to warm up the milk in a pot When it's hot, but not boiling (test it in your wrist) add the yogurt and let it cook for a couple minutes (bacteria working) Pour the liquid yogurt into glass jars and let it 'rest' for 8-10h in a warm and dark place. If you have a portable fridge place them in together with a jar full of really hot water and close.  Finish off the yogurt by leaving it in the fridge to harden.  I used two pots of yogurt to make the cheese. Basically you mix it with a bit of lemon juice, salt, garlic powder and nutrional yeast.  Pour into cheesecloth or cotton cloth and hang it to make the soft cheese (loose some liquid).  Let it hanged for 24h and that's it.  I added some mixed herbs too after spreading it in my toasts  Be the first to add a comment. Log in or register to post comments
global_05_local_5_shard_00000035_processed.jsonl/29835
Vexen Crabtree's Live Journal Previous Entry Share Next Entry Existence of an omniscient or omnipotent God denies Humans free will "The Existence of God Contradicts Free Will" by Vexen Crabtree (2002) You interest me... It's been a long while since I found any sort of intellectual to reason with. 2008-05-29 06:47 am (UTC) I do like some of your argumentation. I greatly respect (and here I am speaking of vexen, and not many of the people posting comments), that you have given more than a fleeting moment to posit and logically construct your arguments. I won't do you the discourtesy of advancing my thoughts on the matter of freewill (such as they are) without first giving more careful consideration to what you've put forth. I will however leave this simple thought. The more complex/grandiose an issue is, the fewer options there are to solve it. In the case of God, we are only left with two options. 1) God 2) No God What I suggest to you is that we all are basing are arguments about God/god(s)/"god" on our presupposed option (Either 1 or 2). I think we do ourselves a disservice when we look at an issue in this way. So, while I won't bother you with my specifics on freewill (at least until I understand more fully your own), I will say that "The Existence of God Contradicts Free Will," only if God doesn't in fact exist. You are viewing vexen
global_05_local_5_shard_00000035_processed.jsonl/29841
Advice From an Analyst Posted on May 03, 2012 by Tiffany I am moving on from Van West Media into new unmarked territories of digital marketing life. After an entire year of writing content, I’ve decided to give up writing to work in web analytics. As a co … Continue reading →
global_05_local_5_shard_00000035_processed.jsonl/29846
No Time To Be Bashful | WAMU 88.5 - American University Radio Filed Under: No Time To Be Bashful Play associated audio This week we have a celebrity edition of the Puzzle. Comedian Paula Poundstone is taking on our challenge. Poundstone is also a regular panelist on NPR's Wait Wait Don't Tell Me. On-air challenge: You're given discrete categories. If you were to list all of the things in the category alphabetically, the one you're given would be second in the list. Name the thing that would be first alphabetically. For example, if you're given "Doc," you would say, "Bashful," because Doc is the second of the seven dwarves alphabetically, and Bashful is the first. Next week's challenge (Please note this is the second week of this two-week challenge): Take a seven-by-seven square grid. Arrange the names of U.S. cities or towns in regular crossword fashion inside the grid so that the cities used have the highest possible total population, according to the 2010 Census. For example, if you put Chicago in the top row and Houston in the sixth row, both reading across, and then fit Atlanta, Oakland and Reno coming down, you'll form a mini-crossword. And the five cities used have a total population, according to the 2010 Census, of 5,830,997. You can do better. Submit Your Answer Copyright 2013 NPR. To see more, visit Drought May Cost California's Farmers Almost $3 Billion In 2015 Introducing The First Non-Medical Intern's Union In The U.S. Detroit Hopes To Drive Tech Startups Away From Silicon Valley Leave a Comment
global_05_local_5_shard_00000035_processed.jsonl/29864
Jump to: navigation, search Planet Eclipse Revision as of 05:22, 18 October 2006 by Gunnar.wagenknecht.org (Talk | contribs) Generally, administration is done on a volunteer basis by the PlanetEclipseAdmins. All requests, such as adding a feed, updating a feed, adding an image or removing a feed should be handled through Bugzilla. • Is the feed written by a real person? • Is the person an Eclipse committer, hacker or contributor? • Does the feed promote a company or a commercial product?
global_05_local_5_shard_00000035_processed.jsonl/29874
Dead zone Redirected from Deadzone 102,769pages on this wiki The dead zone references the distance in which a player cannot do any useful action against a mob. Generally this term is used by Hunters and Warriors to refer to the distance over 5 yards and less than 8 yards away from them. At 5 yards and less, a player can engage in melee combat. At 8 yards and more, a player can engage in ranged combat. • Between these two distances, a Hunter finds nearly all of his (or her) options unavailable other than Scatter Shot, Volley, and using their pet. This is no longer true after Patch 2.3. See below. This dead zone can be exploited by mobs with rooting abilities. The mob can root the player and stay in the dead zone untouched during the duration of the root. Patch 2.3 Edit In Patch 2.3 the hunter dead zone was effectively removed. Kalgan on Fri, 12 Oct 2007 02:19:53 PM PDT We're planning to shrink the min range on ranged attacks to reduce or eliminate the "dead zone". The only point to the dead zone was to ensure the min range on ranged weapons was enough such that ranged weapon attacks wouldn't be used while also being melee'd (at least by mobs... players have a bit of slush built in). Around Wikia's network Random Wiki
global_05_local_5_shard_00000035_processed.jsonl/29893
Points: 5 Cover Story: It Came From Outer Space! How Mega Man became a mover and shaker. continued, (page 2 of 3) I, Rockman Mega Man's long career built momentum. His first of many sequels, Mega Man 2, proved the little robot was a hardy and thoroughly awesome companion for NES players. Although his first title hadn't looked or sounded bad, Mega Man 2 remains one of the most memorable titles in the series thanks to its distinctive aesthetics and finely balanced gameplay. Detailed backgrounds give each stage its own character: The lair of the savage robot Metal Man is a clockwork of gears, and the domain of the time-altering robot Flash Man is ... well, flashy. Neverending Story: Engage Giant enemy sprites make for unforgettable encounters (the initial appearance of the Dragon boss briefly stopped many a young heart). There are eight stages to choose from at the game's start instead of a mere six and one of the Robot Masters is a giant Zippo lighter, which is awesome in its political incorrectness. Mega Man 2 is literally a labor of love. Inafune enjoyed working on the original Rockman, but the game hadn't met with blockbuster sales and Capcom had more profitable ventures in mind. Inafune was given the green light to work on a sequel if he wanted to, but only on the condition that he did so around other projects. The end product is a game that consistently remains near the top of retro NES bloggers' never-ending "Best Ever" lists. Both series' fanatical veterans and casual players who dabbled with few Mega Man titles beyond the NES series remember the game with equal fondness. Mega Man looked and sounded prettier as his sequels stacked up, but the improved visuals and music don't contain the same memories for many people as the rapid, heart-stirring battle ballad that accompanies the warrior through the first stage of Doctor Wily's fortress. A hero needs a dog. Just because. Mega Man 2 also corrects the often unfair gameplay of the first title. The much-hated "disappearing-reappearing" blocks make a return, often as the only bridge across a deadly pool of lava. But players can choose to bypass the headache using items tailored for easier navigation, such as a jet sled or hovering platforms. Quick Man's stage is thick with beams that shoot from the walls and mean instant death, but Flash Man's Time Stopper weapon delivers what it promises and lets the player choose between artful dodging or chickening out. Energy Tanks also let Mega Man fill up on energy when he's low. And when it was time to surrender the television to Aunt Margaret's soap operas, the new password system allowed players to resume the game at a later time. If Mega Man 2 was an apex, Mega Man 3 was a plateau. The visuals were still great and some of the stage themes were original, such as fighting on some robotic serpent's seemingly never-ending coils for Snake Man's stage. It was also the first Mega Man title to introduce a story beyond "boy robot saves the world from evil scientist in denim." The game begins with a ruse about Dr. Wily turning to the side of good and ends with an appearance by Mega Man's long-lost brother Proto Man. Rush, the Swiss Army robot dog, also debuted as a charismatic replacement for Mega Man 2's items.  < prev  1  |  2  |  3  |  next > See Also • E-mail it • 60 Please Recommend 1UP on Facebook Comments (0) Title Of Comment Maximum characters for title is 120 Related Games Around the Network IGN Entertainment Games
global_05_local_5_shard_00000035_processed.jsonl/29940
Experience with OS Reliability Testing on the Exemplar System How we built the CHO test from recycled materials Member Submitted In this paper I will discuss the development and use of the Continuous Hours of Operation (CHO) test which was developed for the Convex Division of Hewlett-Packard. My goal is to help readers with the practical aspects of developing a load test which can be used to help gauge and improve the reliability of a software system. I will briefly mention how we were unable to make much use of currently available software reliability frameworks, partially because of their deficiencies, and partially because of our inadequate knowledge of them. I knew enough about the theories to know that we did not have enough data to calculate a Mean Time to Failure metric; however, we were still successful in improving the reliability of our product and using the results of the CHO test as a release criterion. About the author AgileConnection is one of the growing communities of the TechWell network.
global_05_local_5_shard_00000035_processed.jsonl/29988
Stories by Zack Beauchamp subscribe to Zack Beauchamp's feed Posted on: Mar 2, 2014, Source: Think Progress The Ukrainian situation is as a matter of upholding international law and mitigating humanitarian risks. Posted on: Jun 26, 2013, Source: Think Progress Didn't take long for the right-wing loonies to pipe up. Posted on: Jun 10, 2013, Source: Think Progress Posted on: May 24, 2013, Source: ThinkProgress The senator suggested these measures constituted capitulation to terrorists. Posted on: May 22, 2013, Source: Think Progress How Jason Richwine finally found a place to explore his absurd theories linking IQ to race at the elite university. Posted on: Mar 31, 2013, Source: ThinkProgress Every student who majors in economics and finance gets a copy of Ayn Rand’s novel. Posted on: Feb 4, 2013, Source: Think Progress How the Republican Party incentivizes the replacement of real policy thinking with fact-free paranoic fantasism. Posted on: Jan 28, 2013, Source: Think Progress David French interprets the Christian Bible as granting everyone a right to self-defense. He suggests that this means that God’s will is that people have access to guns. Posted on: Dec 14, 2012, Source: Think Progress Sadly, it's time for another refresher. Posted on: Oct 3, 2012, Source: Think Progress Truly outrageous standard. Posted on: Sep 19, 2012, Source: Think Progress Some of the worst problems (in terms of the harm they cause to people’s lives) in the United States and the world are not being addressed.  Posted on: Sep 4, 2012, Source: ThinkProgress Posted on: Aug 17, 2012, Source: Think Progress Posted on: Jul 16, 2012, Source: ThinkProgress
global_05_local_5_shard_00000035_processed.jsonl/29997
Saint Joan et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus • Tous les prix incluent la TVA. Expédié et vendu par Amazon. Emballage cadeau disponible. Quantité :1 Saint Joan a été ajouté à votre Panier + EUR 2,99 (livraison) D'occasion: Très bon | Détails Vendu par -betterworldbooks- État: D'occasion: Très bon Vous l'avez déjà ? Repliez vers l'arrière Repliez vers l'avant En savoir plus Voir cette image Saint Joan (Anglais) Broché – 24 novembre 2011 Voir les 75 formats et éditions Masquer les autres formats et éditions Prix Amazon Neuf à partir de Occasion à partir de Format Kindle "Veuillez réessayer" "Veuillez réessayer" EUR 0,93 "Veuillez réessayer" EUR 7,84 EUR 5,22 EUR 0,01 "Veuillez réessayer" EUR 5,50 "Veuillez réessayer" EUR 1,77 "Veuillez réessayer" EUR 3,96 "Veuillez réessayer" EUR 17,65 Produits fréquemment achetés ensemble Saint Joan + Regeneration Prix pour les deux : EUR 17,11 Acheter les articles sélectionnés ensemble Descriptions du produit A fine spring morning on the river Meuse, between Lorraine and Champagne, in the year 1429 A.D., in the castle of Vaucouleurs. Captain Robert de Baudricourt, a military squire, handsome and physically energetic, but with no will of his own, is disguising that defect in his usual fashion by storming terribly at his steward, a trodden worm, scanty of flesh, scanty of hair, who might be any age from 18 to 55, being the sort of man whom age cannot wither because he has never bloomed. The two are in a sunny stone chamber on the first floor of the castle. At a plain strong oak table, seated in chair to match, the captain presents his left profile. The steward stands facing him at the other side of the table, if so deprecatory a stance as his can be called standing. The mullioned thirteenth-century window is open behind him. Near it in the corner is a turret with a narrow arched doorway leading to a winding stair which descends to the courtyard. There is a stout fourlegged stool under the table, and a wooden chest under the window. ROBERT. No eggs! No eggs!! Thousand thunders, man, what do you mean by no eggs? STEWARD. Sir: it is not my fault. It is the act of God. ROBERT. Blasphemy. You tell me there are no eggs; and you blame your Maker for it. STEWARD. Sir: what can I do? I cannot lay eggs. ROBERT [sarcastic] Ha! you jest about it. STEWARD. No, sir, God knows. We all have to go without eggs just as you have, sir. The hens will not lay. ROBERT. Indeed! [Rising] Now listen to me, you. STEWARD [humbly] Yes, sir. ROBERT. What am I? STEWARD. What are you, sir? ROBERT [coming at him] Yes: what am I? Am I Robert, squire of Baudricourt and captain of this castle of Vaucouleurs; or am I a cowboy? STEWARD. Oh, sir, you know you are a greater man here than the king himself. ROBERT. Precisely. And now, do you know what you are? STEWARD. I am nobody, sir, except that I have the honor to be your steward. ROBERT [driving him to the wall, adjective by adjective] You have not only the honor of being my steward, but the privilege of being the worst, most incompetent, drivelling snivelling jibbering jabbering idiot of a steward in France. [He strides back to the table]. STEWARD [cowering on the chest] Yes, sir: to a great man like you I must seem like that. ROBERT [turning] My fault, I suppose. Eh? STEWARD [coming to him deprecatingly] Oh, sir: you always give my most innocent words such a turn! ROBERT. I will give you neck a turn if you dare tell me, when I ask you how many eggs there are, that you cannot lay any. STEWARD [protesting] Oh sir, oh sir - ROBERT. No: not oh sir, or sir, but no sir. My three Barbary hens and the black are the best layers in Champagne. And you come and tell me that there are no eggs! Who stole them? Tell me that, before I kick you out through the castle gate for a liar and a seller of my goods to thieves. The milk was short yesterday, too: do not forget that. STEWARD [desperate] I know, sir. I know only too well. There is no milk: there are no eggs: tomorrow there will be nothing. ROBERT. Nothing! You will steal the lot: eh? STEWARD. No, sir: nobody will steal anything. But there is a spell on us: we are bewitched. ROBERT. That story is not good enough for me. Robert de Baudricourt burns witches and hangs thieves. Go. Bring me four dozen eggs and two gallons of milk here in this room before noon, or Heaven have mercy on your bones! I will teach you to make a fool of me. [He resumes h is seat with an air of finality]. STEWARD. Sir: I tell you there are no eggs. There will be none - not if you were to kill me for it - as long as The Maid is at the door. ROBERT. The Maid! What maid? What are you talking about? STEWARD. The girl from Lorraine, sir. From Domrémy. ROBERT [rising in fearful wrath] Thirty thousand thunders! Fifty thousand devils! Do you mean to say that that girl, who had the impudence to ask to see me two days ago, and whom I told you to send back to her father with my orders that he was to give her a good hiding, is here still? STEWARD. I have told her to go, sir. She won't. ROBERT. I did not tell you to tell her to go: I told you to throw her out. You have fifty men-at-arms and a dozen lumps of able-bodied servants to carry out my orders. Are they afraid of her? STEWARD. She is so positive, sir. ROBERT [seizing him by the scruff of the neck] Positive! Now see here. I am going to throw you downstairs. STEWARD. No, sir. Please. ROBERT. Well, stop me by being positive. It's quite easy: any slut of a girl can do it. STEWARD. [hanging limp in his hands] Sir, sir: you cannot get rid of her by throwing me out. [Robert has to let him drop. He squats on his knees on the floor, contemplating his master resignedly]. You see, sir, you are much more positive than I am. But so is she. ROBERT. I am stronger than you are, you fool. STEWARD. No, sir: it isn't that: it's your strong character, sir. She is weaker than we are: she is only a slip of a girl; but we cannot make her go. ROBERT. You parcel of curs: you are afraid of her. STEWARD [rising cautiously] No sir: we are afraid of you; but she puts courage into us. She really doesn't seem to be afraid of anything. Perhaps you could frighten her, sir. ROBERT [grimly] Perhaps. Where is she now? STEWARD. Down in the courtyard, sir, talking to the soldiers as usual. She is always talking to the soldiers except when she is praying. ROBERT. Praying! Ha! You believe she prays, you idiot. I know the sort of girl that is always talking to soldiers. She shall talk to me a bit. [He goes to the window and shouts fiercely through it] Hallo, you there! A GIRL'S VOICE [bright, strong, and rough] Is it me, sir? ROBERT. Yes, you. THE VOICE. Be you captain? ROBERT. Yes, damn your impudence, I be captain. Come up here. [To the soldiers in the yard] Show her the way, you. And shove her along quick. [He leaves the window, and returns to his place at the table, where he sits magisterially]. STEWARD [whispering] She wants to go and be a soldier herself. She wants you to give her soldier's clothes. Armor, sir! And a sword! Actually! [He steals behind Robert]. Joan appears in the turret doorway. She is an able bodied country girl of 17 or 18, respectably dressed in red, with an uncommon face; eyes very wide apart and bulging as they often do in very imaginative people, a long well-shaped nose with wide nostrils, a short upper lip, resolute but full-lipped mouth, and handsome fighting chin. She comes eagerly to the table, delighted at having penetrated to Baudricourt's presence at last, and full of hope as to the result. His scowl does not check or frighten her in the least. Her voice is normally a hearty coaxing voice, very confident, very appealing, very hard to resist.JOAN [bobbing a curtsey] Good morning, captain squire. Captain: you are to give me a horse and armour and some soldiers, and send me to the Dauphin. Those are you orders from my Lord. ROBERT [outraged] Orders from your lord! And who the devil may your lord be? Go back to him, and tell him that I am neither duke nor peer at his orders: I am squire of Baudricourt; and I take no orders except from the king. JOAN [reassuringly] Yes, squire: that is all right. My Lord is the King of Heaven. ROBERT. Why, the girl's mad. [To the steward] Why didn't you tell me so, you blockhead? STEWARD. Sir: do not anger her: give her what she wants. JOAN [impatient, but friendly] They all say I am mad until I talk to them, squire. But you see that it is the will of God that you are to do what He has put into my mind. ROBERT. It is the will of God that I shall send you back to your father with orders to put you under lock and key and thrash the madness out of you. What have you to say to that? JOAN. You think you will, squire; but you will find it all coming quite different. You said you would not see me; but here I am. STEWARD [appealing] Yes, sir. You see, sir. ROBERT. Hold your tongue, you.STEWARD [abjectly] Yes, sir. ROBERT [to Joan, with a sour loss of confidence] So you are presuming on my seeing you, are you? JOAN [sweetly] Yes, squire. ROBERT [feeling that he has lost ground, brings down his two fists squarely on the table, and inflates his chest imposingly to cure the unwelcome and only too familiar sensation] Now listen to me. I am going to assert myself. JOAN [busily] Please do, squire. The horse will cost sixteen francs. It is a good deal of money: but I can save it on the armor. I can find a soldier's armor that will fit me well enough; I am very hardy; and I do not need beautiful armor made to my measure like you wear. I shall not want many soldiers: the Dauphin will give me all I need to raise the siege of Orleans. ROBERT [flabbergasted] To raise the siege of Orleans! JOAN [simply] Yes, squire: that is what God is sending me to do. Three men will be enough for you to send with me if they are good men and gentle to me. They have promised to come with me. Polly and Jack and - ROBERT. Polly!! You impudent baggage, do you dare call squire Bertrand de Poulengey Polly to my face? JOAN. His friends call his so, squire: I did not know he had any other name. Jack - ROBERT. That is Monsieur John of Metz, I suppose? JOAN. Yes, squire. Jack will come willingly: he is a very kind gentleman, and gives me money to give to the poor. I think John Godsave will come, and Dick the Archer, and their servants John of Honecourt and Julian. There will be no trouble for you, squire: I have arranged it all: you have only to give the order. ROBERT [contemplating her in a stupor of amazement] Well, I am damned! JOAN [with unruffled sweetness] No, squire: God is very merciful; and the blessed saints Catherine and Margaret, who speak to me every day [he gapes], will intercede for you. You will go to paradise; and your name will be remembered for ever as my first helper. ROBERT [to the steward, still much bothered, but changing his tone as he pursues a new clue] Is this true about Monsieur de Poulengey? STEWARD [eagerly] Yes, sir, and about Monsieur de Metz too. They both want to go with her. ROBERT [thoughtful] Mf! [He goes to the window, and shouts into the courtyard] Hallo! You there: send Monsieur de Poulengey to me, will you? [He turns to Joan] Get out; and wait in the yard. JOAN [smiling brightly at him] Right, squire. [She goes out]. ROBERT [to the steward] Go with her, you, you dithering imbecile. Stay within call; and keep your eye on her. I shall have her up here again. STEWARD. Do so in God's name, sir. Think of those hens, the best layers in Champagne; and - ROBERT. Think of my boot; and take your backside out of reach of it. The steward retreats hastily and finds himself confronted in the doorway by Bertrand de Poulengey, a lymphatic French gentleman-at-arms, aged 36 or thereabout, employed in the department of the provost-marshal, dreamily absent-minded, seldom speaking unless spoken to, and then slow and obstinate in reply; altogether in contrast to the self-assertive, loud-mouthed, superficially energetic, fundamentally will-less Robert. The steward makes way for him, and vanishes. Poulengey salutes, and stands awaiting orders. ROBERT [genially] It isn't service, Polly. A friendly talk. Sit down. [He hooks the stool from under the table with his instep]. Poulengey, relaxing, comes into the room; places the stool between the table and the window; and sits down ruminatively. Robert, half sitting on the end of the table, begins the friendly talk. ROBERT. Now listen to me, Polly. I must talk to you like a father. Poulengey looks up at him gravely for a moment, but says nothing. ROBERT. It's about this girl you are interested in. Now, I have seen her. I have talked to her. First, she's mad. That doesn't matter. Second, she's not a farm wench. She's a bourgeoise. That matters a good deal. I know her class exactly. Her father came here last year to represent his village in a lawsuit: he is one of their notables. A farmer. Not a gentleman farmer: he makes money by it, and lives by it. Still, not a laborer. Not a mechanic. He might have a cousin a lawyer, or in the Church. People of this sort may be of no account socially; but they can give a lot of bother to the authorities. That is to say, to me. Now no doubt it seems to you a very simple thing to take this girl away, humbugging her into the belief that you are taking her to the Dauphin. But if you get her into trouble, you may get me into no end of a mess, as I am her father's lord, and responsible for her protection. So friends or no friends, Polly, hands off her. POULENGEY [with deliberate impressiveness] I should as soon think of the Blessed Virgin herself in that way, as of this girl. ROBERT [coming off the table] But she says you and Jack and Dick have offered to go with her. What for? You are not going to tell me that you take her crazy notion of going to the Dauphin seriously, are you? POULENGEY [slowly] There is something about her. They are pretty foulmouthed and foulminded down there in the guardroom, some of them. But there hasn't been a word that has anything to do with her being a woman. They have stopped swearing before her. There is something. Something. It may be worth trying. ROBERT. Oh, come, Polly! Pull yourself together. Commonsense was never your strong point; but this is a little too much. [He retreats disgustedly]. POULENGEY [unmoved] What is the good of commonsense? If we had any commonsense we should join the Duke of Burgundy and the English king. They hold half the country, right down to the Loire. They have Paris. They have this castle: you know very well that we had to surrender it to the Duke of Bedford, and that you are only holding it on parole. The Dauphin is in Chinon, like a rat in a corner, except that he won't fight. We don't even know that he is the Dauphin: his mother says he isn't; and she ought to know. Think of that! The queen denying the legitimacy of her own son! ROBERT. Well, she married her daughter to the English king. Can you blame the woman? POULENGEY. I blame nobody. But thanks to her, the Dauphin is down and out; and we may as well face it. The English will take Orleans: the Bastard will not be able to stop them. ROBERT. He beat the English the year before last at Montargis. I was with him. POULENGEY. No matter: his men are cowed now; and he can't work miracles. And I tell you that nothing can save our side now but a miracle. ROBERT. Miracles are all right, Polly. The only difficulty about them is that they don't happen nowadays. POULENGEY. I used to think so. I am not so sure now. [Rising, and moving ruminatively towards the window] At all events this is not a time to leave any stone unturned. There is something about the girl. ROBERT. Oh! You think the girl can work miracles, do you? POULENGEY. I think the girl herself is a bit of a miracle. Anyhow, she is the last card left in our hand. Better play her than throw up the game. [He wanders to the turret]. ROBERT [wavering] You really think that? POULENGEY [turning] Is there anything else left for us to think? ROBERT [going to him] Look here, Polly. If you were in my place would you let a girl like that do you out of sixteen francs for a horse? POULENGEY. I will pay for the horse. ROBERT. You will! POULENGEY. Yes: I will back my opinion. ROBERT. You will really gamble on a forlorn hope to the tune of sixteen francs? POULENGEY. It is not a gamble. ROBERT. What else is it? POULENGEY. It is a certainty. Her words and her ardent faith in God have put fire into me. ROBERT [giving him up] Whew! You are as mad as she is. POULENGEY [obstinately] We want a few mad people now. See where the sane ones have landed us! ROBERT [his irresoluteness now openly swamping his affected decisiveness] I shall feel like a precious fool. Still, if you feel sure - ? POULENGEY. I feel sure enough to take her to Chinon - unless you stop me. ROBERT. This is not fair. You are putting the responsibility on me. POULENGEY. It is on you whichever way you decide. ROBERT. Yes: that's just it. Which way am I do decide? You don't see how awkward this is for me. [Snatching at a dilatory step with an unconscious hope that Joan will make up his mind for him] Do you think I ought to have another talk to her? POULENGEY [rising] Yes. [He goes to the window and calls] Joan! JOAN'S VOICE. Will he let us go, Polly? POULENGEY. Come up. Come in. [Turning to Robert] Shall I leave you with her? ROBERT. No: stay here; and back me up. Poulengey sits down on the chest. Robert goes back to his magisterial chair, but remains standing to inflate himself more imposingly. Joan comes in, full of good news. JOAN. Jack will go halves for the horse. ROBERT. Well!! [sits, deflated POULENGEY [gravely] Sit down, Joan. JOAN [checked a little, and looking to Robert] May I? ROBERT. Do what you are told. Joan curtsies and sits down on the stool between them. Robert outfaces his perplexity with his most peremptory air. ROBERT. What is your name? JOAN [chattily] They all call me Jenny in Lorraine. Here in France I am Joan. The soldiers call me The Maid. ROBERT. What is your surname? JOAN. Surname? What is that? My father sometimes calls himself d'Arc; but I know nothing about it. You met my father. He - ROBERT. Yes, yes; I remember. You come from Domrémy in Lorraine, I think. JOAN. Yes; but what does it matter? We all speak French. ROBERT. Don't ask questions: answer them. How old are you? JOAN. Seventeen: so they tell me. It might be nineteen. I don't remember. ROBERT. What did you mean when you said that St Catherine and St Margaret talked to you every day? JOAN. They do. ROBERT. What are they like? JOAN [suddenly obstinate] I will tell you nothing about that: they have not given me leave. ROBERT. But you actually see them; and they talk to you just as I am talking to you? JOAN. No: it is quite different. I cannot tell you: you must not talk to me about my voices. ROBERT. How do you mean? Voices? ROBERT. They come from your imagination. POULENGEY. Checkmate. ROBERT. No fear! [To Joan] So God says you are to raise the siege of Orleans? JOAN. And to crown the Dauphin in Rheims Cathedral. ROBERT [gasping] Crown the D-! Gosh! JOAN. And to make the English leave France. ROBERT [sarcastic] Anything else? JOAN [charming] Not just at present, thank you, squire. ROBERT. I suppose you think raising a siege is as easy as chasing a cow out of the meadow. You think soldiering is anybody's job? JOAN. I do not think it can be very difficult if God is on your side, and you are willing to put your life in His hand. But many soldiers are very simple. ROBERT [grimly] Simple! Did you ever see English soldiers fighting? JOAN. They are only men. God made them just like us; but He gave them their own country and their own language; and it is not His will that they should come into our country and try to speak our language. ROBERT. Who has been putting such nonsense into your head? Don't you know that soldiers are subject to their feudal lord, and that it is nothing to them or to you whether he is the duke of Burgundy or the king of England or the king of France? What has their language to do with it? JOAN. I do not understand that a bit. We are all subject to the King of Heaven; and He gave us our countries and our languages, and meant us to keep to them. If it were not so it would be murder to kill an Englishman in battle; and you, squire, would be in great danger of hell fire. You must not think about your duty to your feudal lord, but about your duty to God. POULENGEY. It's no use, Robert: she can choke you like that every time. ROBERT. Can she, by Saint Denis! We shall see. [To Joan] We are not talking about God: we are talking about practical affairs. I ask you again, girl, have you ever seen English soldiers fighting? Have you ever seen them plundering, burning, burning the countryside into a desert? Have you heard no tales of their Black Prince who was blacker than the devil himself, or of the English king's father? JOAN. You must not be afraid, Robert - ROBERT. Damn you, I am not afraid. And who gave you leave to call me Robert? JOAN. You were called so in church in the name of our Lord. All the other names are your father's or your brother's or anybody's. JOAN. Listen to me, squire. At Domrémy we had to fly to the next village to escape from the English soldiers. Three of them were left behind, wounded. I came to know these three poor goddams quite well. They had not half my strength. ROBERT. Do you know why they are called goddams? JOAN. No. Everyone calls them goddams. ROBERT. It is because they are always calling on their God to condemn their souls to perdition. That is what goddam means in their language. How do you like it? JOAN. God will be merciful to them; and they will act like His good children when they go back to the country He made for them, and made them for. I have heard the tales of the Black Prince. The moment he touched the soil of our country the devil entered into him, and made him a black fiend. But at home, in the place made for him by God, he was good. It is always so. If I went into England against the will of God to conquer England, and tried to live there and speak its language, the devil would enter into me; and when I was old I should shudder to remember the wickednesses I did. ROBERT. Perhaps. But the more devil you were the better you might fight. That is why the goddams will take Orleans. And you cannot stop them, nor ten thousand like you. JOAN. One thousand like me can stop them. Ten like me can stop them with God on our side. [She rises impetuously, and goes at him, unable to sit quiet any longer]. You do not understand squire. Our soldiers are always beaten because they are fighting only to save their skins; and the shortest way to save your skin is to run away. Our knights are thinking only of the money they will make in ransoms: it is not kill or be killed with them, but pay or be paid. But I will teach them all to fight that the will of God may be done in France; and then they will drive the poor goddams before them like sheep. You and Polly will live to see the day when there will not be an English soldier on the soil of France; and there will be but one king there: not the feudal English king, but God's French one. POULENGEY. I can see no harm in trying. Can you? And there is something about the girl - ROBERT [turning to Joan] Now listen you to me; and [desperately] don't cut in before I have time to think. JOAN [plumping down on the stool again, like an obedient schoolgirl] Yes, squire. ROBERT. Your orders are, that you are to go to Chinon under the escort of this gentleman and three of his friends. JOAN [radiant, clasping her hands] Oh, squire! Your head is all circled with light, like a saint's. POULENGEY. How is she to get into the royal presence? ROBERT [who has looked up for his halo rather apprehensively] I don't know: how did she get into my presence? If the Dauphin can keep her out he is a better man than I take him for. [Rising] I will send her to Chinon; and she can say I sent her. Then let come what may: I can do no more. JOAN. And the dress? I may have a soldier's dress, mayn't I, squire? ROBERT. Have what you please. I wash my hands of it. JOAN [wildly excited by her success] Come, Polly. [She dashes out]. ROBERT [shaking Poulengey's hand] Goodbye, old man, I am taking a big chance. Few other men would have done it. But as you say, there is something about her. POULENGEY. Yes: there is something about her. Goodbye. [He goes out]. Robert, still very doubtful whether he has been made a fool of by a crazy female, and a social inferior to boot, scratches is head and slowly comes back from the door. The steward runs in with a basket. STEWARD. Sir, sir - ROBERT. What now? STEWARD. The hens are laying like mad, sir. Five dozen eggs! ROBERT [stiffens convulsively: crosses himself: and forms with his pale lips the words] Christ in heaven! [Aloud but breathless] She did come from God. Présentation de l'éditeur One of Shaw's most unusual and enduringly popular plays. With SAINT JOAN (1923) Shaw reached the height of his fame and Joan is one of his finest creations; forceful, vital, and rebelling against the values that surround her. The play distils Shaw's views on the subjects of politics, religion and creative evolution. Détails sur le produit En savoir plus sur les auteurs Dans ce livre (En savoir plus) Première phrase A fine spring morning on the river Meuse, between Lorraine and Champagne, in the year 1429 A.D., in the castle of Vaucouleurs. Lire la première page En découvrir plus Parcourir les pages échantillon Rechercher dans ce livre: Commentaires en ligne Il n'y a pas encore de commentaires clients sur 5 étoiles 4 étoiles 3 étoiles 2 étoiles 1 étoiles Commentaires client les plus utiles sur (beta) 33 commentaires 32 internautes sur 34 ont trouvé ce commentaire utile  Drama Instead of History 11 décembre 2005 Par Jeanette Romee - Publié sur Format: Broché This is George Bernard Shaw's most important work. A successful drama that has enjoyed continuous popularity for nearly eighty years is worth a read. Most audiences find it very satisfying. Shaw has a gift for lucid dialogue that brings a centuries old story to life. This is one of the most approachable of the great English language plays. Why then does "Saint Joan" fall short of five stars? Fictional accounts of Joan of Arc's life are numerous and seldom accurate. Shakespeare makes her a witch. Voltaire makes her an idiot. Schiller makes her admirable - and gives her a magical helmet that protects her from harm until she falls in love. In a rare exception to his usual satirical style, Mark Twain spent months in France researching her life and published a fictional biography. Readers who enjoy accurate historical fiction would do well with Twain's "Personal Recollections of Joan of Arc." Twain considered this - not "Huckleberry Finn" - to be his finest work. Shaw pays far more attention to accuracy than most fictionalizations. Several lines in the play are Shaw's own translations from her trial transcript. Shaw's long introductory essay aspires to be history as well as drama. Most scholars agree with his assessment of Joan of Arc's socioeconomic background. Shaw acknowledges a few dramatic economies: he combines the historical Jean d'Orleans and Duke Jean d'Alencon into a single character. What causes problems are Shaw's unacknowledged deviations from the factual record. Shaw argues that Joan of Arc was a forerunner of Protestantism who got a fair trial. Among serious scholars this argument gains no credibility. A surviving letter from the English government that financed the trial guaranteed her execution even if the court found her not guilty. Joan of Arc never rejected the Roman Catholic Church: she rejected the authority of politically biased judges bent on discrediting her and, by inference, on discrediting the king she had crowned. Twenty-four years after her death the Pope reopened the case. The appeals court not only found her innocent but discovered such extensive violations of proper court procedure that it accused the late Bishop Cauchon of heresy. Shaw's choice works as drama rather than as history yet he advocates it on historical grounds. He might be sincere but he is certainly not honest. To an academic scholar who has explained the facts to umpteen Shaw enthusiasts the difference can be infuriating. This is why "Saint Joan" collects a handful of scathing reviews. A reader who understands this little shell game with history should have a lively time with the drama. If this is your first reading of "Saint Joan" then I envy you. Nothing quite equals the first encounter. 6 internautes sur 6 ont trouvé ce commentaire utile  Problem of Gender? No, a Problem of Genre! 3 février 2011 Par Giordano Bruno - Publié sur Format: Broché Radical feminism, to which I pledge complete allegiance, has put gender issues at the forefront of historical interest in Joan of Arc, but historiography is scarcely pertinent to the reading of George Bernard Shaw's play 'Saint Joan.' I'm told that this awkward play was a smash hit and held the stage for decades in Britain, but it's hard to imagine how or why. The first problem is not gender but 'genre.' Is it intended to play as a farce, before an audience that will chuckle genteelly at hearing Jehan d'Arc speak with a Yorkshire brogue? Or as a philosophical tragicomedy, preparing the stage of the future for Samuel Becket? The dialogue is half music-hall burlesque and half pompous twaddle. I'd have a hard time declaring which is more juvenile, the humor or the sententious lecturing. If anyone who reads this review has seen a staged production of the play, I'd be interested in hearing whether it was 'played for laughs' or performed earnestly. Shaw is of course taken quite seriously in the world of anglophone theater, though actual productions of his works are rare in the USA. Shaw was not reticent about assuring "us" of his intelligence, and not particularly chary of condescension, but this play features some of the dumbest jokes and most preposterous dialogue I've ever read. Any audience that wasn't overawed by Shaw's elevated reputation would groan out loud at Joan's flippant folksiness. There seems to be a "Joan-of-Arc" effect on the minds of writers, which disposes them to bizarre extravagance. I turned to Shaw's 'Saint Joan' as a follow-up to reading Mark Twain's romantic novel/ biography "Joan of Arc.' Both works are based on historical sources, chiefly the trial records, yet neither can be interpreted as 'history' in a modern sense. Shaw was aware of Twain's book, and regarded it skeptically, yet the two works have more in common than not. Both are polemics against humanity's inability to comprehend sainthood. 17 internautes sur 21 ont trouvé ce commentaire utile  the Doctor's Dilemma 30 novembre 1999 Par Un client - Publié sur Format: Broché THE DOCTOR'S DILEMMA is one of Shaw's most biting critical commentaries...this time on doctors. Shaw hated doctors, as a result of a botched operation on his foot, so here he portrays them as a group of ignorant, bull-headed windbags. All, that is, except for one doctor, who has actually found a cure for tuberculosis. The "dilemma" in the title is whether to use the cure on a talented young painter who is a moral and ethical sleazebag, or on an upstanding middle-aged physician who is a good soul, albeit a boring and relatively mundane one. All this is complicated by the fact that the doctor is in love with the painter's wife! The biggest problem with the play is that it has lost some of its impetus in the last century. Antibiotics can now cure tuberculosis, and the medical profession is far more restricted in its use of "experimental" treatments than it was then. However, Shaw's wit and invective is still poignant even at the end of the twentieth century. A must-read for Bernard Shaw enthusiasts.... 10 internautes sur 13 ont trouvé ce commentaire utile  Wisdom 8 décembre 2003 Par MarianaP - Publié sur Format: Cahier What has most stuck in my mind, many years after having read Shaw's book, is the fact that it's more logical to think of Joan as a protestant saint, instead of Catholic, when one considers how she rejected the Catholic Church's authority and was, naturally, rejected in turn. He makes a very good point when he says that, right as that Church was to ban her on those grounds, nothing could give it the moral right (or any other right, for that matter) to condemn a woman who disagreed with it on matters of faith. In all fairness, they should have simply excommunicated her and said: "If you think you have a better idea, then you go ahead and create your own Church". It may be a thoroughly idealistic point of view of course, too democratic for that age (perhaps any age), but nonetheless it strikes me as completely fair. If you like a club but object to some of its rules, and that club isn't willing to change for your sake, they may have the right to throw you out, just as you may have the right to start a new one on your own - but they shouldn't be given the right to take away your life for having dared to challenge their concepts. This lesson has stayed with me and I recommend this book for the wisdom it contains. 2 internautes sur 2 ont trouvé ce commentaire utile  Too smart, apparently, for some 5 décembre 2009 Par anonymous - Publié sur Format: Broché Achat vérifié "Cauchon: If you dare do what this woman has done - set your country above the holy Catholic Church - you shall go to the fire with her." So speaks a more engaging, complex executioner of the legendary young soldier put forth by Bernard Shaw in "Saint Joan." Even if the Bishop put Joan to death for political reasons he likely believed that her execution was just. The Catholic Church's problems with Joan lingered for nearly 500 years. Her active assertion of nationalism as a holy endeavor intuited by her own judgment undermined the Catholic church's political authority, and yes, presaged the Reformation, even if Joan was not a Protestant (Shaw labels her "anti clerical"). And she willingly asserted a non-traditional feminine role (soldiering and politicking), which by its nature required non-traditional feminine behavior and dress. Reviewers who say that Joan wore armor to keep from being raped are half right, since Joan's soldiering included such hazards, like being wounded. But she thrived in it too. In fact, I agree with Shaw that the voices spurring her on were Joan's own subconcious, but that is another debate... Those who are skeptical of Shaw's ideas would do well to consider the year of her Canonization: 1920. It's no accident that a year after the Great War, in which the world's powers successfully mobilized against each other in the name of Nationalism (the churches providing prayers and getting out of the way), Catholicism threw up its hands and recognized the genius of the French teenager. This too as women had been called on in support roles like nurses and ambulance drivers, and were being enfranchised by their European and American nations. The play itself is typical Shaw - bright, smart, very worthwhile. None of the play's acts goes on too long. None is weak, except for Act III on the eve of the battle of Orleans, but Shaw is Shaw and seems embarassed by the warlike bluster. Joan herself, as others have observed, often speaks in lines that are taken directly from the trial transcripts. When she doesn't it's usually to give her a flash of wit that rarely seems contrived. This is Joan for grown-ups. And it is Joan for the 21st century: post-modern, the old sentiments put aside. Also reccomended: Regine Pernoud's books. If you need to hear what a pretty, chaste, tear-provoking, goody goody of a girl Joan was buy Mark Twain (I myself donated that volume to the public library when I was 17).
global_05_local_5_shard_00000035_processed.jsonl/30003
Arthur Schlesinger Jr. Arthur Schlesinger Jr.'s picture Arthur Schlesinger, Jr. (1917-2007) was a historian, author, and political adviser who served as Special Assistant to President John Kennedy from 1961 to 1963. Schlesinger won the 1946 Pulitzer Prize for History for The Age of Jackson. In 1966, Schlesinger won another Pulitzer Prize for A Thousand Days: John F. Kennedy in the White House. He was honored with a National Humanities Medal and a Four Freedoms Award before his death in 2007. Articles by this Contributor
global_05_local_5_shard_00000035_processed.jsonl/30012
| | Identifying Unmet Demand:The Key to Long-Term Innovation Success June 30, 2013 Achieving a breakthrough innovation is every company's goal. This research report from Nielsen describes a three-step demand-driven approach to concept development and offers readers 12 factors for success. Members Only Content User Name (email): Also See Relevant Topics
global_05_local_5_shard_00000035_processed.jsonl/30017
Site hosted by Build your free website today! The Jefferson Bible The Life and Morals of Jesus Jefferson's Syllabus of an Estimate of the Merit of the Doctrines of Jesus, Compared with Those of Others. In a letter to Dr. Benjamin Rush, Jefferson described his views on Jesus and the Christian religion, as well as his own religious beliefs. He appended to this description a Syllabus that compared the teachings of Jesus to those of the earlier Greek and Roman philosophers, and to the religion of the Jews of Jesus' time. This letter and the appended Syllabus are interesting to anyone studying the Jefferson Bible because they explain precisely Jefferson's views which later led him to make the compilation of the moral philosophy of Jesus in the form presented on this website. Both the letter and the Syllabus are presented below, and may be found in the Memorial Edition of Jefferson's Writings, Vol. 10, pg. 379. Following the syllabus is a letter to William Short, which contains further discussion of the syllabus. This letter is found in Vol. 11 of the Memorial Edition, pg. 243. Letter To Dr. Benjamin Rush. Washington, April 21, 1803.     Th: Jefferson     Syllabus of an Estimate of the Merit of the Doctrines of Jesus, Compared with Those of Others. Let a just view be taken of the moral principles inculcated by the most esteemed of the sects of ancient philosophy or of their individuals; particularly Pythagoras, Socrates, Epicurus, Cicero, Epictetus, Seneca, Antoninus. I. Philosophers. 1. Their precepts related chiefly to ourselves, and the government of those passions which, unrestrained, would disturb our tranquillity of mind.[Note] In this branch of philosophy they were really great. 2. In developing our duties to others, they were short and defective. They embraced, indeed, the circles of kindred and friends, and inculcated patriotism, or the love of our country in the aggregate, as a primary obligation: towards our neighbors and countrymen they taught justice, but scarcely viewed them as within the circle of benevolence. Still less have they inculcated peace, charity and love to our fellow men, or embraced with benevolence the whole family of mankind. II. Jews. 1. Their system was Deism; that is, the belief in one only God. But their ideas of him and of his attributes were degrading and injurious. III. Jesus. The disadvantages under which his doctrines appear are remarkable. 1. Like Socrates and Epictetus, he wrote nothing himself. 2. But he had not, like them, a Xenophon or an Arrian to write for him. I name not Plato, who only used the name of Socrates to cover the whimsies of his own brain. On the contrary, all the learned of his country, entrenched in its power and riches, were opposed to him, lest his labors should undermine their advantages; and the committing to writing his life and doctrines fell on unlettered and ignorant men, who wrote, too, from memory, and not till long after the transactions had passed. 3. According to the ordinary fate of those who attempt to enlighten and reform mankind, he fell an early victim to the jealousy and combination of the altar and the throne, at about thirty-three years of age, his reason having not yet attained the maximum of its energy, nor the course of his preaching, which was but of three years at most, presented occasions for developing a complete system of morals. 4. Hence the doctrines he really delivered were defective as a whole, and fragments only of what he did deliver have come to us mutilated, misstated, and often unintelligible. Notwithstanding these disadvantages, a system of morals is presented to us which, if filled up in the style and spirit of the rich fragments he left us, would be the most perfect and sublime that has ever been taught by man. The question of his being a member of the Godhead, or in direct communication with it, claimed for him by some of his followers and denied by others, is foreign to the present view, which is merely an estimate of the intrinsic merits of his doctrines. 1. He corrected the Deism of the Jews, confirming them in their belief of one only God, and giving them juster notions of His attributes and government. 2. His moral doctrines, relating to kindred and friends were more pure and perfect than those of the most correct of the philosophers, and greatly more so than those of the Jews; and they went far beyond both in inculcating universal philanthropy, not only to kindred and friends, to neighbors and countrymen, but to all mankind, gathering all into one family under the bonds of love, charity, peace, common wants and common aids. A development of this head will evince the peculiar superiority of the system of Jesus over all others. 3. The precepts of philosophy, and of the Hebrew code, laid hold of actions only. He pushed his scrutinies into the heart of man; erected his tribunal in the region of his thoughts, and purified the waters at the fountain head. 4.He taught, emphatically, the doctrines of a future state, which was either doubted or disbelieved by the Jews, and wielded it with efficacy as an important incentive, supplementary to the other motives to moral conduct. Letter To William Short. Monticello, April 13, 1820.     Your favor of March the 27th is received, and as you request, a copy of the syllabus is now enclosed. It was originally written to Dr. Rush. On his death, fearing that the inquisition of the public might get hold of it, I asked the return of it from the family, which they kindly complied with. At the request of another friend, I had given him a copy. He lent it to his friend to read, who copied it, and in a few months it appeared in the Theological Magazine of London. Happily that repository is scarcely known in this country, and the syllabus, therefore, is still a secret, and in your hands I am sure it will continue so. Table of contents | Introduction | Chapter 1
global_05_local_5_shard_00000035_processed.jsonl/30018
Dream of: 01 April 2012 "Keeping Cool" My old friend Steve Weinstein and I were walking along together, headed to an auditorium where I was going to take part in a debate. We had just left one location, where I had agreed to debate someone in front of an audience, something I had never done before. As I talked with Steve, he tried to encourage me. I thought he would make a good debater. I wished I could debate someone in a practice round in front of Steve so that he could tell me what I was doing wrong. I thought he would clearly also be able to see my strengths. I told him that I anticipated that my biggest problem would be fear in front of so many people. I thought some people who didn't even like me might be in the group. Maybe old law school professors who didn't care for me would be in the audience. When I asked Steve if he had ever been in front of anyone like that, his mind abruptly began going around in circles and he would forget what he was talking about. He looked as if he were drawing a big blank. Drawing a big blank was exactly what I feared most. He said, yea, that he understood exactly what I meant when I said that. At the same time, I thought there was a chance that I would adequately handle the debate. Even though I didn't even know what the debate was going to be about, I figured was able to talk about most problems. I suspected the subject would be a social problem. I only needed to keep my cool when I stood up in front of all the people. Dream Journal Home Page Copyright 2013 by
global_05_local_5_shard_00000035_processed.jsonl/30020
Lucky Day Testo Testo Lucky Day Amici, ecco i finalisti SHAGGY's Opening Straight up right ya know I love ya nah If your man ain't takin care of ya I'm exactly whatcha' lookin' for Don't worry 1-800 Mr. Lovah Dig dat Are you looking for a man to make you lose control? A man when you need _______________ that goal Be a 'life' blanket when you're feeling 'cool' Girlfriend this is your lucky day The don't call me Mr. Lover coz I like ice cream I am Mr. Lover coz I fulfill dreams When last your man made you moan & scream? Girlfriend this is your lucky day Verse 1 Well, who's gonna take the heat? A lot of (pillows)___________(show) indeed But have you ever wondered why a woman will cheat It takes a real man to make a woman complete _________________ speed 'Fellahs out dere acting like their on' But slower can be better if you wanna succeed Listen to your woman & ask what she means Sometimes it can be better if u follow her lead Verse 2 You have a man ___________ that he's known 'well all of that IS' So if he's all of that Then why are you on my phone? ___________ you're feeling all alone 'Could it be that deep down' (Someone) still in need things __________ at home You say you got a man Well let's see what that means Let's see, he pays your bills, he buys your stuff, you keep him clean What does he tell you soft to make you feel like a teen? It takes more than 'moniker' to feel like a queen 'money' Verse 3 Love making should be fun The lady should be satisfied before you're up & done Ladies if your man is one 'a __________' 'who love to jump the gun' Let him go & 'come' 'call me later'Di adds and changes words Let a real lover show you 'what ___________' girl 'how it's done' SHAGGY's Closing Chat bout If yah man don't deal wid yuh right, call me I'll give ya what yah missin' ya know U no haffa worry U need a real Jamaican ____ yah dig dat! Nothing like ya conconut lovah Talk to me gurl Chorus - First Four (4) Lines ONLY
global_05_local_5_shard_00000035_processed.jsonl/30035
Ok, thanks for the useful information. I took the meter apart and had a look and figured out how it works, but it's not working properly. When you have your hand blocking the cell it reads zero, but when you put it right in front of a bright light it only goes up a tiny bit. So I guess there's some electrical fault in the meter.
global_05_local_5_shard_00000035_processed.jsonl/30037
Would it be possible that you stored the film next to a chemical for quite some time that would desensitise the emulsion at the edges of the the first few frames? A bit like a fat roll light leak but vapour, not light. I realise this is a long shot, but long term storage next to Ferricyanide etc? Or, frozen storage with humidity, ice forming, backing paper sticking... Brain storming. It is puzzling how regular the top and bottom is. I suppose mechanical issue is more likely, in the camera. Ps. I did not realise it is between frames, was thinking top and bottom. Ignore my suggestion, please.
global_05_local_5_shard_00000035_processed.jsonl/30038
Quote Originally Posted by Yashinoff View Post I came across an estate sale today and picked up an old Spiratone ring flash for a few bucks. But I've noted it doesn't have a table for calculating exposure based on distance. It also doesn't have a button to trigger the flash without firing the camera, so I'm not sure how one could meter without wasting an exposure. Is there some sort of formula for calculating exposure with a ring flash? Or will I need to just meter it at different distances and build my own exposure table? Thanks for any ideas! Ummmm, you could short the PC plug with a paperclip? Use a camera without film in it? Look up the GN on Google?
global_05_local_5_shard_00000035_processed.jsonl/30039
It sounds like you have a New F-1, Darin, sometimes called the "F-1N" (but not by Canon), not the F-1n, which was the intermediate version between the original F-1 and the New F-1. This may explain some of the confusion. I've had mine since I purchased it new around 1982 or so. Great camera.
global_05_local_5_shard_00000035_processed.jsonl/30068
What Causes Tornadoes? Tornadoes are caused by unstable air in the atmosphere. The lower atmosphere tends to be warmer than normal, while the upper atmosphere tends to be cooler than usual. The varying temperatures combine with unstable wind speeds to make a tornado. Q&A Related to "What Causes Tornadoes?" Tornadoes usually appear along the line of a cold front as it collides with warm, moist air east of it. This usually brings about instability and wind shear. Along "Tornado Alley Here is an answer from my boyfriend's brother, Gabriel Garfield, who is part of the Vortex 2 project ( http://www.vortex2.org/h. ome/. a meteorologist, at one time on the. Discovery Tornadoes are caused by the interaction of weather systems, which create large thunderstorms (the most powerful and long-lived type is called a supercell) The winds created by the Warmer and more humid conditions in the lower atmosphere, and cooler conditions in the upper 3 Additional Answers Ask.com Answer for: what causes tornadoes Clouds form when water vapor condenses in the air. This releases heat, which increases the updraft temperature and the kinetic energy of air movement. In supercell thunderstorms, updrafts are strong and may create a vortex of air that may form a tornado. Most scientists consider this to be a simplified and incomplete explanation. The finer details of tornado formation and dissipation are still unknown. Tornadoes can occur when two different temperature winds come into contact with each other. When hot air meets cold air, they start spinning around each other casing a tornado. There are a few factors that can cause Tornadoes. One of the main factors is uncontrollable winds and the other is the atmosphere. Tornadoes can be scary so be careful. You can find more information here: http://www.weatherquestions.com/What_causes_tornadoes.htm
global_05_local_5_shard_00000035_processed.jsonl/30075
Atheist Nexus Logo The book is called The Fingerprints of God by Brad Cummings.  I've had it in my my possession for less than a day yet but I find forcing myself through it to be both hard and bad for my health due to excessive facepalming.  I'm not yet through the first chapter and already the ignorance, confirmation bias, equivocations, non-sequiturs, and bald-faced-lies are intolerable.  Has anyone else read this book and if so, does it get better after the first chapter? Views: 224 Reply to This Replies to This Discussion The title alone is so off-putting I would not touch it for fear of picking up theist germs. LOL! I'll pass on it as well. Must be a good friend if you didn't just toss it in the recycling bin.  Will they be willing to honestly listen to the faults you find in this?  Maybe just compile a list of the problems with the first chapter and discuss with your friend.  Then you can decide whether to suffer through the rest. This sounds like an excellent idea, after all, it's Sean's friend who 'set the ball rolling' by giving him the book in the first place. I haven't read it, but it sounds very much of the same stripe as Lee Strobel's The Case for Christ, which has been dismantled more ways than I care to count as a badly failed apologetic.  Like James, I have no interest in reading such crap, though listening to people like A|N's Steve Shives destroy books like that on YouTube is at least entertaining! In my leisure time, I prefer to read history rather than fiction. Personal bias, I guess, but since my children grew up, I haven't picked Grimm's Fairy Tales, or Mother Goose in years. By the way, you might want to ask your friend that if there are fingerprints of god, are there also DNA samples and mug shots? I think the bastard is wanted on 5 continents. Sounds like that settles that. I know how you feel.  Last year a coworker lent me a book about god and religion.  She stressed that if I read it, I would probably and seriously consider being religious once again. you, I just couldn't make it through the first chapter without the face-palms and the insults to my intelligence.  I returned it to her unread.      Good for you! I have never heard of it. I would probably never glance at it. If you began reading "in good faith," and found it absurd, how about returning it with "Thanks for your concern, but it just isn't my kind of book."  If pressed, you could add that it has nothing in the first pages, where it should present its hardest-hitting arguments, that you hadn't already considered and abandoned. Why are you reading it? I think I would of thrown it out! Badges  |  Report an Issue  |  Terms of Service
global_05_local_5_shard_00000035_processed.jsonl/30079
  You are here:  Why Congress Should Get the Spike-Strips Out ... Now Thursday, 03 May 2007 15:55 by Stephen P. Pizzo Events undergo a kind of gestation process. What they appear to be the day they occur is almost never what they grow up over time to become. What got me thinking about that is impeachment. A few months ago, when a few voices on the far left first uttered the “I” word in relation to Dick Cheney and George Bush, I was turned off by the idea. Then I started to wonder why I felt that way. After all, if any two public officials in American history ever earned a thorough impeaching it's those two. Yet the idea of actually kicking that process into action produced a sinking, sickish feeling deep within. Then it dawned on me — Republicans had “removed” impeachment from the arsenal that made Congress a co-equal branch of government. They didn't do that on purpose, but by accident — a fortunate accident for them, as we now see. As I said above, events often mature into something else, and that's precisely what happened to the publics feeling about the impeachment process. When mad-dog Republicans misused impeachment during their anti-Clinton feeding frenzy, the public — the sane majority anyway — was turned off by it. They saw it more for what is was — a legislative coup attempt by Republicans against a Democratic president, rather than the legitimate use of Congressional power. It was also viewed as a monumental waste of time, taxpayer money and critically needed legislative bandwidth. Over time that impression gestated into a deep national ambivalence, bordering on disgust, with the impeachment process. It's now almost a knee-jerk response when someone demands impeachment. You can almost hear a national moan: “Oh no. Please, no. Don't take us down that road again! Please.” So there you have it. With their unjust, frivolous, mean spirited, wolf-pack-like pursuit of Bill Clinton the GOP inadvertently inoculated its own top officials from the threat of impeachment today, even when so richly deserved. While I now understand that, the idea of impeaching George W. Bush and Dick Cheney still didn't feel good, but it did seem thinkable. I still don't have a good feeling about impeachment. Not because I remain “traumatized” by the Clinton impeachment fiasco, but because that's how I think we should always feel about impeaching a sitting President or VP. Impeachment is the ultimate punishment, the constitutional equivalent of a firing squad. Therefore it should be approached accordingly — only when clearly justified, only as the last resort, and only with a sense of judicial solemnity, not partisan glee. That's where I am now. What happened to Bill Clinton had nothing to do with the legitimate use of congress' power to impeach. Lying about sex — even under oath — is no reason to unseat the President of a local SPCA, much less the President of the United States. That sorry event reflects, not a flaw in the power to impeach, but a flaw in humans who chose to soil and abuse that power. We must not now compound that mistake by letting it forever place impeachment emotionally and/or politically off limits. To do so would gut the already seriously eroded constitutional separation of powers. Unlike Bill Clinton's stupid, immature, self-indulgent transgressions, Bush and Cheney have actually committed “high crimes and misdemeanors,” — and plenty of each. If a court-like impeachment hearing ever began the process of stripping away the Orwellianisms from the Bush/Cheney list of activities over the last six years impeachment would be — if you'll excuse the expression — a slam dunk. • What really is what the administration likes to call, “enhanced interrogation techniques?” It's torture. • What really is wiretapping without a warrant? It's a crime. • What are “Presidential signing statements,” that nix laws passed by congress and signed into law by the President? They are a violations of the US Constitution which the President swore to uphold. • What are false statements made to mislead congress into approving war? They are lies — lies to congress — a high crime if ever there was one. • What is “preemptive war?” A war against another sovereign nation that had not directly threatened the US? It's an international crime — just as President George H. Bush declared when Saddam invaded and occupied Kuwait. • What is it when five million White House documents (emails) “disappear” just as the administration faces it's first real congressional oversight hearings ever? It's called “contempt of Congress,” and when those missing documents involve an ongoing criminal probe it's called “obstruction of justice,” a felony. Oh, I know, there's more — plenty more. Just pick the top one or two, start impeachment hearings where everyone involved is put under oath, and George and Dick are goners. But the question remains, should we? Would impeaching Bush and Cheney be more disruptive than curative? After all, we have only two more years to endure them. So, should we? Should we impeach? Up until this week I would have said that it was more trouble than it was worth. But, unless the administration begins treating congress with the constitution respect and deference the law requires, especially regarding the war in Iraq, I say yes, impeach. And so far it does not appear either Bush or Cheney are about to stop acting like they are overseeing a monarchy. Yesterday when the president vetoed the war supplemental with conditions and time lines attached by congress, he said something that indicates he still does not get it. “I am, of course,” Bush said, “always interested in the ideas offered by congress...but...” Ah, earth to George — those are not just “ideas.” What if Congress had said it. “Of course, we are always interested in any ideas the President has to offer...but..” Or, what if Congress declared, “We are always interested in any ideas the US Supreme Court has... but...” Then this morning I read that the White House is backing away from it's agreement to get court approval for warrantless wiretaps. Instead, Bush claims, he as President has the power to approve wiretaps on his own. I see. Responsible, cool-headed, soft-talking, clear-thinking Democrats and Republicans in the House and Senate should get out their impeachment primers, dust off the swearing-in Bible and oil the rusted wheels of Congressional justice. Because I am starting to think we're going to be forced to impeach these two guys. Because, by all indicators, these two Dukes of Hazard have clearly decided that, rather than change their ways, they are going to try to beat Smoky to the border. They are putting their lawless heels to the metal. So it's time for Congress to get the spike-strips of impeachment out — first as a warning. If that doesn't work, then use them. Use them before these two men do any more damage. Use them also as a clear warning to the next administration. be it Democratic or Republican, that if you break the law, regardless of intentions, you will be held to account. More from this author: Predictions for 2007 (7049 Hits) White House Chess (6583 Hits) Fine Mess You Got Us Into This Time (8224 Hits) New Lies Forward (6467 Hits) The GOP's Comprehensive Immigration Reform Scam (7060 Hits) Related Articles: We The People: An Open Letter to Congress (8178 Hits) First Real Test for Democrats: The Lame Duck Session of Congress (7830 Hits) Congress Should Immediately Terminate the 2001 AUMF (9265 Hits) The Democrats and the Anti-Bushite Movement: How This Important Alliance Should Work (6074 Hits) An Open Letter to the New Congress - Investing in Hate: America’s Support of Israel (11088 Hits) Add this page to your favorite Social Bookmarking websites Comments (5)add comment a guest said: Let's successfully censure the bastards & go from there... There is just cause for censure votes on various basis. It takes two thirds and momentum for impeachment to succeed. Start with a gimme... May 03, 2007 Votes: +0 a guest said: Let's get a successful censure vote & go from there... A successful censure vote or votes would be the first step(s) in achieving the momentum and two thirds majority that any impeachment undertaking would require. Why spill all your candy in the lobby? The publc needs to be educated and involved. By the time impeachment hearings begin, it better be a slam dunk. Abu Graib, Gitmo, WMD, Plame, warrantless taps, Justice Dept., Stae Dept., on & on. Choose something that has bipartisan objection, get a censure vote, and go from there. May 03, 2007 Votes: +0 a guest said: This dishonest, deceitful duo have already done so much damage its unbelievable they are still at the seat of government. They have set the very lowest standards of public service in almost everything they touch. Easy no-bid defense contracts, deceptive arguments about the war and medicaid prescription drugs for example. They view deception and secrecy as a necessary part of presidential operations in order to get things done. No one yet grasps the outrage of all the soldiers who died unecessarily due to inept, umpulsive war implementation. Then there is the outrage of all the billions in debt this nation now holds for a military adventure in IRAQ promoted dishonestly by Cheney. These 2 characters appear to have no conscience. Sure Bush smiles and is friendly and everyone says they enjoy meeting him. But his actions and negligent handling of the highest office are horrendous. He appears to have let Cheney have a free reign in everything... resulting in corrupt, illegal practices including wire taps and torture. Our nation is at a turning point. If US citizens and their representatives are too lazy or weak spirited to throw these 2 out on their bums, we will set this nation on a downhill path of lower government standards, more political corruption, more illegal/dishonest military adventures, and overall government fiasco. Republicans must push for impeachment also because these two "leaders" are indifferent to the republicans in congress and the traditional conservative values. Yank these dishonest, secretive, negligent characters from their Whitehouse chairs as soon as possible to save the world from low-minded human governance. May 03, 2007 Votes: +0 a guest said: A brilliant case for the necessity of impeachment. I appreciated the break down of the initial reaction against it--felt by nearly everyone I speak too--and then the later understanding of impeachments key and grave role. Impeachment was written with these exact type of men in mind--George Bush and Dick Cheney. May 04, 2007 Votes: +0 Nathanael Nerode said: An accurate assessment of the need for impeachment. I think you've got it. This is why impeachment is necessary. They just won't *stop* breaking the law -- they have declared that they're gonna keep on doing it. There will soon be no other choice but impeachment. May 07, 2007 Votes: +0 Write comment smaller | bigger Top 123
global_05_local_5_shard_00000035_processed.jsonl/30173
Scenes from a December Sicily December 17, 2012 Dicembre, a great season in Sicily. Fog may roll over the hills. Clouds may loom. Laundry stays soggy on the line. Grasses are green. Piazzas unpeopled. Beaches bare. Dog days done. December in Sicily, copyright Jann Huizenga Sicilian Cow in December, copyright Jann HuizengaSicilian Road in December Fog, copyright Jann Huizenga Panorama of Ragusa Ibla, copyright Jann Huizenga my sweeeeeeet December village Click to subscribe to BaroqueSicily. Vieni trovarmi su Facebook. My website. Site Meter - La directory italiana dei blog
global_05_local_5_shard_00000035_processed.jsonl/30226
1 Kings 14:4-14 NIV 6 So when Ahijah heard the sound of her footsteps at the door, he said, "Come in, wife of Jeroboam. Why this pretense?1 I have been sent to you with bad news. References for 1 Kings 14:6 7 Go, tell Jeroboam that this is what the LORD, the God of Israel, says:2 'I raised you up from among the people and made you a leader3 over my people Israel. References for 1 Kings 14:7 8 I tore4 the kingdom away from the house of David and gave it to you, but you have not been like my servant David, who kept my commands and followed me with all his heart, doing only what was right5 in my eyes. References for 1 Kings 14:8 9 You have done more evil6 than all who lived before you.7 You have made for yourself other gods, idols8 made of metal; you have provoked9 me to anger and thrust me behind your back.10 10 " 'Because of this, I am going to bring disaster11 on the house of Jeroboam. I will cut off from Jeroboam every last male in Israel--slave or free.12 I will burn up the house of Jeroboam as one burns dung, until it is all gone.13 References for 1 Kings 14:10 11 Dogs14 will eat those belonging to Jeroboam who die in the city, and the birds of the air15 will feed on those who die in the country. The LORD has spoken!' References for 1 Kings 14:11 References for 1 Kings 14:13 References for 1 Kings 14:14 • a 14:14 - The meaning of the Hebrew for this sentence is uncertain.
global_05_local_5_shard_00000035_processed.jsonl/30227
Exodus 33 CSB The Tent Outside the Camp 1 The Lord spoke to Moses: "Go, leave here, you and the people you brought up from the land of Egypt, to the land I promised to Abraham, Isaac, and Jacob, saying: I will give it to your offspring. References for Exodus 33:1 2 I will send an angel ahead of you and will drive out the Canaanites, Amorites, Hittites, Perizzites,a Hivites, and Jebusites. References for Exodus 33:2 • a 33:2 - Sam, LXX include Girgashites 3 [Go up] to a land flowing with milk and honey. But I will not go with you because you are a stiff-necked people; otherwise, I might destroy you on the way." 4 When the people heard this bad news, they mourned and didn't put on their jewelry. 5 For the Lord said to Moses: "Tell the Israelites: You are a stiff-necked people. If I went with you for a single moment, I would destroy you. Now take off your jewelry, and I will decide what to do with you." 6 So the Israelites [remained]stripped of their jewelry from Mount Horeb [onward]. 9 When Moses entered the tent, the pillar of cloud would come down and remain at the entrance to the tent, and [the Lord] would speak with Moses. The Lord's Glory 12 Moses said to the Lord, "Look, You have told me, 'Lead this people up,' but You have not let me know whom You will send with me. You said, 'I know you by name, and you have also found favor in My sight.' References for Exodus 33:12 13 Now if I have indeed found favor in Your sight, please teach me Your ways, and I will know You and find favor in Your sight. Now consider that this nation is Your people." 14 Then He replied, "My presenceb will go [with you], and I will give you rest." References for Exodus 33:14 • b 33:14 - Dt 4:37; Isa 63:9 15 "If Your presence does not go," Moses responded to Him, "don't make us go up from here. 16 How will it be known that I and Your people have found favor in Your sight unless You go with us? I and Your people will be distinguished [by this] from all the other people on the face of the earth." 17 The Lord answered Moses, "I will do this very thing you have asked, for you have found favor in My sight, and I know you by name." 18 Then Moses said, "Please, let me see Your glory." References for Exodus 33:19 21 The Lord said, "Here is a place near Me. You are to stand on the rock, 23 Then I will take My hand away, and you will see My back, but My face will not be seen."d References for Exodus 33:23
global_05_local_5_shard_00000035_processed.jsonl/30237
Figure 8. Spatial representation of the mutated sections. The positions of key fragments are indicated within the native mature CB protein. These are the globular domains of the light chain, the heavy chain, and two subunits CB(HCN') and CB(HCC'). The figure serves for illustrational purposes only and does not represent the authentic conformation of the fragments. Download authors' original image
global_05_local_5_shard_00000035_processed.jsonl/30286
Letters Prisons and health Availability of junk food should be reduced BMJ 2012; 345 doi: http://dx.doi.org/10.1136/bmj.e7070 (Published 24 October 2012) Cite this as: BMJ 2012;345:e7070 1. Jonathan Tammam, research scientist1, 2. Louise Gillam, former research assistant1, 3. Bernard Gesch, senior research scientist1, 4. John Stein, professor of neuroscience1 1. 1Department of Physiology, Anatomy, and Genetics, University of Oxford, Oxford OX1 3PT, UK 1. jonathan.tammam{at}dpag.ox.ac.uk Prison inmates rely on two sources of food—main meals (provided by the prison) and items purchased from the canteen,1 2 the penal equivalent of a convenience store. Prison meals meet nutritional guidelines, but purchased items—much of it “junk” food—may not.3We analysed macronutrient and energy content of food available in a canteen from … Sign in Log in through your institution Free trial Sign up for a free trial
global_05_local_5_shard_00000035_processed.jsonl/30307
The Radio Boys on the Mexican Border eBook “None of that,” commanded Jack, sternly.  “Up with them quick or I’ll shoot.” Three pairs of hands were unwillingly elevated.  Two of the men wore sheepskin jackets and leather helmets and the boys surmised correctly that they had been up in the airplane.  Bob felt certain they were Morales and Von Arnheim, the two who had made the trip to the East to steal Mr. Hampton’s papers and whom he had foiled in that purpose, but who had succeeded in stealing the airplane and making their way to Mexico in it.  The other was a rangy man of about twenty-six, keen and shrewd-looking, and had the appearance of an American.  Evidently he was the guardian of the cave.  And it was he who had moved to draw his weapon when surprised.  A tough customer and one to be watched, thought the boys. “Face about,” ordered Jack. They obeyed. “Keep them covered, Tom,” Jack then commanded.  “Well search them.” With weapons held ready, the three boys advanced.  At that moment, the caretaker of the cave took one step forward and instantly the lights in both rooms faded out and the cave was in inky darkness. He had pressed a button in the floor, switching off the lights. The boys were so taken by surprise that for a moment they did not fire.  Neither did Tom, for fear of hitting them as they were in front of him.  This gave their three enemies an opportunity to shift position and fling themselves prone. When after their surprise, the boys did fire, their bullets merely pinged against the distant wall and did no damage.  But the flash of their weapons betrayed their positions and answering bullets came uncomfortably close.  One swept Jack’s hat from his head. From behind them Tom Bodine’s revolver spoke, as the enemy thus betrayed themselves.  The soft thud of a bullet striking flesh, a groan, choked off in the middle, a hasty scrambling to get away from the danger point on the part of the man struck, then silence. This silence was so profound the boys seemed to hear the beating of their own hearts, and tried to hold their breath for fear of betrayal.  They had thrown themselves prone after the first volley and lay so close they were touching, Jack in the middle. Each side was fearful now of firing at the other, lest the flashes give their position and an answering bullet find its mark. Jack thought quickly.  Putting his lips to the ear of each of his companions in turn, he whispered:  “Wait till I get Tom and come back.  Then we’ll make our way to the entrance.” Each signified by the pressure of a hand that he understood.  Certainly it would not do to have the enemy escape and thus cut them off in the cave! Slowly, carefully, noiselessly, Jack wormed his way to the rear and when he considered he must be in Tom Bodine’s neighborhood he began whispering in a tone that could not be heard more than three feet away:  Project Gutenberg Follow Us on Facebook
global_05_local_5_shard_00000035_processed.jsonl/30308
Tevye the Dairyman and the Railroad Stories Quiz | Four Week Quiz B Buy the Tevye the Dairyman and the Railroad Stories Lesson Plans Name: _________________________ Period: ___________________ This quiz consists of 5 multiple choice and 5 short answer questions through Burnt Out, pp. 247-255, Hard Luck, pp. 255-259. Multiple Choice Questions 1. Where are the Cossack in The Wedding That Came Without Its Band from? (a) Schtevka. (b) Zhmerinka. (c) Tulchin. (d) Kaminka. 2. What language does Paysi learn as a youth in addition to his own? (a) French. (b) Spanish. (c) English. (d) German. 3. Why does the thief claim to have no luck? (a) He can never sell his stolen goods. (b) He cannot support his family. (c) He always gets caught. (d) He can never find things to steal. 4. What type of coat does the narrator wear in High School? (a) Mink. (b) Lambskin. (c) Skunk-fur. (d) He wears no coat, only a heavy sweater. 5. Where does Mendl hide Tevye's money so that no one would steal it from him on his journey? (a) He ties it to his belt. (b) He sews it into his breast pocket. (c) He puts it in his hat. (d) He hides it in his shoe. Short Answer Questions 1. Before her adoption, how is the girl Rayzl related to her adopted father? 2. Why isn't the end of Kivke's story disclosed? 3. Who does Tevye sell his house to? 4. How many Jews are admitted into the high school in High School? 5. What does Golde prepare for Ahronchik and his friend on their visit over the holiday to Tevye's house? (see the answer key) This section contains 271 words (approx. 1 page at 300 words per page) Buy the Tevye the Dairyman and the Railroad Stories Lesson Plans Tevye the Dairyman and the Railroad Stories from BookRags. (c)2015 BookRags, Inc. All rights reserved.
global_05_local_5_shard_00000035_processed.jsonl/30330
Definition of Lately 1. Not long ago; recently; as, he has lately arrived from Italy. Lately Quotations Franz Kafka Charles Darwin Have you listened to the radio lately? Have you heard the canned, frozen and processed product being dished up to the world as American popular music today? Billy Joel One of the things I've started doing lately is tracking my dreams. I feel like there's a lot of information there and you can really bring those emotions to the situations that may feel mundane or familiar. That gives them new life and gives you a new relationship with it - if that makes any sort of sense. Jennifer Carpenter Merle Haggard More "Lately" Quotations Lately Translations lately in Dutch is de laatste tijd, recentelijk lately in Norwegian is i det siste lately in Portuguese is ultimamente Copyright © 2001 - 2015 BrainyQuote
global_05_local_5_shard_00000035_processed.jsonl/30333
Film by Kazan [1949] Thank you for helping us expand this topic! This topic is discussed in the following articles: • discussed in biography Elia Kazan: Films of the 1940s ...contemporary audiences, though 21st-century viewers might find it less shocking. Gregory Peck plays a journalist who poses as a Jewish man to experience and expose discrimination. Pinky (1949) was yet another Zanuck-produced “social problem” film, this time about a light-skinned African American woman (Jeanne Crain) who returns to her Southern hometown after... • Moss Carlton Moss ...of the heroism and dignity of its black characters is regarded as a touchstone of African American filmmaking. Moss collaborated on the script for director Elia Kazan’s film Pinky (1949) but left the project, angered at what he feared would be the film’s degrading portrayal of its black characters. Moss went on to make countless industrial films as well as... • Waters Ethel Waters MLA style: "Pinky". Encyclopædia Britannica. Encyclopædia Britannica Online. APA style: Pinky. (2015). In Encyclopædia Britannica. Retrieved from Harvard style: Pinky. 2015. Encyclopædia Britannica Online. Retrieved 03 June, 2015, from Chicago Manual of Style: Encyclopædia Britannica Online, s. v. "Pinky", accessed June 03, 2015, Editing Tools: We welcome suggested improvements to any of our articles. • MLA • APA • Harvard • Chicago You have successfully emailed this. Error when sending the email. Try again later. (Please limit to 900 characters) Or click Continue to submit anonymously:
global_05_local_5_shard_00000035_processed.jsonl/30334
Justus, baron von Liebig German chemist Justus, baron von Liebig,  (born May 12, 1803, Darmstadt, Hesse-Darmstadt [Germany]—died April 18, 1873, Munich, Bavaria), German chemist who made significant contributions to the analysis of organic compounds, the organization of laboratory-based chemistry education, and the application of chemistry to biology (biochemistry) and agriculture. Training and early career Liebig was the son of a pigment and chemical manufacturer whose shop contained a small laboratory. As a youth, Liebig borrowed chemistry books from the royal library in Darmstadt and followed their “recipes” in experiments he conducted in his father’s laboratory. At the age of 16, after studying pharmacy for six months under the tutelage of an apothecary at Heppenheim, he persuaded his father that he wanted to pursue chemistry, not the apothecary trade. In 1820 he began his study of chemistry with Karl Kastner at the Prussian University of Bonn, following Kastner to the University of Erlangen in Bavaria, where Liebig ultimately received his doctorate in 1822. His diligence and brilliance was noticed by the Grand Duke of Hesse-Darmstadt and his ministers, who funded his further chemistry studies under Joseph-Louis Gay-Lussac in Paris between 1822 and 1824. While in Paris, Liebig investigated the dangerous explosive silver fulminate, a salt of fulminic acid. Concurrently, the German chemist Friedrich Wöhler was analyzing cyanic acid. Liebig and Wöhler jointly realized that cyanic acid and fulminic acid represented two different compounds that had the same composition—that is, the same number and kind of atoms—but different chemical properties. This unexpected conclusion, which was later codified under the concept of isomerism by the Swedish chemist Jöns Jacob Berzelius, led to a lifelong friendship between Liebig and Wöhler and to a remarkable collaborative research partnership, frequently conducted via correspondence. Liebig’s scientific work with fulminates, together with his fortunate meeting with the influential German naturalist and diplomat Alexander von Humboldt, who was always keen to patronize younger talent, led to Liebig’s appointment at the small University of Giessen in May 1824. As Liebig later observed in his fragmentary autobiography, “at a larger university, or in a larger place, my energies would have been divided and dissipated, and it would have been much more difficult, perhaps impossible, to reach the goal at which I aimed.” What made you want to look up Justus, baron von Liebig? (Please limit to 900 characters) Please select the sections you want to print Select All MLA style: "Justus, baron von Liebig". Encyclopædia Britannica. Encyclopædia Britannica Online. APA style: Justus, baron von Liebig. (2015). In Encyclopædia Britannica. Retrieved from http://www.britannica.com/EBchecked/topic/339838/Justus-baron-von-Liebig Harvard style: Justus, baron von Liebig. 2015. Encyclopædia Britannica Online. Retrieved 03 June, 2015, from http://www.britannica.com/EBchecked/topic/339838/Justus-baron-von-Liebig Chicago Manual of Style: Encyclopædia Britannica Online, s. v. "Justus, baron von Liebig", accessed June 03, 2015, http://www.britannica.com/EBchecked/topic/339838/Justus-baron-von-Liebig. We welcome suggested improvements to any of our articles. Justus, baron von Liebig • MLA • APA • Harvard • Chicago You have successfully emailed this. Error when sending the email. Try again later. Or click Continue to submit anonymously: