id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_05_local_5_shard_00000035_processed.jsonl/33135
|
Teaching and Modeling with XML Schema
R. Alexander Milowski
Center for Document Engineering
School of Information Management and Systems
University of California, Berkeley
Table of Contents
This report is based on both the experiences of teaching[6] XML Schema in the graduate program at UC Berkeley's School of Information Management and Systems (SIMS)[7] as well as the use, by the author, of XML for modeling document for Mathematics. The Center for Document Engineering[8] teaches graduate students in the SIMS program very detailed knowledge of XML technologies and their applications. Each year, the students complete masters projects--many of them heavily using XML. Typically, modeling XML documents is at the core of these projects and so XML Schema has been used quite extensively.
XML Schema is taught at multiple levels within the XML-related courses at SIMS and we've noticed consistent stumbling blocks that the students struggle with as they develop their understanding. Some of these are just adjusting to the process of modeling and typing XML while learning a new syntax. On the other hand, some of these problems relate to areas in which XML Schema could use improvement.
Also, the author has been using XML Schema in several projects relating to encoding of Mathematical documents [1] and computations [2]. These Mathematics applications make heavy use of XML and all have XML Schemata associated with their data. Many of the type systems in these applications make heavy use of substitution groups successfully.
This report attempts to enumerate the issues with teaching, using, and modeling with XML Schema from both the perspective of the new and experienced user.
One of the hardest things to explain in XML Schema is what namespace is associated with an element, its contained content, and attributes given a type definition. The undecorated name in the element syntax that names a declaration or definition is typically misleading to the author of the schema. Only after a user has become experience in reading the XML Schema syntax do they understand the use of QNames and NCNames in declarations or definitions.
While some of this can be explained as just getting used to a new syntax, there is one critical point that should be made. When a definition of a type is made, its local declarations take the namespace of the containing schema document (e.g. the targetNamespace on the [xs:]schema ancestor). This means you need to make a "careful dance" if you want to have types in their own namespaces.
People who come from programming languages like Java where everything is placed in a package will naturally gravitate towards making type libraries where the target namespace is different for the different type libraries. Unfortunately, those same people will gravitate towards making local element declarations as well. When those elements are qualified, they've just associated an element with the type's namespace and not necessary with the namespace they expect to use in their document. It is even worse that when they aren't qualified that they have no namespace.
An example might clarify the problem. Suppose we create a type library with a base type as follows:
<xs:complexType name="Person">
We then create another schema document which uses that library and extends it:
<xs:import namespace="http://www.example.com/schemata/people/2005"/>
<xs:complexType name="PersonWithNickname">
<xs:extension base="base:Person">
<xs:element name="nickname" type="xs:string"/>
Finally, we author the schema for the document uses this type library:
<xs:import namespace="http://www.example.com/schemata/people/extended/2005"/>
<xs:element name="person-list">
<xs:element name="person" type="people:PersonWithNickname" maxOccurs="unbounded"/>
The confusing part is what the instance looks like. The root element and contained element have the namespace of the document. Unfortunately, the 'name' and 'nickname' elements are forced to use the namespace of type libraries in which they were declared. As a result, we get three namespaces in the observed document:
<d:person-list xmlns:d="http://www.example.com/schemata/people-list/2005"
<p:name>R. Alexander Milowski</p:name>
This "rainbow of namespaces" is confusing. In fact, it typically is not what the schema author intended. Then then need to completely re-organize their type definitions to get one namespace but there is no way to have type definitions in their own namespace and have all the elements in one document namespace.
What is really wanted here is to have "structural types" for which the local element declarations take on some enclosing namespace. This can be approximated by changing the imports to includes. The problem is that if two schemata with different namespaces include these definitions, a processor cannot tell that they are the same definition by the type name. Even though the definition is exactly the same and the structures are isomorphic, the type names are different.
This is a real problem for usability in that people will often develop type libraries and assign them namespaces. They might even go further and assign different namespaces within their library. They will not necessarily realize what they have done to the instance until later.
My recommendation to schema authors is to start with the instance and understand what elements and attributes you want to appear and decide what namespaces they should use. Then make you schema conform to that. That is, don't do anything that would force strange uses of namespaces. But this may force the schema author to create types in a way that they might not want to. That is, to not take advantage of typing facilities because they would cause extra namespaces in the observed document.
The rational for this recommendation is that the XML document is what programs process and what people author. The more namespaces you have, the more difficult it becomes to produce or process and so more errors may be introduced.
One of the most difficult challenges in using XML Schema validation has been configuring the different tools to find the correct schema documents. Although simple applications can use xsi:schemaLocation attributes, this does not work for interchange situations (e.g. web services, content management systems, etc.) where the authored xsi:schemaLocation attribute is usually incorrect.
A partial solution to this is to use OASIS XML Catalogs[5] for schema location. This has been implemented in Xerces[3] and Netbeans[4] as well as other products. This works quite well except that:
1. There is no way to map the "no namespace" to a schema document.
2. Strange things happen to URNs (e.g. they translate to ISO public identifiers).
3. It isn't clear that every declaration in a catalog relates to a schema.
Further, there is a real need to be able to package a set of schema documents and identify their namespaces so that an application knows what types, elements, attributes, etc. should be available for a particular domain. I call this a "universe". That is, a set of self-consistent definitions and declarations that represent the "known world".
This packaging of a set of schema documents could be as simple as an enumeration of namespace to document mapping that allows the "no namespace" schema:
<schema-set name="mathdoc">
<schema namespace='http://www.mathdoc.org/schema/paper/2005/us' src='paper.xsd'/>
<schema namespace='http://www.mathdoc.org/schema/thesis/2005/us' src='thesis.xsd'/>
<schema namespace='http://www.mathdoc.org/schema/problemset/2005/us' src='problemset.xsd'/>
<schema namespace='http://www.mathdoc.org/schema/solutionset/2005/us' src='solutionset.xsd'/>
<schema namespace='http://www.mathdoc.org/schema/slides/2005/us' src='slides.xsd'/>
<schema namespace='http://www.mathdoc.org/schema/syllabus/2005/us' src='syllabus.xsd'/>
<schema namespace='http://www.mathdoc.org/schema/review/2005/us' src='review.xsd'/>
Optionally, it would be really nice for applications to identify the root elements that should be allowed:
<schema-set name="mathdoc"
<root name="p:paper"/>
<root name="t:thesis"/>
Substitution groups are fantastic tools but they are limited in a number of ways:
1. There is no declaration of the substitution group. Schema tools must search for the occurrence of the substitutionGroup attribute.
2. There is no way for an element to belong to more than one substitution group.
3. There is no way to refer to a substitution group within a content model and make exceptions for validation (e.g. the substitution group xhtml:inline except xhtml:b or xhtml:i).
One solution to this is to make substitution groups their own definition and then allow the substitutionGroup attribute to be a list of QName values.
Substitution groups are very important for type-based modeling of XML documents. The substitution groups allows similar functionality of generics in programming language type systems--which has been recently added to the Java type system. That is, they let you declare a complex type that has a slot whose members must conform to some base type. Subsequently, any member of the substitution group can be placed in that slot without special syntax (i.e. no xsi:type).
The main problem is that because they aren't defined with their own definition, they are somewhat obscure to the new or experienced user. In addition, you can't make something part of a new substitution group without changing the original definition. This limits re-purposing of schema declarations and severely limits substitution groups.
5.1. A Rational Built-in Simple Type
The fact that XML Schema doesn't allow rational numbers to be typed is almost like leaving out the number zero. Decimal numbers are wholly insufficient for representation of exact numbers.
Let's not make comparisons to programming languages like Java. They too forgot rational numbers. Fortunately, as Java is a programming language, you can add rational numbers into the language as a class. You cannot add rational numbers into XML Schema as a primitive datatype.
There are plenty of situations where you need rational numbers. Because they aren't part of the XML Schema simple type system, they can't be sorted or compared in languages like XSLT or XQuery. You must first convert them to a floating point approximation to get them to sort correctly.
5.2. Restricting Simple Content Complex Types
If you extend a simple type to add an attribute there is no way to further restrict the simple typed content. It would be very nice to be able to restrict the simple type content of a complex type whose content is a simple type restriction.
5.3. Wildcard Control
Wildcard control is very insufficient. They following cases really need to be covered:
• Anything but a list of excluded namespaces.
• Exclusions of certain elements from a particular namespace.
• Pattern matching on a namespace name (e.g. anything from my domain).
5.4. Elements at the Top Level of Content Models
The restriction of not allow element or any at the top of a content model seems arbitrary. If there is a technical reason, then it could easily be solved by saying that an element at the top-level of a content model is automatically wrapped in a sequence. This is a common error by new and experienced users.
5.5. Attributes Dictating Content Models
There are many situations (e.g. ATOM) where an attribute value dictates the content model of an element. That is, for the particular value of an attribute, only specific content may appear. It would be nice to map these attribute values to different complex types rather than force the modeler to "union" the types and then have application-level validation of the structure of the element.
An example of this is the 'content' element from ATOM[9]. The 'type' attribute controls what content can be contained according to some rules. The following is a short list of some of those rules:
1. When type='text', the content must be a string.
2. When type='xhtml', the content must be an XHTML div element.
3. When type='text/xml' the content must be well-formed XML.
A schema author could easily write a type for each of those rules:
1. When type='text':
<xs:extension base="xs:string">
<xs:attribute name="type" type="xs:string" fixed="text"/>
<xs:element ref="xhtml:div"/>
<xs:attribute name="type" type="xs:string" fixed="xhtml"/>
<xs:any namespace="##other" maxOccurs="unbounded"/>
<xs:attribute name="type" type="xs:string" fixed="text/xml"/>
And then validation should choose between these types based on the attribute value of 'type'.
5.6. "Some of These" Models
There is a real need to have a variant of 'all' where:
• Everything is optional.
• But something must occur.
That is, all the elements can occur in any order, they are all optional, but the containing element cannot be empty.
At the Center for Document Engineering, we have been successful at both teaching and using XML Schema. As a whole, it is not as bad as many people believe. But XML Schema does have rough edges.
The largest and most difficult part of teaching XML Schema is explaining how namespaces interact with schemata, schema documents, and definitions vs declarations, and the instance. Much of the want to fix the problem described in section 2 is about lessening this problem.
Also, fixing the configuration and deployment aspects of XML Schema described in section 3 by providing a standard and reasonable alternative to xsi:schemaLocation will help enormously. New users have a very difficult time configuring tools to find their schema documents. They often turn to xsi:schemaLocation to fix this only to put off the real problem of schema location till deployment.
Finally, promoting substitution groups to their own definition will make them far less opaque. They are very misunderstood and that is partially do to the fact that they have no explicit definition. Yet, they are very important to type-oriented XML.
1. R. Alexander Milowski , Mathdoc Schemata , http://www.milowski.com/xml/schemata/mathdoc/ , 2005
2. R. Alexander Milowski , Monos Algebra Software , http://www.milowski.com/software/monos/ , 2005
3. Xerces Java 2 , Apache Foundation, http://xml.apache.org/xerces2-j/ , 2005
4. Netbeans 4.0 , Sun Microsystems, http://www.netbeans.org , 2005
5. Norman Walsh , XML Catalogs , OASIS, http://www.oasis-open.org/committees/entity/spec.html , 2001
6. R. Alexander Milowski , XML and Related Technologies , School of Information Management and Systems, http://www.sims.berkeley.edu/academics/courses/is290-14/s05/ , 2001
7. School of Information Management and Systems , http://sims.berkeley.edu , 2005
8. Center for Document Engineering , http://cde.berkeley.edu , 2005
9. M. Nottingham R. Sayre , The Atom Syndication Format , http://www.ietf.org/internet-drafts/draft-ietf-atompub-format-09.txt , 2005
|
global_05_local_5_shard_00000035_processed.jsonl/33136
|
From W3C eGovernment Wiki
Revision as of 18:58, 10 February 2010 by Dbennett (Talk | contribs)
Jump to: navigation, search
Draft Agenda for February 17th
By teleconference and IRC
• Introductions (5 min)
• Discussion of Scope and Interests of Participants(10 min)
• Discussion of Statement of Work for this Project (10)
• Identifying Resources and Project Management for this Project (10)
• Work on First Project Step (15 min)
How-to join - Phone
eGov IG teleconferences information
Day: Wednesdays (every other week)
Time: 9:00-10:30 EST (lookup other timezones)
For project meeting times, see Projects. Other information is the same.
Phone number: +1.617.761.6200 (Boston) or + (Nice) or +44.117.370.6152 (Bristol)
Conference code: 3468 ("EGOV")
Please, remember to dial "#" right after the conference code. If everything goes well, you should hear a beep meaning you've just joined the conference, and could hear other participants.
The teleconference system at W3C is called Zakim. There are more detailed instructions on how to use it. Zakim has an accompanying and useful IRC bot. Please read next section to learn more about it.
eGov IG Teleconference IRC information
Port: 6665 (try port 80 if you have trouble)
Channel: #egov
|
global_05_local_5_shard_00000035_processed.jsonl/33147
|
Congratulations, “selfie.” You are the Word of the Year. Oxford Dictionaries, which awarded you the title, defines you as “a photograph that one has taken of oneself, typically one taken with a smartphone or webcam and uploaded to a social media website.”
But this isn’t just a word for 2013. This is a word for all time.
In honor of the day, here is a rundown of the selfie through history.
Millions of Years B.C.: Trilobite, trying to get its reflection from a better angle, accidentally falls into lava and preserves itself forever.
Either 6000ish Years Ago At 9 In The Morning Or Millions Of Years, Depending On Your Theology: God creates man in God’s image. This is the first — but not the last — selfie not to live up to the expectations of its creator.
Centuries Ago In Mythology Time: Narcissus composes the perfect selfie by staring into stream until he wilts away into a daffodil.
Lascaux Cavern: Area cave painter painstakingly scratches selfie onto rock wall of cave. “That looks like a duck,” his friend says. “That is my picture face,” the artist replies, indignantly. “I know when I look good.”
15th and 16th Centuries: Leonardo Da Vinci gets in on the selfie movement with this sketch. Michelangelo tries to get in on it as well but is impeded by the fact that, as a sculptor, he primarily works in marble and keeps dropping the chisel on his foot.
17th Century: Rembrandt masters the selfie. Later scholars, leafing through Rembrandt’s elaborate oeuvre of self portraiture, “liked” the images but wondered aloud why Rembrandt never had anyone else around to take these things, like maybe some of those guys from the Night Watch or something. (Here’s Rembrandt mastering the duck face.)
(image via wikimedia commons)
(image via wikimedia commons)
19th Century: Matthew Brady attempts to take some selfies with recently discovered photography equipment but, unable to tell where he is pointing the camera, keeps accidentally taking pictures of the area just over his shoulder and to the left. He passes these off as Innovative Landscapes of Civil War Dead.
19th Century, But In Europe: Vincent Van Gogh paints a lot of innovative selfies. Destroys note to Theo explaining that “this one looks more like a duck because there’s no ear in it ducks don’t have ears.”
20th Century: A combination of Polaroids and timers make selfies available to a wide range of Americans, who still mostly prefer to reserve them for things like Christmas Pictures In Coordinated Sweaters.
Early 21st Century: The addition of cameras to all phones makes photographers out of everyone. I’m sorry, not photographers but people who think they are photographers and keep ruining what you thought was a classy Halloween party by murmuring “Diane Arbus, Eat Your Heart Out” under their breath as they take snaps.
Slightly Later But Still Early 21st Century: The combined trends of Increasing Need to Look Cool For Your Internet Friends and Decreasing Supply Of Real Friends leads to a new golden era of selfie-taking. “Classic photos have been taken of every place on earth,” people reason, sensibly. “But not with me in them! I must change that!”
2013: Selfie awarded Word of the Year.
|
global_05_local_5_shard_00000035_processed.jsonl/33152
|
Editors' pick
All-ACC Happy Hour
Editorial Review
As Maryland alumni, the three of us are not exactly overflowing with confidence about the Terps' chances on the gridiron this season. (If we squeak a bowl bid, we'll be ecstatic.) But with opening weekend of the college football season upon us, we're looking forward to the All-ACC Happy Hour at Public Bar. Alumni groups from every university in the conference have been invited, so wear your colors and get ready to talk some trash. (Unless, of course, you're Wake Forest. Zing!) Doors open at 6 p.m., and happy hour specials include $3 domestic beers, $4 imports and $5 rail drinks.
|
global_05_local_5_shard_00000035_processed.jsonl/33157
|
Thirty years after he left the White House and nine years since his only previous visit to Cuba, Jimmy Carter arrived in Havana last week, wearing the white guayabera that would serve as his uniform during a three-day visit to our island. Watching on television, I recalled how toward the end of his presidency — just as I was starting kindergarten — I learned to scream my first anti-imperialist slogans while thinking of his blue-eyed face.
In the 1970s, the newspaper Granma mocked his background as a peanut farmer. Soon, however, the Castro regime launched more than grievances and caricatures at the U.S. president. In 1980, the Mariel Boatlift sent more than a hundred thousand of our compatriots to his shores, including prisoners and mental patients rushed to the port from Cuba’s jails and asylums.
Those same sad days brought the birth of “repudiation rallies,” with mobs throwing stones, eggs and excrement and spitting on the “infamous traitors” boarding those boats because they couldn’t stand to wait any longer for the promised island paradise.
The pressure of such a flood forced Carter to close the doors to immigrants, handing that battle to Fidel Castro, who screamed “Let the scum go! Let them go!” as he masked ideological extremism under the pose of revolutionary euphoria.
Carter’s mishandling of that immigration crisis, some say, is among the reasons he was not reelected.
Some 20 years later, our media did an about-face and began referring to the former U.S. commander in chief as Mr. Carter. When he visited in 2002 he was introduced as a friend of our Maximum Leader. We who had once insulted him at school assemblies were confused by the red-carpet treatment afforded the man who was once our greatest enemy.
On that visit, as on his recent one, Carter met with government figures but also with opposition groups demonized and outlawed by the authorities. For a moment, we almost thought the world might have changed when Carter spoke before national television cameras in the Great Hall at the University of Havana. It was from his lips that we Cubans heard for the first time about the Varela Project, an effort by Oswaldo Paya to collect signatures for a referendum to amend the Cuban constitution to recognize our basic human rights, including freedom of expression and association.
But the moment was fleeting. Within a few months of Carter’s departure, a series of arrests known as the Black Spring took place across our country. Long prison sentences resulted for 75 dissidents and independent journalists, particularly those who had gathered signatures.
Last week, Carter met with Raul Castro in a formal government setting and with Fidel Castro, casually and at length in his living room.
As before, the regime pretended to show a tolerant face. Raul apparently gave the order not to interfere with the Nobel peace laureate’s early-morning breakfast with a few of us alternative bloggers who, just days earlier, had been demonized on official television as “mercenaries of the empire.”
Also on Carter’s agenda were just-released prisoners of the Black Spring, at least those who were not forced into exile, and their brave wives — known here as the Ladies in White — who never stopped marching for their husbands’ freedom, stoically facing down the repudiation rallies.
As before, Carter found points on which to praise the government, but it all sounded more like diplomatic formalities than real points of consensus.
The big question is whether the presence of the former U.S. president in our complex national situation will change anything. While I don’t believe we will move from a totalitarian state to a democracy by the mere fact of his visit, some acts have a symbolic significance that transcends their purposes.
His willingness to meet with bloggers and other representatives of our country’s emerging civil society extends some ephemeral mantle of protection. It proves that a bubble of respect is possible and that the shock troops who act against the activities of the dissidents are neither spontaneous nor autonomous but a formal arm of the regime. Carter’s willingness to hear our concerns forced Cuban authorities to inadvertently validate us and to acknowledge that there are other voices.
But there must be no illusions. Never mind that Carter proclaimed the innocence of jailed American Alan Gross, who was sentenced to 15 years for sharing technology to provide Internet access to Jewish groups in Cuba, nor that he stated that Cubans should be able to freely leave and enter the country. Carter will not succeed in creating changes we ourselves have not set in motion. And on this island where objectivity finds no middle ground, it seems we must wait for an entire family to die before anything can happen.
Yoani Sanchez is a writer in Cuba. Her awards include the 2010 World Press Freedom Hero award. She blogs at generationy and is the author of “Havana Real: One Woman Fights to Tell the Truth About Cuba Today.” This column was translated from Spanish by M.J. Porter.
|
global_05_local_5_shard_00000035_processed.jsonl/33183
|
I' have website design but now I want to code it, I have good knowledge of HTML / HTML5 and CSS, but little in PHP. My question is how can I start coding my website with PHP do I actually code the entire website with PHP or combined?
What I think is I would start to layer out each page with HTML and CSS and after that I move on to PHP, creating login system, and other dynamic website functions and after that I styling each page.
Please correct me if I am wrong this is my first attempt in creating something serious.
|
global_05_local_5_shard_00000035_processed.jsonl/33185
|
Skip to content
Cancer Health Center
Font Size
Adult Acute Myeloid Leukemia Treatment (PDQ®): Treatment - Patient Information [NCI] - Changes to This Summary (08 / 07 / 2013)
Editorial changes were made to this summary.
Recommended Related to Cancer
This complementary and alternative medicine (CAM) information summary provides an overview of the use of PC-SPES as a treatment in people with cancer. The summary includes a brief history of PC-SPES research, the results of clinical trials, and possible adverse effects of PC-SPES. Included in this summary is a discussion of the contamination of PC-SPES and its withdrawal from avenues of distribution. This summary contains the following key information: PC-SPES is a patented mixture of eight...
Read the Overview article > >
WebMD Public Information from the National Cancer Institute
Last Updated: September 04, 2014
Next Article:
Today on WebMD
Colorectal cancer cells
A common one in both men and women.
Lung cancer xray
See it in pictures, plus read the facts.
sauteed cherry tomatoes
Fight cancer one plate at a time.
Ovarian cancer illustration
Real Cancer Perspectives
Jennifer Goodman Linn self-portrait
what is your cancer risk
colorectal cancer treatment advances
breast cancer overview slideshow
prostate cancer overview
lung cancer overview slideshow
ovarian cancer overview slideshow
Actor Michael Douglas
|
global_05_local_5_shard_00000035_processed.jsonl/33196
|
Skip to main content
The Mastersons - Words and Music - 2012
Wednesday at 9pm on Words and Music: It's a little bit Texas and a little bit Brooklyn, as The Mastersons perform songs from their debut.
Chris Masterson and Eleanor Whitmore each have long resumes in music, but the couple has just released their debut album as The Mastersons, called 'Birds Fly South', and they recently performed a few songs at FUV. Says host Claudia Marshall: 'Chris Masterson was wearing the geekiest glasses I think I have ever seen (high praise coming from me, as I have some pretty nerdy-looking vintage frames myself), and Chris and wife Eleanor also share my love of a pricey, British shoe designer. All of this to say that they seem to be tailor-made for their current home in Brooklyn rather than their home state of Texas, though they do return to Dallas for the holidays. No, Chris and Eleanor - gypsies like most musicians - fit in perfectly here in their adopted hometown, but their music often reminds me of the Minnesota-based Jayhawks. Geography and fashion aside, there is plenty to love about The Mastersons' Americana pop, but don't take it from me: Steve Earle likes them so much he added both to his band and even featured the duo during his last tour. High praise, indeed.' [recorded: 04/10/12]
|
global_05_local_5_shard_00000035_processed.jsonl/33203
|
Hi all on the boards
I'm ashamed to say that I have not played my Wii for some months now as i was moving/decorating a new house.
I have a european Wii & have the Wiikey installed.
Can i play an NTSC version of Pro Evolution Soccer.
I have only ever updated my Wii once & that was when i 1st got it.
Any help would be much appreciated.
|
global_05_local_5_shard_00000035_processed.jsonl/33212
|
How to Move From Being Busy to Actually Getting Things Done
by Megan Brame on 17 January 2014 1 comment
Today more than ever, we all seem to get busier and busier, with many feeling like they've become so busy that nothing productive actually gets done. If you're feeling like you're running around in circles, here are some tips on how to move towards getting more things done in the same amount of time. (See also: Do Less to Get More Done)
Keep To-Do Lists
By having an agenda of items to do each day or week, you can focus your attention towards what actually needs to be done. Keeping track of tasks on a list also helps to prioritize things to do and can help you better understand what may be triggering any feelings of anxiety or "over busyness." If you're a techie, there are apps for smartphones and tablets that are designed specifically as to-do lists, but if you're like me, there's no better satisfaction than being able to physically cross off completed tasks on your daily planner. (See also: Simple Ways to Make Your To-Do Lists More Effective)
Have Specific Work and Play Times
Learning to discipline yourself by limiting your time for tasks can help your mind focus on what needs to get done. By having work deadlines (and leisure deadlines), you are able to put your tasks into a specific window of time. Doing this mental exercise can also give you perspective on what tasks are taking the most time and which ones are trivial. Also, allow yourself to quit once the deadline comes. Give yourself time to hang out and unwind; it can help recharge your brain and lower stress. (See also: Want to Have Fun? Give Yourself a Deadline)
And Have Specific Email Time, Too!
Tim Ferriss, author of the 4 Hour Workweek, made the idea of getting away from email famous. He really pushed the idea of allowing yourself time away from unimportant emails by practicing what he preached: He will only check email twice a day, at 11 a.m. and 4 p.m. Incorporating a disciplined email schedule into your work day can help you avoid distractions and getting caught up in mundane tasks that are taking you away from what needs to get done. Set specific times for checking email and make sure to let your colleagues know that this will be happening.
Back Away From Social Media
Unless social media is part of your job, it's probably one of the biggest drains of time in your day. Everyone needs a break here and there from work, but until you have the discipline to allot small windows of time to Facebook and stick to that, it's best to go cold turkey and avoid social media and games until after your work window has passed. Also, if you have an iPhone, use the "Do Not Disturb" function (and if you don't have an iPhone — there are plenty of Do Not Disturb apps available), so that emergency calls can get through, but distracting texts and push notifications won't. (See also: How to Break Your Social Media Habit)
Learn to Delegate
We all like to feel needed, but we probably aren't as needed as we think. Start to take a look at your daily responsibilities and see if there are tasks that can be delegated to other capable individuals. (See also: How to Delegate at Work and Home)
Hiring a virtual assistant or bringing on a part-timer to do tasks around the office can free up your time to handle larger projects, which can help to close deadlines faster and help to pay for themselves in no time. Even if you don't have the authority to hire new employees or don't think you can bring on the expense of a virtual assistant, there may be tasks on your to-do lists that could be handled by a colleague or co-worker just as well as you've done.
Cancel Routine Meetings
Status meetings are useful — if there are statuses to be updated.
When I was a project manager for a website firm, the majority of my week was tied up in meetings about status updates for each client. Do you know what the majority of those meetings were actually about? Learning there weren't any new updates from the last meeting and that we were still on pace. It was frustrating to get pulled away from work for nothing. Having a meeting for the sake of having a meeting takes everyone away from their duties and stops the workflow.
If you have the ability to schedule meetings, limit status meetings to bi-weekly at most and notify your team that you're adhering to the idea that "no news is good news." If you can show your team that you trust them to do the job assigned, it will help them respect your position and know that you have faith that they can handle whatever comes their way. Just be sure to mention that you're there to help in emergencies. (See also: 7 Things to Change About Meetings)
If you're not able to cancel meetings, look at your schedule and decide if a meeting is important or if your time would be better spent working on your to-do list. Talk to your boss about your concerns regarding your use of time and ask if you could abstain from meetings where you don't feel you're able to contribute. If your boss doesn't budge, compromise with a request to stay for the first half of the meeting only.
How have you gone from busy to productive? How did you do it? Take a moment (but only one!) and share it with us in comments!
Around the web
Average: 5 (2 votes)
Your rating: None
1 discussion
Add New Comment
This test helps prevent automated spam submissions.
Guest's picture
Great advice Megan!
What has really helped me personally become more productive is doing the most meaningful task for the day the first thing I do when I start work. No distractions, no people, no social media, just me and my highest leverage task. Only when I am done, I open myself to the needs of others. This way I am absolutely sure that every day is a productive one, regardless of what happens later on in the day.
|
global_05_local_5_shard_00000035_processed.jsonl/33225
|
TY - VIDEO DB - /z-wcorg/ DP - http://worldcat.org ID - 38126983 LA - English T1 - Great American speeches ; 80 years of political oratory Program six Program six AU - Kennedy, Robert F., AU - Jordan, Barbara, AU - Cuomo, Mario Matthew. AU - Jackson, Jesse, AU - Reagan, Ronald. AU - Pieri & Spring Productions. AU - Films for the Humanities (Firm) PB - Films for the Humanities & Sciences CY - Princeton, N.J. Y1 - 1997/// AB - This series traces the history of visually recorded American oratory and discusses the evolution of how, through technology politicians present themselves to the public. Includes commentary and film clips with place each speech in historical perspective. Two speeches included are one for nonpartisan judgment at the Nixon Impeachment hearings by Barbara Jordan, and a 1984 campaign speech by Jesse Jackson. ER -
|
global_05_local_5_shard_00000035_processed.jsonl/33226
|
TY - ELEC DB - /z-wcorg/ DP - http://worldcat.org ID - 191856926 LA - English T1 - This far by faith. African-American spiritual journeys Part 5, Part 5, AU - Linson, Valerie. AU - Hampton, Henry, AU - Toussaint, Lorraine, AU - Blackside, Inc. AU - Faith Project, Inc. AU - Independent Television Service. AU - PBS Video. AU - OverDrive, Inc. PB - PBS CY - [Arlington, Va.] Y1 - 2007/// AB - "Inheritors of the Faith" plots the growth of the Nation of Islam under the leadership of Elijah Muhammad. After his death, his son, Warith, departs from his father's teachings and leads the Nation of Islam towards a more orthodox practice of Islam. ER -
|
global_05_local_5_shard_00000035_processed.jsonl/33240
|
Aim higher, reach further.
'Golf' With Sir Nick Faldo
Ralph Gardner Jr. Gets Some Tips From a British Open and Masters Champion
My friends were incredulous when they heard I was going to play golf with Sir Nick Faldo, the British Open and Masters golf champion from the '80s and '90s, former world No. 1 and these days an on-air golf analyst for CBS.
There were two major reasons for their incredulity. The first is that I don't play golf. The second is that I really don't play golf. On the rare occasions when I've tried, the results have been depressing, to say the least.
The columnist and Sir Nick Faldo boarded a helicopter in Manhattan that took them to Winged Foot Golf Club. ENLARGE
The columnist and Sir Nick Faldo boarded a helicopter in Manhattan that took them to Winged Foot Golf Club. Getty Images
When I say rarely, I mean I've played twice. The first time occurred when my friend Lloyd took me to a driving range. I'm not unathletic, generally speaking. I run; I play tennis. But within minutes it became obvious to Lloyd, who probably had hopes of grooming a golf buddy, that I was singularly inept.
I simply couldn't make contact with the ball, let alone send it soaring into the stratosphere the way professional golfers, or most anybody else, seems to be able to do after swatting at balls long enough.
When our outing was over, I felt bad for me but worse for him. He appeared crestfallen. I could tell it wasn't just because I'd never be able to play with him, but also because my incompetence probably shattered all his beliefs about practice, dedication and the perfectibility of the human species. Simply put, a chimp with a nine iron could have made better contact with the ball, and undoubtedly launched it farther.
My second attempt at the game occurred a couple of years ago, at an actual golf course in the Berkshires with my friends Tad and Bruce. That outing accomplished something important, though it wasn't teaching me how to play.
I got a glimmer of why people love to play the game, especially when the weather is cooperative. You're out in nature among friends, and not just nature but domesticated nature, though I suppose golfers who find their balls frequently in the rough don't feel as enamored of grass and trees as I do.
But I hardly played any better than I had with Lloyd. Again, my companions were impressed—by my lack of talent.
Add to their disbelief regarding my celebrity golf outing the fact that my companion was to be Sir Nick Faldo, rather than anybody else. I could tell that the mere mention of his name triggered something primal in the male golfer psyche. They weren't just impressed by his stats—he won six majors—but also by his honesty and irreverence as a sportscaster, and his burgeoning business empire. It includes designing golf courses, starting a nonprofit that trains young golf talent and lending his name to apparel and golf clubs. Sir Nick is apparently the quintessential alpha male.
Lloyd even sent me a mash note to pass along to him. "I can't believe my friend, Ralph, gets to hang out with you for a day," it started. "I have been saying for years that I would love to play a round of golf with Sir Nick Faldo." The note concluded with Lloyd inviting him to do just that.
The golf great attempted to share some pointers about the sport. ENLARGE
The golf great attempted to share some pointers about the sport. Getty Images
Sir Nick accepted the compliment with equanimity. I also had someone take our picture on my cellphone just to prove I'd met him and, later in the day after we'd bonded (though I should only speak for myself), I had the golfer sign a couple of balls for my friends.
Bruce had also sent along his encouragement as I headed to the 34th Street heliport, where Sir Nick and I were to board a helicopter for the short ride to the Winged Foot Golf Club in Westchester. "At least you got a good day for it," Bruce wrote. "Too bad there is no wind. It would affect the others but your shots would be closer to the ground."
I wasn't intimidated to be playing with Sir Nick Faldo. Or, I should say, no more intimidated than I would be with any other stranger who might find my incompetence uncompelling. My only goal was simply not to suck, not to be such an albatross that I destroyed everybody's good time; I feared that, given my skills, by nightfall we might have made it no further than the fifth hole.
In fact, I'd made it clear from the start to Glenmorangie, the whiskey that organized the outing, and for which Sir Nick serves as brand ambassador, that I didn't play golf. Nonetheless, they wrote back asking for my handicap. I reiterated my inexperience, and wondered whether there might yet be time to bow out. If I had a handicap, it would probably be somewhere in the 5,000 range, because that's how often I whiff the ball.
Sir Nick seemed like a decent guy, even if he yawned a lot. I learned he'd been giving interviews since the crack of dawn. It seems that after playing not much more than a dozen times a year lately, he's going to test his luck at the Open Championships in Scotland next month—considered an act of courage or bravado, though no more so, in my opinion, than me imposing myself on actual golfers.
I was particularly impressed by Sir Nick's physique. I've always thought of professional golfers as slight, as athletic everymen. But Nick is built like an NFL quarterback—6-foot-3, broad-shouldered and, even at 55 years old, all muscle.
After we arrived at Winged Foot—considered one of the world's most celebrated and challenging golf courses, though they're all equally challenging to me—we had a light lunch and headed out to the driving range to warm up.
Sir Nick, who'd boldly claimed back at the heliport that he could teach me the game in a day, tried to show me how to grip a club. But I couldn't even follow those simple instructions: something about inserting the pinkie of your right hand between the index and middle fingers of your left hand and then locking your hands around the club.
I recognized something in his face that I also had seen when Lloyd and Bruce tried to teach me the game. It wasn't frustration or anger; it was sadness.
When we reached the first hole—it turned out I was part of a foursome that included a couple of other journalists and Maxime Balay, Glenmorangie's brand director—Nick, who was to float between us and another foursome, tried to teach me the proper stance. It didn't do my game much good, as my balls trickled only short distances along the ground, when I hit them at all.
"Your ball is lost," he sighed at some point, though I couldn't tell whether his deadpan delivery was due to his 4:30 a.m. wake-up call or my flaws as a human being. "It's the game of golf," he added nonchalantly at another point as my ball headed into the wild. "What's the worst that can happen?"
But something did happen as we teed off at the third hole. I wouldn't say everything came together, that it clicked, that I figured out how to play the game. But I managed to maintain eye contact with the ball and didn't try to overhit it. The thing actually became airborne, flying a good distance down the fairway.
"You have now experienced a miracle," Nick said.
Shortly after that, he trotted off to join the other foursome. The next time I saw him was back at clubhouse. I asked how he'd describe the other foursome compared to us.
"Golfers," he said.
Show More Archives
Popular on WSJ
Editors’ Picks
|
global_05_local_5_shard_00000035_processed.jsonl/33246
|
Regina Dugan at D11: Badass
5/29/2013 9:41PM
"We got to do a lot of epic sh*t when I was at DARPA," Dugan said onstage at D11. But the stuff she is working on at Motorola is pretty cool (and totally creepy!) too.
... I ... I ... he might like ... I'll tell you ... we got to do a lot of ethics ... as ... it with ... it's clear ... that I wanted to do more of that ... and say all felt a little story of my second interaction with tenants ... say when something like this he he said is ... very light and he said we decided to go with somebody from the mobile industry to lead our innovation efforts ... somebody is very experienced in the industry ... and this is the basic strategy that we have played ... and I said ... I really in the sailing think about that ... and I said that I think that's a great strategy for not losing and allows the strategy for winning ... and a week later ... job ... to re read many tell you why ... that the reason is that what that conversation taught me like it convinced me of ... when said this company was serious about that activity ... was serious about challenging the status quo and taking their underdog status and turning it into ... real innovation for the next-generation ... Thailand ... the challenge everything not just about the projects for doing that how we're doing in a nationwide told Dennis that day was ... what's the strategy them as companies employ foreign their breakthrough breakthrough innovation is decades out of date ... and it needs to be updated at the World War two men year strategy ... that goes from basic research to applied research upright position in commercialization we need to do it differently ... we learned how to do in a jar for remembering it Industry Nance and I have implications for Momo ... and will have cascading implications for the country's competitiveness to let you know what is ... what what rest ... so what we do know is that we take and burying the ... inspired and technically content program leads ... and we intersect big science with a driving application ... that with that cauldron of activity that way is the reason that resulted in chart the from Sputnik surly day ... and we said with that activity of big science activity and a big driving application but you have a really bold image that's right ... I mean it's going to end its many people because they think with the increased risk ... that comes with that you actually yield results less often ... but that's not in my experience ... in fact ... when you take on a really bold vision like that's what happens is you yield results more often ... right if you're unsure failure in your in a nation that ... Trian renamed the rest ... and try and do so by reducing the boldness of the mission and we'll get it to ... pay ... because what you have are uninspired teams and Morgan and Morgan and me in an age ... when is the enemy and taste ... you have brought a couple of things that you were ... in its called on ... the advance technology and projects that can save your advanced technology team that ... that ... if the dentist I urge you ... wisely by the way to do ... you brought a couple things they are working on ... and she talked Venky Shaw men to fair ... share ... well ... E-mail ... Lots of people talk about innovation in this case as that's the big innovations and I happened I just I think that's a lack of imagination frankly there are so many unsolved problems ... and there are so many opportunities that can be realized by the Indians as an attack here so let's just say one ... really important problem one driving application in this case authentication ... authentication is irritating in fact it's so irritating only about half the people do it ... right despite the fact that there's a lot of information about you on your smartphone which makes you far more prone to identity apt ... and if you did nonetheless ... I ... Toyota and that ... passwords in ... hand listen sure that ... drawing patterns and on your record after forty years of advances and competition were still authentic eating basically the same way we did years ago in fact it's gotten worse ... and now you don't do the once a day ... or twice a day the average user doesn't thirty nine times a day to take from two point three seconds every time the deal and power users with us ... onto a hundred times that ... so ... what are we doing about that what we're thinking of ... all home variety of options for how you can do better ... at authentication so you can start with ... near-term things like I'm tokens or FAA's that might have an NCO Bluetooth and that in in them but you can also think ... about ... on ... a means of authentication it simply wear on your scan every day ... for a week in a time say an electronic tax hit ... now ... we're talking about wearable zz everybody's interest in the hunt for founding interest and ... also ... and I wish I ... let Otellini Alec and and and and and we made a lot of advances in wearable spent are still some fundamental problems that we haven't felt ... like one of them is the mechanical mismatch between humans and electronics right ... so electronics are boxy imaging humans are Korean soft ... Apps mechanical mismatch from ... well ... a researcher at the University of Illinois his name is Dr Rogers when he discovered is that he can use standard C maths techniques to make ... items of high performance silicon connected by an accordion like structures ... that would allow it to stretch out to two hundred percent ... and still be performing ... and what he did seem founded the company and they started making electronic ... taxi so I'm wearing mine here on my are we ... to an air hammered again ... this and that did not this is a developmental system were ... made by and see ten ... and it has an antenna and some sensors and then in and what we plan to do ... is work with than to advance and taxi that can be used for authentication ... now ... it may be too that ... ten to twenty year olds don't wanna wear a watch on their arrest ... thank you can be sure that will be far more interested in wearing electronic tax you only get this up here it's ... and that member design right ... they would certainly one ... for those options options ... anyway I'm that you can also imagine ... including not syndication in just your daily habits ... so I'd take a vitamin every morning when I could take vitamin authentication ... what ... Biden and authentication like to have one here well Carol able to ... do it on ... how well the ... effect ... I'll ... miss you guys seen this fellow ... has had small chip ... inside of it with this Swifts ... it also has what amounts to you and inside out that a new battery ... when you swallow and ... the accents in your stomach serve as the electoral I did ... and they power an out and assuaged is ... on a not ... and it creates an eighteen day ECG like signal in your body and essentially your entire body becomes your authentication token ... that this is the ... the ok button ... so wait but now it's that it's really too so what this means is that that becomes my first superpower I really want a superpower ... it means that my arms are like wires my hands are like alligator clips might touch my phone my computer my two are my car I'm not indicated in ... her super power like I want ... some sort of shipping them right away that now ... that said then that I die ... is that this is the FDA cleared so here's the thing this ... yes it is not a science fiction this bill is actually made by company called party of ... and they've developed for medical applications that ... help has been cc engine cleared by the FDA can take thirty of those per day ... for the rest of your life ... and and what happens is your heart ... nothing be changed issued we can just tell me you've taken the Pell anime another cloud of ... an Apple app will will will now know everything I do and everywhere I go because ... let's face it ... I will let you guys ... are from Global Fiennes the water inlet into tonight ... thanks Mindy ... leading Finnish good as them as he does Larry me can take one of the ... the top ... so we'll see we'll have to know ... so if he had demos this working ... an authentic eating ... this isn't like to actually goes up then again the sun and alliances is a this is an stuff it's ... been a shift anytime soon but ... I think having ... them the boldness to think differently about problems that everybody has every day ... is really important from a role in the end there's lot of people now they were trying to ... get the company in that mindset that think they get ... on and it's early but were saying about work style ...
|
global_05_local_5_shard_00000035_processed.jsonl/33271
|
PlaystationTrophies Got a news tip?
Go Back > anorexicwes
Subscribe Donate
Conversation Between anorexicwes and Flibbity Floid
Showing Visitor Messages 1 to 2 of 2
1. anorexicwes
11-16-2012 10:22 PM
It's cool man, I just don't like cheaters. Don't worry about it dude.
2. Flibbity Floid
11-16-2012 08:59 PM
Flibbity Floid
Just wanted to say, it wasn't my intention to get into a scrap with anyone in the Scumbag thread. Left an unofficial apology but I'd like to convey it personally in case it seems like I'm trying to continue arguing.
So, obviously, sorry about the misunderstanding.
|
global_05_local_5_shard_00000035_processed.jsonl/33295
|
Skip Navigation
Guide to the Experts Profile
Guide to Experts home »
Spyridon (Spiros) Margetis
Spyridon (Spiros) Margetis | Professor
Office/Department: Department of Physics
Location: 304 Smith Hall
Phone: 330-672-9739
Fax: 330-672-2959
Area(s) of Expertise:
Dr. Margetis joined the faculty at KSU in 1997.
His research involves collisions of heavy nuclei at ultra-relativistic energies, as they offer unique opportunities to study the behavior of nuclear matter under extreme conditions of temperature (about a trillion degrees) and density. It is expected that inside the hot and dense nuclear matter the nucleon boundaries will `meltdown' and their constituents (quarks and gluons) will be free to move over the extended volume of the created `fireball'. This `deconfined' phase of nuclear matter is usually referred to as ``Quark Gluon Plasma'', the discovery of which is our primary goal. Such matter is believed to have been formed during the initial moments of Big Bang, when the Universe was just a few microseconds old. It might also exist in the core of a neutron star or other exotic astronomical objects.
This research was initially performed at the CERN Super Proton Synchrotron (SPS) in Geneva. Dr. Margetis was affiliated with two major experiments. The CERN-NA35 and CERN-NA49 experiment.
Since 1992 he has been working at the Relativistic Heavy Ion Collider (RHIC), a Department of Energy project in Long Island, New York. and the RHIC experiment STAR. The STAR experiment uses multi-purpose detectors aiming at measuring many different signals simultaneously. His physics interests are in the area of `strangeness' and 'heavy flavor', i.e. the production rates and behavior of 'strange', 'charm' and 'beauty' quarks inside hot nuclear matter. A particle is called `strange' or 'charmed' if one of its constituent quarks is the strange or charm quark respectively (ordinary matter contains only `up' and `down' quarks). An example of a strange particle is the Lambda hyperon. An example of a charmed particle is the D0 meson. The detection of these particles is extremely difficult and high precision detectors combined with accurate tracking software is required. Dr. Margetis and his students are making contributions to the software infrastructure of the experiment as well as the physics analysis. Students in his group will have the option to spend extended periods of time at an accelerator laboratory where they can be exposed to a mixture of software and/or hardware tasks. Unique skills ranging from setting up Monte Carlo simulations, weak signal extraction techniques, tracking, to detector development and improvement can be acquired during this work, skills which can be used in search for employment after graduation.
Scholarly, Creative & Professional Activities
From SPIRES Database
Theses directed ( + pdf copies): PhD/Honor Theses
Research Areas
• Experimental Nuclear Physics
• Ultra Relativistic Heavy Ion Interactions at accelerators like CERN-SPS, BNL-RHIC and CERN-LHC
|
global_05_local_5_shard_00000035_processed.jsonl/33320
|
This project is solving the Bootstrapping of Space Industry challenge.
A commercial moon industry simulation game
Moonopoly, a turn-based strategy game simulating a self-sufficient, profitable moon industry.
Three milestones to pursue:
- Make profit by exporting to other space industries, use it to import resources from earth
- Self-sufficiency by producing all resources on the moon
- Megaproject, the pinnacle of your moonbase, wins the game
Three types of buildings:
- Generators supply power
- Mines excavate resources
- Processors create new materials
Buildings can be constructed in any desired quantity, but only become active with enough power and input resources. Constructing too many buildings, or in a wrong order, can cause power or resource depletion.
Simulated demo:
Project Information
License: Creative Commons BY-NC-SA 3.0
Source Code/Project URL:
Android project -
Facebook group (all communications are here) -
Project hackpad -
Phonegap Project -
iOS project -
|
global_05_local_5_shard_00000035_processed.jsonl/33325
|
You are not logged in.
AMSER logo
Search Results
|< << < > >> >|
Searched for: Resource Type is Models
Results 56 - 60 of 341
This brief Quicktime animation shows the edges of silicon wafers being rounded and smoothed after the ingot have been sawed into slices. This animation is the fourth in a series showing silicon wafer production...
This Quicktime animation shows an optional process for creating silicon epitaxial wafers. The animations shows a trichlorosilane gas being injected which creates a monocrystaline film atop the preexisting wafer. This...
Search time: 0.112 seconds
Sort by:
user login
why log in?
Manage your resources
Save, organize, and share resources that you find.
Subscribe to bulletins
Automatically be notified about new resources that match your interests.
It's easy, fast, and FREE!
for the
Copyright 2015 Internet Scout Resource Metadata
Copyright 2015 Internet Scout
NSF NSDL University of Wisconsin Internet Scout
Leave Feedback
|
global_05_local_5_shard_00000035_processed.jsonl/33330
|
extradoc / sprintinfo / Hildes_to_Heidel.txt
Full commit
planning for the time between the Hildesheim and Heidelberg sprints
clean-up areas
the following issues are meant to be 0.7 issues.
- FILED translate_pypy and
- FILED the translator class need some cleanup
- FILED initialization of the object space is still messy
- move bits around in the annotator to make different uses
more pluggable ?
- reorganizing some wrongly named things ?
- FILED erasing useless files
- FILED cleanup of import dependencies
- ONGOING preparing the next release
filed as issues
- DONE rtyper problem: exceptions are no longer always at the end of a code
block because of the lowlevel rewriting
- DONE translation problem: frozen ids used as hashes are broken
in the post-translation program
- DONE better support of math and float exceptions
- FILED documentation about external function calls and implementing
builtin modules
- DONE prefixing all the C macros and names with pypy
- DONE support producing a windows binary, choose a suitable compiler
- OPEN related to the previous: documenting how interplevel marshal
is plugged into the system
- FILED support for tests from external users and different platforms
other issues
storing bound method on instances confuses the annotator (we can probably live with this limitation
right now, I'm not sure but it may require a large refactoring to support this)
>>> class H:
... def h():
... pass
>>> class C:
... def __init__(self, func):
... self.f = func
... def do(self):
... self.f()
>>> def g():
... h = H()
... c = C(h.h)
>>> t=Translator(g)
>>> t.annotate([])
Additional wild ideas
- thinking of an RPython flowgraph interpreter as an executable?
|
global_05_local_5_shard_00000035_processed.jsonl/33349
|
Your Search Results
Represents the global options for executing a query.
Gecko 1.9
Inherits from: nsISupports Last changed in Gecko 13.0 (Firefox 13.0 / Thunderbird 13.0 / SeaMonkey 2.10)
Method overview
nsINavHistoryQueryOptions clone();
Attribute Type Description
applyOptionsToContainers boolean If true, the query options are only applied to the containers.
asyncEnabled boolean
When true, the root container node generated by these options and all of its descendant containers are opened asynchronously if they support doing so. By default, this is false.
Note: Currently, only bookmark folder containers support being opened asynchronously.
excludeItemIfParentHasAnnotation Obsolete since Gecko 13.0 AUTF8String This option excludes items from a bookmarks query if the parent of the item has this annotation. An example is to exclude livemark items (parent folders have the "livemark/feedURI" annotation). Ignored for queries over history.
excludeItems boolean This option excludes all URIs and separators from a bookmarks query. This would be used if you just wanted a list of bookmark folders and queries (such as the left pane of the places page). Ignored for queries over history. Defaults to false.
excludeQueries boolean Set to true to exclude queries ("place:" URIs) from the query results. Simple folder queries (bookmark folder symlinks) will still be included. Defaults to false.
excludeReadOnlyFolders boolean Set to true to exclude read-only folders from the query results. This is designed for cases where you want to give the user the option of filing something into a list of folders. It only affects cases where the actual folder result node would appear in its parent folder and filters it out. It doesn't affect the query at all, and doesn't affect more complex queries (such as "folders with annotation X").
expandQueries boolean When set, allows items with "place:" URIs to appear as containers, with the container's contents filled in from the stored query. If not set, these will appear as normal items. Doesn't do anything if excludeQueries is set. Defaults to false.
Note that this has no effect on folder links, which are place: URIs returned by nsINavBookmarkService's getFolderURI method. These are always expanded and will appear as bookmark folders.
includeHidden boolean Most items in history are marked "hidden." Only toplevel pages that the user sees in the URL bar are not hidden. Hidden things include the content of iframes and all images on web pages. Normally, you don't want these things. If you do, set this flag and you'll get all items, even hidden ones. Does nothing for bookmark queries. Defaults to false.
maxResults long This is the maximum number of results that you want. The query is exeucted, the results are sorted, and then the top maxResults results are taken and returned. Set to "0" (the default) to get all results.
This does not work in conjunction with sorting by title. This is because sorting by title requires us to sort after using locale-sensetive sorting (as opposed to letting the database do it for us). Instead, we get the result ordered by date, pick the maxResult most recent ones, and then sort by title.
queryType short The type of search to use when querying the DB; This attribute is only honored by query nodes. It is silently ignored for simple folder queries. See Query type constants for possible values.
redirectsMode unsigned short
Specifies how to handle redirects; see Redirects mode constants for details. The default value is REDIRECTS_MODE_ALL.
Note: This option is only used on QUERY_TYPE_HISTORY.
resolveNullBookmarkTitles boolean If a bookmark title is NULL (note, not empty), attempt to use the history title. It is set to false by default.
resultType short Sets the result type. See Result type constants for possible values.
showSessions boolean Separate/group history items based on session information. Only matters when sorting by date.
sortingAnnotation AUTF8String The annotation to use in SORT_BY_ANNOTATION_* sorting modes.
sortingMode short The sorting annotation to use; see Sorting methods for possible values.
Sorting methods
You can ask for the results to be pre-sorted. Since the DB has indices of many items, it can produce sorted results almost for free. Note: re-sorting is slower, as is sorting by title or when you have a host name.
Constant Value Description
SORT_BY_NONE 0 For bookmark items, this constant means sort by the natural bookmark order.
SORT_BY_TITLE_ASCENDING 1 Sort by the ascending title order.
SORT_BY_TITLE_DESCENDING 2 Sort by the descending title order.
SORT_BY_DATE_ASCENDING 3 Sort by the ascending date order.
SORT_BY_DATE_DESCENDING 4 Sort by the descending date order.
SORT_BY_URI_ASCENDING 5 Sort by the ascending URI order.
SORT_BY_URI_DESCENDING 6 Sort by the descending URI order.
SORT_BY_VISITCOUNT_ASCENDING 7 Sort by the ascending visit count order.
SORT_BY_VISITCOUNT_DESCENDING 8 Sort by the descending visit count order.
SORT_BY_KEYWORD_ASCENDING 9 Sort by the ascending keyword order.
SORT_BY_KEYWORD_DESCENDING 10 Sort by the descending keyword order.
SORT_BY_DATEADDED_ASCENDING 11 Sort by the ascending added date order.
SORT_BY_DATEADDED_DESCENDING 12 Sort by the descending added date order.
SORT_BY_LASTMODIFIED_ASCENDING 13 Sort by the ascending last modified order.
SORT_BY_LASTMODIFIED_DESCENDING 14 Sort by the descending last modified order.
SORT_BY_TAGS_ASCENDING 17 Sort by the ascending tags order.
SORT_BY_TAGS_DESCENDING 18 Sort by the descending tags order.
SORT_BY_ANNOTATION_ASCENDING 19 Sort by the ascending annotation order.
SORT_BY_ANNOTATION_DESCENDING 20 Sort by the descending annotation order.
SORT_BY_FRECENCY_ASCENDING 21 Sort by ascending frecency order.
SORT_BY_FRECENCY_DESCENDING 22 Sort by descending frecency order.
Result type constants
Constant Value Description
RESULTS_AS_URI 0 "URI" results, one for each URI visited in the range. Individual result nodes will be of type "URI".
RESULTS_AS_VISIT 1 "Visit" results, with one for each time a page was visited (this will often give you multiple results for one URI). Individual result nodes will have type "Visit".
This is identical to RESULT_TYPE_VISIT except that individual result nodes will have type "FullVisit". This is used for the attributes that are not commonly accessed to save space in the common case (the lists can be very long).
Note: Supported only for QUERY_TYPE_HISTORY.
Returns nsINavHistoryQueryResultNode nodes for each predefined date range where we had visits.
Note: Supported only for QUERY_TYPE_HISTORY.
Returns nsINavHistoryQueryResultNode nodes for each site where we have visits.
Note: Supported only for QUERY_TYPE_HISTORY.
Returns nsINavHistoryQueryResultNode nodes for each site where we have visits, grouped by date.
Note: Supported only for QUERY_TYPE_HISTORY.
Returns nsINavHistoryQueryResultNode nodes for each tag. Each tag node is a RESULTS_AS_TAG_CONTENTS container defined as place:querytype=1&resultType=7&folder=tag_folder_id.
Note: Using this result type forces the query type to be QUERY_TYPE_BOOKMARKS.
Returns nsINavHistoryResultNode nodes for each bookmark contained into the defined tag. To specify the tag you need to add a folder=tag_folder_id to the query, and only one folder is allowed.
Note: Using this result type forces the query type to be QUERY_TYPE_BOOKMARKS. At this time, sorting methods are not supported; results will always be returned in reverse order of insertion.
Query type constants
Constant Value Description
QUERY_TYPE_HISTORY 0 Query's type is history.
QUERY_TYPE_BOOKMARKS 1 Query's type is bookmarks.
QUERY_TYPE_UNIFIED 2 Query's type is unified.
Redirects mode constants
Constant Value Description
REDIRECTS_MODE_ALL 0 Include both redirected-from and redirected-to pages in the results.
REDIRECTS_MODE_SOURCE 1 Include redirected-from pages but not redirected-to pages in the results.
REDIRECTS_MODE_TARGET 2 Include redirected-to pages but not redirected-from pages in the results.
This method creates a new options item with the same parameters of this one.
nsINavHistoryQueryOptions clone();
Return value
Returns the newly created cloned options.
See also
Document Tags and Contributors
Contributors to this page: Sheppy, Jesse, Erwan, trevorh, Mak77, Ecmanaut, Mook, Arehman4
Last updated by: Sheppy,
|
global_05_local_5_shard_00000035_processed.jsonl/33350
|
What: Intro to Parallel Programming is a free online course created by NVIDIA and Udacity. In this class you will learn the fundamentals of parallel computing using the CUDA parallel computing platform and programming model.
Who: This class is for developers, scientists, engineers, researchers and students who want to learn about GPU programming, algorithms, and optimization techniques.
Why: Learn new skills, enhance your career opportunities, and have fun.
How: Click on the Enroll Today button to get started!
Enroll today
Dr. David Luebke
Senior Director at NVIDIA Research
Read more about David:
homepage, twitter: @davedotluebke
Dr. John Owens
Associate Professor at UC Davis
Read more about John:
homepage, twitter: @jowens
Instructional Design Advisor
Dr. Dan Connors
Assistant Professor at University of Colorado Denver
Adjunct Professor at University of Colorado Boulder
Class Syllabus:
• Lesson 1 - GPU Programming Model
• Lesson 2 - GPU Hardware and Parallel Communication
• Lesson 3 - Fundamental Parallel Algorithms
• Lesson 4 - Using Sort and Scan
• Lesson 5 - Optimizing GPU Programs
• Lesson 6 - Parallel Computing Patterns
• Lesson 7 - The Future of GPU Computing
What People are saying:
Simon Brown @sjb3d : Completed the @Udacity parallel programming #CS344 online course. Very well taught and great #CUDA challenges at the end of each unit
Johan Louwers @johanlouwers: Free #udacity course on Introduction to Parallel GPU Programming with #CUDA. Excellent lessons and homework/exercises.
Daivik Orth: This Course was excellent. My internship employer wanted me to parallelize some of their code using CUDA. I had no idea what CUDA was going into it. This course was critical for my success this summer.
What level is this course?
This is an advanced course.
What are the pre-requisites?
Working knowledge of the C programming language, data structures and common algorithms.
How long will it take to complete the course?
Estimated time to complete course: 7 units x avg. of 3 hours each = Approx. 21 hours.
Do I need a CUDA-enabled computer?
No. You'll be able to program and run your assignments on high-end GPUs, via the Udacity system.
When does the course begin?
This class is self-paced. You can begin whenever you like.
How long will the course be available?
This class will always be available.
How much does this cost?
It’s completely free! If you’re feeling generous, we would love to have you contribute your thoughts, questions, and answers to the course discussion forum.
What are the rules on collaboration?
Collaboration is a great way to learn. The key is to use collaboration as a way to enhance learning, not as a way of sharing answers without understanding them.
Relevant Links
Tell Your Friends
Google+ Twitter Facebook
|
global_05_local_5_shard_00000035_processed.jsonl/33361
|
Animal worship
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Animal worship (or zoolatry) refers to rituals involving animals, such as the glorification of animal deities, or animal sacrifice.
The origins of animal worship have been the subject of many theories. The classical author Diodorus explained the origin of animal worship by recalling the myth in which the gods, supposedly threatened by giants, hid under the guise of animals. The people then naturally began to worship the animals that their gods had disguised themselves as and continued this act even after the gods returned to their normal state (Lubbock, 2005, p. 252). In 1906, Weissenborn suggested that animal worship resulted from man’s natural curiosity. Primitive man would observe an animal that had a unique trait and the inexplicability of this trait would appeal to man’s curiosity (Weissenborn, 1906b, p. 282). Wonder resulted from primitive man’s observations of this distinctive trait and this wonder eventually induced adoration. Thus, primitive man worshipped animals that had inimitable traits (Weissenborn, 1906b, p. 282). Lubbock put forward a more recent view. Lubbock proposed that animal-worship originated from family names. In societies, families would name themselves and their children after certain animals and eventually came to hold that animal above other animals. Eventually, these opinions turned into deep respect and evolved into fully developed worship of the family animal (Lubbock, 2005, p. 253). The belief that an animal is sacred frequently results in dietary laws prohibiting their consumption. As well as holding certain animals to be sacred, religions have also adopted the opposite attitude, that certain animals are unclean.
The idea that divinity embodies itself in animals, such as a deity incarnate, and then lives on earth among human beings is disregarded by Abrahamic religions (Morris, 2000, p. 26). In Independent Assemblies of God and Pentecostal churches, animals have very little religious significance (Schoffeleers, 1985; Peltzer, 1987; Qtd. in Morris, 2000, p. 25). Animals have become less and less important and symbolic in cult rituals and religion, especially among African cultures, as Christianity and Islamic religions have spread. (Morris, 2000, p. 24).
The Egyptian pantheon was especially fond of zoomorphism, with many animals sacred to particular deities—cats to Bastet, ibises and baboons to Thoth, crocodiles to Sebek and Ra, fish to Set, mongoose, shrew and birds to Horus, dogs and jackals to Anubis, serpents and eels to Atum, beetles to Khepera, bulls to Apis. Animals were often mummified as a result of these beliefs.
Classification of animal cults[edit]
When a god is respected or worshipped by means of a representative animal, an animal cult is formed (Teeter et al., 2002, p. 355).
Animal cults may be classified in two ways:
• according to their outward form;
• according to their inward meaning, which may of course undergo transformations.
By outward form[edit]
There are two broad divisions:
1. all animals of a given species are sacred, perhaps owing to the impossibility of distinguishing the sacred few from the profane crowd; (sacred-profane dichotomy)
2. one or a fixed number of a species are sacred. It is probable that the first of these forms is the primary one and the second in most cases a development from it due to
1. the influence of other individual cults,
2. anthropomorphic tendencies,
3. the influence of chieftainship, hereditary and otherwise,
4. annual sacrifice of the sacred animal and mystical ideas connected therewith,
5. syncretism, due either to unity of function or to a philosophical unification,
6. the desire to do honour to the species in the person of one of its members, and possibly other less easily traceable causes.
By inward meaning[edit]
Treating cults according to their meaning, which is not necessarily identical with the cause which first led to the deification of the animal in question, we can classify them under ten specific heads:
• Pastoral cults: The pastoral type falls into two sub-types, in which the species is spared and sometimes receives special honour at intervals in the person of an individual. (See Cattle, Buffalo, below.)
• Hunting cults: In hunting cults the species is habitually killed, but occasionally honoured in the person of a single individual, or each slaughtered animal receives divine honours. (See Bear, below.)
• Dangerous or noxious animals: The cult of dangerous animals is due to the fear that the soul of the slain beast may take vengeance on the hunter, to a desire to placate the rest of the species. (See Leopard, below.)
• Animals regarded as human souls or their embodiment:Animals are frequently regarded as the abode, temporary or permanent, of the souls of the dead, sometimes as the actual souls of the dead. Respect for them is due to two main reasons: the kinsmen of the dead desire to preserve the goodwill of their dead relatives and they wish at the same time to secure that their kinsmen are not molested and caused to undergo unnecessary suffering. (See Elephant, below.)
• Totemistic cults: One of the most widely found modes of showing respect to animals is known as totemism (see totem), where a particular animal is seen as sacred to an individual or group, but except in decadent forms there is but little positive worship. In Central Australia, however, the rites of the Wollunqua totem group are directed towards placating this mythical animal, and cannot be termed anything but religious ceremonies. In secret societies we find bodies of men grouped together with a single tutelary animal; the individual, in the same way, acquires the nagual or individual totem, sometimes by ceremonies of the nature of the bloodbond. While an individual's or group's totem is sacred to them, it would not be sacred to another individual or group. By contrast, sacred animals in other religions are thus seen as sacred to the gods, and thus to all humanity, rather than particular individuals or tribes, even though only those sharing this belief will acknowledge their sacredness.
• Cults of nature and vegetation spirits: Spirits of the landscape such as vegetation, rain and the earth in many parts of the world, such as Europe, China and Mesoamerica are conceived in animal form. (See Goat, Serpent below.)
• Cults of ominous animals:The ominous (in the sense of being an omen) animal or bird may develop into a deity. (See Hawk, below.)
• Cults of animals associated with zoomorphic deities: It is commonly assumed that the animals associated with certain deities are sacred because the god was originally zoomorphic or theriomorphic (shapeshifting) ; this is doubtless the case in certain instances; but Apollo Smintheus, Dionysus Bassareus and other examples seem to show that the god may have been appealed to for help and thus become associated with the animals from whom he protected the crops, and so on.
• Cults of animals used in magic: The use of animals in magic may sometimes give rise to a kind of respect for them, but this is of a negative nature. See, however, articles by Preuss in Globus, vol. lxvii., in which he maintains that animals of magical influence are elevated into divinities.
Hunting cults[edit]
Main article: Bear worship
Bear worship is found in a number of religions, including Finnish paganism.
There is a festival among the Nivkhs that takes the form of a celebration in honour of a recently dead kinsman, to whom the spirit of the bear is sent. There have been some attempts to revive the practice.
There is evidence that connects the Greek goddess Artemis with a cult of the bear. Girls danced as "bears" in her honour, and might not marry before undergoing this ceremony. According to mythology, the goddess once transformed a nymph into a bear and then into the constellation Ursa Major.
The Dacians, Thracians, and Getians were noted to worship bears and annually celebrate the bear dance festival.
The bear is traditionally associated with Bern, Switzerland. It is believed that the city's name derives from the Germanic word for "bears" (Bären in German) and a bear is featured on the city's flag and coat of arm. In 1832 a statue of the Celtic bear goddess Artio was dug up there.
The existence of an ancient bear cult among Neanderthals in the Middle Paleolithic period has been a topic of discussion spurred by archaeological findings (Wunn, 2000, p. 434-435). Ancient bear bones have been discovered in several different caves and their peculiar arrangement are believed by some archaeologists to be evidence of a bear cult during the Paleolithic era. (Wunn, 2000, p. 435). However, others argue that the placement of these remains, whether it appears to be an identified pattern or not, is due to natural causes such as wind, sediment, or water (Wunn, 2000, p. 437-438).
The Ainu Iomante ceremony (bear sending). Japanese scroll painting, circa 1870.
The Ainu people, who live on select islands in the Japanese archipelago, call the bear “kamui” in their language, which translates to mean god. While many other animals are considered to be gods in the Ainu culture, the bear is the head of the gods (Kindaichi, 1949, p. 345). For the Ainu, when the gods visit the world of man, they don fur and claws and take on the physical appearance of an animal. Usually, however, when the term “kamui” is used, it essentially means a bear (Kindaichi, 1949, p. 345). The Ainu people willingly and thankfully ate the bear as they believed that the disguise (the flesh and fur) of any god was a gift to the home that the god chose to visit (Kindaichi, 1949, p. 348).
In middle and South Vietnam coastal area, whale is considered sacred creature, who bring lucks and prosperity to fishermen. They are respectfully addressed as "the Lord". Coastal villages often hold funerals for beached whales, their remains are buried and skeletons are collected to be revered.
The first emperor of the last dynasty of Vietnam is believed to be rescued by a whale when his ship was capsized in a storm. After unifying the country, he sainted the whale who came to his rescue, which is known today as "Đông Hải phúc thần" (the deity of Fortune in the East sea).
A prevalent whale cult in Japan occurs around the coastal area. There are cemeteries with memorial stones dedicated to the whales which were hunted and killed to feed the people (Naumann, 1974, p. 4). Buddhist epitaphs mark these stones which implore that Buddha be reborn as a whale (Naumann, 1974, p. 4). Along with these memorials, there is evidence that whale embryos, found in a deceased mother’s womb, were extracted and buried with the same respect as a human being (Naumann, 1974, p. 5). For certain shrines, the bones of a perished whale were also deposited in the area (Naumann, 1974, p. 5).
In Alaska, there were certain tribes that had ceremonial tributes to pieces of a whale after it was captured in a hunt (Lantis 1938, p. 445). Some tribes brought the hump, the fins, or the nose of the whale into their camps or the whaler’s house. These parts were meant to represent the entirety of the whale and were honored as such during the festival (Lantis 1938, p. 445). The bones of a whale, however, were also given ritual treatment. The Alaskan tribes that participated in such acts believed that their rituals protected the whale’s soul from injury and it could then be free to return to the sea (Lantis 1938, p. 445).
Whales were little understood for most of human history as they spend up to 90% of their lives underwater, only surfacing briefly to breathe.[1] Many cultures, even those that have hunted them, hold whales in awe and feature them in their mythologies.
The Tlingit people of northern Canada said that the orcas were created when the hunter Natsihlane carved eight fish from yellow cedar, sang his most powerful spirit song and commanded the fish to leap into the water.[5]
Some cultures associate divinity with whales, such as among Ghanaians and Vietnamese, who occasionally hold funerals for beached whales, a throwback to Vietnam's ancient sea-based Austro-Asiatic culture.[7][8][9][10]
The Bible mentions whales in Genesis 1:21, Job 7:12, Ezekiel and 32:2. The "sea monsters" in Lamentations 4:3 have been taken by some commentators to refer to marine mammals, in particular whales, although most modern versions use the word "jackals" instead.[11] The story of Jonah being swallowed by a "big Fish" is told both in the Qur'an[12] and in the Bible. The Old Testament contains the Book of Jonah and in the New Testament, Jesus mentions this story in Matthew 12:40.[13]
Domesticated mammals[edit]
Cattle and buffalo[edit]
Main articles: bull worship and Cattle in religion
Many religions have considered cattle to be sacred, most famously Hinduism from India and Nepal, but also Zoroastrianism, and ancient Greek and Egyptian religion. Cattle and buffalo are respected by many pastoral peoples that rely on the animals for sustenance and the killing of an ox is a sacrificial function.
The Toda of southern India abstain from the flesh of their domestic animal, the buffalo. However, once a year they sacrifice a bull calf, which is eaten in the forest by the adult males. The buffalo plays an important part in many Toda rituals. These buffalo are currently endangered.
Conspicuous among Egyptian animal cults was that of the bull, Apis. It was distinguished by certain marks, and when the old Apis died a new one was sought. The finder was rewarded, and the bull underwent four months' education at Nilopolis. Its birthday was celebrated once a year when oxen, which had to be pure white, were sacrificed to it. Women were forbidden to approach it when once its education was finished. Oracles were obtained from it in various ways. After death it was mummified and buried in a rock-tomb. Less widespread was the cult of the Mnevis, also consecrated to Osiris.
Similar observances are found in our own day on the Upper Nile. The Nuba and Nuer revere cattle. The Angoni of Central Africa and the Sakalava of Madagascar keep sacred bulls. In India respect for the cow is widespread, but is of post-Vedic origin; there is little actual worship, but the products of the cow are important in magic.
While there are several animals that are worshipped in India, the supreme position is held by the cow (Margul, 1968, p. 63). The humped zebu, a breed of cow, is central to the religion of Hinduism (Margul, 1968, p. 63). Mythological legends have supported the sanctity of the zebu throughout India (Margul, 1968, p. 64). Such myths have included the creation of a divine cow mother and a cow heaven by the God, Brahma and Prithu, the sovereign of the universe, created the earth’s vegetation, edible fruits and vegetables, disguised as a cow (Margul, 1968, p. 64).
According to Tadeusz Margul, observations of the Hindu religion and the cow has led to a misunderstanding that Hindi have a servile relationship with the zebu, giving prayers and offerings to it daily. Typically, however, only during the Cow Holiday, an annual event, is the cow the recipient of such practices (Margul, 1968, p. 65). Margul suggests that sanctity of the cow is based on four foundations: abstaining from cow slaughter, abstaining from beef consumption, control of breeding and ownership, and belief in purification qualities of cow products (milk, curd, ghee, dung, and urine) (Margul, 1968, p. 65-66).
Amun, the god of Thebes, Egypt, was represented as ram-headed. His worshippers held the ram to be sacred, however, it was sacrificed once a year. Its fleece formed the clothing of the idol. Another Egyptian ram-headed god was Banebdjed, a form of Osiris.
Silenus, the Satyrs and the Fauns were either capriform or had some part of their bodies shaped like that of a goat. In northern Europe the wood spirit, Leszi, is believed to have a goat's horns, ears and legs. A deity known as the Goat of Mendes is associated with the pentagram.
In Greece, Italy, and Egypt, the goat was worshipped in both goat form and phallic form (Neave 1988, p. 8). This type of worship has sometimes been said to have originated from the goat’s increased sex drive. One male goat was capable of fertilizing 150 females (Neave 1988, p. 8). The Greek god Pan was depicted as having goat characteristics, such as hooves, horns, and a beard. Along with Pan, the goat was closely related to Dionysus during the Roman era (Neave 1988, p. 8). To honor Dionysus, Romans would tear apart a goat and eat it alive. The goat was commonly associated with dark arts and the devil. This association was amplified in Egypt during the Middle Ages (Neave 1988, p. 8).
Excavations in Central Asia have revealed ancient ritual goat-burial that show a religious significance of the goat predominantly in the area (Sidky 1990, p. 286). These findings have been used as evidence for a goat-cult of Asia originating either in the Neolithic or Bronze Ages (Sidky 1990, p. 286).
A dog after being decorated in the Kukur tihar festival in Nepal
Main article: Dogs in religion
Dogs have a major religious significance among the Hindus in Nepal and some parts of India. The dogs are worshipped as a part of a five-day Tihar festival that falls roughly in November every year. In Hinduism, it is believed that the dog is a messenger of Yama, the god of death, and dogs guard the doors of Heaven. Socially, they are believed to be the protectors of our homes and lives. So, in order to please the dogs they are going to meet at Heaven's doors after death, so they would be allowed in Heaven, people mark the 14th day of the lunar cycle in November as Kukur-tihar, as known in Nepali language for the dog's day. This is a day when the dog is worshipped by applying tika (the holy vermilion dot), incense sticks and garlanded generally with marigold flower.
Actual dog worship is uncommon. The Nosarii of western Asia are said to worship a dog. The Karang of Java had a cult of the red dog, each family keeping one in the house. According to one authority the dogs are images of wood which are worshipped after the death of a member of the family and burnt after a thousand days. In Nepal it is said that dogs are worshipped at the festival called Khicha Puja. Among the Harranians dogs were sacred, but this was rather as brothers of the mystae.
The Uffington White Horse
Main article: Horse worship
Horse worship has been practiced by a number of Indo-European and Turkic peoples. There is some reason to believe that Poseidon, like other water gods, was originally conceived under the form of a horse. In the cave of Phigalia Demeter was, according to popular tradition, represented with the head and mane of a horse, possibly a relic of the time when a non-specialized corn-spirit bore this form. Her priests were called Poloi (Greek for "colts") in Laconia. The mule and the horse are sacred to the Roman god Consus. In Gaul we find a horse-goddess, Epona. There are also traces of a horse-god, Rudiobus. Hayagriva is a horse-headed deity that appears in both Hinduism and Buddhism. The Gonds in India worship a horse-god, Koda Pen, in the form of a shapeless stone, but it is not clear that the horse is regarded as divine. The horse or mare is a common form of the corn-spirit in Europe.
Among the Balkan culture, swaddling an unmarried person in a horse-girth is a typical ritual. It is thought that the sexual potency of the horse is passed to the individual wrapped in its girth (Vukanović 1980, p. 112). Along with the Balkan swaddling, Virgil’s Aeneid bases the founding of the great city of Carthage upon a horse (Qtd. in Brown 1950, p. 32). When the Phoenicians dug up a horse head from the ground they decided to build their city (Carthage) upon that spot because the horse was a sign of success (Qtd. in Brown 1950, p. 32). Thus, Brown argued that the horse was sacred to the Phoenician people (Brown 1950, p. 32).
A statue of Ganesha - the elephant-headed Hindu god of wisdom and obstacle removal
In Thailand it is believed that a white elephant may contain the soul of a dead person, perhaps a Buddha. When one is taken the capturer is rewarded and the animal brought to the king to be kept ever afterwards. It cannot be bought or sold. It is baptized and fêted and mourned for like a human being at its death. In some parts of Indo-China the belief is that the soul of the elephant may injure people after death; it is therefore fêted by a whole village. In Cambodia it is held to bring luck to the kingdom. The cult of the white elephant is also found at Ennarea in southern Ethiopia. In India, the popular Hindu god Ganesha has the head of an elephant and a torso of a human.
In Surat, unmarried Anāvil girls participate in a holiday referred to as Alunām (Naik, 1958, p. 393). This holiday is to honor the goddess Pārvatī. During this celebration, a clay elephant is prepared (most likely to celebrate Pārvatī's creation of Ganesha from a paste of either turmeric or sandalwood). Every day, the unmarried women worship this elephant by dancing, singing songs, and abstaining from eating salt. On the final day of Alunām, the clay elephant is immersed in some body of water (Naik, 1958, p. 393).
Certain cultures also used elephant figurines to display the animal’s importance. There was evidence of an ancient elephant cult in Sumatra (Schnitger, 1938, p. 41). Stone elephant figurines were built as “seats of the souls” in the Sumatran culture (Schnitger, 1938, p. 41). In North Borneo, however, wooden elephant figurines were placed on the top of a bamboo pole. This bamboo pole was only erected after the tribe chief had collected a certain number of human heads (Schnitger, 1938, p. 41).
Wild mammals[edit]
Artemis with a deer, the Diana of Versailles in the Louvre Galerie des Caryatides that was designed for it
In North America the Algonquian tribes had as their chief deity a "mighty great hare" to whom they went at death. According to one account he lived in the east, according to another in the north. In his anthropomorphized form he was known as Menabosho or Michabo.
The deer is important in the mythology of many peoples. To the Greeks it was sacred to the goddess Artemis, while in Hinduism it is linked to the goddess Saraswati. The deer also held spiritual significance to the pastoralist cultures of the Eurasian Steppe. The golden stag figurine found in the Pazyryk burials is one of the most famous pieces of Scythian art.
The cult of the wolf is frequently found throughout Indo-European, Turkic, and Native American cultures.
Both Zeus and Apollo were associated with the wolf by the Greeks.
The Dacians, Thracians, and Getians considered the wolf as their ancestor and honored the wolf in various ways, notably by the Draco.
Rome's foundation uses wolves in totemic imagery.
Lion-headed Egyptian goddess Sekhmet from the temple of Mut at Luxor, granite, 1403–1365 BC, in the National Museum, Copenhagen
The cult of the leopard is widely found in West Africa. Among the Ashanti people a man who kills one is liable to be put to death; no leopard skin may be exposed to view, but a stuffed leopard is worshiped. On the Gold Coast a leopard hunter who has killed his victim is carried round the town behind the body of the leopard; he may not speak, must besmear himself so as to look like a leopard and imitate its movements. In Loango a prince's cap is put upon the head of a dead leopard, and dances are held in its honour.
During the Egyptian Twenty-sixth Dynasty people began mummifying particular animal species as offerings to the god whom the species represented. Millions of mummified cats, birds, and other creatures were buried at temples honoring Egyptian deities.[14][15] Worshippers paid the priests of a particular deity to obtain and mummify an animal and the mummy was placed in a cemetery near the god's cult center. The lion was associated with the Egyptian deities Horus, Nefertum, Ra and Sekhmet. There was a lion-god at Baalbek . The pre-Islamic Arabs had a lion-god, Yaghuth. In modern Africa we find a lion-idol among the Balonda. The lion was also sacred to Hebat, the mother goddess of the Hurrians.
In Judaism the patriarch Jacob refers to his son Judah as a Gur Aryeh גּוּר אַרְיֵה יְהוּדָה, a "Young Lion" (Genesis 49:9) when blessing him. Thus the Lion of Judah started to be reverenced in some others abrahamic cults, symbolising their prophets, as such as Jesus and Haile Selassie I, the ras Tafari.
In Mesoamerica the jaguar was revered as a symbol of fertility and warriorship among the Aztec, Maya and Olmec, and had an important role in shamanism.
Of great importance in Chinese myth and culture, the Tiger is one of the 12 Chinese zodiac animals. Also in various Chinese art and martial art, the tiger is depicted as an earth symbol and equal rival of the Chinese dragon- the two representing matter and spirit respectively. The White Tiger (Chinese: 白虎; pinyin: Bái Hǔ) is one of the Four Symbols of the Chinese constellations. It is sometimes called the White Tiger of the West (西方白虎), and it represents the west and the autumn season.[16]
The tiger replaces the lion as king of the beasts in cultures of eastern Asia,[17] representing royalty, fearlessness and wrath. In Chinese children stories, it is often depicted that the stripes on a tiger’s forehead represent the character 王 (“king”).[16]
Some cultures that celebrated tiger worship are still represented contemporarily. In the suburbs of Kunming, China, there is a tourist attraction where the tiger worship of the Yi is displayed for visitors. This attraction called the Solar Calendar Square is complete with a growling tiger statue, measuring to be five meters high (Harrell & Yongxiang 2003, p. 380). In Chuxiong of China, a similar attraction exists. A tiger totem is presented for tourists; the totem portrays the Yi belief of the tiger setting the entire world in motion. A tiger dance of the Shuangbai County is also performed at such places explaining the history of the Yi and their worship of tigers (Harrell & Yongxiang 2003, p. 380).
Along with these tourist attractions that display historical practices of the Yi, there is also additional evidence for tiger worship. Tigers were found depicted on small stones. These stones were pierced and worn as amulets, suggesting that the tiger had a certain power of protection for its wearer (Waterbury 1952, p. 76). The Queen Mother deity of the west, Hsi Wang Mu, sometimes possessed a tail of a tiger in her depictions and, like the tiger, was associated with the mountains (Waterbury 1952, p. 76). The tiger was also a deity for both the Tungus and the Black Pottery people (Waterbury 1952, p. 80).
In many parts of Vietnam, the tiger is a revered creature. In each village, there might be a tiger temple. This worshiping practice might have stem from the fear of tigers used to raid human settlements in the ancient time. Tigers are admired for their great strength, ferocity and grace. Tiger is also considered a guardian deity. Tiger statutes are usually seen at the entrance of temples and palaces, keeping evil spirits from entering those places.
The tiger is associated with the Hindu deities Shiva and Durga. In Pokhara, Nepal the tiger festival is known as Bagh Jatra. Celebrants dance disguised as tigers and "hunted". The Warli tribe of Maharashtra, India worship Waghia the lord of tigers in the form of a shapeless stone. In Vietnamese folk religion and Dongbei folk religion tiger-gods are also found.
The three wise monkeys over the Tōshō-gū shrine in Nikkō, Japan
Main article: Monkey
In Hinduism the monkey deity, Hanuman, is a prominent figure. He is a reincarnation of Shiva, the god of destruction. In orthodox villages monkeys are safe from harm.
Monkeys are said to be worshipped in Togo. At Porto Novo, in French West Africa, twins have tutelary spirits in the shape of small monkeys.
In some countries, e.g. India, a small number of temples are dedicated to the worship of wild mice. Whilst widely regarded as a creature to be avoided, for pestilential reasons in such temples the animals are actively encouraged. It is frequently associated with St. Thomas (citation required) and Ganesh. As a creature capable of survival, it is to be revered and respected.
Main article: Raven in mythology
The Raven is the chief deity of the Tlingit people of Alaska. All over that region it is the chief figure in a group of myths, fulfilling the office of a culture hero who brings the light, gives fire to mankind, and so on. A raven story from the Puget Sound region describes the "Raven" as having originally lived in the land of spirits (literally bird land) that existed before the world of humans. One day the Raven became so bored with bird land that he flew away, carrying a stone in his beak. When the Raven became tired of carrying the stone and dropped it, the stone fell into the ocean and expanded until it formed the firmament on which humans now live.
In the creator role, and in the Raven's role as the totem and ancestor of one of the four northwest clan houses, the Raven is often addressed as Grandfather Raven. It is not clear whether this form of address is intended to refer to a creator Raven who is different from the trickster Raven, or if it is just a vain attempt to encourage the trickster spirit to act respectably.
Together with the eagle-hawk the crow plays a great part in the mythology of southeastern Australia. Ravens also play a part in some European mythologies, such as in the Celtic and Germanic Religions, where they were connected to Bran and the Morrigan in the former and Woden in the latter.
North Borneo treated the hawk as a god, but it was technically the messenger of the people’s Supreme God (Waterbury 1952, p. 62). There were rituals that involved the hawk when the natives wished to make decisions about certain events, such as journeys from home, major agricultural work, and war (Waterbury 1952, p. 62). In North Borneo we seem to see the evolution of a god in the three stages of the cult of the hawk among the Kenyahs, the Kayans and the sea Dyaks. The Kenyahs will not kill it, address to it thanks for assistance, and formally consult it before leaving home on an expedition. It seems, however, to be regarded as the messenger of the supreme god Balli Penyalong. The Kayans have a hawk-god, Laki Neho, but seem to regard the hawk as the servant of the chief god, Laki Tenangan. Singalang Burong, the hawk-god of the Dyaks, is completely anthropomorphized. He is god of omens and ruler of the omen birds, but the hawk is not his messenger. For he never leaves his house. Stories are, however, told of his attending feasts in human form and flying away in hawk form when all was over.
According to Florance Waterbury, hawk worship was universal (Waterbury 1952, p. 26). This particular bird was “a heavenly deity; its wings were the sky, the sun and moon were its eyes” (Waterbury 1952, p. 26). The hawk is commonly associated with the Egyptian god Horus. The souls of former pharaohs were the followers of Horus and therefore, the hawk (Waterbury 1952, p. 26). Horus was depicted by the Egyptians as a human body with a hawk head after the Fourth and Fifth Dynasty, but before that he was represented as a hawk (Waterbury 1952, p. 27).
Egypt was not the only location of hawk worshippers. There were several other cultures which held the hawk in high regard. The hawk was a deity on the island of Hawaii and symbolized swift justice (Waterbury 1952, p. 62). Along with the lone island from the Hawaiian archipelago, the Fiji islands also had some tribes who worshipped a hawk god (Waterbury 1952, p. 62).In Sikhism,Although Animal worshipping is not a part of Sikh Culture but a White Falcon Bird is mostly regarded in Sikhism as it was associated with 6th Guru and especially 10th Sikh Guru who would always carry White Falcon perched on his hand when going out for Hunt and the 10th Guru was known as Master of White Hawk.Many people believe that the Bird carried by Guru Gobind Singh was Hawk but according to Historians Predictions made they believe that the bird was Gryfalcon OR Sakerfalcon
On Easter Island until the 1860s there was a Tangata manu (Bird man) cult which has left us Paintings and Petroglyphs of Birdmen (half men half frigatebirds). The cult involved an annual race to collect the first sooty tern egg of the season from the islet of Moto Iti and take it to Orongo.
The Frigate Bird Cult is thought to have originated in the Solomon Islands before immigrating to Easter Island where it became obsolete (Balfour 1917, p. 374). The Frigate-Bird was a representation of the god Make-make, the god of the seabird’s egg on Easter Island (Balfour 1917, p. 374).
Other non-mammals[edit]
Main article: Snake worship
The altar where serpent deities are worshipped in a temple in Belur, Karnataka, India
Quetzalcoatl depicted as a snake devouring a man, from the Codex Telleriano-Remensis.
The worship of the serpent is found in many parts of the Old World, and in the Americas.
In India snake worship refers to the high status of snakes in Hindu mythology. Over a large part of India there are carved representations of cobras (nagas) or stones as substitutes. To these human food and flowers are offered and lights are burned before the shrines. Among the Dravidians a cobra which is accidentally killed is burned like a human being; no one would kill one intentionally. The serpent-god's image is carried in an annual procession by a celibate priestess.
The Ancient Egyptians worshiped a number of snake gods, including Apophis and Set, and the Sumerians before them had a serpent god Ningizzida.
In America some of the Native American tribes give reverence to the rattlesnake as grandfather and king of snakes who is able to give fair winds or cause tempest. Among the Hopi of Arizona the serpent figures largely in one of the dances. The rattlesnake was worshipped in the Natchez temple of the sun and the Aztec deity Quetzalcoatl was a feathered serpent-god. In many MesoAmerican cultures, the serpent was regarded as a portal between two worlds. The tribes of Peru are said to have adored great snakes in the pre-Inca days and in Chile the Mapuche made a serpent figure in their deluge beliefs.
Serpent worship was well known in ancient Europe. There does not appear to be much ground for supposing that Aesculapius was a serpent-god in spite of his connection with serpents. On the other hand, we learn from Herodotus of the great serpent which defended the citadel of Athens. The Roman genius loci took the form of a serpent where a snake was kept and fed with milk in the temple of Potrimpos, an old Slavonic god. The ancient Greeks also featured the Gorgons and Medusa in their mythology.
Main article: Fish
A modern interpretation of Dagon as a "fish-god"
According to the Jewish scholar Rashi, the Canaanite god Dagon was a fish god. This tradition may have originated here, with a misinterpretation, but recently uncovered reliefs suggest a fish-god with human head and hands was worshipped by people who wore fish-skins.
Supposedly, there were sacred fish in the temples of Apollo and Aphrodite in Greece, which may point to a fish cult. The goddess at Ashkelon, Atargatis was depicted as half woman, half fish, and according to Xenophon the fish of the Chalus were regarded as gods.
In Japan, there was a deity called Ebisu-gami who, according to Sakurada Katsunori, was widely revered by fishing communities and industries (Qtd. in Naumann, 1974, p. 1). Ebisu, in later traditions, normally appeared in the form of a fisherman holding a fishing pole and carrying a red tai (a perch), but would sometimes take the form of a whale, shark, human corpse, or rock (Naumann, 1974, p. 1). The general image of Ebisu, however, appears to be the whale or the shark, according to Sakurada (Qtd. in Naumann, 1974, p. 2).
During Ebisu-gami festivals, there have been legends told of strange fish creatures which have arrived and been considered sacred. Examples of such fish creatures include familiar species of fish with multiple tails (Naumann, 1974, p. 2). Sometimes these fish were considered to be simply an offering to the deity. Other times, however, they were considered to be Ebisu himself, visiting on the festival day (Naumann, 1974, p. 2).
The praying mantis and the caterpillar, Ngo, are the incarnations of Cagn, a prominent figure in Bushman mythology. It was called the "Hottentots' god" by early European settlers.
The cult of the lizard is most prominent in the Pacific, where it appears as an incarnation of Tangaloa. In Easter Island a form of the house-god is the lizard. It is also a tutelary deity in Madagascar.
Oracular animals[edit]
Animals are frequently used for the purposes of divination. Birds are especially common in this role, as by their faculty of flight they offer themselves to the interpretation as messengers between the celestial and human spheres. Augury was a highly developed practice of telling the future from the flight of birds in Classical Antiquity. The dove appears as an oracular animal in the story of Noah, and also in Thisbe in Boeotia there was a dove-oracle of Zeus. Animal imagery was also often employed in the oracular utterances in Ancient Greece.[18] Parrot astrology is a form of divination using green parakeets which originated in South India and is still practised in modern times.[19]
In Chinese traditional religion, the tortoise is an oracular animal.
Notable oracular animals of the modern period include Lady Wonder, Punxsutawney Phil, Maggie the Monkey, Lazdeika the Crab, Paul the Octopus, and Sonny Wool.
Shamanism and animals[edit]
Main article: Shamanism
Animals were an important aspect of the Shaman religion in Central Asia. Also known as “assistant spirits,” “guardian spirits,” and “helping spirits,” animal spirits are an integral part of a shaman’s work. The more animal spirits a shaman had under his control, the more powerful the shaman (Waida, 1983, p. 228-229). When a shaman set out to journey spiritually to the outer world, animals were a key component, assisting him in his work. There were three primary reasons for a shaman to take such a journey: to find a lost soul, to bring an animal spirit to the high gods, or to lead a soul to its new resting place in the underworld. All of these were extremely important to followers of shamanism and animals were extremely important in facilitating the shaman’s efforts (Waida, 1983, p. 231).
An example of animal spirits in Shamanism comes from the Yenisei Ostiaks culture. During a healing procedure, a shaman invokes a number of animal spirits to help him. The spirits arrive and enter his body. The shaman is not possessed by these spirits; he is free to expel them at any time (Waida, 1983, p. 223). His body begins to leap all over the place, symbolizing that his soul is rising, leaving the earth and going up to the sky. It is a bird spirit that is lifting him through the atmosphere and he cries for it to take him higher so he can see further. According to Adolf Friedrich, at this point the shaman’s essence has, in fact, transformed into the bird spirit that crossed the threshold into his body (Waida, 1983, p. 223). He finally spots what he is looking for, the soul of his ill patient. Still assisting him, the animal spirits carry the shaman to the patient’s soul. The shaman retrieves it and returns the soul to its rightful place, healing the patient. Without the presence of animal spirits, the shaman could not have accomplished such a feat (Waida, 1983, p. 231).
In the Inner Eurasian religion, the transformation of a shaman’s essence into an animal spirit is referred to as “becoming animal” (Baldick 2000, p. 167). The importance of animals in this shamanic religion is shown by the capabilities that animals grant to human beings. Without the assistance of animals, humans from Inner Eurasia were not capable of reaching the sky, traveling rapidly throughout the earth, or going beneath the earth’s outer crust, all of which were important activities to the culture (Baldick 2000, p. 167). Heaven was not attainable for a person without the assistance of an eagle. Because of the eagle, an animal, the Inner Eurasians believed that they were capable of achieving their after-life and living in the home of their ancestors and Supreme God after their departure from the earth (Baldick 2000, p. 167). Heaven was represented by the people in assemblies of animals, usually grouped in sevens or nines (Baldick 2000, p. 167). When participating in hunting or warfare, Inner Eurasians also took on animal qualities because they believed it would increase their success (Baldick 2000, p. 167). Animals were a central part of this religion (Baldick 2000, p. 167).
Religion and animals[edit]
Main article: Animals in Buddhism
One of the most important sanctions of the Buddhist faith is the concept of ahimsa, or refraining from the destruction of life (Regenstein 1991, p. 234). According to Buddhist belief, humans do not deserve preferential treatment over other living beings. Thus, the world is not specifically meant for human use and should be shared equally amongst all creatures (Epstein 1990). Buddhists recognize that all animals are sentient and are capable of feeling pain, grief, fear, happiness, and hunger (Regenstein 1991, p. 234-235). The Dalai Lama once said “Even ants and other insects will run away from danger... They have intelligence and want to live too. Why should we harm them?” (Qtd. in Regenstein 1991, p. 235). Not believing in inflicting harm on any living, sentient being, some Buddhists also follow a vegetarian diet to avoid causing pain to animals (Regenstein 1991, p. 238).
Avoiding the destruction of life can affect aspects beyond a Buddhist’s diet, such as travel plans. In order to avoid crushing any living thing, be it plant, insect, or animal, some Buddhist monks do not travel during rainy seasons (Regenstein 1991, p. 236). Originally, shortly after Buddhism was first founded, monks traveled during all seasons, but public opinion changed this. The people protested that so much life was crushed and destroyed when monks traveled during the wet season. As a result, monks were required to seek shelter during this season and abstain from journeys (Chapple 1993, p. 22).
Living creatures, including humans, culminate to form one large, united life-force in the Buddhist religion. Buddhists, therefore, believe that to harm another living creature is to, in fact, harm yourself as all life-forms are interrelated (Regenstein 1991, p. 237). There are many tales that depict humans sacrificing their lives so that an animal may live. A jataka, or previous incarnation story, tells how the Buddha, (upon hearing the distraught cries of a lioness struggling to feed her hungry cubs), leapt from a cliff and smashed his body to death as an offering, so that she could feed his flesh to them (Chapple 1993).
Mahavira, the founder of Jainism, believed that the only way to be released from the cycle of life (birth, death, and then rebirth), one must follow, like Buddhists, ahimsa and not harm any living creature (Regenstein 1991, p. 229). Some Jains will carry a broom with them and sweep their path as they walk to avoid stepping on any living creature. Jains will also wear masks over their mouths to prevent swallowing insects and inspect their fruit for worms. The fruit inspection is not, however, because of their aversion of worms, but for the protection of the worms themselves (Regenstein 1991, p. 229-230). Jains are also only allowed to eat during daylight hours, when their vision is not restricted, so that they avoid eating insects or other small creatures that could possibly be in their food (Regenstein 1991, p. 230).
Jainism includes a lay form which is somewhat less restrictive (Regenstein 1991, p. 231). Basically lay Jains must distinguish between what forms of violence are necessary and unnecessary, but do not have to abstain entirely (Vallely 2002, p. 5). This results in avoiding all forms of hunting, tilling the soil (tilling involved disturbing creatures embedded in the earth), and brewing (brewing involved using living organisms such as yeasts) (Regenstein 1991, p. 231).
Food will never be prepared especially for them. They beg for food from others believing that because the food was prepared for someone else, they are not the cause of violence towards living creatures (Vallely 2002, p. 5).
Lay Jains, who have the financial capacity, will visit animal markets and buy/rescue animals destined for slaughter for the good that it does. (Regenstein 1991, p. 232).
Hinduism is the primary religion of India (Regenstein 1991, p. 221). Hinduism has evolved over several centuries from Vedic times when there was no restriction on animal worship and also animal consumption for food, to later Buddhist and Jain-influenced eras that led to a wider concept adaptation of non-violence and respect for animals, ahimsa (non-violence) is a major concept in Hindu belief (Regenstein 1991, p. 223). Humans and animals are one family and therefore, humans should treat all living creatures with respect and kindness. Pets are often treated as if they are truly members of the family (Regenstein 1991, p. 223-224).
There are some exceptions to ahimsa in Hinduism. While Hindu belief forbids the slaughter of animals for human sustenance, animal sacrifice was an accepted ritual in some parts of India (Regenstein 1991, p. 225). An explanation for this supposed paradox is that a sacrificial animal is not really considered to be an animal, but a symbol. Thus, when the animal is sacrificed, they are sacrificing the symbol and not the animal (Regenstein 1991, p. 226). The killing of an animal for human pleasure or lavishness is prohibited. An example of such lavishness would be hunting for pleasure, a fur coat made from animal skin, etc. (Regenstein 1991, p. 226).
See also[edit]
6. ^ Anon. "Whale Mythology from around the World". The Creative Continuum. Retrieved 14 February 2010.
11. ^ Lamentations 4:3 multiple versions and commentaries page
12. ^ Quran 37:139–148
14. ^ Quirke and Spencer 1992, pp. 78, 92–94
15. ^ Owen, James (2004), "Egyptian Animals Were Mummified Same Way as Humans", National Geographic News, retrieved 2010-08-06
16. ^ a b Cooper, JC (1992). Symbolic and Mythological Animals. London: Aquarian Press. pp. 226–27. ISBN 1-85538-118-4.
17. ^ "Tiger Culture | Save China's Tigers". Archived from the original on 12 February 2009. Retrieved 2009-03-07.
18. ^ J. L. Lightfoot, The Sibylline oracles Oxford University Press, 2008, ISBN 978-0-19-921546-1, p. 237, fn. 105.
19. ^ Naidu Ratnala, Thulaja. "Parrot astrologers". National Library Board Singapore. Retrieved 23 December 2011.
• Baldick, Julian (2000). “Animal and Shaman: Ancient Religions of Central Asia” New York University Press, New York
• Balfour, Henry (1917). "Some Ethnological Suggestions in Regard to Easter Island, or Rapanui” Folklore, 28(4).
• Bhattacharyya, Asutosh (1965). "The Serpent as a Folk-Deity in Bengal” Asian Folklore Studies, 24(1).
• Brown, Theo (1950). "Tertullian and Horse-Cults in Britain” Folklore, 61(1).
• Chapple, Christopher (1993). “Nonviolence to Animals, Earth, and Self in Asian Traditions” State University of New York Press, Albany
• Epstein, Ronald (1990). “Hindusm's Perspective on Animal Rights” San Francisco State University, [1]
• Harrell, Stevan; Yongxiang, Li (2003). "The History of the History of the Yi, Part II” Modern China, 29(3).
• Kindaichi, Kyōsuke (1949). "The Concepts behind the Ainu Bear Festival (Kumamatsuri)", Southwestern Journal of Anthropology, 5(4), Trans. Minori Yoshida.
• Lantis, Margaret (1938). "The Alaska Whale Cult and Its Affinities” American Anthropologist, New Series, 40(3).
• Livingstone, A (1988). "The Isin “Dog House” Revisited", Journal of Cuneiform Studies, 40(1)
• Lubbock, John (2005). "The Origin of Civilisation and the Primitive Condition of Man", Kessinger Publishing Company.
• Margul, Tadeusz (1968). "Present-Day Worship of the Cow in India” Numen, 15(1),
• Meyerowitz, Eva L. R. (1940). "Snake-Vessels of the Gold Coast” Man, 40.
• Morris, Brian (2000). "Animals and Ancestors: An Ethnography", Berg, New York.
• Naik, T.B. (1958). "Religion of the Anāvils of Surat", The Journal of American Folklore, 71(281).
• Naumann, Nelly (1974). "Whale and Fish Cult in Japan: A Basic Feature of Ebisu Worship", Asian Folklore Studies, 33(1).
• Neave, Dorinda (1988). "The Witch in Early 16th-Century German Art” Woman’s Art Journal, 9(1).
• Nida, Eugene A.; Smalley, William A. (1959). "Introducing Animism” Friendship Press, New York.
• Lord Raglan (1935). "The Cult of Animals ", Folklore, 46(4).
• Regenstein, Lewis G. (1991). “Replenish the Earth: a History of Organized Religions’ Treatment of Animals and Nature – Including the Bible’s Message of Conservation and Kindness Toward Animals” Crossroad, New York
• Schnitger, F.M. (1938). "Prehistoric Monuments in Sumatra", Man, 38.
• Shaffer, Aaron (1974). "Enlilbaniand the ‘DogHouse’ in Isin", Journal of Cuneifrom Studies, 26(4).
• Sidky, M. H. (1990). "”Malang”, Sufis, and Mystics: An Ethnographic and Historical Study of Shamanism in Afghanistan” Asian Folklore, 49(2).
• Teeter, Emily et al. (2000). "A History of the Animal World in the Ancient Near East", ed. Collins, Billie Jean, Vol. 64, Brill, Boston.
• Vallely, Anne (2002). “Guardians of the Transcendent: An Ethnography of a Jain Ascetic Community” University of Toronto Press, Toronto
• te Velde, H. (1980). “Numen” 27(1).
• Vukanović, T. P. (1980). "Swaddling Clothes for the Unmarried and for Herdsmen” Folklore, 91(1).
• Waida, Manabu (1983). “Problems of Central Asian and Siberian Shamanism”, Numen, 30(2).
• Waterbury, Florance (1952). "”Bird-Deities in China” Artibus Asiae. Supplementum, 10(2).
• Weissenborn, Johannes (1906a). "Animal-Worship in Africa", Journal of the Royal African Society, 5(18).
• Weissenborn, Johannes (1906b). "Animal-Worship in Africa (Concluded from p. 181)", Journal of the Royal African Society, 5(19).
• Wunn, Ina (2000). "Beginning of Religion", Numen, 47(4).
• This article incorporates text from a publication now in the public domainThomas, Northcote Whitbridge (1911). "Animal Worship". In Chisholm, Hugh. Encyclopædia Britannica (11th ed.). Cambridge University Press. This work in turn cites:
• For a fuller discussion and full references to these and other cults (that of the serpent excepted):
• N. W. Thomas in James Hastings' Dictionary of Religions
• Frazer, Golden Bough
• Campbell, Spirit Basis of Belief and Custom
• Maclennan, Studies (series 2)
• V. Gennep, Tabou et totémisme à Madagascar
• For the serpent:
• Ellis, Ewe-speaking Peoples, p. 54
• Internat. Archiv', xvii. 113
• Tylor, Primitive Culture, ii. 239
• Fergusson, Tree and Serpent Worship
• Mähly, Die Schlange im Mythus
• Staniland Wake, Serpent Worship, &c.
• 16th Annual Report of the American Bureau of Ethnology, p. 273 and bibliography, p. 312
External links[edit]
|
global_05_local_5_shard_00000035_processed.jsonl/33365
|
From Wikipedia, the free encyclopedia
Jump to: navigation, search
"Cubist" redirects here. For the company, see Cubist Pharmaceuticals.
Georges Braque, 1910, Violin and Candlestick, oil on canvas, 60.96 cm x 50.17 cm, San Francisco Museum of Modern Art
In France, offshoots of Cubism developed, including Orphism, Abstract art and later Purism.[8][9] In other countries Futurism, Suprematism, Dada, Constructivism and De Stijl developed in response to Cubism. Early Futurist paintings hold in common with Cubism the fusing of the past and the present, the representation of different views of the subject pictured at the same time, also called multiple perspective, simultaneity or multiplicity,[10] while Constructivism was influenced by Picasso's technique of constructing sculpture from separate elements.[11] Other common threads between these disparate movements include the faceting or simplification of geometric forms, and the association of mechanization and modern life.
Conception and origins[edit]
Main article: Proto-Cubism
Pablo Picasso, Les Demoiselles d'Avignon, 1907, considered to be a major step towards the founding of the Cubist movement[12]
Pablo Picasso, 1909-10, Figure dans un Fauteuil (Seated Nude, Femme nue assise), oil on canvas, 92.1 x 73 cm, Tate Modern, London
By 1911 Picasso was recognized as the inventor of Cubism, while Braque’s importance and precedence was argued later, with respect to his treatment of space, volume and mass in the L’Estaque landscapes. But "this view of Cubism is associated with a distinctly restrictive definition of which artists are properly to be called Cubists," wrote the art historian Christopher Green: "Marginalizing the contribution of the artists who exhibited at the Salon des Indépendants in 1911 [...]"[4]
The assertion that the Cubist depiction of space, mass, time, and volume supports (rather than contradicts) the flatness of the canvas was made by Daniel-Henry Kahnweiler as early as 1920,[15] but it was subject to criticism in the 1950s and 1960s, especially by Clement Greenberg.[16] Contemporary views of Cubism are complex, formed to some extent in response to the "Salle 41" Cubists, whose methods were too distinct from those of Picasso and Braque to be considered merely secondary to them. Alternative interpretations of Cubism have therefore developed. Wider views of Cubism include artists who were later associated with the "Salle 41" artists, e.g., Francis Picabia; the brothers Jacques Villon, Raymond Duchamp-Villon and Marcel Duchamp, who beginning in late 1911 formed the core of the Section d'Or (or the Puteaux Group); the sculptors Alexander Archipenko, Joseph Csaky and Ossip Zadkine as well as Jacques Lipchitz and Henri Laurens; and painters such as Louis Marcoussis, Roger de La Fresnaye, František Kupka, Diego Rivera, Léopold Survage, Auguste Herbin, André Lhote, Gino Severini (after 1916), María Blanchard (after 1916) and Georges Valmier (after 1918). More fundamentally, Christopher Green argues that Douglas Cooper's terms were "later undermined by interpretations of the work of Picasso, Braque, Gris and Léger that stress iconographic and ideological questions rather than methods of representation."[4]
John Berger identifies the essence of Cubism with the mechanical diagram. "The metaphorical model of Cubism is the diagram: The diagram being a visible symbolic representation of invisible processes, forces, structures. A diagram need not eschew certain aspects of appearance but these too will be treated as signs not as imitations or recreations."[17]
Technical and stylistic aspects[edit]
During the late 19th and early 20th centuries, Europeans were discovering African, Polynesian, Micronesian and Native American art. Artists such as Paul Gauguin, Henri Matisse, and Pablo Picasso were intrigued and inspired by the stark power and simplicity of styles of those foreign cultures. Around 1906, Picasso met Matisse through Gertrude Stein, at a time when both artists had recently acquired an interest in primitivism, Iberian sculpture, African art and African tribal masks. They became friendly rivals and competed with each other throughout their careers, perhaps leading to Picasso entering a new period in his work by 1907, marked by the influence of Greek, Iberian and African art. Picasso's paintings of 1907 have been characterized as Protocubism, as notably seen in Les Demoiselles d'Avignon, the antecedent of Cubism.[12]
Paul Cézanne, Quarry Bibémus, 1898-1900, Museum Folkwang, Essen, Germany
The art historian Douglas Cooper states that Paul Gauguin and Paul Cézanne "were particularly influential to the formation of Cubism and especially important to the paintings of Picasso during 1906 and 1907".[18] Cooper goes on to say: "The Demoiselles is generally referred to as the first Cubist picture. This is an exaggeration, for although it was a major first step towards Cubism it is not yet Cubist. The disruptive, expressionist element in it is even contrary to the spirit of Cubism, which looked at the world in a detached, realistic spirit. Nevertheless, the Demoiselles is the logical picture to take as the starting point for Cubism, because it marks the birth of a new pictorial idiom, because in it Picasso violently overturned established conventions and because all that followed grew out of it."[12]
The most serious objection to regarding the Demoiselles as the origin of Cubism, with its evident influence of primitive art, is that "such deductions are unhistorical", wrote the art historian Daniel Robbins. This familiar explanation "fails to give adequate consideration to the complexities of a flourishing art that existed just before and during the period when Picasso's new painting developed."[19] Between 1905 and 1908, a conscious search for a new style caused rapid changes in art across France, Germany, Holland, Italy, and Russia. The Impressionists had used a double point of view, and both Les Nabis and the Symbolists (who also admired Cézanne) flattened the picture plane, reducing their subjects to simple geometric forms. Neo-Impressionist structure and subject matter, most notably to be seen in the works of Georges Seurat (e.g., Parade de Cirque, Le Chahut and Le Cirque), was another important influence. There were also parallels in the development of literature and social thought.[19]
In addition to Seurat, the roots of cubism are to be found in the two distinct tendencies of Cézanne's later work: first his breaking of the painted surface into small multifaceted areas of paint, thereby emphasizing the plural viewpoint given by binocular vision, and second his interest in the simplification of natural forms into cylinders, spheres, and cones. However, the cubists explored this concept further than Cézanne. They represented all the surfaces of depicted objects in a single picture plane, as if the objects had all their faces visible at the same time. This new kind of depiction revolutionized the way objects could be visualized in painting and art.
The historical study of Cubism began in the late 1920s, drawing at first from sources of limited data, namely the opinions of Guillaume Apollinaire. It came to rely heavily on Daniel-Henry Kahnweiler's book Der Weg zum Kubismus (published in 1920), which centered on the developments of Picasso, Braque, Léger, and Gris. The terms "analytical" and "synthetic" which subsequently emerged have been widely accepted since the mid-1930s. Both terms are historical impositions that occurred after the facts they identify. Neither phase was designated as such at the time corresponding works were created. "If Kahnweiler considers Cubism as Picasso and Braque," wrote Daniel Robbins, "our only fault is in subjecting other Cubists' works to the rigors of that limited definition."[19]
The traditional interpretation of "Cubism", formulated post facto as a means of understanding the works of Braque and Picasso, has affected our appreciation of other twentieth-century artists. It is difficult to apply to painters such as Jean Metzinger, Albert Gleizes, Robert Delaunay and Henri Le Fauconnier, whose fundamental differences from traditional Cubism compelled Kahnweiler to question their right to be called Cubists at all. According to Daniel Robbins, "To suggest that merely because these artists developed differently or varied from the traditional pattern they deserved to be relegated to a secondary or satellite role in Cubism is a profound mistake."[19]
The history of the term "Cubism" usually stresses the fact that Matisse referred to "cubes" in connection with a painting by Braque in 1908, and that the term was published twice by the critic Louis Vauxcelles in a similar context. However, the word "cube" was used in 1906 by another critic, Louis Chassevent, with reference not to Picasso or Braque but rather to Metzinger and Delaunay:
"M. Metzinger is a mosaicist like M. Signac but he brings more precision to the cutting of his cubes of color which appear to have been made mechanically [...]".[19][20][21]
The critical use of the word "cube" goes back at least to May 1901 when Jean Béral, reviewing the work of Henri-Edmond Cross at the Indépendants in Art et Littérature, commented that he "uses a large and square pointillism, giving the impression of mosaic. One even wonders why the artist has not used cubes of solid matter diversely colored: they would make pretty revetments." (Robert Herbert, 1968, p. 221)[21]
The term Cubism did not come into general usage until 1911, mainly with reference to Metzinger, Gleizes, Delaunay, and Léger.[19] In 1911, the poet and critic Guillaume Apollinaire accepted the term on behalf of a group of artists invited to exhibit at the Brussels Indépendants. The following year, in preparation for the Salon de la Section d'Or, Metzinger and Gleizes wrote and published Du "Cubisme"[22] in an effort to dispel the confusion raging around the word, and as a major defence of Cubism (which had caused a public scandal following the 1911 Salon des Indépendants and the 1912 Salon d'Automne in Paris).[23] Clarifying their aims as artists, this work was the first theoretical treatise on Cubism and it still remains the clearest and most intelligible. The result, not solely a collaboration between its two authors, reflected discussions by the circle of artists who met in Puteaux and Courbevoie. It mirrored the attitudes of the "artists of Passy", which included Picabia and the Duchamp brothers, to whom sections of it were read prior to publication.[4][19] The concept developed in Du "Cubisme" of observing a subject from different points in space and time simultaneously, i.e., the act of moving around an object to seize it from several successive angles fused into a single image (multiple viewpoints, mobile perspective, simultaneity or multiplicity), is a generally recognized device used by the Cubists.[24]
The 1912 manifetso Du "Cubisme" by Metzinger and Gleizes was followed in 1913 by Les Peintres Cubistes, a collection of reflections and commentaries by Guillaume Apollinaire.[25] Apollinaire had been closely involved with Picasso beginning in 1905, and Braque beginning in 1907, but gave as much attention to artists such as Metzinger, Gleizes, Delaunay, Picabia, and Duchamp.[4]
Cubism before 1914[edit]
There was a distinct difference between Kahnweiler’s Cubists and the Salon Cubists. Prior to 1914, Picasso, Braque, Gris and Léger (to a lesser extent) gained the support of a single committed art dealer in Paris, Daniel-Henry Kahnweiler, who guaranteed them an annual income for the exclusive right to buy their works. Kahnweiler sold only to a small circle of connoisseurs. His support gave his artists the freedom to experiment in relative privacy. Picasso worked in Montmartre until 1912, while Braque and Gris remained there until after the First World War. Léger was based in Montparnasse.[4]
In contrast, the Salon Cubists built their reputation primarily by exhibiting regularly at the Salon d'Automne and the Salon des Indépendants, both major non-academic Salons in Paris. They were inevitably more aware of public response and the need to communicate.[4] Already in 1910 a group began to form which included Metzinger, Gleizes, Delaunay and Léger. They met regularly at Henri le Fauconnier's studio near the Boulevard de Montparnasse. These soirées often included writers such as Guillaume Apollinaire and André Salmon. Together with other young artists, the group wanted to emphasise a research into form, in opposition to the Neo-Impressionist emphasis on color.[26]
Louis Vauxcelles, in his review of the 26th Salon des Indépendants (1910), made a passing and imprecise reference to Metzinger, Gleizes, Delaunay, Léger and Le Fauconnier as "ignorant geometers, reducing the human body, the site, to pallid cubes."[19] At the 1910 Salon d'Automne, a few months later, Metzinger exhibited his highly fractured Nu à la cheminée (Nude), which was subsequently reproduced in Les Peintres Cubistes by Apollinaire (1913).[25]
The first public controversy generated by Cubism resulted from Salon showings at the Indépendants during the spring of 1911. This showing by Metzinger, Gleizes, Delaunay, le Fauconnier and Léger brought Cubism to the attention of the general public for the first time. Amongst the Cubist works presented, Robert Delaunay exhibited his Eiffel Tower, Tour Eiffel (Solomon R. Guggenheim Museum, New York).[27]
The "Cubists" Dominate Paris' Fall Salon, The New York Times, October 8, 1911. Picasso's 1908 Seated Woman (Meditation) is reproduced along with a photograph of the artist in his studio (upper left). Metzinger's Baigneuses (1908-09) is reproduced top right. Also reproduced are works by Derain, Matisse, Friesz, Herbin, and a photo of Braque
At the Salon d'Automne of the same year, in addition to the Indépendants group of Salle 41, were exhibited works by André Lhote, Marcel Duchamp, Jacques Villon, Roger de La Fresnaye, André Dunoyer de Segonzac and František Kupka. The exhibition was reviewed in the October 8, 1911 issue of The New York Times. This article was published a year after Gelett Burgess' The Wild Men of Paris, and two years prior to the Armory Show, which introduced astonished Americans, accustomed to realistic art, to the experimental styles of the European avant garde, including Fauvism, Cubism, and Futurism. The 1911 New York Times article portrayed works by Picasso, Matisse, Derain, Metzinger and others dated before 1909; not exhibited at the 1911 Salon. The article is titled: The "Cubists" Dominate Paris' Fall Salon and subtitled, Eccentric School of Painting Increases Its Vogue in the Current Art Exhibition - What Its Followers Attempt to Do.[28][29]
"Among all the paintings on exhibition at the Paris Fall Salon none is attracting so much attention as the extraordinary productions of the so-called "Cubist" school. In fact, dispatches from Paris suggest that these works are easily the main feature of the exhibition. [...]
In spite of the crazy nature of the "Cubist" theories the number of those professing them is fairly respectable. Georges Braque, André Derain, Picasso, Czobel, Othon Friesz, Herbin, Metzinger—these are a few of the names signed to canvases before which Paris has stood and now again stands in blank amazement.
What do they mean? Have those responsible for them taken leave of their senses? Is it art or madness? Who knows?"[28][29]
The subsequent 1912 Salon des Indépendants was marked by the presentation of Marcel Duchamp's Nude Descending a Staircase, No. 2, which itself caused a scandal, even amongst the Cubists. It was in fact rejected by the hanging committee, which included his brothers and other Cubists. Although the work was shown in the Salon de la Section d'Or in October 1912 and the 1913 Armory Show in New York, Duchamp never forgave his brothers and former colleagues for censoring his work.[26][30] Juan Gris, a new addition to the Salon scene, exhibited his Portrait of Picasso (Art Institute of Chicago), while Metzinger's two showings included La Femme au Cheval (Woman with a horse) 1911-1912 (Statens Museum for Kunst, National Gallery of Denmark).[31] Delaunay's monumental La Ville de Paris (Musée d'art moderne de la Ville de Paris) and Léger's La Noce, The Wedding (Musée National d'Art Moderne, Paris) were also exhibited.
The Cubist contribution to the 1912 Salon d'Automne created scandal regarding the use of government owned buildings, such as the Grand Palais, to exhibit such artwork. The indignation of the politician Jean Pierre Philippe Lampué made the front page of Le Journal, 5 October 1912.[32] The controversy spread to the Municipal Council of Paris, leading to a debate in the Chambre des Députés about the use of public funds to provide the venue for such art.[33] The Cubists were defended by the Socialist deputy, Marcel Sembat.[33][34][35]
It was against this background of public anger that Jean Metzinger and Albert Gleizes wrote Du "Cubisme" (published by Eugène Figuière in 1912, translated to English and Russian in 1913).[36] Among the works exhibited were Le Fauconnier's vast composition Les Montagnards attaqués par des ours (Mountaineers Attacked by Bears) now at Rhode Island School of Design Museum, Joseph Csaky's Deux Femme, Two Women (a sculpture now lost), in addition to the highly abstract paintings by Kupka, Amorpha (The National Gallery, Prague), and Picabia, La Source, The Spring (Museum of Modern Art, New York).
Abstraction and the Ready-made[edit]
Robert Delaunay, Simultaneous Windows on the City, 1912, 46 x 40 cm, Hamburger Kunsthalle, an example of Abstract Cubism
The most extreme forms of Cubism were not those practiced by Picasso and Braque, who resisted total abstraction. Other Cubists, by contrast, especially František Kupka, and those considered Orphists by Apollinaire (Delaunay, Léger, Picabia and Duchamp), accepted abstraction by removing visible subject matter entirely. Kupka’s two entries at the 1912 Salon d'Automne, Amorpha-Fugue à deux couleurs and Amorpha chromatique chaude, were highly abstract (or nonrepresentational) and metaphysical in orientation. Both Duchamp in 1912 and Picabia from 1912 to 1914 developed an expressive and allusive abstraction dedicated to complex emotional and sexual themes. Beginning in 1912 Delaunay painted a series of paintings entitled Simultaneous Windows, followed by a series entitled Formes Circulaires, in which he combined planar structures with bright prismatic hues; based on the optical characteristics of juxtaposed colors his departure from reality in the depiction of imagery was quasi-complete. In 1913–14 Léger produced a series entitled Contrasts of Forms, giving a similar stress to color, line and form. His Cubism, despite its abstract qualities, was associated with themes of mechanization and modern life. Apollinaire supported these early developments of abstract Cubism in Les Peintres cubistes (1913),[25] writing of a new "pure" painting in which the subject was vacated. But in spite of his use of the term Orphism these works were so different that they defy attempts to place them in a single category.[4]
Also labeled an Orphist by Apollinaire, Marcel Duchamp was responsible for another extreme development inspired by Cubism. The Ready-made arose from a joint consideration that the work itself is considered an object (just as a painting), and that it uses the material detritus of the world (as collage and papier collé in the Cubist construction and Assemblage). The next logical step, for Duchamp, was to present an ordinary object as a self-sufficient work of art representing only itself. In 1913 he attached a bicycle wheel to a kitchen stool and in 1914 selected a bottle-drying rack as a sculpture in its own right.[4]
Section d'Or[edit]
Main article: Section d'Or
The Salon d'Automne of 1912, held in Paris at the Grand Palais from 1 October to 8 November. Joseph Csaky’s sculpture Groupe de femmes of 1911-12 is exhibited to the left, in front of two sculptures by Amedeo Modigliani. Other works by Section d'Or artists are shown (left to right): František Kupka, Francis Picabia, Jean Metzinger and Henri Le Fauconnier
The Section d'Or, also known as Groupe de Puteaux, founded by some of the most conspicuous Cubists, was a collective of painters, sculptors and critics associated with Cubism and Orphism, active from 1911 through about 1914, coming to prominence in the wake of their controversial showing at the 1911 Salon des Indépendants. The Salon de la Section d'Or at the Galerie La Boétie in Paris, October 1912, was arguably the most important pre-World War I Cubist exhibition; exposing Cubism to a wide audience. Over 200 works were displayed, and the fact that many of the artists showed artworks representative of their development from 1909 to 1912 gave the exhibition the allure of a Cubist retrospective.[37]
The group seems to have adopted the name Section d'Or to distinguish themselves from the narrower definition of Cubism developed in parallel by Pablo Picasso and Georges Braque in the Montmartre quarter of Paris, and to show that Cubism, rather than being an isolated art-form, represented the continuation of a grand tradition (indeed, the golden ratio had fascinated Western intellectuals of diverse interests for at least 2,400 years).[38]
The idea of the Section d'Or originated in the course of conversations between Metzinger, Gleizes and Jacques Villon. The group's title was suggested by Villon, after reading a 1910 translation of Leonardo da Vinci's Trattato della Pittura by Joséphin Péladan.
The fact that the 1912 exhibition had been curated to show the successive stages through which Cubism had transited, and that Du "Cubisme" had been published for the occasion, indicates the artists' intention of making their work comprehensible to a wide audience (art critics, art collectors, art dealers and the general public). Undoubtedly, due to the great success of the exhibition, Cubism became recognized as a tendency, genre or style in art with a specific common philosophy or goal: a new avant-garde movement.[37]
Intentions and interpretations[edit]
Juan Gris, Portrait of Picasso, 1912, oil on canvas, Art Institute of Chicago
The Cubism of Picasso, Braque and Gris had more than a technical or formal significance, and the distinct attitudes and intentions of the Salon Cubists produced different kinds of Cubism, rather than a derivative of their work. "It is by no means clear, in any case," wrote Christopher Green, "to what extent these other Cubists depended on Picasso and Braque for their development of such techniques as faceting, 'passage' and multiple perspective; they could well have arrived at such practices with little knowledge of 'true' Cubism in its early stages, guided above all by their own understanding of Cézanne." The works exhibited by these Cubists at the 1911 and 1912 Salons extended beyond the conventional Cézanne-like subjects—the posed model, still-life and landscape—favored by Picasso and Braque to include large-scale modern-life subjects. Aimed at a large public, these works stressed the use of multiple perspective and complex planar faceting for expressive effect while preserving the eloquence of subjects endowed with literary and philosophical connotations.[4]
In Du "Cubisme" Metzinger and Gleizes explicitly related the sense of time to multiple perspective, giving symbolic expression to the notion of ‘duration’ proposed by the philosopher Henri Bergson according to which life is subjectively experienced as a continuum, with the past flowing into the present and the present merging into the future. The Salon Cubists used the faceted treatment of solid and space and effects of multiple viewpoints to convey a physical and psychological sense of the fluidity of consciousness, blurring the distinctions between past, present and future. One of the major theoretical innovations made by the Salon Cubists, independently of Picasso and Braque, was that of simultaneity,[4] drawing to greater or lesser extent on theories of Henri Poincaré, Ernst Mach, Charles Henry, Maurice Princet, and Henri Bergson. With simultaneity, the concept of separate spatial and temporal dimensions was comprehensively challenged. Linear perspective developed during the Renaissance was vacated. The subject-matter was no longer considered from a specific point of view at a moment in time, but built following a selection of successive viewpoints, i.e., as if viewed simultaneously from numerous angles (and in multiple dimensions) with the eye free to roam from one to the other.[24]
This technique of representing simultaneity, multiple viewpoints (or relative motion) is pushed to a high degree of complexity in Gleizes' monumental Le Dépiquage des Moissons (Harvest Threshing), exhibited at the 1912 Salon de la Section d'Or, Le Fauconnier’s Abundance shown at the Indépendants of 1911, and Delaunay's City of Paris, shown at the Indépendants in 1912. These ambitious works are some of the largest paintings in the history of Cubism. Léger’s The Wedding, also shown at the Salon des Indépendants in 1912, gave form to the notion of simultaneity by presenting different motifs as occurring within a single temporal frame, where responses to the past and present interpenetrate with collective force. The conjunction of such subject-matter with simultaneity aligns Salon Cubism with early Futurist paintings by Umberto Boccioni, Gino Severini and Carlo Carrà; themselves made in response to early Cubism.[10]
Cubism and modern European art was introduced into the United States at the now legendary 1913 Armory Show in New York City, which then traveled to Chicago and Boston. In the Armory show Pablo Picasso exhibited La Femme au pot de moutarde (1910), the sculpture Head of a Woman (Fernande) (1909–10), Les Arbres (1907) amongst other cubist works. Jacques Villon exhibited seven important and large drypoints, his brother Marcel Duchamp shocked the American public with his painting Nude Descending a Staircase, No. 2 (1912). Francis Picabia exhibited his abstractions La Danse à la source and La Procession, Seville (both of 1912). Albert Gleizes exhibited La Femme aux phlox (1910) and L'Homme au balcon (1912), two highly stylized and faceted cubist works. Georges Braque, Fernand Léger, Raymond Duchamp-Villon, Roger de La Fresnaye and Alexander Archipenko also contributed examples of their cubist works.
Cubist sculpture[edit]
Pablo Picasso, 1909–10, Head of a Woman
Side view, bronze sculpture modeled on Fernande Olivier
Frontal view of the same bronze cast, 40.5 x 23 x 26 cm
These photos were published in Umělecký Mĕsíčník, 1913[39]
Main article: Cubist sculpture
Just as in painting, Cubist sculpture is rooted in Paul Cézanne's reduction of painted objects into component planes and geometric solids (cubes, spheres, cylinders, and cones). And just as in painting, it became a pervasive influence and contributed fundamentally to Constructivism and Futurism.
Cubist sculpture developed in parallel to Cubist painting. During the autumn of 1909 Picasso sculpted Head of a Woman (Fernande) with positive features depicted by negative space and vice versa. According to Douglas Cooper: "The first true Cubist sculpture was Picasso's impressive Woman's Head, modeled in 1909-10, a counterpart in three dimensions to many similar analytical and faceted heads in his paintings at the time."[40] These positive/negative reversals were ambitiously exploited by Alexander Archipenko in 1912–13, for example in Woman Walking.[4] Joseph Csaky, after Archipenko, was the first sculptor in Paris to join the Cubists, with whom he exhibited from 1911 onwards. They were followed by Raymond Duchamp-Villon and then in 1914 by Jacques Lipchitz, Henri Laurens and Ossip Zadkine.[41][42]
Cubism after 1918[edit]
Pablo Picasso, Three Musicians (1921), Museum of Modern Art. Three Musicians is a classic example of Synthetic cubism.[43]
The most innovative period of Cubism was before 1914. After World War I, with the support given by the dealer Léonce Rosenberg, Cubism returned as a central issue for artists, and continued as such until the mid-1920s when its avant-garde status was rendered questionable by the emergence of geometric abstraction and Surrealism in Paris. Many Cubists, including Picasso, Braque, Gris, Léger, Gleizes, and Metzinger, while developing other styles, returned periodically to Cubism, even well after 1925. Cubism reemerged during the 1920s and the 1930s in the work of the American Stuart Davis and the Englishman Ben Nicholson. In France, however, Cubism experienced a decline beginning in about 1925. Léonce Rosenberg exhibited not only the artists stranded by Kahnweiler’s exile but others including Laurens, Lipchitz, Metzinger, Gleizes, Csaky, Herbin and Severini. In 1918 Rosenberg presented a series of Cubist exhibitions at his Galerie de l’Effort Moderne in Paris. Attempts were made by Louis Vauxcelles to claim that Cubism was dead, but these exhibitions, along with a well-organized Cubist show at the 1920 Salon des Indépendants and a revival of the Salon de la Section d’Or in the same year, demonstrated it was still alive.[4]
The reemergence of Cubism coincided with the appearance from about 1917–24 of a coherent body of theoretical writing by Pierre Reverdy, Maurice Raynal and Daniel-Henry Kahnweiler and, among the artists, by Gris, Léger and Gleizes. The occasional return to classicism—figurative work either exclusively or alongside Cubist work—experienced by many artists during this period (called Neoclassicism) has been linked to the tendency to evade the realities of the war and also to the cultural dominance of a classical or Latin image of France during and immediately following the war. Cubism after 1918 can be seen as part of a wide ideological shift towards conservatism in both French society and culture. Yet, Cubism itself remained evolutionary both within the oeuvre of individual artists, such as Gris and Metzinger, and across the work of artists as different from each other as Braque, Léger and Gleizes. Cubism as a publicly debated movement became relatively unified and open to definition. Its theoretical purity made it a gauge against which such diverse tendencies as Realism or Naturalism, Dada, Surrealism and abstraction could be compared.[4]
Le Corbusier, Assembly building, Chandigarh, India
Cubism formed an important link between early-20th-century art and architecture.[44] The historical, theoretical, and socio-political relationships between avant-garde practices in painting, sculpture and architecture had early ramifications in France, Germany, the Netherlands and Czechoslovakia. Though there are many points of intersection between Cubism and architecture, only a few direct links between them can be drawn. Most often the connections are made by reference to shared formal characteristics: faceting of form, spatial ambiguity, transparency, and multiplicity.[44]
Architectural interest in Cubism centered on the dissolution and reconstitution of three-dimensional form, using simple geometric shapes, juxtaposed without the illusions of classical perspective. Diverse elements could be superimposed, made transparent or penetrate one another, while retaining their spatial relationships. Cubism had become an influential factor in the development of modern architecture from 1912 (La Maison Cubiste, by Raymond Duchamp-Villon and André Mare) onwards, developing in parallel with architects such as Peter Behrens and Walter Gropius, with the simplification of building design, the use of materials appropriate to industrial production, and the increased use of glass.[45]
Le Corbusier, Centre Le Corbusier (Heidi Weber Museum) in Zurich-Seefeld (Zürichhorn)
Cubism was relevant to an architecture seeking a style that needed not refer to the past. Thus, what had become a revolution in both painting and sculpture was applied as part of "a profound reorientation towards a changed world".[45][46] The Cubo-Futurist ideas of Filippo Tommaso Marinetti influenced attitudes in avant-garde architecture. The influential De Stijl movement embraced the aesthetic principles of Neo-plasticism developed by Piet Mondrian under the influence of Cubism in Paris. De Stijl was also linked by Gino Severini to Cubist theory through the writings of Albert Gleizes. However, the linking of basic geometric forms with inherent beauty and ease of industrial application—which had been prefigured by Marcel Duchamp from 1914—was left to the founders of Purism, Amédée Ozenfant and Charles-Édouard Jeanneret (better known as Le Corbusier,) who exhibited paintings together in Paris and published Après le cubisme in 1918.[45] Le Corbusier's ambition had been to translate the properties of his own style of Cubism to architecture. Between 1918 and 1922, Le Corbusier concentrated his efforts on Purist theory and painting. In 1922, Le Corbusier and his cousin Jeanneret opened a studio in Paris at 35 rue de Sèvres. His theoretical studies soon advanced into many different architectural projects.[47]
La Maison Cubiste (Cubist House)[edit]
Raymond Duchamp-Villon, 1912, Study for La Maison Cubiste, Projet d'Hotel (Cubist House). Image published in Les Peintres Cubistes, by Guillaume Apollinaire, 17 March 1913
At the 1912 Salon d'Automne an architectural installation was exhibited that quickly became known as Maison Cubiste (Cubist House), signed Raymond Duchamp-Villon and André Mare along with a group of collaborators. Metzinger and Gleizes in Du "Cubisme", written during the assemblage of the "Maison Cubiste", wrote about the autonomous nature of art, stressing the point that decorative considerations should not govern the spirit of art. Decorative work, to them, was the "antithesis of the picture". "The true picture" wrote Metzinger and Gleizes, "bears its raison d'être within itself. It can be moved from a church to a drawing-room, from a museum to a study. Essentially independent, necessarily complete, it need not immediately satisfy the mind: on the contrary, it should lead it, little by little, towards the fictitious depths in which the coordinative light resides. It does not harmonize with this or that ensemble; it harmonizes with things in general, with the universe: it is an organism...".[48] "Mare's ensembles were accepted as frames for Cubist works because they allowed paintings and sculptures their independence", writes Christopher Green, "creating a play of contrasts, hence the involvement not only of Gleizes and Metzinger themselves, but of Marie Laurencin, the Duchamp brothers (Raymond Duchamp-Villon designed the facade) and Mare's old friends Léger and Roger La Fresnaye".[49] La Maison Cubiste was a fully furnished house, with a staircase, wrought iron banisters, a living room—the Salon Bourgeois, where paintings by Marcel Duchamp, Metzinger (Woman with a Fan), Gleizes, Laurencin and Léger were hung—and a bedroom. It was an example of L'art décoratif, a home within which Cubist art could be displayed in the comfort and style of modern, bourgeois life. Spectators at the Salon d'Automne passed through the full-scale 10-by-3-meter plaster model of the ground floor of the facade, designed by Duchamp-Villon.[50] This architectural installation was subsequently exhibited at the 1913 Armory Show, New York, Chicago and Boston,[51] listed in the catalogue of the New York exhibit as Raymond Duchamp-Villon, number 609, and entitled "Facade architectural, plaster" (Façade architecturale).[52][53]
Cubism in other fields[edit]
The influence of cubism extended to other artistic fields, outside painting and sculpture. In literature, the written works of Gertrude Stein employ repetition and repetitive phrases as building blocks in both passages and whole chapters. Most of Stein's important works utilize this technique, including the novel The Making of Americans (1906–08). Not only were they the first important patrons of Cubism, Gertrude Stein and her brother Leo were also important influences on Cubism as well. Picasso in turn was an important influence on Stein's writing.
In the field of American fiction, William Faulkner's 1930 novel As I Lay Dying can be read as an interaction with the cubist mode. The novel features narratives of the diverse experiences of 15 characters which, when taken together, produce a single cohesive body.
The poets generally associated with Cubism are Guillaume Apollinaire, Blaise Cendrars, Jean Cocteau, Max Jacob, André Salmon and Pierre Reverdy. As American poet Kenneth Rexroth explains, Cubism in poetry "is the conscious, deliberate dissociation and recombination of elements into a new artistic entity made self-sufficient by its rigorous architecture. This is quite different from the free association of the Surrealists and the combination of unconscious utterance and political nihilism of Dada."[54] Nonetheless, the Cubist poets' influence on both Cubism and the later movements of Dada and Surrealism was profound; Louis Aragon, founding member of Surrealism, said that for Breton, Soupault, Éluard and himself, Reverdy was "our immediate elder, the exemplary poet."[55] Though not as well remembered as the Cubist painters, these poets continue to influence and inspire; American poets John Ashbery and Ron Padgett have recently produced new translations of Reverdy's work. Wallace Stevens' "Thirteen Ways of Looking at a Blackbird" is also said to demonstrate how cubism's multiple perspectives can be translated into poetry.[56]
Cubism, Futurism, press articles and reviews[edit]
See also[edit]
1. ^ Christopher Green, MoMA collection, Cubism, Introduction, from Grove Art Online, Oxford University Press, 2009
2. ^ Cubism: The Leonard A. Lauder Collection, The Metropolitan Museum of Art, New York, 2014
3. ^ Christopher Green, MoMA collection Cubism, Origins and application of the term, from Grove Art Online, Oxford University Press, 2009
4. ^ a b c d e f g h i j k l m n o p q Christopher Green, 2009, Cubism, MoMA, Grove Art Online, Oxford University Press
5. ^ Joann Moser, Jean Metzinger in Retrospect, Pre-Cubist works, 1904–1909, The University of Iowa Museum of Art, J. Paul Getty Trust, University of Washington Press 1985, pp. 34-42
6. ^ Jean Metzinger, Note sur la peinture, Pan (Paris), October–November 1910
7. ^ Christopher Green, Cubism and Its Enemies: Modern Movements and Reaction in French Art, 1916-1928, Yale University Press, New Haven and London, 1987, ISBN 0300034687
8. ^ Hajo Düchting, Orphism, MoMA, Grove Art Online, Oxford University Press, 2009
9. ^ Magdalena Dabrowski, Geometric Abstraction, Heilbrunn Timeline of Art History, The Metropolitan Museum of Art, New York, 2000
10. ^ a b Christopher Green, 2009, Cubism, Meanings and interpretations, MoMA, Grove Art Online, Oxford University Press, 2009
11. ^ Christina Lodder, 2009, Constructivism, Formation, 1914–21, MoMA, Grove Art Online, Oxford University Press, 2009
12. ^ a b c Cooper, 24
13. ^ Honour, H. and J. Fleming, (2009) A World History of Art. 7th edn. London: Laurence King Publishing, p. 784. ISBN 9781856695848
15. ^ D.-H. Kahnweiler. Der Weg zum Kubismus (Munich, 1920; Eng. trans., New York, 1949)
16. ^ C. Greenberg. ‘The Pasted-paper Revolution’, ARTnews, 57 (1958), pp. 46–9, 60–61; repr. as ‘Collage’ in Art and Culture (Boston, 1961), pp. 70–83
17. ^ Berger, John (1969). The Moment of Cubism. New York, NY: Pantheon. ISBN 9780297177098.
18. ^ Cooper, 20-27
19. ^ a b c d e f g h Daniel Robbins, 1964, Albert Gleizes 1881 - 1953, A Retrospective Exhibition, Published by The Solomon R. Guggenheim Foundation, New York, in collaboration with Musée National d'Art Moderne, Paris, Museum am Ostwall, Dortmund.
20. ^ Louis Chassevent, Les Artistes Indépendants, 1906, Quelques Petits Salons. Paris, 1908. Chassevent discussed Delaunay and Metzinger in terms of Signac's influence, referring to Metzinger's "precision in the cut of his cubes..."
21. ^ a b Robert Herbert, Neo-Impressionism, The Solomon R. Guggenheim Foundation, New York, 1968
22. ^ A. Gleizes and J. Metzinger. Du "Cubisme", Edition Figuière, Paris, 1912 (Eng. trans., London, 1913)
23. ^ Fritz-R. Vanderpyl, Guy-Charles Cros, Réflexions sur les dernières tendances picturales, Mercure de France, 1 December 1912, pp. 527-541
24. ^ a b David Cottington, 2004, Cubism and its Histories, Manchester University Press
25. ^ a b c Guillaume Apollinaire, Les Peintres cubistes: Méditations esthétiques (Paris, 1913)
26. ^ a b Fondation Gleizes, Chronologie (in French)
27. ^ Robert Delaunay, Eiffel Tower (Tour Eiffel), 1911 (dated 1910 by the artist). Oil on canvas, 79 1/2 x 54 1/2 inches (202 x 138.4 cm). Solomon R. Guggenheim Museum, New York
28. ^ a b Eccentric School of Painting Increases Its Vogue in the Current Art Exhibition - What Its Followers Attempt to Do. The New York Times, October 8, 1911 (High-resolution PDF)
29. ^ a b The "Cubists" Dominate Paris' Fall Salon, New York Times, October 8, 1911 (High-resolution PDF)
30. ^ Philadelphia Museum of Art, Marcel Duchamp, Nude Descending a Staircase, No. 2
31. ^ Statens Museum for Kunst, National Gallery of Denmark, Jean Metzinger, Woman with a Horse, 1911–1912, oil on canvas, 162 x 130 cm
32. ^ M. Lampué s’indigne contre le Salon d’Automne, Le Journal, 5 October 1912, p. 1
33. ^ a b Journal officiel de la République française. Débats parlementaires. Chambre des députés, 3 Décembre 1912, pp. 2924-2929. Bibliothèque et Archives de l'Assemblée nationale, 2012-7516. ISSN 12705942
34. ^ Patrick F. Barrer: Quand l'art du XXe siècle était conçu par les inconnus, pp. 93-101, gives an account of the debate.
35. ^ Peter Brooke, Albert Gleizes, Chronology of his life, 1881-1953
36. ^ Fondation Gleizes, Son Oeuvre
37. ^ a b The History and Chronology of Cubism, p. 5
38. ^ La Section d'Or, Numéro spécial, 9 Octobre 1912
39. ^ Pablo Picasso, 1909–10, Head of a Woman, bronze, published in Umělecký Mĕsíčník, 1913, Blue Mountain Project, Princeton University
40. ^ The Cubist Epoch, (1970) p.232
41. ^ Robert Rosenblum, "Cubism," Readings in Art History 2 (1976), Seuphor, Sculpture of this Century
42. ^ Edith Balas, 1998, Joseph Csaky: A Pioneer of Modern Sculpture, American Philosophical Society
43. ^ "The Museum of Modern Art". Retrieved 2011-06-11.
44. ^ a b Architecture and Cubism, Eve Blau, Nancy J. Troy, MIT Press/Canadian Centre for Architecture, 1997, pbk. 2002
45. ^ a b c Christopher Green, 2009, Cubism, II. Architecture, MoMA, Grove Art Online, Oxford University Press
46. ^ P. R. Banham. Theory and Design in the First Machine Age (London, 1960), p. 203
47. ^ Choay, Françoise, le corbusier (1960), pp. 10-11. George Braziller, Inc. ISBN 0-8076-0104-7
48. ^ Albert Gleizes and Jean Metzinge, except from Du Cubisme, 1912
49. ^ Christopher Green, Art in France: 1900-1940, Chapter 8, Modern Spaces; Modern Objects; Modern People, 2000
50. ^ La Maison Cubiste, 1912
51. ^ Kubistische werken op de Armory Show
52. ^ Duchamp-Villon's Façade architecturale, 1913
54. ^ Kenneth Rexroth. "The Cubist Poetry of Pierre Reverdy (Rexroth)". Retrieved 2011-06-11.
55. ^ Reverdy, Pierre. "Title Page > Pierre Reverdy: Selected Poems". Bloodaxe Books. Retrieved 2011-06-11.
56. ^ Illinois Wesleyan University - The American Poetry Web[dead link]
57. ^ Berger, John. (1965). The Success and Failure of Picasso. Penguin Books, Ltd. p. 73. ISBN 978-0-679-73725-4.
Further reading[edit]
• Alfred H. Barr, Jr., Cubism and Abstract Art, New York: Museum of Modern Art, 1936.
• John Cauman (2001). Inheriting Cubism: The Impact of Cubism on American Art, 1909-1936. New York: Hollis Taggart Galleries. ISBN 0-9705723-4-4.
• Cooper, Douglas (1970). The Cubist Epoch. London: Phaidon in association with the Los Angeles County Museum of Art & the Metropolitan Museum of Art. ISBN 0-87587-041-4.
• Paolo Vincenzo Genovese, Cubismo in architettura, Mancosu Editore, Roma, 2010. In Italian.
• John Golding, Cubism: A History and an Analysis, 1907-1914, New York: Wittenborn, 1959.
• Richardson, John. A Life Of Picasso, The Cubist Rebel 1907-1916. New York: Alfred A. Knopf, 1991. ISBN 978-0-307-26665-1
• Mark Antliff and Patricia Leighten, A Cubism Reader, Documents and Criticism, 1906-1914, The University of Chicago Press, 2008
• Christopher Green, Cubism and its Enemies, Modern Movements and Reaction in French Art, 1916-28, Yale University Press, New Haven and London, 1987
• Daniel Robbins, Sources of Cubism and Futurism, Art Journal, Vol. 41, No. 4, (Winter 1981)
• Cécile Debray, Françoise Lucbert, La Section d'or, 1912-1920-1925, Musées de Châteauroux, Musée Fabre, exhibition catalogue, Éditions Cercle d'art, Paris, 2000
External links[edit]
|
global_05_local_5_shard_00000035_processed.jsonl/33367
|
From Wikipedia, the free encyclopedia
(Redirected from HOX gene)
Jump to: navigation, search
Symbol Homeodomain
Pfam PF00046
Pfam clan CL0123
InterPro IPR001356
SCOP 1ahd
Homeoboxes were discovered independently in 1983 by Ernst Hafen, Michael Levine, and William McGinnis working in the lab of Walter Jakob Gehring at the University of Basel, Switzerland; and by Matthew P. Scott and Amy Weiner, who were then working with Thomas Kaufman at Indiana University in Bloomington.[4][5] The existence of homeoboxes was first discovered in Drosophila, where the radical alterations that resulted from mutations in homeobox genes were termed homeotic mutations. One of the most famous such mutation is Antennapedia, in which legs grow from the head of a fly instead of the expected antennae.
Homeodomain proteins[edit]
A homeobox is about 180 base pairs long and encodes a protein domain that binds DNA. The following shows the consensus homeodomain (~60 amino acid residue chain), with typical insertion sites noted with dashes:[6]
The characteristic homeodomain protein fold consists of a 60-amino acid helix-turn-helix (HTH) structure in which three alpha helices are connected by short loop regions. The N-terminal two helices are antiparallel and the longer C-terminal helix is roughly perpendicular to the axes established by the first two. It is this third helix that interacts directly with DNA via a number of hydrogen bonds and hydrophobic interactions, which occur between specific side chains and the exposed bases and thymine methyl groups within the major groove of the DNA.[7]
Sequence specificity[edit]
Biological function[edit]
The homeobox domain was first identified in a number of Drosophila homeotic and segmentation proteins, but is now known to be well-conserved in many other animals, including vertebrates.[7][9][10]
Hox genes[edit]
Hox gene expression in Drosophila melanogaster.
Main article: Hox gene
Hox genes are essential metazoan genes as they determine the identity of embryonic regions along the anterio-posterior axis.[11] The first vertebrate Hox gene was isolated in Xenopus by Eddy De Robertis and colleagues in 1984, marking the beginning of the young science of evolutionary developmental biology ("evo-devo").[12]
Molecular evidence shows that some limited number of Hox genes have existed in the Cnidaria since before the earliest true Bilatera, making these genes pre-Paleozoic.[13] Homeobox genes have even been found in fungi, for example the unicellular yeasts, and in plants.[citation needed]
The plant homeotic genes code for the typical 60 amino acid long DNA-binding homeodomain or in case of the TALE (three amino acid loop extension) homeobox genes for an "atypical" homeodomain consisting of 63 amino acids. According to their conserved intron–exon structure and to unique codomain architectures they have been grouped into 14 distinct classes: HD-ZIP I to IV, BEL, KNOX, PLINC, WOX, PHD, DDT, NDX, LD, SAWADEE and PINTOX.[14] Conservation of codomains suggests a common eukaryotic ancestry for TALE[15] and non-TALE homeodomain proteins.[16]
Human genes[edit]
Humans generally contain Hox genes in four clusters:
name chromosome gene
There is also a "distal-less homeobox" family: DLX1, DLX2, DLX3, DLX4, DLX5, and DLX6. Dlx genes are involved in the development of the nervous system and of limbs.[17] Other examples include HESX homeobox 1 (HESX1) and short stature homeobox gene (SHOX).
Additional human proteins containing this domain per UniProt annotation:
Mutations to homeobox genes can produce easily visible phenotypic changes.
POU proteins[edit]
Further information: POU family
See also[edit]
2. ^ Gehring WJ (Aug 1992). "The homeobox in perspective". Trends in Biochemical Sciences 17 (8): 277–80. doi:10.1016/0968-0004(92)90434-B. PMID 1357790.
4. ^ McGinnis W, Levine MS, Hafen E, Kuroiwa A, Gehring WJ (1984). "A conserved DNA sequence in homoeotic genes of the Drosophila Antennapedia and bithorax complexes". Nature 308 (5958): 428–33. doi:10.1038/308428a0. PMID 6323992.
5. ^ Scott MP, Weiner AJ (Jul 1984). "Structural relationships among genes that control development: sequence homology between the Antennapedia, Ultrabithorax, and fushi tarazu loci of Drosophila". Proceedings of the National Academy of Sciences of the United States of America 81 (13): 4115–9. doi:10.1073/pnas.81.13.4115. PMC 345379. PMID 6330741.
6. ^ Bürglin TR. "The homeobox page" (GIF). Karolinksa Institute.
8. ^ Corsetti MT, Briata P, Sanseverino L, Daga A, Airoldi I, Simeone A et al. (Sep 1992). "Differential DNA binding properties of three human homeodomain proteins". Nucleic Acids Research 20 (17): 4465–72. doi:10.1093/nar/20.17.4465. PMC 334173. PMID 1357628.
9. ^ Scott MP, Tamkun JW, Hartzell GW (Jul 1989). "The structure and function of the homeodomain". Biochimica Et Biophysica Acta 989 (1): 25–48. doi:10.1016/0304-419x(89)90033-4. PMID 2568852.
11. ^ Alonso CR (Nov 2002). "Hox proteins: sculpting body parts by activating localized cell death". Current Biology 12 (22): R776–8. doi:10.1016/S0960-9822(02)01291-5. PMID 12445403.
12. ^ Carrasco AE, McGinnis W, Gehring WJ, De Robertis EM (Jun 1984). "Cloning of an X. laevis gene expressed during early embryogenesis coding for a peptide region homologous to Drosophila homeotic genes". Cell 37 (2): 409–14. doi:10.1016/0092-8674(84)90371-4. PMID 6327066.
13. ^ Ryan JF, Mazza ME, Pang K, Matus DQ, Baxevanis AD, Martindale MQ et al. (2007). "Pre-bilaterian origins of the Hox cluster and the Hox code: evidence from the sea anemone, Nematostella vectensis". PloS One 2 (1): e153. doi:10.1371/journal.pone.0000153. PMC 1779807. PMID 17252055.
14. ^ Mukherjee K, Brocchieri L, Bürglin TR (Dec 2009). "A comprehensive classification and evolutionary analysis of plant homeobox genes". Molecular Biology and Evolution 26 (12): 2775–94. doi:10.1093/molbev/msp201. PMC 2775110. PMID 19734295.
15. ^ Bürglin TR (Nov 1997). "Analysis of TALE superclass homeobox genes (MEIS, PBC, KNOX, Iroquois, TGIF) reveals a novel domain conserved between plants and animals". Nucleic Acids Research 25 (21): 4173–80. doi:10.1093/nar/25.21.4173. PMC 147054. PMID 9336443.
16. ^ Derelle R, Lopez P, Le Guyader H, Manuel M (2007). "Homeodomain proteins belong to the ancestral molecular toolkit of eukaryotes". Evolution & Development 9 (3): 212–9. doi:10.1111/j.1525-142X.2007.00153.x. PMID 17501745.
17. ^ Kraus P, Lufkin T (Jul 2006). "Dlx homeobox gene control of mammalian limb and craniofacial development". American Journal of Medical Genetics. Part A 140 (13): 1366–74. doi:10.1002/ajmg.a.31252. PMID 16688724.
Further reading[edit]
• Lodish et al. (2003). Molecular Cell Biology (5th ed.). New York: W.H. Freeman and Company. ISBN 0-7167-4366-3.
• Tooze, Carl Branden, John (1999). Introduction to protein structure (2nd ed.). New York: Garland Pub. pp. 159–66. ISBN 978-0815323051.
• Ogishima S, Tanaka H (Jan 2007). "Missing link in the evolution of Hox clusters". Gene 387 (1-2): 21–30. doi:10.1016/j.gene.2006.08.011. PMID 17098381.
External links[edit]
This article incorporates text from the public domain Pfam and InterPro IPR001356
|
global_05_local_5_shard_00000035_processed.jsonl/33369
|
Northwest Passage
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Northwest Passage routes
The Northwest Passage is a sea route through the Arctic Ocean, along the northern coast of North America via waterways through the Canadian Arctic Archipelago, connecting the Atlantic and Pacific Oceans.[1][2][3][4] The various islands of the archipelago are separated from one another and the Canadian mainland by a series of Arctic waterways collectively known as the Northwest Passages or Northwestern Passages.[5] The Parliament of Canada renamed these waterways the "Canadian Northwest Passage" in motion M-387 passed unanimously 2 December 2009.[6][7]
Sought by explorers for centuries as a possible trade route, it was first navigated by Norwegian explorer Roald Amundsen with a small expedition in 1903–1906. Until 2009, the Arctic pack ice prevented regular marine shipping throughout most of the year. Changes in the pack ice (Arctic shrinkage) caused by climate change have rendered the waterways more navigable.[8][9][10][11] The contested sovereignty claims over the waters may complicate future shipping through the region: the Canadian government considers the Northwestern Passages part of Canadian Internal Waters,[12] but the United States and various European countries maintain they are an international strait and transit passage, allowing free and unencumbered passage.[13][14] If, as has been claimed, parts of the eastern end of the Passage are barely 15 metres (49 ft) deep,[15] the route's viability as a Euro-Asian shipping route is reduced.
Strait of Anian. Upper left corner. (Hugo Allard, 1685)
Before the Little Ice Age, Norwegian Vikings sailed as far north and west as Ellesmere Island, Skraeling Island and Ruin Island for hunting expeditions and trading with the Inuit and people of the Dorset culture who already inhabited the region.[16] Between the end of the 15th century and the 20th century, colonial powers from Europe dispatched explorers in an attempt to discover a commercial sea route north and west around North America. The Northwest Passage represented a new route to the established trading nations of Asia.
England called the hypothetical northern route the "Northwest Passage". The desire to establish such a route motivated much of the European exploration of both coasts of North America. When it became apparent that there was no route through the heart of the continent, attention turned to the possibility of a passage through northern waters. There was a lack of scientific knowledge about conditions; for instance, some people believed that seawater was incapable of freezing. (As late as the mid-18th century, Captain James Cook had reported that Antarctic icebergs had yielded fresh water, seemingly confirming the hypothesis.) Explorers thought that an open water route close to the North Pole must exist.[17] The belief that a route lay to the far north persisted for several centuries and led to numerous expeditions into the Arctic. Many ended in disaster, including that by Sir John Franklin in 1845. In 1906, the Norwegian explorer Roald Amundsen first successfully completed a passage from Greenland to Alaska in the sloop Gjøa.[18] Since that date, several fortified ships have made the journey.
From east to west, the direction of most early exploration attempts, expeditions entered the passage from the Atlantic Ocean via the Davis Strait and through Baffin Bay. Five to seven routes have been taken through the Canadian Arctic Archipelago, via the McClure Strait, Dease Strait, and the Prince of Wales Strait, but not all of them are suitable for larger ships.[13][19] From there ships passed through waterways through the Beaufort Sea, Chukchi Sea, and Bering Strait (separating Russia and Alaska), into the Pacific Ocean.
In the 21st century, major changes to the ice pack due to climate change have stirred speculation that the passage may become clear enough of ice to permit safe commercial shipping for at least part of the year. On August 21, 2007, the Northwest Passage became open to ships without the need of an icebreaker. According to Nalan Koc of the Norwegian Polar Institute, this is the first time the Passage has been clear since they began keeping records in 1972.[8][20] The Northwest Passage opened again on August 25, 2008.[21]
Thawing ocean or melting ice simultaneously opened up the Northwest Passage and the Northeast Passage (and within it, the Northern Sea Route), making it possible to sail around the Arctic ice cap.[22] Compared to 1979, the Daily Mail published "Blocked: The Arctic ice, showing as a pink mass in the 1979 picture, links up with northern Canada and Russia."[23] Awaited by shipping companies, this 'historic event' will cut thousands of miles off their routes. Warning, however, that the NASA satellite images indicated the Arctic may have entered a "death spiral" caused by climate change, Professor Mark Serreze, a sea ice specialist at National Snow and Ice Data Center (NSIDC), USA, said: "The passages are open. It's a historic event. We are going to see this more and more as the years go by."[24][25]
Due to Arctic shrinkage, the Beluga group of Bremen, Germany, sent the first Western commercial vessels through the Northern Sea Route (Northeast Passage) in 2009.[26] However, Canada's Prime Minister Stephen Harper announced that "ships entering the North-West passage should first report to his government."[27]
Map of the route followed by the SS Manhattan in 1969
The first commercial cargo ship to have sailed through the Northwest Passage was the SS Manhattan in August 1969.[28][29]
Lancaster Sound at the north end of Baffin Island. Parry Channel runs directly west.
Prince of Wales Strait northwest of Victoria Island.
The Northwest Passage has three parts:
Many attempts were made to find a salt water exit west from Hudson Bay, but the Fury and Hecla Strait in the far north is blocked by ice. The eastern entrance and main axis of the northwest passage, the Parry Channel, was found in 1819. The approach from the west through Bering Strait is impractical because of the need to sail around ice near Point Barrow. East of Point Barrow the coast is fairly clear in summer. This area was mapped in pieces from overland in 1821-1839. This leaves the large rectangle north of the coast, south of Parry Channel and east of Baffin Island. This area was mostly mapped in 1848-1854 by ships looking for Franklin's lost expedition. The first crossing was made by Amundsen in 1903-1905. He used a small ship and hugged the coast.
The International Hydrographic Organization defines the limits of the Northwestern Passages as follows:[30]
On the West. The Eastern limit of Beaufort Sea [From Lands End through the Southwest coast of Prince Patrick Island to Griffiths Point, thence a line to Cape Prince Alfred, the Northwestern extreme of Banks Island, through its West coast to Cape Kellet, the Southwestern point, and thence a line to Cape Bathurst on the mainland (70°36′N 127°32′W / 70.600°N 127.533°W / 70.600; -127.533)].
On the Northwest. The Arctic Ocean between Lands End, Prince Patrick Island, and C. Columbia, Ellesmere Island.
On the Northeast. The Coast of Ellesmere Island between C. Columbia and C. Sheridan the Northern limit of Baffin Bay.
On the South. The mainland coast of Hudson Strait; the Northern limits of Hudson Bay; the mainland coast from Beach Point to Cape Bathurst.
Historical expeditions[edit]
Assumed route of the Strait of Anián
As a result of their westward explorations and their settlement of Greenland, the Vikings sailed as far north and west as Ellesmere Island, Skraeling Island and Ruin Island for hunting expeditions and trading with Inuit groups.[citation needed] The subsequent arrival of the Little Ice Age is thought to have been one of the reasons that European seafaring into the Northwest Passage ceased until the late 15th century.
Strait of Anián[edit]
Main article: Strait of Anián
In 1539, Hernán Cortés commissioned Francisco de Ulloa to sail along the peninsula of Baja California on the western coast of North America. Ulloa concluded that the Gulf of California was the southernmost section of a strait supposedly linking the Pacific with the Gulf of Saint Lawrence. His voyage perpetuated the notion of the Island of California and saw the beginning of a search for the Strait of Anián.
The strait probably took its name from Ania, a Chinese province mentioned in a 1559 edition of Marco Polo's book; it first appears on a map issued by Italian cartographer Giacomo Gastaldi about 1562. Five years later Bolognini Zaltieri issued a map showing a narrow and crooked Strait of Anian separating Asia from the Americas. The strait grew in European imagination as an easy sea lane linking Europe with the residence of Khagan (the Great Khan) in Cathay (northern China).
Cartographers and seamen tried to demonstrate its reality. Sir Francis Drake sought the western entrance in 1579. The Greek pilot Juan de Fuca, sailing from Acapulco (in Mexico) under the flag of the Spanish crown, claimed he had sailed the strait from the Pacific to the North Sea and back in 1592. The Spaniard Bartholomew de Fonte claimed to have sailed from Hudson Bay to the Pacific via the strait in 1640.
Northern Atlantic[edit]
The first recorded attempt to discover the Northwest Passage was the east-west voyage of John Cabot in 1497, sent by Henry VII in search of a direct route to the Orient.[17] In 1524, Charles V sent Estêvão Gomes to find a northern Atlantic passage to the Spice Islands. An English expedition was launched in 1576 by Martin Frobisher, who took three trips west to what is now the Canadian Arctic in order to find the passage. Frobisher Bay, which he first charted, is named after him.
As part of another expedition, in July 1583 Sir Humphrey Gilbert, who had written a treatise on the discovery of the passage and was a backer of Frobisher, claimed the territory of Newfoundland for the English crown. On August 8, 1585, the English explorer John Davis entered Cumberland Sound, Baffin Island.[31]
The major rivers on the east coast were also explored in case they could lead to a transcontinental passage. Jacques Cartier's explorations of the Saint Lawrence River were initiated in hope of finding a way through the continent. Cartier became persuaded that the St. Lawrence was the Passage; when he found the way blocked by rapids at what is now Montreal, he was so certain that these rapids were all that was keeping him from China (in French, la Chine), that he named the rapids for China. To this day, they are known as the Lachine Rapids.
In 1609 Henry Hudson sailed up what is now called the Hudson River in search of the Passage; encouraged by the saltiness of the water in the estuary, he reached present-day Albany, New York, before giving up. He later explored the Arctic and Hudson Bay. In 1611, while in James Bay, Hudson's crew mutinied. They set Hudson and his teenage son John, along with seven sick, infirm, or loyal crewmen, adrift in a small open boat. He was never seen again.[32][33] Cree oral legend reports that the survivors lived and traveled with the Cree for more than a year.
On May 9, 1619, under the auspices of King Christian IV of Denmark-Norway, Jens Munk set out with 65 men and the king's two ships, the Einhörningen (Unicorn), a small frigate, and Lamprenen (Lamprey), a sloop, which were outfitted under his own supervision. His mission was to discover the Northwest Passage to the Indies and China. Munk penetrated Davis Strait as far north as 69°, found Frobisher Bay, and then spent almost a month fighting his way through Hudson Strait. In September 1619 he found the entrance to Hudson Bay and spent the winter near the mouth of the Churchill River. Cold, famine, and scurvy destroyed so many of his men that only he and two other men survived. With these men, he sailed for home with the Lamprey on July 16, 1620, reaching Bergen, Norway, on September 20, 1620.
René-Robert Cavelier, Sieur de La Salle built the sailing ship, Le Griffon, in his quest to find the Northwest Passage via the upper Great Lakes. Le Griffon disappeared in 1679 on the return trip of her maiden voyage.[34] In the spring of 1682, La Salle made his famous voyage down the Mississippi River to the Gulf of Mexico. La Salle led an expedition from France in 1684 to establish a French colony on the Gulf of Mexico. He was murdered by his followers in 1687.[35]
In 1772 Samuel Hearne travelled overland northwest from Hudson Bay to the Arctic Ocean, thereby proving that there was no strait connecting Hudson Bay to the Pacific Ocean.
Northern Pacific[edit]
1765 de l'Isle globe, showing a fictional Northwest Passage.
Most Northwest Passage expeditions originated in Europe or on the east coast of North America, seeking to traverse the Passage in the westbound direction. Some progress was made in exploring the western reaches of the imagined passage.
In 1728 Vitus Bering, a Danish Navy officer in Russian service, used the strait first discovered by Semyon Dezhnyov in 1648 but later accredited to and named after Bering (the Bering Strait). He concluded by this sailing that North America and Russia were separate land masses. In 1741 with Lieutenant Aleksei Chirikov, he explored seeking further lands beyond Siberia. While they were separated, Chirikov discovered several of the Aleutian Islands while Bering charted the Alaskan region. His ship was wrecked off the Kamchatka Peninsula, as many of his crew were disabled by scurvy.
In 1762, the English trading ship Octavius reportedly hazarded the passage from the west but became trapped in sea ice. In 1775, the whaler Herald found the Octavius adrift near Greenland with the bodies of her crew frozen below decks. Thus the Octavius may have earned the distinction of being the first Western sailing ship to make the passage, although the fact that it took 13 years and occurred after the crew was dead somewhat tarnishes this achievement. The ships captain, Hendrick van der Heul was the quartermaster on William Kidd's expedition to the Indian Ocean in 1696. (The veracity of the Octavius story is questionable.)[citation needed]
The Spanish made several voyages to the northwest coast of North America during the late 18th century. Determining whether a Northwest Passage existed was one of the motives for their efforts. Among the voyages that involved careful searches for a Passage included the 1775 and 1779 voyages of Juan Francisco de la Bodega y Quadra. The journal of Francisco Antonio Mourelle, who served as Quadra's second in command in 1775, fell into English hands. It was translated and published in London, stimulating exploration.
Captain James Cook made use of the journal during his explorations of the region. In 1791 Alessandro Malaspina sailed to Yakutat Bay, Alaska, which was rumoured to be a Passage. In 1790 and 1791 Francisco de Eliza led several exploring voyages into the Strait of Juan de Fuca, searching for a possible Northwest Passage and finding the Strait of Georgia. To fully explore this new inland sea, an expedition under Dionisio Alcalá Galiano was sent in 1792. He was explicitly ordered to explore all channels that might turn out to be a Northwest Passage.
Cook and Vancouver[edit]
In 1776 Captain James Cook was dispatched by the Admiralty in Great Britain on an expedition to explore the Passage. A 1745 act, when extended in 1775, promised a £20,000 prize for whoever discovered the passage. Initially the Admiralty had wanted Charles Clerke to lead the expedition, with Cook (in retirement following his exploits in the Pacific) acting as a consultant. However Cook had researched Bering's expeditions, and the Admiralty ultimately placed their faith in the veteran explorer to lead, with Clerke accompanying him.
After journeying through the Pacific, to make an attempt from the west, Cook began at Nootka Sound in April 1778. He headed north along the coastline, charting the lands and searching for the regions sailed by the Russians 40 years previously. The Admiralty's orders had commanded the expedition to ignore all inlets and rivers until they reached a latitude of 65°N. Cook, however, failed to make any progress in sighting a Northwestern Passage.
Various officers on the expedition, including William Bligh, George Vancouver, and John Gore, thought the existence of a route was 'improbable'. Before reaching 65°N they found the coastline pushing them further south, but Gore convinced Cook to sail on into the Cook Inlet in the hope of finding the route. They continued to the limits of the Alaskan peninsula and the start of the 1,200 mi (1,900 km) chain of Aleutian Islands. Despite reaching 70°N, they encountered nothing but icebergs.[17]
From 1792 to 1794, the Vancouver Expedition (led by George Vancouver who had previously accompanied Cook ) surveyed in detail all the passages from the Northwest Coast. He confirmed that there was no such passage south of the Bering Strait.[36] This conclusion was supported by the evidence of Alexander MacKenzie, who explored the Arctic and Pacific oceans in 1793.
19th century[edit]
Das Eismeer (The Sea of Ice), 1823–1824, a painting by Caspar David Friedrich, inspired by William Edward Parry's account from the 1819–1820 expedition.
In the first half of the 19th century, some parts of the Northwest Passage (north of the Bering Strait) were explored separately by many expeditions, including those by John Ross, Elisha Kent Kane, William Edward Parry, and James Clark Ross; overland expeditions were also led by John Franklin, George Back, Peter Warren Dease, Thomas Simpson, and John Rae. In 1826 Frederick William Beechey explored the north coast of Alaska, discovering Point Barrow.[37]
Sir Robert McClure was credited with the discovery of the Northwest Passage in 1851 when he looked across McClure Strait from Banks Island and viewed Melville Island. However, this strait was not navigable to ships at that time. The only usable route linking the entrances of Lancaster Sound and Dolphin and Union Strait was discovered by John Rae in 1854.
Franklin expedition[edit]
In 1845 a lavishly equipped two-ship expedition led by Sir John Franklin sailed to the Canadian Arctic to chart the last unknown swaths of the Northwest Passage. Confidence was high, as they estimated there was less than 500 km (310 mi) remaining of unexplored Arctic mainland coast. When the ships failed to return, relief expeditions and search parties explored the Canadian Arctic, which resulted in a thorough charting of the region, along with a possible passage. Many artifacts from the expedition were found over the next century and a half, including notes that the ships were ice-locked in 1846 near King William Island, about half way through the passage, and unable to break free. Records showed Franklin died in 1847 and Captain Francis Rawdon Moira Crozier took over command. In 1848 the expedition abandoned the two ships and its members tried to escape south across the tundra by sledge. Although some of the crew may have survived into the early 1850s, no evidence has ever been found of any survivors. In 1853 explorer John Rae was told by local Inuit about the disastrous fate of Franklin's expedition, but his reports were not welcomed in Britain.
Starvation, exposure and scurvy all contributed to the men's deaths. In 1981 Owen Beattie, an anthropologist from the University of Alberta, examined remains from sites associated with the expedition.[38] This led to further investigations and the examination of tissue and bone from the frozen bodies of three seamen, John Torrington, William Braine and John Hartnell, exhumed from the permafrost of Beechey Island. Laboratory tests revealed high concentrations of lead in all three (the expedition carried 8,000 tins of food sealed with a lead-based solder).[39] Another researcher has suggested botulism caused deaths among crew members.[40] New evidence, confirming reports first made by John Rae in 1854 based on Inuit accounts, has shown that the last of the crew resorted to cannibalism of deceased members in an effort to survive.[41]
McClure expedition[edit]
The North-West Passage (1874), a painting by John Everett Millais representing British frustration at the failure to conquer the passage.
McClure's ship was trapped in the ice for three winters near Banks Island, at the western end of Viscount Melville Sound. Finally McClure and his crew—who were by that time dying of starvation—were found by searchers who had travelled by sledge over the ice from a ship of Sir Edward Belcher's expedition. They rescued McClure and his crew, returning with them to Belcher's ships, which had entered the Sound from the east. McClure and his crew returned to England in 1854 on one of Belcher's ships. They were the first people known to circumnavigate the Americas and to discover and transit the Northwest Passage, albeit by ship and by sledge over the ice. (Both McClure and his ship were found by a party from HMS Resolute, one of Belcher's ships, so his sledge journey was relatively short.[42])
This was an astonishing feat for that day and age, and McClure was knighted and promoted in rank. (He was made rear-admiral in 1867.) Both he and his crew also shared £10,000 awarded them by the British Parliament. In July 2010 Canadian archaeologists found his ship, HMS Investigator, fairly intact but sunk about 8 m (26 ft) below the surface.[43]
John Rae[edit]
The expeditions by Franklin and McClure were in the tradition of British exploration: well-funded ship expeditions using modern technology, and usually including British Naval personnel. By contrast, John Rae was an employee of the Hudson's Bay Company, which operated a far-flung trade network and drove exploration of the Canadian North. They adopted a pragmatic approach and tended to be land-based. While Franklin and McClure tried to explore the passage by sea, Rae explored by land. He used dog sleds and techniques of surviving in the environment which he had learned from the native Inuit. The Franklin and McClure expeditions each employed hundreds of personnel and multiple ships. John Rae's expeditions included fewer than ten people and succeeded. Rae was also the explorer with the best safety record, having lost only one man in years of traversing Arctic lands. In 1854,[44] Rae returned to the cities with information from the Inuit about the disastrous fate of the Franklin expedition.
Amundsen expedition[edit]
Amundsen's Gjøa was the first vessel to transit the passage.
Main article: Roald Amundsen
The first explorer to conquer the Northwest Passage solely by ship was the Norwegian explorer Roald Amundsen. In a three-year journey between 1903 and 1906, Amundsen explored the passage with a crew of six. Amundsen, who had sailed to escape creditors seeking to stop the expedition, completed the voyage in the converted 45 net register tonnage (4,500 cu ft or 130 m3) herring boat Gjøa. Gjøa was much smaller than vessels used by other Arctic expeditions and had a shallow draft. Amundsen intended to hug the shore, live off the limited resources of the land and sea through which he was to travel, and had determined that he needed to have a tiny crew to make this work. (Trying to support much larger crews had contributed to the catastrophic failure of John Franklin's expedition fifty years previously). The ship's shallow draft was intended to help her traverse the shoals of the Arctic straits.
Amundsen set out from Kristiania (Oslo) in June 1903 and was west of the Boothia Peninsula by late September. The Gjøa was put into a natural harbour on the south shore of King William Island; by October 3 she was iced in. There the expedition remained for nearly two years, with the expedition members learning from the local Inuit people and undertaking measurements to determine the location of the North Magnetic Pole. The harbour, now known as Gjoa Haven, later developed as the only permanent settlement on the island.
After completing the Northwest Passage portion of this trip and having anchored near Herschel Island, Amundsen skied 800 kilometres to the city of Eagle, Alaska. He sent a telegram announcing his success and skied the return 800 km (500 mi) to rejoin his companions.[45] Although his chosen east–west route, via the Rae Strait, contained young ice and thus was navigable, some of the waterways were extremely shallow (3 ft (0.91 m) deep), making the route commercially impractical.
Later expeditions[edit]
The first traversal of the Northwest Passage via dog sled[46] was accomplished by Greenlander Knud Rasmussen while on the Fifth Thule Expedition (1921–1924). Rasmussen and two Greenland Inuit travelled from the Atlantic to the Pacific over the course of 16 months via dog sled.
Canadian RCMP officer Henry Larsen was the second to sail the passage, crossing west to east, leaving Vancouver 23 June 1940 and arriving at Halifax on 11 October 1942.[47] More than once on this trip, he was uncertain whether the St. Roch, a Royal Canadian Mounted Police "ice-fortified" schooner, would survive the pressures of the sea ice. At one point, Larsen wondered "if we had come this far only to be crushed like a nut on a shoal and then buried by the ice." The ship and all but one of her crew survived the winter on Boothia Peninsula. Each of the men on the trip was awarded a medal by Canada's sovereign, King George VI, in recognition of this notable feat of Arctic navigation.
Later in 1944, Larsen's return trip was far more swift than his first. He made the trip in 86 days to sail back from Halifax, Nova Scotia to Vancouver, British Columbia.[48] He set a record for traversing the route in a single season. The ship, after extensive upgrades, followed a more northerly, partially uncharted route.
On July 1, 1957, the United States Coast Guard Cutter Storis departed in company with USCGC Bramble and USCGC Spar to search for a deep-draft channel through the Arctic Ocean and to collect hydrographic information. Upon her return to Greenland waters, the Storis became the first U.S.-registered vessel to have circumnavigated North America. Shortly after her return in late 1957, she was reassigned to her new home port of Kodiak, Alaska.
In 1969, the SS Manhattan made the passage, accompanied by the Canadian icebreakers CCGS John A. Macdonald and CCGS Louis S. St-Laurent. The U.S. Coast Guard icebreakers Northwind and Staten Island also sailed in support of the expedition.[49][50]
The Manhattan was a specially reinforced supertanker sent to test the viability of the passage for the transport of oil. While the Manhattan succeeded, the route was deemed not to be cost effective. The United States built the Alaska Pipeline instead.
In June 1977, sailor Willy de Roos left Belgium to attempt the Northwest Passage in his 13.8 m (45 ft) steel yacht Williwaw. He reached the Bering Strait in September and after a stopover in Victoria, British Columbia, went on to round Cape Horn and sail back to Belgium, thus being the first sailor to circumnavigate the Americas entirely by ship.[51]
In 1981 as part of the Transglobe Expedition, Ranulph Fiennes and Charles R. Burton completed the Northwest Passage. They left Tuktoyaktuk on July 26, 1981, in the 18-foot (5.5 m) open Boston Whaler and reached Tanquary Fiord on August 31, 1981. Their journey was the first open boat transit from west to east and covered around 3,000 miles (4,800 km; 2,600 nmi), taking a route through Dolphin and Union Strait following the south coast of Victoria and King William islands, north to Resolute Bay via Franklin Strait and Peel Sound, around the south and east coasts of Devon Island, through Hell Gate and across Norwegian Bay to Eureka, Greely Bay and the head of Tanquary Fiord. Once they reached Tanquary Fiord, they had to trek 150 miles (240 km) via Lake Hazen to Alert before setting up their winter base camp.
In 1984, the commercial passenger vessel MS Explorer (which sank in the Antarctic Ocean in 2007) became the first cruise ship to navigate the Northwest Passage.[52]
In July 1986, Jeff MacInnis and Mike Beedell set out on an 18-foot (5.5 m) catamaran called Perception on a 100-day sail, west to east, through the Northwest Passage.[53][54] This pair was the first to sail the passage, although they had the benefit of doing so over a couple of summers.[55]
In July 1986, David Scott Cowper set out from England in a 12.8-metre (42 ft) lifeboat, the Mabel El Holland, and survived three Arctic winters in the Northwest Passage before reaching the Bering Strait in August 1989. He continued around the world via the Cape of Good Hope to return to England on September 24, 1990. His was the first vessel to circumnavigate the world via the Northwest Passage.[56]
On July 1, 2000, the Royal Canadian Mounted Police patrol vessel Nadon, having assumed the name St Roch II, departed Vancouver on a "Voyage of Rediscovery". Nadon's mission was to circumnavigate North America via the Northwest Passage and the Panama Canal, recreating the epic voyage of her predecessor, St. Roch. The 22,000-mile (35,000 km) Voyage of Rediscovery was intended to raise awareness concerning St. Roch and kick off the fund-raising efforts necessary to ensure the continued preservation of St. Roch. The voyage was organized by the Vancouver Maritime Museum and supported by a variety of corporate sponsors and agencies of the Canadian government.
Nadon is an aluminum, catamaran-hulled, high-speed patrol vessel. To make the voyage possible, she was escorted and supported by the Canadian Coast Guard icebreaker Simon Fraser. The Coast Guard vessel was chartered by the Voyage of Rediscovery and crewed by volunteers. Throughout the voyage, she provided a variety of necessary services, including provisions and spares, fuel and water, helicopter facilities, and ice escort; she also conducted oceanographic research during the voyage. The Voyage of Rediscovery was completed in five and a half months, with Nadon reaching Vancouver on December 16, 2000.
On September 1, 2001, Northabout, an 14.3-metre (47 ft) aluminium sailboat with diesel engine,[57] built and captained by Jarlath Cunnane, completed the Northwest Passage east-to-west from Ireland to the Bering Strait. The voyage from the Atlantic to the Pacific was completed in 24 days. Cunnane cruised in the Northabout in Canada for two years before returning to Ireland in 2005 via the Northeast Passage; he completed the first east-to-west circumnavigation of the pole by a single sailboat. The Northeast Passage return along the coast of Russia was slower, starting in 2004, requiring an ice stop and winter over in Khatanga, Siberia. He returned to Ireland via the Norwegian coast in October 2005. On January 18, 2006, the Cruising Club of America awarded Jarlath Cunnane their Blue Water Medal, an award for "meritorious seamanship and adventure upon the sea displayed by amateur sailors of all nationalities."[citation needed]
On July 18, 2003, a father-and-son team, Richard and Andrew Wood, with Zoe Birchenough, sailed the yacht Norwegian Blue into the Bering Strait. Two months later she sailed into the Davis Strait to become the first British yacht to transit the Northwest Passage from west to east. She also became the only British vessel to complete the Northwest Passage in one season, as well as the only British sailing yacht to return from there to British waters.[58]
In 2006 a scheduled cruise liner (the MS Bremen) successfully ran the Northwest Passage,[59] helped by satellite images telling the location of sea ice.
On May 19, 2007, a French sailor, Sébastien Roubinet, and one other crew member left Anchorage, Alaska, in Babouche, a 7.5-metre (25 ft) ice catamaran designed to sail on water and slide over ice. The goal was to navigate west to east through the Northwest Passage by sail only. Following a journey of more than 7,200 km (4,474 mi), Roubinet reached Greenland on September 9, 2007, thereby completing the first Northwest Passage voyage made in one season without engine.[60]
Northwest Passage Drive Expedition (2009–2010)
In April 2009, planetary scientist Pascal Lee and a team of four on the "Northwest Passage Drive Expedition" drove the Moon-1 Humvee Rover a record-setting 494 km (307 mi) on sea-ice from Kugluktuk to Cambridge Bay, Nunavut, the longest distance driven on sea-ice in a road vehicle. The Moon-1 was being ferried to the Haughton-Mars Project Research Station on Devon Island, where it now serves as a simulator of future pressurized rovers to be used by astronauts on the Moon and Mars. The Moon-1 was flown from Cambridge Bay to Resolute Bay in May 2009, and then driven again on sea-ice by Lee and a team of five from Resolute to Devon Island in May 2010.[61]
In 2009 sea ice conditions were such that at least nine small vessels and two cruise ships completed the transit of the Northwest Passage. These trips included one by Eric Forsyth[62] on board the 42-foot (13 m) Westsail sailboat Fiona, a boat he built in the 1980s. Self-financed, Forsyth, a retired engineer from the Brookhaven National Laboratory, and winner of the Cruising Club of America's Blue Water Medal, sailed the Canadian Archipelago with sailor Joey Waits, airline captain Russ Roberts and carpenter David Wilson.[63] After successfully sailing the Passage, the 77-year-old Forsyth completed the circumnavigation of North America, returning to his home port on Long Island, New York.
On August 28, 2010, Bear Grylls and a team of five were the first rigid inflatable boat (RIB) crew to complete a point-to-point navigation between Pond Inlet and Tuktoyaktuk. Note: A Northwest Passage requires crossing the Arctic Circle twice, once each in the Atlantic and the Pacific oceans.[citation needed]
On August 29, 2012 the Swedish yacht Belzebub, a 31-foot fiberglass cutter captained by Canadian Nicolas Peissel and Swede Edvin Buregren, became the first sailboat in history to sail through McClure Strait, part of a journey of achieving the most northerly Northwest Passage in recorded history.[64] Belzebub departed Newfoundland following the coast of Greenland to Qaanaaq before tracking the sea ice to Grise Fiord, Canada's most northern community. From there the team continued through Parry Channel into McClure Strait and the Beaufort Sea, tracking the highest latitudes of 2012's record sea ice depletion before completing their Northwest Passage September 14, 2012. The expedition received extensive media coverage, including recognition by former Vice President Al Gore.[65] The accomplishment is recorded in the Polar Scott Institutes record of Northwest Passage Transits and recognized by the Explorers Club[66] and the Royal Canadian Geographic Society.[67]
At 18:45 GMT September 18, 2012, Best Explorer, a steel cutter 15.17 metres (49.8 ft), skipper Nanni Acquarone, passing between the two Diomedes, was the first Italian sailboat to complete the Northwest Passage along the classical Amundsen route. Twenty-two Italian amateur sailors took part of the trip, in eight legs from Tromsø, Norway, to King Cove, Alaska, totalling 8,200 nautical miles (15,200 km; 9,400 mi).[68]
Setting sail from Nome, Alaska, on August 18, 2012, and reaching Nuuk, Greenland, on September 12, 2012, The World became the largest passenger vessel to transit the Northwest Passage.[69][70] The ship, carrying 481 passengers, for 26 days and 4,800 nmi (8,900 km; 5,500 mi) at sea, followed in the path of Captain Roald Amundsen. The World 's transit of the Northwest Passage was documented by National Geographic photographer Raul Touzon.[71]
In September 2013 the MS Nordic Orion became the first commercial bulk carrier to transit the Northwest Passage.[72] She was carrying a cargo of 15,000 tons of coking coal from Port Metro Vancouver, Canada, to the Finnish Port of Pori.[73] The Northwest Passage shortened the distance by 1,000 nautical miles compared to traditional route via the Panama Canal.[74]
International waters dispute[edit]
The Canadian government claims that some of the waters of the Northwest Passage, particularly those in the Canadian Arctic Archipelago, are internal to Canada, giving the nation the right to bar transit through these waters.[14] Most maritime nations, including the United States and those of the European Union, classify these waters as an international strait, where foreign vessels have the right of "transit passage". In such a regime, Canada would have the right to enact fishing and environmental regulation, and fiscal and smuggling laws, as well as laws intended for the safety of shipping, but not the right to close the passage.[13][75] If the passage’s deep waters become completely ice-free in summer months, they would be particularly enticing for massive supertankers that are too big to pass through the Panama Canal and must otherwise navigate around the tip of South America.[76]
In 1985, the U.S. Coast Guard icebreaker Polar Sea passed through from Greenland to Alaska; the ship submitted to inspection by the Canadian Coast Guard before passing through, but the event infuriated the Canadian public and resulted in a diplomatic incident. The United States government, when asked by a Canadian reporter, indicated that they did not ask for permission as they were not legally required to. The Canadian government issued a declaration in 1986 reaffirming Canadian rights to the waters. But, the United States refused to recognize the Canadian claim. In 1988 the governments of Canada and the U.S. signed an agreement, "Arctic Cooperation", that resolved the practical issue without solving the sovereignty questions. Under the law of the sea, ships engaged in transit passage are not permitted to engage in research. The agreement states that all US Coast Guard vessels are engaged in research, and so would require permission from the Government of Canada to pass through.[77]
In late 2005, it was reported that U.S. nuclear submarines had travelled unannounced through Canadian Arctic waters, sparking outrage in Canada. In his first news conference after the 2006 federal election, Prime Minister-designate Stephen Harper contested an earlier statement made by the U.S. ambassador that Arctic waters were international, stating the Canadian government's intention to enforce its sovereignty there. The allegations arose after the U.S. Navy released photographs of the USS Charlotte surfaced at the North Pole.[78][79]
On April 9, 2006, Canada's Joint Task Force (North) declared that the Canadian military will no longer refer to the region as the Northwest Passage, but as the Canadian Internal Waters.[80] The declaration came after the successful completion of Operation Nunalivut (Inuktitut for "the land is ours"), which was an expedition into the region by five military patrols.[81]
In 2006 a report prepared by the staff of the Parliamentary Information and Research Service of Canada suggested that because of the September 11 attacks, the United States might be less interested in pursuing the international waterways claim in the interests of having a more secure North American perimeter.[77] This report was based on an earlier paper, The Northwest Passage Shipping Channel: Is Canada’s Sovereignty Really Floating Away? by Andrea Charron, given to the 2004 Canadian Defence and Foreign Affairs Institute Symposium.[19] Later in 2006 former United States Ambassador to Canada, Paul Cellucci agreed with this position; however, the succeeding ambassador, David Wilkins, stated that the Northwest Passage was in international waters.[76]
On July 9, 2007, Prime Minister Harper announced the establishment of a deep-water port in the far North. In the government press release the Prime Minister is quoted as saying, “Canada has a choice when it comes to defending our sovereignty over the Arctic. We either use it or lose it. And make no mistake, this Government intends to use it. Because Canada’s Arctic is central to our national identity as a northern nation. It is part of our history. And it represents the tremendous potential of our future."[82]
On July 10, 2007, Rear Admiral Timothy McGee of the United States Navy, and Rear Admiral Brian Salerno of the United States Coast Guard announced that the United States would be increasing its ability to patrol the Arctic.[83]
Thinning ice cover and the Northwest Passage[edit]
Arctic shrinkage as of 2007 compared to previous years
In the summer of 2000, two Canadian ships took advantage of thinning summer ice cover on the Arctic Ocean to make the crossing.[84] It is thought that climate change is likely to open the passage for increasing periods of time, making it attractive as a major shipping route. However the passage through the Arctic Ocean would require significant investment in escort vessels and staging ports. Therefore the Canadian commercial marine transport industry does not anticipate the route as a viable alternative to the Panama Canal even within the next 10 to 20 years.[85]
On September 14, 2007, the European Space Agency stated that ice loss that year had opened up the historically impassable passage, setting a new low of ice cover as seen in satellite measurements which went back to 1978. According to the Arctic Climate Impact Assessment, the latter part of the 20th century and the start of the 21st had seen marked shrinkage of ice cover. The extreme loss in 2007 rendered the passage "fully navigable".[8][9] However, the ESA study was based only on analysis of satellite images and could in practice not confirm anything about the actual navigation of the waters of the passage. The ESA suggested the passage would be navigable "during reduced ice cover by multi-year ice pack" (namely sea ice surviving one or more summers) where previously any traverse of the route had to be undertaken during favourable seasonable climatic conditions or by specialist vessels or expeditions. The agency's report speculated that the conditions prevalent in 2007 had shown the passage may "open" sooner than expected.[10] An expedition in May 2008 reported that the passage was not yet continuously navigable even by an icebreaker and not yet ice-free.[86]
Scientists at a meeting of the American Geophysical Union on December 13, 2007, revealed that NASA satellites observing the western Arctic[clarification needed] showed a 16% decrease in cloud coverage during the summer of 2007 compared to 2006. This would have the effect of allowing more sunlight to penetrate Earth's atmosphere and warm the Arctic Ocean waters, thus melting sea ice and contributing to the opening the Northwest Passage.[87]
In 2006 the cruise liner MS Bremen successfully ran the Northwest Passage,[59] helped by satellite images telling where sea ice was.
On November 28, 2008, the Canadian Broadcasting Corporation reported that the Canadian Coast Guard confirmed the first commercial ship sailed through the Northwest Passage. In September 2008, the MV Camilla Desgagnés, owned by Desgagnés Transarctik Inc. and, along with the Arctic Cooperative, is part of Nunavut Sealift and Supply Incorporated (NSSI),[88] transported cargo from Montreal to the hamlets of Cambridge Bay, Kugluktuk, Gjoa Haven, and Taloyoak. A member of the crew is reported to have claimed that "there was no ice whatsoever". Shipping from the east was to resume in the fall of 2009.[89] Although sealift is an annual feature of the Canadian Arctic this is the first time that the western communities have been serviced from the east. The western portion of the Canadian Arctic is normally supplied by Northern Transportation Company Limited (NTCL) from Hay River. The eastern portion by NNSI and NTCL from Churchill and Montreal.[90][91]
In January 2010, the ongoing reduction in the Arctic sea ice led telecoms cable specialist Kodiak-Kenai Cable to propose the laying of a fiberoptic cable connecting London and Tokyo, by way of the Northwest Passage, saying the proposed system would nearly cut in half the time it takes to send messages from the United Kingdom to Japan.
In September 2013 the first large sea freighter MS Nordic Orion was able to use the passage.[72]
Transfer of Pacific species to North Atlantic[edit]
Scientists believe that reduced sea ice in the Northwest Passage has permitted some new species to migrate across the Arctic Ocean.[92] The gray whale Eschrichtius robustus has not been seen in the Atlantic since it was hunted to extinction there in the 18th century, but in May 2010, one such whale turned up in the Mediterranean. Scientists speculated the whale had followed its food sources through the Northwest Passage and simply kept on going.[93][92][94]
The plankton species Neodenticula seminae had not been seen in the Atlantic for 800,000 years. Over the past few years, however, it has become increasingly prevalent there. Again, scientists believe that it got there through the reopened Northwest Passage.[92][94]
In August 2010, two bowhead whales from West Greenland and Alaska, respectively, entered the Northwest Passage from opposite directions and spent approximately 10 days in the same area.[95]
See also[edit]
Further reading[edit]
1. ^ "Northwest passage". Merriam-Webster Online Dictionary.
2. ^ "The Northwest Passage Thawed". [dead link]
5. ^ IHO Codes for Oceans & Seas, and Other Code Systems: IHO 23-3rd: Limits of Oceans and Seas, Special Publication 23 (3rd ed.). International Hydrographic Organization. 1953.
6. ^ Passage of motion M-387 on 2 Dec 2009 – vote
7. ^ Order paper – Private Members' Business, 17 Nov 2009, see motion M-387
8. ^ a b c "Satellites witness lowest Arctic ice coverage in history". Retrieved September 14, 2007.
9. ^ a b "Warming 'opens Northwest Passage'". BBC News. September 14, 2007. Retrieved September 14, 2007.
10. ^ a b Westcott, Kathryn (September 19, 2007). "Plain Sailing on the Northwest Passage". BBC News. Retrieved February 19, 2011.
11. ^ Keating, Joshua E. (December 2009). "The Top 10 Stories You Missed in 2009: A few ways the world changed while you weren’t looking". Foreign Policy.
12. ^ "TP 14202 E Interpretation". Transport Canada.
13. ^ a b c "The Northwest Passage and Climate Change from the Library of Parliament—Canadian Arctic Sovereignty".
14. ^ a b "Naval Operations in an ice-free Arctic" (PDF).
15. ^ "No to shipping ore through Northwest Passage – Baffinland CEO". Steel Guru. 2013-10-20. Retrieved 2013-10-21. The head of a Canadian mining company developing a massive mineral deposit within the Arctic Circle said the Northwest Passage won’t work as a viable shipping route to Europe and Asia.
16. ^ Inuit-Norse contact in the Smith Sound region/Schledermann, P. McCullough, K.M.
17. ^ a b c Collingridge, Vanessa (2002). Captain Cook. Ebury Press. ISBN 0-09-188898-0.
18. ^ Mills, William James (2003). Exploring Polar Frontiers: A Historical Encyclopedia. ABC-CLIO. p. 13. ISBN 1-57607-422-6.
19. ^ a b Andrea Charron—The Northwest Passage Shipping Channel: Is Canada’s Sovereignty Really Floating Away? PDF (225 KB)
20. ^ Fouché, Gwladys (August 28, 2007). "North-West Passage is now plain sailing". The Guardian (London). Retrieved April 10, 2010.
21. ^ "Arctic shortcuts open up; decline pace steady".
22. ^ "Arctic ice cap, 2007". Retrieved February 19, 2011.
23. ^ "Arctic ice cap, 1979". Retrieved February 19, 2011.
24. ^, North Pole becomes an 'island'[dead link]
25. ^ Lean, Geoffrey (August 31, 2008). ", For the first time in human history, the North Pole can be circumnavigated". London: Retrieved February 19, 2011.
26. ^ Liss, Artyom (September 19, 2009), "Arctic trail blazers make history", BBC News, retrieved August 17, 2010
27. ^ Cramb, Auslan (August 31, 2008). ", Arctic becomes an island as ice melts". London: Retrieved February 19, 2011.
28. ^ Smith, William D. (1970). Northwest Passage, The Historic Voyage of the S.S. Manhattan. American Heritage. ISBN 9780070584600.
29. ^ Keating, Bern; Sennett, Tomas (March 1970). "Through the Northwest Passage for Oil". National Geographic 137 (3).
30. ^ "Limits of Oceans and Seas, 3rd edition" (PDF). International Hydrographic Organization. 1953. Retrieved February 6, 2010.
31. ^ Morison, Samuel (1971). The European Discovery of America: The Northern Voyages. New York: Oxford University Press.
32. ^ Abacuk Pricket (1625). "Excerpt from A Larger Discourse of the Same Voyage". Retrieved February 19, 2011.
33. ^ "Dictionary of Canadian Biography Online". Retrieved February 19, 2011.
34. ^ Mansfield, Ed., J.B. (1899, 2003). "History of the Great Lakes: Volume I". Chicago: Maritime History of the Great Lakes; Original: J.H. Beers & Co. pp. 78–90. Retrieved March 11, 2009. Check date values in: |date= (help)
35. ^ "Rene-Robert Cavelier, Sieur de La Salle". Chronicles of America. Retrieved March 21, 2009.
36. ^ Meany, Edmond Stephen. "Vancouver's discovery of Puget Sound". Mystic Seaport. Retrieved April 13, 2007. [dead link]
38. ^ "Arctic paleoradiology: portable radiographic examination of two frozen sailors from the Franklin Expedition (1845–1845)", PMID 3300222
39. ^ Bayliss, Richard (2002:95 151–153). "Sir John Franklin's last arctic expedition: a medical disaster.". J.R. Soc. Med. Retrieved January 26, 2008. Check date values in: |date= (help)
40. ^ Horowitz BZ: "Polar poisons; did Botulism doom the Franklin expedition?" PMID 14677794
41. ^ Keenleyside, Anne (1997). "The final days of the Franklin Expedition: new skeletal evidence." (PDF). Arctic. 50:(1). pp. 36–36. Retrieved January 26, 2008.
42. ^ Jonathan M. Karpoff, Essay for The Encyclopedia of the Arctic (DOC format) HMS Resolute had to be abandoned in the ice on that journey. It was later found again and became quite famous.
43. ^ A.P. "Canadian Team Finds Abandoned 19th Century Ship", NPR, July 28, 2010. Retrieved on 2010-7-29.[dead link]
44. ^ "John Rae—Dictionary of Canadian Biography Online". Retrieved February 19, 2011.
45. ^ Ronald Huntford (2009). Two Planks and a Passion: A Dramatic History of Skiing. Continuum Books. p. 272.
46. ^ Knud Johan Victor Rasmussen, biography by Sam Alley. Minnesota State University, Mankato.[dead link]
47. ^ Larsen, Henry (1948). The North-West Passage. Edmond Cloutier, Queen's Printer and Controller of Stationery. pp. 7–24.
48. ^ Canada at War: THE ARCTIC: Northwest Passage, 1944, Time (magazine) Oct. 30, 1944
49. ^ William D. Smith. Northwest Passage, The Historic Voyage of the SS Manhattan. Markham, ON. Fitzhenry & Whiteside Ltd, Publishers. 1970. SBN: 07-058460-5
51. ^ "Willy de Roos' big journey". Retrieved February 19, 2011.
52. ^ "Stricken Antarctic ship evacuated". BBC News. November 24, 2007. Retrieved November 28, 2007.
53. ^ CBC, November 2, 1988
54. ^ link CBC panel discussion
55. ^ MacInnis, Jeff; Rowland, Wade (1990). Polar Passage: The Historic First Sail through the Northwest Passage. New York: Ivy Books. ISBN 0-8041-0650-9.
56. ^ Cruising, London, Summer 1992, p 35
57. ^ "''Northabout''". Retrieved February 19, 2011.
58. ^ "Norwegian Blue Sails the Northwest Passage". Retrieved February 19, 2011.
59. ^ a b Hapag-Lloyd Kreuzfahrten,, "Hapag-Lloyd Kreuzfahrten GmbH, Cruises, Cruise, Travel". Retrieved February 19, 2011.
60. ^ "The North-West Passage by Sailboat". Sébastien Roubinet. Retrieved September 9, 2007.
61. ^ Lee, P. 2010. Northwest Passage Drive : Preparing for Mars. Above & Beyond – Canada’s Arctic Journal. Sept–Oct 2010, 35–39.
62. ^ Capt. Eric Forsyth
63. ^ [1]
64. ^ [2]
65. ^ [3]
66. ^ [4]
67. ^ [5], Canadian Geographic, 13 April 2013
68. ^ Arctic Sail Expeditions – Italia: North West Passage
69. ^ "The World gets green light to transit Northwest Passage". (Nunatsiaq News – Nortext Publishing Corporation). 31 Aug 2012. Retrieved 2 Oct 2012.
70. ^ "Shrinking ice makes Nunavut more accessible to cruise ships, but money stays on board". (Nunatsiaq News – Nortext Publishing Corporation). 4 Sep 2012. Retrieved 2 Oct 2012.
71. ^ [6]
72. ^ a b "Big freighter traverses Northwest Passage for 1st time". Reuters. 27 September 2013. Retrieved 12 October 2013.
73. ^ "Big freighter traverses Northwest Passage for 1st time". Reuters. 27 September 2013. Retrieved 23 January 2014.
74. ^ "Nordic Orion first to transit the Northwest Passage". Safety 4Sea. 13 September 2013. Retrieved 12 October 2013.
75. ^ Todd P. Kenyon. "Unclos Part Iii, Straits Used For International Navigation". Retrieved February 19, 2011.
76. ^ a b Dispute Over NW Passage Revived from The Washington Post
77. ^ a b "Relations With the United States from the Library of Parliament—Canadian Arctic Sovereignty". Retrieved February 19, 2011.
78. ^ Dave Ozeck, Commander, Submarine Force, U.S. Atlantic Fleet Public Affairs. "USS Charlotte Achieves Milestone During Under-Ice Transit". Retrieved October 25, 2007.
79. ^ Most of the activities involving American submarines (including their current and past positions and courses) are classified, so therefore under that policy the U.S. Navy has declined to reveal which route(s) the Charlotte took to reach and return from the Pole.
80. ^ "Northwest Passage Gets Political Name Change". Retrieved February 1, 2007. [dead link]
81. ^ "Arctic Trek Shows Canada's Sovereignty". Retrieved February 1, 2007.
82. ^ "Prime Minister Stephen Harper announces new Arctic offshore patrol ships". Reuters. July 9, 2007. Retrieved July 9, 2007.
83. ^ Hugo Miller (July 10, 2007). "U.S. Bolsters Arctic Presence to Aid Commercial Ships (Update1)". Bloomberg. Retrieved July 10, 2007.
84. ^ Carolyn Jones (December 4, 2000). "Amazing Voyage Through Perilous Arctic Ocean / Mounties boat sails Northwest Passage". The San Francisco Chronicle. Retrieved December 18, 2010.
85. ^ "Arctic Marine Transport Workshop September 2004" (PDF). Archived from the original (PDF) on August 8, 2007. Retrieved July 9, 2007.
86. ^ Globe and Mail "Tripping through the Northwest Passage"[dead link]
87. ^ Andrea Thompson, Extra Sunshine Blamed for Part of Arctic Meltdown Foxnews, Friday, December 14, 2007
88. ^ Meet your Nunavut Carrier
89. ^ "1st commercial ship sails through Northwest Passage". November 28, 2008. Retrieved September 23, 2013.
90. ^ "NTCL". NTCL. Retrieved February 19, 2011.
91. ^ "Ports served". Retrieved February 19, 2011. [dead link]
92. ^ a b c "Global warming reintroduces gray whale, algae species to Northern Atlantic". International Business Times. June 26, 2011. Retrieved July 5, 2011.
93. ^ Scheinin, Aviad P; Aviad, P.; Kerem, Dan (2011). "Gray whale (Eschrichtius robustus) in the Mediterranean Sea: anomalous event or early sign of climate-driven distribution change?". Marine Biodiversity Records 2: e28.
94. ^ a b Mulvaney, Kieran. "Prodigal Plankton Returns to the Atlantic". Discovery. Retrieved July 5, 2011.
95. ^ Heide-Jørgensen et al. The Northwest Passage opens for bowhead whales Map PDF Biology Letters, August 31, 2011. Accessed: September 27, 2011. Free via Creative Commons
Further reading[edit]
• Neatby, Leslie H. In Quest of the Northwest Passage. Toronto, Ont.: Longmans, Green, and Co., 1958. 194 p., ill. with b&w photos and reproductions and with maps (some fold. to open out)
• Narratives of Voyages Towards the North-West: In Search of a Passage to Cathay and India, 1496–1631. Hakluyt Society, 1849. Cambridge University Press, 2010. ISBN 978-1108008020
• Edinger, Ray. Fury Beach: The Four-Year Odyssey of Captain John Ross and the Victory. New York: Berkley, 2003. ISBN 0-425-18845-0
External links[edit]
|
global_05_local_5_shard_00000035_processed.jsonl/33370
|
Parti bleu
From Wikipedia, the free encyclopedia
Jump to: navigation, search
The Parti bleu was a moderate political group in Quebec, Canada that emerged in 1854. It was based on the moderate reformist views of Louis-Hippolyte Lafontaine, and was a rival to the radical Parti rouge. The Parti bleu formed an alliance with Tories in Upper Canada in the Legislative Assembly of the Province of Canada, creating the foundations for the historical Conservative Party of Canada. Notable bleu leaders included George-Étienne Cartier. The party initially derived much of its support from ultramontanists in the Roman Catholic Church. By the 1870s, however, figures such as Ignace Bourget had lost confidence in the "bleus", and were promoting a new conservative faction known as the "castors". Both of these groups sought to dominate the Quebec Conservative Party during the late 19th century.
See also[edit]
|
global_05_local_5_shard_00000035_processed.jsonl/33371
|
Union of Right Forces
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Union of Right Forces
Сою́з Пра́вых Сил
President (s) Sergey Kiriyenko
Boris Nemtsov
Viktor Nekrutenko
Nikita Belykh
Slogan "The our cause of just"
Founded December 10, 1998 (1998-12-10)
Dissolved November 15, 2008 (2008-11-15)
Succeeded by Right Cause
Newspaper "Just Cause"
Membership (2007) 57,410
Ideology Liberal conservatism
Political position Centre-right
International affiliation International Democrat Union
Colours Blue, red, white
Politics of Russia
Political parties
The Union of Right Forces political party, or SPS (Russian: Сою́з Пра́вых Сил, СПС/Soyuz Pravykh Sil), is a Russian neoliberal political public organization and formerly party initially founded as an electoral bloc in 1999 and associated with free market reforms, privatization, and the legacy of the "young reformers" of the 1990s: Anatoly Chubais, Boris Nemtsov, and Yegor Gaidar. The party was officially self-dissolved in 2008. Nikita Belykh was the party's last leader in 2005-2008.
Since 2011 the Union of Right Forces has been registered as a political public organization, not a political party. It is a member of the International Democrat Union. Leonid Gozman is currently the public organisation's leader. Political public organisations don't have political party status in the Justice Ministry's list and don't have a right to participate in any elections, according to the Russian law.
Political party[edit]
The Party is considered by Western media organs The Economist and the BBC to be one of the few Russian parties that support Western-style capitalism,[citation needed] socio-politically the party is more conservative.[citation needed] Its headquarters are located in Moscow. It is affiliated with the International Democrat Union.
The Union of Right Forces was established in 1999, following a merger of several smaller liberal parties, including Democratic Choice of Russia and Democratic Russia. In the 1999 parliamentary elections the Union of Right Forces won 8.6% of the vote and 32 seats in the Russian State Duma (lower house of the Federal Assembly of Russia).
From 2000 to 2003 the Union of Right Forces was led by former Deputy Prime Minister Boris Nemtsov. Under Nemtsov's leadership SPS strongly opposed what they saw to be the authoritarian policies of President Vladimir Putin and argued that political and media freedoms in Russia had been curtailed.
In the 2000 presidential election, the SPS supported Vladimir Putin's candidacy, though many of the party leaders supported Grigory Yavlinsky.
In the 2003 parliamentary elections the Union of Right Forces, according to official results, received 4% of the vote and failed to cross the 5% threshold necessary for parliamentary representation. A number of SPS candidates came second in single-mandate electoral districts the party had previously held, such as Irina Khakamada in St. Petersburg, Vladimir V. Kara-Murza in Moscow, or Boris Nadezhdin in the Moscow region.
Despite allegations of fraud, Boris Nemtsov accepted responsibility for the election defeat and resigned as SPS leader in January 2004. On 28 May 2005 Nikita Belykh was elected as the new leader of the party.
Plans to merge with Yabloko were shelved in late 2006.[1]
The party won 0.96% of votes in the 2007 elections, not breaking the 7% barrier, and thus no seats in the Duma.
In 2008, Nikita Belyh left his chair to Leonid Goizman. On 1 October 2008, Federal political council of the party voted to dissolve the party to merge it with Civilian Power and Democratic Party of Russia and form a new liberal-democratic party called Right Cause.[2]
Public organisation[edit]
In 2011, Right Cause was suspended by the International Democrat Union, and the re-founded SPS was made a member.
On 27 February 2014, the SPS formally condemned the 2014 Russian military intervention in Ukraine.[3]
See also[edit]
External links[edit]
|
global_05_local_5_shard_00000035_processed.jsonl/33379
|
Skip to content
Subversion checkout URL
You can clone with
Download ZIP
Facebook-Like Link Preview right in your hand.
PHP JavaScript Perl CSS Erlang
branch: master
Facebook-Like Link Preview
Build Status
Developed by @LeonardoCardoso.
Follow @lc_link_preview on Twitter to get updates of what sites the people are successfully previewing around the globe.
How this works
The algorithm keeps tracking what you are typing in the status field and through regular expressions identifies a url. Thereafter, the text is in the field is passed to PHP that does all the work to analyze all the source code of the url found. If you enter more than one url, it will consider that the first one is the more relevant and it will create a preview. Once the source code of the url is obtained, regular expressions begin to seek out and capture relevant informations on it. These informations is basically the title page, the images contained therein, and a brief description of the content covered in the page.
For mode details, visit
Link Preview
HTTP Server
• Apache (must support mod_php)
How to added to your project
1 • Scripts
<script src=''></script>
<script src='js/linkPreview.js' ></script>
If you are saving and fetching results from database using FLP,
you can customize the layout on this script
<script src='js/linkPreviewRetrieve.js' ></script>
2 • Stylesheets
This stylesheet is provides the layout of Facebook's former textarea.
You can totally customize this!
<link rel="stylesheet" type="text/css" href="css/linkPreview.css" />
3 • Configuration
Just create your own textarea (or multiple textareas) and bind it to jQuery like this:
$(document).ready(function() {
// changing placeholder
$('#lp2').linkPreview({placeholder: "Second Field"});
// bind to a tag the results brought from database
4 • Database
To custom your database configurations, you just need to change the following values in php/classes/Database.php
$host = "localhost";
$user = "";
$password = "";
$database = "linkpreview";
Make sure your columns are the same as those ones in linkpreview.sql.
Result Format
"url":"original url",
"pageUrl":"page url",
"canonicalUrl":"cannonical url",
"images": "img1|img2|...",
"videoIframe":"video iframe if it is video"
option default value possible values function
imageQuantity -1 any integer set the max amount of images to be brought (-1 for illimited)
placeholder What's in your mind any string set the placeholder of textarea
Make sure the library php5-curl is installed and enabled on the server, either locally or remotely.
• Linux
$ sudo apt-get install php5-curl
$ sudo service apache2 restart
$ sudo port install php5-curl
$ sudo apachectl restart
Twitter: @TheLeoCardz
Copyright (c) 2014 Leonardo Cardoso (
Dual licensed under the MIT (
and GPL ( licenses.
Something went wrong with that request. Please try again.
|
global_05_local_5_shard_00000035_processed.jsonl/33381
|
Skip to content
Subversion checkout URL
You can clone with
Download ZIP
This branch is 25 commits ahead, 6097 commits behind master
Fetching latest commit…
Cannot retrieve the latest commit at this time
Failed to load latest commit information.
= RDOC - Ruby Documentation System
these optional documentation contained in the immediately preceding comment
document methods, classes, and so on.
== Roadmap
* If you want to use RDoc to create documentation for your Ruby source files,
read on.
* If you want to include extensions written in C, see RDoc::C_Parser
* For information on the various markups available in comment blocks, see
* If you want to drive RDoc programatically, see RDoc::RDoc.
at RDoc::Markup.
* If you want to try writing your own HTML output template, see
== Summary
Once installed, you can create documentation using the 'rdoc' command
(the command is 'rdoc.bat' under Windows)
% rdoc [options] [names...]
Type "rdoc --help" for an up-to-date option summary.
source (such as rdoc itself).
% rdoc
This command generates documentation for all the Ruby and C source
documentation tree starting in the subdirectory 'doc'.
index page contain the documentation for the primary file. In our
case, we could type
% rdoc --main rdoc.rb
You'll find information on the various formatting tricks you can use
in comment blocks in the documentation this generates.
ending +.rb+ and <tt>.rbw</tt> are assumed to be Ruby source. Files
ending +.c+ are parsed as C files. All other files are assumed to
contain just Markup-style markup (with or without leading '#' comment markers).
Ruby source files only.
= Markup
For information on how to make lists, hyperlinks, & etc. with RDoc, see
Comment blocks can be written fairly naturally, either using '#' on successive
=begin rdoc
Documentation to be processed by RDoc.
RDoc stops processing comments if it finds a comment line containing '+#--+'.
turned back on with a line that starts '+#+++'.
# FIXME: fails if the birthday falls on February 29th
# The DOB is returned as a Time object.
def get_dob(person)
# ...
or preceded by a hash character are automatically hyperlinked from comment text
to their description.
Method parameter lists are extracted and displayed with the method description.
If a method calls +yield+, then the parameters passed to yield will also be
def fred
yield line, address
This will get documented as:
You can override this using a comment containing ':yields: ...' immediately
after the method definition
def fred # :yields: index, position
# ...
yield line, address
which will get documented as
+:yields:+ is an example of a documentation directive. These appear immediately
after the start of the document element they are modifying.
== Directives
[+:nodoc:+ / +:nodoc:+ all]
Don't include this element in the documentation. For classes
and modules, the methods, aliases, constants, and attributes
directly within the affected class or module will also be
omitted. By default, though, modules and classes within that
class of module _will_ be documented. This is turned off by
adding the +all+ modifier.
module MyModule # :nodoc:
class Input
module OtherModule # :nodoc: all
class Output
In the above code, only class +MyModule::Input+ will be documented.
Force a method or attribute to be documented even if it wouldn't otherwise
particular private method.
Only applicable to the +initialize+ instance method. Normally RDoc assumes
that the documentation and parameters for #initialize are actually for the
::new method, and so fakes out a ::new for the class. The :notnew: modifier
stops this. Remember that #initialize is protected, so you won't see the
documentation unless you use the -a command line option.
Comment blocks can contain other directives:
[+:section: title+]
Starts a new section in the output. The title following +:section:+ is used
section is used as introductory text. Subsequent methods, aliases,
# :section: My Section
# This is the section that I wrote.
# See it glisten in the noon-day sun.
Lines up to the next blank line in the comment are treated as the method's
calling sequence, overriding the default parsing of method parameters and
yield arguments.
[+:include:+ _filename_]
Include the contents of the named file at this point. The file will be
searched for in the directories listed by the +--include+ option, or in the
have the same indentation as the ':' at the start of the :include: directive.
[+:title:+ _text_]
the source).
Document nothing further at the current level.
[+:main:+ _name_]
Equivalent to the --main command line parameter.
[+:stopdoc:+ / +:startdoc:+]
Stop and start adding new documentation elements to the current container.
For example, if a class has a number of constants that you don't want to
document, put a +:stopdoc:+ before the first, and a +:startdoc:+ after the
last. If you don't specifiy a +:startdoc:+ by the end of the container,
disables documentation for the entire class or module.
= Other stuff
Author:: Dave Thomas <>
== Credits
* The Ruby parser in rdoc/parse.rb is based heavily on the outstanding
parser for irb and the rtags package.
* Code to diagram classes and modules was written by Sergey A Yanovitsky
(Jah) of Enticla.
* Charset patch from MoonWolf.
* Rich Kilmer wrote the kilmer.rb output template.
* Dan Brickley led the design of the RDF format.
== License
is free software, and may be redistributed under the terms specified
in the README file of the Ruby distribution.
== Warranty
This software is provided "as is" and without any express or implied
warranties, including, without limitation, the implied warranties of
merchantibility and fitness for a particular purpose.
Something went wrong with that request. Please try again.
|
global_05_local_5_shard_00000035_processed.jsonl/33382
|
Skip to content
Subversion checkout URL
You can clone with
Download ZIP
tag: 1.1a2
Fetching contributors…
Cannot retrieve contributors at this time
1781 lines (1446 sloc) 87.996 kB
Defending Pyramid's Design
Pyramid Provides More Than One Way to Do It
As the result of our research, however, it became apparent that, despite the fact that no one framework had all the features we required, lots of existing frameworks had good, and sometimes very compelling ideas. In particular, :term:`URL dispatch` is a more direct mechanism to map URLs to code.
Pyramid Uses A Zope Component Architecture ("ZCA") Registry
The "global" API that may be used to access data in a ZCA "component registry" is not particularly pretty or intuitive, and sometimes it's just plain obtuse. Likewise, the conceptual load on a casual source code reader of code that uses the ZCA global API is somewhat high. Consider a ZCA neophyte reading the code that performs a typical "unnamed utility" lookup using the :func:`zope.component.getUtility` global API:
After this code runs, settings will be a Python dictionary. But it's unlikely that any "civilian" would know that just by reading the code. There are a number of comprehension issues with the bit of code above that are obvious.
First, what's a "utility"? Well, for the purposes of this discussion, and for the purpose of the code above, it's just not very important. If you really want to know, you can read this. However, still, readers of such code need to understand the concept in order to parse it. This is problem number one.
Second, what's this ISettings thing? It's an :term:`interface`. Is that important here? Not really, we're just using it as a "key" for some lookup based on its identity as a marker: it represents an object that has the dictionary API, but that's not very important in this context. That's problem number two.
Third of all, what does the getUtility function do? It's performing a lookup for the ISettings "utility" that should return.. well, a utility. Note how we've already built up a dependency on the understanding of an :term:`interface` and the concept of "utility" to answer this question: a bad sign so far. Note also that the answer is circular, a really bad sign.
Fourth, where does getUtility look to get the data? Well, the "component registry" of course. What's a component registry? Problem number four.
Fifth, assuming you buy that there's some magical registry hanging around, where is this registry? Homina homina... "around"? That's sort of the best answer in this context (a more specific answer would require knowledge of internals). Can there be more than one registry? Yes. So which registry does it find the registration in? Well, the "current" registry of course. In terms of :app:`Pyramid`, the current registry is a thread local variable. Using an API that consults a thread local makes understanding how it works non-local.
You've now bought in to the fact that there's a registry that is just "hanging around". But how does the registry get populated? Why, via code that calls directives like config.add_view. In this particular case, however, the registration of ISettings is made by the framework itself "under the hood": it's not present in any user configuration. This is extremely hard to comprehend. Problem number six.
First, the primary amelioration: :app:`Pyramid` does not expect application developers to understand ZCA concepts or any of its APIs. If an application developer needs to understand a ZCA concept or API during the creation of a :app:`Pyramid` application, we've failed on some axis.
Instead, the framework hides the presence of the ZCA registry behind special-purpose API functions that do use ZCA APIs. Take for example the function, which returns the userid present in the current request or None if no userid is present in the current request. The application developer calls it like so:
He now has the current user id.
Under its hood however, the implementation of authenticated_userid is this:
Hiding the ZCA API from application developers and code readers is a form of enhancing "domain specificity". No application developer wants to need to understand the small, detailed mechanics of how a web framework does its thing. People want to deal in concepts that are closer to the domain they're working in: for example, web developers want to know about users, not utilities. :app:`Pyramid` uses the ZCA as an implementation detail, not as a feature which is exposed to end users.
However, unlike application developers, framework developers, including people who want to override :app:`Pyramid` functionality via preordained framework plugpoints like traversal or view lookup must understand the ZCA registry API.
In all "core" code, We've made use of ZCA global API functions such as zope.component.getUtility and zope.component.getAdapter the exception instead of the rule. So instead of:
:app:`Pyramid` code will usually do:
• Features. The ZCA component registry essentially provides what can be considered something like a "superdictionary", which allows for more complex lookups than retrieving a value based on a single key. Some of this lookup capability is very useful for end users, such as being able to register a view that is only found when the context is some class of object, or when the context implements some :term:`interface`.
• Singularity. There's only one "place" where "application configuration" lives in a :app:`Pyramid` application: in a component registry. The component registry answers questions made to it by the framework at runtime based on the configuration of an application. Note: "an application" is not the same as "a process", multiple independently configured copies of the same :app:`Pyramid` application are capable of running in the same process space.
• Composability. A ZCA component registry can be populated imperatively, or there's an existing mechanism to populate a registry via the use of a configuration file (ZCML, via :term:`pyramid_zcml`). We didn't need to write a frontend from scratch to make use of configuration-file-driven registry population.
• Pluggability. Use of the ZCA registry allows for framework extensibility via a well-defined and widely understood plugin architecture. As long as framework developers and extenders understand the ZCA registry, it's possible to extend :app:`Pyramid` almost arbitrarily. For example, it's relatively easy to build a directive that registers several views "all at once", allowing app developers to use that directive as a "macro" in code that they write. This is somewhat of a differentiating feature from other (non-Zope) frameworks.
If you extend or develop :app:`Pyramid` (create new directives, use some of the more obscure "hooks" as described in :ref:`hooks_chapter`, or work on the :app:`Pyramid` core code), you will be faced with needing to understand at least some ZCA concepts. In some places it's used unabashedly, and will be forever. We know it's quirky, but it's also useful and fundamentally understandable if you take the time to do some reading about it.
Pyramid Uses Interfaces Too Liberally
In this TOPP Engineering blog entry, Ian Bicking asserts that the way :mod:`repoze.bfg` used a Zope interface to represent an HTTP request method added too much indirection for not enough gain. We agreed in general, and for this reason, :mod:`repoze.bfg` version 1.1 (and subsequent versions including :app:`Pyramid` 1.0+) added :term:`view predicate` and :term:`route predicate` modifiers to view configuration. Predicates are request-specific (or :term:`context` -specific) matching narrowers which don't use interfaces. Instead, each predicate uses a domain-specific string as a match value.
For example, to write a view configuration which matches only requests with the POST HTTP request method, you might write a @view_config decorator which mentioned the request_method predicate:
You might further narrow the matching scenario by adding an accept predicate that narrows matching to something that accepts a JSON response:
Such a view would only match when the request indicated that HTTP request method was POST and that the remote user agent passed application/json (or, for that matter, application/*) in its Accept request header.
"Under the hood", these features make no use of interfaces.
Many "prebaked" predicates exist. However, use of only "prebaked" predicates, however, doesn't entirely meet Ian's criterion. He would like to be able to match a request using a lambda or another function which interrogates the request imperatively. In :mod:`repoze.bfg` version 1.2, we acommodate this by allowing people to define "custom" view predicates:
The above view will only match when the first element of the request's :term:`subpath` is abc.
Pyramid "Encourages Use of ZCML"
Pyramid Uses "Model" To Represent A Node In The Graph of Objects Traversed
The repoze.bfg documentation used to refer to the graph being traversed when :term:`traversal` is used as a "model graph". A terminology overlap confused people who wrote applications that always use ORM packages such as SQLAlchemy, which has a different notion of the definition of a "model". As a result, in Pyramid 1.0a7, the tree of objects traversed is now renamed to :term:`resource tree` and its components are now named :term:`resource` objects. Associated APIs have been changed. This hopefully alleviates the terminology confusion caused by overriding the term "model".
Pyramid Does Traversal, And I Don't Like Traversal
The idea that some folks believe traversal is unilaterally "wrong" is understandable. The people who believe it is wrong almost invariably have all of their data in a relational database. Relational databases aren't naturally hierarchical, so "traversing" one like a tree is not possible.
However, folks who deem traversal unilaterally wrong are neglecting to take into account that many persistence mechanisms are hierarchical. Examples include a filesystem, an LDAP database, a :term:`ZODB` (or another type of graph) database, an XML document, and the Python module namespace. It is often convenient to model the frontend to a hierarchical data store as a graph, using traversal to apply views to objects that either are the resources in the tree being traversed (such as in the case of ZODB) or at least ones which stand in for them (such as in the case of wrappers for files from the filesystem).
Traversal also offers better composability of applications than URL dispatch, because it doesn't rely on a fixed ordering of URL matching. You can compose a set of disparate functionality (and add to it later) around a mapping of view to resource more predictably than trying to get "the right" ordering of URL pattern matching.
Pyramid Does URL Dispatch, And I Don't Like URL Dispatch
I'll argue that URL dispatch is ultimately useful, even if you want to use traversal as well. You can actually combine URL dispatch and traversal in :app:`Pyramid` (see :ref:`hybrid_chapter`). One example of such a usage: if you want to emulate something like Zope 2's "Zope Management Interface" UI on top of your object graph (or any administrative interface), you can register a route like <route name="manage" pattern="manage/*traverse"/> and then associate "management" views in your code by using the route_name argument to a view configuration, e.g. <view view=".some.callable" context=".some.Resource" route_name="manage"/>. If you wire things up this way someone then walks up to for example, /manage/ob1/ob2, they might be presented with a management interface, but walking up to /ob1/ob2 would present them with the default object view. There are other tricks you can pull in these hybrid configurations if you're clever (and maybe masochistic) too.
Pyramid Views Do Not Accept Arbitrary Keyword Arguments
Many web frameworks (Zope, TurboGears, Pylons 1.X, Django) allow for their variant of a :term:`view callable` to accept arbitrary keyword or positional arguments, which are "filled in" using values present in the request.POST or request.GET dictionaries or by values present in the "route match dictionary". For example, a Django view will accept positional arguments which match information in an associated "urlconf" such as r'^polls/(?P<poll_id>\d+)/$:
Pyramid Provides Too Few "Rails"
By design, :app:`Pyramid` is not a particularly "opinionated" web framework. It has a relatively parsimonious feature set. It contains no built in ORM nor any particular database bindings. It contains no form generation framework. It has no administrative web user interface. It has no built in text indexing. It does not dictate how you arrange your code.
Such opinionated functionality exists in applications and frameworks built on top of :app:`Pyramid`. It's intended that higher-level systems emerge built using :app:`Pyramid` as a base. See also :ref:`apps_are_extensible`.
Pyramid Provides Too Many "Rails"
:app:`Pyramid` provides some features that other web frameworks do not. These are features meant for use cases that might not make sense to you if you're building a simple "bespoke" web application:
These features are important to the authors of :app:`Pyramid`. The :app:`Pyramid` authors are often commissioned to build CMS-style applications. Such applications are often "frameworky" because they have more than one deployment. Each deployment requires a slightly different composition of sub-applications, and the framework and sub-applications often need to be extensible. Because the application has more than one deployment, pluggability and extensibility is important, as maintaining multiple forks of the application, one per deployment, is extremely undesirable. Because it's easier to extend a system that uses :term:`traversal` "from the outside" than it is to do the same in a system that uses :term:`URL dispatch`, each deployment uses a :term:`resource tree` composed of a persistent tree of domain model objects, and uses :term:`traversal` to map :term:`view callable` code to resources in the tree. The resource tree contains very granular security declarations, as resources are owned and accessible by different sets of users. Interfaces are used to make unit testing and implementation substitutability easier.
Pyramid Is Too Big
pyramid/ (except for pyramd/tests and pyramid/paster_templates)
Pyramid Has Too Many Dependencies
This is true. At the time of this writing, the total number of Python package distributions that :app:`Pyramid` depends upon transitively is 18 if you use Python 2.6 or 2.7, or 16 if you use Python 2.4 or 2.5. This is a lot more than zero package distribution dependencies: a metric which various Python microframeworks and Django boast.
The :mod:`zope.component` and :mod:`zope.configuration` packages on which :app:`Pyramid` depends have transitive dependencies on several other packages (:mod:`zope.schema`, :mod:`zope.i18n`, :mod:`zope.event`, :mod:`zope.interface`, :mod:`zope.deprecation`, :mod:`zope.i18nmessageid`). We've been working with the Zope community to try to collapse and untangle some of these dependencies. We'd prefer that these packages have fewer packages as transitive dependencies, and that much of the functionality of these packages was moved into a smaller number of packages.
:app:`Pyramid` also has its own direct dependencies, such as :term:`Paste`, :term:`Chameleon`, :term:`Mako` and :term:`WebOb`, and some of these in turn have their own transitive dependencies.
It should be noted that :app:`Pyramid` is positively lithe compared to :term:`Grok`, a different Zope-based framework. As of this writing, in its default configuration, Grok has 109 package distribution dependencies. The number of dependencies required by :app:`Pyramid` is many times fewer than Grok (or Zope itself, upon which Grok is based). :app:`Pyramid` has a number of package distribution dependencies comparable to similarly-targeted frameworks such as Pylons 1.X.
We try not to reinvent too many wheels (at least the ones that don't need reinventing), and this comes at the cost of some number of dependencies. However, "number of package distributions" is just not a terribly great metric to measure complexity. For example, the :mod:`zope.event` distribution on which :app:`Pyramid` depends has a grand total of four lines of runtime code. As noted above, we're continually trying to agitate for a collapsing of these sorts of packages into fewer distribution files.
Pyramid "Cheats" To Obtain Speed
Pyramid Gets Its Terminology Wrong ("MVC")
If you are in this camp, you might have come to expect things about how your existing "MVC" framework uses its terminology. For example, you probably expect that models are ORM models, controllers are classes that have methods that map to URLs, and views are templates. :app:`Pyramid` indeed has each of these concepts, and each probably works almost exactly like your existing "MVC" web framework. We just don't use the "MVC" terminology, as we can't square its usage in the web framework space with historical reality.
Though MVC comes in different flavors, control flow is generally as
The user interacts with the user interface in some way (for
example, presses a mouse button).
The controller handles the input event from the user interface,
often via a registered handler or callback and converts the event
into appropriate user action, understandable for the model.
The controller notifies the model of the user action, possibly
controller updates the user's shopping cart.)[5]
A view queries the model in order to generate an appropriate
user interface (for example, the view lists the shopping cart's
The controller may (in some implementations) issue a general
automatically notified by the model of changes in state
(Observer) which require a screen update.
The user interface waits for further user interactions, which
restarts the cycle.
To the author, it seems as if someone edited this Wikipedia definition, tortuously couching concepts in the most generic terms possible in order to account for the use of the term "MVC" by current web frameworks. I doubt such a broad definition would ever be agreed to by the original authors of the MVC pattern. But even so, it seems most "MVC" web frameworks fail to meet even this falsely generic definition.
Pyramid Applications are Extensible; I Don't Believe In Application Extensibility
Any :app:`Pyramid` application written obeying certain constraints is extensible. This feature is discussed in the :app:`Pyramid` documentation chapters named :ref:`extending_chapter` and :ref:`advconfig_narr`. It is made possible by the use of the :term:`Zope Component Architecture` and within :app:`Pyramid`.
"Extensible", in this context, means:
• The behavior of an application can be overridden or extended in a particular deployment of the application without requiring that the deployer modify the source of the original application.
Many developers seem to believe that creating extensible applications is "not worth it". They instead suggest that modifying the source of a given application for each deployment to override behavior is more reasonable. Much discussion about version control branching and merging typically ensues.
If you don't want to think about :app:`Pyramid` application extensibility at all, you needn't. You can ignore extensibility entirely. However, if you follow the set of rules defined in :ref:`extending_chapter`, you don't need to make your application extensible: any application you write in the framework just is automatically extensible at a basic level. The mechanisms that deployers use to extend it will be necessarily coarse: typically, views, routes, and resources will be capable of being overridden. But for most minor (and even some major) customizations, these are often the only override plugpoints necessary: if the application doesn't do exactly what the deployment requires, it's often possible for a deployer to override a view, route, or resource and quickly make it do what he or she wants it to do in ways not necessarily anticipated by the original developer. Here are some example scenarios demonstrating the benefits of such a feature.
Ultimately, any argument about whether the extensibility features lent to applications by :app:`Pyramid` are "good" or "bad" is mostly pointless. You needn't take advantage of the extensibility features provided by a particular :app:`Pyramid` application in order to affect a modification for a particular set of its deployments. You can ignore the application's extensibility plugpoints entirely, and instead use version control branching and merging to manage application deployment modifications instead, as if you were deploying an application written using any other web framework.
:app:`Pyramid` performs automatic authorization checks only at :term:`view` execution time. Zope 3 wraps context objects with a security proxy, which causes Zope 3 to do also security checks during attribute access. I like this, because it means:
1. When I use the security proxy machinery, I can have a view that conditionally displays certain HTML elements (like form fields) or prevents certain attributes from being modified depending on the the permissions that the accessing user possesses with respect to a context object.
:app:`Pyramid` was developed by folks familiar with Zope 2, which has a "through the web" security model. This "TTW" security model was the precursor to Zope 3's security proxies. Over time, as the :app:`Pyramid` developers (working in Zope 2) created such sites, we found authorization checks during code interpretation extremely useful in a minority of projects. But much of the time, TTW authorization checks usually slowed down the development velocity of projects that had no delegation requirements. In particular, if we weren't allowing "untrusted" users to write arbitrary Python code to be executed by our application, the burden of "through the web" security checks proved too costly to justify. We (collectively) haven't written an application on top of which untrusted developers are allowed to write code in many years, so it seemed to make sense to drop this model by default in a new web framework.
Justifications for disabling security proxies by default notwithstanding, given that Zope 3 security proxies are "viral" by nature, the only requirement to use one is to make sure you wrap a single object in a security proxy and make sure to access that object normally when you want proxy security checks to happen. It is possible to override the :app:`Pyramid` "traverser" for a given application (see :ref:`changing_the_traverser`). To get Zope3-like behavior, it is possible to plug in a different traverser which returns Zope3-security-proxy-wrapped objects for each traversed object (including the :term:`context` and the :term:`root`). This would have the effect of creating a more Zope3-like environment without much effort.
Pyramid Uses its Own HTTP Exception Class Hierarchy Rather Than webob.exc
This defense is new as of Pyramid 1.1.
The HTTP exception classes defined in :mod:`pyramid.httpexceptions` are very much like the ones defined in webob.exc (e.g. :class:`~pyramid.httpexceptions.HTTPNotFound`, :class:`~pyramid.httpexceptions.HTTPForbidden`, etc). They have the same names and largely the same behavior and all have a very similar implementation, but not the same identity. Here's why they have a separate identity:
• Making them separate allows the HTTP exception classes to subclass :class:`pyramid.response.Response`. This speeds up response generation slightly due to the way the Pyramid router works. The same speedup could be gained by monkeypatching webob.response.Response but it's usually the case that monkeypatching turns out to be evil and wrong.
• Making them separate allows them to provide alternate __call__ logic which also speeds up response generation.
• Making them separate allows the exception classes to provide for the proper value of RequestClass (:class:`pyramid.request.Request`).
• Making them separate allows us freedom from having to think about backwards compatibility code present in webob.exc having to do with Python 2.4, which we no longer support in Pyramid 1.1+.
• Making them separate allows us to silence a stupid deprecation warning under Python 2.6 when the response objects are used as exceptions (related to self.message).
Pyramid has Simpler Traversal Machinery than Does Zope
Zope's default traverser:
• Attempts to use an adaptation to obtain the "next" element in the path from the currently traversed object, falling back to __bobo_traverse__, __getitem__ and eventually __getattr__.
Zope uses multiple mechanisms to attempt to obtain the next element in the resource tree based on a name. It first tries an adaptation of the current resource to ITraversable, and if that fails, it falls back to attempting number of magic methods on the resource (__bobo_traverse__, __getitem__, and __getattr__). My experience while both using Zope and attempting to reimplement its publisher in repoze.zope2 led me to believe the following:
Microframeworks Have Smaller Hello World Programs
Self-described "microframeworks" exist: Bottle and Flask are two that are becoming popular. Bobo doesn't describe itself as a microframework, but its intended userbase is much the same. Many others exist. We've actually even (only as a teaching tool, not as any sort of official project) created one using BFG (the precursor to Pyramid). Microframeworks are small frameworks with one common feature: each allows its users to create a fully functional application that lives in a single Python file.
The contents of
The contents of
The contents of
If we cd to the directory that holds these files and we run python given the directory structure and code above, what happens? Presumably, our decorator decorator will be used twice, once by the decorated function foo in and once by the decorated function bar in Since each time the decorator is used, the list L in is appended to, we'd expect a list with two elements to be printed, right? Sadly, no:
[chrism@thinko]$ python
[<function foo at 0x7f4ea41ab1b8>,
<function foo at 0x7f4ea41ab230>,
<function bar at 0x7f4ea41ab2a8>]
By visual inspection, that outcome (three different functions in the list) seems impossible. We only defined two functions and we decorated each of those functions only once, so we believe that the decorator decorator will only run twice. However, what we believe is wrong because the code at module scope in our module was executed twice. The code is executed once when the script is run as __main__ (via python, and then it is executed again when imports the same file as app.
Let's see what happens when we use the same pattern with the Groundhog microframework. Replace the contents of above with this:
Replace the contents of above with this:
Replace the contents of above with this:
The encouragement to use decorators which perform population of an external registry has an unintended consequence: the application developer now must assert ownership of every codepath that executes Python module scope code. Module-scope code is presumed by the current crop of decorator-based microframeworks to execute once and only once; if it executes more than once, weird things will start to happen. It is up to the application developer to maintain this invariant. Unfortunately, however, in reality, this is an impossible task, because, Python programmers do not own the module scope codepath, and never will. Anyone who tries to sell you on the idea that they do is simply mistaken. Test runners that you may want to use to run your code's tests often perform imports of arbitrary code in strange orders that manifest bugs like the one demonstrated above. API documentation generation tools do the same. Some people even think it's safe to use the Python reload command or delete objects from sys.modules, each of which has hilarious effects when used against code that has import-time side effects.
Routes (Usually) Need Relative Ordering
Consider the following simple Groundhog application:
If you run this application and visit the URL /admin, you will see "admin" page. This is the intended result. However, what if you rearrange the order of the function definitions in the file?
If you run this application and visit the URL /admin, you will now be returned a 404 error. This is probably not what you intended. The reason you see a 404 error when you rearrange function definition ordering is that routing declarations expressed via our microframework's routing decorators have an ordering, and that ordering matters.
In the first case, where we achieved the expected result, we first added a route with the pattern /admin, then we added a route with the pattern /:action by virtue of adding routing patterns via decorators at module scope. When a request with a PATH_INFO of /admin enters our application, the web framework loops over each of our application's route patterns in the order in which they were defined in our module. As a result, the view associated with the /admin routing pattern will be invoked: it matches first. All is right with the world.
In the second case, where we did not achieve the expected result, we first added a route with the pattern /:action, then we added a route with the pattern /admin. When a request with a PATH_INFO of /admin enters our application, the web framework loops over each of our application's route patterns in the order in which they were defined in our module. As a result, the view associated with the /:action routing pattern will be invoked: it matches first. A 404 error is raised. This is not what we wanted; it just happened due to the order in which we defined our view functions.
You may be willing to maintain an ordering of your view functions which reifies your routing policy. Your application may be small enough where this will never cause an issue. If it becomes large enough to matter, however, I don't envy you. Maintaining that ordering as your application grows larger will be difficult. At some point, you will also need to start controlling import ordering as well as function definition ordering. When your application grows beyond the size of a single file, and when decorators are used to register views, the non-__main__ modules which contain configuration decorators must be imported somehow for their configuration to be executed.
In another manifestation of "import fascination", some microframeworks use the import statement to get a handle to an object which is not logically global:
The Pylons 1.X web framework uses a similar strategy. It calls these things "Stacked Object Proxies", so, for purposes of this discussion, I'll do so as well.
Import statements in Python (import foo, from bar import baz) are most frequently performed to obtain a reference to an object defined globally within an external Python module. However, in "normal" programs, they are never used to obtain a reference to an object that has a lifetime measured by the scope of the body of a function. It would be absurd to try to import, for example, a variable named i representing a loop counter defined in the body of a function. For example, we'd never try to import i from the code below:
By its nature, the request object created as the result of a WSGI server's call into a long-lived web framework cannot be global, because the lifetime of a single request will be much shorter than the lifetime of the process running the framework. A request object created by a web framework actually has more similarity to the i loop counter in our example above than it has to any comparable importable object defined in the Python standard library or in "normal" library code.
However, systems which use stacked object proxies promote locally scoped objects such as request out to module scope, for the purpose of being able to offer users a "nice" spelling involving import. They, for what I consider dubious reasons, would rather present to their users the canonical way of getting at a request as from framework import request instead of a saner from myframework.threadlocals import get_request; request = get_request() even though the latter is more explicit.
Explicitly WSGI
Some microframeworks offer a run() method of an application object that executes a default server configuration for easy execution.
Pyramid doesn't currently try to hide the fact that its router is a WSGI application behind a convenience run() API. It just tells people to import a WSGI server and use it to serve up their Pyramid application as per the documentation of that WSGI server.
The extra lines saved by abstracting away the serving step behind run() seem to have driven dubious second-order decisions related to API in some microframeworks. For example, Bottle contains a ServerAdapter subclass for each type of WSGI server it supports via its mechanism. This means that there exists code in that depends on the following modules: wsgiref, flup, paste, cherrypy, fapws, tornado, google.appengine, twisted.web, diesel, gevent, gunicorn, eventlet, and rocket. You choose the kind of server you want to run by passing its name into the run method. In theory, this sounds great: I can try Bottle out on gunicorn just by passing in a name! However, to fully test Bottle, all of these third-party systems must be installed and functional; the Bottle developers must monitor changes to each of these packages and make sure their code still interfaces properly with them. This expands the packages required for testing greatly; this is a lot of requirements. It is likely difficult to fully automate these tests due to requirements conflicts and build issues.
As a result, for single-file apps, we currently don't bother to offer a run() shortcut; we tell folks to import their WSGI server of choice and run it "by hand". For the people who want a server abstraction layer, we suggest that they use PasteDeploy. In PasteDeploy-based systems, the onus for making sure that the server can interface with a WSGI application is placed on the server developer, not the web framework developer, making it more likely to be timely and correct.
Wrapping Up
Pyramid Doesn't Offer Pluggable Apps
It is "Pyramidic" to compose multiple external sources into the same configuration using :meth:`~pyramid.config.Configuration.include`. Any number of includes can be done to compose an application; includes can even be done from within other includes. Any directive can be used within an include that can be used outside of one (such as :meth:`~pyramid.config.Configurator.add_view`, etc).
• Pyramid doesn't provide enough "rails" to make it possible to integrate truly honest-to-god, download-an-app-from-a-random-place and-plug-it-in-to-create-a-system "pluggable" applications. Because Pyramid itself isn't opinionated (it doesn't mandate a particular kind of database, it offers multiple ways to map URLs to code, etc), it's unlikely that someone who creates something "application-like" will be able to casually redistribute it to J. Random Pyramid User and have it "just work" by asking him to config.include a function from the package. This is particularly true of very high level components such as blogs, wikis, twitter clones, commenting systems, etc. The "integrator" (the Pyramid developer who has downloaded a package advertised as a "pluggable app") will almost certainly have made different choices about e.g. what type of persistence system he's using, and for the integrator to appease the requirements of the "pluggable application", he may be required to set up a different database, make changes to his own code to prevent his application from "shadowing" the pluggable app (or vice versa), and any other number of arbitrary changes.
Truly pluggable applications need to be created at a much higher level than a web framework, as no web framework can offer enough constraints to really make them "work out of the box". They really need to plug into an application, instead. It would be a noble goal to build an application with Pyramid that provides these constraints and which truly does offer a way to plug in applications (Joomla, Plone, Drupal come to mind).
Pyramid Has Zope Things In It, So It's Too Complex
complexity and I love simple way of thinking
(Paraphrased from a real email, actually.)
Let's take this criticism point-by point.
Too Complex
Pyramid has ~ 650 pages of documentation (printed), covering topics from the very basic to the most advanced. Nothing is left undocumented, quite literally. It also has an awesome, very helpful community. Visit the #repoze and/or #pylons IRC channels on and see.
Hate Zope
I'm sorry you feel that way. The Zope brand has certainly taken its share of lumps over the years, and has a reputation for being insular and mysterious. But the word "Zope" is literally quite meaningless without qualification. What part of Zope do you hate? "Zope" is a brand, not a technology.
If it's just the word Zope: this can only be guilt by association. Because a piece of software internally uses some package named, it doesn't turn the piece of software that uses it into "Zope". There is a lot of great software written that has the word Zope in its name. Zope is not some sort of monolithic thing, and a lot of its software is usable externally. And while it's not really the job of this document to defend it, Zope has been around for over 10 years and has an incredibly large, active community. If you don't believe this, is an eye-opening reality check.
Love Simplicity
Other Challenges
Other challenges are encouraged to be sent to the Pylons-devel maillist. We'll try to address them by considering a design change, or at very least via exposition here.
Jump to Line
Something went wrong with that request. Please try again.
|
global_05_local_5_shard_00000035_processed.jsonl/33383
|
Skip to content
Subversion checkout URL
You can clone with
Download ZIP
Fetching contributors…
Cannot retrieve contributors at this time
42 lines (34 sloc) 1.456 kB
;; ## job-conf.clj
;; This is example job-conf.clj file, meant to provide default
;;settings to all queries executed inside this project. To get
;;started, create a file called "job-conf.clj" inside the "resources"
;;directory at your project's root. (this is called "resources" by
;;default, though you can customize this in project.clj with the
;;following k-v pair:
;; :resources-path "confdir"
;; job-conf.clj must end with a job-conf map. Feel free to define
;; functions, import namespaces and evaluate code above the final
;; return form.
;; Here's an import of Hadoop's java serialization interface:
(import '
;; And here's Backtype's Thrift serialization. Get this by including
;; [backtype/cascading-thrift "0.1.0"]
;; As a dependency.
(import 'backtype.hadoop.ThriftSerialization)
;; Now, the job-conf map:
{"io.serializations" JavaSerialization}
;; To provide multiple arguments, skip the usual comma separation and
;; wrap multiple arguments in a vector:
;; {"io.serializations" [ThriftSerialization JavaSerialization]}
;; The above examples use class symbols directly. You can also use
;; string versions of the full qualified class names.
{"io.serializations" ["backtype.hadoop.ThriftSerialization"
;; That's it! The above map will get returned, as it's the last form
;; in the file.
Jump to Line
Something went wrong with that request. Please try again.
|
global_05_local_5_shard_00000035_processed.jsonl/33384
|
Skip to content
Subversion checkout URL
You can clone with
Download ZIP
100644 54 lines (47 sloc) 2.795 kB
7257579 @antirez Git repository created from hping3-clockskew-0.tar.gz
1 WARNING: Also try `grep FIXME *.c'
5 HPING2 bugs will no longer be handled, the hping2 code inside hping3
6 is just a compatibility layer that will be dropped once the command
7 line interface will be reimplemented as an hping script itself.
9 DONE - split/rapd for IGRP (me)
10 DONE - add more flags and broadcast address to 'hping iflist'. (me)
11 DONE - ARS's apd and rapd support for IP and TCP options (me)
13 - TUN/TAP support -- virtual interface creation, with Tcl channels
14 - in 'hping recv' a timeout of zero or -1 should be specified using
15 keyword like 'dontblock' and 'forever', like a number of packets
16 equal to zero should be specified using the 'all' keyword.
17 - compression primitives 'hping zip', 'hping unzip'.
18 - recv should support -nobadsum and -notrunc to don't receive packets
19 containing layers with the bad checksum or truncated flags set.
20 - 'hping recvraw' should support a -split option to return the raw data
21 splitted in layers in a flat TCL list where elements are:
22 {layer0name binary0 layer1name binary1 ...}
23 - Ability to specify the outgoing interface regardless of the
24 destination IP address. (Should be impossible without datalink access)
25 - 'hping setif ?-promisc? ?-broadcast? ifname'
26 - 'hping build ?-nocompile? packet' APD->binary
27 - 'hping describe packet' binary->APD
28 - IPv6 support in ARS (some still-non-working patch received)
29 - The hping standard library. that's the real development area
30 to make the scripting capabilities useful. The library should
31 contain a reasonable number of functions to make it more handy,
32 and a number of standard exploits should be rewritten in hping
33 as examples. Also support for fragmentation, TCP reassembly,
34 and so on will be useful.
35 - A short way to invoke scripts in 'path' (/usr/local/lib/hping/*.htcl),
36 something like: "hping script.htcl". Hping may sense it's an .htlc
37 file and not a strange-locking domain name ;) and perform a lookup
38 in the standard library of scripts (~/.hping/*.htcl for example).
39 - Convert all the raw-socket stuff (used in output) to datalink.
40 - Implement a scanner, with random nmap and hping features, and also:
41 FIN scan follwed by a SYN scan, this can be useful
42 since many admins limit the incoming SYN packets, so the
43 SYN or connect() scan is too slow, while the FIN scan
44 show filtered ports as open. We can do a FIN scan, then scan
45 the ports that appears to be open with SYN. Should
46 be both fast and accurate.
48 TODO (about TCL scripting, but for future releases)
50 - 'hping iflist' should include the link header length (or -1 if it's unknown)
51 - 'hping recv' and 'recvraw' should have a -layer2 option to return the whole
52 level 2 frame. The same for 'hping send' and 'hping sendraw'.
53 - 'hping guesslhs' should run the ipv4 header detection and return the lhs
Something went wrong with that request. Please try again.
|
global_05_local_5_shard_00000035_processed.jsonl/33385
|
Skip to content
Subversion checkout URL
You can clone with
Download ZIP
Easy to use module to send e-mails with Node.JS
branch: master
This branch is 553 commits behind andris9:master
Fetching latest commit…
Cannot retrieve the latest commit at this time
Failed to load latest commit information.
Nodemailer is an easy to use module to send e-mails with Node.JS (using SMTP).
You can use two ways to send an e-mail message: the EmailMessage constructor or the shortcut function send_mail(). The send_mail() function takes all the fields of the e-mail message as a function parameter and sends the e-mail immediately. EmailMessage allows to compose the message object first and send it later with its method send().
Nodemailer is Unicode friendly ✔. You can use any characters you like.
Nodemailer supports
• Unicode to use any characters
• HTML contents as well as plain text alternative
• Attachments
• Embedded images in HTML
Install through NPM
npm install nodemailer
or download ZIP archive.
The source for Nodemailer is available at GitHub.
If you use NPM then the module is available as
var nodemailer = require('nodemailer');
but if you're using the source then
var nodemailer = require('./path_to_nodemailer/lib/mail');
Using send_mail()
var nodemailer = require("nodemailer");
nodemailer.send_mail({sender: "",
body:"Hi, how are you doing?"},
function(error, success){
console.log("Message "+(success?"sent":"failed"));
Using EmailMessage
var nodemailer = require("nodemailer");
var mail = nodemailer.EmailMessage({
sender: "",
mail.subject = "Hello!";
mail.body = "Hi, how are you doing?";
mail.send(function(error, success){
The callback function gets two parameters - error and success. If there's an error, then sending failed and you should check where's the problem. If there's no error value but success is not true then the server wasn't able to process the message correctly. Probably there was timeout while processing the message etc - in this case you should re-schedule sending this e-mail. If success is true then the message was sent successfully.
Before sending e-mails you need to set up SMTP server parameters.
nodemailer.SMTP = {
host: "",
port: 25,
hostname: "",
use_authentication: false,
user: "",
pass: ""
If you want to use SSL (not TLS/STARTTLS, just SSL), you need to set the ssl parameter to true.
nodemailer.SMTP = {
host: "",
port: 25,
hostname: "",
use_authentication: false,
ssl: true,
user: "",
pass: ""
SSL Support
nodemailer supports SSL support, with two big caveats:
• You must be using nodejs v0.3.x and its tls library. It has really only been tested on v0.3.8.
• You must use SSL from the beginning, not TLS/STARTTLS negotiation.
See examples/example.js for a complete example.
E-mail Message Fields
• reply_to - An e-mail address that will appear on the Reply-To: field
• subject - The subject of the e-mail
• body - The plaintext version of the message
• html - The HTML version of the message
• attachments - An array of attachment objects. Attachment object consists of two properties - filename and contents. Property contents can either be a String or a Buffer (for binary data). filename is the name of the attachment.
There's an optional extra field headers which holds custom header values in the form of {key: value}. These values will not overwrite any existing header but will be appended to the list.
mail_data = {
headers: {
'X-My-Custom-Header-Value': 'Visit for more info!'
Address Formatting
or with formatted name (includes unicode support)
"Ноде Майлер" <>
To, Cc and Bcc fields accept comma separated list of e-mails. Formatting can be mixed., "Ноде Майлер" <>, User Name <>
Currently you can't use comma in a formatted name, even if the name is in quotes.
Creating HTML messages
Message body in HTML format can be set with the message field html. If property html has contents but plain text alternative body has not (is left to empty), then existing text from the html version is also used in the plaintext version (without the html formatting).
The charset for html is UTF-8.
html: "<p>hello world!<br/>хелло ворлд!</p>"
Using Attachments
An e-mail message can include one or several attachments. Attachments can be set with the message field attachments which accepts a list of attachment objects.
An attachment object primarly consists of two properties - filename which is the name of the file (not a filepath to an actual file on disk etc.) that will be reported to the receiver as the attachments name; and contents to hold the data in a String or Buffer format. There's an additional property cid which can be used for embedding images in a HTML message.
Property filename is unicode safe.
var attachment_list = [
"filename": "attachment1.txt",
"contents": "contents for attachment1.txt"
"filename": "аттачмент2.bin",
"contents": new Buffer("binary contents", "binary");
attachments: attachment_list
Using Embedded Images
NB! the cid value should be as unique as possible!
var cid_value =".image.jpg";
var html = 'Embedded image: <img src="cid:'+cid_value+'" />';
var attachments = [{
filename: "image.png",
contents: IMAGE_CONTENTS,
cid: cid_value
Use Nodemailer Issue tracker to report additional shortcomings, bugs, feature requests etc.
Node.JS v0.3.x doesn't support changing to a secure channel in the middle of a connection (STARTTLS). So when a server requires authentication and this must be done over TLS it's a problem.
Currently the only allowed charset is UTF-8.
Do not use large attachments as the attachment contents are read into memory and the final message body is combined into one large string before sending.
Something went wrong with that request. Please try again.
|
global_05_local_5_shard_00000035_processed.jsonl/33386
|
Skip to content
Subversion checkout URL
You can clone with
Download ZIP
branch: master
Fetching contributors…
Cannot retrieve contributors at this time
59 lines (40 sloc) 1.652 kB
Getting Started
Get Python2.6 or Python2.7 (Whatever comes bundled with your system is
preferred, but otherwise 2.7 is better)
Afterwards, you need to get pip and virtualenv (+virtualenvwrapper)
If you want the latest pip+virtualenv
Use your local package manager to get easy_install (usually packagename
is python-setuptools).
$> easy_install pip
... stuff happens
$> pip install virtualenvwrapper
If you're lazy and want the fast way
Find python-pip and python-virtualenv and pip install virtualenvwrapper
Setting Up Dev Environment
The following will set up a virtualenv named 'hicap'. Feel free to name
it whatever you want.
$> mkvirtualenv hicap
$> pip install -r requirements.txt
The next time you return to your machine just type:
$> workon hicap
The requirements file is in the root of the repo. It contains a list
of all packages for pip to install. You might need to run the pip
install later on when further changes introduce new dependencies.
Local Database
The local settings uses the sqlite backend. One will be created when you do
a syncdb:
$> python syncdb
If you want to start from scratch (modified a model?), just delete the sqlite3
file and do a syncdb again. Later on we'll make a data dump to fill in db
data, or actually do proper migrations (using South).
Running Dev Server
Make sure you're in your virtualenv
$> python runserver
You can also be all 'runserver' to pick your IP and ports.
Yeah, it's that simple.
Jump to Line
Something went wrong with that request. Please try again.
|
global_05_local_5_shard_00000035_processed.jsonl/33387
|
Skip to content
Subversion checkout URL
You can clone with
Download ZIP
Fetching contributors…
Cannot retrieve contributors at this time
158 lines (98 sloc) 5.556 kB
Interchange RPM packages for Red Hat Linux and compatible operating systems
The Interchange RPM packages integrate Interchange with a Red Hat Linux
or compatible operating system. Files are installed in the usual Linux
Standard Base locations:
Interchange base: /usr/lib/interchange.
Executables: /usr/lib/interchange/bin.
Configuration: The global Interchange configuration file is
/etc/interchange.cfg. It is only writable by root.
Data: Catalog directories are located by default in /var/lib/interchange.
Invocation: Invocation is the normal /etc/rc.d/init.d startup method.
Interchange installs to be active in run levels 3, 4, and 5; to be killed
in all.
Logs: Logs go in /var/log/interchange. The subdirectory is needed to
allow the Interchange user ID to write/create files. A configuration file
is added to /etc/logrotate.d to do log rotation.
Run: Run files go in /var/run/interchange. This includes the UNIX-domain
socket and catalog status files. The subdirectory is needed to allow
the Interchange user ID to write/create files.
Sessions and temporary files: /var/cache/interchange.
Documentation: /usr/share/doc/interchange-5.7.7.
On a dedicated production server, it is wise to segregate as many of these
directories as possible onto their own partitions, to prevent problems if
one partition runs out of inodes or disk space, or you have a disk failure.
Interchange requires many Perl modules from CPAN. Many of these do not
usually come supplied with your operating system, so you will need to
install them yourself. It's best to locate RPMs for each of the needed
Perl modules and install them. To get a complete list of dependencies, do:
rpm -qp --requires interchange-5.7.7-1.*.rpm
Unfortunately, there's not currently a reliable, steady source of the latest
CPAN modules in RPM format for most operating systems. Thus the easiest way
to install them is to use CPAN to build the modules from source. First set
up CPAN and install its auxiliary modules:
perl -MCPAN -e'install Bundle::CPAN'
Then install the main modules Interchange uses:
perl -MCPAN -e'install Bundle::Interchange'
Instead you may want to install a bundle that includes many optional but
useful modules:
perl -MCPAN -e'install Bundle::InterchangeKitchenSink'
rpm -Uvh interchange-5.7.7-1.*.rpm
rpm -Uvh interchange-standard-5.7.7-1.*.rpm
If you have installed CPAN modules from source, rather than RPM, you'll need
to install the main interchange package without dependency checking because
RPM doesn't know about those modules you installed:
rpm -Uvh --nodeps interchange-5.7.7-1.*.rpm
Interchange, as installed from the RPM, needs a special invocation from
/usr/sbin/interchange. This is because the locations of configuration,
run, and log files differ from the places Interchange has traditionally
expected them.
As either the 'interch' user or the root user you should start or restart
interchange with this command:
/usr/sbin/interchange -r
NOTE: Contrary to other documentation, you SHOULD NOT use 'bin/restart'
or directly call 'bin/interchange' to start or restart Interchange when
you use the RPM installation.
Live Demo Catalog in RPM Format
There is a separate RPM that provides a live demonstration catalog called
'standard', which you may optionally use to quickly try out Interchange.
It should not be used as a basis for a real catalog; instead build
your own with the makecat tool in '/usr/lib/interchange/bin/makecat',
as described in the documentation. Do not confuse the 'standard' live demo
with the 'standard' catalog skeleton from which you are encouraged to build
your own catalog.
The standard-demo RPM relies upon the following things in the Apache
-- Standard document root and CGI binary locations:
DocumentRoot /var/www/html
-- ServerName must be the same as what is revealed by `hostname` when
the standard RPM is installed. If it is not, temporarily change the
hostname with a command like 'hostname' and then install
the standard-demo RPM. Afterwards you can change the hostname back
to normal.
-- suEXEC not enabled. If you have suEXEC enabled, you are responsible
for changing permissions and running parameters appropriately. You
can typically disable suEXEC by running `chmod u-s /usr/bin/suexec'.
If you want to continue to use suEXEC, you will have to compile the
appropriate INET mode link program and use it instead of vlink.
rpm -Uvh interchange-standard-demo-5.7.7-1.*.rpm
Once installed, you should be able to access the demo catalog like this
(using your own hostname, of course):
The initial administrative user name is "interch", and the password is
"pass". Change the password as soon as possible.
More information
list information, and other resources.
Jump to Line
Something went wrong with that request. Please try again.
|
global_05_local_5_shard_00000035_processed.jsonl/33388
|
Skip to content
Subversion checkout URL
You can clone with
Download ZIP
tree: 9a54d0db66
Fetching contributors…
Cannot retrieve contributors at this time
25 lines (19 sloc) 0.601 kB
Mac version
* Implement OAuth with WebView (currently #if'ed out)
* Implement an actual Mac project which uses it
Unimplemented actions
* Create a thing
* Delete a thing
* Flattr an URL (with optional auto-submit)
* List all flattrs
* Update a thing
* User activities
* User info
Shortcuts taken
* Check all NSLog statements and turn them into proper code
* Proper error message when setOAuthKey:secret: isn't called
* Scopes aren't mutually exclusive, but can be combined
* Support multiple accounts
* Support proper logout
* UIWebView for logins should have a back button
* Write documentation
Jump to Line
Something went wrong with that request. Please try again.
|
global_05_local_5_shard_00000035_processed.jsonl/33400
|
Loading ...
Sorry, an error occurred while loading the content.
Expand Messages
• [email protected]
http://www.chemistry.ucsc.edu/teaching/Winter02/Chem1C/Lect.10.htm Time to talk about the evolution of ATP in the context of Gaia. Again, the basic ID
Message 1 of 1 , Jan 3, 2004
• 0 Attachment
Again, the basic ID creationist argument is implausible complexity.
IOWs, these chemical processes couldn't have happened by blind
The above link talks about the energies and chemistry of ADP. This is
well known information and taught at every university and college and
even in modern high school chemistry and biology classes. I simply
want to talk about how it likely evolved, as opposed to
implausibly "appeared" as the creationists surmise.
Many basic physiological phenomena invoke thermal cycling.
Biochemical regulatory mechanisms such as regulation by protein
phosphorylation can be interpreted as methods for mimicking thermal
cycling that were acquired later in evolution during the transition
from living at a fluctuating temperature to living at a constant
The heat engine. At a first glance the proposed similarity between
heat engines such as the steam engine and biochemical objects may
seem farfetched. In the steam engine water is thermally cycled:
liquid water is heated in a boiler, and evaporates, turns into steam -
a phase transition; the expanding steam performs external work; in
the condensor the steam turns again into liquid water, the reverse
phase transition. In gaia a protein is similarly thermally cycled,
and undergoes a phase transition-like process as well (to an unfolded
respectively more fluid state). The external work is done during the
release of the synthesized ATP. In a steam engine the product, work
that is done, is obtained at the outside of the system, while in
early Gaia the product is formed within the system where ADP and
phosphate are 'pushed together' to form the ATP that is later
The process of producing ATP is in simple form about the burning of
sugar. As a sugar burns, it gives off CO2 and water. The water is
meaningless here because in a marine environment, salts diffuse with
the water. The significant chemical is CO2 as a "waste" product. So,
you have a protein that becomes more fluid and a surface tension
brought about by CO2 as a bubble, and a ride that is about to occur--
as the nucleotide complex rises to the surface where it becomes much
more probable that the complex is swept up by ambiant winds to become
sorted by the cirrus, and to feedback living temperatures and
chemistries. The increase in the temperature of the complex and its
surrounding gases would also operate to levitate the complex to the
marine surface, so the heat engine has caused an increased
probability of capture by the nucleotide complex to the surface--
IOWs, hot air rises.
The next question--where does the sugar come from? On the early Earth
there was much more energy available in ultraviolet light than in
lightning discharges. At long ultraviolet wavelengths, in which
methane, ammonia, water, and hydrogen are all transparent, but in
which the bulk of the solar ultraviolet energy lies, the gas hydrogen
sulfide (H2S) is a likely ultraviolet absorber. Again, it should be
pointed out that gases and lightning are tied together by surface
tension properties which would rise up the nucleotide complexes to
the marine surface to be swept by winds and then sorted by cirrus.
Carl Sagan et al made amino acids by long wavelength ultraviolet
irradiation of a mixture of methane, ammonia, water, and H2S. The
amino acid syntheses, at least in many cases, involve hydrogen
cyanide and aldehyde such as formaldehyde as gaseous intermediaries
formed from the initial gases. UV light, of course, would be a fair
weather occurrance, as it is blocked by clouds. So, again, we are
talking about chemistry occurring relative to gas bubbles suspended
on the surface tension of those bubbles, and having that buoyant
force -- causing the complex to rise to the surface.
Amino acids, particularly biologically abundant amino acids, can be
made so readily under simulated primitive conditions. When laboratory
conditions become oxidizing, however, no amino acids are formed,
suggesting that reducing conditions were necessary for prebiological
organic synthesis and, hence, the importance of electro chemical
conditions. This is another hint at the importance of sugars
burning . . . and electrons added via strikes to the soap, which
could have produced a relatively basic pH.
Under alkaline conditions, and in the presence of inorganic
catalysts, formaldehyde spontaneously reacts to form a variety of
sugars, including the five-carbon sugars fundamental to the formation
of nucleic acids and such six-carbon sugars as glucose and fructose,
which are extremely common metabolites and structural building blocks
in contemporary organisms. Furthermore, the nucleotide bases as well
as porphyrins have been produced in the laboratory under simulated
primitive Earth conditions by several investigators. Therefore, all
of the essential building blocks of proteins, sugars, and nucleic
acids can be readily produced under quite general primitive reducing
What ties them together is the behaviors of the nucelotide protein
complex riding gas bubbles to the marine surface and coupling large
scale roiling conductivity moments with specific cirrus behaviors,
which are altered by the size, shape, mass and charge of the complex.
Sorting occurs by effectiveness, and the parasol rains down to start
the process anew, whereas ineffective parasols are likely damaged in
the UV light of fair weather, or do not fall together with sufficient
probability to self replicate, or do not feed back the strikes to
present proper pH, and so forth.
|
global_05_local_5_shard_00000035_processed.jsonl/33436
|
Where is the kernel?
Dear maintainers,
just some questions....
What happened to the kernel higher than 2.6.26 ?
Is the kernel on hold, due toe the upcoming release of Lenny?
Meanwhile the latest stable kernel-version is 2.6.28 (and 2.6.29 is at work).
Where is 2.6.27 and 2.6.28 in debian? I only found 2.6.26 as the latest
release. Did I miss something?
Reply to:
|
global_05_local_5_shard_00000035_processed.jsonl/33440
|
Re: Archive is moving to auric / Incoming disabled
On Wed, May 10, 2000 at 06:40:30PM -0600, Jason Gunthorpe wrote:
> On Thu, 11 May 2000, Craig Sanders wrote:
> > manually download all the .debs individually or write a little
> > script to fetch them (and hope you didn't make some annoying typo in
> > the URLs). with ftp, the whole batch can be fetched in one go with a
> > carefully constructed wildcard mget.
> Try lftp's http mode.
thanks, i'll give it a go. not as good as a local mirror but should be
better than nothing.
craig sanders
Reply to:
|
global_05_local_5_shard_00000035_processed.jsonl/33441
|
Re: squid's async-io
On Mon, Nov 06, 2000 at 08:53:51PM -0700, Jeff Lightfoot wrote:
> Miquel van Smoorenburg wrote:
> > ftp://ftp.cistron.nl/pub/people/miquels/tmp/squid_2.3.4-1_i386.deb
> >
> > and let me know how it works for you ?
> The default setup worked great for me!
Not quite. 'dns_defnames off' option is not working. Same for
pluto: ~# /etc/init.d/squid start
Starting proxy server: 2000/11/06 21:19:27| parseConfigFile: line 643
unrecognized: 'dns_defnames on'
Jeff Lightfoot -- jeffml at pobox.com -- http://thefoots.com/
"How can I sing like a girl and not be stigmatized by the rest of
the world?" -- TMBG
Reply to:
|
global_05_local_5_shard_00000035_processed.jsonl/33448
|
Re: Perl module license clarification
It's always usefull when people bring an issue up before a list to
provide appropriate links to the context in which the decisions are
being made, and or prior discussion on the decision. The threads on
debian-perl[1][2] dealing with this issue explain the problems pretty
well, and Colin and James come to (roughly) the same conclusions that
I did.
One of the issues raised in this thread, but not alluded to in the
parent message is that Michael G Schwern (upstream) uses the "under
the same terms as perl itself" and then only links to the Artistic
license.[3] Michael should clarify in the copyright/license statement
whether he means gpl+artistic or artistic only, due to the dissonance
between these two statements.
Don Armstrong
We were at a chinese resturant.
He was yelling at the waitress because there was a typo in his fortune
-- hugh macleod http://www.gapingvoid.com/batch31.php
Attachment: pgpldTHsQOGi0.pgp
Description: PGP signature
Reply to:
|
global_05_local_5_shard_00000035_processed.jsonl/33449
|
On Tue, 2004-08-03 at 09:31, Anthony DeRobertis wrote:
> On Mon, Aug 02, 2004 at 09:03:33PM +0000, Jim Marhaus wrote:
> > "Debian Legal summary of the X-Oz License"
> > http://lists.debian.org/debian-legal/2004/02/msg00229.html
> Clause 4 of the license posted at the start of this thread is, with the
> execption of whos names it protects, word-for-word identical.
> Am I missing something?
Yes. Clause 3 is the GPL-incompatible non-free one. Clause 4 is standard
boilerplate, found in many licenses (it's also superfluous, being
written into copyright by default in US law).
Joe Wreschnig <[email protected]>
Attachment: signature.asc
Description: This is a digitally signed message part
Reply to:
|
global_05_local_5_shard_00000035_processed.jsonl/33451
|
nbio REMOVED from testing
FYI: The status of the nbio source package
in Debian's testing distribution has changed.
Previous version: 2.0-14
Current version: (not in testing)
Bug #422605: FTBFS: debian/make-libnbio.sh: line 78: /usr/bin/gcjh: No such file or directory
The script that generates this mail tries to extract removal
reasons from comments in the britney hint files. Those comments
were not originally meant to be machine readable, so if the
reason for removing your package seems to be nonsense, it is
probably the reporting script that got confused. Please check the
actual hints file before you complain about meaningless removals.
This email is automatically generated; [email protected] is responsible.
To UNSUBSCRIBE, email to [email protected]
Reply to:
|
global_05_local_5_shard_00000035_processed.jsonl/33454
|
Re: Help & advise on using WML constructs to create pages.
On Mon Oct 29, 2007 at 10:37:56 +0100, Gerfried Fuchs wrote:
> Am Sonntag, den 28.10.2007, 21:08 +0000 schrieb Steve Kemp:
> > Right section of the website beneath [english]/security/audit is a little
> > out of date. It is primarily out of date because the information contained
> > there is contained in the HTML, and that makes keeping it current harder
> > than it should be.
> What exactly do you mean with "right section"? Am a bit puzzled about
> that.
That was bad editing upon my part. What I meant to say was:
"Right now the section of the website beneath ..."
> It is due to the using of
> #use wml::debian::recent_list
> and the file english/template/debian/recent_list.wml in which this perl
> function is coded out. Said that, you can implement near to everything
> with some tricky perl code, like grepping through the DSAs and take
> those that match 'security.*audit' or similar, though things that would
> run longer like querying the BTS, if you are refering to the lists of
> bugs and want to automatically extract their informations too, should be
> not get done in a webwml run but in a seperate cronjob and then on the
> webwml run only parse the data in a file written by the other job.
OK I think that might be a good way forward. I'll have a play
around with it over the coming week. I guess there is no real
urgency, it just bothers me that the process is a little fiddly and
I'm mostly to blame for that.
> Definitely, but you will have to tweak the get_recent_list function.
> Please be extremely careful with it, it's used very widely across the
> site and people might get angry if you break it.
I think I'll either copy that locally, or write a perl script. The
latter is probably the fastest way given that I don't need too
much done.
Reply to:
|
global_05_local_5_shard_00000035_processed.jsonl/33458
|
Export (0) Print
Expand All
Recommendations for Choosing Between Functions and Macros
Most Microsoft run-time library routines are compiled or assembled functions, but some routines are implemented as macros. When a header file declares both a function and a macro version of a routine, the macro definition takes precedence, because it always appears after the function declaration. When you invoke a routine that is implemented as both a function and a macro, you can force the compiler to use the function version in two ways:
• Enclose the routine name in parentheses.
#include <ctype.h>
a = _toupper(a); // Use macro version of toupper.
a = (_toupper)(a); // Force compiler to use
// function version of toupper.
• "Undefine" the macro definition with the #undef directive:
#include <ctype.h>
#undef _toupper
If you need to choose between a function and a macro implementation of a library routine, consider the following trade-offs:
• Speed versus size The main benefit of using macros is faster execution time. During preprocessing, a macro is expanded (replaced by its definition) inline each time it is used. A function definition occurs only once regardless of how many times it is called. Macros may increase code size but do not have the overhead associated with function calls.
• Function evaluation A function evaluates to an address; a macro does not. Thus you cannot use a macro name in contexts requiring a pointer. For instance, you can declare a pointer to a function, but not a pointer to a macro.
• Type-checking When you declare a function, the compiler can check the argument types. Because you cannot declare a macro, the compiler cannot check macro argument types; although it can check the number of arguments you pass to a macro.
Community Additions
© 2015 Microsoft
|
global_05_local_5_shard_00000035_processed.jsonl/33459
|
Export (0) Print
Expand All
How to: Break on User-Unhandled Exceptions
If you are debugging with Just Mode Code, you can tell the debugger to break on any exception that is not handled by a handler in user code ("My Code"). The following procedure shows you how to use the Exceptions dialog box to determine which user-unhandled exceptions you want to break on.
By default, the Exceptions dialog box lists the most common exceptions in each category. You can add your own exceptions and delete exceptions you have added. Visual Studio saves the list of added exceptions with the solution data, so the exceptions will be available the next time you open and run the project.
Note Note
The Exceptions dialog box provides keys for setting controls without using the mouse. The hot keys are indicated by underlining in the control labels. If you have Windows themes disabled, the underlining will not be visible, although hot keys will still work. To view the hot-key underlining, enable Windows themes using the Windows Control Panel.
For more information, see How to: Add New Exceptions and How to: Delete User-Added Exceptions.
To break when an exception is not handled by My Code
1. On the Debug menu, click Exceptions.
Note Note
To enable the Exceptions menu in Express versions, on the Tools menu, click Settings, and then select Expert Settings.
2. In the Exceptions dialog box, select User-unhandled for an entire category of exceptions, for example, Common Language Runtime Exceptions.
Expand the node for a category of exceptions, for example, Common Language Runtime Exceptions, and select User-unhandled for a specific exception within that category.
3. Click OK.
© 2015 Microsoft
|
global_05_local_5_shard_00000035_processed.jsonl/33460
|
Export (0) Print
Expand All
ASP.NET Web Page Resources Overview
If you create Web pages that will be read by speakers of different languages, you must provide a way for readers to view the page in their own language. One approach is to re-create the page in each language. However, that approach can be labor intensive, error prone, and difficult to maintain as you change the original page.
ASP.NET enables you to create a page that can obtain content and other data based on the preferred language setting for the browser or based on the user's explicit choice of language. Content and other data is referred to as resources and such data can be stored in resource files or other sources
In the ASP.NET Web page, you configure controls to get their property values from resources. At run time, the resource expressions are replaced by resources from the appropriate resource file.
A resource file is an XML file that contains the strings that you want to translate into different languages or paths to images. The resource file contains key/value pairs. Each pair is an individual resource. Key names are not case sensitive. For example, a resource file might contain a resource with the key Button1 and the value Submit.
You create a separate resource file for each language (for example, English and French) or for a language and culture (for example English [U.K.], English [U.S.]). Each localized resource file has the same key/value pairs; the only difference is that a localized resource file can contain fewer resources than the default resource file. The built-in language fallback process then handles loading the neutral or default resource.
Resource files in ASP.NET have an .resx extension. At run time, the .resx file is compiled into an assembly, which is sometimes referred to as a satellite assembly. Because the .resx files are compiled dynamically, like ASP.NET Web pages, you do not have to create the resource assemblies. The compilation condenses several similar-language resource files into the same assembly.
When you create resource files, you start by creating a base .resx file. For each language that you want to support, create a new file that has the same file name. But in the name, include the language or the language and culture (culture name). For a list of culture names, see the CultureInfo class. For example, you might create the following files:
• WebResources.resx
The base resource file. This is the default (fallback) resource file.
• WebResources.es.resx
A resource file for Spanish.
• WebResources.es-mx.resx
A resource file for Spanish (Mexico) specifically.
• WebResources.de.resx
A resource file for German.
At run time, ASP.NET uses the resource file that is the best match for the setting of the CurrentUICulture property. The UI culture for the thread is set according to the UI culture of the page. For example, if the current UI culture is Spanish, ASP.NET uses the compiled version of the WebResources.es.resx file. If there is no match for the current UI culture, ASP.NET uses resource fallback. It starts by searching for resources for a specific culture. If those are not available, it searches for the resources for a neutral culture. If these are not found, ASP.NET loads the default resource file. In this example, the default resource file is WebResource.resx.
In ASP.NET, you can create resource files that have different scope. You can create resource files that are global, which means that you can read the resource file from any page or code that is in the Web site. You can also create local resource files, which store resources for a single ASP.NET Web page (.aspx file).
Global Resource Files
You create a global resource file by putting it in the reserved folder App_GlobalResources at the root of the application. Any .resx file that is in the App_GlobalResources folder has global scope. Additionally, ASP.NET generates a strongly typed object that gives you a simple way to programmatically access global resources.
Local Resource Files
A local resources file is one that applies to only one ASP.NET page or user control (an ASP.NET file that has a file-name extension of .aspx, .ascx, or .master). You put local resource files in folders that have the reserved name App_LocalResources. Unlike the root App_GlobalResources folder, App_LocalResources folders can be in any folder in the application. You associate a set of resources files with a specific Web page by using the name of the resource file.
For example, if you have a page named Default.aspx in the App_LocalResources folder, you might create the following files:
• Default.aspx.resx. This is the default local resource file (the fallback resource file) if no language match is found.
• Default.aspx.es.resx. This is the resource file for Spanish, without culture information.
• Default.aspx.es-mx.resx. This is the resource file for Spanish (Mexico) specifically.
• Default.aspx.fr.resx. This is the resource file for French, without culture information.
The base name of the file matches the page file name, followed by a language and culture name, and ending with the extension .resx. For a list of culture names, see CultureInfo.
Localizing Client Script Resources
Localization support for ASP.NET AJAX client script builds on the foundation of the ASP.NET 2.0 localization model. In this model, you embed script files and localized script resources in a hub-and-spoke organization of assemblies (satellite assemblies). You can then selectively use these embedded client scripts and resources for specific languages and regions. This model enables a single code base to support multiple cultures. There is also support for localized script files that are provided as .js files on disk. ASP.NET can serve localized client scripts and resources automatically for specific languages and regions.
For more information, see the following topics:
Choosing Between Global and Local Resource Files
You can use any combination of global and local resource files in the Web application. Generally, you add resources to a global resource file when you want to share the resources between pages. Resources in global resource files are also strongly typed for when you want to access the files programmatically.
However, global resource files can become large, if you store all localized resources in them. Global resource files can also be more difficult to manage, if more than one developer is working on different pages but in a single resource file.
Local resource files make it easier to manage resources for a single ASP.NET Web page. But you cannot share resources between pages. Additionally, you might create lots of local resource files, if you have many pages that must be localized into many languages. If sites are large with many folders and languages, local resources can quickly expand the number of assemblies in the application domain.
When you make a change to a default resource file, either local or global, ASP.NET recompiles the resources and restarts the ASP.NET application. This can affect the overall performance of your site. If you add satellite resource files, it does not cause a recompilation of resources, but the ASP.NET application will restart.
Linked resources are supported only in global resource files.
After you create resource files, you can use them in ASP.NET Web pages. You typically use resources to fill the property values of controls on the page. For example, you might use resources to set the Text property of a Button control, instead of hard-coding the property to a specific string.
To use resources to set control property values, you can use implicit localization or explicit localization, as follows:
• Implicit localization works with local resources and lets you automatically set control properties to matching resources.
• Explicit localization lets you use a resource expression to set a control property to a specific resource in a local or global resource file.
Implicit Localization with Local Resources
If you have created local resource files for a specific page, you can use implicit localization to fill the property values for a control from the resource file. In implicit localization, ASP.NET reads a resource file and matches resources to property values.
To use implicit localization, you must use a naming convention for resources in the local resource file that uses the following pattern:
For example, if you are creating resources for a Button control named Button1, you might create the following key/value pairs in the local resource file:
You can use any name for Key, but Property must match the name of a property of the control that you are localizing.
In the page, you use a special meta attribute in the markup for the control to specify implicit localization. You do not have to explicitly specify which properties are localized. A Button control that is configured for implicit localization might resemble the following:
<asp:Button ID="Button1" runat="server" Text="DefaultText"
meta:resourcekey="Button1" />
The resourcekey value matches a key in the corresponding resource file. At run time, ASP.NET matches resources to control properties using the control label as the resourcekey. If a property value is defined in the resource file, ASP.NET substitutes the resource value for the property.
Explicit Localization
Alternatively, you can use explicit localization, where you use a resource expression. Unlike implicit localization, you must use a resource expression for each property that you want to set.
A Button control that is configured to set the Text property from a global resource file might resemble the following:
<asp:Button ID="Button1" runat="server"
You can specify an explicit resource expression or an implicit resource expression for a control, but not both. The following declarative syntax on a Button control causes a parser error:
<asp:Button ID="Button1"
In this example, an implicit local resource file (one that matches the current page name) is specified as well as an explicit resource file that is named WebResources. To prevent a parser error for this control, remove one of the resource expressions.
Localizing Static Text
If a page includes static text, you can use ASP.NET localization by including it in a Localize control, and then using explicit localization to set the static text. The Localize control renders no markup; its only function is to act as a placeholder for localized text. The Localize control can be edited in Design view, not only in the property grid. At run time, ASP.NET treats the Localize control as a Literal control. For example, your page might include the following code:
<asp:Localize runat=server
Text="Welcome!" meta:resourcekey="LiteralResource1" />
<br />
<br />
<asp:Localize runat="server"
Text="Name: " meta:resourcekey="LiteralResource2" />
<asp:TextBox runat="server" ID="TextBox1"
meta:resourcekey="TextBox1Resource1" />
Security noteSecurity Note:
Implicit Localization in Templates
In templated controls, such as the DataList, GridView, and Wizard controls, you localize template style properties by accessing the properties through the parent control's implicit resource expression. You cannot use an implicit resource expression on the template itself.
To localize values for a template property, use the meta attribute and a resource key for the control that the template belongs to. Then use either the Property.Subproperty syntax or the Property-Subproperty syntax in the resource file. For example, the following declarative syntax is valid for a Wizard control:
<asp:Wizard ID="Wizard1"
BorderWidth="<%$ resources:navBorderWidth %>"/>
<asp:WizardStep ID="WizardStep1"
Title="Step 1"
The following key/value pairs in the local resource file could be used for the previous example:
Wizard1Resource1.NavigationStyle.BackColor, Red
navborderWidth, 5
Or the following key/value pairs could be used:
Wizard1Resource1.NavigationStyle-BackColor, Red
navborderWidth, 5
You can use an explicit resource expression for the NavigationStyle property of the Wizard control in the previous example. The explicit resource expression omits the Class name so that resources from a local resource file are used.
For more information about templated server controls, see ASP.NET Web Server Controls Templates.
When a page runs, ASP.NET selects the version of the resource file that most closely matches the current UICulture setting for the page. If there is no match, ASP.NET uses resource fallback to obtain a resource. For example, if you are running the Default.aspx page and the current UICulture property is set to es (Spanish), ASP.NET uses the compiled version of the local resource file Default.aspx.es.resx.
ASP.NET can set the UICulture and Culture properties for the page to the language and culture values that are passed by the browser. Alternatively, you can set the UICulture and Culture properties explicitly, either declaratively or in code. You can also set the values declaratively in Web.config files. For detailed information, see How to: Set the Culture and UI Culture for ASP.NET Web Page Globalization.
You should not rely exclusively on browser settings to set language and culture information, because users can be using a browser on a computer other than their own. Also, browsers frequently communicate only language information without a specific culture setting. In that case, the server has to deduce a specific culture for data formatting. A good strategy is to let users select a language explicitly.
Besides setting resource values in markup with resource expressions, you can retrieve resource values programmatically. You might do this if the resource value is not known at design time or if you want to set the resource value to a value that is obtained at run time. For more information, see How to: Retrieve Resource Values Programmatically.
Community Additions
© 2015 Microsoft
|
global_05_local_5_shard_00000035_processed.jsonl/33461
|
Export (0) Print
Expand All
CredentialCache.Add Method (String, Int32, String, NetworkCredential)
Adds a NetworkCredential instance for use with SMTP to the credential cache and associates it with a host computer, port, and authentication protocol. Credentials added using this method are valid for SMTP only. This method does not work for HTTP or FTP requests.
Namespace: System.Net
Assemblies: System (in System.dll)
System.Net.Primitives (in System.Net.Primitives.dll)
public void Add(
string host,
int port,
string authenticationType,
NetworkCredential credential
Type: System.String
A String that identifies the host computer.
Type: System.Int32
A Int32 that specifies the port to connect to on host.
Type: System.String
A String that identifies the authentication scheme used when connecting to host using cred. See Remarks.
Type: System.Net.NetworkCredential
The NetworkCredential to add to the credential cache.
host is null.
authType is null.
authType not an accepted value. See Remarks.
port is less than zero.
This method places a NetworkCredential instance for use with SMTP into the CredentialCache. The cache stores credentials in the order in which they are added to it. When the GetCredential(String, Int32, String) method is called, it returns a NetworkCredential instance that is selected by matching the host, port, and authType. The comparison is done case-insensitively.
The supported values for authType are "NTLM", "Digest", "Kerberos", and "Negotiate".
Credentials added with this method are only valid for use with SMTP. This method does not work for HTTP or FTP protocols.
The following code example initializes a CredentialCache with multiple security credentials for use with SMTP and uses one of those credentials with a SmtpClient.
SmtpClient client = new SmtpClient("ContosoMail", 45);
MailAddress from = new MailAddress("[email protected]", "Sender Name");
MailAddress to = new MailAddress("[email protected]", "Recepient Name");
MailMessage message = new MailMessage(from, to);
message.Body = "This is a test e-mail message sent by an application. ";
message.Subject = "Test Email using Credentials";
NetworkCredential myCreds = new NetworkCredential("username", "password", "domain");
CredentialCache myCredentialCache = new CredentialCache();
myCredentialCache.Add("ContoscoMail", 35, "Basic", myCreds);
myCredentialCache.Add("ContoscoMail", 45, "NTLM", myCreds);
client.Credentials = myCredentialCache.GetCredential("ContosoMail", 45, "NTLM");
catch(Exception e)
Console.WriteLine("Exception is raised. ");
Console.WriteLine("Message: {0} ",e.Message);
.NET Framework
.NET Framework Client Profile
Supported in: 4, 3.5 SP1
Supported in: Windows Phone 8.1
Supported in: Windows Phone Silverlight 8
© 2015 Microsoft
|
global_05_local_5_shard_00000035_processed.jsonl/33462
|
Export (0) Print
Expand All
Events and Event Handling for Visual Basic 6.0 Users
If you are familiar with events and event handling in Visual Basic 6.0, the event model in Visual Basic 2008 may at first seem confusing, but ultimately it is simpler and much more powerful.
In Visual Basic 6.0, events are tied to specific objects and have their own event-handling code. For example, on a form with a button and a menu, each has its own Click event; you have to write code in the event handler for each, even if they both perform exactly the same function.
' Visual Basic 6.0
Private Sub HelpButton_Click()
HelpButton.Caption = "Help me!"
End Sub
Private Sub HelpMenu_Click()
HelpMenu.Caption = "Help me!"
End Sub
In Visual Basic 2008, events are tied to event handlers by means of delegates, allowing you to create a single event handler for multiple objects.
Private Sub HelpButton_Click(ByVal sender As Object, ByVal e As _
System.EventArgs) Handles HelpButton.Click, HelpMenu.Click
sender.Text = "Help me!"
End Sub
In the above example, notice that the event declaration has a Handles clause that defines which events will be handled—in this case, the Click events for both the HelpButton and HelpMenu objects. The objects and events do not have to be of the same type; for example you might have a single event handler that handles the Click event of a button, the DoubleClick event of a text box, and the Tick event of a timer.
Notice also that the event declaration contains two parameters: ByVal sender As Object and ByVal e As System.EventArgs. The first parameter, sender, provides a reference to the object that raised the event. The second parameter, e, passes an object specific to the event that is being handled. By referencing the object's properties (and, sometimes, its methods), you can obtain information such as the location of the mouse for mouse events, or data being transferred in drag-and-drop events.
In the following example, the MouseDown event handler uses the sender parameter to determine the type of object that generated the event, and if the object is a PictureBox, the e parameter is used to move a label to the location where the click took place. To duplicate this example, add two PictureBox controls and a Label control to a form.
Private Sub Form1_MouseDown(ByVal sender As Object, ByVal e As _
System.Windows.Forms.MouseEventArgs) Handles Me.MouseDown, _
PictureBox1.MouseDown, PictureBox2.MouseDown
If TypeOf sender Is PictureBox Then
Label1.Location = sender.Location + e.Location
MsgBox("Please click a picture")
End If
End Sub
Typically, each event produces an event handler with a different event-object type for the second parameter. Some event handlers, such as those for the MouseDown and MouseUp events, have the same object type (MouseEventArgs) for their second parameter. For these types of events, you can use the same event handler to handle both events.
For events that pass different event object types, you must create separate event handlers. For example, the TextChanged event of a TextBox control passes the generic EventArgs event object, and the MouseDown event passes the more specialized MouseEventArgs event object. The MouseEventArgs object contains properties that are specific to mouse events such as Button, to determine which mouse button was pressed; these properties do not apply to a TextBox control and would cause an error if you tried to reference them.
In addition to the conceptual differences in event handling, the names and behavior of some events for various objects are different in Visual Basic 2008. For more information, see Windows Forms Controls for Visual Basic 6.0 Users.
Community Additions
© 2015 Microsoft
|
global_05_local_5_shard_00000035_processed.jsonl/33463
|
Export (0) Print
Expand All
Selector.SelectionChanged Event
Occurs when the currently selected item changes.
Namespace: System.Windows.Controls.Primitives
Assembly: System.Windows (in System.Windows.dll)
public event SelectionChangedEventHandler SelectionChanged
<selector SelectionChanged="eventhandler"/>
A selection change can occur through user interaction, through binding, or when other values are set.
Supported in: 5, 4, 3
Silverlight for Windows Phone
Supported in: Windows Phone OS 7.1, Windows Phone OS 7.0
Community Additions
© 2015 Microsoft
|
global_05_local_5_shard_00000035_processed.jsonl/33464
|
Windows Dev Center
Additional game programming resources
For more info regarding game programming on Windows and Windows Phone, check out the following resources.
DirectX game programming code samples
Game programming reference
Game design guidance
Game programming tutorials
Channel 9 Video
Type keywords of interest such as "game" or "DirectX" in the Term field to find the talks that make sense for you.
2012 Game Developer's Conference (GDC) presentations
Game programming guidance for other technologies
Other resources
© 2015 Microsoft
|
global_05_local_5_shard_00000035_processed.jsonl/33465
|
Windows Dev Center
Windows PowerShell
Updated: July 8, 2013
The documents published here are written primarily for cmdlet, provider, and host application developers who require reference information about the APIs provided by Windows PowerShell. However, system administrators might also find the information provided by these documents useful.
For the basic information needed to start using Windows PowerShell, see Getting Started with Windows PowerShell .
Windows PowerShell Documents on MSDN
Installing the Windows PowerShell SDK
Provides information about how to install the Windows PowerShell SDK.
Writing a Windows PowerShell Module
Provides information for administrators, script developers, and cmdlet developers who need to package and distribute their Windows PowerShell solutions.
Writing a Windows PowerShell Cmdlet
Provides information for designing and implementing cmdlets.
Writing a Windows PowerShell Provider
Provides information for designing and implementing Windows PowerShell providers. It will help you understand how Windows PowerShell providers work, and it provides sample code that you can use to start designing or writing your own providers.
Writing a Windows PowerShell Host Application
Provides information that can be used by program managers who are designing host applications and by developers who are implementing them. The host application can, define the runspace where commands are run, open sessions on a local or remote computer, and invoke the commands either synchronously or asynchronously based on the needs of the application.
Writing a Windows PowerShell Formatting File
Provides information for the authoring of formatting files, which control the display format for the objects that are returned by commands (cmdlets, functions, and scripts).
Windows PowerShell Reference
Provides reference content for the APIs used in writing cmdlets, providers, and host applications, as well as other supporting APIs.
© 2015 Microsoft
|
global_05_local_5_shard_00000035_processed.jsonl/33467
|
Forgive me, I'm not an economist or anything, but doesn't this raise a question of shell company regulation? It shouldn't be possible to use a legal structure like that.
It most certainly does raise the question.
Here's an article and HN discussion for Intellectual Ventures being linked to over 2000 shell companies: http://news.ycombinator.com/item?id=4946445
That there exists a legal structure for some group of people to avoid responsibility is quite baffling to me.
Things like Limited Liability means that someone could potentially do something harmful, and yet not be "personally" responsible for the consequence - and yet, reap the rewards should they succeed, means that the cost is externalized to society at large. This should be fixed (how, i have no idea tho...).
The responsible party is fully liable, if you can prove they are using the entity as a sham you can pierce the veil.
|
global_05_local_5_shard_00000035_processed.jsonl/33468
|
Shared publicly -
Choices and solutions
Michelle Wang's profile photoPourya Heidarpour's profile photoLi Wenbo's profile photogee ann bilbao's profile photo
thats never happened for me on anything important lol
This relies on the assumption that what you desire is good for you. Often this is not the case. Think of unhealthy food, drugs if you are addicted (e.g. to cigarettes), being lazy when you should work out, watching TV when you should study etc.
Nice .......Now I don't have to go ORACLE everytime :):)
is it the realization that a coin is about to decide for your brain? does the brain settle it's strike and go back to work as soon as it realizes it is about to be outsourced to a another shiny object?
There are only two kinds of choices I use a coin for:
-Those that don't matter.
-Those in which I really want to do one thing but know I really need to do another.
Deciding while the coin is in the air doesn't work for either of those.
tossing coin...100% guaranteed at the start of soccer match...till now..
Right, thanks, I didn't know it. The question still remains, why what I hope for is the correct answer?
Sametime it work out e.g"cheeseburger or Chicken Burger"
'Current research' suggests you make better decisions when in need of a pee!!!!
and that 'snap' decisions are normally the best.
So, why the hell do companies needs 'boards' of people that take months to make a decision!?!?!?
This reminds me of a story called the 50 cent computer. A boy is going to his uncles for a week, and this boy is head over heels for technology. His uncle has no technology and the boy asked do you have a computer? The uncle gave him a 50 cent piece and said it'll answer any question. So the boy used it and eventually got lost, the sheriff and took him back. The boy said I kept on asking it questions but it kept on giving me the wrong answer. The uncle said that's because we have the most super computer. It's in us, our brain, it allows us to make our own choices. We don't have to rely on computers to give us the answer.
easy way to make descisions
these are the briefest moments that pass us by
That's some deep insight
Amazing how simply brilliant this statement is.
love it, very true, never thought of it until now...
It's true!
At that moment you start wishing for one over the other. ;)
Unless one is completely lost like in the middle of the that point you're just hoping that whatever decision you make is the right one...
Touches up on the issue of having sincerity in what one seeks, or objectivity
I learned this from my first ever boss and good friend Bill many, many years ago. It really does work.
With the coin you let go of your likes and dislikes and get ready to accept anything that comes your way. That is a step towards enlightenment.
My primary method of choosing between Chinese food, or Dominos.
So.....what's for lunch? :-)
There is but one choice and two options.
The first thought is always the right thing to do.
I've done this many times. If you find yourself thinking, "I hope it lands...", ignore the coin and follow year heart. If not, then it doesn't really matter anyway.
Can i use that method ..... good day...
Add a comment...
|
global_05_local_5_shard_00000035_processed.jsonl/33485
|
More titles to consider
Shopping Cart
Want to compost but arent sure where to start? Need a little help with a compost pile thats already in the garden? Compostology 1-2-3 is the answer! Its simply the best--and most complete--guide to successful composting for every garden size, and it answers the most-asked questions: What is compost? Why is it important? How do you make compost? And how do you use compost? The experts at Organic Gardening share their years of experience with composting, blending together how-to information and simple science to help backyard gardeners understand the process of transforming household and yard waste into rich, crumbly compost. Learn which materials make the best compost, how to build a compost bin or layer a compost pile, how to troubleshoot, which tools and supplies make the composting process easier, step-by-step methods to keep compost cooking, and how to use gardeners gold to enrich the soil in garden beds, planting areas, and container gardens. With helpful tips and hints and easy-to-understand illustrations, Compostology 1-2-3 shows how to make and use compost for better soil, healthier plants, and tastier vegetables and fruit. And its as easy as 1-2-3.
People who read this also enjoyed
Get a 1 year subscription
for / issue
• IOS
|
global_05_local_5_shard_00000035_processed.jsonl/33486
|
A Rakuten Company
More titles to consider
Shopping Cart
Is your business struggling to stay afloat? Are you overwhelmed by the challenge of building an organization that can be a market leader? Well, now is the time to stop going in circles--find a new direction and re-imagine your company. In this hard-hitting guide, renowned international corporate consultants and professors Leo Hopf and William Welter show how to breathe new life into your firm. Using revealing case studies from Seagate to Harley-Davidson, they offer such key strategies as: Repackaging products to widen the range of your target demographic; Revising your profit model to improve your margins; Moving up- or down-market to attract new customers; Using core competencies to enter new markets; and Conducting business at a different time to reach new customers. You'll need to take a risk to reap the rewards. But this blueprint for growth will supply you with the confidence to start on a different path. So forget the same-old tired tactics. Instead, make things happen by making over your business! It's crucial to the livelihood of your enterprise, and Hopf and Welter give you everything you need to get it right.
People who read this also enjoyed
Get a 1 year subscription
for / issue
• IOS
|
global_05_local_5_shard_00000035_processed.jsonl/33488
|
More titles to consider
Shopping Cart
For Someone Else If You’re Concerned. For Yourself If You’ve Ever Wondered. You joined your church because of its intensity for God. Like no other place, it’s helped you discover the meaning of obedience. Of teachableness. Of death to self. If there’s one problem, it’s the confusion that sometimes comes from your own carnal thinking. But God has given you leaders who can lovingly correct a doubting, independent spirit and help you choose God’s best for your life. How can you go wrong with a church like that? Easily. What you’ve just read actually fits the profile of many abusive churches. Twisted Scriptures reveals in depth how the Bible can be distorted in ways that rob you of the liberty Jesus died to give you. You might be shocked at what you discover. This book uncovers the subtle but powerful techniques by which, in the name of truth, controlling leaders manipulate and intimidate countless believers. It also supplies tools for overcoming persuasive, deceptive teachings and practices. Thousands of Christians have already moved from struggle to true freedom and hope through Twisted Scriptures. If you truly want to grow in everything God made you to be, you owe it to yourself to read this book.
People who read this also enjoyed
Get a 1 year subscription
for / issue
• IOS
|
global_05_local_5_shard_00000035_processed.jsonl/33489
|
More titles to consider
Shopping Cart
Secrets can destroy you—and the one you love most.
Richard and Rose, Book 6
As Richard returns with Rose to her childhood home of Darkwater for two weddings, romance is in the air—but so is trouble. It begins with Rose’s stolen watch. Tensions rise when they learn their old adversaries, the Drurys, have taken a house nearby. A series of attacks on those they love, plus a rise in smuggling activity, only add to the threat of violence.
Then illness strikes at the worst possible time, threatening everyone in the district—especially the children. Questions abound: Was the infection deliberate? Is someone striking at Richard through Rose, or are their enemies targeting Rose for information she possesses?
Richard calls on his resources, public and private, to counter an enemy that threatens to destroy his beloved Rose. Rose is no helpless victim, however, and refuses to let anyone—even Richard—take away her independence. She finds ways to fight that aren’t in his armoury. Whether he likes it or not…
Warning: When Richard uses a topaz necklace to give Rose hot shivers, it might give you ideas, so keep a man handy to experiment on. But you can’t have Richard.
People who read this also enjoyed
Get a 1 year subscription
for / issue
• IOS
|
global_05_local_5_shard_00000035_processed.jsonl/33490
|
More titles to consider
Shopping Cart
You are about to purchase and download the ebook version of Matthew Henry's Commentary on the Whole Bible-Book of John, for your eBook Reader Device.
Matthew Henry's Commentary on the Whole Bible is an EXHAUSTIVE study tool, used by countless scholars and laymen for well over 100 years. This commentary covers every chapter and nearly every verse in the Bible, providing a thorough commentary on the Holy Scriptures.
Ever since it was finished, this reference has been an invaluable tool to theology students everywhere. If you're scouring scripture, or just casually studying, you will find this commentary very insightful.
People who read this also enjoyed
Get a 1 year subscription
for / issue
• IOS
|
global_05_local_5_shard_00000035_processed.jsonl/33496
|
Export (0) Print
Expand All
Enforcing Smart Cards to Log on to a Local Computer
Updated: November 16, 2009
Applies To: Windows 7, Windows Server 2008 R2
You deployed a Group Policy setting that configures a computer to require smart card authentication to log on to the domain. Now, users of the computer cannot log on to the computer by using their user name and password.
When a computer is configured to require smart card logon, all users of that computer must log on by using a smart card.
You can verify that all users of the computer have smart cards to log on to the computer, you can disable the Group Policy setting that requires a smart card to log on to the computer, or you can change the Group Policy setting to allow users to log on by using either their credentials or their smart card.
Requiring a smart card to log on is most appropriate for remote computers, such as a remote domain controller or remote Terminal Services gateways.
Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
Community Additions
© 2015 Microsoft
|
global_05_local_5_shard_00000035_processed.jsonl/33497
|
Export (0) Print
Expand All
Expand Minimize
The local computer is a domain controller of a child domain_LocalComputerIsDCInChildDomain
Applies to: Exchange Server
Topic Last Modified: 2012-06-05
Microsoft® Exchange Server 2007 setup cannot continue because the local computer is a domain controller for a child domain.
Exchange 2007 setup will not install on to a domain controller for a child domain unless the domain controller is a global catalog server.
To resolve this issue, promote the domain controller to a global catalog server or install Exchange 2007 to a non-domain controller, a member server, in the child domain, and then rerun the Microsoft Exchange setup.
To correct this warning by making the Exchange server a global catalog server
1. On the domain controller, click Start, point to Programs, click Administrative Tools, and then click Active Directory Sites and Services.
2. In the console tree, double-click Sites, double-click the name of the site, and then double-click Servers.
3. Double-click the target domain controller.
4. In the results pane, right-click NTDS Settings, and then click Properties.
5. On the General tab, click to select the Global catalog check box.
6. Restart the domain controller.
Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
© 2015 Microsoft
|
global_05_local_5_shard_00000035_processed.jsonl/33498
|
Export (0) Print
Expand All
How to: Set Deployment Properties (Reporting Services)
In Business Intelligence Development Studio, you must specify the report server and optionally the folders for reports and shared data sources so that you can publish the items in a Report Server project to a report server. The properties and values that Business Intelligence Development Studio needs to build, preview an deploy reports are stored in project configurations of the Report Server project. You can create multiple named sets for these project properties, so that you can conveniently switch between property sets. Each set of properties is a configuration. For example, you can have a configuration for publishing reports to a test server and a different configuration for publishing reports to a production server.
Use Configuration Manager to create and manage sets of project properties in project configurations. Configuration Manager is a feature supported by Visual Studio, on which BI Development Studio is based.
Do not confuse this feature with the Reporting Services Configuration Manager, which is used to configure Reporting Services after installation. For more information, see Configuring a Report Server Installation (Reporting Services in Native Mode).
In BI Development Studio, the action of publishing reports from a Report Server project or solution is known as deploying reports.
To set deployment properties
1. Right-click the report project, and then click Properties.
2. In the Property Pages dialog box for the project, select a configuration to edit from the Configuration list. Common configurations are DebugLocal, Debug, and Release.
You can use multiple configurations to switch quickly between different report servers or settings.
3. In the OutputPath textbox, type or paste the path in your local file system to store the report definition used in build verification, deployment, and preview of reports. The path must be different than the path that you use for the project and a relative path that is a child folder under the path of the project.
4. In the ErrorLevel text box, type the severity of the build issues that are reported as errors. Issues occurring when building reports, data sources, or other project resources with severity levels less than or equal to the value of ErrorLevel are reported as errors; otherwise, the issues are reported as warnings. Any error will cause the build task to fail. The valid severity levels are 0 through 4 inclusive. The default value is 2.
ErrorLevel can be used to increase or decrease the sensitivity of the build. For example, when a report with a map is built during deployment to a SQL Server 2008 report server an error displays by default and building the report fails. If you lower ErrorLevel the map is removed from the report, a warning displays, and building the report continues.
5. In the StartItem list, select a report to display in the preview window or in a browser window when the report project is run.
6. In the OverwriteDataSources list, select True to overwrite the shared data source on the server each time shared data sources are published, or select False to keep the data source on the server.
7. In the TargetServerVersion list, select either the SQL Server 2008 or SQL Server 2008 R2 version of Reporting Services or select Detect Version to automatically determine the version installed on the server identified by the TargetServer URL property. The default value is SQL Server 2008 R2.
Use TargetServerVersion to customize the built reports, placed in the path specified in OutputPath, for the version of the report server specified in TargetServer URL.
8. In the TargetDataSourceFolder text box, type the folder on the report server in which to place the published shared data sources. The default value for TargetDataSourceFolder is Data Sources. If you leave this value blank, the data sources will be published to the location specified in TargetReportFolder.
9. In the TargetReportFolder text box, type the folder on the report server in which to place the published reports. The default value for TargetReportFolder is the name of the report project.
For a report server running in native mode, you must have Publish permissions on the target folder to publish reports to that folder. Publish permissions are provided through a role assignment that maps your user account to a role that includes publish operations. For more information, see Creating and Managing Role Assignments and Publisher Role. For a report server running in SharePoint integrated mode, you must have Member or Owner permission on the SharePoint site. For more information, see Site and List Permission Reference for Report Server Items.
10. In the TargetServerURL text box, type the URL of the target report server. Before you publish a report, you must set this property to a valid report server URL. When publishing to a report server running in native mode, use the URL of the virtual directory of the report server (for example, http://server/reportserver or https://server/reportserver). This is the virtual directory of the report server, not Report Manager.
When publishing to a report server running in SharePoint integrated mode, use a URL to a SharePoint top-level site or subsite. If you do not specify a site, the default top-level site is used (for example, http://servername, http://servername/site or http://servername/site/subsite).
To set Configuration Manager properties
2. In the Property Pages dialog box for the project, click Configuration Manager.
3. In the Configuration Manager dialog box, select the configuration to edit. The currently active configuration is displayed as Active(<configuration>).
4. In Project Contexts, for each project in the solution, select or clear Build or Deploy.
If Build is selected, Report Designer builds the report project and checks for errors before previewing or publishing to a report server. If Deploy is selected, Report Designer publishes the reports to the report server as defined in deployment properties. If Deploy is not selected, Report Designer displays the report specified in the StartItem property in a local preview window.
Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
Community Additions
© 2015 Microsoft
|
global_05_local_5_shard_00000035_processed.jsonl/33504
|
An edit from a photoshoot photographed by Nick Sakowski with model Kristina O'Brien.
Filmed and Edited by Brad Shutack.
Filmed with Canon Vixia HV30.
Edited with Final Cut Pro.
Music: When I Was A Young Girl (VV Mix) by Feist.
Loading more stuff…
Loading videos…
|
global_05_local_5_shard_00000035_processed.jsonl/33508
|
The most frequent data maintenance calls we receive often follow an employee's exit from the organization. When the only person in your organization who knows how to maintain your cadastral fabric leaves - what do you do next?
GIS process knowledge often disappears when employees leave or retire. But when your organization is responsible for maintaining critical data - can you really afford for that knowledge to walk out the door with them?
Would you like to streamline GIS editing tasks for all users so they spend less time searching for a button and more time editing?
Learn the basics and advanced concepts of documenting GIS processes and making editing tasks more efficient with Task Assistant Manager. TAM is used to create step-by-step guides that streamline productivity by organizing editing tasks into an interactive window within ArcMap.
In the webinar we will:
• introduce core concepts of Task Assistant Manager
• demonstrate simple GIS editing processes with TAM workflows
• demonstrate the configuration of TAM workflows
• discuss advanced design concepts
Loading more stuff…
Loading videos…
|
global_05_local_5_shard_00000035_processed.jsonl/33519
|
Translation(s): none
This page will be used for user documentation.
Diaspora Installer Package
This will install gems via This is a short term solution until we complete the diaspora package.
Enable diaspora jessie repo
Import archive signing key
The archive is signed with Praveen's OpenPGP key:
2A79 74AE 2FC1 52D7 7867 DA4A CE1F 9C67 4512 C22A
Import the corresponding key to your system:
# gpg --recv-keys --keyserver CE1F9C674512C22A
# gpg --export --armor CE1F9C674512C22A | apt-key add -
If you have difficulty getting the key via keyserver, you can get it via wget
# wget
# apt-key add praveen.key.asc
Update your repository list
Once you import the gpg key, add the corresponding repository to sources.list and update the packages list:
# apt-get install apt-transport-https ca-certificates
# echo deb jessie main contrib >>/etc/apt/sources.list
# apt-get update
then install diaspora-installer
# apt-get install diaspora-installer
We hope to be able to provide diaspora-installer via jessie-backports when the new version clears NEW and migrates to testing.
If you have contrib section in your sources list, you can just run
# apt-get install diaspora-installer
The source code of diaspora-installer package could be found here.
Diaspora Package Testing
/!\ This is very early version of the diaspora package and not recommended for production yet.
Setup Debian Unstable environment
You have to setup a Debian Unstable system (you could setup it as a virtual machine if you want). You'll have to install Debian Testing first from and then upgrade to unstable.
You can also use pbuilder to setup a Debian Unstable environment
# pbuilder create
# pbuilder login
Enable diaspora unreleased repo and install diaspora
Enable diaspora unreleased repo
then install diaspora
# apt-get remove jbuilder
# apt-get install ruby-eco-source diaspora
This will create necessary database initialization and configuration using postgresql.
Re installing the package
If you want to reinstall the package, you have to purge, drop the database and remove the dbconfig-common configuration for diaspora:
# apt-get purge diaspora-common
# rm /etc/dbconfig-common/diaspora*
# rm -rf /etc/diaspora*
# rm /etc/nginx/sites-available/
# rm /etc/nginx/sites-enabled/
# sudo -u postgres dropdb diaspora_production
# rm /var/cache/apt/archives/diaspora*
There is more work to do.
1. compass has an unnecessary dependency on rb-fsevent
1. Get packages in NEW to archive. Send reminders to ftp masters.
2. Test diaspora installer package in jessie
3. Create a tracker like gnome status or update current progressbar to show out dated or newer versions in debian.
4. Handle diaspora version updates (migrations, config file etc)
Policy for dependency updates
Help keep the gem versions in sync. If deb version of a library is older than required by diaspora (run 'bundle install --local' on a develop branch checkout of diaspora upstream), update the deb version. If debian already has a new version of a library, update the corresponding gem version in diaspora.
1. tiny version change, patch gemfile
2. minor version change, test compatibility
3. major version change, test compatibility and embed gem if needed
Coordinate with upstream for major version updates.
You can find the packaging work at
See below for the team effort to package the dependencies of Diaspora and Diaspora itself for Debian.
Diaspora packaging
Enabling Chat
|
global_05_local_5_shard_00000035_processed.jsonl/33520
|
Hints for building GNU R packages
This page assembles some hints about GNU R packages.
Packaging template
Usually packaging GNU R code is very simple when using r-base-dev. A typical debian/control file looks like this:
Source: r-<repository>-<name>
Maintainer: Packaging team <[email protected]>
Uploaders: uploader <[email protected]>
Section: gnu-r
Priority: optional
Build-Depends: debhelper (>= 9),
<more r-* packages>
Standards-Version: 3.9.4
Vcs-Browser: http://anonscm.debian.org/viewvc/<team-dir>
Vcs-Svn: svn://anonscm.debian.org/<team-dir>
Homepage: http://cran.org/<location-on-cran>
Package: r-<repository>-<name>
Architecture: all
Depends: ${R:Depends},
<more r-* packages>
Description: GNU R package ...
long description
A typical debian/rules file looks like this:
#!/usr/bin/make -f
include /usr/share/R/debian/r-cran.mk
In both cases above usually repository=cran which is the default in debian/rules (so this line is not needed). You might like to set it to bioc for BioConductor packages.
Feel free to check out a rich set of examples for instance in the repository of the SVN repository of Debian Med team.
Specifics of GNU R packages
RData files (*.rda) in source packages
It seems to be a frequently discussed topic between R package maintainers and ftpmaster that several R packages are containing RData files which somehow are looking like binary files without source for people not familiar with R. However, for people who are working with R this is a non-issue because these so called serialized R objects can be input and manipulated in R by humans, I guess in the same way that png files can be edited using image manipulation programs.
There is some decision on R datasets from ftpmaster that adds some requirements the maintainer needs to check in case the upstream source contains RDate files.
Relevant hint: Since GNU R upstream sources are usually quite good documented in very many cases the according RData files are documented inside the docs. It is a very good idea to grep for the file name of the files and check the according hits whether all questions you need to answer are just answered there.
Usage of the ${R:Depends} variable
In 659163 the ${R:Depends} variable was used to simplify the versioned dependency in R packages. It seems that the current implementation which contains a hardcoded dependency to the version of the r-base-dev package:
dpkg-query -W -f='$${Version}' r-base-dev
under some circumstances creates to strict dependencies which in turn requires a rebuild of packages that could be avoided if the variable would simply regard an R API version like it was originally suggested:
R --version | head -n1 | perl -ne 'print / +([0-9]\.[0-9]+\.[0-9])/'
|
global_05_local_5_shard_00000035_processed.jsonl/33544
|
Pizza Hut Launches Evangelion Movie Campaign in Japan
posted on 2007-09-06 13:24 EDT
Exclusive pizza boxes, computer wallpaper, 1/1 Rei stand-ups given away
The campaign runs from September 6 to October 17. Pizza Hut previously sponsored Sunrise's Code Geass: Lelouch of the Rebellion military robot anime series with in-animation product placement, and the current Evangelion movie also credits Pizza Hut for promotional consideration.
Source: Saishin Anime Jōhō
Image © Khara, Gainax
discuss this in the forum (23 posts) |
bookmark/share with:
News homepage / archives
Around The Web
|
global_05_local_5_shard_00000035_processed.jsonl/33564
|
Uncanny X-Men: First Class #2
Nightcrawler thought he'd found sanctuary in Attilan but now he's transgressed their most sacred law! Kurt stands trial before an angry mob, with Black Bolt the ultimate judge of his fate -- and if the verdict is guilty, he's one dead mutant!
Customer Rating
Average Rating (10):
Written by
Scott Gray
Art by
Roger Cruz
Cover by
Roger Cruz
Story Arc
Uncanny X-Men: First Class - Hated and Feared
About Book
Page Count
24 Pages
Print Release Date
August 12 2009
Digital Release Date
June 1 2011
Age Rating
12+ Only
2011 Marvel Characters, Inc.
|
global_05_local_5_shard_00000035_processed.jsonl/33567
|
There is one summary. Bill summaries are authored by CRS.
Shown Here:
Introduced in House (01/06/2009)
Returning Government to the American People Act - Declares that: (1) the Bush Administration should not rush into effect major new controversial regulations in its closing days; (2) the incoming Administration, working with the Congress, should review and, if appropriate, revise or reject such regulations; and (3) Congress should enact and the President should sign legislation necessary to ensure the new Administration has that opportunity.
|
global_05_local_5_shard_00000035_processed.jsonl/33572
|
UT Computer Science Unveils Cognitive Computing Course Based on IBM Watson in Fall 2014
IBM Watson on Jeopardy
UT Computer Science is partnering with IBM to launch a new cognitive computing course that gives students unprecedented access to one of IBM’s most prized innovations: Watson.
IBM to collaborate with universities on Watson's QA tech
IBM and eight universities from around the world will collaborate on developing the company's Watson supercomputer and the question-answering technology behind it. The University of Texas at Austin Department of Computer Science which will collaborate on automated reasoning and common sense.
Subscribe to RSS - IBM
|
global_05_local_5_shard_00000035_processed.jsonl/33579
|
Having Drupal Show Headings
I'm brand new to Drupal, and nobody answered this question yesterday so I need to re-post. How do you get headings and subheadings to appear in a Drupal document? If I mark a document up with tags h1 through h6, Drupal strips out these tags when sending the document to a web browser. If XHTML tags h1 through h6 are forbidden, what can I do in a story or blog entry to create headings and subheadings instead?
Is it possible to turn off clean urls for searches?
Hi there,
I am using Mint to analyse my stats, and one of the peppers they have monitors the search terms that people use on the site. I know that Drupal has built in stats for this, however I would like them all in one place.
To track searches, Mint requires the search URL to be in the form of example.com/search.php?q=Mint, where the search.php and q= are configurable. What I want to do is to turn off the clean URL generation for searches only, so that I can provide the right terms to Mint to track the searches.
Does anyone know how I can do this for Drupal 6.x?
Flash node permissions
Flash node provides the following user settings to control what roles are and are not able to do:
Flash node version 5
• administer flash node - access the flash node configuration pages to set module defaults
• create flash nodes - create new flash node content
• edit own flash nodes - edit user's own flash node content
• hide advanced options - do not show the Advanced flash node settings section on the node editing form (prevents changes to substitution text, flashvars and base parameter)
• hide basic options - do not show the Basic flash node settings section on the node editing form (prevents changes to the display mode, width and height)
• hide display options - lets the user access the Basic flash node settings section on the node editing form to adjust the height and width, but prevents changes to the display mode
• import flash - allows the user to import multiple files - the author of imported files will be the importing user
Flash node version 6
The main change is that edit and delete permissions are refined, in line with other content types. So in addition to the permissions above the following are also defined...
• delete any flash node - delete flash nodes created by any user
Theming flash node
Flash node uses two theme functions to produce output.
theme_flashnode($flashnode, $teaser = FALSE, $options = array()) is used to process a flash node object and prepare for it rendering to HTML. Within flash node this function does nothing more than check the requested size does not exceed the configured limits, and scales down the content as required. You could adapt this function to, for example, scale the teaser content to a fraction of the native size.
theme_flashnode_markup($flashnode, $options = array()) is the function that takes a formatted flash node object and returns mark up, either by using SWF Tools if it is available, or by falling back to direct embedding. You could over-ride this theme function if you wanted to use customised flash rendering code.
The functions are split in this way to try and make it simple to over-ride just the portion you want to modify. Assuming you generally wouldn't want to mess with the actual production of markup and only manipulate the sizing of flash content you can therefore over-ride theme_flashnode() and simply conclude your custom themer with a call to theme_flashnode_markup() when you're ready.
Note that the introduction of themeable functions to flash node is new so I am open to suggestions for improvement!
Putting flash in a block
The easiest way to do this is to configure an input format that can use the flash node input filter. Then you create a flash node to hold the flash content, and then you can create a block that uses a flash node macro to bring the content across. You can use the macro to resize the content to suit the site layout.
If you don't want the flash content to be viewable as a node in its own right simply set the status of the "parent" or "placeholder" node to unpublished. You can still refer to the node from the macro, but you can't view it.
Javascript substitution text
A new installation of flash node uses direct embedding to output the flash content, using the <object> and <embed> tags. That's fine for basic use but javascript methods have a number of advantages. In particular users who do not have flash and javascript will see some meaningful content in place of the animation, while a search engine such as Google will index the substitution content. To use javascript embedding you must download and install SWF Tools.
Subscribe with RSS Subscribe to RSS - Drupal 6.x
|
global_05_local_5_shard_00000035_processed.jsonl/33622
|
Reviews for Lie
oranfly chapter 1 . 2/14/2009
This had perfect amounts of angst and fluff. Definitely a joy to read. I hope you do post more fics, cos I know I'll be reading them :D
dream-of-belief chapter 1 . 2/4/2009
Great story! And I absolutely adore David Cook (which is the main reason I read this fic; I'm glad I did)!
JT4Life chapter 1 . 1/29/2009
Yes, yes, more fics! I really do love your writing, it's always seamless and Peter and Liv are just perfect. Man, if *only* TPTB would come by the site every once in a while! any of your fics would make AMAZING, SQUEFUL Bolivia moments!
oh yeah, that whole thing with Rachel hitting on peter really p*ssed me off too. they gotta fix that!
can't wait for more, keep up the great work :D
Xeen Cyr chapter 1 . 1/29/2009
great scene indeed.
liliez chapter 1 . 1/29/2009
awesome fic, looking forward to reading more of your work!
noturgurl chapter 1 . 1/28/2009
I DEFINITELY enjoyed ;) I'm all for some fluff after this nice little angsty fic ;)
wjobsessed chapter 1 . 1/28/2009
I thought this was good.
There's certainly potential for her to break down at any time.
I wonder if we'll get to see it...
My fav:
"She was ten times a better person than he knew he was."
Please go write your muse's fluff :)
Miss Mila chapter 1 . 1/28/2009
I *loved* it!
Great fic. She needed to cry, lol. And he needed to be there for her.
The episode was AMAZING. I love how cute he was with Ella. And him drunk(ish), of course. And I know, Rachel is amazing and all, but if she messes with Peter...she'll have to go, lol.
Great job,
Ocein chapter 1 . 1/28/2009
So, this is how last night's episode SHOULD have ended! She's going to break sometime gosh darnit. And yes, I totally saw Rachel flirting but, thankfully, Peter just awkwardly smiling. She's bound to find out Peter has a thing for Olivia :)
Love your fics!
ahealthyaddiction chapter 1 . 1/28/2009
You are SUCH a good writer... I love the scenes you create. PLEASE write a fluff fic, I would absolutely love to read what you come up with... a kiss, at the very least! (the VERY least.) )
|
global_05_local_5_shard_00000035_processed.jsonl/33628
|
Disclaimer: I do not own any of the digimon characters. I do however own Riley, Evan, Alex, Sam, and Amber who might appear in some of my other fics. : Hugs self: I am so proud of myself.
Warnings: Strong (when I say strong I mean STRONG) Language.
Summary: Sora reflects on a not so average day with a surprising ending. Mira. Sora's POV
What It's Like
Do you know what its like to have your world turned upside down momentarily and spin almost completely out of control. Do you know what its like to get back to normal, only to have it slow down to an almost complete stop. So slow that your heartbeats are minutes apart, to be the center of someone else's world. I do.
Earlier that day
"Come on, come on" I muttered under my breath as I searched my book bag. Ms.Tucker stood over me with a disappointed look on her face. I smiled at her nervously before continuing my search. I flipped through my math textbook only to find my science homework. "Must not lose that," I muttered to myself as I stuffed the work into my book bag and slammed my math book shut.
After a couple more minutes of hopeless searching I gave up and said, "I'm sorry Ms. Tucker. I did the assignment but I must have forgotten it at home." She looked at me and shook her head. "I'm very disappointed in you Sora. I would expect this from Taichi but not from you."
"Yeah Sora, she would expect this from me but not from…hey. Whats that suppose to mean" Tai said.
Everyone started laughing and Matt just shook his head. "Alright class, open your books to page 681. We are starting a new section today. Adding Rational Expressions with Like Denominators." Everyone groaned. "Sora you may take your seat now." "Thank you" I said before grabbing my stuff and taking my seat between Tai and Matt. As I sat down I couldn't suppress the urge to yawn and so I did.
At that moment Matt and Tai leaned toward me and started whispering. "My my miss Takenouchi, arriving to class late, having no homework to turn in, and letting loose a yawn big enough to rival lion's. I must say you are not that far from becoming Tai" Matt said. "I resent that" Tai shot back at him before turning to me and saying "Matt's right Sora. Whats the deal?" "Nothing. I was just up late last night" I replied. I put my hands over my head and arched my back, which popped my spine in a few different places and yawned. 'That felt good' I thought to myself. "That still doesn't explain why you have no homework to turn in."
"Care to explain?" Tai finished for him. I sighed. There was no point in lying because I'm a bad liar and they would see right through it. "After I was done with all of my homework, I decided to clean my book bag and while I was at it clean my room also. So it was a real mess." They both looked at me with an expression that said "…annnnd…" "And… I got distracted." "That's the best you can do, 'I got distracted'" Tai mocked.
"At least tell us what the distraction was," said Matt. I sighed out of frustration. "You know, we are disturbing the class." I said hoping for an escape. "Look around you Sora. There is no class to disturb." Matt said. I looked around and truth be told, there was no class. The half that wasn't sleeping was starring into deep space.
"I got a phone call." I said starring across the room blankly. "Ah, now we're getting somewhere." Tai said. "From who?" asked Matt. "A friend" I said. "Ah." Matt said. "Mimi." They said in unison before turning their attention to the teacher. I looked at Matt then Tai with a surprised look on my face. 'How did they know that?'
Next Period
"Ms. Smith I swear I have it. I know I have it. I just had it last period." I said to my science teacher as I searched my book bag once again trying to find my homework. "Please be it, please be it." I chanted to myself as I came across some work. It turned out to be my math homework so I just gave up right then and there.
"Sora, its okay, you can always turn it in Monday if you can't find it. Okay." "Thank you I said before taking my seat next to one of my best friends, Riley. As soon as I sat down I sighed tiredly and put my head on the desk. "Hey, would you cover for me?" I asked as I yawned again. I was in desperate need of some sleep.
"Of course. Besides we're just watching a movie so you don't have to worry." "Thanks" I said before closing my eyes. "No problem." I heard her say. What I didn't see was the knowing smile she had on her face.
During lunch Riley, my other two friends Sam and Amber, and I sat in the lunchroom. We were waiting for the last member of our group…Evan.
Amber turned to Sam, "Are you eating?" "No." Sam said.
"Why not?"
"Because I don't want to. Is that a problem?"
"No but you don't have to be so mean about it."
"I wouldn't be so mean, if you weren't always trying to be my mother."
"Well I wouldn't always try to be your mother if you weren't always acting like a baby"
They continued bickering before Riley said, "Do you think you guys can try to rip out each others throats a little quieter." "Can't you see me and my sister trying to have an argument here?" Sam asked with a smile. Riley rolled her eyes and shook her head. "Hey Sora, earth to Sora, whats up with you" said Amber waving her hand in front of my face.
"Huh, what" I said coming out of my daydream. "Why are you so spaced out?" Amber repeated.
"I wasn't spaced out."
"Yes you were. I was watching you."
"I thought you were fighting with your sister." I said remembering the so-called "argument."
"Hey, I can multitask" she retaliated with a smirk. "Hey, there's Evan." I say pointing at the lunchroom doors. They all turned to look in the direction I was pointing so they didn't see me sigh with relief, except Riley of course. She winked at me before saying "Yea, and her boyfriend."
"Don't you mean boy toy?" Sam joked. "What is his name again? Taylor…Tyler…" Amber asked. "I thought it was Dylan." Sam said just before they arrived at the table.
"Hey Evan. Hey Alex." I said.
"Was up." Riley said.
"Hi Evan, Alex what is up." Sam said.
"Yea Alex, how's it going." Amber chipped in.
Alex must have noticed that their smiles were a little too toothy because he asked, "They forgot my name again, didn't they?"
"No." Sam and Amber said in unison.
"Yes." Riley and I retorted.
"Traitors." "Sell outs." Sam and Amber shot back at us. They would have continued if Alex hadn't said, "You guys can never remember my name." They both looked at him with a shocked expression.
"That hurts Justin! How could you say such a thing! We've always known your name was Michael." Sam said looking very offended.
"Yea, Bryan. We would never forget that your name is Danny." Amber said looking equally offended.
"Its Alex" he grumbled. "Don't worry babe. They're just messing with you." Evan said, speaking for the first time since they got there. Sam and Amber grinned at him sweetly. "So was up guys" she continued. "Nothing. We're just trying to get into Sora's head…again" Amber answered. "Cool, did I miss anything?' Evan asked.
"Nope. You arrived just in time." Sam answered. Alex looked at his watch and grimaced. "Sorry babe but I have to go." "Yeah, you should go. I don't you to be late for your interview." Evan said with a slight pout. "Don't worry. I'll see you later this afternoon, okay?" "Okay." She said before kissing him.
When they pulled apart Alex snapped his fingers as if remembering something. "Oh and Sora would you…" Don't worry, I'll keep her out of trouble." I said already knowing what he was going to ask. "Thanks." He said.
"You know, I don't appreciate the fact that you think I'm going to get into some kind of trouble." "Uh huh." Alex said before kissing her briefly on the lips and saying "I'll see you later." Evan pouted as if she were in first grade and was denied something. "Bye ladies." He said walking off.
"Bye Kevin." Sam shouted after him.
"See ya Steve." Amber said
He turned around and while walking backwards he shouted "Its Alex." He smiled and then started jogging off. "Okay, back to Sora. What's wrong with you?" Evan asked. "Nothings wrong. I fell asleep last period and I was still a little dazed." I lied praying they believed me. "Due to the fact that you are a terrible liar we are going to let that one slide. What we are more interested in is why you were sleeping during your last period?" Evan said as she verbalized everyone's thought except for Riley's.
"I was up really late last night." "How late exactly?" she continued with her interrogation. "Until about 4:00 this morning." "Ah" she said and I couldn't help but notice Matt had said the same thing, in the same tone earlier. Before I could say anything they all said "Mimi" in unison before getting up from the table.
I just sat there with a stunned look on my face. "How did you guys know that?" I asked getting up from the table. They all smiled and walked away "No, seriously. How did you guys know?" I said as jogged to catch up to them.
The Library
We all sat at the table that was tucked away in the back corner of the library. Riley had to pull up an extra chair and now she was straddling it at the edge of our table, her blazer was hanging on the arm of her chair. We all slouched over our cards and watched each other but mostly Evan. We were playing blackjack and she always won.
I was the dealer. I looked at Riley who clenched her fist. That meant she had ten. Then she put her palm flat down on the table and what would seem like absentmindedly tapping her finger against the table. She tapped eight times. She had eighteen. I nodded slightly.
I looked at Sam who coughed. Another ten. Then she brushed her nose with her thumb five times. Fifteen. Amber, who used her sister's number as an base number had her elbow on the table and held her head in her hand. She tapped her temple once with her finger. Sixteen. We looked at Evan who had a confident look on her face.
We decided not to take any risks. I made eye contact with Riley as I slipped a card out of my hand and onto the top of the deck. I removed my hand and Riley immediately said "Hit me." With a straight face I handed her my card, which was a three. Riley smiled and looked at Evan who was smiling confidently at her.
"Are we ready?" I ask. They all nodded with large grins on their faces. Riley, Sam, Amber, and I were all grinning for the same reason though. "Lets see them." "Fifteen." Sam said showing her cards.
"Sixteen." Amber said following Sam's example.
"Same." I say.
"Nineteen." Evan said triumphantly throwing down her cards. "Beat that." Evan said to Riley.
Riley smiled. "Twenty-one." she said showing each card.
I smiled as she put down my three. If I had kept it I would have tied with Evan, 'but we're not trying to tie, we're trying to win' I thought to myself as I watched Evan. Her jaw was slack and she was examining Riley's cards over and over again.
"Dammit." Evan muttered. "That's the eighth time in a row. I have never had such rotten luck." I looked at her sympathetically. Sure we were cheating and taking all of her money but she always wins at this game and takes all our money. It's just a little "friendly competition" but who are we kidding. We are sore losers when it comes to losing money to our best friend.
After lunch we'll split the money amongst each other. "Deal again." Evan said with a determined look on her face, "Are you sure?" Riley asked with an arched eyebrow. "Yes" Evan replied. Are you positive?" Amber asked. "Yes." "Are you positively sure" Sam chipped in with a playful grin. "Just deal the damn cards." Evan replied with a smile.
"Sorry. I couldn't help myself. Its in my nature." Sam said with a goofy grin. "Which one?" Amber simply said. "That was just so funny. Eventually I'll get to the part where I laugh." Sam said with a fake smile. "Now children, play nice." Riley said with a half smile. I shook my head and dealt the cards. Before anyone looked at their cards, we all threw 1 dollar towards the center of the table. Everyone picked up their cards and the game begun.
After a series of "hit me's" I looked up at Riley, Amber, and Sam to get their numbers. Riley had a 17. Amber had already burst so it was between Sam and me. I had a King, a six, and an Ace. Sam coughed twice. We locked gazes and just as I was putting my Ace on top of the deck, Evan looked up at Sam and said "Hey Sam, are you ok? You been coughing ever…since…"
Evan followed Sam's gaze to where I had just moved my hand from the deck. She looked up at me then back at Sam. I tried to warn to Sam that Evan was catching on and not to ask for a hit but she didn't notice. She said, "Hit me." Evan furrowed her eyebrows and looked back at me. She had her mouth open as if she wanted to say something but had to think about it. I didn't move.
Sam said hit me again and I reluctantly reached for the Ace. Before I could grab it though, Evan picked it up and looked at it. "Hey, that's mine." Sam said. Everyone's eyes were on Evan. She grabbed the cards out of Sam's hands and quickly looked at them before looking back at me. "21" she said before realization dawned on her.
Before she could say anything I said, "Evan its not what it looks like." A predatory grin spread across her lips before she said "Nice try." Now we were in trouble. It's not the loud angry Evan that you should worry about. It's the calm quiet Evan that you have to watch out for, due to the fact that Evan is never quiet and calm at the same time.
"I knew there was something wrong when I kept loosing. Now I know." Evan said still smiling. " We don't know what you're talking about." Sam said as innocently as she could. "Bullshit." Evan said simply. "You guys were playing me from the start. And here I thought I was loosing my touch." She said, her grin getting wider. "Okay so maybe we cheated this once but we were planning to give you back your money as soon as we stopped playing." Amber said.
"Bullshit!!" Evan said louder standing up with such force that it knocked her chair backward. Now with an outburst like that you would expect her to be pissed but she was laughing and so were we. We didn't realize that the librarian had heard her though. "I can't believe this. My own friends cheating me out of my own money." She said picking up her chair.
She sat and looked at Riley and said " and you with your holier than thou façade. You, who's supposed to be the mature one, I can't believe you." " Sorry Evan but I have to admit that you are almost damn near unbeatable and I couldn't pass up this opportunity to knock you off your pedestal." Riley said with a simple smile.
"My own friends betraying me." Evan said with mock sadness. By this time the librarian had made her way over to our table. "Could you please keep it down, this is a library." She snapped. Before I could offer up an apology Evan (out of instinct mind you) said, "I have a better idea, why don't you fuck of" without turning to look at the librarian.
Now this may seem strange to any onlooker but Evan could have given a damn weather it was a teacher, librarian, or student. But Evan was already on thin ice and if she had truly known that the librarian was behind her she wouldn't have said anything. "Excuse me?" the librarian asked. This time Evan turned around and was confronted with a very angry librarian. "Awww shit." Evan simply said.
"I think you should come with me young lady and see what the principle has to say about your idea," the librarian hissed while hauling Evan out of her seat. "Wait, you can't." I said suddenly. I had no idea what I was saying but I did know that Evan would never apologize or deny what she said cause that's how she felt. Her stubbornness could result in her getting suspended… again and I couldn't let that happen.
"She can't?" everyone including Evan asked. The librarian narrowed her eyes at me and said "And why not please, prey tell." Everyone looked at me and Evan smirked at me. I sighed and looked the librarian in the eyes and said, "You can't take her away because it's not her fault for saying things like that." Evan's smirk grew wider.
"Then please explain to me who's fault it is." Said the librarian obviously not believing me. "Evan can't help it because…she has turret syndrome!" I said as if I had figured out the cure for cancer. Riley looked at me as if I had grown a third eye and two pairs of wings out of my ears.
Evan winked at me and tugged her arm from the librarian and said "yea so get your fucking hands off of me." Oh great. I just game Evan the only excuse she needed to say whatever she wanted to. "Oh really." The librarian said looking suspicious. I had no choice but to follow through with my lie.
Evan sat down and I said, "Yes it's true. She has a mild case of turret syndrome, so sometimes she just blurts things out that she really shouldn't." "Well if that's the case then why am I just finding out about this?" the librarian asked loosing ground. She didn't want to be wrong about her accusation of this being a lie because she could get fired for discriminating against one of the students.
"Because its none of your fucking business." Evan answered. At this point the librarian looked as if she were about to blow her top. "She's a little touchy about the subject so it's on a need to know basis." I said quickly. By now, both Sam and Amber were about to explode with laughter. Riley threw them a warning glance. They settled down a little.
"Is there anything else you would like to know?" I asked as innocently as I could. She obviously believed me because she said, "Well can you keep it down?" Evan looked me right in the eyes.
I shook my head slightly as I saw the mischief blazing in her eyes. She winked, turned to the librarian, and said "Well excuse the fuck out of me for not being able to control this goddamned problem. I promise that the next time I get the urge to say fuck I will step outside. Is that okay with you."
The librarian was so taken aback by this that she just walked away. Evan turned back to face us. Sam and Amber had to bite into their bottom lips in order to not laugh. If they were biting any harder they would have bitten through their lips. Riley was busy trying to get them to not laugh.
"Don't laugh. Whatever you do, don't laugh. She said
"To funny." Sam said as best as she could.
"Must laugh." Amber said, finishing Sam's sentence.
Riley looked towards the check out desk to see the librarian watching us. She turned back to the twins and said, "Hold it. Think of something tragic. Earthquake, Tornado, Hurricane."
"Not" said Sam.
"Working" finished Amber.
I just sat there taking in what had just happened. "Sora, we should get out of here before these two loose it." Riley said indicating to Sam and Amber. I nodded and we all started towards the door.
Sam and Amber were leading, Evan was in the middle and Riley and I brought up the rear. As we were walking pass the check out desk, Evan muttered, "Fat ass bitch" loud enough for the librarian to here. Riley started to push Evan out the door while I offered the librarian an apologetic shrug and made my way towards the door.
Once outside Sam and Amber practically exploded with laughter. "Thank you, thank you. It was my pleasure." Evan said as their laughter began to die down. "Am I going to hell for that?" I asked no one in particular.
"Relax Sora. You did it to save me. That's got to count as a good deed." Evan said as she wrapped her arm around my shoulders. That made me feel a little better until Amber said "Well technically, we save you so much that I don't think its considered a good deed anymore." I groaned loudly.
"I know something that will cheer you up." Evan said trying her best to make it up to me. When she was sure that I was watching her she unbuttoned her blazer and slid it off her shoulders. Then she started to loosen up her tie. "What are you doing?" Riley asked with an arched eyebrow. "Yeah, I don't think a striptease is going to make Sora feel any better." Sam said.
When Evan was done, the first button of her shirt was undone, her tie was loose, and she was holding her blazer over her shoulder. "I, my good friends, am sporting the style that Mimi is wearing her uniform in." Evan said with a lopsided smile. "How do you know that Mimi is wearing her uniform like that?" I asked.
"Because she's headed this way." Riley answered looking pass me. I turned around to see Mimi walking towards us. Evan was right. Mimi did have her first button undone, tie loose, and holding her blazer over her shoulder. "Hey guys," she said as she walked up to us. Everyone said hey except Evan, who said, "Sup Mimi."
"Nothing much. I heard that you have mild turret syndrome." She answered. "Damn, I didn't know that news traveled that fast in this school." Evan said with a frown.
"It doesn't. I was in the library when you had your little performance. It was very convincing except for the fact that someone with turret syndrome blurts random obscenities and not the ones they want to say." Mimi said matter of factly.
"Yeah, but I think Mrs. Stokes was so shocked, she didn't even realize that." Sam said. "Hey, that's a good thing." Evan reminded her. "So Mimi, why is it that you're dressed like that?" Riley asked. "A better question is why you haven't been penalized for it." Amber added.
"My last class was like the Sahara desert so our teacher told us that it was ok if we wanted to loosen up. I haven't cooled down just yet." She said with a sly smiled. "Hey Sora, I wanted to know if you wanted to come over to my house today. My parents are going to a dinner party and they told me that you could come over if you wanted to."
"Sure, I would love to." "Great. I'll meet you after school ok." Mimi said as she started walking away. "Ok, see you then." I said to her. "So, you're going to tell her that you that you like her, right." Evan said seriously as she straightened her tie.
"Maybe. I'm not sure if…wait a minute, how did…" I started to ask but they started walking away from me.
"Hey, there's principle Penn." Amber said as we walked into the courtyard. "So what. Fuck him." Evan said nonchalantly as she observed her nails. As soon as she said that, it was as if the principle heard her because he started to make his way towards up. "Ah fuck." Evan said when she saw him approaching us.
Just as Evan was about to say something else Riley elbowed her in the ribs. Evan glared at her but kept quiet. "Good afternoon ladies. How is everyone today?" Principle Penn asked. Everyone looked at me to answer him including the principle. "We're doing fine." I said, trying to figure out why I had to tell him.
"That's good. Sora, I've been watching your games lately. Keep up the good work and you may just become MVP." He said. "Thank you sir." "Sora, that's awesome." Sam said. "Yeah. I hope you make it." Amber added. Riley nodded and Evan muttered something about it being a bribe.
He didn't hear her though. Instead he looked at the twins and said "Ah, the Lindsey twins. Amber and Sam, right?" "I'm Sam. You can tell because my eyes are a really deep blood red. " "And I'm Amber. My eyes are more of a chocolate." They said. "Oh yes, I can see it now." He said as he observed their eyes.
"Their eyes are not the only difference between them you moron. If you just took the time to care, you would notice that." Evan muttered. "Could you repeat that ms. Chambers. I'm afraid I didn't hear you." He said to Evan. "I said that if it weren't for their eyes you would never be able to tell them apart." Evan said smoothly as she went back to observing her nails.
She smiled up at him. "I see. And how have you been doing ms. Chambers?" He said not really believing her. "Well you know me." Evan said with a fake smile. "I do ms. Chambers. That is why I am asking." "Son of…" Evan started before Riley jumped in and said "Her mother's uncle. The son of her mother's uncle is helping her with her attitude problem."
Evan glared at Riley. "Yes well that is very good. Have you thought about my offer to participate in the Brain Bowl? You are a very brilliant girl ms. MaCoy." He said directing his question to Riley. "I've thought about it but no thanks. That's not for me." Riley said with a kind smile. "Well, if you ever change your mind, the offer still stands. You ladies enjoy the rest of your lunch and have a nice weekend." He said as he started to walk away.
"You too" we all said except for Evan who just snorted and crossed her arms over her chest defiantly. "I don't have an attitude problem. Some people just don't like the way I react to certain things." Evan said once the principle was out of sight. "Whatever." Riley said.
When the bell rang we all made promises to call each other and headed to our last period of the day. Riley and Evan had English 3 honors, Amber had Spanish 2, Sam had drivers' education, and I had…
As I made my way to the gym I started to think about what Evan asked. Could I tell Mimi that I liked her as more than a friend? What would she say? What would she think? Would she hate me? I was so lost in my thoughts that I didn't notice one of my classmates jog up to me.
"Hey Sora. How's it going?" he asked, bringing me out of my thoughts. "Oh, hey Shane. It's going okay. How about you?" "It's going great." There was an awkward silence so I said. "Is there something you wanted to tell me?" "Oh right. Um…you know Mimi Tachikawa right." "Uh-huh." "Well I wanted to know if she was going out with anyone, or if she had a boyfriend. Do you know?"
At first I was a little upset but I smiled, as I said, "No, not that I know of." "That's great. Thanks Sora" he said before jogging away. Sure I had just practically given Mimi up to one of the nicest guys in school but what chance did I have? I rather Mimi be happy with Shane than alone because of my own selfish feelings. With that final resolution I walked into the girls locker room.
After I dressed out I went out onto the soccer field and sat at the top of the bleachers. Tai and the others were playing a quick round of HORSE. It wasn't long before Tai noticed me sitting alone, staring into space. "Hey Sora" he shouted up at me. I looked down at him.
"What are you doing up there?" I looked at him as if what I was doing wasn't obvious. He rolled his eyes. "I know what you're doing, but why are you doing it here. Now is not the best time to space out." "Oh?" I said with an arched eyebrow.
"Don't you know that physical education is the best acedemic subject in the entire world!? Not only do you get a grade to hone your athletic skills and sharpen your mind. It also gives one the opportunity to bond with nature and his fellow man… and woman." He added as a few girls looked at him expectantly. He grinned up me.
"What do you have to say to that?" I thought about it for a second before smiling at him and saying "If you wanted me to come down there and whip your butt, all you had to do was ask." He laughed. "As if you could. You'd have to catch me first." With that said I ran down the bleachers and soon we were playing soccer 3 on 3.
After P.E., I decided to take a quick shower before meeting up with Mimi. I had worked up a good sweat while playing with Tai. He was fast, but I was faster. Every time I passed him and scored he would blame it on the sun being in his eyes, or sneaker malfunctions.
We met up in front of the gym once school ended. The sky looked a little dark but I was in a good mood so I didn't worry too much. "Thanks Tai. It was a nice game. Too bad you lost." "You looked a little down earlier so I decided to let you win." "Sure you did." I said while rolling my eyes. He stuck his tongue out at me and the he smiled. "See you later, Sora." "Bye Tai." I said and started to make my way towards the front of the school.
When I arrived I was a little surprised to see Shane talking to Mimi. Then I smiled, remembering that Shane wanted to go out with her. Mimi was smiling and she looked absolutely beautiful. Pity the sun wasn't out. The sky was getting darker and it looked as if it were going to rain. I pouted a little, hoping that we would make it to Mimi's house before it came down.
"Sora!" I heard Mimi shout as she tried to get my attention. She waved me over. I smiled and made my way towards her. "Hey Shane." I said when he was walking past me. He had a slightly confused look on his face.
"Huh? Oh hey Sora." "So how did it go?" he thought about it for a moment before saying "I'm not sure…by the way, nice game today. I just might have to join your team next time."
He smiled kindly, and then started to walk away. "I'm so glad that you're coming over." Mimi said once I was standing in front of her. "Me too." I said and we started to walk towards her house.
Two blocks from Mimi's house, the rain started to come down…hard. As we started to run Mimi began to laugh. Time slowed as I watched her run. She looked over her shoulder at me and smiled.
She was so beautiful and she didn't have a care in the world. Time sped up again as she grabbed hold of my wrist. "Come on Sora." She said when her house came into view. By the time we got inside her house, we were completely drenched. "I'm going to put on a fire. I'm freezing." Mimi said with a shiver to emphasize her point.
She was right though. It was really cold in her house. "Okay. I'll call my mom and let her know where I am." Mimi nodded and made her way towards the living room. I called my mom and told her that I was going to spend the night at Mimi's and asked her to bring some of my things over later. She had no problem with me staying over and said that later in the evening she would bring my things. She also told me to tell Mimi hello for her.
"Hey Mimi, my mom…said…" I started as I passed Mimi's blazer on the floor. I walked into the living room and started to say, "Mimi, did you…" I stopped short as the air caught in my throat. Standing in front of the fireplace was a skirt less Mimi. She was only wearing her tie and white button down shirt. It barely concealed the red panties she was wearing.
She was also wearing a matching red bra. I knew this because soon her shirt and tie joined her skirt on the floor. "What did your mom say?" she asked as she looked up at me. All I could do was just stand there. "You're shivering! You must be freezing." Mimi said as she noticed that I was visibly shaking. She didn't know that it wasn't because I was cold.
"You should get out of those clothes before you catch a cold." She said approaching me. I finally found my voice and said. "No really, it's not that bad. Besides I don't have anything to wear" "Don't be silly. I have clothes that you can wear." By that time she was already in front of me. All I could do was nod as she unbuttoned my blazer.
She pushed it off of my shoulders and looked up at me. She leaned forward and whispered into my ear "Breathe." Only then I realized that I was holding my breath. I took a deep breath and sighed. She giggled a little and looked me in the eyes. Right then I truly believed that she could see into my soul. I believed that she could see how I felt about her.
Hey eyes were so deep that I would have drowned in them if it weren't for the fact that I could feel her loosening my tie and pulling it off. She never broke eye contact as she unbuttoned my shirt slowly, button after button. Once she had undone the last button, she moved her hands to my collarbone. The second her fingers touched my skin my eyes slid shut and I shuddered.
She slid her hands under the collar of my shirt and down my arms along with the shirt. It fell to the ground silently and pooled around my feet. I heard her move. I opened my eyes slightly to see her walk behind of me. She placed her hands at the top of my shoulders and slid her fingers down my back slowly.
They tripped over my bra strap and continued downwards to the top of my skirt. Her fingers unbuttoned it and slid the zipper down. It fell to the floor as silently as my shirt did. I now stood before her in nothing more than my black underwear. I waited for her next move.
Her right arm slid around my waist and her left hand hooked onto my left shoulder. I felt her hair brush against my back. Then I felt her cheek rest against the center of my back. She sighed letting her breath roll across my skin. I shuddered again and relished in the feeling of her body pressed against mine.
"Do you ever want to be someone else?" She asked suddenly in a quiet voice. I don't think she wanted me to answer because she said, "You know, like when you keep saying the same thing over and over again and no one understands a word that you're saying. But they pretend like they do with fake smiles and tell you that everything's all right.
They tell you obvious lies that make you sick. Lies that make you hate the world that you're stuck in. You hate this world so much that you feel on the edge of breaking down but you can't because there's no one there to save you. And knowing this makes you feel totally and completely lost.
That's what its like when you have friends like mine. I'm not talking about you, Tai, or any of the other digidestined. I'm talking about the friends you get when you're popular. I bet no one has ever lied straight to your face. I bet no one has ever lied to you period. With friends not worth having and parents who are barely around, it's hard to find a center. Have you ever been the center of someone's world Sora? Do you know what that feels like?"
"No" "You should because you're the center of my world, the center of my life. Whenever I feel like I am going to fall apart you always seem to be there. I wanted to tell you this last night but I just couldn't get it out. You mean so much to me. More than you know." She whispered that last part.
I unhooked her hand from my shoulder and turned to face her. Her right hand was still around my waist. I looked deep into her eyes. It was as if they were pleading for me to understand what she felt.
She didn't have to plead because I knew exactly what she felt. I felt the exact same thing. I leaned forward slowly and let my lips brush lightly against hers in a series of soft kisses. I pressed my lips against hers a little harder and let my tongue slide against her bottom lip.
She opened her mouth slightly and met my tongue with hers. Her lips were so soft and her tongue was sweet. Her mouth tasted of cherries. She wrapped her arms around my neck as mine wrapped around her waist.
She slid her fingers through my hair, and pulled my mouth closer. As our tongues slid against each other in a soft caress, I gently pulled her body against mine and heard her (as well as felt her) moan. It passed her lips and right into my mouth. It was an amazing sensation. All and all the kiss was perfect.
I woke up with my hand draped over her waist as she slept. I pulled her closer to me and was immediately consumed by her warmth. She snuggled closer and buried her head in my shoulder. I smiled. She was absolutely adorable.
Now despite what people may think, we did not have sex. When we got to the point where our bodies demanded oxygen, we pulled apart. We just stood there staring at each other as we filled our lungs with fresh air. She smiled and I smiled in return. Then she shivered a little and said that she was still a little cold. I agreed, so she got some blankets and set them in front of the fire. Once we were settled, we shared another kiss and then drifted off to sleep. So you see, no sex.
I smiled at the thought though. Before I could fully think about it I heard Mimi say, "What's so funny?" I hadn't even noticed that she had woken up. "Nothing. Just thinking." I said. "Do these happy thoughts have anything to do with yours truly?" "Maybe." She rolled her eyes. "Did you sleep okay?" I asked, changing the subject.
"More than okay. Thanks to you. Does this mean that we're going out?" "I guess it does." "Good." She held me tighter. "Shane asked me out today." "I saw. What did you say? He looked kind of confused." I said. I was a little surprised that she had brought that up but I wanted to know what happened none the less.
"I would have been confused too if I were in his position." She said with a sly smile. "Why? What did you tell him?" "Well he said that he'd heard that I wasn't seeing anyone and wanted to know if I wanted to go out with him. I told him that I was flattered that he wanted to go out with me but I wasn't interested.
I told him that he was kind and that I liked him but I didn't like like him. I told him that I would like to like like him but it wasn't likely. I told him that I like liked someone else. He told me that he understood even though he didn't and walked away." Her smile got wider. I just shook my head while she deemed herself clever. When I looked at her, she was staring at me. "So who is this other person that you "like like"?" She smiled a little. "That's for me to know and for you to kiss me." She said and so I did.
A/N: Well here it is. My second Mira. What did you think? Thank you to those who read/reviewed the first one. And for all those who thought there was going to be a lemon. I'm so sorry to disappoint you. But before you flame me and never read any of my work again, I want you to know that this story has one more chapter that includes a lemon. So just be patient, kay. I want to thank cab and anyone else who has helped me with this story. My next story will be another Mira so lookout for it as well as the next chap. to this story. Whichever one comes first. As for my OC's, if you want more info on them just let me know. Please review and thanks again.
|
global_05_local_5_shard_00000035_processed.jsonl/33629
|
Sons Over Lovers
She's not exactly known for being a loving sort of girl. She's spurned whatever affections her husband might have tried to work towards so many times that he's given up on the idea that love could ever pierce the hard shell of her exterior.
Still, everyone knows there's one thing, one person, she does love, and loves with her entire soul, and that's her son.
Romance has nothing to do with their marriage. The Emperor's father, the man that's she's now chained to, set it up shortly before he died.
"'There's a Skywalker legacy to carry on,'" the new Emperor had quoted after Vader's death in answer to her questions. "And that's why we're going to try and have a baby."
For Emperor Luke Skywalker's part there is no sentimentality involved, except for maybe towards his father, trying to carry on whatever the dead man may have wished. For Mara Jade Skywalker she can only hate him for everything he's done to her. He and his father killed her emperor so that they could sit on the throne instead. It doesn't matter to her that she is now the Empress. That holds no sway.
He'd made it quite plain to her that he was marrying to give his father grandchildren, and due to her genes, she seemed the perfect choice.
He's given up the idea of telling her that he really does think she's stunning, and that he secretly adores her. Besides, attachment is forbidden. Marry to produce an heir, not because you fell in love. So that's what he does.
She's tried so hard to convince herself that she hates going to bed with him at night, that he makes her skin crawl. In essence, he does, but with excitement, not disgust. At first she'd tried to make him as reluctant as possible to touch her, merely submitting to his passions instead of participating in them. While it clearly irked him, she couldn't make it last. She'd ended up enjoying his attentions too much to keep the mask of bored neutrality on.
She'd contemplated killing him in his sleep before, too, but never quite had the nerve to do it.
He looks innocent when he sleeps, even if it's the one and only time he is.
She'd been both nervous and depressed when it was announced that after a year and a half of trying, she was finally pregnant. For one thing, she didn't want to be a mother. For two, her husband could just get rid of her after the child was born.
But after four years, he still hasn't gotten rid of her, even though it's never occurred to her that it's maybe because he doesn't want to.
Not having seen the event which turned Luke Skywalker, Jedi Knight, into Luke Skywalker, Dark Lord of the Sith, she's managed to piece it together through other people, straining what seems nonsensical from what seems probable. She's asked him his version of events, but he never tells her.
From what she can tell, he'd surrendered himself to his father in an effort to turn him. When this failed, he was tested before the Emperor, forced to watch his comrades be slaughtered like cattle. Apparently, Vader had searched the boys thoughts and found some girl that meant a lot to him, and the Emperor promised to murder her in several painful and torturous ways, trying to decide which was the worst. It seems he'd fallen begging at the Emperor's feet not to touch the girl, he'd do whatever was asked.
She's wanted to ask him several times if he was in love with this girl, but she never asks, so he never tells her.
But Vader, now allied with his son, ended up murdering the Emperor and seating himself on the throne, his son heir to the empire.
As it was, she is given to understand, that Emperor Skywalker ended up murdering the girl that had forced him to turn in a fit of jealous, desperate rage – she'd refused to join him in the Empire, or something. Mara has never been fully certain.
And she hasn't asked her husband if it's true or not.
He's pleasing to look at, and she's found herself drowning in his pale blue eyes without ever meaning to. He's just so captivating that it astounds her. When she does give in and melt into those blue eyes, he draws her onto his lap, gently stroking the curve of her waist with his hand. Just one. From experience she knows that only one feels warm and inviting to the touch. The other doesn't generally have any sort of temperature the way a hand should. He's admitted that it happened when he was about twenty, and that his father had cut it off. It is electronic, and it can feel things – pain and heat and such – but it only looks real.
She's asked him to explain so many times that if his father had done so many terrible things to him, why on earth did he – does he – love him so very much?
He never tells her. She's pretty sure he doesn't even know why.
"Sometimes," he excused at one point, "love is all we have."
Well, she has her son to love. What does he have? What keeps the master of the galaxy as sane as he ever is?
She doesn't know it, but it's her that he loves. But he'll never tell her as long as they live.
She knew that he wanted to escape her emotion filled wrath so many times during her pregnancy, but stayed only because he knew that she'd be even angrier at him once he got back. She blamed him several thousand times for making him pregnant, and said the thing she's said a billion times in five and a half years: "I hate you."
She hasn't convinced herself to believe it yet. For that matter, he doesn't believe her either.
She hasn't raged at him for impregnating her since giving birth, however. Mostly because she really has him to thank for the greatest, only treasure in her life. She finds it amazing that her son's eyes are the exact same captivating blue as his father's.
Maybe that's one reason she loves him so much.
It seems to be a pattern in Skywalker males to both look like and adore their fathers, for the four year old Imperial Prince practically worships the ground the Emperor walks on. He sees him for what he is at his core; not a murderer, or a tyrant, or someone who ended up betraying his cause for all the right and wrong reasons. He sees his father as the hero he once was.
And secretly, the Emperor would give just about anything to be that hero again.
Still, the Empress wishes that her beloved angel could see what she considers the truth about his sire; that he really is a tyrant who has murdered in cold blood more times than she'd care to count. The man that murdered the very woman his soul died saving.
He doesn't seem to have too much of a soul now. Though whatever's left of it comes out around his child, and shines through when he makes love to his wife.
At one point, a few months into their marriage, she'd caught him talking in his slip, eye lids fluttering while his face was screwed up in tremendous anguish. He was begging and pleading for someone he identified only as his friends not to leave him, to please forgive him, he was so sorry. She'd tried to comfort him in his sleep, only to have him wake up and clamp a hand around her wrist as though she were an attacker. She might not have forgiven him for it even weeks later had his terribly blue eyes not betrayed his terror and anguish. In the end, he'd ended up only falling back asleep in her arms, listening to her whisper soothing words they both knew were lies.
That sort of incident hasn't happened since, and they never talk about it.
She wonders who those friends of his were. The Rebels from before he was turned? Clandestine fellow Jedi? And was that woman among them?
She used to consider killing him.
After the birth of their son, it seemed as though he even expected her to kill him, and challenged "Why don't you do it? It'd be so easy to slit my throat at night."
It sounded like he was almost begging her to do it. It seemed he maybe wanted to meet back up with those friends in the embrace of death.
"I need you now," she explained. "You're what keeps my son safe."
"Funny," he'd dryly commented. "You seem to think him not safe at all in my presence." It was and is true enough. She doesn't even like it when the Emperor holds the boy on his lap to tell him wonderful stories of heroes that sound very familiar, the characters so recognizable.
She'd carefully organized her thoughts to rebuke that one. "He's Lord Vader's grandson as well as the Imperial Prince. Someone is going to want him dead. A Rebel out for revenge, a nut case, I don't know for certain who, but it will happen." The Emperor himself had survived assassination attempts. His father didn't have to go through that, as a combination of age old weaknesses and the after effects of murdering the Emperor had taken the strength out of him. "So long as you live, my son is safe."
"Is that all you care about?" He'd sounded jealous. In fact, as much as he loves his son, he's very jealous of the attention his mother reserves for her precious child and him alone. He'd give just about anything to have her look at him with that much love in her eyes, just once. It doesn't seem like she ever will.
"You can ask any mother; they always choose sons over lovers." He merely nodded at that, shrugging.
She'd considered killing him, but now he is far too valuable.
And though she doesn't even realize it, she's falling in love with him after five and a half years.
As for the Emperor, even if his father had arranged the marriage to merely carry on the family dynasty, he's loved her from the start.
And maybe someday she'll see him the way her son sees him.
The End
|
global_05_local_5_shard_00000035_processed.jsonl/33630
|
Title: Fifty Fangirls
Disclaimer: Standard ones apply.
Notes: I wrote this in my live journal a long while ago because I was feeling stupid and decided to post it here for the sake of not forgetting about it.
When Eiri heard Shuichi's voice in the hallway, he immediately grew to be suspicious. The singer, after all, was not in the habit of talking to himself, nor were his words directed at Eiri. This led Eiri to the conclusion that Shuichi had brought someone back with him to the apartment, and Eiri did not particularly like said conclusion. He pressed his ear to the door and listened carefully, trying to pick out a second voice.
"And this is the kitchen," Shuichi said.
There was an unfamiliar murmur of reply. Eiri furrowed his brow.
Footsteps approached and Eiri's suspicion grew exponentially. More than one visitor? Hm. Eiri backtracked to his desk and saved his document. Just in case.
His timing was wonderful, as it turned out, as Shuichi threw open the office door just as Eiri was closing his laptop. "And this here is Yuki's office, where -- Yuki!"
Eiri stared at Shuichi and then eyed the mob of women crowding behind the singer. "Do I even want to know what's going on here?" he asked.
Shuichi started to answer, but there was a delighted cry from the mob. Eiri tried to escape as a wave of young women surged past Shuichi and swarmed around the writer, but no avail.
"Yuki Eiri-sama!"
"Yuki-sensei, I love you!"
Well, shit. Eiri had nowhere to escape. He ended up backed against a wall with screaming girls all around him. One was ripping books off os his own shelf and thrusting them at him, demanding that he sign them for her. Others were pleading for a smile, a touch, anything. Eiri, however, was still somewhat in shock and could only search continuously for some means of escape.
Shuichi, it seemed, was facing a similar problem. It seemed he had been exercising only a trace of control over his group and, now that this measure of control had been lost, was being doted on to a similar extent as Eiri himself.
Eiri felt a hand wander to parts of his body he did not particularly want touched at that moment in time and, upon realizing that Shuichi was receiving similar attentions, grew to be a bit angry. After taking a moment to gather his sense, he burst free of the mob of women, grabbed Shuichi by the hair (the only easily-visible part of the singer) and bolted out of the room. He slammed the door before any of the strangers could tail them and fell back against it. Already he could hear the women trying the door knob and pounding on the other side. He reached up and over to lock the door and then let out a relieved sigh, sinking into a sitting position.
Shuichi, after prying Eiri's fingers off of his hair, collapsed into a seated position next to Eiri. "Phew," he breathed. "That was kind of scary, huh?"
Eiri turned his head to glare at Shuichi.
The singer meeped. "What? What'd I do?"
"What the hell did you think you were doing?" Eiri snapped.
Shuichi's words ran together as he tried to explain himself. "I got out of work early today and the place was mobbed and we couldn't get out and I wanted to come to see you but I couldn't do anything and it's K's day off, so he couldn't do anything, either, and so I ended up promising to take twenty of 'em on a tour of the apartment and they had a contest to find out who could go and I brought them here and --"
"And now there are twenty crazed fangirls locked in my office," Eiri finished. "Great."
"Fifty," Shuichi corrected, flushing slightly.
"Fifty?" Eiri repeated. "You said only twenty won the --"
"There were lots of ties," Shuichi said glumly.
Eiri groaned. "Even better." He bashed his head back against the door and was answered by the renewed vigor of the women locked in his office. "So there are fifty crazed fangirls locked in my office. Wonderful. Just... wonderful."
Shuichi squirmed. "I didn't think you'd be home," he murmured.
"S'just... You're usually not here on Thursdays when I get home so I kinda' thought you'd never know if I brought them here and..."
"And that's supposed to make it all right?" Eiri asked, quirking an eyebrow at the singer. "You are an idiot."
"I am not!"
"The fifty young ladies locked in my office serve to prove you wrong," Eiri snapped. "But I'll deal with you later." He frowned pointedly at the door. "We have to get rid of them."
Shuichi screwed up his face as he thought. "We could..."
"Yuki! You didn't even wait to hear what I was going to say!"
"I didn't need to," Eiri muttered. "I know it would have been stupid."
Shuichi's indignant cry was matched by the wails of the locked-in women behind the door. "Yuki-senseiiii!" they cried. Eiri made a mental note to go rummaging in the kitchen for ear plugs. In the meantime, he rubbed his forehead irritably.
"There has to be some way to get rid of them..." he muttered.
"We could just... let them out," Shuichi offered. "Or hide and let someone else let them out!"
"It doesn't matter," Eiri argued. "They know where we live, now, and there's nothing stopping them from coming back even after we do get them out of there!" He glared at his feet. "We might as well just..." He stopped. Hey now. That was an idea.
Shuichi furrowed his brow. "Just...?" he prompted.
"Go get some boxes from downstairs," Eiri said, getting to his feet.
"What?" Shuichi asked, scrambling into a standing position. "Why?"
"We have some packing to do."
Shuichi stared at him for a while longer and then, deciding not to question Eiri's idea, went downstairs to do as he was told.
Three hours later, the couple was busily settling into their brand new apartment on the other side of Tokyo. They were hanging up clothes in the new closets, rearranging furniture, and chatting amiably about how nice their new neighbors were. Neither of them even attempted to talk about how they had been forced to leave Eiri's office furniture, books, and laptop behind. Why ruin a good thing?
On the other side of Tokyo, fifty fangirls whimpered pathetically and promised themselves that they would never try to grope Yuki Eiri-sensei ever again.
the end
|
global_05_local_5_shard_00000035_processed.jsonl/33631
|
Dying in America
Rated: PG13 as of now. Might be more later on. Actually, yeah. Probably should be for mature audiences only!
Warning: "Adult" themes, vulgar language, drug use and mature content ahead.
Pairing: Mimi/Roger. (Sorry, I'm not a Mark/Roger fan at all! The thought of it makes me go 2oipdokdfpokwpeofkp, to put it simply.)
Warning II: I spell badly and have poor grammar. Bite me.
Disclaimer: I don't own Rent or any of its Rent-goodness. I wish I did though.
R&R PLEASE. I thrive on reviews. More reviews more enthusiasm to write.
7 am.
Dusty light filtered in through the loft's grayed window panes, sprawling across the floor in odd patterns. Brightness rolled over the couch, hitting Roger's sleeping form. The dirty blonde's face twitched, contorting in a sleepy annoyance. His eyes fluttered open, surprised that he wasn't looking toward the loft's ceiling, but Mimi's smiling face as she loomed over him.
"Good morning, babe." Her tan fingers rolled over his face, brushing a lock of hair behind his ear as she leaned forward and placed a small kiss on his lips. Roger smiled and leaned up, staring at the girl, still groggy. "Did Mark let you in?" he half asked, half yawned.
Mimi rubbed the back of her head. "Yeah. He also told me to tell you that he was going to be gone for a little bit…" she said rather awkwardly, eyes darting away.
Roger's smile faded as he glanced toward the door.
"Leaving for a little bit, Mimi? Where too?"
"Would you believe me if I told you he met a girl at the club and was invited to her house for the week?"
"I didn't think so…" Mimi sighed, wringing her sleeve boredly. "Well, babe, that's what he told me. He was going to meet with some girl and get to know her better, and so… we won't see him for a bit."
She sat down, making herself comfortable in Roger's lap.
"That doesn't sound much like him…" Roger murmured, leaning his forehead against Mimi's back. She smiled and turned in his lap to wrap her arms around his neck, her forehead pressing against his. "Collins is still away at Sante Fe for that new teaching job offering, and I heard Maureen and Joanne were having a 'them' day…" she muttered into his ear in the most silky voice she could muster.
"A 'them' day?"
"You're dense this morning," Mimi groaned, pushing Roger's shoulders back and sliding off him. He stared quietly after her, eyebrows raising. "You made coffee," he noticed.
Mimi sighed, pouring herself a cup.
"Want some? It's cold out… It's going to hit the 'teens tonight." She turned, offering him her mug.
Roger frowned and shook his head. "I'm fine."
"Your cheeks and nose are red. You're cold – don't deny it. Get something warm to drink before you get sick."
"You certainly have the place to talk, don't you?" Roger asked sarcastically as he stood up, narrowing his eyes at her. Mimi's mouth popped open, eyebrows furling down.
"You're being a bastard," she muttered, feeling his remark had hit a weak nerve.
"You know I've been going without smack—I've been doing WELL and you bring up shit—"
"Calm down! I didn't mean it!"
She immediately quieted upon his yell. But she didn't seem fearful.. No, her face was filled with rage. "Don't you dare tell me to calm down, you—you--!"
Mimi finally snapped in two. She dropped the mug on the counter, coffee sploshing out the sides. "I try to be nice and this is what I get. I'm leaving."
"…Bye, Mimi."
The dancer stormed out of the room, sliding the door shut with a loud slam. Roger massaged his temples and stood up, wobbling toward the counter. He leaned heavily against it and picked up the cup, taking a sip.
Not bad.
…Not bad at all.
12 am.
Roger pulled the final string of the guitar before letting it fall to the seat cushion, his body rising up to stand. Mimi hadn't shown her face, and he was beginning to worry.
It was time to apologize.
He exited the room and begun down the stairs, heading for Mimi's apartment. He blinked at her door, which was already ajar. His stomach clenched.
Why would she leave her door open?
"Mimi?" he asked, his tone riddled with concern. He stepped inside, but the room was empty. Taking a stride forward, he soon found a crunch beneath his foot.
Freezing, he peered down at a paper bag below his shoe.
An eyebrow raised.
"…Don't tell me," he thought miserably. "You've got drugs stashed in here after all."
He bent down and picked up the bag, opening the top to view its contents. However, when he opened it, there was only a note inside, and a small package of—crackers?
Curious, he unfolded the note, and begun to read.
If you find this, I'm already at CatScratch. My manager wanted me in early for some private business. Hell only knows what this means. I hope you came in to apologize. If you did, then you're forgiven.
Oh and, you better eat the crackers. You WILL get sick.
-Love xoxoxo
Roger glanced at the baggie of crushed crackers. Shrugging, he tore it open and pulled out a few crumbs, dropping them into his mouth.
Now what was he supposed to do?
Mark and Collins were gone. Maureen and Joanne were having that 'them day', and not even in hell would he be caught spending time with Benny. And Mimi…
He screwed up with her again.
At least he didn't feel the guilt of not intentionally coming to her apartment to apologize. Glancing out the window, he crunched the half-empty bag in his hand and strode to the trashcan, throwing it away. He gave the note a final look, then smiled softly upon reading it again.
Even if she was angry, she still loved him enough to write him this.
And he had pissed her off, too…
It was about time he did something for her.
Mkay, guys. I'm done for now! At this point, no one but myself knows where this is going. It'll become MUCH more dramatic and fun later on. What could Mimi be doing at CatScratch, and whats Roger planning for her?
Will those plans even wind up mattering? Whooo knows.
'Til Chapter 2, r3birth – signing off!
|
global_05_local_5_shard_00000035_processed.jsonl/33632
|
A/N: Again I'm sorry, I'm sorry, I'm sorry, I'm sorry, I'm sorry, I'm sorry, I'm sorry! This is probably one of my longer chapters. It's the last one, though, hope you like the ending. I hope you've enjoyed. It may be a tinsy bit OOC in the end, but not much. Thanks a bunch! R&R! -Mac
Disclaimer: I don't own Life with Derek, or the lyrics in italics below.
Chapter Five
Dance Until The Band Stops Playing
What can now be said, oh little one, on the other side? "Dance until the band stops playing," "Sing with all of your might." The list goes on and on...
A week to the day later, we held a memorial service. I was completely overwhelmed by the finality of it all. For most of the week I had tried to remain uninvolved in the arrangements. I couldn't think about what style of casket to have or what color flowers that would be best. I didn't want to think about the funeral at all. I think my dad and Nora were both appreciative and relieved when Casey offered to take over. She would better job anyway, they admitted later. I just wasn't ready for it. I was still clinging to the hope that one morning I'll wake up and Marti will be there causing come sort of unnecessary mayhem, just like her big brother. With the memorial coming up, though it was like a slap in the face. She was really gone. She wasn't coming back.
I know it seems foolish to hold on to a hope like that. I know I'm far too old to not understand death. I'm old enough to accept that she was gone. I just didn't want to believe it. She was so young, she had so much ahead of her and it all got ripped away from her. Her life was over before she even had a chance to really experience it. It was heart breaking, for me, for all of us. The truly painful thing was watching the heart break on the faces of my family. It seems like it was just this terrible nightmare that I would wake up from any minute. But I wasn't going to wake up. I have to face that.
Casey took over most of the arrangements but left only one area to my dad and Nora for a decision. Who was going to speak at the service? At first I thought my dad would just do it. It made sense for him to speak at his daughter's funeral. Actually, it didn't make sense at all. He shouldn't have to be deciding who would speak at his daughter's funeral. There shouldn't have to be a funeral. If the world made sense at all, Marti would still be alive, terrorizing the people in our house and listening only to me. But the world doesn't make sense, and Marti is gone. Now my dad is faced with such a decision and a few days ago I found out what his decision was. His decision was me.
When he came to talk to me, it was the first time we had really talked about it. We were really leaning on Casey and Nora for support, not each other. I went out of my way to make sure Edwin was alright--he counted on me to be there for him. I was his big brother, so of course I was going to be. But when it came to my dad, it just got hard. I didn't know what to do or say. I wanted to find away to tell him I understood how he was feeling, but I can't. What can you say to a man who just lost his daughter--even if he is your father?
We did get to talk a little about her. We got into a nice reminiscent conversation. Remembering all the good times with her, all her obscure and unusual ways of addressing people, her entire outlook on life even at such a a young age--it served to break the ice. She was amazing in her strange, demanding, unpredictable way. I would find a way to remember her everyday. She deserved that much. She deserved to be remembered.
After our somewhat shaky, awkward talk, my dad got up the nerve to ask me to speak at the service. I was shocked. I never thought he would ask me. Later on Casey would tell me, she had thought all along that I should do it. Apparently, everyone agreed with that. My dad said it just seemed right for me to do it. I was the one who was closest to her. Well I looked at my dad as he asked me, as he explained his reasoning--and I couldn't say no. So I told him I would do it. I had no idea what I would say, but I would do it. And I would.
I would get myself dressed up, stand up in front of all our relatives and friends, and try to sum up what Marti meant to us, even if there wasn't an easy way to condense everything Marti was. It would be hard to put into words, what Marti was--what she meant to us, how much we loved her--but I would try.
The only thing missing from the week prior to the funeral was a serious talk about my relationship with Casey. I think they were trying to put it off until after the service. I wasn't worried through, I couldn't be. If I worried, it meant I was afraid. I had no reason to be afraid, as I told myself constantly. It didn't matter what they thought about us, I wasn't losing Casey. And I definitely wasn't losing her because they can't accept it. Because they thought we would be better off with other people. Because they think we don't belong together. They can think whatever they want. I know better. I know we belong together. If anyone fits me perfectly it's Casey. I know it. I know it even if they don't.
I thought they were going to leave it off until I overheard a conversation between Casey and Nora, just Casey and Nora. I know, I know. Eavesdropping is bad. I know, but I still do it. This conversation might very well affect me. I have a good reason to listen.
"Casey can I talk to you?" Nora asked softly. There was only a couple of things this could be about. I stopped around the corner from the kitchen and listened.
"Yeah, Mom. What is it?" Casey responded. I couldn't see them from where I was.
"It's about you and Derek."
"What about us?" I could sense the tension in her voice. She was prepping herself for the worst. I could tell.
"How serious are you two?"
"Does it really matter? Will it make a difference in how you feel about it?"
"Probably not, but could you humor me Casey, please?"
"Mom could you just get to the point, please. I have some things left to do, before tomorrow. I need to get them done, so if we could hurry this along..." Casey's tone had an edge to it. I could hear it. She thought her mom was going to say something against us, and it was frustrating Casey.
"I'm having trouble understanding how this happened."
"It just happened Mom. I can't explain it. We didn't do it on purpose. It just happened. All I know is I love him and he loves me. That's a big step for Derek, and me too. Don't mess that up for us."
"Don't mess it up? The whole situation is messed up and the two of you made it that way." Nora accused, but somehow kept her tone neutral.
"The situation got messed up when you married George. The two of you forced us together. The way I see it is it was either this or we would have killed each other." Casey spoke firmly, with confidence, as she voiced her opinion. "Would you rather we had killed each other?"
I could almost see the look of question on her face. I imagine her head tilted to the side as she watched Nora, with her eyebrows raised. I had to suppress a laugh at the vision I had produced in my head. Her sarcasm must have stuck Nora, because there was a long pause before she spoke again.
"You're going to fight me at every corner, aren't you?"
"Did you expect me to just give up, and give in? I love him. Isn't that enough for you?" Casey nearly pleaded.
"No. It's just not right."
"And why not? Why is it wrong? Can you explain it to me?" Casey questioned, but waited for no answers. "He needs me. I'm not going to leave him when he needs me most. You can't expect me to."
"Casey, honey, see reason..."
Casey interrupted her. "I can see reason just fine. I see reason clearly. More clearly than you, I think. I understand that you and George are going to have trouble accepting that we're together, but it's what you'll have to do. I'm sorry that you don't like it, but I can't do anything about that. I'm not willing to hurt Derek--or myself for that matter--just because you said to. No, I won't do it."
"You're willing to fight that hard for him?"
"I'm willing to do anything for him."
My heart soared when those words came from Casey's lips. Now that's what I call devotion. I didn't need to worry. I would fight for us. She would fight for us. We would fight and that's all that mattered. I turned around and headed back for my room. I didn't need to hear anymore of the conversation. It didn't matter what was said, we'd be okay.
I had just settled down at my computer, in my room, when my door flew open. I lazily turned my head to see who had done it. I caught sight of Casey standing in my doorway. I nodded her in and she stepped in, closing the door behind her. I swiveled around in my chair so that I was facing her completely.
"What are you doing?" Casey asked as she looked at my computer screen.
"Nothing yet." I admitted and turned back to my computer.
The screen was empty save for a blank word document. I watched the blinking cursor in the top left corner of the document. I had been attempting to work on what I was going to say at the funeral the next day. I had been working on it all week and still hadn't managed to get anything down. I had no idea what to say and it didn't seem like it was going to come to me anytime soon.
"Nothing, huh?" Casey inquired, tilting her head as she looked at me.
"I was trying to figure out what I'm going to say tomorrow, but I got nothing...just a blank page."
"You'll think of something." Casey put a hand on my shoulder and squeezed slightly, "I'm sure you'll think of something."
"What about you? What are you doing?" I questioned, looking up at her.
"I just finished talking with my mom."
"About what?" I inquired, not letting on that I had listened in.
"Us." Casey answered simply.
"Hmm, what about us?"
"Everything, what she thinks about us. The conversation we were waiting for."
"What did she say?"
"In so many words, that she doesn't want us together. She doesn't think it's appropriate in our situation. That being in love isn't enough to justify our relationship...everything we expected they would say." Casey explained, "But I fought her, gave her a ton of trouble. I didn't give in."
"I knew your ability to have an answer to everything would come in handy someday." I joked, sending her a smirk as I turned away from my computer and back toward her.
Casey stepped forward so she was standing in between my legs. She leaned forward, holding herself up by holding onto my shoulders, so that we were face to face just inches apart. She smiled as she looked me right in the eyes.
"Make fun of me all you want, but it worked." She laughed and kissed me lightly on the nose before stepping back and away from me.
It worked? That was new information. "What do you mean it worked?"
"I mean, it worked. She's going to let us be together, no more argument."
"Really?" I asked, searching her eyes.
"Yeah. She said we'll have to sit down with her and George to discuss rules, but sometime later, once the funeral is behind us."
"I can't believe it."
"Well, believe it. And this will probably be the last time we'll be allowed to be alone together." Casey smiled as she backed up toward my door.
I stood and walked to her, "And I suppose sex is completely out of the question."
"Completely." Casey repeated and laughed.
"And what about this, is this allowed?" I asked, before I pulled her to me and kissed her. Her arms went around my neck as she kissed me back.
She pulled away and took a deep breath before saying, "We'll have to negotiate that one in."
"I'll be sure to." I smiled. I rested my forehead against hers. "Tomorrow is going to be awful."
"I know." Casey agreed, her voice quiet. "I know it is. But we'll get through it."
"How? I've got to get up there in front of everyone and I'm drawinga blank on what to say. I don't know what I'm going to do. I should never have agreed to this in the first place. But I couldn't say no to my dad. I couldn't force him to do something he wasn't ready to do."
"Derek you can do this. I know you can." Casey replied. "I can help you if you want."
"No, if I'm going to do this, I have to do it myself."
"Okay, I understand. I have some calls to make, last minute confirmation things, you know how it is." Casey said, "I'll check in on you later, okay?"
"Yeah." I nodded as she opened my door and made to walk out. "Oh and Case?"
"Mmhmm." Casey paused in her exit and looked back at me.
"Love you." I said simply.
"Love you too, Derek." Casey replied before walking out and closing the door behind her.
That night, I still had nothing, even through all my trials, I had nothing. It wasn't like I wasn't trying, it was just nothing sounded right. By the end of the night I was still staring at a clear white screen. Nothing, not even a trace of anything. Just blank. I had spent hours watching the cursor in the corner, blinking, taunting me, waiting for me to write something. But I couldn't.
I couldn't sleep. I had closed out the document, and shut down the computer long before. I had finally given up, in exchange for sleep. A sleep that wouldn't come. So I lay awake, staring at my ceiling. Not the best choice when you have a memorial service to attend--to speak at--in mere hours. At some point I did slip into dreams, but it didn't last long. Before I knew it my alarm woke me up and I was snapped back to reality.
I found my suit, hanging up and still in the plastic from the cleaners. I changed and headed fro the bathroom to freshen up and fix my hair. My tie sat untied around my neck. I got to the bathroom door just as Casey was coming out. I managed a small smile through my sleep deprived haze and she returned it with a little more energy.
"Morning." She replied, pressing a kiss to the side of my mouth and wiping away the smudge of lipstick she left there.
"Morning." I said.
"It's all yours." Casey responded waving me into the bathroom.
"Thanks." I nodded.
I slipped in and closed the door. I propped myself up with my hands on the counter, one on each side of the sink. I stared at my reflection in the mirror. It was actually today. We were going to bury my little sister today. I turned the nob for the cold water and splashed some on my face. It helped to wake me up a little. I grabbed a towel off the hook and dried my face. With minimal effort I fixed my hair so it wasn't unattractively unruly and left the bathroom.
Casey's door was open as I passed and I stopped in her doorway. She was sitting on her bed as she slipped some heels onto her feet, strapping them into place. She finally looked up and caught sight of me. She grabbed her purse and walked toward me. Once she was in the hallway she closed the door to her room.
"Did you figure out what you're going to say?" Casey asked.
"No." I said simply and the look I gave her must have been enough to tip her off that I didn't want to talk about it.
Casey turned and headed for the stairs, as I followed. We came down together. Lizzie was already finished and sitting on the couch staring at the blank screen of the TV. I stood next to Casey, behind the couch. She said a small greeting to Lizzie, who responded slightly. I hastily tied my tie. It must have looked sloppy, because Casey made a face when I turned toward her. She moved it a little so that it was centered and tightened it ever so slightly. Edwin joined us not long after with his own tie fisted in his hand, a look of frustration etched into his features. I immediately walked over to him and without a word, helped him tie it. I straightened it when we were finished similarly to how Casey had done with mine.
"Where are dad and Nora?" Edwin asked.
"I don't know. I haven't seen them yet." I answered.
"I checked in on them before I got ready, they should be done any minute." Casey replied.
"How were they?" I questioned. They had to be in tough shape.
"As well as they possibly could be." Casey said. "They'll be okay, though."
I nodded. After that it was quiet until my dad and Nora appeared. It was quiet even after that. It was only a moment before they ushered outside to the car Casey had arranged for, to take us to the church where the service was being held. The entire drive we were all quiet, I don't even think any of us moved. The trip didn't take long and we were soon assembled in the church.
While most ceremonies I've attended--weddings, awards assemblies, and funerals alike--seem to drag on forever, this one did not. At least, not to me. It was soon my turn to speak. The moment I had been fearing was now upon me.
"And here is Derek Venturi, to say a few words."
I stood and made my way to the front from my seat in the first pew with Casey and the rest of my family. I took my place behind the podium. As I looked out at all the faces--faces of the people who cared for or loved Marti--it was suddenly like I knew exactly what to say. I took a deep breath and began.
"I had trouble getting ready for this. I had trouble finding the right words to say for my little sister. I know most people would come prepared with some piece of scripture or some speech about how different life is going to be without her or how much we're going to miss her. While all that is there, I don't think that's enough for Marti.
"I can't say, 'she led a good life', 'she lived it well', or 'she had no regrets.' The truth is, she never really got the chance to lead a good life, or to live her life to the fullest. It's tragic, we all know that. I know that if she had understood what a regret was, she wouldn't have had any. And in her absence, I am left with only one: that she never truly got to see how good life could be.
"When I thought about what I was going to say here--when I thought about Marti--the only thing that crossed my mind were all the things Marti never got to do. She never got to grow out of her obsessive belief she was a cat. She never got to grow up at all. She never got to hate being too young. She never got to hate being too old. She never got to be an adult wishing she was a kid again. She never got to fall in love or get married. She never got to have kids of her own--that would grow up believing they're a bunch of cats, or dogs or some other wild animal. She never got to do a lot of things. There were a lot of things she missed out on. I could bore you with some spill about how 'she was taken from us too soon' or how 'God must have had a reason' or 'that's she's in a better place,' but I won't.
"From what I could tell Marti was happy. She may have been a little crazy sometimes, a little too nosey, insanely curious--which I assume was the cause of the nosiness--and someone once said to me, far too much like me. If you knew her, you know that's true. But she was a good kid and she was loved. She is loved.
"Marti was a bright spot in the day. She was a chance to see truly carefree whiles. She was a chance for a good laugh. She was so many things...and we will all miss that. We will all miss her. I will miss her, but I will not mourn her. I will live for her, experience everything she couldn't for her. This is for you Marti. I love you."
I let out a breath of relief and stepped down. I returned to my seat next to Casey and felt her slip her hand into mine. She leaned toward me and kissed my cheek, letting it linger just a tad longer than necessary. I smiled and leaned into her.
"Did you say all of that off the top of your head?" Casey whispered to me later, as we walked out to the cemetery for the actual burial.
"Yeah. When I tried to get it out, it just wouldn't come out. But once I got up there, it all seemed to fall into place. It sounded all right, didn't it?" I responded.
"It sounded amazing, perfect for not having anything prepared at all. And surprisingly eloquent fro you." Casey assured. "It was perfect, don't worry. You did good Derek. Marti was exactly what you said, everyone felt the exact way you described all the expected sentiments you cut out, didn't fit Marti, she would have hated them. You did perfect, especially for last minute."
"Thank you." I smiled.
"For what?" Casey questioned.
"You know we do that a lot. I say some thing and you need further clarification, 'for what?' You can't just accept it how it is." I rolled my eyes, "For making up that load of bull to make me feel better."
"It wasn't bull. I was serious." Casey defended her response. "I really think you did perfect, and that's the truth. Don't question it. 'You can't just accept it how it is.'"
"Don't steal my lines." I joked.
"Okay, as long as you don't steal mine." Casey proposed, "Deal?"
"When have I ever stolen one of yours?" I inquired, frowning.
"Do we have a deal or not?" Casey prodded.
"Fine deal." I agreed.
"See this is what Marti would have wanted, for us to get past it and move on as quickly as possible." Casey replied.
"Do you actually think she was old enough to think such a thing?" I asked.
"I just have the feeling that's what she would have wanted, whether she understood it or not." Casey responded.
"I think you're right."
From our connected hands, I pulled her closer so I could wrap my arm around her waist as we walked. Most people had already assembled at the burial site and they parted to let us through to the front. This part of the service began shortly after. Watching her casket being lowered was too much for me and before they finished. I had to get away. I gestured for Casey to stay. I spent the remainder of the burial, standing alone under a tree a little further down the hill. I casually glanced at the stones set into the ground at my feet. The closest one was a double plot, the dates showed the couple had been elderly when they passed--just over a month apart. From the few simple words written there you could tell they had lived full lives--mother, father, wife, husband, friend, even grandmother and grandfather. I wanted mine to read like that. I wanted to experience all of those things, because Marti hadn't.
"What are you looking at?" Casey's voice filled my ears, breaking into my thoughts.
I turned and watched her finish her walk down to me. "All done up there?"
"Yeah. So, what were you looking at?"
"This couple, they got to be very old--together. They were even buried next to each other. They were parents, and grandparents. I want that someday." I explained, "And I think I want it with you."
"Derek, I..."
"I love you, Case. I know it's only been six months, but it's different. I can feel it. I've realized a lot of things because of what happened. And when I said I wouldn't let you go, I didn't mean just right now--I meant forever. I might not have known it, but that's what I meant." I said quickly, spitting the words out as fast as I could. The emotion was thick in my voice, I could hear it.
"You can't possibly mean that..."
"I do."
"Yes." I nodded in confirmation.
"I love you, Derek. I really do. And I meant it yesterday when I said I was willing to do anything for you..."
"When did you say that?" I asked, continuing in my act of playing dumb.
"I know you heard me. You make too much noise when you walk. I heard you walk in and I heard you walk away. Just because my mom didn't hear you, I did. I'm too tuned into you."
"I don't care that you heard. I'm glad you heard."
"Yes." Casey nodded this time, "You said it felt different. I know what you mean. It feels right, so right that we don't want to let go of it, because it feels like if we do we'll never find it again..."
"I don't think we would ever find it again. Not something like this." I admitted.
"Me neither." Casey agreed.
"So we agree. We belong together, like eternal, forever together." I said.
"Yes, I think so." Casey smiled.
"Marti would be proud of us." I replied.
"Why do you say that?" Casey asked.
"Because we're living life to the fullest, taking it for everything it's worth." I answered.
Casey smiled and stepped closer to me. She gripped my shoulders and pushed herself up, onto the tips of her toes, to capture my lips with hers. My hands found her waist and pulled her closer. I was sure it was her I wanted it all with. I wasn't looking for a happily ever after, most of the time those aren't real. I was just looking for an ending with us together. And I would find it. For me. For Casey. For Marti.
A/N2: That's the end! Hope you enjoyed it! Review...Review...Review, please! -Mac
|
global_05_local_5_shard_00000035_processed.jsonl/33633
|
Chapter Two
The inside of the club is a wreck. The smells of blood, sweat, and dirty bodies are almost overpowering. Buffy wrinkles her nose and takes a few steps inside. It looks like some twisted version of a war zone, and she feels her stomach turn again. Tables and chairs are overturned, broken legs sticking up like sinister teeth. Shattered glass crunches under her feet. Cages hang from the ceiling, human-sized steel bars casting weird shadows on the filthy walls. A body lies in one of them, arms flung out pitifully. She can smell rot from across the room. Something is very wrong here. Vampires don't keep dead bodies around, because of the smell if nothing else.
The stage is still partially set up, though the microphones and instruments are in a shambles. It looks half-rotted, as though some freakish zombie band is expected to play the next time there's an audience. A drum gapes at her from beneath an overturned music stand, its middle all punched-out and jagged. An unexpected wave of sadness washes over her. This was a happy place once, and now it's all in ruins. Buffy pushes the unwanted emotion away, replacing it with anger. Regret will only make her weak, and there's never time for weakness in her world.
A rustling from behind the curtains drags her into the back room. She nearly steps in a pool of blood, freezing, momentarily nauseated. Then a faint cough from the back makes her jump, and she's moving again, kicking aside the wreckage. The curtains raise a cloud of stale, dusty air around her, stirring dread deep in her gut. She's seen a lot of terrible things, but something about this place tells her it's about to change her definition of evil. The very ground seems to radiate malice.
A giant cage is attached to one wall, the bars just far enough apart for an arm to fit through. A sickening array of torture implements are displayed on the adjacent wall. She can barely make out the form of a man, crumpled on the floor in the dim light. Taking a step closer, she can see the top of his grayed head sagging limply from his neck. Trepidation fills her as she wonders whether she's missed her chance by one dying breath.
She's certain the noises have been coming from him. She puts her hands on the door of the cage, rattling experimentally. The bars are thick, designed to impede vampire strength. She's strong, but not nearly strong enough. Moreover, the old Watcher is shackled to the wall with chains too thick for her to readily break. She cranes her neck and presses her forehead to the rusty old bars, trying to decide whether the man is still alive.
A rustle of movement from behind her makes the hairs on the back of her neck stand at attention. Buffy whirls to see that the shadow-man has finally come inside, though he looks decidedly uneasy in the sickly yellow light from the inside of the club. He stands just inside the curtain, the dark fabric billowing around his shoulders like a cape. He keeps his eyes down, and resolutely ignores the array of torture paraphernalia on the wall. Buffy sighs and cocks her head defiantly, telling herself that she's annoyed. She tries not to notice that he's even better looking than she previously thought, or the way his eyes seem to sparkle when they land on her.
"I don't suppose you've got a key on you," she says, schooling her voice into a tone of cool indifference.
The man stares blankly at her for a moment before answering. "They really don't…like me dropping in."
"Why not?"
"They really don't like me." There's a slight tremor in his voice, and for a moment she wonders whether he's actually just showed some sort of emotion. There must be more that he's not telling her, but she doesn't bother pressing. His personal sob story is the last thing she's interested in at the moment.
"How could that possibly be…" It comes out in her most caustic tone, though she isn't sure she actually intended it as an insult. The man's eyes flick to the other side of the room, away from her, and she wonders for a moment whether she's actually hurt him. With a shake of her head, Buffy forces the feeling away, telling herself that the feelings of strange men, gorgeous or otherwise, are beyond her effort at the moment. She's here with a job to do. Still, she can't help being distracted by curiosity. "If you're gonna be popping up with this cryptic wise man act on a regular basis, can you at least tell me your name?"
Something in the way he says it catches her and draws her in, though he's still making a conscious effort not to look at her. His voice is filled with more emotion than she's thought possible in a single word. Desperate for her to hear, but too unworthy.
"Angel." She repeats it without thinking, too lost in the dark smoke of images conjured up by the sound of his voice. Buffy realizes she's spoken aloud a moment too late, and mentally berates herself for showing even this small sign of weakness. He could still be the enemy. "Pretty name." Too flustered, and too girly. She's off her game and they both know it.
The man in the cage coughs loudly, and Buffy propels herself toward the bars again with all the nervous energy hanging in the air. Coming back to consciousness, the old Watcher pulls himself into a sitting position with the chains of his shackles. "Buffy Summers?" His voice is tinged equal parts British accent and awe.
"That's right," says Buffy, suddenly all business. Two needy men, and she's letting it go to her head. This is her job, not some super-hero gig. "You were the one who called my Watcher, right?"
The old man nods weakly.
"Wanna tell me what I'm doing here?" Out of the corner of her eye, she sees Angel flinch, and realizes how harsh her words sound. Then she wonders why she ought to care what he thinks. This is her job, and she needs to make sure this old Watcher is for real.
"The Master's factory," he says, too out of breath to form full sentences. "He's…building an army. You must stop him."
She glances over her shoulder at Angel, half tempted to laugh at the Watcher's overly formal tone. "So I've been told. And I assume you want me to get you out so you can help me?"
"If it's not—" He breaks off, coughing. "Too much trouble."
"It's a lot of trouble," says Buffy coolly. "So why don't you tell me where I can get a key for this lock?"
"The Master…one of his…lackeys…has it. Red hair." The Watcher shudders. "Her name is Willow. Nastiest vampire I've ever come across."
Buffy nods, unimpressed. "And she would be where?"
"They'll come back here." The Watcher coughs again. "You must take them by day."
"So what am I supposed to do now? Sit around crocheting you a pretty new scarf to celebrate your release?"
The Watcher shakes his head, pain creasing his face. "You've got to conserve your strength for…the factory. There's an abandoned house… 1630 Revello Drive. There are others there. They'll help you." His head sags against the wall, and Buffy wonders whether he'll survive long enough to be rescued. Still, she works for the Council, and that makes his rescue her mission.
"Fine." She turns on one chunky boot-heel, prepared to tell Angel that they are finished here. She's greeted by the site of an empty room, curtains still waving in the wind from what must have been a hasty exit. Sighing, Buffy tosses the curtains aside and makes her way through the wreckage and back out the door of the club.
She barely has a chance to get one foot across the threshold before the shadows burst into a flurry of motion and she's surrounded by vampires.
Lines quoted and twisted from 1.01 Welcome to the Hellmouth, 1.02 The Harvest, 1.07 Angel, and (of course) 3.09 The Wish.
Feedback would be greatly appreciated.
|
global_05_local_5_shard_00000035_processed.jsonl/33635
|
Disclaimer: I do not own the PJO series. I own celestial steel, Forgotten, and Odessa.
Author's Note: This is the final chapter of this story. It is Zoë's joining of the Hunt, and then a brief history of her later accomplishments. Hope you enjoy it.
Thanks again to my reviewers.
I looked up, dull-eyed, to see Artemis standing in front of me, glowing faintly in the moonlight.
"Odessa is dead," I said. I probably should have tried to say it less bluntly, but I was in shock. Too late now.
Artemis nodded, her face serene. "She chose her death, sacrificing herself to save you. We shall never forget her. But that is not why I have come. Come."
She beckoned, and I stood up and walked after her, through the forest, until we arrived at the camp. There were a few sentries, and the wolves, but they stood there as if Artemis brought lost maidens into the camp every night. Maybe she did.
She led me into her tent, and gave me some water and ambrosia. For a moment, I was able to forget about Odessa.
I looked up. Artemis's silver eyes were fixed upon me. "Odessa is dead. I need a new lieutenant for the Hunters. Even before Odessa's death, you were a candidate for the next lieutenant. I don't expect an answer right away, but… Would you like to join the Hunters?"
I thought about it. I remembered Heracles, the hero I had loved. The hero who had left me to die. I remembered the sword that I had made, the sword that was in the grip of the kraken now. I thought of Odessa, the Huntress who had loved me, too, but as a sister. She had not betrayed me. She had died for me, to stop my other sister from killing me.
Aegle would still be hunting me. But I could have sisters who loved me. Sisters who would protect me, live with me. I thought of all I could have.
I raised my head and looked at Artemis. Words came to me, words I knew, that the Oracle knew. Words that Odessa knew.
"I pledge myself to the goddess Artemis. I turn my back on the company of men, accept eternal maidenhood, and join the Hunt."
Artemis seemed a little surprised, but all she said was, "I accept."
And, once again, I had a home.
I stayed with the Hunt for the next three thousand years. I accomplished much during that time.
I led the Hunters into battle many times during the Trojan War. We shot all the sentries as they saw the Greek soldiers sneaking through the city. Without us, Troy would never have fallen.
Later, we destroyed Rome, after its corruptness stretched to the stars.
Between 476 and the 1000s, I didn't do much. But in 1007, I sailed with the Viking Leif Eriksson to the New World. Exciting, but we didn't accomplish much. Leif was paranoid that someone would steal his treasure stash, although he did leave some Roman coins that he had found.
In 1776, using Odessa's ideas, I "helped" Thomas Jefferson write the Declaration of independence. I stayed in America for several decades after that, making sure that it was being followed. I also was sent to straighten out several people who were not obeying the new laws.
And now, in 2007, here I was, walking into the great garden, the same that Aegle had exiled me from, three thousand years ago.
I heard a gasp from behind me, probably from Percy. It was beautiful. My heart gave a leap as I saw Ladon, curled around the tree. I longed to reach out, touch him again. But I did not know what would happen. A lot can happen in three thousand years. Look at what Aegle did to me in just a couple days.
"The apples of immortality," I heard Thalia whisper. "Hera's wedding gift from Zeus."
Spectral singing sounded. It was beautiful, but terrifying, somehow. Percy reached for his sword, but I smacked his hand away.
They shimmered into view, Aegle in the lead. Hesperia stood at the back of the group. She caught my eye and gave me a strained half smile. I smiled back, not caring about Aegle. Then I turned and addressed all of them.
"We do not see any sister," replied Aegle coldly. "We see two half-bloods and a Huntress. All of whom shall soon die." Hesperia sent a withering look at Aegle.
"You've got it wrong," said Percy stepping forward. "Nobody is going to die." Boys.
The Hesperids turned as one to look at Percy. He seemed a little disconcerted by their hostile stares, but he stood tall.
"Perseus Jackson," mused Erytheia.
"Yes. I do not see why he is a threat," added Arethusa.
"Who said I was a threat?" asked Percy.
Aegle half-glanced toward the mountain. "They fear thee. They are unhappy that this one has not killed thee yet."
"Tempting sometimes, but no thanks. He's my friend." Thalia replied.
"There are no friends here, daughter of Zeus. Go back." Aegle responded.
"Not without Annabeth."
"And Artemis," I added. "We must approach the mountain."
"You know he will kill thee. You are no much for him." Aegle said. Will you doom your friends to accomplish your goals, Zoë? Again? Aegle added silently.
Shut up. "Artemis must be freed," I repeated. "Let us pass."
Aegle shook her head. "You have no rights here anymore. We have only to raise our voices and Ladon will wake."
"He will not hurt me," I replied. I fervently hoped that that was true.
"No? And what about your so-called friends?" Will you abandon them? It's fun to kill those who support the gods.
I replied with several words that I had learned in the modern generation. Then I steeled myself and shouted.
"Ladon! Wake!"
The dragon stirred, heads rising up from the tree, huge eyes blinking sleepily. Aegle yelped, and the Hesperids scattered, reuniting with the evening shadows. "Are you mad?!" yelped Aegle.
"You have never had any courage, sister." I replied. "That is thy problem.
"Zoë, don't. You're not a Hesperid anymore," Thalia whispered. "He'll kill you."
I ignored her. "Ladon is trained to protect the tree. Skirt around the edges of the garden. Go up the mountain. As long as I am the bigger threat, he should ignore thee."
"Should," repeated Percy. "Not exactly reassuring."
I glared at him. "It is the only way," I insisted. "Even the three of us together cannot fight him."
Ladon hissed, fetid breath searing my skin like acid. That ended the argument. They split up, and cautiously inched up the mountain.
I stepped towards Ladon. "It's me, my little dragon," I told him. "Zoë has returned."
Ladon shifted, obviously confused. I tried to mentally soothe him, with senses sharpened by Forgotten's aura that touched me so long ago.
"Fool," hissed Aegle, melting into shadow. Her fingers began moving in patterns, starting a spell.
"I used to feed thee by hand," I reminded the dragon. "Do you still like lamb's meat?"
Aegle hissed a word, and a blue mist shot into Ladon's nostrils. Uh oh. His eyes filled with rage, and he lunged at me, fangs clashing an inch from my face. A corner of my mind noticed that that particular head was missing a fang, and I knew where that fang was right now.
I spun, dodging snaps and slashes, coughing from the acid breath streaming around me.
Up on the hilltop, Percy drew his sword, clearly intending to attack Ladon.
"No!" I called. "Run!" But that moment of distraction gave Ladon an opening, and he took it. Fangs clamped in my side, and I could not suppress a cry of pain. Ladon hissed, and I wriggled out of his jaws and ran up the mountain, ignoring the pain in my side.
As we reached the peak, I nearly tripped over a black marble block. I looked down at it, and then I realized what is was.
"The ruins of Mount Orthys," Thalia whispered.
"Yes," I agreed. "It was not here before. This is bad."
"What's Mount Orthys?" Percy asked.
I suppressed a sigh of annoyance. "The mountain fortress of the Titans," I said. "In the first war, Olympus and Orthys were the two rival capitals of the world. Orthys was –" I winced, clutching my wounded side.
"You're hurt," said Percy, sounding worried. "Let me see."
"No!" If they realized how badly I was hurt, we wouldn't go further. They wouldn't want to risk my life. "It is nothing. I was saying… In the first war, Orthys was blasted to pieces."
"But… How is it here?" Percy asked.
"It moves in the same way that Olympus moves. It always exists on the edges of civilization. But the fact that it is here, on this mountain, is not good."
"This is Atlas's mountain." I stopped, staring ahead. "Where he used to hold up the sky."
Artemis, not Atlas, was standing under the vortex, holding it up. She was clearly in immense pain.
I rushed forward to help my goddess.
"Stop! This is a trap. You must leave now," she said, exhausted.
I shook my head, tears coursing from my eyes, and ran forward to pull uselessly on her chains.
"How touching."
I stopped, frozen. I knew the voice of my father. Hate coursed through me, more hate than when Heracles had abandoned me.
He was standing there, next to Annabeth and a boy that I assumed was Luke. HE didn't look so good, but his grip on his sword was steady, and it was held at Annabeth's throat. That could be a problem.
"Luke," growled Thalia. "Let her go."
He smiled. "That is the General's decision, Thalia. But it's good to see you again."
She spat.
"So much for old friends," said the General, chuckling. "And you, Zoë. It's been a long time. How is my little traitor? I will enjoy killing you."
"Do not challenge him," wheezed Artemis. "Do not respond."
"Wait a second." That was Percy. "So you're Atlas?"
"So, even the stupidest of heroes can finally figure something out. Yes, I am Atlas, the general of the Titans and the terror of the gods. Congratulations. I will kill you presently, as soon as I deal with this wretched girl."
"You're not going to hurt Zoë," he shot back. "I won't let you."
"You have no right to interfere," sneered Atlas. "This is a family matter."
Percy looked confused. "A family matter?"
"Yes," I said. "Atlas is my father."
I resumed my glare at Atlas. "Let Artemis go," I demanded.
He walked over to her. "Perhaps you'd like to take the sky for her? Be my guest."
"No!" shouted Artemis. "I forbid you!"
"You see, daughter? Lady Artemis likes her new job. I think I will have all the Olympians take turns carrying the burden, once Lord Kronos rules again, and this is the center of our palace. It will teach those weaklings some humility."
"I don't understand," said Percy. "Why can't Artemis just let go of the sky?
Atlas laughed. "How little you understand, young one. This is the point where Ouranos and Gaia first brought their mighty children, the Titans. The sky still yearns to embrace the earth. Someone must hold it at bay, or else it would crush down on this place, flattening everything within a hundred leagues. Once you have taken the burden, there is no escape. Unless someone takes it from you." He smiled.
Moving forward, he examined Thalia and Percy. "So these are the best heroes of the age, eh? Not much of a challenge."
"Fight us," said Percy boldly. "And let's see."
"Have the gods taught you nothing? An immortal does not fight a mere mortal directly. It is beneath our dignity. I will have Luke crush you instead."
I stopped paying attention to the conversation. My side was hurting so much…
… "And after that, Olympus itself. All we need is your help."
"You aren't Luke. I don't know you anymore."
"Yes, you do," he pleaded. "Please. Don't make me… Don't make him destroy.
We looked at each other. Then Percy spoke.
We charged.
I remember Atlas fighting Percy, and then Artemis fought, while Percy held up the sky. Atlas knocked down Artemis, and I charged him. He sent my flying, and I smashed into the unforgiving rocks. The rocks rumbled from the force of my body hitting it. So did I. Several ribs broke, as well as my leg. I knew right then, I would die. There was nothing anyone could do about it. If Apollo himself tried to heal me, I would die.
But Artemis picked me up in the chariot a short time later. Percy and Thalia were with her, both of them looking worried.
"Can't you heal her with magic?" asked Percy. "I mean… You're a goddess."
Artemis tried to set her hand on my side, but, weakly, I pushed her hand away. There was nothing she could do.
"Have I… served thee well?" I whispered.
"With great honor," she answered. "The finest of my attendants."
I relaxed. "Rest. At last."
I slowly turned to Thalia. "I am sorry that we argued," I whispered. "We could have been sisters."
"It's my fault," said Thalia. "You were right about Luke, about men – everything."
"Perhaps not all men," I responded, summoning up my last bit of strength. I turned to Percy and managed a smile. "Do you still have the sword, Percy?"
He nodded, pulling it out and setting it in my hand. I closed my hand around it, feeling it. Part of me was in it. The part that made it. "You spoke the truth, Percy Jackson. You are nothing like… Hercules. I am honored that you carry this sword." I shuddered, cold.
"Stars," I whispered. "I can see the stars again, my lady."
"Yes," answered Artemis, a tear trickling down her cheek. "They are beautiful tonight, my brave one."
"Stars," I whispered. I started to see black at the corner of my vision. MY last thought, as I drifted into oblivion, was this: Odessa would be proud.
I nearly cried while writing this. Rick Riordan didn't leave me with much of a choice. Oh well… Anyway, reviews would be nice. This is the last chapter of Forgotten. The next story will be called Child of the Titans. Until then!
Sa Rart
|
global_05_local_5_shard_00000035_processed.jsonl/33637
|
I don't own anything. Zip. Zilch.
Mary could say that she had the heart to take the tickets when she saw him lying in the hospice bed, when he forgot about her. She could say that she wanted to take them, as she left him, because she wanted to make absolutely certain that she was never again on his mind and never cause him pain. But it would be a lie. If he couldn't remember, then he could have a token of her to haunt him as he would haunt her for all of eternity.
Honestly how could she, the supposed stronger one, live with watching scar after scar mar his dark skin on her behalf? Why could she never just save herself? Because she was weak with him, physically and mentally. The fire in the air whenever he found her, over and over again in the past, burned into her memory, leaving the spiritual equivalent of the wounds he took for her in the moments of mortal weakness when they were supposed to find happiness, not heartbreak.
Mary remembered screaming, screaming his name as police drug her from the ambulance. As it drove further and further away the number of men needed to hold her back increased until she could stand no more.
Why did it always have to end exactly as before?
When Mary stood gazing into his unseeing eyes and saw no gleam of recognition on his haggard face she knew what her choice would be. He always found her before. But not this time. She hated him for making her weak, as she loved him for the very same reason. She hated the desire to protect built so strongly into every fiber of his being that nearly ended his life, and therefore, inadvertently, hers, more than once. For her. She loved him. She hated the overwhelming happiness that overflowed into agonizing sadness. Every. Single. Time.
She'd finally had enough. This time it would be different, not like before. The chance lined perfectly with her frustrations and his amnesia. She would not regret the decision. For once she would suffer more than him while he lived in forgetfulness.
So Mary reached for the tickets on that un-fateful night, meaning to leave him with one. His eyes keenly followed her movements and locked, confused and sleep-ridden, on her trembling fingers. With angry tears—she was drowning again—Mary slipped her hand away, turned, and quietly left him behind.
She disappeared with her gilded guilt, bent on enduring alone because she was the stronger one, but, leaving a trace of herself in his hands, it appeared only physically.
And it all ended just as before. While she suffered for a time, unknowingly, along with him, he suffered, alone, the most.
What can I say? I love the movie, and these two. Together. Or separate. Either way. I lovingly call them HanMar to those who agree that these two should totally have some serious make-up sex. Now where the hell is that sequel I've been hearing about...?
|
global_05_local_5_shard_00000035_processed.jsonl/33640
|
Disclaimer :
-I don't own any of the characters... they all belong to the super-genius Masashi Kishimoto-sensei... Dattebayo!
-Only the plot is mine... mine... mine...!
-All of my published works are Un-BETA-ed... and I don't use spellchecker... I publish right after I type... at work... hahaha!
-I am so fond of punctuations...
-I am soooo into UCHIHAcest... I soooo love Sasuke and Itachi Uchiha...
A/N : I finally finished the last part of my supposedly one-shot. Hope I can write a new one soon. I hope I don't get too busy. To all the faves and hates, thanks so much. That's the beauty of life. :D
Warning : This is a Yaoi Fic (If you have same-sex issues... then don't read)...
Sometimes, every hole in the house has a reason... ;)
The Walls Have Eyes
Previously :
Sasuke smiled, his dark eyes glittering with desire. "Then take me Itachi..." he whispered as he gently licked Itachi's shaft. He felt Itachi tremble with his touch. He coated Itachi's thick erection with his saliva, gently sucking on the skin in the process. Itachi wanted nothing more than to ram his member in Sasuke's delicious looking ass but he was sure he couldn't walk for the next few days and was sure someone would notice. He needed to be gentle so that he can be sure there will be a second time. Because now that he have tasted how sweet his brother was, he can't get enough of him.
Itachi looked at Sasuke, his dark eyes burning with desire. His sweet, not-so-innocent brother was willing to do the deed with him. He wanted Sasuke to devour his length, but the need to put his throbbing erection into Sasuke's love hole was more powerful. He reached for Sauske's hands and stopped him from teasing his almost bursting shaft. Itachi caught the glint of disappointment in his brother's eyes. "Was I not pleasing you enough, brother?" he asked worriedly. Itachi shook his head and gave his otouto an assuring smile "You please me more than anyone can Sasuke..." he said as he planted a soft kiss on his brother's lips.
Itachi got up. "Where are you going? I thought that you would take me... I thought..." he called out but stopped as soon as the words spilled. It was quiet embarrassing that he sounded so eager to be marked. But what can he do? His arousal was again awakened and the wanton need to be taken was slowly filling his sanity. Itachi looked back and smiled again "Patience otouto... we will get there..." Itachi murmured as he vanished into thin air. Sasuke scowled. Where was his brother going? He shamefully came quickly as his brother pleasured him with his mouth earlier. What the hell was he going to do with his growing erection?
Before he could exhale, he felt Itachi's strong arms wrap around his chest from behind "Did you miss me?" the elder raven asked huskily into his ear. Itachi showed Sasuke what he went out to get. Sasuke eyed the bottle and his eyes grew large "Tha-attt's..." he stammered. Itachi chuckled "Yes, it's mother's bath oil." Itachi said. "You see... as much as I want to claim you right now, we need to make things perfect. This is your first time isn't it?" Itachi asked. Sasuke nodded as pleasure circulated through his veins. "Are you sure you want this?" Itachi asked. Sasuke nodded "Hai! More than anything!" he confirmed.
Itachi smiled and began dropping butterfly kisses on Sasuke's shoulders as his hands moved to uncap the bottle and poured the sweet smelling oil on his palms. Sasuke grew delirious as the sweet smell of lavender flowers filled his nostrils. He watched through his droopy lids as Itachi coated his hands with the oil. Sasuke rested his back on Itachi, while he tried to calm himself. He was damn excited. He bit his lower lip as he felt Itachi's warm hands wrap around his weeping shaft. Itachi's hands were too slippery and even the slightest movement brought tremors of pleasure to him.
Sasuke threw his head over Itachi's shoulder, exposing a lot of his creamy neck. Itachi hungrily licked and sucked unto the warm skin as he continued to play with Sasuke's rock-hard pride. "Uhmn... Itachi-nii..." Sasuke whimpered as Itachi ran his index finger on the sensitive slit. He loved the way Sasuke whimpered. The delicious sounds Sasuke was doing was driving him insane. He can't hold on to it much longer. He bit through Sasuke's skin and sucked it, showing the young raven how much he wanted him. He heard Sasuke growl "That will bruise, you know..." he breathed out. Itachi just smiled.
"Go on all fours, otouto..." Itachi demanded. It sounded sinfully delicious and goosebumps started to decorate Sasuke's arms. He dropped on all fours and his naked ass was now exposed to Itachi. "Beautiful..." he heard Itachi comment. He looked back and frowned "Baka!" he growled. Itachi got the bottle again and poured an ample amount on Sasuke's buttocks. Sasuke gasped as he felt the warm oil flow down to his thighs. Their mother would not be that thrilled to find out that her favorite bath oil was all gone, but he cared none of that. He cared only to be marked by Itachi and that was all the matters.
Itachi caught the sliding oil with his index finger and spread it all over, making sure to fully coat his brother's twitching entrance. "Hah... Itachi-nii.. Umph.. Have you... have you.. ever done this before?" Sasuke asked, cutting off each word as he gasped for air. Itachi felt his mouth water and his member twitch "That's not important now..." he responded. Sasuke whimpered "It is for me..." he whispered. Itachi stood on his knees and leaned over, hugging Sasuke from behind. His long hair curtained over. He whispered directly into Sasuke's ear "I haven't wanted a man before... only you otouto..." he said and Sasuke heard what he wanted to know.
Itachi slowly inserted a finger into Sasuke. Sasuke gritted and whimpered. "Don't fight it... relax..." Itachi cooed. Sasuke tried to relax, the sensation was both pain and pleasure. He felt Itachi pull out and inserted a follow-up digit and then another. "Haahh..." he wailed. Itachi began to move his hand slowly at first, waiting for Sasuke's tensed muscles to relax. His cock was painfully burning with desire. He knew he had to wait for a few more minutes. He didn't want Sasuke to feel any pain, but if it will take longer than that he knew he could die. Itachi slowly finger-fucked Sasuke and soon heard moans of pleasure from his submissive lover.
Itachi could bear no more. He pulled his fingers out and heard Sasuke hiss with disappointment. He quickly poured more oil on his own throbbing erection and coated it, biting his lower lip to prevent himself from moaning. He adjusted himself behind his brother. "Nii-san..." Sasuke whispered. "This might hurt a bit..." Itachi warned Sasuke. He slowly placed the head of his shaft on Sasuke's entrance and slowly made his invasion. "Fuck! Itachi! That hurts! Pull out!" Sasuke screamed. Itachi wanted to continue, but the thought of hurting Sasuke stopped him. "Please relax... Sasuke... please..." Itachi pleaded.
Sasuke began taking deep breaths, as he concentrated on relaxing. It was very uncomfortable and Itachi was.. so to say, very huge. With all the love and patience he can muster, Itachi began to slowly invade Sasuke again. Sasuke tried his best not to scream. After all, he wanted this and he gave Itachi permission to do this to him. As Itachi slowly penetrated him, the elder raven continued touching him here and there. Soon Sasuke's attention was diverted to his own weeping cock and Itachi successfully penetrated him. The ripping pain was too much, but bearable. Sasuke took a couple of deep breaths, he felt sweat roll off his forehead down to his face.
Itachi didn't move, the pulsing of his shaft increased the moment he felt the warm delicious pressure wrap around his engorged erection. The feeling was utterly glorious. The best thing he ever tasted in his years of existence. No woman gave him this euphoric ecstasy. "Nii-san..." his thoughts were awakened as he heard Sasuke call out to him. "Please...move..." the younger asked. Itachi held on to Sasuke's legs and began moving, thrusting into the clenching muscles that was squeezing his cock to pleasurable heights. Sasuke gently rocked along with Itachi's rhythmn. It was a special dance made only for both of them.
"Itachi-nii..." Sasuke whimpered as Itachi added a bit more pressure with his thrusts. Sasuke have fully adjusted to him and he knew he can take harder and deeper thrusts. After a few more thrusts Sasuke screamed, not with pain but with pure pleasure. "Ahhh..." his brother's seductive screams echoed and tickled Itachi's ears. Itachi knew he hit Sasuke's pleasure point. It took him a good couple of minutes to locate it. Sasuke was ready and he can't stop... not anymore... Itachi needed release. He held Sasuke's hips tightly and rammed his entire length in and out of his brother's entrance.
Sasuke's body jerked with pleasure "Ohhh-Fuck! Itachi...aaahhh... shit!" Sasuke screamed as Itachi hit his prostrate over and over. Itachi leaned over and his sweat covered body collided with Sasuke's equally wet back. He reached for Sasuke's erection and began pumping it. His hands felt the shaft tremble and pulsate. He felt Sasuke's balls tighten. He was falling into the ecstatic pleasure as his body moved on it's own. He loved the feel of Sasuke's tight ass clenching his cock, the inexplainable pleasure of having his erection sucked by the delcious heat... a feeling he had no words to describe.
He felt the knot in the pit of his stomach grow numb. He increased his thrusts... in and out, pulling Sasuke's hips against him... meetng his thrusts as his other hand played with Sasuke rock-hard erection. Screams of lust and sexy moans filled the four corners of Sasuke's room. Itachi was sure that his brother's screams can be heard outside the house. He didn't care, their house was situated at the end of street and at the opening of Konoha's forest. No one would be there to listen and witness the deed they were engaged in. Itachi finally had his fill... "Fuck, Sasuke!" he screamed as he released his seed into Sasuke upon reaching his climax.
Sasuke came as again and Itachi's hand was coated with his love juice. Itachi took a few seconds of rest on Sauske's back to regain his breath. The young raven collapsed on the bed, tired and panting but fully satiated. Itachi removed his now growing limp member out of Sasuke and rolled off. As he was trying to calm down he heard Sasuke talk. "Nii-san... you were never fair to me." he mumbled. Itachi directed his eyes from the ceiling to Sasuke's lovely face "Whatever do you mean?" he asked as he reached forth and removed the stray lock of hair away from Sasuke's forehead.
Sasuke smiled. Though he looked tired, Itachi knew Sasuke was up to something. He was willing to bet his life that he saw a glint of naughtiness shine in Sasuke's dark orbs. Sasuke moved and rolled on top of Itachi. This time the young raven was the one pinning the other down. He leaned and kissed Itachi on the lips, releasing it only to gasp and breath. Itachi was loving every moment of it. Whatever Sasuke was doing to him felt incredibly arousing. Though it was just a few minutes after he came, he realized that he was growing hard again. Sasuke was taking his turn now, after all... Itachi never broke nor forget a promise.
Sasuke slowly slipped down and was now facing Itachi's member, bringing the not-so-limp shaft back to it's thrust-able state earlier. Itachi gritted his teeth as he felt Sasuke touch him. "Are you sure you've never done this?" he asked as he closed his eyes and gurgled a moan. Sasuke chuckled "I am sure..." he responded. "If you keep doing that, I might... oh, fuck!" Itachi cursed as he felt Sasuke take one of his balls into his warm mouth. "Sasuke...haahh..." Itachi moaned as Sasuke roamed his tongue over the base of Itachi's shaft and balls. Sasuke was pleased with the sounds Itachi was creating.
Sasuke got the bottle that was standing solely and uncapped on his bedside table. It was almost empty, but it still had enough content to achieve his goal. He was determined to make Itachi scream like he shamefully did earlier. He grinned wickedly as he reached for it and poured the oil on his hands. He then raised Itachi's legs and placed his calves on his shoulders. Sasuke was facing Itachi and he adjusted Itachi's distance until his cock touched Itachi's buttocks. Itachi looked at Sasuke and frowned "Otouto, I haven't... go slow..." he whispered. It was different when Itachi asked for something, it still sounded deliciously demanding.
Sasuke was glad that Itachi was keeping his promise, no force needed. He gently circled Itachi's entrance with his oily index finger and inserted it without warning. He saw Itachi cringe, but the elder raven didn't say a word. He added another digit, not as slowly as Itachi was with him earlier. He heard Itachi growl, but he was sure it wasn't displeasure. it sounded impatience. "Sasuke stop playing... please..." Itachi pleaded. The sexy pleading voice was enough to make Sasuke's cock weep double time. He can't believe how easily Itachi can turn him on... from the slightest touch to softest moan. He reacted to all of it.
He directed his rock-hard shaft on Itachi's entrance, hoping that he coated it properly. It was nice to dominate Itachi one in a while, but it was never his intention to hurt his aniki. He respected his brother. Sasuke, though inexperienced as he was remembered how gentle his brother was to him earlier. He was smart enough to identify that his brother needed to be stretched. Sasuke started to slide his fingers in and out of Itachi until his brother was cooing with pleasure. "Hmnnn... Sasuke..." Itachi moaned as he licked his sudden-dry lips from the pleasure he was getting and soon enough, his shaft's tip was crowned with pre-cum.
Sasuke felt Itachi getting impatient. He felt his brother's ass squeezing his fingers with every moan and sigh. He was hard, his throbbing erection was trying to find relief. He removed his fingers and got the same reaction he gave out earlier... an angry hiss of disappointment. He placed the tip of his erection on Itachi's entrance. He was already lubricated from earlier. He looked at Itachi and saw a nod, his brother was ready and so was he. He held Itachi's legs and slowly pushed himself in. He saw Itachi squint his eyes shut. "Fuck, Sasuke!" he spat. Sasuke closed his eyes as well. The sensation was undefined.
Itachi had all the rights to be proud that Sasuke was his brother. He was well-endowed as well. Both had a hard time but their lust for each other didn't stop them. Sasuke filled Itachi half-way, causing the elder rave to panth for air. "Sasuke, what the hell are you waiting for? Move, dammit!" Itachi gritted in between clenched teeth. Obediently, Sasuke did as he was told. He pushed his entire length in and Itachi gave yelp. "Hah! Oh, fuck... that feels so good!" Itachi quivered with delight as he held on the bed's side for support. Sasuke's single bed suddenly became two small for both of them.
"Itachi-nii... you are... so... tight... oh, shit!" Sasuke said as he slid in and out of Itachi's warm ass. He trembled from the delicious sensations he was getting from fucking Itachi. "Sasuke... harder... you're too slow... haahh..." Itachi complained. 'So Itachi wants it rough' Sasuke thought. He held on Itachi's legs and increased his pace, pulling Itachi harder against himself on every thrust. Itachi began screaming with pleasure. Sasuke supported his thrusts with his right hand on Itachi's leg while his left hand grabbed Itachi's shaft and gave it a good squeeze. Obscenities started leaving Itachi's lips, turning Sasuke on even more.
Sasuke released Itachi's cock and went back to push and pull his brother against him with both hands. Itachi was almost there. He grabbed his own erection and pumped it in time with Sauske's thrusts. Sasuke have never been this sexually aroused in his entire life. Looking at the way Itachi pumped himself and feeling his brother's tight, delicious ass was enough reason to make him cum for the third time. He breathed with his mouth as Itachi's groans and choice of words rang over him like the greatest piece of music ever written. He increased his speed, not aware of the heavy creaking the bed's wooden legs were making.
"Faster Sasuke... fuck me, harder... haahh... that's... it... harder..." Itachi demanded as his brother met his thrusts. He felt a wave of pleasure burst in him for the third time. He opened his eyes and saw that Itachi came hard with him. His brother's seed coated his hands ans abdomen. Itachi looked at Sasuke and his satisfied face made Sasuke realize that his brother was fully aware of what exactly happened between the two of them today. Sasuke searched his mind and then his heart... no regrets. Just a question of 'What now?'. He removed his cock from Itachi's ass. He dropped beside Itachi and tried to regain his breath.
They remained silent. No one dared to say a word. The only sound heard was the cricket's song in the forest. Sasuke looked at Itachi and his brother had his eyes closed. Sasuke felt a sudden uerge to touch Itachi and cuddle up to him. Sasuke was lost in trance. Whatever happened to them was beautiful and glorious. He was fully aware that this incident will change everything for both of them. He will look at Itachi in a different light now. This marks a new chapter of their lives. He never expected that he could fall for his brother like this so easily. It was a new feeling and he liked the feel of it.
"Nii-san..." he whispered and he heard Itachi's soft 'hn'. "What now?" he asked, hoping deep inside that his brother will not be offended with his blunt questioning. "What would you like to happen Sasuke? Are you having any regrets?" Itachi asked. Sasuke searched his heart, not even the slightest trace of guilt nor regret can be found. But it took him a few minutes to answer. "I don't regret it at all..." he responded. He felt Itachi move. He looked at his brother and saw that he was already standing. Itachi slowly picked his robe and slowly walked towards the door. Sasuke felt a suddrn lump form in his throat.
He got up and quickly caught up with Itachi. He buried his face on Itachi's back and wrapped his arms around his brother. "Don't go..." he murmured against the soft skin of his brother's back. Itachi smiled though Sasuke can't see it. "Why?" he asked, his voice in it's daily monotone. "Because... because..." Sasuke stammered. Itachi faced him and tilted his chin up a bit so their eyes would meet. Itachi was still a few inches taller than Sasuke. "Why should I stay?" he asked again. "Because I want you to stay..." was all Sasuke could muster, but it was enough reason for Itachi.
Itachi held Sasuke in his arms. They stayed that way. No exchange of words. They were just enjoying the newly found warmth... the long-lost feeling of comfort that was long gone came rushing back in. "I missed you..." Sasuke said, finally breaking the silence. Itachi ran his fingers on Sasuke's hair. "I missed you as well otouto..." Itachi confessed. They looked at each others eyes again. Their dark orbs did the talking the tongue dared not to say. Itachi cupped Sasuke's face and kissed him, no demands this time... just pure feeling. Sasuke gave soft sigh and kissed his brother back.
No awkward moments anymore. They both understood what the heart needed. This will not end today. This just marked everything anew. Sasuke looked at Itachi "Is this possible?" he asked. Itachi nodded "Of course otouto, we will make it possible." he replied. Sasuke smiled, for the first time he felt contented, light and free. He took Itachi's hand and wrapped it with his own. "So... what would you like for dinner?" Sasuke asked. Itachi chuckled "I haven't even had lunch yet." he said as he wandered off to the bathroom. "Dinner can wait... will you join me?" he asked with a smile.
Sasuke smirked at his brother. He looked back before joining Itachi. He frowned at what he saw. Itachi looked where Sasuke was looking at. "Well, it seems like you will be joining me in my room for a while..." Itachi commented. In the middle of the room lay Sasuke's broken bed. "I must fix it... before father and mother arrives. Mother will not be happy about this. First her oil and now a broken bed." he said as Itachi tugged him into the bathroom.
He heard Itachi laugh. "Don't fix it... leave it be." he whispered as he led Sasuke under the gush of water from the shower. "Mother will ask for an explanation..." he reasoned. "Sshhh... don't tire your pretty head, otouto. We will look for an alibi... we will lie..." he huskily whispered into his ear. Itachi's warm breath made Sasuke shiver. "And what would you tell her, hmmn?" he asked as he felt Itachi touch him. "Well, I will take blame on the oil... but for the bed... I think I will tell them that we sparred." he grinned wickedly. Sasuke smiled. They still have till Monday to spar and spar they will!
Finally, it's done!
I hope you all enjoyed my fic.
Thank you all, so much for being an inspiration.
This is not possible without you.
And to my darling koibito, wherever you are... I hope you are fine...
I miss you so much already.
R and R please. Thanks a lot.
Hugs and Kisses...
|
global_05_local_5_shard_00000035_processed.jsonl/33643
|
Smack me. I should have been working on To Become a Titan. Instead, I created this. OTL
I'm so sorry.
This chapter takes place before 'Terra'.
If you can, please take the time to review with your thoughts or any mistakes you find. :3
Chapter 1:
Curiosity is a funny thing. It's how people make discoveries, it drives people to do things, and sometimes curiosity kills the cat. Or in Danny's case, half-kills.
It was a normal day in his terms. Danny's parents had just finished one of their long-term projects, their greatest achievement: The Fenton Ghost Portal. Maddie and Jack Fenton were scientists of the paranormal, researchers, and above all: Ghost hunters.
While growing up, the Fenton family had been mocked, shunned, and overall ignored thanks to the unusual profession the elder Fentons had taken up. At first, Danny thought their job was cool despite some of the more dangerous moments. Jasmine Fenton tried to separate herself from the weirdness through academic achievements.
As Danny got older , he came to a realization that his lack of social status was almost directly related to the fact he was the son of 'weirdoes'. The thought made him grow a little bitter about their job, but otherwise accepted there wasn't much he could change.
His only two and best friends, Sam Manson and Tucker Foley, not only accepted him despite his unusual parents but actually thought the whole Fenton family was cool. His sister was a third best friend until her brains left Danny in her shadows.
That was his life up until the moment where his parents finished their effort-filled invention to open an inter-dimensional hole into another realm, the Ghost Zone.
It didn't work at first. Sam, Tucker, and Danny explored the lab after Danny's parents decided to take a break to relieve themselves of some of the disappointment that a measly spark and then nothing brought. It was Sam that added fuel to Danny's curiosity on the portal and what the Ghost Zone might be like.
He wasn't sure if it was because he thought Sam was the coolest friend a guy could ask for, or because Danny really had honestly been curious about the portal and Sam had pulled that curiosity to the front of his mind, but after she and Tucker left his house, Danny lay in bed awake that night with a plethora of thoughts on the portal downstairs.
He was only fourteen, how was Danny supposed to know that going downstairs in the middle of the night to get a peek at a supposedly failed portal project would change things?
According to the digital clock by his bedside, it was two in the morning when Danny crawled out of his bed with no luck at getting a wink of sleep. His brain was filled with the endless possibilities of the Ghost Zone, how his parents had been on the edge of a breakthrough that might change how the family was seen. They would be the N.A.S.A of Ghosts and might not be ridiculed anymore. Heck, they could be the Neil Armstrongs of the Ghost Zone.
Quietly, Danny tip-toed down stairs in his , blue eyes slowly adjusting to the dark as he found the door to the basement/lab. He took a breath, realizing his heart was pounding.
'C'mon, Fenton. What's the worst that'll happen?', Danny thought, smiling softly as he realized the worst would be having to clean the lab for a few days.
That wasn't always a bad thing since he was used to doing such anyways. He made his way down the steps, bare feet touching the cool tile of the lab. 'I should have worn shoes, though', Danny realized. At least there hadn't been any broken vials in a while.
The raven-haired boy scanned the dark room, touching the wall near the entrance. He ran his fingers up and down until he came across the light switch, hitting it. Light assaulted his eyes, making Danny close his eyelids quickly with a small hiss.
When he had adjusted to the lighting, the youngest Fenton opened his eyes to meet the portal's gaping dark opening. The portal took up quite a portion of the lab and it was hard not to see it.
Danny wiped the sweat gathering on his forehead with the back of his hand as he walked over, inspecting the entrance. It was still the same as when Tucker, Sam and himself stood before it. Still, he hadn't gotten a very good look inside before his parents had found them and distracted them with dinner.
Remembering protocol, Danny made his way to where his own custom Hazmat suit was hanging, quickly changing into the white and black outfit. It felt nice against his skin.
When he was dressed, Danny walked back to the portal, climbing up into it. He placed a hand against the wall to steady himself as he tried to get his barring and move forward.
It started as a small tremor. Danny had put it off as his own nerves, that he might be shaking, until it became violent and threw the boy around. His hand smacked a button in the middle of the chaos of what he now realized was an earthquake and he was in the worst possible location for one.
He didn't have time to think on escaping to somewhere safer like under the nearby lab desks, as the portal lit up and roared to life, Danny being caught in the power-up.
The pain was intense, like his insides were on fire and melting and his skin was being roasted but an accompanying feeling of powerthrew him off. Danny didn't know how long the shock lasted, but it ended when the metal walls around him cracked and protested. The portal around him shorted out as the whole lab was buried in rubble.
Slowly, consciousness filled his mind as he blinked into the darkness. No longer did he have to adjust, he could see just fine, though he wasn't sure if that was a good or bad thing as he eyed the broken plaster and other materials that had reinforced his house.
'Okay, let's get the facts straight: I'm caved in, underground, and there was just a major earthquake. I didn't tell a soul that I was going to the portal, so no one knows I'm down here. There's no air down here. I'm officially royally screwed.', Danny assessed the situation, deadpanning at the on switch that had shocked him. 'This is your fault, button. You and the sheer bad luck I have that an Earthquake would hit in the middle of the night- I wonder if everyone's alright. Still, I should stay put, moving stuff might make it worse…'
Danny hugged his knees as he tried to make himself more comfortable in his enclosed environment. He never considered himself a very claustrophobic person, especially since he seemed to spend quite a bit of time shoved in lockers, though he was becoming more and more painfully aware of how little space he had as time went on. 'Huh, at least there's no aftershock…'He thought as he looked around. Metal and rocks and that damn 'on' switch were the only sights for Danny to take in.
A tingling sensation took over him. It started with his fingers, slowly flowing through him until his whole being was tingling. At first, Danny just thought his body was falling asleep until he realized he was sinking into the floor of the portal. "Gah!" The boy shrieked, trying to pull himself up.
A loose wire served as his savior when he grabbed it, pulling himself out of the floor. The teen shook in a slight panic, placing a hand on his chest as he tried to slow his breathing.
"That…Was weird…" Danny panted, pulling his hand away to get a good look at it. "Hey, I could have sworn my gloves were black…" He blinked, curious at the color change.
He shrugged it off, deciding it must have been a new feature in the hazmat suits. When his hand suddenly turned invisible, Danny held back another yell. "Must have a camouflage feature…" He mumbled to himself. His mom would think of that, after all. "… Great, I'm talking to myself now. And probably wasting oxygen too…"
More time passed. Danny wasn't sure how long he waited until he started hearing a noise. It sounded like someone was digging or drilling. Was someone actually looking for him? He decided to chance it.
"Hey! In here! Survivor here! Heeeeeey! Please help!" He shouted at the top of his lungs. "Help me!"
Pebbles started to fall from the wall as the noise neared. Soon, cracks of light showed with an small glow of gold. It must have been morning already. "Over here." Danny said, pressing away from where the digger was breaking through.
Finally, a hole big enough to crawl through opened up, rocks flying out of the way. "Are you okay?" A voice Danny wasn't expecting asked. It was a girl's voice, after all. He would have thought a muscular man would be the one to save him, though he guessed a girl was possible too.
"Y-yeah…" Danny replied, peeking his head through the hole to meet a blonde girl with blue eyes and a silver hairclip. She was pretty, with a slightly boyish outfit.
"Wow," The girl stared at him. "… Has anyone ever told you that your eyes are pretty wicked?"
That confused Danny. "Uh, no. I mean, I've gotten compliments because they're blue, but wicked?" He asked as he brushed himself off, feeling his face heat up slightly.
"Blue?" The girl gave him a look that clearly said she thought he was delusional. "They look green to me. And what's with the get-up? Are you a hero or a meta-human or something?"
"Meta- What? And my eyes are blue." Danny gave her a blank look.
The blonde shook her head, reaching into the pocket of her blue shorts and pulling out a compact mirror. She opened it and pointed it at Danny so that he could see himself.
Danny stared at the image. A boy with glowing green eyes and white hair was staring back at him. The teenager brought a gloved hand to his face, the looking-glass's image copying his movement. "Oh god, am I dead? I look like a- A…"
"Ghost?" His rescuer supplied. "I think it makes you look pretty cool, Casper."
Danny glared at her. "It's not funny! My parents are ghost hunters-" He paused, realizing he didn't know her name.
"Terra." The girl grinned, clearly enjoying his display before she frowned, looking down. "That, uh… Might not matter anymore. I checked this whole house for survivors- Actually I checked a few houses because I felt bad. No one in this house made it but you…" She trailed off awkwardly.
"…" It was too much for the ghost boy as he felt his head spin. His parents and his sister had to make it. He couldn't be a ghost-
Danny passed out from the overload of information, Terra catching him. The blonde sighed. "I'm so sorry…" She mumbled guiltily. She was at fault, even if he didn't know it. White rings washed over the boy she was trying to drag him to safety, changing his outfit to . and his hair black. "… That's a neat trick." She whistled to herself.
"I'm not a ghost!" Danny shouted as he woke up from a nightmare. He slowly calmed down as his eyes adjusted to the fire before him.
"Morning Casper," Terra grinned at him. "Fish?" She asked, holding out a small, cooked fish with a stick speared through it.
"…" Danny only stared as he tried to process the situation, looking all around. They were in a forest with a small stream bubbling nearby. He was laying in a pile of leaves, clearly man-made.
Finally, his stomach growled, making Terra raise an eyebrow as she smirked. "C'mon, it won't bite."
Danny took the meal, taking slow bites. It was better than the food at school, at least.
"Sooooooooo," Terra tried to break the silence. "Judging by how you reacted back there, you're either a new meta-human or you're amnesiac. Do you know your name, Twinkles?"
"… It's Danny." Danny told her between bites. He had started wolfing down the fish and was soon finished. Terra handed him another, still smiling. "What do you mean by meta-human? I'm not a ghost?"
"Well, you changed to this boy with blue eyes and black hair, do ghosts turn human?" Terra retorted.
"So then… I only have ghost powers." Danny decided. "That makes sense. I did go intangible and invisible down there. I thought it was just part of the hazmat suit, but now that I think about it- " He dropped the fish, realizing that the portal might have brought these powers with that shock. He had almost forgotten that detail.
Reminder of the portal shifted to those who created it and those also occupying the house. His family didn't make it, if what Terra said was true.
"Hey, you okay?" Terra's face shifted to concern. "You didn't hit your head or anything during the earthquake, right?"
"… I just… My family… This whole 'powers' thing…" Danny shut his eyes, groaning as he held his head. "I need a little bit to think on it. This situation is surreal…"
The situation was made worse as his pants went intangible, meeting the ground. Danny opened his eyes, blushing as he pulled them back up, Terra chuckling at him.
"Nice taste in boxers," She teased, before scratching her head idly. "Sorry, I know how that feels. I shouldn't laugh…" After all, she was still unable to fully control her powers.
"You keep talking about meta-humans… Are you one?" Danny finally asked.
"Yup." Terra admitted. "I have, uh... Terrakinesis powers." After a look from Danny that clearly said he didn't know what that was, she added, "In Laymen's terms: It means I can control earth and rocks." She informed, holding out a hand. It started glowing with a golden aura and a few pebbles surrounding the fire floated above her hand with the same aura around them.
"Oh." Danny looked thoughtful. "So that's why you were able to rescue me. So you're like a superhero!" He grinned, proud of his deduction.
"…" The blonde couldn't help but grin back as she dropped the rocks. "Sure am. I'm more of a wanderer though. Places to go, people to see, y'know? Stopping a few bad guys along the way."
Danny slowly nodded. Normally, he would be over the moon at meeting a superhero and would have asked for her autograph, but he was still trying to recover from earlier. "… Are we outside of Amity Park?"
"Yeah, close by. Quite a few of the older buildings fell down, they weren't reinforced for that big of a quake. I didn't know where else to take you , so I brought you to my campsite." Terra answered. She didn't bother telling him how long she had been here.
Danny nodded again, gripping an elbow in thought. "If I go back there, I don't have a family anymore…" The only immediate family he could think of that might end up with him would be Aunt Alicia in the middle of nowhere, Arkansas. That wasn't a comforting thought at all.
Terra nervously gripped her knees. "Well… You could come with me." Why was she offering him this choice? Wasn't she only going to hurt him like everyone else?
'But he's got powers too. He's not completely defenseless. Maybe he can even help you,' A voice nagged at the back of her head. 'And maybe you can even help him somehow, since he's probably unstable too…' Terra sighed, knowing that was true.
Meanwhile, Danny had been pondering the idea. Traveling with Terra might help him, since he did have these new powers. It wasn't like staying would let him stay in Amity Park. She could probably even help him. Heck, she was a superhero, maybe he could help her fight bad guys or something as a sidekick. That would be interesting. "I… Can I join you then, Terra?"
"…Yeah." Terra allowed herself to give him a small smile. She held out a hand. Danny took it, shaking her hand with his own smile.
The moment was ruined by his hand turning invisible, Danny retracting the appendage in horror. "This is going to take a lot of getting used to…" He grumbled as Terra broke out laughing.
Terra had been respectful as she and Danny hid in the shadows of the mass held for the locals who had died in the earthquake, Danny covering himself with a hoodie that Terra had lent him, in his ghost form. There would be no viewing due to the conditions of some of the bodies, and funerals would be held later, though Terra had insisted that they should leave before then.
Reluctantly, Danny agreed. At the moment, he was trying his hardest not to cry. He had many regrets, like not telling his parents how much they really meant to him, or the fact he had been a little distant lately. This situation was too fast, he really didn't expect things to end like this. No more parents. No more Jazz. It hurt to think about it that way.
He recognized quite a few students from Casper high, though neither of his best friends had shown up. They weren't among the names of those missing or confirmed dead, though it was entirely possible they might be in the hospital.
Danny was surprised when his name was called and he subconsciously pulled the hood down further, as if it would protect him. He blocked out any Fenton names that came after his, Terra placing a hand on his shoulder as a gesture of comfort.
Eventually, people started going up and telling stories about those who were lost. Danny had been surprised to see a silver-haired middle-aged man stroll up who identified himself as a friend and the godparent of Jazz and Danny, then he started telling stories about their parents: Most reflected positively about Maddie Fenton in their 'College days'.
"Terra," Danny turned to her. "Let's go." He didn't want to listen to anything else about his deceased parents. It would break his resolve on not crying.
"Huh?" Terra blinked. "But he was just getting to the backwash incident-"
"Please?" Danny's glowing eyes stared at her from under the hood. "I… I don't- Let's just go."
Terra shrugged, deciding to spare Danny anymore discomfort. "Alright. Let's go."
Danny took her wrist, turning them both invisible and intangible as he started floating in the air. Flying had been almost second nature since the moment he discovered he had that power.
The girl didn't seem bothered as they flew over the audience and out of the building, though she swore she saw a wisp escape the silver-haired man's mouth. 'Must be really cold up there,' She thought as they escaped to an alley, where Danny set her down, both turning tangible and visible.
"So Danny, where to? Any place you wanna go?" Terra asked, trying to take his mind off his recent loss.
"… Anywhere but here." Danny smiled softly as he pulled the hood off, running a hand through his white locks. It felt like a great pressure was lifted off his chest.
"… Cool, that narrows things." Terra grinned, before running in a direction. "Race you!"
"…" Danny stared after the blonde for a moment before running after her. He idly noted that he was much faster than before the accident. "You're on, Terra!"
"Y'know, you're gonna need a superhero name, if you're gonna keep doing this. I don't think villains would bow down to the unholy powers of 'That ghost kid'," Terra teased as she and Danny sat in a dinner, a place she had personally picked out. Currently, they were in South Dakota. "Any ideas? I'd offer Casper, but you keep hitting me every time I do."
Danny shrugged, scratching his neck. "Dunno. I'm down to Specter and Phantom."
"Oh, I like Phantom!" Terra gave two thumbs of approval. "Just Phantom then?"
"Danny Phantom." Danny couldn't help but grin. "I know, maybe it's a little lame, but I like it."
Terra shrugged. "No shame in changing something that works. It fits you, Danny."
"Thanks, I think…" Danny mumbled, white hair falling in his face. He tried to blow it away, before just brushing it with his fingers. "Man, weeks ago, I'd never think I'd even have to decide something like that. The biggest decision I had to make back then was whether to eat dinner or hide from it…"
Terra snickered. "C'mon, the food couldn't have been that bad."
"Once, the Thanksgiving turkey came to life and tried to kill us, Terra. I'm not joking." Danny made a face as he recalled the meal. "My parents made the weirdest things."
"… I'm sorry I didn't get to meet them. They sound cool, from what you've told me." Terra sighed. "… I would have loved fighting that turkey." She joked.
Both of them laughed, Danny imagining how the fight would turn out. Terra would probably win, he decided.
The ground under them started to shake slightly, making Terra sober up. It seemed Danny hadn't noticed, so she grabbed his hand, pulling him up while grabbing the bag that held all her belongings, along with one she had gotten Danny for his few belongings he had recovered before they left Amity. "Let's go!"
Danny was confused as Terra threw some cash onto the table, leading him out the door. Their meal hadn't even come, what was the hurry? "In the air," Terra simply said, looking away from him to hide her glowing eyes.
The ghost boy took that as his cue, wrapping his arms around her waist as he hoisted her into the air, his legs shifting into a tail. "Terra, what's wrong?" He asked as he created more distance between them and the ground.
"I… I can't tell you." Terra shook her head, her normally carefree attitude gone as she watched the ground.
"Terra," Danny frowned. "Come on, people don't just rush out of a restaurant like that without a reason."
"I'm fine!" The blonde protested quickly, before taking a breath. "Look, let's keep moving. I hear the west coast is nice this time of year…" Terra tried to change the subject.
Danny sighed, deciding not to press the issue for now. "Yeah, that sounds nice… Which way?"
Terra looked around for a moment, before pointing in a specific direction. "That way." She said simply.
Danny wondered if she were some kind of living compass or something as he flew them towards where she wanted. He hoped she might tell him another time what had happened.
The rest of the flight was silence until Danny got tired, where they had to descend and find somewhere to sleep for the night. The restaurant incident wasn't brought up again.
|
global_05_local_5_shard_00000035_processed.jsonl/33663
|
When my kids were in preschool they loved pouring over catalogs from companies like Birthday Express and declaring that their next party would be a "Bob the Builder Party" or a "Cowgirl Party." At the time it made me sad that they were taking all their party ideas from catalogs. That was before they became more creative and started developing their own themes. Themes for which there were no easy-to-buy decorations! It's more creative, more original and more fun to create a theme, or choose a theme for which there aren't commercial products available, but it's also more work. That's why we have tips on how to do it. As always with kids' parties the first step is to find out what your child means by a specific theme. Do they mean a certain color of plates or napkins? Activities? Invitations? Assuming the birthday girl wants decorations and activities, Pinterest is your friend. Even if your child has completely made up a theme (Princess Cowboys in Outer Space?) parts of it have been done by someone, somewhere. This year my kids wanted Wild Kratts and Little House on the Prairie. Both are popular with kids, but don't have official merchandise (something I'm generally glad about). I used Pinterest to help find ideas, and created the boards (linked above). Sometimes a theme may have some commercially available elements, but you want to be more creative (and save some money).
Check out our Dr. Seuss party board for ideas people have had creating different Dr. Seuss themes. As always, entertainment can really help bring a theme to life. Even if an entertainer doesn't seem like a perfect fit for your theme, talk to the entertainer about your ideas. A magician might be able to do tricks involving animals for an animal party, or baseballs for a sports party. A Balloon Twister can create almost anything to work with your theme either as a centerpiece or an activity/party favor and musicians know all sorts of songs! When you're done creating your original theme party, don't forget to make your own board on Pinterest and let us know about it, too!
|
global_05_local_5_shard_00000035_processed.jsonl/33683
|
Skip to main content
anyone used JTHarness with Groovy to provide higher level test framework
1 reply [Last post]
Joined: 2007-06-12
As anyone, used Groovy in combination with JTharness (or vice-versa) to create a higher level application test framework. That is not only API test framework, but distributed application test framework?
Reply viewing options
Joined: 2004-12-13
I have not heard of anybody using this within the JT Harness. This doesn't mean that nobody has done it - they may not have told us.
JT Harness Project Owner/Developer
|
global_05_local_5_shard_00000035_processed.jsonl/33689
|
32 CFR 11.5 - Definitions.
§ 11.5 Definitions.
(a) Combatant immunity. Under the law of armed conflict, only a lawful combatant enjoys “combatant immunity” or “belligerent privilege” for the lawful conduct of hostilities during armed conflict.
(b) Enemy. “Enemy” includes any entity with which the United States or allied forces may be engaged in armed conflict, or which is preparing to attack the United States. It is not limited to foreign nations, or foreign military organizations or members thereof. “Enemy” specifically includes any organization of terrorists with international reach.
(c) In the context of and was associated with armed conflict. Elements containing this language require a nexus between the conduct and armed hostilities. Such nexus could involve, but is not limited to, time, location, or purpose of the conduct in relation to the armed hostilities. The existence of such factors, however, may not satisfy the necessary nexus (e.g., murder committed between members of the same armed force for reasons of personal gain unrelated to the conflict, even if temporally and geographically associated with armed conflict, is not “in the context of” the armed conflict). The focus of this element is not the nature or characterization of the conflict, but the nexus to it. This element does not require a declaration of war, ongoing mutual hostilities, or confrontation involving a regular national armed force. A single hostile act or attempted act may provide sufficient basis for the nexus so long as its magnitude or severity rises to the level of an “armed attack” or an “act of war,” or the number, power, stated intent or organization of the force with which the actor is associated is such that the act or attempted act is tantamount to an attack by an armed force. Similarly, conduct undertaken or organized with knowledge or intent that it initiate or contribute to such hostile act or hostilities would satisfy the nexus requirement.
(d) Military Objective. “Military objectives” are those potential targets during an armed conflict which, by their nature, location, purpose, or use, effectively contribute to the opposing force's war-fighting or war-sustaining capability and whose total or partial destruction, capture, or neutralization would constitute a military advantage to the attacker under the circumstances at the time of the attack.
(e) Object of the attack. “Object of the attack” refers to the person, place, or thing intentionally targeted. In this regard, the term includes neither collateral damage nor incidental injury or death.
(f) Protected property. “Protected property” refers to property specifically protected by the law of armed conflict such as buildings dedicated to religion, education, art, science or charitable purposes, historic monuments, hospitals, or places where the sick and wounded are collected, provided they are not being used for military purposes or are not otherwise military objectives. Such property would include objects properly identified by one of the distinctive emblems of the Geneva Conventions but does not include all civilian property.
(g) Protected under the law of war. The person or object in question is expressly “protected” under one or more of the Geneva Conventions of 1949 or, to the extent applicable, customary international law. The term does not refer to all who enjoy some form of protection as a consequence of compliance with international law, but those who are expressly designated as such by the applicable law of armed conflict. For example, persons who either are hors de combat or medical or religious personnel taking no active part in hostilities are expressly protected, but other civilians may not be.
(h) Should have known. The facts and circumstances were such that a reasonable person in the Accused's position would have had the relevant knowledge or awareness.
Title 32 published on 2014-07-01.
No entries appear in the Federal Register after this date, for 32 CFR Part 11.
United States Code
|
global_05_local_5_shard_00000035_processed.jsonl/33691
|
9 CFR 112.2 - Final container label, carton label, and enclosure.
§ 112.2 Final container label, carton label, and enclosure.
(a) Unless otherwise provided, final container labels, carton labels, and enclosures (inserts, circulars, or leaflets) shall include the information specified in this section.
(1) The principal part of the true name of the biological product which name shall be identical with that shown in the product license under which such product is prepared, or the permit under which it is imported, shall be prominently lettered and placed giving equal emphasis to each word composing it. Descriptive terms used in the true name on the product license or permit shall also appear. Abbreviations of the descriptive terms may be used on the final container label if complete descriptive terms appear on a carton label and enclosures;
(2) If the biological product is prepared in the United States, the name and address of the producer (licensee or subsidiary) or if the biological product is prepared in a foreign country, the name and address of the permittee and of the foreign producer.
(3) The license or permit number assigned by the Department which shall be shown only in one of the following forms respectively: “U.S. Veterinary License No. ___,” or “U.S. Vet. License No. ___,” or “U.S. Vet Lic. No. ___,” or “U.S. Veterinary Permit No. ___,” or “U.S. Permit No. ___.”
(4) Storage temperature recommendation for the biological product stated as not over 45 °F. or stated as not over 7 °C. or stated as not over 45 °F. or 7 °C.
(5) Full instructions for the proper use of the product, including vaccination schedules, warnings, cautions, and the like: Provided, That in the case of very small final container labels or carton, a statement as to where such information is to be found, such as “See enclosure for complete directions,” “Full directions on carton,” or comparable statement;
(6) In the case of a multiple-dose final container, a warning to use entire contents when first opened: Provided, That a diagnostic or a desensitizing antigen packaged in a multiple-dose final container is exempt;
(7) If the biological product contains viable or dangerous organisms or viruses, a warning to “Burn this container and all unused contents,” except that in the case of a small one-dose container, the statement “Burn this container” or “Burn this vial” may be used.
(8) In the case of a biological product recommended for use in domestic animals, the edible portion of which may be used for food purposes, a withholding statement of not less than 21 days to read: “Do not vaccinate within (insert number) days before slaughter” or “Do not vaccinate food-producing animals within (insert number) days before slaughter”: Provided, That longer periods shall be stated when deemed necessary by the Administrator. Very small final container labels are exempted from this requirement.
(9) The following information shall appear on the final container label and carton label, if any, but need not appear on the enclosure:
(i) A permitted expiration date;
(ii) The number of doses where applicable;
(iii) The recoverable quantity of the content of each final container stated in cubic centimeters (cc.) or milliliters (ml.) or units.
(iv) A serial number by which the product can be identified with the manufacturer's records of preparation: Provided, That when a liquid antigenic fraction is to be used instead of a water diluent for one or more desiccated antigenic fractions in a combination package, a hyphenated serial number composed of a serial number for the desiccated fraction and the serial number for the liquid fraction shall be used on the carton;
(10) In the case of a product which contains an antibiotic added during the production process, the statement “Contains ___ as a preservative,” or an equivalent statement indicating the antibiotic added shall appear on cartons and enclosures if used: Provided, That if cartons are not used, such information shall appear on the final container label;
(11) The number of final containers of biological product and the number of doses in each final container shall be stated on each carton label for all cartons containing more than one final container of biological product. The number of final containers of diluent, if any, and the quantity in each shall also be stated on each carton label.
(b) Labels may also include any other statement which is not false or misleading and may include factual statements regarding variable response of different animals when vaccinated as directed but may not include disclaimers of merchantability, fitness for the purpose offered, or responsibility for the product.
(c) Labels of biological products prepared at licensed establishments or imported shall not include any statement, design, or device, which overshadows the true name of the product as licensed or which is false or misleading in any particular or which may otherwise deceive the purchaser.
(d) Carton labels and enclosures shall be subject to paragraph (d)(1), (d)(2), and (d)(3) of this section.
(1) The statement, “Restricted to use by or under the direction of a veterinarian” or “Restricted to use by a veterinarian,” shall be used on all carton labels and enclosures when such restriction is prescribed on the product license.
(2) If the licensee states on the carton labels and enclosures of a product that its sales are restricted to veterinarians, then the entire production of that particular product in the licensed establishment shall be so restricted by the licensee.
(3) The statement “For veterinary use only” or an equivalent statement may appear on the carton labels and enclosures for a product if such statement is being used to indicate that the product is recommended specifically for animals, and not for humans.
(e) When label requirements of a foreign country conflict with the requirements as prescribed in this part, special labels may be approved for use on biological products to be exported to such country. When laws, regulations, or other requirements of foreign countries require exporters of biological products prepared in a licensed establishment to furnish official certification that such products have been prepared in accordance with the Virus-Serum-Toxin Act and regulations issued pursuant thereto, such certification may be made by Animal and Plant Health Inspection Service upon request of the licensee.
(f) If a carton label or an enclosure is required to complete the labeling for a multiple-dose final container of liquid biological product, only one final container shall be packaged in each carton: Provided, That if the multiple-dose final container is fully labeled without a carton label or enclosure, two or more final containers may be packaged in a single carton which shall be considered a shipping box. Labels or stickers for shipping boxes shall not contain false or misleading information but need not be submitted for approval.
(Approved by the Office of Management and Budget under control number 0579-0013)
[38 FR 12094, May 9, 1973, as amended at 39 FR 16856, May 10, 1974; 41 FR 44359, Oct. 8, 1976; 42 FR 11825, Mar. 1, 1977; 42 FR 29854, June 10, 1977; 42 FR 41850, Aug. 19, 1977; 48 FR 57473, Dec. 30, 1983; 56 FR 66784, Dec. 26, 1991]
Title 9 published on 2015-01-01.
No entries appear in the Federal Register after this date, for 9 CFR Part 112.
|
global_05_local_5_shard_00000035_processed.jsonl/33692
|
10 U.S. Code § 2922g - Preference for motor vehicles using electric or hybrid propulsion systems
prev | next
(a) Preference.— In leasing or procuring motor vehicles for use by a military department or Defense Agency, the Secretary of the military department or the head of the Defense Agency shall provide a preference for the lease or procurement of motor vehicles using electric or hybrid propulsion systems, including plug-in hybrid systems, if the electric or hybrid vehicles—
(1) will meet the requirements or needs of the Department of Defense; and
(2) are commercially available at a cost, including operating cost, reasonably comparable to motor vehicles containing only an internal combustion or heat engine using combustible fuel.
(b) Exception.— Subsection (a) does not apply with respect to tactical vehicles designed for use in combat.
(c) Relation to Other Vehicle Technologies That Reduce Consumption of Fossil Fuels.— The preference required by subsection (a) does not preclude the Secretary of Defense from authorizing the Secretary of a military department or head of a Defense Agency to provide a preference for another vehicle technology that reduces the consumption of fossil fuels if the Secretary of Defense determines that the technology is consistent with the energy performance goals and plan of the Department required by section 2911 of this title.
(Added Pub. L. 111–84, div. B, title XXVIII, § 2844(a),Oct. 28, 2009, 123 Stat. 2682; amended Pub. L. 112–81, div. B, title XXVIII, § 2821(b)(3),Dec. 31, 2011, 125 Stat. 1691.)
2011—Subsec. (d). Pub. L. 112–81struck out subsec. (d), which defined “hybrid”.
Pub. L. 111–84, div. B, title XXVIII, § 2844(c),Oct. 28, 2009, 123 Stat. 2682, provided that: “The Secretary of Defense shall prescribe regulations to implement section 2922g of title 10, United States Code, as added by subsection (a), within one year after the date of the enactment of this Act [Oct. 28, 2009].”
|
global_05_local_5_shard_00000035_processed.jsonl/33717
|
Testing for Vulnerable Remember Password and Pwd Reset (OWASP-AT-006)
Revision as of 11:07, 18 August 2008 by Marco (Talk | contribs)
Jump to: navigation, search
OWASP Testing Guide v2 Table of Contents
Brief Summary
Several web applications allow users to reset their password if they have forgotten it, usually by sending them a password reset email and/or by asking them to answer one or more "security questions". In this test, we check that this function is properly implemented and that it does not introduce any flaw in the authentication scheme. We also check whether the application allows the user to store the password in the browser ("remember password" function).
Description of the Issue
A great majority of web applications provide a way for users to recover (or reset) their password in case they have forgotten it. The exact procedure varies heavily among different applications, also depending on the required level of security, but the approach is always to use an alternate way of verifying the identity of the user. One of the simplest (and most common) approaches is to have on file the user's email address (e.g., this is obtained when the user first registers), and send the old password (or a new one) to that address. This scheme is based on the assumption that the user's email has not been compromised and that is secure enough for this goal.
Alternatively (or in addition to that), the application could ask the user to answer one or more "secret questions", which are usually chosen by the user among a set of possible ones. The security of this scheme lies in the ability to provide a way for someone to identify themselves to the system with answers to questions that are not easily answerable via personal information lookups. As an example, a very insecure question would be “your mother’s maiden name” since that is a piece of information that an attacker could find out without much effort. An example of a better question would be “favorite grade-school teacher” since this would be a much more difficult topic to research about a person whose identity may otherwise already be stolen.
Another common feature that applications use to provide users a convenience is to cache the password locally in the browser (on the client machine) and having it 'pre-typed' in all subsequent accesses. While this feature can be perceived as extremely friendly for the average user, at the same time, it introduces a flaw, as the user account becomes easily accessible to anyone that uses the same account on the client machine.
Black Box Testing and Examples
Password Reset
The first step is to check whether secret questions are used. Sending the password (or a password reset link) to the user email address without first asking for a secret question means relying 100% on the security of that email address, which is not suitable if the application needs a high level of security.
On the other hand, if secret questions are used, the next step is to assess their strength.
As a first point, how many questions need to be answered before the password can be reset? The majority of applications only need the user to answer to one question, but some critical applications require the user to answer correctly to two or even more different questions.
As a second step, we need to analyze the questions themselves. Often a self-reset system offers the choice of multiple questions; this is a good sign for the would-be attacker as this presents him/her with options. Ask yourself whether you could obtain answers to any or all of these questions via a simple Google search on the Internet or with some social engineering attack. As a penetration tester, here is a step-by-step walk-through of assessing a password self-reset tool:
• Are there multiple questions offered?
• If so, try to pick a question which would have a “public” answer; for example, something Google would find with a simple query
• Always pick questions which have a factual answer such as a “first school” or other facts which can be looked up
• Look for questions which have few possible options, such as “what make was your first car”. These questions would present the attacker with a short-list of answers to guess at and based on statistics the attacker could rank answers from most to least likely
• Determine how many guesses you have (if possible)
• Does the password reset allow unlimited attempts?
• Pick the appropriate question based on analysis from above point, and do research to determine the most likely answers
• How does the password-reset tool (once a successful answer to a question is found) behave?
• Does it allow immediate change of the password?
• Does it display the old password?
• Does it email the password to some pre-defined email address?
• The most insecure scenario here is if the password reset tool shows you the password; this gives the attacker the ability to log into the account, and unless the application provides information about the last login the victim would not know that his/her account has been compromised.
• A less insecure scenario is if the password reset tool forces the user to immediately change his/her password. While not as stealthy as the first case, it allows the attacker to gain access and locks the real user out.
• The best security is achieved if the password reset is done via an email to the address the user initially registered with, or some other email address; this forces the attacker to not only guess at which email account the password reset was sent to (unless the application tells that) but also to compromise that account in order to take control of the victim access to the application.
The key to successfully exploiting and bypassing a password self-reset is to find a question or set of questions which give the possibility of easily acquiring the answers. Always look for questions which can give you the greatest statistical chance of guessing the correct answer, if you are completely unsure of any of the answers. In the end, a password self-reset tool is only as strong as the weakest question. As a side note, if the application sends/visualizes the old password in cleartext it means that passwords are not stored in a hashed form, which is a security issue in itself.
Password Remember
The "remember my password" mechanism can be implemented with one of the following methods:
1. Allowing the "cache password" feature in web browsers. Although not directly an application mechanism, this can and should be disabled.
2. Storing the password in a permanent cookie. The password must be hashed/encrypted and not sent in the clear.
For the first method, check the HTML code of the login page to see whether browser caching of the passwords is disabled. The code for this will usually be along the following lines:
<INPUT TYPE="password" AUTOCOMPLETE="off">
The password autocomplete should always be disabled, especially in sensitive applications, since an attacker, if able to access the browser cache, could easily obtain the password in cleartext (public computers are a very notable example of this attack). To check the second implementation type, examine the cookies stored by the application. Verify that the credentials are not stored in cleartext, but are hashed. Examine the hashing mechanism: if it is a common, well-known algorithm, check for its strength; in homegrown hash functions, attempt several usernames to check whether the hash function is easily guessable. Additionally, verify that the credentials are only sent during the login phase, and not sent together with every request to the application.
Gray Box Testing and Examples
This test uses only functional features of the application and HTML code that is always available to the client, the graybox testing follows the same guidelines of the previous paragraph. The only exception is for the password encoded in the cookie, where the same gray box analysis described in the Cookie and Session Token Manipulation AoC chapter can be applied.
OWASP Testing Guide v2
|
global_05_local_5_shard_00000035_processed.jsonl/33718
|
User talk:Abraham Kang
Saltar a: navegación, buscar
1. sidebar TableOfContents
This page is under construction!
Output Encoding
Output encoding is the process by which characters which could be interpreted as directives or instructions within an output context are converted to their literal string equivalents. For example, basic output encoding in an HTML context would require "<", ">", "double quote", "single quote", and "&" to be converted to their HTML entity equivalents. Here are some examples:
& --> &
< --> <
> --> >
" --> "
\’ --> &\#x27;
In a SQL context "single quote" characters may get escaped to "’’" (double single quotes) or "\’" (back slash single quote). In a URL context, characters which could have special meaning in a URL (such as ?, &, =, #, etc.) are converted to their %2DigitHexEquivalent (eg: space becomes %20 or "+"). In all cases, characters which have special meaning in their output context are converted to a format that the interpreter/parser in the output context considers plain text (non-executable instructions or directives). Output encoding is one of the most effective ways to mitigate against cross-site scripting and other attacks. However, output encoding is a topic which has been over simplified. Today many Web 2.0/AJAX applications output data in non-trivial contexts. Non-trivial contexts are contexts which are composed of multiple or different contexts then the context which the data was originally placed in. Output encoding contexts can be categorized into the following contexts:
## Simple Context
## Mutating (Chameleon) Contexts
## Multi-Context Contexts
## Encoding Cleansing Contexts
## Reverse Encoding Contexts
## Lower-level Contexts
Simple Context
A simple context is one which does not change. The XSS (Cross Site Scripting) Prevention Cheat Sheet deals with these types (HTML, HTML attribute, URL, CSS, and JavaScript Contexts). A simple context is clearly visible and does not have any other contexts mixed in. For example in HTML page:
{{{ <%= ESAPI.encoder().encodeForHTML( request.getParameter( "input" ) )%> }}}
If the encoding is done correctly and there are unified and specified character sets, an attacker should not be able to escape out of this context.
Non-trivial Contexts
Simple contexts were common in request/response applications however most modern applications (Web 2.0/AJAX) have more complicated contexts. These contexts were caused by the need to execute JavaScript/VBScript from user generated events.
With the birth of Web 2.0/AJAX applications came the proliferation of client side Javascript/VBScript and the vulnerabilities associated with these scripting languages. JavaScript and VBScript are powerful languages having tight integration with HTML. HTML can execute script both from {{{<SCRIPT>}}} tags and HTML tag attributes. As a result, data placed in the script executing attributes can change their context from the original context it was placed in. One example of this is the Mutating (Chameleon context).
Mutating (Chameleon) Context
The Mutating (Chameleon) context is a context which looks like one context but really is another. It is best understood by looking at some examples:
{{{ <img src="javascript:<%=request.getParameter("userData")%>" /> }}}
Because of the src attribute, some developers might get confused and think the data is being output in a URL context. In this case, URL encoding "*userData*" does not do anything because it is implicitly reverse encoded by the browser (because we are encoding for the wrong context). In the example above, "userData" should have been JavaScript encoded because it is in a JavaScript context.
Another example is the following:
{{{ <DIV STYLE="width: expression(jsFunctionCall(<%=request.getParameter("userData2")%>));"> }}}
The *STYLE* attribute seems to indicate that *userData2* is placed in a CSS context but the *expression()* method is utilized to call JavaScript. Using CSS encoding here would be not stop XSS from occurring.
In the examples above, utilizing JavaScript encoding would mitigate against XSS in the direct context which the output data was placed but does not mitigate against DOM based XSS. If userData is passed to a vulnerable JavaScript/VBScript function within the processing logic of the script methods being called, the encoded data could become exploitable. Because data which is passed into JavaScript/VBScript functions could theoretically be passed to multiple vulnerable contexts the next context type is called a multi context.
Multi Context
A multi context primarily occurs when user data is passed as parameters to a script function from a URL, event handler method, CSS expression() method, or script context. In order to use the appropriate output encoding, the developer will need to trace the data flow of the untrusted data and make sure that the data does not flow to any vulnerable contexts (HTML context using document.write() or innerHTML, URL context using window.location and the "javascript:" protocol, CSS context setting background URL attributes, JavaScript context using the eval() method, etc.). In some cases if you notice that the parameter only is output in an HTML context using document.writeln() you can HTML encode the data then JavaScript encode the data (in that order) before placing it in the page.
Let\’s look at an example to solidify this concept:
{{{ <a href="javascript:doCalculations(’<%=request.getParameter("reportName")%>’)">Run Report</a> }}}
In order to stop JavaScript inlining in the "*Run Report*" link, the "reportName" request parameter needs to be JavaScript encoded. However, this may not be enough.
If the doCalcuations() function looked like the following then JavaScript encoding would not be sufficient to mitigate against XSS.
{{{ function doCalculations(reportName) {
Var reportCal = doReportCalc();
" + reportName + "
} }}}
If this was the only dangerous usage of "reportName" then the appropriate output encoding to use would be HTML encoding followed by JavaScript encoding. The JavaScript encoding would stop any attempts to inline code in the anchor href attribute and the HTML encoding would stop any XSS attempts in the document.writeln() call of the doCalculations() function.
But multi contexts can get even more complicated when user data passed in to a script function is output to possibly multiple contexts (URL and HTML). In this case, trying to use multiple nested encoding would likely break the application (URL encoding, then, HTML encoding, then JavaScript encoding as an example). In this case, we would have to revert to JavaScript encoding to prevent inlining of code in the anchor href attribute but then rely on additional JavaScript encoding methods to facilitate proper output encoding in script code (where the context is known). ESAPI4JS is a JavaScript library which provides JavaScript encoding methods to address DOM based XSS.
{{{ function doCalculations(reportName) {
Var reportCal = doReportCalc();
" + $ESAPI.encoder().encodeForHTML(reportName) + "
} }}}
In the new doCalculations() function above the proper encoding has taken place in a location where the context is readily discernable. This allows application developers to only have to focus on the primary context while the JavaScript developers deal with the context which they create. Ideally, using a JavaScript library to do output encoding makes sense. Although the example above seems a bit contrived. There are other contexts where a JavaScript encoding library would be required. The Encoding Cleansing Context is one of them.
Encoding Cleansing Context
The encoding cleansing context occurs when data is stored in a value attribute of an HTML element. Often times Web 2.0/AJAX applications store commonly used data or initialization data in the value attributes of hidden fields, textarea elements hidden with CSS, or directly in JavaScript variables. The problem is that data which is placed in the value attribute of a HTML element loses its HTML encoding when the value is later retrieved by DOM methods.
Given the following HTML, you are not directly vulnerable to XSS:
{{{ <input type="hidden" id="tempHolder" value="<%= ESAPI.encoder().encodeForHTML( request.getParameter( "initData" ) )%>" /> }}}
The value in the source is
{{{ <input type="hidden" id="tempHolder" value="&\#x3C;&\#x73;&\#x63;&\#x72;&\#x69;&\#x70;&\#x74;&\#x3E;&\#x61;&\#x6C;&\#x65;&\#x72;&\#x74;&\#x28;&\#x31;&\#x32;&\#x33;&\#x29;&\#x3C;&\#x2F;&\#x73;&\#x63;&\#x72;&\#x69;&\#x70;&\#x74;&\#x3E;" /> }}}
However, if a DOM method was used to retrieve the value and write it out using a document.writeln() you would have exploitable XSS.
The above line would cause a pop up with "123" as the string message.
Server side output encoding does not work here. The only choice is to utilize a JavaScript encoding library like ESAPI4JS and change to line above to the following:
{{{ var tempH = $ESAPI.encoder().encodeForHTML(document.getElementById("tempHolder").value); document.writeln(tempH); }}}
In a similar vein to contexts which cleanse encodings, there are other contexts which will reverse encode certain encodings.
Reverse Encoding Contexts
Reverse encoding contexts are contexts which reverse encode specific encodings. The reason why these contexts are important is to understand the risks of using the wrong encoding for a certain context. In a good number of cases, using the wrong encoding may mitigate certain risks with the added side effect of breaking the app. For example, HTML encoding all of the output data in between {{{<script>}}} tags may mitigate against XSS attacks but could break your JavaScript/VBScript (depending on which characters are encoded) code because the JavaScript/VBScript parser does not understand HTML encoding. In other cases, developers have the mistaken belief that HTML encoding will stop attacks in any context. Finally, some WAFs are configured to assume that HTML encoded data is safe allowing attackers to bypass a WAF by placing HTML and URL encoded content in contexts which will automatically reverse encode the data before executing it. The locations where reverse encoding occurs is dependent on the browser but with IE6 the <img> tag’s src attribute will reverse HTML encode data. In all other browsers, the JavaScript event handler methods (on{{{*}}} methods like onClick, onMouseOver, etc.) of HTML tags will reverse HTML encode data. CSS style expression() attributes reverse encode CSS encoding. URL attributes ("src", "href", "window.location", etc.) will reverse encode HTML and URL encoded data after the "javascript:" protocol indicator.
Here are some examples which are exploitable:
{{{ //Reverse URL encoding allows the attacks to work. <a href="javascript:<"alert(’UrlEncoded’)")%>">Test Reverse URL encoding</a> //Reverse URL and HTML encoding <a href="javascript&\#x3A;<"alert(’UrlEncoded’)")%>">Test Reverse URL encoding</a> //Reverse HTML encoding when "javascript:" is HTML encoded <a href="&\#x6A;&\#x61;&\#x76;&\#x61;&\#x73;&\#x63;&\#x72;&\#x69;&\#x70;&\#x74;&\#x3A;&\#x61;&\#x6C;&\#x65;&\#x72;&\#x74;&\#x28;&\#x31;&\#x29;">Test Reverse URL encoding 1</a>
//Reverse HTML encoding midway through the code allows the allows the attacks to work
<a href="javascript:new String(’hello&\#x27;&\#x29;&\#x3B;&\#x61;&\#x6C;&\#x65;&\#x72;&\#x74;&\#x28;&\#x32;&\#x29;">Test Reverse URL encoding 1</a>
//Reverse URL encoding midway through the code
<a href="javascript:new String(’hello%27%29%3B%61%6C%65%72%74%28%32%29">Test Reverse URL encoding 1</a>
//More complicated example <button id="myButton">Button</button>
<a href="javascript:document.getElementById(’myButton’).addEventListener(’click’, new Function(’alert(777)’), false)">Attach Event</a> <a href="javascript:document.getElementById(’myButton’).addEventListener(’click’,&\#x20;&\#x6E;&\#x65;&\#x77;&\#x20;&\#x46;&\#x75;&\#x6E;&\#x63;&\#x74;&\#x69;&\#x6F;&\#x6E;&\#x28;&\#x27;&\#x61;&\#x6C;&\#x65;&\#x72;&\#x74;&\#x28;&\#x37;&\#x37;&\#x37;&\#x29;&\#x27;&\#x29;, false)">Attach Event</a> <script>
window.location = "javascript:alert(’from window.location’)";
window.location = "javascript:%61%6C%65%72%74%28%27%66%72%6F%6D%20%55%52%4C%20%65%6E%63%6F%64%65%64%20%77%69%6E%64%6F%77%2E%6C%6F%63%61%74%69%6F%6E%27%29";
//Using the wrong encoding can stop attacks in certain contexts but the results are typically hit or miss //HTML and URL encoding in a CSS expression stops the attack
//URL encoding the ":" in "javascript:" stops the attack <a href="<"javascript:alert(’UrlEncoded’)")%>">Test Rerverse URL encoding</a> //URL Encoding in an onClick event handler stops the attack <img src="javascript:alert(’alert from img’)" alt="javascript:alert(’from img alt’)" onClick="<"alert(555)")%>"/>
document.getElementById(’myButton’).addEventListener(’click’, new Function(’%61%6C%65%72%74%28%27%39%39%39%27%29’), false)
Trying to utilize the wrong encoding for the given context is a hit or miss proposition. In addition, using the wrong encoding has a tendency to break your application. To properly output encode, use the correct encoding for the context where the data is placed and will eventually be output. If you think this is confusing you haven’t seen the worst. When implementing proper output encoding a developer needs to also consider how bytes are converted into characters given the character set of the output context.
Lower-level Contexts
Lower-level contexts deal with how a raw byte stream is converted to characters in the output context receiving the untrusted data. This problem typically occurs when there is a mismatch of character sets. An attacker can take advantage of the mismatch of character sets or lack of specifying a character set to bypass your encoding routines. Let’s look at an example of output encoding for sql injection given a character set mismatch. Some libraries will escape single quotes by prepending the single quote with a back slash. Normally this isn’t a problem but it becomes a problem when there is a character set mismatch and a character in the output character set ends with the same character used to escape dangerous characters. The English language is pretty compact because the letters and numbers can fit in 62 values. All of the other characters (punctuation and control characters) can be fit into 127 values (ASCII) for English--if you add the western European languages you can fit all of the letters used into 255 values (ISO-8859-1). Because all of the English and western European letters fit within an eight bit representation, the characters are represented with two hexadecimal values. 5c for example is a back slash. Asian character sets are comprised of thousands of symbols and characters. In order to address all of the characters, each Asian character is represented by a 16 bit value (represented by 4 hexadecimal values). In most of these character sets there is backward support of the single byte ASCII values as single bytes. One example of an Asian character set which exhibits this behavior is the GBK character set. In the GBK character set *0xbf5c* represents a valid single Asian character (*縗*) and *27* (hex) by itself represents a single quote. If the application server is running an 8 bit character set then for simplicities sake let’s assume that the application server will look at two hexadecimal values and convert it to a character. Once all of the incoming data has been parsed, the application code will send the data to your encoding routines. If an attacker sends *0xbf27…* to your application running the 8-bit character set the character representing bf will most likely be represented as an unprintable character represented by *¿*. This character is not recognized as a dangerous character and will be passed through the output encoding routine untouched but when it sees the single quote character (*27* in hex) it will prepend a "\" (*5c* in hex) before the *27*. This results in *0xbf5c27…*. When passed as a last name to a database running the GBK character set the query will look like the following:
`Select * from Users where last_name = ’`*縗*`’ or 1=1.`
The reason this occurred is that *0xbf5c* is the character for *縗*. In the GBK character set ASCII characters are preserved as single byte representations so the *27* was interpreted as a *single quote*. To summarize, the encoding routines were looking at the characters using one character set and the database interpreted the bytes using a different character set. In the case where a character set is not explicitly defined, an attacker can pass in bytes which look benign in the encoding routines character set but get converted to dangerous characters in the output context. For example, let’s take the example were the application does not specify a character set and the page looks like the following:
<c:out value=’<%=request.getParameter("userData")%>’ />
The <c:out> tag encodes the "<", ">", "&", "double quote", and "single quote" characters. Normally that is sufficient to stop XSS in an HTML context. However, some browsers will try to guess the encoding based on the output characters in the page when no character set is specified by the response page. If the attacker were to send in the following as "*userData*" what would happen:
{{{ +ADw-SCRIPT+AD4-alert(123)+ADw-/SCRIPT+AD4- }}}
This would get by the <c:out> tags encoding routine and execute UTF-7 encoded script tags. In general to avoid this you will need to enforce a unified character set across all of your application components and tiers.
Using the Right Tools for Encoding
There are many encoding libraries out there in the wild and some are more secure than others. When evaluating an encoding library you will need to understand several criteria to determine if the encoding library is secure.
What Characters Does It Encode and What Approach Does It Take
Ideally you are looking to see which characters are encoded for each context. If the encoding library is using a backlist approach then you want to compare the encoding libraries to see which library encodes more characters. Ideally the encoding library which takes a white list approach (encodes all characters except numbers and letters) would be preferred over an encoding library which uses a black list approach (only encodes a specified set of characters). ESAPI and ESAPI4JS are two well written implementations which can be used for comparison purposes.
Standardize the Encoding Library Across the Enterprise
Once an encoding library has been selected ensure that all applications developed in your organization use the encoding library consistently. This will reduce the mistakes made by developers who do not understand all of the implications of improper output encoding.
Where to Utilize Output Encoding
Some developers get confused and try to output encode all incoming request parameters including data before it is stored to the database. This will corrupt the data in the database if it is used in a context other than a browser. The best practice is to output encode as close as possible to the context you are trying to address. Ideally this would require the JavaScript developers to output encode using ESAPI4JS just before calling document.writeln() or setting the innerHTML attribute. Server side developers would then need to only output encode for the primary context of the outputted data instead of using multiple encodings.
Output encoding is not a simple endeavor. Getting it correct requires a developer to understand all of the moving pieces to make sure that the correct encoding is being applied to the appropriate context. Remember that you want to understand where untrusted data is being output/used, how your encoding is working, and how your environment processes characters. You also want to make sure your selected encoding library consistently. Good luck and email me ( with any questions.
Further Reading
* Klein, A., DOM Based XSS Injection
* Adding XSS protection to .NET 1.0
* ASP.NET Eval
* Malicious code mitigation
* Security: What Every Programmer Needs to Know by Daswani, Kern, Kesavan
* Hacking Exposed: Web 2.0 by Cannings, Dwivedi, Lackey
* AJAX Security by Sullivan and Hoffman
|
global_05_local_5_shard_00000035_processed.jsonl/33721
|
Sponsor a Speaker (or Arrange to Give a Talk Yourself!)
Easier than it sounds, this is one of the most effective means of advocacy. Local schools, colleges, universities, and civic clubs are all likely to host speakers on vegetarian eating and animal rights.
Post a Comment
Please log in to comment.
|
global_05_local_5_shard_00000035_processed.jsonl/33727
|
For over 20 years a rather controversial and counterintuitive idea has been around that is simply described by the title of a popular book Punished by Rewards by A. Kohn (Houghton Mifflin, 1993). The idea is that a reward (usually monetary) inherently reduces task interest and creativity. In other words they have the precise opposite effect to that they were designed to have. He lists six reasons for this assumption.
Pay is not a motivator – it has only a transitory impact on motivation. Also too little money can demotivate as it can almost be an insult. It does not mean that more money will bring about increased satisfaction & motivation.
Rewards Punish - this is because they, like out-right punishment, are manipulative. By making a bonus contingent on certain behaviours, managers are seen to manipulate their subordinates. This experience of being controlled is likely to assume a punitive quality over time.
Rewards Rupture Relationships – Incentive programs tend to pit one person against another, which has negative repercussions .This threatens good teamwork. Rewards bring about internal competition not co-operation.
Rewards Ignore Reasons –Managers sometimes use incentive systems as a substitute for giving workers what they need to do a good job, like useful feedback, social support, and autonomy. Offering a bonus to employees requires much less input and effort.
Rewards Discourage Risk Taking – People working for a reward generally try to minimise challenge and tend to lower their sights when they are encouraged to think about what they are going to get for their efforts. Their focus is wrong.
Rewards Undermine Interest – Extrinsic motivators are a poor substitute for genuine interest in one’s job. If people feel they need to be ‘bribed’ to do something, it is not something they would ordinarily want to do.
Put simply, the thesis is this: people who have been given (explicit) rewards at work (such as performance-related pay) may work harder and produce more but it is of lower quality, contains more errors and reduces creativity. Rewards may make people less willing to take risks, be less playful and experimental and more mechanical.
When people begin to evaluate our work and explicitly reward some measurable output, the creative juices dry up. The creative process is replaced by ‘reward thinking’, which distracts individuals from the activity, thereby reducing the spontaneity and flexibility of performance.
What many popular critics have asserted is that in various educational and workplace settings the introduction of reward systems does more harm than good whenever creative performance is a desirable outcome.
Take the case of the creative writer scribbling at home on a new novel. Local children had for three days played extremely noisily in a small park near his study. The sound of their playing was simultan-eously loud, uncontrollable and unpredictable. What could he do: Ask (politely) that they quieten down or go away?; Call the police or the parents if he knew them; threaten them with force if they did not comply?; or pay them to go away?
Play is fun and can be creative: it is intrinsically satisfying and can be extinguished by rewards. In the story the writer went to the children and said, somewhat insincerely, that he had very much enjoyed them being there, and the sound of their laughter, and he was so delighted with them that he was prepared to pay them to continue. He promised to pay them each £1.00 a day if they carried on as before. The youngsters were naturally surprised but delighted. For two days the writer, seemingly grateful, dispensed the cash. But on the third day he explained that because of a ‘cash flow’ problem he could only give them 50p each. The next day he claimed to be ‘cash-light’ and only handed out 10p. The following day they got nothing.
True to prediction the children would have none of this, complained and refused to continue. They left promising never to return to play in the park. Totally successful in his endeavour, the writer retired to his study luxuriating in the silence.
He had rewarded the children for their creative play and hence stopped it. But is this true? Does pay for performance in R&D people, in advertising agencies and in marketing circles lead to less inventiveness? A recent careful analysis of all the existing data, plus careful experimental work, suggests this is not true. In fact the data show that if a (creative or analytic) person receives a tangible reward (money) that depends on completing a task to a particular quality stand-ard and then subsequently that reward is eliminated, the person spends as much time on the activity as he or she did before the reward was introduced.
Moreover, there are two reliable and robust effects of extrinsic reward on intrinsic interest. With verbal reward (praise), people spend more time on a task following the reward’s removal than before its introduction. Further, most people state that they like the task better after verbal reward or monetary reward that depends on performance quality. Reward for high creativity in one task also enhances subsequent creativity in quite different tasks.
In fact the only time when rewards have detrimental effects is when rewards occur on a single occasion without regard to the quality of performance (actual creativity) or the speed accuracy of task completion. It is alas true in business that there are occasions where people are rewarded irrespective of their real performance. Some compensation and promotion systems are, quite frankly, pretty insensitive to perform-ance so that employees can vary their performance (both ways) with little effect on tangible rewards. This definitely reduces effort and satisfaction and commitment.
For the old-fashioned behaviouralists the news is good. Rewards can be used either to enhance or diminish creative performance, depending on how they are used. Rewards presented occasionally and independent of performance may encourage individuals to believe that they have no control over the reward and they lessen their perform-ance. However, rewards presented repeatedly in a non-salient fashion for genuinely original work increase creativity and positive attitude to entirely different creative problems. A tangible reward that people see for successful work is likely to enhance their feelings of self-confidence.
Explicit promise of reward for creativity does increase that creativity, unless, of course, people believe that level of creativity is beyond their capability. Also, the unattractive combination of a great prize with great time pressure to find a solution may cause such anx-iety and passion that it disrupts the cognitive juices.
All this does not necessarily mean that intrinsic task interest – sheer personal love of the activity, whatever it is – has no effect on creativity or productivity. It is and will always be vital. But there is no such simple evidence that explicitly rewarding creative task perform-ance interferes with that performance. The secret lies in what is rewarded, when and why.
Recent Posts in A Sideways View
The Psychology of Hallucinations
When, how and why people experience hallucinations.
Moneygrams: Recalled Childhood Memories About Money
Are you a saver or a spender? What money messages did you get as a child?
Remote Personality Profiling
What Can You "Scrape Off The Web" to Accurately Profile Someone?
Impulsivity: Good or Bad?
What is the difference between functional and dysfunctional impulsivity?
How to Evaluate the Queen of England
How Good is the CEO of the House of Windsor?
The Anti-Psychiatry Movement
It is 55 years since The Myth of Mental Illness. What was that all about?
|
global_05_local_5_shard_00000035_processed.jsonl/33728
|
And what do people see? Chances are...not her. A woman of a certain age is invisible.
But not to herself. Under the white hair, behind the lined face, inside the body, a little worse for years of use, is a woman of interest, of accomplishment, a woman of essence. A woman who would tell you, should you take the time to ask, that she has lived, loved, lost, survived, tried, failed, succeeded. That she has made her way along a slippery path, tripped, fallen, stood and walked on.
That the things that mattered to her once don’t matter anymore. Whether the color of her lipstick should accord with her age. Whether her clothes look too young. Whether her hair should be colored so that she could look and feel younger, as if hair color could accomplish that. She knows that feeling younger, feeling happy with yourself, is an inside job.
That what people think of her matters not. That what she thinks of herself, does. That she wishes she had more women of her age and interests around her. That moving to a new city has made friendship in later years difficult to find.
That inside that woman of essence, of accomplishment, of 76, is still the girl of 15 who met the love of her life on a blind date and married him at 20. Who longs for the love cut short by the Fates. Who remembers his gentle touch. Who laments that days or weeks can go by without a loving touch, a hug, from anyone.
That should she not pass a mirror, she would not know her age. That the naked body she once disliked is now beautiful to her. That she still thinks of how wonderful it would feel to have fabulous sex with a fabulous partner. That she finds it sad that most people would find that surprising if not repulsive. That our society is pointed toward youth. That to most, a woman of age is overlooked, under utilized, under appreciated for the wisdom she could bring.
That though she is busy with a life she has created, she is, in the main, lonely, and finds it difficult to write the words, much less confess them to anyone, lest she be pitied. She is not pitiable. Merely, lonely.
That she tries every day to do something good for someone else, most especially those who are in need and do not ask. That she has become increasingly sensitive to the suffering of others, especially the abuse and pain of those who cannot speak for themselves…children…animals. She works to speak for them.
That her children and grandchildren are the loves of her life. That her pride in them as human beings is unrelenting. That she wishes only for more of their physical presence in her life. That having to learn to live on her own and be responsible for herself, meant having to leave their sides. That having learned what she needed, accomplished what she set out to do, she will want to be physically closer as the years move on.
So, put aside your phone, your Ipad. Take off your MP3 player and the next time you see that woman walking down the street, or sitting on the bus, or in the subway or stopped at a red light, look at her and smile in recognition. One day you, yourself, may be under that white hair, behind the lined face, looking out at a world that does not see you for who you truly are.
Recent Posts in What Do I Do Now?
Making Room for the Now
Letting go of what was
The "Silver Tsunami"
Choosing how and where we age
Is 'Everythink' Okay?
How to make yourself miserable
To Pack or not to Pack!
Taking your life with you when you leave the country.
Piglet and Pooh
A friendship like no other
|
global_05_local_5_shard_00000035_processed.jsonl/33732
|
Writer's Popularity No Mystery: P.D. James Says Her Novels Are Modern Morality Plays
Article excerpt
MURDER IS the unique crime. It is the taking away of something which we as humans haven't the power to give and cannot possibly restore. Murder is also a contaminating crime. It touches the lives of every character, even the innocent."
British murder mystery writer P.D. James has spilt a lot of ink and fictitious blood. And as vice-president of the Prayer Book Society in England, her religious and moral sensibility permeates much of her own dark prose.
"The mystery novel is a modern morality play," she said. "It is about the restoration of order out of disorder and about the attempts of human beings to achieve justice, even though the justice they achieve is only the terrible justice of men and not the divine justice of God." Her fourteenth novel, A Certain Justice, particularly underscores this point.
Baroness James (she was so honoured for her fiction) believes she can be a serious writer within the restraints of the detective novel. And the critics agree.
Globe and Mail crime books reviewer Margaret Cannon reads 500 to 600 novels a year. Most remain a blur, but she recalls Ms. James's works with remarkable clarity. "The best writers are always worth rereading," said Ms. Cannon, who reads Ms. James again and again on the strength of her characters and the rich complexity of their relationships. "Her characters are totally realized. Her minor ones are particularly memorable."
Ms. Cannon, herself an Anglican, appreciates how Ms. James's novels explore "the big themes of heaven, hell, death and judgment. Her people must confront their mortality, their mistakes. Ms. James doesn't walk away from evil."
A Taste for Death "transcends the genre and is absolutely the best thing Ms. James ever wrote," Ms. Cannon said. "It is a brilliantly realized study of sin and redemption. The incredible characters are all flawed; they each have their own sins to expiate. All come to redemption; all are saved from themselves. In the last third of the book, the `whodunit' doesn't matter. Motivation is more important. In a split second, by a cardinal act of mercy, a soul is saved, although all are forced to pay a terrible price. A Taste for Death is P.D. James's most severe, most ruthless work. Fifty years from now, it will still be standing."
Ms. James's detective hero, Cmdr. Adam Dalgleish, is a clergyman's son who respects people of faith. Ms. James describes Dalgleish as a "reverent agnostic. He's respectful of the Christian religion and of the church of which his father was part and in which he was brought up. …
|
global_05_local_5_shard_00000035_processed.jsonl/33850
|
On Running: A young athlete's 'slump' may be something more
4:49 PM, Mar. 18, 2014
• Filed Under
When people are suffering from depression, they often are encouraged to start an exercise regime.
Physical activity causes endorphins to be released into the body, which in turn helps to elevate mood. This helps with feelings of depression, but it is not a cure. In fact, while it may seem that because an athlete exercises so much, they are less likely to suffer from depression, the truth is not so simple.
Depression in high school and college athletes is, most likely, under reported. Athletes, especially at a young age, tend to mask their depressed feelings because they do not want to ...
Buy/Sell Marketplace
Search all Classified ads. Sell your stuff.
|
global_05_local_5_shard_00000035_processed.jsonl/33857
|
Protecting you password is important. / Thinkstock
Q: Is there a way to make a hacker-proof brokerage password?
A: Just a few letters, your password, may be all that separates your brokerage account from a hacker.
And that's why it's worthwhile taking the time to understand how to not only choose a rock-solid password, but also closing down other avenues hackers can get access to your account.
First some password basics. Make sure you choose passwords that are at least eight letters long and don't choose words that are in the dictionary, says Lou Steinberg of TD Ameritrade. Hackers have the ability to run thousands of password guesses using dictionary databases, he says.
That doesn't mean your password has to be a jumble of random letters. Try using the first letter of each word from a phrase. You might use something like MTFBWY, for "may the force be with you," and tack on a number you can remember.
Don't stop just with the brokerage website, Steinberg cautions. Many brokerage attacks result when investors have compromised e-mail addresses. Hackers can hijack an e-mail address and use that entry point to help them reset the brokerage password. Never reuse a password from another site on a brokerage site.
And be careful of what you put on social-network sites, such as Facebook and Twitter. Hackers mine these sites to help them figure out what the secondary password is.
Lastly, never enter any password into a public computer, such as one at a hotel or cafe. These machines can be infected with software that can be used to capture your password. If you're using a mobile device in a cafe to access your brokerage account, it's best to turn off the Wi-Fi network and use your cellular network instead. Connections over cellular networks are much more secure than public Wi-Fi hot spots, he says.
Brokerages do maintain safeguards, too. TD Ameritrade, for instance, uses technology that identifies if a customer's computer appears to be infected with malware or viruses, Steinberg says. If the account is being accessed by an infected computer, TD Ameritrade will block access and educate the investor how to clean the computer and change user names and passwords.
Copyright 2015
Read the original story: Ask Matt: Making a hacker-proof brokerage password
Real Deals
Sign up for a Full-Access Subscription!
Subscription Help
Twitter Activity
Staff Blogs
In the Wings : 2015 Metros: Blue Carpet Session #lohudmetros
Here, in Peter Carr's video, is the 2015 Metros pre-show, heretofore to be known as The Blue...
Varsity Insider : Summer football schedule: Key dates for 2015 7 on 7s, team camps
Now, you can swear that football season doesn't begin until after Labor Day, but you'd be...
Facebook Activity
|
global_05_local_5_shard_00000035_processed.jsonl/33863
|
Skip to main content
About your Search
Search Results 0 to 1 of about 2
that it did. it extends the same tax breaks we currently give to companies to employees so they can afford to buy their own health care again, according to their own needs. it expands health savings accounts so people can meet their needs with pretax income. it restores to people the freedom to shop across state lines to find the best policies to suit their needs. it restores flexibility so that health plans can accommodate people with pre-existing conditions, while expanding risk pools to provide for those conditions. it attacks cost drivers like medical liability law that are making health care unaffordable. it restores pricing flexibility to plans so a healthy young person can again purchase catastrophic insurance for next to nothing. it takes the best of the american health care system, preserves it, and corrects its flaws. i realize the senate's likely to bury this reform as it has so many, but it's important that the house pass it so that the american people can see that there is still hope to save what was once the finest health care system in the world and can be again as soon as t
Search Results 0 to 1 of about 2
|
global_05_local_5_shard_00000035_processed.jsonl/33874
|
Opposable Thumbs / Gaming & Entertainment
Wanted: Weapons of Fate aims to please comic AND film fans
Last summer's Wanted film seemed to polarize audiences, particularly fans of Mark Millar's comic on which the movie was based. While the movie itself was critically well-received, it bore little resemblance to the graphic novel on which it was based: instead of the original story about a world ruled by supervillains, audiences were given a special effects-laden tale about a group considered to be the "assassins of fate."
The recently-released Wanted: Weapons of Fate, however, tells a story that takes place after the film itself, and footage of the game displays protagonist Wesley Gibson wearing the costume of The Killer, which is what he wore in the comic. So exactly which franchise does the game tie into—the comic or the movie? During GDC, I got to talk with Ulf Andersson, the game's director and co-founder of Grin Games, and he explained that Weapons of Fate is actually connected to both.
Of course, creating a game based on the movie wasn't something that really took any of us by surprise; the film's action sequences often felt like they were straight out of a video game anyway thanks to the visual style Timur Bekmambetov employed. Andersson pointed out that Bekmambetov's movie was one of the few action flicks that actually managed to do something different from what audiences were used to, much like The Matrix did ten years prior. "I'm not saying it's as good as the first Matrix," he confessed, "but it did a lot of stuff that nothing else could do."
That said, the game's development was not an afterthought to the movie's production. In fact, it turns out that the game was in development before the movie was shot, something that sounds promising when you consider the rushed nature of so many game tie-ins.
Andersson has no illusions about the uphill battle Weapons of Fate faces as a licensed title. "Movie titles and licensed games have been looked down on by a lot of people," he pointed out. However, while many of these games are actually pretty rotten, the public's awareness of this is due to the fact that these tie-ins are a part of the movies' publicity campaigns. "The amount of movie titles released that are bad compared to the normal games released are bad is pretty low... the difference is that the movie games have a marketing campaign around them."
That was part of the reason that Grin decided to go with a plot that didn't have players going through the movie's plot itself: while it is a part of the film's universe, the game's story allows gamers to experience something that's a blend of the comic and the movie. "Story-wise, it's heavily connected to the movie... but visually, it has some hook-ins to the comic," he explained, noting the costumes and heavy gore. "Tone-wise, it's a bit more to the comic because it's a bit more brutal and rough around the edges. Even in the menu, there are bits like that, with 'pussy mode'... If you're really into the whole Wanted franchise, it's a really cool extension to that story."
Finally, Andersson says that Grin is hoping to create downloadable content for the game, but, "I won't say 'yes' or 'no' on that. We're just waiting to see what people want now that we've released the game. We'll see how timing and everything works." When I asked a follow-up question about whether there was a sequel in the works, he confessed, "I like sequels, and I liked the game, so I'd like to make a sequel." Whether or not Wanted: Weapons of Fate is deserving of a full sequel remains to be seen, but Opposable Thumbs will feature a full review of the game later this week.
Expand full story
You must to comment.
You May Also Like
|
global_05_local_5_shard_00000035_processed.jsonl/33888
|
French Pronunciation
February 3, 2011 12:18 PM Subscribe
Trying to figure out principles of French listening to a recording of a poem ('Le pont Mirabeau' by Apploinaire). Recording here.
In the line
"Sous le pont Mirabeau coule la Seine"
I hear a schwa at the end of 'coule'. Am I hearing right? Is this the way all words ending in consonant+e are pronounced?
I also hear the schwa at the end of 'vienne' and 'sonne' in the line
"Vienne la nuit sonne l’heure"
I'm confused because even though I learned a bit of French as a kid, I don't remember this sound at the end of words. Or am I hearing gemination of the final consonant--I mean, is this just because the final consonant is doubled and you pronounce it doubly-long?
posted by Paquda to Writing & Language (15 answers total) 2 users marked this as a favorite
In everyday spoken French, that schwa is usually elided. In poetry and music, however, where rhythm and rhyme reign supreme, it is retained.
posted by ocherdraco at 12:21 PM on February 3, 2011 [4 favorites]
Or, rather it is often, but not always, retained. It depends upon what is needed to make the phrase work in the context of the poem or song.
posted by ocherdraco at 12:22 PM on February 3, 2011 [3 favorites]
When yer fancy-talkin' in french you can put more EMphasSIS on the liason.
posted by blue_beetle at 12:36 PM on February 3, 2011
Officially the final "e" is pronounced, but usually when speaking, it's dropped. But think about it as the final syllable that causes the final consonant to be pronounced. So lis is just "lee," while lise is "leezeh," which gets abbreviated in speaking to "leez."
You'll often hear the final "e" in song lyrics.
The rules for pronouncing French are often just about what sounds nice.
posted by thebazilist at 12:46 PM on February 3, 2011
In French poetry, especially pre-1950, vowels that are silent in ordinary speech are sometimes enunciated in order to preserve the scansion.
The same is true in English poetry--there are plenty of poems where the "-ed" ending is pronounced, for instance.
From Byron's Don Juan:
And one by one her articles of dress
Were laid aside; but not before she offer'd
Her aid to fair Juanna, whose excess
Of modesty declined the assistance proffer'd:
Which pass'd well off -- as she could do no less;
Though by this politesse she rather suffer'd,
Pricking her fingers with those cursed pins,
Which surely were invented for our sins, -
This doesn't work, scansion-wise, unless you pronounce "cursed" as "curs-ed." Note that Byron generally (though not always) represents the ordinary pronunciation of the "-ed" ending with an apostrophe replacing the e.
posted by Sidhedevil at 12:49 PM on February 3, 2011 [2 favorites]
I lived with a family in Grenoble for a while, and the father, who was originally from the south of France, pronounced words in this way--nobody else in the family did. He was also quite a chatterbox, such that since he dominated dinner table conversation, and as a good host focused much of it on me, I came home with a very funny accent indeed.
posted by padraigin at 12:58 PM on February 3, 2011
What ocherdraco and Sidhedevil said.
Generally not pronounced unless it is needed for scansion.
10 Sous le pont Mirabeau coule la Seine
3 Et nos amours
6 Faut-il qu'il m'en souvienne
10 La joie venait toujours après la peine
7 Vienne la nuit sonne l'heure
7 Les jours s'en vont je demeure
So you need to pronounce coule but souvienn'
Vienne , sonne , l'heur'
posted by bru at 1:21 PM on February 3, 2011
Also, try singing along to some George Brassens--impossible without keeping track of which schwas are pronounced.
Et le troisième coup ne fut qu'une caresse...
posted by lapsangsouchong at 2:56 PM on February 3, 2011
That's a trickier example, though, pronunciation-wise -- think "accursed". Go back to the 1600s, for sure, and you see that flexibility; go further forward into the Tennyson era, and instead of apostrophes, you'll often see silent vowels marked with accents for pronunciation, in a kind of deliberate archaism.
Anyway, as ocherdraco said, when you're working within the high formalist tradition of French poetry and song, you pronounce those silent '-e' endings to fit the metre, not least because it's the basis of all of those feminine rhymes, and the interplay of feminine and masculine rhyme is central to French prosody. You can hear it when Piaf sings 'La vie en rose', and even when Jacques Brel sings 'La chanson de Jacky', where the terminal -es in the first two lines ('Knock-le-Zoute' / 'je le redoute') are there almost by sheer weight of tradition.
posted by holgate at 3:12 PM on February 3, 2011
In modern French, the unstable e is only found in open syllables, like in demain [də-mɛ̃] or je reviens [ʒə Rəvjɛ̃].
The rules are:
Mandatory pronunciation
1) inside a word or a group of words, after more than one pronounced consonnant, et if the next syllable starts with a consonnant;
2) before an aspired h;
3) before the numbers un, huit et onze;
4) in an accentuated final syllable;
5) a few other isolated cases.
Mandatory omission
1) inside a group of words, afterone pronounced syllable;
2) at the end of a group of words;
3) before or after a vowel.
And it's facultative at the start of a group of words. It will often be pronounced before an occlusive consonnant, like in le pont.
So a modern French reader, not realizing they're reading a poem, could read:
9(8) Sous l[e]pont Mirabeau coul' la Seine
3 Et nos amours
6 Faut-il qu'il m'en souvienn'
9 La joie v'nait toujours après la pein'
5 Vienn' la nuit sonn' l'heur'
7(6) Les jours s'en vont je d[e]meure [pronunciation here is facultative]
But the unstable e is always pronounced before consonnants in classic diction, so that Rimbeaud could write:
12 Je le vis, je rougis, je pâlis à sa vu(e)
12 Un trouble s'éleva dans mon âm(e) éperdu(e)
(note that the e is not pronounced before a vowel or at the end of a verse)
posted by Monday, stony Monday at 3:43 PM on February 3, 2011 [3 favorites]
I was told, by my Paris-born high school french teacher, that having the final syllable be audible was part of the Provençal accent. I learned French diction (for singing classical music) before I learned the French language, and I always have just a little of that final syllable, because it's so often needed for musical purposes, and he joked that I spoke with a Provençal accent.
posted by KathrynT at 6:55 PM on February 3, 2011
You've got great answers re: the poetry side of the pronunciation.
And as others have remarked, an audible final "e" is also part of southern French accents (not just Provençal). To make things even more confusing, they sometimes add that vowel where there is none. To wit, "peuneu" is "pneu" in the Marseille area. They'll add it on the end of words that don't have a final "e" too. In my completely anecdotal and non-scientific experience, this happens when people are most comfortable with others in the south. Je suis allée au marché-euh, putaing c'était beau-euh, frangchemengeuh on peut pas demander mieux hein-euh, quel soleil, putaing-euh...
But I digress from the poetry.
posted by fraula at 12:34 AM on February 4, 2011
Thank you all. So now understand it's like the 'ed' suffix in English that can be pronounced in either of two ways in poetry to fit the meter. Thinking back, I remember hearing that final sound in song lyrics too and not knowing what to make of it.
posted by Paquda at 7:41 AM on February 4, 2011
I need to correct what I said above now that I understand better: Pronunciation of final 'e' as a light schwa sound is always done, except at the end of a line or when the following word starts with a vowel. So it's not like the '-ed' suffix in English that the poet has the option of using in two ways. And as Padraigin mentioned, in southern French accents people often pronounce final e's in their ordinary speech.
posted by Paquda at 7:54 AM on February 28, 2011
One last thing -- I often hear "merde" as "MER-DAH!!" especially if someone has stubbed their toe or something.
posted by thebazilist at 4:58 PM on March 6, 2011
« Older Best Windows free/shareware so... | Can I set up usb connections, ... Newer »
This thread is closed to new comments.
|
global_05_local_5_shard_00000035_processed.jsonl/33893
|
Take the 2-minute tour ×
I have installed pure-ftpd in the Guest machine. I tried to connect to FTP server of Guest Machine from Guest Machine with the port number 21 and I could connect to it successfully.
In the host machine I have added following command in order to redirect host's port 2121 into guest's port 21 and connect to FTP Server of Guest Machine.
VBoxManage setextradata Ubuntu "VBoxInternal/Devices/e1000/0/LUN#0/Config/FTP/HostPort" 2121
VBoxManage setextradata Ubuntu "VBoxInternal/Devices/e1000/0/LUN#0/Config/FTP/GuestPort" 21
VBoxManage setextradata Ubuntu "VBoxInternal/Devices/e1000/0/LUN#0/Config/FTP/Protocol" TCP
But once I tried to access this guest ftp server from Host Machine it asked me a password for the user I have in Guest machine and authentication passed successfully. But when it tried to list directories it showed me an error message saying following:
alt text
If you translate it into Enlgish, it will be following:
The folder contents could not be displayed.
Could not display the entire contents of "/ in localhost:2121": Can not open data connection. Maybe your firewall is blocking it?
How to solve the problem?
share|improve this question
Hmm... you might be able to solve it by using a SSH enabled FTP client. Once it burrows a SSH tunnel using your admin user (who has access to all files) then it can connect to the FTP service internally on the machine. The important point here is to use a user account with the proper permissions. – djangofan Dec 23 '10 at 23:15
1 Answer 1
FTP can be a tricky protocol. The control connection is (normally) set up on port. This connection is used for authentication and sending commands to the server. Data transfer happens on a different connection. Normally this is on port 20. What happens is that the client requests data from the server on port 21, then the server opens a connection back to the client on port 20 to transfer the data. This is where a firewall on the machine running the ftp client can get in the way (it may block the incoming connection from the ftp server).
FTP has a passive mode that is supposed to cause the ftp server to transfer data to the client over the control connection instead of opening a new connection for the data transfer. I think the command is PASV, but I have never tried it myself.
I hope this is helpful.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/33894
|
Take the 2-minute tour ×
After the Ubuntu logo the boot halts and all i see is this:
• Stopping anac(h)ronistic cron
• Stopping save Kernel messages
• Checking battery state
• Stopping System V runlevel comaptibility
• Starting CUPS printing spooler/server
And then it jsut hangs there forever. Any help? I've tried previous kernel versions from Grub with no success
share|improve this question
Sounds like Video Card/Chip issue. What do you run? – wojox Oct 18 '12 at 19:33
AMD Radeon HD 3450, this system has been working fine for 2 months with the Ubuntu drivers. – user98581 Oct 18 '12 at 19:44
Boots fine from the LiveCD – user98581 Oct 18 '12 at 19:47
I was under the impression it was a fresh install today. Sorry. – wojox Oct 18 '12 at 19:53
Don't apologize! Just tell me you ahve some bright idea for what the problem might be. Please. – user98581 Oct 18 '12 at 19:55
1 Answer 1
Boot off your LiveCD and run:
sudo touch /forcefsck
And reboot.
share|improve this answer
Negative. I would say now it's worse, before it used to keep the screen resolution, now in the middle of the screen in a quirky font it says: * Checking Battery State Any bresh ideas? – user98581 Oct 18 '12 at 20:12
I have everything backed up. I'm compelled to just reinstall everything. – user98581 Oct 18 '12 at 20:13
I would. Sometimes it's a lot quicker. =) – wojox Oct 18 '12 at 23:19
Your Answer
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.