id
stringlengths
50
55
text
stringlengths
54
694k
global_01_local_1_shard_00001926_processed.jsonl/2152
Make your own free website on Check Back here to see new updates! (last 8 displayed) 08/27/01 Major work on project Nippon, several units have been updated. 08/27/01 This site is undergoing a MAJOR redesign - bear with me :) 07/08/01 Pictures from Games Day! 05/28/01 Clan War Demo Pictures added! 04/19/01 New Revised Pictures added. 03/25/01 New Pictures in the Gaming Section:
global_01_local_1_shard_00001926_processed.jsonl/2158
Of mice and men thesis statement essay We can already picture your teacher going weak in the knees. Think of it as the headline of a newspaper article. We got a future. Does the work seem to advocate individuals forging relationships and acting as a cohesive force? In "Of Mice and Men," John Steinbeck utilizes his prevailing themes of friendship and loneliness, through his deep characterization and interconnection between George and Lenny, in order to illustrate glamorized desire of "the American dream. Write an analytic essay in which you evaluate these various levels of loneliness. People with ADHD are often jittery, inattentive, distracting, and very very smart. It might be interesting to examine how these individuals who society deem as "losers" seek to have their voices validated despite their own failures. Along these lines, another thesis statement could be on how all the main characters experience some type of failure in their dreams and their collective link is failure or deferment in this realm. It also expresses your opinion or how you feel about the subject. All quotes contain page numbers as well. You are not trying to prove everything there is to prove about your topic. Examples List on new topic of mice and men thesis statement The Needs Served by Relationships All human beings develop relationships with others because those relationships fill particular needs. General Rule 1 and General Rule 2 still apply. What is a thesis statement? Cleopatra is perhaps the most well-known female pharaoh of Egypt. We got somebody to talk to that gives a damn about us. Essay Database A thesis statement is like a map for your reader. Profound Loneliness The pervasive emotion experienced by all of the characters in Of Mice and Men is loneliness see quotes, below. Of Mice and Men essays A goodthesis statement to reflect the truth of the Renaissance, however,would read: And it should start with your smallest or most tepid example and build to your most explosive. The loneliness is also, though, profoundly existential and symbolic. This depends on what portion of math you are talking about. Write an essay in which you explain the needs of each character that are fulfilled by the other. Write an essay in which you use theories from psychology and psychoanalysis to explain what anxiety is, how it affects these characters, and how it limits their possibilities to overcome some of the internal barriers that they erect against themselves, as well as the external conditions that restrict them. What does a thesis statement do?Examples of good thesis statement for essay and research papers on Of Mice and Men. Literary Analysis Loneliness in “Of Mice and Men” by John Steinbeck essay This is a book about the last hope that two people have, the hope they have put each day of their life in, the hope that leads to desperation and loneliness. Example Thesis Claims for Of Mice and Men When writing a thesis claim, you must start first with a thesis handle. Your thesis handle will consist of an arguable statement regarding your critical lens. Connected to your thesis handle will be your 3 prongs; each prong will consist of specific evidence that backs up your handle. No, generally for essays or papers you are not answering your thesis statement, you are asserting it. You make your thesis statement generally in the first paragraph and spend the rest of the paper proving the claim you have made. Thesis Statement / Essay Topic #4: The Role of Minor Characters in “Of Mice and Men” Lennie and George are the two main characters in Of Mice and Men, but there is a cast of “minor" characters as well. These characters include Candy, Curley, Crooks, and Slim. Of Mice and Men character analysis Each of the characters of John Steinbeck’s “Of Mice and Men” is very controversial and has a deep psychological conflict inside. View all Of Mice and Men Thesis Statement. How to write an essay on "friendship between Lennie and George" in Of Mice and Men, taking in the 1 educator answer Explain loyalty VS friendship in Of Mice and Men. Of Mice and Men thesis statement Download Of mice and men thesis statement essay Rated 5/5 based on 38 review
global_01_local_1_shard_00001926_processed.jsonl/2209
• Register User MikkoKastrin Member for: 8 months (since Apr 9) Type: Registered user Full name: Mikko Kastrin Location: Sahuarita, AZ Website: http://www.coolairconditioningrepairsahuaritaaz.com About: Are you in need of expert pro in Sahuarita? Cool Air Conditioning Repair Sahuarita professionals at one call services can handle your entire HVAC repair needs. Activity by MikkoKastrin Score: 100 points (ranked #1,648) Questions: 0 Answers: 0 Comments: 0 Voted on: 0 questions, 0 answers Gave out: 0 up votes, 0 down votes Received: 0 up votes, 0 down votes Wall for MikkoKastrin Please log in or register to post on this wall.
global_01_local_1_shard_00001926_processed.jsonl/2215
Design Minimalist Workspace icon Design Minimalist Workspace 1.0 for Android The description of Design Minimalist Workspace Office (from the Dutch kantoor, itself from French comptoir) is the name for a place that is used for commercial or business carried on a regular basis. Offices can be only in the form of a room or a small room and high-rise buildings. [1] Offices are often divided to two types; the largest and most important office is usually used as the head office, while the other is called the offices of the branch office. Show More Design Minimalist Workspace Tags Add Tags Additional Information Similar to Design Minimalist Workspace Comment Loading... Ooops! No such content! Popular Apps In Last 24 Hours APKPure App
global_01_local_1_shard_00001926_processed.jsonl/2241
Happy Valentine’s Day Hope everyone is enjoying this very special Hallmark occasion… I took my family out for lunch to the boys’ favorite place, Macaroni Grill. It was lots of fun. I had just come from the dentist’s office where I had work done on both the tops and bottom teeth. Yes, my mouth was still numb, but novocain has a delightful botox effect–it relaxes the wrinkles surrounding your mouth so you look about five or ten years younger. I’m not about to complain about that, even if I do drool when drinking a glass of cabernet. Bao continues to do well. You know, when we first met him, I recall that his skin was ghastly. Imagine how a fabric sofa would feel…a tweed one. That’s what his skin felt like. I’ve been applying cocoa butter twice a day on him and you know what? It’s working! His skin is nearly as soft as Little Boy G’s. I’m sure it was the first time lotion had been applied to his tiny little frame. Hubby took Bao (and G) to get blood drawn while I was at the dentist’s. According to poopsie, it didn’t go well. Bao only has so much blood, evidently, because it just stopped flowing. They ended up trying different locales, holding him down and moving the needle around in his arm. You know the drill. Hubby says that Bao cried the whole time, sniff, crying “mommy! mommy!” Sniff, sniff, sniff. Glad I wasn’t there to witness it.  I can’t stop thinking about Sue who is in Hanoi with her family and new boy, Hung, now. Loving him. Learning about him. Enjoying him. Soon, they’ll come home and it will all seem like a dream. Once adoption has touched your life, you’re never the same for so many reasons. My little valentines gave me the cutest card today, and signed it XOXOXOXOXO. Melted my heart. I love them so very much. I have been blessed with their presence. —-er, Hold that thought. G just showed me that he bit the erasers off all the new pencils he got for Valentine’s Day. Grrr. Well, lucky for him I have a short memory. Now back to love… 1. kweenmama said, February 18, 2009 at 3:20 am Lol. Bites off erasers, eh? I guess there could be worse things… 2. Sarah said, February 22, 2009 at 7:29 pm I saw a dramatic turnaround in Simon’s skin once I started running the humidifier in his room 24/7. The boys are so cute. Hope you’re all doing well! Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_1_shard_00001926_processed.jsonl/2245
Les S Hi Danniel, I wanted to send you a testimonial on the patches for my bursitis.  I woke up one Saturday morning and saw a bulge on my elbow. I noticed there was fluid in there. As I’ve never had bursitis before I never knew what it was. I immediately put on my jacket to go the clinic, but then decided to Google it. I read many forums and found out that many people opted to have the fluid drained. That was not appealing to me at all!  I saw the sponsored link for OSMO Patches and ordered them. I got an email telling me when they were shipped, and received them within 10 days. After using the first 3 patches I noticed my bursitis getting smaller. After the 9th one it was almost gone, then totally gone after the 10th patch. Using your patches saved me from having a doctor drain the fluid…thanks!!! If I know of anyone with bursitis I will be sending them to you ASAP! - William M, California, United States - Gabrielle W, QLD, Australia - Sharon B, Alberta, Canada - Judy, North Carolina, United States - Vickie M, Rhode Island, United States OSMO Patch No Questions Asked Guarantee Policy Have a Question? Do you have a question about OSMO Patch?
global_01_local_1_shard_00001926_processed.jsonl/2266
#Beauty4Balance: Day 12. Lady Lake. Post for 7.2.17. Lake Michigan is always impressive. Her skin looks mosaic with blues and greens.  Shifting patterns with the movement of her waves. Changing hues each time the clouds catch the sun as they chase her across the sky. This year she seems exceptionally beautiful. There is a creek just to the west of where I’m standing.   It runs cool and is currently feeding iron into the Lake. The result is a strip of reds and oranges along the shoreline. The blues seem to make room for the new color- allowing the reds to hug the sand.  It is captivating. Lady Lake’s first name undermines her. One might think there has been a mistake. She does not have the presence of a “Lake.”  She is too big. Too wide. You cannot see to the other side.  And her pull is too powerful. You could almost swear she is the sea. But she has a softer side than the sea. A different kind of beauty. She is sweeter to the taste. Fresher to the smell. Gentler to the skin. As I stand here at the tip top of her head and look out at her – I wonder who is looking up at me from the other parts of her body. I wonder if they are like me – at their own in-laws’ family cabin somewhere. Watching their stepdaughter and dog frolic in the water. Having a beer. Or are they doing something else? Are they sipping wine in Traverse City? Are they taking a break from shopping in the big city of Chicago? Are they eating cheese curds and wishing it was Packers season in Green Bay, Wisconsin?  Are they riding a dune buggy around Sleeping Bear Dunes? Camping in Ludington? Or maybe even getting married at our wedding venue in St. Joe? Perhaps they are simply enjoying one the thousands of beaches along her surfaces with their family, friends or loved ones. Whatever it is.  Wherever they are.  Whoever they are with  They are probably feeling like I do right now.   Refreshed. Content. Happy.  Alive. Lady Lake’s best attribute is her ability to entice, enchant and pull people in to her side like a giant magnet or lure.  Like a mother or a lover.  She gives and gives – feeding and watering the life around her. She embraces the elements she is exposed to, weathers the storms, and adapts gracefully as her body changes over the years. But she is most beautiful when she is loved and appreciated. And when she is loved and appreciated, everything around her becomes a part of her. And a part of her beauty. ~Be Gentle. Be Beautiful. Embrace the Mess. Previous #Beauty4Balance posts: How #Beauty4Balance got started:  #Beauty4Balance: Day 1. Trumped. Challenge Accepted. And then Backwards from here on Day 12: #Beauty4Balance: Day 11. Big Mac.  Post for 7.1.17. Day 10. ☑️ Complete To Do List. Day 9. Hm.     Day 8. Get Your Head in the Game.   Day 7. #Balance4Beauty.  Day 6. Being Taken Care Of.    Day 5. My Church.   Day 4. Losing Balance. Day 3.  Treat Yo’ Self!   #Beauty4Balance: Day 2.  Slow Down. Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/2267
water bottle pouring Proud To Be Aussie!   Proud to be Aussie! Here’s an infographic to celebrate the spirit and history of the land down under!   Continue Reading beloka water in coolers Pure. Fresh. Mineral Rich.   Pure Evolution The difference between generic water and pure pristine mineral water is crystal clear. ‘Pristine’ in natural water terms means how well protected its source is from any harmful surroundings, as measured by its level of nitrates. Beloka WaterTM is ranked as ‘superior’, the highest possible ranking by ‘Fine Waters of the World’... Continue Reading
global_01_local_1_shard_00001926_processed.jsonl/2270
Applications of Quadratics Day 1 9 teachers like this lesson Print Lesson SWBAT use a quadratic equation to model a mathematical situation. Big Idea Students use a graphic organizer to organize their thinking around solving quadratic word problems. 7 minutes Slide 1 The logistics of this lesson are really interesting.  I want students to use white boards because I need them to be able to hold up their answers to slide 2 and 3 of the launch. However, before getting to those questions I ask my students to answer the question on slide #1 on their whiteboards.  Most students are able to "just think" of the number that will make the statement true (MP2).  However, some students will set up an equation and solve it.  I will have students from both camps share their answer and how they obtained it.  This simple categorization helps lead into today's lesson by giving students a glimpse of types of problems they will encounter in class today.  Slide 2 & Slide 3 In my classes, it is often basic procedural mistakes that hold students back when using algebra to model a word problem (MP4).  Slides 2 and 3 of the launch will get students "warmed up" by asking them to write some simple algebraic expressions.  Again, students will use white boards and hold up their answer after each questions. I will use this "presentation" as an informal assessment of student readiness. My students will usually do okay on the first three questions. On question Problem 4, some students will write "5-x" and others will write "x-5".  I will put both of these up on the board and have students turn and talk with their partner about which is correct.  Then, I will ask students to pick a specific number and imagine that number being decreased by 5.  I'll ask,"Which expression would give the correct answer?"  Usually after this intervention, Problem 7 will cause fewer issues.  However if quite a few students are still writing "7-x", I will do another mini-lesson to move things in the right direction. Guided Practice 28 minutes After the Launch, each student will be given a handout of the Guided_Notes.  As we work on the problems in the notes, I will ask students to continue to show their work on their whiteboards.  The reason I want both available is so that students can "mark up the text" of the word problem before trying to write their equation.  To do this, students can underline, write expressions, circle words, etc (MP1).   For this part of class, I have students divide their mini-whiteboards into three sections with the middle section being the largest.  When reading a word problem, the first thing I want my students to determine is "what are our variables?" (aka, "what do we want to find?").  I ask my students to place this information in the left portion of the whiteboard.  The second thing I ask my students to do is to use the variables to write an equation or expression based on the problem description.  Finally, I encourage my students to make sure that answers make sense by solving and checking in the right section of the white board. After this introduction, we start working on the problems as a class. I generally don't like to read problems to students.  So, I ask the entire class to read the first question to themselves either by looking at the projector or by reading the problem on their paper.  On the first read-through they should only be reading.  Then, I ask the class to read the problem a second time marking up the text as they read.  Now, on the third pass, I ask students to construct an equation. Teaching Notes: 1. In questions #1-4, "the setup" would mean that students are defining their variable as "let x = the positive number"  The work is shown in the middle section of the whiteboard.   2. One thing I stress is that students do their check using the original problem NOT the equation that they make.  Students should take their solution (in the case of #1 the solution is 2) and substitute that value wherever they see "a number" or "the number" in the original word problem.  I do this because if students construct the incorrect equation but then solve it correctly their answer still will not make the original problem true (MP6). Questions #1-4 usually go fairly smooth.  We go through them 1-by-1 and students work on the whiteboards and hold up their responses once they are complete.  If some students are really excelling, I will have them work ahead using the guided notes. In questions #5 and #6 the setup would include both expressions for both the length and the width of the rectangle (example: #5 would be "let x = width" and "let x+4=length").  For the check, their solutions should make sense for both dimensions (one is 4 more than the other) and should give the correct area. Question #7 will require us to review how to set up variable representations of consecutive integers or consecutive even/odd integers before starting to write the equation to solve the problem.   5 minutes I designed this closing activity to help me to identify which students are grasping the idea of writing quadratic representations to solve word problems.  Before distributing it to the students I will remind the class that I still want to see all three parts in their solution (setup, work, and a check).
global_01_local_1_shard_00001926_processed.jsonl/2277
Story image Hands-on review: D-Link Powerline AV2 1000 HD Gigabit 22 Sep 16 It’s the high-tech Murphy’s law. Shopping for a router, You plunk down an obscene amount of cash. You come home with an ultra high-end, super fast and long range WiFi router. Then you find the one WiFi dead zone in your home happens to be exactly where you sit to use your PC. Sigh. Those in masonry homes will find the masonry structures can block WiFi signals. Then there's those in apartment buildings. All 15 WiFI channels in use by several tenants at once. The resulting interference creates a rocky and unreliable connection. Pulling your hair out in frustration? The good news is that there is an answer. Better still, it is easy to use and it works. Enter stage left, Powerline technology. If your dead-spot is near a wall power socket you’re in luck. Powerline technologies let you zap data over your home's electrical wiring. Being a wired connection, it is less prone to interference. If the writing on the box with D-Link’s kit is to believed, it is also fast, offering up gigabit speeds. The Gear The D-Link AV2 1000 Gigabit Starter kit comes with two mains network adapters. These use the AV2 1000 standard. In non-geek speak, this means that they’ll shunt your data around at speeds of up to 1Gbps. D-Link tick a lot of boxes design-wise. Their adaptors are compact. They're not much larger than a double plug mains adaptor. An Ethernet cable socket is on the underside of the adaptor. This means that cables are unlikely to get in the way of other plugged in widgets. There's also a mains pass-through socket.  In the past, using a Powerline adaptor meant that the wall socket it occupied into was out of action.  Now you can plug another widget into the adaptor while its in use. It’s a much appreciated addition. For those in a situation using shared mains power, optional encryption is also available. It’ll keep nosey neighbours and/or flatmates out of your network. Getting up and running was a doddle. After unpacking the adaptors, I just plugged them in and they got to work. I plugged an adaptor into the mains outlet next to my router and connected to the router with an Ethernet cable. The other adaptor could then work with any mains socket in the house.  Seeing if everything was working involved checking the three status lights on the adaptor. If they’re all green (and they were), you're all set. The only fly in the ointment were the bundled Ethernet cables. At only a metre long, they were useless for pretty much anything. I had some longer spares, but you may want to factor that into installation plans. Getting connected took a whole 5 minutes! I hooked an adaptor to my notebook PC and tested throughput by copying a 1GB file to my NAS. The file copied across in just under 2 minutes at a speed of 12.1MB/sec. This isn’t exactly gigabit, but it was still fast enough for tasks like watching a video, streaming music or browsing. This performance could have more to do with the wiring in our turn of the century villa. Based on this it is fair to assume that your performance mileage will vary. Speed freaks won''t get Gigabit performance but the AV2 1000 adaptors were simple to set up. For a near bomb-proof means of filling in that pesky WiFi coverage hole, the AV2 1000 network adapters from D-Link are going to be exactly what the doctor ordered. How blockchain will impact NZ’s economy 25% of malicious emails still make it through to recipients Human value must be put back in marketing - report Wine firm uses AR to tell its story right on the bottle DigiCert conquers Google's distrust of Symantec certs Protecting organisations against internal fraud Telesmart to deliver Cloud Calling for Microsoft Teams Jade Software & Ambit take chatbots to next level of AI
global_01_local_1_shard_00001926_processed.jsonl/2293
Communicating with Twitter via Twitter4J using Scala Twitter4J is a Java library for the Twitter API. With Twitter4J, you can easily integrate your Scala application with the Twitter service. Twitter4J is featuring: – Easy to use with Scala (as it works on any Java Platform version 5 or later) – Support via a single jar file. – Built-in OAuth support. Here is the tutorial to use Twitter4J in Scala. 1. Download the Twitter4J jar file here. 2. Setup the TwitterFactory Object with your Twitter application credentials. 3. Thats it ! .Now we are ready to interact with Twitter. Posting a Tweet : Capturing the Tweets from your timeline : Sending direct messages to recipients : Querying the Twitter : Getting Direct Messages : & much more….. There are several more methods present for a complete interaction with Twitter. Find more Here’s the Scala code file : Leave a Reply %d bloggers like this:
global_01_local_1_shard_00001926_processed.jsonl/2295
Poultry industry faces fowl problem During its ongoing quest to grow larger chickens that fulfill the demand of white meat, the poultry industry has run into an unexpected problem: an emerging phenomenon known as “woody breast.”
global_01_local_1_shard_00001926_processed.jsonl/2304
Command line redirection is performed by the command line interpreter The magic characters like <, >, and | in command lines like myprogram.exe | sort > output.txt are interpreted by the command interpreter CMD.EXE; they aren't built into the CreateProcess function. (This is obvious if you think about it. That command line created two processes; which one should CreateProcess return a handle to?) If you pass a command line like this to CreateProcess, it will merely run the myprogram.exe program with the command line arguments "| sort > output.txt". (The ShellExecute function behaves similarly.) If you want these characters to be interpreted as redirection operators, you need to give them to someone who will interpret those characters in the manner you intend: cmd.exe /C myprogram.exe | sort > output.txt Since different command line interpreters use different syntax, you have to specify which command line interpreter you want to use. If the command line came from the user, you probably want to use the COMSPEC variable in order to give the command to the user's command line interpreter of choice. Comments (31) 1. BryanK says: Or you could implement the pipe and redirection yourself — this is not necessarily easy (in fact I have no idea how to do it; I assume CreateProcess takes some info that determines where a process’s stdin comes from and where its stdout/stderr go to, but I don’t know for sure), and you’ll be duplicating code that’s already in cmd.exe.  But it is (probably) another way to do it.  ;-) 2. Gabe says: If you want shell interpretation performed, I think the proper thing to do is simply to call the system() function. 3. duggie says: Did old versions of DOS have redirection defined by the myprogram.exe? I recall simplistic redirection being explained in terms of parameters when you typed "EDIT /?" <shudder> 4. Dave Harris says: When I first started using PCDOS, it seemed bizarre to me that would interpret some special characters, like < and >, but not others, like * and ?. On Unix they were all done by the shell. 5. I.P. Overscsi says: Dave Harris: I believe the wildcard characters (* and ?) were not expanded by the shell in DOS due to the limited RAM available for the process block (the location where the command line parameters were stored).  Wildcards can expand out to hundreds if not thousands of files, overflowing the PCB.  This means that expanding wildcards was always left up to the application.  It persists in this manner simply for backward compatibility. 6. BryanK says: Doesn’t system() just run Raymond’s command line for you on Win systems?  (I.e., %COMSPEC% /C "whatever string you pass to system()".) That’s what it does on Linux, at least — it forks, then runs /bin/sh -c "whatever string you pass to system()", and then waits for that child process to exit.  (Note that the quotes — or something emulating them — are *required*; the -c option requires *one* slot in the argv array for its argument.  I believe cmd.exe’s /C option is the same, but I don’t know for sure.  OTOH, WinMain receives a single string, not an argv array, so maybe it doesn’t matter.) On Windows I doubt it can wait for the process to exit, because of Raymond’s post a couple weeks ago about "what can you do with the HINSTANCE returned by ShellExecute?".  Unless it uses CreateProcess instead of ShellExecute; I’m not sure if that makes a difference in this case or not. 7. David Candy says: Search msdn for sample code using the phrase "Creating a Child Process with Redirected Input and Output" (I have a CD) and it will tell you how to shell woth redirection without cmd. 8. Gabe says: BryanK, the system() function probably just calls CreateProcess(), so it waits until the command exits. ShellExecute is a relatively new function that analyzes its input to determine how to handle it, whereas system() is defined to always use the system shell to execute the given command — they are not interchangeable. duggie, old versions of DOS did redirection the same way UNIX does (i.e. via changing the location of file descriptors 0, 1, and 2). However DOS could not multitask, so piping was handled by redirecting the output of the first program to a temp file, then redirecting that file to stdin on the next program once the first had exited. Dave Harris, it only seems bizarre because DOS (and Windows) have different ideas of which characters are special. On Unix, the * and ? characters are special and must be interpreted by the shell. On Windows those characters aren’t special and are interpreted by the individual program. This allows programs to process wildcards in ways that make sense. If a wildcard refers to a files in a directory, the standard file enumeration functions will handle it the same for every program. Only very naive programs (those that take an unordered list of filenames) can really be helped by shell-processed wildcards. For example "ren *.bat *.cmd" doesn’t make sense when interpreted by the shell. It also is nice to have "dir /s *.exe" work just as easily as "dir *.exe". On UNIX, the command "rm *.txt" will fail on a directory with a million text files because the shell will spend lots of time and memory reading in the whole directory to find the text files, sorting it, and then trying to pass it to "rm", only to have it fail on exec() because you can’t pass a million parameters to a process. To do this properly you either need to write a custom program or do something like "find . -name ‘*.txt’ -print0 | xargs -N rm". On Windows, "del *.txt" will work no matter what. 9. Norman Diamond says: On sufficiently old Unix systems, although the shell interpreted wildcards, memory space was too cramped to put them all in the command line.  Of course there was no such thing as a million filenames, but even with one filename the result wouldn’t be put in the command line.  The shell created a temporary file and told the executable program to read that file to get the list of filenames. On the other hand, on Windows, "del *.txt" also sometimes doesn’t work, though of course the reasons are different. 10. Chris says: Dave Harris and I.P. Overscsi: I think that not expanding those characters is also a marginal safety feature. It allows commands like DEL to check for total erasure (and perhaps, to optimize). 11. Chris says: Dave Harris and I.P. Overscsi: 12. 64bitter says: gabe, oh and by the way: 1. dir /s is innappropriate as an example because the recursion is implemented by cmd.exe not "standard file enumeration functions". Otherwise, I should be able to do ren /s, right ? 2. I seriously doubt that  NTFS implements the wildcards, which means FindFirstFile is handling the del "*.txt" in your example. Which in turn says to me that Windows will have the same problem that you claim unix has handling a 1-million file directory (running out of memory and what not). 13. 64bitter says: Gabe: Actually Unix does not treat * and ? as special. They are interpreted by the user’s shell.  That is why shells like zsh can extend wildcards beyond the basic * and ?. While the Windows behavior may be nice for certain things (like your ren example), it makes extending the wildcard set almost impossible, because you have to worry about backward compatibility. Leaving wildcard expansions to the shell allows them to implement whatever new shorthand they want (** in zsh for subdirectory recursion, for example). We can debate endlessly as to which is better, but I find that the model of keeping the OS simple more attractive. 14. Anonymous Coward says: Huh, it is very interesting to read these comments. I’ve often wondered why the Windows cmd shell works the way it does. In fact, at my first job as a tester, one of the bugs we encountered was "wildcards work on Unix but not Windows." ;) Personally, I much prefer the Unix way of wildcard processing. It’s predictable within the shell, and I always use the same shell. Even if I’m on a Solaris machine, I can still use bash. I know what "find" will do, I know what "grep" will do, and I know what "ls" and "rm" will do. With respect to running out of memory expanding filenames, there is nothing wrong with dumping the names to a file, processing the file, etc. Plus, at a past job we split up directories with that many files anyway because of the performance hit we took (on Windows Server). But that’s my personal preference. The performance difference between the native Windows shell cmds and Cygwin implementations of their Unix counterparts is very different, as Gabe points out. I find it best to use a mix of "dir /s", "findstr" and "grep." :) 15. For running the cmd line… /c leaves the window open when the process is done. /k closes the window when the process is done. Useful sometimes when launching a dos basesd process from your application. 16. Driver Dude says: Having the shell expand command line args means expansion is done by one program – the shell – rather than by every command the user may want to use. The user learns one syntax and it works for most programs that take filename args. If wildcards needs to be given explicitly, there are well-defined ways to escape those chars – namely, the backslash.    find / -name *bak  … Of course there are drawbacks. "ren *.bat *.cmd" is one simple operation that requires a script in UNIX. What if you have a web server that produced daily logs and you want to move 2005 Q1 logs to another directory?     mv all/logs.20050[123]*  Q1 Needs three commands in Windows – one for each month. What I don’t understand is why Windows demands every program parse their command line. When I invoke a program, the args I will pass are distinct pieces of data. A filename is ONE ARG even if it has spaces. Forcing the args into one string loses the distinctiveness of each arg and requires the callee to re-parse and seperate the pieces. The whole business of quoting %1 could have been avoided if the unix style argv[] is used. After all, Explorer knows that the filename the user clicked on is an indivisible datum. 17. Gabe says: I should point out that my Unix version of "del *.txt" was actually "del /s *.txt" because I forgot to pass "-maxdepth 1" to find. Norman, if old shells put filename lists into files for the commands to read, every single command would have to know how to get its parameters from a file and xargs would never need to have been written. 64bitter, my point was not that recursion should be handled by the shell, but that it should be handled along with wildcards by the application. Since the shell doesn’t know about the recursion, it doesn’t make sense for it to handle wildcard expansion. That means that "dir /s *.txt" works just as well as "dir *.txt", but "ls -lR *.txt" doesn’t work nearly as well as "ls -l *.txt", and "ls -l **/*.txt" probably doesn’t do what you want either. And if for some reason your directory has a file called "-rf" in it, "rm *" almost certainly doesn’t do what you want, while "del *" almost certainly does. Likewise, rm doesn’t need wildcard processing because the shell already does it, but that means that "rm *.txt" works and "rm -r" works, but "rm -r *.txt" doesn’t work (and neither does "rm -r *.txt" as it would with ls). As for "keeping the OS simple", it’s hard to tell which standpoint is better. In Unix, every shell has to have its own (possibly incompatible) wildcard implementation and since that wildcard handling is fairly naive, each program that wants to handle wildcards or recursion has to have its own (possibly incompatible) implementation. Whenever you run into a situation with too many files to fit on a command line, you’re stuck running find or find|xargs, so you don’t even get your shell’s wildcards anymore. In Windows, only the filesystem layer has to implement wildcards. This makes Windows simpler, right? NTFS implements wildcards, but the processing is done by an OS library routine (FsRtlIsNameInExpression). Just to try it out, I wrote a Perl script to make a directory with 100,000 .exe files and 100,000 .txt files. It took about 2.5 minutes to run on an NTFS volume. I ran "dir /o > nul" (to sort the directory) and it took about 12 seconds and used 30MB of memory. Then I ran "del *.txt", and the command processor took about 1 minute and never used more than 1500kB of memory. If you ran that test on Unix you wouldn’t run out of memory (who doesn’t have 32MB laying around?), but you would hit ARG_MAX (128k in Linux) and execve() would return E2BIG. 18. For those of you who are more interested in the gritty details of command line redirection, RaymondC… 19. Gabe says: Yes, it is annoying when you want to use wildcards and the Windows program you are running doesn’t accept them. Of course there’s nothing stopping you from just running a wildcard-expanding shell (either a native POSIX version or a Win32 version like cygwin). If you’re compiling it yourself with VC, you could even link in setargv.obj (as described in and you get wildcards expanded automatically. If you’re really annoyed by some program not getting wildcards expanded, you can write your own program to handle it via ImageFileExecutionOptions. Raymond may hate you if you do this. Anyway, having wildcards in the shell is a nice feature, but it still doesn’t prevent programs from having to implement wildcards (like ls, find, ftp, and unzip). If the shell expansion isn’t good enough and the program you want to use doesn’t implement them, you’re stuck with running it through for or find anyway. 20. BryanK says: If your directory has a file named -rf in it, then that’s when you would use "rm — *".  That is, after all, the whole point of the "–" argument. As far as "only the filesystem layer has to implement wildcards" — yes, but if only every program would *use* that layer.  Use of the pattern matching function(s) in NTFS is sadly inconsistent between programs — too many of them expect each file to be given to them, one at a time, and don’t use FindFirstFile/FindNextFile at all.  (And this isn’t just programs ported from Unix, where they wouldn’t have to worry about it; several programs provided as part of a "bare" win2k install do it as well.  Unfortunately I can’t remember which ones they are at the moment.) 21. 64bitter says: we should take the further debate out of raymond’s blog. I am sure no one else cares about it :) I have no quarrel over remote queries like the one you mention, however, the unix way to do it would probably (I’m not a unix expert by any means)be to run rsh ls *.txt at the remote and collect the output. Remember, Unix was networked when networks were even slower :-) To me, doing it in the driver is optimizing for the pathological case at the cost of future extensiblity (which you haven’t addressed).   BTW, if I add a new FSD, does it also have to implement the wildcard expansion ? I would hope not. It’s been a while since I looked at the IFS docs, but I don’t remember them saying anything about that. 22. running "rsh ls *.txt" seems like a strange way to solve the problem. An operation that used to require only directory read privileges now needs remote logon privileges? 23. BryanK says: But "remote logon privileges" may be required anyway, depending on how the directory tree was exported to the client. (NFS?  Yes, that would need extra privileges to do it on the server.  SMB?  Depends; the client would probably need new privileges, but possibly not, depending on the way the SMB "handlers" on both ends were done.  SCP/SFTP?  No new privileges are required for that.  Granted, exposing a remote directory tree via only scp/sftp is probably pathological…) 24. Norman Diamond says: Wednesday, May 17, 2006 5:56 AM by Gabe > Norman, if old shells put filename lists > into files for the commands to read, every > single command would have to know how to get > its parameters from a file In sufficiently old versions of Unix, that was true, exactly as I stated. > and xargs would never need to have been > written. In sufficiently old versions of Unix, that was true, exactly as you stated. Wednesday, May 17, 2006 7:41 AM by Anonymous Coward > Personally, I much prefer the Unix way of > wildcard processing. It’s predictable within > the shell, and it doesn’t change until you open up an editor and start typing search expressions or commands. 25. 64bitter says: Gabe: Good points, but my gripe is exactly with the filesystem having to implement wildcards. To me, that’s a more complex OS, not simpler. It also means that the Windows wildcard expansion is sadly limited. * and ? do not make for much power beyond simple groupings. For example, can I do "ls [A-C]*.txt" with dir ? As far as your argument that the shell should not handle wildcards, I disagree. As I was trying to point out, dir /s is fine, but how do you handle ren /s without re-writing cmd.exe ? What about some other arbitrary command that needs to operate on a set of files ? Wouldn’t it be better if no command ever had to worry about whether it should recurse or not or how it should parse wildcards (or not parse them) ? If I want to add ** (for arguments sake) to windows, I have to update an FSD and/or ntdll/kernel32 instead of  a shell. How often does a normal user run into the pathological case of a > 128k command line ? (which btw is only 32k on Windows :) Is it really worth optimizing for that case ? They can always write scripts to get around pathological cases. In my experience Unix shells have been consistent on the basic regex language they support. ls -l **/*.txt does exactly what dir /s *.txt does. And the nice thing about that is that any program that runs under zsh would have that pattern expanded for it. None of them would have to learn new patterns as they were developed. For example, ** was developed just to overcome the recursion problem. It required no changes to ls, cp, mv or any other existing tools. I can understand both approaches, and I think they each fill a need. The best part, of course, is that you can use Unix shells on Windows and get most of the Unix behaviors you want. If you use native ports instead of cygwin, relative speed is not an issue generally. So the debate about which is better is really a non-issue. They both work on Windows, so the lesson is to use Windows :-) 26. Gabe says: 64bitter, the reason that filesystems *should* implement wildcards is to put the processing closest to the data. Running "dir 64bit*" will take the same amount of time running on an NTFS directory of 10 files as 1000000 files. Running "ls 64bit*" will require 100000x more time to process, even if the filesystem happens to have directories indexed by name. This is even more pronounced over a network. I would rather be able to ask a fileserver "which files start with ‘.txt’?" than to have to send every single filename over the network just to figure out which ones end with txt. Remember, networks can be slow and directories can be large. It’s essentially the same difference as using SQL Server vs. accessing an MDB file sitting on a server. And "dir /s *.txt" is the equivalent of "ls -lR *.txt" because when you run "ls -l **/*.txt" ls doesn’t have the ability to show listings per-directory. 27. Jules says: <i>Granted, exposing a remote directory tree via only scp/sftp is probably pathological…</i> Not quite that pathological: the Linux user-mode-filesystem driver interface <a href="">lufs</a&gt; includes an implementation of ‘sshfs’ which is essentially the same as mounting a remote filesystem while only having ‘scp’ access.  This is deployed in live end-user systems; access to this filesystem driver is one of the most common reasons for people to install the package, I understand. 28. Gabe says: Sorry Norman, but I have a hard time believing that. Do you have any evidence? The V3 man page for sh says "…a list of names is obtained which match the argument…and the resulting sequence of arguments replaces the single argument…and finally the command is called with the resulting list of arguments." This means that as early as Feb 1973 the standard Unix shell was inserting the results directly into the command line. 64bitter, you’re not too far off the mark. zsh actually does some pretty heinous stuff to perform its tab-completion. Any new filesystem would have to implement wildcards, but only to the extent of calling the system-provided functions. Feel free to start your own blog entry about it if you wish. 29. Norman Diamond says: Thursday, May 18, 2006 4:54 PM by Gabe > Do you have any evidence? Mine dated from 1976 rather than 1973.  Sorry I didn’t bring it to Japan and can’t quote from it directly. I do thank you for quoting from the 1973 version. Still, think about the memory problems they would have run into in those days.  It’s not surprising that they might have experimented with workarounds and then reverted an experiment like this. 30. Gabe says: It is quite instructive to see how systems have evolved. For example, back then (1973) piping used the same syntax as file redirection. You might see a command like this: ls >"pr -h ‘My directory’"> Note that the quotes were necessary in order to tell that the next tokens belong to pr instead of ls. This caused them to rethink things, and they decided on the | character we all know and love now (or ^ for those who are ASCII impaired). 31. Norman Diamond says: Friday, May 19, 2006 1:03 AM by Gabe > and they decided on the | character we all > know and love now (or ^ for those who are > ASCII impaired). Yeah that brings back a memory.  I saw someone use ^ in a command line, asked what it was, received a correct answer, and was puzzled.  This was in an environment where all the terminals were ASCII, so even if I fully understood the answer then I still might have been puzzled. In some non-ASCII environments there could be a different answer.  Typing | requires pressing a Shift key, but ^ is a shiftless character.  A command line typist could obtain a performance improvement 5% at a time ^_^ Comments are closed. Skip to main content
global_01_local_1_shard_00001926_processed.jsonl/2330
Archives for blood clot Understanding Thrombectomy and Embolectomy Thrombectomy and embolectomy are life-saving procedures mostly performed in emergency situations. The terms embolectomy and thrombectomy are sometimes used interchangeably, but there are some differences between the two. To understand how a thrombectomy or embolectomy is performed, you must first understand why they are done. Sometimes, due to various factors like disease, blood clots can form in the blood vessels. A thrombus is usually a solid-mass stationary clot. An embolus is when part or all of that clot is dislodged and begins to travel through the circulatory system. Essentially, an embolus is a moving thrombus. These clots can pose serious Read More
global_01_local_1_shard_00001926_processed.jsonl/2355
Buy Discounted Hugo Boss Gift Cards Buy discounted Hugo Boss gift cards online. Freely spend it in store or online, faster you spend the more you save. Payment options: What are Payment options? Loading ... Please wait... Hugo Boss gift cards Have one to sell? Sell Hugo Boss Gift Cards at CardBazaar
global_01_local_1_shard_00001926_processed.jsonl/2371
There’s a thin red line that tells a tale of a heart broken, now mended…of the God-given skill of a surgeon’s hands…of a long wait of nearly overwhelming proportion…of a second chance at life and health and family and friends grateful. manger-crossThis Advent, we praise God for this cross…the cross that came before the Crib…the cross that gave Roger a heart that beats love of God and family…a cross that revealed the goodness and mercy of our Father as He attends to every suffering, every need. Christmas came early to our home.  The gift of life, ever precious and ever new, is a gift we unwrapped eagerly…gratefully and joyfully…thankful to the Giver who is even greater than the gift.
global_01_local_1_shard_00001926_processed.jsonl/2372
Alexandrine Rite One of the great parent rites of the East, used throughout the original Patriarchate of Alexandria, Egypt. One of its earliest peculiarities is the invocation of the Word of God and not the Holy Ghost after the words of Institution, or Consecration. It has three forms: the Greek Liturgy of Saint Mark, no longer used; the three liturgies used by the Copts; and the uses of the Abyssinian Church (Ethiopic). The chief characteristics of this rite are the placing of the Great Intercession, with diptychs and memory of the saints, before the Sanctus, and the absence of the Benedictus at the end of the Sanctus.
global_01_local_1_shard_00001926_processed.jsonl/2374
Xref: news.cso.uiuc.edu alt.folklore.urban:68935 news.answers:7029 Path: news.cso.uiuc.edu!ux1.cso.uiuc.edu!sdd.hp.com!network.ucsd.edu!dog.ee.lbl.gov!dog.ee.lbl.gov!usenet From: [email protected] (Terry Chan) Newsgroups: alt.folklore.urban,news.answers,alt.answers Subject: alt.folklore.urban Frequently Asked Questions Followup-To: alt.folklore.urban Date: 29 Mar 1993 18:35:29 GMT Organization: Department of Redundancy Department Lines: 1354 Approved: [email protected] Expires: 28 April 1993 Message-ID: <[email protected]> Reply-To: [email protected] (Terry Chan) NNTP-Posting-Host: Summary: Urban legends supported, challenged and debunked Please read before posting to AFU Archive-name: folklore-faq Last-Modified: 93/3/29 Version: 2.50 29 March 1993 Official Usenet Alt.Folklore.Urban Frequently Posted Legends "I will set down a tale...it may be history it may be only a legend, a tradition. It may have happened, it may not have happened. But it could have happened..." -- Mark Twain [via Christopher Neufeld] This is alt.folklore.urban -- the newsgroup where nonsense is revered as an artform, and debunking has been taken to new heights. The group has broadened its god-given mandate from a place for discussing urban legends (ULs) to a place for confirming or disproving beliefs and facts of all kinds, including origin of vernacular ("The whole nine yards", "Sniping like a bald giraffe"), common scientific fallacies, obscure points of history, stories of pranks, the location of Foucalt's pendulums, Why "Space 1999" was better than "Star Trek: TOS," and so on. In other words, it's a great place to get a reality check on anything that "a friend" told you, or to compare notes about odd things. As a result, you will find items in the classic urban legend mold (e.g., food contamination legends), as well as old wives tales, and other oddball facts, trivia, and stories. TWO NOTES TO NEW READERS: - We encourage you to post any stories you suspect may be an UL. Funny or whatever. Details matter! Please try to give as much as possible. BUT, be advised that many of the stories in the FAQ have been hashed over. If you wish to debate them, be prepared to substantiate your claim. - The weasely :-) symbol is frowned upon in this group. Any questions, see Phil Gustafson who will gladly rearrange your diodes for you and charge you two-fifty for it. The purpose of summarizing these frequently-seen legends is to provide a guide to veracity and their experience in this newsgroup. Most ULs cannot be traced back to original true incidents, but some, particularly the more recent ones can be. There are ULs which may, coincidentally, have a true manifestation, but a true manifestation does not deprive a UL of its legendary status. However, since many if not most ULs are false, where possible, I include a comment referring to a true incident, subject to sufficient evidence, of course. A DIGRESSION ON URBAN LEGENDS AND "FALSEHOOD" Occasionally, there is a post to the effect of: "That actually happened you st*p*d, f*ck*ng, b*st*rds, Jan Harold Brunvand is Polish, the FAQ list is wrong, the sun rises in the West and it's not an urban legend." As noted elsewhere in this list and by astute individuals on the net, an UL does not have to be false. If we take the example of "The Unsolvable Math Problem" (see below), we find that mathematician George Dantzig is the probable individual involved. So is this story no longer an UL? Jan Harold Brunvand addresses this issue thusly: "Despite finding its [The Unsolvable Math Problem] apparent origin, I continue to accept anonymous versions as legendary. Here's why." "An oral story is a story, whatever its origin. As long as a story continues to circulate in different variations, partly by word of mouth, we may regard it as folklore. But probably 'The Unsolvable Math Problem' legend should no longer be discussed as strictly 'apocryphal,' since we now seem to have found its source, and the deviations from the original incident are easily recognized and are not excessive." - JHB,_The Choking Doberman_, p. 282 Veracity is interesting but far from the only thing when it comes to the study of urban legends. MEANWHILE, BACK TO OUR REGULARLY SCHEDULED PROGRAM . . . I have also begun to collect references to specific volumes of JHB's to document various classic ULs. This is a slow and on-going process. Acronyms for Jan Harold Brunvand's books in the list below are: TVH - _The Vanishing Hitchhiker_ TMP - _The Mexican Pet_ TCD - _The Choking Doberman_ CBA - _Curses! Broiled Again_ TBT - _The Baby Train_ (forthcoming, March 1993) Related newsgroups to consider when posting an article which may be "folklore": - alt.folklore.computers [guess what this one is about?] - alt.folklore.science ["Does hot water freeze faster than cold?" Heh.] - alt.folklore.college [Lots of the same old stuff, but why not?] - alt.folklore.ghost-stories [A Joel Furr production.] - sci.skeptic [for those with lots of time on their hands] - alt.tasteless [frequently more appropriate than not.] - alt.usage.english [pretty self-explanatory, dontcha think?] - alt.flame [just a thought else hold that thought] - alt.binaries.pictures.erotica.d [the others are for *pictures* only.] - alt.religion.kibology [the mother of all newsgroups] - rec.arts.startrek.misc [Anything about "Lost in Space" will do.] NOMINATIONS FOR THE OFFICIAL MOTTO OF A.F.U. [One free clue: if youse post with one of the following in your article, youse takes youse chances in this newsgroup.] "It could have happened, so it must be true." "Sheesh!" "Sorry to inject some facts into this newsgroup..." "It COULD have happened so it MUST have happened" "Bula Vinaka" "I read it on USE[less]NET so it must be true." "You st*p*d f*ck*ng b*st*rds..." "The way I heard it..." "I read it in the paper..." "I think it's stupid. We collect all these business cards, and it turns out nobody wants them." "Mumpsimus" "Furrfu!" "Bzzzzt!" "No Facts but..." "And as for the voracity [sic] of the source, this is my GRANDMOTHER you're talking about." "True story as far as anyone knows. No particular reason why it should be doubted." "I can't vouch for the veracity of your story. But there's enough stupidity out there that I'll believe it." "He might have. That alone is enough to prove..." "Are you saying that some soaps are not detergents but that no detergents are soaps?" [Happy, Chuck Adams? Sheesh!] "Well, looking at my couch, I could see how this would happen" "Excuse me. But can anyone tell me what's going on here?" "I'm not making this up. I've seen a wargame of the battle of Stalingrad which includes an optional counter for mine dogs, so it must be true. "I will not describe it so don't even bother asking me about it." "My girlfriend has seen people doing this. Sources don't come more reliable." "If you doubt this crap, Ive [sic] got a copy I could quote." "I heard the story. It wasn't cocaine, it was a cat." "Exaggeration makes a better story." "Yup. I've heard that one too so it must be true." "I didn't keep any references as I didn't think it would be a subject on AFU." "I do not post speculation or bullshit to this newsgroup." "Sounds like bullshit to me." "I must say, with all due respect, the tone of your reply is typical of much of the dialog that goes on on this network and newsgroup. Any apparent weakness or oversight, real or not, becomes the occasion for an attack on the basic intelligence of the person who reveals it -- in this case the lecturer whose talk some fifteen years ago I sketchily summarized." AFU MAN OF THE YEAR (1992) - Trelford Pinkerton RUNNERS UP FOR AFU PERSON OF THE YEAR (1992) - Obik, the frozen, neolithic homosexual - Stein, Cindy's troll or husband or whatever SPECULATION ON CAPTAIN JAMES T. KIRK'S MIDDLE NAME - "Terry" - "Tirebiter" - "Tennessee" - "Tyrone" - "Tin-Plated Dictator with Delusions of Godhood" - "Teriyaki" OFFICIAL AFU MASCOT - My pet King snake, Elvis - Peter's pet dalmatian dog, Pixel - snopes' pet cat, Snopes - little gator's non-biological gator, harvee - Cindy's pet troll, Steinar - Nigel's pet human, Joel Furr HACK ETYMOLOGIES FOR THE WORD 'POSH' - Puke On Shoes Here - Port Out, Starboard Home - Passed Out, She Hurled - Post Office: Shergold's Hospital - Pulmonary -- Oxygenated Supply to Heart - Port Out, Sherry Home - Prow Outward, Stern Homeward OFFICIAL AFU PHOTOGRAPHER - Dan Wright OFFICIAL FOOD OF AFU - Chicken Mole' - Red Velvet Cake - Poinsettia salad - Kentucky Fried Chicken - little gator's Deep Sh*t Cookies OFFICIAL BIG DIC OF AFU - The OED or Winston Churchill (tie) Okay, the major categories are: - The Misappliance of Science - The 'Plane Truth (What goes up...) - Does Not Compute - Twinkie Twitter - Mysterious Medical Maladies - Wind Powered Fantasies - Stupid Academia Tricks - Stupid People Tricks - What's in a Word? - Reefer Madness - How Firm is Your Foundation? - Kill Your Television! - Astonishing Antipodean Antics - Lewd Food - Snuff Movies - Upstanding Legends of the Penis and Scrotum - Hide the Salami - Disney Dementia (and other amusement park legends) - Question Authority! - Legal Beagles - Wild Life in the Fast Lane - Legends About Natatory Capabilities of Large Anthropoid Primates - Astounding Avian Anomalies - Doggie-Style and Cattie-Wumpus - Other Animal Crackers - Arthropod Crackers - Some References and Credits Key to one liners below: T = 100% scientific truth Tb = believed true, but not conclusively proven F = 100% falsehood Ft = A legend, mostly untrue, but with a true occurence or known origin. Fb = believed false, but not conclusively proven U = unanswered and may be unanswerable P = Maybe it didn't happen, but it's scientifically possible (used extremely sparingly, where the opposite is expected, as it could apply to just about every legend) There is a comment, "*", on certain lines in the FAQ. This indicates that there is further information on this point available via anonymous ftp. Thanks to the great generosity of CatStyle (Jason R. Heimbaugh) and the Grate State of Illinois, the site name is cathouse.aiss.uiuc.edu ( The subdirectory is /misc/fun/urban.legends. For our overseas folk, Haakon "YuNoHoo" Styri has also established a mirror site at balder.nta.no ( The subdirectory is /pub/alt.folklore.urban. Many thanks for their efforts. Hint: Grab the file named "Filelist" for a description of what's there. ================================================================================ THE MISAPPLIANCE OF SCIENCE F.*You can make as much ice faster by starting with warmer water. T.*Boiled water freezes faster than ordinary water at same initial temp. T.*Hot water evaporates while freezing, producing 75% of ice in 90% of time. F. A penny falling from height of Empire State building will embed in pavement. [Yeah, yeah, it's mentioned in the _Life in Hell_ books] T. There is no truth to the rumor that James "T." Kirk's middle name is Terry. F. Bath water drains the other way round in other hemisphere, due to Coriolis. T. Coriolis force affects fluids if you take incredible pains to isolate it. Fb.Microwaving panties kills yeast infections (cold spots in oven...) F. Coloring your CD's rim with (special) marker will enhance sound quality. T.*CDs are the size they are because it could hold Beethoven's 9th symphony. F.*People explode/boil/something in the vacuum of space. F. Eelskin wallet demagnetizes bank cards (nope, but magnetic clasp might). F. Daylight sky appears dark enough to see stars from bottom of deep well. T. Venus and perhaps a few other bright stars/planets can be seen in daylight. F. Bubbles in bubble wrap contain a cheap, but toxic gas. U. East German secret police "bug" factory now uses skills to make hearing aids F. Hot-drying acid-washed jeans "re-activates" the acid(Nope, but might shrink) F. Ontario Hydro mandated poor installation,so copper fails as often as Alum. T. Fluorescent lamp will light up when held near high-voltage line. T. You sure can raise bloody hell asking about physics/chemistry on AFU. Tb.Fluorescent light will break down vitamins in clear milk containers. F. Fluorescent lights leach vitamins from your body. Tb.Leather saddles used to be treated with llama dung to avoid scaring horses Tb.The spec. for leather saddles got copied for leather jackets... T. 3M "post-it" notes were invented & marketed as an unofficial project T.*Subliminal messages in advertising are ineffective, but outlawed anyway. ["Media Sources and Business Legends" in TCD] U. Filamentous phage M13 obtained from lab's letter rejecting the transfer! T. Long term storage of paper in a PVC envelope is harmful (fumes degrade it). T. Some combinations of metal tooth fillings can receive radio signals. F. Printer/copier toner is carcinogenic. [But be careful about breathing it.] F. The moon is larger near the horizon than up in the sky due to refraction. T. The above is due to an optical illusion. T.*Indiana House Bill #246 of 1897 would've set pi=3.2, killed in state Senate. Fb.Some state (e.g., Kansas) once considered a bill setting pi = 3. F. US and Russia won't destroy their cultures of smallpox for fear of bio- war. F. Taking baking soda as an antacid is bad 'cause CO2 can rupture your stomach. U. Hypnosis is a fake! Net says "Yes, no, zzzz". [But does remove warts.] F. Flowers are bad in hospital rooms because they suck oxygen out of air. Fb.People only use 10% of their brain capacity (whatever that means). F. If the entire population of China jumped up at the same time: a) the Earth's orbit would be disturbed, b) the entire US would be swamped by a tidal wave. Fb.If all the Chinese screamed at the same time, people in the US could hear it U. This message is costing the net hundreds if not thousands of dollars. T. There was a natural nuclear reaction in Africa long ago [NOT an explosion.] F. Swimming right after eating will cause cramps and you'll drown. F. Squeezing out the air from a partially consumed soda bottle will keep soda from going flat. F. There are workmen who died building Hoover Dam and were entombed in it. F. I deleted all references to Kibo from the FAQ list. F. There is a pillar in India made of metal found nowhere else in the world. Tb.Tomatoes are not vegetables, they're berries. [Thanks, Scott C.] Tb.Women workers in old watch factories got poisoning by licking brushes used for applying radium compound to watch faces. U. Deckard was a replicant. [I don't care about the "Director's Cut."] F. Large telescope mirrors often become distorted due to glass flow. F. You can see glass flow in the windows of old buildings. Tb.MRI used to be called "Nuclear MRI", but "N" was dropped due to nuke fear. T. Nobody came up with any good stuff on the origins of Daylight Saving Time. U. "Trekkies" are controlling the minds of everyone on the net. Fb.A newspaper spellchecker sub'd "In the African-American" for "in the black." F. Welding while wearing contacts can cause them to stick to your eyeballs. F. NASA sends Swiss watchmakers very thin threads of gold; they send back drilled w/holes. [Similar story w/Japan and US.] F. Standing a hard-boiled egg on end has something to do with an equinox. THE 'PLANE TRUTH (WHAT GOES UP...) T. 800ft diameter asteroid passed within 500K miles of hitting earth in 1989. T. Confused pilots occasionally land on tiny strip short of correct airport. T. F51D plane can flip due to engine torque.(A. Frisbie posted pilot's manual!) Tb.US Govt fixed plane transponders always report positions(catch drug imports) T. Airforce/manufacturers tests planes by firing chickens from special cannon. Tb Cessna planes aren't sold in the US anymore due to threat of liability suits T. Beechcraft and Mooney still make & sell planes in the US however... T. Pilot can discreetly signal a hijack by setting the transponder to "7500" Tb.Leave flaps down when off the active as a request for armed intervention!! F. The Great Wall of China can be seen with the naked eye from the moon. T. Many manmade structures can be seen with the naked eye from Earth orbit. F. Shuttle crew did secret experiment on how to make love in zero gravity. Tb.Jet lag is exacerbated by alcohol consumption. T. Parachute mishap brought down a Cessna (gently) on a novice's parachute. F. Airlines use a gas to keep passengers mildly sedated and less troublesome. U. Similar story of lowering cabin pressure below usual. Fb.Both pilots on airliner end up locked out of cockpit in lavatory mixup. ["Death and Danger in the Air" in CBA] U. In 90% of plane crashes, the words "Oh sh*t!" appear on the flight recorder. Fb.Man surnamed "Gay" is on a full flight. Stewards check list and have to bump someone and he's up. Steward asks if someone's "Gay." He says "Yes" and they tell him he's to be bumped. In a misunderstanding, others chime in saying "No, they're 'Gay'." DOES NOT COMPUTE T. Apple use a Cray to design hardware systems; Cray use an Apple... T. Prodigy grabs large sectors of the disk, containing data from deleted files. F. Prodigy slyly reads your disk & nefariously uploads your top secrets to IBM. F. Stories about Seymour Cray's strange hobbies (annual boat burning etc). F.*The FCC is proposing a modem tax (Nope, the proposal died in 1987). T. Bill Gates has $750K Porsche 959 he can't use;no type compliance,no license! U. New computer system "lost" a Montgomery Ward Calif warehouse for 3 years... T. "q=q++;" is an undefined statement under ANSI C(same object modified twice). Fb.Dave^H^H^H^HTerry Manley will never get in the FAQ list. T. Calling "#" a pound sign as in common US parlance really riles some folks up T. "#" is frequently referred to as a "hash" mark outside the US. F. Russian/Chinese mechanical translator translates "out of sight, out of mind" into "blind and insane". Also "Spirit is willing, but the flesh is weak" as "the drink is good but the meat is rotten." T. Terry Wood proved that it's not easy to shut down the net. (Although posting that 'Lost in Space' was better than 'Star Trek' [TOS] came close.] U. IBM ordered a whole bunch of "THIMK" games; but printer changed to "THINK". T. In 1947 a moth was found in a relay of the Harvard Mark II machine, and taped into the logbook as the "first actual case of bug being found". T. The log book used to be in building 1200 "K-lab" of the Naval Surface Warfare Center, Dahlgren Division. Now at the Smithsonian MoAH. F. Grace Hopper coined the term "bug" as a result of this event. T. Grace Hopper was a programmer for the Mark II and often told the moth story. T. "Bug" was used to mean a design defect as far back as Edison's time. TWINKIE TWITTER T. "animal or vegetable shortening" on ingredients list == LARD F. Hostess snacks (Twinkies, Cupcakes, etc.) aren't baked! They set,like jello Fb.Twinkies eat mold... If mold grows on a twinkie, the twinkie digests it... T. There really were chocolate "iced" Twinkies. Tb.Jonathan "et al." Papai wears a "Miracle Ear" to navigate long hallways. F. Singer John Denver served as a sniper in Vietnam (poss. his dad did). T. Drew Lawson can't handle Zingers. MYSTERIOUS MEDICAL MALADIES U. Woman had "tree in the bedina" -- potato used as pessary, sprouted... U. Woman had "Smiling Mighty Jesus" -- spinal meningitis. U. Woman had "sick as hell anemia" -- sickle cell anemia U. Woman named child "Nosmo King" after sign on delivery room door. F. There is a special ward for "Newky Brown" addicts in Newcastle General F.*Person's hair turns entirely white "overnight" from stress. T. Some people sneeze when exposed to bright light ("photic sneeze effect"). Tb.You can catch diseases (crabs, lice, herpes, VD, etc) from public toilets. Tb.Patient died when intravenously given Kaopectate. U. FDA approval causes cancer. Tb.Drinking large quantities of deionized/distilled water over a long period of time can screw you up due to ion imbalances. F. Hair/nails continue to grow after death. T. They appear to as the corpse shrinks. F. Woman sees doc with irritated eye. Sez a male stripper rubbed his pouch in her eye. Doc checks and removes a louse from it. F. "Ear lobe" repair is booming in NYC because thieves rip earrings off women. F. Thugs hide under cars in malls and cut ankles of women returning to cars. [Above two in TBT, forthcoming] Tb.Rat(s) eat face of child while child is near adult in poor side of town. F. An autopsy reveals big hairballs in lungs of a man who breathed in bits of hair while he worked, and thus suffocated him. T. RT's wife's small hair ball nearly killed her. And she's got a big scar. F. Girl dies of big hairball in stomach from chewing on ends of her braids. [Above two in "The Hair Ball" in TMP.] F. Mime has heart attack during act. People think it's part of act; he dies. F. B.F. Skinner's daughter died/committed suicide/sued because of rearing in Skinner box/special cribe. WIND-POWERED FANTASIES T. Fin-de-siecle Frenchman,Petomane,got rich farting as music hall act.Fartist. U. Blowback (blowforward?) from ignited fart, singed frat-boy's intestines. U. Vet cut vent-hole in cow's flank, lit escaping gases, burned down barn... Tb.A patient's intestine explodes from cauterization during surgery due to gas. T. A patient's intestine exploded during a colotomy. STUPID ACADEMIA TRICKS NOTE: Many university-based ULs are passed continually. Before posting, check out the references below and in Appendix B of JHB's textbook which has a survey of academe ULs by Barre Toelken. T. Prof lists famous unsolved problems;student thought it was homework- solved! (Student was George Dantzig.) ["The Unsolvable Math Problem" in CBA.] Fb.Student cheats on exam,asks "do you know who I am?",jams paper in exam pile! ["Bluebook Legends" in TMP] Fb.Professor jostled; misses watch;grabs back from jostler; later finds at home [Variation of "The Jogger's Billfold" in TCD] F. College roommate commits suicide, gets you an automatic "A" for courses. ["The Suicide Rule" in CBA.] T. Student gets tuition $ by asking for $0.01 from each person via newspaper. Tb.Students find rolled-up carpet; take and unroll in dorm room to find body. Fb.Student kills self during exam by putting 2 pencils in nose and hitting desk T. People's lawn gnomes/elves stolen; owners were sent letter/pics from exotic locations with the ornament. ["Roaming Gnomes" in CBA] T. Famous UL researcher misspells the subtitle of a Star Trek film in a book. F. Two co-eds alone in dorm; one goes to study; other in room; roomie hears heavy dragging sounds; blocks door; hears scratches; waits til morning; opens door to find other co-ed with ax in head who was scratching for help. ["The Roommate's Death" in TVH and TMP] Fb.Students buy a barber pole and drive the town. Stopped continually by police F. Girl is alone at home/dorm with dog; sleeps; hears noise and a dripping sound; is frightened but reaches to dog and feels a lick; goes back to sleep. In morning, finds dog hanged in shower and note under bed which says "humans can lick too." ["The Licked Hand" in TCD] Fb.Prof. gives "announced" quiz to surprised class after putting ad in paper. Fb.Prof. allows students to "bring in what they can carry for exam"; student carrys in a grad student" (variation on allowing use of "Feynman"). Fb.Prof. nails exam thief by cutting bottom 0.5" of exam to find longer answer. Fb.Philosophy prof.'s 1 word exam: "Why?" "A" to student who replies "Why not?" [Many, many variations]. Fb.Low grading prof. grades same exam in successive semesters; gives higher grade each time. 4th time around (or so), writes: "Like it more each time". [Version with drawing of a whale.] Fb.Prof. lectures class on sugar content of ejaculate. Girl then asks "Why does it taste so salty then?" Runs out of class amidst laughter. Fb.Science class students take swab from inside of cheek and examine under microscope. One group sees odd organisms and calls prof. who looks and declares that it's sperm. Fb.Student submits 20 yr old paper for class; prof. gives "A"; says he always liked it but he only got a "B" when he wrote it. [The above 6 are in "College Con Artists and How They Operate" in CBA] T. Prof. Donald "Art of Computer Programming" Knuth's 1st publication was in MAD mag. (MAD #33 "The Potrzebie system of weights and measures") F. Frat holds blood drive. Some grossly high % of frat donors are HIV positive. T. There seems to be quite a few university buildings named after Kresge. Fb.Prof. demos test for diabetes by dipping finger in several flasks of urine and then licking it. Then asks students to do same. They do, after which he says he dipped with one finger and licked with the other. STUPID PEOPLE TRICKS T.*Craig Shergold, UK cancer kid,sought get-well cards,overwhelmed with 33 mil. T.*Craig Shergold, UK health plan wouldn't operate;Kluge paid;tumor was benign! T.*Lousy quality CS GIF courtesy of Phil Kernick available via anonymous ftp. T. Craig Shergold's 13th birthday was June 24, 1992.From now June 24 is AFUday. Tb.Craig Shergold lives in an "unsalubrious" section of town. T. His name has been misspelled several times in various pleas. T. But he sure as heck doesn't want or need any more cards now. T.*See _The Guinness Book of Records 1992_, p. 207.4 for his listing. T.*See 19 July 1990 _NY Times_ (p. 24), _People_ magazine 10 June 1991, p. 63. T.*Check the afu anonymous ftp site for sources and references. T.*Cards that are sent to the hospital no longer go to him. T. A variation of the above now includes a call for business cards. [Classic American UL in this genre is "Postcards for Little Buddy" in CBA] T. There was a version involving bar codes which was a hoax. Tb.Paul Tomblin wants to put Craig back in the hospital. Tb.John Slater doesn't think Craig live in an "unsalubrious" area anymore. Tb.Craig voted on the folklore rmgroup from [email protected]. U. Errol Flynn was invited to "black tie" party; went nude,except for black tie U. Ed Zotti is Cecil Adams, or Marilyn vos Savant, or Isaac Asimov, or.... T. Some beggars with "will work for food" signs are just extra sympathy scams. T. People have been injured by rocking a vending machine that falls on them. Fb.Man's house demolished after friend placed ad in paper for a joke. Fb.US GI captures Iraqi soldier - they knew each other from Chicago. F. Special chemical for swim pools, turns bright color on contact with urine. F. "3 Men & a Baby" has a scene with a real ghost in it. Fb.Wife sprays toilet with flammable bug spray, husband shits, smokes, explodes Wife sprays toilet with flammable hair spray, you know the rest, etc. ["Hilarious Accidents" in TMP. Variations in TVH.] Fb*Aluminum ring pull tabs are collected & exchanged for dialysis machine time. ["Redemption Rumors" in TMP] T. The Ronald McDonald House in Rochester, MN is collecting tabs for their own kids needs as of 3/92. Thanks to Shawn Brawnhart, [email protected], E. David J. Tearns, and me for following up on this. F. Chanting "Mary Worth" before a mirror summons dead spirit at slumber parties Related to famous La Llorona legend? ["I Believe in Mary Worth" in TMP] Fb.Male athlete cheats drug test with wife's pee; test shows he's pregnant. T. Infirm, elderly, obese alcoholics have set themselves on fire occasionally. F. People occasionally spontaneously combust and burn to death. Whoompfh! F. Cabbage Patch dolls are possessed by the devil. F. Kid sends broken Cabbage Patch dolls sent back. Death certificate sent back. ["The Cabbage Patch Tragedy" in TMP] Fb.Couple stays in odoriferous hotel room;informed next day of body in mattress F. Someone is crushed to death trying to shrink blue jeans by wearing in tub. ["Product Defect and Liability Legends" in TCD] F.*Tourists' room is burgled, later finds snaps of "toothbrush up thief's ass". Perry Pederson([email protected]) claims to have seen such pictures from his mother-in-law's Mexico vacation in June 1992. Yeah, right. F. Two guys see kid fishing; kid says fish aren't biting but worms are; on way back; they discover kid slumped over; worms were baby water moccasins! ["The Can of Snakes" in TMP] Fb.Child's foot/leg is amputated after pumping Reeboks shoes too tight. F.*Dr. C. Drew, a plasma researcher; bleeds to death when hospital turns him (a black man) away. [Similar story with death of Blues great Bessie Smith.] T. For some reason, some folks kill snakes by grabbing tail and "snapping" them T. "Chicken sexing" is big business. Started by Asian family. T."little gator" S. Mudgett is mentioned in one of Cecil's books. F. Folks find casks of wine in cellar of old house. Tap and drank from several of them. Later, preserved body of original house owner found in cask. [Body in the cask motif may find some basis in old story of Admiral Nelson of Battle of Trafalgar. His body was shipped back in wine/rum cask. Upon arrival in UK, cask was low/empty. "The body in the cask" in TCD.] Tb.Nautical saying: "Tapping the Admiral" is based on the above. F. Boyfriend tells girlfriend they're through and she should leave when he leaves on a long trip. He returns to find phone off the hook connected to the "time" recording in Japan/some far away place. ["The Lover's Telephone Revenge" in CBA] F. Helicopter fights forest fires by scooping water from lake. Charred body of scuba diver found in ashes. ["Death and Danger in the Air" in CBA] F. Ship captains, on their own authority, can perform marriages. F. Fat person on ship/airline toilet has intestines sucked out due to vacuum. U. Brian "Allah Mode" Scearce manages the "Hors de Combat" female mudwrestlers. Fb.Some guy in a foreign country teaches the locals that a certain obscene handsign (to him) was actually a welcoming gesture. Locals all pose for pictures while making the gesture. F. Woman on bus raises a man's hand and asks "Who does it belong to? It was on my butt." Several red-faced men get off at next stop. T. Jan Harold Brunvand's son, Erik, teaches at UU and even read a.f.u. Sheesh! F. Halloween sadists randomly give poisoned candy to children. T. A Texas child was poisoned by his father on Halloween in 1974. [Above two are in "Halloween Sadists" in CBA] F. Woman frequents tanning salons; develops funny smell; innards cooked! ["Curses! Broiled Again" in _CBA_] T. A guy goes a-shooting at Saguaro cacti; hits one. It falls and kills him! ["The Plant's Revenge" in _CBA_] F. Someone couldn't call for help because they couldn't dial the "11" in "911". ["Dial 911 for Help" in TCD] T. Lots of people comment on the FAQ list without actually reading it. Tb.People were once frequently mistaken for dead and were buried alive. Tb.Edison's last breath is kept in a jar in Michigan. (Well, sort of). Tb.Elvis lives near Palo Alto, works for Sun, and speaks w/an English accent. Fb.Co-ed loses tampon inside prior to blind date; worried; sees school intern; is acutely embarrassed. Her date turns out to be the intern! Fb.Young man buys condom from pharmacist; he's embarrassed so boasts of date. He picks her up, pharmacist/dad answers the door! ["The Blind Date" in TMP] F. Bride at big wedding thanks each person, then thanks groom for sleeping w/maid-of-honor. Then throws bouquet, etc. ["The Bothered Bride" in TMP] F. Kid in Michael Jackson's commercial breaks neck and dies from: breakdancing, OD, hit by motorcycle. Kid is Alfonse Ribera. Rumored of many kids on TV. [See "Michael Jackson's Dancing Partner" inTMP] F. First 7 numbers on bar code of "Thriller" album is Michael Jackson's phone. ["Michael Jackson's Telephone Number" in TMP] F.*Phil Collins' song "In the Air Tonight" is about a death witnessed by Phil. T. Sheesh! This was even debunked in _Parade_ magazine. T. Crotch seam rivet in 1st Levi's dropped due to pain from standing near fires F. Several suburban white women visit big city. They nervously enter elevator which has a black man and a dog.He says "Sit Lady!" They promptly sit on the floor but he was talking to the dog! T. UL ends w/free dinner, roses, or tickets to concert for ignorant women. T. Guys mentioned include Reggie Jackson, Wilt Chamberlain, Lionel Ritchie, Eddie Murphy, O.J. Simpson, Joe Greene and Magic Johnson.] T. There is an amusing variant about the English parliament (look it up). T. Older version: woman stuck in an elevator where two black men piss on her. [The above five are in "The Elevator Incident" in CBA.] F. Couple hires hippie-type babysitter. Later, mother calls and sitter says everything is fine; she's stuffed the turkey and put it in the oven. Mom worries since they don't have an turkey; parents rush home and find that stoned sitter has (or is about to) put baby in the (microwave) oven. ["The Hippie-Babysitter" in TVH.] F. "Clever" babysitter stops baby crying by holding its head in oven. ["The Clever Babysitter" in TMP] U. A plain-Jane coed invited to special night out by a BMOC. As she gets ready, has bad gas from lunch. Date arrives;so plans to fart in car before he gets in. She farts and quickly rows down window. Date gets in, says,"I'd like you to meet Tom and Mary in the backseat." ["The Fart in the Dark" in TVH.] Fb.Family visits wilderness park. They see bears and want to get "cute pics" of bear w/child so they smear honey on his cheek. Bear eats child's face. F. Bride's father at wedding goes to pay band, but wallet is missing and has to take up collection from guests. Later viewing of wedding video shows groom's father lifting bride's father's wallet! ["Sex Scandals" in TCD] Tb.Some guys who make $ recycling aluminum strip a house with new siding. Tb.People (mostly guys) have been electrocuted pissing on a subway's 3rd rail. T. Common UL mills include Dear Abby, Ann Landers, and Paul Harvey. F. Woman lighting fire opens door w/hot poker;robber at door sees and grabs it! (Var. where woman is holding a knife). ["The Robber Who was Hurt" in TCD] T. I don't give a damn when the 21st century starts. Everyone knows it's 4691. F. Clocks are commonly displayed at 8:18/8:20/10:10 because that's when JFK or Abraham Lincoln was shot. WHAT'S IN A WORD? [Try checking out the OED and the Dictionary of American Regional English for etymological history; _The Penguin Dictionary of Historical Slang_, by Eric Partridge (abridged by Jacqueline Simpson). Penguin books. For you other types, there's always alt.usage.english.] F.*The etymology of the 4-letter word "f*ck" is an acronym of old. [e.g. "Fornication Under Consent of the King.] T. Lord knows, there're lots of variations of initials/names for "Jesus Christ" F. 'HAL' in the film "2001: A Space Odyssey" was derived from letters for "IBM" Tb.The expression "86" (to put the kibosh on), originated in 1920s diner slang. T. A.J.Balfour appt'd Secretary Ireland by Uncle Bob.Nepotism? Bob's your uncle T. JF Kennedy said "Ich bin ein Berliner." Could be either "I am a native of Berlin" or "I am a jelly doughnut." Berliners knew what he was talking about T. Hebrew was considered as official language of the US. [Guess what happened?] F.*German was once within one or two votes of becoming the official US language T. Fijian on the AT&T ad says ""Bula vinaka, beachside!" ("hello, thanks"). T. Many languages don't pronounce foreign words/phrases as they really are. Fb.US Civil War Gen. Hooker is the source for a common term for streetwalkers. Tb.Though he may have helped popularize it. F.*Thomas Crapper invented the flush toilet. T.*Thomas Crapper did exist and made improvements to modern flushing mechanisms F.*The word 'crap' is derived from Thomas Crapper. F. Otto Titzling invented the brassiere. F.*The words to "Louie, Louie" are dirty.[Thanks to Maiko Covington for lyrics] F.*Eskimos have some megaboss number of words for snow. F.*"Posh" is from "Port Out, Starboard Home" from Colonial English days. T.*"Hamburgers" and "Frankfurters" are named after cities in Germany. T.*"In like Flynn" is from Errol Flynn's acquittal on statutory rape charges. T.*"Okay" is from Martin 'Old Kinderhook' van Buren and a weird fad of the time Tb.Warren Burstein posted some urban legend stuff once or twice. T. The du Pont Co. has claimed (1940) that "nylon" was an arbitrary coinage, but also (1978) that it was a modification of "no run" spelled backwards. F. Jack Kerouac wrote that "Pig" stands for "Protector of Immutable Government" T. "Futhark" is an acronym. F. "Furrfu" honors Joel Furr, who flamed a proposed rmgrouping of alt.folklore. computers to ashes in late 1992. Tb.Bruce Tindall *has* plugged books not written by his family. T. But I can't remember any of them except the OED. T. He does make a hell of a double Manhattan though. F. The song "Puff the Magic Dragon" is about smoking pot or Vietnam war weapon. HOW FIRM IS YOUR FOUNDATION? F. Building is built backwards. Public criticizes; Architect commits suicide. Tb.There have been buildings built backwards. F. Various university libraries sink; books heavier than architect thought! F. Same as above, but pool not library, weight of water, not books. Ft.Lots of bldgs (malls, etc.) are sinking into the ground as we post! [See "Back to the Drawing Board--Some Architectural Legends" in CBA] T. Some universities, cities are riddled with semi-secret utility tunnels. T. Clouds and other weather can transpire in the upper parts of high structures Fb.RC Church building plans reviewed by Pope/Vatican; response was "we are not angels"; plans had no loos! Fb.Bldg collapses due to gas explosion from buried dead elephant under it. T. Soldiers break step when marching over bridges (trivially observed). U. Bridge falls down if soldiers don't break step when marching over. Fb.Bridge falls down due to resonance if soldiers don't break step marching over. Broughton suspension bridge, England, 14 April 1831, fell under soldiers march, but prob just overloaded, not resonating. Mark Brader posted Times story! F. Otherwise sound bridge falls down if soldiers don't break step marching over. (There have been no documented instances of this) KILL YOUR TELEVISION! F. "Newlywed Game" husband televised response that the strangest place they made love was "That'd be the butt, Bob." T. Brian Gordon posted Bob Eubanks interview where Bob offers $10K for proof. T. Many people claim to have seen it. Bill McCauley claims to have a tape. T. Robert Huss claims to have seen this episode but says the quote is wrong. F.*The UK cartoon series "Cpt. Pugwash" had character names w/double entendres. T. Many people claim to have seen and heard these too. What a coincidence! T. Woman has epileptic seizures upon hearing Mary Hart's [ET anchor] voice. Tb.Parents get a video for children. Find it was recorded over old porn tape! F. Johnny Carson said he'd pet Zsa Zsa's pussy if she'd move her cat. F. JC said to Jack Nicklaus' wife that her kissing his balls before a golf game must "make his putter flutter." (Sometimes about Arnold Palmer.) F. JC gave out his AT&T card number for free calls since he won big settlement. [Or Steve McQueen,Paul Newman, Sammy Davis,Jr,Robert Redford,Burt Reynolds.] F. David Letterman tells audience to say "Hi" to Paul Shaffer 'cause his contract says his butt can't be shown on TV. [Above four from "Talk Show Tales - 'Dave's Behind' in CBA] T. Charles Lasner still lives in the '60s. [This line was entered ca. 1962] F.*Kid tells Bozo the Clown to "shove it"/etc. after kid drops egg in game. F.*Bozo interviews kids on show. One kid says "Cram it, clown!" Is removed. F.*Some kid's talk show host says "That ought to shut the little bastards up!" on live TV/radio. [Above three from 'Bozo the Clown's Blooper' in TMP] F.*Soupy Sales was canned for telling kids to send him pieces of paper with pictures of dead presidents from their parents' dresser drawers on his show. T.*He was suspended for a week. F. Jan or Cindy Brady actress was a porn star. REEFER MADNESS [The alt.drugs FAQ list has lots of interesting info.] F.*"Blue star" or cartoon character (esp. Mickey Mouse) tattoos laced with LSD is sold at schools to hook kids into acid. T.*This UL is frequently spread via poorly typed/copied fliers. T.*LSD has been sold on blotter paper with cartoon characters. ["Blue Star Acid" in CBA and "Mickey Mouse Acid" in TCD. See also Dave Gross's definitive periodic posting.] Fb.Person high on drugs stares at sun -- gets partial blindness. T. Check in Medline in December 1992 shows no such case reported. F. Aspirin and Coca-Cola taken together get you high. (Nope.May cause insomnia) T. Phil Kernick thinks it does work on him, but that's Oz for you. U. More than 4 hits of acid in one month renders you legally insane. F. Tobacco cos. prepared to market/mfg joints if pot was legalized in '60s/'70s T. You can beat any drug test (in a Zen way) by not taking the test. U. Guy on pot pulled over by police. Asked if he knew his speed. Was 5 mph! F. LSD accumulates in the brain and spinal column and shows up on x-rays. Fb.McDonald's coffee stirrers changed; they were used by cocaine sniffers. ["Mickey Mouse Acid" in TCD] F.*Banana peels and peanut shells contain hallucinogenic substances. F.*"Street" acid (LSD) is frequently cut with strychnine. T. D.M. Procida is one of the more hilarious posters to AFU in a long time. ASTONISHING ANTIPODEAN ANTICS F. Some part of Australia is antipodal to some part of N. America or Europe. T. Cane toads are now a plague, originally imported to eat cane beetles. U. Koalas are always stoned/drunk, as they eat alcohol in eucalyptus leaves. U. Koalas, being filled with eucalyptus oil, "explode" in bushfires. F. Kangaroos deliver the mail in the outback. U. "Goanna Oil" dissolves muscle protein. Goannas are large native lizards. U. Driver fools tourists in Milford tunnel bus,says motorbike is oncoming train U. Dingos eat babies. Australian courts say YES, NO, YES. Fb.Aussies put vegemite under eyelids to get high. Yum! T. Some New Zealanders do not think very highly of Australians. T. There sure are lots of stories about Vegemite. [Why not Marmite?] U. Derek "I like to post about Africa" Tearne and Hugh Grierson. 'Nuff said! U. Rights to "Waltzing Matilda" are owned by an American, hence not anthem. U. Wayne McDougall is costing the net hundreds if not thousands of dollars. T. "Chooks" taste like chicken. LEWD FOOD T. There're kosher Chinese restaurants in and around big East Coast cities. T. Most mass-market beers contain "foaming agents" to make them form a head. U. Eating lots of chicken fast food causes males to grow breasts (from hormones T. Eggs and chicken are horribly contaminated, and should NOT be eaten raw. T. Unless marked "dairy", fast food shakes aren't milk: mostly carrageen gel. T. Lead leaches from lead crystal decanters into drinks; is not good for you. F. Eating carrots may improve night vision, because of large amounts of Vit A. Tb.Microwaved food is better (other cooking allegedly creates carcinogens) Tb.Eating celery takes more energy than its digestion yields. U. Mick Jagger used a Mars bar as a dildo on nubile pop loon Marianne Faithful. F,T,T,U.Fast food places use unusual ingredients: worm, 'roo meat, seaweed, rat. ["'The Kentucky Fried Rat' and Other Nasties" in TVH] F. Stranger at restaurant eats your cookies, you grab, later find you took his. ["The Packet of Biscuits" in TCD. Douglas Adams claims this really happened to him in _So Long, and Thanks for All the Fish_. Var. w/Kit Kat bars.] F.*Cook cheated into buying Mrs Fields' recipe, gets revenge by spreading it. ["The Mrs. Fields Cookie Recipe" in CBA. This is probably a descendant of the "Red Velvet Cake" UL in TVH. Another version involves Nieman-Marcus and many other noted retail establishments.] F. Green M&M's ("Smarties" in UK and Canada) are an aphrodisiac. F. Red M&M's are a carcinogen (Nope, they used red dye #5,not dangerous #2) [Both M&M legends are in "Green M&Ms" in TMP] F. Ingesting a tapeworm will help you slim, so people do this regularly ["'Bosom Serpent' Legends" in TCD.] T. Many CIA (and other gov't) snackbars are staffed by blind people. F. They're hired to help maintain secrecy. F. Grape seeds can get caught in your appendix and give you appendicitis. T. Steven Bellovin thinks diverticulitis may be source of this UL. T. British army doses water with bromide (for purification), soldiers say it's. U. ...to suppress soldiers' libidos. US Army salts their peters with saltpeter. Fb.Kennedy family made their pile thru a Scotch import monopoly Tb.Kennedy family made their pile thru smuggling Scotch during prohibition. F. The red leaves of Poinsettias (aka the Xmas Plant) are deadly poisonous. ["The Poinsettia Myth" in TMP.] T. Poinsettia sap and leaves are irritants and may harm small children. T. People have been poisoned by eating food cooked on burning oleander branches Tb.Asparagus stinks up pee, but ability to smell it is genetically inherited. T. Fresh seeds from plants of rose family react to form cyanide in the body. T. Lots of Asian restaurants have humorous names to English speakers. F. Mikey (Life cereal) exploded from eating Pop Rocks with soda (You wish!) ["The Death of Little Mikey" in TCD] F.*A popular Mexican beer (esp. Corona) was made with urine. F.*Snapple supports Operations Rescue and/or the KKK. F.*Tropical Fantasy causes sterility in black men. T. Some people like to eat the placenta (aka afterbirth) of their children. F. Shampoos and foreign beauty aids are made from aborted babies. ["The Secret Ingredient" in TMP] F. Couple travels to exotic locale with pet dog. Eatery prepares it for them. ["Food and Restaurant Rumors and Legends"/"Unfortunate Pet Legends", TCD] F. Ethnic eateries (Chinese/E. Indian/Italian) use cat/dog/human meat instead of expected meat.["The Eaten Pets"/"Further Ethnic Stereotype Legends,"TMP] F. Cantaloupes are infected with salmonella and are thus bad to eat. T.*Woman removes label from "tuna" can, finds cat food label underneath. T.*The cat food actually was tuna canned 6 years earlier in Canada, declared unfit for human consumption, allowed to be exported as pet food, and then illegally relabeled as tuna again. (Toronto Star, March 24, 1992) Fb.In pre-revolutionary Paris, peasants resold food from restaurant garbage. T. Vegemite (and Marmite) is made from yeast by-products, salt, and other stuff Fb.Cannibalism was a common means of sustenance for past cultures. F. "Instant" ramen noodles are coated w/wax and can cause intestinal blockage. Fb.Drinking alcoholic beverages through a straw makes one drunker faster. Tb.Carbonation in whisky and soda makes one drunk faster than a straight whisky F. Marco Polo brought pasta back to Italy from the Chinese. T. Spinach has no more iron than other vegetables; UL due to misplaced decimal. F.*People eat chocolate because it gives them the same feeling as being in love F. Chocolate makes people horny. F. Peeling labels off a beer bottle means you're: a) a virgin, b) gonna get lucky, c) sexually frustrated. F. Eating hot bread is bad for you (alcohol, stomach upset, etc.) T. Rachel Perkins is on the Lemur FAQ list and Joel Furr did't even know it. U. Maybe it's Nigel writing the damn thing. Tb.Don't use fresh/frozen pineapple, Kiwi fruit, or maggots to make Jell-O. Tb.The Chinese characters for "Coca-cola" could sound like those for "bite the wax tadpole." Fb.The Chevy Nova was a failure in Spanish speaking countries 'cause of name. Tb.Pepsi had a similar episode where "Come Alive with Pepsi!" is rendered as "Pepsi brings your ancestors back from the dead!" Tb.Certain Eng. documentaries notwithstanding, spaghetti doesn't grow on trees. T. Some English beers contain fish guts. F. The "Baby Ruth" candy bar was named for George "Babe" Ruth. Duh. T. It was really named for US president Grover Cleveland's oldest daughter. F. "Bubble Yum" bubble gum is manufactured with spiders eggs. ["The Kentucky Fried Rat" in TVH.] T. Barth Richards will look like a schmuck for food (or for nothing for that matter). SNUFF MOVIES Tb.The Feds, cops, CIA, etc. have never actually found a real snuff film. T. Scotland Yard has found no evidence of snuff films in the last 20 years. F. "Snuff films" actually exist (Nope, tho' there are various wannabe fakes) T. Some psychotics have taped the murder of their victims. T. Search in WestLaw in 1991 showed no mention of cases on "snuff films". F.*"Faces of Death" is a snuff film. [See Larry Doering plot summary.] F. "Snuff" was the name of a real snuff film. T. We never saw a snuff film that we didn't like. T. Dean Lambey in California was arrested in 1989 by an undercover officer and tried and convicted while planning to make a snuff film. Conviction was upheld by a federal appeals court in 1992 in Richmond, VA. Tb.There were at least two different endings to "Old Yeller". By definition, a snuff film is one in which the film is the *purpose* of (rather than incidental to) the murder and with some intent of commercial distribution (i.e. if they ran out of film, the murder would be postponed until someone could run down to the 7-11 & get more). Paul Lanning, the FBI's chief researcher into child pornography was quoted by _The Times_ of London: "In 20 years I have not seen any hard evidence that they have commercially produced sexually explicit films of murders for the gratification of other people. Simulated snuff movies using special effects are so realistic there is no point in risking life in jail." Note to the new reader: please don't send or post e-mail saying "snuff movies *could* exist, because people are naughty enough" - this is not in dispute; the point is that no examples have yet come to light. Until someone shows evidence of their existence, snuff films are in the same category as UFO's, the Loch Ness monster, and Bruce Willis's hair -- i.e. "believed false." UPSTANDING LEGENDS OF THE PENIS AND SCROTUM F. Model's dick showed in a Sears catalog ad for shorts (it was drawstring!) T. But it looked a little like the model's wiener, and folks thought it was. T. Nelson Rockefeller died of cardiac arrest while porking the help. U. Errol Flynn banged out "Star-spangled Banner" on xylophone with his big dong F. Gangster John Dillinger's long wang is pickled in a jar at/near Smithsonian. F. In Nigeria, roving gangs of thieves may surreptitiously steal mens' dorks. T. Groupies took plaster casts of pop singers' schlongs, inc Hendrix's whacker. Tb.Adolf Hitler only had one testicle. Immortalized in many a kid's rhyme. T. Masturbator's penis in hose chopped by fan blade of Hoover Dustette cleaner. T. This is dubbed the legend of "the Cleaner and the Leaner Wiener". U. Woman slits guy's scrotum, sticks straw in, and blows; he gets off on it... F. Child in mall goes to toilet; is abducted; has willie cut off. [TCD] F. Drunk joyriding on hood of car, loses parts to hood ornament at sudden stop. F. Wife seduces cheating husband then superglues his plonker while he sleeps. ["The Superglue Revenge" in TCD] T. Guy hurts self after sex w/machine drive belt, has self surgery w/stapler. Fb.Health worker in US/Africa demos condom usage to immigrants/natives w/a broom/finger. Woman returns pregnant. She had used EXACTLY as taught. U. Napoleon's wanker was cut off at autopsy and was recently auctioned off. F. Number of stars on _Playboy_ cover is # of times Hef banged the centerfold. T. It's a distribution code. T. Public boners are banned in Indiana. Law upheld by US Supreme Court. HIDE THE SALAMI U. Cuckolded husband replaces contents of wife's pessaries with lye. T. Mad doctor in Ohio cut off womens' clitoral hoods while operating on them. T. People put assorted objects up their asses, get stuck, removed in hospital. U. Well-known film star et al. put a gerbil up his ass for "wriggly furry fun" ["The Colo-Rectal Mouse" in TMP. Related entries in LEGAL BEAGLES] U. Well-known male pop star rushed from concert, stomach pumped free of semen. F. Spanish fly (Cantharides) is aphrodisiac (actually genital tract irritant). F. Girl slipped spanish fly at drive-in movie; found impaled on gear shift. ["Miscellaneous Sex Legends" in TCD] F. Woman tied naked to bed, man in superhero costume with broken leg in closet. T. Similar motif in Stephen King's novel _Gerald's Game_. Fb.Hetero couple get stuck together while coupling. Separated at hospital. ["The Stuck Couple" in TCD] F. One night stand, partner leaves early, other partner finds msg "Welcome to the world of AIDS". ["AIDS Mary" in CBA] F. Student is regularly nocturnally chloroformed by roommate, for sodomy. Tb.This may have actually happened in the Dutch army. Those officers! F. `Baghdad Betty' told US army that Bart Simpson was sleeping with their wives Tb.Would-be rapist steals kisses; one Calif victim bit a piece off his tongue. F. Man fills wife's lover's convertible with concrete. ["The Solid Cement Cadillac" in TVH] T. Woman's womb filled with air during cunnilingus; she dies due to embolism. F. Woman impregnated while swimming, due to sperm loose in pool. F. Woman impregnated when hit by bullet that shot Civil War soldier's testicles ["Miscellaneous Sex Legends" in TCD] Tb.Unintentional virgin birth happens occasionally in bizarre circumstances. Tb.E.g. vagina-less woman,fellates lover, stabbed in gut by boyfriend,pregnant! F. Silicone breasts expand under low pressure (eg. airline stewardesses on job) U. Mother threatens to discipline kid;kid threatens to squeal on mom's fellatio. F. Husband informed that septic tank/toilet blockage due to too many condoms; but he doesn't use them; confronts wife, she confesses affair w/milkman. He waits and shoots milkman next day; but it was a substitute milkman! ["The Evidence" in TMP] F. Couple goes to "love" hotel w/hot tub, mirrors, etc. Make the sign of the six legged aardvark. Upon return, call up an X-movie and see themselves! ["Sex Scandals" in TCD] F. There was a significant increase in NYC births ~9 months after 1965 Blackout Tb.A town in Oregon banned all sex. Tb.Rimming (oral/anal contact) is legal in Utah. DISNEY DEMENTIA [AND OTHER AMUSEMENT PARK STORIES] T. Disney parks are riddled with secret tunnels and surveillance equipment. T.*"Little Mermaid" video cover features good drawing of penis. Prank? Revenge? T. There is a basketball hoop at the top of the Matterhorn replica. T. Male Disneyites may not grow beards (& many other petty rules for women too) T. There is a secret "Club 33" serving hard liquor,in New Orleans Sq,Disneyland T. Clerics in their robes are admitted to Disneyland at concessionary rates. T. Wheelchairs & 1 attendant go to the front of the line for rides. Tb.Disney ripped off Orlando county, thru grabbing Federal road funds T. Woman alleges clit-tickling by one third of 3 Little Pigs; case thrown out F. Three little pigs clit-tickled law-suit happy babe, with non-mobile arms. F. Child disappears from Disneyland, found with new haircut, dyed by abductor. T. SF writer Harlan Ellison fired from Dismall Studios after Mickey porn joke. F. Old Walt Disney's dead body was frozen for later revivification. F. Child goes for ride on popular ride; feels bites; dies from snake bites! F. Water in "Tunnel of Love" ride infested with snakes. [Both in "Death in the Funhouse" in _CBA_.Stephanie da Silva says this really happened to her.] T. Disney caused people to believe that Lemmings suicide in march to sea. T. AFU WEST I was on 2 July 1991. T. AFU WEST ][ was on 12 December 1991. T. There was an AFU South in May, 1992 with 2 people. Tb.snopes was in Los Altos, California on 28 January 1992. T. AFU WEST ]|[ was in Mountain View on Craig's b-day in 1992. T. AFU WEST IV - TERRY was on 28 October 1992. T. AFU WEST V was on 20 February 1993. T. AFU/alt.fan.lemur SOUTHEAST was held on 27 March 1993. QUESTION AUTHORITY (AND OTHER CONSPIRACIES) U. CIA fixed the Anarchist's Cookbook, so explosive blows up as you make it. T. You may *own* the mailbox, but US Postal Service controls what goes in it. T. The CIA, NSA and 11 different secret govt organizations tap & bug everything T. Princess Anne was only female competitor not given sex test in 1976 Olympics T. London doctor struck off for inveigling Turkish peasants to donate a kidney. F. Guy/gal wakes up in Big City, a kidney has been stolen from him! Tb.Hubbard started Scientology after Heinlein bet he couldn't found a religion. T. alt.religion.scientology FAQ sez "F," but I haven't been converted yet. F. P&G's logo reflects Satanic or Moonie ties. ["The Proctor & Gamble Trademark" in TCD] Fb.On "Oprah" designer Liz Clairborne said her clothes were not designed for black women because their "hips were too big". Tb.Candy manufacturers sneakily micro-reduce size of product to gyp you. F. Universal Product Codes (computer readable bar-codes) are marks of Satan. P. VP Bush persuaded Iranians to delay hostage release to aid Reagan election. U. Govt has secret plan to replace the currency overnight to foil drug barons. Tb.CIA radio transmits spoken five digit code numbers to operatives worldwide T. You can send a coconut thru the mail without any further wrapping. Yowser! T. Some change-making machines can be fooled by photocopies of currency. T. The NSA shortened the key length on DES. U. The NSA shortened the key length on DES so they could crack everyone's codes T. The NIST is proposing a less secure digital signature standard than RSA... U. because the NSA asked them to, so they could crack everyone's codes. F. Unification Church (i.e. Moonies) owns Entenmann's bakery F. Unification Church (i.e. Moonies) owns Waldenbooks. Tb.Unification Church (i.e. Moonies) owns a fish processing plant in Gloucester, Massachusetts. U. Those guys selling roses on roads are connected with the Moonies. T. Entenmann's owned by General Foods, Philip Morris bought, merged w/ Kraft. F. Govt cabbage price memo lots longer than var. patriotic/religious documents. ["The Price of Cabbage Memo" under "Government Legends" in TCD.] F. Govt regularly burns WWII-era hemp fields. Only high officials know where. T. Dick Joltes used to be an arms dealer (he's a leg man). F. If you are the first to read this and send me e-mail, you will receive $10. Fb.Class requests satellite imaging photo; US says "no";(then) USSR says "yes". F. Compensation paid to kin of Salem witches up to 1957 (per _The Economist_). T. Mass. recanted the Salem trials and freed the witches within a few years T. Name of last alleged witch was cleared in 1957. Tb.Whole business is extraordinarily similar to modern accusations of Satanism. T. Crop circles (at least in the UK) have been shown to be man-made. T.*Mapmakers place copyright traps in maps (Rand-McNally, no. Thomas Maps, yes) U. Several noted movies have "death curses" on them. Fb.Major firms/gov't suppress evidence of a super great product(car,light,etc.) T. The USA did indeed have a 49 star flag. F. Some 1963 $1 bills have a 'K' for JFK, 11 for month of death to commemorate JFK. ["The Kennedy Note" in TMP] T. Channel 1 for TV existed in the US, but was eliminated by the FCC in 1945. U. Lee Harvey Oswald acted alone. F. An undercover cop must answer yes to "Are you a cop?" to avoid entrapment. Fb.Guy dodges draft by eating peanut butter/hotdog from rectum in front of MD. F. There was once a female Pope in the Roman Catholic Church. F. Noted atheist Madalyn Murray O'Hair is petitioning the FCC to ban religious broadcasting. Fb.U.S. Patent Office head once said that it be closed because "Everything that can be invented has been invented." F. It's illegal to pick Trilliums in Ontario, Canada. U. Lots of places are supposedly either 3rd or 22nd to be bombed in WWIII. F. Ads for "free pets" are frequently answered by testing labs for specimens. T. Gerald Ford did have a vice president(who is mentioned elsewhere in the FAQ) T. Bank policies on ATMs work differently in different areas. F. The king of Denmark wore a yellow star in solidarity with Jews in WWII. T. Japanese soldiers trapped on isles in Pacific who believed WWII was still on F. The Trilateral Commission is working to take over the world. F. Ditto for the Council on Foreign Relations. F. Queen Victoria so loved "Alice..." she requested all L.C.'s books. Was ticked with copy of _Symbolic Logic_. F. You can tell if a big op. is happening at US gov't by level of pizza orders. T. Craig Becker once went nuts and bought a whole shitload of Jack Chick comix. T. Canadians sure seem to get worked up about this "50-40" business. Tb.Larry Doering appreciates Stalinist humor. LEGAL BEAGLES [See also WILD LIFE, STUPID PEOPLE TRICKS, and SNUFF] F. Guy trims hedges with lawnmower but trims own extremities; sues; wins big! ["The Lawnmower Accident", TMP,"Media Sources and Business Legends" in TCD] T. Check in various legal databases shows no such case appealed. Tb.Some people think researching the most trivial legal point is great fun. F. There are legal limits on how much of your debts you can pay in coins (US). T. Woman sued drink co.; she was blinded by bottle cap after opening w/pliers. F. The US has 70% of world's lawyers. T. Gerbils are illegal in California.[CA Reg. Title 14, Sec. 671 (c)(2)(J) 1]. Tb.Gerbils are trained to sniff drugs in Canada. Those Canadians! F. You must be struck thrice before retaliation can be construed as self-defense WILD LIFE IN THE FAST LANE Fb.Schoolkid beheaded by road sign,due to sticking his head out the bus window. Tb.Oregon Highway Div blows up eight ton dead whale, showers town with blubber. Fb.Gas (petrol) engines pollute the same as diesel; diesel just smells worse. Tb.Diesel engines emit more unburnt hydrocarbons than gas ones w/catalytic conv Ft.Power windows in cars trap kids' limbs, necks. Kill or maim them. T. A 2 yr-old girl was killed by a power window in a Fiat in the UK in May 1992 F. Stop signs with a white border are optional. (Oh, I don't think so...) F. Leaving car radio on when the ignition switch is off will drain battery. [Exc. VWs, etc. where the radio is not switched thru the ignition switch.] Tb.Airbag in car can give you a chemical burn when it deploys. U. Driver sets cruise control, wrongly believes it steers too! Crashes... ["'Cruise Control' Stories" in TCD.] Tb.Tree-lined French avenue triggers epileptic fits by flickering light at 11Hz F. The VW Beetle was designed by Hitler. Fb.New car rattles -- note found in door frame from factory saboteur... ["The Rattle in the Cadillac" in TCD.Classic UL always involves a luxury car T. Montana & Wyoming have a token $5 fine for exceeding Federal 55mph limit. T. Mongo-power engine installed in weenie-looking car. Blows off Corvettes. T. John Somebody-or-other built car called "the Beast" with 27lt Spitfire engine T. It eventually took off, and self-destructed on the A27 outside Brighton. T. Special equipment can transmit any reading you want to police radar gun. T. There are traffic lights with green on top in a few US Irish neighborhoods. T. You can be guilty of DUI on a bicycle, horse, perambulator, etc most places. T. Guy in Los Alamos labs fitted a jet engine to Honda Civic, ran on salt flats. U. Person fitted rocket/JATO unit to car, embedded in rockface at first bend. Fb.Man working on roof ropes himself to car on other side;wife drives off.Splat. T. The "man on roof" appeared on a home video show in UK. Believed to be staged. F. Hitchhiker disappears, is ghost of person killed years ago in road accident. ["The Vanishing Hitchhiker" in TVH and TMP] F. Valuable classic car sold for pittance by (1) grieving parents of war dead F,U(2) spouse of errant husband (3) heirs of person who died and rotted in it. Fb.(4) sold by widow who would receive either car or proceeds of its sale. ["The Death Car" and "The Philanderer's Porsche" in TVH. "The Bargain Sports Car" in CBA] F. Psycho's handhook hanging from the car door, broken off as couple drove away ["The Hook" in TVH] F. Carthief squashed dead in stolen BMW by collapsing freeway in '89 SF quake F. Driving barefoot is illegal most places (Nope, but it's dumb to goad cops) T. Driving barefoot is illegal in the state of Kentucky. T. New York car thief stole lab delivery of cadaver heads... U. Red sports cars generate disproportionate number of speeding tickets. F. Man crashes into toll booth while receiving fellatio from girlfriend. Fb.Flashing your headlights will cause a traffic light to change faster. Tb.There are some lights w/sensors for emergency vehicles. Tb.There're lots folk remedies to plug up old radiators: cigarettes, pepper. T. Lots of places have weird street names. T. You can find lots of weird msgs on license plates if you try really hard. T. "SIGAlerts" in the greater LA area are named for a guy named Loyd Sigmon. F. Couple's car out of gas; he gets help; she hears noise, then cops arrive; tell her to leave & not look back; she does, sees him hanging or decapitated. ["The Boyfriend's Death" in TVH] F. Guy tries to siphon gas from an RV but instead siphons from the septic tank; found unconscious by RV next morning. Tb."Maintenance-Free" batteries were invented for cheaper transport of new cars F. Police officer pulls over female driver.She asks about tickets to policemen's ball, he replies "Policemen don't have balls." Fb.Woman gets in her car at night; is followed on the way home; calls for help; husband accosts the guy; guy was trying to warn woman of thug in backseat of her car. ["The Killer in the Back Seat", TVH] Fb.Parking spot taken from older woman by two younger women. They tell her "Sorry we're younger and faster." Woman reflects, rams their car, and replies "I'm older and richer". [Several variations on the repartee.] ["Old vs. Young" in TMP and also used in the film "Fried Green Tomatoes".] F. A motorcyclist at high speed hits a fly which goes to his brain via his eye. F. An auto worker steals parts of a Caddy bit by bit until he has a whole car. U. Fancy car has "No Radio" sign. Owner returns to broken windshield and "No Windshield"/"Get One" or "Just Checking" sign. Fb.Truck gets stuck at low bridge. Noone knows what to do; a young kid suggests letting the air out of the tires. U. UK people drive on the left (etc) to allow easy sword access in old days. F. Someone never gets tickets because his license plates say "NONE". Tb.Freon can be used to break Kryptonite locks. Tb.No self-respecting car thief would use it though. F. In great desperation, mother lifts car off and rescues trapped child. F. Woman picks up elderly woman hitchhiker; sees that HH has hairy arms; gets HH out on pretense;takes off;later finds cleaver/hatchet/knife in seat. ["The Hairy Armed Hitchhiker" in TCD.] F. Couple w/baby on long trip stops to switch places; place baby on roof; they forget it up there! Police cruiser pull them over and baby is rescued. ["The Baby on the Roof" in TCD.] F. Grandma dies on long family trip; they strap body to roof; car is stolen! ["The Runaway Grandmother" in TVH.] T. "The Club" is lame because a thief could cut through the wheel in no time. LEGENDS ABOUT NATATORY CAPABILITIES OF LARGE ANTHROPOID PRIMATES Tb.Gorillas can't swim. T. Certain tribes of Japanese macaques sift their grain in the sea. Fb.Many simians hold regular swimming contests; winners mate w/ choice females. Tb....Losers go on "The Love Connection". T. Some monkeys prefer not to swim at all; will drown if dropped in water. P. Chimpanzee muscles are formed in a way that renders backstroke impossible. T. "Baywatch" proves that apes share at least 95% of DNA with humans. ASTOUNDING AVIAN ANOMALIES F. Birds cannot sing while on the ground. Tb.Govt forces commercial birdseed to be irradiated to stop hemp seed sprouting T. Radar emissions can kill birds, sterilize sailors, fry other small mammals. T. Chickens are easily mesmerized. Whoopee. F. Sprinkle salt on a bird's tail to catch it by preventing it flying away. T. If the bird let you get close enough to salt its tail, you could grab it. F. Seagulls (and other creatures) explode when you feed them Alka-Seltzer or rice, or "pop-rocks" - dried coconuts?.["The Death of Little Mikey" in TCD]. F. Birds won't sit on their nests if you touch one of their eggs. F. The resonance frequency of a chicken's skull cavity is ~7 Hz. Tb.Some birds get drunk by eating partly fermented berries/fruits. DOGGIE-STYLE and CATTY-WUMPUSS [See also LEWD FOOD] F. Dalmatians and humans are the only mammals whose urine contain urea. Tb.Dalmatians and humans are the only mammals who cannot break down uric acid into its soluble form, "allantoin" U. Old/ditzy woman puts dog in microwave to dry it out- it dies gruesome death/lives to bark again. ["The Pet (or Baby) in the Oven" and "Hot Dog" in TVH. Also "I Read It in the Paper" in TCD.] T. Cruel people and other weirdos will microwave pets. This is not a surprise. T. A Baltimore lawyer was busted for microwaving a kitten in January 1992. F. A Doberman chokes on fingers that it bit off burglar hidden in closet. ["The Choking Doberman" in, surprise! TCD and TMP] F. Plastic/glass water bottles on lawn prevent dogs urinating in the area. ["Lawn Order in New Zealand (and elsewhere)" in CBA] F. The scent of wolf dung terrifies dogs, so disposal by zoos is regulated. T. Radioactive cat litter found in May 1991 in Berkeley, Calif U. Source of the litter was radioactive cat food? Cat on radiation therapy? F. Days-old body in home discovered headless. Was eaten by dog! T. Cats can carry a parasite (toxoplasmosis) which is esp.dangerous to fetuses. Tb.Aspirin is very bad for cats (slow removal of salicyates from their bodies). Tb.Dog gets shock from phone line, urinates, phone rings! F. Woman's cat dies. She puts it in a shopping bag/box to take it to the country for burial. On the way, she stops at a store and puts the bag down. She turns around and bag is shoplifted. ["The Dead Cat in the Package" in TVH. There's an amusing ending in one of the stories.] T. Many variations on above with urine samples in bottles and bags of garbage. Tb.In WW2, Russians fed dogs under tanks, then released them in battle with anti-tank explosives having an antenna-like trigger on their backs. Tb.Dogs ran under wrong ones, German tanks didn't smell like Russian tanks. T. Most Russian tanks were diesel, most German ones weren't. T. German high command counters by spreading rabies rumors, encouraging soldiers to shoot every dog they see. F. Firemen rescue old lady's cat from tree. She invites them for tea. They run over cat when they leave. ["The Bungled Rescue of the Cat" in CBA] OTHER ANIMAL (BUT NON-BUGGY) CRACKERS U. Every animal has enough brains in its head to preserve its own hide. F. Dead rabbit next door dug up by dog;washed, put in cage by frantic dogowner. ["The Hare Drier" in CBA.] F. Killer whales will attack swimming dogs because they stink like hell. F. Fox frees itself of fleas by gradual immersion, shifting fleas to lintball. Fb.Driver runs over exotic animal,wraps in coat for fun photo;it revives, runs off! Similar story: A hunter poses for picture w/deer w/rifle in antlers. Fb.Farmer asks hunter to shoot mule; other hunter shoots another mule too. T. Armadillos can contract leprosy. U. Armadillos can spread leprosy to humans. Tb.Cow-tipping (pushing over a sleeping cow) has happened. Tb.Cow-tipping is usually just a bunch of hooey to beguile city kids. Tb.Candiru fish, native to S. America, can swim into your urethra. T. Fainting goats are real. Crimony! T. Galapagos turtles do moan and groan during copulation. F. Guinea pigs' eyes fall out if you hold them up by their tails. T. Guinea pigs actually *do* have small stumpy vestigial tails. Take a look! Fb.Horse falls thru bottom of moving trailer, legs ground to stumps. Fb.Otter, newly-released after $50K Valdez clean-up, is eaten by whale. T. Rats cannot vomit (the basis for many rat poisons). F.*There are [albino] alligators inhabiting the sewers of New York City. [TVH] T. There sure seem to be lots of stories about pigeons. T. Sewer rats can come into the house and bite one's behind while on the potty. U. Litter from released balloons choke and kill whales, birds, etc. F. [Domesticated] turkeys are so dumb,they'll drown if they're out in the rain. Fb.Trapper ties dynamite to coyote, releases; coyote runs under his car/house. ["The Coyote's Revenge" in TCD. Similar ULs with rabbits, raccoons, fish, etc. exist and are traced back to an old motif involving a cat in TMP] F. Woman found a rat in Mexico and brought it home thinking it was a dog. ["The Mexican Pet" in, surprise! TMP] F. Baby elephant escapes from circus; sits on VW;front/roof dented;later police stop owner and ask what happened? ["The Elephant that Sat on a VW" in TCD.] ARTHROPOD CRACKERS T. Really big insects (snakes too) can get imported along with fruit shipments. F. Bugs congregate in the pointy ends of bananas, so discard before eating. F. Dragonflies ("darning needles") can sting you very severely. T. Only hymenopterans sting. A large dragonfly may be strong enough to pinch. F. If a dragonfly or a ladybug lands on you, you will have good luck. T. "Killer" African bees are swarming into Texas from down South. T. A lot of people have found live or dead insects in their fast food snacks. T. Cockroaches love coffee, live in TV's, too often get in your cup or food. T. Insect lays eggs in open wound; months later baby insects eat their way out. Variation: Woman gets bitten, after insects out, she dies/has breakdown. ["The Spider Bite" in TMP] F. Cactus shakes, then explodes with hundreds of scorpions/spiders. ["Spiders in the Yucca" in TMP] F. Explorer gets bug in ear; bug eats thru to other ear; gave birth on way... [Various ULs of this type under "A Bug in the Ear" in _CBA_] F. A woman w/beehive hairdo is so proud of it she doesn't wash her hair; she dies from bees/spiders in it. Fb.Lobsters,dropped in boiling water, scream.(Nah, it's steam from under shell) Fb.Moth/butterfly scales from wings will poison or blind you. Fb.There are US state laws making it illegal to kill/capture praying mantises. T. The bite of the Brown Recluse spider is nasty. SOME REFERENCES: Cecil Adams (_The Straight Dope_, 1984, ISBN 0-345-33315-2 and_More of the Straight Dope_, 1988, ISBN 0-345-35145-2 both published by Ballantine Books). Author of "The Straight Dope" Q&A column of _The Chicago Reader_ and is syndicated in many alternative newspapers. Cecil is "a National Treasure" who "tells people what they actually want and need to know instead of useless rubbish." Worth reading if only for for his writing style. Contrary to what you may read on a.f.u., he is not related to Marilyn vos Savant but he might be Monty Hall. Jan Harold Brunvand (_The Vanishing Hitchhiker_, 1981, ISBN 0-393-95169-3; _The Choking Doberman_, 1984, ISBN 0-393-30321-7; _The Mexican Pet_, 1986, ISBN 0-393-30542-2; _Curses! Broiled Again_, 1989, ISBN 0-393-30711-5, _The Baby Train_, 1993, ISBN 0-393-03438-0; _The Study of American Folklore_, 3rd Ed., 1978, all published by W.W. Norton); _Folklore: A Study and Research Guide_, 1976, St. Martin's. JHB is one of the leading folklorists today and has done much to popularize the study of ULs. Also has a great back hand and skies a mean "figure 11." Alfie Kohn, _You Know What They Say...The Truth About Popular Beliefs_, 1990, ISBN 0-06-092115-3, Harper. Pretty good book with, get this, *references* to stuff in the back. This is a good habit which some of you folks may want to try sometime.... G. & C. Merriam Co., _Webster's New Collegiate Dictionary_, 1977, ISBN 0-87779-348-4. Great bedside reading. Check it out sometime. There's also the OED, but Bruce Tindall will probably take care of that. William Poundstone (_Big Secrets_, 1983, Morrow and _Bigger Secrets_, 1986, Houghton-Mifflin). Sorry, it's a secret. [Graham Toal sez these books may be ordered from Blackwells in Oxford.] Peter Trei says the stuff on Masons is total BS, but then, he WOULD say that. Bruce Tindall and Mark Watson (_Did Mohawks Wear Mohawks?_ _And Other Wonders, Plunders, and Blunders_, Quill - William and Morrow, 1991. ISBN 0-688-09859-2.) S'all right, and only one wrong entry so far. Just don't believe what they say about dalmatians, humans, and urea. You can even e-mail Bruce on the net to blast him. Peter van der Linden (_The Official Handbook of Practical Jokes_ Signet, ISBN 0-451-15873-3, 1989 and _The Second Official Handbook of Practical Jokes_, 1991, Signet, ISBN 0-451-16924-7). Do you want to get the scoop on practical jokes that actually have some real world validity rather than those by prepubescent college kids on bad banana peels? Try checking these two bricks^H^H^H^H^H^H books out. You'll find ULs, delightfully bad illustrations, and even practical jokes. As a bonus, get the real dope on STella. A free gerbil to anyone who sends in the cover page from a volume with her STella (offer void in California under Title 14, Sec. 671 (c) (2) (J) 1). $3.50 ea. Cheap! God, would you believe that even Peter has another book coming out? What's this world coming too? =============================================================================== An urban legend: * appears mysteriously and spreads spontaneously in varying forms * contains elements of humor or horror (the horror often "punishes" someone who flouts society's conventions). * makes good storytelling. * does NOT have to be false, although most are. ULs often have a basis in fact, but it's their life after-the-fact (particularly in reference to the second and third points) that gives them particular interest. =============================================================================== Unbounded thanks to: Jane Beckman, Steven Bellovin, Conrad Black, Mark Brader, Jack Campin, Raymond Chen, Joe Chew, Patrick S Clark, Cathi A.Cook, Cindy Davies, Glenn Davis, Jeff Davis, Scott Deerwester, Larry Doering, all the Terry's: Carroll, Chan, Monks, Wood, et al., David Esan, Ted Frank, Greg Franklin, Alan Frisbie, Kim Greer, Tom Greer, Dave Gross, Phil Gustafson, Jason R. Heimbaugh, David A. Honigs, David B. Horvath, Wendy Foran Howard, Mark Israel, Richard Joltes, Jim Jones, Cynthia Kandolf, Phil Kernick, Susan Mudgett, Bill Nelson, Tom Neff, Bob O'Brien, Jonathan Papai, Christophe Pettus, Brian Scearce, Sean Smith, Randal Schwartz, Ken Shirriff, snopes, Haakon Styri, Bruce Tindall, Dwight Tovey, Peter van der Linden, Greg Widdicombe, and Dan Wright. OTHERS? Have you ever wondered how those people have gotten the name at the end of the FAQ list? They are people who are widely recognized as thoughtful posters of reliable information. They have consistently added value to various debates by sharing their point of view, and often researching difficult questions which arise on the net, and posting authoritative facts citing sources. The official way for joining the list of distinguished AFU-ers is to take one of these unanswered questions that come now and then, research it and reach a definitive conclusion (or demonstrate that one cannot be found). Post your findings. If the report is sound, and the original question was non-trivial, you will be added to the acknowledgements section of the FAQ list! Be prepared to submit references. We are mostly adults here (except around the beginning of the academic year). Be prepared to discuss and debate your research and conclusions here. The unofficial way to get on the list is to give me a big payoff (and it better be more than two-fifty). Original FAQ list by Peter van der Linden, February, 1991. Maintained by Terry Chan since July, 1991. Mildly tinkered with in a few trivial ways, PvdL, December 9, 1991 Masterfully improved formating courtesy of Tom Neff, December 16, 1991. Posting to news.answers finished off by Phil "Call me Ishmael" Gustafson. -- Energy and Environment Division | Internet: [email protected] Lawrence Berkeley Laboratory | Berkeley, California USA 94720 | Yeah, right.
global_01_local_1_shard_00001926_processed.jsonl/2414
Noisy Silence? Come on, people like us are obsessed with good entertainment. It comes in all sorts and sizes, both active and passive forms: sitcoms, reality TV, music, theater, art, literature, drama, comedy, concert, amusement parks, national parks, sporting events, and action sports (and the list goes on). Literally it is what motivates most of us to get through the workweek. Monday is an awful invention, so we come home and medicate with Netflix until bed. Wednesday comes with a hump, and after summiting, Friday is within reach. And when Friday comes, whatever day your Friday actually lands on, we escape the reality of a life of potentially endless workweeks by hitting the bar, or the gym, or the restaurant. Go ahead you deserve it. Work we think is not truly living. Life we say begins when I punch out, and the weekend begins. That is when we live the kind of lives we imagine living all the long workweek. And how do we know what kind of life we want to live? Well I think mainly this is defined by the narrative that come down the pipeline of entertainment. Sitcoms normalize the lives some of us are already living. They make me feel good by comparison. Reality TV makes us all feel better about ourselves, like we know something the stupid people on the TV don’t know. Sporting events give many of us an alter ego, a fantasy life where real life is only about whose team is best and who scored the most points, or who is going to be the team next year. Cell phones and computers put entertainment in our hands all day, in the bedroom, on the toilet, or at the coffee shop with a friend. It is all designed to keep us contently numb. What happens when the noise stops, even just for a second? Come on be honest, you feel the compulsion to drown it out, the silence that is. You reach for the remote, the phone, the book, car keys, the bike or skateboard or whatever it is. It’s deafening isn’t it? How can silence be so loud? It is scary and dark in there, in the room of silence. Is it a trap. Perhaps a maze with no way to exit and our worst fears around every corner. I thought silence is the absence of noise. But the silence, like it is so good at doing, gives way to the noise in our hearts and minds. Try it. That is, try listening to your own life instead of the worship album, or the Netflix original. Don’t worry; it will be loud when you turn off the noise. It will settle down though. And when the waves settle and the water becomes still, there you will hear the alpha and omega the beginning and the end with a still small voice saying with all the love in the world, “you are my Beloved child. I am yours and you are mine.” It might just change your life. Or maybe I mean the one behind the silence will. Yea that is what I mean. Don’t be afraid. Give it a shot. Go for it. Just do it. Don’t take my word for it. Go, now! Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_1_shard_00001926_processed.jsonl/2419
Open main menu File:1953 West Virginia license plate.jpg Original file(1,000 × 402 pixels, file size: 202 KB, MIME type: image/jpeg) English: A 1953 West Virginia (USA) license plate Source Own work Author Absecon 49 w:en:Creative Commons attribution share alike You are free: • to share – to copy, distribute and transmit the work • to remix – to adapt the work Under the following conditions: File history current18:46, 12 December 2016Thumbnail for version as of 18:46, 12 December 20161,000 × 402 (202 KB)Absecon 49 (talk | contribs)User created page with UploadWizard • You cannot overwrite this file. There are no pages that use this file. File usage on other wikis The following other wikis use this file:
global_01_local_1_shard_00001926_processed.jsonl/2432
These are the steps to enter recovery mode on the LG K4 enter-level smartphone so you can effectively recover your device. The steps for entering the recovery mode should work for a stock recovery and a custom recovery if you ever decide to replace your stock recovery with something like TWRP Recovery or Cyanogen Recovery in the future. Files You Need • LG K4 owners with root access to the internal system can download the Quick Boot app from the Google Play Store. Entering Recovery Mode on the LG K4 1. Long-press the Power button until the LG K4 smartphone turns off. Alternatively, you can press the Power button just once and select the ‘Power Off’ option from the Power menu. 2. Boot the K4 smartphone up by pressing the Power and Volume Down buttons simultaneously and do not let go of the buttons until you can see the LG Logo. 3. Release both the Power and Volume Down buttons when you see the LG logo and then press them both down quickly again. 4. You should now see the Recovery option from the menu. Use the Volume keys and the Power key to navigate through the menu and confirm your choices. Those K4 owners who have root access can install the Quick Boot app from the Google Play Store instead. Just log in to your Google account and browse the Play Store for ‘Quick Boot’ and download the same directly to your smartphone. Open the app from the app drawer and check out the option for booting it up in the recovery mode.
global_01_local_1_shard_00001926_processed.jsonl/2441
The frosted glass is specifically to diffuse an RGB LED lamp thing I made, so every scratch and other degradation on this thing so far is very prominent. There must be 8 coats of Rustoleum frosted glass spray on it. It's a very thick matte finish. For all the frosted glass tutorials out there, like on wine glasses, you would think a few of them would post an update that everything came off or otherwise looks terrible after a week, and perhaps a few would have shown how to solve it. My concern is that whatever enamel or acrylic spray I apply will either add a gloss, or reduce opacity by filling in the surface and eliminating any light refraction. The only constraint is that I need to be able to buy it nearby at Walmart or Home Depot or something. I won't have time to order it online because it's a gift. Preferably a Rustoleum product because it's cheap. Would the American Accents Ultra Cover Matte Clear work? enter image description here enter image description here Click on images to view full-sized version. • I hope you found a fix to the sealing issue. Please let me know how you fixed your issue of sealing your spray frosted glass. I am having the same issue on the lights I'm in process of making. I too have been unable to find anything related to this. I would think Rust-oleum would make a sealant for the frosted glass. – Tammy Minchew Oct 1 '17 at 17:33 up vote 1 down vote accepted Given your time and store restraints, I would agree with your choice of a rattle-can/spray can of matte clear coat. I don't know the brands well enough to recommend one over another. There is the potential that the clear coat will reactivate the frosted coats, even if they are thoroughly dried and cured. So apply very light coats from twice the recommended distance and allow each coat to dry before adding the next. If the frosted coat does reactivate, it will mix with the clear coat and thus dilute or distort the frost. The less of the clear coat you apply in each protective coat, the less chance of ruining your artwork. It might be wise to frost up another piece of plastic and after it dries, test the clear coat on it before risking your art. If you had more time, an art supply shop (or Hobby Lobby), and an airbrush, you would have more options. Createx Airbrush paints has a product called Intercoat which would be perfect for this situation. It provides a non-reactivating layer to protect your existing artwork from the solvents in any paint or clear coat which you might apply over them. Spraying a layer of Intercoat over your frost paint would lock it in place, allowing you to add a matte clear coat without any risk of reactivation. • I had probably just missed your message on the way to buying and then applying the Ultra Cover Matte Clear yesterday. There were so many indiscernible options that I decided to test in on a different glass first, and that turned out far better than I thought it would. The rough surface of frost turned smooth and hard, and not glossy. But that glass only had three coats of the frost. When I put it on my project it does seem to have reactivated the frost, and it lost most of the opacity the test glass never had. – TURNBOMB Jul 27 '17 at 20:45 • How would you fix it? I'm not sure if I should spray the rest of the can of frost on top of it and try it again, or alternate layers of frost and sealant, or try to clean it all off and start over again. I'll see if I can find intercoat somewhere around here, good call. – TURNBOMB Jul 27 '17 at 20:45 • If you just want to increase the opacity, have you considered adding a layer of wax paper on the inside. It would defuse the light more and has a factory-consistent thickness/opacity so you won't get light and dark spots. If you must fix it from the outside, I wouldn't add any more clear coat. Try building up a layer of frost over the work you have already done, to get it back to where you want it. Then try EXTREMELY LIGHT coats of clear coat with time between each for drying. Paints are funny stuff sometimes. – Henry Taylor Jul 28 '17 at 0:04 Your Answer
global_01_local_1_shard_00001926_processed.jsonl/2447
Real person or construct? Until about the middle of the twentieth century, some critics, and many readers and theatre-goers, wrote and spoke of characters in plays as if they were real people with a life that continued off-stage. More on confusion of character with reality: In 1850, Mary Cowden Clarke even published The Girlhood of Shakespeare's Heroines, in which, building on hints and ideas from the plays, she imagined the upbringing of each heroine; Ophelia, for example, she describes as a child watching the ‘wide expanse of sea … swelling before her; while a feeling of awe would creep over her at the thought of a watery death.' Nowadays it is accepted that characters are constructs— that is, they have no real existence but are created by the writer and given shape for a particular purpose. So we need to ask: • Why did Shakespeare give this particular character his or her characteristics? • What would be the result if they were different? • What would be the result if that character were not introduced at all? More on the effect of character on plot: Of course the plot would be altered considerably if, say, there were no Ophelia in Hamlet — but what would be the result if she were as confident as, for example, Beatrice in Much Ado About Nothing? For each character, then, we can look at: • How Shakespeare has presented them • Their effect on the drama • What Shakespeare's purposes might have been. Scan and go Scan on your mobile for direct link.
global_01_local_1_shard_00001926_processed.jsonl/2448
JONESLICKELLY is a crossword puzzle answer that we have spotted 1 time. Referring Clues: Last Seen In: • King Syndicate - Premier Sunday - November 26, 2017 Seen a clue for the answer joneslickelly that we don't have? Then please submit it to us so we can make the clue database even better! Footer Image
global_01_local_1_shard_00001926_processed.jsonl/2459
Friday, January 04, 2008 Camera Obscura: Groucho as God; KITT as a Mustang Thursday, January 03, 2008 What Will Be On TV in 2008 Without Writers? It will be bleak. The strike by writers will become most prominent in the next few weeks, as TV broadcasters attempt to return to non-holiday schedules. Some shows have a dozen or fewer episodes to air - unless it is a game show. You can read what the schedule will look like here at TV Squad. By the end of January, viewers won't have many choices apart from game shows and a handful of episodes for most everything else. So expect the strike to continue until the lack of shows becomes an immediate, not a future, issue. But, as producers learned in the early 1980s after the first writers strike, they can fill in hours and hours with low concept shows like "Cops". YouTube and other online creations will flourish, and producers may facilitate the death of programming, other than for reruns and games. And "American Idol". Wednesday, January 02, 2008 Dreaming of Electric Sheep I used to think we could peek at the Future and understand the Present when reading science fiction, but now I'm afraid we've landed in a warped world where the horrible ideas of Future dystopias are filling the Present. No personal rocket cars here, more the wreckage of a world gone over the edge into absurdity and delusion. For instance, I was reading the rather odd press reports from Great Britain, where the government has decided their nation is removing the phrase "war on terror" from their political lexicon: London is not a battlefield, he said." Who knows, maybe such attempts at language modification will lead us to ... well, somewhere other than where we are, I suppose. Language modification to accommodate bizarre policies has been a staple in science-fiction tales for some time. (I always laughed at the scene in "Brazil" where the government chief combating terrorism was asked his thoughts on the 13th year of constant terrorist attacks and the chief replies with a laugh, "Beginner's luck!") Still, after reading the above story today, I then ran across this blog, which offers frequent updates to the world to tell us "Which Phillip K. Dick Story Are We In Today". And yep, right there on January 1st is mention of the story from Britain and which story relates to it. Don't get me wrong - I like PKD's works, always have. But if we can catalog current events as elements of his fiction, we are in deep, deeeep shit. For those who don't know his work, suffice to say it painted a world of endless deceptions and paranoia, of fakery elevated to it's greatest height, of reality sliding into madness. Not the best way to start the New Year - offering evidence we inhabit the nightmarish landscape of PKD's imagined future. Blues Master Wallace Coleman Back In ET Fine news for the new year - blues singer Wallace Coleman is doing two shows in East Tennessee. First, he'll be at the Knoxville Museum of Art on Jan. 18th and then he performs at Rose Center in Morristown on Feb. 2nd. I met Wallace some years back and count that as my great fortune. If you like blues music, Wallace is the man to see. (Previous post here.) My best advice is to get tickets now to one of these two shows. His website has samples of his work, his bio and his schedule and ways to order his CDs. Great to have you back Wallace! Tuesday, January 01, 2008 Happy New Epoch!! Here is a new year and all that goes with it. I have learned that writing/talking about things related to Time usually ends up confusing me and most readers. Time is a slippery thing. But, here goes ... Life really seemed to move slowly at one time, now the years tick past faster than the eye can see. Which is sort of way to say "Dang, I is old", or more accurately, "I sure has seen a heap of Januarys and they all are starting to sorta seem the same". For some reason, I've always liked the concept of the Chinese New Year, which is on a 12-year cycle, where one of twelve animals represents the year at hand. So that way, folks can say "hey, it's been a while since we had a year of the rat!". Plus the whole make-loud-noises-and-blow-up-fireworks thing came from them too. What was new in 2007 depends on whether you knew about it or not. For instance, there is this thing on the Internets called "Facebook" which started in 2004, but which I was asked to join in the last few days of 2007, so it was new to me. Also I was asked to join another Internets thing called "Twitter" which was started in 2006 but was new to me in 2007. Bottom line is I joined both of these online sites and I really have no idea what to do with them or for them or to them. Both Facebook and Twitter are called "social utilities" or "social networking" sites. That may explain why I am lost - I usually stumble in "social" activities. I do like the blogging groups I have joined and maybe my old brain can only contain the workings of blogging and not social utility programs. So one challenge for me in 2008 is attempting to use facebook and twitter, but I know I don't shuck and jive as fast as I used too so it may well be 2009 or later before I can twit and book with ease. (I learned in 2007 that I use words which some folks do not understand, like "shuck and jive", but other folks have no idea what twitter or facebook mean, so I guess it all evens out. Words are tricky things.) A new year is often marked by some by the announcement of New Laws Taking Effect. Perhaps it is a positive thing that Humans keep making New Laws in efforts to make the world a better place. Perhaps. When I was younger, I often chastised older folk for not being able to adjust to the new. But I've learned that "new" is subjective. More likely these days, I chastise anyone for not being aware of the past or the present. I was recently on a college campus talking with a professor friend and we did a wee "test" of students to see if they knew of famous people my friend and I knew about. They did not of course. Johnny Carson, for instance, was "a guy on TV once". My friend and I decided that the students knew little of American pop culture prior to Tupac Shakur. Granted, knowledge of American pop culture is likely more trivial than vital information to have. Still, my friend said to me that his students seemed to have little interest or knowledge of events more than 2 years old. Had I been a student in the "test group" I'd bet I would have told the old geezers to get with the now and to heck with the old. Some people have told me, over the course of my life, that I must have been born old. (No one tells me that anymore, though, they just see me as old.) Anyway, the experiment with my friend got me to pondering on the idea that I had grown up seeing myself in a context of Time and that now people grow up without such a context. For example I knew there was "old" music and "new" music. My parents had record albums by Benny Goodman and Tommy Dorsey and I had record albums (new at the time) by The Beatles and Jim Morrison. However, today, people have MP3 players with songs. So it seems to me that not only do some of the younger folk have no context of the when of a song, they do not have the context of said song within an album. (Honest to pete, I heard an 8-year-old girl last year ask her mom what an "album" was.) A young fellow recently was asking me to listen to a song he liked on his iPod by Guns and Roses and I asked him what album that song was from and he told me it was on the Greatest Hits album. He sorta did not understand what I meant. My professor friend told me that younger folk do not need context in their heads, no need of of personal knowledge of time and history - they just whip out their personal hand-held techno device and do a search to learn what something was or is, and then put the device away and they go about their lives. Perhaps that way of a context-less life is better. I tend to see events repeating and repeating, with minor variations. But perhaps it is not better to see each event as unique and brand new as it might prompt them to think some event or some trend has never existed before. Most behaviors and trends have been around a long time, really -- religious and tribal warfare, for instance, has been around a long time and remains with us today. Here's something I do know - it seems good to me to have a point in time where we get a "new" start. Wipe everything back to zero and start over. Still, it also seems good to me to have a knowledge of the number of times that you have started over. I mean, there sure needs to be a start and an end to say, a football game, or it would never find a conclusion and conclusions can be more enjoyable than not having one. And after a whole bunch of teams play a whole bunch of games, it is fun to have the ones with the most wins play each other in playoffs and then pick an overall winner. Then you start a new season. As goofy as games can be, that process is still mostly fun. All of which is one way of saying goodbye to 2007 and hello to 2008. And while most of the world focuses on the measurement of years, I have always taken some pleasure in the definition of points in time called "epochs." Here is what Webster's says in defining epoch: \ˈe-pək, ˈe-ˌpäk, US also & British usually ˈē-ˌpäk\ Medieval Latin epocha, from Greek epochē cessation, fixed point, from epechein to pause, hold back, from epi- + echein to hold — more at scheme 1 a: an event or a time marked by an event that begins a new period or development b: a memorable event or date 2 a : an extended period of time usually characterized by a distinctive development or by a memorable series of events b: a division of geologic time less than a period and greater than an age And that's a level of vague I appreciate. Happy New Epoch!! Monday, December 31, 2007 Weekly Best of TN Blogs Here's to one of the best online ideas of 2007 - the best weekly blog roundup in Tennessee, courtesty of R. Neal at TennViews -- and to it's continuation in 2008: "An abbreviated 'on-the-road live from Memphis' edition of our weekly sampling from some of Tennessee's best and brightest bloggers:
global_01_local_1_shard_00001926_processed.jsonl/2464
The Tower of Babel by Pieter Bruegel the Elder.  Common languages are an integral part of linguistic development in the ancient world, as often such languages influence subsequent languages and help unify or economically and politically integrate populations over a wide territory. The ancient Near East displays some of the world’s earliest common languages shared by several states and population groups. The earliest lingua franca is perhaps Akkadian.[1] However, it is not clear if this language was spoken and written very widely, as it may have been more utilized by the elites from different regions, such as the political establishments. Read the rest of the article at  Categories: Ancient History Tags: , , Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_1_shard_00001926_processed.jsonl/2467
Natured or nurtured? I have been working through some ideas for a character who is for want of a better word a psychopath. Not the axe wielding homicidal maniac type. More your person who leaves a trail of destruction in his wake type. This got me thinking about whether or not the psychopaths behaviour is something constructed by environment or naturally occurring. Is it caused by some genetic deficiency? Or is it part of some contemporary malaise? Is their behaviour natured? Or nurtured? I’m not a great believer in nature as the organising force of society. It seems to me we left the forces of nature behind when we moved into cities. And allowed every aspect of our lives to be controlled in some way. From birth to death. There is an organising principle in place. A body to categorize. An institution to reward this behaviour. Or punishes that. I think nurture is the dominant force in our lives. And holds much greater sway than nature. I can see there are some elements of what we do that are natural. That come from some deep genetic imperatives. But from where I stand. The vast majority of our behaviour. The rituals we adhere to. How we interact. Are all nurtured into us. So if we are taught to behave in certain ways by the world around us. The psychopath must be a form constructed by society. If that is the case? And they are? What lay the foundations for their behaviour? Is it some twisted version of competitive behaviour? Amplified by some early setback? Or personality trait brought on by repeated rejection by a parent? All decisions I will have to make before long. I’m guessing it was both. Plus some as yet to undiscovered traumas. Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_1_shard_00001926_processed.jsonl/2481
IxDA Boston: Ethics in Gamification event at Mad*Pow The Designer's Oath began in an IxDA Boston workshop. Following an interactive session exploring the Ethics of Gamification, we asked the 30 participants reflect upon their experience by collaboratively completing a fill-in-the blank version of the Hippocratic Oath to make it more applicable to design. Photo of Samantha Dempsey presenting at IXDA
global_01_local_1_shard_00001926_processed.jsonl/2485
Commit 4f29e2b3 authored by Andrey Gursky's avatar Andrey Gursky Committed by Philipp Hörist Preserve SSL handshake errors order Sets are unordered and list with push/pop acts as LIFO, though we need FIFO. Since the number of elements is tiny, no need to use deque. Addresses #9120 parent f13ff8ac Pipeline #1464 passed with stages in 2 minutes and 22 seconds
global_01_local_1_shard_00001926_processed.jsonl/2489
Efficient and low-complexity hardware architecture of Gaussian normal basis multiplication over GF(2 m ) for elliptic curve cryptosystems For access to this article, please select a purchase option: Buy article PDF (plus tax if applicable) Buy Knowledge Pack 10 articles for £75.00 (plus taxes if applicable) Learn more about IET membership  Recommend Title Publication to library You must fill out fields marked with: * Librarian details Your details Why are you recommending this title? Select reason: Thank you Your recommendation has been sent to your librarian. In this paper, an efficient high-speed architecture of Gaussian normal basis (GNB) multiplierover binary finite field GF(2 m ) is presented. The structure is constructed by using some regular modules for computation of exponentiation by powers of 2 and low-cost blocks for multiplication by normal elements of the binary field. For the powers of 2 exponents, the modules are implemented by some simple cyclic shifts in the normal basis representation. As a result, the multiplier has a simple structure with a low critical path delay. The efficiency of the proposed multiplier is examined in terms of area and time complexity based on its implementation on Virtex-4 field programmable gate array family and also its application specific integrated circuit design in 180 nm complementary metal–oxide–semiconductor technology. Comparison results with other structures of the GNB multiplier verify that the proposed architecture has better performance in terms of speed and hardware utilisation. 1. 1) • 1. Hankerson, D., Menezes, A., Vanstone, S.: ‘Guide to elliptic curve cryptography’ (Springer-Verlag, New York, 2004, 1st edn.). 2. 2) • 2. Horng, J.S., Jou, I.C., Lee, C.Y.: ‘On complexity of normal basis multiplier using modified Booth's algorithm’. Proc. Seventh WSEAS Int. Conf. on Applied Informatics and Communications, Athens, Greece, 24–26 August 2007, pp. 1217. 3. 3) 4. 4) 5. 5) • 5. Azarderakhsh, R., Reyhani-Masoleh, A.: ‘A Modified low complexity digit-level Gaussian normal basis multiplier’. Proc. Third Int. Workshop Arithmetic of Finite Fields (WAIFI), June 2010, pp. 2540. 6. 6) 7. 7) 8. 8) 9. 9) 10. 10) 11. 11) 12. 12) • 12. Wun Chiou, C., Lee, C.Y., Yeh, Y.C.: ‘Sequential type-I optimal normal basis multiplier and multiplicative inverse in GF(2m)’, Tamkang J. Sci. Eng., 2010, 13, (4), pp. 423432. 13. 13) 14. 14) • 14. Wang, Z., Wang, X., Fan, S.: ‘Concurrent error detection architectures for field multiplication using Gaussian normal basis’. Proc. of Information Security, Practice and Experience (ISPEC), 2010(LNCS, 6047), pp. 96109. 15. 15) 16. 16) 17. 17) 18. 18) • 18. Kwon, S.: ‘A low complexity and a low latency bit parallel systolic multiplier over GF(2m) using an optimal normal basis of type II’. Proc. 16th IEEE Symp. Computer Arithmetic, June 2003, pp. 196202. 19. 19) • 19. Lee, C., Chang, P.: ‘Digit-serial Gaussian normal basis multiplier over GF(2m) using Toeplitz matrix-approach’. Proc. Int. Conf. Computational Intelligence and Software Engineering (CiSE), 2009, pp. 14. 20. 20) 21. 21) • 21. Sukcho, Y., Yeon Choi, J.: ‘Anew word-parallel bit-serial normal basis multiplier over GF(2m)’, Int. J. Control Autom., 2013, 6, (3), pp. 209216. 22. 22) 23. 23) 24. 24) 25. 25) 26. 26) • 26. IEEE P1363: Editorial Contribution to standard for Public Key Cryptography, 2003. 27. 27) • 27. Federal Information Processing Standards Publications (FIPS)186-2, U.S. Department of Commerce/NIST: Digital Signature Standard (DSS), 2000. 28. 28) 29. 29) 30. 30) • 30. Grabbe, C., Bednara, M., Teich, J., et al: ‘FPGA designs of parallel high performance GF(2233) multipliers’. Proc. Int. Symp. on Circuits and Systems, 25–28 May 2003, pp. 268271. 31. 31) • 31. Novotny, M., Schmidt, J.: ‘General digit-serial normal basis multiplier with distributed overlap’. 10th Euromicro Conf. on Digital System Design Architectures, Methods and Tools, 29–31 August 2007, pp. 94101. 32. 32) • 32. Hosseinzadeh-Namin, A., Wu, H., Ahmadi, M.: ‘High speed word-parallel bit-serial normal basis finite field multiplier and its FPGA implementation’. Thirty-Ninth Asilomar Conf. on Signals, Systems and Computers, 28 October–1 November 2005, pp. 13381341. 33. 33) 34. 34) 35. 35) Related content This is a required field Please enter a valid email address
global_01_local_1_shard_00001926_processed.jsonl/2500
Table Of Contents 2.3. A secured cluster In the other tutorials you may have noticed the presence of the security flag. By default a cluster is secured and requires the generation of a cluster key pair and users to be added. In this tutorial, we will see how this is done. We will assume that configuration files are stored in the /etc/qdbd directory and that binaries are installed in /usr/local/bin. 2.3.1. Generating a cluster key pair The private key will have to be shared for all the servers of the cluster. It must be kept private and only the daemon requires it. To generate a key pair you use the quasardb cluster key generator (see quasardb cluster key generator): qdb_cluster_keygen -p /etc/qdb/cluster_public.key -s /etc/qdb/cluster_private.key It is very important that the private key remains unaccessible to third parties. Clients connecting to the cluster do not need the private key, only the public key. It’s best to keep the cluster public key file in a read accessible location different from the QuasarDB configuration directory. 2.3.2. Creating an user We will create an user named “alice” and add that to the user file. We will store the private key in a local directory, as we will need it to connect to the cluster. To add an user you use the quasardb user adder tool (see quasardb user adder): qdb_user_add -u alice -p /etc/qdb/users.cfg -s alice_private.key We can create, if we need to, a second user named “bob”: qdb_user_add -u bob -p /etc/qdb/users.cfg -s bob_private.key The user adder tool will update the users.cfg, preserving our user named “Alice”. 2.3.3. Generating the daemon configuration We will generate a default configuration file and update the security information with the files we just generated. To generate a default configuration, we use the –gen-config switch from the daemon: qdbd --gen-config > /etc/qdb/qdbd.cfg In this generated a configuration file, we need to update the security section of this file: "security": { "enable_stop": false, "enable_purge_all": false, "enabled": true, "encrypt_traffic": false, "cluster_private_file": "/etc/qdb/cluster_private.key", "user_list": "/etc/qdb/users.cfg" We strongly recommend to use an absolute path for the cluster private file as well as the users list. By default full traffic encryption is disabled for performance and compliance reasons. However, even with traffic encryption disabled, the authentication itself is cryptographically strong. 2.3.4. Running the daemon with our secure setup We now need to run the daemon with our updated configuration: qdbd -c /etc/qdb/qdbd.cfg When security is properly setup, the following lines should appear in the log: 11:12:08.989481000 24348 info successfully loaded cluster private key from "/etc/qdb/cluster_private.key" 11:12:08.989760100 24348 info successfully loaded 2 users from "/etc/qdb/users.cfg" If the daemon fails to load either the key or the user file, ensure the daemon has proper read access to these files and that the path is valid. 2.3.5. Establishing a secure connection from the shell To connect the shell securely to the cluster, we need: • The cluster public key file. In our case it’s /etc/qdb/cluster_public.key • The user private credentials file. In our case it’s either alice_private.key or bob_private.key You will see that the credential file contains both the private key and the user name. To securely connect as alice: qdbsh --cluster-public-key-file=/etc/qdb/cluster_public.key --user-credentials-file=alice_private.key To securely connect as bob: When succesfully connected, you should be greeted by the shell prompt: quasardb shell version 2.1.0 build d34dc0d3 2017-01-11 00:00:00 +0200 Copyright (c) 2009-2017 quasardb. All rights reserved. If either the cluster key or the user key are invalid, you will have the following error: Can't connect to cluster: Login failed for the user. If you connect to the cluster without specifying any credentials, you will have the following error: Can't connect to cluster: Invalid reply from the remote host. This is because the shell attempts to connect to the cluster using the unsecured protocol and the server answers with the secure protocol. 2.3.6. Growing the cluster Now that you’ve set up your secure cluster, you may want to add more nodes. To do that, you need to make sure that the private key as well as the user directory are present in the node you want to add to the cluster. Once this is done, you connect the node to your cluster like you would do without the security active. The node will authenticate itself with the cluster private key and be recognized as a special user. 2.2. Your first quasardb cluster Next arrow_forward 3. Concepts
global_01_local_1_shard_00001926_processed.jsonl/2508
Archive for October, 2011 2 Timothy 4:1-4 tells us: Preach the word; be instant in season, out of season; exhort with all longsuffering and doctrine. The Bible tells us that Jesus himself warned: Back to 2 Thessalonians 2:9-12 * Definition of OFFEND (G4624) a) to entice to sin 1.   to cause to fall away 3.   to cause one to judge unfavourably or unjustly of another The Bible tells us to “take captive every THOUGHT to make it obedient to Christ”. (2 Corinthians 10:5) Everything we do, and everything we say, springs from what is in our heart. What is in our heart is determined by what we ALLOW in. We must use our minds, and our knowledge of Scripture, to determine what we should allow in, and what we should reject (a reason hypnosis is so dangerous is that it bypasses this safeguard). Not every thought we have springs from within us. Sometimes, even unwittingly, we adopt the thoughts of others because of things we see and hear. Other thoughts are little ‘darts’ that the enemy sends into our minds. We must study our Bibles to know the ‘mind of God’. Then we must purposely align our thoughts and beliefs with His. We must reject thoughts that are not in alignment with His Word. This is how we safeguard our souls. This is where the battle rages–first, in our minds. What we do, will spring from what we believe, and what we allow to take root in our heart. Not seeing things from God’s point of view (not ‘having the mind of God’) is why so many people have persistent sin in their life that they seem unable to overcome. Our minds must be changed, towards our sin. It is not enough, merely to know that something is bad. Through study of the Word of God, we will understand WHY something is bad–and therein lies the motivation for change. Then, the thoughts that precede the sin must be recognized and ‘taken captive’ (rejected). We can only recognize these thoughts, by learning what the Word of God says, and making God’s way of thinking our own. This is how the Word of God transforms us: it allows us to view things through God’s eyes, it aligns our hearts with His, and it motivates us to change to please Him and to be more like Him. I believe that those who have the most trouble with backsliding, are those who fail to realize that we live in a raging battle between Lucifer and his followers, and God and the host of heaven. Right now, the Earth and all mankind belong to the devil. Those of us who become Christians become enemies of the devil. Jesus Christ gave his spiritual authority to Christians, and the devil knows this. Genesis 3:15 (God speaking to the devil / Lucifer / Satan) says: This verse is primarily fulfilled through Jesus Christ, but in a sense, the enmity (and the spiritual battle) continues to this day. For this reason (and because man is created in the image of God), the devil hates mankind and seeks to defile and destroy us. I am going to quote some of what a friend wrote in a blog post, and add a view into the spiritual dimension, so you can REALLY see what is happening, and what we struggle against.  (MY COMMENTS WILL BE IN CAPS) “For example, let’s say that someone is an alcoholic. One day this alcoholic realized that his or her life is a mess, and they cried out to God to deliver them. Through a series of events, God set them free from alcohol. And for a while, that person never even thought about drinking. (BUT, THAT VERY DAY THEY CALLED OUT TO GOD, THAT PERSON OBTAINED A NEW AND PERSISTENT ENEMY: THE DEVIL) But one day, all kinds of things happened that made life hard to deal with. (JUST HAPPENED? OR PERHAPS–ORCHESTRATED!) It could be any number of things, but never the less, the result is the same. (DEMONS THAT ARE ASSIGNED TO THEM SPRING INTO ACTION. LITTLE THOUGHT ‘DARTS’ PENETRATE THEIR MIND. ‘BOY, I NEED A DRINK’, THE DEVIL WHISPERS. ) That person looks to alcohol as a refuge. (‘JUST A LITTLE BUZZ WOULD BE NICE’, THE DEVIL WHISPERS. ‘JUST A BEER OR TWO’ . . . ) They want to escape into “happiness” just for a little while. Just enough to numb things out a little bit so they can relax and think things through. So after some conflict in their head and heart, they cave in to the pressure, and they pick up a six-pack. There was that one last bit of hesitation right before the bottle touched their lips, but that was quickly overcome by the thought (THOUGHT ‘DART’ SENT BY THE DEVIL) of “it’s too late now, you’ve already bought the beer and opened it up.” So down goes the first bottle. They think “this time I will only drink in moderation”, but that didn’t work last time, and it won’t work this time either. (‘MAYBE JUST ONE MORE’, THE DEVIL WHISPERS . . . AGAIN, AND AGAIN . . . ) Before they know it, they are stopping by the store every night on the way home from work. (WHEN THEY DRINK IS THE ONLY TIME THE VOICES SHUT UP AND GIVE THEM ANY PEACE!) They will meet other people who drink (YOU DON’T THINK THAT’S BY COINCIDENCE DO YOU?), and late nights at the bar are a normal way of life…again. Then comes the DWI, then comes the totaled car, then comes the broken marriage. Why did this happen?’ It happens because we either don’t know, or don’t believe that there is a huge demonic presence on this Earth, that is constantly at work (especially at opposing the people of God). These demons are eternal beings that never sleep! They will work on you 24/7 for the rest of your life . . . if you let them!! But here is the key–you DON’T let them!! The Bible tells us that the devil goes about, like a roaring lion, seeking whom he may devour. But it also tells us ‘resist the devil and he will flee from you’. Now, Satan’s #1 lie is that he doesn’t exist. Obviously it is to his advantage that we believe that, because if we do, we won’t resist him! But, the Bible wouldn’t tell us to resist him if he didn’t exist!! One way to resist him (besides to ignore what he is saying or telling us to do), is to ‘rebuke’ him. You can say: ‘Satan (or ‘demons’)–LEAVE ME ALONE!! IN JESUS’ NAME! (If you aren’t a Christian, your authority is pretty limited, so you’d better get that resolved first.) The other thing to do is to ‘plead the blood of Jesus’ over yourself for protection. That’s as simple as saying: ‘I plead the blood of Jesus over myself’. So, lets review. The first, and most important steps you take are to: 1. Do your best to live right 2. ‘Plead the blood of Jesus’ over yourself daily 3. Always remember that you are involved in a spiritual battle, and that the spirit world is very real 4. Resist the devil 5. Rebuke the devil/demons when they mess with you If you will do these things, you will see a tremendous improvement! Beyond that, there are other things you’ll need to learn more about and do, for complete deliverance. • Clean up your life and your home, work station, etc. Learn about the kind of things that can be ‘doorways’ for demons, or that demons can ‘attach to’ and get rid of them. • Get deliverance from (have cast out) any demons that are living inside you. (Satan’s #2 lie is that Christians can’t have demons inside them.) You can find more info about deliverance at these sites: (the best info, but the site is horribly disorganized) “[There is] therefore now no condemnation to them which are in Christ Jesus, who walk NOT after the flesh, but after the SPIRIT.” (Romans 8:1) ” . . . Abraham believed God, and it was counted unto him for righteousness. Now to him that worketh is the reward not reckoned of grace, but of debt. But to him that worketh not, but believeth on him that justifieth the ungodly, his FAITH is counted for righteousness.” (Romans 4:3-5) “Knowing that a man is not JUSTIFIED by the works of the law, but by the FAITH of Jesus Christ. . . for by the works of the law shall no flesh be justified.” (Galatians 2:16) “What [doth it] profit, my brethren, though a man say he hath faith, and have not works? can faith save him? . . . faith, IF IT HATH NOT WORKS, is dead, being alone. Yea, a man may say, Thou hast faith, and I have works: shew me thy faith without thy works, and I will shew thee my faith BY my works. Thou believest that there is one God; thou doest well: the devils also believe, and tremble. But wilt thou know, O vain man, that FAITH WITHOUT WORKS IS DEAD? Was not Abraham our father justified by works, when he had offered Isaac his son upon the altar? Seest thou how FAITH WROUGHT WITH HIS WORKS, and by works was faith made perfect? And the scripture was fulfilled which saith, Abraham believed God, and it was imputed unto him for righteousness: and he was called the Friend of God. Ye see then how that by works a man is justified, and not by faith only. . . . For as the body without the spirit is dead, so faith WITHOUT works is dead also.” (from James 2) If we must work for our salvation, then God would owe it to us if we did a good job. However, we are NOT justified by the works of the LAW, for none of us is capable of perfectly keeping the law! What hope of salvation have we then? We can be justified by faith in Jesus Christ. There is a difference between belief and faith. Belief is a declaration that we agree that something is real or true. But faith, genuine living faith, is the guiding force of our life. All the actions and decisions of our life spring not from what we believe, but what we believe IN (in other words, from our faith)! Our works, the way we live our life, will testify as to our faith. If our life reveals that we had our faith in God, then that faith will justify us. ‘Abraham believed God’ . . . in other words, Abraham lived a life of obedience to God–and not because he feared the LAW, but because he revered and had faith in the character of GOD. This faith, in the character and promises of God, was counted to Abraham as righteousness . . . in spite of the fact that he, himself, was neither completely righteous nor perfect. And here is how we can examine our own hearts: Do we place our faith in the LAW . . . because we believe IT has the power to determine whether we should be condemned or justified? Is it the LAW that we fear and respect? Do we strive to know the LAW and obey IT completely? Is it the requirements of the LAW that we meditate on? Is it the LAW that we hold dear in our hearts? Is it the LAW that we judge ourselves by? Or, do we place our faith in GOD, because HE is greater than the law? Do we realize that we can never completely, perfectly fulfill the law ? Do we realize that, even after doing all that we can, we still fall short of attaining the perfection that could justify us, under the law? Do we know that it is only the grace of GOD and the sacrifice of JESUS CHRIST that CAN fulfill the righteous requirements of the law? Do we trust in HIM to bridge that gap for us, when we come to the end of our righteousness and still fall short? Is it JESUS CHRIST whom we place our faith in? Is it GOD whom we fear and respect? Is it GOD we strive to know and obey? Is it the requirements of GOD that we meditate on? Is it GOD whom we hold dear in our hearts? We all have faith in something. Our faith gives birth to actions (works). Will our works demonstrate a faith that can justify us? Other people may have a hard time discerning the difference between works done to please the law and works that spring from faith in God, but God knows the difference!
global_01_local_1_shard_00001926_processed.jsonl/2539
If I Were a Tree If I were a tree, I would have no reason to love a human. source: Maggie Stiefvater, The Raven Boys image: Eddie’s Garden Photos Pine Tree  16 thoughts on “If I Were a Tree 1. Yes, we humans have much to answer to when it comes to trees.. Thankfully there are those of us who do love our trees Eddie.. And so happy to meet so many of them here on your blog.. ❤ xxx 2. It’s true. And yet they do. Love humans, that is. Their love, like much of nature’s best, is unconditional. Only humans insist on “earning” or “deserving” love… sigh… kindness is always welcome WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s Justice Reign A lifestyle blog with meaning, because depth is always in fashion. Simply Chronically Ill Living with a damaged skull Sriram Janak - Photography Art Work by Diann Meynor Being Alive Rolandomio Travel Soul Gatherings Spiritual Moments in the Human Experience Big Dreams for a Tiny Garden courtyard garden reflections Art Gowns The Art of Glamorous Fantasy The Learning Prophet Poetry, Fiction, Non-Fiction, Nature, A medium of expression Voices from the Margins Savvy Raj Live Life Lovingly! Mark Your Steps Staying foolish and hungry Silently Smouldering Words Poetry and things like that Photos by Donna Birds and Wildlife Photography thoughts from my mind to yours Travel With Photografey The Lantern Room Enlightenment Through Photography Smile Always Find Your Middle Ground %d bloggers like this:
global_01_local_1_shard_00001926_processed.jsonl/2555
#AlexFromTarget Goes Canine pic.twitter.com/tztvTfGb8q You can call me Alex OK – this is true. A teenage girl in Texas sees a hot guy in a Target store. She gets a picture of him and sends it to her friend. Somehow it goes viral in a way that makes Ebola seem like evolution in slow motion. The world goes into a frenzy of joy, lust and greed. Alex from Target is the hottest commercial property on the planet. They’re making a video game and branding cosmetics in his image and name. Ghost writers are queuing to write his life story. Offers of film stardom…..blah blah blah. Even French TV knocks President Hollande off the top of the News to cover the story.  . Viral Alex It’s a dog’s life at the checkout OK – this is true. A romantic novelist in France sees the cutest ever dog at a restaurant. She takes a snap and puts it on her blog. She waits. Let’s see the true power of the internet. Believe me – this pooch had real tight balls and wasn’t afraid to walk around with them sticking out. You don’t get that in Target. Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/2568
C/Type Qualifiers From Wikiversity < C Jump to navigation Jump to search C Type Qualifiers[edit] C type qualifiers add special properties to the variables being declared. C provides the following two keywords: • const: the const qualifier is used to indicate the variable value can not be changed after its initialization. As an alternative, the #define preprocessor directive can be used to define constant values and these will consume no memory space. • volatile: the volatile qualifier indicates that variable values can be changed without the current program's knowledge and so the compiler should not optimize away uses of that variable. Note: a Standard conforming compiler can ignore these qualifiers; nevertheless, it must issue a message when an attempt is made to alter an object declared as const. Project: Topic:C Previous: Data Types and Keywords — C/Type Qualifiers — Next: Storage Classes
global_01_local_1_shard_00001926_processed.jsonl/2580
A reek hen or reek fowl was a chicken given to a landlord, the church, or another authority as a tax or tribute. It was specified as being a 'well-fed fowl', but in many cases it was a symbol of vassalage, and may or may not have been enforced. In other cases it was a tax, with one reek hen due for every hearth with a fire (or, as it may be, every chimney with smoke). If this was part of a tribute, it would indeed be only a part, in addition to other goods and moneys; for example, a tribute might be one days harvest and a reek hen.
global_01_local_1_shard_00001926_processed.jsonl/2581
An Eocene fossil turtle. Found in New Zealand, and considered to be different enough from Psephophorus species found in Europe, Egypt, and the United States to be given a separate classification. This turtle is found in Tertiary sediments. It was first discovered in 1995 and named by Robert Kohler, who was a fan of Terry Pratchett. Pratchett himself has this to say about it:          "Of course I’m proud of it. It tickles my imagination. Forty millions years ago this thing was paddling around the globe, eating jellyfish, and now there’s this link to this short bald guy whose own species, at that time, was still saying 'ook'          I use it as my Human Being test. We all have such a thing, even if we don't like to think of it like that- a little test of the imagination. I mentioned it to another author who immediately said, 'Who do I have to sleep with to get a species named after me?' and she passed. It's the people who look at you sideways and say, 'Is that good?' that you know are pod beings from the planet Zog." The quote is taken from The Discworld Companion, in the part where they interview Terry Pratchett
global_01_local_1_shard_00001926_processed.jsonl/2582
Glimpses of grace seen in the everyday Posts tagged ‘shepherd’ Feeling Sheepish? Blindly following a leader has gotten lots of people into trouble, too. That’s why we need the Good Shepherd, the Lord Jesus who watches over us and has given His life to save us from the foolish consequences of our headstrong ways.  Will we follow Him or wander off to do our own thing—or follow “other sheep” into total ruin?  “All of us, like sheep, have strayed away. We have left God’s paths to follow our own. Yet the LORD laid on him the sins of us all.”  (Isaiah 53:6) My Awesome Jesus! I love the paradoxes that describe Jesus.  He defies being put into a box.  Those who know Him revel in the fact that he’s both… My Shepherd and yet my sacrificial Lamb (John 10:11 & John 1:29) My God and yet my Brother (John 20:28 & Luke 8:21) My Creator and yet my Companion (John 1:3 & Matthew 28:20) Eternal yet killed (and of course raised to life)  (John 1:1; 19:30 & chapter 20) Master and yet Servant (Jude 1:4 & Mark 10:45) And much, much more! Christ is the visible image of the invisible God.     for through him God created everything         in the heavenly realms and on earth. He made the things we can see     and the things we can’t see— Everything was created through him and for him.     He existed before anything else,         and he holds all creation together. So he is first in everything.     and through him God reconciled everything to himself.         He made peace with everything in heaven and on earth Maranatha!  Come, Lord Jesus! Pictures of God and Me When our son Nathan was five years old, we played a game one evening, taking turns saying  “You’ll be ________ and I’ll be _______.”  The blanks were filled with two things that go together.  For example, You’ll be  Goldilocks and I’ll be Papa Bear.  Or You’ll be salt and I’ll be pepper. Nathan came up with this one:  “You’ll be Cinderella and I’ll be her go-cart!”  Hmmm… But it does make me think of paired roles in Scripture that “picture” the close relationship between God and me.  I love these.  In love God/Jesus is:                                         I am: Shepherd                                                 His sheep Fortress                                                   refugee hiding there Mother bird                                               chick hiding under mom Bridegroom                                              His bride Father                                                       His child Vine                                                          a branch depending on the Vine Potter                                                       clay Master                                                      His servant Leader                                                      His follower Creator                                                    creature Tag Cloud
global_01_local_1_shard_00001926_processed.jsonl/2591
2016 Conference Highlights Focus on Speakers Focus on Exhibitors Keeping it Local. 12th Annual Local Food Conference Exhibitors Current List of Exhibitors We update our website weekly with new exhibitors.  Check back often and follow us on Facebook.com/FTTPittsburgh for event updates. Check Back Often for Updates! We are still accepting exhibitors for the 2018 Conference.
global_01_local_1_shard_00001926_processed.jsonl/2600
Saturday, December 16, 2017 Finding men with wide shoulders attractive These guys in here have broader shoulders than your average Joe's. Do we love it? Researchers claim women (and some guys, of course) instinctively like men with broad shoulders. Are you one of them? Men with broad shoulders usually consider themselves blessed. Aren't they, though? Often, we see them make fashion disasters out of themselves. This is because they don't use body shape clothing to compliment their assets. But, these five dudes right here... The one's with no t-shirts don't need to think about fashion as long as they're shirtless, right? "A good set of shoulders sends a signal that this is a man - strong, grown, ready and able to carry me from a burning building, or cradle a kitten or infant." Broad shoulders make a man look beastly, desirable and powerful! As compared to the hips, they are usually the most important factor in attractiveness. Some people add how men with wide shoulders give out the vibe that they can protect us. 'Shoulders make the man' and 'the wider the better' are also pretty common beliefs. Broad shoulders just give off an air of masculinity and people love to see the contours of the bones there, they look so inviting and men-lovers to nibble on them. Some say it's ridiculously sexy. Thoughts? 1. I can appreciate nice broad shoulders, but that is not my favorite part of a man's upper body. Nice pecs get me going. But I totally get what is being said about the unspoken masculinity vibes that come with broad shoulders. 2. I share your words, and for me also the #2 would be perfect! the problem is that when bodybuilding is exaggerated and becomes ugly and disharmonious! For this reason, I do not like professional body builders! just an example: if you take Anton Antipov here you'll love him for sure He became exaggerated and I can't love him so much now! 3. The eyes eat too ;) send me the first one ;) 4. I appreciate a man with broad shoulders as long as it remains harmonious with his arms (biceps for example), his torso and also his legs. Nor should it be too big. 5. # 3 Like to strike up a conversation with you and see were it go's hot guys (642) gay guys (543) hot guys with abs (521) instagram boys (495) hot guy of the day (461) hot 100 guys 2015 (413) hot guys 2015 (413) abs (360) cute guys (356) hot boy (348) hot boys (348) hot man (348) hot men (348) Instagram (313) hottie (229) masculine (202) muscular (165) cute boys (152) handsome men (151) eye candy (149) fit studs (147) shirtless boys (147) hot guy (139) cute boy (82) hottie of the day (82) shirtless boy (82) studs (82) hot shirtless men (80) jocks (59) hunks (57) hot 100 guys 2016 (48) hot guys 2016 (48) male models (39) fitness motivation (35) sexy boys (34) pecs (31) sexy biceps (23) adorable boys (21) hot daddy (21) masculine men (21) beautiful male models (18) shirtless male models (18) muscle worship (17) hot young guys (16) male nipples (15) hot jocks (14) boys next door (13) sexy men in underwear (13) buff guys (11) celebration (11) hot guy selfies (11) hot guys at the beach (11) guys with v-lines (9) guys with cute smiles (8) hot guy meme (8) hot guys at the gym (8) hot guys with tattoos (8) sexy cars and hot guys (8) food and sexy guys (7) men with shades (7) sexy hard workers (7) body worship (6) milestone (6) sexy famous guys (6) muscles (5) sexy sweaty men (5) strong men (5) hot guys in uniforms (4) poll results (4) ripped (4) adorable (3) biceps (3) celebrity (3) confidence is sexy (3) man boobs (3) poll (3) shirtless guys (3) thirsty men (3) bad boys (2) boy next door (2) fist pumping men (2) group of sexy men (2) men stretching (2) photo spam (2) sexy frat boys (2) sexy gamers (2) sexy hairy men (2) sexy policemen (2) vote (2) animal lovers (1) animals (1) bearded sexy men (1) buff (1) gorgeous dudes (1) halloween (1) hot guys shopping (1) hot male swimmers (1) hot military guys (1) hot summer (1) male model (1) photo of the day (1) sexy long hair men (1) sportsmen (1) summertime guys (1) working out (1)
global_01_local_1_shard_00001926_processed.jsonl/2611
How to recognise bot? Like in the title, lot of people is saying that they keep fighting bots all the time, but how do you actually know that you are fighting against bot not real player? A lot of high level commons, including dinos most people wouldn’t bother leveling, like ones that can’t be fused. Usually they are all the same level. After the fight: their names contain blood, mouth, bouncer, COM. There a few more typical names I’m not recalling atm. Here’s how I recognize: 1.Dino level average over 25, sometimes got all lv30. But only use common ~ epic creatures. 2.Weird move choice. For example, repeat using normal attack, even though they can use special moves. 3.Use some creatures that real players won’t raise. Because they are too weak, so rarely to got DNA, or just material for advance hybrids. ex; Suchomimus,Diplocaulus ,Suchotator, Sinoceratops, Spinosaurus Gen2, Kentrosaurus, Spinotahraptor, Ankylosaurus, Postimetrodom, Concavenator, Rajasaurus, Baryonyx. 4.Extremely high critical & stunning chance. (Don’t know if this one is real) 5.You can record their ID, and go search on top 100 list. Their names aren’t in leaderboard. All of these are absolutely accurate like this one. You can also see lower bots as well all level 22 and up. Most players have different levels of Dinos not all 22, all 25, all 29, all 30 , here’s another one Hey! We at Metahub published this a little while back. It’ll answer all your questions regarding bots :wink: plus give you a few tips on how to avoid them!
global_01_local_1_shard_00001926_processed.jsonl/2612
Legendaries where have they all gone to .? Legendarie’s we all want them we all need them … but and here is the big but… Where in the blazes have they all gone to lately.?. Weeks ago i used to see legendary dino’s all over the place but lately since the recent upgrades they have all but vanished from the game entirely.!. i have travelled more than 50 kilometres from home in the search of even just one of them but so far no luck in finding one or even a long dead skeleton of one either… hint hint LUDIA… big HINT.!. Bring back the legendary dinosaurs or i am out of there faster than a raptor doing warp factor 9.5 speed, it was the one thing that kept me interested in this game because the legendary dino’s kept popping up now and then in different suburbs so i kept chasing them to find out what ones were available or if any new ones had appeared that i didnt have yet. So come on LUDIA lift & shift bring back the legendary dino’s or its GAME OVER for me m afraid… nuff said O.o I don’t think legendary dinos spawn in the wild… Legendarys don’t must mean epics I think so…:blush: Anyhows, I do come across few Epics daily. Rares are quite common I think… Legendaries have never spawned in The Wild. Well atleast it Will be Healty if you Can run as fast as a raptor away :joy: Wow! You’re so lucky… :+1: Do you mean park events then… Must mean park events although indominus has never been in a event as of yet Legendaries have never appeared in the wild. Lower Hybrids, yes, but not Legends. The only time Legends and Uniques are on the map is during Park Events. Otherwise, you’re chasing down the dinos needed to fuse. Epic Dino have YELLOW Halo & Legendary RED Halo! Legendary yellow dino is in Jurassic World THE GAME! Only The first Two you mention have actually spawned In a park as part of an event along with IndoRaptor aswell. And that is event dinos not Wild dinos. Wilffio : Those legendaries i mentioned above some have appeared at local parks i dont know why but i am not complaining one little bit, my sons were running around the local park like headless chooks chasing one after another of them, especially when the * Indominus Rex * showed up suddenly out of no where the ankle biters ( my sons ) freaked out big time and went after it as fast as a Velociraptor on speed.!. blasted ankle biters made me look like an old geriatric in a wheelchair because of the amount of dino DNA they got that day, my oldest son was a smart alec and bragged about snagging enough DNA to get the indominus rex for crying out loud… gggggggrrrrrrrrrrrrrrrrrr little sod .!. lol
global_01_local_1_shard_00001926_processed.jsonl/2619
Malleus Maleficarum Sometime ago, a friend had asked me about the “Malleus Maleficarum” about the “witch hunt” of the Inquisition during the 1480’s. Interesting read, I have it saved in My Favorites. My question is: Wasn’t there something either about the document or the authors, Kramer and Sprenger, not being factual or that the document was actually not used for its intended purpose? I believe it is said that the book became the “Manuel for Witch Hunting?” Any clarification would be greatly appreciated. Is this what you are referring to: The book itself was not specifically ordered by the Roman Catholic Church. The writers attached a letter of approbation from the University of Cologne ostensibly signed by four teachers there. However, this letter was a forgery. The University had not approved the book, and had in fact condemned it for the use of unethical legal procedures, and because its demonology was not consistent with Catholic doctrine. Kramer was condemned by the Inquisition in 1490, but the book continued in publication, buoyed by the growing popular hunger for remedies against witchcraft. I got the above from a Wikipedia article. Yes, I think this is it. Do you know where I can find more details about this? Thanks fo jogging my memory, Dallas! Demon Lovers: Witchcraft, Sex, and the Crisis of Belief by Walter Stephens It’s a rare look into how the Malleus Mallificarum was written and edited that sheds light on the motivations of Kramer and Sprenger. I found it especialy interesting to learn how the text evolved in response to failed witch trials. (For example, gagging witches in court to prevent them from casting spells was invented in response to an eloquent woman who ‘bewitched’ the magistrate and won her freedom.) Witch-hunting was not just a Catholic phenomenon. A couple years ago I read The Reformation by Diarmud MacCullough (very good, btw) & he states that after the initial upheavals of the Reformation and Counter-Reformation there was a huge upsurge in witch-hunts in both Catholic and Protestant countries. The only places that were immune were Spain and Ireland, perhaps because Spain had “infidels” (Jews and Moors) to deal with and Ireland had the English barbarians on their shores. Wow, thanks y’all. I’ll definitely look into those! I knew I could count on my brothers and sisters at CA - ya’ll are wonderful!
global_01_local_1_shard_00001926_processed.jsonl/2622
Big Fish Discussion in 'The Front Room' started by Gombur Glodson, Dec 29, 2003. 1. Gombur Glodson Gombur Glodson Fledgling Freddie Am I the only one looking forward to this movie? Saw the trailer and I was hooked :) Seems like it's Forrest Gump mixed with Tim Burtons freaky mind. Share This Page
global_01_local_1_shard_00001926_processed.jsonl/2624
What I want in iTunes: Song Aliases Discussion in 'Mac Apps and Mac App Store' started by swiftaw, Sep 30, 2005. 1. swiftaw macrumors 603 Jan 31, 2005 Omaha, NE, USA This is something I really want, the ability to have a song show up on many albums but only need one copy of it on the disk/ipod. For example, I have the song 'Bohemian Rhapsody' 4 times in my itunes library, one the original release album, Queen's Greatest Hits, and on two compilation albums. I really wish I didn't need to have 4 copies of the file on my disk. I would love the ability to have one copy on the disk and then aliases to it for the three albums. Of course, I could have chose not to rip in the last 3 times, but I don't like partial albums , even if it does end up with duplicate copies of a song on my disk. Does anyone else wish you could have song aliases? 2. kgarner macrumors 68000 Jan 28, 2004 That's an interesting idea.I too have a few duplicates like that, but sometimes the versions are different. Like if I have song from a movie soundtrack and then from the real album they are often different lengths and such. But for those times where it really is a repeat it could be handy. 3. cube macrumors G5 May 10, 2004 Not worth the complication and development for the few times one might have exact duplicates (and even if they were not exactly the same). 4. notjustjay macrumors 603 Sep 19, 2003 Canada, eh? What would happen if you manually replaced one of the duplicate files (in your iTunes library) with a symlink to the original? Share This Page
global_01_local_1_shard_00001926_processed.jsonl/2628
Fan-made summary - Story - Chapter 12 : Broken [stub] v5.2 Moderators: Invisigoth, chemi User avatar Posts: 341 Joined: Sun Jun 04, 2017 7:19 pm Re: Fan-made summary - Story - Chapter 12 : Broken [stub] v5.2 Post by darrin » Mon Nov 12, 2018 11:18 am Ha, that was clever cidjen, "You win this round" as the cartoon villains say. :lol: :lol: I almost didn't post that, because on the one hand I was afraid of being perceived as mean (even though, y'know, I'm posting a joke :(), and on the other hand I've been beating this Schroedinger's horse for a dozen strips now and it'll likely be months before we get any kind of in-comic observation whether it's alive or dead. But the more I thought about it the more I started to believe this was the perfect joke for expressing that "multiple perceptions" spirit of MegaTokyo. If you think the mathematician is making an important point (not necessarily about sheep ;)), then that's why the joke is funny for you (and if you find the mental image of a bunch of sheep that are black on one side and some other color on the other hilarious, then that's a bonus). On the other hand, if you think the mathematician is just being a pretentious asshole, then the joke is still funny, just for a different reason. And if like me you think the Dirk Gently books are Douglas Adams's best work (despite the greater praise the Hitchhiker ones generally receive), and try to embrace the quantum in all things, then you're quite justified in finding it funny both ways at once. If anyone did perceive any kind of mockery in the joke, please believe any such mockery was essentially self-directed, and please also consider this my promise via attempted humor that I won't bring up the subject again, at least until the next comic that actually has Ashe vs Evil Old Man in it. ;) Avatar by Broken, I changed the book My rescripts, now with little bits of commentary for each one User avatar Posts: 573 Joined: Fri Dec 29, 2017 12:13 pm Post by cidjen » Tue Nov 13, 2018 12:05 pm The joke is not lost on me ;) Humor is always welcome :) You wouldn't believe, what colour of sheep I see around where I live (deep orange in the winter, specked with all kinds of green, blue, pink to identify the owner etc !) :) Translation to polish (Scanlations have now been deleted) User avatar Yl33 D4 N00b Posts: 335 Joined: Sun Jun 04, 2017 7:19 pm Location: KY Post by Yl33 D4 N00b » Tue Nov 13, 2018 4:28 pm Jerry Garcia got reincarnated as a shepherd? :lol: Post Reply Who is online Users browsing this forum: No registered users and 3 guests
global_01_local_1_shard_00001926_processed.jsonl/2633
1. JohnBarry2's Avatar I have Windows 10 on my laptop and on my phone(950). With W8 I would use Windows Phone App for Desktop. It had a few good features like SYNC-ing photos, music or videos from your PC to your phone and resizing them. The new Windows 10 Phone Companion App has an import from phone to PC option but it doesn't sync. Any ideas, I love being able to keep a copy of all my photos on my phones SD card?? 12-30-2015 08:58 PM Similar Threads 1. bing/cortana search is broken on my phone By obakir in forum Microsoft Lumia 950 Replies: 18 Last Post: 05-11-2016, 05:23 PM 2. 1520 is one sweet phone By Captpt in forum Nokia Lumia 1520 Replies: 38 Last Post: 02-07-2016, 09:42 PM 3. Replies: 0 Last Post: 12-30-2015, 08:35 PM 4. Hello ?why we don t have snap chat on windows phone 8.1? By esrabh in forum General Phone Discussion Replies: 2 Last Post: 12-30-2015, 08:22 PM
global_01_local_1_shard_00001926_processed.jsonl/2640
Dismiss Notice Dismiss Notice BIG Sale 50% For All Magento Themes and Extension Cyber Monday by Magesolution Discussion in 'Ads & Offers (not web hosting)' started by Hlinh, Nov 22, 2018. 1. Hlinh Hlinh Member b& Get Flat 50 % off on All Magesolution Extensions and Themes !!!! Magesolution is running a limited period offer and giving away 50 % discount on all products for CyberMonday until Nov 27. Use the coupon code CYBER to get 50% off while you are buying Magento 1 & 2 Extensions, Magento 1&2 Themes at https://www.magesolution.com/ Hurry! There has never been a better time to buy extensions from Magesolution! Share This Page
global_01_local_1_shard_00001926_processed.jsonl/2641
Learn How to Make French Breads and Pastries at Home! Learn all the techniques and recipes to make classic French breads and pastries in this easy-to-follow video course - no experience necessary!    Watch Promo By the end of this course, you will become a master French baker and be able to experience all the delights of a French bakery right at home in your own kitchen! It doesn't matter what your experience in baking is. All you need is a love of delicious French breads and pastries to become a French pastry chef! In this online video course, you'll learn: • How to make croissants • How to make French bread (French baguettes) • How to make macarons • How to make brioche • How to make crème brûlée • How to make crème patissiere (pastry cream) • How to make quick and easy puff pastry • How to make cream puffs (profiteroles) • How to make éclairs • How to make spongecake • How to make crepes We will cover the following techniques so that you can make other French creations with your new skill set: • Getting silky smooth custards • Working with yeast • Making choux pastry • Classic butter pastry for sweet and savory recipes • Whipping egg whites into meringue • Laminating dough Your Instructor Beeta Hashempour Beeta Hashempour Beeta Hashempour is the chef and author of the French food site MonPetitFour.com, sharing traditional and modern French recipes for everyday meals. Having previously worked as a pastry instructor specializing in French breads and pastries, Beeta decided to create this online course dedicated to sharing her love of French baked goods with students beyond her local community. Class Curriculum Available in days days after you enroll   Section 1 Available in days days after you enroll   Section 4 Available in days days after you enroll   Section 5 Available in days days after you enroll   Section 7 Available in days days after you enroll Frequently Asked Questions How long is the course? How long do I have access to the course? What tools are used in this course? Are refunds available for the course? This course is not open for enrollment.
global_01_local_1_shard_00001926_processed.jsonl/2659
One cliché about life and death, etc.— found, for example, in the Bible and Das Lied von der Erde— is that we may go, but the Earth goes on and life goes on for those who survive us. Well, maybe enough people—it only takes a few at a time—are so jealous of those who will live on that they’ve decided to destroy life, to kill the Earth. Is there another explanation? 1. Ed Curtis · · Reply Why explain today’s politics or political systems? They evolved during the Reformation and replaced the rule of the Popes. Now obsolete, they are being replaced by technological entities in the form of corporations and other similar institutions. Robots will help with the heavy lifting. Soon, it will be possible to prolong life, possibly indefinitely. Who will benefit from such developments? Certainly not all people. How will those who are left out react? How will the chosen people react? Who will the chosen people be? The rich? The elites? Will Hillary and Donald be among the chosen people? Will you? Will I? Why? Why not? I’d like to believe that the entire contents of my mind and life experiences and ability to think and continue learning would be worthwhile preserving. If not in a rehabbed body then possibly in a giant, interstellar drop box? Waiting for a worthy robot? In any event, it is too much effort to destroy the earth. 2. Contemporary politics is a train wreck, and this explanation is as good as any I have seen. Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_1_shard_00001926_processed.jsonl/2667
| | February 5, 2018 Recent studies of honeybees and bumblebees have examined combinatory effects of different stressors, as insect pollinators are naturally exposed to multiple stressors. At the same time, the potential influences of simultaneously occurring agricultural agents on insect pollinator health remain largely unknown. Due to different farming methods, and the drift of applied agents and manure, pollinators are most probably exposed to insecticides but also bacteria from organic fertilizers at the same time. We orally exposed honeybee workers to sub-lethal doses of the insecticide thiacloprid and two strains of the bacterium Enterococcus faecalis, which can occur in manure from farming animals. Our results show that under laboratory conditions the bees simultaneously exposed to the bacterium and the pesticide thiacloprid had significantly higher survival rates 11 days post-exposure than the controls, which surprisingly showed the lowest survival. Related article:  A UK Farmer's Perspective: What are the Consequences for Sustainability and the Public When Biotechnology Innovations are Withheld? [C]aloric restriction through behavioural and physiological adaptations may have mediated an improved survival and stress resistance in our tests. However, the decreased food consumption could in long-term also result in possible negative effects at colony level. Read full, original post: Increased survival of honeybees in the laboratory after simultaneous exposure to low doses of pesticides and bacteria Optional. Mail on special occasions. Send this to a friend
global_01_local_1_shard_00001926_processed.jsonl/2671
Prehistoric Cemetery: Necropolis of Son Real Prehistoric Cemetery: Necropolis of Son Real: Located just steps from the Mediterranean Sea on the northern coast of Majorca, the Necropolis of Son Real (Necròpoli de Son Real) is a sprawling prehistoric burial ground used from the Iron Age up through the Roman era.  The oldest tombs in this ancient necropolis—which stretches over 8,600 square feet on the Punta des Fenicis, a small headland in the Bay of Alcudia—date back to the 7th century BC, to the time of the Talaiotic culture on the Balearic Islands. More than 130 tombs have been found in the cemetery so far, containing the human remains of over 300 bodies. Many of the later tombs—those from around the 5th century BCE—are unusually shaped, resembling small ships or horseshoes. reading at Atlas Obscura.
global_01_local_1_shard_00001926_processed.jsonl/2676
Building from Source Landon Jobe edited this page Jan 10, 2018 · 15 revisions Before you start building, please take note of our known issues. The only dependencies for building MineCordBot are the following: 1. Java 8 JDK - Oracle, OpenJDK 2. BuildTools - (Semi-optional) Only needed for older versions of MineCordBot prior to 2.2.0. 3. Git / Git for Windows - (Optional) Explicitly required by BuildTools, useful for cloning. Building Minecordbot To build MineCordBot you will need to clone the repository, or download an archive from the releases page. After that, you will need to run the build through the included Gradle Wrapper. 1. Using your terminal (or GitBash), navigate to the directory you want to clone the repository. From here, you'll need to clone the repository as it shows on GitHub. $ cd ~/parent/directory/for/the/clone/ $ git clone 2. Branches and BuildTools • Optionally, you can switch to another currently existing branch. (ie: development) $ git checkout [Branch Name] • If building against MCB prior to 2.2.0, go ahead and run BuildTools now. 3. Once you have cloned the repository, you can go ahead and run the Gradle Wrapper to build Minecordbot. • Windows • Run gradlew build from the Windows Command Line, or... • In GitBash, execute bash build • Linux and Mac • Run /bin/bash gradlew build, or ./ build • You can also try to run it under sh (/bin/sh) • You may need to mark as an executable file - chmod +x (See the chmod manpage.) 4. Grab the freshly built "Shaded" jar (./build/libs/Minecordbot-{version}-Shaded.jar) and place it in your server's plugins folder. Feel free to rename it. 5. Refer to the Installation Page and test the build. Be sure to report any bugs during build or installation that you see to the Issue Tracker. Automated Scripts There are two automated scripts available in the repository that wrap around the Gradle Wrapper - they are optional and only provided for your convenience. • build.bat • For use on Windows Exclusively • Non-interactive (Will run and close) • For use on Linux and Mac with a BASH-compatible shell. • May need to be marked as an executable, depending on the system. • Can be ran on Windows through GitBash • Requires user intervention to exit when finished. • Allows reading the output if launched from a Graphical interface. BuildTools Instructions Since MineCordBot Version 2.2.0, Spigot's BuildTools is no longer required. Versions prior to this release required BuildTools to be ran at least once, against the Spigot 1.12 (--rev 1.12.1.) Please see the documentation linked: BuildTools Wiki. Known Issues • Gradle will not grab all the files generated or pulled in by BuildTools when using the Windows Linux Subsystem. • Versions of MineCordBot before 2.1.0 do not support Discord's Channel Categories, and will treat them as channels. Building a pre-2.1.0 version is not recommended. You can’t perform that action at this time. Press h to open a hovercard with more details.
global_01_local_1_shard_00001926_processed.jsonl/2677
Block or report user Report or block abng88 Hide content and notifications from this user. Contact Support about this user’s behavior. Report abuse Popular repositories 1. SimianArmy Forked from Netflix/SimianArmy Tools for keeping your cloud operating in top form. Chaos Monkey is a resiliency tool that helps applications tolerate random instance failures. 2. boto Forked from boto/boto Python interface to Amazon Web Services 3. ruby-hello-world Forked from openshift/ruby-hello-world Hello world ruby sample for OpenShift v3 4. sinopia Forked from rlidwka/sinopia Private npm repository server 5. dask-kubernetes Forked from dask/dask-gke kubernetes setup to bootstrap distributed on google container engine 6. test-cookiecutter-data-science Forked from drivendata/cookiecutter-data-science 4 contributions in the last year Contribution activity October - December 2018 abng88 has no activity yet for this period. September 2018
global_01_local_1_shard_00001926_processed.jsonl/2678
Powderbase provides a flat file, single table database engine and API Switch branches/tags Nothing to show Clone or download Fetching latest commit… Cannot retrieve the latest commit at this time. Type Name Latest commit message Commit time Failed to load latest commit information. • Josh McIntyre • jmcintyre.net • Powderbase provides a flat file, single table database engine and API Git Workflow • master for releases (merge development) • development for bugfixes and new features • make build Build the library • make tools Build associated utilities • make clean Clean the build directory • Create a database • Load a database for operations • Insert a record • Update a record • Search records • Remove a record • Requires the C++ standard library • Linux • Windows • Mac OSX Including and Compiling • Using the library in an application Add #include <DB.h> to use the library • Compiling an application that uses Powderbase Add DB.a to the list of files to compile, and ensure the DB.h header is in the include path Ex: g++ -o bin/sample src/tools/sample.cpp lib/DB.a -Ilib Creating and Loading a database • Declare a database object This object will be used to perform all of the desired operations on the database DB db; • Declare a table object and add fields to the table. In other words, define your table's columns First declare a table object using DB::Table table;. All table operations will be performed on this object. Next, add fields to the table, specifying the field name and the field type (ATTR_INT, ATTR_FLOAT, ATTR_CHAR16) Ex: table.add_field("Name", DB::ATTR_CHAR16); table.add_field("Squat", DB::ATTR_INT); table.add_field("Press", DB::ATTR_INT); table.add_field("Deadlift", DB::ATTR_INT); table.add_field("Wilks", DB::ATTR_FLOAT); • After creating the table, create the database by specifying the name and the table to use db.create("sample", table); • Loading an existing database in an application To load an existing database, create a database object and call db.load with the database name. This allows the database engine to load important information from the database file and makes it ready for record operations DB db; Performing Record Operations • Inserting a record To insert a record, first create a record object, specify which table to use, and add data to each field that you specified in your table. Ex: DB::Record record; record.add_char16("Name", "Josh"); record.add_int("Squat", 245); record.add_int("Press", 105); Note: If you don't specify data for a particular field, it will be filled with a default value (0, 0.0, "" for ATTR_INT, ATTR_FLOAT, and ATTR_CHAR16 respectively). Once the record object is filled in, call insert on the database object to commit that record • Updating a record To update a record, first set the record ID to the ID of the record in the database you wish to update. Then, use the add methods to update the data. Ex: record.add_int("Deadlift", 305); record.add_float("Wilks", 235.72); • Searching for records To search for records, you'll call the appropriate method based on which ATTR type you want to search on. Also specify the field name and value to match. This method returns an std::vector of record objects, so you'll want to declare an std::vector<DB::Record> variable to store the search results in and then call the search function. Ex: std::vector<DB::Record> records = db.search_float("Wilks", 235.72); The returned records can then be used to retrieve the data as needed. Ex: std::cout << "id: " << records[i].get_id() << "\\n"; std::cout << "Name: " << records[i].get_char16("Name") << "\\n"; std::cout << "Squat: " << records[i].get_int("Squat") << "\\n"; std::cout << "Press: " << records[i].get_int("Press") << "\\n"; std::cout << "Deadlift: " << records[i].get_int("Deadlift") << "\\n"; std::cout << "Wilks: " << records[i].get_float("Wilks") << "\\n"; The above example loops through all of the retrieved records and prints out the value in each field. • Removing a record Removing a record is one of the simplest operations. Call the remove function on the database, specifying the ID of the record to be removed. Ex: Note: as of development c18882b, a removed record may not be deleted from the file on disk right away. In order to achieve better performance, records are initially kept in the file and marked as removed. When about half of the database is marked as removed, the engine will rewrite the file on disk to free up space. Code samples • For a complete source code example, read src/tools/sample.cpp and src/tools/perf.cpp
global_01_local_1_shard_00001926_processed.jsonl/2679
Enterprise Kubernetes for Developers Switch branches/tags Clone or download Pull request Compare This branch is 79 commits ahead, 3566 commits behind openshift:master. Fetching latest commit… Cannot retrieve the latest commit at this time. Type Name Latest commit message Commit time Failed to load latest commit information. OpenShift Application Platform Go Report Card GoDoc Travis Jenkins Join the chat at freenode:openshift-dev Licensed under Apache License version 2.0 Watch the full asciicast • Easily build applications with integrated service discovery and persistent storage. Learn More: Getting Started If you have downloaded the client tools from the releases page, place the included binaries in your PATH. • On any system with a Docker engine installed, you can run oc cluster up to get started immediately. Try it out now! • For a full cluster installation using Ansible, follow the Advanced Installation guide • To build and run from source, see CONTRIBUTING.adoc The latest OpenShift Origin images are published to the Docker Hub under the openshift account at https://hub.docker.com/u/openshift/. We use a rolling tag system as of v3.9, where the :latest tag always points to the most recent alpha release on master, the v3.X tag points to the most recent build for that release (pre-release and post-release), and v3.X.Y is a stable tag for patches to a release. OpenShift builds a developer-centric workflow around Docker containers and Kubernetes runtime concepts. An Image Stream lets you easily tag, import, and publish Docker images from the integrated registry. A Build Config allows you to launch Docker builds, build directly from source code, or trigger Jenkins Pipeline jobs whenever an image stream tag is updated. A Deployment Config allows you to use custom deployment logic to rollout your application, and Kubernetes workflow objects like DaemonSets, Deployments, or StatefulSets are upgraded to automatically trigger when new images are available. Routes make it trivial to expose your Kubernetes services via a public DNS name. As an administrator, you can enable your developers to request new Projects which come with predefined roles, quotas, and security controls to fairly divide access. For more on the underlying concepts of OpenShift, please see the documentation site. OpenShift API The OpenShift API is located on each server at https://<host>:8443/apis. OpenShift adds its own API groups alongside the Kubernetes APIs. For more, see the API documentation. OpenShift extends Kubernetes with security and other developer centric concepts. Each OpenShift Origin release ships slightly after the Kubernetes release has stabilized. Version numbers are aligned - OpenShift v3.9 is Kubernetes v1.9. If you're looking for more information about using Kubernetes or the lower level concepts that Origin depends on, see the following: What can I run on OpenShift? OpenShift is designed to run any existing Docker images. Additionally, you can define builds that will produce new Docker images using a Dockerfile. For an easier experience running your source code, Source-to-Image (S2I) allows developers to simply provide an application source repository containing code to build and run. It works by combining an existing S2I-enabled Docker image with application source to produce a new runnable image for your application. You can see the full list of Source-to-Image builder images and it's straightforward to create your own. Some of our available images include: Your application image can be easily extended with a database service with our database images: What sorts of security controls does OpenShift provide for containers? OpenShift runs with the following security policy by default: • Containers run as a non-root unique user that is separate from other system users • They cannot access host resources, run privileged, or become root • They are given CPU and memory limits defined by the system administrator • Any persistent storage they access will be under a unique SELinux label, which prevents others from seeing their content • These settings are per project, so containers in different projects cannot see each other by default • Regular users can run Docker, source, and custom builds • By default, Docker builds can (and often do) run as root. You can control who can create Docker builds through the builds/docker and builds/custom policy resource. • Regular users and project admins cannot change their security quotas. Many Docker containers expect to run as root (and therefore edit all the contents of the filesystem). The Image Author's guide gives recommendations on making your image more secure by default: * Don't run as root * Make directories you want to write to group-writable and owned by group id 0 * Set the net-bind capability on your executables if they need to bind to ports < 1024 If you are running your own cluster and want to run a container as root, you can grant that permission to the containers in your current project with the following command: # Gives the default service account in the current project access to run as UID 0 (root) oc adm add-scc-to-user anyuid -z default See the security documentation more on confining applications. Support for Kubernetes Alpha Features Some features from upstream Kubernetes are not yet enabled in OpenShift, for reasons including supportability, security, or limitations in the upstream feature. Kubernetes Definitions: • Alpha • The feature is available, but no guarantees are made about backwards compatibility or whether data is preserved when feature moves to Beta. • The feature may have significant bugs and is suitable for testing and prototyping. • The feature may be replaced or significantly redesigned in the future. • No migration to Beta is generally provided other than documentation of the change. • Beta • The feature is available and generally agreed to solve the desired solution, but may need stabilization or additional feedback. • The feature is potentially suitable for limited production use under constrained circumstances. • The feature is unlikely to be replaced or removed, although it is still possible for feature changes that require migration. OpenShift uses these terms in the same fashion as Kubernetes, and adds four more: • Not Yet Secure • Features which are not yet enabled because they have significant security or stability risks to the cluster • Generally this applies to features which may allow escalation or denial-of-service behavior on the platform • In some cases this is applied to new features which have not had time for full security review • Potentially Insecure • Features that require additional work to be properly secured in a multi-user environment • These features are only enabled for cluster admins by default and we do not recommend enabling them for untrusted users • We generally try to identify and fix these within 1 release of their availability • Tech Preview • Features that are considered unsupported for various reasons are known as 'tech preview' in our documentation • Kubernetes Alpha and Beta features are considered tech preview, although occasionally some features will be graduated early • Any tech preview feature is not supported in OpenShift Container Platform except through exemption • Disabled Pending Migration • These are features that are new in Kubernetes but which originated in OpenShift, and thus need migrations for existing users • We generally try to minimize the impact of features introduced upstream to Kubernetes on OpenShift users by providing seamless migration for existing clusters. • Generally these are addressed within 1 Kubernetes release The list of features that qualify under these labels is described below, along with additional context for why. Feature Kubernetes OpenShift Justification Custom Resource Definitions GA (1.9) GA (3.9) Stateful Sets GA (1.9) GA (3.9) Deployment GA (1.9) GA (1.9) Replica Sets GA (1.9) GA (3.9) Replica Sets perform the same function as Replication Controllers, but have a more powerful label syntax. Both ReplicationControllers and ReplicaSets can be used. Ingress Beta (1.9) Tech Preview (3.9) OpenShift launched with Routes, a more full featured Ingress object. Ingress rules can be read by the router (disabled by default), but because Ingress objects reference secrets you must grant the routers access to your secrets manually. Ingress is still beta in upstream Kubernetes. PodSecurityPolicy Beta (1.9) Tech Preview (3.9) OpenShift launched with SecurityContextConstraints, and then upstreamed them as PodSecurityPolicy. We plan to enable upstream PodSecurityPolicy so as to automatically migrate existing SecurityContextConstraints. PodSecurityPolicy has not yet completed a full security review, which will be part of the criteria for tech preview. SecurityContextConstraints are a superset of PodSecurityPolicy features. NetworkPolicy GA (1.6) GA (3.7) Please contact us if this list omits a feature supported in Kubernetes which does not run in Origin. You can develop locally on your host or with a virtual machine, or if you want to just try out Origin download the latest Linux server, or Windows and Mac OS X client pre-built binaries. First, get up and running with the Contributing Guide. See HACKING.md for more details on developing on Origin including how different tests are setup. If you want to run the test suite, make sure you have your environment set up, and from the origin directory run: # run the verifiers, unit tests, and command tests $ make check # run a command-line integration test suite $ hack/test-cmd.sh # run the integration server test suite $ hack/test-integration.sh # run the end-to-end test suite $ hack/test-end-to-end.sh # run all of the tests above $ make test You'll need etcd installed and on your path for the integration and end-to-end tests to run, and Docker must be installed to run the end-to-end tests. To install etcd you should be able to run: $ hack/install-etcd.sh Some of the components of Origin run as Docker images, including the builders and deployment tools in images/builder/docker/* and images/deploy/*. To build them locally run $ hack/build-images.sh To hack on the web console, check out the assets/README.md file for instructions on testing the console and building your changes. Security Response If you've found a security issue that you'd like to disclose confidentially please contact Red Hat's Product Security team. Details at https://access.redhat.com/security/team/contact OpenShift is licensed under the Apache License, Version 2.0.
global_01_local_1_shard_00001926_processed.jsonl/2768
Valerie Douglas Happily married, she’s companion to two dogs, four cats and an African clawed frog named Hopper who delights in tormenting the cats from his tank. You can find more information at her site, Valerie Douglas Author. You can read Valerie’s articles here. and view Valerie’s books here. You can follow Valerie on her networks: Twitter ~Facebook ~Goodreads ~Pinterest ~ Website ~ Amazon
global_01_local_1_shard_00001926_processed.jsonl/2783
Build React Apps | Introduction And Getting Started 01 List Of Content Getting Started React is a Framework for Rendering User Interfaces in an efficient way since it is performance friendly and very easy to use, also it allows you to manipulate the different UI data and states, Created and Maintained by Facebook and Used by Big Companies and Teams for the rendering process, also you can use it natively for rendering UI for Mobile Apps (Android & IOS). So in this Course Series, we gonna go from the basic stuff into more advanced and complicated UI State management and Using Other CSS/React Frameworks that will speed the development process for us, so in this tutorial we are going to set up the Working Environment also use React with Webpack for dependency management and Babel for JSX Syntax Compiling. Installing Modules on Node.js Project First, we need to install React and React Dom  npm install react react-dom --save Also for Compiling and Bundling our Assets plus the JSX Syntax Recognition we are going to need Webpack, Laravel-Mix (For Easier Webpack Dependency Management) and Babel (Full Pack) npm install webpack laravel-mix babel babel-loader babel-env cross-env The cross-env module is for Cross OS Bash Code Execution, So now we have the Required modules and frameworks, let set up the webpack/laravel-mix bundling process. For Compiling JSX and React Code may be a bit tricky in most cases, but using laravel-mix plus a little bit more configuration we can do that pretty normally, so create a new file on the project root directory and name it webpack.mix.js where we are going to put our Custom Config  let mix = require("laravel-mix"); //We Tell it to Compile our app.js file and put it on the /dist folder mix.js("./app.js", "dist/"); //This Solves the emitting Stuck at 95% let path = require("path"); let webpack = require("webpack"); //We are telling it to use Babel Loader for Compiling our JSX Code (React and HTML) (module.exports = { target: "node", watch: true, externals: ['ws'], module: { loaders: [{ test: /.jsx?$/, loader: "babel-loader", exclude: /node_modules/, query: { presets: ["es2015", "react"], plugins: ["transform-class-properties"] }, ] The Config actually is very simple, we are just telling webpack through laravel-mix to compile our /app.js and put it under the /dist folder using the Babel loader for JSX and ES6 Syntax Bundling without errors. our app.js file contains all the necessary files (the entry point script) so we are going to require the src/renderer.js on it so when using it on our webpage (dist/index.html) let renderer = require("./src/renderer"); Rendering a Simple React Text Our Project Structure Should look something like //Project Structure Now for Bundling our Scripts, we need to run the watch command which gonna keep track of our files if there are any changes it will automatically recompile the app.js file for us, so under the scripts object on package.json add  "scripts": { "test": "echo 'no script'", "watch": "cross-env NODE_ENV=development node_modules/webpack/bin/webpack.js --watch --progress --hide-modules --config=node_modules/laravel-mix/setup/webpack.config.js" Now you can run the watch command in order to compile your app.js (jsx code) using webpack  npm run watch You should notice that a new file under /dist folder named app.js has been created for you and this is the file you need to include (Import) in your HTML Web page for making the rendering process works, just create a simple HTML File and make sure to link to the script (app.js) at the end of the body unless it won't recognize your DOM Element and Also we need an HTML Element (Container) that is going to hold our react elements, so let's create a DIV Element giving it an ID of Root so we can refrence it later on from our JS Code to render all of our elements under it ... ... For Now, let's try to just render a simple text using react into our DOM, so React is actually based under a Component's Entity System which means you need to feed it in a component then react is going to take care of the reset steps of the rendering and updating process we will talk more deeply about component and how they work in the next video tutorials in the series, but for now just for showcasing we are going to render a simple text //We Import React and ReactDOM import React from "react"; import ReactDOM from "react-dom"; //Refrence the Root Container let root = document.getElementById("root"); Also, we need to create the component and add an event listener for DOMContentLoaded so we can render our elements, if we would not place our rendering method under the Dom loaded Callback we will get a very weird error //Using render method we give it our component document.addEventListener("DOMContentLoaded", () => { //Dom Content is Created and Ready ReactDOM.render(, root); //Our Component's more on that in the next videos class Test extends React.Component { constructor(props) { render() { return ( Hello World! ); } } You can open the index.html and you should see a Hello World! Test gets printed out on the webpage from React, Cool! What's Next That was the setup process also explanation of the basic things are going on behind the scenes, so in the next video tutorials on the series we will dive deeply on react and explain different aspects, Stay Tunned! Share Tutorial Made With By Ipenywis Founder, Game/Web Developer, Love Play Games
global_01_local_1_shard_00001926_processed.jsonl/2784
AS201200 SuperHosting.BG Ltd. - NETERRA-NETINFO-NET Netinfo net BG AS201200 SuperHosting.BG Ltd. Whois Details inetnum: - netname: NETERRA-NETINFO-NET descr: Netinfo net BG country: BG admin-c: DUMY-RIPE tech-c: DUMY-RIPE status: ASSIGNED PA mnt-by: MNT-NETERRA mnt-routes: AS13147-MNT mnt-domains: AS13147-MNT created: 2005-11-30T16:13:11Z last-modified: 2018-11-14T09:26:58Z source: RIPE mnt-domains: SUPERHOSTING-MNT mnt-routes: SUPERHOSTING-MNT abuse-c: SHRO-RIPE remarks: * THIS OBJECT IS MODIFIED remarks: * data has been removed from this object. remarks: * http://www.ripe.net/whois Hosted Domain Names There are 1,620 domain names hosted across 52 IP addresses on this ASN. IP Address Domain Domains on this IP goglobal-travel.com 325 bnp.bg 298 ngobg.info 294 alpisbg.com 282 rakiyata.com 254 anarhia.eu 62 spyderops.com 11 cervicalcancer-bg.com 11 stanyonov.com 10 draska.com 8 taraextreme.com 7 xn--80aacke0bbqdbd8byb6k.com 6 titov.info 4 valuerepublic.net 4 podelenie.com 2 penkov-markov.com 2 stroitelnie-materiali.com 2 chiccoshop.bg 2 easytask.eu 2 zuzutel.com 2 IP Addresses in this range Try our JSON API from the command line Free for small projects. Pay as you grow. Plans & Pricing A million uses. Easy to implement.
global_01_local_1_shard_00001926_processed.jsonl/2795
Porcelain (Part 39) For a moment he paused, wondering if he should go back inside and ask Lydia if she knew the whereabouts of the boy.  That, however, seemed unlikely to elicit anything more than a furious reaction as to why he though he could inquire about the location of her son.  Instead, Wyatt started to wander down the path that had been partially beaten-down into the bramble and wildflowers behind the main house.  It meandered a bit, around a copse of young elm trees, skirting the edge of a shallow gully and splitting in two around a large rock that poked out of the ground near a thicket of blackberry bushes.  Just as he stepped around the north side of that rock, Wyatt spotted Claudia and Ambrose, both of them kneeling down next to what looked like a grave marker.  There did not seem to be any immediate danger to the girl, so Wyatt paused, slowly sinking down so that the wildflowers screened him from their view, curious as to just what they might be doing.  After the confrontation in the hotel room with the young boy and the stick, Wyatt had carried an uneasiness with him about any unsupervised time that Ambrose and Claudia might spend together.  The boy’s previous tormenting of the girl had been cruel, but not something which caused Wyatt to have concern for her safety.  The hotel incident had been different, seeming to carry with it a hint of real danger and evil intent.  Claudia had not been effected by that incident at all of course, and although she remained wary of Ambrose from their prior interactions, had tried to engage him in play activities a few times since they arrived at the estate.  Today the scene appeared to be innocent enough, Claudia playing with something Wyatt could not see on the ground while Ambrose looked on.  Claudia laughed a few times as he watched, and when he rose up to walk over and talk to them, Wyatt did so with a feeling of relative ease about the situation. That changed abruptly as he got close enough to see the ground around the two children.  Ambrose was simply kneeling there, clean and with an amused look on his face, at least up until the moment he turned and saw Wyatt walking toward them.  At that point his face had blanched for just a second, to be replaced quickly by a smirking grin.  Claudia, however, was very dirty, her dress spotted by dirt, mud and grime covering her arm up past her elbow.  Strewn around among the two children were the various bones of what appeared to be a dog.  After a sharp command to stop what they were doing, Wyatt quickly looked around the area where the children were sitting.  It was clearly some kind of a graveyard, likely one that had been used by the families occupying the estate in the past.  The graves were haphazardly arranged around a slightly depressed area of the land that was dominated by two large trees, an oak and an elm.  At first glance Wyatt counted fifteen mounds, a few of them marked with makeshift crosses and one with a small, etched stone marker.  Three of the graves appeared very small, either children or pets, and he briefly offered up thanks that it was the latter of these which Claudia had dug up.  The girl, who had been oblivious to his approach until his command to stop, now stared at him with the wounded look of a child interrupted at play. “Get over her Claudia, now,” Wyatt commanded while reaching his hand out for her.  She remained kneeling though, reaching back down toward another bone that was sticking out of the earth.  This animal had not been buried very deeply, and Wyatt figured that one of it’s bones may well have been sticking out of the earth when the children arrived.  Perhaps that had been what prompted her to start digging.  That, or the influence of Ambrose, who still had the smirk on his face.  He returned his attention to Claudia, grabbing her arm and hauling her up. “I said to stop it girl.  Now, get over there by that tree.”  He pointed and she went, starting to cry now as she realized she had angered him.  After Claudia had taken several steps, Wyatt turned and looked at Ambrose. “You get back to the house boy.  Or somewhere else, not here.  You shouldn’t be this far away from your mother.  And stay away from Claudia from now on.  I mean it.  I’ll be watching, so stay away.” The boy stood there for a moment, a look of contemplation on his face, and then he took off running back in the direction of the house. After spending a few minutes trying to talk to Claudia , all of it seemingly useless as she continued to cry over his words, he took her hand and they walked back to the cabin together. That night, Lydia started right in as they began to eat. “Isaac, you may want to know that your father’s young charge is apparently a grave robber.” Isaac stopped with his food halfway to his mouth, a dubious look on his face.  “What makes you say that?” “Well, she spent the day digging up bodies in some old cemetery on  this property.  Playing with the bones and everything.” “You cannot be serious.  Father?” Wyatt had remained silent as she spoke, wondering just how outlandish the tale was going to get.  Claudia had stopped eating, realizing that she was being talked about.  He patted her hand and encouraged her to go back to her meal before he responded. “Hardly the truth.  Perhaps madam,  you should ask an adult who was actually there instead of listening to the garbled tales of a three year old boy.” “He knows what he saw.” “He certainly does, and I wouldn’t put him as the angel in this story.  He’s the one who wanted the grave dug up.  Just because he managed to get Claudia to do the digging doesn’t mean he is free from blame.” “He did no such thing.  He never should have been running around with that vile little girl!” Claudia had stopped eating again and Wyatt had heard enough. “We will be taking our meal with us tonight.  As for the truth Isaac, just so you know, there was a grave dug up, just one, and it was a dog.  Both of these children were there, and I am quite certain both were involved.  I will deal with the girl.  You should tend to the issues with your boy.”  With that, Wyatt grabbed his and Claudia’s plates, piling up a few extra rolls on his, and then helping her down from the small chair she sat in.  As he did so Isaac stood up. “You will not be leaving with our plates father.  Eat here or leave them.” “I think not son.  We will not sit here while Claudia is attacked like she is invisible, and for something in which your son shares the blame.” “My house father, my rules.  Stay or leave the food.” “Not your house, boy.”  Wyatt stopped and looked directly back at Issac.  “And we are leaving,” he finished tersely. Isaac’s face had turned bright red but he said nothing, and as they left Wyatt heard Lydia scoff. “Whatever was that old fool talking about?” …to be continued Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/2798
Marvin the Martian, Revisited Obviously, I realize that Marvin the Martian already made an appearance here during Space Week. The thing is, though, he’s always been my second favorite Looney Tunes character. Not only was he from space — a fact that captivated me both as a kid and apparently an adult sock wearer — he really did seem like the only one of Bugs’ adversaries who was legitimately competent. How could you not appreciate that? It would not be Cartoon Week, then, if I didn’t find a way to include him. Luckily, I had a second pair of Marvin socks at the ready because the Puddinette knows me on some crazy sub-cellular level. Or, well, just maybe, she texts me to ask before buying any possible duplicates. However it happened, two Marvins is a good thing. Although maybe not for Earth. Oh, and as for who was/is my number one favorite Looney ‘toon? I’m positively spinning to tell you. Odds are good we’ll all find out tomorrow. 2 comments on “Marvin the Martian, Revisited 1. Marvin is the only cartoon I can initiate. Love the socks! 2. It has to be Taz!!!! Comments are closed. %d bloggers like this:
global_01_local_1_shard_00001926_processed.jsonl/2829
Kirbycolors This article is about the group of warriors debuting in Kirby's Adventure. For the leader, see Meta Knight. Reason: Make "Meta-Knights" and "Meta Knight Corps" separate pages, similarly to Star Warrior and Galaxy Soldier The Meta-Knights are a group of warriors led by Meta Knight and are featured in several games in the Kirby series. For the most part, the Meta-Knights are incredibly loyal to their master and would do anything to protect him. While the NTSC and PAL versions of the game loosely refer to the entire group of knights as the Meta-Knights, in Japan, there is a slight difference in what exactly "Meta-Knights" refers to. The term メタナイツ (Metanaitsu), meaning "Meta-Knights" refers to Axe Knight, Javelin Knight, Trident Knight, and Mace Knight - the four main combat-oriented members of the group who fought Kirby as early as in Kirby's Adventure. The larger organization itself, which only features in Revenge of Meta Knight is called (Metanaito gundan), meaning "Meta Knight's Corps" from Meta Knight's trophy description in Super Smash Bros. Melee and Super Smash Bros. Brawl. This broader categorization includes personnel on the Halberd from Meta Knight at the top, Captain Vul, Sailor Waddle Dee, Axe Knight, and Mace Knight, right down to regular enemies defending the ship, and Wheelies powering it in the Reactor. Known Members The known members of this band of warriors are: Kirby's Adventure and Kirby: Nightmare in Dream Land The original Meta-Knights (Axe Knight, Javelin Knight, Mace Knight, and Trident Knight) first appeared as Room Guarding Mid-Bosses in Kirby's Adventure alongside their chivalrous master. Each of the knights are masters of their own specific weapon. Not much information was given about them except for their likenesses and alliance with Meta Knight, and they were given minimal to no characterization. Kirby encounters them for their first time in the second level, Ice Cream Island, and then fights them once per level up until the last level (Rainbow Resort). In the remake, the normal boss music does not play, instead, a remix of the mid-boss theme from Kirby 64: The Crystal Shards is played. The Meta-Knights are fought in: Kirby Super Star and Kirby Super Star Ultra The Meta-Knights in Kirby Super Star In Kirby Super Star, the Meta-Knights, more specfically Axe Knight, Trident Knight, and Mace Knight, were seen hiding out in Marshmellow Castle during the events of Dyna Blade and fought Kirby. All of them later re-accompanied their master on a full-on assault of Dream Land with their powerful warship—the Halberd. But their plan ended early when the ship was taken down and crashed down below into Orange Ocean, thanks to Kirby. The group or warriors seemingly disbanded after the destruction of the Halberd, as they haven't appeared since then, nor did they appear when the Halberd flew again during the events of Kirby: Squeak Squad. The Meta-Knights seem to be unable to survive in water; in Milky Way Wishes in Super Star and its remake, in the area where the Copy Essence Deluxe for Sword is found on Aquarius, the Meta-Knights are seen guarding the door to the area, and when Kirby attacks them, the knockback usually gets them in the water, and they explode inside it. This was also hinted when the Halberd was crash-landing in the Secret Sea -- the Meta-Knights survived the explosions of the Halberd, but had to escape due to the fact that they were crash landing in water. In the ending credits for Meta Knightmare Ultra only Captain Vul, Sailor Waddle Dee, and Axe Knight makes a brief cameo in a snapshot with Meta Knight, in the interior of the Halberd. Kirby Mass Attack They finally appear in an original game as part of the Kirby Quest and Strato Patrol EOS sub-games. The four knights will attack Kirby before he can advance inside the Halberd to defeat Meta Knight. The order is Javelin Knight, Mace Knight, Trident Knight, and Axe Knight. Their attacks are also more effective, powerful and can cover long distances. Kirby: Planet Robobot Although not seen on-screen, The Meta-Knights worked hard to rebuild the Halberd after it crash-landed beneath the Access Ark and after Meta Knight was abducted by the Haltmann Works Company.[1] In Meta Knightmare Returns, Meta Knight can call upon the original four Meta-Knights from Kirby's Adventure to perform his strongest special attack, Meta Knightmares, in which they slash through any and all enemies on screen with their respective weapon. They also appear celebrating in the sub-game's ending. Weapons (Artillery) Flails are only used by Mace Knights. Like the Yo-Yo ability, it also swings like a handed boomerang. Axes are used by Axe Knights. They are of the twin-bladed variant, and can be thrown further than the maces can be swung. Javelins are used by Javelin Knights, even though they are not normally knight weapons. They fly similarly to Cupid's arrows. Tridents, also not a weapon normally used by knights, are used by Trident Knights. They are either thrown at or jetted into their enemy (a feature only seen in Kirby Super Star and its remake). In Kirby's Adventure, tridents inflict electrical damage upon contact, but in their other appearances, they are non-elemental. The Halberd In the Super Smash Bros. series The Meta-Knights Axe Knight, Mace Knight, Trident Knight, and Javelin Knight appear as a single primary ace-class neutral spirit in Super Smash Bros. Ultimate which can be obtained by fighting a stamina battle against a team of Meta Knights wielding Killing Edges where more Meta Knights will appear during battle. When their spirit is equipped, it increases the amount of sword damage the equipped fighter will deal. 1. Miiverse
global_01_local_1_shard_00001926_processed.jsonl/2844
Previous Lecture Complete and continue     Would you Recommend the Course? Thanks once again for taking part in this version of How to Think Like a Roman Emperor. Now that you've reached the end of the course, we'd be very grateful if you'd consider providing a brief testimonial recommending the course to prospective students. This is entirely optional, of course – it's up to you. However, your recommendations and feedback are tremendously valuable because they help other people to know if the course is for them. We'll potentially use any feedback from this page on the front page to tell others what you thought of the course. NB: It's not essential but helps us to make better use of your testimonial if you've used your real name and a chosen an image for your profile.
global_01_local_1_shard_00001926_processed.jsonl/2848
Lenddo Score API Docs Explore the API with ease. This document will be continually updated as each API endpoint develops. Lenddo’s APIs follow the Representational state transfer (REST) standard allowing resources created, modified and pulled with a standard set of GET, POST, PUT, DELETE HTTP requests. Communication with lenddo follows the REST architecture constraints including being stateless & cacheable. All requests are performed over SSL. All responses are returned as JSON objects. Global Error Codes End Points
global_01_local_1_shard_00001926_processed.jsonl/2857
From Linguifex Jump to: navigation, search My to do list for Jukpë can be found here. If you have any suggestions for additions, clean ups or clarifications then don't hesitate to add them! If you have any other questions about this article leave a message on the talk page or send me message! Head direction Initial Mixed Final Primary word order 8 noun classes Verbs conjugate according to... Voice Mood Person Number Tense Aspect General information The ethnic flag of the Jukpë people. The Jukpë language (English: [d͡ʒuːkpə], Jukpë: ghijúkpë [ɣìd͡ʒúk͡pə̥]) is the traditional language of the Jukpë people. It is spoken natively by around seventy thousand people in the north of Cameroon, eastern Nigeria, southern Chad and western Central African Republic. It is also used by Jukpë people and their descendants living abroad, most notably in Britain, France and South Africa. Jukpë is an agglutinative language, it has a simple syllable structure and lacks diphthongs. There are thirty-two consonants and six vowels; with all vowels, except "ë", having two tones, high (◌́) and low (unmarked). Word order is mainly SVO but occasionally SOV and imperatives are normally placed at the beginning of sentences. Adpositions are prepositional and head direction is usually noun initial; that is that adjectives, numerals, demonstratives and genitives proceed the noun. Although Jukpë lacks grammatical gender there are eight noun classes that do in fact act similarly to grammatical genders. There are also two numbers and conjugations occur according to voice, mood, number, tense and aspect using various affixes. Phonology and orthography See also: IPA for Jukpë Jukpë has thirty-two consonants. Bilabial Labio-dental Alveolar Post-alveolar Palatal Velar Labio-velar Pharyngeal Nasal m̥ m n̥ n ɲ̊ ɲ ŋ̊ ŋ ŋ͡m Plosive p b t d c ɟ k g k͡p ɡ͡b Fricative f v s z x ɣ ħ ʕ̝ Affricate t͡ʃ d͡ʒ Approximant j Trill ʙ Flap or tap ɾ The table below shows how consonants correspond to the letters of the alphabet. Grapheme IPA Description M m [m] bilabial nasal MH mh [m̥] voiceless bilabial nasal N n [n] alveolar nasal NH nh [n̥] voiceless alveolar nasal NM nm [ŋ͡m] labio-velar nasal NY ny [ɲ] palatal nasal NYH nyh [ɲ̊] voiceless palatal nasal NG ng [ŋ] velar nasal NGH ngh [ŋ̊] voiceless velar nasal P p [p] voiceless bilabial plosive B b [b] voiced bilabial plosive T t [t] voiceless alveolar plosive D d [d] voiced alveolar plosive TH th [c] voiceless palatal plosive DH dh [ɟ] voiced palatal plosive K k [k] voiceless velar plosive G g [g] voiced velar plosive KP kp [k͡p] voiceless labial-velar plosive GB gb [ɡ͡b] voiced labial-velar plosive F f [f] voiceless labiodental fricative V v [v] voiced labiodental fricative S s [s] voiceless alveolar fricative Z z [z] voiced alveolar fricative KH kh [x] voiceless velar fricative GH gh [ɣ] voiced velar fricative H h [ħ] voiceless pharyngeal fricative Q q [ʕ̝] voiced pharyngeal fricative CH ch [t͡ʃ] voiceless palato-alveolar affricate J j [d͡ʒ] voiced palato-alveolar affricate Y y [j] palatal approximant BR br [ʙ] bilabial trill R r [ɾ] alveolar tap For simplicity's sake [ʕ̝] will henceforth be represented as [ʕ]. There are six vowel phonemes in Jukpë and two tones; high (◌́) and low (unmarked). Front Central Back Close i u Mid ə̥ Open a The table below shows how the vowel phonemes correspond to letters. Grapheme IPA Description I i [i] close front unrounded vowel U u [u] close back rounded vowel O o [o̞] mid back rounded central vowel Ë ë [ə̥] voiceless mid central vowel E e [e̞] mid front unrounded vowel A a [a] open front unrounded vowel All vowels except [ə̥] change according to tone and vowels are never reduced, regardless of stress. Hereafter, [e̞] and [o̞] will be represented by the simplified [e] and [o] respectively. • a b br ch d dh e ë f g gb gh h i j k kh kp m mh n ng ngh nh nm ny nyh o p q r s t th u v y z N.B.: All digraphs and trigraphs are considered to be separate letters, whereas vowels with tonal marks are not. Jukpë words can only have the following forms: • V(F) • CV(F) • VCV(F) • CV...(F) • VCV...(F) Where "V" is any vowel, "C" is any consonant and "F" is any consonant except "q", "h", "y" or "br". One of the only exceptions to these forms is the prevocalic form of "and" - "nh" (the preconsonantal form of which is "nha"). The two main phonotactic restrictions are: • Two vowels may not appear adjacent to one another within the same word. • If two adjacent words end and start with the same consonant then that consonant becomes geminate. Despite these rules they may be broken by loan words, e.g. "Mákrisít" /mákɾìsít/ ("Christ"). Jukpë articles are used extremely sparingly, usually only for emphasis and in formal contexts. The definite article "ó" corresponds to the English "the" and the indefinite article "ë" corresponds to "a(n)" and "some". Articles are invariable. Though Jukpë does not have grammatical genders per se, however there are eight noun classes which act similarly and are divided semantically, i.e. according to what kind of object the word is. Class Prefix (sg) Prefix (pl) Example (sg) Example (pl) Translation 1. People m(á)- n(á)- to to person (people) 2. Animals v(á)- z(á)- bís bís fish 3. Plants nm(u)- b(i)- nmu bi tree(s) 4. Food h(ó)- ch(ú)- pót chúpót soup(s) 5. Body parts gb(i)- kp(é)- gbi kpé eye(s) 6. Groups j(í)- t(í)- dháta dháta pride(s) of lions 7. Artefacts gh(i)- k(é)- ghizek zek knife (knives) 8. Other up(u)- ny(á)- upuna nyána field(s) The dictionary form of a noun divides the prefix from the rest of the word with a hyphen. For example the word for "lion" would appear in a dictionary as "vá-dháta" but elsewhere it would simply be written "vádháta". Dictionaries also sort by the first letter of the root word, not by the first letter of the prefix, so that "hó-bís" ("fish" [meat]) would appear above "vá-bís" ("fish" [animal]). The lexical changes caused by the class prefixes can also be shown by using the root word "to": 1. "máto": person, man, human 2. "váto": barbarian, demon, infidel 3. "*nmuto": n/a 4. "hóto": victim 5. "gbito": penis (slang) 6. "jíto": a crowd or group of people, a people or nation, humanity, mankind 7. "ghito": a slave, a serf, a servant, an employee 8. "*uputo": n/a Adjectives agree with the noun they describe regarding noun class prefix. For example the base adjective "edhék" ("red"), is shown below: Class Singular Plural 1. People medhék nedhék 2. Animals vedhék zedhék 3. Plants nmedhék bedhék 4. Food hedhék chedhék 5. Body parts gbedhék kpedhék 6. Groups jedhék tedhék 7. Artefacts ghedhék kedhék 8. Other upuedhék nyedhék N.B.: The dictionary form an adjective is prefixless. Comparative constructions using "more" are made by adding the suffix "-" to the adjective. For example, "The dog is older [more old] than the bird" is translated as "Vájá vátéjo vábrúnokú vághur". Constructions using "less" attach the suffix "-do" to the adjective. For example, "The bird is younger [less old] than the bird" is translated as "Vághur vátéjo vábrúnodo vájá". Constructions conveying equality, i.e. "as... as", place "" before the adjective and "mi" after it. For example, "The dog is as young as the bird" is translated as "Vájá vátéjo mí vámáronh mi vághur". To construct a superlative using "most" the suffix "-kúku" is attached the adjective. For example, "The oldest [most old] dog" is translated as "Vájá vábrúnokúku". In the same way, superlative constructions using "least" attach the suffix "-doku" to the adjective. For example, "The youngest [least old] bird" is translated as "Vághur vábrúnodoku". • dog: v-ájá • bird: vá-ghur • to be: ge-té • to learn: ke-pár • old: brúno • young: máronh Possessive adjectives modify a noun by attributing possession or belonging to someone or something. This corresponds to the English "his" or "your". Just as normal adjectives do possessive adjectives agree with the prefix of noun they describe. Person Singular Plural 1st ánhu ámhu 2nd ónhe ómhe 3rd (m/n) éjo éyo 3rd (f) úja úya Jukpë infinitive verbs begin with an infinitive prefix. There are six possible prefixes: "g(e)"-, "k(e)"-, "gh(ó)"-, "kh(ó)"-, "q(u)"- and "h(ú)"-. For example "kepár" means "to learn". This verbal affix system means that unusually Jukpë has no irregular verbs at all. Note that as with nouns verbs have a dictionary form, e.g. "kepár" is written as "ke-pár" in a dictionary. Conjugations occur by replacing the infinitive prefix with another that agrees with the subject in class and number. Suffixes are added according to person. Infixes are added to further conjugate verbs according to voice, mood, tense and aspect. These infixes are added in the order tense, aspect, mood and then voice. Person Singular Plural 1st -(u)n -(u)m 2nd -(e)k -(e)v 3rd (m/n) -(ó)jo -(ó)yo 3rd (f) -(á)ja -(á)ya 1. Present: unmarked 2. Past: -(í)r(í)- 3. Future: -(á)z(á)- 1. Imperfective: unmarked 2. Perfective: -(e)m(e)- 3. Habitual: -(a)r(a)- 1. Indicative: unmarked 2. Conditional: -(a)b(u)- 3. Interrogative: -(u)du(m)- 4. Subjunctive: -(ë)t(ë)- 5. Imperative: -(a)kh(a)- 1. Active: unmarked 2. Passive: -(d)ú(n)- 3. Causative: -(e)ny(e)- 4. Reflexive: -(s)á(m)- 5. Reciprocal: -(r)ú(g)- • The present tense refers to an occurrence which is happening now or to an object that currently exists. • "Mápárójo": "He is learning" • The past tense refers to something that has happened or to an object that no longer exists. • "Márípárójo": "He was learning" • The future tense refers to an event that will happen or to something that will exist. • "Mázápárójo": "He will learn" • The imperfective denotes an action or condition that does not have a fixed temporal boundary, but is unfinished, continuous or in progress. • "Mápárójo": "He is learning" • "Márípárójo": "He was learning" • The perfective denotes a completed event. • "Márímepárójo": "He learnt" • The habitual is similar to the imperfective, it denotes an action or condition that does not have a fixed temporal boundary, but is habitual or repetitive. • "Márapárójo": "He learns" • "Márírapárójo": "He was learning" • The indicative mood is used in ordinary factual or objective statements. • "Mápárójo": "He is learning" • The conditional mood is used to signify that something is dependant upon the out-come of something else. • "Mákipárójo": "He would learn" • The interrogative mood is used for asking questions. • "Mádupárójo?": "Does he learn?" • The subjunctive mood is used to express an action or state that is hypothetical or anticipated rather than actual, including wishes and commands. • "It is necessary that mátëpárójo": "It is necessary that he learn" • The imperative mood is used to express orders and does not take a class prefix. • "Khapárójo": "Learn!" • The active voice is used to show that the subject of a verb carries out an action. • "Mápárójo": "He is learning" • The passive voice is used to show that the subject of a transitive verb receives an action. • "Mádúnyepárójo": "He is being taught" • The causative voice is used to show that a subject causes someone or something else to do or become something or causes a change in state. • "Mányepárójo": "He is teaching" • The reflexive voice is used to show that the subject of a verb carries out an action on itself. • "Mányesápárójo": "He is teaching himself" • The reciprocal voice is used to show that the subject(s) of a verb perform an action on each other. • "Mányerúpáróyo": "They are teaching each other" Verbs are negated by the use of the negative prefix "ngh(i)"- which is affixed to the very front of the verb. For example, "nghinápárev" means "you [pl] aren't learning" and "nghimányesápárójo" means "he isn't teaching himself". The copula in Jukpë makes use of a regular verb ("ge-té") and also of the "conjugation" of pronouns (and sometimes nouns and rarely adjectives). Compare the sentences below: • Vádháta vátéjo vákpá. • The lion is large. • Vánhojo vádháta vákpá. • He is the large lion. • Vádháta vákpárójo. • The lion "larges". • Márasarán títi mánhun. • I think therefore I am. • big, large: kpá • lion: vá-dháta • therefore, so, as a result: títi • to think: hú-sará Verb serialisation In Jukpë, rather than sequences of verbs using subordination, as in English, verbs sequences undergo serialisation. Verb serialisation usually means that two conjugated verbs are put together in a sequence in which no verb is subordinated to an other, however this is not exactly the case in Jukpë. Instead of the subordinated verb being in the infinitive it is conjugated yet rather than adding a class prefix and pronoun suffix, the infinitive prefix is kept. If the verb is instead fully conjugated then a different meaning is conveyed. Examples are given below with no object, a direct object and an indirect object. The first example given corresponds to "... in order to..." in English and the second corresponds to "... and...". No object: • Jukpë: Márísájo húrítam. • IPA: [máɾísád͡ʒò ħúɾítàm] • Gloss: He went played [inf]. • English: He went to play. • Jukpë: Márísájo márítamójo. • IPA: [máɾísád͡ʒò máɾítàmód͡ʒò] • Gloss: He went he played. • English: He went and played. Direct object: • Jukpë: Máríjájo ghité khóríqé. • IPA: [máɾíd͡ʒád͡ʒò ɣìté xóɾíʕé] • Gloss: He came book took [inf]. • English: He came to take the book. • Jukpë: Máríjájo ghité máríqéjo. • IPA: [máɾíd͡ʒád͡ʒò ɣìté máɾíʕéd͡ʒò] • Gloss: He came book he took. • English: He came and took the book. Indirect object: • Jukpë: Máríjájo nyhë upudúk qurísá. • IPA: [máɾíd͡ʒád͡ʒò ɲ̊ə̥ ùpùdúk ʕùɾísá] • Gloss: He came to shop went [inf]. • English: He came to go to the shop. • Jukpë: Máríjájo nyhë upudúk márísájo. • IPA: [máɾíd͡ʒád͡ʒò ɲ̊ə̥ ùpùdúk máɾísád͡ʒò] • Gloss: He came to shop he went. • English: He came and went to the shop. Direct and indirect object: • Jukpë: Nyhë upudúk máríjájo ghité khóríqé. • IPA: [ɲ̊ə̥ ùpùdúk máɾíd͡ʒád͡ʒò ɣìté xóɾíʕé] • Gloss: To shop he came book brought [inf]. • English: He came to the shop to bring the book. • Jukpë: Nyhë upudúk máríjájo ghité máríqéjo. • IPA: [ɲ̊ə̥ ùpùdúk máɾíd͡ʒád͡ʒò ɣìté máɾíʕéd͡ʒò] • Gloss: To shop he came book he brought. • English: He came to the shop and brought the book. • to go: qu-sá • to play: hú-tam • to come: ge-já • book: ghi-té • to take, to bring: khó-qé • to: nyhë • shop: upu-dúk Adverbs are formed very simply. An adverbial affix is simply added to the base adjective, "'kí(k)"-. As an example the base adjective meaning "quick" is "haqá" and the adverb "quickly" in Jukpë is "kíhaqá". Adverbs also take relevant class prefixes. There are however some exceptions to this rule of adverb formation. The prime the adverbial form of "good" (i.e. "well"), as in English, is irregular in Jukpë. In Jukpë "good" is "jékhón" whereas "well" is "kíchëmen". Personal pronouns take the appropriate noun class prefixes except for class 1 nouns (people). Subject (nominative) Due to the pronouns that are effectively built into conjugated verbs, nominative personal pronouns are rarely if ever used. When employed they are mostly used as emphatic pronouns, somewhat analogous to the French "Moi, je...". Person Singular Plural 1st nhu mhu 2nd nhe mhe 3rd (m/n) nho mho 3rd (f) nha mha Direct object (accusative) Accusative personal pronouns are used when the pronoun is the direct object of a transitive verb. For example, "I used to teach them" would translate as "Máríranyepárun nyóyo", (literally "I used to cause them to learn"). Person Singular Plural 1st nyun nyum 2nd nyek nyev 3rd (m/n) nyójo nyóyo 3rd (f) nyája nyáya Possessive (genitive) Genitive pronouns are the equivalent of English's "mine", "yours", "his" et cetera. Person Singular Plural 1st nhuth mhuth 2nd nhedh mhedh 3rd (m/n) joth yoth 3rd (f) jath yath Indirect object (dative) Person Singular Plural 1st unhë umhë 2nd enhë emhë 3rd (m/n) johë yohë 3rd (f) jahë yahë Interrogative pronouns are in a questions and correspond to the five English, the five interrogative pronouns "what", "which", "who", "whom" and "whose". In Jukpë interrogative pronouns are used much like in English: These pronouns do vary according to what they refer to. In the cases of "ke" and "keke" they can take any class prefix except class 1 (people) and "kudh" may take any class. If the class required is unknown (for example in the question "What did that?" the class of the noun referred to is unknown or at least unclear) then a class 8 (other) prefix is used. Since "má-ku" already has a singular prefix attached for class 1 (people), the only prefix variation possible is changing "má-" to "ná-" for pluralisation. N.B.: The prefix attached to "kudh" refers to the noun who posses the object in question and not to the possessed object. In English the main five relative pronouns are "that", "which", "who", "whom" and "whose". Jukpë has three main relative pronouns: Just as with the interrogative pronouns, prefixes can be attached to relative pronouns. "Tet" and "tuthá" obey the same rules as "ke", "keke" and "kudh" whereas "má-tut" obeys the same rules as "má-ku". Despite the fact that Jukpë has relative pronouns it is more common to use constructions without them informally, especially with animate objects, i.e. people and animals: • Jukpë: Mánhojo matu ghifránsa mírarapárunójo. • IPA: [mán̥òd͡ʒò màtù ɣìfɾánsà míɾàɾàpáɾùnód͡ʒò] • Gloss: He person French taught-me • English: He is the man who taught me French. Note the fact that the example sentence does not use the verb "ge-té" ("to be") but rather adds conjugation to the third person pronoun "nho" (see above). In English "this", "that", "these", "those" are demonstrative pronouns. They indicate whether they are replacing singular or plural words and give the location of the object. However, where in English there are only two sorts of demonstrative pronouns (i.e. "this"/"these" and "that"/"those") there are five in Jukpë: • "this-near-to-me-and/or-us" • "that-near-to-you-but-not-to-me" • "that-far-from-me-and/or-us" • "that-far-from-you-but-not-me" • "that-which-cannot-be-seen-or-no-longer-exists" Colour terms There are twelve basic colour terms in Jukpë. These are shown below: Colour terms English Jukpë black/dark gháso white/light mheréme grey chudó purple áraní sky blue táke blue/green (grue) míqoro (light) green gbína yellow ngazá red edhék pink jóyó light brown/light orange henyhá dark brown/dark orange úhadha Colour spectrum The word "gbína" is usually only used to denote the colour of something that is naturally a lighter green and when it is used to describe the colour of, for example, a garment it is akin to something like "I have a beautiful green dress". The word "míqoro" can be used for any item, natural or not, but only covers the colour "gbína" when neutrally referring to unnaturally coloured objects. "Gháso" means black or more broadly dark but can also encompass some darker shades of blue. Likewise, "mheréme" means white or light (i.e. not dark) as well as some very light shades of yellow.
global_01_local_1_shard_00001926_processed.jsonl/2871
African Wild Ass Lineage is the Foundation of all Donkeys August 11, 2010 NGS stock photo of donkeys by Ira S. Lerner I just came across this article at National Geographic. I must admit I have quite a fondness for African donkeys. They just keep keepin’on in the most difficult circumstances. Their bray is other-worldly. It sounds pretty much like the Tusken Raider that tries to kill Luke just before he meets Ben Kenobi in the original Star Wars. Genetic analysis proves that the African wild ass, which may be down to the last few hundred individuals, is the ancestor of modern donkeys. The same study by an international group of researchers suggests that a subspecies, the Nubian wild ass, thought to have vanished, might have survived after all. It turns out that the Wild Ass of East Africa is the living ancestor of all modern donkey lineages. These asses were domesticated by pastoral nomads around about 5,000 years ago. That’s potentially in the same ballpark as the domestication of the Azawakh dogs by those same nomads. Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_1_shard_00001926_processed.jsonl/2877
City Slang: All American Boy revisited Congrats to my MT colleagues past and present Curt Guyette, Brian Smith, ML Liebler, John Carlisle, Jack Lessenberry, Justin Rose and W. Kim Heron for such a strong showing at the SPJ Awards last night. I was proud to help represent our newspaper and, just for the hell of it, here’s the piece that won for me, on Ty Stone. Thanks to the Society of Professional Journalists, everyone at the Metro Times, Brian Smith for editing, Ty Stone for having an amazing story, and my wife, son and family.
global_01_local_1_shard_00001926_processed.jsonl/2879
The world is less scary the more we can recognize ourselves in it, and, in Caramel, writer-director Nadine Labaki invites us to gaze into the mirror and savor our pretty reflections. The title refers to the super-sticky concoction of sugar and lemon juice used to thin bushy brows and other areas of interest, employed by the staff of a smallish beauty salon in an unglamorous corner of Beirut. It's a nexus of activity, gossip and sisterly bonding. The setting is exotic but the characters are familiar types — the busybody, the ingenue, the tomboy and the doddering old lady — all of whom would be comfortable pulling up a stool in Queen Latifah's Chicago shop. Of course, some of the dilemmas they face are somewhat different, such as the Muslim girl who has to undergo a bizarre surgical procedure to fool her fiance into thinking she's a virgin. What are for these women everyday nuisances, like being harassed by the police for simply sitting in a car with a man at night, might shock Western audiences who take a liberated society for granted. Consider the silent struggle of young shampoo girl Rima, who longs for one of her lovely lady customers, but is so deeply closeted it's never an option. A Hollywood comedy would dress such scenes in girl-on-girl action jokes. Still, Beirut is a pretty cosmopolitan place, and the movie is very good at showing the easy interweaving of cultures, not as some grand statement of unity, but as a basic, inescapable fact of day-to-day reality. Labaki has a real feel for atmosphere, and the attractively shot film unfolds with a naturalism that cuts through the otherwise soapy nature of the material. Upping the realism is that most of the actors aren't professionals, yet they give nuanced, instinctive performances without the slightest hint of forcing it. Seasoned pros would likely ham it up, driving the movie into maudlin chick-flick territory. Nobody here ever jumps up on a table and lip-syncs to an Aretha Franklin tune, and that's a blessing — but there's pathos and lots of hugging, even a bit of a wedding dance at the end. Maybe someday soon seeing such common joys from a Middle Eastern film won't be odd at all. Opens Friday, Feb. 8, at the Maple Art Theatre, 4135 W. Maple Rd., Bloomfield Hills; 248-263-2111. Corey Hall writes about film for Metro Times. Send comments to
global_01_local_1_shard_00001926_processed.jsonl/2885
Direct Mail Advertising Direct Mail Advertising Direct Mail Advertising If you believe in business trends, then you cannot help but realise that direct mail advertising trend is yielding big dividends. How big? Huge. In fact, you most likely receive thousands of direct mail advertisements every month. Direct mail advertising works. The reason it works is that when used properly, direct mail reaches existing customers as well as a targeted list of potential customers. If you have a market in business-to-business sales, you should invest a god part of your marketing budget in B2B direct mail. If you think this concept degrades your products or services, you are mistaken. It certainly has not diminished the value of products used by the world's largest corporations. Instead, direct mail targets businesses that could benefit from your goods. If you operate a small, medium or large business and do not use B2B direct marketing, you are missing the boat. Amazon.com, Apple, HP, GE and many other big businesses use direct marketing. They realise that today's purchasing habits are very different than in the 20th century. While the traveling salesman is not completely a relic, the role of these persons is greatly diminished. The truth is that every year online shopping and purchasing increase in stature. The Internet is the preferred choice for research about services, research about quality and research about pricing. Your mission is to get these potential customers to your brick and mortar operation or to your website. In the 20th century some businesses experimented with direct advertising. This strategy was often used to create brand recognition. Television, radio and printed advertising were the standard marketing strategies. Eventually, marketing departments came to realise that the strategy was costly, ineffective and a offered a poor return on investment (ROI). That is when direct marketing surged to the top page of marketing plans. Today, corporations now retain or train consultants to help maximise returns. Direct marketing is cost effective, utilises demographically charged lists and contains big savings to new customers. This is a form of advertising that will take your company to the next level. There are four types of direct mail strategies. Direct mail, direct e-mail, direct fax and direct telephone marketing are the most used direct marketing tools. In all these applications, the key is to get a compelling offer into the hands of some who needs a product but does not realise that the sender provides the service. For example, if a company wants to increase its share in Australia, advertisers can visit Mailing Lists.com.au and draw from a current data base of more than 1,000,000 registered businesses in Australia. If a more global company wanted to use direct marketing to the USA, that business can design a marketing list that will access more than 20 million registered businesses. Best of all, utilising the site's data base and a series of filters designed by the client, the mailing list can be targeted to the largest or smallest geographical area. In this economy, all businesses now it is time to sink or swim. Here's my recommendation, put aside 20th century marketing and use direct mail marketing to jump onboard the 21st century.
global_01_local_1_shard_00001926_processed.jsonl/2897
thankyou for this quest. i want to know where i am going, but if i know too soon i fear i will disappear. i want only for this body to know you, so please provide structure and integrity to this delicate balance of elements that houses my spirit. please acquaint me with the sky, she stuns me with her grace. when my selfishness grows beyond me, teach me how to know the stars that live in her bosom and realise the extent of my ignorance, and teach me how to speak to the nomadic clouds that drift across her many faces when my friends have left my heart and when even the clouds are gone, teach me how to keep the company of the vast emptiness of the ocean face of the heavens, dear sky blue sky of shades and hues unending. please help me know this breath that runs through my veins and speaks through my words. i feel it every moment, but i do not know from where it comes. i follow it at night, and i follow it in my sleep, but it leaves no traces in its wake. do you hide behind it? tell me what words mean, i hear my friends saying them, and sometimes i do not understand, but i see the flames of love burning in their eyes. sometimes it is yellow, sometimes it is red, and sometimes it is black. but fire is fire, and its nature is one, and we will all come home to you when night falls over man. so tell me what these words mean, what is to be said, and when. reveal to me the nature of this time: sometimes i get lost in it, and i lose all sense of dimension: the weaver of time, is it you? why is its path laden with feathers and thorns? why does it speak of a one-way street but manifest in endless forms? if you are the backbone of this infinite serpent, then does that mean you were never born? was i so too, if we are the same, you and I? thankyou for my blood. i see it only when it leaves me, it is red like no other. my mother wears it too, under her skin, and it makes her shine from within. so do the trees. they make low skies when they grow, and my fevers flow when i watch them dance in the evening sun. teach me not to worry, not to fear; because the day does not belong to me, neither does tomorrow, they are all transitions from the locker of eternity. teach me that all i have is now and the shape of it is filled with space dust formed by a compressed composition, layer by layer, over the ages, slowly revealing in moments, minutes, seconds, years: but it is not the time that matters, it is the density of it, and every moment holds every other in an indestructible balance, held fast by an indestructible force: you. so teach me not to worry, not to fear, that now is the only thing that belongs, and that it is right here: and finally, i thankyou for this voice, because i know that it is all that there is, and without it, i would not speak to you. i would not write, i would not know, i would not feel anymore. but knowing that you are there is why i can, and why i will go on: your winds will take me there, and i know not where. but something tells me that i have been on a constant arrival and the only departure has been these thoughts, these doubts – is my destination here, where i have been from the start? your nearness tell me what is this I feel are you really here, in this darkness or have I just been dropped into a world of ideals? is it the brush of your hair or the swooning mist of an early dawn that has come in disguise? please stay here, right now so that I can know what your eyes look like so that I can remember you and find my way to you before I lose myself – tell me what is this I feel did a splinter of you pierce the horizon of my restlessness and leave a mark of silence in its wake? is it an emptiness that gazes out with longing to remain so as long as you’re gone? when will you come again, when will you touch my time and stay here with me, and take me home? tell me one more thing too – is it it worth the wait? is it worth the years and the minutes and the moments? will you leave a sign in the path that you take? should I tell my friends that I will soon be leaving? and if they ask, ‘where to?’, what should I say? this is untitled leaving with no fuss is like being buried in a warm blanket with no edges or endings wrapped in closed comfort for the rest of time and all that remains forgotten, happy, without complaints but there are these threads: people, places, tangible intangibilities lifelong circuits of fading signals running like currents in a rotting sea waiting for the ocean to open a window and dilute this drink of life so here I will stay and wait for you my eternal to my previous self what is this we are doing who are you being and where are we going were you the person I was before I became what I am now and have I forgotten you? do our times meet or do we remain two separate parallel lines for the rest of what is, and have you grown away from me? do our realities coexist or coincide or superimpose overlay and merge or do they flick and slither in the dust like two dying fishes? or have we always been, two friends in disguise and two dualities of a singularity, attached to the other, like the rain and the wind? what spaces do you leave when silence engulfs the air, leaving it pregnant with sign of death, what are the reasons for your concepts of good and evil? where do we go from here, where do we come from, how do simple questions rally from the complexity of unity and when will I know? when will I know the color of the self, the faces of the eternal, the light in the murk and the worth of my gold? when will I know you, the I that speaks, and the voice that listens? the senses that collude, the marvels that fall beneath the horizon, only to speak in fission and dissapear into nothingness? when will questions run out of fuel, when will time come to rest, and when will I sleep? it’s okay to be a little bit crazy because nowhere is a place and that is where we’re all going. after this brief stop we’ll leave, so my eyes don’t rest for one moment when I’m here. in the darkest of nights I feel plagues arriving, storms filled with painful happinesses and wrenching sadnesses. not knowing who I am is also okay, because I didn’t come here with my permission, and my voice is not heard unless I listen to it really carefully, and the more I try, i realise that it’s just echoes bouncing off caves within my skull. not remembering the person I was might not matter either, because voices letting out glimpses of bright light can only be heard when I’m not being that but being this right here – this person I am now, and I will not be staying, because I will be arriving in just a moment, and that person will be me. I still do not know myself. because I’m gone as soon as I come. there is no time left in between to find out. if I ask I receive silence. if I stay silent I receive questions. maybe I should be silent for a little longer. a little wider. further. so tell my mother that it’ll be okay, tell myself that I’ll be just fine, because I saw myself in the mirror today, just a speck that I was, so maybe it doesn’t matter much. and you can only see a speck when the sun shines at it, through it, in it, floating dust all going nowhere, flying through the corridor, waiting for itself. if it isn’t part of something, it is part of something else, and if it isn’t part of something else, it is part of itself. and that is what I’m made of. I might just be dust and sunlight. Cold floor, warm winds Good times bad times Good times and basketball fields and grass everywhere and football in the sun at midday. And teachers and loud noises, and forgotten lessons. Carelessness and mathematics and fearlessness. And then there is now, which is a complex equation. Such a difference, the rethought and the the thought. Now and before. What a contrast. Black and nothing. Where is the leaf, asked the summer. In the midst of winter, away from the pale blue bucketful of beer and sunshine. Washed over by a question that thrilled every leaf of grass. Where is the sky? And the sky opened up like a drop going down a funnel, and falling down a waterfall. Only this, this happened in one corner of my eye. Seeing and believing, then forgetting. Dead. Alive. Then dead again. And then a burst of stinging fireworks. In every inch of this that is. And some rhythm, and some colour, and a mighty mountain of light, and a tower of cotton bags. The smell of wet earth in the air, a halo of solved problems. Clarity. Just not momentarily. Distant. And present. Ever feel alive? Ever feel like you are everything you need, and the oceans will rise and dance for you? Every fleeting moment, you live a hundred more, and so forth. There, and there, it fades out into a deception. It is all false. All is not real. Such is the nature of the truth and that which is not. Good comes and goes, and then bad comes, and then good, and then whatnot. Look out for signs. To learn where to go. What to be. And when to sleep.
global_01_local_1_shard_00001926_processed.jsonl/2908
Esther 9:5, Question 2. Why does the verse mention different methods of killing? • According to the Midrash, the Jews killed the enemies inside their houses with the sword, but killed those who were outside with other methods. Those who were hiding needed to be brought out to the battlefield. • The Alshich explains that some gentiles openly threatened the Jews, while others harbored hate privately. Each group received a punishment commensurate with their behavior – some were wounded with the sword, some were killed, and yet others were destroyed together with their possessions. • The Maharal points out that hitting the enemies with the sword could potentially kill them, and once they are killed, they may need to be buried. But once they are destroyed, the enemies are gone. • R’ Moshe Katzenellenbogen writes that, in big cities, Jews could only kill bigger, more obvious enemies. In the smaller cities, the Jews stripped the weaker leaders of their power and humiliated them. • The Vilna Gaon explains these three methods were utilized at different stages of the battle. During the first stage, the Jews used swords, then graduated to burning those hiding out of the buildings, and finally arrested the residents. • The Ben Ish Chai points out that the rearranged initial letters (not counting the article letter vuv‘s) of makas cherev vi’hereg vi’avdal (“striking of the sword, and killed, and destroyed”) spell out the word emcheh (“I will destroy”). H-Shem (Shemos 17:14) uses this very word in His promise to eradicate Amalek, the nation responsible for this massacre. He also points out that these three expressions parallel Haman’s plan (Esther 3:13) to kill, destroy, and annihilate the Jews. The Jews merited to overcome this triple fate by fasting for three days (Esther 4:16). • R’ Dovid Feinstein writes that the destruction in this verse refers to the Jews destroyed the property of their enemies. This was done to demonstrate that their intent was not to conquer the wealth of others. Perhaps this was also intentionally contrary to Achasverosh’s order (Esther 4:11) in order to have the excuse that they could not take the possessions, since they were destroyed. Esther 9:2, Question 1. Why does the verse stress that the Yehudim congregated? ב נִקְהֲלוּ הַיְּהוּדִים בְּעָרֵיהֶם בְּכָלמְדִינוֹת הַמֶּלֶךְ אֳחַשְׁוֵרוֹשׁ לִשְׁלֹחַ יָד בִּמְבַקְשֵׁי רָֽעָתָם וְאִישׁ לֹאעָמַד לִפְנֵיהֶם כִּֽינָפַל פַּחְדָּם עַלכָּלהָעַמִּים 2. The Yehudim congregated in their cities in all of the states of King Achashverosh to send their hand against those who sought bad for them. And a man did not stand before them because the fear of them fell on all the nations. • The Rosh writes that the verse stresses that the Jews gathered because they came together to pray and fast. As is mentioned in Halacha (Mishna Berura 686:2), this is the reason for fasting on Taanis Esther before Purim. • There is a power in numbers, and congregating can have powerful affects, so R’ Aryeh Leib Tzonetz and the Sfas Emes note that Haman’s spiritual power was due to the Jews being splintered and separate (Esther 3:8). Therefore, the intent of this verse, Mordechai’s order for the Jews to be gathered before Esther approached Achashverosh (Esther 4:16), and even the mishloach manos gifts (Esther 9:19) after the miracle was to unify the Jewish people. Esther 8:17, Question 1. What do these expressions of happiness signify in this verse? יז וּבְכָלמְדִינָה וּמְדִינָה וּבְכָלעִיר וָעִיר מְקוֹם אֲשֶׁר דְּבַרהַמֶּלֶךְ וְדָתוֹ מַגִּיעַ שִׂמְחָה וְשָׂשׂוֹן לַיְּהוּדִים מִשְׁתֶּה וְיוֹם טוֹב וְרַבִּים מֵֽעַמֵּי הָאָרֶץ מִתְיַהֲדִים כִּינָפַל פַּחַדהַיְּהוּדִים עֲלֵיהֶם 17. And in each every state, and in each and every city – any place where the word of the king and his law was revealed – there was happiness and joy to the Yehudim, a feast and holiday. And many from the nations of the land became Yehudim because the fear of the Yehudim fell upon them. • The Ksav Sofer points out that the repetition of “happiness and joy” in this verse connotes the high degree of happiness present on Purim due to re-acceptance of Torah (Esther 9:27). • R’ Moshe Dovid Valle notes that these four expressions of happiness are intended to stand in marked contrast to the four expressions of sadness (Esther 4:3) – evel (“mourning”), tzom (“fasting”), bechi (“crying”), and misped (“eulogy”) – used earlier when knowledge of Haman’s decree became known. • The Ben Ish Chai points out that, taken together, the first letters of the words magiya simcha v’sasson la’Yehudim (“there was happiness and joy to the Yehudim”) form a rearranged acronym for shalom (“peace”). This is because joy and happiness is only fully realized in peace. Esther 6:12, Question 1. Why does the verse emphasize that Mordechai returned to the king’s gate? יב וַיָּשָׁב מָרְדֳּכַי אֶלשַׁעַר הַמֶּלֶךְ וְהָמָן נִדְחַף אֶלבֵּיתוֹ אָבֵל וַחֲפוּי רֹאשׁ 12. And Mordechai returned to the gate of the king. And Haman was propelled to his house mourning, and with a covered head. • It seems doubly strange for the verse to say Mordechai returned to the palace, when our commentary on the previous verse made clear the Haman found Mordechai in the house of study. According to the Talmud (Megillah 16a) and the Midrash (Esther Rabba 10:6), the verse emphasizes that Mordechai returned to the king’s gate instead of into because Mordechai returned to wearing sackcloth and fasting. • Rashi’s explaining that Mordechai returned to mourning seems to not be his pashut pshat, simple explanation. • The Maharsha clarifies that Mordechai could not enter the king’s gate wearing sackcloth because of their rules of propriety in those days, so he could only come as far as the gate, itself. Therefore, Mordechai, having been mourning in sackcloth for the last several days could not be said to be returning to a place where he could not have previously been. • R’ Avigdor Bonchek explains that being paraded on a horse emboldened Mordechai to defy Achashverosh’s law by going to gate in sackcloth. • The Targum writes that Mordechai returned to serving on the Sanhedrin at this point, a position that is described in TaNaCh (see Bireishis 19:1, Devarim 21:19, Ruth 4:1) as being positioned “at the gate.” • The Midrash (Shemos Rabba 38:4) teaches that the verse says Mordechai returned because he is humble. There is a humility in accepting one’s place, as is said of Avraham whom the Torah (Bireishis 18:33) describes as having “returned to his place” after speaking with H-Shem. • R’ Henoch Leibowitz notes that the Torah (Devarim 30:8) promises us that H-Shem will return us to our Land only after we suffer from our enemies. Rav Leibowitz explains that the lesson is that a person’s prayer in times of rescue should be equal in power and intensity to that with which one prays in times of troubles. The very purpose of our troubles is to increase our attachment to H-Shem. The proper method for this is to follow Rabbeinu Bachya’s advice (on Shemos 2:23) when he says that one’s prayer is the most intense in times of difficulty and that, therefore, it is incumbent on a person to remember that feeling of intensity, and bottle up that feeling of pain in order to pray strongly in the brighter future that the troubles do not return. At our most desperate, we should try to encapsulate the emotion to use in better times. • He quotes R’ Naftoli Tropp, the Rosh Yeshiva of the Chofetz Chaim’s yeshiva in Radin writes that a famous piyut said on Yom Kippur calls us all dalim, poor. Even the rich should recall that all is H-Shem’s and they only have their riches only by the grace of G-d. • The Yosef Lekach writes that Mordechai usually wore sackcloth during davening, and then changed for court. At this point, Mordechai did not change because he felt his prayers were unsuccessful, and not answered. This is because his riding on a horse did not manifestly spell out the redemption of the Jews. The Jews were still threatened. • Rebbetzin Heller points out that, being G-d focused, Mordechai didn’t care if Achashverosh loved or honored him. This event did not change Mordechai’s humility. • The Sfas Emes writes that Mordechai still felt guilty about causing the threat to Jewish existence by refusing to bow down to Haman. True teshuvah comes from the feeling of being unworthy of kindness from H-Shem. He concludes that one should never be too confident in this. • The Iyun Yaakov points out that, on the political side, Mordechai had anticipated using his saving Achashverosh’s life as leverage when begging Achashverosh to save the Jews – not just a pony ride around town. Disappointed by the loss of his ace in the hole, Mordechai’s only remaining means to save the Jews is to pray to H-Shem. • The Ohel Moshe quotes the Brisker Rav, R’ Yitzchak Zev HaLevi Soloveitchik that in his reporting the goings-on to Esther earlier (Esther 4:5-16), Mordechai was unwilling to get out of his sackcloth for even one moment and even requiring Hasach as an intermediary because prayer and emunah are the main tools for salvation. • The Ohel Moshe also brings R’ Yehonason Eibshutz who quotes the Talmud (Brachos 5b) that a prisoner does not free himself. Somebody else needs to help somebody out. Similarly, Mordechai, once he sees himself rescued, returned to pray for the other Jews. Similarly, • R’ Dovid Bleicher of Novordok notes that Mordechai had his own needs met, but kept praying for the Jews because he had worked on himself to feel as if he was still under the threat of death. • The Midrash (Esther Rabba 6:12) states that a true Jewish leader does not stop fasting until the prayers are answered. • The Maharal notes that Mordechai was not satisfied by this honor because Achasherosh did not come to thank him, himself. He had no reason to think that Achashverosh felt actual gratitude. After all, as R’ Elie Munk points out in his commentary on Chumash (Vayikra 7:30), of all the offerings, the only one which the Torah describes as having to be brought “by his own hands” is the shelamim (peace offering) because it is brought as a way to thank H-Shem, and “when expressing one’s gratitude, it is proper to do it personally.” • Parenthetically, he also quotes this as the reason brought by Abudraham for the congregation to say the blessing of Modim (thanksgiving) during the repetition of the Amidah prayer, since the congregational leader cannot express the gratitude of another person. • The Maharal also says in a few places (Nesivos Olam) that simcha (joy) comes from shleimus (completeness). Here, too, Mordechai cannot be content since the Jews are still under the threat of annihilation, and are thus incomplete. • Perhaps the simplest explanation to why Mordechai returned to his place can be gleaned from a story told about R’ Yechezkel Abramsky. While discussing Megillas Esther with his rebbetzin, he asked her what Mordechai could have been thinking while riding on the horse. She answered, “This type of foolishness is for drunkards. I wish this will be over soon, so I can return to learning Torah!”
global_01_local_1_shard_00001926_processed.jsonl/2915
Grouping component This component defines the basic nodes to operate on groups of other nodes. Transform node allows to additionally translate, rotate or scale a group of nodes. Switch node allows to choose one children from a group of nodes (which is a useful tool for various interactive animations). See also X3D specification of the Grouping component. Note that explicit bounding boxes are (for now! This may change in the future!) not used by the engine. That is, don't bother calculating / filling the fields bboxCenter and bboxSize for our engine. The engine currently always internally calculates and keeps up-to-date best-fit boxes (and spheres) for collision, all by itself.
global_01_local_1_shard_00001926_processed.jsonl/2951
True colours of ancient sculptures 2000 years old die from Egypt (with 20 sides) Unfinished obelisk in Aswan (Egypt) - largest known ancient obelisk, 1500 years old. Collection of historical artifacts Walls of Saksaywaman - magnificent example of Inca masonry. Garum - ancient roman's ketchup Meet the Romans Pireus Lion: ancient greek sculpture with viking runic inscriptions made in 11th century. Now in Venice. An Egyptian floor mosaic depicting a dog and a knocked-over gold vessel. c. 200-100 BC Gobekli Tepe: where the religion was born. The horn of the last aurochs bull, which died in 1620
global_01_local_1_shard_00001926_processed.jsonl/2960
Enter your keyword Take a Help in Surveying Assignment Answers Understand the Techniques to Construct Surveying Homework Answers from Us at Myhomeworkhelp.com  The technique used by surveyors or licensed practitioners to measure the angles and the optimum location of the points of construction is known as surveying. This method is a mix of science and technology and is essential to carry out a well-organized construction project. Surveying is a process which is concerned with calculating the dimensions of certain objects on the face of the earth to obtain a clearer picture about its location and to predict whether the growth of a construction around it is ultimately safe. Surveying frequently employed by surveyors to evaluate spatial locations of a certain point. The practical purpose of surveying is enormous and has a bright prospect for the students pursuing it. Hence gathering an adequate amount of knowledge on a rewarding subject matter like this must not be neglected by budding engineers. They must be attentive enough in classes to grasp the aims and objectives of topics like these and this will consequently help them write improved Surveying homework answers. The primary objectives of “Surveying” in short In order to present a thorough explanation of what surveying truly is one has to take help of certain other parameters. The major objectives of surveying and the factors involves are categorized as follows- 1. Horizontal distance Surveying plays an eminent role in evaluating the horizontal distance which separates two geographic points. These points might be located at different elevations. 1. Vertical elevation Calculating the difference in the vertical elevation of points has importance in the survey of the points or to study their geographic location. 1. Relative direction Surveying is actively used to find the relative direction of the contour of a particular terrain. This is done by measuring the horizontal angles between the lines in accordance with a random direction. 1. Absolute direction Unlike the relative direction, the absolute direction, as the name suggests, is measured with respect to a distinct direction. Evaluation of each of these factors is highly significant in the study or surveying of topography. If they are unable to find informative resources to construct Surveying assignment answers, students can always rely on the expert educators working in our firm myhomeworkhelp.com. Why do students need academic assistance? The fact that a student’s life is highly eventful and they have to follow a strict schedule on a daily basis is undeniable. They might lack the requisite amount of time that is needed to invest in completing their projects or important submissions like Surveying assignment answers. Honestly, they cannot be blamed every time they fail to meet a deadline. This is why students are becoming more inclined towards online assistance from our trustable agency myhomeworkhelp.com. At our agency, nurturing raw talent and directing them towards the path of academic excellence is what we strive for. Furthermore, students need an additional helping hand to cope up with the confusions related to elaborate subject matters. We cater to all kinds of academic issues like project submissions, construction of substantial Surveying homework answers, preparing customized dissertations and so on. So treat yourself to our amazing and affordable services and experience the improved outcome.
global_01_local_1_shard_00001926_processed.jsonl/2961
Simba amd Malka Simba amd Malka Postby Symba727 » May 14th, 2018, 11:18 pm A/N: This is another one shot that I've been thinking about for so long. Mufasa is alive in this. It is a slash(boy/boy). DON'T LIKE, DON'T READ! LION KING IS DISNEY’S,NOT MINE! “Can't catch me!" Simba yelled as he ran from Malka. "Want to bet?!" Malka replied as he ran faster. "Whoa!" That was the last thing Simba said because he smashed into a tree. His friend went over to check on him and saw he was unconscious. "Damn it bro, you need to watch where the hell you're going!" The teenaged lion rolled his brown eyes as he ran to get Rafiki. The shaman examined Simba and told Malka that he will be fine. After about an hour, the young lion came to. "What happened? I feel like I got kicked in the head by a zebra." "I wish that's what happened! You knocked into a tree again. I was kind of worried you weren't going to wake up." Malka told him with concern. "Dude, I'm fine. No need to be all weird about it." Simba looked a him with a questioning expression when he spoke. "I'm not being weird! I can't be concerned about my best friend?!" The lion snapped as he stalked off. "Wait Malka!" The red named lion ran as fast as he could until he cought up with him. "Tell me why you're acting weird. Ever since we became teens, you've been looking at me weird and talking to me weird. What's up?" "You'd hate me if I told you. I don't want to talk about it. "Come on, it ain't like you love me or something, right?" "Well…I…do…" Malka admitted with a blush. "Really?" Simba asked. "Dude that's gross! What the hell is wrong with you?!" The teenager did not realize how much he hurt his friend by what he said. This time, Malka ran all the way back to his pride and Simba couldn't follow him. Why would he love me like that? We're both male. Maybe he's got something wrong with him. The way he looks at me. It's kind of cute…WAIT…WHAT?! Simba thought to himself as he slunk home feeling like utter crap. As the days passed, all that was on his mind was Malka. His face clouded his mind's eye and his voice rang in his head non stop. "DAD!" he finally roared. "Son? What's wrong?" his father answered. "It's Malka! I can't stop thinking about him! What do I do?!" "Tell me what happened." "I smashed into a tree again cause I didn't watch where I was going and he was "worried" about me. He look at me like he wanted to lick me on the muzzle or something. It was weird. What's wrong with him? Why does he love me?" "Well Simba, some lions love other lions and some lionesses love other lionesses. It's completely natural and part of the Circle of Life. Remember, love is never wrong and so it never dies." "So it's not wrong for us to love each other?" "Not at all." "Thanks dad!" Simba said as he ran off to Malka's pride. A few hours later, he arrived and was greeted by Malka who looked like he had been crying. "Simba, what are you doing here?" "I came to say I'm sorry for saying you were gross and there was something wrong with you. I talkedto my dad and he said our feelings were natural. Forgive me?" "Yeah…wait… OUR feelings?" Malka asked shocked. "Yes." The two males locked eyes and that is when Simba finally came to terms with the fact that he was in love with Malka. The next thing they knew, they were nuzzling, then the red maned lion licked his now boyfriend's muzzle. "I love you, Malka." "And I you Simba." Posts: 6 Joined: April 8th, 2018, 12:42 am Nickname(s): Symba Gender: Non-binary Pride Points: 0 Return to Fan Fictions Who is online Users browsing this forum: No registered users and 4 guests
global_01_local_1_shard_00001926_processed.jsonl/2974
 Coronis (An Appendix to True Christian Religion) #0 (Buss (1975)) - New Christian Bible Study Coronis (An Appendix to True Christian Religion) #0 Coronis (Buss translation) Go to section / 60   Next → I. There have been four Churches on this earth since the time of the creation: a First, which is to be called the Adamic; a Second, the Noachian; a Third, the Israelitish; and a Fourth, the Christian. II. There have been four Periods, or successive States, of each Church, which in the Word are meant by "morning," "day," "evening," and "night." III. In each Church the four changes of states have been consecutive; the first of which has been the Appearing of the Lord Jehovih and Redemption, and then was its Morning, or Rise; the second has been its Instruction, and then was Mid-day, or Progression; the third has been its Decline, and then was its Evening, or Vastation; the fourth has been its End, and then was its Night, or Consummation. After its End, or Consummation, the Lord Jehovih appears and executes a judgment on the men of the former Church, and separates the good from the evil, and raises the good to Himself Into heaven, and removes the evil from Himself into hell. After these things, of the good raised to Himself He forms a new heaven, and of the evil removed from Himself, a new hell; and in both He establishes order, so that they may remain under His control and under obedience to Him to eternity; and then through the new heaven He successively inaugurates and establishes a new Church on earth. From this new heaven, the Lord Jehovih derives and produces a new Church on earth; which takes place by means of a Revelation from His mouth or from His Word, and by inspiration. IV. These periodical changes of state which occurred in succession in the first, or Most Ancient Church, which was the Adamic, are described by Moses in the first chapters of Genesis; but by celestial representatives, and by other things, belonging to the world, to which spiritual things correspond. V. The periodical changes of state which occurred in succession in the second, or Ancient Church, which was the Noachian, are also described in Genesis, and here and there in the four remaining books of Moses. VI. The periodical changes of state which occurred in succession in the third Church, which was the Israelitish, are also described in Moses, and afterwards in Joshua, in the Books of the Judges, of Samuel, and of the Kings, and likewise in the Prophets. VII. The periodical changes which occurred in succession in the fourth Church, which is the Christian, are described in the Word of both Testaments; its Rise, or Morning, in particular, in the Evangelists, and in the Acts and writings of the Apostles; its Progression towards Noon-day, in the ecclesiastical history of the first three centuries; its Decline, or Evening, by the history of the centuries immediately following; and its Vastation even to Consummation, which is its Night, in the Apocalypse. VIII. After those four Churches, a new one is to arise which will be truly Christian, foretold in Daniel and in the Apocalypse, and by the Lord Himself in the Evangelists, and looked for by the Apostles. IX. The Church successively declines from the truths of faith and the goods of charity, and it declines in the same proportion also from the spiritual understanding and genuine sense of the Word. X. Consequently, the Church departs in the same proportion from the Lord, and removes Him from itself. XI. In proportion as this is effected, it tends towards its end. XII. It is the end of the Church, when there remains no longer any truth of faith or genuine good of charity. XIII. The Church is then in falsities and the evils therefrom, and in evils and the falsities therefrom. XIV. Hence, from the deceased out of the world hell increases, so that it raises itself up towards heaven, and interposes itself between heaven and the Church, like a black cloud between the sun and the earth. XV. This interposition prevents the access of any truth of faith, and thence any genuine good of charity, to the men of the Church; but, instead of them, falsified truth, which in itself is falsity, and adulterated good, which in itself is not good. XVI. Then naturalism and atheism take possession together. XVII. This state of the Church is meant and described in the Word, by "Vastation," "Desolation" and "Consummation." XVIII. While Vastation lasts, and before Consummation supervenes, the Lord's Advent is announced, also Redemption by the Lord, and after this there is a new Church. XIX. While the Israelitish Church still endured, these three were announced in many passages of the Word in the Prophets. XX. The Coming of the Lord. XXI. Redemption. XXII. A new Church. Almost everywhere in the prophetic Word, Vastation and Consummation, also the Last Judgment, the Lord's Coming, a new Church, and Redemption, are treated of. XXIII. As regards Redemption in particular, through which alone Salvation takes place, it was accomplished by Jehovah God incarnate, who is our Lord Jesus Christ. XXIV. The first part of Redemption was a total subjugation of the hells. XXV. The second part of Redemption was the separation of the evil from the good, and the casting down of the evil into hell and the raising of the good into heaven. XXVI. And, lastly, there is the arrangement in order of all in hell, and the arrangement in order of all in heaven. XXVII. And then, at the same time, Instruction concerning the truths which are to be of faith, and the goods which are to be of charity. XXVIII. And thus the Establishment of a new Church. XXIX. The final and efficient Cause of Redemption was the Regeneration of man, and thereby salvation. XXX. The Lord, because He is the only Redeemer, is therefore the only Regenerator, and thus the only Saviour. XXXI. By His first Advent, and the Redemption then wrought, the Lord was not able to form a new heaven of Christians, and from that a new Church, because there were as yet no Christians, but they came into existence gradually through the preachings and writings of the Apostles. XXXII. Neither was He able afterwards, since from the beginning so many heresies broke forth that scarcely any doctrine of faith appeared in its own light. XXXIII. And at length the Apostolic Doctrine was increasingly torn, rent asunder, and adulterated by abominable heresies. XXXIV. This is meant by "the abomination of desolation," and by "the affliction such as was not, either will be," and by "the darkening of the sun, moon, and stars," in the Evangelists, in Daniel, and also in the Prophets; likewise by "the Dragon" and many other things, in the Apocalypse. XXXV. Because the Lord foresaw these things, therefore of necessity if man were to be saved, He promised that He would come again into the world and accomplish a Redemption, and would thus institute a new Church, which would be truly Christian. XXXVI. The Lord Himself foretold His Second Coming, and the Apostles frequently prophesied respecting it, and John openly so in the Apocalypse; XXXVII. In like manner respecting the New Church which is meant by the "New Jerusalem" in the Apocalypse. XXXVIII. This Second Redemption was effected in the same way as the first (of which above, from n. xxiii to xxx), XXXIX. And also for the sake of the Regeneration, and hence the Salvation, of the men of the Church, as its final and efficient cause. XL. The falsities which have hitherto desolated, and have at length consummated, the Christian Church, were chiefly the following: XLI. They receded from the worship of the Lord, preached by the Apostles, and from faith in Him. They separated the Divine Trinity from the Lord, and transferred it to three Divine Persons from eternity, consequently to three Gods. XLII. They divided saving faith among these three Persons. XLIII. They separated charity and good works from that faith, as not at the same time saving. XLIV. They deduced justification-that is, remission of sins, regeneration, and salvation-from that faith alone, independently of man's co-operation. XLV. They denied to man free-determination in spiritual things, thus asserting that God alone operates in man, and that man on his part does nothing. XLVI. From this necessarily flowed forth Predestination, by which religion is abolished. XLVII. They decreed that the Passion of the Cross is Redemption. XLVIII. From these heresies, falsities burst forth in such abundance that there does not remain a single genuine truth which is not falsified, nor, consequently, a single genuine good which is not adulterated. XLIX. The Church knows absolutely nothing about this, its Desolation and Consummation, nor can it know, until the Divine Truths announced by the Lord in the work entitled THE TRUE CHRISTIAN RELIGION, are seen in light and acknowledged. The Word is thus obscured and darkened, so that not a single truth any longer appears in it. L. For many reasons this New Christian Church is not being established through any miracles, as the former was. LI. But, instead of them, the spiritual sense of the Word is revealed, and the spiritual world disclosed, and the nature of both heaven and hell manifested; also, that man lives as a man after death; which things surpass all miracles. LII. This New truly Christian Church, which is at this day being established by the Lord, will endure to eternity, as is proved from the Word of both Testaments; also it was foreseen from the creation of the world; and it will be the Crown of the four preceding Churches, because it will have true faith and true charity. LIII. In this New Church there will be spiritual peace, which is "glory," and internal blessedness of life, as is also proved from the Word of both Testaments. LIV. These things will exist in this New Church, by reason of its conjunction with the Lord, and through Him with God the Father. LV. An invitation addressed to this Church and to the whole Christian world; and an exhortation to worthily receive the Lord, who has Himself foretold that He would come into the world for the sake of this Church and to it. I. Miracles were performed in the Church before the Lord's Advent, because, at that time, men were external, or natural, and could not be led to their representative worship except by miracles. The Miracles performed in Egypt, in the wilderness, in the land of Canaan, and even to the present time, are to be enumerated. And that, yet, they never influence men. II. After the Lord's Advent, when man from external became internal, and when the capacity of being able to know was imparted to man, miracles were withheld. Also, if that capacity were impeded, man would become more external than before. III. Miracles would abolish worship truly Divine, and introduce the former idolatrous worship; as also has taken lace for very many centuries back. Nevertheless, the latter have not been Divine miracles, but such as were wrought by the magicians of old. IV. At this day, in place of miracles, there has taken place a manifestation of the Lord Himself, an intromission into the spiritual world, and enlightenment there, by immediate light from the Lord, in such things as are the interior things of the Church. But, above all, the opening of the spiritual sense in the Word, in which the Lord is in His own Divine light. V. These Revelations are not miracles; since every man is in the spiritual world as to his spirit, without any separation from his body in the natural world-I, however, with a certain separation, though only as to the intellectual part of my mind, but not as to the voluntary;-and as regards the spiritual sense, the Lord through it is with all who approach Him in faith in the above light; also, through that sense He is in man's natural light. Go to section / 60   Next →
global_01_local_1_shard_00001926_processed.jsonl/2976
Screenshot: YouTube There is a very finite amount of Beastie Boys music on the planet, given that the boys from Brooklyn announced that 2011’s Hot Sauce Committee Part Two would be their final release following Adam Yauch’s death. And there is an incredibly finite amount of Daft Punk music on the planet, given that the Parisian duo are notorious perfectionists, taking up to eight years between albums. Daft Science, an eight-track effort by the Toronto producer Coins, does not provide new music by either group, but its smart, deeply layered juxtapositions of Beasties vocals and Daft Punk tracks manages to make both sound new again. This is no cut-and-paste mashup job; the Daft Punk samples are drastically reworked and cut to emphasize the mic-tossing exuberance of these Beastie Boys verses. The thrill doesn’t come from the unlikeliness of the pair, but instead from how organic it all feels—it’s a little surprising the two groups never formally teamed up. Well, now they have, sort of. Coins originally produced the record two years ago, but it’s making the rounds now, thanks in part to a post on Daft Punk’s Reddit page. Better late than never, though, as it is absolutely white-hot shit. [via Metafilter]
global_01_local_1_shard_00001926_processed.jsonl/3001
No Transaction Exist message on check-in when transactions do exist. Why am i receiving a "No Transactions Exist" message when I check in my device when I have created transactions on my device? Pocket Inventory - QuickBooks Pocket Inventory - SBA Pocket Inventory - All Orders This problem generally occurs when you have checked the device in while Pocket Inventory is still running on the device and the transactions you have saved have not yet been written to the data file. If you experience this problem, follow these steps to save your transactions: 1. Close Pocket Inventory on the device down. This will cause the data files to be written to the devices file system. 2. On your desktop, open up "My Computer" and open the Mobile Device. Navigate the device's file system to the /Program Files/Pocket Inventory folder. There will be a TempDB.pml file and a sch.pml file located in the folder. Make copies of both of these files. 3. Open Pocket Inventory on the desktop and check out the device the same way you checked the device out previously. 4. On your desktop in the device's file system delete the new TempDB.pml file that was created when checking out the device and rename the copies you created to TempDB.pml and sch.pml. 5. Check the device back in. This issue was fixed in Pocket Inventory version 1.0.24 Call Cruncher More questions? Call to speak with a NumberCruncher Solutions Consultant at: call us
global_01_local_1_shard_00001926_processed.jsonl/3019
Musing on abilities: the meanings of four words Setting the context My brief for this piece was to unpick the meanings of the terms: Skills, Competencies, Capacities and Literacies[1]. Although supporting the One by One enquiry into digital literacies in museums I was given freedom to reflect generically beyond it. My reflections arise from an interest in how digital has transformed the possibilities of cultural learning, for example, what it offers for social or paragogic[2] learning, or for an ecological interpretation of culture. If I was to write a treatise for the abilities needed by museums, it would include systems thinking, anticipatory planning, imagination, and a raft of social and emotional abilities, before any technical skills. I see relational situations as the key to understanding how meaning is made, how abilities are acquired and how authority to teach is conferred. Building on this, I’d suggest that the more complex the situation, the more that mastery of abilities[3] requires enhanced consciousness of the relational situation of one’s work. That treatise isn’t my brief here, but I mention my views so that I can set out the context as I see it. To summarise what we are working with: • Culture in a high-tech world is increasingly complex, and museums are already complex organisations • Uncertainty around what kinds of skills people will need in the future • Public discourses about how we educate for future needs are too simplistic for this emerging complexity and uncertainty. So, to the question, what do these terms mean? And, how are each of them important in our current context? First, how do we agree what terms mean? The four terms in question are employed not so much as accurate labels but as power tools in contests about the development of people. The metaphor of ‘power tools’ came to my mind because I’m writing this against an aural backdrop of neighbours’ building work: Our situation governs our choice of words, and also their reception. The meanings of all terms are provisional, but some can be more multi-purpose, or bluntly heavy-duty, than others. The more contested the situation in which terms are employed, the more they are liable to be used as tools either for construction or for conflict. More often the latter. Dictionary definitions can be helpful to establish clarity, and the ‘truth’ of a term can be deeply rooted in its etymology. However, in practice, or in different practices of use, we settle or hover temporarily on meanings. I think there may be five modes of agreement, depending on context: Mode of agreement How meanings of terms are agreed A typical context of use Expressive ‘What I mean’ Poetry Contingent ‘What we mean, for now’ Business, to agree a deal Objective ‘What authoritative people agree it means’ Published research Targeted ‘What particular audiences understand it to mean’ Marketing Hermeneutic ‘What we all take it to mean with our diverse perspectives – seeking common ground and learning from each other’ Intercultural dialogue Leaning to the hermeneutic mode I intend this piece to contribute to a hermeneutic approach, whereby my take on the four terms is not laid down as the authority, but is offered as a blueprint for further shared interpretation. A hermeneutic mode fits with the idea that meanings are made, and abilities acquired, through relational situations. Meanings or processes are tried out and those that work best for the situation or the group might stick, and are reinforced and adapted with use. There may be friction around this but there is also flow, and good leadership of groups can enable that flow. Museums can be the most complex (and fascinating) types of organisation because they work across all five modes of agreement listed above. They produce creative work, manage business operations, conduct research, market to audiences and host intercultural dialogues, and so on. The meanings of terms such as ‘learning’, ‘curating’, ‘outreach’ or ‘sustainability’ can be hotly debated between these different functions. Where a museum’s leadership supports hermeneutic processes, where common ground and learning flows between teams, these debates don’t fester but instead can fuel collaboration. The issue of future abilities is very contested now because human civilisation is at a crossroads: If we don’t use all our assets urgently to restore the planet’s operating system and tackle gross inequalities, civilisation will not be sustained. (I’m putting a paragraph break here to let that sink in!) In addition, arguments about future abilities can get stuck in opposing camps because the paradigm frames are too fixed. Particularly when presented in mainstream media, the debates are too simplistic. People are brought together from situations with different modes of agreement, but the facilitation of debate does not support them to learn from each other. For example, in the ‘Knowledge versus Skills’ debate, both sides are correct in some way, but one side might emphasise the process of learning and the other its outcomes, so they will always misinterpret each other’s position. Those against a Knowledge-based curriculum are accused of wanting to deprive learners of knowledge. With their Skills-based framing, they mean that knowledge is best reinforced through practice in real settings, that abilities held in muscle memory and in social behaviours are more permanent than those transmitted through abstract instruction. Those against a Skills-based curriculum believe that know-how is best contained and transferred in linguistic or cognitive formats. This Knowledge-based framing corresponds with a belief in social mobility, that one succeeds mainly by affinity with networks and comfort with protocols, aided by linguistic Cultural Capital. Each side does not clearly see the same horizon of common ground. (I am simplifying to make a point, of course, and one might add to this story that advocates for Character-based education interject into this binary debate.) A blueprint for interpreting the four terms I first checked the dictionary definitions, which do not strongly reveal the distinctive meanings of each term: • Skill, noun, the ability to do something well; expertise • Literacy, noun, the ability to read or write. Or, competence or knowledge in a specified area • Competency, noun, the ability to do something successfully or efficiently • Capability, noun, the ability or power to do something. However, each definition does provide clues. So I took these clues and mused on their distinctive meanings, thinking about their use in different situations. I came up with the following blueprint: Skills is shown as an origin term, more common in use than the others, and therefore a capacious or baggy concept. Unlike the other Latinate terms, it’s from an old Norse word (that is, ‘skil’, meaning discernment or knowledge; and it’s interesting that this old meaning doesn’t refer to the physical or manual abilities which characterise its interpretation now). Possibly, the Latinate terms have come to supplement or replace Skills, which has been associated too much with training for manual labour, when any curriculum body or institution worth its salt would want to be associated with intellectual and professional aspiration. Competencies is shown coming directly out of Skills because it is often used in tandem. In Skills-based frameworks, competencies are often applied to the assessment of abilities, with precise descriptions of standards to evidence them. So, if you are skilled at boiling an egg, the Competencies might include placing an egg in the water pan without breaking it, timing the boiling for different preferences of hardness, and removing it without burning yourself. However, Competencies is almost as much of a baggy concept as Skills, and has come to be used to mean a range of things. Competencies are often used outside Skills-based frameworks to encompass not just Skills, but the knowledge and personal attributes that are needed in order to demonstrate full ability to perform a role. Beyond even this, Competencies can be used to try to define the motivations and values that might optimise someone in a role. Despite this bagginess, it can be distinguished from Literacies and Capabilities in that it is most often used in a business setting, used for training and recruitment of individuals. Literacies is the term most often used by industry bodies or campaigners to advocate a set of abilities needed for future work and society. Literacy is essentially the twinned ability to transfer speech or thought into graphic letters and to decode those letters into meaning. Around this have been discussed or codified many other abilities to enhance the effectiveness and expressiveness of meaning-making and communication, so that Literacy, a well-resourced area of education, has grown into a broad array of abilities. Since the 1990s, when in the UK at least, Literacy (and Numeracy) expanded to fill space in the National Curriculum, we’ve seen waves of campaigns for alternative Literacies: Visual Literacy, Multimodal Literacy, Information Literacy, Emotional Literacy, Wellbeing Literacy, Financial Literacy, Ecological Literacy, Science Literacy and Digital Literacy. Some of these campaigns acknowledge that Literacy per se is core to their alternative skillset (e.g. Information Literacy relies on reading) or that Literacy can be taught through creative activities such as Music. Others emphasise that decoding information goes way beyond letters, to include sounds, body language, images and natural phenomena. Some campaigns use Literacies more as a metaphor or starting point, with other social, emotional and practical abilities incorporated into their manifestos for Literacies. For example, Science Literacy was about broad knowledge of the application of science and its discussion in society[4]. The JISC definition of Digital Literacies is ‘those capabilities which fit an individual for living, learning and working in a digital society’. Doug Belshaw, in his PhD thesis and 2014 book, ‘The Essential Elements of Digital Literacies’ identifies these as Cultural, Cognitive, Constructive, Communicative, Confident, Creative, Critical, and Civic. Because none of these are overtly technical, it suggests that character attributes are more important than mastery of digital tools. It comes across as a provocation that for people to thrive in a digital world, these character attributes are the foundation of permanent abilities upon which any temporary technical abilities can be easily acquired as needed. It could be argued that all abilities are essentially about accessing, decoding and communicating information, particularly in the 21st Century, so Literacies are a suitable generic term for abilities. However, I think Literacies are only a part of what makes somebody able to achieve something. There are also elements such as mastery of materials and equipment, manual and other physical abilities, and personal motivation. These can’t be reduced to the processing of information. Capabilities are often used in social and health care, for example in assessing what support is needed for a person with disabilities or multiple disadvantages. They are also used to describe the abilities of whole teams or organisations, for example, of a business being capable of innovation or collaboration. Capability combines ‘capacity’ with ‘ability’. Capacity comes from the Latin root ‘capere’, to take or take up (e.g. as in a cup). The addition of -ability makes it more active than ‘capacity’, affording description of what can be achieved, not simply what can be coped with. So, a person with disabilities might have capacity to stand up unaided, but have capability of various other movements with the right care, equipment, removed barriers and supported practice. Capabilities are seen as highly contextual: they might empower individuals but are not their sole responsibility. In digital culture and museums, capabilities are influenced by a range of overlapping contextual factors: • values and motivations of the group culture • methods and technologies being used • which sector it is (e.g. museums, heritage or arts) • social capital (e.g. different ages, levels of education or advantage) • financial capital and resources • how much freedom or much surveillance there is • …and so on. Essentially, the four terms are synonyms, but with differences in origin and use. I tend to favour Capabilities of the four because people’s abilities to achieve their goals are highly dependent on so many factors. A programmatic approach to developing the digital abilities of museums might involve agreeing these uses of the four terms: • Skills: Generic shorthand, interchangeable with ‘abilities’ • Capabilities: Elements that underpin the abilities of individuals and teams to achieve goals, where people’s competencies intersect with those of other people’s and the resources available to them • Competencies: Concrete descriptions of optimum performance by individuals, regarding specific areas of activity such as service design, project management, or social media hosting. These need to be refreshed constantly to adapt to new technologies and methodologies. • Literacies: A core element of Capabilities. Access to, and familiarity with, relevant and diverse vocabulary, methodologies, practitioners, best practice, ethics and professional enquiries. Mastery comes about through practice in situations where Capabilities are maximised, where descriptions of Competencies are continually refined and refreshed, and development of Literacies provides an enhanced consciousness of the relational situations of one’s domain. [1] I’m using ‘abilities’ as the umbrella for all four terms. I might otherwise use ‘skills’ as the generic term, but this would be too confusing here. [2] An alternative spelling is ‘peeragogic’. Paragogy is learning through interaction between peers. [3] Mastery could be defined as comprehensive competency, affirmed by others with equivalent competence. [4] This is better defined now as part of a framework called Science Capital, developed by KCL with UCL. Add your comment
global_01_local_1_shard_00001926_processed.jsonl/3020
Iscuss the strengths and weaknesses of one or more theory of competitive advantage, e.g. VRIN, fives forces, evolutionary strategy. When answering the question, please range across the relevant readings (attached) to support your arguments. There is no specific number of sources you should use, but you should be using more than four and in most cases no more than ten. You may also use current news sources from the press. Referencing Requirements: Bibliography should be in the following form: Brenner, R., a?What is, and What is Not, Imperialisma, Historical Materialism, 14, 4, 2006: 79-105. Polanyi, K., The Great Transformation, Beacon Press: Boston 1957. Schwartz, H. M., States Versus Markets (third edition), Palgrave: Basingstoke, 2010, pp. 43-63. Wallerstein, I., a?Three Paths of National Development in Sixteenth-Century Europea, in The Capitalist World Economy, Cambridge University press: Cambridge, 1997. When citing an author within the text, do so as follows: (Polanyi 1957, pp. 123-34) (Brenner 2006, p. 23)
global_01_local_1_shard_00001926_processed.jsonl/3021
Update Launch Center Pro's [list] with your most used Pinboard tags One of the coolest tricks from Launch Center Pro 2 is the [list] parameter, which allows you to create a prompt of options to pick. It's great because services with a specific set of search queries doesn't rely on your memory to be called, like your Pinboard tags. However, once in a while you must review and manually update your LCP's lists and that's a bummer, so I built a Pythonista script to update your Pinboard tags for you. #coding: utf-8 import console import keychain import pickle login = keychain.get_password('pinboard.in','pythonista') if login is not None: user, pw = pickle.loads(login) user, pw = console.login_alert('Pinboard Login', '') login = pickle.dumps((user, pw)) keychain.set_password('pinboard.in', 'pythonista', login) import requests import json pinboard_url = 'https://api.pinboard.in/v1/tags/get?format=json' r = requests.get(pinboard_url, auth=(user, pw)) data = json.loads(r.text) tags = data.items() # minTags is the minimum amount of times this tag must link to a bookmark to be part of our final list. # Change the value to 1 to grab all tags, for example. minTags = 10 # This will generate a list without tags with less than minTags bookmarks. filteredTags = [(str(k).lower(),int(v)) for k,v in tags if int(v) >= minTags] # Change to True to sort your tags by name, otherwise they'll be sorted by count sortByName = False from operator import itemgetter if sortByName: filteredTags = sorted(filteredTags, key=itemgetter(0)) filteredTags = sorted(filteredTags, key=itemgetter(1), reverse=True) # finalTags kicks the conversion to a Launch Center Pro [list] converting each tag so we can use them to call Pinswift later. finalTags = '|'.join([k for k,v in filteredTags]) title = 'Pick a Tag!' label = 'Pick a Tag!' description = 'Outcome for our Pythonista script to create a list with our most used tags from Pinboard ready to trigger at Pinswift' # Comment the next line if you're not using Pinswift action = 'pinswift:///u:%s/t:[list:%s|%s]' % (user, label, finalTags) # Uncomment the next line if you're using Pincase #action = 'pincaseapp://x-callback-url/open?mode=personal_tag&tag=[list:%s|%s]' % (label, finalTags) # Uncomment the next line if you're using Pushpin #action = 'pushpin://feed?user=%s&tags=[list:%s|%s]' % (user, label, finalTags) from urllib import quote import webbrowser import_lcp = 'launchpro://import?url=%s&title=%s&description=%s' % (quote(action), quote(title), quote(description)) Get it on GitHub here. Well, you ask, how does it work? First, this script is only possible because Pinboard has an API we can call to get our list of tags, therefore, I'm sorry to disappoint you, but you won't be able to update your list of Clear lists, for example. We use and store our Pinboard login using the keychain module and collect a list with all our tags and how many times they were used in our bookmarks. This is nothing special and you can find the workflow up to this point around the web. There is a couple of customizable variables for your delight in this script, the first of them is minTags, which is the minimum bookmark count a tag must have to join our final list. The next variable is sortByName, which when set to True will sort our tags by name, otherwise they will be sorted by count. You can tweak a few more things on the Launch Center Pro action such as the title, description and label of the prompt. You don't have to change that unless you want to. If you're fine with my variables and your Pinboard client of choice is Pinswift, just hit Run and Pythonista will bounce to LCP and you'll be asked if you want to install it. Pick a spot on the grid1 and you're done. You know I'm a nice guy and if you use Pushpin or Pincase, the actions to trigger these apps instead of Pinswift are commented in the script. Just follow the instructions and you're ready. And that's why web services and Launch Center Pro are so cool. 1. I strongly suggest you to replace the previous action if you're running it the second time. Just a hint.
global_01_local_1_shard_00001926_processed.jsonl/3033
Isla Aukate Alderion Diandre (left) helping Paria (right) tend to a garden at the abbey Paria, like all dires, is the essence and a reflection of the person she was formed from.  In this case Sagitair.  What was a shock to so many people, including her creator, was that instead of reflecting the cruelty and sadism of her progenitor, Paria was deeply faithful and devoted to good.  It was as though the last smothering dregs of Sagitair’s goodness were distilled and formed into a whole independent being. But Paria was not perfect.  Upon her birth she was a stereotype of an angry Christian, harshly judging the sins of those around her.  But when she fled her creator and took refuge with Father Mella and the friars of the abbey she quickly learned the error of her ways and recanted, slowly becoming a more understanding and loving creature. Her link with Sagitair remained though and her creator used it to torment her daily and force her silence regarding her plans to kidnap Fox and take over the lair.  As much as Paria wanted to warn people, Sagitair forced her silence.  So Paria focused herself on being a comfort to the people around her and making peace with herself.
global_01_local_1_shard_00001926_processed.jsonl/3034
2018.14 A Perl 6 IDEA Jonathan Worthington and his Edument team have announced an Integrated Development Environment for Rakudo Perl 6 named Comma, based on the JetBrains IDEA platform. And this is no April Fool’s joke (unlike the previous version of this edition of the Perl 6 Weekly). Check out the features, the FAQ, roadmap and Reddit comments. Exciting times indeed! Larry in the Wild It appears that Larry Wall will be giving a presentation titled “It’s the End of the World as We Know It, and I Feel Fine” at the Academic IT Festival in Cracow, Poland on 5-7 April. Too bad this overlaps with the German Perl Workshop (4-6 April) otherwise yours truly would have had a compelling reason to finally visit Cracow. Core Developments • Ticket status of past week. • Jonathan Worthington provided support for the PID of the asynchronously running process in Proc::Async. Elizabeth Mattijsen made the same feature available to Proc. • Timo Paulssen changed the interface of the nqp::getrusage op so that it uses a given native integer array, rather than create a new one each time nqp::getrusage is called. This significantly lowered the number of allocations for the supervisor thread. • Jonathan Worthington also made Supply.interval a serial Supply (which it should have been from the start). And he fixed a pesky rooting bug in MoarVM, which resolved more than a handful bug reports. • Zoffix Znet introduced a fails-like in Test.pm6, with semantics similar to throws-like, but for Failures rather than Exceptions. • Bart Wiegmans fixed some spesh related issues. • Jeremy Studer made List cmp List about 17x faster. • Elizabeth Mattijsen did many micro-optimizations that may or may not be visible in your code. She also implemented Array.grab with semantics similar to Array.pick but actually immediately removing the value from the Array. She did the same for native arrays. • And many other smaller fixes and improvements. Blog Posts Meanwhile on Twitter Meanwhile on StackOverflow Meanwhile on FaceBook • JJ Merelo: We just reached 600 questions with the tag Perl6 in StackOverflow. My own experience says that in a few hours you usually have excellent answers by Brad, Jonathan, brian d foy, Elizabeth, and many others. However, we need more questions; I need not tell you that one question a day in Stack Overflow is a drop in the water; so please as soon as you bump into some little trouble just go there and ask away. Answers help us improve documentation, and we are all enriched by the experience. Will we be able to reach The Number of The Beast before the end of May? (that would effectively double the going asking rate). Meanwhile on perl6-users Perl 6 in comments Perl 6 Modules 6 New Modules: 11 Updated Modules: Winding Down I think that the way Jonathan Worthington has set up Comma will work better than several other Kickstarter-like projects, because it will deliver something from the start. Can’t wait to actually get my hands on Comma. And for me, as a staunch vim user, that’s saying a lot. See you next week! Got something to note? WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/3046
Visitors   Views   Downloads Note that a Preprint of this article also exists, first published January 11, 2017. Ontologies are used for tasks such as the standardization of terminology, the verification of data consistency, and the integration of heterogeneous databases. Ontologies have been actively applied to areas including, but not limited to Biology and Medicine (Whetzel et al., 2011), Crisis Management (Liu, Shaw & Brewster, 2013), Information Security (Vorobiev & Bekmamedova, 2010), and Software Engineering (Happel & Seedorf, 2006). In this work, we focus on the area of life sciences, where ontologies are commonly used in tasks such as annotation of gene products and proteins in different databases (Magrane & Consortium, 2011; Flicek et al., 2013; The Gene Ontology Consortium, 2015), or structuring and searching data sources (Doms & Schroeder, 2005). Life science ontology mappings identify existing concepts with similar meaning. These ontology mappings are useful in tasks like finding new annotations, supporting other data integration methods, combining related ontologies, or ontology reuse. When ontologists build new ontologies they often search for existing ontologies to avoid redundancy of concepts as recommended, for example, by the OBO Foundry principles (Smith et al., 2007). Identifying ontology mappings and understanding how ontologies relate is a critical step in integrating data and applications that use different ontologies ( Ghazvinian, Noy & Musen, 2009). In this paper we analyse and evaluate NCBO BioPortal (Whetzel et al., 2011) ontology mappings. BioPortal is a comprehensive publicly available repository of live science ontologies. It offers several functionalities, for example, browsing and searching for ontologies or defining ontology mappings. BioPortal ontologies are frequently being updated with newer versions. As a result, ontologies may contain new concepts, relations or ontology mappings, or contain other modifications. In scientific community, these changes are often referred to as the evolution of ontologies (Kirsten et al., 2011; Hartung, Groß & Rahm, 2013). To help ontology engineers in understanding how ontologies overlap and evolve, we use concepts from graph theory to identify clusters of BioPortal ontologies (i.e., communities) that tend to overlap more often than others. Please note that in this paper we use the word community for a set of ontologies that tend to overlap. In contrast, the OBO (Open Biomedical Ontologies) project defines a community as a set of ontologies that work together and reduce mutual overlap. We also recognize hub ontologies, i.e., ontologies that connect many other ontologies/communities. Since BioPortal data often changes (e.g., new ontologies or versions of ontologies are uploaded or new mappings are defined), we analyse the mapping data at different time points. We propose an alignment of similar communities, define stable communities and perform a time transition analysis. Our work aims to answer questions like “In my area of interest, what ontologies already exist and how are they related to each other?” or “In my area of interest, which sub-areas are stable and which are not in terms of ontology development?”. Answering these questions can assist in tasks like ontology reuse and development. The results of the data gathered and analysed at five different time points are presented. Related work Related work can be categorized in the following (often overlapping) two groups: (1) analysis of ontology mappings and (2) evolution of ontologies. Below we introduce the most relevant papers from these groups. Similar to our work, Ghazvinian et al. (2009) performed analysis of BioPortal mappings. The goal of their work was to learn more about the characteristics of the ontologies and the relationships between them. As a result, they produced graphs of subsets of biomedical ontologies. Although Ghazvinian’s work addresses a similar problem, our work uses a different approach (i.e., modularity analysis as described in the Methods section) to cluster ontologies in communities and identify hub ontologies. In addition, we also analyse transition between different time points, and identify stable and similar communities. As a result, we offer our work as a supplement to Ghazvinian’s findings about biomedical ontologies and their mappings. Changes in ontologies have been previously studied and tools such as GOMMA (Kirsten et al., 2011) have been developed. The GOMMA framework provides a scalable and comprehensive infrastructure to analyse large life science ontologies and their evolution. Hartung, Groß & Rahm (2013) investigates evaluation of ontology mappings for different versions of the same ontology. However, as far as we know, no previous work analysed evolution of overlapping communities of ontologies as we do in this paper. This work is partly a result of our BioHackathon activities (Katayama et al., 2014) and prior work (Kocbek, Perret & Kim, 2012), where we produced a graph representation of BioPortal ontologies. In our later work (Kocbek et al., 2013) we performed initial analysis of differences between two graphs. There are several new contributions in this paper compared to the previous work. First, in the previous work, a preliminary investigation with a basic analysis of mapping data at only two time points was performed. Limited data did not allow detailed trend analysis. On the other hand, data gathered at five time points offers a comprehensive analysis of identified communities (e.g., identifying stable and similar communities), which is the focus of this paper. We also perform analysis of project and category data and discuss alignment with identified communities. In addition, we try to validate generated clusters with information found in MEDLINE abstracts (Miller, Lacroix & Backus, 2000). Data and Methods To investigate the state and evolutionary change of biomedical ontologies, we need a comprehensive collection of ontologies. We have chosen to investigate BioPortal data since it is widely recognized as a comprehensive repository of biomedical ontologies. Parts of this and the next section summarize our previous paper with added information. The data (Supplemental Information 1) was gathered at the following five time points: October 2012, February 2013, August 2013, December 2013 and July 2014. Currently BioPortal contains more than 400 ontologies grouped into 41 categories (e.g., Health, Anatomy, Cell). To perform the analysis, the following data had to be collected through BioPortal RESTful web services for all time points: the ontology’s full name (e.g., Gene Ontology), the ontology’s name abbreviation (e.g., GO), and the number of mappings from/to the ontology. Since the BioPortal RESTful interface changed after August 2013, we gathered the following additional data only for the first three versions of our visualizations: ontology statuses (e.g., production) and ontology versions (e.g., alpha). To analyse identified communities, we also collected number of projects and categories that community members belong to. Our analysis depends on mapping information in BioPortal. The BioPortal web page describes mappings as: We collected the number of all mappings between ontology pairs. The following three types of mappings are supported (please note that no information about mapping types was gathered for our current analysis): • NCBO mappings are periodically calculated with a computer algorithm. The algorithm finds mappings for terms with close lexical match or mappings for terms with the same URI from different ontologies. The majority of the mappings is from this group. • Unified Medical Language System (UMLS) mappings link terms with the same UMLS concept unique identifier (CUI) or terms from the UMLS MRMAP.RRF data. • Mappings between ontology terms related by an OBO (Open Biological and Biomedical Ontologies) xref property. Detecting communities and hub ontologies In the next step, pre-processing of the data was performed. For all ontology versions prior December 2013, we removed the following: (1) ontologies with the retired or alpha status, (2) ontologies that contain the keyword test in their full name, and (3) restricted or private ontologies. From data gathered in December 2013 and July 2014 we removed summary ontologies (i.e., they contain the summaryOnly  = true field). The filtered data was then processed with Gephi (Bastian, Heymann & Jacomy, 2009), an open source tool for graph analysis and visualization. Gephi was chosen because it’s free, platform independent, and several graph and node properties can be calculated. The input file format contained the following three fields: (1) fromOntology: the name of the source ontology, (2) toOntology: the name of the target ontology (3) numberOfMappings: number of directed mappings between source and target ontology. To identify communities of densely overlapped ontologies, we applied Gephi’s Modularity Analysis (also called Community Detection) to the data. Modularity Analysis (MA) is a measure of structure in graphs. Gephi implements Louvain method (Blondel et al., 2008) for MA, which is the fastest and most accurate method in terms of modularity score (Aynaud & Guillaume, 2010). Graphs with a high MA score have sophisticated internal structure with separate communities of densely connected nodes inside the communities and sparse connection across communities. To separate communities as much as possible, we ran MA with different resolution parameter values (ranging from 0.8 to 1.2) until the highest MA score for each graph was calculated. The resolution parameter controls number of communities but it results in different MA score. The numbers of mappings between ontologies were used as weights in computing MA scores. Next, we used the Gephi’s Betweenness Centrality (BC) metric (Freeman, 1977) to identify “hub” ontologies. BC is a measure of the frequency of occurrence of a particular node in all the shortest paths between any two nodes. A BC value is calculated for ach node where nodes with a higher BC value play an important role in connecting other ontologies and communities of ontologies. Validating the communities with MEDLINE We used information from MEDLINE abstracts (Miller, Lacroix & Backus, 2000), to analyse how often ontologies from same/different communities found in our latest time point appear together in scientific literature. The goal of this exercise was to validate the clusters with external information. We downloaded the 2016 version of MEDLINE in XML format and developed an algorithm to find pairs of ontology names in all abstracts published before August 2014 (our latest version of the graph is July 2014). Ontology names and abstracts were transformed to lower case characters before the comparison. Simple exact string matching was used to look for ontology names mentions. For example, in the following text “… we introduce GoPubMed, a web server which allows users to explore PubMed search results with the Gene Ontology…”, Gene Ontology would be identified. Aligning communities Running the community detection algorithm at five time points provides us with different number of communities for each time point. Our previous research (Kocbek et al., 2013) showed that most communities at the time point t contain at least some ontologies from the previous time point t − 1. The challenge is to align similar communities to compare graphs at multiple time points. With aligned communities we can identify communities that changed their size, new communities, or disappearing communities. There are several ways to find similar communities in evolving graphs (Freeman, 1977; Hopcroft et al., 2004) and no method suits all problems. So, how do we decide when two identified communities are similar? For p‘ractical reasons we wish to make this decision as simple as possible. Probably the simplest definition would be that two communities are more similar when they share the highest number of nodes compared to other pairs of communities. However, this simple method has a drawback. It has been proven that already small graph changes may affect MA score of Louvain algorithm (Aynaud & Guillaume, 2010). Since BioPortal represents a dynamic repository, it is likely that some identified communities represent unstable communities. Therefore, we wish to use a more stable method for identifying similar communities. We expect that ontologies with the highest BC scores play an important role in BioPortal as they will likely stay in the repository in the future. We call these ontologies community core ontologies. In addition, we should consider ontologies that are not shared between two communities. Based on these issues, we first define several terms that are explained in the following paragraphs. Let us imagine that we identified two groups of communities where group C1 contains communities identified at time point t1 and C2 contains communities identified at time point t2 (t2 > t1). First, we define the importance score of ontology o as: I o = B C o , t 1 + B C o , t 2 2 where BCo,t1 and BCo,t2 represent BC scores for ontology o at time points t1 and t2 respectively. Next, we define a similarity score SCcx,cy between two communities cx ∈ C2 and cy ∈ C1. The similarity score is based on a weighted version of the Dice coefficient (Dice, 1945) and represents a value between 0 and 1. We calculate the similarity score as: S C c x , c y = o O I o o O I o + o N I o where O represents a set of overlapping ontologies, and N represents a set of non-overlapping ontologies found in cx or cy. We also define the closest community to cx  ∈C1 (i.e.,  CCcx as the community cy ∈ C2 with the highest similarity score when comparing to cy: C C c x = c y with Max S C c x , c y . Let us illustrate these definitions on an example where we identified five communities at two different time points. At the first time point we identified two communities and at the second time point we identified three communities. Ontologies in each community and their BC scores are presented in Table 1. Figure 1 illustrates the steps described below. Table 1: An example illustrating identified communities at two different time points. tp1 (2 communities) tp2 (3 communities) Com Ont BC Com Ont BC c1 A 2 c3 B 6 B 4 F 2 C 3 c4 A 1 c2 D 0 C 4 E 1 c5 D 2 F 4 E 4 G 2 H 5 DOI: 10.7717/peerj.2990/table-1 Illustration of identified communities at two different time points tp1 and tp2. Figure 1: Illustration of identified communities at two different time points tp1 and tp2. Ontologies (circles) that belong to the same community are coloured the same. To calculate similarity scores between pairs of communities, we first calculate importance of ontologies: I A = 2 + 1 2 = 3 2 ; I B = 6 + 4 2 = 5 ; I C = 3 + 4 = 7 2 ; I D = 0 + 2 2 = 1 ; I E = 4 + 1 2 = 5 2 ; I F = 4 + 2 2 = 3 ; I G = 0 + 2 2 = 1 , I H = 0 + 5 2 = 5 2 . Next, we calculate the similarity score values for pairs of communities as follows: S C c3,c1 = I B I B + I A + I C + I F = 10 26 0 . 39 S C c3,c2 = I F I F + I B + I D + I E + I G = 0 . 24 S C c4,c1 = I A + I C I A + I C + I B = 0 . 5 S C c4,c2 = 0 I A + I C + I D + I E + I F + I G = 0 S C c5,c1 = 0 I A + I B + I C + I D + I E + I H = 0 S C c5,c2 = I D + I E I D + I E + I F + I G + I H = 0 . 35 . Based on these results, we summarize similar and same communities in Table 2. Similar communities are those whose similarity scores are higher than 0. Note that although c3 is similar to c1 and c2, c3 does not represent a closest community to any of the older communities c1 and c2, since c4 and c5 score higher similarity scores when compared to c2 and c3. Also note that our CC function is bi-directional, so we can also say that, for example, c1 is closest to c4. Table 2: An example of similar and same communities. Community Similar to Closest to c3 c1 and c2 / c4 c1 c1 c5 c2 c2 DOI: 10.7717/peerj.2990/table-2 Results and Analysis In the following sections we present statistics for identified (closest) communities and their main hub ontologies, present results of validation with MEDLINE abstracts, analyse transition (evolution) between different time points, analyse the coherence of communities, and present results of measuring effects of ontology sizes on community detection. Statistics, identified communities and their hub ontologies Table 3 shows statistics for all five versions of our graphs. The values in the first column are as follows: Table 3: Statistics for different versions of the graph. Oct12 Feb13 Aug13 Dec13 Jul14 MAV 0.346 0.339 0.343 0.435 0.402 #All 283 294 317 359 367 #Map 254 268 259 321 318 %Map 90% 91% 82% 89% 87% #NoMap 29 26 58 38 49 %NoMap 10% 9% 18% 11% 13% #Com 5 6 7 7 6 #C1 87 127 88 211 160 #C2 85 54 46 49 65 #C3 31 35 43 28 48 #C4 31 20 39 11 30 #C5 20 28 36 11 12 #C6 / 4 5 7 3 #C7 / / 2 4 / DOI: 10.7717/peerj.2990/table-3 Abbreviations are as follows: modularity analysis value number of all ontologies number of ontologies with at least one/no mappings percentage of ontologies with at least one/no mappings number of communities community x • MAV represents Modularity Analysis values, • #All is the number of all ontologies in the graph, • #Map is the number of ontologies with at least one mapping (source or target), • %Map is percentage of ontologies with at least one mapping (source or target), • #NoMap is the number of ontologies with no mappings, • %NoMap is the percentage of ontologies with no mappings, • #Com is the number of identified communities. The #Cx (0 < x < 8) values represent the number of ontologies in each identified community. The number of ontologies in each community orders communities. The MA values in Table 3 are all below 0.5 with highest being the last two versions. Low MA values indicate that it is difficult to identify well-structured and independent communities between BioPortal ontologies. We can notice that the number of all ontologies rises over time, which is a result of new ontologies being added to the repository. The proportion of mapped ontologies indicates that the majority of new ontologies have no mappings. The number of identified communities changed over time from five identified communities in Oct12 to six or seven identified communities in later versions. Figure 2 illustrates a part of identified communities from the August 2013 data, where each colour represents different community, and each node represents an ontology. Node size correspond to ontology BC values. We present changes in these communities (e.g., ontologies switching their communities, i.e., changing the colour in the graph) in the Transition analysis section. Illustration of identified communities in a graph. Figure 2: Illustration of identified communities in a graph. Different colours represent communities, while nodes represent ontologies. Node labels are ontology abbreviations and node sizes correspond to BC values. Grey nodes are ontologies with no mappings. Table 4 shows ontologies with the highest BC values (i.e., main hub ontologies) for each community (communities are again ranked by their size). SNOMEDCT (Systematized Nomenclature of Medicine—Clinical Terms) is the ontology with the highest overall BC score (ignoring the communities) in each version, which makes it the most important hub ontology. There are several reasons for that. First, SNOMEDCT contains other ontologies (e.g., RCD) and extensive sub terminologies that we expect to find represented in other ontologies. Next, according to BioPortal’s webpage, SNOMEDCT is also the first most viewed ontology with 50% more views than NDF (National Drug File), which is on the second place. Finally, SNOMEDCT has also been identified the most prominent hub ontology with Ghazvinian’s methods (Ghazvinian et al., 2009). In the next section we align the communities and discuss their changes between consecutive graphs. Validating the communities with MEDLINE We found 3,020 ontology pairs (less than 3% of all possible pairs) that were mentioned together in at least one abstract. Figure 3 shows proportions of ontology pairs found in at least 2 MEDLINE abstracts where each ontology is from either a different (red) or the same (blue) community. Although the differences on Fig. 3 are small (Y axis), we can notice that pairs where each ontology belongs to a different community tend to be found in lower number of abstracts (i.e., from 2 to 10 abstracts). On the other hand, ontology pairs that can be found together in large numbers of abstracts (e.g., 108, 152 or 164 abstracts) tend to belong to the same community. Proportion of ontology pairs found in different number of abstracts Figure 3: Proportion of ontology pairs found in different number of abstracts The horizontal axis displays the number of abstracts, while the vertical axis displays the proportion of ontology pairs for each number of abstracts. Table 4: Identified communities and their main hub ontologies for all versions of the graph. Please note that the communities are not aligned. Oct12 Feb13 Aug13 Dec13 Jul14 7 / / HIMC-CPT SWO / DOI: 10.7717/peerj.2990/table-4 Cardiac Electrophysiology Ontology National Cancer Institute Thesaurus Uber Anatomy Ontology Radiology Lexicon Systematized Nomenclature of Medicine—Clinical Terms Neuroscience Information Framework National Center for Biotechnology Information Organismal Classification Eagle-I Research Resource Ontology Taxonomy for Rehabilitation of Knee Conditions National Drug File—Reference Terminology Software Ontology Sage Bionetworks Synapse Ontology Semantic Web for Earth and Environment Technology Ontology Similarities between graph pairs. Figure 4: Similarities between graph pairs. (A) Feb13 vs Oct12, (B) Aug12 vs Feb13, (C) Dec13 vs Aug 13, and (D) Jul14 vs Dec13. Column and row names represent the main hub ontology for each identified community. Different shades of green correspond to similarity scores where darker colours represent higher numbers and lighter colours represent lower numbers. The NoMap row represents ontologies that had no mappings in the previous version of the graph but are members of one of the communities in the newer version. The New row represents ontologies that did not exist in the previous version of the graph. These results imply that identified communities contain ontologies that appear more often together in the literature. However, since most ontologies pairs were not found in the abstracts, different methods should be explored (e.g., citations to ontologies, analysing full texts, similarity matching). This is an area for future investigations. Transition analysis Figure 4 represents four heat maps for similarities between pairs of consecutive graph versions. Column and row names represent the main hub ontology for each identified community. Columns contain names for recent versions, while rows contain names for older versions. Different shades of green correspond to similarity scores where darker colours represent higher numbers and lighter colours represent lower numbers. White colour corresponds to the similarity score of zero and shows communities with no similarity. The NoMap row represents ontologies that had no mappings in the previous version of the graph but are members of one of the communities in the newer version. The New row represents ontologies that did not exist in the previous version of the graph. When observing heat maps on Fig. 4, we can see how communities evolve over time. Observing single columns indicates how many older communities or their parts merge into a single newer community (e.g., Red and Blue communities in Fig. 2 could merge into one community in the future). On the other hand, observing single rows indicates into how many new communities an older community splits (e.g., Red community in Fig. 2 could become two communities in the future). For example, let us consider the heat map A (we can interpret B, C and D in the similar way). Row names represent hub ontologies for the old version (Oct12), while column names represent ontologies for the new version (Feb 13) of the graph. The third row shows that all ontologies from the UBERON community stayed in the same community, i.e., the community did not split. On the other hand, observing row 2 shows that although the majority of Oct12 NCIT ontologies stayed in the closest community in Feb13 (i.e., NCIT, column 2), some ontologies also migrated into the NIF (column 1), UBERON (column 3), RADLEX (column 4) and SNOMEDCT (column 5) communities. The third column illustrates merging of parts of three different communities (i.e., NCIT, UBERON and RADLEX) into the new UBERON community. The heat map A also shows that the new identified community (i.e., NCBITaxon, last column) mainly consists of ontologies from the old EP (row 1) community and some ontologies that had no mappings in Oct12 (row 6). With the heat maps we can find pairs of closest communities, which are identified with the most intensive shades of green in each column. For example, on the heat map A, the NIF column contains three coloured squares. However, the square in the EP row is the most intensive shade of green, which identifies the closest community to NIF. In Table 5 we align identified closest communities and their corresponding main hub ontologies in groups from G1 to G6. Table 5: Aligned closest communities, and their main hub ontologies. Oct12 Feb13 Aug13 Dec13 Jul14 G6 / / / SWO SWO DOI: 10.7717/peerj.2990/table-5 Figure 5 shows the proportion of ontologies that “stay” in each group of the closest communities between two consecutive versions of the graph. As we notice, we identified six groups of the closest communities, where five of them keep more than half of ontologies in the first three versions of the graph. In Dec13, G1 and G2 keep majority of ontologies, while G3, G4 and G5 lose more than half of the ontologies. In the latest version only G5 loses more than half of the ontologies, while other communities keep the majority of their ontologies. Proportion of ontologies that stay in the same closest community between graph pairs. Figure 5: Proportion of ontologies that stay in the same closest community between graph pairs. Table 5 and Fig. 5 show that some closest communities keep the same core ontologies over several versions of graph (e.g., G2 and G3), while other closest communities contain different core ontologies for each version of the graph (G1 and G5). We could say that G2 group represents the most stable group over all versions of the graph. Figure 4 shows that more than 90% of the G2 ontologies stayed in the closest community in Feb13 and Jul14, and 80% of G2 ontologies stayed in the same community in Aug13 and Dec13. SNOMEDCT is G2’s core ontology for all versions of the graph. Figure 5 also shows that three groups of closest communities lost more than half of their ontologies in Dec13 with two G4 and G5 loosing more than 90% of their ontologies. When comparing these results with heat map C on Fig. 1, we notice that the majority of these ontologies joined the largest community (the first column and the second and third rows). Closer analysis of mapping data showed that many new mappings have been added to BioPortal in Dec13, which uses an updated version of BioPortal data, i.e., BioPortal 4. The latter was a major update of the portal that used largely updated data. Some of the mapping information is significantly different when comparing to older versions. For example, RADLEX had been core ontology in all the versions before December 2013. However, in the latest version this ontology has only a few mappings. Also, it is interesting that the latest two versions result in highest MAVs (Table 3), which indicates that ontologies might be clustered better compared to previous versions. It will be interesting to see if this affects stability in the future. An interesting community is the NCBITaxon community, which appears the Feb13 and Dec13 versions. We already learned that some taxonomy ontologies formed their own community in February 2013 (Kocbek et al., 2013). However, this community merged with the largest community in Aug13 (Fig. 1). The community was identified again in Dec13, but then again merged in Jul14. Considering Fig. 4 and the heat map D one can notice that communities in the last two versions keep most ontologies compared to previous versions. This indicates that the mapping data changed the least compared to previous data and BioPortal gained in stability. Analysing community coherence BioPortal groups ontologies into 41 categories such as Anatomy, Health, Ethology, and Gene Product. In addition, information about projects that use BioPortal ontologies is available. We use these two types of information to discuss the coherence of identified communities in our methods. Figure 6 illustrates distribution of top 5 categories with highest number of members (Health, Anatomy, Gross Anatomy, Phenotype, Animal Gross Anatomy) for all 5 graph versions. The horizontal axis present closest communities and the vertical axis present ratio of community members belonging to each category. Top 5 categories. Figure 6: Top 5 categories. Distribution of top 5 categories with highest number of members (Health, Anatomy, Gross Anatomy, Phenotype, Animal Gross Anatomy) for all 5 graph versions: Oct 12 (A), Feb13 (B), Aug13 (C), Dec13 (D), Jul14 (E). Charts on Fig. 6 show that all identified communities contain ontologies from different categories for all graph versions. However, we can notice that more than 90% of G5 ontologies in the Oct12 version belong to the Anatomy category and around 70% of G5 ontologies belong to the Gross Anatomy and Animal Gross Anatomy categories. In the future versions, G5 still contains the largest proportion of anatomy ontologies. Again, the Dec13 version shows major changes with large drop of anatomy ontologies in G5. We analysed mapping data for two ontologies that were in G5 in Aug13, i.e., Foundational Model of Anatomy (FMA) and Mosquito Gross Anatomy Ontology (TGMA). The former stayed in G5 also in Dec 13, while the latter switched to G1. We observed large increase of overlapping ontologies for both ontologies in Dec13. A large number of newly overlapping ontologies for TGMA belongs to other communities, which is probably the reason for its migration. Another distinct community is G2, where a large proportion of ontologies belongs to the Health category. Almost 70% of Oct12 G2 ontologies are categorised as health ontologies and present the majority in G2 future graphs as well. Health ontologies are distributed through other identified communities in the future and present large portions of G4 and G6. Communities G1 and G3 are more heterogeneous with a mixture of ontologies from all categories in all graph versions. We also investigated the BioPortal project data to analyse its alignment with identified communities. Each project has a list of ontologies that it uses and we investigated how these lists correspond to the identified communities for the Jul14 version. Project with the highest number of ontologies used 35 ontologies, while the majority of projects used a single ontology. We ignored the latter projects in our analysis since it was obvious that they will be aligned with a single community. Table 6 shows number or projects using ontologies from only 1, 2, 3, 4, 5 or 6 identified communities for 77 projects that use at least two ontologies. We can notice that most projects use ontologies from 2 or 3 identified communities. However, 12 projects use ontologies from the same community. In addition, some projects use the majority of ontologies from the same community. For example, G5, which contains most of anatomy ontologies as we discussed above, provides all ontologies for a database containing genomic and biological information on anopheline mosquitoes (i.e., the AnoBase project (Topalis et al., 2005)). G5 also contains 8 out of 10 ontologies for the Bgee database (Bastian et al., 2008), which compares expression patterns between animals. Bgee creates homology relationships between anatomical ontologies, and stores this information in a multi-species ontology. These examples show that our clusters contain all or the majority of ontologies being used in narrower projects. Table 6: Number of connected ontologies in each graph version for two anatomy ontologies. #Communities 1 2 3 4 5 6 #Projects 12 26 27 7 5 0 DOI: 10.7717/peerj.2990/table-6 Analysing the effect of ontology sizes on community detection An important factor that influences the number of mappings between two ontologies is the size (i.e., number of classes) of both ontologies. It is more likely that larger ontologies have higher number of mappings when compared to smaller ontologies. Unfortunately, we did not collect ontology sizes for each time spot in our analysis and historical data is not available through BioPortal’s API. We downloaded old versions of ontologies at the time of writing this paper and tried to manually parse the ontologies with the OWL API to calculate their sizes. The OWL API is a Java API and reference implementation for creating, manipulating and serialising ontologies (Horridge & Bechhofer, 2011). However, due to issues such as missing ontology imports, parsing errors, and license restrictions, we were unable to calculate correct sizes for a large number of ontologies. Ignoring these ontologies would not produce comparable results with our previous analysis. To address this problem, we gathered mapping information and ontology sizes for November 2015 and produced two new graphs. In the first graph, we applied the same community detection techniques as described in the previous sections, while in the second graph, we normalised number of mappings by ontology sizes. Table 7 shows results for two graphs using data gathered in November 2015 with two different sources for edge weights: (a) number of mappings, and (b) number of mappings normalised by ontology sizes. Both graphs result in 6 identified communities with the same hub ontologies. Between the two graphs, two communities are completely identical, while other three communities result in minor changes. Specifically, out of 437 ontologies, 12 ontologies (i.e., approx. 3%) change the communities. None of these ontologies were hub ontologies. These findings imply that ontology sizes do not play an important role in community detection for our data. However, we plan to investigate these findings in more depth in future graph versions. Table 7: Comparison of community information for November 2015 with and without considering ontology size. Size MAV #Ontologies #Comm #C1 #C2 #C3 #C4 #C5 #C6 No 0.346 437 6 255 107 30 26 12 7 Yes 0.339 437 6 259 106 29 24 12 7 DOI: 10.7717/peerj.2990/table-7 Discussion and Conclusion In this paper we focused on investigating a comprehensive repository of biomedical ontologies (BioPortal) using graph theory concepts. We performed the exploratory study of BioPortal’s mapping data over different time points. As far as we know, this is the first attempt of this kind. With investigating mapping data gathered at five different time points using graph theory methods, we identified similar and closest communities of overlapping ontologies, and demonstrated evolution of communities over time. We also tried to validate communities through mentions of their ontology members in MEDLINE abstracts. The five communities identified in the first version of the graph changed their size. We showed how communities appear, disappear, split or merge over time. Based on similarity scores we determined closest communities between pairs of different graph versions. We then analysed the stability of these closest communities. We discussed how identified communities align with BioPortal’s category and project information. We also identified core ontologies of the closest communities. When studying our conclusions, we should take into consideration some limitations of the work. First, the BioPortal repository can be publicly modified and no evaluation of the uploaded ontologies or mapping data is done. In addition, although we tried to identify them, there are probably some “test” ontologies left in our data. Therefore, we should expect some data noise. Our analysis also showed large differences in data between the Aug13 and Dec13 when BioPortal 4 was announced. Second, our method for identifying communities might favour larger ontologies since we do not consider ontology sizes when calculating edge weights. Although our analysis of data gathered in November 2015 implies that normalising edge numbers results in small changes in final graph, this remains an area for future investigation. Next, due to limitations of BioPortal’s web service API, we were not able to distinguish between different types of ontology mappings in older versions. For example, the MESH and RH-MESH ontologies have same concepts and only differ in syntactic translation, which has not been picked up by our methods. Finally, our observations highly depend on the Louvain method for community detection. We accept this method as a “ground truth” quality metrics of our clusters. The Louvain method was the only available method in Gephi and it is considered as the fastest and most accurate method in terms of modularity score (Aynaud & Guillaume, 2010). In the future, we plan to address the above issues, especially distinguishing between different types of mappings and considering ontology sizes. We also plan to consider other graph centrality measures and methods for community detections. Finally, we plan to perform a deeper analysis of changes in the underlying ontologies to investigate how these affect the broader graph clustering patterns. Supplemental Information Ontology mapping information Mappings between pairs of ontologies for different versions of graphs. DOI: 10.7717/peerj.2990/supp-1
global_01_local_1_shard_00001926_processed.jsonl/3086
XSEDE ECSS Staff at PSC Enable Non-Human Primate Genome Reference Transcriptome Resource to Support Study of Genes in Our Closest Relatives November 2013 In the card game “Concentration,” you place the 52 cards in a deck face down on a table. You turn one over; then you turn over another, with the intent of matching the numbers. If they don’t match, you turn them face down again. Then you repeat, trying to find the matches. Memory is paramount. When you see a “6” card, you have to remember where you last saw that number. Now imagine a game of Concentration in which the task not only involves 3 billion cards, but also the multiple ways they can be strung together to make winning poker hands. And imagine what kind of memory you’d need to find the matches. Thanks in part to PSC Blacklight’s best-in-world shared-memory and the Data Supercell’s ability to store and move huge amounts of data in a fluid and accessible way, the laboratory of Christopher Mason, assistant professor in the departments of Physiology and Biophysics and the Institute for Computational Biomedicine, Weil Cornell Medical College, and colleagues have spearheaded the first repository of the active genes in 13 nonhuman primates. The effort has been led by Lenore Pipes, an NSF graduate research fellow and student of Mason and Adam Siepel, associate professor of computational biology, Cornell University. Blacklight is a SGI UV shared-memory system; the Data Supercell, PSC’s archival system, is a low-cost, high-bandwidth, high-capacity and highly-reliable data management system. Reported in a January 2013 Nucleic Acids Research paper, the Non-Human Primate Reference Transcriptome Resource (NHPRTR) provides an electronic infrastructure to support researchers who are sequencing, comparing, and trying to understand genes in mankind’s closest relatives. Getting the geography down Understanding the genomes of the nonhuman primates—great apes such as chimpanzees, old world monkeys, new world monkeys and more primitive prosimians, such as lemurs—is important for understanding ourselves in health and disease, Mason explains. “Nonhuman primates are widely used models in pharmaceutical research,” he says. “Also, understanding their genomes allows us to answer evolutionary questions about how the human genome came to be.” But the state of the field in primate genome research is uneven, depending on which species you look at. “Not all primates’ genomes have been sequenced,” Mason says. Chimps and rhesus monkeys have been sequenced—but not enough times to ensure good proofreading. “Even for those that have been sequenced, there is an incomplete or poor annotation of what genes are present in these species.” Annotation is critical. If the genome were a map, for example, the DNA sequence would represent lines  for the roads and circles for the cities. Annotation is the process of putting labels on that map. “If you took a normal map but removed all the names of the cities, you wouldn’t know where Philadelphia is, where Pittsburgh is,” Mason says. “You would have no sense of geography. Annotation lets you navigate the human and primate genomes in the same way that an annotated map lets you navigate the U.S.” Uncovering the cards The initial work for the NHPRTR consisted of obtaining the sequences for the active genes in 13 primate genomes. In the cell, DNA is the master copy of the genetic material, encoding the blueprints for making the cell’s components in a series of bases: A, T, G and C. In order to express a gene, the cell copies its DNA sequence to RNA, a molecule closely related to DNA. The cell translates some of these RNA copies into proteins, the main actors in the cell. Other RNAs carry out specific functions on their own. The process of copying a gene’s DNA code into RNA is called transcription. The transcriptome is the collection of RNAs that are being expressed in an organism’s living tissues. The process of reading the RNA code requires fairly short segments—about 100 bases, for optimum efficiency. Because the genome is so much larger than that, researchers must first cut it into small, overlapping fragments. Once they have the sequences of these fragments—about 600 million of them for a typical species, though some of the primate group’s analyses looked at as many as 3 billion— the researchers can then reconstruct the entire transcriptome sequence by matching where the segments overlap. It’s much like playing a game of Concentration that follows all the ways that 3 billion cards could make a winning hand. But it gets harder. Many of the sequences are nearly, but not completely, identical. In addition, inevitably there are some errors in the sequence that have to be corrected, by covering each bit of the sequence multiple times. It’s hard to piece imperfect, redundant and nearly identical bits together in the proper order. In order to get it right, the scientists must construct a chart of possible ways of stringing them together, testing each possibility in turn. These charts are called De Bruijn graphs. Blacklight and Data SuperCell: all about the memory Blacklight speeded the calculation behind the matching considerably, Pipes says. A traditional, “distributed memory” supercomputer would have solved the problem by raw speed only, essentially uncovering each “card”—possibility in the De Bruijn graph—one at a time, then turning it face down to check another. Blacklight’s massive shared-memory, though, made that unnecessary—the machine was able to keep many possibilities in its memory at once, allowing for far more rapid matching. PSC’s Data Supercell (see Technical Note, p. 21) also allowed the researchers to use their massive amounts of data efficiently, making it available in large chunks with minimal retrieval delay. Running the problem on Blacklight required PSC staff to work with the developers of the De Bruijn graph software, Trinity, to optimize its performance on the new machine. “The primate NHPRTR study was the biggest thing anyone had tried to do with Trinity,” says Philip Blood, an ECSS subject expert and PSC senior scientific specialist, who helped the researchers in the crucial step of getting that software running on Blacklight. Getting the program to work on the new platform required painstaking trial and error. Annotation: Table of contents for expressed genes Some primate genomes have been sequenced already. More are likely to come as the technology becomes quicker, easier, and cheaper. “Sequencing DNA is really only the first step in understanding a genome,” Mason says. “You need to know what’s expressed, what’s active” from a DNA sequence, in the RNA, to make sense of how an animal’s genome works, he adds. “Our transcriptome maps create the first catalog of functional, active elements in a given genome. That is the first essential step of delineating the molecular recipe that defines the synthesis of the entire organism, from one cell to the trillions of cells in an adult.” The transcriptome contains the sequences of all the active genes in a given cell or tissue. By comparing the sequences in the transcriptome to those in the genome, researchers can tell which genes are active. It’s a particularly important question in understanding why humans and chimpanzees are different. Both species’ DNA is very similar—96 percent of the sequences are identical. Because of that many researchers suspect that they may express different genes at different times in specific tissues, painting a very different picture out of an almost identical palette of colors. This is the sort of question that the NHPRTR will help primate researchers to tackle, Pipes says. At the moment, the NHPRTR represents 13 key primate species identified by researchers in the field. In the next stage of the research, they will focus on deep sequencing of matching tissues from various individuals, including the molecular characterization of the various brain regions between these animals. They’ll also look at the evolution of gene structure, alternative splicing and the catalog of species-specific genes. Taken together, these data inform not only the functional map of genes for these primates, but ultimately help answer the age-old question at a genetic level, “What makes us human?” Upcoming Events Events Calendar <<  December 2018  >>  Su  Mo  Tu  We  Th  Fr  Sa    2  3  4  5  6  7  8 System Status • Bridges is Up   Bridges is running normally, however is unavailable due to maintenance. Featured Projects Brain Image Library (BIL) XSEDE Partner image gallery
global_01_local_1_shard_00001926_processed.jsonl/3093
Blog Q&A Calculators Students Logbook Contact Pension Fund Contributions Posted 26 June 2016 under Tax Q&A Andrew says: 26 June 2016 at 14:49 Under the "Retirement" section of the tax return on TaxTim, it says "Did you make monthly contributions to a Pension Fund, Retirement Annuity Fund or a Provident Fund OTHER THAN the contributions you already entered before?" I am on a CTC and only contribute to a pension fund via my Employer. These contributions are therefore not reflected on my PAYE certificate. I have therefore not entered any contributions in the "PAYE 5 Employer Tax Certificate" section of TaxTim (referred to above). Do I now need to enter separately any contributions to the pension fund in the "Retirement" section? TaxTim TaxTim says: 26 June 2016 at 15:04 No additional entry is required, as the contributions as part of CTC reduces you taxable income every month. So the income declared has already been reduced. Get Inland Revenue Tax Dates and Deadlines in your Inbox Let TaxTim help you submit your Tax returns! TaxTim will help you: • Do Your Tax Return Easily • Avoid penalties • Save money Get started
global_01_local_1_shard_00001926_processed.jsonl/3125
14 Nov LA OTRACINA is unquestionably the band of the week. Photobucket Pictures, Images and Photos What is the criteria for this doubtlessly dubious distinction? Ill-defined at best. It’s tempting to simply capture the words of the promotional sticker on the band’s “Blood Moon Riders” album, which states the following: “Inverted progressive surf rock, liberated from psychedelic epithets.” It’s tempting to say any band willing to lay down that kind of mission statement – to invoke the spirit of liberation, progression, inversion and an alternate dimension wherein The Ventures crash-landed on Venus the same night Buddy Holly joined the choir invisible – should be the band of the week. Why resist the temptation? No reason at all – beyond the fact that La Otracina is not just any band, and this point cannot be stressed strongly enough. Liberated from psychedelic epithets, Brooklyn’s La Otracina wins the space race the old-fashioned way: by turning the Orange amps up to twelve and proceeding to split your brain clean in half, moving seamlessly through an entire galaxy of riff-tactic solar flares and a backbeat you can really dance (if you’re into that sort of thing). Photobucket Pictures, Images and Photos Power-trio? Yes. Massive walls of guitar heroics spread perfectly across an incalcuable hooks-per-minute ratio? Yes, yes. Killers of reality, or bringers of the new dawn? Doesn’t matter. Define your own reality. Alan Watts says reality is just a Rorshach inkblot. La Otracina is the band of the week, and they say reality has got to die. Download: LA OTRACINA – “Beyond the Smoke” (from the “Beyond the Smoke” August ’09 Tour CD-R) Photobucket Pictures, Images and Photos Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_1_shard_00001926_processed.jsonl/3135
Once There Was A Winter 2016 / HD Colour / Feature Currently in post-production A winter wonderland, a young Lady secluded in a doublewide trailer with flowing liquor, a Hunter, a Welder, a Plumber, guns, bullets, a missing wife, and ambiguous sexual tension… What could go wrong? Winter is a feature length, twisted psychological thriller where escape into frozen nature is as dangerous as the hot trap of shelter. Set in a deceptively beautiful snowy landscape, a young adventurous student finds herself in over her head in a secluded doublewide trailer. It’s trial by fire as she negotiates her safety with three men when mating rituals and power struggles fueled by guns, liquor, and a secret threaten them all. Writer/Director: Ana Valine Producers: Lori Lozinski, Seanna McPherson, & Ana Valine Cinematographer: Michael LeBlanc Production Design: Grant Pearse Funding: Telefilm Canada Production Companies: Original Title One Productions (Violator Films Inc. & Rodeo Queen Pictures Inc.) Kate Corbett Teach Grant Juan Riedinger Kris Demeanor
global_01_local_1_shard_00001926_processed.jsonl/3136
Monday, August 8, 2016 The Zoo Trip 1 comment: 1. The Zoo Trip- Before visiting the zoo we studied zoos and endangered animals. We found out they have breeding programmes for endangered animals in our zoo. The Zoo people keep animals occupied by giving them challenges in finding their food and by giving them toys. Zoo people try to make the animals' enclosures like their natural habitat. When we went to the zoo we were looking for information- Do the animals have young (babies)? Do they look occupied?or bored? Do they look fit and healthy? Do they space to move around?
global_01_local_1_shard_00001926_processed.jsonl/3150
August 17, 2017 Questions To Ask Your Kit Camper – Thursday 1. On Wednesday your group had a great splash fight in the river. What happened? Was it fun? Did you get splashed? 2. Tell me about your big game of Werewolf on Thursday. Where did you play? What animal were you in the game? 3. What stories have you heard from the counselors this week at story & song time? Which one is your favorite? Why? BUFFALO CAMP (Pam’s Group) 1. Sock Wars and Werewolf are two of the games that you’ve played this week. How are they different? Where did you play them? Which one do you like better? Why? 2. Your group has spent lots of time playing in the Eno River this week. What have you done at water time? Have you gone down the chute? What is it? 3. Can you tell me about the box turtle your group found on Wednesday? Where was it? What did it look like? Was it scared? How could you tell?
global_01_local_1_shard_00001926_processed.jsonl/3160
In an extra from Edward Snowden's interview with John Oliver, Snowdon advises that a good password to use is one such as MargaretThatcheris110%SEXY.. Also, on the Errata Security blog, Robert Graham says on the matter: NSA leaker Edward Snowden recent suggested that a strong password would look like "MargaretThatcheris110%SEXY". he's been criticized for this, but actually, it indeed pretty strong. Yes, there are lots dictionary and Markov weakness, but they are compensated for by length. All else being equal, longer is better. Indeed, whatever password you have now, simply adding "xxxxxxxxxxx" onto the end of it it likely to make it unbreakable, and it's extremely easy for you to remember. A password like "MaThis110%SX" is a 12 character password such that even the NSA is unlikely to be able to break it if it were your Lastpass password -- Snowden's longer form doesn't make it worse. (Note, some people claim this Snowden example isn't so secure, but they are wrong). Now, on previous discussions on here we have learnt that the human brain is bad at being random. We also know that password entropy isn't based on what's in the actual password, but how the password was generated. For example, the following password may be considered strong on first glance: However, say that Bob always generates his passwords by combining the following words in his password generation text file together in a random order, and the attacker knows that, then the password is not so strong. One of the comments on the Wired article is: if I was trying to crack a hash I wouldn't just assume from the beginning that all passwords follow a female_names+surnames+english_word+english_word+known_passwords pattern and then wait up to 7 days to see if I was correct. If I knew it was that pattern, then Snowden's password would have 33.041 bits of entropy. Otherwise, the entropy would be considerably higher (>100 bits). This describes the crux of my question. If I made such a password like MargaretThatcheris110%SEXY., a "strength meter" such as zxcvbn gives the entropy as 39.6 (including the full stop). However, nobody knows that I generated the way zxcvbn breaks it down. And even if they did know I'd used that method in the past, I might use a different method for my next password (e.g. male_name+number+english_word+french_word+known_password+diceword). As tylerl notes in another answer: If an attacker knows that I might use "human brain made up" sequence definitions, possibly with "human brain made up" values to fill in those sequences, does this actually help them in any practical sense? What I mean is the entropy value of 39.6 doesn't really mean it can be attacked by a brute force attack filling that keyspace, because the attacker does not know the structure. I realise in security the only things that should be secret are passwords and secret keys, the mechanisms themselves should be considered known and public. However, the way the password is generated could be considered private because know one else knows the exact method. Obviously Snowden has revealed this publically, but for his next password he'll do it slightly differently. Is this why Graham disagrees that Snowden's example is more secure than the entropy analysis suggests? Also related: Has human-generated entropy ever been a real problem? • 1 I sense a lot of confusion about some basic points here. So, just to head some of it off, let me remind folks: it is meaningless to talk about the entropy of a (single) password; that's not well-defined. You can't talk about the entropy of a single value; instead, what is well-defined is the entropy of a distribution or a random process. So, if we hypothesize a particular random process for generating a password, then we can compute the entropy of that process. Those online "entropy calculators" don't actually calculate the entropy; they just compute some (possibly lousy) approximation. – D.W. Jul 1 '15 at 1:47 • 1 I think relying on the secrecy of your password generation scheme for security is a violation of Kerckhoffs's principle. That said, 39.6 bits of entropy seems okay for something like a remote web service, assuming that's an accurate calculation (I'm not sure whether it is or not). 4 random common words still seems like a better scheme IMO. – Ajedi32 Jul 1 '15 at 15:48 • If nobody would ever come up with it as a password, doesn't that mean that the entropy is effectively infinite? So, all you need to do is substitute a different percentage and you're good to go... (n.b.: this is obviously said in jest. Real life is a lot more complicated than that.) – a CVn Oct 19 '15 at 15:39 up vote 7 down vote accepted As tylerl noted, entropy isn't really a measure of password strength, but it is the best that we've got: Even though the MargaretThatcheris110%SEXY. password, when analysed, has an entropy of 39.6 bits, the generation method is randomised (albeit by the human brain). This makes it difficult to gauge its actual strength. This faux randomisation will also make it difficult for an attacker to put together a wordlist without knowing the structure itself of that particular password. Unless the end-user is using the same structure for multiple passwords (which might accidentally happen should they generate enough that they need to remember), then this lack of entropy doesn't really help the attacker. This is why Graham disagrees that Snowden's password is weak. It is impossible to judge whether any given single password is "weak" or "strong". might be a secure password, however if it is in the attacker's dictionary then it is not. Password "strength" meters like zxcvbn can give a breakdown of how your password might be constructed, and if it falls into a common sequence then that may prompt you to go for a different one. The sequence of female_names + surnames + english word + english word + digits + common password + character that zxcvbn determines from MargaretThatcheris110%SEXY. is not likely to be very common, therefore an attacker would only choose to attack the keyspace of this entropy distribution if they have a specific reason to do so. This means MargaretThatcheris110%SEXY. is probably as NSA proof as Graham suggests. • so, you asked the question so that you could answer it, for points or what? i know its allowed, but seems silly – n00b Jun 30 '15 at 17:33 • @n00b I was wondering the same. However, on SO, I have asked a question and then a few hours later actually figured it out. – Jared Burrows Jun 30 '15 at 18:09 • 7 Answering your own question:… – circuitBurn Jun 30 '15 at 21:02 • "entropy isn't really a measure of password strength" - Not sure what your justification for that statement is. There's no source or citation or explanation. Sounds like a dubious conclusion to me. Why wouldn't it be a measure of password strength? – D.W. Jul 1 '15 at 1:44 • @D.W.: Answer updated with citation (it was linked and partially quoted in the original question though). – SilverlightFox Jul 1 '15 at 8:26 The problem with entropy as a measure of password strength is it really does have to be applied to the input not the output. If I base64 encode the word "password" I get something that looks strong, but really isn't. So measuring entropy bits is really a best case. If you look at purely random generation the per symbol entropy for even relatively small keyspaces is actually not as bad as you might imagine. With reference to: Case insensitive letters are 4.7 bits per symbol. All ascii is 6.5 per symbol. So as long as my password using just 'normal letters' is 50% longer, it's 'more secure'. But realistically - even a randomly generated password may not be that random. It looks good, but it isn't. A human brain generated password is similarly ... not all that random, but there's an important caveat - unless I know how your brain works, I can't tell the algorithm you may have used. I may be able to guess - and indeed, this is how dictionary attacks work. You make a a set of dictionary driven 'password rules', which is very simply a case of sticking together symbols and trying to 'guess' those. This massively reduces your entropy from a 'best case' of random characters. I think XCKD quotes "correcthorsebatterystaple" as bring around 44 bits instead of the theoretical 122 that a string that length could be. So ... short answer - it's next to impossible to tell. Don't let people brute force your passwords even if you are confident :). Sure Snowden's password "algorithm" is now known and that reduce the potential keyspace to an attackable range. Now Snowden is smart enough to know this and I would presume would not use a password based on the same algorithm or even one similar in the future. There are however two issues to consider. The first is information leakage when sharing derived secrets. The only advantage of using an algorithm over just random words (diceware) would be the to produce multiple secure secrets from the algorithm. An example would be deriving two passwords which would be easier to memorize than two purely random values. Lets assume that without knowing the algorithm that both derived passwords are too complex to be broken by brute force. The issue is that there are other ways to obtain one of the passwords and that reduces the strength of the other noe. For example if someone one password to encrypt a document and the other as their facebook login that would be very bad. Law enforcement could use legal powers to intercept the facebook password and based on the results derive the algorithm or a substantial portion of the algorithm and then cut the entropy of the secret document password from >100 bits down to 40. From unbreakable to breakable due to leakage. So yes in an abstract analysis it is very secure but the real world is complex. We have to consider where the derived passwords will be used. When two values are linked there is more risk because leaking information can compromise the underlying algorithm. If you are assuming the algorithm will remain a secret then that is a problem. If you assume the algorithm will not remain a secret then you will need more complex passwords and you lose the value of the algorithm over say just using multiple random passwords. When we pass a secret to a third party (i.e. a login to a website) we lose control over it and that is the problem in a nutshell. I used the example of law enforcement compelling facebook to record the next login but it could be the website has bad security and stores it in plain text, or one of the employees in malicious and recording all logins as they happen, or the site gets hacked doesn't know it and a third party (possibly one w/ 3 letters) is covertly recording the logins. If I can't control the security of a secret I don't want that secret tied to other secrets. I can't control if facebook will compromise the security of that one secret but I can compartmentalize the damage. A password manager protected by a strong password that stores randomly generated site passwords ensures there is no upstream linkage. A compromise of the master password, compromises all stored passwords but there is no way for the leaked facebook password, can compromise the secret document password. Still with a "master password" while there isn't upstream linkage there is linkage of all the secrets and the master password which is potentially bad for similar reasons. For a higher level of security it may be useful to isolate higher security secrets from lower security secrets by using an algorithm plus random value stored in the password manager for the high level secrets. Thus a compromise of the master password would compromise all the low level secrets but not necessarily the higher level ones. • It may be a known algorithm now, but the key space of "a relatively short English sentence that may or may not make sense" is one hell of a large key space to attempt to bruteforce. PGP/GPG isn't any less secure just because people know how it's calculated. – Shadur Jun 30 '15 at 17:58 I think the most important component to trying to analyze this quantitatively is So with that in mind, the permutations of password generation algorithms need to be included as bits of entropy since it is possible the attacker is out there putting together a stable of brute forcers for each possible generation scheme (the xkcd scheme, the zxcvbn scheme, the schneier scheme, etc. which all trade some amount of entropy for ease of memory recall) and will ultimately just line them all up and fire them at your hash should they get the chance. Some clever use of google would probably reveal the top 6 or 8 methods for "memorable password creation" and that would be the place to start if you wanted to come up with a more complete entropy analysis. Your Answer
global_01_local_1_shard_00001926_processed.jsonl/3163
LED lights may cost a little more up front, but they last longer and save energy, making them cheaper in the long run What Is an LED Light Bulb? LED light bulbs are the newest innovation in the lighting industry, and they use a different technology than previous light bulbs (such as traditional incandescent or compact fluorescent). Instead of heating up a filament as in traditional light bulbs, LED light bulbs activate light emitting diodes which are semiconductors that cause electrons to release light energy. LED light bulbs typically combine a large number of these diodes to increase brightness until it reaches the brightness of an incandescent. Why Go LED? You’ve probably noticed by now that LED light bulbs are 10 times more expensive than traditional incandescent light bulbs, and so you might be scratching your head trying to figure out why people would want LEDs. The answer is both in the increased lifespan of the LED light bulb as well as the dramatic energy savings. In order to capitalize on LED lighting, you will have to use them over a ten year period. Besides the money savings, you will also be helping to reduce energy use which will cut down on greenhouse gas emissions overall. First let’s break down replacement costs. The typical incandescent light bulb costs approximately $2 while a typical LED light bulb might cost around $20. When you consider the average lifespan of each however, you begin to think LED light bulbs are pretty attractive: incandescents last around 2,000 hours, and LED light bulbs last 25,000 hours, outlasting incandescents by a lot more than 10 times. So, if you plan on using the bulb for 10 years or more, you’ve already reclaimed your investment. LED Bulb LED Light Bulbs can last more than 10 times longer than standard incandescent light bulbs This of course is just talking about the replacement costs of the bulbs themselves. But if you consider the costs of replacing bulbs, especially in commercial or industrial environments, the labor costs can be quite daunting! Consider all the places where light bulbs are installed and how hard it is to get to some of those locations. The additional labor costs quickly add to the total cost of the bulbs. Learn more about cost savings with LED lighting for the home. It even gets better economically for LED light bulbs when you consider the energy savings. In order to compare energy consumption, first let’s clarify how we measure it. The brightness of a bulb (how much light is emitted) is measured in units called lumens. Typical 60W incandescent bulbs spit out around 660 lumens while a typical 9W LED light bulb will emit around 900 lumens. Even though the LED light bulb we’re talking about emits 27% more light than the incandescent, it consumes 51W less energy. If we take our 10 year scenario again, you are looking at an approximate savings of around $160 per bulb (assuming 15 cents per KWh and an average burn time of 6 hours per day). LED light bulbs save more and more money for those who choose it over standard incandescent light bulbs. What Kinds of LED Light Bulbs are Available? LED Light Bulb • Standard Household LED Light Bulb (E27)—The most common types of light bulbs in houses have the typical screw-on base called E27 (an Edison base). These light bulbs have a number of LEDs inside a compact casing. Because of the compact nature of the bulb, heat sink technology must also be applied to make sure all the electronics inside do not overheat. • LED GU10 • LED Track Lighting (GU10, GX5.3, GU4, GZ4)—LED light bulbs are also made for household or commercial track lighting, featuring all of the standard base connectors used for track lighting fixtures including GU10, GX5.3, GU4, and GZ4 bases. • LED MR16 • Multifaceted Reflector (MR16, MR11, MR8)—Multifaceted reflector refers not to the type of base connector, but to the design of the casing that can enhance the light output of the bulb. Multifaceted reflectors (MR) use highly reflective metals, while the number refers to the diameter of the light bulb in eighths of an inch (MR16 therefore is 2 inches wide). • LED Floodlight • LED Floodlights—Floodlights are another popular iteration of LED lamps because of their immense light output. Floodlights typically fit in fixtures that don’t require a compact design, and they are often mounted outside. Because of its bigger size and open design, the heat problems associated with compact bulbs aren’t as much of a problem, and more LEDs can be employed, giving you a much higher lumen output. • LEDTube Light • Tube Lamps (T2, T4, T5, T8, T9, T10, T12, T17, PG17)—Tube lamps have been manufactured since the first half of the 20th century and are largely employed in office or industrial environments. These bulbs have G5, G10 or G13 connector sockets. Because of their spread out nature, the LEDs in these bulbs don’t get quite as hot, and so heat sinks are typically minimal for this application. • LED Light Bulb • Dimmable LED Light Bulbs-- Manufacturers of LED light bulbs have also come out with dimmable bulbs. Dimmable bulbs are great for mood lighting in living rooms, home theaters, high-end conference rooms, commercial lobbies, and more. These bulbs must also be paired with a hardware dial or switch that allows the user to select the desired brightness. These bulbs also tend to be significantly more expensive and they also tend not to achieve quite the same efficiency as an on/off LED bulb. Typical on/off LED bulbs come close to achieving 100 Lumens per watt, while dimmables are more likely to output around 75 lumens per watt on average (depending on the dim settings you use most). • LED Light Strip • LED Light Strips—These strips can be rigid or flexible, and they can be simple ribbons or can have weather protective jackets. These strips also often include colored LEDs that are great for decorative lighting, accent lighting, or for special occasions like holidays. • LED Light Panel • LED Panels—Manufacturers have now begun making flat panels covered with LED lights. These panels are used in office ceilings (like in a drop ceiling) to illuminate a room, and are also being integrated into photography lighting applications. More resources about LED Light Bulbs: Done researching? Find what you need here: Saffron by Sewell LED Lightbulb E27 Saffron by Sewell 10W Light bulb E27 Saffron by Sewell 15W Spotlight E27 Multifaceted Reflector Saffron by Sewell 7W Spotlight MR16 LED Track Lighting Saffron by Sewell 7W Spotlight GU10
global_01_local_1_shard_00001926_processed.jsonl/3179
Connascence: a mis-step Let’s revisit that early code. After I had fixed the CoV arising from making the first test pass, the Checkout looked like this: public class Checkout { private int balance = 0; public void scan(String sku, int price) { balance = price; public int currentBalance() { return balance; Then in the second article, after I had recycled the test to add multiple scanned items, the Checkout had become: public class Checkout { private Money balance = Money.ZERO; public Checkout scan(String sku, Money price) { balance = balance.add(price); return this; public Money currentBalance() { return balance; I had blindly made the Checkout keep a running balance, without pausing to realise that there was an alternative: I could have made it remember the scanned items, and only total them up in the currentBalance() method. Had I done so, it would then have been natural to calculate the discounts there too. And that could have been done by a special offer object that had no state. Thus avoiding all that faffing about with factories! The problem I have with that, though, is that the code I wrote for the first (recycled) test was simpler than the alternative. I had no test, and no connascence, pushing me to remember the scanned items and total them later. At least, right now I can’t see that test or that connascence. I feel that either my blind approach has led me to a poor design that will cost a lot to correct, or that I failed to spot something that could have prevented this. Food for thought… 6 thoughts on “Connascence: a mis-step 1. What about the following example? We know we get a 20p discount for 2 A’s. Let’s assume another rule that states there are no discounts at all if at least one B was scanned (just for the sake of exposing the “problem”). In that case calculating the right balance in the method ‘scan’ would be harder, because for the test case “AAB”, the method would have to somehow undo the discount for two A’s. Now, alternative would be to save the potential 2A-discount as a field and apply it in the ‘currentBalance’ method. (that’s Connascence of Algorithm because every new type of discount forces me change both methods). Further, the rules could get so complex that all sorts of potential discounts would undo each other after every scan (Contranascence of discounts). On the other hand, if we calculate the discounts in ‘currentBalance’ we save ourselves the problem of undoing or shared algorithm across 2 methods. Does that make any sense? 2. You may have fallen into a common trap when using TDD – expecting it to solve the problem rather than guiding your solution into a good implementation. TDD works well if you have a broad idea of how you want to solve the problem – however it will often fail at driving out the solution because it appears to force most people to thinking at the micro (rather than the macro) level. A classic illustration of this is summarised here Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/3219
"Hierarch, I don't understand how this is possible, but... my scanners are detecting high solarite concentrations in the native beasts here." - Karax(src) The slayn elemental is a creature found on the planet Slayn, homeworld of the Tal'darim. They appear to prey on the local dirge beetles. When the Daelaam came to Slayn to aid Alarak in fighting Ma'lash, phasesmith Karax detected solarite signals coming from the elementals, and advised Artanis and his forces kill them to retrieve it. Karax ultimately discovered the elementals had an unusual digestive system, and the solarite was a byproduct of it. The retrieved solarite was used to help power the Spear of Adun.[1] Game UnitEdit While it doesn't appear much in pure stats, the Slayn elemental is a dangerous enemy. It can ensnare units in a solarite cocoon, preventing them from moving and attacking, and draining HP from them rapidly to heal itself. Move out in large numbers against it, as ensnared units can be attacked to free them from their trappings, also stopping the elemental from draining their health. In smaller numbers, the elemental will likely encase all the player's units, rendering them helpless until death while the elemental will likely escape the fight unharmed. Each elemental killed gives +5 solarite. Co-op MissionsEdit Slayn elementals appear in Chain of Ascension. They have increased stats from their campaign counterparts, and gain an area-of-effect attack.[2] 1. Blizzard Entertainment. StarCraft II: Legacy of the Void. Mission: Rak'shir. (in English). 2015-11-10 2. 2016-03-17. New Co-Op Mission: Chain of Ascension. StarCraft II. Accessed 2016-03-17.
global_01_local_1_shard_00001926_processed.jsonl/3229
2. Greetings Guest!! Dismiss Notice Dismiss Notice 4. Hail Guest!, Dismiss Notice just wondering ... Discussion in 'UHall' started by Lord Kynd, May 13, 2008. 1. Lord Kynd Lord Kynd Guest the shields and swords from the new cove part of event when you try to enhance they break, has anyone been able to ? or maybe we are trying with the wrong thing to enhance them with ?
global_01_local_1_shard_00001926_processed.jsonl/3231
They do not believe in the dual nature of Jesus, being both fully God and fully man.  Jesus was God became man, died and became God again.  Christ is now fully God, but subordinate to his Father.  Jesus is Jehovah of the Old Testament. Born of a Virgin LDS believe Jesus was born of a virgin.  Mary was in some unspecified manner made pregnant by God the Father, through the power of the Holy Spirit.  Hence Jesus is not a metaphorical Son, but a begotten Son.  Jesus is not the son of the Holy Spirit, but of the Father through the Holy Spirit.
global_01_local_1_shard_00001926_processed.jsonl/3238
Emma Blackery at Sugar Factory, Tuesday 9 October 2018 Emma Blackery Fiona likes Emma Blackery, and had a VIP meet-and-greet ticket for this gig. (She had met her once before, during a signing session at Vidcon last year.) The VIP session started at 18:00, so we got there early, and Fiona went in while I hopped over to the Apple Store. When they let me in at 19:00 with the rest of the ordinary ticket-holders, Fiona was up near the front of the stage chatting and laughing with a group of other fans, and decked out in as much merch as she could afford with the money I had given her. She was in her element. The Sugar Factory is a small venue, and anywhere was going to be close to the stage. I staked out a spot near the far side of the room, on a slightly raised step next to the unoccupied DJ stand. This gave me a high enough view to see over the heads of any tall Dutch folk, and get some great pictures with my new camera. There was enough space for Fiona to sit up on the table when she found herself tired of standing after Lilly Ahlberg’s opening set. Set list: 1. Villains Part 1 2. Dirt 3. Third Eye 4. Let Me Be 5. Agenda 6. Fake Friends 7. Icarus 8. Petty 9. Sucks To Be You 10. Telegram Undercover Lover 11. What I Felt With You 12. Lies 13. Human Behaviour 14. Take Me Out 1. Burn The Witch 2. Villains Part 2 Lilly Ahlberg Lilly Ahlberg Emma Blackery and band Emma Blackery Emma Blackery and band Emma Blackery and band, including Sir Jony Ive on guitar.
global_01_local_1_shard_00001926_processed.jsonl/3240
WordPress Plugins 101 Let's take a look at WordPress Plugins.  You need to run WordPress.org to run plugins.  Plugins are a piece of code that extend the functionality of WordPress. Think: photo gallery, social sharing, forms,  message boards, event calendars, or anything you need to make your website awesome.  It's the very nature of WordPress with its feature rich and user friendly publishing platform that makes it's a webmaster's dream with it's open source code,  support community and extensibility. What is a … [Read more...]
global_01_local_1_shard_00001926_processed.jsonl/3244
2 Projects to 1 repository? Can I link 2 different project to 1 repository of 1 project? You can’t ‘link’ Glitch projects to any repo at the moment - we only support exporting to repos on demand. You are able to export to whichever repo you like, though. You’d need to handle merging of those multiple projects once exported, which might be tricky depending on whether you have any common files. I mean, when I have in my project in the package.json “repository”: { “url”: “Project_link” What is that? take a look at https://docs.npmjs.com/files/package.json#repository That means. It does not work for glitch.com? Will it come somewhen? You can use https://api.glitch.com/project-name/git if you want I cant open this link. Git can. Per the article I linked you to: “It should not be a url to an html project page that you put in your browser. It’s for computers.” So, I should put that link in to my package.json? and also in the second project package.json? It gives me this error with “repository”: { “url”: “https://api.glitch.com/name/git parse error: Invalid numeric literal at line 33, column 7 I’d check your code as it should work fine. The following works fine for me so just copy and paste it, replacing project-name: "repository": { "type": "git", "url": "https://api.glitch.com/project-name/git" So, I need to set that to my both projects? Then it should work? Is it possible to open the repository? How can I save the project on it? Yes, though I’m not sure what you’re expecting to happen - it’s just a reference as explained in the article I linked you to. You can push and pull from it using git. It automatically runs in the background of your Glitch project, you don’t need to do anything to save the project on it. Snapshots are taken as you make changes.
global_01_local_1_shard_00001926_processed.jsonl/3247
Wondfo Combo Packs - 100 Ovulation / 20 Pregnancy w/ cups Regular price $29.98 Sale About the product • All Tests FDA-Approved and over 99% Accurate • Allows you to pinpoint when ovulation occurs - the time you're most likely to conceive! • Provides earliest detection of pregnancy - 4, or more, days before your period is due. • Quick, discreet, free, first class shipping.